text stringlengths 454 608k | url stringlengths 17 896 | dump stringclasses 91
values | source stringclasses 1
value | word_count int64 101 114k | flesch_reading_ease float64 50 104 |
|---|---|---|---|---|---|
This is CodeEval problem #169 and I am going to show how I have written a Python 3 solution for it.
Firstly, I have converted the given samples to test cases:
def test_provided_1(self): self.assertEqual('bh1770.h', solution('*7* johab.py gen_probe.ko palmtx.h macpath.py tzp dm-dirty-log.h bh1770.h pktloc faillog.8.gz zconf.gperf')) def test_provided_2(self): self.assertEqual('IBM1008_420.so', solution('*[0123456789]*[auoei]* IBM1008_420.so zfgrep limits.conf.5.gz tc.h ilogb.3.gz limits.conf CyrAsia-TerminusBold28x14.psf.gz nf_conntrack_sip.ko DistUpgradeViewNonInteractive.pyc NFKDQC')) def test_provided_3(self): self.assertEqual('menu_no_no.utf-8.vim', solution('*.??? max_user_watches arptables.h net_namespace Kannada.pl menu_no_no.utf-8.vim shtags.1 unistd_32_ia32.h gettext-tools.mo ntpdate.md5sums linkat.2.gz')) def test_provided_4(self): self.assertEqual('-', solution('*.pdf OldItali.pl term.log plymouth-upstart-bridge rand.so libipw.ko jisfreq.pyc impedance-analyzer xmon.h 1.5.0.3.txt bank')) def test_provided_5(self): self.assertEqual('groff-base.conffiles', solution('g*.* 56b8a0b6.0 sl.vim digctl.h groff-base.conffiles python-software-properties.md5sums CountryInformation.py use_zero_page session-noninteractive d2i_RSAPublicKey.3ssl.gz container-detect.log.4.gz')) def test_provided_6(self): self.assertEqual('46b2fd3b.0 libip6t_frag.so', solution('*[0123456789]* keyboard.h machinecheck 46b2fd3b.0 libip6t_frag.so timer_defs.h nano-menu.xpm NI vim-keys.conf setjmp.h memcg'))Then I noticed the regular expression grammar is close with the one used in many programming languages, Python included. With a few slight differences.
A dot ('.') in the pattern means just a dot.
A question mark ('?') means a single character whichever, what we use to represent with a dot.
A star ('*') means any number of any characters, without the need of a dot before it.
And, there is one more change that is not given in the problem description but it is caught by the third test case.
The pattern should cover the entire string. So, for instance "*.???" means that a matching string starts with whatever and ends with three unspecified characters after a dot. So basically, it is like the behavior of the python re match() function when is passed a dollar sign ('$') at the end of the string.
Given the changes are so tiny, it doesn't make sense to create a custom regex engine, a much more effective solution is adapting the input pattern so that it obeys to the rules of the standard python regular expressions. So, I have written this function:
def adjust(pattern): return re.sub('\*', '.*', re.sub('\?', '.', re.sub('\.', '\.', pattern))) + '$'Three calls to substitute the characters as expected by python, and then add a dollar at the end of the string.
The more internal call to sub() replace each non-escaped dots to escaped ones. Then each plain question marks become plain dots. And finally each plain stars become the couple dot-star.
Applying this adjustment, the solution is just a matter of regular expression matching:
def solution(line): data = line.split() pattern = adjust(data.pop(0)) # 1 result = [name for name in data if re.match(pattern, name)] return ' '.join(result) if result else '-'I used a list comprehension to filter the names in data to keep just the ones that matches the pattern.
This solution has been accepted by CodeEval, and I have pushed test cases and python script to GitHub. | http://thisthread.blogspot.com/2017/01/codeeval-filename-pattern.html | CC-MAIN-2018-43 | refinedweb | 552 | 52.66 |
$ cnpm install eko-cli
A command line tool for developers interacting with Eko Studio projects.
First, you will need to sign up at Eko Studio.
Install the CLI globally by using
npm install -g eko-cli.
Usage is automatically generated; to get usage for a particular subcommand, type the
help subcommand at the end of the namespace or subcommand, e.g.
eko-cli studio help.
Log in in with your studio user account by running
eko-cli user login.
To add code to an existing Eko Studio project, use the checkout command.
Run
eko-cli studio checkout -p [PROJECT_ID].
A directory with the name PROJECT_ID will be created. It contains the Eko Studio project's code and it is also a git repository, connected to the project. You can now use any git client to add and update the code to this project. If there any changes made and pushed in Eko Studio, git pull will allow you to get them.
To test a local version of your project, run
eko-cli studio test. (Notice you need to click the mixed content warning in chrome and choose “Load unsafe scripts”)
For storing encrypted credentials with the OS,
keytar must be installed & compiled before use (its OS bindings mean it needs more love than most npm packages). To allow use without
keytar, our
package.json lists it as an optional dependency, and there is a filesystem-based fallback if
keytar is not available. | https://developer.aliyun.com/mirror/npm/package/eko-cli | CC-MAIN-2020-24 | refinedweb | 242 | 65.22 |
New TLDs On The Way From ICANN 157."
TLDs (Score:1)
Just a note:
Today in the NYTimes Circuits section, there was a whole page ad for "www.*.tv" domains
I just thought that was kewl
Woteva
-Sam
Re:The Wrong Answer to the Wrong Problem (Score:1)
Local companies such as auto body shops should be encouraged to register domains under (state).us or (city).(state).us instead of the
--
Re:Alias the misspellings (Score:1)
Impossible (Score:1)
enforce, and many sites are quite general
purpose (e.g. geocities). How would someone
stick not-for-children content on geocities?
Re:icann needs some competition... (Score:1)
Competition? See The Open Root Server Confederation [open-rsc.org] as well as This Comment, Above [slashdot.org]. Exactly what you're looking for.
My choices for TLDs... (Score:1)
-----
"O Lord, grant me the courage to change the things I can,
the serenity to accept those I cannot, and a big pile of money."
Because some people need more than two or three do (Score:1)
BTW, posted with a recent Mozilla nightlie. This is getting very usable, stable, and fast. Maybe someone will hack together an MDI version of it... like Opera.
:)
--
Re:Can just see it now.... (Score:1)
Or maybe prohibit any one entity (corporation or individual) from registering the same 2nd level domain in more than one TLD[1]. So if you register xyz.com then you cannot also register xyz.org, xyz.net etc. This would force people to choose wisely in which TLD to register.
[1] With the possible exception of ISPs who would be allowed to register in the
.net TLD (for their own equipment) as well as an appropriate one for use by their customers.
Re:Too much gTLD's & too little internationalizati (Score:1)
And what about... (Score:1)
"aitch tee tee pee colon slash slash dot dot dot dot dot dot"
*giggle*
--
TLD's of interest (Score:1)
or
or......
I better not go on or I'll be troll bait.
Personal distributed ROUTE system (Score:1)
If all people customized and hooked up to a new Name System, the current foofa would fade.
No longer would ICANN have sole authority over TLDs. Any group could create their own mapping of of Names to Numbers, and the users would choose who to listen to.
For example, I could create a list with IMO the most deserving owners occupying the best names.
eToys.sell would sit besides Etoys.know or eBay.sell would crowd in with ebay.hate .
I can hear your objections.
No naming database would be complete!
Just like Gnutella, your personal NS would contact other sources to find an unknown address.
It's easily corruptable and/or insecure, and/or out of date!
If ICANN's NS is wrong, try Slashdot's NS. If they don't work, go to GNU's NS.
I imagine this distributed NS would break ICANN's strangehold and turn into a cross between the Open Directory and Everything2.
A moderated, controversial naming system. The group of people you most trust through common interests would also share their opinion on links and names.
How 'bout it?
Section II-C2 (Score:1)
So who gets to enforce the charter on
.xxx? =)
This, and other parts of the Topic, suggest that ICANN is looking at actually enforcing the distinctions in any new TLDs. So if you go to mcdonalds.banc, you likely won't be getting an ad for Big Macs.
Another interesting tidbit is:
Which seems to imply that if a person named Ford registers ford under a TLD reserved for personal domain names, any claim by the auto maker would (in theory) be ignored.
The last piece I'm going to point out is the timeline. The official announcment of the addition of any new TLDs won't be happening until November 1. Contracts between ICANN and registrars have a deadline of December 1. There is no mention of when the TLDs become available, but one would assume it would be after the contracts are finalized. (Please note that the schedule is only suggested and not final)
Restricted access TLDs... (Score:1)
As an example, when this topic has come up before, one of the ones I really liked was the
I'm sure there are other possible TLDs that would be inappropriate for commercial entities. Let's restrict those so that there will actually be some domains left for the rest of us.
-Joe
I want .rog (Score:1)
I thought "If they had a
take care of idiots like me" .
And when the page finally loaded, what did I
see up the top but a story about new TLDs.
It's a sign from God I tell you.
long domain names (Score:1)
so it becomes and (Score:1)
No new TLDs necessary, just convince the guy who owns index.pl.
-jfedor
Re:What purpose would they serve? (Score:1)
New TLDs won't solve the problem (Score:1)
The solution is to adopt an unambiguous naming system. Maybe calling it a "location" system is a better name. Just like the post office requires an unambiguous address to process the mail, the user needs to provide enough information to single out the desired site. The post office will not deliver mail with just a name on it (even if it is famous).
There are of course a lot of details to be worked out, but my idea is that companies (or people) provide a classified list of names that refer to them, e.g., company name, physical location, products, trademarks, abbreviations, etc. The user fills out a form or uses a shorthand to describe the desired site. If not enough info is provided, the user can select from a list of matches. Once disambiguated, the browser can save the match.
The disadvantages are that no one will get a short name and there would be an enormous hue and cry to make such a change. The advantages are that no one will be left out and it would be a more rational system.
Problem: Searching (Score:1)
Currently, if you look for, a request is sent to your local DNS, and asks it if it knows the number for that name.
Assuming it doesn't, then the DNS ask's one of the root servers where the central list of all
It then asks the central list of all
Then is asks microsoft.com's DNS for the number for
It's a hierachical structure.
So, no, it's not technologicaly straightfrowerd to remove TLD's a the moment.
Why Not (Score:1)
Let them name their sites whatever. They still got to get peoples attention. I'd rather stick with numbers, afterall, who can forget that
It all gets changed into numbers in the end anyhow. Why get a middleman involved?
Come see my website.
Re:For real this time? (Score:1)
Check out the case of Chase Business Solutions [chase.co.uk] vs Chase Manhatten Bank, they're losing the domain basically because they don't have the huge sums of money to see it through court, even though there is no way they should be able to lose. . .
(A HREF="
8 .html">Register article)
Re:Like USENET, DNS needs a ".alt" top level domai (Score:1)
Boss of nothin. Big deal.
Son, go get daddy's hard plastic eyes.
We all need a little .sex now and then (Score:1)
I have to agree with you there. Now, mind you, I'm the webperson for a N.O.W. website and I just sold my old house to a feminist non-profit, but I really think that we need to face certain facts, like where half of the traffic is (before napster).
So, we could use a
Of course, some carriers will block these, but it makes it easier to deal with schools and libraries and repressive countries while allowing the Net to continue to be open for most people. Note that sex education would be either
The .name is the thing (Score:1)
But naming things so that IE breaks is a good thing!
Re:Who needs them? (Score:1)
Of course these "come.to" adresses are quite stupid but that's an other matter
Re:What I always wanted... (Score:1)
mmm (Score:1)
Re:Finally... (Score:1)
JOhn
Re:bah (Score:1)
I mean, did you try:
reiserfs.org - grabber
reiserfs.com - grabber
reiserfs.net - grabber
namesys.com - grabber
namesys.org - grabber
namesys.net - grabber
AARRRGGHH !!! stop it
(ok
Samba Information HQ
NOT .xxx or .sex (Score:1)
Dave Blau
Why do we want so many TLDs? (Score:1)
When you think of say, Microsoft, do you think whether it's a
How many people want to distinguish companies with the same name by their TLD? How many companies actually enjoy having to register under every single TLD (and sometimes under every country too) to protect against 'evil' ppl?
In the end, one name is taken by one company. When we want to see XYZ, we go to XYZ, we don't worry about whether we want the
---
How does the "ICANN at large" fit into all this? (Score:1)
We obviously have a say, but will our voices be heard?
Will we have a vote? naw....
---
Interested in the Colorado Lottery?
We will have to wait and see (Score:1)
I think that one important thing to consider is the phrase "consider adopting".
The ICANN Board of Directors is expected to consider adopting such a policy at its meeting on 15-16 July 2000 in Yokohama, Japan.
---
Interested in the Colorado Lottery?
why .sex or .xxx is not a good idea (Score:1)
nc
Re:I don't think those exist (Score:1)
.sex or .xxx doesn't work (Score:1)
Basically, it's unworkable, but that doesn't mean that a few politicians won't encourage it as a way of telling their constituents that They're Doing Something.
Re:Mixed bag (Score:1)
That's assuming that any TLD is as good as any other.
Because it's entrenched in the minds of *billions* of people,
.com will be the preferred domain for years. A few others like .web or .corp might become recognized, but that's probably it. All you do with new TLDs is make every company scramble for "mycompany.web" and "mycompany.corp", or whatever wins. (Or sue whoever got to them first.)
Re:Finally... (Score:2)
Two thoughts. (Score:2)
Oh yeah, one more thing. The
.cc domains are now available, and you can register them here [], and someone named Colin Burns Games has already snatched up [] slashdot.cc [slashdot.cc]...
--
You should get around a bit more (Score:2)
What is weird is the extent to which you say things of which you know not.
--
Re:When Hell Freezes Over (Score:2)
Start using country and state/province designations.
For instance, the domain "writersblock" is a complete cockup. are all taken.
The
This is typical: the TLDs are being misused, all the "good" words are taken and there are more domain name campers than there are fully functioning domains!
Time to cut this shit out. If you're a home-town boy running a freebie web service out of the goodness of your heart, you get a. If your running a registered business within your locale, then you'd get. If you are large enough to be in several states, you get to be considered national, and get. Only if you're truly an international business can you score the URL.
This also resolves a lot of the problems with corporations stomping all over people. You could actually have! Sure as heck no one is ever going to confuse your URL with.
There are flaws with this system, to be sure.
But it's a damned site (ha, ha) less flawed than the TLD cockups we have now and seem to be intent on maintaining.
--
They ask questions, I give my answers. (Score:2)
Steven E. Ehrbar
bah (Score:2)
on the other hand, maybe icann is in bed with nsi or core. there are bound to be a _lot_ more domain registrations with more TLDs to overrun and pollute.
come on. it's pretty obvious that the current system isn't working too well. how about designing a new domain structure and scrapping the current one. make people registering new domains prove that they have a real need for it, and have a group of people monitoring of the registrars to prevent approval of domain name squatting and namespace pollution. offer anyone with a currently active domain free re-registration in the new system, maybe with a free year or something.
i'm sure that everyone will shoot that idea down, but you have to do the same thing to get a block of ip addresses; theory being that if everyone and their brother go out and get a full
--
Re:.sex OR .xxx (Score:2)
just because the TLDs are there does not mean that people will use them. and tricks like mis-spellings and foo.net (where foo.com is the `real' site) get those types of sites _far_ more exposure than they would get if they all existed in
--
Re:bah (Score:2)
i'd have _no_ problem paying $20 - $25us for a domain, it's still a quarter of the price nsi charges.
--
Re:NSI's monopoly could be eliminated (finally!) (Score:2)
In theory, you could. Alternic tried to do that very thing. Unfortunately, you have to talk the rest of the world into using your root servers, a nearly impossible task these days. If no one looks at your root server, no one uses your maps. Right now, NSI has a monopoly on root servers for the com, net, and org TLDs, so everyone has to pay a vig to NSI.
It is one of the reasons a peer-to-peer, more loosely structured heiarchical service is needed to replace DNS, hopefully for IPv6.
Oh, and just in case, IANANSIE, among other things...
Sorry, my comment was more toung in cheeck, not intended as an actuall accusation. I probably should have inserted the appropriate disclaimer in the original post.
Re:NSI's monopoly could be eliminated (finally!) (Score:2)
bzzt!
Thank you for playing, Mr. NSI employee.
If you check the pricing structure of any "accredited registar" you will find that $6 for each domain gets paid to NSI, not matter who you register it with. Yup, that domain you just got from domainmonger.com just sent another $6 into NSI's pockets. Why? They still run the root DNS domains for
Re:For real this time? (Score:2)
Trademark law is built around the concept of protecting intellectual property, not around avoiding consumer confusion. This avoidance is a by-product and a test of potential infringement, but not the core driver.
As far as the mapping problem goes, this isn't a problem that DNS can solve and one that is addressed quite well by existing trademark law, thank you very much. By using DNS to solve this mapping problem, we are likely to afford IP holders extra-legal protection at the expense of individuals - not something that I particularly look forward to.
Re:TIMs of the World Unite (Score:2)
Must...resist...urge...to...moderate...up....
:-)
Cheers,
Tim
TLD's? Oh dear. :) (Score:2)
Learn, modify, then repeat until failure.
Yours in science,
Bowie J. Poag
.cc? (Score:2)
Pope
Freedom is Slavery! Ignorance is Strength! Monopolies offer Choice!
Ummmm.... (Score:2)
I'm not saying there are no entries in the domains in question. I'm saying the domains themselves do not exist in the Internet DNS namespace.
For comparison,
But the names are still part of the DNS name space.
Um, no, they're not. For a domain name to be part of the Internet Domain Name System, they must be registered with the root name servers. Simply no two ways about it. If A.ROOT-SERVERS.NET (which is the same as NS.INTERNIC.NET) doesn't know about the domain, it doesn't exist. Period.
Now, maybe someone has a convention of using invalid. as a domain for invalid domains (like many use localdomain. as domain for the localhost entry) but it isn't part of the DNS.
Make sense?
Too bad DNS is hierarchal by definition (Score:2)
Unfortunately, the Domain Name System protocol and structure is a hierarchy. It was designed that way on purpose for scalability, delegation, and organizational purposes. This may lead to complex systems, as TBL observed, but there isn't much you can do about it.
Indeed, computers more or less need a hierarchy to be efficient at sorting and lookup, which is exactly what DNS servers do. I'm not so sure we can get around that practical requirement.
Understand what the DNS is (Score:2)
Right. But if it can't scale to every entity that wants an entry, it is broken. You think it's bad now? What happens when all six billion people on the planet have email, and all the businesses that go with them do too?
The DNS has to scale to this level, or it will collapse.
The whole point of DNS is to make it EASIER to remember site locations.
DNS was invented to automate the process of distributing information about network hosts. It used to be that everyone was listed in everyone else's
It most explicitly was not created to make it easier for someone to guess a company's address by typing random words into the "Location" bar of your browser. The DNS exists to name things. It does not exist to find them. Naming and Finding are two distinctly different things.
And what about people... people want nameservice too.
People generally have physical locations, too.
Again, the better points of DNS is that it doesn't matter where you are or what your ip is.
This is, of course, an issue, and one I don't have an immediate solution for. Businesses, at least, have a place of incorporation, but even that can move if you want. And people move more often then businesses do.
But how do you expect a ".indiv" (or whatever) domain to scale to six billion people? Or more?
And this misuse you speak of.. how are you supposed to keep it from happening in this system as well?
People have legal residences. Businesses have a place of incorporation. These are tried and true methods which are already in place and have been proven to work.
At least you can prove that IBM has nothing to do with: food, sex, banking, personal name or art.
IBM does offer financial services (leasing of equipment and such), so they could certainly justify that. What about their cafeteria food services? And IBM makes large donations to the humanities, so you could argue art as well.
Point being: How do you administer this tangled mess of TLDs you propose we create?
Adding more TLDs would actually lower the value of each TLD, so it's not worth getting ibm.food because no one in their right mind would ever go there.
Wrong. Nobody in their right mind goes to, either, but guess who owns it? For any company serious about their Internet presence (which should, eventually, be equal to any company), the cost to register additional domains is small compared to the potential trouble not registering them costs.
The whole point of new TLD's is to relieve the pressure on the
Again I point out that the us. domain structure was created in response to this very problem.
If everybody had to use the long a$$ physical location scheme that would be the biggest boost to alternate forms of address lookups they could possibly hope for.
Great! Then maybe people will stop using the DNS as a phone book and start using it the way it was intended!
Limiting domain names? (Score:2)
Gee, it would really suck to be a network application service provider, if you could only have a maximum of two customers.
I don't think those exist (Score:2)
ns.internic.net doesn't think they exist.
I have to assume it knows what it is talking about.
Re:Finally... (Score:2)
But it won't (and can't) prevent people from putting adult material on any other TLD. So what's the point? All the adults sites that exist now will (most likely) stay where they are.
LL
Re:You should get around a bit more (Score:2)
France tends to be fairly open about this sort of thing, IME. Topless bathing on pretty much _any_ beach, plus limited nudity on billboards and the like, or earlier evening TV than over here. What little I've seen of Germany suggests that's pretty similar.
In the UK we're probably about halfway to that. Nudity on billboards or TV before 9 simply isn't allowed - well, depends on your definition of nudity. One magazine projected a shot of a TV presenter's bottom on to the Houses of Parliament, which they'd run on their cover. Anything more than that would definitely get complaints, though. Topless bathing can happen anywhere, but is still pretty rare.
On the other side, we _will_ moan loudly about violence or gore (no not Gore...) - the general opinion being that it just desensitises the kids and warps their valuesystems.
Re:We all need a little .sex now and then (Score:2)
dotcon (Score:2)
And to make things interesting for the pr0n industry, let's give them
-John
They forgot two current TLDs - .invalid and .uucp (Score:2)
Re:What I always wanted... (Score:2)
In their scramble for exposure, you'd still get sites squatting on
Re:why .sex or .xxx is not a good idea (Score:2)
But in fact, the proposal is simply to create a
And I'm assuming this wouldn't have the problems that the current namespace has since I doubt many companies want to register a lot of
Alias the misspellings (Score:2)
... especially when I type slashdot.rog into lynx and it looks up slashdot.rog.edu, slashdot.rog.com, and slashdot.rog.net as well.
Re:For real this time? (Score:2)
The core tennants of trademark law have nothing to do with intellectual property. Trademarks are not intellectual property in any way (there is no content to them). Trademarks are words and symbols associated with a company and its products. You may be confusing Trademark law with Patent or Copyright law.
So here's the issue (and maybe I didn't make my point clearly enough): if you have a restaurant called McDonald's and I have a software company called McDonald's, we know that consumers will not be confused between the two (you sell greasy burgers and I sell buggy software--no comparison, right?).
Now comes the web. McDonalds.com is just a commercial domain. It does not distinguish what kind of business it is. It's just commercial. You and I both plausibly have a right to the domain and both of us arguably confuse each others customers by using it.
Does that make sense?
For real this time? (Score:2)
But I remain sceptical. ICANN has a difficult job, no doubt about it. But so far, they haven't managed to make much progess.
Re:They made a similar thing in Brazil... Only wor (Score:2)
This is what I think will happen. TLDs are still being used as some kind of pigeonholing mechanism. The fact is that life is more complicated than a series of categories.
ICANN's paper makes a great point: the stability of the DNS system is paramount. So while I strongly believe in burning all TLDs, I do think that we'll need some new TLDs as a test before this is possible.
Long term, though, remains the same: we don't need TLDs. They are from a time when the Internet was a regulated government system, and are now obsolete. Nowadays, everyone registers their name under all available TLDs anyway as legal protection. So adding more only will make the same small number of good TLDs more expensive for people like us.
Remove all TLDs, though, and people can establish their own heirarchies. Someone in another thread said this was like AOL keywords. Well, yes and no. It is more extensible, but ultimately, keywords are a better UI than long complex addresses.
Enforcement is the key (Score:2)
In glancing through the document, I notice that they do mention trademark law, and the need for enforcement, but not excessive enforcement. The groups couldn't come to an agreement on how the trademark issue should be dealt with, which is a good sign, I think.
BUT, it will only matter if there is enforcement.
.com, .net and .org would have been much better had they been enforced. Granted, we would have "run out" of "useable" domain names long before now, but the users would be much more informed as to their purpose.
So, I'm all for the new gTLDs, as long as the rules for application in
.BLAH is public, and strickly enforced. Like someone else meant, they should split them up based on trademark law (hopefully as generic as possible, not US based), so that (to use the other example) McDonalds.food and McDonalds.car_repair aren't both the Micro$o~1 of the eating world.
This is my
Re:I find this amusing... (Score:2)
Serve Slashdot via a special "Slash" protocol. This, with the above, gives us:
slash://slashdot.dot/.slash/
"slash colon slash slash slash dot dot dot slash dot slash slash"
Man, now "Slash" doesn't even sound like a real word... it's like when you say "dolphin" over and over again 'til you start wondering who in their right mind would build a doll with fins.
Eliminate the scarcity problem. (Score:2)
Reduce the artificial scarcities, and it won't be profitable to snatch up domains anymore, solving the problem quite nicely. Of course, the business of selling them would be hurt, which means I doubt if we'll see it happen anytime soon. Why make it so they only have to buy one domain instead of the three or more they have to get now?
What I always wanted... (Score:2)
Create a cyber red light district so you can:
1: Know where to go when you want to get dirty.
2: Be able to leave them out of your web search results when are searching for ANYTHING else.
Re:.cc? (Score:2)
.cc denotes Cocos Islands
This [iana.org] has a list of ccTLD's
Also you can register
.cc's at []
If brevity is the soul of wit this will be the wittiest speech ever. Thank-you.
Here's a thought... (Score:2)
slashdot.org would just be "slashdot", and "" would just be "" (or "" and "" by late next year).
If you really wanted to put something in your url to identify your organization type, you could always just put it at the beginning, like "edu.lcs.mit".
Does anybody see a problem with this?
What happened to the old stuff? (Score:2)
Oh No (Score:2)
Oh Sweet Mother of God.
Can just see it now.... (Score:2)
Be sure to also register
.net
.org
.dot
.rob
.movie
.travel
.xxx
.sex
.biz
.art
........)
-- | https://slashdot.org/story/00/06/14/2315231/new-tlds-on-the-way-from-icann | CC-MAIN-2017-39 | refinedweb | 4,607 | 75.1 |
An escape sequence in C is a sequence of characters that does not signify itself when used inside a character or string literal but is translated into another character or a sequence of characters that may be challenging or difficult to represent directly.
In C, each escape sequence contains a backslash of two or more characters,\ (called the’ Escape Character’), while the rest of the characters decide the manner in which the escape sequence is interpreted. For instance, \n is a newline character escape sequence.
Table of Escape Sequence in C
Example
#include <stdio.h> int main() { printf("Hello,\nworld!"); }
The escape sequence \n in this code does not represent a backslash and the letter n followed because the backslash creates a “break” from the ordinary meaning of compiler characters. After the backslash is displayed, the compiler requires a second character to complete the escape sequence and converts it into the bytes it wants to represent. So “Hello,\nworld!” stands for a string with a built-in newline, whether used inside or elsewhere.
At least one hex digit following \x is needed for a hex escaping sequence without an upper bound. It continues as many hex digits as are. For instance, \xABCDEFG denotes the byte with the ABCDEF 16 numerical value, and the letter G, not a hex digit, is followed. Nevertheless, the actual numerical value allocated is determined by the implementation, when the resulting integer value is too large to fit into one byte. Many platforms have 8-bit char sort, restricted by two hex digits to the useful hex escape sequence. However, within a wide or small string literal (prefixed with L) hex escape sequences longer than two hex digits can be useful: | https://www.codeatglance.com/escape-sequence-in-c/ | CC-MAIN-2020-40 | refinedweb | 285 | 51.28 |
So the other day Paul and I were shooting the breeze about spirographs. He was saying I needed to get back to blogging now that I have the time. Of course, the second you set out to try to write a post, so many ideas flow forth at once, it actually is hard to pick just one and focus on it. Since he had enjoyed my drawing work, I thought I’d start out with a little push at circles.
That quickly went out of control because I ended up with enough material for a few chapters rather than a single blog post. (And, no, my chapter for his book is about property wrappers, which I love, rather than drawing)
To give a little context, before I decided to try my hand at full time work, I had had a contract with Pragmatic to update my Drawing book. I had to cancel that because commuting full time to another city left me with zero free time for my self, my family, let alone writing. (Now that I am back at my own desk, I may see about returning to that project because geometry is a core passion.)
Anyway, let me start at the end of all this and show you some pictures and then I’ll (pardon me) circle back and start telling the story of the code and how all this came to pass.
I started my day by opening a playground, deciding to just flex my coding and see where it would take me. I wanted to work with circles, so I plugged a range into a map to get me there.
// Get some points around a circle let points = (0 ..< nPoints).map({ idx -> CGPoint in let theta = CGFloat(idx) * (CGFloat.pi * 2 / CGFloat(nPoints)) return CGPoint(x: r * cos(theta), y: r * sin(theta)) }) // Create a path let path = UIBezierPath() // Get the last point before the circle starts again let lastIndex = points.index(before: points.endIndex) // Draw something interesting for (point, index) in zip(points, points.indices) { let p0 = index == lastIndex ? points.startIndex : points.index(after: index) let p1 = index == points.startIndex ? lastIndex : points.index(before: index) path.move(to: .zero) path.addCurve(to: point, controlPoint1: points[p0], controlPoint2: points[p1]) }
It’s not the worst code in the world, but it’s not great. I was rewarded with a pretty path, so whee. Still, the code was screaming out that it wanted to be better.
I started by attacking the index work. Why not have an array that supported circular indexing by offering the next and previous items? So I built this:
public extension Array { /// Return the next element in a circular array subscript(progressing idx: Index) -> Element { idx == indices.index(before: indices.endIndex) ? self[indices.startIndex] : self[indices.index(after: idx)] } /// Return the previous element in a circular array subscript(regressing idx: Index) -> Element { idx == indices.startIndex ? self[indices.index(before: indices.endIndex)] : self[indices.index(before: idx)] } }
Before you start yelling at me, I quickly realized that this was pretty pointless. Arrays use
Int indexing and I had already written wrapping indices a billion times before. Just because I has the concept of a circle in my head didn’t mean that my array needed to. I pulled back and rewrote this to a variation of my wrap:
public extension Array { /// Return an offset element in a circular array subscript(offsetting idx: Index, by offset: Int) -> Element { return self[(((idx + offset) % count) + count) % count] } }
Much shorter, a bit wordy, but you can offset in either direction for as far as you need to go. I did run into a few out of bounds errors before remembering that modulo can return negative values. I decided not to add in any assertions about whether
idx was a valid index as arrays already trap on that, so a precondition or assertion was just overkill.
Next, I decided to design a
PointCircle, a type made up of points in a circle. Although I initially assumed I’d want a
struct, I soon realized that I preferred to be able to tweak a circle’s radius or center, so I moved it to a
class instead:
/// A circle of points with a known center and radius public class PointCircle { /// Points representing the circle public private(set) var points: [CGPoint] = [] /// The number of points along the edge of the circle public var count: Int { didSet { setPoints() } } /// The circle radius public var radius: CGFloat { didSet { setPoints() } } /// The circle's center point public var center: CGPoint { didSet { setPoints() } } public init(count: Int, radius: CGFloat, center: CGPoint = .zero) { (self.count, self.radius, self.center) = (count, radius, center) setPoints() } /// Calculate the points based on the center, radius, and point count private func setPoints() { points = (0 ..< count).map({ idx -> CGPoint in let theta = CGFloat(idx) * (2 * CGFloat.pi / CGFloat(count)) return CGPoint(x: center.x + radius * cos(theta), y: center.y + radius * sin(theta)) }) } }
I added observers to each of the tweakable properties (the radius, point count, and center), so the circle points would update whenever these were changed. By the way, this is a great example of when not to use property wrappers. Wrappers establish behavioral declarations, which this is not. My circle uses the observers instead to maintain coherence of its internal state, not to modify, limit, or expand type side effects for any of these properties.
Now I could easily create a circle and play with its points:
let circle = PointCircle(count: 20, radius: 100) let path = UIBezierPath() for (point, index) in zip(circle.points, circle.points.indices) { path.move(to: circle.center) path.addCurve(to: point, controlPoint1: circle.points[offsetting: index, by: 1], controlPoint2: circle.points[offsetting: index, by: -1]) }
I decided not to add some kind of API for passing a 2-argument (point, index) closure to my circle instance. It doesn’t really add anything or make much sense to do that here. It wouldn’t produce much beyond a simple for-loop, and the point here is to build a Bezier path, not to “process” the circle points.
My goal was to build enough support to allow me to iterate through the points and reference adjacent (or further offset) points to build curves. This does the job quite nicely.
It didn’t feel quite finished though. I wanted to add a little extra because one of the things I often do with this kind of drawing is create stars and points and loops using offsets from the main radius, often interpolated between the main points on the circle’s edge. Because I had built such a simple class, adding an extension for this was a snap:
extension PointCircle { /// Returns an interpolated point after a given index. /// /// - Note: Cannot pass the existing radius as a default, which is why the greatest finite magnitude is used public func interpolatedPoint(after idx: Int, offsetBy offset: CGFloat = 0.5, radius r: CGFloat = .greatestFiniteMagnitude) -> CGPoint { let r = r == .greatestFiniteMagnitude ? self.radius : r let theta = (CGFloat(idx) + offset) * (2 * CGFloat.pi / CGFloat(count)) return CGPoint(x: center.x + r * cos(theta), y: center.y + r * sin(theta)) } }
The most interesting thing about this is that you cannot use a type member to default a method argument, which is why I ended up defaulting it to `greatestFiniteMagnitude`. It seems to me that it would be a natural fit for the Swift language to allow that kind of defaulting. In this case, it would say: “If the caller doesn’t specify a radius, just use the one already defined by the instance.” What do you think? Is that too weird an ask?
To wrap up, here’s an example using the interpolation:
let path2 = UIBezierPath() for (point, index) in zip(circle.points, circle.points.indices) { path2.move(to: point) path2.addCurve(to: circle.points[offsetting: index, by: 1], controlPoint1: circle.interpolatedPoint(after: index, offsetBy: 0.33, radius: circle.radius * -2), controlPoint2: circle.interpolatedPoint(after: index, offsetBy: 0.67, radius: circle.radius * -2)) }
All the shapes at the start of this post are created from this and the preceding loop by tweaking the curve parameters. What pretty results will you come up with? If you build something particularly lovely, please share. I’d love to see them!
5 Comments
For the default argument, I usually just make it default nil, and use the type member inside with nil-coalescing.
public func interpolatedPoint(after idx: Int, offsetBy offset: CGFloat = 0.5, radius r: CGFloat? = nil) -> CGPoint {
let r = r ?? self.radius
...
}
Definitely more elegant, thank you! I think defaults derived from type values would make sense too.
this is the best kind of blog post because it reveals the thought process and problem solving.
Well done. Thank you.
Thank you for making me smile. Your comment was a lovely pick-me-up!
For my card and board games I’ve been creating something to do more than single Spirographs at a time, I suppose I should have Bézier curves as a primitive type along with the other roulettes.
However, they’re not the primary objective, so they’ll come later. | https://ericasadun.com/2020/01/10/circles-within-circles-custom-types-and-extensions/ | CC-MAIN-2021-43 | refinedweb | 1,512 | 63.59 |
Net8 includes an application program interface (API) called Net8 OPEN allowing programmers to develop both database and non-database applications. In addition, Net8 contains several new benefits for programmers, including UNIX client programming, signal handler and alarm programming, Bequeath protocol, and child process termination.
This chapter contains the following sections:
Net8 includes an application program interface (API) called Net8 OPEN, which enables programmers to:
Net8 OPEN provides applications a single common interface to all industry standard network protocols.
The relationship of Net8 OPEN to other products is shown in Figure 10-1.
Using Net8 OPEN, you can solve a number of problems, such as:
In contrast to a remote procedure call interface, Net8 OPEN provides a byte stream-oriented API that can be used to develop basic applications which send and receive data. Applications developed with Net8 OPEN must ensure that values sent across the network are interpreted correctly at the receiving end.
The Net8 OPEN API consists of five function calls:
The applications program interface is provided as part of the standard Net8 installation. To use it, you need the following:
$ORACLE_HOME/network/publicon UNIX and
ORACLE_HOME
\network\tnsapi\includeon Windows NT.
$ORACLE_HOME/network/libdirectory and is named LIBTNSAPI.A. On Windows platforms, the
ORACLE_HOME
/network/tnsapi/libcontain the files TNSAPI.DLL and TNSAPI.LIB.
Modules which make reference to Net8 OPEN functions should include TNSAPI.H, as follows:
#include <tnsapi.h>
Your makefile (or other location for your build command) should ensure that the include path is set properly so that it can find TNSAPI.H. Refer to the sample makefiles provided in your installation.
To configure Net8 to recognize your Net8 OPEN application, proceed as follows:
To do this, choose a system identifier (SID) name for your service similar to that of an Oracle database. Do not pick the same SID as your database.
For example, if you are configuring a "chat" program, you could call the SID "chatsid". Place the program into the same place as the Oracle server executable, which is normally
$ORACLE_HOME/bin on UNIX and
ORACLE_HOME
\bin on Windows NT.
You would place the following entry in a listener configuration file as follows:
sid_list_listener =(sid_list =(sid_desc =(sid_name = chatsid)/*your SID name*/ (oracle_home = /usr/oracle)/*$ORACLE_HOME bin directory*/ (program = chatsvr)/*the name of your server program*/)
You need to restart the listener, so it will recognize the new service.
For example, if your listener is listening on the following address:
(description=(address=(protocol=tcp)(host=unixhost)(port=1521)))
And you want people to refer to the service you created above as "chat".
You would add the following parameter to your local naming configuration file for release 8.1 configuration:
chat= (description=(address=(protocol=tcp)(host=unixhost)(port=1521) ) (connect_data=(service_name=chatsid)))
You would add the following parameter to your local naming configuration file for pre-release 8.1 configuration:
chat= (description=(address=(protocol=tcp)(host=unixhost)(port=1521) ) (connect_data=(sid=chatsid)))
Note that the address contains the SID you configured in the LISTENER.ORA file above. Also note that the second line started with at least one space character, which indicates that it is a continuation line.
If you have domains in your network, you need to name your service accordingly. For instance, use chat.acme.com if the domain is acme.com. Again, use the TNSNAMES.ORA file as a template -- if all the other net service names end in a domain, you need to name your service similarly.
If needed on your operating system, you also must ensure that you have permission to execute your program.
Two sample applications are provided with Net8 OPEN:
This section lists the error numbers which can be returned if one of the above function calls fails. Note that in some cases, connection-related errors may come back from a send or receive call, if the connection has not yet been established at that time.
20002 - SDFAIL_TNSAPIE - The underlying "send" command failed in tnssend(). 20003 - RECVFAIL_TNSAPIE - The underlying "receive" command failed in tnsrecv(). 20004 - INVSVROP_TNSAPIE - Operation is invalid as the server. 20005 - INVCLIOP_TNSAPIE - Operation is invalid as the client. 20006 - HDLUNINI_TNSAPIE - The connection should be initialized by calling tnsopen(). 20007 - INHFAIL_TNSAPIE - Server failed in inheriting the connection from the listener. 20008 - ACPTFAIL_TNSAPIE - Server failed in accepting the connection request from the client. 20009 - NULHDL_TNSAPIE - A null handle was passed into the call, which is not allowed. 20010 - INVOP_TNSAPIE - An invalid operation called was passed into the call. 20011 - MALFAIL_TNSAPIE - A malloc failed in TNS API call. 20012 - NLINIFAIL_TNSAPIE - Failed in NL initialization. 20013 - NMTOOLONG_TNSAPIE - Service name is too long. 20014 - CONFAIL_TNSAPIE - Client connect request failed. 20015 - LSNFAIL_TNSAPIE - Server failed to listen for connect request. 20016 - ANSFAIL_TNSAPIE - Server failed to answer connect request. 20017 - NMRESFAIL_TNSAPIE - Failed to resolve service name. 20018 - WOULDBLOCK_TNSAPIE - Operation would block. 20019 - CTLFAIL_TNSAPIE - Control call failed. 20020 - TNSAPIE_ERROR - TNS error occurred. 20021 - INVCTL_TNSAPIE - Invalid operation request in control call.
Event programming in UNIX requires the use of a UNIX signal. When an event occurs, a signal flags a process. The process executes code that is relevant to the particular signal generated. UNIX does not allow a single process to set more than one signal handler or alarm for a particular signal call. If a process sets a second signal handler or alarm request on a signal like SIGCHLD (signal on a child process' status change), UNIX nullifies and loses the previous request for the SIGCHLD.
If any part of your application issues one of these requests, signal handling or alarms may cause the system to lose and never respond to that particular request. Depending on the signal requested, the system may not clean up defunct processes properly because of a signal handler problem.
Net8 provides two solutions to allow for the use of signal handling and alarms in tandem with Oracle's usage of those requests:
Net8 provides an operating system dependent (OSD) call that keeps a table of all signal handler or alarm requests for each signal. Any program that uses the signal handler or alarm is now required to use the Oracle OSD calls. This provides a solution for programmers in UNIX who are not allowed to set more than one signal handler or alarm for a particular call. Any program that uses the signal handler or alarm must use the Oracle OSD calls. This is however, currently available only for internal use. In the near future, an externalized version of the OSD calls for client application usage will be released.
Until then, if you set all of the client's signal handlers before making any database connections, the OSD call will remember the last signal handler set for the signal and will add it to the signal handler table. Note that by doing this, you cannot disable the signal handler.
To use the table-driven shared OSD signal handler for all SIGCHLD calls, you must observe the following rules:
This section is for UNIX application programmers who use both the UNIX signal handler for tracking child process status changes with the SIGCHLD call and Net8 for the networking portion of their application.
When a client application is directed to communicate with an Oracle database on the same machine, it uses the Bequeath protocol to establish the connection. The Bequeath protocol enables the client to retrieve information from the database without using the listener. The Bequeath protocol internally spawns a server process for each client application. In a sense, it performs locally the same operation that a remote listener does for your connection.
Since the client application spawns a server process internally through the Bequeath protocol as a child process, the client application becomes responsible for cleaning up the child process when it completes. When the server process completes its connection responsibilities, it becomes a defunct process. Signal handlers are responsible for cleaning up these defunct processes. Alternatively, you may configure your client SQLNET.ORA file to pass this process to the UNIX init process by disabling signal handlers.
Use the Net8 Assistant to configure a client to disable the UNIX signal handler. The SQLNET.ORA parameter set to disable is as follows:
bequeath_detach=yes
This parameter causes all child processes to be passed over to the UNIX init process (pid = 1). The init process automatically checks for "defunct" child processes and terminates them.
Bequeath automatically chooses to use a signal handler in tracking child process status changes. If your application does not use any signal handling, then this default does not affect you. | http://docs.oracle.com/cd/F49540_01/DOC/network.815/a67440/ch10.htm | CC-MAIN-2014-15 | refinedweb | 1,412 | 55.13 |
Odoo Help
Odoo is the world's easiest all-in-one management software. It includes hundreds of business apps:
CRM | e-Commerce | Accounting | Inventory | PoS | Project management | MRP | etc.
How to get id of another module ?
Hi,
on clicking a button from my own module i have opened(redirected) purchase order create screen, after creating PO i have to update that current PO id in my module table. is there any possibilities to get po id ?.
Through this python function im redirecting to PO from mymodule
def action_generatePO(self, cr, uid, ids, context=None): return { 'type': 'ir.actions.act_window', 'name': 'Purchase Order', 'view_mode': 'form', 'view_type': 'form', 'view_id':False, 'res_model': 'purchase.order', 'target':'new', 'context': context, }
Regards, Praveen
Here I upload a solution
Hi Francesco, I have to get purchase id only in my function, so in the place of "YOUR_PURCHASE_ID" after getting PO id only i can able to declare. please tell any solutions to get PO id.
A purchase can come from a search or other system. I don't know your problem. I answer only to your question.
About This Community
Odoo Training Center
Access to our E-learning platform and experience all Odoo Apps through learning videos, exercises and Quizz.Test it now | https://www.odoo.com/forum/help-1/question/how-to-get-id-of-another-module-44057 | CC-MAIN-2017-26 | refinedweb | 206 | 57.67 |
I'm starting to design a basic minesweep type program. The minefield is going to be a two-dimensional array. When it prints out, the field gets shifted over one space in the 10th row since 10 is obviously larger than 9. Any suggestions on how to make it even?
Code:#include <iostream> #include <conio> using namespace std; void main() { int row, col, x; col=0; row=0; x=1; cout<<" 1 2 3 4 5 6 7 8 9 10"; char minefield[10][10]; for (row=0; row<10; row++) { cout<<"\nRow "<<x<<": "; x=x++; for (col=0; col<10; col++) { cout<<" -"; } } getch(); } | http://cboard.cprogramming.com/cplusplus-programming/73378-two-dimensional-array-question.html | CC-MAIN-2014-10 | refinedweb | 104 | 78.59 |
My code is supposed to calculate and print the average pH for every fluid given the file variable name.
This is what I have so far, trying to separate the txt file into parts using
split()
def average_ph(file_variable):
result = 0
line = file_variable.readline()
found = False
while line != "" and not found:
list = line.strip().split(",")
if list.isnum:
result += list
if line != "":
avg = result / 3
if not found:
result = None
print(avg)
return avg
file_name = str(input("Enter a file name: "))
file_variable = open(file_name, "r", encoding="utf-8")
Lemon juice,2.4,2.0,2.2
Baking soda (1 Tbsp) in Water (1 cup),8.4,8.3,8.7
Orange juice,3.5,4.0,3.4
Battery acid,1.0,0.7,0.5
Apples,3.0,3.2,3.5
Boy, where to start?
list = line.strip().split(",") if list.isnum:
First,
list is the name of a built-in type in Python, and while you can overshadow that by using it as a variable name, for the sake of not confusing yourself and everybody else, you really shouldn't:
lst = line.strip().split(",") if lst.isnum:
OK, that's better.
lst is an instance of the class that can now still be referred to as
list. Now, your
if lst.isnum: appears to be an attempt to test the output of a method of that instance. But in Python you can't call methods without typing the parentheses. Without parentheses, currently, your
if statement is asking whether the pointer to the method itself is non-zero which, for methods that exist, is always going to be true...
lst = line.strip().split(",") if lst.isnum():
OK, that's better. Except note that I said, "...for methods that exist".
isnum is not a method of the
list class so the code will just raise an exception here. You presumably mean the string method
.isnumeric:
lst = line.strip().split(",") if lst.isnumeric():
But of course this is still wrong. You want to test whether items in the list are numeric. Therefore, you need to call some function or method of each item, not of the list itself. Although strings have an
isnumeric method, the
list class (to which our
lst variable belongs) does not. One elegant way around this is to use a "list comprehension":
lst = line.strip().split(",") lst = [item for item in lst if item.isnumeric()]
But of course that doesn't actually convert the items from strings to numbers. Did you really think you could just add up a bunch of strings and divide by 3?
lst = line.strip().split(",") lst = [float(item) for item in lst if item.isnumeric()]
OK, now we have a list of actual floating-point numbers that can be manipulated numerically. But we've thrown away the information about which substance we're measuring.
lst = line.strip().split(",") substance = lst.pop(0) # remove and store the first item in the list lst = [float(item) for item in lst if item.isnumeric()]
I would then suggest that you somehow associate each pH value-list/average with its respective substance—otherwise that associative info is going to get lost/corrupted. There are neat ways of doing that with a
dict, although currently you have a variable called
found that is unused—suggesting that you may be intending to do something like:
if substance == the_particular_substance_we_are_currently_interested_in: found = True avg = ...
(Note: if you do this, do it inside the loop—you want to check each line to see if it's the target, after all.)
Now, as for your
result += lst... Well, you initialized
result to
0 so it's an integer, and
lst as we know is a
list. You can't add a
list to an integer—it doesn't make sense. What you presumably want to do is
sum the values in the list (and you won't even need
result):
avg = sum(lst) / len(lst)
Note that I'm dividing by whatever the length of
lst is, rather than hard-coding the number 3 in there. Hardcoding assumptions like that is a really effective way to set hard-to-find traps for your future self, so let's avoid it.
Good luck. | https://codedump.io/share/HcHXtmGMLzaz/1/finding-the-average-ph-through-files | CC-MAIN-2016-50 | refinedweb | 700 | 75.91 |
This document concerns lib issue 225 and the proposed resolution:
Unless otherwise specified, no global or non-member function in the standard library shall use a function from another namespace which is found through argument-dependent name lookup (3.4.2 [basic.lookup.koenig]).
Although I generally agree with the resolution, the basic intent of this document is to clearly outline where and why "Unless otherwise specified" should appear. This document also applies to lib issue 229 (which is very closely related).
The bulk of this document concerns only one method: swap. But there are a few other methods involved as well. To begin, I would like to define the term swappable so that I may easily refer to this definition later in the paper.
This concept is modeled after similar concepts in the standard. Namely:
swappable requirements:
In the table t and u are non-const values of a type T.
For a type T, being swappable does not require (or imply) copyconstructible nor assignable. But if a type is both copyconstructible and assignable, then it is also swappable. For example:
class Swappable { public: Swappable(int size) : size_(size), data_(new int[size]) {} ~Swappable() {delete [] data_;} friend void swap(Swappable& x, Swappable& y); private: int size_; int* data_; Swappable(const Swappable&); // not defined Swappable& operator=(const Swappable&); // not defined }; void swap(Swappable& x, Swappable& y) { std::swap(x.size_, y.size_); std::swap(x.data_, y.data_); }
Swappable is swappable, but not copyconstructible nor assignable.
Non-const scalars such as int and int* are swappable because they are copyconstructible and assignable. They can be swapped with std::swap.
A typical client-level class may have one or several methods, both at class scope and at namespace scope that are used by the standard library. Indeed, most (but not all) of these methods are neatly written up in various "requirements" sections in the standard. Examples include default constructible, copy constructible and assignable. These three requirements refer to member methods of an object.
The equality and less-than comparison requirements can refer to methods either at class scope, or at namespace scope. Although not specifically mentioned, the equality and less-than comparison requirements appear to require that if the method is defined at namespace scope, then it must be in the same namespace as the class definition. There are two reasons for this implied requirement:
This implied requirement does not come as a surprise to the general C++ programmer. Indeed, it is considered good programming practice to group namespace scope functions of a class within the same namespace as the class, whether or not the std::lib is involved (Items 31-34, Exceptional C++, Herb Sutter).
Another example of primitive requirements in the standard is in sections 24.5.1 and 24.5.2. These are the istream_iterator and ostream_iterator sections. The standard says that these use operator >> and operator << respectively. No mention is made of namespaces. Nor is there a reference to "readable" or "writeable" requirements. Here it is implied that an unqualified call to operator>>(std::istream&, your_object&) will be made. You had better set up your operator>> so that it will work! (i.e. put it in the same namespace as your class).
Had Jerry chosen read(istream&, MyClass&) instead of operator>>, would we today be questioning what namespace "read" was supposed to go in? I'm grateful to Jerry that this is not an issue we have to wrestle with. Since "read" was implemented as an operator, we currently accept without question that koenig lookup should find the correct method in the namespace of MyClass.
I believe swap is a primitive. More a part of a class's intrinsic interface, than a std::lib method. Similar to:
istream& operator >>(istream&, MyClass&); ostream& operator <<(ostream&, const MyClass&); bool operator ==(const MyClass&, const MyClass&); bool operator <(const MyClass&, const MyClass&); MyClass operator +(const MyClass&, const MyClass&);
Indeed, if C/C++ had a built-in operator that meant swap, I don't believe we would be having this conversation.
So I think swap is a primitive. What else do I think is a primitive? Where do we draw the line? Are we expecting another visit from Pandora so soon?
I'm afraid I don't have a good definition of primitive. My dictionary defines primitive (in part) as:
primitive adj not derived, original, primary, assumed as a basis, ...
This is a concept not unlike pornography. I have difficulty with a precise definition, but I know it when I see it. Perhaps other members of the committee can help me with this. In short, a primitive is something that has more to do with a type, than it has to do with an algorithm in the std::lib. Perhaps primitive is not the right adjective to be describing this concept.
The bad news is: more than one.
The good news is: not that many.
For the moment I would like to define anything implemented as an operator (either built-in or overloaded) as a primitive. It would be very convenient if we could just stop there: methods implemented as operators are primitive and belong in the client's namespace, and methods not implemented as operators are not primitive and belong in namespace std. But I believe that this rough cut based on syntax and history alone is not in the best interest of the C++ community.
In addition to those methods implemented as operators, I propose the following list of primitives. Note that only one of them (swap) is outside of Section 26 (Numerics):
And I think the following identifiers should be reserved as possible future primitives:
swap is used a fair amount in <algorithm>. This should really come as no surprise. After all, it is a primitive! :-) There are actually two distinctions I would like to make though. There are currently several methods that specifically mention swap, either in their effects clause, or in their complexity clause. In my opinion, these must call swap (not std::swap, nor a series of assignments). In addition there are several methods that commonly call swap as part of their implementation, but no mention is made of this possibility in the standard. I would like to allow for this possibility with "may call swap". That is, it is implementation defined if such a method calls std::swap, swap, or neither.
iter_swap (1) swap_ranges reverse random_shuffle partition next_permutation prev_permutation
These methods are currently missing any requirements statement except that their use of forward or better iterator implies that the value_type is assignable. Since the (proposed) implementation must call swap, the minimum needed requirement on the value_type is that it is swappable.
Footnote (1): Implementations are allowed to specialize iter_swap. If such specializations do not call swap, they are forbidden from assuming copy constructibility or assignability of the iterator's value_type, despite the container's requirements.
rotate pop_heap sort_heap sort partial_sort partial_sort_copy nth_element
These methods are currently missing any requirements statement except that their use of forward or better iterator implies that the value_type is assignable. Since the (proposed) implementation may call swap, then the value_type must be both swappable and assignable.
stable_partition inplace_merge stable_sort
These methods are currently missing any requirements statement except that their use of forward or better iterator implies that the value_type is assignable. The description of these methods includes the possibility of using a temporary buffer. This implies that the value_type is also copy constructible. Thus swappable is already implied, clearing the way for the possibility that these methods may call swap.
The rest of the proposed primitives are called by member methods of the same name within the valarray template (26.3.3.3).
So how big of a change is this? What does it mean to implementors? And more importantly, what does it mean to clients of the std::lib?
I believe that in terms of effected code, this is a minuscule change. From a practical standpoint I do not think a single line of non-std::lib code will be broken. Up until very recently (mid 2000?), all std::lib implementations made most or all calls to other std::methods with the unqualified syntax. Issue 225 is mandating that this is incorrect and several (two?) vendors have already modified their libs accordingly. Thus I see little or no possibility that any client code exists which would be surprised by a std::lib calling a swap method in their own namespace. Indeed, I'm sure there is much more code that would be surprised by this not happening.
The change to std::lib vendors who have not yet swept through their libs and qualified internal calls is significant but not overwhelming. I converted the Metrowerks std::lib to qualified calls in about 8 hours. For those vendors who have already done this job, they would have to undo qualification on swap and the rest of the primitives defined herein. I estimate that job to take less than an hour.
Acceptance of this proposal will undercut much (all?) of the motivation for relaxing 17.4.3.1/1 to allow client code to put definitions into namespace std.
I believe that this is the path that will produce the least surprise to C++ programmers, and at the same time, provide them with the highest quality tools.
Respectfully,
Howard HinnantSenior Library and Performance Engineer Metrowerks hinnant@metrowerks.com | http://www.open-std.org/jtc1/sc22/wg21/docs/papers/2001/n1289.html | CC-MAIN-2017-17 | refinedweb | 1,557 | 55.44 |
// I don't think this still works, just found this in my backups and got sentimental. // You don't and shouldn't use INI files for your projects in 2008, it's stupid. YAML is the way to go!
package IniParser; require 5.00307; $IniParser::VERSION='1.224'; sub new { shift; my $file = shift; my $dir = shift; my $parsing = { 'file' => $file, 'dir' => $dir }; &set_file($parsing) if !$file; bless $parsing, 'IniParser'; return $parsing; } sub import_names { # this method aliases the hashes in the $parse_classes # rarray of the object to the name of the respective # ini class and import them into the namespace of the # caller package my $rparse = shift; my $rarray = shift; my $caller_pkg = caller; my ($class,$item); foreach $item (@$rarray) { if (!ref($item)) { $class = $item; } else { *{"${caller_pkg}::${class}"} = $item; } } } sub set_file { my $rparse = shift; my $new_name = shift; # if set_file is not called with an argument # with the name of the ini file, set_file # will look for an ini file with the name of the # script that is currently using the package if ($new_name) { $rparse->{'file'} = $new_name; } elsif (!defined($rparse->{'file'})) { $rparse->{'file'} = $0; $rparse->{'file'} =~ s/(\.?[\w\-.]+)\.([\w]+)?/$1\.ini/; # a dot *has* literal meaning inside a character class!!! # in the case above a dot means a period. } return $rparse->{'file'}; } sub set_dir { my $rparse = shift; my $new_dir = shift; if ($new_dir) { $rparse->{'dir'} = $new_dir; } return $rparse->{'dir'}; } sub which_file { # returns the name of the current ini file my $rparse = shift; return $rparse->{'file'}; } sub parse_file { # the spawned hashes will still persist after # perl exits the sub since # they are referenced in the mem alocated to $classes my $rparse = shift; my $new_class; $classes = [ ]; open (INI,"$rparse->{'dir'}"."$rparse->{'file'}") or die "$!: couldn't open ini file"; flock (INI, 2); while ($_ = <INI>) { chomp($_); next if $_ eq ''; # skips blank lines if ($_ =~ m/^\[([^\]]+)\]$/) { $new_class = $1; push (@$classes,$new_class); push (@$classes,\%$new_class); } elsif ($_ =~ m/^([\w\-]+) *= *("?(.+?) *"?)$/) { # laziness wanted my $key = $1; my $value = $2; $value =~ s/^"(.+)"$/$1/; # greediness wanted $$new_class{$key} = $value; } } flock (INI, 8); close(INI); return $classes; } 1; =head1 NAME IniParser v.1.0 beta 2 - Simple Ini File Parser and Value Importer =head1 SYNOPSIS use IniParser; $this_ini = new IniParser('foobar.ini',''); $rarray = $this_ini->parse_file(); $this_ini->import_names($rarray); # or, in perl's traditional oneliners: $this_ini->import_names(this_ini->parse_file()); =head1 ABSTRACT This perl library is meant to parse simple ini files for values that you want to use on your script. I wrote it because I needed to keep simple info such as directory pathes, URLs, database information outside my perl scripts so that it would be easier to port it to another system without having to edit the script file. IniParser uses a rather fast, object oriented interface. It parses ini files that should look like this: [database_info] db = potvall user = spiceee passwd = candy [paths] img = flash = IniParse imports hashes to your current namespace with the keys and values specified in your ini file. So for the above ini file, you could access the value for the image path like this: print "$paths{'img'}\n"; The output for this command should be: I should emphasize that you should only keep small but relevant info in your ini file. This is not a database system whatsoever! =head1 DESCRIPTION =head2 PROGRAMMING STYLE If you create a new IniParser without any argument, such as: $this_ini = new IniParser(); IniParser will suppose your ini file has the same name of the current script, only with a .ini extension. For instance, if the file using IniParser is named foobar.pl, IniParser will look for a foobar.ini if no filename is passed to it. With the ini file directory, if not passed to it, IniFile will suppose the dir is the same dir of the script using IniParser. =head2 CALLING IniParser.pm ROUTINES You can set the name of the ini file after initializing the object with the routine call: $this_ini = new IniParser(); $this_ini->set_file('foobar.ini'); Same works for the directory: $this_ini->set_dir('stuff/ini-bin/'); If at any time you need to know what is the working ini file name, use: $this_file = $this_ini->which_file(); # This will return the name of the file. To tell IniParser to parse your file, use: $rarray = $this_ini->parse_file(); $rrarray is a hard reference to the array that contains the data of the parsed file, to tell IniParser to import those data to your namespace, use: $this_ini->import_names($rarray); It's pretty much it. =head1 BUGS The parsing engine is still lacking a definitive reference, mostly because the ini file lacks some reference too. Here are some rules: =item 1. if you want your value to start with a relevant space, quote the value: Ex: [foobar] foobar = " i really need the space" $foobar{'foobar'} points to the value: (space)i really need the space. =item 2. if you have opening and closing quotes in the middle of the value, IniParser will keep them: Ex: [foobar] script_tag = script language = "JavaScript" $foobar{'script_tag'} holds: script language = "JavaScript" Note that this could be so much clearer if you write it like that: [foobar] script_language = JavaScript =item 3. Important!! If you use spaces in the "class" name, IniParser will fail to import the names of the hashes to your namespace: Ex: [foo bar] foobar = foobar %foo(space)bar is not a valid variable name in perl!!!! Please report bugs to perl@potentialvalleys.com =cut | http://www.dzone.com/snippets/iniparserpm-my-first-perl | CC-MAIN-2014-41 | refinedweb | 890 | 65.96 |
Top: Multithreading: jobqueue
#include <pasync.h> class jobqueue { jobqueue(int limit = DEF_QUEUE_LIMIT); void post(message* msg); void post(int id, int param = 0); void posturgent(message* msg); void posturgent(int id, int param = 0); message* getmessage(int timeout = -1); int get_count(); int get_limit(); }
The jobqueue class implements a thread-safe list of objects of type message or any derivative class. Jobqueue supports posting to and reading from the list from multiple threads simultaneously.
The jobqueue class can help to build multithreaded server/robot applications by maintaining a pool of reusable threads that receive job 'assignments' from a queue. This threading model can be faster compared to applications that create and destroy separate thread objects for each task. See Examples for a full-featured server template with a thread pool.
jobqueue::jobqueue(int limit = DEF_QUEUE_LIMIT) constructs a job queue object. Limit specifies the maximum number of messages this queue can hold. If the limit is reached, the next thread that posts a message will wait until the queue becomes available again. In this version the default for limit is 5000.
void jobqueue::post(message* msg) adds a message to the queue. Msg can be an object of class message or any derivative class. The message object should always be created dynamically using operator new. The messages in the queue are processed in order they were posted, i.e. on first-in-first-out basis.
void jobqueue::post(int id, pintptr param = 0) creates a message object using id and param and calls post(message*).
void msgqueue::posturgent(message* msg) posts a message object "out of turn", i.e. this message will be processed first. The messages posted through this method are processed on first-in-last-out basis. post() and posturgent() can be used alternately on the same queue.
void jobqueue::posturgent(int id, pintptr param = 0) creates a message object using id and param and calls posturgent(message*).
message* jobqueue::getmessage(int timeout = -1) retrieves the next message from the queue or waits if there are no messages available. The timeout parameter specifies the timeout value in milliseconds. If timeout is -1 (the default) getmessage() will wait for a message infinitely. This function returns a message object, or otherwise NULL if the time specified in timeout has elapsed. NOTE: the message object returned by this function must be freed with operator delete. It is safe to call getmessage() concurrently.
int jobqueue::get_count() returns the number of messages currently in the queue.
int jobqueue::get_limit() returns the queue limit set by the constructor.
See also: message, msgqueue, Examples | http://www.melikyan.com/ptypes/doc/async.jobqueue.html | crawl-001 | refinedweb | 427 | 66.64 |
Ketting v6: Using Hypermedia APIs with React
We just released Ketting 6. This is the accumulation of about a year of learning on how to better integrate REST APIs with frontend frameworks, in particular React.
It’s packed with new features such as local state management, new caching strategies, (client-side) middleware support and change events. It’s also the first release that has some larger BC breaks to make this all work.
Releasing Ketting 6 is a big personal milestone for me, and I’m really excited to unleash it to the world and see what people do with. A big thank you to all the people that beta tested this in the last several months!
What’s Ketting?
In short: Ketting is a generic REST client for Javascript. You can use it for pushing JSON objects via HTTP, but the richer your API is in terms of best practices and standard formats, the more it can automatically do for you.
It has support for Hypermedia formats such as HAL, Siren, Collection+JSON, JSON:API and can even understand and follow links from HTML.
It’s often said that REST (and Hypermedia APIs) is lacking a good generic client. GraphQL has a lot of advantages, but a major one is tooling. Ketting aims to close that gap.
More information can be found on Github.
React support in Ketting 6
Ketting now has a separate react-ketting package that provides React bindings to Ketting. These bindings should look very familiar if you’ve used Apollo Client in the past.
Lets dive into an example:
Lets assume you have a REST api that has an ‘article’ endpoint. This returns something like:
{ "title": "Hello world", "body": "..." }
This article is retrieved with
GET, and updated with
PUT, this is how
you would display it:
import { useResource } from 'react-ketting'; export function Article() { const { loading, error, data } = useResource(''); if (loading) { return <div>Loading...</div>; } if (error) { return <div class="error">{error.message}</div>; } return <article> <h1>{data.title}</h1> <p>{data.body}</p> </article>; }
But what about mutations? Unlike GraphQL, mutations in REST APIs often have
the same format for
GET and
PUT, so sending an updated resource to a
server often just means mutating your ‘data’ and sending it back.
The following example would allow a user to edit an article and send it back:
import { useResource } from 'react-ketting'; export function Article() { const { loading, error, data, setData, submit } = useResource(''); if (loading) { return <div>Loading...</div>; } if (error) { return <div class="error">{error.message}</div>; } const changeTitle = (title) => { data.title = title; setData(data); }; const changeBody = (body) => { data.body = body; setData(data); }; return <form onsubmit={() => submit}> <input type="text" value={data.title} onChange={ev => changeTitle(ev.target.value) /> <textarea onChange={ev => changeBody(ev.target.value)}>{data.body}</textarea> <button type="submit">Save!</button> </form>; }
Whenever
setData is called, the internal Ketting cache is updated with the new
resource state. This is globally stored, based on the uri of the resource.
This means that if multiple components use
useResource on that same uri,
every component will see that update and triggere a re-render.
This is similar to Apollo’s local state, except it’s still bound to a single resource uri and can eventually be saved.
When
submit() is called, the
data is re-serialized and sent in a
PUT
request.
Non-exhaustive list of other changes
- Multiple cache strategies, such as forever, short and never.
- Support for fetch-middlewares. OAuth2 is reimplemented as such a plugin. These plugins can be added globally, or per-origin.
get()now returns a
Stateobject, and functions such as put() will require one as an argument.
put()now automatically updates the state cache.
- Support for HEAD requests and following links from HEAD response headers.
- PKCE support for OAuth2.
- Links can now be mutated and sent back to the server.
- Nested transcluded items/embeds.
- A separate
postFollow()method.
- Better support for binary responses and
text/*responses.
- Experimental: Support for Siren actions, HAL forms and submitting HTML forms.
Future plans
The next two things we are working on are:
- Support for more hooks/components for common React/REST API patterns (tell us what you want!).
- Deeper support for forms and actions from HAL Forms, Siren and HTML.
- Websocket support for live server-initiated state pushes.
More links
- The documentation got a complete rewrite and is now hosted on the Github Wiki.
- For a full list of changes and BC breaks, check out the Upgrading page. | https://evertpot.com/ketting-6/ | CC-MAIN-2022-05 | refinedweb | 745 | 58.48 |
Changing Target Web Service At Runtime
Introduction
While developing clients for web services, we typically add a web reference to the web service by specifying URL of the .asmx file. Adding a web service in VS.NET generates required proxy object. configurable URL so that even if original web service is moved your clients need not be recompiled. In this article we will see how to do just that.
Creating the web service
For our example we will develop a simple web service that has only one method. Following steps will show you how to proceed.
- Create a new C# web service project in VS.NET.
- Open the default .asmx file and add following code to it.
using System; using System.Web.Services; namespace HelloWorldWS { public class CHelloWorld : System.Web.Services.WebService { [WebMethod] public string GetHelloWorld() { return "Hello World From CHelloWorld"; } } }
- As shown above this web service class (CHelloWorld) contains a single method called GetHelloWorld() that returns a string.
- Add another .asmx file to the project.
- Open the file and modify it as shown below.
using System; using System.Web.Services; namespace HelloWorldWS { public class CHelloWorldBackup : System.Web.Services.WebService { [WebMethod] public string GetHelloWorld() { return "Hello World From CHelloWorldBackup"; } } }
- This class is similar to previous one but its name is CHelloWorldBackup. Also, it returns different string from GetHelloWorld() method so that you can identify the method call
- Now, that we have both the web services ready compile the project.
Creating web service client
Let us build a simple web client for our web service.
- Create a new ASP.NET web application in VS.NET.
- The application will have a default web form. Before writing any code we need to add a web reference to our web service. Right click on the references node and select Add web reference. Follow the same procedure as you would have while developing normal web services. Adding a web reference will generate code for proxy web service object.
- Place a button on the web form and add following code in the Click event of the button:
private void Button1_Click (object sender, System.EventArgs e) { localhost.CHelloWorld proxy=new localhost.CHelloWorld; Response.Write(proxy.GetHelloWorld()); }
- Above code shows how you will normally call a web service. The web reference contains information about the location of the web service.
- If you move the .asmx file after you deploy this client, it is bound to get an error. To avoid such situation, modify above code as shown below:
private void Button1_Click (object sender, System.EventArgs e) { localhost.CHelloWorld proxy=new localhost.CHelloWorld; proxy.Url=" /HelloWorld.asmx"; Response.Write(proxy.GetHelloWorld()); }
- In above code we have explicitly set Url property of the proxy class to the required .asmx file. You can easily store this URL in <appSettings> section of web.config file and retrieve it at run time. Now, even if you move your web service, all you need to do is change its URL in the web.config.
- Following code shows this:
private void Button1_Click(object sender, System.EventArgs e) { localhost.CHelloWorld proxy=new localhost.CHelloWorld; proxy.Url=GetURL(); Response.Write(proxy.GetHelloWorld()); }
public string GetURL() { return ConfigurationSettings.AppSettings["webserviceurl"]; }
- The web.config looks like this:
<appSettings> <add key="webserviceurl" value=" /HelloWorldBackup.asmx" /> </appSettings>
Note that in order to work above code correctly, both the web service should have exactly same web method signatures.
I hope you must have got some idea about how to change target web service at run time.
Keep Coding!(I found this article from here...)
--
Het Waghela
The person who sends out positive thoughts activates the world around him positively and draws back to himself positive results. | http://its-different.blogspot.com/2005/05/changing-target-web-service-at-runtime.html | CC-MAIN-2018-22 | refinedweb | 604 | 60.41 |
lp:~ubuntuone-pqm-team/requests-oauthlib/stable
Created by Ricardo Kirkner on 2013-02-19 and last modified on 2013-02-19
- Get this branch:
- bzr branch lp:~ubuntuone-pqm-team/requests-oauthlib/stable
Members of Ubuntu One PQM Team can upload to this branch. Log in for directions.
Branch merges
Related bugs
Related blueprints
Branch information
- Owner:
- Ubuntu One PQM Team
- Project:
- requests-oauthlib
- Status:
- Development
Recent revisions
- 16. By Kenneth Reitz on 2013-01-28
Merge pull request #10 from sa2ajj/
oauthlib- version
require at least version 0.3.4 of oauthlib
- 15. By Kenneth Reitz on 2013-01-28
Merge pull request #13 from matthewlmcclure
/kennethreitz/ requests/ issues/ 1096
Use consistent attr name with requests proper.
- 14. By Kenneth Reitz on 2013-01-28
Merge pull request #14 from matthewlmcclure
/add-gitignore
Added a .gitignore file.
- 13. By Cory Benfield on 2012-12-22
Merge pull request #7 from mart-e/patch-1
unicode behaviour to python 3
- 12. By Kenneth Reitz on 2012-12-19
Merge pull request #6 from ib-lundgren/
moar_docs
Added some more docs to the readme
- 11. By Kenneth Reitz on 2012-12-19
Merge pull request #4 from ib-lundgren/master
Tidying up a bit for requests 1.0
- 10. By Cory Benfield on 2012-12-19
Typo in Readme
There was a typo in the readme.
Yeah.
- 9. By Cory Benfield on 2012-12-17
Merge pull request #3 from kracekumar/issue-1
Fixes issue #1
- 8. By Kenneth Reitz on 2012-11-23
import fixes
- 7. By Kenneth Reitz on 2012-11-23
import from oauthlib
Branch metadata
- Branch format:
- Branch format 7
- Repository format:
- Bazaar repository format 2a (needs bzr 1.16 or later) | https://code.launchpad.net/~ubuntuone-pqm-team/requests-oauthlib/stable | CC-MAIN-2019-39 | refinedweb | 286 | 64 |
15 May 2008 15:51 [Source: ICIS news]
LONDON (ICIS news)--Dow will permanently shut down its cobalt-polybutadiene (PBD) rubber assets in Berre L’Etang, France, at the end of this week, as announced in February as part of cost-cutting efforts, a company source confirmed on Thursday.
?xml:namespace>
“The plant will shut down at the end of this week and will prepare for demolition in the coming weeks,” the source added.
PBD is used in tyre tread and sidewall compounds, conveyor belts, footwear, golf balls, a variety of mechanical goods, as well as for impact modification of polystyrene.
($1 = €0.65)
For more on PS. | http://www.icis.com/Articles/2008/05/15/9124246/dow+confirms+france+pbd+factory+closure.html | CC-MAIN-2013-20 | refinedweb | 108 | 62.72 |
So far, all our Java applications have run in the command line. We've made some pretty cool stuff, but without a more visual front-end user interface our interactions with users are fairly limited.
This week we'll add an additional layer of complexity by creating entire web applications for our Java projects. To do this, we'll use a tool called Spark. In this lesson we'll begin exploring how to setup, configure, create, and launch a basic Spark application.
Spark is an awesome, lightweight web framework that will allow us to create web applications with robust Java back-ends. (Note: when Googling, there is Apache Spark and Java Spark aka the Spark framework. Keep that in mind.)
Spark sticks quite closely to its blueprint, Sinatra, a framework developed for Ruby, which is the gold standard of frameworks: By learning Spark, you will be able to understand how many other frameworks do what they do, Sinatra in Ruby, Silex in PHP, Nancy in C#... it’s very cross-applicable! Spark will be responsible for creating user interfaces for our applications that can be viewed in a web browser, and handling interactions between our user interfaces and back-end logic.
To get a general sense of how Spark works, we will quickly walk through creating a website to display a letter to our friends. Then, we'll explore the individual elements of a Spark web application in further detail throughout upcoming lessons.
Let’s begin by creating a new, simple application with Spark.
First, create a new project in IntelliJ as outlined in the Getting Started with IntelliJ lesson. Use friendletter for the GroupId, and friend-letter for the ArtifactId.
Walk through the rest of the setup screens as demonstrated in the Getting Started lesson. Make sure you tick all the right boxes.
Once your project is loaded, add a .gitignore file.
Then, open the build.gradle file, and add the following lines:
dependencies { testCompile group: 'junit', name: 'junit', version: '4.12' compile "com.sparkjava:spark-core:2.6.0" compile "com.sparkjava:spark-template-handlebars:2.5.5" //we'll need this for later! compile 'org.slf4j:slf4j-simple:1.7.21' //to ensure easy to read logging. }
Great! You may be prompted by Gradle that it needs to download the files that make up
spark-core,
spark-template-handlebars, and
slf4j-simple (a logging tool that provides better error messaging). You can also do this yourself: click “gradle” in the right sidebar, and then the circular arrow “refresh” button. Gradle will download your dependencies for you.
Now, create an App.java file by right-clicking on the src/main/java directory and adding a Java class called App.java.
App.javaFile
Next, let's set up our App.java file. Last week our App.java files contained code to interact with users through the command line. With Spark, App.java will still be responsible for our user interfaces, but the code will look different. We'll need to use the format and methods expected by the Spark framework.
We'll add the following to App.java:
import static spark.Spark.*; public class App { public static void main(String[] args) { get("/", (request, response) -> "Hello Friend!"); } }
As you type, you’ll notice that red squiggly lines appear - this means that IntelliJ is reading the code we are writing and checking it for errors! You’ll also potentially see a red line on the right hand side - this means something is wrong with this line. A yellow line means a warning or an inconsistency, and if all is well, you’ll see a green checkmark up at the top!
Note: If you see an error message that reads: "Cannot resolve symbol ‘spark’" make sure you have included spark dependencies in your build.gradle. Go check it.
Let’s walk through this short code:
import static spark.Spark.*; imports the Spark library Gradle has located and downloaded for us.
The next part, beginning with
get(), is new. Let's discuss this portion in further detail.
This line:
get("/", (request, response) -> "Hello Friend!");
...is known as a route. Routes like these are the primary building blocks of a Spark application.
This part is important - make sure you understand what a route is and what it does before moving on. Check with the pair near you or with your teacher if this feels confusing!
A route is comprised of three individual pieces:
A verb depicting what the route is doing. In our route, this verb is
get(). Remember when we learned about HTTP Requests? The
get() method represents an HTTP GET request. And an HTTP GET request is responsible for getting information from a web server to return to the client. It means that something or someone is trying to GET information from the server: A list of restaurants, or students, some information, or an image.
A path. That is, what part of the web application the verb is interacting with. In the example above, we see
get("/".... This means that we're executing an HTTP GET request to our server, to retrieve the content for the
/ area of our site. If we later published our site online at the domain, the route above would be responsible for getting the content at.
A callback. That is, the
(request, response) -> portion. Don't worry about the details of this different-looking line of code yet, just know that when a client requests the resources of the specific webpage located at
/, the server will return the string
"Hello Friend!" back to the client in the HTTP response body.
When our browser makes an HTTP request to our Spark application, Spark matches it to the first route in App.java that matches the request. So, for instance, if we make a GET request with the path
/photos, Spark will read through the App.java file, and then execute the request when it hits the first route that begins with
get(/photos....
Make a mental note: The App.java file gets read top to bottom! So, note that if you have multiple similar routes, Spark will map the request to the first route it finds that matches the request. We probably won't encounter this until our applications get much larger; but keep this in mind for the future.
Let's launch our app!
Find the Run menu at the top of your window and select Run. The first time you do this, IntelliJ will ask you what exactly you wish to run - because you can run projects in more than one way. Don’t worry about this now, simply select App.
After a few moments, your app should compile, and you should see this in the Run pane at the bottom of your screen:
If you don’t see the below, fix any errors you may have in your code, double check your dependencies, and try again.
The messages above are informing us that our Spark application has been successfully launched, or "ignited" in Spark's terminology, and it's 'located' at
0.0.0.0:4567. We can visit in the browser and see our "Hello Friend!" message:
Congratulations, you just wrote your first Spark application!! That was really pretty straightforward, wasn’t it?
But we should probably include more than just "Hello Friend", don't you think? Let's write an entire letter to our friend using HTML:
import static spark.Spark.*; public class App { public static void main(String[] args) {>" );
The project directory should now look like this:
friend-letter ├── build.gradle ├── .gitignore └── src └── main ├── java └── App.java
When we add HTML to a route like this, it needs to be one long
String. However, to make it read like an HTML file, we concatenate multiple
Strings across multiple lines with the
+ operator.
If we refresh the browser after adding our HTML nothing happens! What went wrong?
Remember, Java is a compiled language. The computer doesn't run the source code in the
.java files we write. Instead, this source code must be compiled into a format the computer can read. So, after making changes we need to recompile and restart the server to ensure the new content is present in the compiled code that Spark is referencing.
Let’s do that now.
Either select Run > Stop ‘App’ from the main menu, or hit the red square either in the top right corner or bottom left corner. If you are looking at the menu in the bottom left corner, you can also choose Rerun App.
If you check localhost:4567/ now, you’ll see your changes.
Let's add images to spruce things up!
First, we'll need to create a place to house our images and other resources.
In src/main folder, create another subdirectory called resources. This folder will store any non-Java files required to run your application, such as CSS, HTML, images, videos, music files, etc.
In resources, create another folder called public. The public folder is where we'll place content that should be visible to the outside world (ie: Things that users should be able to see. Like the images we want to display in our app.)
Finally, in the public folder, create an images folder. This is where our images will reside.
Next, let's add some image files to our new friend-letter/src/main/resources/public/images directory. Unsplash is a great resource for free stock photographs. Pick out a few images to use in your own project. (You may also want to re-size them. To do this on a Mac, open an image in the "Preview" program, and visit Tools > Adjust Size... ).
For this lesson, I'm using the following two images from Unsplash. I've saved them as
rockycoast.jpeg, and
foggymountain.jpeg. Then, I resized them to a width of 1000 pixels. For your program, feel free to either download your own images, or save copies of these:
The project directory should now look like this:
friend-letter ├── build.gradle ├── .gitignore └── src └── main ├── java │ └── App.java └── resources └── public └── images ├── foggymountain.jpeg └── rockycoast.jpeg
Sweet. Now let’s include some code in our template to render these:
To do this, we'll create another new route in App.java. Up until now, we were only accessing pages under the root URL, namely localhost:4567/.
Now, let's use these new images in our application! To do this, we'll create another new route in App.java. We can create a new page in our app by adding a new "entry" with another instance of Spark's
get() method.
We also need to let Spark know where static files like images are going to live.
We can do this by including the line
staticFileLocation("/public"); in the
main() method. This will let Spark know it should always look in the
/public directory for any additional resources we link, and load images assuming
/public as a starting point.
import static spark.Spark.*; public class App { public static void main(String[] args) { staticFileLocation("/public"); //this line has changed!>" ); //new route below! get("/favorite_photos", (request, response) -> "<!DOCTYPE html>" + "<html>" + "<head>" + "<title>Hello Friend!</title>" + "<link rel='stylesheet' href=''>" + "</head>" + "<body>" + "<h1>Favorite Traveling Photos</h1>" + "<ul>" + "<li><img src='/images/foggymountain.jpeg' alt='A photo of a mountain.'/></li>" + "<li><img src='/images/rockycoast.jpeg' alt='A photo of a a rocky beach.'/></li>" + "</ul>" + "</body>" + "</html>" ); } }
If your image files are named something different, make sure the file path in your
<img> tags reflect your unique images. If we quit the server, we should now be able to visit. Our web app now has multiple pages!
Now, if you restart the server, you should be able to navigate to and see your images!
This is super neat, clearly.
That said, I think we can agree, that, even with the added HTML, our website is still a little plain. And typing out the html with concatenation is tiresome. There must be a better way! (and there is.)
Enter the template!
What is a template? A special kind of crockery? No, not exactly.
Our application is really quite tiny. At the moment, it only contains two pages, with small pieces of text and a few images. Can you imagine what the App.java file would look like in a large application with many, many pages? And what if each page contained more content than ours? App.java would be huge and unwieldy! And what if we wanted to add a bunch of images, video, or other content? Oh dear.
Thankfully, we can easily slim down our App.java file as our applications grow. In this lesson we'll learn how to create templates to house our HTML. In the context of Spark, templates are separate files outside of App.java that contain the HTML for individual web pages within our application.
This allows us to re-use pages with different content, or to break pages down into sections - some may change based on which route we are trying to access, some may stay the same. It also allows us to insert bits of java code in our frontend to make showing dynamic data much, much easier.
Spark cannot render templates on its own, so we'll use a special tool called Handlebars.
If you have worked with JavaScript frontend frameworks before, you may have heard of Handlebars: Handlebars.js is used by many different kinds of platforms to render easy-to-read templates. Like Spark, it’s cross-applicable. While Handlebars was originally designed for use with JS, the Java version is exactly the same and uses the same syntax! Super cool.
Let’s get cracking.
We’ve already added Handlebars to our build.gradle, so that’s taken care of.
We’ll need to modify our App.java route a bit, and add some new directories to store our templates.
If you don't already have one in place, create a subdirectory called resources inside of src/main. Make a directory called public, and another inside that called images.
In addition to housing any images used in our applications, Spark will also use the resources folder for templates.
Next, let's create a templates folder inside of resources. As you may have guessed, this is where our template files will reside.
Our project directory should look like this:
hello-friend ├── build.gradle ├── .gitignore └── src └── main ├── java │ ├── App.java │ └── resources ├── public │ └── images └── templates
Good stuff!
Now we can create our first template. Within src/main/resources/templates create a file called hello.hbs. Handlebars template files have a
.hbs extension, which stands for, you guessed, Handlebars.
Let’s move on over to the next lesson and crank out some templates. | https://www.learnhowtoprogram.com/java/web-applications-with-java/introduction-to-spark-33347b2b-025f-432f-9eeb-800dca2554e6 | CC-MAIN-2019-04 | refinedweb | 2,454 | 67.65 |
The original pong game was not much compared to what would come later. For many it was amazing that something like was available for use in the home. I have seen others make pong games in Unity and thought it might be fun to try. Pictures of the console show controls for two players. For this project I’ll make the second player the computer. Yeah it will hard to bet but….
Using Unity 5.5 start out with a basic camera.
Using a graphic tool I made a paddle and a ball(png format). Create a folder named Sprites and drop in the two images. Create a empty game object named ‘player’
Drag the paddle sprite onto the player game object and notice the Sprite Renderer show up as a component of the player. Select the player object and then Select Component->Physics->RigidBody from the menu. The paddle will need this in order to bounce the ball.
Create a new folder named Physics. Select Asset->Create->PhysicsMaterial. Name it bounce. When applied to the paddle will cause the ball to bounce back.
In order for the paddle to react to the ball hitting it we need to add a collider component. A BoxCollider will do. Set the material of the collider to the bounce material.
Create a new game object called Ball and add in the ball sprite. Add a RigidBody and collider as well.
So far there is one paddle and a ball. Not so good?
There needs to be some code in order to make this work. Create a new folder named Scripts and add a new c# file named paddle.cs. Below is what the code should look like( or close).
The Update function is part of the core Unity MonoBehavoir class. It is called once per frame. The variable ‘gameObject’ refers to the object to which this script is attached.
Input.GetAxis(“Vertical”) will return -1 or 1 depending if the down or up arrow key is pressed. This value times the speed will be used to increment the position of the game object.
playerPosition = new Vector2(-20,Mathf.Clamp(yPosition,-13,13));
This line creates a new 2d Vector with a fixed X location of -20(where I placed the paddle on the screen), and a new value of Y based on the new yPosition. Mathf.Clamp() restricts the y value to between -13 and 13. These values were determined by experimentation.
The last line transforms the object to a new position. Since the x value is always -20 the paddle will only move up or down.
using System.Collections; using System.Collections.Generic; using UnityEngine; public class paddle : MonoBehaviour { public float speed=3; public float yPosition; public Vector2 playerPosition; // Update is called once per frame void Update () { yPosition=gameObject.transform.position.y+(Input.GetAxis("Vertical")*speed); playerPosition=new Vector2(-20,Mathf.Clamp(yPosition,-13,13)); gameObject.transform.position =playerPosition; } } | https://rickerg.com/2017/01/23/unity-pong-game-why-not/ | CC-MAIN-2018-34 | refinedweb | 487 | 68.57 |
Introduction
Are you an 8-bit or a 32-bit programmer?
At OMZLO, we have been mainly focussing our development efforts on newer 32-bit Arm-Cortex chips (STM32 and SAMD), which typically offer more RAM, more speed, more peripherals, at a similar or lower price-point than older 8-bit MCUs. But 8-bit MCUs are far from dead. Microchip has notably released a new series of chips, collectively branded as the "tinyAVR 0-series", which offer more modern peripherals than the older AVR chips at a very competitive price point. They seem like the perfect candidate for simple products that don't need all the features and fine-tuning capabilities of the newer 32-bit MCUs. 8-bit MCUs are also substantially simpler to program, which translates into faster development time.
Thanks to the success of the Arduino UNO, there are tons of tutorials online that explain how to program 8-bit Atmega328 microcontrollers and their cousins like the Attiny85 using direct register access, without the Arduino language or any vendor IDE such as Atmel Studio. Just google "atmega328 blinky". All you need is an AVR C-compiler, a text editor, avrdude, and an AVR programmer. Some resources even show how to also build the electronics needed to get a basic atmega328 running on a breadboard. However, it's hard to find the same information for these newer "tinyAVR 0" chips.
Of course, Microchip offers all the tools necessary to program these newer "TinyAVR" MCUs with their windows-only IDE. There are also "Arduino cores" for some of these newer "TinyAVR" MCUs that let you program them with the Arduino IDE. But again, if you like to write code for MCUs in "baremetal" style, with your favorite text editor, a makefile, and a c-compiler, there are few resources available online.
In this blog post, we will describe how to program a blinky firmware on an Attiny406, from the ground up, using the simplest tools. Most of the things described here can be easily transposed to other TinyAVR MCUs. Our approach is generally guided toward macOS or Linux users, but should also be applicable in an MS-Windows environment with a few minor changes.
Hardware
We decided to play with the Attiny406, with a view of using it in the future to replace the Attiny45 we currently use on the PiWatcher, our Raspberry-Pi watchdog. The Attiny406 has 4K of flash space, 256 bytes of RAM, and can run at 20Mhz without an external clock source.
One of the most important differences between the new TinyAVR MCUs and the older classic AVR MCU like the Attiny85 is that the newer chips use a different programming protocol called UPDI, which requires only 3 pins, as opposed to the 6-pin ISP on the classic AVRs.
A little research shows that programming TinyAVRs with UPDI can be achieved with a simple USB-to-serial cable and a resistor, thanks to a python tool called pyupdi, which suggests the following connection diagram for firmware upload:
Vcc Vcc +-+ +-+ | | +---------------------+ | | +--------------------+ | Serial port +-+ +-+ AVR device | | | +----------+ | | | TX +------+ 4k7 +---------+ UPDI | | | +----------+ | | | | | | | | | RX +----------------------+ | | | | | | | +--+ +--+ | +---------------------+ | | +--------------------+ +-+ +-+ GND GND
shematic
We created a minimalistic breakout board for the Attiny406. The board can be powered by 5V through USB or a lower 3.3V through dedicated VCC/GND pins. An LED and a button were also fitted on the board. For testing purposes, we decided to embed the 4.7K resistor needed for the UPDI programming directly in the hardware (i.e. resistor R2). This gives us the following schematic:
Board
The resulting breakout board is tiny and fits conveniently on a small breadboard. The design files are shared on aisler.net.
Programming the Attiny406 on the board with a USB-serial cable is done by connecting the headers on the board edge:
Software
pyudpi
We installed pyupdi following the instructions provided on their webpage.
We connected our USB-Serial cable to the board with the 4 dedicated UPDI pins available on the board. Our USB-Serial converter shows up as the file
/dev/tty.usbserial-FTF5HUAV on a MacOS system.
To test that the programmer recognizes the Attiny406, you can issue a command similar to the following, adapting the path for the USB-serial converter to your setup:
pyupdi -d tiny406 -c /dev/tty.usbserial-FTF5HUAV -i
This should result in the following output if all goes well:
Device info: {'family': 'tinyAVR', 'nvm': 'P:0', 'ocd': 'D:0', 'osc': '3', 'device_id': '1E9225', 'device_rev': '0.1'}
The C compiler
The typical avr-gcc available on macOS with homebrew did not seem to recognize the Attiny406 as a compiler target, so we went off to install the avr-gcc compiler provided by Microchip, which is available here. Downloading the compiler requires you to create an account on the Microchip website, which is a bit annoying.
Once downloaded, we extracted the provided archive in a dedicated directory. The
bin directory in the archive should be added to the
PATH variable to make your life easier. Assuming the downloaded compiler is stored in the directory
$HOME/Src/avr8-gnu-toolchain-darwin_x86_64, the PATH can be altered by adding the following line to your
.bash_profile file:
export PATH=$PATH:$HOME/Src/avr8-gnu-toolchain-darwin_x86_64/bin/
Newer Attiny MCUs are not supported out of the box by the Microchip avc-gcc compiler. You need to download a dedicated Attiny Device Pack from their website, as shown below:
The resulting downloaded Device Pack is named
Atmel.ATtiny_DFP.1.6.326.atpack (or similar depending on versioning). Though the extension is
.atpack, the file is actually a zip archive. We changed the extension to
.zip and extracted the package in the directory
$HOME/Src/Atmel.ATtiny_DFP.1.6.326 next to the compiler files.
C program
We created the following program that blinks the LED on pin PB5 of our Attiny board at a frequency of 1Hz.
#include <avr/io.h> #include <util/delay.h> int main() { _PROTECTED_WRITE(CLKCTRL.MCLKCTRLB, 0); // set to 20Mhz (assuming fuse 0x02 is set to 2) PORTB.DIRSET = (1<<5); for (;;) { PORTB.OUTSET = (1<<5); _delay_ms(500); PORTB.OUTCLR = (1<<5); _delay_ms(500); } }
The code looks very similar to what you would see on a classic AVR "blinky" program. One visible change is the use of structures to access various registers of the MCU: e.g instead of setting bits in
PORTB, you access
PORTB.DIRSET.
The other visible change is the clock setup code
_PROTECTED_WRITE(CLKCTRL.MCLKCTRLB, 0). Out of the box, at reset, the Attiny406 runs at 3.33Mhz, which corresponds to a base frequency of 20Mhz with a 6x clock divider applied. To enable the full 20Mhz speed, the register
CLKCTRL.MCLKCTRLB is cleared. Because this register needs to be protected against accidental changes, the Attiny406 requires a specific programming sequence to modify it. Fortunately, this is natively offered by the macro
_PROTECTED_WRITE. More details are available in the Attiny406 datasheet.
In comparison with an STM32 or a SAMD21, the code is blissfully simple.
Makefile
We assume the following directory structure where:
Src/Atmel.ATtiny_DFP.1.6.326/is the location of the Microchip Device Pack
Src/attiny406-test/is the directory where the code above is stored in a file called
main.c
Compiling the code can be done by issuing the following command within
attiny406-test/ directory,:
avr-gcc -mmcu=attiny406 -B ../Atmel.ATtiny_DFP.1.6.326/gcc/dev/attiny406/ -O3 -I ../Atmel.ATtiny_DFP.1.6.326/include/ -DF_CPU=20000000L -o attiny406-test.elf main.c
An
-O optimization flag is required to make the
_delay_ms() function calls work successfully, as well as defining the variable F_CPU to reflect the expected chip clock speed. The rest of the parameters provide the location of the Attiny406 device-specific files we previously extracted from the Device Pack.
Uploading the firmware to the MCU requires a conversion to the intel HEX format and a call to the pyupdi tool. To address all these steps, we created a simple Makefile.
OBJS=main.o ELF=$(notdir $(CURDIR)).elf HEX=$(notdir $(CURDIR)).hex F_CPU=20000000L CFLAGS=-mmcu=attiny406 -B ../Atmel.ATtiny_DFP.1.6.326/gcc/dev/attiny406/ -O3 CFLAGS+=-I ../Atmel.ATtiny_DFP.1.6.326/include/ -DF_CPU=$(F_CPU) LDFLAGS=-mmcu=attiny406 -B ../Atmel.ATtiny_DFP.1.6.326/gcc/dev/attiny406/ CC=avr-gcc LD=avr-gcc all: $(HEX) $(ELF): $(OBJS) $(LD) $(LDFLAGS) -o $@ $(OBJS) $(LDLIBS) $(HEX): $(ELF) avr-objcopy -O ihex -R .eeprom $< $@ flash: $(HEX) pyupdi -d tiny406 -c /dev/tty.usbserial-FTF5HUAV -f attiny406-test.hex read-fuses: pyupdi -d tiny406 -c /dev/tty.usbserial-FTF5HUAV -fr clean: rm -rf $(OBJS) $(ELF) $(HEX)
To compile the code, we simply type
make. Uploading is done with
make flash. This Makefile can be further enhanced as needed.
Conclusion
With the right tools, baremetal programming on the new TinyAVR MCUs is as simple as on its older AVR cousins.
If you have programming tips for the AVRTiny, please share them with us on on Twitter or in the comments below.
Hi,
It's great that someone else is doing things with these MCUs, I've used them in some recent projects and they're great, I'm using the attiny1617 in my main projects.
I wrote a script to automate setup of the toolchain here:
Which I think supports the 406. I haven't tried it on a Mac, the main target is Linux.
I'm pleased that I don't need to use any fancy libraries (except the avr C library and their very minimal runtime / startup code) and it's all simple enough that I can disassemble my firmware and see exactly what's happening.Mark Robson, 23 days ago
How about send $ and we send you a kit?
I am an old hand at bare level programming :).
JohnJohn, 22 days ago
Hi, Great tutorial, I have a few Atmega4809 in a box, waiting to play. They use the same UPDI interface, have you tried the same toolchain and Microchip tools with this MCU?
Best regards,
Javier.Javier Cano, 21 days ago
Great tutorial, and I like the idea of baremetal programing. Thank you for sharing! I decided to design a variant board that would be easier for me to handsolder and be friendly with my FTDI cables. I posted the design files and BOM on github profile DCelectronics, in the repository ATtiny406_Board. I hope more people get interested in developing with AT406 and contribute to the open source community.DCelectronics, 20 days ago
I'd buy a board, any chance you'll be selling?graeme, 4 days ago | https://www.omzlo.com/articles/baremetal-programming-on-the-tinyavr-0-micro-controllers | CC-MAIN-2020-45 | refinedweb | 1,753 | 64.61 |
Compiling Java *.class Files with javac
Last modified: May 7, 2019
1. Overview
This tutorial will introduce the javac tool and describes how to use it to compile Java source files into class files.
We’ll get started with a short description of the javac command, then examine the tool in more depth by looking at its various options.
2. The javac Command
We can specify options and source files when executing the javac tool:
javac [options] [source-files]
Where [options] denotes the options controlling operations of the tool, and [source-files] indicates one or more source files to be compiled.
All options are indeed entirely optional. Source files can be directly specified as arguments to the javac command or kept in a referenced argument file as described later. Notice that source files should be arranged in a directory hierarchy corresponding to the fully qualified names of the types they contain.
Options of javac are categorized into three groups: standard, cross-compilation, and extra. In this article, we’ll focus on the standard and extra options.
The cross-compilation options are used for the less common use case of compiling type definitions against a JVM implementation different from the compiler’s environment and won’t be addressed.
3. Type Definition
Let’s start by introducing the class we’re going to use to demonstrate the javac options:
public class Data { List<String> textList = new ArrayList(); public void addText(String text) { textList.add(text); } public List getTextList() { return this.textList; } }
The source code is placed in the file com/baeldung/javac/Data.java.
Note that we use *nix file separators in this article; on Windows machines, we must use the backslash (‘\’) instead of the forward slash (‘/’).
4. Standard Options
One of the most commonly used standard options of the javac command is -d, specifying the destination directory for generated class files. If a type isn’t part of the default package, a directory structure reflecting the package’s name is created to keep the class file of that type.
Let’s execute the following command in the directory containing the structure provided in the previous section:
javac -d javac-target com/baeldung/javac/Data.java
The javac compiler will generate the class file javac-target/com/baeldung/javac/Data.class. Note that on some systems, javac doesn’t automatically create the target directory, which is javac-target in this case. Therefore, we may need to do so manually.
Here are a couple of other frequently used options:
- -cp (or -classpath, –class-path) – specifies where types required to compile our source files can be found. If this option is missing and the CLASSPATH environment variable isn’t set, the current working directory is used instead (as was the case in the example above).
- -p (or –module-path) – indicates the location of necessary application modules. This option is only applicable to Java 9 and above – please refer to this tutorial for a guide to the Java 9 module system.
If we want to know what’s going on during a compilation process, e.g. which classes are loaded and which are compiled, we can apply the -verbose option.
The last standard option we’ll cover is the argument file. Instead of passing arguments directly to the javac tool, we can store them in argument files. The names of those files, prefixed with the ‘@‘ character, are then used as command arguments.
When the javac command encounters an argument starting with ‘@‘, it interprets the following characters as the path to a file and expands the file’s content into an argument list. Spaces and newline characters can be used to separate arguments included in such an argument file.
Let’s assume we have two files, named options, and types, in the javac-args directory with the following content:
The options file:
-d javac-target -verbose
The types file:
com/baeldung/javac/Data.java
We can compile the Data type like before with detail messages printed on the console by executing this command:
javac @javac-args/options @javac-args/types
Rather than keeping arguments in separate files, we can also store them all in a single file.
Suppose there is a file named arguments in the javac-args directory:
-d javac-target -verbose com/baeldung/javac/Data.java
Let’s feed this file to javac to achieve the same result as with the two separate files before:
javac @javac-args/arguments
Notice the options we’ve gone through in this section are the most common ones only. For a complete list of standard javac options, check out this reference.
5. Extra Options
Extra options of javac are non-standard options, which are specific to the current compiler implementation and may be changed in the future. As such, we won’t go over these options in detail.
However, there is an option that’s very useful and worth mentioning, -Xlint. For a full description of the other javac extra options, follow this link.
The -Xlint option allows us to enable warnings during compilation. There are two ways to specify this option on the command line:
- -Xlint – triggers all recommended warnings
- -Xlint:key[,key]* – enables specific warnings
Here are some of the handiest -Xlint keys:
- rawtypes – warns about the use of raw types
- unchecked – warns about unchecked operations
- static – warns about the access to a static member from an instance member
- cast – warns about unnecessary casts
- serial – warns about serializable classes not having a serialversionUID
- fallthrough – warns about the falling through in a switch statement
Now, create a file named xlint-ops in the javac-args directory with the following content:
-d javac-target -Xlint:rawtypes,unchecked com/baeldung/javac/Data.java
When running this command:
javac @javac-args/xlint-ops
we should see the rawtypes and unchecked warnings:
com/baeldung/javac/Data.java:7: warning: [rawtypes] found raw type: ArrayList List<String> textList = new ArrayList(); ^ missing type arguments for generic class ArrayList<E> where E is a type-variable: E extends Object declared in class ArrayList com/baeldung/javac/Data.java:7: warning: [unchecked] unchecked conversion List<String> textList = new ArrayList(); ^ required: List<String> found: ArrayList ...
6. Conclusion
This tutorial walked through the javac tool, showing how to use options to manage the typical compilation process.
In reality, we usually compile a program using an IDE or a build tool rather than directly relying on javac. However, a solid understanding of this tool will allow us to customize the compilation in advanced use cases.
As always, the source code for this tutorial can be found over on GitHub.
It’s always good to know how to use the basic tools themselves instead of entirely depending on the IDE.
Definitely 🙂 | https://www.baeldung.com/javac | CC-MAIN-2019-22 | refinedweb | 1,112 | 50.87 |
Actually console for results. You will probably see this type of console on running this application.
This means that your service has been installed in the emulator. Check the apps installed. You will probably see your application.
Now we are going to create this SMS receiver application.
Create a new project and copy this code to the java file created.
package pack.coderzheaven; import android.content.BroadcastReceiver; import android.content.Context; import android.content.Intent; import android.os.Bundle; import android.telephony.gsm.SmsMessage; import android.widget.Toast; @SuppressWarnings("deprecation") public class SMS_Receiver extends BroadcastReceiver { @Override public void onReceive(Context context, Intent intent) { Bundle bundle = intent.getExtras(); Object messages[] = (Object[]) bundle.get("pdus"); SmsMessage SMS[] = new SmsMessage[messages.length]; for (int n = 0; n < messages.length; n++) { SMS[n] = SmsMessage.createFromPdu((byte[]) messages[n]); } /* GETTING THE LAST JUST ARRIVED MESSAGE FROM INBOX */ Toast toast = Toast.makeText(context,"Received SMS inside SMS_Receiver : " + SMS[0].getMessageBody(), Toast.LENGTH_LONG); toast.show(); } }
In the above class you can see that “SMS_Receiver” extends the BroadcastReceiver class.So this class has to implement the onReceive method inorder to receive broadcast events. The intent is get using
Bundle bundle = intent.getExtras();
After that an array is created for all the SMS and here I am showing only the last SMS received by the intent using a toast. How to simulate an SMS to your emulator is explained in here and another method here
No XML file for layout is used here.
AndroidManifest.xml file.
Note that every receiver should be registered in the manifest file in order to receive intents using the receiver tag. Take a look at this code.
<=".SMS_Receiver" android: <intent-filter> <action android: </intent-filter> </receiver> </application> </manifest>
After sending the SMS mentioned in one of the methods after running this application, quickly switch to the emulator to see the output, because I am using a toast to display the message, So it will come and go and you may not see.
Sending SMS using emulator control.
Please leave your comments if you found this post useful.
Pingback: Listening incoming sms message in Android | Coderz Heaven
Hello..Thanks for your detail guidance …But i also want to view the sender’s number in the Toast along with the Sms Body.So please can you help me how to view it please…
I appreciate you guidance as early as possible..
Hi Ishwari..
Did you check this post here | https://www.coderzheaven.com/2011/04/20/how-to-get-the-sms-sent-to-your-emulator-within-your-application-or-get-notified-when-an-sms-arrives-to-your-phone/ | CC-MAIN-2021-43 | refinedweb | 403 | 52.26 |
In article <17342817.1052002018@[10.0.1.2]>, David Eppstein eppstein@ics.uci.edu wrote:
On the other hand, if you really want to find the n best items in a data stream large enough that you care about using only space O(n), it might also be preferable to take constant amortized time per item rather than the O(log n) that heapq would use, and it's not very difficult nor does it require any fancy data structures. Some time back I needed some Java code for this, haven't had an excuse to port it to Python. In case anyone's interested, it's online at.
BTW, the central idea here is to use a random quicksort pivot to shrink the list, when it grows too large.
In python, this could be done without randomization as simply as
def addToNBest(L,x,N): L.append(x) if len(L) > 2*N: L.sort() del L[N:]
It's not constant amortized time due to the sort, but that's probably more than made up for due to the speed of compiled sort versus interpreted randomized pivot. | https://mail.python.org/archives/list/python-dev@python.org/message/AI42ASWEMKLOAZPV5FONNXLU6KUCGWOO/ | CC-MAIN-2021-21 | refinedweb | 189 | 78.38 |
GETFSSTAT(2) BSD Programmer's Manual GETFSSTAT(2)
getfsstat - get list of all mounted file systems
#include <sys/param.h> #include <sys/mount.h> int getfsstat(struct statfs *buf, size_t bufsize, int flags);
getfsstat() returns information about all mounted file systems. buf is a pointer to an array of statfs(2) structures */ }; The buffer is filled with an array of statfs structures, one for each mounted file system up to the size specified by bufsize. If buf is NULL, getfsstat() returns just the number of mounted file sys- tems. Normally flags should be specified as MNT_WAIT. If flags is set to MNT_NOWAIT, getfsstat() will return the information it has available without requesting an update from each file system. Thus, some of the(). | http://mirbsd.mirsolutions.de/htman/sparc/man2/getfsstat.htm | crawl-003 | refinedweb | 122 | 65.62 |
fdopen - associate a stream with a file descriptor
#include <stdio.h> FILE *fdopen(int fildes, const char *mode);
The fdopen() function associates do not cause truncation of the file.
Additional values for the mode argument may be supported by an implementation.
The mode of the stream must be allowed by the file access mode of the open file. The file position indicator associated with the new stream is set to the position indicated by the file offset associated with the file descriptor..
The fdopen() function will preserve the offset maximum previously set for the open file description corresponding to fildes.
Upon successful completion, fdopen() returns a pointer to a stream. Otherwise, a null pointer is returned and errno is.
None.
fclose(), fopen(), open(), <stdio.h>, Standard I/O Streans.
Derived from Issue 1 of the SVID. | http://pubs.opengroup.org/onlinepubs/007908775/xsh/fdopen.html | CC-MAIN-2014-15 | refinedweb | 136 | 59.3 |
How do I return an object's name?
return an object c#
javascript return object literal
return object python
return object javascript es6
javascript function return object undefined
javascript object
javascript return new object in map
I'm pretty new to Java so I don't know if my question make any sense in the first place. But I will try to describe it as best as I can.
How do I return the name of an object? So I made a class called
Player and made the following object:
Player John = new Player(); System.out.println(John);
How do I make it so that it prints/returns the word "John" instead of anything else? I would appreciate any help, thanks a lot!
In your example you are not actually setting the name of the player to John you are creating an object called John.
To fix this declare a field inside your
Player class:
public class Player { String name; public Player(String name) { this.name = name; } public String getName() { return name; } public void setName(String name) { this.name = name; } }
Now you can create as many players as you want and name them:
Player player = new Player("John");
When you want to get a player's name, just call the
getName() function.
When you want to set a player's name, just call the
setName() method.
To print the players name on the console use this:
System.out.println(player.getName());
Or you can override the
toString() method of
Player to offer a textual representation of the object, in this case only a player's name:
@Override public String toString() { return "Player[name=" + name + "]"; }
Then, you can use:
System.out.println(player); // toString() is called if player != null
How to return an object literal from a JavaScript constructor, When doing so, you return an object literal that has added value. Everyone knows that creating a JavaScript object literal is as simple as: var foo = {}. No problem� In C#, a method can return any type of data including objects. In other words, methods are allowed to return objects without any compile time error. Explanation: In the above example, we have a class named as Example. Example class contains setdata () method which is used to set the value of str, and Display () method is used to display the value of str, and Astr () is used to add the value of passed object in current object and adding the sum in another object.
Have a instance variable which holds the name property and populate it at the time of object instantiation. Override "toString()" method to display the name -
@Override Public String toString(){ return name; } Player John = new Player(); System.out.println(John);
Passing and Returning Objects in Java, Passing and Returning Objects in Java � While creating a variable of a class type, we only create a reference to an object. � This effectively means� How to return an object from a function in Python? Python Server Side Programming Programming. The return statement makes a python function to exit and hand back a value to its caller. The objective of functions in general is to take in inputs and return something. A return statement, once executed, immediately halts execution of a function, even if it is not the last statement in the function.
First off, you should create a constructor for the class to accept a string to set the name of the player in the class.
You can then override the toString() method so the string representation of the class displays the name of the player or you can make a getter method to retrieve the name of the player.
Example:
public class Player { private String name; public Player(String name) { this.name = name; } @Override public String toString() { return name; } public String getName() { return name; } public void setName(String name) { this.name = name; } }
You can use it as such:
public class App { public static void main(String[] args) { // Using constructor to set name of the player Player john = new Player("John"); // You can then print the name of the player by printing the object // directly or by calling its getter method System.out.println(john); // prints "John" System.out.println(john.getName()); // also prints "John" } }
C#, C# | Method returning an object. 05-12-2018. In C#, a method can return any type of data including objects. In other words, methods are allowed to return objects� It says to make the function makeGamePlayer return an object with three keys. //First, the object creator function makeGamePlayer(name,totalScore,gamesPlayed) { //should return an object with three keys: // name // totalScore // gamesPlayed } I'm not sure if i should be doing this
How to “return an object” in C++?, Memory is only allocated when an object is created and not when a class is defined. An object can be returned by a function using the return� How to return an object from the function? In C++ programming, object can be returned from a function in a similar way as structures. Example 2: Pass and Return Object from the Function In this program, the sum of complex numbers (object) is returned to the main () function and displayed.
C++ Tutorial: Object Returning - 2020, C++ Tutorial: Object Returning, When a function, either a member function or a standalone function, returns an object, we have choices. The function could�.
How to return object from function in JavaScript?, In JavaScript, a function can return nothing, by just using empty return statement. But without using even the statement, the function returns� If a method or function returns an object of a class for which there is no public copy constructor, such as ostream class, it must return a reference to an object. Some methods and functions, such as the overloaded assignment operator, can return either an object or a reference to an object. The reference is preferred for reasons of efficiency.
- Possible duplicate of Java Reflection: How to get the name of a variable?
- Possible duplicate of How do I print the variable name holding an object?
- Possible duplicate of Java—how can I dynamically reference an object's property? | https://thetopsites.net/article/55308249.shtml | CC-MAIN-2021-25 | refinedweb | 1,015 | 61.36 |
Bulletin Daily Paper 10/03/2011
The Bulletin Daily print edition for monday, October 3, 2011
Pedaling in autumn Top fall rides in the Central Oregon area � SPORTS, D1 � October 3, 2011 75� Livestock feed, from a trailer GREEN, ETC., C1 MONDAY WEATHER TODAY Cloudy, scattered showers High 64, Low 38 Page B6 Serving Central Oregon since 1903 Eight's enough The small-team game thrives in Gilchrist SPORTS, D1 Off-road conflict ... and a BLM answer? New area will ease tension, feds say; neighbors not so sure Future of Baker cement kiln may rest on D.C. vote By Andrew Clevenger The Bulletin Smokejumper � and record holder � takes one last leap By William Yardley New York Times News Service Andy Tullis / The Bulletin WINTHROP, Wash. -- Kristy Longanecker smiled while her husband fell from the clear blue sky. "He got to live his dream," said U.S. Forest Service. Friday was his last day on the job, and his was not just another retirement. Longanecker has spent 38 years as one of the most elite of his kind, a smokejumper.. See Jumper / A5 Ambers Thornburgh, 72, fixes a cut fence that goes around his land and BLM land near Eagle Crest Resort last week. Thornburgh believes ATV riders cut the fence, and he has become increasingly frustrated as this continues to happen. "I've got other things to do besides rebuild fence behind these people," the rancher says. By Dylan J. Darling The Bulletin Fences that Ambers Thornburgh mended this spring were busted again as fall started in Central Oregon. Likely snipped by bolt cutters, the fence's barbed wire sags alongside a dirt trail etched by motorcycles and all-terrain vehicles through the sagebrush and juniper around Cline Buttes north of Bend. Nearby riders knocked down a gate to roll onto Thornburgh's land. Thornburgh, a 72-year-old rancher, said dealing with the reoccurring damage is tiresome. "I've got other things to do besides rebuild fence behind these people," Thornburgh said. Federal officials say the Bureau of Land Management's new Cline Buttes Recreation Area, with its designated trails and staging area, should remedy the problem. But Thornburgh and neighbor Sage Dorsey, 54, whose land is also close to the buttes, aren't so sure. "We'll believe it when we see it," Dorsey said. Proposed Cline Buttes Recreation Area plan Buc k hor nR d. Goodrich Rd. 126 Holmes Rd. WASHINGTON -- This week, the House of Representatives will vote on two measures that could set aside the Environmental Protection Agency's pollution standards and drastically alter the way the Clean Air Act is enforced. For one cement plant in Eastern Oregon, the legislation could mean the difference between staying in business and closing, costing Baker County its largest taxpayer. Five years ago, Kansasbased Ash Grove Cement Co.'s Durkee plant released more than 2,500 pounds of mercury into the air each year, more than any other cement kiln in the country. In 2008, the state of Oregon and the kiln's owners struck an agreement requiring the installation of advanced pollution devices capable of cutting mercury emissions by at least 75 percent. To that end, say Ash Grove officials, the company has spent $20 million on so-called active carbon injection technology. But last year, the EPA issued a new rule, set to go into effect in September 2013, that would require the Durkee plant to reduce its mercury emissions even more, by as much as 98 percent. Proponents of the EPA's standards say the health and economic benefits far outweigh the burden that complying places on businesses. The new legislation, the EPA Regulatory Relief Act and the Cement Sector Regulatory Relief Act, would postpone the implementation of the new standards by more than three years. See Cement / A5 IN CONGRESS Fryrear Rd. 126 Eagle Crest Resort Cline Buttes A U.S.-backed geothermal plant struggles By Eric Lipton and Clifford Krauss New York Times News Service End of the `free-for-all' Within a triangle of highways connecting Bend, Sisters and Redmond, the public land around Cline Buttes has been a magnet for people looking to drive off-road since the 1960s, said Matt Able, an off-highway vehicle specialist with the U.S. Forest Service who has been involved with the design of the recreation area. "At this point there are no designated trails," Able said. "It's been a free-for-all." By June 2013, that should come to an end, he said. Construction of a staging area -- with a parking lot, restrooms and an information kiosk -- is set to start at the end of October. Off-highway vehicle trail building will follow and continue through the winter. In all, the trail system, which will also have separate hiking, horseback riding and mountain biking trails, will have 100 miles of trails for OHVs. Able said that will squelch the enticement for people to drive over the open range and onto private property. "If you build a good-quality trail system, most people are going to stay on that trail system," he said. See Off-road / A4 eF alls Hw y. To Sisters Bar rR d. 20 To Bend Terrebonne Sisters 126 Redmond 20 Proposed roads and trails Motorized off-highway vehicles,including quads and motorcycles Motorcycles only Mountain bikes Shared use Hiking trails Horse trails Source: Bureau of Land Management Correction In a story headlined "Internet caps enter wider U.S. debate," which appeared Monday, Sept. 26, on Page A1, the last name of Mark Hobbs was misspelled. The Bulletin regrets the error. 97 Tumalo Bend Greg Cross / The Bulletin In a remote desert spot in northern Nevada, there is a geothermal plant run by a politically connected clean energy startup drained Nevada Geothermal's reserves, its own auditor concluded in a filing released last week that there was "significant doubt about the company's ability to continue as a going concern." See Energy / A4 We use recycled newsprint The Bulletin An Independent Newspaper INDEX Abby Calendar Classified C2 C3 E1-4 Comics C4-5 Green, Etc. C1-6 Horoscope Local C5 B1-6 Movies Obituaries Oregon C3 B5 B3 Sports TV listings Weather D1-6 C2 B6 Crosswords C5,E2 Editorial B4 Clin TOP NEWS INSIDE AFGHANISTAN: Raiding Haqqani byways, Page A3 PERRY: Offensive name sparks criticism, Page A3 U|xaIICGHy02329lz[ Vol. 108, No. 276, 28 pages, 5 sections MON-SAT A2 Monday, October 3, 2011 � THE BULLETIN The Bulletin How to reach us STOP, START OR MISS YOUR PAPER? F / Technology MONDAY TUESDAY WEDNESDAY THURSDAY FRIDAY Technology Consumer Environment Education Science 541-385-5800 Phone hours: 5:30 a.m.- 5 p.m. Mon.-Fri., 6:30 a.m.-noon Sat.-Sun. GENERAL INFORMATION 541-382-1811 NEWSROOM AFTER HOURS AND WEEKENDS 541-383-0367 541-385-5804 ONLINE NEWSROOM FAX E-MAIL Expert warns of Facebook risks for students By Scott Travis McClatchy-Tribune News Service: Photos by Michael Nagle / New York Times News Service An editorial meeting at Mashable, the news site about social media and digital culture, at its offices in New York. In June 2009, Mashable's Web traffic surpassed that of TechCrunch, making it the most popular technology blog. Social media news site mashes its way online By Jennifer Preston New York Times News Service according to Google Analytics. Fine Arts/Features. NEW YORK -- Pete Cashmore admitted Cashmore, the soft-spoken chief executive of Mashable, the one-man blog he turned into a popular news site about social media and digital culture, appeared totally at ease during the lively conversation. And within half an hour, an important measure of success was achieved. Cashmore, whose company worked with the U.N.," Cashmore said. "It shows how we can steer the conversation to help the world. We are a very new brand, and I think that this adds a great deal of legitimacy to our cause." Can it succeed? Mashable's prospects for greater success and growth, however, are unclear, given the ever-changing digital media landscape. To help increase its audience and create new opportunities for advertising revenue, Cashmore expanded Mashable's coverage last month, adding new sections for entertainment and U.S. and world news. He also hired Lance Ulanoff, 47, the former editor of PCMag.com and senior vice president of content for Ziff Davis websites, to oversee news coverage. By hiring a veteran journalist,," Kramer of Paid Content said. John Borthwick, chief executive of Betaworks, a company that both invests in and works Pete Cashmore, chief executive of Mashable, started the blog as a one-man operation when he was 19. when its Web traffic surpassed that of TechCrunch, according to Compete and Quantcast, two social media measurement firms. As portals like Yahoo scramble to hold onto an audience that is becoming less drawn to generalinterest. Mashable, which is privately held, now generates enough revenue from display advertising, custom programs with marketers, event sponsorships and conferences to support an operation of about 40 employees, most of them working from new offices on Park Avenue South. Cashmore would not disclose revenue or operational expenses but said the site did not rely on private investors for financing. The company has financed its expansion, he said, by steadily increasing revenue and carefully managing expenses. Cashmore said there were 17 million unique visitors last month, closely with Internet start-ups in New York, praised Cashmore for expanding content beyond technology because of the appeal to advertisers. He also endorsed the decision to proceed without outside investors. "It has not held him back," he said. "As an entrepreneur, you maintain control of your own destiny." For advertisers looking to reach a socially influential audience, Mashable is a good fit, said Ian Schafer, chief executive of Deep Focus, a digital advertising agency. "For reach, and from an authority standpoint, they own the audience," Schafer said. But he acknowledged that expanding the site would be harder than starting it. "It is no longer just about the quality of their audience, it is about the size now," he said, adding that it was difficult to "grow very quickly and maintain quality." Cashmore acknowledged the challenge but said he was struck by something Wiesel had said about the importance of waiting, a concept that seems to be disappearing, he said, during this time of rapid change. "Waiting has value," he said. "And some things change and then there are things that stay the same." FORT LAUDERDALE, Fla. -- The popularity of smartphones and social networking sites is keeping a growing number of people connected -- to danger, deception and a loss of academic or career opportunities. Many, said Sameer Hinduja, the codirectorold in Orlando, Fla., texted a nude photo of his 17-yearold girlfriend -- and ended up on Florida's sex offender list. A job applicant at a Miami Shores university ranted online about having to take a typing test, and lost the chance for the position. And a 13-year-old Hillsborough. � Weight Loss & Weight Management � Nutritional Counseling � Hormone Balancing � Age Management SOLAR & RADIANT HEATING SYSTEMS 856 NW Bond � Downtown Bend � 541-330-5999 541-389-7365 CCB# 18669 AGEWISEMD.COM 541.678.5150 Sick & Tired of Feeling Sick & Tired? Join us for a FREE Health Awareness Seminar Tuesday, October 4th 5:30pm - 6:30pm We will be addressing the following: � Brain Fog � Fatigue � Chronic Pain � Inability to Sleep � Difficulty Losing Weight � Restless Legs � GI/Stomach Issues Frustrated that your symptoms still persist even though you medicate appropriately? TO SUBSCRIBE Home delivery and E-Edition: One month, $11 Print only: $10.50 Company's roots For Tues. Oct. 4th may change your #552520,. Natural Health Solutions Presented by Tim Lind, D.C., Chiropractic Physician. Seating is limited, so please call to reserve yours today! Dr. Tim Lind D.C. Tuesday, Oct. 4th, 5:30pm - 6:30pm 541-389-3072 � doclind.com To reserve your seat NOW call 541-389-3072 THE BULLETIN � Monday, October 3, 2011 A3 T S In debt talk, a divide on what tax breaks should stay By Ron Nixon and Eric Lichtblau New York Times News Service GOP CAMPAIGN Candidate Christie could upend race By Kasie Hunt The Associated Press WASHINGTON --. Sen. John Kerry, D-Mass., says he too wants to eliminate such breaks, except when it comes to beer. He is one of the main supporters of a proposal that would cut taxes for small beer makers like the Samuel Adams Brewery in Boston. And Rep. Paul 71,000-page tax code has become loaded with dozens of obscure but economically valuable tax breaks. NASCAR racetrack operators can speed up the writeoffs. Whether any of them are scrubbed from the books may ultimately prove how serious Congress is about reducing the debt, and how adept powerful lobbies are at guarding their benefits, political analysts and tax experts say. One of the few members of Congress willing to talk about specific breaks that could be abolished is Sen. Tom Coburn, R-Okla. He released a 626-page report in June that included a section on what he considered to be dozens of needless tax breaks that were "little more than corporate welfare," like vacation home deductions and special deals for the makers of fishing tackle boxes. He also ridiculed a bevy of loose guidelines that have allowed business deductions for cat food and toupees, as well as breast implants for exotic dancers. In contrast, President Barack Obama has focused on a handful of tax breaks that are considered symbolically powerful, including credits for oil production and an accelerated depreciation for corporate jets. Tyler Hicks / New York Times News Service U.S. Army Sgt. Gregory Brown provides security as more troops land last week in the Charbaran valley, Afghanistan. The operation was aimed at disrupting the Haqqani network, the insurgent group that collaborates with the Taliban and al-Qaida. In dust and danger, raiding the Haqqani By C.J. Chivers New York Times News Service antigovernment groups and to put thousands more Afghan police officers and soldiers into contested areas. The long-term ambition is that Afghan forces will have the troops probably leaked that the skills and resolve to stand up to assault was coming. the insurgency as the Americans As the soldiers climbed the hills pull back. -- laden with body armor and And yet, even while looking be- backpacks heavy with water and yond 2014, U.S. units must fight a ammunition -- they almost imday-to-day war. mediately found signs of the fightOne element lies in trying to ers' presence. prevent more of the carefully At the now-abandoned school, planned attacks that have shaken which the Haqqani and Taliban Kabul, the Afghan capital, sev- fighters had forced to close, the eral times this year. The attacks soldiers were greeted by a taunt-- striking prominent targets, ing note written in white chalk from the capital's premier hotel above the main entrance. to the U.S. Embassy -- have often "Taliban is good," it read, in been organized by the Haqqanis, English. and have highlighted the Afghan The school, the soldiers said, government's vulnerability and was evidence of an earlier setthe insurgents' resiliency. back. According to those who Lt. Col. John Meyer, who com- advanced the counterinsurgency mands the Second doctrine that Battalion of the swept through the 28th Infantry Reg- "When you come American military iment, which used here, that's a big several years ago, two companies building schools to cordon off the problem for us. was supposed Charbaran Val- Because after you to help turn valley and another to leys like this one sweep the villages, leave the Taliban around. called the opera- comes and asks Instead, it was tion "a spoiling atshut down by the tack to prevent a us about you, and same fighters who spectacular attack they take our food overran the govin the Kabul area." center and are not paying ernment the poIt was also intendand chased ed, he said, to gath- for it." lice away. It stands er intelligence. empty -- a marker The Charbaran -- Ghul Mohammad, of good intentions Valley has become Afghan elder, to U.S. gone awry, and of one of the main troops time and resourcroutes for Haqqani es lost before this fighters to enter latest battalion inAfghanistan. They generally herited duties in the province. come in on foot, U.S. officers say, Soon the soldiers climbed a and then, after staying overnight mountain, joining the rest of the in safe houses and tent camps, battalion, to sleep in the relative they work their way toward Kabul safety of a higher ridge. or other areas where they have The next morning, as the sweep been sent to fight. resumed, one elder, Ghul MohamMid-level Haqqani leaders also mad, sat with 1st Lt. Tony Nicosia, meet in the valley's villages, U.S. a U.S. platoon leader, as Afghan officers said, including near an and U.S. soldiers searched the abandoned school and the ruins shops a second time. of a government center that the There was a ritual familiarity to United States built earlier in the their exchange, a product of a war war but that local fighters had de- entering its second decade. stroyed by 2008. "When you come here, that's It was 2010 when the last con- a big problem for us," the elder ventional unit entered the valley. said. "Because after you leave the An infantry company, it landed Taliban comes and asks us about by helicopter and was caught in a you, and they take our food and two-hour gunfight as it left. are not paying for it." When the U.S. and Afghan After the U.S. and Afghan soltroops fanned out this time, their diers reached the opposite slope, mission faced a familiar law of the guerrillas managed their only guerrilla war: When conventional attack: They fired four mortar forces arrive in force, guerrillas rounds from outside the cordon. often disperse, setting aside weapThe rounds exploded well beons to watch the soldiers pass by. hind the soldiers, near the abanThe operation was also prob- doned school, causing no harm ably no surprise to the Haqqani but making clear that Charbaran, fighters in the valley, U.S. officers which had fallen almost silent as said, because during the days of the company moved through, repreparation some of the Afghan mained out of government hands. Snag for Perry: offensive name at Texas property By Amy Gardner The Washington Post struggles." Civil rights activist Al Sharpton called for Perry to explain more fully his relationship to the property or bow out of the presidential race. Local Service. Local Knowledge. 541-848-4444 1000 SW Disk Dr. � Bend � EQUAL HOUSING LENDER Redmond School of Dance NOW ENROLLING Classes in Ballet, Jazz, Hip Hop, Tap, Liturgical and Boy's Break Dance 2332 S. Hwy 97, Redmond 541-548-6957 70 Years of Hearing Excellence Call 541-389-9690 30% OFF WALLPAPER SALE! NOW THROUGH OCTOBER 31, 2011! *30% Off suggested retail prices on select wall coverings NEW LOCATION: 7 SE GLENWOOD DR. 41 Off of 9th Street (across from south side of Bend High) Winterize & Shrink Wrap Lowe Boats Alumaweld Boats Boat Consignment Merc | Honda | BRP Evinrude | Johnson | Volvo Don't Replace ... Reface and save thousands! Call today for a free consultation! 541-385-7791 Always stirring up something good. OPEN: 7:30 TO 5:30 MONDAY - FRIDAY � 8:00 TO 3:00 SATURDAY 541-382-4171 � 2121 NE Division � Bend | 541-548-7707 � 641 NW Fir � Redmond 541-647-8261 5% Off Winter Service when you mention this ad A4 Monday, October 3, 2011 � THE BULLETIN C OV ER S T OR I ES Wall Street protesters in for long haul By Verena Dobnik The Associated PressoyerSims John Minchillo / The Associated Press Volunteers prepare donated food Sunday for participants of the Occupy Wall Street protest in Manhattan's financial district. The demonstration started out small, with fewer than a dozen college students, but has grown to include thousands of people in communities across the country. heard chanting, "Take the bridge." Floods recede slowly in battered Philippines The Associated Press CALUMPIT, Philippines -- Floodwaters slowly receded early today Philippines days apart last week. Typhoon Nalgae killed at least three people Saturday. It was headed. Off-road Continued from A1 `Lack of respect' Given the history of free-roaming riding around Cline Buttes, Thornburgh and Dorsey are skeptical about whether the trail system will change the disregard some OHV drivers show toward private property. Like Thornburgh, Dorsey said he regularly has to mend his fences and pick up gates, even ones marked with signs declaring private property and signaling no trespassing. "It's a lack of respect," Dorsey said. "You don't just break things down because they are in your way." Thornburgh and Dorsey said that for the plan to keep people on the trails, there will have to be an increase in law enforcement. Able said there will be more patrols by rangers and Deschutes County Sheriff's deputies at the recreation area. "So there will be somebody watching," he said. To make it easier for landowners like Thornburgh and Dorsey to report OHV riders they find on their property, Virginia-based Responsible Trails America is leading a nationwide effort to require registration numbers be displayed on OHVs. Like license plate numbers on cars, the OHV numbers would be large enough for people to see from a distance and report, said Randy Rasmussen, Western states organizer for Responsible Trails America in Corvallis. He said the registration numbers would help eliminate the "rogue element" that would go off trail, and possibly onto private property, after the trail system is established. Staying on the trails Whether the plan works remains to be seen, said Jim Karn, a Bend man who volunteers with the Central Oregon Trail Alliance. "I don't think it will stop people immediately, and it may never stop people -- but it is far and away the best solution," he said. "If you don't do something it will just continue." While he's mostly been involved with the design of new mountain bike trails at Cline Buttes, Karn said he also rides an off-highway motorcycle. Agreeing with Able, Karn said he thinks the trails will curb the OHV problems. "Those will be more fun to ride on than just driving overland randomly," he said. He is sure Cline Buttes will draw more people coming there to recreate, be it on an OHV, mountain bike, horse or foot. Not only is the recreation area close to Bend, Sisters and Redmond, it also stays clear of snow much of the winter. The mix of public and private land around the buttes is flat rangeland, Karn said, more open to exploration by OHVs than woods or lush valley lowlands. "There are no natural boundaries here," Dorsey said. But there are fences. Dylan J. Darling can be reached at 541-617-7812 or at ddarling@bendbulletin.com. Energy Continued from A1 Fairbank, the chief executive, who like other company executives works out of Vancouver, British Columbia, where Nevada Geothermal Power has corporate offices. "We're doing OK." Sen.," Reid said in a statement in April 2010, after he visited the company's Nevada plant. That was two months before the project even got conditional approval for the Energy Department loan guarantee. During the tour, Reid. Just last month, again with Reid's support, Ormat secured its own Energy Department loan guarantee, worth $350 million, to help support three other Nevada geothermal projects that are expected to produce 113 megawatts of power. Reid has received some support from the industry, in the form of at least $43,000 worth of campaign contributions from the geothermal industry since 2009, according to an analysis of federal campaign finance records. Adam Jentleson, a spokesman for Reid, said that the senator was proud of his work as an advocate for geothermal power and a broad array of other clean energy projects in his state. But," Jentleson said. An Obama administration official also pointed out that the Nevada Geothermal project won the enthusiastic support of prominent Republicans in the state, and of the Bush administration. execu- tives, Whale, an engineer and research analyst at Cormark Securities, wrote a report last week on Nevada Geothermal warning that "looming default overshadows financial results." "If there is not sufficient cash flow to service that debt, then the loan guarantee will be invoked," Whale said.," Fairbank said. "But it does not mean we are not going to be here two years from now." ALWAYS STIRRING UP SOMETHING GOOD Serving Central Oregon Since 1975 70 Years of Hearing Excellence Call 541-389-9690 7:30 AM - 5:30 PM MON-FRI 8 AM - 3 PM SAT. Bob Schumacher 541.280.9147 541-382-4171 541-548-7707 2121 NE Division Bend 641 NW Fir Redmond Put Life Back in Your Life Living Well with Ongoing Health Issues Workshops begin October 5: October 5 - November 9 9:30 am - noon Sisters (Please call for class locations) Living Well serves the communities of Deschutes, Crook and Jefferson counties (541) 322-7430 C OV ER S T OR I ES THE BULLETIN � Monday, October 3, 2011 A5 "When I was growing up, there was the mill, the fish hatchery and other stuff like that. And I remember going, `I think I want to smoke jump,'" says Dale Longanecker, 57, whose 896 jumps -- 362 of which were into fires -- are a record that may never be broken, the Forest Service says. Matthew Ryan Williams New York Times News Service Yemeni jet bombs army post, killing 30 The Associated Press S ouster in Yemen's chapter of the Arab Spring, raising questions about whether the bombing might have been intentional. Yemen's' government and the renegade military units both consider Yemen's al-Qaida branch an enemy. The president's political opponents, however, accuse him of allowing the Islamic militants to seize control of several towns in southern Yemen earlier this year in a bid to spark fears in the West that without him in power, al-Qaida would take over. The airstrike, which took place on Saturday evening in Abyan province, targeted an abandoned school used as a shelter by soldiers of the army's 119th Brigade who were battling the al-Qaida fighters, military and medical officials said. The brigade is thought to have received significant support from the U.S. military to enable it to fight the militants in the south more effectively. Jumper Continued from A1, `I, Cement Continued from A1 "It's important to give some better thought to these rules and their impact," said Rep. Greg Walden, R-Hood River, who has co-sponsored both bills. "I just think (the EPA is) pushing too far at the wrong time." The Durkee plant's problems stem largely from the local limestone it uses to make cement, which is abnormally high in naturally occurring mercury. As a result, says Walden, it's harder for the Durkee plant to meet the EPA's emissions standards than it is for other plants. "What I'm being told is that they're using the best technology in the world and achieving the best (emission) levels they can given the ore that they work with," he said. "It seems to me that we can find a better balance than EPA is trying to establish here." Under the Clean Air Act, the EPA has the authority to create a special subcategory with different emission standards for plants like the one in Durkee, but it has not done so. If the Durkee plant is forced to close because it can't meet the EPA standards, then those jobs are likely lost to China, which produces 10 times as much cement as the U.S., says Walden, in whose district the Durkee plant operates. And much of the pollution created in China ends up in the U.S., particularly in West Coast states like Oregon, he said. the best control technology in the world, which we have," he said. Benefits of the Clean Air Act Opponents of the new legislation under consideration maintain it guts the Clean Air Act. The bills might as well be called the Mercury Poisoning Acts, John Walke, the Natural Resources Defense Council's clean air director, told members of the House Energy & Power Subcommittee in September. "(They) weaken the Clean Air Act drastically to authorize the indefinite delay of toxic air pollution standards for incinerators, industrial boilers and cement plants. Worse, these bills rewrite the Clean Air Act and overturn multiple federal court decisions to eviscerate strong toxic air pollution standards that under current law must be applied to control dangerous mercury, lead, dioxins and acid gases from these facilities," he said. The EPA estimates that the overall health benefits of the Clean Air Act prevented 160,000 premature deaths in 2010 and expects that number to grow to 230,000 by 2020. Additionally, the Clean Air Act helped avert 130,000 heart attacks, 13 million lost workdays and 1.7 million asthma attacks, the EPA claims. The EPA also argues that the Clean Air Act's economic benefits far outweigh the spending required to comply. By 2020, the economic benefits, largely attributable to additional productivity associated with better health and fewer deaths, will approach $2 trillion, while the costs will be $65 billion. A recent study by the Economic Policy Institute claims the cumulative compliance costs of all the EPA rules implemented or proposed during the Obama administration amounts to between .11 and .15 percent of the economy. "(T)he evidence to date is clear: The hue and cry over the effect of EPA regulations on the economy is a counterproductive distraction," wrote the study's author, Isaac Shapiro. "The lopsided attention to this topic is making it harder for the nation and Congress to focus on the changes in policies that could actually significantly improve the employment situation." Walden said he was familiar with the EPA's suggested economic and health benefits, but that they don't tell the full story. "In a perfect world, you'd have no emissions anywhere, and you'd have perfect health. But we don't live in a perfect world," he said. "The reality is, you push too far, you won't have any economic (or health) benefits, because nobody's going to install the upgrades ... so we lose the jobs and we don't necessarily improve the air quality." moun- tains, `Wow,. Technology reduces harmful emissions The Durkee facility is a little more than 27 miles southeast of the Baker County seat, Baker City. In a county with a population of 16,000, Ash Grove employs just over 100 people, and more than six times as many jobs are associated with the plant, according to Walden. Mercury emissions are frequently associated with coalburning power plants, but cement plants can also be major contributors. According to state figures, the Durkee plant has released at least 1,485 pounds of mercury into the atmosphere every year since 2002 except last year, peaking at 2,582 pounds in 2006. By 2010, it had reduced its emissions to 879 pounds. When the mercury particles settle, they frequently end up in water sources, and in fish as the compound methylmercury. Exposure to methylmercury is particularly dangerous for young children and pregnant women, and has been linked to birth defects, brain damage, reduced IQ, and difficulty with reading, writing and learning. There is currently a fish consumption advisory for the Snake River and the Brownlee Reservoir due to moderate mercury levels, according to the Oregon Health Authority's website. Since its state-of-the-art technology went online in July 2010, said Curtis Lesslie, Ash Grove's vice president of environmental affairs, the Durkee plant's emissions have been cut by 90 percent. In fashioning the Clean Air Act, Congress considered that different source materials will have different levels of naturally occurring elements like mercury, he said. "We believe that that means that where there are obvious differences, then EPA should utilize subcategorization," he said. That issue, along with others, is being litigated, with a hearing scheduled in federal court in Washington later this month. "We think the standard should be achievable when you apply Nominated for an environmental award Earlier this week, Walden and the rest of Oregon's congressional delegation wrote to the EPA to nominate Ash Grove for an EPA Clean Air Excellence Award for its efforts at the Durkee site, saying the company's commitment to proactively reduce its mercury emissions three years ahead of the proposed EPA rule is commendable. "This type of action by Ash Grove and their ultimate success in making meaningful reductions is a model that others should emulate," the letter states. "Ash Grove's willingness to step up and address mercury emissions at its plant is vital to the social, economic and environmental welfare of our constituents." Winners will be announced in the spring of 2012. Andrew Clevenger can be reached at 202-662-7456 or at aclevenger@bendbulletin.com. A6 Monday, October 3, 2011 � THE BULLETIN Call Now to Schedule Your Appointment Hurry, Offers End 10/5/11 Offer expires 10/12/11. 10/12/11. Bend River Promenade 3188 N Hwy. 97, Suite 118 Next door to Sears (541) 389-3381 LOW PAYMENTS AVAILABLE! 10/12/11. THE BULLETIN � MONDAY, OCTOBER 3, 2011 L Inside OREGON Medical marijuana finding its way onto black market, see Page B3. Teachers union backs Avakian for Wu's seat, see Page B3. B WASHINGTON Hop farmers get creative in face of USDA rules, see Page B6. JEFFERSON COUNTY SCHOOL DISTRICT IN BRIEF Rain to cool off Central Oregon Rain clouds are expected to gather over Central Oregon early this week, possibly dripping sprinkles today and Tuesday before bursting Wednesday, said Ann Adams, an assistant forecaster with the National Weather Service office in Pendleton. While not a winter storm and only likely to drop snow at the highest points along the crest of the Cascades, Adams said the influx of rain will lower temperatures throughout the week. "It's definitely going to cool things down," Adams said. Today and Tuesday should have highs near 65 degrees, according to the National Weather Service. Wednesday and Thursday, the high temperature should dip close to 55. While the storm system is expected to peak in Bend midweek, Adams said, rain may fall early in the week. Today, there is a 40 percent chance of rain, increasing to a 50 percent chance Tuesday, she said. Tuesday night, rain becomes likely, and Wednesday, there's an 80 percent chance, "which is pretty definite that it is going to happen," Adams said. Along with the rain, the storm system should bring low temperatures in the high 30s to Central Oregon, according to the weather service. A break in the clouds is expected Friday, when it should be partly sunny. Saturday should be mostly sunny, with a high near 66 degrees. -- Bulletin staff report LILY RAFF McCAULOU Building a farm from the ground up ine years ago, Jerre Kosta and Sean Dodson moved from Lake Oswego to Central Oregon to care for their aging parents. Today, they're local pioneers of sustainable farming. One evening in 2002, they came back to their rented home east of Prineville and sipped beers on the deck as the sun set over Barnes Butte. Ducks landed on a neighbor's pond. It was beautiful. Peaceful. And land just beyond the pond happened to be for sale. Kosta, an archaeologist, and Dodson, an engineer, bought the 10-acre plot and planned to use it as a base camp for fishing and relaxation. Instead, someone from Crook County called and said that a tax deferral for the property was set to expire unless the couple agreed to work the land. They looked at each other. They looked outside their window. Dodson's mother was battling cancer, and the couple was seeking healthy foods for her. Suddenly, farming made sense. To convert 10 acres of High Desert into a viable farm, the scientists read stacks of books and journals. They turned to three rock stars of sustainable farming: Joel Salatin, whose holistic Virginia farm was profiled in the book "The Omnivore's Dilemma" and the movie "Food, Inc.;" Allan Savory, whose practice of restoring grasslands through grazing has been imported from Africa; and Bill Mollison, who designed year-round farms that mimic natural ecosystems. Kosta says she and Dodson founded Dancing Cow Farm on the belief that healthy foods begin with healthy soil. "We're meat-eaters who are also concerned about the land," she explains. Whether on the farm itself or on leased land, the couple starts by planting a mix of grasses, legumes, forbs and flowers for their animals to graze. This provides a balanced meal that spans a longer growing season than just one plant species would. Unlike a monotonous field of hay, which could sap a particular nutrient, diversity protects the soil. And flowers attract bees to help pollinate nearby native plants. Today, the couple owns about 100 Irish Dexter cattle -- a small, old breed that's increasingly rare. The animals are so docile that the owners don't bother removing their horns as most ranchers would. "It's one less stressor on the animals," Kosta says. They stopped castrating bulls, too. Bulls have leaner, more flavorful meat than steers, which attracts a niche market. Bulls are butchered by 24 months, before a natural surge in testosterone would make them more aggressive. They're slaughtered at Prineville's Butcher Boys, just a few miles away. Sometimes, cattle graze together with Jacob sheep, raised for lamb meat. A "flerd," or mixed-species herd, is an old farming technique that raised some eyebrows among conservative Crook County ranchers. After these animals graze, the couple brings in chickens and turkeys, also raised for meat. The birds spread the manure to fertilize the field. And they control pests such as flies. The goal is to leave the field healthier than it was before the grazing cycle. Dancing Cow Farm also raises eggs, vegetables and herbs. Most goods are sold directly to consumers, though a few restaurants buy them, too. Much of the meat is sold before the animals are butchered and customers are invited to visit the farm and meet their future meals. After nine years in agriculture, the couple says they still have a lot to learn. Dodson is returning to his old job to help cover the bills. Meanwhile, other farmers and ranchers in the region are hiring the couple as consultants. Kosta and Dodson have found themselves at the local forefront of a growing movement that extends way beyond organic. "What used to be crazy," Dodson says, "is getting to be more mainstream." Lily Raff McCaulou can be reached at 541-617-7836 or lraff@bendbulletin.com. Double-dose program more than doubles yearly progress scores By Duffie Taylor The Bulletin N MADRAS -- Jefferson County high school students are showing that an extra reading or math class can make all the difference when it comes to passing state tests. A year ago, the Jefferson County School District implemented a program that requires students who fail to meet state benchmarks in either reading or math take an extra course instead of their scheduled elective. Today, administrators say they are seeing big results. About half of Madras High School's 782 students participate in the double-dose program, which is funded by a $3.7 million federal stimulus grant until 2013, said Nick Kezele, an instructional coach who oversees the program at the high school. `Great things are happening' Kezele has already seen its positive effects on student performance. "Great things are happening at Madras High School," Kezele said. "The results have been pretty dramatic." If you want proof, Kezele said, just take a look at the numbers. The number of students meeting state benchmarks in math rose from 26 percent in 2008 to 56 percent in the 2010-11 school year. Test score improvements in reading are even more pronounced. The latest state tests showed 74 percent of students scoring at or above the Adequate Yearly Progress standards set by the No Child Left Behind law. That score is nearly triple that of 2008, when 26 percent of students met or exceeded standards. But Kezele said the program's success goes beyond data. He hears students talking to each other about their test scores as he passes through the hallway. See Progress / B2 Sunriver observatory: Donated telescopes in need of housing More local briefing on Page B2. Oregon wildfires The following fires were burning in the mapped area below as of 9:56 a.m. Friday. For updates, go to firemap.aspx. DOLLAR LAKE FIRE Andy Tullis / The Bulletin Holly May, 40, left, of Portland, looks at details of the sun through a telescope while her friend Crystal Peterson, 37, also of Portland, gazes skyward during the Autumn Astronomy Festival on Sunday morning at the Sunriver Nature Center & Observatory. � Acres: 6,304 � Containment: 90 percent � Threatened structures: None � Cause: Lightning SHADOW LAKE FIRE � Acres: 10,000 � Containment: 40 percent � Threatened structures: None � Cause: Lightning Looking to the heavens By Dylan J. Darling The Bulletin MOTHER LODE FIRE � Acres: 2,661 � Containment: 10 percent � Threatened structures: 1 � Cause: Lightning SUNRIVER -- Over the last four months, the Sunriver Nature Center & Observatory added two large telescopes to its arsenal, but they weren't yet out for display Sunday at the Autumn Astronomy Festival. Before observatory visitors can start scanning the cosmos with the new telescopes, the observatory has to resolve a terrestrial matter -- building a permanent home for them, said manager Bob Grossfeld. The sizes of the telescopes -- 20 and 30 inches -- make them too big to squeeze into the existing building that houses the observatory's other telescopes. The observatory's signature dome was built in 1990 and, Grossfeld said, the adjacent "Starport" with a motor-driven retractable roof was completed in 1999. Now the observatory is trying to raise $35,000 to $40,000 to build two 8by-16-foot wood and steel buildings for the new telescopes, both of which were donated to the observatory, Grossfeld said. The buildings would be on metal Observatory fundraising and open house event The Sunriver Nature Center & Observatory is trying to raise $35,000 to $40,000 to cover the construction costs of buildings for new telescopes. To donate, call 541-598-4406 or visit donations. An open house is planned for 8 to 10 p.m. Sunday at the observatory, which is located at 57245 River Road in Sunriver. tracks so observatory workers could move them from over the stationary telescopes, revealing the entire night sky. "It basically gives us a bigger window to look at deep sky objects like galaxies," Grossfeld said. Grossfeld said he is hopeful that the buildings and the telescopes could be in place by June. Along a bike path amid Sunriver's vacation homes, the observatory is a popular stop for families. About 40 people visited Sunday, peering through filtered telescopes at the sun during the Autumn Astronomy Festival. Before letting people press their eyes to the telescopes' viewers, Jeannie Webb, an astronomer at the observatory, explained some rules. Number one? Don't look at the sun without the filters on the telescopes. "The sun really is bad for your eyes," she said. Through the filtered telescopes, though, it's a treat, said Holly May, 40, of Portland. May could see what looked like massive flames on the sun's surface, which Webb explained were electrical storms called prominences by astronomers. "You could also see clouds moving," May said. The solar telescopes are available for viewing from 10 a.m. to 2 p.m. on Saturdays through Oct. 22 as part of a visit to the nature center, Grossfeld said. Admittance to the nature center and observatory is $4 for adults and $3 for children ages 12 and younger. See Observatory / B2 WASCO LAKE FIRE � Acres: 200 � Containment: 70 percent � Threatened structures: 0 � Cause: Human Hood River Dollar Lake Fire Mother Lode Fire Wasco Lake Fire Pendleton Mitchell John Day Sisters Prineville Bend Madras Shadow Lake Fire La Pine Burns MILES 0 Andy Zeigert / The Bulletin 50 Well sh t! YOUR PHOTOS We're taking Well, shoot! -- The Bulletin's photo-taking workshop -- in a new direction. So far, we've let our photographers do most of the talking (and the shooting). Now it's all you. Can you work a camera and capture a great photo? And can you tell us a little bit about it? Start e-mailing your own photos to readerphotos@bendbulletin.com and we'll pick the best for publication inside this section. Include as much detail as possible -- when and where you took it, and any special technique used -- as well as your name, hometown and phone number. In the meantime, through the end of the year, continue reading our professional tips every other Tuesday in the Local section -- and keep sending us your stuff! (No doctored photos, please!) B2 Monday, October 3, 2011 � THE BULLETIN C OV ER S T OR I ES L State police identify man killed in crash B were arrested Friday on suspicion of burglary, theft and criminal mischief, according to a Bend Police Department news release. They're suspected of breaking into a home at 1054 N.W. Harmon Blvd. sometime between 2 p.m. Wednesday and 9:15 a.m. Friday. Both men were being held Sunday at the Deschutes County jail, and Ward's bail was set at $35,000, according to the jail's website. Unverzagt was being held without bail on a parole violation. According to the release, surveillance video from the 7-Eleven on Northwest Galveston Avenue -- about four blocks from the house -- showed Ward shoplifting the wine before the burglary. A Bend police officer pulled Ward over Friday for a traffic violation and recognized him and Unverzagt as suspects in the burglary. Along with stealing a television and other electronics, the burglars allegedly vandalized the home by spraying areas with a fire extinguisher. Progress Continued from B1 He said that's unusual, especially for a school that has been ranked with the 18 lowest-achieving schools on state test scores. "It's becoming part of the culture here. Students realize the extra class or classes are helping them and it does make a difference." "In reading, we've seen the highest growth results," said Jefferson County School District Superintendent Rick Molitor. "This is something for us to look at and celebrate." Molitor said academic growth hasn't been confined to the high school. Reading test score improvement also has been noted among the district's youngest students. At the start of last school year, 21 percent of kindergarten students at Madras Primary scored at grade level in reading. By year's end, that number had quadrupled to 84 percent. "Our focus is districtwide improvement," Molitor said. "And we have seen academic Compiled from Bulletin staff reports The Oregon State Police on Sunday released the name of a Warm Springs man killed Saturday in a crash involving a pickup and a semi-truck on U.S. Highway 26 about four miles northwest of Madras. According to Lt. Gregg Hastings of the state police, William James Trimble, 43, was riding in the passenger seat of a 2002 Ford pickup -- driven by Anthony Blueback, 19, of Warm Springs -- along Northwest Fir Lane when Blueback failed to stop at a stop sign at the Highway 26 intersection and smashed into the right side of a Freightliner driven by Charles McConaha, 55, of Auburn, Wash. Blueback was flown by helicopter to St. Charles Bend. He was listed in fair condition Sunday. David Brian LeClaire, 23, and Apaullo LeClaire, 3, both of Warm Springs, were also in the pickup truck and were taken to Mountain View Hospital in Madras with non-life-threatening injuries, Hastings said. Apaullo LeClaire was not in a child's car seat, but was wearing a seat belt. It's unclear whether the others in the pickup were wearing seat belts. McConaha was not injured in the crash. State police troopers closed both lanes of Highway 26 for five hours while they investigated the wreck. growth at every single level." Jefferson County has yet to meet the state's benchmark for districts, which requires that 70 percent of students in the district meet or exceed AYP standards in every subcategory, Molitor said. But that doesn't diminish what students, teachers and administrators have accomplished. "We started out at a more challenging level. And we've set the stage for many years for this kind of growth to occur. We're not lowering the ceiling. We're rising to meet it," Molitor said. Kezele said administrators are engaged in a systemic effort to lay the groundwork so that fewer students will need to take extra courses by the time they reach high school. "These problems didn't begin when they walked in as freshmen," he said. "We want the work we're doing now on all levels to mean that fewer students will require the program in the future. That's our hope." Duffie Taylor can be reached at 541-383-0376 or at dtaylor@bendbulletin.com. West Salem activist accused of bribery The Associated Press SALEM -- A West Salem community activist is accused of bribing public officials to reject a financial report at a Polk Soil and Water Conservation District meeting. E.M. Easterly was due in court today on five counts of bribing board members stemming from the comments he made March 8 at the public meeting, the Statesman Journal reported. He is active in community groups that include the West Salem Neighborhood Association, Glenn-Gibson Creeks Watershed Council and West Salem Redevelopment Advisory Board. Easterly claimed he was making a point when offered money to board members to reject the report, which he took issue with. "I have $600 right here in front of me. I am willing to offer and give to board members who are prepared to sign a pledge," he said, according to a transcript from the meeting. His pledge had said the report would not be approved until it was verified. He told a special prosecutor in the case in August that his actions should not have been interpreted as an attempt to bribe. "The money I displayed was not a bribe; it was an effort to highlight board member obligations ... to verify before approving all district financial documents," Easterly wrote to Yamhill County District Attorney Brad Berry. "I made no request to `vote no'; my offer was to incentivize board member financial report verification before publicly accepting any Treasurer's Report." He called his actions an "attention-getting effort." Lost Prineville hunter found in Ochoco forest A Prineville man spent the night in the woods over the weekend after becoming lost late Saturday. A hunting companion found Eldon Simpson, 54, walking on a road in the Ochoco National Forest near Crystal Springs at 6:30 a.m. Sunday, according to a news release from the Crook County Sheriff's Office. Simpson's hunting group reported him missing at 9:30 p.m. Saturday after he didn't return to camp. Search and rescue crews drove roads near the camp Saturday night and started a ground search early Sunday. Simpson was uninjured and did not require medical treatment. Observatory Attempted baby seller to be freed The Associated Press VANCOUVER, Wash. -- A woman who tried to sell her newborn son at a Taco Bell restaurant in southwest Washington will be free from jail soon. Under an agreement with Clark County prosecutors, 36year-old Heidi Knowles pleaded guilty on Thursday to reckless endangerment and was sentenced to 77 days in jail by a county judge. The Columbian reports that Knowles has already served 77 days in jail, and will be released this week. According to court documents, prosecutors say Knowles approached a woman in the restaurant on July 14, handed her 1-year-old baby and offered to sell him for between $500 and $5,000. The woman declined and called 911. Child Protective Services took the baby and later placed him with a relative. Court hearings on the child's custody are pending. Wine bottle leads to Bend burglary suspects An empty wine bottle left behind by burglars in a northwest Bend home led police to their suspects. Christopher Ward, 23, and Ryan Unverzagt, 33, both of Bend, Continued from B1 The observatory also has evening star programs from 8 to 10 p.m. on Wednesdays and Saturdays through Oct. 22, he said. The cost of the programs -- which include lessons about the stars -- is $6 for adults and $4 for children ages 12 and younger. Grossfeld said the observatory has free events like the Autumn Astronomy Festival about once a month, except during the winter. There's Hospice Home Health Hospice House Transitions an open house set for 8 to 10 p.m. on Sunday, during which visitors will have the chance to look through the new 20-inch telescope. "Even if the weather is bad, we will be out there showing off the equipment," Grossfeld said. Dylan J. Darling can be reached at 541-617-7812 or at ddarling@bendbulletin.com. Lincoln declares date for Thanksgiving in 1863 The Associated Press Today threerun homer off the Brooklyn Dodgers' Ralph Branca in the "shot heard 'round to be." "The Maltese Falcon" -- the version starring Humphrey Bogart and directed by John Huston -- opened in New York. In 1961, "The Dick Van Dyke Show," also starring Mary Tyler 541.382.5882 T O D AY IN HISTORY Moore, made its debut on CBS. In 1981, Irish nationalists at the Maze Prison near Belfast, Northern Ireland, ended seven months of hunger strikes that had claimed 10 Mather and Georgelli- van (No Doubt) is 42. Pop singer Kevin Richardson is 40. Rock (Hinder) is 29. Actress-singer Ashlee Simpson-Wentz is 27. THOUGHT FOR TODAY "Life has got a habit of not standing hitched. You got to ride it like you find it. You got to change with it." -- Woody Guthrie, American folk singersongwriter (1912-67) Little ad BIG savings! Advanced Technology 25% to 40% OFF MSRP � FREE Video Ear Exam � FREE Hearing Test � FREE Hearing Aid Demonstration We bill insurances � Wor kers compensation 0% financing (with approved credit) Michael & Denise Underwood Serving Central Oregon for over 22 years 541-389-9690 141 SE 3rd Street � Bend (Corner of 3rd & Davis) Put Life Back in Your Life Living Well with Ongoing Health Issues Workshops begin October 8: Bend Workshop Times (please call for class locations) October 8 - November 12, 10:00 am - 12:30pm (Saturdays) Living Well serves the communities of Deschutes, Crook and Jefferson counties (541) 322-7430 THE BULLETIN � Monday, October 3, 2011 B3 O Teachers back Avakian in November special election By Jonathan J. Cooper The Associated Press PORTLAND -- The political action committee for Oregon's largest teachers union voted Saturday to back Labor Commissioner Brad Avakian in the Democratic primary to replace former congressman David Wu. The decision by the Oregon Education Association spurned state Sen. Suzanne Bonamici and state Rep. Brad Witt, the other main Democrats running in the Nov. 8 special election.. It was too soon to say what type of support the OEA will give Avakian, Service Employees International Union and the American Federation of State, County and Municipal Employers both decided to sit out the primary. THE SEARCH FOR MEDICINE AND THE WAR ON DRUGS Jeff Barnard / The Associated Press Medical marijuana grower James Anderson looks over the remains of a Gold Hill garden that held hundreds of pot plants before federal agents pulled them out and hauled them away. Anderson said he and others growing on the property were within the limits of the Oregon Medical Marijuana Plan, but that the U.S. Drug Enforcement Agency took the plants anyway. Medical marijuana reaching black market; DEA raids farms By Jeff Barnard The Associated Press Oregon's top federal law enforcement official says medical marijuana from Oregon is regularly sold in other states. U.S. Attorney Dwight Holton told The Associated Press on Friday that Texas, Arkansas, Florida, Tennessee, Idaho and Missouri are among the states where Oregon medical marijuana growers are illegally selling their crops. "We hear from patients when I'm on radio call-in shows," Holton said. "Inevitably, we get a call in saying, `I can't find marijuana.' If cardholders can't find marijuana, we've got to figure out where it is going, and there is a ton of it growing in the state. The answer is we know where it is going." Lori Duckworth of Southern Oregon NORML said medical marijuana advocates are eager to work with federal authorities to stop illegal sales, which can jeopardize supplies that should be going to patients. "Until cannabis prohibition ends and we get some kind of regulation system in this country as a whole, we cannot stop the criminals, we can't stop the black market," she said. "Patients are not criminals. But patients are being punished for the actions of a few bad seeds." Shipping all over U.S. Holton said an informal list of medical marijuana seizures in the past year kept by prosecutors showed 50 pounds going to Texas, 43 pounds going to Florida, 75 pounds going to the East Coast, and 120 pounds going to Arkansas. "I think what is new about this, or different about what we have seen so far -- not this particular case -- is the excess amount of marijuana that must go someplace -- especially when we've got cardholders saying they can't get marijuana," Holton said. Holton said he could not speak specifically about a U.S. Drug Enforcement Administration raid this week in Gold Hill, where hundreds of plants were seized from people who said they were within state medical marijuana limits. But federal efforts aimed at medical marijuana were targeting large traffickers, not individual patients. Holton said they have no hard criteria for deciding when to bust a medical marijuana garden, but added that medical marijuana advocates are among their newest allies in combatting illegal sales. "They understand this threatens something they care about," he said. "We are glad to have their help." He acknowledged that there is a conflict with federal laws prohibiting any possession of marijuana and state law allowing medical use, but noted that federal law trumps state law, and he is sworn to uphold the law. "I am not a crusader on this -- not remotely," he said. "We have many other fish to fry. We devote limited resources to it. We try to target cases that are the most egregious." B Britt Festival head leaving position MEDFORD -- The head of what's billed as the Northwest's oldest music festival is moving on to another job. Jim Fredericks has been the executive director of the Britt Festival for less than two years. In that time he's been credited with stabilizing its finances and boosting attendance and contributions. The Mail Tribune reports that Fredericks hasn't said what his new job will be. The Britt Festival celebrates its 50th anniversary next year. County Sheriff's deputies say there's no sign of foul play after the body of a 63-year-old man was recovered from the Willamette River. Emergency personnel pulled the body of Marvin Leonard Studer out of the water Saturday afternoon just south of the Buena Vista Ferry landing, south of Independence. Family members said they last saw Studer on Sept. 9 at his home near the Willamette, and that he frequently spent time along the river. The cause of death remains under investigation. County as 53-year-old Anna Emerikov of Gervais. The Sheriff's Office says the incident occurred about 2 a.m. Saturday on Union Pacific railroad tracks one mile north of Gervais, which is near Salem. Deputies say the woman was pronounced dead at the scene. The train's conductor and engineer told authorities they were traveling at 46 mph when they saw something lying on the tracks ahead of them. They said people in the area commonly leave garbage bags on the tracks, but they realized when the train got closer that the object was a person. The train took almost a mile to stop, and the operators were unable to avoid hitting the woman. -- From wire reports bendbulletin.com/boocoo b Body pulled from Willamette River INDEPENDENCE -- Polk Woman killed by train near Salem GERVAIS -- Authorities have identified a woman who was fatally struck by a train in Marion B4 Monday, October 3, 2011 � THE BULLETIN E We might need a new approach to college dilemma The Bulletin AN INDEPENDENT NEWSPAPER BETSY MCCOOL GORDON BLACK JOHN COSTA RICHARD COE Chairwoman Publisher Editor-in-chief Editor of Editorials A new report by Complete College America says way too many students are starting college and not finishing. Using information submitted by 33 states, including Oregon, researchers determined that 4 in 10 public college students Even for full-time students, the gap is large. In Oregon, for example, the study shows that for every 34 students who enroll full-time in a two-year public college, only 13 earn a degree. At four-year public colleges, for every 45 who enroll, only 29 graduate. The report urges significant changes in our approach to college, including: � Better tracking of students so policy is based on understanding what happens to all students. � Cutting the time it takes to earn a degree by using block schedules, more online resources and simplifying registration, among other things. � Changing the way remediation is offered by embedding it in mainstream courses. � Restructuring programs to face the fact that many students have busy lives, including work and families. The report focuses on the notion that more students need to earn a post-secondary degree. For Oregon, it cites statistics that by 2020, 67 percent of jobs will require a career certificate or college degree, while only 36 percent of Oregon adults currently hold an associate degree or higher, leaving a 31 percent skills gap. We agree fully on one thing: It's a terrible waste for so many students to start college and not gain a degree. They are likely left with disappointment, debt and no improved job to help pay off that debt. But it is surely an oversimplification to say the solution is to change college so all can graduate. Note that in the example of the skills gap cited above, 67 percent of jobs will require a career certificate or college degree. A career certificate and a college degree are vastly different, but this notion lumps them together under the college banner. And the notion that remediation should be embedded in mainstream courses would certainly diminish the level at which those courses are taught, thus diminishing the learning for all the students and diminishing the meaning of the degree that results. This is an important study, and if its numbers are accurate, it correctly concludes that what we are doing is a failure for many students and a waste of taxpayer investment. The correct solution, though, might be far different from what these researchers propose. Let's reexamine the notion that nearly everyone should go to college, and look instead at providing the most effective and appropriate secondary and post-secondary education. attend only part-time, and only one-quarter of them graduate. Dogs useful in protecting stock By Carroll F. Asbell hey're here! Those two simple words may announce that the losing battle that started in Yellowstone Park and advanced across five Western States has now visited Paulina. The exact words attributed to rancher Ray Sessler in the spring issue of Prineville Territory magazine are: "I saw a wolf out here on Powell Mountain in November. And there was one with a collar on it and Oregon Department of Fish and Wildlife tracked it to Camp Creek. They're here. Take a look at what's happening in Eastern Oregon." Wolves are sustaining, prolific carnivores that have threatened man's livestock for thousands of years, and this threat has been addressed by different means in different parts of the world for just as long. The wolf predation solution lies in looking at the successful stockman who lives with this predator now and has for centuries. His solution is the use of a familiar tool, the stock dog. Preposterous, you say? Yes, if you only classify a "stock dog" by the homegrown loyal dog you own and love. Border collies, heelers and the shepherd are all wonderful dogs that are neither bred, trained nor equipped to protect your stock from even a small wolf, let alone a 100-pound alpha male. So you say, what stock dog? Consider a breed of dogs whose name means, "Kills wolves." The breed has many names: Central Asian sheepdog, Credneasiatskaya Ovcharka, Central Asian Ovcharka, Alabay, Alabai, Volkodav, Turkmen Alabai, Central Asian Shepherd. Shepherds commonly identify these dogs as "Buribosar," which, in translation means, "Kills wolves." T IN MY VIEW Where wolves or bear stock losses are a centuries-old problem, just consider what large predators are capable of killing: possibly 10 or more valuable domestic animals in a single night. The subsistence stockmen located in the underbelly of Europe and Asia cannot tolerate these existence-threatening losses and take aggressive action with result-proven stock dogs. The main purpose of their dogs is and was the protection of livestock from wolves. That's where the "kill wolves" is derived from. Dogs of huge mass, strong muscles, a crushing bite and 140 pounds of fighting skills that were developed over three centuries of inbred instinct and unbelievable endurance are the primary traits evident in these wolfkilling stock dogs. Despite their great fighting skill, their love, tolerance, attachment to children and a quiet independent character are reputed to be exceptional. The plan? Simple. From the air or the ground, go scout where the wolves are denned up or traveling. Locate the sites with GPS and go run your big stock dogs against predators. As stock dogs are instinct hunters and very protective of their territories, they may just tackle a wolf or two. Wolves use different fighting tactics from domestic dogs and will usually engage in a running fight except when they are protecting a den. In a standing fight against "Buribosar," wolves face fierce visceral inbred dedication, a bone-rendering bite and fighting methods that match or exceed the wolves' abilities. Can you be charged with a crime because you lack the absolute control over two historic Thanks, Senator Durbin he revenge of the banks has arrived. Banks are rolling out new monthly debit card fees of from $3 to $5. The person you could write to thank is Sen. Dick Durbin, R-Ill. In the wake of TARP, when taxpayers were compelled to spend $564 billion to bail out the financial geniuses that nearly shattered the world's financial system, Congress wanted changes. It came up with legislation to fix the financial world. Durbin got an amendment approved targeting what are called interchange fees or swipe fees. Those are the fees retailers pay when a consumer uses a debit card to make a transaction. There's isn't much question that the amount charged was not perfectly aligned with the cost of providing the service. On average, interchange fees were about 44 cents. Durbin said the actual cost of providing the service was about 10 cents. His amendment said the Federal Reserve should set a limit on the fee. T The Fed set the limit at 24 cents. It just went into effect. Durbin argued this was not government price fixing. Setting a limit sure looks like price fixing. And what did Durbin think would happen? Retailers would lower their prices? We haven't noticed that happening. Banks didn't just eat the loss in revenue, either. Consumers will pay more for using debit cards. Consumers may feel pushed toward credit cards, which can charge high interest rates. Now that banks have raised their fees, is Congress going to set off another circus by investigating the monthly debit fee increases and requiring limits for those? Or is it only when retailers complain about fees that Congress acts? If anything, Durbin's amendment seems to have helped retailers at the expense of consumers. Some fix. adversaries: the wolf and the dog? Are you restricted from owning a stock dog? Do stock management methods preclude the use of dogs? Not according to the Sheriff of Wallowa County when I posed these hypothetical questions to him more than a year ago. One caution you might consider: These breeds can be found in kennels in metropolitan centers and are sold as guard dogs. The dog you are looking for might be purchased from a more reliable source. Send your agent deep into the mountain belt of Europe or Asia and find a diminutive, evil-smelling, sheepskin-clad shepherd who has dogs in residence that tear the tires off the vehicle or savage the four-legged transportation of your buyer in an attempt to dismember the interloper seeking to buy their offspring. One other thing to think about: When the emotion-driven crowd learns that elk calves can be chased into a fence line and won't jump or crawl under the fence, thus being easy pickings for wolves, your stock fences will be outlawed and you will be shock collaring your cattle, horses and sheep to keep them inside the shock wire enclosure. If you can't afford this stock restraint -- just sell out to the "people are the problem" element and join the loggers in the unemployment line. Farfetched? Maybe. Let's hear some cogent, unemotional arguments from officials or proponents of wolf advancement. Please, just the facts and the stated law bolstering your arguments against the implementation of this proposal. In the alternative, you might consider consigning the elected officials supporting our irrational wolf program "to the wolves" by your vote. Carroll F. Asbell lives in Prineville. Many prisoners remain trapped in the limbo of Guantanamo Bay By Joseph Margulies For The Los Angeles Times he v. Bush, the first Guantanamo case in the Su- T preme funda- mental?" Joseph Margulies is a lawyer with the MacArthur Justice Center and a law professor at Northwestern University. He is the author of "Guantanamo and the Abuse of Presidential Power," and is working on a book about the effect of Sept. 11 on national identity. He wrote this for the Los Angeles Times. THE BULLETIN � Monday, October 3, 2011 B5 O FORMER ARCHBISHOP PHILIP HANNAN D N Richard Clyde Perdue, of Redmond Oct. 21, 1930 - Sept. 24, 2011 Arrangements: Redmond Memorial Chapel 541-548-3219 om Services: Funeral Service: Saturday, October 8, 2011, noon viewing, service 1:00pm at LDS, 6630 Abba Ave, Klamath Falls. Burial to follow at Mt. Laki Cemetery. Contributions may be made to: Catholic consul to JFK dies By Dennis Hevesi New York Times News Service VFW Post 1383, Klamath Falls, Oregon. Retired Archbishop Philip Hannan, a confidant to President John F. Kennedy and the leader of the Roman Catholic Archdiocese of New Orleans for more than 20 years, died Thursday at a hospice in New Orleans. The archbishop, who delivered the eulogy for Kennedy in 1963, was 98. The archdiocese confirmed his death, saying he had been in declining health for several years. It was in the late 1940s when the archbishop, Father Hannan at the time, met Kennedy, then a young Democratic congressman from Massachusetts. A priest had come to Kennedy's office, unannounced, insisting that as a Catholic the congressman had to defend the church in Mexico against opponents in the Mexican government. Kennedy was irate -- until a colleague put him in touch with Hannan, who was then an assistant chancellor in the Archdiocese of Washington. Hannan assured Kennedy that the priest had violated protocol by directly approaching a member of Congress, and he promised to speak to the priest. That was the start of a long friendship. "When Kennedy had a question about how politics and church teaching intersected, he would give Father Hannan a call," said Peter Finney Jr., editor of The Clarion Herald, the New Orleans archdiocese's newspaper. The issues they touched on included race relations and tensions between faith and constitutional mandates. A degree of secrecy was a must. "For it to be known that Kennedy was consulting at all with a Catholic bishop would have been politically harmful," Finney said. Reggae pioneer Leonard Dillon dies By Rob Kenner New York Times News Service The Associated Press ile photo Former Archbishop Philip Hannan celebrates his 90th birthday in New Orleans, La., in March 2003. Hannan, who gave the eulogy for President John F. Kennedy and later served more than three decades as the head of the New Orleans Roman Catholic Archdiocese, died Thursday. He was 98. The eulogy was essentially a reprise of the president's favorite verses from scripture and excerpts from his inaugural speech. "He decided to do that because he thought Kennedy's words were so uplifting that there was little that he could improve upon," Finney said. On June 8, 1968, three days after the assassination of the president's brother, Sen. Robert F. Kennedy, Hannan presided over his burial at Arlington National Cemetery. And 26 years later, he returned to Arlington to lead prayers for Jacqueline Kennedy Onassis, who had died of cancer. In 1964, he officiated at the reburial of two Kennedy infants at Arlington so that their remains could be near those of their father. It was with a blend of social activism and conservatism that he presided over the Archdiocese of New Orleans from 1965 to 1988. In 1965, as the Second Vatican Council was modernizing the church, he unsuccessfully pushed for a change in church policy in support of nuclear armament by Western powers because, as the petition he wrote said, it "has preserved freedom for a very large portion of the world." Philip Matthew Hannan was born in Washington on May 20, 1913, one of eight children of Patrick and Lillian Hannan. His father was a plumber. The future archbishop earned a licentiate in theology from the Gregorian University in Rome and a doctorate in canon law from Catholic University of America before being ordained in 1939. In 1942, he enlisted to become an Army chaplain and was assigned to the 505th Parachute Regiment of the 82nd Airborne Division. In 1945, he helped liberate a concentration camp at Wobbelin, Germany. Hannan is survived by his brother, Jerry. On Saturday, he received absolution for whatever sins he had committed in life from the current archbishop, Gregory Aymond. "Sounds good to me," he told Aymond. Social activism In New Orleans, where public swimming pools were not open to African-Americans, he integrated the pool at the archdiocese's Notre Dame Seminary. He also established after-school programs for children of all faiths at neighborhood centers throughout the archdiocese. He secured federal support to build nearly 3,000 affordable housing units for seniors and poor people. He created one of the largest food banks for poor people in the country. And he set up a hospice for AIDS patients. JFK's eulogy On Nov. 25, 1963, three days after Kennedy's assassination, at the request of Jacqueline Kennedy, the first lady, Hannan delivered the eulogy at the president's funeral Mass in St. Matthew's Cathedral in Washington. St. Matthew's had been the bishop's boyhood church. Leonard Dillon, an influential Jamaican singer and songwriter who founded the pioneering vocal group the Ethiopians, died Wednesday at his home in Port Antonio, Jamaica. He was 68. The cause was cancer, his daughter Patrice Dillon said. Long before artists like Bob Marley and Peter Tosh made reggae music synonymous with social and spiritual uplift, Dillon had emerged as one of the first Jamaican singers to infuse his songs with Afrocentric themes and sharp-eyed commentary. His body of work mirrored the evolution of Jamaican music, from laid-back mentoflavored folk songs through the horn-driven dance tunes of ska in the 1960s to the smooth rock-steady sound that eventually morphed into the bass-heavy music known as reggae. Dillon joined Stephen Taylor and Aston Morris to form a vocal trio called the Ethiopians in 1966. After Morris left the trio Dillon and Taylor continued as a duo, turning out hits, primarily in the Caribbean during the 1960s, like "Everything Crash," "The Whip" and "Train to Skaville," which also found wide popularity in Britain. After Taylor died in a car accident in 1975, Dillon recorded on his own as the Ethiopian. Leonard Winston Dillon was born on Dec. 9, 1942, in Port Antonio. His mother was a music instructor. In addition to his daughter Patrice, survivors include his wife, Sylvia; six other children, Camille, Tamara, Hyatta, Raymond, Serrano and Lenward; and seven grandchildren. Hispanic leader of East L.A. dies at 75 By Dennis McLellan Los Angeles Times NFL By Frank Litsky Football author Titans offensive coordinator dies Peter Gent dies scrimmage in 16 games. But in 2010, the Titans' offense was ineffective, and the team finished at 6-10. After that season, the Titans fired Jeff Fisher, their head coach for the past 14 seasons. The four candidates for the job included Heimerdinger and Mike Munchak, their offensive line coach for 14 seasons. Munchak got the job, and the next day he fired Heimerdinger, who had been his boss, saying the team needed to go in a new direction. "I am disappointed," Heimerdinger said. "I know it is part of the business." Heimerdinger did not coach again. Before moving to the NFL in 1994, Heimerdinger spent 10 years as a well-traveled college assistant at the University of Florida, the Air Force Academy, North Texas State, California State Fullerton, Rice and Duke. Michael Heimerdinger was born Oct. 13, 1952, in DeKalb, Ill. He earned a bachelor's degree in history from Eastern Illinois University and a master's in administration from Northern Illinois. He played wide receiver at Eastern Illinois, where his roommate and teammate was Mike Shanahan, now the head coach of the Washington Redskins. One day during a college spring practice, Shanahan was hit hard and returned to their room coughing up blood, he recalled in an interview with The Washington Post in 2010. Heimerdinger quickly called for an ambulance, and doctors in the hospital found that one of Shanahan's kidneys had split in two. "He saved my life," Shanahan said. Heimerdinger's survivors include his wife, Kathie; a son, Brian, an intern in the Houston Texans' scouting department; a daughter, Alicia; and his parents. New York Times News Service LOS ANGELES -- Richard Amador Sr., a California-born son of migrant farmworkers who became a nationally recognized expert in community economic development and helped create thousands of jobs for East Los Angeles residents, has died. He was 75. Amador died of esophageal cancer Sept. 19 at his home in the Monterey Park neighborhood of L.A., said his daughter, Cynthia Amador-Diaz. In 1967, Amador founded what became known as CHARO Community Development Corp., a nonprofit community and economic development organization that was headquartered in East L.A. for more than four decades. By the time he retired as president and chief executive in early 2003, CHARO had been listed by Hispanic Business Magazine as one of the top 12 Latino nonprofits in the United States and reportedly was the leading job-placement agency in Los Angel," Mayor Antonio Villaraigosa said in a statement to the Los Angeles Times. Mike Heimerdinger, who coached offensive units for the Denver Broncos, the New York Jets and the Tennessee Titans, helped mold players like Steve McNair, Vince Young and Jay Cutler, and continued to work while undergoing chemotherapy, died Friday while in Mexico to receive experimental cancer treatments. He was 58. The Titans confirmed his death after talking with his family, The Associated Press reported. In November, Heimerdinger learned he had a rare, fast-moving type of cancer that attacked his lymphatic system. He never identified it publicly, saying, "I can't pronounce it." During chemotherapy sessions, he kept coaching and calling plays for the Titans without missing a game, working from the coaches' box rather than the sidelines. "I know people think it's a big deal that I'm going to work," he told The Boston Globe. "I just happen to have a disease, but I'm not dying and I'm not going down the drain and I don't feel special." Heimerdinger was creative with the passing game. He was instrumental in the development of quarterbacks McNair, Young (both in Tennessee) and Cutler (in Denver) and receivers like Derrick Mason (Tennessee) and Rod Smith (Denver). "I didn't know how to run routes," Smith said in 2004. "He showed me how to read defenses. He really instilled in me that I could make it." Smith went on to become a standout receiver for the Broncos, surpassing the 10,000-yard plateau. Heimerdinger was a coach in the National Football League for more than 15 years, sometimes leaving a team and then rejoining it. He coached wide receivers for the Broncos from 1995 to 1999, By Richard Goldstein New York Times News Service The Associated Press ile photo Tennessee Titans offensive coordinator Mike Heimerdinger looks on during the third quarter of an NFL football game against the Houston Texans in Houston in November 2010. Heimerdinger, a veteran assistant in the NFL, died Friday. He was 58. a period when the team won two Super Bowls, and returned to Denver as assistant head coach in 2006-07. In between he was offensive coordinator for the Titans (200004), when the team went to the playoffs three times, and the Jets (2005), who passed him over as a head-coach candidate after Herm Edwards was let go. (Eric Mangini got the job.) He returned to the Titans as offensive coordinator from 2008 to 2010. In 2008, with Kerry Collins as quarterback, the Titans had the best record in the NFL (13-3) and allowed only 12 quarterback sacks. (They were defeated in the divisional playoff round by the Baltimore Ravens.) In 2009, Chris Johnson, their running back, set an NFL record with 2,509 yards gained from Peter Gent, a receiver for the Dallas Cowboys of the 1960s whose best-selling novel "North Dallas Forty" portrayed professional football as a dehumanizing business that drove painracked players to drug and alcohol abuse, died Friday in Bangor, Mich. He was 69. The cause was complications of pulmonary disease, according to the D.L. Miller Funeral Home of Bangor. Gent. "North Dallas Forty" was among the early books providing unsettling views of pro athletics that went beyond the game details on the sports pages. their jobs. Coaches and management were portrayed as callous figures who viewed players as disposable parts and allowed team doctors to shoot them up with painkillers that masked their injuries. `A total lie' Tex Schramm, the Cowboys' president and general manager, was quoted by The Washington Post at the time as calling Gent's portrayals "a total lie" that "indicted the whole NFL and the Dallas Cowboy organization." But in his review for The New York Times, sportswriter Dick Schaap wrote that "Gent builds a strong case against professional football" and "balances shock with humor, irony with warmth, detail with insight, and ends up with a book that easily transcends its subject matter." At 6 feet 4 inches and 205 pounds or so, he was a forwardcenter for Michigan State and was drafted by the Baltimore Bullets of the National Basketball Association in 1964 after averaging 21 points a game as a senior. But he was only a 14thround selection. He tried out instead for the Cowboys, who thought he had good hands. His best year was 1966, when he caught 27 passes for 474 yards, but he was often injured. Gent planned to be an advertising copywriter, but put that career aside with the success of "North Dallas Forty." He wrote several other novels focusing on the football world, and a memoir, "The Last Magic Summer," in which he told of reconnecting with his son, Carter, as both recovered from the emotional toll of his divorce and a custody battle. America's Team Telling of a team he called the North Dallas Bulls, Gent included characters based in part on his wise-cracking teammate and buddy, quarterback Don Meredith, and on coach Tom Landry, who went on to build the Cowboys into the powerhouse known as America's Team. The novel told of players who used recreational drugs and alcohol to cope with physical pain and the emotional toll brought by the fear of losing B6 Monday, October 3, 2011 � THE BULLETIN W E AT H ER Maps and national forecast provided by Weather Central LP �2011. THE BULLETIN WEATHER FORECAST TODAY, OCTOBER 3 Today: Cloudy, scattered showers, cooler, afternoon breezes. Tonight: Mainly cloudy, scattered showers. LOW TUESDAY Cloudy, scattered showers, cooler, afternoon LOW breezes. WEDNESDAY Cloudy, scattered showers, cooler, afternoon LOW breezes. THURSDAY Cloudy, slight chance of showers, cool, afterLOW noon winds. FRIDAY Partly to mostly cloudy and cool. HIGH HIGH Ben Burkel Bob Shaw 64 STATE Western Condon 64/43 38 Yesterday's state extremes � 81� Ontario � 30� Meacham Calgary 72/48 HIGH 62 37 HIGH 56 32 HIGH 58 30 62 32 LOW FORECASTS: LOCAL Government Camp 46/40 NORTHWEST Rain will be likely over western Washington and Oregon today. Vancouver 59/52 BEND ALMANAC SUN AND MOON SCHEDULE Sunrise today . . . . . . 7:05 a.m. Sunset today . . . . . . 6:43 p.m. Sunrise tomorrow . . 7:06 a.m. Sunset tomorrow. . . 6:41 p.m. Moonrise today . . . . 2:18 p.m. Moonset today . . . 11:42 p.m. First Full PLANET WATCH Tomorrow Rise Set Mercury . . . . . .7:29 a.m. . . . . . .6:54 p.m. Venus . . . . . . . .8:15 a.m. . . . . . .7:13 p.m. Mars. . . . . . . . .1:40 a.m. . . . . . .4:23 p.m. Jupiter. . . . . . . .7:43 p.m. . . . . . .9:34 a.m. Saturn. . . . . . . .7:45 a.m. . . . . . .7:08 p.m. Uranus . . . . . . .6:17 p.m. . . . . . .6:27 a.m. TEMPERATURE PRECIPITATION Maupin 70/45 Ruggs 69/41 Moon phases Last New Marion Forks 60/35 Warm Springs 65/43 Willowdale 64/42 Madras 65/41 Mitchell 63/40 Camp Sherman 59/35 Redmond Prineville 64/38 Cascadia 61/39 63/39 Sisters 62/37 Bend Post 64/38 61/36 Cloudy and breezy with rain tapering to showers today. Central Oct. 3 Oct. 11 Oct. 19 Oct. 26 Yesterday's weather through 4 p.m. in Bend High/Low . . . . . . . . . . . . . . . . . . . 68/39 24 hours ending 4 p.m.. . . . . . . . 0.00" Record high . . . . . . . . . . . . .87 in 2001 Month to date . . . . . . . . . . . . . . . 0.00" Record low. . . . . . . . . . . . . .18 in 1973 Average month to date. . . . . . . . 0.02" Average high . . . . . . . . . . . . . . . . . . .67 Year to date . . . . . . . . . . . . . . . . . 4.73" Average low. . . . . . . . . . . . . . . . . . . .35 Average year to date. . . . . . . . . . 7.89" Barometric pressure at 4 p.m.. . . 29.88 Record 24 hours . . . . . . . 0.85 in 1940 *Melted liquid equivalent OREGON CITIES City Yesterday Hi/Lo/Pcp Monday Hi/Lo/W Tuesday Hi/Lo/W Astoria . . . . . . . . 65/51/0.01 . . . . . 62/52/sh. . . . . . 60/48/sh Baker City . . . . . . 74/33/0.00 . . . . . 76/43/sh. . . . . . 64/40/sh Brookings . . . . . . 60/55/1.41 . . . . . 64/51/sh. . . . . . 58/50/sh Burns. . . . . . . . . . 71/34/0.00 . . . . . 76/44/sh. . . . . . 64/41/sh Eugene . . . . . . . . 64/56/0.14 . . . . . 62/52/sh. . . . . . 62/46/sh Klamath Falls . . . 65/37/0.00 . . . . . 60/37/sh. . . . . . 57/39/sh Lakeview. . . . . . . 66/36/0.00 . . . . . 66/39/sh. . . . . . 60/40/sh La Pine . . . . . . . . 64/32/0.00 . . . . . 61/34/sh. . . . . . 59/32/sh Medford . . . . . . . 74/48/0.00 . . . . . 69/47/sh. . . . . . 66/45/sh Newport . . . . . . . 61/48/0.15 . . . . . 58/52/sh. . . . . . 57/49/sh North Bend . . . . . 64/54/0.15 . . . . . 62/51/sh. . . . . . 61/48/sh Ontario . . . . . . . . 81/47/0.00 . . . . . 79/54/sh. . . . . . 70/49/sh Pendleton . . . . . . 76/41/0.00 . . . . . 72/45/sh. . . . . . 69/44/sh Portland . . . . . . . 63/55/0.10 . . . . . 61/55/sh. . . . . . 61/51/sh Prineville . . . . . . . 67/42/0.00 . . . . . 61/39/sh. . . . . . 63/40/sh Redmond. . . . . . . 71/37/0.00 . . . . . 67/40/sh. . . . . . 61/39/sh Roseburg. . . . . . . 65/58/0.09 . . . . . 68/49/sh. . . . . . 64/48/sh Salem . . . . . . . . . 62/55/0.30 . . . . . 62/51/sh. . . . . . 64/48/sh Sisters . . . . . . . . . 67/38/0.00 . . . . . 62/37/sh. . . . . . 56/39/sh The Dalles . . . . . . 70/50/0.01 . . . . . 69/49/sh. . . . . . 66/47/sh FIRE INDEX Bend, west of Hwy. 97.....High Sisters................................High Bend, east of Hwy. 97......High La Pine...............................High Redmond/Madras..........High Prineville ..........................High Mod. = Moderate; Ext. = Extreme WATER REPORT The following was compiled by the Central Oregon watermaster and irrigation districts as a service to irrigators and sportsmen. Reservoir Acre feet Capacity Crane Prairie . . . . . . . . . . . . . 34,881 . . . . .55,000 Wickiup. . . . . . . . . . . . . . . . 108,536 . . . .200,000 Crescent Lake . . . . . . . . . . . . 78,408 . . . . .91,700 Ochoco Reservoir . . . . . . . . . 25,644 . . . . .47,000 Prineville . . . . . . . . . . . . . . . 101,255 . . . .153,777 River flow Station Cubic ft./sec Deschutes RiverBelow Crane Prairie . . . . . . . . . . . 379 Deschutes RiverBelow Wickiup . . . . . . . . . . . . . . . 967 Crescent CreekBelow Crescent Lake . . . . . . . . . . . . 69 Little DeschutesNear La Pine . . . . . . . . . . . . . . . . . 111 Deschutes RiverBelow Bend . . . . . . . . . . . . . . . . . 109 Deschutes RiverAt Benham Falls . . . . . . . . . . . . 1,355 Crooked RiverAbove Prineville Res. . . . . . . . . . . . . . 17 Crooked RiverBelow Prineville Res. . . . . . . . . . . . . 259 Ochoco CreekBelow Ochoco Res. . . . . . . . . . . . . 9.58 Crooked RiverNear Terrebonne . . . . . . . . . . . . . . . 170 Contact: Watermaster, 388-6669 or go to Seattle 65/51 Paulina 57/35 Portland 61/55 Missoula 75/52 To report a wildfire, call 911 ULTRAVIOLET INDEX The higher the UV Index number, the greater the need for eye and skin protection. Index is for solar at noon. Oakridge Elk Lake 61/37 51/26 Sunriver 60/35 Brothers 61/34 La Pine 59/33 Burns 62/36 61/34 Crescent Lake 54/28 Crescent Fort Rock 62/36 Hampton 59/35 Mostly cloudy skies with showers possible across the region today. Eastern Eugene 62/52 Helena Boise Bend 64/38 81/51 78/52 Grants Pass 67/45 Idaho Falls Redding 67/49 LOW 0 2 2 MEDIUM 4 HIGH 6 V.HIGH 8 10 Chemult 59/32 Christmas Valley Silver Lake 65/34 63/37 Elko 78/40 75/49 Reno POLLEN COUNT Updated daily. Source: pollen.com Crater Lake 48/31 Partly cloudy skies with a slight chance of showers today. San Francisco 65/57 76/49 Salt Lake City 81/60 LOW MEDIUM HIGH Legend:W-weather, Pcp-precipitation, s-sun, pc-partial clouds, c-clouds, h-haze, sh-showers, r-rain, t-thunderstorms, sf-snow flurries, sn-snow, i-ice, rs-rain-snow mix, w-wind, f-fog, dr-drizzle, tr-trace NATIONAL WEATHER SYSTEMS Shown are noon positions of weather systems and precipitation. Temperature bands are high for the day. Calgary 72/48 TRAVELERS' FORECAST NATIONAL Yesterday Monday Tuesday City Hi/Lo/Pcp Hi/Lo/W Hi/Lo/W Abilene, TX . . . . .89/59/0.00 . 91/57/pc . . 87/59/pc Akron . . . . . . . . .53/38/0.17 . .57/48/sh . . 65/46/pc Albany. . . . . . . . .64/46/0.09 . .64/47/sh . . 62/48/sh Albuquerque. . . .79/57/0.00 . 79/56/pc . . . .79/55/t Anchorage . . . . .47/41/0.07 . .48/38/sh . . . 46/35/c Atlanta . . . . . . . .68/46/0.00 . . .73/50/s . . . 77/54/s Atlantic City . . . .61/51/0.00 . .58/52/sh . . 66/54/sh Austin . . . . . . . . .88/47/0.00 . . .88/57/s . . . 89/61/s Baltimore . . . . . .51/45/0.14 . .60/49/sh . . 66/51/pc Billings. . . . . . . . .83/57/0.00 . 85/55/pc . . 84/50/pc Birmingham . . . .71/42/0.00 . . .73/49/s . . 77/52/pc Bismarck . . . . . . .88/45/0.00 . 82/54/pc . . . 85/58/s Boise . . . . . . . . . .82/56/0.00 . .81/51/sh . . 68/46/sh Boston. . . . . . . . .65/57/0.00 . .66/53/sh . . 63/50/sh Bridgeport, CT. . .68/54/0.23 . .63/49/sh . . 66/52/sh Buffalo . . . . . . . .50/42/0.45 . .60/50/sh . . 62/46/pc Burlington, VT. . .54/44/0.32 . .59/52/sh . . 58/42/sh Caribou, ME . . . .58/45/0.00 . .58/46/sh . . 51/33/sh Charleston, SC . .70/46/0.00 . . .73/52/s . . . 78/56/s Charlotte. . . . . . .65/42/0.00 . 68/45/pc . . . 75/48/s Chattanooga. . . .68/44/0.00 . 72/46/pc . . 79/50/pc Cheyenne . . . . . .82/47/0.00 . 80/50/pc . . 77/48/pc Chicago. . . . . . . .66/41/0.00 . . .67/51/s . . . 74/53/s Cincinnati . . . . . .65/36/0.00 . 67/44/pc . . . 71/49/s Cleveland . . . . . .55/45/0.19 . .58/50/sh . . 66/49/pc Colorado Springs 82/51/0.00 . 80/52/pc . . 76/49/pc Columbia, MO . .72/39/0.00 . . .78/48/s . . . 81/52/s Columbia, SC . . .71/50/0.00 . . .74/46/s . . . 79/50/s Columbus, GA. . .73/47/0.00 . . .76/49/s . . . 80/52/s Columbus, OH. . .60/40/0.00 . .62/46/sh . . 68/47/pc Concord, NH . . . .61/52/0.07 . .63/47/sh . . 65/42/sh Corpus Christi. . .87/61/0.00 . . .83/69/s . . 85/77/pc Dallas Ft Worth. .84/57/0.00 . . .86/54/s . . . 86/57/s Dayton . . . . . . . .61/36/0.00 . 64/44/pc . . . 70/47/s Denver. . . . . . . . .85/55/0.00 . 82/57/pc . . 79/56/pc Des Moines. . . . .76/40/0.00 . . .78/51/s . . . 81/55/s Detroit. . . . . . . . .63/40/0.00 . 66/48/pc . . . 71/50/s Duluth . . . . . . . . .74/42/0.00 . . .72/49/s . . 68/51/pc El Paso. . . . . . . . .88/66/0.00 . 87/64/pc . . 87/64/pc Fairbanks. . . . . . .57/36/0.00 . .46/28/sh . . . 43/25/c Fargo. . . . . . . . . .83/52/0.00 . 82/55/pc . . . 83/58/s Flagstaff . . . . . . .68/40/0.38 . . .70/43/t . . . .68/39/t Yesterday Monday Tuesday City Hi/Lo/Pcp Hi/Lo/W Hi/Lo/W Grand Rapids . . .65/36/0.00 . . .68/44/s . . . 70/47/s Green Bay. . . . . .69/31/0.00 . . .67/45/s . . . 69/50/s Greensboro. . . . .61/42/0.00 . . .64/44/c . . . 74/48/s Harrisburg. . . . . .49/42/0.43 . .59/46/sh . . 66/49/pc Hartford, CT . . . .70/51/0.16 . .68/48/sh . . 65/50/sh Helena. . . . . . . . .75/43/0.00 . 78/52/pc . . 70/41/sh Honolulu . . . . . . .90/77/0.00 . 87/74/pc . . 88/73/pc Houston . . . . . . .87/54/0.00 . . .86/58/s . . . 88/62/s Huntsville . . . . . .72/39/0.00 . 72/42/pc . . 77/48/pc Indianapolis . . . .67/37/0.00 . 72/47/pc . . 74/50/pc Jackson, MS . . . .73/45/0.00 . . .78/48/s . . 81/53/pc Jacksonville. . . . .78/47/0.00 . . .74/55/s . . . 79/63/s Juneau. . . . . . . . .50/30/0.00 . 50/34/pc . . 50/35/sh Kansas City. . . . .75/41/0.00 . . .83/56/s . . 84/58/pc Lansing . . . . . . . .62/34/0.00 . 66/45/pc . . . 69/47/s Las Vegas . . . . . .95/72/0.00 . 91/71/pc . . 81/65/pc Lexington . . . . . .62/36/0.00 . 67/44/pc . . . 71/48/s Lincoln. . . . . . . . .80/44/0.00 . 85/51/pc . . 87/53/pc Little Rock. . . . . .76/45/0.00 . . .78/47/s . . 81/54/pc Los Angeles. . . . .76/64/0.00 . 70/61/pc . . 66/58/pc Louisville . . . . . . .68/41/0.00 . 72/47/pc . . 74/51/pc Madison, WI . . . .68/30/0.00 . . .73/46/s . . . 75/50/s Memphis. . . . . . .73/46/0.00 . . .76/48/s . . 81/52/pc Miami . . . . . . . . .87/75/0.00 . .86/75/sh . . 86/74/pc Milwaukee . . . . .67/39/0.00 . . .66/50/s . . . 68/53/s Minneapolis . . . .80/43/0.00 . . .79/52/s . . . 81/58/s Nashville . . . . . . .67/40/0.00 . 73/42/pc . . 78/51/pc New Orleans. . . .74/62/0.00 . . .78/58/s . . . 81/61/s New York . . . . . .64/50/0.06 . .61/53/sh . . 66/55/sh Newark, NJ . . . . .65/49/0.60 . .60/49/sh . . 67/53/sh Norfolk, VA . . . . .61/48/0.00 . . .62/49/c . . 68/56/pc Oklahoma City . .83/49/0.00 . 85/57/pc . . . 85/56/s Omaha . . . . . . . .78/47/0.00 . 83/55/pc . . 85/56/pc Orlando. . . . . . . .82/60/0.00 . . .83/61/s . . . 84/65/s Palm Springs. . .102/74/0.00 . . .91/66/s . . 83/66/pc Peoria . . . . . . . . .70/36/0.00 . . .75/47/s . . . 78/51/s Philadelphia . . . .56/50/0.46 . .60/48/sh . . 66/52/sh Phoenix. . . . . . .100/77/0.00 101/74/pc . . 94/66/pc Pittsburgh . . . . . .46/41/0.53 . .58/46/sh . . 63/44/pc Portland, ME. . . .59/51/1.66 . .63/53/sh . . 59/46/sh Providence . . . . .70/58/0.02 . .67/52/sh . . 64/51/sh Raleigh . . . . . . . .62/46/0.00 . 65/42/pc . . . 73/50/s Yesterday Monday Tuesday Yesterday Monday Tuesday City Hi/Lo/Pcp Hi/Lo/W Hi/Lo/W City Hi/Lo/Pcp Hi/Lo/W Hi/Lo/W Rapid City . . . . . .96/46/0.00 . 90/58/pc . . . 89/58/s Savannah . . . . . .73/45/0.00 . . .74/51/s . . . 79/60/s Reno . . . . . . . . . .78/51/0.00 . 76/49/pc . . . . 67/49/ Seattle. . . . . . . . .64/50/0.00 . .65/51/sh . . 59/50/sh Richmond . . . . . .58/49/0.00 . .63/45/sh . . 71/49/pc Sioux Falls. . . . . .81/50/0.00 . . .83/55/s . . . 85/60/s Rochester, NY . . .54/44/0.24 . .62/51/sh . . . 63/45/c Spokane . . . . . . .69/51/0.13 . 72/52/pc . . 64/45/sh Sacramento. . . . .78/53/0.00 . .70/55/sh . . 71/56/sh Springfield, MO. .72/40/0.00 . . .78/50/s . . . 79/51/s St. Louis. . . . . . . .71/42/0.00 . . .78/50/s . . 80/56/pc Tampa . . . . . . . . .80/60/0.00 . . .83/62/s . . . 86/67/s Salt Lake City . . .84/64/0.00 . . .81/60/t . . . .77/58/t Tucson. . . . . . . . .93/66/0.01 . . .93/69/t . . 92/65/pc San Antonio . . . .87/58/0.00 . . .88/59/s . . 88/64/pc Tulsa . . . . . . . . . .78/45/0.00 . 84/51/pc . . 85/54/pc San Diego . . . . . .79/64/0.00 . 71/62/pc . . . 67/61/c Washington, DC .52/45/0.19 . .60/48/sh . . 67/52/pc San Francisco . . .72/57/0.00 . .66/58/sh . . 66/55/sh Wichita . . . . . . . .83/49/0.00 . 87/58/pc . . 85/57/pc San Jose . . . . . . .76/56/0.00 . .74/59/sh . . 71/58/sh Yakima . . . . . . . 71/43/trace . .67/44/sh . . 65/41/sh Santa Fe . . . . . . .77/43/0.00 . . .73/45/t . . . .71/45/t Yuma. . . . . . . . .102/80/0.00 . .101/69/s . . 90/59/pc Yesterday's U.S. extremes (in the 48 contiguous states): Vancouver 59/52 Seattle 65/51 Portland 61/55 Boise 81/51 Saskatoon 72/49 Winnipeg 75/51 Billings 85/55 � 102� Palm Springs, Calif. � 19� Embarass, Minn. Cheyenne 80/50 San Francisco 65/57 Las Vegas 91/71 Salt Lake City 81/60 Denver 82/57 Albuquerque 79/56 Phoenix 101/74 Tijuana 68/57 Chihuahua 83/55 � 1.66" Portland, Maine Los Angeles 70/61 Honolulu 87/74 Halifax 64/54 Portland To ronto 63/53 58/48 Bismarck St. Paul Green Bay Boston 79/52 82/54 67/45 66/53 Buffalo Detroit Rapid City 60/50 New York 66/48 90/58 61/53 Des Moines Philadelphia Columbus 78/51 Chicago 62/46 60/48 67/51 Omaha Washington, D. C. 83/55 St. Louis 60/48 Louisville 78/50 Kansas City 72/47 83/56 Charlotte 68/45 Oklahoma City Nashville Little Rock 85/57 73/42 78/47 Atlanta 73/50 Birmingham Dallas 73/49 86/54 New Orleans 78/58 Orlando Houston 83/61 86/58 Miami 86/75 Thunder Bay 65/41 Quebec 59/47 INTERNATIONAL Amsterdam. . . . .77/50/0.00 . 73/54/pc . . . 67/55/c Athens. . . . . . . . .75/64/0.00 . 75/65/pc . . . 77/64/s Auckland. . . . . . .63/59/0.00 . . .62/54/r . . 59/49/pc Baghdad . . . . . .100/66/0.00 . . .92/66/s . . . 93/65/s Bangkok . . . . . . .91/79/0.00 . . .88/77/t . . . .87/77/t Beijing. . . . . . . . .68/39/0.00 . 69/46/pc . . 73/50/pc Beirut. . . . . . . . . .82/70/0.00 . . .81/71/s . . . 83/73/s Berlin. . . . . . . . . .77/48/0.00 . . .73/50/s . . 70/51/pc Bogota . . . . . . . .66/45/0.00 . .68/50/sh . . 64/51/sh Budapest. . . . . . .77/48/0.00 . . .79/48/s . . . 79/50/s Buenos Aires. . . .72/52/0.00 . . .65/48/s . . 66/50/pc Cabo San Lucas .93/75/0.00 . 93/79/pc . . . 95/78/s Cairo . . . . . . . . . .86/70/0.00 . . .86/68/s . . . 86/70/s Calgary . . . . . . . .55/32/0.00 . . .72/48/r . . . .63/42/r Cancun . . . . . . . .86/70/0.00 . . .86/71/t . . . .86/70/t Dublin . . . . . . . . .64/55/0.00 . .63/53/sh . . . 61/52/c Edinburgh . . . . . .61/54/0.00 . .60/51/sh . . . 58/49/c Geneva . . . . . . . .75/50/0.00 . . .76/50/s . . . 78/49/s Harare . . . . . . . . .81/61/0.00 . . .81/61/t . . . .82/61/t Hong Kong . . . . .84/77/0.00 . .81/74/sh . . . .79/73/r Istanbul. . . . . . . .73/55/0.00 . . .68/54/s . . . 71/55/s Jerusalem . . . . . .84/63/0.00 . . .78/60/s . . . 81/62/s Johannesburg . . .64/50/0.21 . . .71/52/t . . . 70/48/s Lima . . . . . . . . . .70/61/0.00 . . .66/58/s . . . 67/59/s Lisbon . . . . . . . . .86/66/0.00 . . .86/64/s . . 88/64/pc London . . . . . . . .79/55/0.00 . 78/57/pc . . . 68/58/c Madrid . . . . . . . .79/52/0.00 . . .83/52/s . . . 82/52/s Manila. . . . . . . . .88/77/0.00 . . .85/78/t . . . .86/79/t Mecca . . . . . . . .111/84/0.00 . .108/83/s . . 107/83/s Mexico City. . . . .66/55/0.00 . . .73/54/t . . . .75/53/t Montreal. . . . . . .50/45/0.00 . .58/47/sh . . 56/43/sh Moscow . . . . . . .45/41/0.00 . 51/42/pc . . 52/43/sh Nairobi . . . . . . . .82/63/0.00 . 81/59/pc . . 82/57/pc Nassau . . . . . . . .91/77/0.00 . . .87/78/t . . . .87/79/t New Delhi. . . . . .93/72/0.00 . . .92/72/s . . . 92/73/s Osaka . . . . . . . . .70/57/0.00 . 68/54/pc . . . 72/55/s Oslo. . . . . . . . . . .55/48/0.00 . 64/45/pc . . . 58/42/c Ottawa . . . . . . . .54/41/0.00 . .58/47/sh . . 59/42/pc Paris. . . . . . . . . . .81/54/0.00 . . .80/56/s . . 78/55/pc Rio de Janeiro. . .79/72/0.00 . . .79/67/t . . 74/65/pc Rome. . . . . . . . . .81/59/0.00 . . .83/61/s . . . 83/59/s Santiago . . . . . . .86/45/0.00 . 67/44/pc . . 68/43/pc Sao Paulo . . . . . .77/63/0.00 . 78/57/pc . . 69/55/sh Sapporo. . . . . . . .54/48/0.00 . .48/36/sh . . 59/46/sh Seoul . . . . . . . . . .64/43/0.00 . . .66/46/s . . . 68/48/s Shanghai. . . . . . .68/61/0.00 . 69/61/pc . . . 72/63/c Singapore . . . . . .86/73/0.00 . . .86/78/t . . . .87/79/t Stockholm. . . . . .61/46/0.00 . 62/47/pc . . 59/45/pc Sydney. . . . . . . . .63/54/0.00 . .64/54/sh . . . 63/52/s Taipei. . . . . . . . . .77/73/0.00 . . .83/75/r . . . .81/75/t Tel Aviv . . . . . . . .84/70/0.00 . . .81/69/s . . . 83/70/s Tokyo. . . . . . . . . .68/64/0.00 . .68/57/sh . . 70/56/pc Toronto . . . . . . . .48/39/0.00 . .58/48/sh . . 61/46/pc Vancouver. . . . . .57/48/0.00 . . .59/52/r . . . .59/50/r Vienna. . . . . . . . .75/48/0.00 . . .75/51/s . . 73/52/pc Warsaw. . . . . . . .59/43/0.00 . . .71/49/s . . 70/51/pc Anchorage 48/38 La Paz 96/76 Juneau 50/34 Mazatlan 88/78 Monterrey 85/65 FRONTS USDA rules force farmers to get creative in growing organic hops By Shannon Dininny The Associated Press TOPPENISH, Wash. --. Pick up a copy of the most comprehensive visitor's guide in Central Oregon: Elaine Thompson / The Associated Press The storage area of the Elliott Bay Brewing Co. is marked for organic products on Thursday in Seattle, where the company brews about a half-dozen organic, year-round beers and some seasonal beers.." � The Bulletin � Chambers of Commerce � Oregon Border Kiosks � Central Oregon Visitor's Association � Bend Visitor and Convention Bureau � Deschutes County Expo Center � Other Points of Interest This guide features a wide variety of informative maps, points of interest, spring and summer events and recreational opportunities. The Fall/Winter edition publishes October 21 Advertising Deadline: Wednesday, October 5 Call your advertising representative today. New rules in 2013. Cultural crop `A good change'. 541-382-1811 PRESENTED BY: IN COOPERATION WITH: GREEN, ETC. THE BULLETIN � MONDAY, OCTOBER 3, 2011 G GREEN LIVING, TECHNOLOGY & SCIENCE IN OREGON The ratings are in The first two weeks of the fall TV season are over, but which network came out the big winner? Page C2 C � Television � Comics � Calendar � LAT crossword � Sudoku � Horoscope Inside `WE FILL A BIG VOID' Despite the Web, middlemen still have their purpose By Damon Darlin New York Times News Service Submitted photos David Straight, owner of Bend-based Fodder Feeds, holds mats of sprouted grains livestock feed grown hydroponically in one of the climate-controlled units he manufactures. sprouting an alternative Fodder Feeds has an efficient way to grow feed for livestock By Ed Merriman The Bulletin Fodder Feeds Founder: David Straight Employees: Nine Address: 61037 Groff Road, Bend Phone: 541325-3377 Website: www .fodderfeeds.com SAN FRANCISCO -- No journalist likes to be told he's naive. But that's what Zach Yungst, cofounder of cater2.me, told me after I wrote a Ping column suggesting that companies that pay for their employee's meals, as many hightech firms do, retard the economic life of a neighborhood. It's true that these companies, which are paying engineers $100,000 or $150,000 a year, have every incentive to keep their employees at their desks working, he said in an e-mail. Paying for a meal gets a firm another $50 to $70 of work from an officebound worker during the lunch hour. Yungst and his business partner, Alex Lorton, have thought a lot about that. Cater2. me, the company they've started in San Francisco, delivers food from carts and small restaurants to businesses that aren't big enough to afford their own chefs. "We fill a big void," Yungst said. Yungst and Lorton are online much of the day reading food blogs, looking for trends and figuring out which chefs to approach on the weekends, but they are classic middlemen. Hold on, though, wasn't that a job description that the Internet was destroying? There was even a 25-cent word for it: disintermediation. The Web, we were told, was eliminating the need for the layers of brokers, agents, wholesalers and even retailers that separate the consumer from the producer. TECH FOCUS That has happened in some instances, drastically reducing the role of travel agents, for example. But consumers still need help and the Internet has provided the tools and the environment for companies like cater2.me to flourish. It has made it easier for middlemen to reach consumers and made it remarkably easy and inexpensive for these middlemen to create companies to do just that. While there has been a lot of talk about how the technology industry does not create jobs on the scale of traditional manufacturing -- a shrunken General Motors still employs more people than a thriving Google -- the Internet has made it a lot easier to create a broad array of new small businesses. Cater2.me is a good example of it. Both of its founders are Wharton business school graduates who began their careers in the kinds of jobs you'd expect Bschoolers to take; Yungst joined an investment bank and a private equity firm while Lorton took a job as a business consultant. Yungst visited many offices in San Francisco, and strolled past food trucks on the city streets selling porchetta sandwiches, curries, barbecue and just about anything you can think of stuffed in a taco. This gave him an idea: If people can't get out to the food, Yungst would bring the food to them. Lorton, who had met Yungst when they were both freshmen at the University of Pennsylvania, liked the idea and joined him. See Middlemen / C6 David Straight spent most of his life running ranches and building houses in California and Southern Oregon before he moved to Bend just in time for the housing market crash. But instead of lamenting tough times, Straight changed course and started Fodder Feeds in July 2010, and built what he described as a kind of high-tech pasture on wheels, producing livestock feed with a fraction of the water and land and none of the pesticide used in traditional methods. Inside one of the company's climatecontrolled 8-by-25-foot trailers, Straight says, a rancher can hydroponically grow more sprouted grains to use as animal feed in six days than a 40-acre field of alfalfa hay produces in a month. GREEN A fresh crop of grassy sprouted grain can be seen inside a Fodder Feeds trailer. "We take nature's normal 30-day process for growing a seed to an 8-inch sprout, and we do it in six days," Straight said. "We turn two pounds of seed into 18 to 20 pounds of highly nutritious feed in six days." Agricultural and feed industry experts in Central Oregon said they've seen an increased interest recently in feeding sprouted grains, the point where a planted seed straddles the line between seed and new plant, as alternative to hay. See Fodder / C6 Annie Tritt / New York Times News Service Alex Lorton, left, and Zach Yungst, center, of cater2.me, which delivers food to office workers, talk with Damon Kappas, a client, in San Francisco. At cater2.me, sales of street food to office workers in San Francisco proves that the Internet hasn't eliminated the middleman after all. The flower is mightier than the mosquito Parasite's downfall may be nutritious, poisonous nectar By Donald G. McNeil Jr. New York Times News Service Courtesy Dr. Gunter C Muller and Yosef Schlein via The New York Times News Service Anopheles sergenti, an aggressive mosquito species, sips the nectar of the Nile tamarisk. More so than blood, mosquitoes subsist on nutritious nectar from flowers and fruit. When the nectar is poisoned, the mosquitoes are powerless. SCIENCE movable bait. That's how we came up with fruit juice." Supported by a grant from the Bill and Melinda Gates Foundation, Schlein and research partner Guenter Mueller Christensen, a mosquito expert at the "You can't move flowering trees around. So you have to use movable bait. That's how we came up with fruit juice." -- Yosef Schlein, a parasitologist at Hebrew University in Jerusalem University of Wisconsin Veterinary Medicine School who was not involved in the research, called the poisoned nectar "a very cool thing." "It's been talked about for a long time," he said, "but they're the first who actually did it." Kathryn Aultman, who oversees the roughly $1 million the Gates Foundation has put into the work thus far, said: "I'm very pleased and excited about the early results. It's wonderful that we're able to break free our imaginations to try some of these things." See Mosquito / C6 C2 Monday, October 3, 2011 � THE BULLETIN T EL EV ISION Husband is tempted to get out and about stu- FALL TV SEASON Ratings were high, but not at NBC By Scott Collins Los Angeles Times DEAR ABBY dent. In order to save money on housing, my best friend, "Keira," and I decided to get an apartment together. She's engaged, so it's actually the two of. I feel it is her passive-aggressive way of undermining me... LOS ANGELES -- The results of the first couple of weeks of the fall TV season are in, and there are some surprises. For the first time in its 25year Monday, nine premiere would more than double last season's average. The episode drew a 25 share of the 18-to-49-year-old audience that advertisers seek -- a figure almost never seen for scripted entertainment these days, and a huge victory for CBS and studio Warner Bros. "Men" was so powerful that it muscled viewers away from "Dancing With the Stars," which ABC was hoping would draw big numbers for a new cast that included Chaz Bono, the show's first transgender contestant, and cable host Nancy Grace. "Those CBS numbers on Monday were huge," said Jeff Bader, who oversees scheduling for ABC. "The audience, I think a lot of it came from us.". ABC has defied that trend this season, at least so far. "Revenge" and "Pan Am" performed surprisingly well in their 10 p.m. slots. In the case of "Pan Am," pairing it with an iconic show entering its final season may have helped. "Women are the core audience for ABC and `Pan Am'" -- which focuses on a time when flight attendants were still known as stewardesses -- "obviously has a natural appeal for women," Bader said. "`Desperate Housewives' was the perfect lead-in for it, and it's on a night where the main competition is football." The network that most needed a hit, of course, was the one that did not find one: NBC. Mired in fourth place for years -- and under a new owner, cable giant Comcast -- the once-mighty network watched virtually its entire new lineup implode: the '60s flashback "The Playboy Club," the crime drama "Prime Suspect" and the comedy "Free Agents." Only "Up All Night," a comedy about young parents, showed some promise. Of course, a couple of weeks do not tell the story of an entire season, and executives have yet to roll out everything. Next month will see premieres for, among others, ABC's "Last Man Standing" starring Tim Allen (Oct. 11), NBC's fantasy "Grimm" (Oct. 21) and Fox's animated comedy "Allen Gregory" (Oct. 30). ORIGINAL FINE ART GALLERY "NATURE'S BOUNTY" Dan Chen & William Pickerd Show Opens Friday October 7 "One of the Paciic Northwest's Premier Fine Art Galleries" MOCKINGBIRD GALLERY 869 NW Wall Street Downtown Bend � 541-388-2107 MONDAY PRIME TIME 10/3/11 BROADCAST/CABLE CHANNELS BD-Bend/Redmond/Sisters/Black Butte (Digital); PM-Prineville/Madras; SR-Sunriver; L-La Pine; * Sports programming may vary '70s Show Ciao Italia `G' 5:30 World News Nightly News Evening News World News The Simpsons Fetch! With Ruff Nightly News That '70s Show Perfect Day `G' 6:00 6:30 7:00 7:30 8:00 8:30 9:00 9:30 10:00 10:30 11:00 11:30 KATU News at 6 (N) ' � NewsChannel 21 at 6 (N) � Access H. Old Christine KEZI 9 News KEZI 9 News Two/Half Men Two/Half Men This Old House Business Rpt. News News 'Til Death `PG' King of Queens My Family `PG' Time Goes By Jeopardy! `G' Wheel Fortune Dancing With the Stars (N) ' `PG' � Jeopardy! `G' Wheel Fortune The Sing-Off The six remaining groups perform. (N) ' `PG' � How I Met 30 Rock ' `14' How I Met 2 Broke Girls Two/Half Men Mike & Molly ' Entertainment The Insider `PG' Dancing With the Stars (N) ' `PG' � Big Bang Big Bang Terra Nova Instinct (N) `14' � House Twenty Vicodin (N) `14' PBS NewsHour (N) ' � Antiques Roadshow `G' � Prohibition (N) ' (Part 2 of 3) `PG' � Live at 7 (N) Inside Edition The Sing-Off The six remaining groups perform. (N) ' `PG' � Seinfeld `PG' Seinfeld ' `G' Gossip Girl (N) ' `14' � Hart of Dixie (N) ' `PG' � Great Performances Tenor Pl�cido Domingo. ' `G' Artist Toolbox NHK World Tavis Smiley (N) BASIC CABLE CHANNELS (10:01) Castle Head Case (N) `PG' The Playboy Club (N) `14' � Hawaii Five-0 Kame'e (N) ' `PG' (10:01) Castle Head Case (N) `PG' News TMZ (N) ' `PG' The Playboy Club (N) `14' � Cops `14' � 'Til Death `PG' Charlie Rose (N) ' � KATU News (11:35) Nightline News Jay Leno News Letterman KEZI 9 News (11:35) Nightline Family Guy `14' Family Guy `14' Teens Behind the Wheel ' `PG' News Jay Leno King of Queens South Park `14' PBS NewsHour ' � The First 48 Life Snatched `14' Hoarders Kathleen; Margree `PG' Hoarders `PG' � Hoarders Lloyd; Carol `PG' � Intervention Anthony `14' � Intervention Sandy `14' � 130 28 18 32 The First 48 `14' � (2:30) >>> >>> "Top Gun" (1986, Adventure) Tom Cruise, Kelly McGillis, Anthony Edwards. A hot-shot Navy > "Billy Madison" (1995) Adam Sandler, Darren McGavin. Premiere. A hotel > "Billy Madison" (1995, Comedy) Adam Sandler, Darren McGavin. A hotel 102 40 39 jet pilot downs MiGs and loves an astrophysicist. � magnate's adult son goes back to grade school. � magnate's adult son goes back to grade school. � "Se7en" (1995) Untamed and Uncut ' `14' � Untamed and Uncut ' `G' � Animal Cops Houston Fragile `PG' I Shouldn't Be Alive `PG' � I Shouldn't Be Alive `PG' � Animal Cops Houston Fragile `PG' 68 50 26 38 Untamed and Uncut ' `14' � Most Eligible Dallas `14' Housewives/NJ Housewives/NJ Real Housewives/Beverly Real Housewives/Beverly (10:01) Most Eligible Dallas `14' What Happens Housewives 137 44 Extreme Makeover: Home Edition Extreme Makeover: Home Edition "Blue Collar Comedy Tour: One for the Road" (2006, Comedy) Premiere. ' `14' "Blue Collar Comedy Tour: One for the Road" `14' 190 32 42 53 Angels Among Us ' `PG' � Philanthropy Inc. � American Greed Mad Money Philanthropy Inc. � American Greed Paid Program Wealth-Trading 51 36 40 52 Dreamliner: Inside the Piers Morgan Tonight (N) Anderson Cooper 360 � OutFront Piers Morgan Tonight Anderson Cooper 360 � Anderson Cooper 360 � 52 38 35 48 Anderson Cooper 360 (N) � Always Sunny Daily Show Colbert Report 30 Rock `PG' 30 Rock `PG' Chappelle Show Chappelle Show Always Sunny Always Sunny Always Sunny Always Sunny Daily Show Colbert Report 135 53 135 47 Always Sunny Journal Joy of Fishing PM Edition Visions of NW Talk of the Town Local issues. Cooking Journal Desert Word Travels Talk of the Town Local issues. Ride Guide `14' Out Present 11 Politics & Public Policy Today 58 20 12 11 Politics & Public Policy Today A.N.T. Farm `G' Shake It Up! `G' Good-Charlie So Random! `G' Good-Charlie Wizards-Place "Halloweentown II: Kalabar's Revenge" (2001) `PG' So Random! `G' Good-Charlie Wizards-Place My Babysitter 87 43 14 39 Phineas, Ferb Cash Cab `G' American Chopper: Sr. vs. Jr. American Chopper: Sr. vs. Jr. American Chopper: Sr. vs. Jr. American Chopper: Sr. vs. Jr. American Chopper: Sr. vs. Jr. American Chopper: Sr. vs. Jr. 156 21 16 37 Cash-Chicago Kardashian Keeping Up With the Kardashians Kardashian E! News (N) Sex & the City Sex & the City E! Special `PG' Kendra `14' Kendra `14' Chelsea Lately E! News 136 25 NFL Football Indianapolis Colts at Tampa Bay Buccaneers (N) (Live) SportsCenter (N) (Live) � NFL PrimeTime (N) � SportsCenter (N) (Live) � 21 23 22 23 Monday Night World, Poker 2011 World Series of Poker 2011 World Series of Poker SportsCenter Football Live Baseball Ton. Football Live NFL Presents College Football Northwestern at Illinois 22 24 21 24 SportsCenter Boxing Boxing One on One One on One AWA Wrestling � Boxing Boxing 23 25 123 25 Boxing SportsCenter SportsCenter SportsCenter SportsCenter SportsCenter H-Lite Ex. H-Lite Ex. H-Lite Ex. H-Lite Ex. H-Lite Ex. H-Lite Ex. H-Lite Ex. H-Lite Ex. 24 63 124 203 Pardon The Lying Game The Lying Game (N) > "Coyote Ugly" (2000) Piper Perabo, Adam Garcia, Maria Bello. The 700 Club (N) `G' � 67 29 19 41 That '70s Show That '70s Show The Lying Game `14' Hannity (N) On Record, Greta Van Susteren The O'Reilly Factor � Hannity On Record, Greta Van Susteren The Five 54 61 36 50 The O'Reilly Factor (N) � Best Dishes Diners, Drive Diners, Drive Unwrapped Unwrapped Unwrapped Crave (N) Best Thing Ate Best Thing Ate Diners, Drive Diners, Drive Diners, Drive Diners, Drive 177 62 98 44 Best Dishes (3:30) >> "The Sentinel" (2006) How I Met How I Met Two/Half Men Two/Half Men > "What Happens in Vegas" (2008) Cameron Diaz, Ashton Kutcher, Rob Corddry. > "What Happens in Vegas" (2008), Rob Corddry 131 Property Brothers `G' � Hunters Int'l House Hunters Showhouse Showdown (N) `G' My First Place My First Place House Hunters Hunters Int'l House Hunters Hunters Int'l 176 49 33 43 Property Brothers `G' � Modern Marvels Muscle Cars `G' Pawn Stars `PG' Pawn Stars `PG' Pawn Stars `PG' Pawn Stars `PG' American Pickers `PG' � Pawn Stars `PG' Pawn Stars `PG' Around the World in 80 Ways 155 42 41 36 Modern Marvels `PG' � Unsolved Mysteries `14' � Unsolved Mysteries `14' � Unsolved Mysteries `14' � "Girl Fight" (2011) Anne Heche, James Tupper. Premiere. `14' � Against the Wall `14' � 138 39 20 31 Cold Case Files ' `PG' � The Rachel Maddow Show (N) The Ed Show (N) The Last Word The Rachel Maddow Show The Ed Show Hardball With Chris Matthews 56 59 128 51 The Last Word That '70s Show That '70s Show Fantasy Factory Fantasy Factory Ridiculousness Ridiculousness Ridiculousness Ridiculousness Ridiculousness Death Valley (N) Cuff'd (N) `14' Ridiculousness 192 22 38 57 Jersey Shore ' `14' � SpongeBob Victorious `G' Victorious `G' Big Time Rush SpongeBob My Wife & Kids My Wife & Kids George Lopez George Lopez That '70s Show That '70s Show Friends ' `14' Friends ' `PG' 82 46 24 40 SpongeBob Dr. Phil ' `PG' � Dr. Phil ' `PG' � Dr. Phil ' `PG' � OWN Behind the Scenes Supersize vs Superskinny `PG' Dr. Phil ' `PG' � 161 103 31 103 Ask Oprah's All Stars `14' � Boys in the Hall Motorhead College Football Washington at Utah Bensinger The Dan Patrick Show 20 45 28* 26 College Football Ways to Die Ways to Die Ways to Die Ways to Die Ways to Die King of Queens King of Queens Ways to Die Ways to Die Ways to Die Ways to Die UFC 136 Countdown (N) ' `14' 132 31 34 46 Ways to Die Warehouse 13 The 40th Floor ' Warehouse 13 Shadows ' � Warehouse 13 Insatiable � Warehouse 13 Emily Lake; Stand The group must stop a crazed man. Warehouse 13 Emily Lake; Stand 133 35 133 45 Warehouse 13 Past Imperfect ' Behind Scenes Mark Chironna Kingdom Conn. Jesse Duplantis Night of Hope From Chicago Joel Osteen Perry Stone First to Know Creflo Dollar Praise the Lord � 205 60 130 MLB Baseball New York Yankees at Detroit Tigers (N) ' (Live) � Inside MLB (N) Conan `14' Family Guy `14' Conan `14' 16 27 11 28 MLB Baseball A Night at the Movies Stephen King >>>> "Frankenstein" (1931) Boris (7:15) >>> "Freaks" (1932, Horror) Wallace Ford, Olga A Night at the Movies Stephen King >>> "Dr. Jekyll and Mr. Hyde" (1931, Horror) Fredric (11:15) >>> "Mark of the Vampire" 101 44 101 29 discusses horror films. (N) Karloff, Colin Clive. � Baclanova, Leila Hyams. � discusses horror films. March, Miriam Hopkins, Rose Hobart. � (1935) Lionel Barrymore. Toddlers & Tiaras ' `G' � Little People Little People Little People: Off to School Cake Boss `PG' Cake Boss `PG' Cake Boss `PG' Cake Boss `PG' Little People: Off to School 178 34 32 34 Ultimate Cake Off ' `PG' � Law & Order By Perjury ' `14' Law & Order Exchange ' `14' Law & Order Crimebusters `14' Law & Order Chattel ' `14' The Closer Repeat Offender `14' CSI: NY Scared Stiff `PG' � 17 26 15 27 Law & Order Identity ' `14' Regular Show MAD `PG' Looney Tunes Johnny Test ' Johnny Test (N) Wrld, Gumball Adventure Time Secret Mountain King of the Hill King of the Hill American Dad American Dad Family Guy `14' Family Guy `14' 84 Bourdain: No Reservations Bourdain: No Reservations Bourdain: No Reservations Bourdain: No Reservations Bourdain: No Reservations Bourdain: No Reservations 179 51 45 42 Bourdain: No Reservations The Jeffersons Sanford & Son Sanford & Son Sanford & Son Sanford & Son M*A*S*H `PG' M*A*S*H `PG' Love-Raymond Love-Raymond Love-Raymond Love-Raymond The Nanny `PG' The Nanny `PG' 65 47 29 35 Good Times NCIS Friends and Lovers ' `PG' NCIS Skeletons ' `PG' � NCIS Heartland ' `PG' � WWE Monday Night RAW (N) ' � (11:05) >> "Fast & Furious" 15 30 23 30 NCIS Blowback ' `PG' � Tough Love: Miami ' `PG' Basketball Wives LA ' `14' Basketball Wives LA (N) ' `14' Basketball Wives LA ' `14' 100 Greatest Songs of the '00s Pop Up Video Greatest Songs 191 48 37 54 Tough Love: Miami ' `PG' PREMIUM CABLE CHANNELS (6:10) >> "Blue Crush" 2002 Kate Bosworth. ' `PG-13' � >> "Prince of Persia: The Sands of Time" 2010 Jake Gyllenhaal. > "Soldier" 1998 Kurt Russell. ' `R' � The Crazies `R' ENCR 106 401 306 401 (4:20) >> "The Crazies" 2010 >>>> "A Hatful of Rain" 1957, Drama Eva Marie Saint. `NR' � >>> "The Verdict" 1982, Drama Paul Newman, Charlotte Rampling. `R' � Blood Feud FMC 104 204 104 120 >>>> "A Hatful of Rain" 1957, Drama Eva Marie Saint. `NR' � Built to Shred Built to Shred Moto: In Out Moto: In Out AirForce (N) `G' Shaun White The Daily Habit Strangers Moto: In Out Moto: In Out AirForce `G' Shaun White The Daily Habit Strangers FUEL 34 Golf Now (N) Top 10 The Golf Fix Golf Central Learning Center Golf Now Top 10 The Golf Fix Golf Central Learning Center GOLF 28 301 27 301 Big Break Ireland Little House on the Prairie `G' Little House on the Prairie `G' Little House on the Prairie `G' Frasier ' `PG' Frasier ' `PG' Frasier ' `PG' Frasier ' `PG' Frasier ' `PG' Frasier ' `PG' HALL 66 33 175 33 The Waltons The Indiscretion `G' (4:15) >> "Waterworld" 1995 Kevin Costner. A loner navi- >> "Liar Liar" 1997, Comedy Jim Carrey. A fast-talking Real Time With Bill Maher ' `MA' � >>> "Scott Pilgrim vs. the World" 2010 Michael Cera. A slacker contends Boxing Darren Barker vs. Sergio MarHBO 425 501 425 501 gates a future world. `PG-13' � lawyer cannot tell a lie. ' `PG-13' � with his new girlfriend's exes. ' `PG-13' � tinez, Middleweights (4:00) "Dying Breed" 2008 `R' >>> "The Descent" 2005, Horror Shauna Macdonald. `R' Whitest Kids Malcolm, Middle Malcolm, Middle Indie Sex II: Extremes `MA' >>> "The Descent" 2005 `R' IFC 105 105 (4:00) > "Sgt. (5:40) >> "The Lovely Bones" 2009, Drama Mark Wahlberg, Rachel Weisz. A young murder >> "The Saint" 1997, Suspense Val Kilmer, Elisabeth Shue. A master of dis- >>> "Black Swan" 2010, Drama Natalie Portman. A ballerina forges an unMAX 400 508 508 Bilko" 1996 victim watches over her family from heaven. ' `PG-13' � guise finds romance and danger in England. ' `PG-13' � usual relationship with a sultry newcomer. ' `R' � Bomb Hunters: Afghanistan `14' Border Wars Murder Capital `PG' Border Wars `PG' Bomb Hunters: Afghanistan `14' Border Wars Murder Capital `PG' Border Wars `PG' Border Wars Lost in the River `14' NGC 157 157 Iron Man: Armor Iron Man: Armor Avatar: Air. Avatar: Air. Avatar: Air. Dragon Ball Z Iron Man: Armor Iron Man: Armor Odd Parents Fanboy-Chum Fanboy-Chum Dragon Ball Z Iron Man: Armor NTOON 89 115 189 115 Dragon Ball Z Fisher's ATV Destination Pol. Dirt Trax TV Mudslingers NASCAR Outd. Best of West Headhunters TV Wild and Raw Fisher's ATV Dirt Trax TV Destination Pol. Mudslingers OUTD 37 307 43 307 Bone Collector Primitive (3:30) >> "Flaw- (5:25) "Lake City" 2008 Sissy Spacek. iTV. A young man > "Paper Man" 2009 Jeff Daniels. iTV Premiere. A frustrated novelist depends Dexter Debra becomes an unexpected Homeland Pilot Carrie Mathison is Dexter Debra becomes an unexpected SHO 500 500 less" � on the run goes to his childhood home. ' `R' on an imaginary friend for support. ' `R' � hero. ' `MA' � suspicious of a hero. `MA' � hero. ' `MA' � Pass Time `PG' Pass Time `PG' Car Science Movie Preview Monster Jam Pass Time `PG' Pass Time `PG' Car Science Movie Preview NASCAR Race Hub SPEED 35 303 125 303 Monster Jam (N) (6:50) >>> "About Schmidt" 2002 Jack Nicholson. ' `R' � >> "The Sorcerer's Apprentice" 2010 Nicolas Cage. ' `PG' � >> "Takers" 2010 Matt Dillon. STARZ 300 408 300 408 > "The Hot Chick" 2002, Comedy Rob Schneider. ' `PG-13' � (4:15) >> "Critical Condition" 1987 (6:15) >> "Terminal Velocity" 1994, Action Charlie Sheen. A sky diver investi- >> "Manderlay" 2005, Drama Bryce Dallas Howard, Isaach De Bankol�, Danny Glover. Premiere. (10:20) "Triangle" 2009 Melissa George. Yacht passenTMC 525 525 Richard Pryor. `R' � gates the mysterious death of a student. ' `PG-13' � In 1933 a woman finds slaves on a plantation. `NR' gers encounter mysterious weather conditions. UFC Live: Marquardt vs. Story College Football Talk NBC Sports Talk College Football From Oct. 28, 2000. (N) VS. 27 58 30 209 WEC WrekCage `14' � Golden Girls Golden Girls Golden Girls Golden Girls Golden Girls Golden Girls Golden Girls Golden Girls Golden Girls Ghost Whisperer ' `PG' � Sinbad It's Just Family `PG' WE 143 41 174 118 Golden Girls THE BULLETIN � Monday, October 3, 2011 C3 CALENDAR TODAY WORLD SERIES HOLD 'EM FOR HABITAT: Poker tournament, followed by a closed winners' tournament Oct. 4; proceeds benefit Habitat for Humanity; $5; 6:30 p.m., 5 p.m. sign-ups; Jake's Diner, 2210 N.E. U.S. Highway 20, Bend; 541419-6021. S.W. Sixth St., Redmond; 541-5261491.; 6 p.m.; 541-388-3378, info@bendfilm.org or .org. THE NORTHSTAR SESSION: The California-based roots-rock band performs; free; 7 p.m.; McMenamins Old St. Francis School, 700 N.W. Bond St., Bend; 541-382-5174 or. AUTHOR PRESENTATION: Thor Hanson talks about his book "Feathers: The Evolution of a Natural Miracle"; with a slide show; free for members of museum, $5 for non-members; 7:30 p.m.; High Desert Museum, 59800 S. U.S. Highway 97, Bend; 541382-4754. . THE CHANGING COLORS: The Colorado-based folk musicians perform, with Rural Demons; $5; 8 p.m.; The Horned Hand, 507 N.W. Colorado Ave., Bend.. Seeking friendly duplicate bridge? Go to Five games weekly TUESDAY GREEN TEAM MOVIE NIGHT: Featuring a screening of "Chemerical," which explores the toxicity of common household cleaners; free; 6:30-8:30 p.m.; First Presbyterian Church, 230 N.E. Ninth St., Bend; 541-815-6504. THE SPEAKEASY: An open mic storytelling event; those born in the 1930s or whose parents or grandparents lived through the Depression can speak about surviving the downturn; donations accepted; 7 p.m.; Innovation Theatre Works, 1155 S.W. Division St., Bend; 541977-5677. WEDNESDAY "IT'S IN THE BAG" LECTURE SERIES: Julie Ann Elston presents the lecture "Bamboo Capitalism: The Economic Rise of China in the 21st Century," which explores China's economic prowess; free; noon-1 p.m.; OSU-Cascades Campus, Cascades Hall, 2600 N.W. College Way, Bend; 541-322-3100 or www .osucascades.edu/lunchtimelectures. BEND FARMERS MARKET: Free; 3-7 p.m.; Mirror Pond parking lot, eastern end of Drake Park; 541-4084998 or .com. RAILROAD DAY CENTENNIAL CELEBRATION: Celebrate local railroad history, with games, train rides, tours, displays, reenactments and more; free; 3:30-6:30 p.m.; Art Station, 313 S.W. Shevlin Hixon Drive, Bend; 541-389-1813 or www .deschuteshistory.org. SPEAKNOW: High school students compete in a spoken word competition; $3, free to participate; 7 p.m., registration at 6:30 p.m.; PoetHouse Art, 55 N.W. Minnesota Ave., Bend; 541-728-0756 or programs@thenatureofwords.org. THE NORTHSTAR SESSION: The California-based roots-rock band performs; free; 7 p.m.; McMenamins Old St. Francis School, 700 N.W. Bond St., Bend; 541382-5174 or www .mcmenamins.com. "HARD TIMES": Innovation Theatre Works presents an adaptation of Studs Terkel's book about people who lived through the Great Depression; $20, $18 students and seniors, $10 ages 75 and older; 8 p.m.; Innovation Theatre Works, 1155 S.W. Division St., Bend; 541-504-6721 or www .innovationtw.org. "ONE FOR THE ROAD": A screening of the Teton Gravity Research film about snow sports athletes and their lives on the road; $13 in advance, $15 day of show; 8 p.m.; Tower Theatre, 835 N.W. Wall St., Bend; 541-317-0700 or .org. ages; proceeds benefit the Oregon Athletic & Educational Foundation; $12, $20 two haunts, $30 all haunts; 7 p.m.; old Parr Lumber buildings, 443 S.W. Evergreen Ave., Redmond;. "BREAKING AWAY": A screening of the PG-rated 1979 film; free; 7:30 p.m.; Jefferson County Library, Rodriguez Annex, 134 S.E. E St., Madras; 541475-3351 or www .jcld.org. "HARD TIMES": Innovation Theatre Works presents an adaptation of Studs Terkel's book about people who lived through the Great Depression; $25; 8 p.m.; Innovation Theatre Works, 1155 S.W. Division St., Bend; 541-504-6721 or www .innovationtw.org. RICHIE SPICE: The reggae superstar performs, with Subliminal; $18 in advance, $20 at the door; 8 p.m.; Domino Room, 51 N.W. Greenwood Ave., Bend; 541-788-2989. POLYRHYTHMICS: The Seattlebased funk group performs; $7; 9 p.m.; Silver Moon Brewing & Taproom, 24 N.W. Greenwood Ave., Bend; 541-388-8331. older; "Distortions" 3-D haunt is all ages; proceeds benefit the Oregon Athletic & Educational Foundation; $12, $20 two haunts, $30 all haunts; 7 p.m.; old Parr Lumber buildings, 443 S.W. Evergreen Ave., Redmond;. TRIAGE: Local comedy improvisational troupe puts on a fun show in the style of "Whose Line is it Anyway?;" appropriate for the whole family; $5; Doors open at 7 p.m.; Greenwood Playhouse, 148 N.W. Greenwood Ave., Bend; 541-389-0803 or. . CLOVERDALE: The country musicians perform; $5; 9 p.m.; Maverick's Country Bar and Grill, 20565 Brinson Blvd., Bend; 541-3251886. SUNDAY PANCAKE BREAKFAST AND GREYHOUND ROMP: With a silent auction and merchandise; proceeds benefit Greyhound Pet Adoption Northwest; $8; 8-11 a.m.; Tripiano home, 67708 Cloverdale Road, Sisters; 541-549-8422..-8 p.m.; 541388 .org. "HARD TIMES": Innovation Theatre Works presents an adaptation of Studs Terkel's book about people who lived through the Great Depression; $20, $18 students and seniors, $10 ages 75 and older; 2 p.m.; Innovation Theatre Works, 1155 S.W. Division St., Bend; 541504-6721 or .org. LA PHIL LIVE -- DUDAMEL CONDUCTS MENDELSSOHN: A screening of the live concert, featuring the Los Angeles Philharmonic performing music by Mendelssohn; conducted by Gustavo Dudamel; $20, $16 children; 2 p.m.; Regal Old Mill Stadium 16, 680 S.W. Powerhouse Drive, Bend; 541-382-6347. ROLAND WHITE: The two-time Oregon State Senior Fiddling Champion performs, with Mark Barringer; free; 2 p.m.; Sisters Public Library, 110 N. Cedar St.; 541312-1032 or www .deschuteslibrary. org/calendar. SECOND SUNDAY: Authors from The High Desert Poetry Cell read from a selection of their works; followed by an open mic; free; 2 p.m.; Downtown Bend Public Library, Brooks Room, 601 N.W. Wall St.; 541-312-1034 or www .deschuteslibrary.org/calendar. OBSERVATORY OPEN HOUSE: Dress warmly for a night of stargazing; free; 8-10 p.m.; Sunriver Nature Center & Observatory, 57245 River Road; 541-593-4394 or www .sunrivernaturecenter.org. SATURDAY.-10:30 p.m.; 541-388. WRITE NOW!: Brainstorm, play word games and more in a casual setting, to help creative writing; free; 1 p.m.; Sunriver Area Public Library, 56855 Venture Lane; 541-312-1081 or www .deschuteslibrary.org/calendar. JANE GOODALL LECTURE: Primatologist and conservationist Jane Goodall speaks about her experiences in the field and reflections on conservation issues; $35, $20 students and seniors, $75 preferred; 1:30-2:30 p.m.; Deschutes County Fair & Expo Center, 3800 S.W. Airport Way, Redmond; 541548-2711 or. AUTHOR PRESENTATION: Johan Mathiesen, author of "Mad as the Mist and Snow: Exploring Oregon Through Its Cemeteries," talks about Oregon cemeteries; free; 3 p.m.; Sunriver Area Public Library, 56855 Venture Lane; 541-617-7050. AUTHOR PRESENTATION: Rosemarie Ostler will give a talk based on her new book "Slinging Mud: Rude Nicknames, Scurrilous Slogans, and Insulting Slang from Two Centuries of American Politics."; free; 6:30 p.m.; Paulina Springs Books, 422 S.W. Sixth St., Redmond; 541526-1491. BEND COMMUNITY CONTRADANCE: Featuring caller Ron Bell-Roemer and music by the High Country Dance Band; $7; 7 p.m. beginner's workshop, 7:30 p.m. dance; Boys & Girls Club of Bend, 500 N.W. Wall St.; 541-330-8943. HAUNTED HOUSES: Featuring three haunted houses; "Dark Intentions" and " The Haunt at Juniper Hollow" are recommended for ages 12 and FRIDAY "THE OWL AND THE WOODPECKER" EXHIBIT OPENS: New exhibit features photographs by Paul Bannick; exhibit runs through Jan. 8; included in the price of admission; $15 adults, $12 ages 65 and older, $9 ages 5-12, free ages 4 and younger; 9 a.m.-5 p.m.; High Desert Museum, 59800 S. U.S. Highway 97, Bend; 541-382-4754 or..-11:15 p.m.; 541-388-3378, info@ bendfilm.org or. FIRST FRIDAY GALLERY WALK: Event includes art exhibit openings, artist talks, live music, wine and food in downtown Bend and the Old Mill District; free; 5-9 p.m.; throughout Bend. VFW DINNER: A dinner of Polish sausage and sauerkraut; $7; 5 p.m.; VFW Hall, 1503 N.E. Fourth St., Bend; 541-389-0775. AUTHOR PRESENTATION: Rosemarie Ostler will give a talk based on her new book "Slinging Mud: Rude Nicknames, Scurrilous Slogans, and Insulting Slang from Two Centuries of American Politics;" free; 6:30 p.m.; Paulina Springs Books, 252 W. Hood Ave., Sisters; 541-549-0866. AUTHOR READINGS: Author Suzanne Burns reads from her book, "Misfits and Other Heroes;" Author Jim Churchill-Dicks will read from his book, "Beyond Telling;" free; 7 p.m.; The Nature of Words, 224 N.W. Oregon Ave., Bend; 541-647-2233. CHAMPAGNE AND ACES: A casino night, with, a silent auction, raffle, and appetizers; proceeds benefit the community center; $25; 7-10 p.m.; Bend's Community Center, 1036 N.E. Fifth St.; 541-389-0046. HAUNTED HOUSES: Featuring three haunted houses; "Dark Intentions" and " The Haunt at Juniper Hollow" are recommended for ages 12 and older; "Distortions" 3-D haunt is all VH1 / Eyeboogie via New York Times News Service A screenshot of a Fergie music video on VH1's "Pop Up Video." "Pop Up," a humorous music-video explainer from the 1990s, will return as a midday show. `Pop Up Video' retooled for a new decade By Megan Angelo New York Times News Service THURSDAY JOURNEY TO THE GALAPAGOS: A naturalist, biologist and physicist share perspectives and photos of the Galapagos Islands; free; 2 p.m.; Bend Senior Center, 1600 S.E. Reed Market Road; 541-617-4663, ruthh@ uoregon.edu or .edu. AUTHOR PRESENTATION: Thor Hanson talks about his book "Feathers: The Evolution of a Natural Miracle"; with a slide show; free; 5 p.m.; Paulina Springs Books, 422 M For Monday, Oct. 3 T 3:25, 7:10, 10:15 RISE OF THE PLANET OF THE APES (PG-13) 12:50, 3:55, 6:50, 9:20 WHAT'S YOUR NUMBER? (R) 1:40, 4:35, 7:20, 9:55 EDITOR'S NOTE: Movie times in bold are open-captioned showtimes. EDITOR'S NOTE: There is an additional $3.50 fee for 3-D movies. DOLPHIN TALE (PG) 6:30 MONEYBALL (PG-13) 6:30 REGAL OLD MILL STADIUM 16 680 S.W. Powerhouse Drive, Bend, 541-382-6347 REGAL PILOT BUTTE 6 2717 N.E. U.S. Highway 20, Bend, 541-382-6347 MADRAS CINEMA 5 1101 S.W. U.S. Highway 97, Madras, 541-475-3505 CONTAGION (PG-13) 2:20, 4:50, 7:10 THE GUARD (R) 2:50, 5:20, 7:40 THE HELP (PG-13) 2, 6:40 LIFE, ABOVE ALL (PG13) 2:10, 4:40, 7:20 MIDNIGHT IN PARIS (PG13) 2:30, 5, 7:30 MONEYBALL (PG-13) 2:40, 7 MCMENAMINS OLD ST. FRANCIS SCHOOL 700 N.W. Bond St., Bend, 541-330-8562 (After 7 p.m. shows 21 and older only. Guests younger than 21 may attend screenings before 7 p.m. if accompanied by a legal guardian.) EDITOR'S NOTE: Due to screening of some football games, no movies will be shown today. 50/50 (R) 1:45, 4:55, 7:40, 10:25 ABDUCTION (PG-13) 12:10, 3, 4:25, 6:15, 9, 10:05 CONTAGION (PG-13) 12:30, 3:05, 6:45, 9:15 COURAGEOUS (PG-13) 12:40, 3:35, 6:30, 9:25 THE DEBT (R) 1:30, 7:30 DOLPHIN TALE (PG-13) Noon, 3:45, 7, 9:40 DOLPHIN TALE 3-D (PG-13) 1:10, 4:15, 7:35, 10:10 DREAM HOUSE (PG-13) 1:20, 4:10, 6:35, 9:05 DRIVE (R) 1:55, 4:45, 7:55, 10:20 THE HELP (PG-13) 12:05, 3:15, 6:20, 9:45 KILLER ELITE (R) 2, 5:05, 7:50, 10:30 THE LION KING 3-D (G) 1, 4, 7:15, 9:35 MONEYBALL (PG-13) 12:20, ABDUCTION (PG-13) 4:50, 7:05 COURAGEOUS (PG-13) 4, 6:40 DOLPHIN TALE 3-D (PG) 6:35 DOLPHIN TALE (PG) 4:05 KILLER ELITE (R) 4:10, 6:35 WHAT'S YOUR NUMBER? (R) 4:50, 7:10 REDMOND CINEMAS 1535 S.W. Odem Medo Road, Redmond, 541-548-8777 ABDUCTION (PG-13) 4:30, 6:45, 9 DOLPHIN TALE (PG-13) 4:15, 6:45, 9:15 THE HELP (PG-13) 5:30, 8:30 WHAT'S YOUR NUMBER? (R) 4:15, 6:30, 8:45 PINE THEATER 214 N. Main St., Prineville, 541-416-1014 SISTERS MOVIE HOUSE 720 Desperado Court, Sisters, 541-549-8800 THE HELP (PG-13) 4, 7:30 DOLPHIN TALE (UPSTAIRS -- PG-13) 6 EDITOR'S NOTE: Pine Theater's upstairs screening room has limited accessibility. CONTAGION (PG-13) 7 THE DEBT (R) 6:45," Thompson said wistfully by phone from Los Angeles. "Nobody had real lives back then." "Back then" was 1996, and the band was really the staff of "Pop Up Video," the humorous musicvideooriented: `I read my music videos,'" Thompson said. But by 2002 both art- ists and fans were becoming less interested in videos, and VH1 decided the "Pop Up" concept was exhausted. "We expanded, did some episodes of `Brady Bunch' and `Who Wants to Be a Millionaire,'" Thompson said. "But everyone still felt it had run its course. Everyone but us." The show's last episode was that August. Thompson packed up his Bowery apartment and headed for Los Angeles. "I didn't pitch VH1 for a decade," he said. "And I didn't hear from them either." Then, a year ago,, `Call me when you want to bring back `Pop Up,'" Thompson said. "Three months later she called." Tatro said, "It had always been near and dear to my heart." the Internet posed. The backstage stories once first gleaned by "Pop Up" researchers were already spattered across the Web. website you can inscribe your own captions on videos. C4 Monday, October 3, 2011 � � Monday, October 3, HAPPY BIRTHDAY for Monday, Oct. 3, 2011: You swing back and forth from extrovert to introvert this year. You enjoy carousing and being social, but you also honor your priorities. For the first time in many years, you tackle a personal or domestic matter head-on. This attitude can and will make all the difference in your life. Others will understand how very determined you are. If you are single, you cannot deny your love of romance. Honor that passion and watch everything else tumble into place. Take your time before committing.) HHHH If you don't take the lead, no one else will. You might have little choice. As you can be determined and fiery, it might be best if you lead the charge anyway. Opportunities head in where you least expect them. Tonight: A must appearance. TAURUS (April 20-May 20) HHHHH If you have an unexpected but unwanted insight, you need to detach and probably head down a new path. This new road could involve being less reactive or actually experiencing something totally new. Though you are a conservative sign, you will be able to let go. Tonight: Follow the music. GEMINI (May 21-June 20) HHHHH Relate directly to others with a willingness to part from the past. An opportunity will present itself if you follow your intuition. Honor a need for more space and centering. Then you will blossom and reveal your complete self. Tonight: Dinner for two. CANCER (June 21-July 22) HHHHH You can flow naturally if you go with your moods. Focus on the long-term implications of a situation. You want your relationships -- both professional and personal -- to succeed. Don't lose sight of this goal. Tonight: Where the action is. LEO (July 23-Aug. 22) HHHH Before you know it, you could be entrenched in a project. News that heads in your direction could be a shock, but somehow it doesn't distract you. Revise your plans and don't worry about others' judgments. Tonight: Clear your desk, then choose something relaxing. VIRGO (Aug. 23-Sept. 22) HHHHH No matter what situation you find yourself in, your creativity flourishes. Your imagination seems relentless. Touch base with a child or loved one. Through detachment, you'll find a solution. Tonight: Keep it light. LIBRA (Sept. 23-Oct. 22) HHHH If you can make your work environment more agreeable, then do. Allow greater give-and-take within your immediate surroundings. You cannot control anyone anyway. If you feel more productive at home, work from there. Tonight: Make a clear separation between work and your personal life. SCORPIO (Oct. 23-Nov. 21) HHHHH Reach out to others. The only mistake you can make is to stand on ceremony. Establish boundaries in a caring manner. Others express a lot of concern about what is happening around you. Tonight: Let the good times in. SAGITTARIUS (Nov. 22-Dec. 21) HHH Take a hard look at your budget. This accounting might not involve your personal funds, but someone else's or perhaps at work. You might be surprised by what you see and a decision you make. You are on the right track. Tonight: Squeeze in some exercise. CAPRICORN (Dec. 22-Jan. 19) HHHHH Your strength and endurance might be needed to carry a job or project to the finish line. Your ability to tap into your creativity encourages others to do the same. Welcome a brainstorming session. Tonight: Don't push beyond a certain level. AQUARIUS (Jan. 20-Feb. 18) HHH If you look around, you might decide to maintain a low profile. Whatever the reason, you sense that something is off. You are changing profoundly within. A domestic matter or real estate investment needs checking out. Tonight: Stay anchored. PISCES (Feb. 19-March 20) HHHHH Schedule meetings and return calls. Your people skills make all the difference in what occurs. A discussion fills in a lot of the gaps. New ideas abound. What might have held some promise now becomes unusually dynamic. Tonight: Only what you want. � 2011 by King Features Syndicate GET FUZZY NON SEQUITUR SAFE HAVENS SIX CHIX ZITS HERMAN C6 Monday, October 3, 2011 � THE BULLETIN C OV ER S T OR I ES Horses eat sprouted grain livestock feed grown in refrigeratorsized Fodder Feeds units at the Straights' ranch near Bend. The units are designed for smaller ranches or hobby farms with 10 to 12 horses or steers. Submitted photo Fodder Continued from C1 Mylen Bohle, crop and forage specialist with the Oregon State University Extension Service in Central Oregon, said he partially agrees with a Massachusetts Department of Agriculture study that said growing sprouted grain as a feed crop would allow farmers to extend the grazing season. It would also allow them to be more self-sufficient, potentially resulting in less off-farm expenditures and greater monetary returns. "Does it work, does it do what they say it will? Yes, it does. It turns seed into a sprouted forage," Bohle said. However, Bohle said, the potential for farmers and ranchers to reduce feed costs or improve profitability depends, in part, on the cost of the equipment. Several other companies in the U.S. and Australia sell systems to hydroponically grow livestock feed from sprouted grains. But Straight said it's the climatecontrolled growing environment in his trailers that makes the difference. It allows the rapid production of grassy feed about 8 inches tall from a blend of seeds, primarily barley, oat, legume and lentil seeds, Straight said. "One unit produces 1,000 pounds of feed per day, or over 185 tons a year, which is enough to feed about 56 horses or steers every day for a year," he said. "To produce an equivalent amount of feed in a pasture, you'd need 40 acres of good quality irrigated hay ground like you have up in Madras." Britt Spaulding, general manager of Round Butte Seed Inc. in Culver, said the sale of barley to ranchers for growing sprouted grain livestock feed started picking up about three or four weeks ago in Central Oregon. "I can tell you sprouted grain is a type of animal feed. It is relatively new here, but we are getting some calls, and we have sold some barley to people who are growing sprouted grains for livestock feed," Spaulding said. Before starting Fodder Feeds last July with a group of inves- Mosquito Continued from C1 Mueller and tors, Straight said he owned several businesses in the Bend area, including Straight Enterprises, High Mountain Properties and ICF Supply and Building. He said the potential for growing sprouted grains as a green, alternative livestock feed is "huge." "Animal feed is a $200 billion a year industry in the United States right now. We are just a tiny grain in the feed industry," Straight said Friday en route to delivering two Fodder Feeds units to ranchers in Arizona and Texas. "If we got 1 percent of the market, that is $2 billion a year in sales." Prices for his units range from $7,995 for refrigerator-sized model designed for hobby farms or ranches to $56,000 for an 8-by25-foot trailer. An 8-by-53-foot Fodder Feeds semitrailer runs $100,000 or more, Straight said. The feed is grown hydroponically, he said, similar to hydroponic tomato production in greenhouses, and nearly all of the water is recycled except what is actually consumed by the plants. To grow 20 pounds of feed on farmland with pivot irrigation takes about 400 gallons of water per day. With flood irrigation, it takes about 2,000 gallons of water per day, Straight said. "With our machine, it takes about 2 gallons of water to pro- duce the same amount of feed. That is a huge water savings," he said. Bohle said OSU Extension Service research found that every 10 pounds of barley seed planted and grown hydroponically produced 6 to 7 pounds of sprouted grain feed with a composition of 85 to 90 percent water and 10 to 15 percent dry matter. Ranchers might want to consider that when assessing whether to feed barley in its grain form versus converting it to sprouted grain. High prices for hay, feed corn, barley, wheat and other feed crops have sparked more interest locally in alternative feeds such as sprouted grain, Bohle said. Hay prices hit near records in the summer, due partly to high fuel, fertilizer and pesticide costs, and partly to a nationwide hay shortage, Bohle said. "Last year alfalfa was around $180 per ton. This year it is anywhere from $250 to $300," Bohle said. "Futures prices are way up," he said, due to concern about a shortage of hay to feed cattle and other livestock through the winter and into the spring of 2012. Growing livestock feed in climate-controlled trailers or buildings is a new twist on a decadesold alternative feed crop traditionally grown in farm fields, Straight said. In researching the topic, he said he found articles dating back more than 100 years about feeding animals sprouted grains, but he said it took five years of drought during the past two decades in Australia for the idea of growing the feed in trailers or in feed factory buildings to catch on. "It has spread to Europe, Saudi Arabia, Northern Africa, South America and Canada," Straight said. "With the drought going on in the Southwest, we are getting 30 to 40 calls a day from ranchers in Texas, Colorado, New Mexico and Arizona." He's seeking investors, he said, to finance additional manufacturing plants that would turn out more Fodder Feeds growing units. Bohle said he remembers when a guy built a factory for growing sprouted grains in Montana in the 1960s, but it went out of business after about a year. "I find it fascinating that here we are 50 years later, and the concept is coming back," Bohle said. Ed Merriman can be reached at 541-617-7820 or emerriman@bendbulletin," Schlein said. "You don't get much credit for simple ideas." Where Buyers And Sellers Meet get a room desertorthopedics.com Bend 541.388.2333 Redmond 541.548.9159 3RD ST. & EMPIRE BLVD. Annie Tritt / New York Times News Service Empanadas made by Joseph Ahearne and sold by cater2.me wait to be delivered to office workers in San Francisco. "We understand the stresses on the person who orders the food," said Zach Yungst, co-founder of cater2.me. "We make them look good." Middlemen Continued from C1 They talked to chefs who were just starting out, many of them hoping to break into the catering business while working in communal kitchens and running pop-up restaurants, farmers market food stands or food trucks. The chefs lacked the time and the connections to get inside offices to sell their food. The two partners found Feldo Nartapura outside a Mission district art gallery grilling skewers of Indonesian sate on a portable grill. Entree to the office-worker market has given him more business and spread his weekend-concentrated business over seven days. "I have consistent work," he said. "Before I'd only look forward to the weekend." Joseph Ahearne, who makes Argentine empanadas, says of the new arrangement, "It helps to keep the wheels rolling." The consistent work means he has hired seven people to help him make little meat-filled pastries using his mother's recipe. Without worrying as much about drumming up business, he says, "I can concentrate on the kitchen." All the while, the two were talking to financial and technology companies in downtown San Francisco. (The Internet doesn't eliminate the need for old-fashioned shoe leather.) Many companies were already having food delivered. Cater2.me's pitch was that they'd reliably provide variety. This is where the Internet was a boon to the new middlemen. They could provide a slick order form that even the newest and lowliest employee -- the one often stuck with the task of coordinating lunch for everyone else -- could navigate. "We understand the stresses on the person who orders the food," said Yungst. "We make them look good." Now, an office containing 10 to 250 people can order around 30 kinds of food from 70 vendors. One day it might be Dontaye Ball's barbecue and the next Veronica Salazar's chicken mole sliders. ("We call them sliders because people don't know they are hojaldritas," she says.) The company says it provides Malaysian, Venezuelan, Jamaican and African meals as well as more familiar Chinese, Japanese, Thai and Italian food. They built a back-end system that tracks which companies prefer what kind of foods. Cater2. me now has about 80 clients including prominent startups like Ngmoco, Yelp and Posterous. The middlemen have put the chefs front and center with their clients. "We never white label a product," Lorton said. The chefs are pleased that new customers are becoming acquainted with their fare. People seek them out at farmers markets or fairs. Nartapura's Satayisfied stand and Salazar's El Huarache Loco stand are now fixtures at San Francisco street food fairs. Hall, who delivers his sandwiches and salads in his "pulledpork Prius," says, "It's kind of cool to see corporate customers embrace street food." S THE BULLETIN � MONDAY, OCTOBER 3, 2011 MLB Inside St. Louis evens series with Philadelphia, see Page D4. D RUNNING Portlander wins Dirty 2nd Half A Portland man was the overall winner and a Canadian was first among the women in Sunday's Dirty 2nd Half, a half marathon trail run that started and finished at Seventh Mountain Resort southwest of Bend. Thomas Brooks, of Portland, was first among the men and the fastest of the race's total of 149 finishers with a time of 1 hour, 15 minutes and 24 seconds over the 13.1-mile course. Finishing second was 2010 Dirty 2nd Half winner Mario Mendoza, of Bend, with a time of 1:18:34. And third overall was Bend's Ian Sharman in 1:26:16. The women's winner was Stacey Cleveland, of Penticton, British Columbia; her time was 1:34:04. The second woman to finish was Bend's Marcy Schreiber, in 1:37:26, and third was Sunriver's Bretagne Dow-Hygelun, in 1:40:13. In the accompanying 10kilometer race, Bend runners Jason Townsend (43:09) and Mary Wellington (46:55) were the men's and women's winners, respectively. Complete race results are listed in Scoreboard on Page D2. -- Bulletin staff report Perfect rides for a perfect season J ust because summer is over and winter looms on the horizon does not mean you have to give up road cycling for the year quite yet. In fact, with moderate temperatures and local scenery in the midst of autumnal transition, fall -- the brief "shoulder season" that it is -- might be the best season of all to pedal through many Central Oregon routes. Brad Boyd, owner of Eurosports bicycle shop in Sisters, offers his top recommendation without hesitation. "The fall is a beautiful time to go ride the Aufderheide," Boyd says. That would be Aufderheide Drive, a span of roughly 60 miles of winding road along the western slopes of the Cascade mountains that heads south from state Highway 126 near AMANDA MILES CYCLING CENTRAL Ryan Brennecke / The Bulletin Cyclists, from left, Erik Huston, Thom Pastor, Andy Martin and Bill Matlock ride down Bear Creek Road together during a morning ride together on Saturday. the small town of Rainbow and eventually intersects with state Highway 58 near Oakridge. Along the way cyclists pass along the Cougar Reservoir and ride for long stretches alongside the McKenzie River's South Fork. "It's stunning," Boyd says of the ride, the start of which is about an hour's drive away from Sisters. "It's spectacular. And if you can get over there while the leaves are changing, it's amazing. Even in the middle of summer there's hardly any traffic ... and it's a beautiful, beautiful ride." Nearby and to the west is McKenzie Pass on state Highway 242, a staple ride in Central Oregon in the springtime, when snow gates keep the road free of vehicular traffic but allow entrance for cyclists. See Rides / D6 P R E P S P O R T S C O M M E N TA RY INSIDE NFL Bears ...........34 Panthers ......29 Bengals........23 Bills..............20 Titans...........31 Browns......... 13 Lions............34 Cowboys......30 Chiefs ..........22 Vikings......... 17 Redskins ...... 17 Rams............ 10 49ers ........... 24 Eagles ..........23 Saints ..........23 Jaguars ........ 10 Texans ......... 17 Steelers ....... 10 Giants ..........31 Cardinals .....27 Falcons ........30 Seahawks ....28 Packers ........49 Broncos .......23 Patriots ........31 Raiders ........ 19 Chargers ......26 Dolphins ...... 16 Ravens .........34 Jets .............. 17 Rob Kerr / The Bulletin Gilchrist running back Tyler Shuey scores agains the North Lake Cowboys during a home game on Friday, Sept. 23. Eagles blow big lead, fall to 49ers San Francisco rallies from a 20-point deficit to beat Philadelphia, see Page D3 Gilchrist special The Grizzlies are Central Oregon's only team to play eight-man football Y San Francisco 49ers quarterback Alex Smith. GILCHRIST -- ou hear football at Gilchrist before you actually see it. The Grizzlies' home stadium is located behind and above Gilchrist School, home of not only the high school but all grades from kindergarten up in this tiny community that straddles U.S. Highway 97 in northern Klamath County about 45 minutes south of Bend. The football facility is situated about 30 yards due east and a good 30 feet higher than the school buildings. When visitors pull into the football stadium's BEAU EASTES parking lot -- an uneven, unpaved patch of dirt just south of the field -- game sounds can be heard immediately. Whistles signaling the start and stop of plays, the public-address announcer calling out ball carriers and tacklers. With only two sets of bleachers -- both on the home side -- the voices of elementary-age children chasing one another around the six-lane running track that rings the gridiron are often as loud as the spectators. Gilchrist is located in the Deschutes National Forest, and the stadium is surrounded by decades-old fir and pine trees. When fans enter the athletic field, it's a bit like Shoeless Joe making his first appearance out of the Iowa cornfields. See Gilchrist / D5 MOTOR SPORTS Kurt Busch gets victory at Dover NASCAR's Sprint Cup championship playoff tightens as Busch beats Jimmie Johnson on Sunday, see Page D6 Columbia Edgewater takes 2011 Team Championship By Zack Hall The Bulletin LOCAL GOLF Edgewater, a private course in Portland, combined to shoot a 3-over-par 219 in the final round at Brasada to overtake first-round leader Broadmoor Club and win the tournament at 3-under 429. What makes Columbia Edgewater such a tough competitor at the Team Championship? "It's a player's club," said Randy Mahar, a 55-year-old stock broker. "There's just a lot of good players," said Scott Hval, a 50-year-old dentist who earned medalist honors at 6 under. "There are five or six players at home that didn't want to come." See Columbia / D5 INDEX Scoreboard ................................D2 NFL ............................................D3 Major League Baseball ............. D4 Golf ............................................D5 College football .........................D5 Motor sports............................. D6 Cycling Central......................... D6 POWELL BUTTE -- No club takes the Oregon Golf Association Men's Team Championship more seriously than Portland's Columbia Edgewater Country Club. "It's absolutely about pride," said Bill Winter, a member of Columbia Edgewater, which entered the 2011 Team Championship having won the tournament 29 times, more than any other club. "We're carrying on a tradition." Columbia Edgewater used that pride to come from behind on a breezy and overcast Sunday at the Club at Brasada Ranch to win the Team Championship for the 30th time. The four-golfer team from Columbia Andy Tullis / The Bulletin Mark Olsen of Columbia Edgewater Country Club tees off on the 13th hole while competing in the OGA Team Championship at The Brasada Ranch Canyons Golf Course Sunday afternoon. D2 Monday, October 3, 2011 � THE BULLETIN O A TELEVISION TODAY SOCCER Noon -- English Premier League, Tottenham vs. Arsenal (taped), Root Sports. SCOREBOARD ON DECK Today Boys soccer: Redmond at Summit, 4 p.m. Volleyball: Regis at Culver, 6 p.m. Tuesday Boys soccer: Mountain View at Crook County, 4 p.m. ; Madras at Molalla, 6 p.m.; Sweet Home at Sisters, 4:30 p.m.; Culver at Umatila, 4 p.m. Girls soccer: Redmond at Summit, 4 p.m.; Mountain View at Crook County, 4 p.m.; Molalla at Madras, 4 p.m.; Sisters at Sweet Home, 4:30 p.m.; La Pine at Cottage Grove, 7 p.m. Volleyball: Bend at Mountain View, 6:30 p.m.; Summit at Crook County, 6:30 p.m.; Madras at Molalla, 6 p.m.; La Pine at Sweet Home, 7:15 p.m.; Sisters at Junction City, 6:45 p.m.; Gilchrist at Prospect, 5 p.m.; Central Christian at North Lake, 4 p.m. Wednesday Volleyball: East Linn Christian at Culver, 6 p.m. Thursday Boys soccer: Redmond at Bend, 5 p.m.; Summit at Crook County, 5:30 p.m.; North Marion at Madras, 4 p.m.; Sisters at Elmira, 4:30 p.m. Girls soccer: Bend at Redmond, 5 p.m. ; Crook County at Summit, 4 p.m.; Madras at North Marion, 4 p.m.; Elmira at Sisters, 4:30 p.m.; Sweet Home at La Pine, 4:30 p.m. Volleyball: Redmond at Summit, 6:30 p.m.; Crook County at Mountain View, 6:30 p.m.; North Marion at Madras, 6 p.m.; La Pine at Elmira, 6:45 p.m.; Sisters at Sweet Home, 6:45 p.m. Friday Football: Mountain View at Redmond, 7 p.m.; Bend at Summit, 7 p.m.; Washoughal (Wash.) at Crook County, 7 p.m.; Gladstone at Madras, 7 p.m.; Elmira at Sisters, 7 p.m.; Sweet Home at La Pine, 7 p.m.; Scio at Culver, 7 p.m.; Camas Valley at Gilchrist, 4 p.m. Cross country: Redmond, Bend, Summit, Mountain View, Madras, Crook County, Sisters, La Pine at the Oxford Classic in Drake Park in Bend, noon Boys soccer: Culver at Central Christian, 4 p.m. Volleyball: Hosanna Christian at Gilchrist, 4 p.m.; Central Christian at Arlington, 5:30 p.m.; Paisley at Trinity Lutheran, 2 p.m. Saturday Boys soccer: Crook County at Sweet Home, 1 p.m.; Central Christian at Irrigon, 1 p.m. Volleyball: Redmond, Bend at Glencoe Tournament, TBA; Madras, La Pine at Junction City Tournament, 9 a.m.; Central Christian, Trinity Lutheran at Gilchrist Invitational, 9 a.m. Bend, 1:34:01. 37, Lenora James, Bend, 1:50:37. 38, Bill Harris, Albany, 1:50:46. IN THE BLEACHERS GOLF PGA Tour Justin Timberlake Shriners Hospitals for Children Open Sunday At TPC Summerlin Las Vegas Purse: $4.4 million Yardage: 7,243; Par: 71 Final Kevin Na, $792,000 67-63-66-65--261 Nick Watney, $475,200 65-67-64-67--263 Tommy Gainey, $255,200 67-67-64-68--266 Paul Goydos, $255,200 66-66-66-68--266 David Hearn, $149,160 69-67-66-65--267 Tim Herron, $149,160 65-66-67-69--267 Spencer Levin, $149,160 68-67-64-68--267 Carl Pettersson, $149,160 66-67-66-68--267 Jhonattan Vegas, $149,160 63-67-69-68--267 Ben Crane, $97,533 67-67-68-66--268 Scott Piercy, $97,533 67-65-70-66--268 Kris Blanks, $97,533 66-65-66-71--268 Hunter Haas, $97,533 71-61-72-64--268 Bryce Molder, $97,533 68-66-67-67--268 Kyle Stanley, $97,533 69-64-69-66--268 Billy Horschel, $61,726 66-66-70-67--269 Kevin Streelman, $61,726 66-66-69-68--269 Charlie Wi, $61,726 64-66-72-67--269 Robert Garrigus, $61,726 66-68-63-72--269 William McGirt, $61,726 63-69-68-69--269 Brendan Steele, $61,726 66-65-69-69--269 Roland Thatcher, $61,726 68-68-63-70--269 Stephen Ames, $38,060 71-67-65-67--270 Steven Bowditch, $38,060 67-69-66-68--270 Chad Campbell, $38,060 71-67-66-66--270 David Duval, $38,060 66-71-64-69--270 Nick O'Hern, $38,060 71-67-63-69--270 Kevin Stadler, $38,060 68-70-65-67--270 Kevin Kisner, $28,600 70-66-67-68--271 Bill Lunde, $28,600 70-66-66-69--271 Billy Mayfair, $28,600 67-70-68-66--271 Alex Prugh, $28,600 67-68-67-69--271 Boo Weekley, $28,600 67-65-71-68--271 Woody Austin, $22,220 68-69-66-69--272 Harrison Frazar, $22,220 65-69-67-71--272 Nathan Green, $22,220 64-72-67-69--272 Trevor Immelman, $22,220 67-67-69-69--272 Rod Pampling, $22,220 65-70-66-71--272 Garrett Willis, $22,220 65-68-68-71--272 Jonathan Byrd, $15,420 71-66-67-69--273 Bob Estes, $15,420 66-70-68-69--273 Brian Gay, $15,420 67-67-69-70--273 Martin Laird, $15,420 70-66-66-71--273 Tag Ridings, $15,420 69-68-67-69--273 Briny Baird, $15,420 68-69-69-67--273 Kevin Chappell, $15,420 69-67-70-67--273 Bobby Gates, $15,420 68-67-67-71--273 Charley Hoffman, $15,420 71-66-70-66--273 Jason Bohn, $11,117 70-66-67-71--274 Steve Flesch, $11,117 65-70-71-68--274 Joe Ogilvie, $11,117 68-66-67-73--274 Michael Bradley, $10,261 69-66-69-71--275 Greg Chalmers, $10,261 68-68-69-70--275 Ben Curtis, $10,261 69-68-70-68--275 Cameron Percy, $10,261 68-69-72-66--275 Tim Petrovic, $10,261 67-70-70-68--275 Blake Adams, $9,724 65-70-69-72--276 Joseph Bramlett, $9,724 70-66-70-70--276 Steve Elkington, $9,724 67-69-72-68--276 Derek Lamely, $9,724 65-71-68-72--276 Rocco Mediate, $9,724 67-71-68-70--276 Josh Teater, $9,724 71-64-70-71--276 Aron Price, $9,416 68-70-69-70--277 Arjun Atwal, $9,196 66-70-69-73--278 Ricky Barnes, $9,196 70-68-70-70--278 John Merrick, $9,196 67-71-71-69--278 Vaughn Taylor, $9,196 65-69-68-76--278 D.J. Brigman, $8,888 67-66-72-74--279 Scott McCarron, $8,888 71-65-70-73--279 Will Strickler, $8,888 66-70-73-70--279 Nate Smith, $8,668 67-68-74-72--281 Paul Stankowski, $8,668 67-71-71-72--281 Cameron Beckman, $8,492 72-64-73-73--282 Cameron Tringale, $8,492 66-71-72-73--282 Made cut, did not finish Michael Thompson, $8,360 68-70-72--210 Justin Hicks, $8,228 71-67-73--211 George McNeill, $8,228 69-69-73--211 J.P. Hayes, $8,052 69-68-75--212 Duffy Waldorf, $8,052 69-68-75--212 Fran Quinn, $7,920 71-67-76--214 BASEBALL 2 p.m. -- MLB Playoffs, AL Division Series, Texas Rangers at Tampa Bay Rays, TBS. 5:30 p.m. -- MLB Playoffs, AL Division Series, New York Yankees at Detroit Tigers, TBS. FOOTBALL 5:30 p.m. -- NFL, Indianapolis Colts at Tampa Bay Buccaneers, ESPN. 270 374 302 347 352 319 322 293 323 257 Total Defense Plays Stanford 261 California 245 Colorado 325 Arizona St. 341 Utah 279 Washington St. 276 Oregon St. 263 Southern California 344 Oregon 322 UCLA 342 Washington 361 Arizona 344 Stanford Arizona California Southern California Arizona St. UCLA Washington Oregon St. Colorado Utah 1886 2298 1825 2272 2130 1988 1956 1543 1832 1414 471.5 459.6 456.3 454.4 426.0 397.6 391.2 385.8 366.4 353.5 Yds Yds Pg 1248 312.0 1257 314.2 1747 349.4 1774 354.8 1439 359.7 1447 361.7 1488 372.0 1898 379.6 1558 389.5 2091 418.2 2135 427.0 2518 503.6 TUESDAY BASEBALL 11 a.m. -- MLB Playoffs, AL Division Series, Texas Rangers at Tampa Bay Rays, TBS. 2 p.m. -- MLB Playoffs, NL Division Series, Philadelphia Phillies at St. Louis Cardinals, TBS. 5:30 p.m. -- MLB Playoffs, AL Division Series, New York Yankees at Detroit Tigers, TBS. 6:30 p.m. -- MLB Playoffs, NL Division Series, Milwaukee Brewers at Arizona Diamondbacks, TNT. TENNIS ATP ASSOCIATION OF TENNIS PROFESSIONALS ------ Thailand Open Sunday At Impact Arena Bangkok, Thailand Purse: $608,500 (WT250) Surface: Hard-Indoor Singles Championship Andy Murray (1), Britain, def. Donald Young, United States, 6-2, 6-0. NEERS -- COLTS: OUT: QB Peyton Manning (neck). DNP: QB Kerry Collins (head), G Ryan Diem (ankle), TE Brody Eldridge (knee), DT Fili Moala (ankle), T Joe Reitz (ankle), LB Ernie Sims (knee). FULL: S Antoine Bethea (heel), DE Dwight Freeney (ankle). BUCCANEERS: No Data Reported. USA Today Top 25 Poll The USA Today Top 25 football coaches poll, with first-place votes in parentheses, records through Oct. 1, total points based on 25 points for first place through one point for 25th, and previous ranking: Record Pts Pvs 1. Oklahoma (27) 4-0 1,421 1 2. LSU (21) 5-0 1,410 2 3. Alabama (10) 5-0 1,408 2-1 456 12 19. West Virginia 4-1 436 23 20. Michigan State 4-1 366 25 21. Kansas State 4-0 264 -- 22. Florida State 2-2 229 24 23. Auburn 4-1 217 -- 24. Arizona State 4-1 177 -- 25. Texas A&M 2-2 160 13. Late Saturday Summary Malaysian Open Sunday At Putra Stadium Kuala Lumpur, Malaysia Purse: $947,750 (WT250) Surface: Hard-Indoor Singles Championship Janko Tipsarevic (3), Serbia, def. Marcos Baghdatis, Cyprus, 6-4, 7-5. SOCCER 3 p.m. -- UEFA Champions League, Arsenal vs. Olympiacos (taped), Root Sports. 5 p.m. -- MLS, Los Angeles Galaxy at New York Red Bulls, ESPN2. Betting Line NFL (Home teams in Caps) Favorite Opening Current Underdog Today BUCCANEERS 10 10 Colts WTA WOMEN'S TENNIS ASSOCIATION China Open Sunday At The Beijing Tennis Centre Beijing Purse: Men, $3.337 million (WT500); Women, $4.5 million (Premier) Surface: Hard-Outdoor Women Singles First Round Kaia Kanepi, Estonia, def. Zheng Saisai, China, 6-0, 6-3. Sabine Lisicki (14), Germany, def. Irina-Camelia Begu, Romania, 6-2, retired. Daniela Hantuchova, Slovakia, def. Eleni Daniilidou, Greece, 6-4, 6-2. Dominika Cibulkova, Slovakia, def. Zhang Shuai, China, 6-0, 6-2. Ana Ivanovic, Serbia, def. Kimiko Date-Krumm, Japan, 6-1, 6-1. Monica Niculescu, Romania, def. Li Na (4), China, 6-4, 6-0. Marion Bartoli (8), France, def. Iveta Benesova, Czech Republic, 3-6, 6-4, 7-5. Christina McHale, United States, def. Ayumi Morita, Japan, 6-2, 0-6, 6-3. Carla Suarez Navarro, Spain, def. Ekaterina Makarova, Russia, 7-5, 6-1. Anastasia Pavlyuchenkova (13), Russia, def. Barbora Zahlavova Strycova, Czech Republic, 7-5, 6-4. Maria Jose Martinez Sanchez, Spain, def. Shahar Peer, Israel, 6-1, 7-5. Polona Hercog, Slovenia, def. Laura Robson, Britain, 6-4, 6-3. Sam Stosur (6), Australia, def. Tsvetana Pironkova, Bulgaria, 6-4, 6-0. Chanelle Scheepers, South Africa, def. Hu Yue-Yue, China, 6-0, 5-7, 6-0. VOLLEYBALL 6:30 p.m. -- High school, Bend at Mountain View, COTV. RUNNING Dirty 2nd Half Marathon Sunday, Bend Place, name, town, time 1, Thomas Brooks, Portland, 1:15:24. 2, Mario Mendoza, Bend, 1:18:34. 3, Ian Sharman, Bend, 1:26:16. 4, Peter Vraniak, Bend, 1:29:09. 5, Teague Hatfield, Bend, 1:32:46. 6, David Cleveland, Prineville, 1:33:43. 7, Jeff Jones, Bend, 1:34:00. 8, Stacey Cleveland, Penticton, 1:34:04. 9, Mark Robins, Salem, 1:34:38. 10, Spike Widmer, Bend, 1:35:02. 11, Shawn Diez, Sisters, 1:35:46. 12, Gary Thompson, Bend, 1:37:08. 13, Marcy Schreiber, Bend, 1:37:26. 14, Ron Deems, Bend, 1:37:52. 15, Bretagne DowHygelun, Sunriver, 1:40:13. 16, Jason Bosch, Eugene, 1:40:17. 17, Ahna Jura, Bend, 1:41:00. 18, Tj Paskewich, Bend, 1:41:46. 19, Erica Johnson, Bend, 1:42:06. 20, Krissy Moehl, 1:42:08. 21, Jeffrey McAlpine, Portland, 1:43:07. 22, Sadie Evans, Bend, 1:43:53. 23, Kari Strang, Bend, 1:44:23. 24, Mike Harrington, Bend, 1:44:33. 25, Andrew Robinson, Eugene, 1:44:36. 26, Hailey Garside, 1:44:43. 27, Tom Blanchette, Redmond, 1:45:04. 28, Dan St Germain, Bend, 1:45:16. 29, Marianne Falk, 1:45:23. 30, Suzanne King, Bend, 1:45:52. 31, Rod Thompson, Bend, 1:46:00. 32, Murray Biddulph, Troutdale, 1:46:18. 33, Aaron Walton, Bend, 1:46:20. 34, Heidi Washenberger, 1:47:00. 35, Sam Friedman, Roseburg, 1:47:57. 36, Don Rowden, 1:48:53. 37, Kristen Ball, Roseburg, 1:49:45. 38, John Weinsheim, Redmond, 1:51:01. 39, Keith Bell, Bend, 1:51:49. 40, Chris Linkhorn, Eugene, 1:52:03. 41, Andrew Zapp, Bend, 1:52:41. 42, Julia Eidukas, Bend, 1:53:05. 43, Carey Connell, Tualatin, 1:53:23. 44, Jim Woodrich, 1:53:51. 45, George McConnell, Bend, 1:53:52. 46, Curtis Brawner, Bend, 1:54:00. 47, David Sieveking, Bend, 1:54:08. 48, Rebecca Seyferth, John Day, 1:54:11. 49, Allison Dubenezic, Corvallis, 1:54:24. 50, James Wellington, Bend, 1:54:29. 51, Lindy Vraniak, Bend, 1:54:31. 52, Cambria Gilsdorf, Bend, 1:54:33. 53, Chantelle Russell, Eugene, 1:54:48. 54, Karen Tuvey, Bend, 1:55:04. 55, Ashley Johnson, Bend, 1:55:14. 56, Erik Rook, Long Creek, 1:55:25. 57, Chris Bothman, Eugene, 1:55:55. 58, Chuck Arnold, Bend, 1:55:57. 59, Alexis Eudy, Bend, 1:56:02. 60, Steve Coughran, Bend, 1:56:20. 61, Neale Druffel, Bend, 1:56:25. 62, Sharon Sieveking, Bend, 1:56:28. 63, Caitlin Mastenbroek, Bend, 1:56:29. 64, Jake Slodki, Bend, 1:57:07. 65, Ryan Macy, Bend, 1:57:29. 66, Jeff Halsey, Fresno, Calif., 1:57:48. 67, Ross Fuhrman, Corvallis, 1:57:49. 68, Brandi Fuhrman, Corvallis, 1:57:50. 69, John Foley, 1:58:00. 70, Joe Mosley, Eugene, 1:58:21. 71, Jonathan Williams, 1:58:41. 72, Keith Aller, Sunriver, 1:58:55. 73, La'nette Pike, La Pine, 1:58:57. 74, Mark Hubler, Bend, 2:00:16. 75, Steve Walters, Beaverton, 2:00:32. 76, Bryon Bahns, 2:00:41. 77, Tanya Hackett, Bend, 2:00:49. 78, Daniel Ridgeway, Boise, Idaho, 2:00:49. 79, Karin Tsiatsos, 2:00:51. 80, Jim Buck, Gresham, 2:01:26. 81, Renae Gibbons, 2:01:46. 82, Laura Blossey, Bend, 2:01:47. 83, Amy McDonald, 2:01:47. 84, Terri Silliman, Eugene, 2:01:50. 85, Troy Longstroth, Redmond, 2:02:14. 86, Dana Carmichael, 2:02:20. 87, Kelly Bates, Salem, 2:02:26. 88, Sharon Mosley, Eugene, 2:02:51. 89, Ed Busch, Bend, 2:03:17. 90, Bethany Harrington, Bend, 2:04:19. 91, Steve Strang, Bend, 2:04:26. 92, Drexell Barnes, Bend, 2:04:46. 93, Paige Barnes, Bend, 2:04:47. 94, Gary Winter, Bend, 2:04:51. 95, Deana Wyland, Albany, 2:05:24. 96, Katy Polluconi, Bend, 2:05:27. 97, Eva Cihon, Bend, 2:05:29. 98, Ken Koch Richter, Brownsville, 2:05:33. 99, Jodi Steiner, Albany, 2:05:41. 100, Ruth Ann Clarke, Bend, 2:05:48. 101, Gretchen Peed, Redmond, 2:05:49. 102, Diana Vesely, Bend, 2:05:52. 103, Justine Lucia, Bend, 2:05:55. 104, Deb Badger, Powell Butte, 2:05:57. 105, Angie Hubler, Bend, 2:06:04. 106, Jennifer Williams, Bend, 2:06:09. 107, Arnie Kubiak, Bainbridge Island, Wash., 2:06:13. 108, Stacey Wimberly, Bend, 2:06:45. 109, Pete Seashols, Bend, 2:06:47. 110, Carrie Dejohn, Bend, 2:07:04. 111, Topher Root, Bend, 2:07:09. 112, John Millslagle, Bend, 2:08:27. 113, Ron Hampton, Newberg, 2:08:46. 114, Heidi Weiss-Hoffman, Bend, 2:09:09. 115, Dave Bilyeu, Bend, 2:09:54. 116, Mike Doherty, 2:09:56. 117, Brendon Connelly, Newberg, 2:10:53. 118, Morris Roberts, Winchester, 2:10:59. 119, Jennifer Banning, Sisters, 2:11:02. 120, Becky Eriksson, Bend, 2:11:09. 121, William Johnson, Bend, 2:11:31. 122, Annette Benedetti, Bend, 2:11:33. 123, Erin Hernley, Salem, 2:13:06. 124, Andrea Paskewich, Bend, 2:16:12. 125, Ashley Perry, 2:16:57. 126, Jayne Root, Bend, 2:16:58. 127, Thomas Bahrman, Bend, 2:17:01. 128, Marla Hacker, Bend, 2:17:08. 129, Sha-Marie Brown, Bend, 2:17:42. 130, Roger Daniels, Bend, 2:18:10. 131, Jill Briskey, Culver, 2:18:10. 132, Ron Taylor, Bend, 2:19:44. 133, Laurel Weiland, Bend, 2:19:49. 134, Kim Legowik, Everett, Wash., 2:20:53. 135, Kayla Dievendorf, Bend, 2:22:07. 136, Corrinne Leblanc, Albany, 2:22:57. 137, Rebecca Bell, Bend, 2:24:29. 138, Jeffrey Timm, Bend, 2:24:32. 139, Susan Gotshall, Bend, 2:25:48. 140, Sam Hager, Bend, 2:25:51. 141, Lura Wilhelm, Bend, 2:25:54. 142, Jenny Schossow, Bend, 2:26:27. 143, Sarah Rush, Bend, 2:30:18. 144, Angela Roberts, Winchester, 2:34:08. 145, Debbie Foster, Kuna, Idaho, 2:35:29. 146, Mike Seashols, Bend, 2:37:49. 147, Travis Raymond, Albany, 2:52:04. 148, Jeanette King, Bend, 2:59:01. 149, Nathan Thompson, Redmond, 3:01:45. Dirty 2nd Half Marathon Sunday, Bend Place, name, town, time 1, Jason Townsend, Bend, 43:09. 2, Danny Harris, Bend, 44:19. 3, Curt Gibson, Prineville, 45:19. 4, Mary Wellington, Bend, 46:55. 5, John Seasholtz, not available, 48:35. 6, Peter Hatton, Bend, 49:38. 7, Keli Timm, Bend, 49:40. 8, Nicole Smith, Bend, 49:41. 9, Bambi Will, Bend, 51:23. 10, Mike Edgerton, Bend, 52:20. 11, Emily Cleveland, not available, 53:45. 12, Russell Ward, Bend, 54:34. 13, Nate Pedersen, Bend, 54:49. 14, Rich Fox, Bend, 56:30. 15, Chris Clemow, not available, 57:06. 16, James Watts, not available, 58:43. 17, Stephanie Robins, Salem, 58:47. 18, Rick Saenz, Bend, 59:04. 19, Kevin Iverson, Bend, 59:40. 20, Leticia Iverson, Bend, 1:01:00. 21, Dayna Ralston, not available, 1:01:15. 22, Gavin Hall, not available, 1:01:19. 23, Andrew Timm, Bend, 1:01:38. 24, Sheri Philpott, Terrebonne, 1:03:20. 25, Teri Champlin, not available, 1:03:51. 26, Karen Tonsfeldt, Portland, 1:03:52. 27, Crystal Clarke, Bend, 1:04:20. 28, Jimmy Clarke, Bend, 1:04:20. 29, Dominic Ficcojuslen, Bend, 1:08:42. 30, Katie Gillette, not available, 1:09:17. 31, Melissa Durham, Sunriver, 1:11:53. 32, Wendy Mahaney, Bend, 1:11:53. 33, Pam Harris, Albany, 1:16:26. 34, Jennifer Vracin, not available, 1:16:45. 35, Anna Higgins, Bend, 1:16:45. 36, Linda Fisher-Berlang, College Schedule All Times PDT (Subject to change) Thursday's Games SOUTH W. Kentucky at Middle Tennessee, 4:30 p.m. FAR WEST California at Oregon, 6 p.m. ------ Friday's Game FAR WEST Boise St. at Fresno St., 6 p.m. ------ Saturday's Games EAST Villanova at New Hampshire, 9 a.m. UConn at West Virginia, 9 a.m. Dartmouth at Yale, 9 a.m. Holy Cross at Brown, 9:30 a.m. Sacred Heart at Columbia, 9:30 a.m. Harvard at Cornell, 9:30 a.m. Duquesne at Albany (NY), 10 a.m. Stonehill at Bryant, 10 a.m. Lehigh at Bucknell, 10 a.m. Colgate at Monmouth (NJ), 10 a.m. Old Dominion at Rhode Island, 10 a.m. Georgetown at Wagner, 10 a.m. Ohio at Buffalo, 12:30 p.m. Southern Miss. at Navy, 12:30 p.m. Iowa at Penn St., 12:30 p.m. Pittsburgh at Rutgers, 12:30 p.m. William & Mary at Delaware, 3 p.m. Fordham at Penn, 3 p.m. Presbyterian at Stony Brook, 3 p.m. CCSU at UMass, 3 p.m. St. Francis (Pa.) at Robert Morris, 4 p.m. Richmond at Towson, 4:30 p.m. SOUTH Butler at Campbell, 9 a.m. Maryland at Georgia Tech, 9 a.m. Dayton at Jacksonville, 9 a.m. Louisville at North Carolina, 9 a.m. Mississippi St. at UAB, 9 a.m. Kentucky at South Carolina, 9:20 a.m. Florida St. at Wake Forest, 9:30 a.m. Marist at Davidson, 10 a.m. Norfolk St. at Delaware St., 10 a.m. Murray St. at Georgia St., 10 a.m. Princeton at Hampton, 10 a.m. Drake at Morehead St., 10 a.m. Savannah St. at Morgan St., 10 a.m. Wofford at The Citadel, 10 a.m. Samford at Furman, 10:30 a.m. Bethune-Cookman at NC A&T, 10:30 a.m. NC Central at SC State, 10:30 a.m. MVSU at Alabama A&M, 11 a.m. Boston College at Clemson, noon Howard at Florida A&M, noon Chattanooga at Georgia Southern, noon Cent. Arkansas at Nicholls St., noon Austin Peay at UT-Martin, noon Elon at W. Carolina, noon Maine at James Madison, 12:30 p.m. Florida at LSU, 12:30 p.m. Cent. Michigan at NC State, 12:30 p.m. Miami at Virginia Tech, 12:30 p.m. Ark.-Pine Bluff at Jackson St., 2 p.m. Liberty at Gardner-Webb, 3 p.m. Vanderbilt at Alabama, 4 p.m. VMI at Coastal Carolina, 4 p.m. Troy at Louisiana-Lafayette, 4 p.m. Arkansas St. at Louisiana-Monroe, 4 p.m. Prairie View at Southern U., 4 p.m. Georgia at Tennessee, 4 p.m. SE Missouri at Tennessee St., 4 p.m. Marshall at UCF, 4 p.m. Texas St. at McNeese St., 5 p.m. Syracuse at Tulane, 5 p.m. MIDWEST Minnesota at Purdue, 9 a.m. Army at Miami (Ohio), 10 a.m. FIU at Akron, 11 a.m. Temple at Ball St., 11 a.m. Montana Western at North Dakota, 11 a.m. San Diego at Valparaiso, 11 a.m. Bowling Green at W. Michigan, 11 a.m. E. Kentucky at E. Illinois, 11:30 a.m. Illinois at Indiana, 11:30 a.m. Illinois St. at Missouri St., noon N. Dakota St. at S. Illinois, noon E. Michigan at Toledo, noon Missouri at Kansas St., 12:30 p.m. Kent St. at N. Illinois, 12:30 p.m. Air Force at Notre Dame, 12:30 p.m. S. Dakota St. at Youngstown St., 1 p.m. Indiana St. at N. Iowa, 2 p.m. S. Utah at South Dakota, 2 p.m. Michigan at Northwestern, 4 p.m. Ohio St. at Nebraska, 5 p.m. SOUTHWEST Oklahoma vs. Texas at Dallas, 9 a.m. Memphis at Rice, 9:30 a.m. Alabama St. at Texas Southern, 11 a.m. Stephen F. Austin vs. Sam Houston St. at Houston, noon Kansas at Oklahoma St., 12:30 p.m. South Alabama at UTSA, 2:30 p.m. Auburn at Arkansas, 4 p.m. Iowa St. at Baylor, 4 p.m. East Carolina at Houston, 4 p.m. Northwestern St. at Lamar, 4 p.m. Texas A&M at Texas Tech, 4 p.m. FAU at North Texas, 4:30 p.m. FAR WEST Arizona at Oregon St., 12:30 p.m. Arizona St. at Utah, 12:30 p.m. Sacramento St. at N. Colorado, 12:35 p.m. Montana St. at Portland St., 1:05 p.m. Louisiana Tech at Idaho, 2 p.m. Montana at Idaho St., 3 p.m. E. Washington at N. Arizona, 3:05 p.m. Cent. Oklahoma at Cal Poly, 4:05 p.m. UNLV at Nevada, 4:05 p.m. Colorado at Stanford, 4:30 p.m. Wyoming at Utah St., 5 p.m. Humboldt St. at UC Davis, 6 p.m. San Jose St. at BYU, 7:15 p.m. TCU at San Diego St., 7:30 p.m. Washington St. at UCLA, 7:30 p.m. Polls The AP Top 25 The Top 25 teams in The Associated Press college football poll, with first-place votes in parentheses, records through Oct. 1, total points based on 25 points for a first-place vote through one point for a 25th-place vote, and previous ranking: RADIO TODAY BASEBALL 2 p.m. -- MLB Playoffs, AL Division Series, Texas Rangers at Tampa Bay Rays, KICE-AM 940. Listings are the most accurate available. The Bulletin is not responsible for late changes made by TV or radio stations. S B Tennis � Tipsarevic beats Baghdatis to win Malaysian Open: Janko Tipsarevic, of Serbia, defeated Marcos Baghdatis, of Cyprus, 6-4, 7-5 Sunday to win the Malaysian Open in Kuala Lumpur, capturing his first ATP World Tour title in his fifth final. The 27-year-old Tipsarevic had been the only top-20 player without an ATP title. The No. 3 seed clawed his way back into the match after trailing 0-3 in the first set to win in 2 hours, 6 minutes. Tipsarevic ended a fine run by Baghdatis, a wild card entry who ousted three of the Malaysian Open's top-six seeds. Baghdatis, a former top-10 player, had been trying to revive his flagging season after starting the year ranked No. 20, but since falling 40 spots. � Murray beats Young in Thailand Open final: Fourthranked Andy Murray claimed his 19th career title in beating American Donald Young 6-2, 6-0 in the final of the Thailand Open on Sunday in Bangkok. The top-seeded Briton was in complete control throughout the 48-minute match, exploiting the lack of experience and unforced errors from his 55thranked opponent. Young was playing in his first tour final. "I just played really well," Murray said. "Towards the end of the first set, he started playing well. But after that I hardly made any mistakes. I felt like I was moving well. It was difficult for him to hit any clean winners. He had to work hard for a lot of points." 7. (7) A J Allmendinger, Ford, 400, 103.1, 38, $127,836. 8. (27) Clint Bowyer, Chevrolet, 400, 91.1, 36, $140,558. 9. (12) Marcos Ambrose, Ford, 400, 98, 35, $114,741. 10. (22) Kevin Harvick, Chevrolet, 400, 98.2, 35, $129,861. 11. (13) Jeff Burton, Chevrolet, 400, 84.5, 34, $89,500. 12. (34) Jeff Gordon, Chevrolet, 400, 86.3, 32, $116,786. 13. (14) David Reutimann, Toyota, 400, 86.9, 31, $107,058. 14. (30) Brian Vickers, Toyota, 400, 74.8, 30, $103,964. 15. (23) Jamie McMurray, Chevrolet, 400, 75.9, 29, $111,539. 16. (3) Paul Menard, Chevrolet, 400, 78.6, 28, $83,250. 17. (16) Regan Smith, Chevrolet, 400, 67.5, 27, $101,195. 18. (11) Denny Hamlin, Toyota, 400, 72.2, 26, $118,950. 19. (17) Mark Martin, Chevrolet, 400, 74.7, 25, $82,350. 20. (15) Brad Keselowski, Dodge, 400, 84.6, 25, $98,808. 21. (19) David Ragan, Ford, 399, 60.8, 23, $83,350. 22. (24) Juan Pablo Montoya, Chevrolet, 398, 60.1, 22, $111,258. 23. (20) Ryan Newman, Chevrolet, 398, 59.8, 21, $113,100. 24. (21) Dale Earnhardt Jr., Chevrolet, 398, 68.7, 20, $81,225. 25. (28) Tony Stewart, Chevrolet, 398, 59.4, 19, $115,683. 26. (8) Bobby Labonte, Toyota, 398, 65.5, 18, $99,145. 27. (10) Greg Biffle, Ford, 397, 86.5, 17, $87,800. 28. (36) David Gilliland, Ford, 397, 46.7, 16, $87,558. 29. (33) Joey Logano, Toyota, 397, 52, 15, $80,150. 30. (1) Martin Truex Jr., Toyota, 396, 70.9, 15, $93,100. 31. (25) Landon Cassill, Chevrolet, 395, 42.5, 0, $83,983. 32. (41) Dave Blaney, Chevrolet, 395, 39.6, 12, $78,172. 33. (37) Andy Lally, Ford, 394, 38.1, 11, $78,925. 34. (43) J.J. Yeley, Ford, 390, 34.2, 10, $68,300. 35. (39) Casey Mears, Toyota, 366, 41.9, 9, $68,075. 36. (40) Mike Bliss, Ford, accident, 346, 39.1, 0, $67,925. 37. (26) Josh Wise, Ford, brakes, 56, 39.5, 0, $67,800. 38. (38) Reed Sorenson, Dodge, electrical, 52, 36.4, 0, $67,650. 39. (42) Joe Nemechek, Toyota, clutch, 49, 31.9, 0, $67,500. 40. (35) Michael McDowell, Toyota, fuel pump, 44, 34.2, 5, $67,325. 41. (31) David Stremme, Chevrolet, vibration, 31, 30.8, 3, $67,125. 42. (29) Scott Speed, Ford, brakes, 24, 31.7, 0, $66,995. 43. (32) Travis Kvapil, Ford, ignition, 12, 28.3, 0, $67,329. ------ Race Statistics Average Speed of Race Winner: 119.413 mph. Time of Race: 3 hours, 30 minutes, 59 seconds. Margin of Victory: 0.908 seconds. Caution Flags: 10 for 44 laps. Lead Changes: 24 among 13 drivers. Lap Leaders: M.Truex Jr. 1-2; Ku.Busch 3-41; M.Bliss 42; M.McDowell 43; R.Sorenson 44; Ku.Busch 45-51; C.Edwards 52-110; Ky.Busch 111; J.Johnson 112-113; B.Keselowski 114-115; C.Edwards 116-138; J.Burton 139-142; C.Edwards 143-176; A.Allmendinger 177-184; K.Harvick 185194; J.Johnson 195-247; M.Kenseth 248; J.Burton 249-252; M.Kenseth 253-254; J.Johnson 255-300; Ku.Busch 301; J.Johnson 302-353; Ku.Busch 354; J.Johnson 355-358; Ku.Busch 359-400. Leaders Summary (Driver, Times Led, Laps Led): J.Johnson, 5 times for 157 laps; C.Edwards, 3 times for 116 laps; Ku.Busch, 5 times for 90 laps; K.Harvick, 1 time for 10 laps; A.Allmendinger, 1 time for 8 laps; J.Burton, 2 times for 8 laps; M.Kenseth, 2 times for 3 laps; B.Keselowski, 1 time for 2 laps; M.Truex Jr., 1 time for 2 laps; Ky.Busch, 1 time for 1 lap; M.Bliss, 1 time for 1 lap; R.Sorenson, 1 time for 1 lap; M.McDowell, 1 time for 1 lap. Top 12 in Points: 1. K.Harvick, 2,122; 2. C.Edwards, 2,122; 3. T.Stewart, 2,113; 4. Ku.Busch, 2,113; 5. J.Johnson, 2,109; 6. Bra.Keselowski, 2,108; 7. M.Kenseth, 2,108; 8. Ky.Busch, 2,107; 9. J.Gordon, 2,103; 10. D.Earnhardt Jr., 2,088; 11. R.Newman, 2,081; 12. D.Hamlin, 2,054. IndyCar Kentucky Indy 300 Results Sunday At Kentucky Speedway Sparta, Ky. Lap length: 1.5 miles (Starting position in parentheses) All cars Dallara chassis, Honda engine 1. (4) Ed Carpenter, 200 laps. 2. (11) Dario Franchitti, 200. 3. (7) Scott Dixon, 200. 4. (3) James Hinchcliffe, 200. 5. (8) Ryan Hunter-Reay,) Charlie Kimball, 200. 14. (28) Dan Wheldon, 200. 15. (22) Takuma Sato, 200. 16. (21) Vitor Meira, 200. 17. (19) Tony Kanaan, 200. 18. (12) Mike Conway, 200. 19. (1) Will Power, 200. 20. (5) J.R. Hildebrand, 199. 21. (27) James Jakes, 198. 22. (29) Pippa Mann, 197. 23. (23) E.J. Viso, 192. 24. (20) Ana Beatriz, 165, contact. 25. (13) Simona de Silvestro, 141, mechanical. 26. (24) Alex Lloyd, 140, contact. 27. (6) Marco Andretti, 140, contact. 28. (25) Dillon Battistini, 124, driver fatigue. 29. (16) Helio Castroneves, 34, mechanical. Race Statistics Winners average speed: 174.039 mph. Time of Race: 1:42:02.7825. Margin of Victory: 0.0098 seconds. Cautions: 3 for 32 laps. Lead Changes: 7 among 4 drivers. Lap Leaders: Power 1-48, Hildebrand 49, Franchitti 50-187, Carpenter 188, Franchitti 189-190, Carpenter 191-192, Franchitti 193-195, Carpenter 196-200. Points: Franchitti 573, Power 555, Dixon 518, Servia 425, Kanaan 366, Briscoe 364, Hunter-Reay 347, M.Andretti 337, Rahal 320, Patrick 314. Champions Tour SAS Championship Sunday At Prestonwood Country Club Cary, N.C. Purse: $2.1 million Yardage: 7,212; Par 72 Final Kenny Perry (315), $315,000 66-69-70--205 John Huston (168), $168,000 69-66-71--206 Jeff Sluman (168), $168,000 67-69-70--206 Russ Cochran (126), $126,000 66-71-71--208 Fred Couples (101), $100,800 68-71-70--209 Jay Don Blake (71), $71,400 68-72-70--210 J.L. Lewis (71), $71,400 67-73-70--210 Chien Soon Lu (71), $71,400 72-68-70--210 Nick Price (71), $71,400 66-69-75--210 Mark Calcavecchia (53), $52,500 73-70-68--211 Bob Gilder (53), $52,500 69-70-72--211 Tommy Armour III (0), $44,100 71-68-73--212 Tom Lehman (0), $44,100 69-71-72--212 Dan Forsman (0), $36,750 70-73-70--213 Eduardo Romero (0), $36,750 73-68-72--213 Scott Simpson (0), $36,750 69-76-68--213 Rod Spittle (0), $36,750 67-72-74--213 Chip Beck (0), $27,846 69-73-72--214 Tom Kite (0), $27,846 72-69-73--214 Corey Pavin (0), $27,846 65-74-75--214 Joey Sindelar (0), $27,846 70-75-69--214 Hal Sutton (0), $27,846 68-73-73--214 Mark Brooks (0), $20,580 71-74-70--215 Olin Browne (0), $20,580 68-70-77--215 Gary Hallberg (0), $20,580 66-78-71--215 Morris Hatalsky (0), $20,580 69-77-69--215 Steve Jones (0), $20,580 68-72-75--215 Craig Stadler (0), $20,580 70-72-73--215 Ronnie Black (0), $16,590 69-73-74--216 Phil Blackmar (0), $16,590 75-69-72--216 Joe Ozaki (0), $16,590 72-72-72--216 David Frost (0), $13,860 70-72-75--217 Bill Glasson (0), $13,860 75-72-70--217 Lonnie Nielsen (0), $13,860 73-71-73--217 D.A. Weibring (0), $13,860 72-70-75--217 Mark Wiebe (0), $13,860 71-76-70--217 Brad Faxon (0), $10,290 72-69-77--218 Gary Koch (0), $10,290 72-75-71--218 Larry Mize (0), $10,290 72-73-73--218 Larry Nelson (0), $10,290 72-71-75--218 David Peoples (0), $10,290 76-71-71--218 Loren Roberts (0), $10,290 74-70-74--218 Ted Schulz (0), $10,290 70-73-75--218 Peter Senior (0), $10,290 67-73-78--218 Bob Tway (0), $10,290 78-69-71--218 Bobby Clampett (0), $7,770 69-69-81--219 Vicente Fernandez (0), $7,770 72-75-72--219 Tom Purtzer (0), $7,770 71-74-74--219 Bruce Fleisher (0), $5,483 74-73-73--220 Scott Hoch (0), $5,483 70-75-75--220 Dana Quigley (0), $5,483 70-75-75--220 Keith Fergus (0), $5,483 74-73-73--220 Mike Goodes (0), $5,483 77-73-70--220 Bernhard Langer (0), $5,483 73-77-70--220 Mark McNulty (0), $5,483 77-72-71--220 Jim Rutledge (0), $5,483 72-76-72--220 Jim Thorpe (0), $5,483 73-76-71--220 Jim Gallagher, Jr. (0), $3,780 73-76-72--221 Wayne Levi (0), $3,780 71-76-74--221 Dave Rummells (0), $3,780 74-75-72--221 Tim Simpson (0), $3,780 70-76-75--221 Bobby Wadkins (0), $3,780 69-75-77--221 Fulton Allem (0), $2,835 70-77-75--222 John Harris (0), $2,835 72-72-78--222 Tom Jenkins (0), $2,835 72-76-74--222 Curtis Strange (0), $2,835 76-70-76--222 John Cook (0), $2,128 75-73-75--223 Peter Jacobsen (0), $2,128 74-76-73--223 Mike Reid (0), $2,128 73-80-70--223 Steve Lowery (0), $1,848 71-76-78--225 Fuzzy Zoeller (0), $1,722 74-75-77--226 Steve Pate (0), $1,596 76-76-75--227 Hale Irwin (0), $1,470 72-76-80--228 Joe Daley (0), $1,386 72-80-77--229 David Eger (0), $1,302 71-84-76--231 Gil Morgan (0), $1,218 78-75-79--232 Doug Tewell (0), $1,134 75-78-80--233 Ben Crenshaw (0), $1,050 78-76-81--235 SOCCER MLS MAJOR LEAGUE SOCCER All Times PDT ------ EASTERN CONFERENCE W L T Pts GF Sporting Kansas City 11 9 12 45 47 Philadelphia 10 7 14 44 41 Columbus 12 12 8 44 38 Houston 10 9 13 43 40 New York 8 7 16 40 47 D.C. 9 10 11 38 46 Chicago 7 8 16 37 40 Toronto FC 6 13 13 31 33 New England 5 14 12 27 35 WESTERN CONFERENCE W L T Pts GF x-Los Angeles 18 3 10 64 46 x-Seattle 16 6 9 57 51 x-Real Salt Lake 15 10 6 51 43 FC Dallas 13 11 7 46 36 Colorado 11 9 12 45 42 Portland 11 13 7 40 38 Chivas USA 8 12 12 36 40 San Jose 6 11 14 32 33 Vancouver 4 16 10 22 29 NOTE: Three points for victory, one point for tie. x- clinched playoff berth ------ Sunday's Games Columbus 2, D.C. United 1 Portland 1, Vancouver 0 Chivas USA 1, Philadelphia 1, tie Tuesday's Game Los Angeles at New York, 5 p.m. Thursday's Game Real Salt Lake at Vancouver, 6:30 p.m. GA 40 34 41 40 42 46 40 56 51 GA 23 33 32 34 40 44 39 40 50 No. 25 Arizona St. 35, Oregon St. 20 Oregon St. Arizona St. 6 7 7 0 -- 20 0 21 7 7 -- 35 First Quarter OrSt--FG Romaine 34, 10:50. OrSt--FG Romaine 21, 7:04. Second Quarter OrSt--Ward 10 run (Romaine kick), 14:40. ASU--Pickens 17 pass from Osweiler (Garoutte kick), 12:27. ASU--G.Robinson 24 pass from Osweiler (Garoutte kick), 7:56. ASU--Miles 78 punt return (Garoutte kick), 6:11. Third Quarter OrSt--Rodgers 5 pass from Mannion (Romaine kick), 8:43. ASU--C.Marshall 37 run (Garoutte kick), 6:17. Fourth Quarter ASU--C.Marshall 8 run (Garoutte kick), 14:49. A--57,437. ------ OrSt ASU First downs 21 25 Rushes-yards 14-47 32-109 Passing 341 258 Comp-Att-Int 40-66-4 24-37-3 Return Yards 44 127 Punts-Avg. 7-43.9 5-43.8 Fumbles-Lost 2-1 3-1 Penalties-Yards 13-139 6-74 Time of Possession 31:14 28:46 ------ INDIVIDUAL STATISTICS RUSHING--Oregon St.: Ward 5-30, Rodgers 117, Jenkins 1-11, Stevenson 3-10, Wheaton 1-6, Mannion 3-(minus 27). Arizona St.: C.Marshall 14-80, Miles 6-45, Middlebrooks 5-12, Osweiler 7-(minus 28). PASSING--Oregon St.: Mannion 40-66-4-341. Arizona St.: Osweiler 24-37-3-258. RECEIVING--Oregon St.: Wheaton 11-116, Bishop 8-64, Rodgers 5-32, Jenkins 5-30, Halahuni 3-25, Gwacham 2-41, Ward 2-16, Cooks 2-13, Stevenson 2-4. Arizona St.: Miles 8-62, Middlebrooks 5-49, Pickens 3-35, Pflugrad 3-31, G.Robinson 2-68, C.Marshall 2-7, Ross 1-6. PAC-12 Team Leaders Rushing Offense Car Yds Yds Pg Oregon 161 1198 299.5 UCLA 196 997 199.4 Stanford 150 790 197.5 California 151 644 161.0 Washington 179 747 149.4 Arizona St. 173 705 141.0 Washington St. 130 558 139.5 Southern California 158 683 136.6 Utah 124 531 132.8 Oregon St. 110 424 106.0 Colorado 148 507 101.4 Arizona 132 378 75.6 Passing Offense Att Cp Yds Yds Pg Arizona 242 174 1920 384.0 Washington St. 164 102 1516 379.0 Southern California 189 134 1589 317.8 California 151 78 1181 295.3 Arizona St. 179 123 1425 285.0 Oregon St. 183 110 1119 279.8 Stanford 120 87 1096 274.0 Colorado 175 98 1325 265.0 Washington 143 97 1209 241.8 Oregon 121 73 937 234.3 Utah 133 76 883 220.8 UCLA 123 68 991 198.2 Total Offense Plays Yds Yds Pg 282 2135 533.8 294 2074 518.5 BASKETBALL WNBA WOMEN'S NATIONAL BASKETBALL ASSOCIATION All Times PDT ------ CHAMPIONSHIP x-if necessary Sunday, Oct. 2: Minnesota 88, Atlanta 74 Wednesday, Oct. 5: Atlanta at Minnesota, 5 p.m. Friday, Oct. 7: Minnesota at Atlanta, 5 p.m. x-Sunday, Oct. 9: Minnesota at Atlanta, 1 p.m. x-Wednesday, Oct. 12: Atlanta at Minnesota, 5 p.m. DEALS Transactions HOCKEY National Hockey League BOSTON BRUINS--Assigned LW Lane MacDermid and C Max Sauve to Providence (AHL). CAROLINA HURRICANES--Reassigned F Drayson Bowman to Charlotte (AHL). CHICAGO BLACKHAWKS--Recalled F Jimmy Hayes and F Peter LeBlanc from Rockford (AHL). DETROIT RED WINGS--Recalled F Brent Raedeke from Grand Rapids (AHL). Reassigned D Brendan Smith, F Tomas Tatar, F Gustav Nyquist, F Landon Ferraro, F Joakim Andersson, F Brent Raedeke, D Travis Ehrhardt, D Brian Lashoff and G Jordan Pearce to Grand Rapids. NASHVILLE PREDATORS--Assigned F Gabriel Bourque, F Chris Mueller and D Tyler Sloan to Milwaukee (AHL). NEW YORK ISLANDERS--Assigned LW Michael Haley, F Sean Backman, F Casey Cizikas, F Justin DiBenedetto, F Brett Gallant, Anders Nilsson and G Kevin Poulin to Bridgeport (AHL). WINNIPEG JETS--Released LW Jane Pesonen. Assigned D Paul Postma and F Jason Gregoire to St. John's (AHL). HOCKEY NHL NATIONAL HOCKEY LEAGUE Preseason All Times PDT ------ Sunday's Games Detroit 3, Pittsburgh 2 Washington 4, Chicago 1 Monday's Games No games scheduled NHL Calendar Oct. 5 -- Opening day rosters set. Oct. 6 -- Regular season begins. Oct. 7, 8 -- NHL Premiere Games in Stockholm, Berlin, and Helsinki (featuring the New York Rangers, Buffalo Sabres, Los Angeles Kings and Anaheim Ducks). Basketball � Lynx blow open Game 1 in fourth quarter: in Minneapolis. Lindsay Whalen added 15 points and six assists and the Lynx turned a close game into a runaway with a 13-0 run to open the fourth quarter. Game 2 of the best-of-five series is Wednesday night in Minneapolis. -- From wire reports MOTOR SPORTS NASCAR Sprint Cup AAA 400 Results Sunday At Dover International Speedway Dover, Del. Lap length: 1 miles (Start position in parentheses) 1. (2) Kurt Busch, Dodge, 400 laps, 133.8 rating, 47 points, $223,625. 2. (6) Jimmie Johnson, Chevrolet, 400, 133.5, 44, $220,786. 3. (4) Carl Edwards, Ford, 400, 127.2, 42, $180,566. 4. (9) Kasey Kahne, Toyota, 400, 111.3, 40, $142,158. 5. (18) Matt Kenseth, Ford, 400, 109.8, 40, $148,311. 6. (5) Kyle Busch, Toyota, 400, 111, 39, $142,266. FISH COUNT Upstream daily movement of adult chinook, jack chinook, steelhead and wild steelhead at selected Columbia River dams last updated on Saturday. Chnk Jchnk Stlhd Wstlhd Bonneville 1,157 501 496 149 The Dalles 2,634 1,147 3,449 958 John Day 3,632 1,172 4,196 1,057 Upstream year-to-date movement of adult chinook, jack chinook, steelhead and wild steelhead at selected Columbia River dams last updated on Saturday. Chnk Jchnk Stlhd Wstlhd Bonneville 644,800 175,427 360,052 126,441 The Dalles 413,266 141,147 281,435 97,448 John Day 335,047 129,604 226,064 79,042 McNary 301,235 91,201 200,314 63,611 FOOTBALL NFL NATIONAL FOOTBALL LEAGUE ------ NFL Injury Report NEW YORK -- The updated National Football League injury report, as provided by the league: Today INDIANAPOLIS COLTS at TAMPA BAY BUCCA- Oregon Washington St. NFL THE BULLETIN � Monday, October 3, 2011 D3 San Francisco rallies to beat Philadelphia, 24-23 49ers overcome 20-point deficit, take record to 3-1 The Associated Press." Also on Sunday: Lions . . . . . . . . . . . . . . . . . . . . . 34 Cowboys . . . . . . . . . . . . . . . . . . 30 ARLINGTON, Texas -- Matthew Stafford saw his defense start wiping out a 24-point deficit with interceptions returned for touchdowns midway through the third quarter, then he and Calvin Johnson took over from there, leading Detroit to a stunning victory over Dallas. Titans . . . . . . . . . . . . . . . . . . . . . 31 Browns . . . . . . . . . . . . . . . . . . . . .13 CLEVELAND -- Matt Hasselbeck's fresh start in Tennessee has his team off to an unexpected one. The veteran quarterback threw three TD passes in the first half and safety Jordan Babineaux returned an interception NFL ROUNDUP 97 yards for a TD. Packers. . . . . . . . . . . . . . . . . . . . 49 Broncos . . . . . . . . . . . . . . . . . . . 23 GREEN BAY, Wis. -- Aaron Rodgers threw for a career-high 408 yards, tied a personal best with four touchdown passes and ran for two more scores and Green Bay remained unbeaten. Bengals. . . . . . . . . . . . . . . . . . . . 23 Bills . . . . . . . . . . . . . . . . . . . . . . . 20 CINCINNATI -- Rookie quarterback Andy Dalton shook off a horrid first half and led his first comeback victory, culminating in Mike Nugent's 43-yard field goal as time ran out against previously unbeaten Buffalo. Texans. . . . . . . . . . . . . . . . . . . . . .17 Steelers. . . . . . . . . . . . . . . . . . . . 10 HOUSTON -- Arian Foster rushed for 155 yards and the goahead touchdown in the fourth quarter as Houston overcame an injury to All-Pro Andre Johnson for the win. Patriots . . . . . . . . . . . . . . . . . . . . 31 Raiders . . . . . . . . . . . . . . . . . . . . .19 OAKLAND, Calif. -- Tom Brady bounced back from a four-interception performance by throwing for 226 yards, two touchdowns and committing no turnovers. Redskins . . . . . . . . . . . . . . . . . . .17 Rams. . . . . . . . . . . . . . . . . . . . . . 10 ST. LOUIS -- Ryan Torain ran for 135 yards and a 20-yard score, and Washington held off a late rally by winless St. Louis. Saints . . . . . . . . . . . . . . . . . . . . . 23 Jaguars. . . . . . . . . . . . . . . . . . . . 10 JACKSONVILLE, Fla. -- Drew Brees threw for 351 yards and a touchdown, Darren Sproles Michael Perez / The Associated Press San Francisco 49ers kicker David Akers (2) reacts after his extra point was good, with punter Andy Lee (4), in the second half of Sunday's game against the Philadelphia Eagles in Philadelphia. The 49ers won 24-23. 3 minutes remaining. . The much-maligned Smith went 13 for 17 for 201 yards in the second half, with TD passes of 30 yards to Joshua Morgan and 9 to Vernon Davis. Then Gore, who didn't start because of a sprained added 188 all-purpose yards and New Orleans improved to 3-1. Bears. . . . . . . . . . . . . . . . . . . . . . 34 Panthers . . . . . . . . . . . . . . . . . . . 29 CHICAGO -- Devin Hester set an NFL record with his 11th punt return for a touchdown, and Matt Forte ran for a career-high 205 yards for Chicago (2-2). Chargers. . . . . . . . . . . . . . . . . . . 26 Dolphins . . . . . . . . . . . . . . . . . . . 16 SAN DIEGO -- Philip Rivers threw for 307 yards and one touchdown, Mike Tolbert ran for another score and San Diego knocked out Miami quarterback Chad Henne. Falcons . . . . . . . . . . . . . . . . . . . . 30 Seahawks. . . . . . . . . . . . . . . . . . 28 SEATTLE -- Matt Ryan threw for 291 yards, rookie Julio Jones caught 11 passes for 127 yards and Atlanta held off a secondhalf rally. Giants . . . . . . . . . . . . . . . . . . . . . 31 Cardinals . . . . . . . . . . . . . . . . . . 27 GLENDALE, Ariz. -- Eli Manning threw two touchdown passes in a 58-second span late in the game to rally New York. Chiefs . . . . . . . . . . . . . . . . . . . . . 22 Vikings . . . . . . . . . . . . . . . . . . . . .17 KANSAS CITY, Mo. -- Matt Cassel hit Dwayne Bowe for a 52yard fourth-quarter touchdown pass, Ryan Succop was perfect on five field-goal attempts and the Chiefs are no longer winless. Ravens . . . . . . . . . . . . . . . . . . . . 34 Jets . . . . . . . . . . . . . . . . . . . . . . . .17 BALTIMORE -- Baltimore scored three touchdowns on defense, all off turnovers by New York Jets quarterback Mark Sanchez, and cruised to a victory in a bizarre game that featured an NFL-record five returns for scores. NFL SCOREBOARD Giants 31, Cardinals 27 0 10 0 21 -- 31 3 3 14 7 -- 27 First Quarter Ari--FG Feely 27, 13:02. Second Quarter Ari--FG Feely 27, 7:57. NYG--Bradshaw 13 run (Tynes kick), 2:54. NYG--FG Tynes 30, :01. Third Quarter Ari--Wells 1 run (Feely kick), 10:24. Ari--Wells 1 run (Feely kick), 2:55. Fourth Quarter NYG--Jacobs 1 run (Tynes kick), 12:07. Ari--Wells 2 run (Feely kick), 5:16. NYG--Ballard 2 pass from Manning (Tynes kick), 3:37. NYG--Nicks 29 pass from Manning (Tynes kick), 2:39. A--60,496. ------ Ari NYG First downs 24 22 Total Net Yards 360 368 Rushes-yards 24-54 32-156 Passing 306 212 Punt Returns 3-30 3-28 Kickoff Returns 5-120 3-74 Interceptions Ret. 1-0 0-0 Comp-Att-Int 27-40-0 20-34-1 Sacked-Yards Lost 1-15 4-25 Punts 5-44.6 4-45.0 Fumbles-Lost 2-2 2-1 Penalties-Yards 7-55 11-118 Time of Possession 28:01 31:59 ------ INDIVIDUAL STATISTICS RUSHING--N.Y. Giants: Bradshaw 12-39, Jacobs 9-18, Manning 3-(minus 3). Arizona: Wells 27-138, Smith 2-16, Kolb 2-1, StephensHowling 1-1. PASSING--N.Y. Giants: Manning 27-400-321. Arizona: Kolb 20-34-1-237. RECEIVING--N.Y. Giants: Nicks 10-162, Cruz 6-98, Bradshaw 4-11, Ballard 3-33, Manningham 1-10, Hynoski 1-5, Ware 1-2, Jacobs 1-0. Arizona: Fitzgerald 8-102, Heap 4-41, Doucet 3-42, Sherman 2-24, Housler 1-16, Stephens-Howling 1-9, King 1-3. MISSED FIELD GOALS--None. N.Y. Giants Arizona Fourth Quarter NE--Branch 4 pass from Brady (Gostkowski kick), 13:38. Oak--Moore 6 pass from J.Campbell (pass failed), :28. A--62,572. ------ NE Oak First downs 25 24 Total Net Yards 409 504 Rushes-yards 30-183 27-160 Passing 226 344 Punt Returns 1-15 1-18 Kickoff Returns 2-47 4-62 Interceptions Ret. 2-19 0-0 Comp-Att-Int 16-30-0 25-39-2 Sacked-Yards Lost 1-0 0-0 Punts 3-49.0 2-52.0 Fumbles-Lost 0-0 1-0 Penalties-Yards 5-45 9-85 Time of Possession 26:40 33:20 ------ INDIVIDUAL STATISTICS RUSHING--New England: Ridley 1097, Green-Ellis 16-75, Woodhead 2-13, Brady 1-(minus 1), Edelman 1-(minus 1). Oakland: McFadden 14-75, Ford 1-30, J.Campbell 4-29, Bush 8-26. PASSING--New England: Brady 16-30-0226. Oakland: J.Campbell 25-39-2-344. RECEIVING--New England: Welker 9158, Ochocinco 2-26, Gronkowski 1-15, Edelman 1-11, Green-Ellis 1-9, Branch 1-4, Ridley 1-3. Oakland: Heyward-Bey 4-115, Boss 4-78, Bush 4-55, McFadden 4-48, Hagan 4-27, Moore 3-19, Gordon 1-2, Cartwright 1-0. MISSED FIELD GOALS--None. Den GB 18 26 384 507 23-119 28-111 265 396 0-0 2-7 5-146 2-59 2-20 3-92 22-32-3 29-39-2 1-8 2-12 2-49.0 1-49.0 1-1 0-0 3-24 3-27 26:59 33:01 ------ INDIVIDUAL STATISTICS RUSHING--Denver: McGahee 15-103, Orton 2-7, Ball 2-5, Moreno 2-4, Decker 1-1, Tebow 1-(minus 1). Green Bay: Starks 13-63, Rodgers 9-36, A.Green 3-11, Kuhn 1-3, Flynn 2-(minus 2). PASSING--Denver: Orton 22-32-3-273. Green Bay: Rodgers 29-38-1-408, Flynn 01-1-0. RECEIVING--Denver: Lloyd 8-136, Decker 5-56, Fells 2-29, McGahee 2-10, Willis 1-15, Green 1-8, Moreno 1-7, Ball 1-6, Larsen 1-6. Green Bay: G.Jennings 7-103, Nelson 5-91, Starks 5-38, J.Jones 3-48, Finley 3-28, Driver 3-20, Cobb 2-75, Kuhn 1-5. MISSED FIELD GOALS--None. First downs Total Net Yards Rushes-yards Passing Punt Returns Kickoff Returns Interceptions Ret. Comp-Att-Int Sacked-Yards Lost Punts Fumbles-Lost Penalties-Yards Time of Possession AMERICAN CONFERENCE East Buffalo New England N.Y. Jets Miami W 3 3 2 0 W 3 3 1 0 W 3 2 2 2 W 3 2 1 1 L 1 1 2 4 L 1 1 3 3 L 1 2 2 2 L 1 2 3 3 T 0 0 0 0 T 0 0 0 0 T 0 0 0 0 T 0 0 0 0 Pct .750 .750 .500 .000 Pct .750 .750 .250 .000 Pct .750 .500 .500 .500 Pct .750 .500 .250 .250 PF 133 135 100 69 PF 107 88 39 46 PF 119 80 74 64 PF 91 111 81 49 PA 96 98 95 104 PA 70 56 85 84 PA 57 74 93 72 PA 85 113 111 126 Home 2-0-0 1-0-0 2-0-0 0-2-0 Home 2-0-0 2-0-0 1-1-0 0-2-0 Home 2-0-0 1-1-0 1-2-0 1-0-0 Home 3-0-0 1-1-0 1-1-0 1-1-0 Away 1-1-0 2-1-0 0-2-0 0-2-0 Away 1-1-0 1-1-0 0-2-0 0-1-0 Away 1-1-0 1-1-0 1-0-0 1-2-0 Away 0-1-0 1-1-0 0-2-0 0-2-0 AFC 3-1-0 3-1-0 1-2-0 0-4-0 AFC 3-0-0 3-1-0 1-1-0 0-3-0 AFC 2-1-0 2-1-0 2-2-0 1-2-0 AFC 2-1-0 2-2-0 1-2-0 0-2-0 NFC 0-0-0 0-0-0 1-0-0 0-0-0 NFC 0-1-0 0-0-0 0-2-0 0-0-0 NFC 1-0-0 0-1-0 0-0-0 1-0-0 NFC 1-0-0 0-0-0 0-1-0 1-1-0 Div 1-0-0 1-1-0 0-0-0 0-1-0 Div 1-0-0 0-1-0 1-1-0 0-1-0 Div 1-0-0 1-0-0 0-1-0 0-1-0 Div 1-0-0 1-0-0 0-1-0 0-1-0 PASSING--Minnesota: McNabb 18-30-1202.. MISSED FIELD GOALS--None. South Houston Tennessee Jacksonville Indianapolis 49ers 24, Eagles 23 San Francisco 0 3 14 7 -- 24 Philadelphia 7 13 3 0 -- 23 First Quarter Phi--Harbor 16 pass from Vick (Henery kick), 4:08. Second Quarter SF--FG Akers 37, 14:22. Phi--FG Henery 32, 12:08. Phi--FG Henery 32, 1:52. Phi--McCoy 5 pass from Vick (Henery kick), :38. Third Quarter Phi--FG Henery 33, 9:30. SF--Morgan 30 pass from Ale.Smith (Akers kick), 7:20. SF--V.Davis 9 pass from Ale.Smith (Akers kick), 2:58. Fourth Quarter SF--Gore 12 run (Akers kick), 3:00. A--69,144. ------ SF Phi First downs 22 23 Total Net Yards 442 513 Rushes-yards 25-164 20-108 Passing 278 405 Punt Returns 2-(-6) 1-(-3) Kickoff Returns 4-90 2-40 Interceptions Ret. 1-27 0-0 Comp-Att-Int 21-33-0 30-46-1 Sacked-Yards Lost 3-13 2-11 Punts 4-49.5 2-43.5 Fumbles-Lost 2-1 2-2 5-55 Penalties-Yards 5-40 Time of Possession 28:52 31:08 ------ INDIVIDUAL STATISTICS RUSHING--San Francisco: Gore 15-127, Hunter 9-38, Ale.Smith 1-(minus 1). Philadelphia: Vick 8-75, McCoy 9-18, Brown 3-15. PASSING--San Francisco: Ale.Smith 2133-0-291. Philadelphia: Vick 30-46-1-416. RECEIVING--San Francisco: Crabtree 5-68, V.Davis 4-45, Morgan 3-65, Walker 3-20, Hunter 2-62, Gore 2-12, Miller 1-15, K.Williams 1-4. Philadelphia: Maclin 7-74, D.Jackson 6-171, Avant 6-69, McCoy 6-34, Harbor 3-55, Schmitt 1-11, Celek 1-2. MISSED FIELD GOALS--San Francisco: Akers 44 (WL), 45 (BK). Philadelphia: Henery 39 (WR), 33 (WR). North Baltimore Cincinnati Cleveland Pittsburgh West San Diego Oakland Denver Kansas City Saints 23, Jaguars 10 7 7 6 3 -- 23 0 10 0 0 -- 10 First Quarter NO--Collins 1 run (Kasay kick), 7:59. Second Quarter NO--Graham 1 pass from Brees (Kasay kick), 12:37. Jac--Miller 14 pass from Gabbert (Scobee kick), 7:29. Jac--FG Scobee 31, :34. Third Quarter NO--FG Kasay 38, 10:45. NO--FG Kasay 39, 4:11. Fourth Quarter NO--FG Kasay 21, 12:46. A--62,471. ------ NO Jac First downs 30 15 Total Net Yards 503 274 Rushes-yards 34-177 17-104 Passing 326 170 Punt Returns 1-9 1-4 Kickoff Returns 2-48 3-64 Interceptions Ret. 1-6 2-25 Comp-Att-Int 31-44-2 16-42-1 Sacked-Yards Lost 3-25 3-26 Punts 1-58.0 4-38.3 Fumbles-Lost 0-0 1-0 Penalties-Yards 6-50 2-15 Time of Possession 37:05 22:55 ------ INDIVIDUAL STATISTICS RUSHING--New Orleans: Sproles 775, Ingram 17-55, P.Thomas 6-36, Brees 3-10, Collins 1-1. Jacksonville: Jones-Drew 11-84, Gabbert 2-14, Karim 4-6. PASSING--New Orleans: Brees 31-44-2351. Jacksonville: Gabbert 16-42-1-196. RECEIVING--New Orleans: Graham 10132, Sproles 5-56, Moore 5-50, Meachem 4-59, P.Thomas 4-43, Ingram 2-3, Colston 1-8. Jacksonville: Thomas 5-73, Lewis 3-38, Hill 2-34, Dillard 2-16, West 1-16, Miller 1-14, Jones-Drew 1-3, Bolen 1-2. MISSED FIELD GOALS--New Orleans: Kasay 53 (WR), 50 (SH). New Orleans Jacksonville NATIONAL CONFERENCE East Washington N.Y. Giants Dallas Philadelphia W 3 3 2 1 W 3 2 2 1 W 4 4 2 0 W 3 1 1 0 L 1 1 2 3 L 1 1 2 3 L 0 0 2 4 L 1 3 3 4 T 0 0 0 0 T 0 0 0 0 T 0 0 0 0 T 0 0 0 0 Pct .750 .750 .500 .250 Pct .750 .667 .500 .250 PF 83 102 99 101 PF 127 60 90 89 PA 63 87 101 101 PA 98 60 105 102 PA 97 76 98 96 Home 2-0-0 1-0-0 1-1-0 0-2-0 Home 2-0-0 1-1-0 1-0-0 1-1-0 Home 2-0-0 1-0-0 2-1-0 0-2-0 Away 1-1-0 2-1-0 1-1-0 1-1-0 Away 1-1-0 1-0-0 1-2-0 0-2-0 Away 2-0-0 3-0-0 0-1-0 0-2-0 Away 2-0-0 0-2-0 0-2-0 0-1-0 NFC 3-1-0 3-1-0 2-1-0 1-3-0 NFC 1-1-0 2-1-0 2-2-0 0-3-0 NFC 3-0-0 3-0-0 2-2-0 0-2-0 NFC 2-1-0 1-2-0 1-3-0 0-3-0 AFC 0-0-0 0-0-0 0-1-0 0-0-0 AFC 2-0-0 0-0-0 0-0-0 1-0-0 AFC 1-0-0 1-0-0 0-0-0 0-2-0 AFC 1-0-0 0-1-0 0-0-0 0-1-0 Div 1-1-0 1-1-0 1-0-0 0-1-0 Div 1-0-0 1-0-0 0-1-0 0-0-0 Div 1-0-0 1-0-0 0-1-0 0-1-0 Div 1-0-0 1-1-0 0-1-0 0-0-0 Falcons 30, Seahawks 28 7 17 3 3 -- 30 0 7 14 7 -- 28 First Quarter Atl--Gonzalez 1 pass from Ryan (Bryant kick), 6:08. Second Quarter Atl--Turner 21 run (Bryant kick), 10:13. Sea--Rice 52 pass from Jackson (Hauschka kick), 8:46. Atl--Turner 1 run (Bryant kick), 2:48. Atl--FG Bryant 47, :25. Third Quarter Atl--FG Bryant 50, 13:40. Sea--M.Williams 6 pass from Jackson (Hauschka kick), 10:01. Sea--Lynch 11 run (Hauschka kick), 3:07. Fourth Quarter Atl--FG Bryant 42, 11:38. Sea--Obomanu 8 pass from Jackson (Hauschka kick), 8:13. A--66,266. ------ Atl Sea First downs 25 20 Total Net Yards 412 372 Rushes-yards 36-121 15-53 Passing 291 319 Punt Returns 2-24 2-40 Kickoff Returns 1-19 4-94 Interceptions Ret. 2-11 0-0 Comp-Att-Int 28-42-0 25-38-2 Sacked-Yards Lost 0-0 0-0 Punts 4-37.5 3-49.7 Fumbles-Lost 0-0 0-0 Penalties-Yards 4-35 6-40 Time of Possession 40:10 19:50 ------ INDIVIDUAL STATISTICS RUSHING--Atlanta: Turner 26-70, Ryan 426, 330, Obomanu 3-25, Miller 3-21, Robinson 1-7, Washington 1-4. MISSED FIELD GOALS--Seattle: Hauschka 61 (SH). Atlanta Seattle South New Orleans Tampa Bay Atlanta Carolina Cle--FG Dawson 51, 14:17. Ten--Cook 80 pass from Hasselbeck (Bironas kick), 13:59. Ten--Williams 4 pass from Hasselbeck (Bironas kick), :33. Third Quarter Ten--FG Bironas 39, 6:45. Ten--Babineaux 97 interception return (Bironas kick), 2:28. Fourth Quarter Cle--Watson 10 pass from McCoy (Dawson kick), 11:36. A--66,240. ------ Ten Cle First downs 13 25 Total Net Yards 332 416 Rushes-yards 29-112 22-84 Passing 220 332 Punt Returns 2-17 2-18 Kickoff Returns 2-48 3-36 Interceptions Ret. 1-97 1-0 Comp-Att-Int 10-21-1 40-61-1 Sacked-Yards Lost 0-0 4-18 Punts 6-39.5 4-38.8 Fumbles-Lost 0-0 1-0 Penalties-Yards 5-45 5-40 Time of Possession 23:07 36:53 ------ INDIVIDUAL STATISTICS RUSHING--Tennessee: C.Johnson 23101, Hasselbeck 1-5, Ringer 4-4, Harper 1-2. Cleveland: Hillis 10-46, Hardesty 7-22, McCoy 4-16, Ar.Smith 1-0. PASSING--Tennessee: Hasselbeck 1020-1-220, Locker 0-1-0-0. Cleveland: McCoy 40-61-1-350. RECEIVING--Tennessee: Cook 2-93, Washington 2-62, L.Hawkins 2-38, C.Johnson 211, Stevens 1-12, Williams 1-4. Cleveland: Little 6-57, Watson 6-48, Massaquoi 6-46, Cribbs 5-50, Hardesty 5-49, Hillis 5-23, Robiskie 3-25, Norwood 1-19, Moore 1-15, Al.Smith 1-13, Marecic 1-5. MISSED FIELD GOALS--None. 1-9 1-20 27-46-1 9-17-1 0-0 1-9 2-39.5 4-39.3 1-0 0-0 8-52 5-45 33:29 26:31 ------ INDIVIDUAL STATISTICS RUSHING--Carolina: D.Williams 10-82, Stewart 8-52, Newton 8-35. Chicago: Forte 25205, Barber 5-17, Cutler 1-2. PASSING--Carolina: Newton 27-46-1374.). Interceptions Ret. Comp-Att-Int Sacked-Yards Lost Punts Fumbles-Lost Penalties-Yards Time of Possession Bengals 23, Bills 20 0 17 0 3 -- 20 3 0 10 10 -- 23 First Quarter Cin--FG Nugent 31, 2:02. Second Quarter Buf--FG Lindell 43, 13:33. Buf--Scott 43 interception return (Lindell kick), 3:10. Buf--Jackson 2 run (Lindell kick), :40. Third Quarter Cin--FG Nugent 21, 11:23. Cin--Gresham 17 pass from Dalton (Nugent kick), 5:26. Fourth Quarter Buf--FG Lindell 23, 11:22. Cin--Dalton 3 run (Nugent kick), 4:09. Cin--FG Nugent 43, :00. A--41,142. ------ Buf Cin First downs 12 25 Total Net Yards 273 458 Rushes-yards 21-83 32-171 Passing 190 287 Punt Returns 0-0 7-69 Kickoff Returns 1-23 3-66 Interceptions Ret. 2-48 0-0 Comp-Att-Int 20-34-0 18-36-2 Sacked-Yards Lost 1-9 2-11 Punts 8-51.6 5-38.4 Fumbles-Lost 0-0 1-0 Penalties-Yards 4-26 3-15 Time of Possession 28:39 31:21 ------ INDIVIDUAL STATISTICS RUSHING--Buffalo: Jackson 17-66, Spiller 3-12, Fitzpatrick 1-5. Cincinnati: Benson 19-104, Leonard 4-36, Scott 5-13, Dalton 3-12, Green 1-6. PASSING--Buffalo: Fitzpatrick 20-34-0199. Cincinnati: Dalton 18-36-2-298. RECEIVING--Buffalo: Jackson 5-32, St.Johnson 4-58, Jones 3-21, B.Smith 2-25, Nelson 2-18, Chandler 2-8, Roosevelt 1-28, Spiller 1-9. Cincinnati: Green 4-118, Gresham 4-70, Simpson 3-26, Hawkins 2-43, Caldwell 2-17, Scott 2-9, Leonard 1-15. MISSED FIELD GOALS--None. Buffalo Cincinnati Redskins 17, Rams 10 7 7 3 0 -- 17 0 0 0 10 -- 10 First Quarter Was--Moss 6 pass from Grossman (Gano kick), 3:06. Second Quarter Was--Torain 20 run (Gano kick), 5:42. Third Quarter Was--FG Gano 38, 11:08. Fourth Quarter StL--FG Jo.Brown 32, 10:09. StL--Jackson 15 pass from Bradford (Jo. Brown kick), 5:45. A--56,113. ------ Was StL First downs 16 14 Total Net Yards 339 172 Rushes-yards 40-196 17-45 Passing 143 127 Punt Returns 4-3 4-1 Kickoff Returns 2-35 2-32 Interceptions Ret. 0-0 2-66 Comp-Att-Int 15-29-2 20-43-0 Sacked-Yards Lost 0-0 7-37 Punts 7-45.9 8-45.0 Fumbles-Lost 3-0 3-1 Penalties-Yards 10-96 9-65 Time of Possession 35:10 24:50 ------ INDIVIDUAL STATISTICS RUSHING--Washington: Torain 19-135, Helu 8-35, Hightower 8-24, Grossman 5-2. St. Louis: Jackson 17-45. PASSING--Washington: Grossman 1529-2-143. St. Louis: Bradford 20-43-0-164. RECEIVING--Washington: Moss 5-39, Gaffney 4-62, Davis 4-34, Cooley 1-4, Hightower 1-4. St. Louis: Kendricks 4-33, Pettis 4-32, Jackson 4-19, Alexander 3-46, Bajema 2-11, B.Gibson 1-14, Sims-Walker 1-6, Miller 1-3. MISSED FIELD GOALS--None. Washington St. Louis North Green Bay Detroit Chicago Minnesota Pct PF 1.000 148 1.000 135 .500 94 .000 77 Pct .750 .250 .250 .000 PF 94 58 86 46 Chargers 26, Dolphins 16 7 3 3 3 -- 16 7 6 10 3 -- 26 First Quarter Mia--Hilliard 1 run (Carpenter kick), 2:47. SD--Jackson 55 pass from Rivers (Novak kick), 1:35. Second Quarter SD--FG Novak 27, 7:55. Mia--FG Carpenter 41, 1:48. SD--FG Novak 48, :07. Third Quarter SD--Tolbert 1 run (Novak kick), 9:24. Mia--FG Carpenter 37, 6:46. SD--FG Novak 23, 1:15. Fourth Quarter Mia--FG Carpenter 51, 11:34. SD--FG Novak 38, 4:28. A--63,002. ------ Mia SD First downs 16 21 Total Net Yards 248 411 Rushes-yards 22-72 28-116 Passing 176 295 Punt Returns 1-22 3-22 Kickoff Returns 3-66 1-21 Interceptions Ret. 0-0 2-21 Comp-Att-Int 20-30-2 21-31-0 Sacked-Yards Lost 3-18 2-12 Punts 3-45.0 3-50.3 Fumbles-Lost 0-0 2-0 Penalties-Yards 2-41 8-80 Time of Possession 26:42 33:18 ------ INDIVIDUAL STATISTICS RUSHING--Miami: Bush 13-50, Hilliard 6-20, Slaton 1-2, Henne 1-1, Mat.Moore 1(minus 1). San Diego: Mathews 16-81, Rivers 5-18, Tolbert 6-17, Hester 1-0. PASSING--Miami: Mat.Moore 17-261-167, Henne 3-4-1-27. San Diego: Rivers 21-31-0-307. RECEIVING--Miami: Marshall 5-52, Hartline 3-31, Bess 3-21, Clay 2-34, Bush 2-15, Hilliard 1-18, Fasano 1-9, Gates 1-8, Mastrud 1-8, Slaton 1-(minus 2). San Diego: Mathews 5-68, Tolbert 5-51, Jackson 3-108, McMichael 3-25, Brown 2-26, Floyd 2-26, Crayton 1-3. MISSED FIELD GOALS--None. Miami San Diego West San Francisco Seattle Arizona St. Louis PA Home 75 1-1-0 97 1-1-0 87 1-1-0 113 0-3-0 ------ Sunday's Games Detroit 34, Dallas 30 Kansas City 22, Minnesota 17 Houston 17, Pittsburgh 10 San Francisco 24, Philadelphia 23 Cincinnati 23, Buffalo 20 Atlanta 30, Seattle 28 New England 31, Oakland 19 Baltimore 34, N.Y. Jets 17 Today's Game Indianapolis at Tampa Bay, 5:30 p.m. Washington 17, St. Louis 10 Chicago 34, Carolina 29 New Orleans 23, Jacksonville 10 Tennessee 31, Cleveland 13 N.Y. Giants 31, Arizona 27 San Diego 26, Miami 16 Green Bay 49, Denver 23 Texans 17, Steelers 10 0 0 7 3 -- 10 7 3 0 7 -- 17 First Quarter Hou--Daniels 1 pass from Schaub (Rackers kick), 4:05. Second Quarter Hou--FG Rackers 25, 2:33. Third Quarter Pit--Mendenhall 3 run (Suisham kick), 7:02. Fourth Quarter Pit--FG Suisham 26, 14:57. Hou--Foster 42 run (Rackers kick), 12:02. A--71,585. ------ Pit Hou First downs 20 17 Total Net Yards 296 318 Rushes-yards 22-118 35-180 Passing 178 138 Punt Returns 2-43 3-17 Kickoff Returns 3-62 2-34 Interceptions Ret. 0-0 1-0 Comp-Att-Int 16-30-1 14-21-0 Sacked-Yards Lost 5-28 0-0 Punts 4-50.5 5-47.0 Fumbles-Lost 0-0 1-0 Penalties-Yards 5-45 9-64 Time of Possession 28:17 31:43 ------ INDIVIDUAL STATISTICS RUSHING--Pittsburgh: Redman 6-40, Moore 4-34, Mendenhall 9-25, Roethlisberger 211, A.Brown 1-8. Houston: Foster 30-155, Tate 2-20, Ogbonnaya 1-4, Schaub 2-1. PASSING--Pittsburgh: Roethlisberger 1630-1-206. Houston: Schaub 14-21-0-138. RECEIVING--Pittsburgh: A.Brown 5-67, Wallace 4-77, Miller 3-15, Ward 1-19, Redman 1-12, Sanders 1-10, Johnson 1-6. Houston: Daniels 5-69, A.Johnson 4-36, Foster 3-11, Dreessen 1-14, Casey 1-8. MISSED FIELD GOALS--Pittsburgh: Suisham 30 (BK). Pittsburgh Houston Ravens 34, Jets 17 7 10 0 0 -- 17 17 10 7 0 -- 34 First Quarter Bal--McClain 6 fumble return (Cundiff kick), 11:58. NYJ--McKnight 107 kickoff return (Folk kick), 11:43. Bal--FG Cundiff 38, 6:27. Bal--Rice 3 run (Cundiff kick), 1:14. Second Quarter Bal--FG Cundiff 38, 13:19. Bal--Johnson 26 fumble return (Cundiff kick), 8:11. NYJ--Harris 35 interception return (Folk kick), 6:17. NYJ--FG Folk 40, 2:14. Third Quarter Bal--Webb 73 interception return (Cundiff kick), 8:49. A--71,247. ------ NYJ Bal First downs 7 16 Total Net Yards 150 267 Rushes-yards 19-38 40-112 Passing 112 155 Punt Returns 2-12 1-16 Kickoff Returns 2-135 3-49 Interceptions Ret. 1-35 1-73 Comp-Att-Int 11-35-1 10-31-1 Sacked-Yards Lost 2-7 2-8 Punts 8-43.3 7-44.3 Fumbles-Lost 5-3 3-2 Penalties-Yards 9-69 7-46 Time of Possession 22:32 37:28 ------ INDIVIDUAL STATISTICS RUSHING--N.Y. Jets: Greene 10-23, Conner 3-15, Sanchez 3-3, Tomlinson 3-(minus 3). Baltimore: Rice 25-66, R.Williams 12-49, Flacco 3-(minus 3). PASSING--N.Y. Jets: Sanchez 11-35-1119. Baltimore: Flacco 10-31-1-163. RECEIVING--N.Y. Jets: Burress 3-33, Holmes 3-33, Mason 2-37, Keller 2-12, Tomlinson 1-4. Baltimore: Dickson 4-45, Rice 2-64, Boldin 1-28, Pitta 1-14, L.Williams 1-11, T.Smith 1-1. MISSED FIELD GOALS--None. N.Y. Jets Baltimore Lions 34, Cowboys 30 0 3 14 17 -- 34 Detroit Dallas Sunday, Oct. 9 Arizona at Minnesota, 10 a.m. Oakland at Houston, 10 a.m. Kansas City at Indianapolis, 10 a.m. Philadelphia at Buffalo, 10 a.m. New Orleans at Carolina, 10 a.m. Cincinnati at Jacksonville, 10 a.m. Tennessee at Pittsburgh, 10 a.m. Seattle at N.Y. Giants, 10 a.m. Tampa Bay at San Francisco, 1:05 p.m. San Diego at Denver, 1:15 p.m. N.Y. Jets at New England, 1:15 p.m. Green Bay at Atlanta, 5:20 p.m. Open: Baltimore, Cleveland, Dallas, Miami, St. Louis, Washington Monday, Oct. 10 Chicago at Detroit, 5:30 p.m. ------ All Times PDT Packers 49, Broncos 23 Denver Green Bay 3 14 0 6 -- 23 14 14 14 7 -- 49 First Quarter Den--FG Prater 27, 5:22. GB--Nelson 50 pass from Rodgers (Crosby kick), 2:08. GB--Woodson 30 interception return (Crosby kick), :50. Second Quarter GB--Rodgers 11 run (Crosby kick), 12:18. Den--Decker 5 pass from Orton (Prater kick), 10:27. Den--Decker 33 pass from Orton (Prater kick), 3:21. GB--G.Jennings 17 pass from Rodgers (Crosby kick), :24. Third Quarter GB--Rodgers 8 run (Crosby kick), 8:26. GB--J.Jones 16 pass from Rodgers (Crosby kick), 1:12. Fourth Quarter GB--Driver 8 pass from Rodgers (Crosby kick), 7:46. Den--Fells 7 pass from Orton (run failed), 3:02. A--70,529. ------ Punts Fumbles-Lost Penalties-Yards Time of Possession 6-43.7 0-0 10-75 23:21 3-53.7 0-0 7-33 36:39 Patriots 31, Raiders 19 New England 7 10 7 7 -- 31 Oakland 3 7 3 6 -- 19 First Quarter Oak--FG Janikowski 28, 10:26. NE--Welker 15 pass from Brady (Gostkowski kick), 6:07. Second Quarter Oak--Bush 1 run (Janikowski kick), 10:20. NE--Green-Ellis 1 run (Gostkowski kick), 7:44. NE--FG Gostkowski 44, :06. Third Quarter NE--Ridley 33 run (Gostkowski kick), 11:07. Oak--FG Janikowski 26, 3:21. ------. Chiefs 22, Vikings 17 7 0 3 7 -- 17 3 6 6 7 -- 22 First Quarter KC--FG Succop 40, 7:16. Min--Aromashodu 34 pass from McNabb (Longwell kick), 1:47. Second Quarter KC--FG Succop 24, 5:15. Minnesota Kansas City). Bears 34, Panthers 29 3 17 0 9 -- 29 Carolina Chicago Titans 31, Browns 13 7 14 10 0 -- 31 3 3 0 7 -- 13 First Quarter Cle--FG Dawson 48, 6:48. Ten--Stevens 12 pass from Hasselbeck (Bironas kick), 3:25. Second Quarter Tennessee Cleveland D4 Monday, October 3, 2011 � THE BULLETIN M A J O R L E A G U E B A S E B A L L P L AYO F F S Tigers stop Yankees to tie series at 1-1 By Howie Rumberg The Associated Press Brewers bash their way to NLDS lead By Colin Fly The Associated Press anyNext up body -- but particularly against � New York at a team like them with the short Detroit porch in right field -- it was not a good feeling," Tigers manager � When: Jim Leyland said. "But it worked Today, out OK." 5:30 p.m. Tigers starter Max Scherzer � TV: TBS pitched no-hit ball into the sixth before Cano blooped an oppositefield�. Matt Slocum / The Associated Press St. Louis Cardinals' Ryan Theriot (3) reacts after sliding safe into home as Philadelphia Phillies catcher Carlos Ruiz (51) can't make the tag in time, during the sixth inning of baseball's Game 2 of the National League division series, Sunday in Philadelphia. Cards rally against Lee and Phils, even series Many fans walked over to watch the two-sport doubleheader, and the crowd of 46,575 was the � Philadelphia PHILADELPHIA -- Jon Jay flipped Carlos largest in the eight-year history of Citizens Bank at St. Louis Ruiz, then Albert Pujols delivered the knockout Park. blow. For a while, it seemed the Phillies had this one � When: These feisty St. Louis Cardinals aren't backing under control. Tuesday, down from the mighty Phillies. After all, Lee is one of the best postseason 5 p.m. Pujols hit a go-ahead single in the seventh inpitchers in history, and he was 17-9 with a 2.40 ning after Cliff Lee blew a four-run lead, and the � TV: TBS ERA and a major league-best six shutouts this Cardinals rallied past Philadelphia 5-4 Sunday season. night to even their NL playoff matchup at one Lee was 7-0 with a 1.26 ERA in his first eight game each. playoff starts -- 4-0 with the Phillies in 2009 -- Down early, Jay jolted Philadelphia's catcher on a bruis- before losing Games 1 and 5 of the World Series to the San ing play at the plate. Jay was out, ending the fourth inning. Francisco Giants as a member of the Texas Rangers last The Phillies, however, couldn't block the Cardinals' path year. to victory. He's 0-3 with a 7.13 ERA in the last three outings. "I thought that was my only option," Jay said. "I thought On a chilly night when game-time temperature was 50 I got him all right, and I was hoping that the ball would degrees, Lee was the only starter in short sleeves. come out, but it didn't. He did a good job of holding onto Maybe he got cold. the ball." "Any time I got a 4-0 lead in the first or second, I feel I The NLDS shifts to St. Louis for Game 3 on Tuesday. have the game well in hand," Lee said. Cole Hamels will be the third straight All-Star pitcher Clinging to a 4-3 lead, Lee got the first two outs in the to face the Cardinals, who'll send Jaime Garcia to the sixth. Then Ryan Theriot lined a two-out double to left mound. and Jay followed with an opposite-field single to left. TheThe wild-card Cardinals, who got into the postseason riot slid home safely ahead of Raul Ibanez's high throw to only after the Phillies beat Atlanta in Game 162, got the tie it at 4. split they were looking for on the road against the team Down 4-0, the Cardinals started their rally in the fourth. that had the best record in the majors. Berkman walked and Yadier Molina hit a one-out infield Lee hardly looked like the guy who used to be so domi- single. Theriot sliced an RBI double down the right-field nant in the postseason. He gave up five runs and 12 hits, line and Jay followed with an RBI single to get St. Louis striking out nine in six-plus innings, to lose his third within 4-2. straight playoff start. Jay advanced to second on the throw to the plate, and "I wasn't able to make my pitches, so I take full respon- Carpenter was pulled for pinch-hitter Nick Punto. Lee sibility," Lee said. fired a 92 mph fastball by Punto for the second out. Pitching on three days' rest for the first time in his caBut Rafael Furcal followed with a line-drive single to reer, Chris Carpenter struggled for the Cardinals. left. Theriot scored and Jay came rumbling around the But one reliever after another did the job for manager bases. Ibanez made a perfect one-hop throw and the ball Tony La Russa. arrived along with Jay. He slammed into Ruiz, his left foreSix Cardinals relievers combined to toss six shutout arm knocking the stocky catcher backward. But Ruiz held innings, allowing just one hit. Jason Motte finished for a to temporarily prevent the tying run from scoring. Lee, four-out save. backing up the plate, pumped his fist while Ruiz calmly "We've been doing this all year. We don't give up," Motte picked up his mask and jogged to the dugout. said. "People counted us out, (but) we kind of went out Carpenter, the 2005 NL Cy Young Award winner, althere and just kept playing hard." lowed four runs and five hits in three innings. It was the After chipping away for a few innings, the Cardinals shortest outing of the season for Carpenter, who led the took the lead in the seventh. Allen Craig led off with a tri- NL with 237 1/3 innings pitched this year. ple off center fielder Shane Victorino's glove. A three-time The bullpen bailed him out. Gold Glove winner, Victorino misplayed the ball. He had Fernando Salas retired all six batters he faced, and to go a long way to make the catch, but overran it and the Octavio Dotel set down five in a row. Marc Rzepczynski ball bounced off his glove. gave up a two-out single to Rollins in the seventh, ending a Pujols, who struck out in his previous two at-bats, lined streak of 15 straight batters retired. Rzepczynski left after a single over drawn-in shortstop Jimmy Rollins to give St. hitting Chase Utley to start Philadelphia's eighth. Louis a 5-4 lead. Mitchell Boggs came in and got Hunter Pence to ground Cardinals players jumped up and cheered wildly in the into a forceout. Arthur Rhodes replaced him and struck dugout, while Phillies fans sat silently in disbelief. The out Ryan Howard. Then it was Motte's turn. red-clad faithful had their hearts broken already once Both teams had issues with plate umpire Jerry Meals, Sunday. and Cardinals manager Tony La Russa criticized the Just a few hours earlier, the Eagles blew a 20-point lead strike zone during the telecast. and lost 24-23 to the San Francisco 49ers in an NFL game The Phillies, who overcame a 3-0 first-inning deficit in across the street. Game 1, took a 3-0 lead in the first in this one. The Associated Press By Rob Maaddi Next up MLB SCOREBOARD MAJOR LEAGUE BASEBALL Postseason Glance All Times PDT ------ DIVISION SERIES (Best-of-5; x-if necessary) American League New York 1, Detroit 1 Friday, Sept. 30: Detroit 1, New York 1, 1� innings, susp., rain Saturday, Oct. 1: New York 9, Detroit 3, comp. of susp. game Sunday, Oct. 2: Detroit 5, New York 3 Today, Oct. 3: New York (Sabathia 19-8) at Detroit (Verlander 24-5), 5:37 p.m. Tuesday, Oct. 4: New York (Burnett 11-11 or Hughes 5-5) at Detroit (Porcello 14-9), 5:37 p.m. x-Thursday, Oct. 6: Detroit at New York, 5:07 or 5:37 p.m. Tampa Bay 1, Texas 1 Friday, Sept. 30: Tampa Bay 9, Texas 0 Saturday, Oct. 1: Texas 8, Tampa Bay 6 Today, Oct. 3: Texas (Lewis 14-10) at Tampa Bay (Price 12-13), 2:07 p.m. Tuesday, Oct. 4: Texas (Harrison 14-9) at Tampa Bay (Hellickson 1310), 11:07 a.m. x-Thursday, Oct. 6: Tampa Bay at Texas, 2:07 or 5:07 p.m. National League Philadelphia 1, St. Louis 1 Saturday, Oct. 1: Philadelphia 11, St. Louis 6 Sunday, Oct. 2: St. Louis 5, Philadelphia 4 Tuesday, Oct. 4: Philadelphia (Hamels 14-9) at St. Louis (Garcia 13-7), 2:07 p.m. Wednesday, Oct. 5: Philadelphia at St. Louis, 3:07 or 5:07 p.m. x-Friday, Oct. 7: St. Louis at Philadelphia, 5:07 or 5:37 p.m. Milwaukee 2, Arizona 0 Saturday, Oct. 1: Milwaukee 4, Arizona 1 Sunday, Oct. 2: Milwaukee 9, Arizona 4 Tuesday, Oct. 4: Milwaukee (Marcum 13-7) at Arizona (Collmenter 1010), 6:37 p.m. (TNT) x-Wednesday, Oct. 5: Milwaukee at Arizona, 5:07 or 6:37 p.m. x-Friday, Oct. 7: Arizona at Milwaukee, 2:07 or 5:07 p.m. Sunday's Summaries Goldschmidt 1b C.Young cf R.Roberts 3b G.Parra lf D.Hudson p Ziegler p Paterson p Shaw p b-Burroughs ph Owings p c-Blum ph Da.Hernandez p Totals 4 4 4 4 2 0 0 0 1 0 1 0 36 1 1 1 3 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 4 10 1 1 0 0 0 0 0 0 0 0 0 0 4 1 2 0 0 0 1 0 2 0 1 0 0 0 0 0 0 0 1 0 0 0 1 0 0 5 13 .250 .429 .429 .000 .000 ------.000 --.000 --Hudson L, 0-1 5 1-3 9 5 5 0 6 93 8.44 Ziegler 0 3 4 4 2 0 13108.00 Paterson 1-3 0 0 0 0 1 6 0.00 Shaw 1-3 0 0 0 0 0 3 0.00 Owings 1 0 0 0 0 1 12 0.00 Da.Hernandez 1 0 0 0 0 0 12 0.00 Milwaukee IP H R ER BB SO NP ERA Greinke 5 8 4 4 0 7 86 7.20 Saito W, 1-0 1 1 0 0 0 1 11 0.00 Hawkins 1 0 0 0 2 1 31 0.00 Fr.Rodriguez 1 1 0 0 1 2 19 0.00 Axford 1 0 0 0 2 2 26 0.00 Ziegler pitched to 6 batters in the 6th. Inherited runners-scored--Ziegler 1-1, Paterson 2-0, Shaw 2-0. IBB--off Ziegler (Kotsay). Balk--Ziegler. T--3:29. A--44,066 (41,900). 1-ran for Ordonez in the 6th. E--Jeter (1). LOB--Detroit 7, New York 9. 3B--Posada (1). HR--Mi.Cabrera (1), off F.Garcia; Granderson (1), off Benoit; Swisher (1), off Valverde. RBIs--Kelly (1), Mi.Cabrera 3 (3), V.Martinez (1), Granderson (1), Swisher (1), An.Jones (1). SB--Mi.Cabrera (1). S--R.Santiago 2. SF--An.Jones. Runners left in scoring position--Detroit 4 (Jh.Peralta 3, Kelly); New York 4 (Teixeira, Jeter 2, Cano). Detroit IP H R ER BB SO NP ERA Scherzer W, 1-0 6 2 0 0 4 5 104 0.00 Benoit H, 1 2 1 1 1 0 3 23 4.50 Valverde 1 2 2 2 2 1 34 18.00 New York IP H R ER BB SO NP ERA F.Garcia L, 0-1 5 1-3 6 4 3 0 6 77 5.06 Logan 2-3 0 0 0 0 2 8 0.00 Wade 2 2 0 0 1 2 37 0.00 Ayala 1 1 1 1 0 0 19 6.75 Scherzer pitched to 2 batters in the 7th. Inherited runners-scored--Benoit 2-0, Logan 2-0. HBP--by Scherzer (R.Martin), by Ayala (Inge). Balk--Logan. T--3:34. A--50,596 (50,291). Utley 2b 1 1 0 0 2 1 .500 Pence rf 3 1 1 1 1 1 .375 Howard 1b 4 0 1 2 0 1 .286 Victorino cf 4 0 0 0 0 0 .375 Ibanez lf 4 0 1 1 0 2 .375 Polanco 3b 4 0 0 0 0 1 .000 Ruiz c 4 0 0 0 0 1 .000 Cl.Lee p 2 0 0 0 0 1 .000 Lidge p 0 0 0 0 0 0 --c-Gload ph 0 0 0 0 0 0 --d-B.Francisco ph 1 0 0 0 0 0 .000 Bastardo p 0 0 0 0 0 0 --Worley p 0 0 0 0 0 0 --Madson p 0 0 0 0 0 0 --Totals 31 4 6 4 3 8 St. Louis 000 301 100 -- 5 13 0 Philadelphia 310 000 000 -- 4 6 0 a-struck out for C.Carpenter in the 4th. b-singled for Salas in the 6th. c-was announced for Lidge in the 7th. d-flied out for Gload in the 7th. LOB--St. Louis 9, Philadelphia 4. 2B--Freese (1), Theriot 2 (2), Rollins 2 (2). 3B--Furcal (1), Craig (1). RBIs--Furcal (1), Pujols (1), Theriot (1), Jay 2 (2), Pence (3), Howard 2 (6), Ibanez (4). SB--Rollins (1). CS--Pujols (1), Rollins (1). S--Descalso. Runners left in scoring position--St. Louis 6 (Berkman, Jay, Furcal, Theriot 2, Craig); Philadelphia 2 (Polanco, Howard). GIDP--Theriot, Polanco. DP--St. Louis 1 (Furcal, Theriot, Pujols); Philadelphia 2 (Rollins, Utley, Howard), (Ruiz, Ruiz, Rollins, Howard, Utley). St. Louis IP H R ER BB SO NP ERA C.Carpenter 3 5 4 4 3 2 64 12.00 Salas 2 0 0 0 0 2 19 0.00 Dotel W, 1-0 1 1-3 0 0 0 0 2 19 0.00 Rzpczynski H, 1 2-3 1 0 0 0 0 12 40.50 M.Boggs H, 1 1-3 0 0 0 0 0 4 9.00 Rhodes H, 1 1-3 0 0 0 0 1 3 0.00 Motte S, 1-1 1 1-3 0 0 0 0 1 9 0.00 Philadelphia IP H R ER BB SO NP ERA Cl.Lee L, 0-1 6 12 5 5 2 9 110 7.50 Lidge 1 0 0 0 1 0 6 0.00 Bastardo 2-3 0 0 0 1 1 12 0.00 Worley 1-3 0 0 0 0 0 3 0.00 Madson 1 1 0 0 0 2 15 0.00 Cl.Lee pitched to 3 batters in the 7th. Rzepczynski pitched to 1 batter in the 8th. Inherited runners-scored--M.Boggs 1-0, Rhodes 1-0, Motte 1-0, Lidge 2-0, Worley 1-0. IBB--off Lidge (Y.Molina). HBP--by Rzepczynski (Utley). T--3:22. A--46,575 (43,651). 20 Next up delivered � Milwaukee at right after Arizona Diamondbacks re- � When: liever Brad Tuesday, Ziegler be6:30 p.m. came angry about a balk � TV: TNTbest zero for 10 with runners in scoring position and Milwaukee kept its cool until the sixth, when seven consecutive batters reached with one out. Brewers 9, Diamondbacks 4 Arizona Bloomquist ss A.Hill 2b J.Upton rf M.Montero c AB 4 3 5 4 R 0 1 1 0 H BI BB 0 0 1 3 0 2 1 2 0 0 0 1 SO 2 0 1 2 Avg. .250 .500 .222 .000 Milwaukee AB R H BI BB SO Avg. C.Hart rf 5 2 2 1 0 0 .222 C.Gomez cf 0 0 0 0 0 0 --Morgan cf-rf 5 0 1 2 0 2 .125 Braun lf 4 2 3 3 0 1 .750 Fielder 1b 4 1 1 1 0 2 .375 R.Weeks 2b 4 0 1 1 0 0 .167 Hairston Jr. 3b 4 1 2 0 0 0 .500 Y.Betancourt ss 3 1 0 0 1 0 .143 Lucroy c 3 1 1 1 0 2 .286 Greinke p 2 0 1 0 0 1 .500 Saito p 0 0 0 0 0 0 --a-Kotsay ph 0 1 0 0 1 0 .000 Hawkins p 0 0 0 0 0 0 --Fr.Rodriguez p 0 0 0 0 0 0 --d-McGehee ph 1 0 0 0 0 0 .000 Axford p 0 0 0 0 0 0 --Totals 35 9 12 9 2 8 Arizona 010 120 000 -- 4 10 1 Milwaukee 202 005 00x -- 9 12 1 a-was intentionally walked for Saito in the 6th. b-struck out for Shaw in the 7th. c-struck out for Owings in the 8th. d-fouled out for Fr.Rodriguez in the 8th. E--Ziegler (1), Y.Betancourt (1). LOB--Arizona 10, Milwaukee 5. 2B--C.Young (1), R.Roberts (1), Braun (2), Hairston Jr. (1). 3B--R.Weeks (1). HR--Goldschmidt (1), off Greinke; C.Young (1), off Greinke; J.Upton (1), off Greinke; Braun (1), off D.Hudson. RBIs-- J.Upton 2 (2), Goldschmidt (1), C.Young (1), C.Hart (1), Morgan 2 (2), Braun 3 (3), Fielder (3), R.Weeks (1), Lucroy (2). SB--Bloomquist (2). CS--R.Roberts (1). S--Lucroy. Runners left in scoring position--Arizona 5 (D.Hudson, G.Parra, M.Montero, Blum, Goldschmidt); Milwaukee 2 (Hairston Jr., R.Weeks). Runners moved up--R.Roberts. GIDP--Y.Betancourt. DP--Arizona 1 (R.Roberts, A.Hill, Goldschmidt). Arizona IP H R ER BB SO NP ERA Tigers 5, Yankees 3 Detroit A.Jackson cf Ordonez rf 1-Kelly pr-rf D.Young lf Mi.Cabrera 1b V.Martinez dh Avila c Jh.Peralta ss Betemit 3b Inge 3b R.Santiago 2b Totals AB 5 3 2 5 4 4 3 4 2 1 2 35 R 1 1 1 0 1 0 0 0 0 1 0 5 H BI BB SO 0 0 0 2 3 0 0 0 1 1 0 0 0 0 0 1 3 3 0 1 1 1 0 2 0 0 1 2 0 0 0 2 0 0 0 0 1 0 0 0 0 0 0 0 9 5 1 10 Avg. .000 .429 .500 .222 .429 .286 .000 .250 .000 .500 .000 Cardinals 5, Phillies 4 St. Louis AB R H Furcal ss 5 0 2 Craig rf 4 1 1 M.Boggs p 0 0 0 Rhodes p 0 0 0 Motte p 0 0 0 Pujols 1b 5 0 2 Berkman lf 4 1 1 Freese 3b 4 0 1 Rzepczynski p 0 0 0 Chambers rf 1 0 0 Y.Molina c 3 1 1 Theriot 2b 4 2 2 Jay cf 3 0 2 C.Carpenter p 1 0 0 a-Punto ph 1 0 0 Salas p 0 0 0 b-Schumaker ph 1 0 1 Dotel p 0 0 0 Descalso 3b 0 0 0 Totals 36 5 13 Philadelphia Rollins ss AB R 4 2 BI 1 0 0 0 0 1 0 0 0 0 0 1 2 0 0 0 0 0 0 5 BB 0 1 0 0 0 0 1 0 0 0 1 0 1 0 0 0 0 0 0 4 SO 1 2 0 0 0 2 1 2 0 1 1 1 0 0 1 0 0 0 0 12 Avg. .333 .143 ------.375 .250 .143 --.500 .286 .500 .286 .000 .000 --.600 --.000 New York AB R H BI BB SO Avg. Jeter ss 5 0 0 0 0 2 .200 Granderson cf 4 1 1 1 1 1 .286 Cano 2b 4 0 1 0 1 2 .444 Al.Rodriguez 3b 3 0 0 0 1 0 .000 Teixeira 1b 4 0 0 0 0 1 .143 Swisher rf 3 1 1 1 1 1 .286 Posada dh 3 1 2 0 1 1 .500 R.Martin c 2 0 0 0 1 0 .167 Gardner lf 2 0 0 0 0 0 .167 a-Er.Chavez ph 1 0 0 0 0 1 .000 An.Jones lf 0 0 0 1 0 0 --Totals 31 3 5 3 6 9 Detroit 200 002 001 -- 5 9 0 New York 000 000 012 -- 3 5 1 a-struck out for Gardner in the 7th. Jeffrey Phelps / The Associated Press H BI BB SO Avg. 3 0 0 0 .625 Milwaukee Brewers' Jonathan Lucroy reacts after his RBI bunt during the sixth inning of Game 2 of baseball's National League division series against the Arizona Diamondbacks, Sunday in Milwaukee. THE BULLETIN � Monday, October 3, 2011 D5 COLLEGE FOOTBALL NOTEBOOK Troubled Ohio State on verge of collapse By Ralph D. Russo The Associated Press Julie Jacobson / The Associated Press Kevin Na reacts after sinking a putt on the 18th green to win the Justin Timberlake Shriners Hospitals for Children Open, Sunday in Las Vegas. Na finished 23 under par for the tournament. Na gets first PGA Tour victory The Associated Press LAS VEGAS -- Kevin Na won the Justin Timberlake Shriners Hospitals for Children Open on Sunday for his first PGA Tour title, birdieing Nos. 1517 to pull away for a two-stroke victory over Nick Watney. The 28-year-old Na closed with a 6under 65 for a tournament-record 23under 261 total at TPC Summlerin in the Fall Series opener. Watney, a twot GOLF ROUNDUP. Also on Sunday: Late eagle lifts Perry to victory CARY, N.C. -- Kenny Perry won the SAS Championship for his first Champions Tour title, making a 30-foot eagle putt on the par-5 17th en route to a 2under 70 and a one-stroke victory over Jeff Sluman and John Huston. Perry won a day after sister Kay Perry died after a long fight with breast cancer. The 51-year-old Perry, a 14-time winner on the PGA Tour winner, had an 11under 205 total -- the highest winning score in tournament history -- on the Prestonwood Country Club course. Sluman also finished with a 70, and Huston shot a 71. Hoey tops countrymen for title ST. ANDREWS, Scotland -- Northern Ireland's Michael Hoey held off countrymen Rory McIlroy and Graeme McDowell to win the Dunhill Links Championship. Hoey closed with a 6-under 68 at St. Andrews for a tournament-record 22under 266 total. McIlroy shot a 68 to finish two strokes back. McDowell (69) and Scotland's George Murray (67) tied for third at 18 under. Columbia Continued from D1 The team score at the 36-hole tournament is calculated by taking the three best stroke-play scores each day from every four-golfer team. The scores from Hval (68-70--138), Mahar (70-74--144) and Winter (7275--147) counted both days. Mark Olsen shot 76-79--155. Scores crept higher Sunday as players struggled with the wind at Brasada. After shooting 8 under during the first round Saturday, Broadmoor struggled to 8 over in the final round. And that opened the door for Columbia Edgewater. "The wind was tough," said Winter, a former University of Portland men's golf coach, a day after many players shot under par in calm conditions. "The wind made it a par golf course." Columbia Edgewater edged the teams from Creswell's Emerald Valley Golf Club and Bandon Dunes Golf Resort on the southern Oregon Coast. The team from Redmond's Juniper Golf Club (+13) finished in eighth place out of 36 teams and eight spots ahead of Bend Golf and Country Club (+26), which ended in 16th place. The Cen- tral Oregon Golf Tour (+41) finished in 28th, and Sunriver Resort (+44) earned 31st place. For Hval, the Team Championship and medalist honors mark the final pieces to a great week. On Friday, he won the championship match of the Oregon Senior Amateur Championship at Astoria Golf and Country Club in Warrenton. "In a way, it's been easy because I have just been playing so well," said Hval, a 50-year-old dentist. "It's been a good week." Zack Hall can be reached at 541-6177868 or at zhall@bendbulletin.com. 107 46-1. No. 2 Alabama moves behind LSU in AP poll past four seasons. And for the first time since 2000, the Nos. 1 and 2 teams reside in the same division. That season Nebraska and Kansas State of the Big 12 North held the top two spots in the AP poll for one week. Wisconsin. -- The Associated Press at 3-1. Quick hits � The national championship race looks like an eight-team contest between LSU, Alabama, Oklahoma, Wisconsin, Stanford, Oklahoma State, Boise State and Clemson. �. �. Gilchrist Continued from D1 Is this heaven? No, it's the home of eight-man football in Central Oregon. Since 2003, the Grizzlies have been playing with three fewer players than traditional football. While the rules of eight-man football vary slightly across the country -- in some states, the game is played on an 80-yard field -- the field dimensions in Oregon are the same as the traditional 11-man game. Typically, though it varies with formations, the three "missing" players in eight-man football are two tackles and a receiver on offense and two defensive backs and a defensive lineman on defense. Speed rules in eight-man football, especially on a 100-yard field. "If you can get to the perimeter, you can do quite well," says longtime Gilchrist coach Steve Hall, who has been coaching football for almost 30 years. "If you have a little pop inside, you'll be successful too." Playing without lights -- games start at 4 and sometimes 3 p.m. in Gilchrist to assure ample daylight -- Grizzly football generates the same passion and enthusiasm as any Cougar or Lava Bear contest. With spectators allowed to roam the track, game officials are at times less than 10 feet away from "helpful" parents. The bleachers at Gilchrist are only eight rows deep, which seems to encourage roaming spectators. The visitors' side of the field, which has no seating, resembled a church picnic two weeks ago as North Lake fans pulled up folding chairs and portable seating cushions alongside the track. "I had a dad high-fiving me on the sideline (before Gilchrist defeated North Lake 44-28) and there was still three minutes left in the game," Grizzly assistant coach Brian Stock recalls. "I told him to chill out, we've still got to get a stop." As the sun fades, Gilchrist's jewel of a stadium only shines brighter. Ponderosa and lodgepole pine trees cast shadows on the field, creating an effect that the University of Oregon spent several million dollars trying to replicate at its new Matt Court basketball court. The "golden hour" that photographers speak about in reverent tones backlights the final quarter of play. "Our stadium is little, but it's a beautiful setting," says Hall, who is in his 13th season as the Grizzlies' head coach. "You can't beat it. It's wonderful." While Class 6A and 5A football programs field three teams (varsity, junior varsity and frosh) with sometimes as many as 20 coaches, Gilchrist this season has one team with 16 players "Coaching defense, it's almost impossible to get a shutout. You're one missed tackle from a big play, every play." -- Gilchrist assistant coach Brian Stock and two coaches. Hall runs the offense, and Stock, the team's lone assistant, calls the defense. Platooning -- common among teams at larger schools -- is not a consideration at Gilchrist. When the Grizzlies go from offense to defense, center Bradley Toombs is the only player who subs out. The other seven Gilchrist players simply morph from quarterback to cornerback, offensive tackle to nose guard. "Coaching defense, it's almost impossible to get a shutout," says Stock, who played 11-man football at Henley High in Klamath Falls. "You're one missed tackle from a big play, every play." While programs from bigger schools often use a player from the soccer team to handle kicking duties, that is not an option for most eight-man teams. Onside and squib kicks are fairly common in eight-man football, and teams often go for it on fourth down, in part because punting can be so hit or miss. "The number one thing is: Do you have anyone that can kick?" Stock asks rhetorically about kickoff strategies. "And if you do, you have less people to make the tackle. I can't count how many kickoff returns we see each year." This year's Grizzly team is 21 through three games, young but full of potential. For the first time in his coaching career Hall is starting a freshman, Jonny Heitzman, at quarterback. (At most other large schools, freshmen rarely play varsity, let alone start at quarterback.) Gilchrist, with only four seniors on the roster, has shown a flair for the dramatic this season, rallying back from a 28-18 halftime deficit against North Lake two Fridays ago to post their first win. "Here I am, 30 years into coaching football, and I've got a freshman at quarterback," Hall says with a chuckle. "Has that ever happened? No. But he does a great job." The Grizzlies defeated Butte Falls 58-20 this past Friday in their third straight home game. After the final horn the two teams sat down together for a homemade taco feed before the Loggers headed back to Butte Falls. "That's what we do in these little communities," Hall says approvingly. "We try to do the whole thing (at games)." Hall then adds, half serious, half joking: "You just hope you don't have overtime." Beau Eastes can be reached at 541-383-0305 or at beastes@ bendbulletin.com. Self Referrals Welcome 541-706-6900 541-388-4418 Find It All Online bendbulletin.com D6 Monday, October 3, 2011 � THE BULLETIN MOTOR SPORTS ROUNDUP C CAMPS/CLASSES/ CLINICS BICYCLE REPAIR AND MAINTENANCE CLINICS: Learn how to properly repair and maintain your bike; first and third Tuesdays of each month; free; Pine Mountain Sports, 255 S.W. Century Drive, Bend; advanced sign-up required; 541-385-8080;. FIX-A-FLAT CLINIC: Learn how to repair a punctured mountain- or road-bike tire; 10 a.m. Sundays; Sunnyside Sports, 930 N.W. Newport Ave., Bend; free; 541-382-8018. E C Sunday, Oct. 14-16; rides of 22 to 90 miles; marked routes, aid stations and mechanical support; $89-$159; 541-385-7002; bendsbigfattour.com. TRINITY BIKES RIDE: All-comers group road and mountain bike rides leave from Trinity Bikes, 811 S.W. 13th St., Redmond; road rides at 5:30 p.m. Tuesdays; mountain bike rides 6 p.m. Wednesdays; free; 541-923-5650. 9 a.m. Saturdays in Bend from Hutch's Bicycles east-side location, 820 N.E. Third St.; approximately 40 miles; vigorous pace; 541-3826248;. Please e-mail sports event information to sports@bendbulletin.com or click on "Submit an Event" on our website at bendbulletin.com. Items are published on a space-availability basis, and should be submitted at least 10 days before the event. MOUNTAIN BIKING PROGRAM: For beginning through advanced riders ages 8-14 (grades three through eight); Wednesdays through Oct. 19; 2:30-4 p.m. grades three through five; 1-4:15 p.m. for grades six through eight; transportation for particiapnts in grades six through eight; Bill Warburton; 541-335-1346; www. bendenduranceacademy.org. OUT OF TOWN HARVEST CENTURY: Saturday; 7 a.m.; Hillsboro; $45-$55, 45-, 75and 100-mile routes, family route; continental breakfast, rest stops, catered lunch and finish line party; $45;. DOUBLE TROBLE: Noncompetitive double century ride; Saturday; Maupin; solo and tandem riders, two-person and four-person teams; $50-$200;. com/double-trouble. RACES CROSS AT THE COLLEGE: Threerace cyclocross series; Thursdays, Oct. 6, 13 and 20; Central Oregon Community College; registration at 4:45 p.m.; first race begins at 5:25 p.m.; free for COCC and OSU-Cascades students, $5 all other students, $10 all other riders; Matt Plummer; 541-385-7413;. T.I.R. FAT TIRE CRIT: Saturday, Oct. 8; registration starts at 3 p.m.; beginner, intermediate, expert, BMX and kids races; racing starts at 4:30 p.m.; $12; Trinity Bikes, 865 S.W. 17th St. #301, Redmond. CROSSAFLIXION CUP CYCLOCROSS SERIES: Final race of series is Sunday, 8:30 a.m.; Seventh Mountain Resort, Bend; $22 adults, $5 juniors, $60 series; complete race schedule available online; for all ages and abilities;. SHUTTLES EVENING LOCAL SHUTTLE: Tuesdays and Thursdays; leaves at 5:30 p.m. from Cascade Lakes Brewery; drop offs at Dutchman and Swampy Lakes sno-parks; $10 per person; reserve in advance; Cog Wild; 541385-7002; info@cogwild.com. MCKENZIE RIVER SHUTTLE: Available daily, usually runs once or twice per week; $240 per van; confirmed reserved dates also available at; 541-385-7002. SHUTTLE PUNCH PASSES: Six-use passes; $60; valid to use for any local $10 shuttle; Cog Wild; 255 S.W. Century Drive, Bend; 541-385-7002. PRIVATE SHUTTLES: Available for a variety of dates and times; $80 per hour per shuttle, which can fit up to 14 riders and bikes; call to reserve in advance; Cog Wild; 541-385-7002;. JUNIOR DEVELOPMENT MBSEF YOUTH CYCLOCROSS PROGRAM: For riders ages 10-18; through Sunday, Oct. 30; program includes weekend camp, weekly clinics and support at races; coaching from Bart Bowen, a former national champion cyclist; for information or to register, call MBSEF at 541-388-0002. BEND ENDURANCE ACADEMY CYCLOCROSS PROGRAM: For beginning through advanced riders ages 10-18; through Saturday, Nov. 19; multiple enrollment options available; fully supported trips to races; Bill Warburton; 541-335-1346; www. bendenduranceacademy.org. BEND ENDURANCE ACADEMY YOUTH Russ Hamilton Jr. / The Associated Press Kurt Busch celebrates in victory lane after winning Sunday's NASCAR Sprint Cup race at Dover International Speedway in Dover, Del. Kurt Busch takes the win at Dover The Associated Press DOVER, Del. -- rear view point at Richmond when Busch called Johnson a "fivetime chump." "To beat your arch nemesis, that's just icing on the cake. That's pretty sweet," Busch said.." Also on Sunday: Carpenter edges Franchitti for first career victory SPARTA, Ky. -- It's that time of the season when the focus is on Scott Dixon, Dario Franchitti and Will Power -- the guys running for the IndyCar championship. It means the also-rans get overlooked, even when they've proven they can be a player. Ed Carpenter did just that Sunday at Kentucky Speedway. Carpenter scored his first career IndyCar victory by beating Franchitti in a wheel-to-wheel battle to the checkered flag in the closest finish in track history. Even though he had finished second here the previous two years, there was no buzz about Carpenter before the race began. "I've always known that I've belonged, but until you win one, there are always going to be people who think different," shrugged Carpenter, who gave Sarah Fisher Racing its first victory. Rain forces NHRA to postpone final eliminations MOHNTON, Pa. -- Rain forced NHRA officials to postpone the final eliminations in the NHRA Nationals at Maple Grove Raceway. RIDES BEND'S BIG FAT TOUR: Friday- CYCLING SCOREBOARD CYCLOCROSS Thrilla CX Series Race #4 Sept. 29, Bend Men A 1, Ryan Trebon. 2, Brennan Wodtli. 3, Cody Peterson. 4, Eric Martin. 5, Scotty Carlile. 6, Tim Jones. 7, Bart Bowen. 8, Damien Schmitt. 9, Matt Fox. 10, Mike Brown. 11, James Williams. 12, Chris Winans. 13, John Rollert. 14, Kyle Wuepper. 15, Matt Williams. A 40+ 1, Andrew Sargent. 2, Derek Stallings. 3, Brian Seguin. 4, George Wescott. 5, Doug Smith. 6, David Baker. 7, Ralph Tolli. B 1, Scott Gray. 2, Brian Jorgensen. 3, Colin Dunlap. 4, Ryan Ness. 5, Adam Carroll. 6, Jared Reber. 7, Chad Willems. 8, Matt Hickey. 9, Dawson Stallings. 10, Monty Nelson. 11, Robert Gilbert. 12, Steve Langenderfer. 13, Darren Smith. 14, Jeff Merwin. 15, Rob Angelo. 16, Geoff Raynak. 17, Kevin Donnelly. 18, Samuel Stumbo. 19, Beny Ambauen. 20, Ben Lewis. 21, Steve Helt. 22, Brett Golden. 23, Cory Tanler. B 40+ 1, David Taylor. 2, Eric Birky. 3, Dan Wolnick. 4, Todd Schock. 5 Henry Abel. 6, Mark Backus. 7, Jay Palubeski. 8, Todd Sprague. 9, Rene Bates. 10, Derek Faller. 11, Walter McKnight. 12, Rob Kerr. 13, William Bazemore. 14, Dan Davis. 15, Brian Smith. 16, Stephen Crozier. 17, Rick Peters. 18, Amory Cheney. C 1, Cameron Beard. 2, Cameron Carrick. 3, Evan Olson. 4, Ryan Altman. 5, Chris Zanger. 6, Andrew Hayes. 7, Matt Wilkin. 8, Jeff Johnston. 9, Lucas Freeman. 10, Ken Johnson. 11, John Livingston. 12, Mike Taylor. 13, Zach Colton. C 40+ 1, David Anderson. 2, Mike McLandress. 3, Jeff Monson. 4, Juan Ramirez. 5, Tim Beard. 6, Craig Mavis. 7, Kyle Gorman. 8, David Gratke. 9, unknown rider. 10, Michael Coe. 11, Kern Reynolds. 12, Craig Gerlach. 13, Joel Kent. 14, Shawn Gerdes. 15, Andy Barram. 16, Brad Pfeiffer. 17, Burke Selbst. Women A 1, Serena Bishop Gordon. 2, Angela Mart. B 1, Laura Hagen. 2, Andrea Thomas. 3, Diana Spring. 4, Angelina Salerno. 5, Mary Ramos. 6, Shellie Heggenberger. 7, Mary Skrzynski. 8, Aimee Furber. 9, Nicholle Kovach. 10, Lynda Palubeski. 11, Jennifer Bruce. C 1, Michelle Mills. 2, Holly Pfeiffer. 3, Lauren Mork. 4, Meredith Brandt. 5, Melodie Buell. 6, Marny Musielak. 7, Patti Wolfe. 8, Amy Mitchell. 9, Lauren Hamlin. Juniors 1, Mitchell Stevens. 2, Lance Haidet. 3, Keenan Reynolds. 4, Ian Wilson. 5, Will Beaudry. 6, Hannah Mavis. 7, Luke Johnson. 8, Ivy Taylor. 9, Walter Lafky. Rides Continued from D1 "It's one of the most amazing scenic spots you're going to find," says Cody Peterson, an employee at Hutch's Bicycles in Bend. "It's one of the most scenic roads in the country. It's gorgeous." Sisters is a good starting location to ride McKenzie Pass. Riders will pick up more than 2,000 feet of elevation gain to the top of the pass and then can ride down the western side to the McKenzie Bridge area before turning around and heading for home. Along with plenty of climbing on this ride, cyclists get to roll along sustained descents and ride on some serious switchbacks, the likes of which are rarely found on United States roads, Peterson observed. The ride has a lot of scenic variation as well. "The leaves are going to change colors on the other side (of the pass), because you go from evergreen trees to the different tree type (deciduous) on the western side of the Cascades," Peterson said. "You go from high desert to full-on volcanic fields to lush forest." And if 75 miles seems too long of a distance, as Boyd pointed out, cyclists can always ride just part of McKenzie Pass, turning around a few miles west of the pass (whose elevation reaches 5,324 feet) or at other intermediate locations. For riders who love to climb, another route both Boyd and Peterson mentioned is to the Paulina Lake Road, off U.S. Highway 97 just north of La Pine, which will take riders to Paulina and East lakes. "It's a very substantial climb getting up to the lakes, but it's a really pretty climb and the lakes are just gorgeous," Peterson said. For cyclocross riders, Peterson suggested exploring Three Creeks Road, which heads south out of Sisters and also offers some good climbing opportunities. Cyclocross riders can also hit the road by riding to the end of Skyliners Road west of Bend and taking a right there onto the dirt road that eventually connects with Three Creeks Road. The route will offer peeks at the Three Sisters and Broken Top, Peterson noted. If you are not feeling up to climbing McKenzie Pass or just want a shorter option, an out-andback route along state Highway 27 that runs south out of Prineville might be just the ticket. "It's one of those rides that it can be socked in in the mountains in November, and you can go there and it's going to be 15 degrees warmer," Boyd said of the ride -- about 40 miles total -- from Prineville to Prineville Reservoir and back, which will take riders past fields and farmlands and through a canyon. Of course, these are just some of many possible options for fall riding in Central Oregon. Others include Camp Sherman, Twin Bridges in the Tumalo area, Cascade Lakes Highway, Horse Ridge and Crater Lake. For these rides and any others, your local bike shop is a solid resource. You can buy maps to carry along on rides, and bike shop employees can hash over route options. So do not let a lack of imagination or sense of exploration stop you. Get out and ride while the riding is good. After all, winter is coming. Amanda Miles can be reached at 541-383-0393 or at amiles@ bendbulletin.com. SOCCER Timbers victorious over Whitecaps VANCOUVER, British Columbia -- Kenny Cooper scored in the 25th minute and the Portland Timbers beat the Vancouver Whitecaps 1-0 Sunday in the first MLS game played. "It was a huge win," Cooper said. "It feels good to get three points against them." It wasn't the way the Whitecaps wanted to christen their new home. The enthusiasm that bubbled before the match turned flat by the end. "You went away frustrated and disappointed," Vancouver interim coach Tom Soehn said. "I didn't think we had the best energy in the first half. That's hard to explain when you look at this venue and the excitement. We gave away a bad goal. There is no looking back. Teams punish you for mistakes." 541-322-CARE DEAL of the BUY ANY SANDWICH & DRINK & GET A SECOND SANDWICH & DRINK FOR FREE!* 62090 NE DEAN SWIFT RD., BEND (OFF HWY 20, ACROSS FROM COSTCO) DAY *Free sandwich & drink is of equal or lesser value. Coupon good 10/03/11. Original newsprint only. One coupon per visit. Coupon has no cash value. 541-550-7778 see our menu at Sign up to receive notification of these and other great money saving offers in The Bulletin. E-mail your name and address to emailnotifications@bendbulletin.com THE BULLETIN � Monday, October 3, 2011 E1 CLASSIFIEDS The Bulletin GENERAL MERCHANDISE EMPLOYMENT PROFESSIONAL SERVICES LEGAL NOTICES To place your ad visit or call 541-385-5809 Find Classifieds at TRANSPORTATION RENTALS/REAL ESTATE contact us: Place an ad: 541-385-5809 Place an ad with the help of a Bulletin Classified representative between the business hours of 8 a.m. and 5 p.m. hours: FAX an ad: 541-322-7253 Include your name, phone number and address Business Hours: Monday - Friday 7:30 a.m. - 5:00 p.m. Subscriber Services: 541-385-5800 Subscribe or manage your subscription On the web at: 1 7 7 7 S . W . 210 Classified Telephone Hours: Monday - Friday 7:30 a.m. - 5:00 p.m. Saturday 10:00 a.m. - 12:30 p.m. 24 Hour Message Line: 541-383-2371 Place, cancel, or extend an ad T h e B u l l e t i n : C h a n d l e r 246 A v e . , 253 B e n d 265 O r e g o n 269 9 7 7 0 2 Farm Market Furniture & Appliances Second Hand Mattresses, sets & singles, call Guns, Hunting and Fishing Ruger 10/22 semi-auto rifle, syn stock, w/ammo, like new, $200. 541-647-8931 Ruger 44 Magnum, $475; Pre-64 30-30 Winchester; $375; 30-40 Craig, $175; 410 Shotgun, $125; 22 Mag Derringer, $150; misc. ammo & hunting knives,503-830-6564 Sturgeon Gear: 10', 12' & 15' Ugly Stik rods. Penn Level Wind & spin reels. Tailer pole holder, pocket belt. Line, weights & many new hooks, other tackle, tackle box, 2 pole holders for bank fishing. Also collection of knives, $500 for all, or part reasonably priced. 541-420-0306 UTAH Concealed Firearms Permit class w/ LIVE FIRE! $99. Sisters, Sat. 11/5. Call: 503-585-5000 817-789-5395 Wanted: Collector seeks high quality fishing items. Call 541-678-5753, 503-351-2746 Weatherby Mark V 340, very nice, $1100. Please call 541-548-4774 TV, Stereo and Video Mitsubishi 52" HD-ready flat screen TV & matching stand, $500 obo. 541-504-1470 Building Materials Gardening Supplies & Equipment SUPER TOP SOIL Screened, soil & compost mixed, no rocks/clods. High humus level, exc. for flower beds, lawns, gardens, straight screened top soil. Bark. Clean fill. Deliver/you haul. 541-548-3949. The Hardwood Outlet Wood Floor Super Store 541-598-4643.. 255 Computers THE BULLETIN requires computer advertisers with multiple ad schedules or those selling multiple systems/ software, to disclose the name of the business or the term "dealer" in their ads. Private party advertisers are defined as those who sell one computer. 300 308 Farm Equipment and Machinery � Laminate from .79� sq.ft. � Hardwood from $2.99 sq.ft. 541-322-0496 266 Find It in The Bulletin Classifieds! 541-385-5809 258 Travel/Tickets Duck Tickets vs Arizona State, Sat., Oct 15, 35-yd line, 12 rows behind Duck bench. 2 @ $150 ea. 541-390-4115 212 Heating and Stoves 3 large zero-clearance fireplaces, showroom models, 1 right corner, 2 flat wall, $500 ea, OBO. 1 newer woodstove, $1200 firm. Several gas & pellet stoves, $800 each OBO. All warrantied for 1 season. Call 541-548-8081 Your Backyard Birdfeeding Specialists! 1992 Case 580K 4WD, 5500 hrs, cab heat, extend-a-hoe, 2nd owner, clean & tight, tires 60% tread. $24,900 or best offer. Call 541-419-2713 Antiques & Collectibles The Bulletin reserves the right to publish all ads from The Bulletin newspaper onto The Bulletin Internet website. TURN THE PAGE For More Ads 260 The Bulletin Ford Model 640 Tractor, circa 1954. Front loader hydraulic system totally rebuilt. 7-ft scraper blade; PTO; chains; new battery. Oldie but goodie! $3750. 541-382-5543 Misc. Items Buying Diamonds /Gold for Cash SAXON'S FINE JEWELERS Forum Center, Bend 241 Bicycles and Accessories 4 GOOD BIKES - 2 mountain bikes and 2 road bikes, $20 each. 541-385-6012 General Merchandise Pets and Supplies. Pets and Supplies Mini Aussies 1 females & 4 males, $250 ea. Ready to go! 541-420-9694. Pomeranian puppy female. She is sweet and playful with a party coloring. $400. Call (541) 480-3160 Pomeranian puppy. Female wolf-sable. Beautiful thick double coat, cute face, $400 Call (541) 480-3160. 242 200 202 Exercise Equipment NordicTrack Recumbent Bike, #SL728, like new, $250 or best offer. 541-389-9268 246 Want to Buy or Rent Wanted: $Cash paid for vintage costume Jewelry. Top dollar paid for Gold & Silver. I buy by the Estate, Honest Artist. Elizabeth, 541-633-7006 Wanted: Used wood splitter, in good condition, will pay fair value. 541-508-0916 Guns, Hunting and Fishing NOTICE TO ADVERTISER 541-617-8840 Since September 29, 1991, BUYING advertising for used woodWinchester Model 12, 12-ga, Lionel/American Flyer trains, stoves has been limited to excellent condition, $450 or accessories. 541-408-2191. models which have been 270 best offer. 541-593-7474 certified by the Oregon DeLost and Found Winchester Model 50 Auto, Ferragamo Shoe Lovers: Size partment of Environmental 8�, 20+ pairs, heels, flats, 12/20-gauge, excellent cond, Quality (DEQ) and the fedcasual, dressy, new & used, $425 OBO. 541-593-7474 eral Environmental Protec- Found Kite: Eve. of Sat. 9/24, starting at $49.541-312-2972 Snowberry Village, call to tion Agency (EPA) as having Winchester Model 70 30-06, identify, 541-389-1526. met smoke emission stanpre-64, pre-WWII, beautiful, INDIAN dards. A certified woodstove Found Wristwatch, on Phil's 85-90%, must see, $800, may be identified by its cerSUMMER Trail, 9/25. Call to identify, 541-977-8393. tification label, which is perA refreshing & 541-388-2939 manently attached to the Win. Mod. 70 300 Weatherby affordable stove. The Bulletin will not Lost Cat - white female named mag. 1951, Exc. cond. all selection of Lucy, 13 yrs old, declawed, knowingly accept advertising orig. 3x6 Weaver scope gifts & goods ran from car crash on for the sale of uncertified 510-909-8085 cell info/make inspired by nature for you, 8/11/11, on Hwy 97 at woodstoves. offer, live in Bend your home & garden. Highland, Redmond. If seen, 1900 NE Division St., Bend. Wanted: Gas freestanding 248 please call 541-504-4194. Tue-Sat 10-4. heater in good condition. Call Health and 541-508-0916. 541-389-6655 325 Hay, Grain and Feed CLEAN AND GREEN 2nd cutting alfalfa, and grass hay, 200 ton 3x4 bales, $200 ton. Call 541-475-3324. Premium orchard grass 3x3 mid-size bales, no rain, no weeds. $100 per bale. 541-419-2713. Wheat Straw: Certified & Bedding Straw & Garden Straw; Compost. 541-546-6171. 341 Horses and Equipment Horse Boarding In Bend City Limits, Heated indoor arena, stalls with paddocks, price depends on care level, 541-385-6783,541-788-9512 Picking up unwanted horses, cash paid for some, 509-520-8526. 208. Bulldog/Boxers - Valley Bulldog puppies. 4 males, 3 females, CKC Reg. Brindle & white. $800. 541-325-3376 Chihuahua Pups, assorted colors, teacup/toy, 1st shots, wormed, $250,541-977-4686 Dove, white, adult male, healthy and good breeder. $10. 541-382-2194 30-06 Winchester Model 70 Rifle, pre-'64, 4x scope, wood stock, leather sling, exclnt Poodle Pups, AKC toys for shape, $900. 541-548-3301 sale. Adults, rescued toys, for free adoption. 541-475-3889 40cal Taurus SS pistol, 4mags, $375. Rem. 7mm rifle, syn stock, $325. 541-647-8931 PUREBRED BOXER PUPPY Brindle male Call Classifieds at 7.62x39 SKS with wood stock 8 weeks on 9/27/11 541-385-5809 and bayonet, one thirty $500. (541) 815-9157 round mag., Chinese?? $375 OBO. 541-977-3091. Queensland Heelers Free Wirehaired Terrier,neutered Bend local, Standards & mini,$150 & up. male, housebroke, very loving, CASH PAID for GUNS! 541-280-1537 to loving home, 541-241-0202 541-526-0617 CASH!! Redbone Puppy, Registered, 12 For Guns, Ammo & Reloading wks old, great looks, smart & Supplies. 541-408-6900. sweet, $400. 541-815-7868 DO YOU HAVE Rodents? FREE barn/shop cats, SOMETHING TO SELL we deliver! Altered, shots. AKC White German Shepherds, FOR $500 OR LESS? Some friendly, some not so $550; reserve yours for $100. Non-commercial much, but will provide exReady to go October 2. Call advertisers may pert rodent control in ex541-536-6167 an ad with our change for safe shelter, food whiteshepherds.com & water. 541-389-8420. "QUICK CASH GERMAN SHEPHERD PUP, SPECIAL" male, ready now both par- Wolf hybrid dogs, nice & big! 1 1 week 3 lines male, 1 female, 1 year old, ents on site. $400. $12 or $400 each. 541-408-1115 541-280-3050 2 weeks $18! German Shepherd pups, 8 wks, Yorkie-Chihuahua male puppy, Ad must papers, 6 F, 2 M, blk & tan & looks Yorkie, tiny, $250 cash. include price of single item sable, $350. 541-389-8447 541-546-7909 of $500 or less, or multiple items whose total German Shorthaired Pointers, does not exceed $500. Great for hunting or family pet, Both parents used for Call Classifieds at guiding, $350, ready now. 541-385-5809 541-420-1869 leave message Guinea Pigs, 6-week old sisters. Free (together) to good YORKIES, AKC females. Excelhome only. 541-317-2827 lent temperaments. 7 wks now. Glock .40cal auto pistol, $450. Winchester 30-06 bolt rifle & Kittens/cats avail from rescue $850. Details: 541-388-3322 scope, $350. 541-647-8931 group, 1-5 Sat/Sun, other 210 HANDGUN SAFETY CLASS days by appt. 65480 78th St, for concealed license. NRA, Bend. Altered, shots, ID chip, Furniture & Appliances Police Firearms Instructor, carrier, more. Kittens just Lt. Gary DeKorte Wed., Oct. $40 for 1, $60 for 2; adult !Appliances! A-1 Quality & Honesty! 12th 6:30-10:30 pm. Call cats just $25, 2 for $40, free A-1 Washers & Dryers Kevin, Centwise, for reservaas mentor cat if kitten $125 each. Full Warranty. tions $40. 541-548-4422 adopted! Adult companion Free Del. Also wanted W/D's cats free to seniors, disabled dead or alive. 541-280-7355. H&K USP 45 cal in excel& veterans! 389-8420. Map, lent condition. Only 100 photos at. Bed, Serta Perfect Sleeper, pillowtop, king, mattress, box rounds fired thru barrell. LAB PUPS AKC, 7x Master Nasprings, $800, 541-923-6760 Comes with extra magational Hunter sired, yellows & zine, nylon holster and 200 blacks, hips & elbows certi- GENERATE SOME excitement in rounds. $750 Firm. Call fied, 541-771-2330 your neighborhood! Plan a (541) 504-3333. garage sale and don't forget to advertise in classified! Labradoodles, Australian Mossberg 12g 500 pump, syn 541-385-5809. Imports - 541-504-2662 stock, ext'd mag, 7+1 shot gun, $275. 541-647-8931 Maytag room A/C, 34x19x13, exc. condition. Paid $545, Rem. 30-06 pump, like new, LABRADOR PUPPIES asking $250 obo, cash only. 2 black males $275. Rem. Model 31, 12ga 541-318-8668. pump, $195. 541-815-4901 541-504-8550 or 541-788-4111 Queen Bed, w/pillowtop mat- Remington 1100 12 GA, 3" chambers, vented rib, recoil Lhasa Apso/Shih Tzu pup, tress & box spring, night pad, exc. cond., call Hank, gorgeous, $300. Linda, stand, dresser, exc. cond., 541-548-1775. 503-888-0800 Madras. $450/all, Ron, 441-389-0371 Beauty Items 267 Fuel and Wood WHEN BUYING FIREWOOD... To avoid fraud, The Bulletin recommends payment for Firewood only upon delivery and inspection. 345 Belly Fat A Problem? FREE DVD Reveals weight loss myths. Get ANSWERS to lasting weight loss. Call 866-700-2424 Over 40 Years Experience in Carpet Upholstery & Rug Cleaning Call Now! 541-382-9498 CCB #72129 Pool Table, exc. cond, used sparingly along w/cues and light, $1600/all, Ron, 541-389-0371. Wanted - paying cash for Hi-fi audio & studio equip. McIntosh, JBL, Marantz, Dynaco, Heathkit, Sansui, Carver, NAD, etc. Call 541-261-1808 Livestock & Equipment Lost Chihuahua: female small, wearing pink body glove. Sun. 9/25, approx. 7:30 a.m. off Skyliner Rd. on Phil's Trl. $100 Reward! 541-385-9397 REMEMBER: If you have lost an animal, don't forget to check The Humane Society in Bend, 541-382-3537 Redmond, 541-923-0882 Prineville, 541-447-7178; OR Craft Cats, 541-389-8420. Paying Cash for Sheep & Goats, Please call 509-520-8526 for more info. � A cord is 128 cu. ft. 4' x 4' x 8' � Receipts should include, name, phone, price and kind of wood purchased. � Firewood ads MUST include species and cost per cord to better serve our customers. 358 Farmers Column 10X20 STORAGE BUILDINGS for protecting hay, firewood, livestock etc. $1496 Installed. 541-617-1133. CCB #173684. kfjbuilders@ykwc.net A farmer that does it right & is on time. Power no till seeding, disc, till, plow & plant new/older fields, haying services, cut, rake, bale, Gopher control. 541-419-4516 249 Art, Jewelry and Furs All Year Dependable Firewood: Dry , split lodgepole, 1 for $155 or 2 for $300. No limit. Cash, check, or credit. Bend 541-420-3484 Dry Lodgepole For Sale $165/cord rounds; $200/cord split. 1.5 Cord Minimum 36 years' service to Central Oregon. Call 541-350-2859 286 Sales Northeast Bend 265 Horse Sculture, by J. Chester Armstrong, one of Central OR's most famous artists, cherry wood, 57" wide, 35" high, private owner, $10,000, 541-593-7191. Building Materials HH FREE HH Garage Sale Kit Place an ad in The Bulletin for your garage sale and receive a Garage Sale Kit FREE! KIT INCLUDES: � 4 Garage Sale Signs � $1.00 Off Coupon To Use Toward Your Next Ad � 10 Tips For "Garage Sale Success!" � And Inventory Sheet PICK UP YOUR GARAGE SALE KIT AT: 1777 SW Chandler Ave. Bend, OR 97702 269 Gardening Supplies & Equipment BarkTurfSoil.com Instant Landscaping Co. BULK GARDEN MATERIALS Wholesale Peat Moss Sales Cabinet Refacing & Refinishing. Save Thousands! Most jobs completed in 5 days or less. Best Pricing in the Industry. 541-389-9663 541-647-8261. Check out the classiieds online Updated daily For newspaper delivery , call the Circulation Dept. at 541-385-5800 To place an ad, call 541-385-5809 or email classified@bendbulletin.com 375 Meat & Animal Processing Angus Beef, No hormones or chemicals, locally grown, all natural, USDA inspected, whole or half, $2.95/lb. hanging weight, incl. cut & wrap, 541-390-1611. 292 John Deere 57 riding mower, magneto, new belts, $225 firm. 541-504-9747 Sales Other Areas Moving sale-Everything must go! All indoors. Free coffee and cookies. 2000 Suzuki John Deere RX95 riding Vitara 4WD, Kubota L175 mower, new battery, $325 tractor w/blade and utility firm. 541-504-9747 scoop. Lots of misc. Everything half price or lower on FIND IT! Sunday! 144444 Birchwood BUY IT! Rd. Sunforest Estates, 8.25 SELL IT! mi. south on Hwy 31. Fri-Sun The Bulletin Classiieds Oct. 7-9, 9 a.m.-4 p.m. E2 Monday, October 3, 2011 � THE BULLETIN To place an ad call Classiied � 541-385-5809 THE NEW YORK TIMES CROSSWORD Edited by Will Shortz 541-385-5809 or go to AD PLACEMENT DEADLINES *Must state prices in ad Place a photo in your private party ad for only $15.00 per week. PLACE AN AD Garage Sale Special 4 lines for 4 days. . . . . . . . . $20.00 OVER $500 in total merchandise 4 days . . . . . . . . . . . . . . . . . $17.50 7 days . . . . . . . . . . . . . . . . . $23.00 14 days . . . . . . . . . . . . . . . . $32.50 28 days . . . . . . . . . . . . . . . . $60.50 . 476 476 476 528 573 Employment Opportunities 476 Medical Billing Specialist/ Medical Assistant Full time position with respected primary care office in Bend. Previous billing experience required. Successful candidate will have full knowledge of claim submission, secondary and tertiary insurance claims, charge posting and payment posting, follow-up of denials, unpaid accounts and collections. Medical Assistant skills must include: vitals, phone triage, acquisition of patient history, assist minor procedures/injections and medication refill. Previous eCW experience a plus. Ability to work well as part of a team. Excellent salary and benefit package. Fax resume Attn: Nita, 541-389-2662. Medical Billing Specialist/ Receptionist Full time position with respected primary care office in Bend. Previous billing experience required. Successful candidate will have full knowledge of claim submission, secondary and tertiary insurance claims, charge posting and payment posting, follow-up of denials, unpaid accounts and collections. Previous eCW experience a plus. Ability to work well as part of a team. Excellent salary and benefit package. Fax resume Attn: Nita, 541-389-2662. Mental Health: Children's Mental Health Wrap Coordinator/Supervisor: Community mental health agency in Jefferson County seeking a bachelor or master's level individual with experience working in a mental health setting with high needs children/families. Facilitates wraparound teams, works closely w/ mental health clinicians, community partners and case management. Must have excellent interpersonal skills, respect for diverse cultures, be organized and be strong at documentation. Salary is competitive and based on experience & education level. Qualified applicants may call (541) 475-6575 for an application & job description. E-mail resumes to cindip@bestcaretreatment.org Employment Opportunities. Employment Opportunities Finance & Business Loans and Mortgages Business Opportunities 500 528 FREE BANKRUPTCY EVALUATION visit our website at. Employment 400 421 Employment Opportunities COLLECTOR - Eugene collection agency needs Full-time debt collectors.Email resume teri@pacificcoastcredit.com or fax 541-689-1632. Must relocate to the Eugene area by December 1 2011. Employment Opportunities Lot Attendant41-382-3402 LOCAL MONEY We buy secured trust deeds & note, some hard money loans. Call Pat Kelley 541-382-3099 extension 13. Look at: Bendhomes.com for Complete Listings of Area Real Estate for Sale Need Seasonal help? Need Part-time help? Need Full-time help? Advertise your open positions. The Bulletin Classifieds Schools and Training TRUCK SCHOOL Redmond Campus Student Loans/Job Waiting Toll Free 1-888-438-2235 454 Looking for Employment Family Helper - Senior Care Cooking - Errands - Etc., 541-419-8648. I provide Senior In-home Care (basic care services). Please call Judy, 541-388-2706. Need Help? We Can Help! REACH THOUSANDS OF POTENTIAL EMPLOYEES EVERY DAY! Call the Classified Department for more information: 541-385-5809 DO YOU NEED A GREAT EMPLOYEE RIGHT NOW? Call The Bulletin before 11 a.m. and get an ad in to publish the next day! 385-5809. VIEW the Classifieds at: Immediate opening for Lot Attendant at Toyota-Scion of Bend. Full time, year round position. Must be motivated and ready to work. Must pass drug test, good driving record, and be insurable. Apply in person @ Toyota of Bend, (Ask for Casey Cooper) 61430 S. Hwy 97, Bend. Need Seasonal help? Need Part-time help? Need Full-time help? Advertise your open positions. The Bulletin Classifieds BANK TURNED YOU DOWN? Private party will loan on real estate equity. Credit, no problem, good equity is all you need. Call now. Oregon Land Mortgage 388-4200. 476 Employment Opportunities CAUTION READERS: Maintenance/Desk Clerk Full- Time, needed at Resort on McKenzie River. RV parking avail. Weekends a must. E-mail resume to info@belknaphotsprings.com Show Your Stuff.: Kevin O'Connell Classified Department Manager The Bulletin Education - Montessori school located in the Old Mill District is seeking an afternoon toddler class assistant and substitute teachers. Potential candidates should have a minimum of either one year of college level study in early childhood education or one year of experience working with toddlers or preschoolers in a Certified Child Care Center. Please call 541-633-7299 or email emay@drmskids.com. Fabricator Manual Machinist, Hydraulics Person, & Field Mechanic. Need right fit for family business. Must have experience, ability to think & able to work independently. Wage DOE. Will help relocate right person to Mid-Willamette Valley. Send resume mdi@peak.org 541-967-3514. Maintenance Manager JELD-WEN is seeking a Maintenance Manager at its Wood Fiber Division in Klamath Falls, OR. For more information please go to our website at: /employment. Send resume to jobs@jeld-wen.com. Get your business GRO W With an ad in IN G The Bulletin's Field Mechanic: Exp. w/Logging & heavy equip. repair, long hours & weekends. Extensive travel in Central OR. & N. CA. Wages DOE, 541-330-1930 "Call A Service Professional" Directory Remember.... Add your web address to your ad and readers on The Bulletin's web site will be able to click through automatically to your site. Now you can add a full-color photo to your Bulletin classified ad starting at only $15.00 per week, when you order your ad online. To place your Bulletin ad with a photo, visit, click on "Place an ad" and follow these easy steps: 1. 2. Pick a category (for example - pets or transportation) and choose your ad package. Write your ad and upload your digital photo. Create your account with any major credit card. All ads appear in both print and online. Please allow 24 hours for photo processing before your ad appears in print and online. Independent Contractor H Supplement Your Income H Operate Your Own B usiness FFFFFFFFFFFFFFFF 541-383-0398 Accounting KEITH Mfg Company is looking to fill a CFO position. BS in Accounting or Finance, MBA or CPA preferred. Ten plus years experience, preferably in a manufacturing environment. Working knowledge of Excel, Exact and FAS. Lean Accounting and/or Lean Mfg knowledge preferred. Please send resume with cover letter including salary requirements to Brenda Jones, HR Manager @ bjones@keithwalkingfloor.com Newspaper Delivery Independent Contractor Join The Bulletin as an independent contractor! 3. & Call Today & Prineville and Bend The Bulletin Classifieds is your Employment Marketplace Call 541-385-5809 today! We are looking for independent contractors to service home delivery routes in: Cab Driver needed for night shift. Apply at: 1919 NE 2nd, Bend Chiropractic Tech Full Time $12-15hr DOE- Professional, team player, leader, ready for a career, want to change lives? Our Chiropractic office is looking for you! (pdf/doc/docx) Email Cover Letter and Resume to dionne.applicant@gmail.com Details will be auto emailed. Fax (541)388-0839 No Calls H Madras, H Must be available 7 days a week, early morning hours. Must have reliable, insured vehicle. Please call 541.385.5800 or 800.503.3933 during business hours apply via email at online@bendbulletin.com S0305 5X10 kk To place your photo ad, visit us online at or call with questions, 541-385-5809 To place an ad call Classiied � 541-385-5809 Real Estate For Sale42 654 865 880 THE BULLETIN � Monday, October 3, 2011 E3 881 Boats & RV's ATVs Motorhomes Travel Trailers 700 800 745 850 Autos & Transportation Homes for Sale BANK OWNED HOMES! FREE List w/Pics! bend and beyond real estate 20967 yeoman, bend or Snowmobiles Yamaha Grizzly Sportsman Special 2000, 600cc 4-stroke, push button 4x4 Ultramatic, 945 mi, $3850. 541-279-5303 Need help ixing stuff around the house? Call A Service Professional and ind the help you need. Alfa See Ya 40 2005. 2 slides, 350 CAT. Tile. 2 door fridge with ice-maker. $98,000. 541-610-9985 Springdale 29' 2007, slide, Bunkhouse style, sleeps 7-8, excellent condition, $16,900, 541-390-2504 Tent Trailer 1995 Viking, sleeps 6-8. Awning, screened room, 2-yr tags, extras. Great cond! $3950 obo. 541-549-8747 900 908 Aircraft, Parts and Service Summer Price Yamaha 600 Mtn. Max 1997 Now only $850! Sled plus trailer package $1550. Many Extras, call for info, 541-548-3443. 870 Boats & Accessories 15' 7", Alumaweld Stryker, 2 motors - 60 & 6 HP, extras, $13,500 OBO, 541-318-1697. 860 Beaver Santiam 2002, 40', 2 slides, 48K, immaculate, 330 Cummins diesel, $63,500 OBO, must sell.541-504-0874 Motorcycles And Accessories Weekend Warrior Toy Hauler 28' 2007, Gen, fuel station,exc. 1/3 interest in Columbia 400, located at Sunriver. $138,500. Call 541-647-3718 cond. sleeps 8, black/gray interior, used 3X, $27,500. 541-389-9188. Four Winds Chateau M-31F 2006, 2 power slides, back-up camera, many upgrades, great cond. $43,900. 541-419-7099. Executive Hangar at Bend Airport (KBDN). 60' wide x 50' deep, with 55' wide x 17' high bi-fold door. Natural gas heat, office & bathroom. Parking for 6 cars. Adjacent to Frontage Rd; great visibility for aviation bus. $235K 541-948-2126 HARLEY CUSTOM 2007 Dyna Super Glide FXDI loaded, all options, bags, exhaust, wheels, 2 helmets, low mi., beautiful, Must sell, $9995. 541-408-7908 19-ft Mastercraft Pro-Star 190 inboard, 1989, 290hp, V8, 822 hrs, great cond, lots of extras, $10,000. 541-231-8709 746 Northwest Bend Homes Hot West Side Properties! FREE List w/Pics & Maps bend and beyond real estate 20967 yeoman, bend or Harley Davidson Ultra Classic 2008 Too many upgrades to list, immaculate cond., clean, 15K miles. $14,900 541-693-3975 20.5' 2004 Bayliner 205 Run About, 220 HP, V8, open bow, exc. cond., very fast w/very low hours, lots of extras incl. tower, Bimini & custom trailer, $19,500. 541-389-1413 Rentals Apt./Multiplex Redmond 600 630 Houses for Rent SE Bend 2 Bdrm. Home in Romaine Village, wood stove, W/D, dog neg., no smoking, $635/mo., 1st & last, refundable $250 cleaning dep., 541-385-7698 Advertise your car! Add A Picture! Reach thousands of readers! T-Hangar for rent at Bend airport. Call 541-382-8998. 916 Trucks and Heavy Equipment 748 Autumn Specials Studios $400 1 Bdrm $425 � Lots of amenities. � Pet friendly � W/S/G paid Northeast Bend Homes Move-in Ready! 4 Bedroom, 2 bath, double car garage, fenced yard, quiet neighborhood, $149,000. Owner may carry. Call 541-281-9891 2010 Custom Pro-street Harley DNA Pro-street swing arm frame, Ultima 107, Ultima 6-spd over $23,000 in parts alone; 100s of man hours into custom fabrication. Past show winner & a joy to ride. $20,000 obo 541-408-3317 20.5' Seaswirl Spyder 1989 H.O. 302, 285 hrs., exc. cond., stored indoors for life $11,900 OBO. 541-379-3530 Hunter's Delight! Package deal! 1988 Winnebago Super Chief, 38K miles, great shape; 1988 Bronco II 4x4 to tow, 130K mostly towed miles, nice rig! $15,000 both. 541-382-3964, leave msg. Itasca Winnebago Sunrise 1993, 27' Class A, exc. cond., see to appreciate, 38K mi., 4K gen. w/59 hrs on it, walk around bed, tires like new - 3 yrs old, $11,500, 541-536-3916. 1982 INT. Dump with Arborhood, 6k on rebuilt 392, truck refurbished, has 330 gal. water tank with pump and hose. Everything works, $8,500 OBO. 541-977-8988 Chevrolet 3500 Service Truck, 1992, 4x4, automatic, 11-ft storage bed. Liftgate, compressor & generator shelf inside box, locked storage boxes both sides of bed, new tires, regular maintenance & service every 3K miles, set up for towing heavy equip. $3995. 541-420-1846 Rooms for Rent Rooms for Rent in SE home, incl utils female preferred: 1 share bath, $475; 1 ensuite, $525. $200 deposit. Call Paula, 541-317-0792 STUDIOS & KITCHENETTES Furnished room, TV w/ cable, micro. & fridge. Util. & linens. New owners, $145-$165/wk. 541-382-1885 THE BLUFFS APTS. 340 Rimrock Way, Redmond Close to schools, shopping, and parks! 541-548-8735 Managed by GSL Properties Call 541-385-5809 The Bulletin Classifieds 648 Houses for Rent General 3 BDRM, 2 bath, dbl. garage, fenced yard, gourmet kitchen, appl., dw, (Sunriver area). No pets/smoking. $795 month + dep. 541-550-6097, 593-3546 Find exactly what you are looking for in the CLASSIFIEDS A 2 bdrm, 1 bath, 866 sq.ft., wood stove, new paint, inside util., fenced yard, extra storage building, $795, 541-480-3393,541-610-7803 AVAIL. NOW 3 bedroom, 1 bath, appliances, wood stove, garage, yard, deck. No pets/ smoking. $725 month + deposits. 541-389-7734. The Bulletin New Constrution, 3 bdrm, 2 bath, dbl. garage, Close to parks, hospital, schools, slab granite counters, hardwood floors, landscape w/sprinkler systems, starting at $152,900, Bend River Realty, Rob Marken, Broker/Owner 541-410-4255. More photos: To Subscribe call 541-385-5800 or go to 25' Catalina Sailboat 1983, w/trailer, swing keel, pop top, fully loaded, $10,000, call for details, 541-480-8060 882 Fifth Wheels Jayco Greyhawk 2004, 31' Class C, 6800 mi., hyd. jacks, new tires, slide out, exc. cond, $54,000, 541-480-8648 29' Alpenlite Riviera 1997 1 large slide-out. New carpeting, solar panel, AC & furnace. 4 newer batteries & inverter. Great shape. Reduced from $13,900, to $10,900. 541-389-8315 541-728-8088 632 Apt./Multiplex General The Bulletin is now offering a MORE AFFORDABLE Rental rate! If you have a home or apt. to rent, call a Bulletin Classified Rep. to get the new rates and get your ad started ASAP! 541-385-5809 Spacious 3 bdrm, w/study/den, 2.5 bath on 1/2 acre, lease, 1st & last, small pet considered, $1200/mo., 352-304-1665. Ads published in the "Boats" classification include: Speed, fishing, drift, canoe, house and sail boats. For all other types of watercraft, please see Class 875. 541-385-5809 Honda 750 Ace 2003 w/windscreen and LeatherLyke bags. Only 909 miles, orig owner, $4000 OBO. 541-771-7275. Chevy 18 ft. Flatbed 1975, 454 eng., 2-spd trans, tires 60%, Runs/drives well, motor runs great, $1650. 541-771-5535 658 755 Houses for Rent Redmond Sunriver/La Pine Homes Honda VT700 Shadow 1984, 23K, many new parts, battery charger, good condition, $3000 OBO. 541-382-1891 KAWASAKI 750 2005 like new, 2400 miles, stored 5 years. New battery, sports shield, shaft drive, $3400 firm. 541-447-6552. 634 Apt./Multiplex NE Bend 1/2 Off 1st mo. rent! 2210 NE Holliday, 3 bdrm., 2 bath, w/garage, gas heat, fireplace, quiet. No smoking. $725/mo. 541-317-0867. Alpine Meadows Townhomes 1, 2 and 3 bdrm apts. Starting at $625. 541-330-0719 Professionally managed by Norris & Stevens, Inc. Attractive 2 bdrm. in 4-plex, 1751 NE Wichita, W/S/G paid, on-site laundry, small pet on approval. $525/mo. 541-389-9901. Beautiful 2 Bdrms in quiet complex, park-like setting. No pets/smoking. Near St. Charles.W/S/G pd; both w/d hkup + laundry facil. $625$650/mo. 541-385-6928. Ivy Creek Townhouse: 2 bdrm, 2 bath, garage, private patio, W/D hookup, W/S/G & lawn maint. paid, 1120 sq.ft., near St. Charles, no pets/smoking, $695/mo + dep., 541-382-4739. PUBLISHER'S Small Home, 1 bdrm, 1 bath on NOTICE ranch property, 8 mi. W. of All real estate advertising in Terrebonne on Lower Bridge, this newspaper is subject to refs. req., no smoking, $650, the Fair Housing Act which $500 dep., 541-419-6542 makes it illegal to advertise New Custom Finished "any preference, limitation or SW Redmond. 3 Bdrm, 2 bath, home, 1000' river frontage, discrimination based on race, woodstove, heat pump, 5+/-acres Mtn views. color, religion, sex, handicap, vaulted ceilings. Garage w/ Gourmet kitchen, 4 large familial status, marital status work room. On 5 acres, all bdrms w/walk-in closets. or national origin, or an inyard care by owner. Owner 3.5 baths, large bonus rm, tention to make any such uses pasture. No smoking, ready to move in! Bank preference, limitation or dispets negotiable. Ref. req'd. owned. Reduced, now crimination." Familial status $1000/mo. + Sec. and $324,500. Bend River Realty, includes children under the cleaning deposit. Rob Marken, Broker/ Owner age of 18 living with parents 541-408-5890 541-410-4255. More photos or legal custodians, pregnant women, and people securing 659 custody of children under 18. Houses for Rent This newspaper will not 773 Sunriver knowingly accept any advertising for real estate which is Acreages in violation of the law. Our A 3 bdrm, 1.5 bath, 1376 sq.ft., wood stove, brand new car- 14 acres of tall pines bordering readers are hereby informed pet, brand new oak floors, that all dwellings advertised Fremont National Forest, W/S paid, rear deck, $850. in this newspaper are availfronts on paved road, power 541-480-3393,541-610-7803 able on an equal opportunity at property. Zoned for resibasis. To complain of disdence. 12 miles north of Bly, 687 crimination call HUD toll-free OR. $35,000 Easy terms at 1-800-877-0246. The toll owner 541-892-2829, or Commercial for free telephone number for 541-783-2829. Rent/Lease the hearing impaired is 1-800-927-9275. *** GENERATE SOME excitement in your neigborhood. Plan a garage sale and don't forget to advertise in classified! 385-5809. Used out-drive parts Mercury OMC rebuilt marine motors: 151 $1595; 3.0 $1895; 4.3 (1993), $1995. 541-389-0435 875 Marathon V.I.P. Prevost H3-40 Luxury Coach. Like new after $132,000 purchase & $130,000 in renovations. Only 129k orig. mi. 541-601-6350. Rare bargain at just $89,400. Look at : MUST SELL GMC 6000 dump truck 1990. 7 yard bed, low miles, good condition, new tires! ONLY $3500 OBO. 541-593-3072 Watercraft Kawasaki KLR650 Dual Sport, 2005, low miles, $4200. 541-350-3921 Ads published in "Watercraft" include: Kayaks, rafts and motorized personal watercrafts. For "boats" please see Class 870. 541-385-5809 Phoenix Cruiser 2001, 23 ft. V10, 51K. Large bath, bed & kitchen. Seats 6-8. Awning. $30,950. 541-923-4211 Alpha "See Ya" 30' 1996, 2 slides, A/C, heat pump, exc. cond. for Snowbirds, solid oak cabs day & night shades, Corian, tile, hardwood. $14,900. 541-923-3417. Cardinal 34.5 RL (40') 2009, 4 slides, convection oven + micro., dual A/C, fireplace, extra ride insurance (3 yr. remaining incl. tires), air sleeper sofa + queen bed, $50,900 OBO, must see to appreciate, 406-980-1907, Terrebonne GMC Ventura 3500 1986, refrigerated, w/6'x6'x12' box, has 2 sets tires w/rims., 1250 lb. lift gate, new engine, $4,500, 541-389-6588, ask for Bob. Mac Mid Liner 1991, with cabin chassis, air brakes, power steering, auto transmission, diesel, near new recap rear tires, 30% front tires, new starter, PTO & hydraulic pump. Will take Visa or Mastercard, $2500, 541-923-0411. 880 Motorhomes Yamaha XT225 Dual Sport, 2006, low miles, $3700. Call 541-350-3921 865 A-Class Hurricane by Four Winds 32', 2007, 12K miles, cherry wood, leather, queen, sleeps 6, 2 slides, 2 TVs, 2 roof airs, jacks, camera, new condition, non-smoker, $59,900 or best offer. 541-548-5216. Hurricane by Office / Warehouse 1792 sq.ft., 827 Business The Bulletin is now offering a Way, Bend. 30�/sq.ft.; 1st LOWER, MORE AFFORDABLE mo. + $300 dep. Rental rate! If you have a 541-678-1404 home to rent, call a Bulletin Classified Rep. to get the Office/Warehouse located in new rates and get your ad SE Bend. Up to 30,000 sq.ft., started ASAP! 541-385-5809 competitive rate, 541-382-3678.. R..E Deadlines are: Weekdays 11:00 noon for next day, Sat. 11:00 a.m. for Sunday and Monday. 541-385-5809 Thank you! The Bulletin Classified *** Powell Butte: 6 acres, 360� views in farm fields, septic approved, power, OWC, 10223 Houston Lake Rd., $114,900, 541-350-4684.. Carri-Lite Luxury 2009 by Carriage, 4 slideouts, inverter, satellite sys, frplc, 2 flat scrn TVs. $60,000. 541-480-3923 Pette Bone Mercury Fork Lift, 6000 lb., 2 stage, propane, hardrubber tires, $4000, 541-389-5355. COACHMAN 1997 Catalina 5th wheel 23', slide, new tires, extra clean, below book. $6,500. 541-548-1422. ATVs A-Class Polaris 330 Trail Bosses (2), used very little, like new, $1800 ea. OBO, 541-420-1598 638 650 Apt./Multiplex SE Bend 1 Mile from Old Mill - 2 Bdrm, 1 bath, garage, security dep. $600 mo. No pets. 560 SE Wilson, 541-385-0844; or se habla espanol: 714-227-3235 Houses for Rent NE Bend A Nice 3 bdrm, 1.75 bath 1428 sq.ft., woodstove, fenced yard, RV parking, 2.5 acres, horse OK. $895/mo. 541-480-3393,541-610-7803 yard, fireplace, Avail Nov 1, 1 yr lease. Background check. Small pet neg. No smoking. $895/mo. 541-948-0469 Office/Warehouse Space 6000 sq ft., (3) 12x14 doors, on Boyd Acres Rd. Reasonable rates. 541-382-8998 The Bulletin offers a LOWER, MORE AFFORDABLE Rental rate! If you have a home to rent, call a Bulletin Classified Rep. to get the new rates and get your ad started ASAP! 541-385-5809 Four Winds 32', 2007, 12K miles, cherry wood, leather, queen, sleeps 6, 2 slides, 2 TVs, 2 roof airs, jacks, camera, new condition, non-smoker, $59,900 or best offer. 541-548-5216. Winnebago Sightseer 2008 30B Class A, Top-of-the-line RV located at our home in southeast Bend. $79,500 OBO. Cell # 805-368-1575. People Look for Information About Products and Services Every Day through Fleetwood Wilderness 36' 2005 4 slides, rear bdrm, fireplace, AC, W/D hkup beautiful unit! $30,500. 541-815-2380 Truck with Snow Plow! Chevy Bonanza 1978, runs good. $6500 OBO. Call 541-390-1466. 925 642 1815 SW 21st Quiet spacious 2/2 duplex, gorgeous fenced w/garage. Mint condition! W/S/G paid, new carpet, $715. 541-409-2175 Sell an Item Polaris Phoenix, 2005, 2+4 200cc, like new, low hours, runs great, $1700 or best offer. Call 541-388-3833 Utility Trailers The Bulletin Classifieds 881 Apt./Multiplex Redmond Nice 3 bdrm., 2 bath, fenced FAST! If it's under $500 you can place it in The Bulletin Classifieds for 693 Travel Trailers Forest River 26' Surveyor 2011, Echo light model, aluminum construction, used 1 time, flat screen TV, DVD & CD player, outside speakers, 1 slide out, cherry cabinets, power awning, power tongue lift, can be towed by most autos, $19,500, call now at 541-977-5358. Mobile Suites, 2007, 36TK3 with 3 slide-outs, king bed, ultimate living comfort, quality built, large kitchen, fully loaded, well insulated, hydraulic jacks and so much more.$56,000. 541-317-9185 Ofice/Retail Space for Rent An Office with bath, various sizes and locations from $200 per month, including utilities. 541-317-8717 Approximately 1800 sq.ft., perfect for office or church south end of Bend. Ample parking. $675. 541-408-2318. 652 775 12 ft. Hydraulic dump trailer w/extra sides, dual axle, steel ramps, spare tire, tarp, excellent condition. $6500 firm. 541-419-6552 2005 7'x14' Interstate Cargo Trailer, used very little, $3000. 541-536-4115 24-ft Wells Fargo trailer, winch, many extras, $5500 or best offer. 541-548-7126 personals To The Person who bought tools at Cash Connection in Redmond. Please bring receipt and pickup items by Oct. 10th. 541-923-6501. Houses for Rent NW Bend Adorable home in THE PARKS, 2 bdrm, 2 bath, mtn. views, W/D, corner lot, $1345, Please call 541-408-0877 Manufactured/ Mobile Homes 2 bdrm, 2 bath, 1380 sq. ft., decks. Nice location in Romaine Village w/park views. $8,800 cash. 1-949-338-7139 efhsez@gmail.com POLARIS PHOENIX 2005, 2X4, 200cc, new rear end & tires, runs excellent, $1350 OBO. Tilt bed trailer for (2) 4-wheelers, $400. Buy both for $1600. 541-932-4919 $10 - 3 lines, 7 days $16 - 3 lines, 14 days (Private Party ads only) Skyline Layton 25' 2008, Model 208 LTD. Like brand new. Used 4x Bend to Camp Sherman. Winterized, in storage. 3855 lbs Sleeps MONTANA 3585 2008, exc. 5. Queen walk around bed cond., 3 slides, king bed, lrg w/storage, full bathroom, full LR, Arctic insulation, all opkitchen & lrg fridge. Dual tions $37,500. 541-420-3250 batteries & propane tanks, awning,corner-leveling jacks, Easylift Elite load hitch w/ bars, furnace, AC, AM/FM stereo. Couch & dining table fold out for extra sleeping. $11,795 OBO. 760-699-5125. Pilgrim 27', 2007 5th wheel, 1 slide, AC, TV, full awning, exSPRINGDALE 2005 27' eatcellent shape, $23,900. ing area slide, A/C and 541-350-8629 heat, new tires, all contents included, bedding 885 towels, cooking and eating utensils. Great for vacation, Canopies and Campers fishing, hunting or living! $15,500 541-408-3811 Call 541-385-5809 to promote your service � Advertise for 28 days starting at $140 (This special package is not available on our website) Accounting/Bookkeeping BANKRUPTCY - $399 Big Tex Landscaping/ ATV Trailer, dual axle flatbed, 7'x16', 7000 lb. GVW, all steel, $1400. 541-382-4115, or 541-280-7024. Debris Removal JUNK BE GONE l Haul Away FREE For Salvage. Also Cleanups & Cleanouts Mel 541-389-8107 Landscaping, Yard Care Landscaping, Yard Care Landscaping, Yard Care. Interstate West Enclosed Trailer, 20' Car hauler, cabinets, tile floor, $4995, 541-595-5363. Towmaster Equipment Trailer, 14,000 lb capacity. Tandemn axle, 4-wheel brakes, 18' bed, heavy duty ramps, spare tire mounted, side mounted fork pockets, all tires in good condition. $3995. Call 541-420-1846. everything! 541-815-9256 Adult Care Heritage House AFH Quality care for the elderly. Private rooms, set rates, no add-ons! 1227 South Egan Rd, in Burns. 541-573-1845 Domestic Services Housekeeping Services: Residential & offices, 15 years experience. Reasonable rates. Call Bertha, 541-788-6669 refs. avail. Take these steps for HEALTHY TURF Next Spring Fall Aeration �Improve turf health �Improve root growth �Enhance fertilizer applications Masonry Chad L. Elliott Construction Building/Contracting NOTICE: Oregon state law requires anyone who contracts for construction work to be licensed with the Construction Contractors Board (CCB). An active license means the contractor is bonded and insured. Verify the contractor's CCB license through the CCB Consumer Website MASONRY Brick * Block * Stone Small Jobs/Repairs Welcome L#89874. 388-7605, 410-6945 Drywall ALL PHASES of Drywall. Small patches to remodels and garages. No Job Too Small. 25 yrs. exp. CCB#117379 Dave 541-330-0894 Fall Fertilizer Your most important fertilizer application Hunters, Take a Look at This! 1978 Dynacruiser 9�' camper, fully self-contained, no leaks, clean, everything works, will fit 1988 or older pickup. $2500 firm. 541-420-6846 931 HHH Standard and organic options Painting, Wall Covering WESTERN PAINTING CO. Richard Hayman, a semiretired painting contractor of 45 years. Small Jobs Welcome. Interior & Exterior. 541-388-6910. ccb#5184 Picasso Painting Interior/Exterior. Ask about our 10% discount, Affordable, Reliable. 25 yrs exp. CCB# 194351 Bruce Teague 541-280-9081. Automotive Parts, Service and Accessories (4) Hankook Winter I Pike studded tires on steel rims, 185/65R14, 90T, $300. 541-647-4232 Set of 4 studded tires on rims, for Honda Odyssey, 225/ 60R16, $250. No Fri night or Sat calls. 541-504-8963 Tires, (4), 265/70R17 115s Wintercat snows, w/wheels, used 1 season, $1200 new, sell $500, Ron, 541-389-0371 We Buy Scrap Auto & Truck Batteries, $10 each Also buying junk cars & trucks, (up to $500), & scrap metal! Call 541-912-1467 Compost Application Excavating �Use less water $$$ S A V E $$$ �Improve soil Levi's Dirt Works:Residential/ Commercial General Contractor or call 503-378-4621. The For all your dirt and Bulletin recommends excavation needs. checking with the CCB prior to contracting with anyone. Some other trades also require additional licenses and certifications. �Subcontracting � Public Works � Small & large jobs for contractors & home owners by the job - or hour. � Driveway grading (low cost get rid of pot holes & smooth out your driveway) � Custom pads large & small � Operated rentals & augering � Wet & dry utils. � Concrete CCB#194077 541-639-5282. Nelson Landscape Maintenance Serving Central Oregon Residential & Commercial � Sprinkler Winterization & Repair � Sprinkler Installation � Trimming � Fall Clean up � Weekly Mowing & Edging �Bi-Monthly & monthly maint. �Flower bed clean up �Bark, Rock, etc. �Senior Discounts Fall Cleanup Margo Construction LLC Since 1992 � Pavers �Carpentry �Remodeling � Decks � Window/Door Replacement � Int/Ext Paint CCB 176121 � 541-480-3179 I DO THAT! Home Repairs, Remodeling, Deck Refinishing Time! Rental Repairs. CCB#151573 Dennis 541-317-9768 Don't track it in all Winter leaves � needles � debris H gutters and more H EXPERIENCED Commercial & Residential Free Estimates Senior Discounts Tile, Ceramic Steve Lahey Construction Tile Installation Over 20 Yrs. Exp. Call For Free Estimate 541-977-4826�CCB#166678 Russ Peterson Builder / Contractor 40 years experience Home Repairs & Remodels 541-318-8789 � CCB 50758 541-390-1466 Same Day Response Call Today! Bonded & Insured 541-815-4458 LCB#8759 When ONLY the BEST will do! 2003 Lance 1030 Deluxe Model Camper, loaded, phenomenal condition. $17,500. 2007 Dodge 6.7 Cummins Diesel 3500 4x4 long bed, 58K mi, $34,900. Or buy as unit, $48,500. 541-331-1160 E4 Monday, October 3, 2011 � THE BULLETIN 940 975 To place an ad call Classiied � 541-385-5809 Vans CHEVY ASTRO EXT 1993 AWD mini van, 3 seats, rear barn doors, white, good tires/wheels. Pretty interior, clean, no rips or tears. Drives exc! $2500. Free trip to D.C. for WWII Vets! (541) 318-9999 or (541) 815-3639 Automobiles Chevy Corvette 1988 4-spd manual with 3-spd O/D. Sharp, loaded, 2 tops, (tinted & metal. New AC, water pump, brake & clutch, master cylinder & clutch slave cyl. $6500 OBO. 541-419-0251. 932 1000 1000 1000 1000 Legal Notices LEGAL NOTICE REQUEST FOR PROPOSAL Chrysler La Baron Convertible 1990, Good condition, $3200, 541-416-9566 Legal Notices Legal Notices 10, 2011. Cal-Western Reconveyance Corporation 525 East Main Street P.O. Box 22004 El Cajon CA 92022-9004 Cal-Western Reconveyance Corporation Signature/By: Tammy Laird R-389662 09/12/11, 09/19, 09/26, 10/03 Legal Notices PUBLIC NOTICE The Bend Park & Recreation District Board of Directors will meet in a work session beginning at 5:30 p.m., Tuesday, October 4, 2011, at the district office, 799 SW Columbia, Bend, Oregon. Consultant Ron Vine will present the results of the recently conducted Recreation Needs Assessment Survey. The board will meet in a regular meeting at 7:00 p.m. Agenda items include consideration of approval of Resolution No. 338 to apply for an RTP grant, and ratification of emergency change orders to a contract with Alex Hodge for the construction of the Coyner Trail. The board will meet in a executive session following the reconvened work session pursuant to ORS 192.660(2)(e) for the purpose of discussing real property transactions and ORS 192.660(2)(h) for the purpose of consulting with legal counsel regarding current litigation or litigation likely to be filed. The October 4, 2011, agenda and board report is posted on the district's website,. For more information call 541-489-7275. Chevy Gladiator 1993, great shape, great mileage, full pwr., all leather, auto, 4 captains chairs, fold down bed, fully loaded, $3950 OBO, call 541-536-6223. Dodge Durango 1999 126K mi. 4X4 Great cond. 7 passenger $4200. 541-475-2197 Antique and Classic Autos Pickups Chevrolet 2001 crew cab dually. 3500 Silverado LT leather, all power, 8.1 litre gas with Allison transmission. 82K miles, excellent cond. $15,495. 541-408-0386 Sport Utility Vehicles 4-WHEELER'S OR HUNTER'S SPECIAL! Jeep 4-dr wagon, 1987 4x4, silver, nice wheels, 183K, lots of miles left yet! Off-road or on. $1400. Call 541-318-9999 or 541-815-3639. Free trip to D.C. for WWII Vets! Dodge Grand Caravan SXT 2005: StoNGo, 141k miles, power doors/trunk $7850. Call 541-639-9960 Ford Mustang Convertible LX 1989, V8 engine, white w/red interior, 44K mi., exc. cond., $5995, 541-389-9188. Cadillac Eldorado Convertible 1976 exc cond, 80K, beautiful, AC, cruise, power everything, leather interior, fuel inj V8, $7500. 541-815-5600 Chevy S10, 1997, 6-cyl, 5-spd AT, 4WD, AC, 111K mi, bedliner, really good cond,$3500 541-788-0087; 541-382-0214 Dodge Dakota 4x4 X-Cab, 1994, w/canopy, 180K mi, 5-spd, tow pkg $2200. 541-550-6689 D o d g e R a m V a n 1 9 9 0 Customized to carry livestock such as Alpacas, Sheep, Goats etc. Runs Great, Needs a paint job. 78K miles, $2,000. (541) 447-4570 Ford Cargo Van 1986, V-8, AUTO trans, 2 TANKS, RUNS EXCELLENT!! $900 Call Mike 541-480-3018 Call The Bulletin At 541-385-5809. Place Your Ad Or E-Mail At: FORD Windstar Mini Van, 1995, 138K, nice inside & out, only half worn out! Seats 7, Michelins, nice wheels, drives excellent 1 look is worth 1000 words! $1800. 541-318-9999 or 541-815-3639. Free Trip to D.C. for WWII Vets! Kia Rhondo 2009, loaded,USB & aux ports,satellite radio,DVD, 3rd row,brand new snows, 52K, $15,500, 541-280-4875. Jeep CJ-7 1984 4WD. New Snow/Mud tires, runs Great and has a custom installed 2nd rear axle. Great for hunting and fishing. Soft Top, Clean $5,500 (541) 447-4570 Jeep Grand Cherokee Laredo 2004 $8500 OBO, 6cyl. 4x4 tow pkg., extra wheels/tires white cloth, 102k original owner runs looks great 541-593-1453 Chevrolet Corvette 1967 Convertible with removable hard top. #'s matching, 4 speed, 327-350hp, black leather interior. $58,500 541-306-6290 FORD MUSTANG GT 2005 CONVERTIBLE, 9,000 miles, Shaker Sound Sys, Leather int. Immaculate condition. Must See! $23,995. 541-771-3980 Ford F-250 1986, MUST SELL For Memorial 70 Monte Carlo All original, beautiful, car, completely new suspension and brake system, plus extras. $4000 OBO. 541-593-3072 Lariat, x-cab, 2WD, auto, gas or propane, 20K orig. mi., new tires, $5000, 541-480-8009. JEEP GRAND CHEROKEE LIMITED 2001 4x4, 90k, leather. A cream puff! One nice lady's car. Ford F250 1997 X-cab 4x4 , 112K, 460, AC, PW, PL, Split window, factory tow pkg, receiver hitches, front & rear, incl. 5th wheel platform & Warn winch. Unit incl. cloth interior, exc. cond. $7,000. call: 541-546-9821, Culver Only $7,900 541-815-3639, 318-9999 975 Chevy Camaro Z28 I-ROC 1989, 22K mi, T-Top, almost show room cond, 5.7L, always garaged, $9995. 541-389-5645 Automobiles Jeep Grand Cherokee Limited 1996, V-6, burgandy, leather interior, fully loaded, new all weather tires, new muffler/shock absorbers, great cond., $3800 OBO, 541-678-5482,541-410-6608 Audi A3 Quattro 2.0 2009, AWD, 30K, warranty & Audi Care, $26,000, 541-385-3378 Mercury Cougar 1994, XR7 V8, 77K mi, excellent cond. $4695. 541-526-1443 All British Car Cruise-in! Every Thurs, 5-7pm at McBain's British Fish & Chips, Hwy 97 Redmond, OR. 541-408-3317 FORD F250 4x4 - 1994 1950 CHEVY CLUB COUPE Cobalt Blue, Great condition, runs well, lots of spare parts. $9995. Call 541-419-7828 460 engine, cab and a half, 4-spd stick shift, 5th wheel hitch, 181K miles. $2100. Call 541-389-9764 Audi S4 2005, 4.2 Avant Quattro, tiptronic, premium & winter wheels & tires, Bilstein shocks, coil over springs, HD anti sway, APR exhaust, K40 radar, dolphin gray, ext. warranty, 56K, garaged, $30,000. 541-593-2227 Chevy Corvette Coupe 2006, 8,471 orig miles, 1 owner, always garaged, red, 2 tops, auto/paddle shift, LS-2, Corsa exhaust, too many options to list, pristine car, $37,500. Serious only, call 541-504-9945 Ford F250 XLT 4x4, 1985, 4-speed, gooseneck hitch, good work truck! $1450 or best offer. Call 541-923-0442 FORD F350 2003, crew cab 4x4 V-10, great tires, towing pkg, power windows, locks and seats, CD. 132,621 miles, Carfax avail. $9995. See craigslist 255692031 for pics. 541-390-7649. FORD Pickup 1977, step side, 351 Windsor, 115,000 miles, MUST SEE! $3800 OBO. 541-350-1686 Jeep Ltd Wagoneer 4WD, 1989 runs great, exc cond, leather seats, full pwr, winch, brushgrd, tow pkg, 96K, perfect 2nd car/hunting rig, $3850. Steve, 541-815-5600 1980 Classic Mini Cooper All original, rust-free, classic Mini Cooper in perfect cond. $10,000 OBO. 541-408-3317 BMW 323i convertible, 1999. 91K miles. Great condition, beautiful car, incredibly fun ride! $9300. 541-419-1763 Mini Cooper Clubman S, 2009, 24Kmi, 6-spd manual, heated leather seats, loaded. Avg 30+mpg, exlnt cond, must see! $23,500. 541-504-7741 Mitsubishi 3000 GT 1999, auto., pearl white, very low mi. $9500. 541-788-8218. The Redmond School District Board of Directors requests proposals from experienced Construction Managers/General Contractors to construct a Major Remodel of Redmond High School located at 675 SW Rimrock in Redmond, Oregon. It is the intent of the School Board to enter into a contract with the selected Construction Manager/General Contractor (CM/GC) which will include a Fixed Fee and a Guaranteed Maximum Price for the entire scope of the work. CM/GC's responding to this request will be evaluated based upon their qualifications, prior experience, proposed schedule and plan for completing the work, associated fees, and other relevant factors. The project will include, but not limited to, replacement of main electrical switch gear; ADA upgrades to interior and exterior; exterior window and door replacement; remodel of administration area; various reconfigurations to classrooms; and library/media center. Copies of the Request for Proposal document may be obtained by calling the District's office (541) 923-8938 or in person at 145 SE Salmon, Redmond, OR 97756. Proposals are due prior to 3:00 P.M. PDT, October 27, 2011. Proposals received after the specified time will not be considered. The District plans to interview one or more of the top finalists. Interviews are tentatively scheduled for Wednesday November 9, 2011. All proposers must be registered with the Oregon Construction Contractors Board prior to submitting proposals. Failure to register will be sufficient cause to reject proposals as non-responsive. For this project, the provisions of ORS 279C.800 through 279C.870, relative to prevailing wage rates, shall be complied with by the Contractor and subcontractors. This solicitation does not obligate the Redmond. Get your business GRO W ING With an ad in The Bulletin's "Call A Service Professional" Directory 1000 1000 1000 Legal Notices Legal Notices Legal Notices Nissan Xterra S - 4x4 2006, AT, 76K, good all-weather tires, $13,500 obo. 858-345-0084 BMW 325i convertible 2003 in exlnt cond, 54,500 mi. Silver, black top, great handling, fun car! $15,400. 541-788-4229 Chevy Wagon 1957, Saab 9-3 SE 1999 convertible, 2 door, Navy with black soft top, tan interior, very good condition. $5200 firm. 541-317-2929. 4-dr., complete, $15,000 OBO, trades, please call 541-420-5453. Chrysler 300 Coupe 1967, 440 engine, auto. trans, ps, air, frame on rebuild, repainted original blue, original blue interior, original hub caps, exc. chrome, asking $9000 or make offer. 541-385-9350. Porsche Cayenne 2004, 86k, immac.,loaded, dealer maint, $19,500. 503-459-1580. SUBARUS!!! BMW 330 CI 2002 great cond., Newer tires. Harmon/Kardon stereo system. Asking $10,950. 541-480-7752. Buicks 1995 LeSabre Limited, 113K, $2950; 1998 LeSabre, 93k, $3900; 1999 Regal GS V-6 supercharged $3500; 2002 LeSabre, 102k, $4950; 2006 Lucerne CX, stunning black, 70k, $7900; 2006 Lucerne CXL 58k, white, $12,500. Bob 541-318-9999 or Sam 541-815-3639. Cadillac El Dorado 1994, Total cream puff, body, paint, trunk as showroom, blue leather, nicely patina-ed gorgeous light blue, $1700 wheels w/snow tires although car has not been wet in 8 years. On trip to Boise last week avg. 28.5 mpg., $5700, 541-593-4016. Chrysler SD 4-Door 1930, CDS Royal Standard, 8-cylinder, body is good, needs some restoration, runs, taking bids, 541-383-3888, 541-815-3318 Ford Sport Trac Ltd Ed. 2007 4x4, many extras incl. new tires, 107k, perfect winter SUV, $14,995. 541-306-7546 541-322-7253 Nice clean and fully serviced . Most come with 3 year, 36,000 mile warranty. Call The Guru: 382-6067 or visit us at Dodge pickup 1962 D100 classic, original 318 wide block, push button trans, straight, runs good, $1250 firm. Bend, 831-295-4903 Ford Mustang Coupe 1966, original owner, V8, automatic, great shape, $9000 OBO. 530-515-8199 GMC �-ton Pickup, 1972, LWB, 350hi motor, mechanically A-1, interior great; body needs some TLC. $4000 OBO. Call 541-382-9441 Volvo 780 1990, extremely rare car, Bertone designed & built, Volvo reliability & safety, Italian elegance, all parts avail., Italian leather, Burl Wood, drives beautifully, $5500, 541-593-4016. LEGAL NOTICE OREGON TRUSTEE'S NOTICE OF SALE T.S. No: F529041 OR Unit Code: F Loan No: 0999701899/RITCHIE Investor No: 177112574 AP #1: 130904 Title #: 110317537 Reference is made to that certain Trust Deed made by LAURANNA M. RITCHIE as Grantor, to WELLS FARGO FINANCIAL NATIONAL BANK as Trustee, in favor of WELLS FARGO BANK, N.A. as Beneficiary. Dated May 26, 2004, Recorded June 23, 2004 as Instr. No. 2004-36981 in Book --Page --- of Official Records in the office of the Recorder of DESCHUTES County; OREGON SUBORDINATION AGREEMENT DATED OCTOBER 25, 2004 covering the following described real property situated in said county and state, to wit: THE EAST HALF OF THE EAST HALF OF THE SOUTH HALF OF THE SOUTHEAST QUARTER OF THE NORTHWEST QUARTER (E1/2E/2S1/2SE1/4NW1/4) OF SECTION 31, TOWNSHIP 15 SOUTH, RANGE 11 EAST OF THE WILLAMETTE MERIDIAN, DESCHUTES: 8 PYMTS FROM 11/15/10 TO 06/15/11 @ 200.48 $1,603.84 Sub-Total of Amounts in Arrears:$1,603.84 : 17400 STAR THISTLE LN, BEND, OR 97701-9173 $59,160.00, together with interest as provided in the note or other instrument secured from 10/15/10, and such other costs and fees are due under the note or other instrument secured, and as are provided by statute. WHEREFORE, notice is hereby given that the undersigned trustee will, on November 4, 2011, at the hour of 10:00 A.M. in accord with the Standard Time, as established by ORS 187.110, INSIDE THE MAIN LOBBY OF THE DESCHUTES COUNTY COURTHOUSE, 1164 NW BOND, BEND , County of DESCHUTES,: 06/2745250 PUB: 09/19/11, 09/26/11, 10/03/11, 10/10/11 Porsche Cayenne S 2008 Nearly every option: 20" wheels, navigation, Bi-Xenon lights, thermally insulated glass, tow pkg, stainless steel nose trim, moonroof, Bose sys, heated seats. 66K mi. MSRP was over $75K; $34,900. 541-954-0230 GMC Z71 1993 4X4 350, 71K mi, Auto AC PW PL 1 Owner, Always garaged, PRISTINE $6995. 602-418-9981, Bend Ford T-Bird 1955, White soft & hard tops, new paint, carpet, upholstery, rechromed, nice! $30,000. 541-548-1422 International Flat Bed Pickup 1963, 1 ton dually, 4 spd. trans., great MPG, could be exc. wood hauler, runs great, new brakes, $1950. 541-419-5480. Porsche Cayenne Turbo 2008, AWD, 500HP, 38K mi., exc. cond, meteor gray, 2 sets of wheels and new tires, fully loaded, $59,750 firm. 541-480-1884 Chevy Corsica 1989, Attractive 5-dr., hatchback, V-6 auto, A/C, retiree's vehicle, well maintained, great cond., $2000 OBO, 541-330-6 1000 1000 1000 Legal Notices LEGAL NOTICE TRUSTEE'S NOTICE OF SALE Loan No: xxxxxx4374 T.S. No.: 1336262-09. Reference is made to that certain deed made by Greg Baxter and Linda Baxter Husband And Wife, as Grantor to First American Title, as Trustee, in favor of National City Mortgage A Division of National City Bank, as Beneficiary, dated January 26, 2009, recorded February 02, 2009, in official records of Deschutes, Oregon in book/reel/volume No. xx at page No. xx, fee/file/Instrument/microfilm/reception No. 2009-04495 covering the following described real property situated in said County and State, to-wit: Lot 38 in block 9 of Newberry Estate, Phase II, Deschutes County, Oregon Commonly known as: 52751 Golden Astor Rd. La Pine OR 97739. August 1, 2010 of principal and interest and subsequent installments due thereafter; plus late charges; together with all subsequent sums advanced by beneficiary pursuant to the terms and conditions of said deed of trust. Monthly payment $1,629.23 Monthly Late Charge $65.17. By this reason of said default the beneficiary has declared all obligations secured by said Deed of Trust immediately due and payable, said sums being the following, to-wit; The sum of $227,790.05 together with interest thereon at 5.500% per annum from July December 16, 2011 at the hour of 1:00pm, Standard of Time, as established by Section 187.110, Oregon Revised Statutes, At the Bond Street entrance to Deschutes County Courthouse 1164 NW Bond, City of Bend, Legal Notices Legal Notices LEGAL NOTICE TRUSTEE'S NOTICE OF SALE Pursuant to O.R.S. 86.705 et seq. and O.R.S. 79.5010, et seq. Trustee's Sale No. OR-USB-11010943 NOTICE TO BORROWER: YOU SHOULD BE AWARE THAT THE UNDERSIGNED IS ATTEMPTING TO COLLECT A DEBT AND THAT ANY INFORMATION OBTAINED WILL BE USED FOR THAT PURPOSE. Reference is made to that certain Deed of Trust made by, NEAL K. HACKBARTH, (MARRIED), as grantor, to FIDELITY NATIONAL TITLE INSURANCE, as Trustee, in favor of MORTGAGE ELECTRONIC REGISTRATION SYSTEMS, INC., as beneficiary, dated 8/18/2008, recorded 8/20/2008, under Instrument No. 2008-34647, records of DESCHUTES County, OREGON. The beneficial interest under said Trust Deed and the obligations secured thereby are presently held by U.S. BANK, NATIONAL ASSOCIATION. Said Trust Deed encumbers the following described real property situated in said county and state, to-wit: A tract of land located in the Northeast one-quarter of the Southeast one-quarter (NE1/4SE1/4) of Section 5, Township 18 South, Range 12, East of the Willamette Meridian, City of Bend, Deschutes County, Oregon, described as follows: Parcel 2., Partition Plat No. 2004-97, Document No. 2004-73258, Deschutes County Official Records, said parcel being a portion of that tract of land described in Document No. 2003-86110, Deschutes County Official Records. EXCEPTING THEREFROM the following described tract of land: Beginning at the Southwest corner of Parcel 2, Partition Plat No. 2004-97, Document No. 2004-73258, Deschutes County Official Records, said parcel being a portion of that tract of land as described in Document NO. 2003-86110, Deschutes County Official Records; thence North 00�03'23" West, along the West line of said parcel, a distance of 60.07 feet to the Northwest corner of said parcel; thence leaving said line, along the North line of said parcel and an angle point in said line, the following bearings and distances: North 89�57'12" East, 5.57 feet; thence South 00�03'23" East, 5.00 feet; thence leaving said line and continuing South 00�03'23" East, 55.07 feet to the South line of said parcel; thence North 89�59'22" West, along said line, 5.57 feet to the Point of Beginning. The street address or other common designation, if any, of the real property described above is purported to be: 784 SE PELTON PLACE BEND, OR 97702 The undersigned Trustee disclaims any liability for any incorrectness of the above street address or other common designation.: Amount due as of August 26, 2011 Delinquent Payments from February 01, 2011 7 payments at $828.51 each $5,799.57 (02-01-11 through 08-26-11) Late Charges: $216.16 Foreclosure Fees and Costs $1,199.00 TOTAL: $7,214.73 $91,577.14, PLUS interest thereon at 6.875% per annum from 1/1/2011, until paid, together with escrow advances, foreclosure costs, trustee fees, attorney fees, sums required for the protection of the property and additional sums secured by the Deed of Trust. WHEREFORE, notice hereby is given that the undersigned trustee, will on January 6, 2012,. DATED: 8/26/2011 LSI TITLE COMPANY OF OREGON, LLC Trustee By: Asset Foreclosure Services, inc. as agent for the Trustee By: Angela Barsamyan Foreclosure Assistant 5900 Canoga Avenue, Suite 220, Woodland Hills, CA 91367 Phone: (877)237-7878 ASAP# 4078435 09/12/2011, 09/19/2011, 09/26/2011, 10/03/2011 Mercury Monterrey 1965, Exc. All original, 4-dr. sedan, in storage last 15 yrs., 390 High Compression engine, new tires & license, reduced to $2850, 541-410-3425. ToyotaTundra 2000 SR5 4x4 perfect cond., all scheduled maint. completed, looks new in/out. $10,000 541-420-2715 Plymouth Barracuda 1966, original car! 300 hp, 360 V8, centerlines, (Original 273 eng & wheels incl.) 541-593-2597 935 REPORTED STOLEN 1965 Mustang Convertible from 77 yr-old man. OR License #663ANB. REWARD for info leading to recovery. Please contact Deschutes County Sheriff with any info: 541-693-6911. Sport Utility Vehicles Triumph TR-6, 1974, 84K, partial engine rebuild, rollbar, nice hobby car, runs great. $9900 OBO, 541.788.1416 Chevy Suburban LT 2004, 90K, 1-owner, soccer/ski trip ready, leather, cruise, Onstar, $15,000, 541-389-7365 VW BAJA BUG 1974 1776cc engine. New: shocks, tires, disc brakes, interior paint, flat black. $5900 OBO. partial trades considered. 541-322-9529. CHEVY SUBURBAN LT 2005 72,000 miles, new shocks, rear brakes, one owner, $16,995, 541-480-0828. Willis Jeep 1956, new rebuilt motor, no miles, power take off winch, exc. tires, asking $3999, 541-389-5355. Ford Excursion 2005, 4WD, diesel, exc. cond., $24,000, 541-923-0231. call 541-385-5809 | http://issuu.com/wescom/docs/bulletin_03-10-11 | CC-MAIN-2015-11 | refinedweb | 57,554 | 75.1 |
Standard C Library (libc, -lc)
#include <stdlib.h>
#include <fcntl.h>
int
grantpt(int fildes);
char *
ptsname(int fildes);
int
unlockpt(int fildes);
#include <fcntl.h>
int
posix_openpt(int mode);
The grantpt(), ptsname(), unlockpt(), and posix_openpt() functions allow
access to pseudo-terminal devices. The first three functions accept a
file descriptor that references the master half of a pseudo-terminal
pair. This file descriptor is created with posix_open'' clears the lock held on the pseudo-terminal pair
for the master device specified with fildes.
The posix_openpt() function opens the first available master pseudo-ter-
minal device and returns a descriptor to it. The mode argument specifies
the flags used for opening the device:
O_RDWR Open for reading and writing.
O_NOCTTY If set, do not allow the terminal to become the controlling
terminal for the calling process.
The grantpt() and unlockpt() functions return the value 0 if successful;
] mode.
open(2), pty(4), tty(4)
The grantpt(), ptsname(), unlockpt(), and posix_openpt() functions con-
form to IEEE Std 1003.1-2001 (``POSIX.1'').
The grantpt(), ptsname(), unlockpt(), and posix_openpt() functions
appeared in FreeBSD 5.0.
The purpose of the unlockpt() function has no meaning in FreeBSD.
The flag O_NOCTTY is included for compatibility; in FreeBSD, opening a
terminal does not cause it to become a process's controlling terminal.
BSD December 23, 2002 BSD | http://www.syzdek.net/~syzdek/docs/man/.shtml/man3/grantpt.3.html | crawl-003 | refinedweb | 222 | 66.23 |
IRC log of vmtf on 2005-09-27
Timestamps are in UTC.
12:55:36 [RRSAgent]
RRSAgent has joined #vmtf
12:55:36 [RRSAgent]
logging to
12:55:45 [RalphS]
Meeting: SWBPD VM Task Force
12:56:02 [RalphS]
Agenda:
12:58:39 [RalphS]
Previous? 2005-07-19
13:01:30 [Zakim]
SW_BPD(VMTF)9:00AM has now started
13:01:37 [Zakim]
+Ralph
13:02:03 [danbri]
danbri has joined #vmtf
13:02:12 [aliman]
aliman has joined #vmtf
13:02:18 [danbri]
hi
13:02:20 [RalphS]
rrsagent, please make record public
13:02:31 [Zakim]
+Tom_Baker
13:02:59 [Zakim]
+??P5
13:03:08 [Zakim]
+Alistair_Miles (was ??P5)
13:03:19 [Zakim]
+Danbri
13:03:20 [berva]
berva has joined #vmtf
13:03:32 [berva]
berva has joined #vmtf
13:04:13 [berva]
hi - coming soon on the phone
13:05:15 [Zakim]
+??P6
13:05:30 [RalphS]
zakim, ??p6 is Bernard
13:05:30 [Zakim]
+Bernard; got it
13:07:15 [tomb]
tomb has joined #vmtf
13:07:27 [RalphS]
zakim, who's on the phone?
13:07:27 [Zakim]
On the phone I see Ralph, Tom_Baker, Alistair_Miles, Danbri, Bernard
13:08:55 [RalphS]
DanBri: my response (question) to Alistair didn't make complete sense as I momentarily forgot that SKOS URIs use '#'
13:09:18 [RalphS]
Ralph: question still made some sense, as it leads to Bernard's questions
13:10:43 [RalphS]
->
Alistair's thoughts on SKOS changes
13:10:49 [RalphS]
Scribe: Alistair
13:10:52 [RalphS]
Chair: Tom
13:11:02 [aliman_scribe]
tom: if you click on
you get angle brackets ...
13:11:11 [aliman_scribe]
agreed in madrid this isn't good enough ...
13:11:42 [aliman_scribe]
so far assume this is reasonable practice ...
13:12:02 [aliman_scribe]
options: some sort of content-negotiation...
13:13:27 [aliman_scribe]
or resolve to a web page which contains pointer to RDF schema (e.g. via link attribute, or GRDDL) ...
13:13:54 [RalphS]
q+ to talk about deployed tools
13:14:02 [aliman_scribe]
so by default, go to readable web page, and applications that want to consume RDF can do so. ...
13:14:08 [aliman_scribe]
q+ to comment on SKOS proposal
13:14:34 [aliman_scribe]
might be technically difficult, but practically best. But not clear on best way forward.
13:14:43 [Zakim]
RalphS, you wanted to talk about deployed tools
13:15:17 [aliman_scribe]
ralph: important to use solution that respects compatibility with current tools, which expect to do a GET on prop URIs and expect RDF/XML content. ...
13:15:34 [aliman_scribe]
so if we require they do accept: application/rdf+xml prob ok
13:15:36 [Zakim]
aliman_scribe, you wanted to comment on SKOS proposal
13:16:00 [RalphS]
Alistair: the SKOS Core proposal I wrote does try to do both of these things;
13:16:10 [RalphS]
... requesting text/html returns a human-readable document
13:16:18 [RalphS]
... this is different from what DCMI currently does
13:16:43 [RalphS]
... if the clients asks for RDF/XML it gets redirected to something that is RDF/XML
13:17:04 [RalphS]
... this feature of DCMI -- using redirects -- is a good idea
13:17:23 [RalphS]
... so I'm in favor of using content negotiation
13:17:42 [aliman_scribe]
tom: content negotiation seems clear, other option fuzzy.
13:17:44 [danbri]
q+ to ask re "RedirectTemp /foaf/0.1/Organization
" in apache
13:18:44 [aliman_scribe]
tom: other option? to have web page with embedded pointer to rdf schema, & if enough peple do it then applications will have to handle it.
13:19:22 [RalphS]
q+ to ask if embedded RDF was talked about in Madrid
13:19:45 [aliman_scribe]
tom: ericm said in madrid more practical to have some sort of redirect ?
13:20:03 [aliman_scribe]
danbri: remember ericm saying something about lnking to RDF
13:20:25 [aliman_scribe]
ralph: published recommendation says something about link.
13:20:37 [aliman_scribe]
danbri: webarch provides for content negotiation
13:20:50 [aliman_scribe]
tom: consensus for content-negotiation?
13:21:04 [aliman_scribe]
ralph: other option is embedded RDF (XHMTL 2.0)
13:21:38 [aliman_scribe]
danbri: previous foaf specs have embedded RDF/xXML at expense of validation
13:22:08 [aliman_scribe]
ralph: support as much RDF as we can as embedded, but not necessarily evrything. ...
13:22:33 [aliman_scribe]
RDF/A syntax is what HTML TF is converging on, is it reasonable to express RDF schema as RDF/A?
13:23:17 [aliman_scribe]
ralph: RDF/A solution does not address deployed tools
13:23:30 [aliman_scribe]
tom: content negotiation raise issues?
13:23:45 [aliman_scribe]
ralph: yes but cheap and tools should change to do this anyway.
13:24:01 [RalphS]
ack me
13:24:01 [Zakim]
RalphS, you wanted to ask if embedded RDF was talked about in Madrid
13:24:06 [RalphS]
ack danb
13:24:06 [Zakim]
danbri, you wanted to ask re "RedirectTemp /foaf/0.1/Organization
" in apache
13:24:21 [aliman_scribe]
danbri: trying to figure out what do do with FOAF ns ...
13:24:32 [aliman_scribe]
currently wrong redirect 30x ...
13:24:43 [aliman_scribe]
currently goes from term URI to namespace URI ...
13:24:52 [aliman_scribe]
can then get that with html or rdf ...
13:25:08 [RalphS]
Ralph: [re Accept: application/rdf+xml] -- it's a shame it took us several years to tell application developers what content type to request, but oh well
13:25:40 [aliman_scribe]
discussed doing redirect so that e.g. ns/mbox redirects to spec#term_mbox
13:26:01 [aliman_scribe]
... but problem with hash & encoding in apache with rewriting ...
13:26:26 [aliman_scribe]
... reasonable for clients to get redirects dependedt on content type requested ...
13:26:49 [aliman_scribe]
but with above options redirects are content type specific?
13:27:05 [aliman_scribe]
...how do you configure in apache?
13:27:10 [danbri]
current:RedirectTemp /foaf/0.1/Organization
13:27:33 [danbri]
possible: RedirectTemp /foaf/0.1/Organization
13:27:45 [danbri]
prob 1: # gets escaped somehow (reported by al)
13:28:22 [danbri]
prob 2: this becomes representation-specific: #term_Organization is an anchor only in the HTML version of the ns doc ... means nothing in the RDF version
13:28:28 [RalphS]
Ralph: it doesn't strike me that different redirects based on Accept: is architecturally bad, but if there's no apache support that's an issue for us
13:28:57 [RalphS]
Alistair: current browsers preserve their fragid across redirects
13:29:19 [RalphS]
... so a redirect that includes a fragid would lead to fragid clashes
13:29:49 [aliman_scribe]
ralph: suspect alistair is right ... but wonder if its actually endorsed by http spec ...
13:30:01 [aliman_scribe]
if its not endorsed then not all browsers may do it.
13:30:10 [danbri]
ah, so a link such as <a href="
">Organization</a> might redirect to right part of the html doc
13:30:15 [danbri]
rrsagent, pointer?
13:30:15 [RRSAgent]
See
13:30:32 [RalphS]
Ralph: perhaps we could ask the TAG if it is legitimate for a server to return a fragid in a redirect
13:30:47 [aliman_scribe]
ralph: ask the tag if legit for server to return uri with hash in redirect?
13:31:41 [aliman_scribe]
tom: consensus on content-negotiation, so we could as a next step write up how this works, leading to issues with the TAG?
13:32:16 [aliman_scribe]
tom: ... talking about a workable solution, which raises questions of compatibility with spec.
13:33:03 [RalphS]
Alistair: apache URI-encodes '#' before serving a redirect to the client but purl.org leaves '#' un-encoded
13:33:19 [danbri]
q+ to note that redirect+conneg option, on a / namespace, means that term URIs can't redir to parts of the html spec
13:33:35 [aliman_scribe]
tom: what's the nnext step?
13:33:46 [aliman_scribe]
q+ to talk about requirements
13:33:50 [danbri]
eg <a href="
">Organization</a> took me to
13:33:58 [aliman_scribe]
tom: or is it too speculative?
13:34:02 [RalphS]
q+ to ask for documentation of FOAF URI resolution process ala Alistair's SKOS Core resolution message
13:34:26 [aliman_scribe]
tom: who could take the lead?
13:34:38 [Zakim]
danbri, you wanted to note that redirect+conneg option, on a / namespace, means that term URIs can't redir to parts of the html spec
13:35:32 [aliman_scribe]
danbri: realising that / ns prevents us getting clickable term URIs getting to correct sections of a doc ...
13:36:18 [aliman_scribe]
tested redirects with hash for FOAF ...
13:36:34 [danbri]
13:36:46 [aliman_scribe]
... so apache hash encoding makes sense if browsers hang on to frag ids across redirects.
13:37:07 [aliman_scribe]
ralph: above redirect is broken...
13:38:07 [aliman_scribe]
danbri: can document this as one of the tradeoffs for hash vs slash.
13:38:54 [aliman_scribe]
ralph: is there a doc which describes FOAF URI resolution policy now, and what it should be post madrid discussion?
13:39:02 [aliman_scribe]
ralph: can you write this up?
13:39:26 [aliman_scribe]
ralph:... propose you write how it is now, then write best guess on how it should work.
13:39:31 [danbri]
13:39:35 [Zakim]
RalphS, you wanted to ask for documentation of FOAF URI resolution process ala Alistair's SKOS Core resolution message
13:39:51 [aliman_scribe]
ACTION: danbri to write up how foaf URI dereferencing works now, and how it should be done.
13:40:28 [aliman_scribe]
ACTION: tom to write up current DCMI URI dereferencing works now, and how it should be done.
13:40:34 [Zakim]
aliman_scribe, you wanted to talk about requirements
13:41:13 [RalphS]
Alistair: we can state our [DCMI, SKOS, FOAF] requirements, perhaps more simply than we can describe what currently is implemented
13:43:04 [RalphS]
Ralph: it's fine to use SHOULD and MUST in a requirements document
13:43:13 [aliman_scribe]
tom: e.g. marc relator codes are declared as RDF props, and click gets you to html, but you have to know to go elsewhere for the RDF ...
13:43:28 [aliman_scribe]
nice for humans, bad for computers.
13:43:36 [aliman_scribe]
ralph: ok to say must and should
13:44:21 [aliman_scribe]
ralph: bernard asked provocative question in email...
13:44:30 [aliman_scribe]
bernard: not deliberately provocative :)
13:44:44 [RalphS]
->
Bernard asks about relationship to Published Subjects
13:45:36 [aliman_scribe]
ralph: if we go down this route of making URIs friendly to both humans and computers they start to behave alot like publish subjects ...
13:45:46 [aliman_scribe]
can we characterise the similarities and differences?
13:46:30 [danbri]
q+ to suggest "Namespaces whose URI ends in '/', since term URIs cannot redirect HTML clients to sections of the HTML documentation, SHOULD provide 'table of contents' per-term hyperlinks near the top of the HTML documentation"
13:46:31 [aliman_scribe]
bernard: when we did published subjects, recommendation (might) way that computers would use annexed schemas was not clear ...
13:46:39 [aliman_scribe]
pubsub primarily directed at humans ...
13:46:53 [aliman_scribe]
now with this new state of things we can revisit pubsub ...
13:47:23 [aliman_scribe]
ralph: useful line of investigation ... gives us way to do convergence ...
13:47:30 [danbri]
q-
13:47:49 [aliman_scribe]
but one issue is if there is a disagreement between interpretation of human-readabel and machine-readable, which do yu belive?
13:48:22 [aliman_scribe]
bernard: TMs have no notion of a contradiction, no notion of consistency, just some binding points for bits of information about a subject ...
13:48:33 [aliman_scribe]
but no way to make sure these things are consistent. ...
13:48:46 [aliman_scribe]
which is why AI folks don#t like TMs ...
13:49:03 [aliman_scribe]
but consistency between human and computer descriptions is difficult to control.
13:49:17 [aliman_scribe]
tom: clarification: you're not talking about simple workflow issues ...
13:49:34 [aliman_scribe]
because e.g. DCMI generates documentation from schemas (??) ...
13:49:49 [aliman_scribe]
(scribe may have got that wrong way round)
13:50:03 [Zakim]
This conference is scheduled to end in 10 minutes; all ports must be freed
13:50:07 [aliman_scribe]
... DCMI has not said e.g. 'RDF schema has precendence over the web page ...
13:50:25 [aliman_scribe]
' ... so be defult the web page is the 'authoritative' resource ..
13:50:44 [aliman_scribe]
but this situation could change in the future, esp as we move towards saying more about the terms in a formal sense ...
13:50:51 [RalphS]
q+ to ask Tom to elaborate on "by default, the [HTML] page is authoritative over the RDF schema"
13:51:08 [aliman_scribe]
so we're going to have to be more explicit on this (i.e. which is more authoritative).
13:51:27 [aliman_scribe]
bernard: machine readable is normative, human readable is informative ... go in this direction?
13:52:01 [aliman_scribe]
tom: this is direction for dcmi, but RDF schema presents a subset of the information that's presented in the web pages ...
13:52:14 [aliman_scribe]
e.g. versioning information is only in the web pages ...
13:52:20 [aliman_scribe]
q+ to talk about skos
13:52:42 [aliman_scribe]
ralph: is is a proper subset? are there e.g. domains & ranges in RDF overlooked in HTML?
13:52:42 [danbri]
q+ to note
13:52:52 [danbri]
described. ..."
13:53:09 [danbri]
rdfs is (on purpose) agnostic re which forms of vocab desc take precedence
13:53:10 [aliman_scribe]
tom: no, actually right now looking at assigning domains and ranges to DCMI props, to express current semantics ...
13:53:33 [aliman_scribe]
seen as a positive step, but danger of restricting definitions in practice ...
13:53:55 [danbri]
q-
13:54:11 [aliman_scribe]
also need to rethink policy implications, how do we express that same information in web documents, and when do we want to say which resource is 'authoritative'?
13:54:32 [aliman_scribe]
... currently assume they're always in sync, which could be difficult.
13:55:04 [Zakim]
This conference is scheduled to end in 5 minutes; all ports must be freed
13:55:04 [aliman_scribe]
danbri: could say e.g. 'we believe these things are always in sync, if not tell us'
13:55:38 [aliman_scribe]
ralph: you (tom) said that by default human readable web page is 'authoritative' .. expand?
13:56:06 [aliman_scribe]
tom: we have web pages which say 'this is the authoirtative description of DCMI terms' and RDF docs don't say that.
13:56:31 [aliman_scribe]
tom: also historically always precendence for html
13:56:31 [Zakim]
RalphS, you wanted to ask Tom to elaborate on "by default, the [HTML] page is authoritative over the RDF schema"
13:56:36 [Zakim]
aliman_scribe, you wanted to talk about skos
13:57:06 [RalphS]
Alistair: this [which variant is authoritative] is a longer-term issue
13:57:27 [RalphS]
... some constraints will be hard to describe; e.g. in SKOS constraints are currently only described in SKOS
13:57:34 [RalphS]
s/in SKOS/in prose/
13:57:47 [RalphS]
... it may be possible to use SPARQL to write some constraints
13:58:00 [RalphS]
... RDFS doesn't have enough to specify all SKOS constraints
13:58:05 [Zakim]
This conference is scheduled to end in 2 minutes; all ports must be freed
13:58:14 [RalphS]
... e.g. broader/narrower
13:58:30 [RalphS]
... and "there should be only one preferred label per language"
13:58:57 [RalphS]
DanBri: RDFS had a class ConstraintResource
13:59:05 [Zakim]
This conference is scheduled to end in 1 minute; all ports must be freed
13:59:59 [RRSAgent]
See
14:00:05 [Zakim]
This conference is scheduled to end now; all ports must be freed immediately
14:00:09 [Zakim]
The time reserved for this conference has been exceeded. 11 ports must be freed
14:00:18 [Zakim]
-Danbri
14:00:30 [RalphS]
rrsagent, please draft minutes\
14:00:30 [RRSAgent]
I'm logging. I don't understand 'please draft minutes\', RalphS. Try /msg RRSAgent help
14:00:32 [RalphS]
rrsagent, please draft minutes
14:00:32 [RRSAgent]
I have made the request to generate
RalphS
14:00:43 [Zakim]
-Alistair_Miles
14:00:44 [Zakim]
-Bernard
14:01:06 [Zakim]
-Ralph
14:01:07 [Zakim]
-Tom_Baker
14:01:09 [Zakim]
SW_BPD(VMTF)9:00AM has ended
14:01:10 [Zakim]
Attendees were Ralph, Tom_Baker, Alistair_Miles, Danbri, Bernard
14:01:15 [berva]
berva has left #vmtf
14:20:03 [danbri]
danbri has left #vmtf
16:02:19 [Zakim]
Zakim has left #vmtf | http://www.w3.org/2005/09/27-vmtf-irc | crawl-002 | refinedweb | 2,771 | 61.36 |
Increase get pointer and return next character.
The function increases the get pointer by one and returns the next character, unless the get position is at the end of the input sequence, in which case EOF is returned.
Parameters.
Return Value.
The character available at the newly increased position of the get pointer.
If either before or after the call to this member function the get pointer is at the end of the input sequence EOF is returned.
Example.
// show file content - snextc () example
#include <iostream>
#include <fstream>
using namespace std;
int main () {
char ch;
streambuf * pbuf;
ifstream istr ("test.txt");
pbuf = istr.rdbuf();
do {
ch=pbuf->sgetc();
cout << ch;
} while (pbuf->snextc()!=EOF);
istr.close();
return 0;
}
This example shows the content of a file on screen, using the combination of
sgetc and snextc to
read the input file.
Basic template member declaration ( basic_streambuf<charT,traits> ):
See also.
sbumpc, sgetc, sgetn
streambuf class | http://www.kev.pulo.com.au/pp/RESOURCES/cplusplus/ref/iostream/streambuf/snextc.html | CC-MAIN-2018-05 | refinedweb | 154 | 56.76 |
This preview shows
pages
1–4. Sign up
to
view the full content.
View Full
Document
This
preview
has intentionally blurred sections.
View Full
Document
This
preview
has intentionally blurred sections.
Unformatted text preview: - 1 - 1 (30) 2 (30) 3 (30) 4 (30) 5 (30) Total (150) CS101 Introduction to Programming Final Exam (Spring 2008) Section Professor's Name Student ID Your Name ※ Fill out the student information CORRECTLY or you will get 1 point off for every mistake you make. 1. Answer each question according to the instruction. 1-1. Choose one that is NOT a Java keyword (or reserved word). ( 4 ) (3 points) ① implements ② interface ③ throw ④ integer ⑤ abstract 1-2. What result will you get when the following program is executed? ( 4 ) (3 points) public class test { public static void main(String[] args) { StringTokenizer st = new StringTokenizer("3+4-5+10", "+-", true); for(int i=0; i<st.countTokens(); i++) System.out.print(st.nextToken()+" "); } } ① 3 4 5 10 ② 3 + 4 - 5 + 10 ③ 3 4 ④ 3 + 4 - ⑤ This program throws a “NoSuchElementException" 1-3. Choose a correct statement. ( 4 ) (3 points) ① An abstract class can contain only abstract methods ② Although we can make an object for an abstract class, it is impossible to make an object for an interface ③ It is impossible that a class inherits a parent class and also implements an interface. ④ 'actionPerformed()' is an abstract method defined in 'ActionListener' and 'ActionListener' is a kind of interface ⑤ When a class inherits an abstract class or interface, we use a word 'implements' instead of 'extends'- 2 - 1-4. The following program handles the exception by using the try-catch statement. Choose an answer that represent a correct result you will get after execution. ( 1 ) (3 points) public class test { public static void main(String[] args) { System.out.print("1"); try { System.out.print("-2"); methodA(); System.out.print("-3"); } catch(NullPointerException e) { System.out.print("-4"); System.exit(0); } catch(Exception e) { System.out.print("-5"); } finally { System.out.print("-6"); } } public static void methodA() throws Exception { int a = 3; if(a%2==1) throw new NullPointerException(); System.out.print("-7"); } } ① 1-2-4 ② 1-2-5 ③ 1-2-4-6 ④ 1-2-5-6 ⑤ 1-2-7-3-6 1-5. Choose an incorrect description. ( 4 ) (3 points) ① Vector and Linked List are a kind of dynamic data structures. ② At the time an array is created, its length is fixed. ③ The base type of a vector must be a class type rather than a primitive type. ④ In Generics, it is possible to create a new object by using type parameters (such as <T>); For example, T s = new T(); is a legal expression. ⑤ A valid array index is always between 0 and (array length - 1)- 3 - * The following program prints out an integer value written in the file "input.txt". Read this program and answer two questions below. (1-6, 1-7) public class test { public static void main(String[] args) { try{ BufferedReader br = new BufferedReader(new FileReader("input.txt")); String s = br.readLine(); System.out.println(Integer.parseInt(s)); } catch (NumberFormatException e) { System.out.println("number format error"); } catch (FileNotFoundException e) {...
View Full Document
This note was uploaded on 04/09/2010 for the course CS CS101 taught by Professor Hwang
- Hwang
Click to edit the document details | https://www.coursehero.com/file/5853573/2008spring-final/ | CC-MAIN-2017-13 | refinedweb | 578 | 57.87 |
06 September 2012 19:46 [Source: ICIS news]
By John Dietrich
HOUSTON (ICIS)--With a slight increase in feedstock costs being balanced by slowly softening demand, sources said on Thursday that they expect September contract prices for ?xml:namespace>
One large producer confirmed it will seek a rollover on most of its September contracts, keeping prices within the ICIS assessed range of $1.10-1.15/lb ($2,425-2,535/tonne, €1,916-2,003/tonne) FD railcar (free delivered via railcar).
“With the recent hurricane activity and demand remaining stable in some sectors and starting to slip in others, it’s not worth pushing,” the producer said. “But all bets are off next month depending on feedstocks.”
Sources said that only one major MMA plant -- Evonik’s 150,000 tonne/year Fortier facility in
On the feedstock side, US barge acetone contract prices have increased by 0.5 cents/lb in each of the past two months, while slight gains have also been seen in the ammonia and methanol markets.
“If there’s any bias for MMA prices, it would be up slightly because of feedstock costs,” an MMA buyer said.
August contract prices were assessed at a fall of 1-2 cents/lb from July, although rollovers were prominent.
Some US MMA market players said they are seeing material as low as 95 cents/lb, although no buyers have said they can get their hands on the product.
“We’ve heard that rumour, but we haven’t been able to find the material,” a buyer said.
The buyer speculated that the cheap material might not be on-spec for most
However, the large
“We saw the same rumour a year ago, and it didn’t amount to anything,” the producer said. “Maybe someone is just trying to shed inventory, or it’s off-spec or whatever, but there’s not much of it and it won’t be a factor in discussions.”
Demand in the downstream coatings sector has started to slide, sources said, citing mostly seasonal factors.
Although some are optimistic a second wave of strong demand could come now that temperatures have returned to more favourable painting conditions, most buyers disputed this, saying any new material needed is likely in inventory rather than needing to be produced.
Major US MMA producers include Dow Chemical, Evonik and Luc | http://www.icis.com/Articles/2012/09/06/9593453/high-feedstocks-soft-demand-pushing-us-mma-to-rollover.html | CC-MAIN-2015-22 | refinedweb | 392 | 57.2 |
A universal graphics library
Project description
Graph
The goal is to build a Tensor-based computer graphics library that focuses on the field of computer vision.
The graphic elements of this project refer to the Canvas of tkinter (Python 3.7 or later). The code implementation principle and the instruction manual can refer to tutorial in this project.
Graph_tensor user manual reference manual.
PyPI support available
You can install the latest version using the following command:
$ pip install graph-tensor
The following command is used when called:
import graph_tensor
Contribution
You are welcome to contribute new code. A detailed description of the package can be found in DeveloperGuide_en or DeveloperGuide_zh.
Reference
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
graph-tensor-0.1.0.tar.gz (8.4 kB view hashes) | https://pypi.org/project/graph-tensor/ | CC-MAIN-2022-21 | refinedweb | 148 | 50.33 |
Create Quick Database Interfaces with ASP.NET Dynamic Data
Customizing using attributes
So far, you have briefly seen how ASP.NET Dynamic Data applications work. After you have seen how the different features of the application, you should next learn how you can control how data is displayed in the application.
Earlier, when looking at the
Global.asax.cs
file, the
ScaffoldAllTables property was set to
true. This property value means that every table in the
model became active in the application for editing and
deleting. But maybe you would like to better control which
tables are active. To do this, you need to use
attributes. In the data model, the classes that represent
the tables are defined as partial classes. This means that
you can effectively continue adding features to these
classes, including specifying attributes. To write the
necessary code, you need to add a new file to your
project.
Assuming for example, that you want to hide the employees table, you would add a partial class definition for the Employee class, originally defined in the ADO.NET entity model file NorthwindModel.Designer.cs (if you followed the naming convention suggested earlier). Replacing the skeleton public class definition written by Visual Studio, add the following code:
[ScaffoldTable(false)]
public partial class Employees
{
}
With this definition, the Employees class defined in the
original entity model gets extended, and the ScaffoldTable
attribute is added. This attribute is one of the key ones in
ASP.NET Dynamic Data. Many of the most important attributes
are defined in the System.ComponentModel.DataAnnotations
namespace. Other often-needed attributes include
ScaffoldColumn (of which you will soon see an example),
DisplayName, DisplayFormat, Range and
UIHint.
With the above ScaffoldTable attribute (and the value of false) in place, you should now run the application to see how it behaves. In the initial screen showing the names of tables in the data model, you should see that the Employees table link is missing. And, if you take a look for example at the Orders table, you can see that the hyperlinks to the table are also gone.
Notice how there are two ways to show and hide tables.
You can make all tables visible using the
ScaffoldAllTables property in the
Global.asax.cs file, and then hide them one by
one using attributes. The other option is to go the other
way around: leave
ScaffoldAllTables to false,
and then allow individual tables to become visible using the
ScaffoldTable(true) attribute.
Next, let's see how you can control individual fields using attributes. Previously, you used partial classes to help in specifying the ScaffoldTable attribute, but if you wanted to have attributes associated with individual columns, you would need another kind of solution. Since you cannot have partial property definitions, you must use an additional class to define properties that are associated with database fields.
To do this, you start with a similar partial class like with the ScaffoldTable attribute, but you use the MetadataType attribute to associate another class with the original. Then, this additional class, called the metadata class, allows you to define public properties for each field in the data model which you want to control. The following example shows how this is done:
[MetadataType(typeof(EmployeesMetadata))]
public partial class Employees
{
}
class EmployeesMetadata
{
[DisplayName("Person's title")]
public object Title { get; set; }
}
Here, the partial class Employees is defined as before,
but also the
MetadataType attribute is applied
to the class. The constructor of this attribute accepts a
type as a parameter, which in turn points to the metadata
class called
EmployeesMetadata. This class is
then free to define new properties and associated field-
level attributes to them. For instance, here the
DisplayName attribute (in the
System.ComponentModel namespace) is associated
with the column Title to specify a new, more descriptive
title for the field. Of course, the property names must
match those in the database for this to work.
Modifying user interfaces
While understanding how attributes are applied in ASP.NET Dynamic Data applications is key to your success, you must also understand how you can customize the web page templates that together create the user interface for your application. As briefly mentioned before, ASP.NET Dynamic Data applications by default utilize an ASP.NET template file. This file is named Site.master, and can be found from the root folder of the project.
If you wanted to change the user interface, then editing the Site.master file would be a good place to start. It utilizes XHTML code and defines a single content placeholder into which the actual pages are embedded at runtime. Furthermore, the master file uses CSS styles, which are in turn defined in the file Site.css. To do application-wide font and color changes, editing this style sheet file would give you a head start.
In addition to the template and style sheet files, you do of course have the actual .aspx pages that implement the four basic operations. This can be found inside the DynamicData\PageTemplates folder in your solution. For instance, you might wish to change how the listing pages operate. For this need, you would edit List.aspx.
Another option for customizations is the DynamicData\FieldTemplates folder. This folder contains the user controls that ASP.NET Dynamic Data uses to render different database field types. For instance, a Boolean field is shown as a checkbox to the user. If you wanted to change this, you could simply go and edit the files Boolean.ascx and Boolean_Edit.ascx. There usually are two controls defined for each data type: one for viewing and another for editing. Often, the viewer control is simply a read-only version of the edit control.
It is also possible to define your own user controls to work with your data. For instance, you might wish to change the control that is used to display dates. By default, the DateTime.ascx control uses a textbox control for this, but you could easily change this to, say, a calendar control. If you wanted to make this an application-wide change, then you could simply edit DateTime.ascx, and all date fields would change. You can also change the control on a field by field basis. This is done using attributes, just like with the previously shown ScaffoldTable and ScaffoldColumn attributes. Assume that you had implemented a calendar user control DataTimeCalendar.ascx like this:
<%@ Control Language="C#" AutoEventWireup="true"
CodeBehind="DateTimeCalendar.ascx.cs"
Inherits="DynamicDataTest.DynamicData.
FieldTemplates.DateTimeCalendar" %>
<asp:Calendar
</asp:Calendar>
This declaration mirrors any other user control
definition. However, for a user control to be suitable for
ASP.NET Dynamic Data use, you need to tweak the code-behind
file a bit. First, you need to change the inheritance
chain from the regular
System.Web.UI.UserControl to
System.Web.DynamicData.FieldTemplateUserControl.
Of course, you are not limited to controls that are available in ASP.NET. For instance if you have purchased a nice, feature-rich third-party control or created one on your own, you are free to use them in your ASP.NET Dynamic Data applications. Specifying which user control should be used when ASP.NET Dynamic Data renders the database views can be controlled using the UIHint attribute. This attribute is applied to metadata classes just like the ScaffoldColumn attribute. With the previous DateTimeCalendar user control declaration in place, you could use the UIHint attribute as follows:
[MetadataType(typeof(EmployeesMetadata))]
public partial class Employees
{
}
class EmployeesMetadata
{
...
[UIHint("DateTimeCalendar")]
public object HireDate { get; set; }
}
Here, the HireDate field of the Employees table is assigned the UIHint attribute with the value of "DateTimeCalendar". When ASP.NET Dynamic Data shows the table, the regular text label is replaced with the calendar control (Figure 7). Note that you also need to write a couple of lines of code to the user control's code behind file so that you can set the calendar to show the correct hire date:
protected override void OnDataBinding(EventArgs e)
{
base.OnDataBinding(e);
object val = FieldValue;
if (val != null)
{
Calendar1.SelectedDate = (DateTime)val;
Calendar1.VisibleDate = Calendar1.SelectedDate;
}
}
Figure 7. A custom calendar showing employee hire dates.
Other than this kind of code, it is quite easy to customize your pages with custom controls. As you can see, the row listings and editing pages need not solely rely on labels and text boxes.
Page 3 of 4
| http://www.developer.com/net/article.php/10916_3823551_3/Create-Quick-Database-Interfaces-with-ASPNET-Dynamic-Data.htm | CC-MAIN-2014-42 | refinedweb | 1,395 | 57.37 |
Q. C++ program to swap two numbers without using temporary variable.
Here you will find an algorithm and program in C++ programming language to swap 2 numbers without using any third or temporary variable.
Swapping two number : Swap two numbers means exchange the values of two variables with each other. Suppose we are given 2 numbers num1 = 10 and num2 = 20 and we have to swap these 2 numbers without using third variable. After swaping value of num1 = 20 and num2 = 10.
Algorithm to swap two numbers without using third variable
START Step 1 -> Take two integer as input num1 and num2. Step 2 -> Print number before swapping Step 3 -> num1 = num1 + num2; Step 4 -> num2 = num1 - num2; Step 5 -> num1 = num1 - num2; Step 6 -> Print numbers after swapping STOP
C++ Program to Swap Two Numbers Without Using Temporary Variable
#include <iostream> using namespace std; int main() { int num1,num2; cout<<"Enter Two Numbers :\n"; cin>>num1>>num2; cout<<"Number before swapping is "<<num1<<" and "<<num2<<"\n"; num1=num1+num2; num2=num1-num2; num1=num1-num2; cout<<"Number after swapping is "<<num1<<" and "<<num2; return 0; }
Output
Enter Two Numbers : 10 15 Number before swapping is 10 and 15 Number after swapping is 15 and 10 | https://letsfindcourse.com/cplusplus-coding-questions/cplusplus-program-to-swap-two-numbers-without-temporary-variable | CC-MAIN-2022-40 | refinedweb | 206 | 60.38 |
Hey, im back again. I got a little time to program and so i decided to write a rock paper scissors program.
I am not sure what is wrong with it but it closes after the user inputs somthing. I think i needs it to return a value
Code:#include <cstdlib> #include <iostream> using namespace std; int rock(); int paper(); int scissors(); int main() { int select; cout<< "Welcome to Rock, Paper, Scissiors Version 1.0"; cout<< "\nInstructions:\n"; cout<< "\nType ( 1 ) to cast rock\n"; cout<< "Type ( 2 ) to cast paper\n"; cout<< "Type ( 3 ) to cast paper\n"; cout<< "\nYour choice : "; cin>> select; switch (select) { case 1: rock(); break; case 2: cout<<"asdf";//paper(); break; case 3: cout<<"ahrt";//scissors(); break; default: cout<< "\nThat was not a selection!\n"; break; } cin.get(); } int rock() { int compchoicerock; compchoicerock = rand() % 3 + 1; if ( compchoicerock == 1 ){ cout<< "\nThe computer also chooses rock.\n"; cout<< "The round ends in a draw."; } else if( compchoicerock == 2 ){ cout<< "\nThe computer chooses paper, and paper covers rock so you lose!\n"; } else if( compchoicerock == 3 ){ cout<< "\nThe computer chooses scissors, rock smashes scissors so you win!"; } } | http://cboard.cprogramming.com/cplusplus-programming/66588-why-doesnt-work.html | CC-MAIN-2013-48 | refinedweb | 190 | 70.53 |
: Land Transactions: October 5,90 Table of Contents Main page 1 page 2 Main: Around Levy County page 3 Main: Opinion page 4 Main: Law and Courts page 5 Main: Around Levy County continued page 6 page 7 Main: Sports and Recreation page 8 page 9 page 10 Main: Around Levy County continued page 11 Main: Classified and Legals page 12 page 13 page 14 page 15 page 16 Main: Around Levy County continued page 17 page 18 Main: Land Transactions page 19 Main continued page 20 Full Text LEVY COUNTY JOURN HE COUNTY PAPER EST. 1A92P VOL. 83, NO. 13 INSIDE - i They're 'Nuts in Williston Page 2 4-H Week Page 3 An aSSOCiaTnon or their own Page 17 OBITUARIES I John F. Beach Jr. Dylan Fulton Arthur Reeves CONTENTS... Around Levy 2-3,6 Opinion 4 Law & Courts 5 Obituaries 7 Levy History 11 Tides 11 Sports 8-10 Classified 12 Legals 12-15 Land Transactions 15-18 Marketplace 19-20 G) E: FOr m F0)0 oi, -n cr) - UO M 0) ;u -- 0) Governor will not dissolve Y'town BY CASSIE JOURNIGAN STAFF WRITER Gov. Jeb Bush has declined the former Yankeetown mayor's recommendation to dissolve the town charter and 'turn over local government functions to Levy County. Mayor Joanne Johannesson made her recommendation in her Sept. 19 letter of resignation to the governor. A letter dated Sept. 28 from the governor's office and signed by general deputy counsel Nathan Adams IV was sent to Yankeetown town attorney Kenneth Warnstadt. A copy was also sent by request to the Levy County Journal. The letter from the governor's office reads: "We do not believe further action by this office is necessary at this time," citing that Yankeetown, under the direction of an emergency financial management board, has "paid overdue bills, hired critical staff, completed and received an audit...addressed insurance concerns, and. established a committee to address. water and sewer problems." ..... The emergency board headed by George Lambka, oversaw town functioning after the governor declared Yankeetown to be in a state of See Town Page 20 THURSDAY, OCTOBER 5,20061 SECTION: 20 PAGES BY CAROLYN RISNER MANAGING EDITOR Insurance mandates have put a damper on a once healthy volunteer base. Bonnie Tollefson, Levy County Library Director, told the county commissioners two weeks ago that the vol- unteer pool of 50 has now dwindled to one due to a new policy requiring all volunteers to submit to a background check and drug testing. The policy covers all per- sons who volunteer, County Coordinator Fred Moody said, while Tollefson added it has hurt her ranks consider- ably. Many volunteers object to what they feel is an indigni- ty. The cost of the test is the county's burden, Tollefson said. To help alleviate some of the inconvenience and indig- nity, Tollefson said Tuesday that testing will be held in Levy County and volunteers will not have to travel to Gainesville. Drug testing for library volunteers will begin at 9 a.m. Tuesday, Oct. 24 at the Luther Calloway Library in Chiefland. Other dates include: K Oct. 27, 9 a.m. Cedar Key Library Oct. 27, 1 p.m., Wil- listen Library > Oct. 30, 9 a.m., Bron- son Library > Oct. 30, 1 p.m., A.F. Knotts Library, Yankeetown Someone from Human Resources will be on hand, Tollefson said, to answer questions and assist volun- teers. Anyone who volun- teers and does not make one of the local testing dates will have to have the work done in Gainesville, she said. In other library business during Tuesday's county commission meeting, Tollef- son received permission to 50 cents per copy Journal photo by Miriam Blitch STUDENTS IN THE CLASSES of Mark Roberts at Chiefland Middle School were among those who read Peter and the Starcatchers during last week's attempt to set a new world record. Students hope to enter record books BY CASSIE JOURNIGAN STAFF WRITER It wasn't quite, "On your mark, get set, go," but there was all the excitement of a sporting event kick-off as students in Chiefland and Bronson eagerly awaited their countdown. "Breaking a World Record: Reading Aloud!" was held Thursday at 11:25 a.m. Event organizers hoped to break a world record for the most people reading aloud in different locations simultaneously. Approximately 300,000 middle school students across Florida took part in the race, which was sponsored by Gov. Jeb Bush and was one piece of his "Shoot for the Stars: A Record Breaking Year for Middle Schools" campaign. Students watched countdown activities by webcast. The governor then led students across Florida in reading aloud an excerpt from "Peter and the Starcatchers," a book by Dave Barry and Ridley Pearson. Twelve students were directed in the read-a-thon by student leaders Cynthia Shelhorse and Brianna Peterson at SHilltop Alternative School in Bronson. Chiefland Middle School contributed 372 participants. Students and event organizers will need to wait about a month to discover whether their read-a-thon efforts earned them a world record. purchase six computer sys- tems each for the Williston and Chiefland libraries. Funded by a grant from the Gates Foundation, the system will "make librarians' lives easier," Tollefson said. Library patrons may also be privy to a guest speaker next year who will speak on Jewish literature. Tollefson is applying for a grant that if awarded will bring the Uni- versity of Florida's Dr. An- drew Gordon to Chiefland to speak on the subject. See Road Page 20 Tuesday last day to register ,for November election The November general election is less than six weeks away but Floridians still have time to register to vote. To participate in the Nov. 7 general election Floridians must register to vote by Tuesday, Oct. 10. To increase voter participation this year, the Secretary of State joined with the Florida State Association of Super- visors of Elections in a public awareness campaign. The Campaign. "Get Out The Vote," has been effective in regis- tering over 21,000 new voters in Florida. As of Aug. 7 there ,were 10,429,566 registered voters. Voter registration applications are available online at S, at Supervisor of Elections of- i fices and through a Department of Highway Safety and Mo- tor Vehicles office. Completed applications must be post- hmarked or hand-delivered to any Supervisor of Elections See Vote Page 20 REACH US I Managing Editor Carolyn llsner Phone (3521490-4462 Fax (3521490-4490 Chlefland (3521486-5042 Bronson Email edltor@levYloumal.com Address P.O. Box 159 Bronon, F 32621-0159 P.O. Bx 2990 Chleland, FL 32644-2990 SUBSCRIBE Levy, Dixie and Gllchrlst counties $17 in-state $22 Out of state $27 Locally owned and operated! The Levy County Journal believes In good stewardship of the land. Thats why we print on 100 percent recycled newsprint. Protecting our future TODAY! " Volunteers must have drug test 0Looking Back I: THE YEAR WAS 1918 and two WWI soliders were living it up in Germany. They were O.L. Smith, right, and M.E. Hiers, left, who would go on to sit on the Levy County Board of County Commis- sioners (see Levy History Page 7). JIE E I . THURSDAY, OCTOBER 5, 2006 Page 2 LEVY COUNTY JOURNAL %~ ~I ~ L ,^ ^..gg - 'c"- LjH' . -3s^" & Linear I am iu.i. ~t Peanut Kiia 'o'caf'r 'i4 4 ;'. -- . j-f. $ : :- -... SMain Street and Noble A Williston 'ark, Main Street and Noble Ave'e, Williston - j. s . JusS Good i 4..... j..u Billy Jack's Specializing in slow cooked BBQ, Band cut steaks, hand breaded seafood and a variety of made-to.order salads and sandwiches. Catering for all occasions. Monday Saturday 11:00 a.m to 9:00 p.m. (352) 528-5225 i an r I- i -I-. -. 1 _.-- ll .ll ....._. X Victorian TeaRoomA 115 SE 1st A4venue 'Wilfiston For a trumy ilunlue e. pxFlt'lC 11 Ct i17nll a c rIntnmosplfet e n 4C~w Aite "U(et 'acw { 'tfao m ad &awtxn A-ocal Artists' Gallery of Equine, Western and Landscape Art SAntique Consign r t hi MONTANA FURNITURE jSe'dtAi d at 40 LYW t St. inWiP~to I^^ uesda -Satwufd, 11Ham-5pm The Ivy 3-ouse Restaurant & Bed andBreakfast 352-528-5410 Lushv Mo~u ay-Saturday 11:00acw-2:00pvm Suppert~e Eve ry Friday Er Saturday 5-8pmr IIALE'S GENERAL STORE ANTIQUES, ICE CREAM PARLORI COFFEE & SANDWICH SHOP MONDAY-SATURDAY 10:00AM-5:001P wedgef&eay Santurda y 1Oau~t-2~2 I .Adany varietie- ftea and411t Iilt hLnit l a1tV I1fli/tI? M r'r'o'ro n x.rn ; i2- i2Y- 150;ivoic'mj: I , across 1-oll CiY I LII Buy, sell and trade/Used and new book *'t1 5 ouiese fcofag1oy I tarting sunday Uctober 8thi Open 7 days 11:00 am-9:00 pm Green Shutters 706 West Nob6le've. Wiiaston Steak Safood Daily Lunch Specials staa lung at $7.95 528-0090 ijry our iomemad desserts. We aflo serve Beer and'Wine. SFrin'ndifv. erice and nnodHfome f okina! l A glimpsee of the past brought forward into theJ present. Cedar Chest is not your a erage a/t/ique shop. he museum like store contains precious memories, designs and items carried throughout a time-line in history. Open: Wednesday thur Saturday 10:00 a.m. to 5:00 p.m. (352) 528-0039 48. F. Noble Ave. Williston. Fl 32696 We're NUTS about Williston * Williston Sports 127 East Noble Ave. Williston 352-528-6987 (D Monday-Friday 12:30-6:00pm . Saturday 900am-2:00pm A I anAccessories LVYCOUNTY JOUR HIE UNTY PAP EEST. A992. ATVS, Dirtbikes and much much more &Gator, Seminole, Hurricane MM And Buccaneers Novelties. *". '1A1L CINuTALRIMIA LLssf"zSTH ip - F j * PER :IAL Member FDIC r Pi *I I df LEVY COUNTY JOURNAL AROUND LEVY COUNTY THURSDAY, OCTOBER 5, 2006 Chiefland joins Enterprise Zone BY CASSIE JOURNIGAN STAFF WRITER Area businesses and government agencies are banding together in an attempt to bring prosperity- and jobs-to Ley County. Pam Blair, executive director of Nature Coast Business Development Council, Inc. requested, "that commissioners cooperate and set aside areas to include in an enterprise zone." Chiefland city commissioners unanimously approved a motion to develop the zone during their Sept. 26 meeting. The state-run enterprise zones program seeks to buffer areas in need of economic revitalization through tax incentives offered to businesses located within zone boundaries. Tax credits are provided in Instead, the tax breaks come the form of tax refunds to in the form of sales tax businesses. Discounts of up rebates offered to businesses to 50 percent for utilities and that are located within zone telecommunications may be boundaries. offered to businesses as well. Enterprise zones are Commission member Teal accepted based on Pom e r o application to the Governor's Office of Tourism, Trade and Economic Development, S-~ which administers the program. Not allareasthat apply S d are accepted. in-terpFri o Fol i There are t currently three other counties in competition asked whether for the one available rural taxpayers would bear the designation according to brunt of tax cuts. Blair, and the applications are "There will be no loss in due in November. Decisions revenue to municipalities are expected from the state in within the county or the December. county itself," Blair said. Besides 'the city of Chiefland, Williston, Bronson and the county are cooperating in the effort to achieve the zone designation. A task force has been set up by the county and includes Chiefland Police Dept. Chief Robert Douglas, Levy County Sheriff Lt. Sean Mullins, Ted Parada of Levy County Code Enforcement, Workforce Development Board member Kathy Judkins, Marilyn Kern- Ladner from Central Florida Community College, Capital City Bank's Andy'Lot, Levy Abstract & Title's Skipper Henderson, and Sharon Battles from Unity, Family Community Center. Chiefland Mayor Betty Walker appointed Commissioner Teresa Barron to serve as Chiefland's point of contact to the board. Levy celebrates National 4-H Week More than 240,000 4-H participants in Florida will share their accomplishments within their communities during National 4-H Week, Oct. 1-7. Counties across the state will also observe the week with proclamations, community service activities and events. 4-H is one of the largest youth development programs in America, involving more than 7 million young people ages 5-19, and 538,000 youth and adult volunteers. This is their week to celebrate their program and thank those who support them. National 4-H Week also serves as a great recruiting tool to attract new members. Open houses and ice cream socials are very common so' that communities can learn more about the 4-H youth development program. Alachua County also plans to hold an open house for new and prospective 4-H members and families. Many counties including Palm Beach, Walton, Gilchrist and Santa Rosa will meet with their city government leaders to receive proclamations recognizing the week. Proclamations provide formal recognition to 4-H and allow youth to experience the government process. "Proclamations are a great learning tool for youth during this week," Florida Agriculture Commissioner Charles H. Bronson said. "They are able to visit with their city and county leaders and learn more about the democratic process." Lake, Orange, Osceola, Seminole, Brevard and Volusia counties are joining together and partnering with Second Harvest Food Bank to hold a peanut butter drive. Twenty to 30 youth from each county are expected to participate at various Publix stores on Make a Difference Day, Oct. 28. Other counties will promote 4-H in area schools. Youth members in Bradford County are delivering baskets of goodies to businesses and individuals who have supported their program throughout the year. Other Contacts (352) 339-4713, (352) 339-2704 or (352) 339-6435 (Loader operator) Ly. COUNTY JOUrT 4-H is Florida's only youth development program directly connected to the technological advances and. latest research of the University of Florida. 4-H members learn leadership, citizenship and life skills through hands-on-projects in science, engineering and technology, health living, or citizenship. Topics are as varied as rocketry, nutrition and healthy living, public speaking, butterfly analysis, photography, and community services. Using a "learn by doing" model, youth are encouraged to experiment, be innovative and think independently to get them the most from their experience. In addition, 4-H helps our communities' young people reach their full potential. Recent studies show youth who participate in 4-H do better in school, are move motivated to help others, feel safe to try new things, achieve a sense of self-esteem and develop lasting friendships. Founded in 1902, 4- H reaches more than 240,000 rural, suburban and urban youth ages 5-18 in Florida and is active in all 67 counties,,and with the Seminole tribes. All programs are open to all' persons regardless of race, color, age, sex, handicap or national origin, For more information on joining a 4-H group in your area, contact your local County Cooperative Extension Office or visit the Florida 4-H web site at www. florida4h.org. David Renaud D.V. M. Kathy Bowker D.V. M. Greater CiieffandcChamber of Commerce 2006 Business of the year 4 Affordable Quality Medicine & Surgery 4Convenient Appointments Available ' Personal Compassionate Service 'Warm Caring Clinic & Staff AWVeterinary Pet Insurance &*& Morning Drop-off SAngelia and Monty OpeD Tus, WW h i, J y a1m Ptzz-q by the die$ 1.75 Hand-Tossed Dough Pizz, Made Fres Daily o bol So ed e eat fd 70 E. Haaay new ownership- same great food 760 E. Hathaway Bronson News Briefs .. Flu shots. McElroy reunion slated next. SFamily and friends are welcome! T~w^ vju for recny mis nwsf.apr. 8 's I- " Mon.- Fri. 9am -6pm Saturday 9am 4pm 810 EastThrasher Bronson (352) 486-006 Prices as low as: 50 i sq.ft.Wall Tile 99 Csq. ft Floor Tile "- r Porcelairr.. SCera mlc-l 4 Marble t wGran[tee Featuring: Contract oDiscounts Setting Materials Tools Largest Selection Around Unbeatable Prices FamlyAtmosphere Instafler Recommendations Did you know that 74% of adults believe an unattractive smile can hurt your chances for career success [Ea-I.HS____________________ '3S Page 3 - A A Fill Dirt & Hauling On South 121-Williston, Florida Located (352) 528-3520 Office @ B&G Seed LEVY COUNTY JOURNAL OPINION THURSDAY, OCTOBER 5, 2006 YOUR VIEW i Veterans are done an injustice To the editor: The last time I looked there was a law that said as an American we had a God given right to have freedom of speech. Well, I have always believed that whenever an American chose to speak, they should do three things. First they should speak the truth, second they should say something intelligent and third they should say something to help their fellowman. Well, what I am about to say is the truth, it is intelligent and I only hope and pray it will not only help my fellowman but I hope it will help my comrades. The greatest disgrace in the country is the way our veterans and their families are being treated or should I say not being treated. The first two years President Bush has been occupying the White House, he has cut the veterans administration budget twice. The first time was for $1.4 billion the second time was for $1.5 billion and he has continued to cut our benefits. How about the men and the armed forces for 20 and 30 years? He has allowed their health care payments to be increased three times what they were paying. Is this the way he rewards these veterans and their families for the sacrifices they made to keep this country safe, so Little George could one day be president? Let's get back to our veterans' hospitals, he has tried to shut most of them down. Of course what congressmen do not realize if they could just get off their donkeys (of course there is another word for donkeys) you would find that the most intelligent, dedicated men and women are working in the VA hospitals. There is so much knowledge and experience being lost. If you could just spend one day in the VA hospital in Gainesville you would be amazed the things you could learn. But, now I must be honest and say we also have received some individuals who think our veterans are not worth the care they are receiving and they only put a workload on the honest and hard working people trying to help our veterans. This is a great disgrace and I only hope and pray I will see these injustices undone before I leave this world. Our VA hospitals should be top priority when it comes to spending the taxpayer's money. William Franklin Bronson Letters to the Editor The Levy County Journal, welcomnes Let- ters to the Editor. Please kieer these things in mind when submitting your thoughts: 1) Letters should be 500 words or less. Letters. Quote of the Week "Life is never fair, and perhaps a good thing for most of us that not." it is it is Oscar Wilde (Irish poet, novelist, dramatist and critic, 1854-1900) Copyrighted Matenal Syndicated Content Available from Commercial News Providers WL dxA-3 Millage vote will not be forgotten BY JERRY ROBINSON GUEST COLUMNIST along with many others, was at the final budget hearing of the BOCC. There were pleas from many residents in the county to reduce the millage rate from 7.9 percent to 6.5 percent, but these pleas fell on deaf ears, although, Ms. Bell did recommend a reduction to 7.0 percent. The final budget was adopted for in excess of $77 million dollars. Doing a little research I went back to the budget year of 2002-2003. That budget was $45,250,377. What is the difference from four years ago to this year that would constitute an increase of $32 million? At the hearing the hiring of another attorney, staff member and separate facilities were discussed. Ms. Bell made a motion to do away the legal department at the end of the contract period of the current county attorney and utilize special attorneys for a given situation on an hourly contract basis. This ,, motion failed. Later iKi . Parker made a ,notieo net4ohire another "':'' attorney and staff member. This motion also failed from lack of a second as did Ms. Bell's. No other commissioner would second-either of these motions. So it appears that not only are we going to have two attorneys, but an additional staff member along with separate facilities but also expense from outside attorneys that has more expertise in areas that the present county attorney does not have. The projected budget cost was $160,000 however rest assured that this number will, in all probability, double if not more. There has been something that has not been noted very much while the final budget was in the process of being finalized and that is health insurance for the county employees. It seems that AvMed and Blue Cross bid on the county's health insurance with very little differences in the coverage. The difference between the two was approximately $800,000 with Blue being the more expensive. Guess which one the BOCC approved-Blue of course. Not only did the BOCC approve the more expensive amount but agreed to provide approximately $60-$100 per employee to offset the increase for the family plan. I am not against the betterment of benefits for employees but with the BOCC accepting the higher of the two, it seems that the lower of the two would do more to offset the difference even giving the employees an additional $60- $100 to offset the family plan. I do not know how many of the approximate 350 county employees have the family plan but taking 50 percent of the employees, well you do the math. My question is why accept a plan that cost $800,000 more? Could the millage rate have been lowered had they accepted the lower bid? The sheriff requested approval to hire four additional deputies for the county correctional facility so that more prisoners could be housed. The numbers below are approximate but when the sheriff and I met to discuss this matter he stated that the numbers could have been a reality, if not more so. The Sumter County Sheriff was willing to sign a one year contract so that the correctional facility would house prisoners at the maximum. Other sheriffs had contacted our sheriff about housing prisoners as well. The BOCC turned the sheriff down and wanting to increase the pay of the deputies so that after certificaftioband sotile'Op P" w they vt^wbuo^ld n6't leave; lis'' depi~riit f. Mr. Yearty went fo to say the reason the deputies are here was their love for the county. Buit, in my opinion, dollars, especially with deputies and firemen, speak the loudest. After calculating the difference of the cost of housing the prisoners, adding the daily stiffen [sic] given for housing the prisoners and then deducting,the amount of the four additional officers, this would leave in excess of $1.1 million NET. Why would the BOCC walk away from a net of $1.1 million and not lower the village rate? There was also talk about having to put in a new communications system for the sheriff department. Mr. Stevens quoted $1 million but was corrected by Mr. Yearty with the correct price of $2.3 million. It is difficult to believe that this is going to be the cost for new towers, and possibly land for the towers, in house hardware and hardware that will have to be replaced in the field. Look for this number to double or possibly quadruple before all is said and done. But wait there is more. A few years ago a new communication system could have been put in for $1.3 million along with additional outside monetary assistance. But, the BOCC at that time said they didn't have the money to do that. But now, with a $77 million plus budget, they can. Funny how that happens, huh? Mr. Yearty stressed that additional See Robinson Page 11 Y COUNTY JOUR ll Photographer/Production Miriam Blitch Staff Wrters Cassie Joumigan Neal Fisher Sales Representatlve/Bronson Laura Catlow Typesetter Wilma Jean Asbell Miss Honey says ... S unday, Oct. 1, 2006. Hi, ya'll. I have had a very busy weekend, baking sweets for my fiends and customers. I still missed a few, so after tomorrow I guess I'll start again. I couldn't find my friend Mozie, so I sold her cake to someone else, I will bake her another one tomorrow or Tuesday and go searching for her again. I believe she told me she was staying with Johnnie Mae at night the last time I saw her. Nuff said, until later! Monday, 5:30 a.m. Good morning! Coffee is made. Want a cup? My boys are sleeping (little dogs). Little Bit is asleep in the baby's bed, Sweet Pea is on the back of my chair and MISS HONEY Misty is , beside me and Sugar Bugger is eating my toes, uh huh, is too. At least he is trying and his little teeth can hurt, but I love him so'much and they return that love every day! Uh huh, do too! Hush, Donald, they do too! Misty and Sweet Pea need a hair trim, so I guess I'll take them to the doggie salon. Shhh, they don't know they are dogs! I have a million and one things to do, but who says I must do them? No one. These little ones can't talk and couldn't care less, so I'm safe for now. It's now 8 a.m. and like a bad penny "I come back!" You though you were rid of a bad penny or Miss Honey! We always return, but would you really want to get rid of me? I didn't think so!! Sunday morning I started out the door and Sweet Pea and Misty ran out, there See Honey Page 11 Page 4 These are afew of myfavorite things ike many sports and music fans, I get excited before a big game or musical event. I i eagerly await the appearance of my favorite sports figures : or teams before a big game. I am a fan of musicians across the musical spectrum. A few actors- both R past and CASSIE IOURNIHiAl present- capture my imagination. And.; as a writer I have my favorite authors-those who propel me on, who stand like a measuring stick upon which I foolishly measure myself. But I reserve most of my fan-type adoration for other kinds of heroes-those men and women who fought for ' independence, who created a new country based on their own hopes and dreams as well as the ideals and principals of long-dead philosophers. I love our American experiment in all its unruly permutations. Which is why."q I so gladly responded to the .: idea of covering Sunday's ;, planned protest rally in ? Chiefland. The Chain of Life would be First Baptist , Church's demonstration i;. of two of my favorite civil ,' liberties-the freedom of ; q speech andhflid'feedom ofa": peaehbble assembly. No o ':- matter whether I held the same belief as those carrying posters. Freedom of speech : means airing different voices,; and opinions. Agreement is o not a prerequisite. I am glad we are still debating the ethics of abortion. While I believe a * woman's individual need should assume primary ') relevance in the question of , abortion rights, I am glad we debate when or if the soul animates the fetus, and whether it is morally right to allow abortion from that ) angle. I am glad that we uphold ' human life as sanctified, and that we consider other arenas I besides the scientific one in : our quest for answers. I am especially glad that as a people, we question existing laws and regulations. I am not glad when others:) use their freedom of speech , to lambaste those whose beliefs may be different. I * am not glad when certain others claim a moral high , ground, asserting a unique See Cassie Page 11 LEVY COUNTY JOURNAL LAW & COURTS THURSDAY, OCTOBER 5, 2006 More than a dozen arrested on cocaine charges The Levy County Sheriff's Office reports the following arrests: Javaris Green, 18, of Chiefland was arrested for possession of cocaine and possession of cocaine with intent to distribute .and possession of Ecstasy. Bail was set at $15,000 Kyle A. Perkins, 18, of Chiefland was arrested for possession of marijuana with intent to distribute, sale of cannabis and possession of cannabis with intent to distribute-all charges within a 1000 ft. of school. Bail was set for $20,000. : James Virgil Boatright, 42, of Chiefland was arrested for possession and purchase of crack cocaine, tampering with evidence and two charges of child neglect. Bail was set at $45,000. Aaron Flanders, 41, address unknown was arrested for sale and possession of crack cocaine. Bail was set at $15,000. William W. Duval, 23, of Chiefland was arrested for possession and purchase of cocaine also tampering with evidence. Bail was set at $17,500. Joseph Lee Richards, 43, of Chiefland was arrested for possession and purchase of crack cocaine and possession of drug paraphernalia. Bail was set at $17,500. Deborah K. Venable 48, of Ocala was arrested possession and purchase of crack cocaine and tampering with evidence. Bail was set at $12,500. Bonnie E. Spencer, 26, address not stated, was arrested on a Levy County warrant for violation of probation for, possession.,of controlled -ubsbtatice r and, giving falsenanme t64IEO." No bail was set. Jeffery Curtis Dockery, 46, of Chiefland was arrested for sale and possession of cocaine with intent to distribute. Bail was set at $15,000. Craig Leshard Joshua, 23, of Chiefland was arrested for four charges of sale and three charges of possession of crack cocaine and one charge of possession of cocaine. Bail was set at $100,000. Sunny Oats, of Williston was arrested on a Levy County warrant for violation of probation. No bail was set. Barbara Evans, 37, of Fanning Springs was arrested on an active Levy County warrant for larceny. Bail was set at $2,500. Kelly Lee Donaldson, 51, of Chiefland was arrested for possession and purchase of crack cocaine. Bail was set at S$7,500.. Martin John Schrader, 45, of Chiefland was arrested on for possession and purchase of cocaine. Bail was set at $15,000. Daniel Lee Evans, 21, of Maryville was arrested on a Levy County warrant for violation of probation for petit theft. He was released on his own recognizance. Charles Rowland Bray, 49, of unknown address was arrested on a Levy County warrant for failure to appear for aggravated battery. Bail was set $10,000. Troy Lee Pettingill, 44, of Old Town was arrested for possession and purchase of crack cocaine also tampering with evidence. Bail was set at $17,500 on the drug charges. Tommie Lee Hall, 38, of Tampa was arrested on a warrant for violation of probation for battery and four charges of sale and possession of crack cocaine. Bail was set 30,000. Belinda Chavez Barraza, 20, of Chiefland was for sale and possession of cocaine. Bail was set at $10,000. Reginald Adams Jr., 21, of unknown address was arrested for possession of marijuana less than 20 grams. No bail was stated. Larry Darnell Parhm, 50, Bronson, was arrested for two charges of retail theft. Bail was set at $3,000. Blake N. Fessenden, 23, of Bronson was arrested on an order of arrest from Sumpter County for leaving the scene of an accident. He was to serve 29 day in jail. Joseph C. Kasco, 25, of Cedar Key was arrested on a Levy County warrant for failure to appear for driving while license suspended or revoked; possession of firearm; ,by cnvictedfelon, possession of :cannabis less than 20 grams and paraphernalia. Bail was set at $7,500. Regina Mitzi Streitz, 29, of Williston was arrested for dealing in stolen property. Bail was set at $10,000. Meliss Ann Lipman, 36, of Indiantown was arrested on an Alachua County warrant for failure to appear for possession of controlled substance, cocaine and possession of cannabis less than 20 grams. Bail was set at $10,000. Joseph Graham, 53, of Williston was arrested on an active Levy County warrant for failure to appear for driving while license suspended or ,revoked knowingly. He was released on his own recognizance. Michelle Lee Hymer, 25, of Old Town was arrested on a Levy County warrant for violation of probation for the sale of alcohol to minor. No bail was set. Mary Ann Methvin, 38, of Old Town was arrested on a Levy County warrant for failure to appear for damage to property, criminal mischief over $200 dollars under $1,000 and battery/ touch or strike. Bail was set at $10,000. Christopher Mark Sherwood, 30, of Ft. Lauderdale was arrested on an active Levy County warrant- for violation of probation for flee and attempt to elude. No bail was set. Michael Dennis McDonald, 46, of Old Town was arrested on a ,Levy County warrant for violation of probation for purchase of cocaine and possession of narcotics with intent to sell. Bail was set at $10,000. Ebony Tenekka Young, 22, of Gainesville was arrested on two Alachua County warrants for violation of probation for no driver's license and theft. Bail was set at $3,000. Jamie Robert Backes, 22, of Bronson was arrested on a Levy County warrant for violation of probation for possession of cocaine. No bail was, set. David S. Frazier, 24, of Bronson was arrested on a Levy County warrant for cocaine sell schedule II and possession of cocaine. Bail was set at $25,000. Burgess L. Green, 27, of Ocala was arrested for driving while license suspended or revoked knowingly. Bail was set at $2,500. Kurtis Daniels, 21, of Bronson was arrested on a Levy County warrant for failure to appear for trespassing, criminal mischief. He was released on his own recognizance. Cosmo L. James, 20, of Gainesville was arrested for ,possession of marijuana less,- than 20 grams and possession of cocaine. Bail was set at $7,500. Tangala M. Dixon, 41, of Bronson was arrested for an order adjudication contempt of court. No bail was set. William C. Munk, 18, of Bronson was arrested on an active Levy County warrant for larceny theft more than $300 less than $5,000. Bail was set at $5,000. Aubrey A. Ourso, 28, of Williston was arrested for battery (domestic). Bail was set at $3,500. Barry Leon Clark, 48, of Williston was arrested for aggravated battery and burglary to structure while armed. Bail was set at $75,000. The Chiefland Police Department reports the following arrests: *Charles Ronald Anthony, 47, of Ocala was arrested for theft (retail). Rhoda Lee Evans, 30, of Ocala was arrested for grand theft. WANTED) IN LEVY COUNTY Deangelo Jerome James Kevin Harmon Jackson Date of biith: 3-13-77 Date of birth: #6-13-77 Last known Address: Last known Address: Williston Williston Wanted for: VOP DUI Wanted for: FTA Battery George H. Pierce Date of birth: 8-15-61 Last known Address: Chiefland Wanted for: VOP Possession of Methamphetamine Barry Brian Smith Date of birth: 12-10-80 Last known Address: Inglis Wanted for: FTA No Drivers License William Wesley Sims Date of birth: 4-4-84 Last known Address: Chiefland Wanted for: VOP Possession of Marijuana Jeremiah Anthony Tisdale Date of birth: 6-4-82 Last known Address: Bronson Wanted for: Burglary, Larceny Anyone knowing the whereabouts or having any information about the above individuals, please contact the Levy County Sheriffs Office at 486-5111, or to remain anonymous call Crime Stoppers at 1-877-349-8477. Timothy W. Rankin, 42, of Ocala was arrested for fraudulent returns. Melinda L. Rankin, 30, of Ocala was arrested for fraudulent returns. Robert Edwards Thomas Jr., 50, homeless was arrested for petit retail theft. Carrie Hyatt, 33, of Chiefland was arrested for obtaining goods without authorization and exploitation of an elderly person. Klayton Ezra Adams, 27, of Chieflaid was arrested for two charges of grand theft of $300 or more, two charges of fraudulent use of credit card, obtaining goods without authorization and exploitation of an elderly person. Henry S. Taylor, 21, of Crystal River was arrested for grand theft of $300 or more, possession of methamphetamine, burglary tools and stolen property. Ian Barrington Milloy, of Chiefland was arrested for resisting obstructing or opposing officer without violence. Kathleen Dawn Luce, 25, of Chiefland was arrested for possession of cocaine and drug paraphernalia. The, Williston Police Department reports the following arrests: Mandy Raye Ashley, 26, of Williston was arrested for driving while license suspended or revoked. Deonte Antione Dallas, 19, of Williston was arrested for possession of cocaine and possession of cocaine with intent to distribute. Lorenza Hayes Jr., 32, of Williston was arrested for failure to appear for a warrant issued out of Levy County. Terry Lee Mercer, 23, of Williston was arrested for driving while license suspended or revoked. Fire service continues for Yankeetown Correction: Yankeetown has never gone without fire services, as was erroneously reported in ast week's Levy County Journal. "I have responded to 44 calls since July 1, and 105 for the year overall. Several newspapers have made the same error, and residents 'have been calling to find out if we have fire department services," fire chief Paul Shearer stated. The fire. department was threatened with closure, according to an executive order from Gov. Jeb Bush's office last July 12. In declaring a state of emergency, the governor referred to several factors. Many of them were financial, according to executive order 10-163, including unpaid fuel bills. "The volunteer Town Fire Department will shortly have' no ability to operate because its fuel account is unpaid and subject to cancellation," the executive order stated. The bills have since been paid and the account is no longer subject to cancellation." The Journal deeply regrets the error and any confusion it may have caused. Sheriff's Corner This week I want to update you on recent events here at the Sheriff's Office. Your Investigations Division has been very busy. Recently your deputies were called to. the Yankeetown school for a missing person. When they arrived, they immediately realized that this situation was more serious than someone just being lost. Your' Ineftigations Division responded /e ^ N to assist the deputies and began working this incident ,as a homicide. Fortunately, this person was found quickly JOHNNY and was safely SMITH returned to his family. You may also be aware Of tIe' recent hriUci-ide *i' 0, Ztk crglu %j 4;vzA UZ U Trenton. Your investigators worked with the Gilchrist County Sheriff's Office and FDLE and were able to assist in recovering the murder .weapon as well as solving several other reported thefts in our area. In addition, investigators in the Williston area were able to solve several burglaries at the middle school. Investigators See Shef Page 10' UnO' '. <\J~J3\1)>-n led Page 5 Will They Do it Again? The Federal Reserve has raised rates seventeen i times straight starting June, 2004. Another good reason to invest short term IJ SAPY* (Seven Month CD) Drummond Community Bank Cedar Key Chiefland Cross City Old Town Trenton Annual percentage yield (APY) is accurate as of 9/18/06. Penalty may be imposed for early withdrawal. The minimum balance to open the account is $5,000. This offer may be withdrawn at any time. Member FDIC III Page 6 LEVY COUNTY JOURNAL News Briefs, Band festival scheduled. Learn to quilt Paddle on a manatee watch In preparation for the upcoming manatee season, Manatee Springs State Park will hold an Interpretive training session for potential participants in the park's "paddle patrol." The trip length is usually about one to one and 1 1/2 hours. Individuals wishing to become involved with the park's paddling program are invited to attend one of three scheduled orientation and interpretive workshops. The workshops are scheduled for Friday, Oct. 20; Friday, Nov. 10 or Saturday Nov. 11 at Manatee Springs State Park. Workshops begin at 1 p.m. and will last about two hours. Refreshments will be served by the park's Citizen Supp6rt. Chiefland native plays bluegrass Oct. 6-7 Lonesome River Band, a nationally known bluegrass band, will play at a bluegrass weekend in Perry this Friday and Saturday, Oct. 6 and 7. The band features former Chiefland resident Shannon Slaughter on acoustic guitar. The bluegrass weekend will be held at Forest Park on Highway 19. It is a benefit-f frEruieThacker, a musician who suffered an, automobile accident several weeks ago...~ Slaughter is the son of Jennie Lou and Billie Ray Sharp. He graduated from Chiefland High. 11 9a.m.-2 p.m. Health Fair and Chili Cook-off 2-4 p.m. Wednesday, Oct. 18. I a.m.- Noon & 2 p.m.-6 p.m. Major Medical Tuesday 8 a.m.-12:30 p.m. SMedicare/Medicaid Thursday Personal Injury/Auto Accidents a.m.- Noon & 2p.m.p.m. SWorkers' Compensation ~ Walk-Ins Welcome ~ 493-1540 I Lm 2220 N. Young Blvd., Chiefland (Across from Wal-Mart Super Center) N-> [ u suI s AROUND LEVY COUNTY THURSDAY, OCTOBER 5, 2006 Levy Ambassadors Tour Hall of Hope As a testament to the spirit, cour- age and strength of millions of Americans touched by cancer, the American Cancer Society unveiled Sa national monument to cancer pa- tients, survivors and loved ones "the Wall of Hope" that resided temporarily on the National Mall in Washington, D.C. during the Soci- ety's Celebration on the Hill event Sept. 19 20. "The Wall of Hope will allow those touched by cancer to voice their desires that Congress and the White House make cancer a bud- get priority," said Debbie Sheppard and Gail Osteen, COH Ambassa- dors, "By memorializing those who have succumbed to cancer and cel- ebrating those who have beaten the disease, we hope to personalize the nationwide war on cancer and the .. policy solutions that will help win it." Celebration on the Hill Ambassadors met with Congresswoman Gin- For more information anytime, ny Brown-Waite. Pictured, from left, the Levy County Ambassadors: call toll free 1-800-ACS-2345 or Gail Osteen, C6ngresswoman Ginny Brown-Waite and Debbie Shep- visit pard. Learn to climb your family tree The Levy County Genealogy and History Society will host a free workshop on Saturday, Oct. 28, from 9:30 a.m. to 3:30 p.m. at the Levy County Quilt Museum, located east of Chiefland on 27A. Watch for the Quilt Museum signs at Levyville and turn onto NW 10th Street. This will be a workshop designed to give the begin- ner the necessary tools to begin research, where to find informa- tion and how to organize find- ings. There will be two sessions in the morning "How to Start" and "Brickwalls and How to Get Around Them.?!' After lunch there , will be two more sessions on - "How to Prepare for Research Trips" and "Organizing Your Findings." The workshop is free, but a lunch of soup, salad, sand- wich and .drink will be provided for $5. Reservations are required due to limited seating. You may make reservations by sending your check for $5 per person for lundh to the Levy County Genealogy and His- tory Society, P.O. Box 1025, Chiefland, FL 32644. For more information call 352-493-4849 or email Dix at dixl034@yahoo.com. ' lig John's SupplY Plumbing, Well, Irrigation, a Watersoftners, Iron Filters, 4 Pool Supplies mfrm(524965 wl" 1,4,-91tot)r~WBT;) 4 ~5lL~1tUIEE~ J .M~uI8A~eri'. 'C~T0P C~ --.~ J-: Im~? . Louis Sullivan named SSA district manager Atlanta Regional Commissioner Paul Barnes announced the appointment of Louis B. Sullivan as District Manager of the Gainesville Social Security Office. Sullivan comes to the Gainesville Office with more than 25 years of experience with the Social Security Administration. He began his career with Social Security as a co-op stu- dent in Vicksburg, Miss. He has held increasingly respon- sible positions with the agency, most recently as the Assistant District Manager of the Gainesville Social Security Office. Sullivan said he is looking forward to serving the counties in the Gainesville District. The Gainesville District Office serves the counties ofAla- chua, Bradford, Dixie, Gilchris, and Levy where 62,257 ben- eficiaries receive more than $52 million each month in Social Security and Supplemental Security Income (SSI) benefits. The Gainesville Social Security Office is located at 1610 NW 23rd Avenue in Gainesville. M- l- I l 3 Otes Ue MrTwt 1 Brickfrnvrtin paer n; vdi$ 'A A 24 N Main St - LEVY COUNTY JOURNAL John F. Beach Jr. John Franklin Beach Jr., 87, of Gainesville died Monday, Sept. 25, 2006. Mr. Beach was born in Trenton. He was retired from USDA Soil Conservation and was a member of West Gainesville Church of Christ. He was also a preacher and preached in Umatilla, Green Cove Springs, Dade City, Fort Meade, Cler- mont, Melrose and Center Hill. He is survived by his wife, Maude Beach of Gainesville; son, Max Louis Beach of Hawthorne; daughters, Marilda Arnn AROUND LEVY COUNTY Smith of Greenbrier, Tenn. and Velma Thomasina England of Gaston, S.C.; brothers, Forest L. and Douglas K. Beach of Trenton; sisters, Patricia Anderson of Cross City and Edna Peterson of High Springs; nine grandchildren and five great- grandchildren. Williams-Thomas Funeral Home Westarea was in charge of arrangements. Dylan Lee Fulton Dylan Lee Fulton, infant, died Sept. 26, 2006 at Shands Teaching Hospital in Gainesville. He is survived by his mother and father, Nichole Fulton and Matthew King, a brother Trevor King, maternal grandmother, Pam Fulton of Homosassa, paternal grandparents, Carl and Trish King of Bronson, great- grandmothers, Sarah Siner of Homosassa, Miriam Biehl of Floral City, Barbara Hobby of Inverness and many aunts, uncles and cousins. THURSDAY, OCTOBER 5, 2006 Page 7 Arthur Reeves Arthur G. Reeves, 85, of Trenton/High Springs died Satur- day, Sept. 23 at his residence. He was a native of Risley, N.J. and a glass blower by trade. An 18-year resident coming to this area from Winter Ha- ven, Fla., he was a member of the First United Methodist Church High Springs, The High Springs Lodge #137 Free and Accepted Masons, Morocco Shrine Temple, Valley of Ocala Scottish Rite, Gainesville Shrine Club, VFW At-Large and Santa Fe Chapter #105 order of the Eastern Star of High Springs. Survivors include his wife of 60 years, Dorothy Reeves, High Springs/Trenton; a son Arthur Reeves Jr., High Springs/ Trenton; three daughters, Pamela L. Papas, Glen Cove, N.Y., Carolyn Mastro, Vineland, N.J., Joyce C. Messer, Belmont, Mass.; eight grandchildren and 13 great-grandchildren. Evans-Carter Funeral Home, High Springs, was in charge of arrangements. Reflecting on the miracle of life and labor of love Y ou sure it's not that Braxton Hicks fellow knocking again?" I moaned. Naturally I was as excited as any guy about the birth of his first child, but hey, we'd already had one false alarm and I'd just gotten to sleep here. "No, I think this is really it, honey," Angie replied. I swung my feet to the floor, rubbing my eyes with both fists. By the time they adjusted, my wife was waddling off to the car like she could do the whole thing without me. I wanted to get mad, but she was just too cute with that big watermelon belly. We didn't get checked into a room at the hospital until late. Even then I could scarcely get a wink of sleep with all the poking they were doing on Angie. It was really annoying. I was trying to be supportive and all but it was clearly unfair how she got the soft bed while I got stuck in the stiff old arm chair. Angie just looked at me crazy when I suggested we BUT ANYWAY Guy E. Sheffield take turns. The baby was obviously not going to be cooperative either. Little Kailey, as we had dubbed her, was in no hurry to leave the nest. The whole next day we played hurry up and wait. Angie was dilating slower than a bowlegged turtle on Xanax, and I was miserable. Every time I would just about nod off that dumb machine would start beeping indicating she was having another contraction. I wanted to get mad, but Angie just looked so cute lying there in pain. By late evening the whole thing had begun to resemble some weird sort of hostage negotiation. This little Kailey girl had apparently barricaded herself in and seemed willing to wait us out. I called to her, tried to reason, but she didn't seem to care how sleepy I was. In desperation the nurses set up a perimeter and the doc snuck in to break Angie's water. This covert operation was pulled off with such surgical precision I began to wonder why these doctors say they're just practicing medicine. Offering a Complete Line of Supplies for your Mobile Home Repair or Remodeling New and Surplus *Trim Plumbing Roofing -Vinyl Supplies Monday- Thursday, *Doors -Electrical l 7:30 am. to 5:30 p.m. Skirting -Aluminum Supplies *0 Fri 7:30 to 5:00 *Power Poles *Set-UP Supplies Sat. 8:00 to 1:00 *Windows -Liquid Pool Chlorine -, 14237 N.W. U.S. IScreen Made (352) 490-9900 Hwy. 19 Chiefland 1 00* 00M 0 0_0 OWM- ji LEVY COUNTY HISTORY 62 Years Ago Minute Book "Q" 1943-1950 -p. 131 At a regular meeting of the Board of County Commissioners in and for Levy County at the Court House in Bronson, in the Commissioners' Room on this the 2nd day of October, A. D. 1945, the following members were present: J. E. Hogan, Chairman, W. S. Yearty, Randolph Hodges, M. E. Hiers, J. G. Newsom. After reading the minutes of the last regular and special meetings Commissioners W. S. Yearty, J. G. Newsom and J. E. Hogan requested that the following explanation be placed in the minutes: At the last regular meeting of the Board, the question of establishing an office for furnishing information to the returning war veterans was brought up. Under the law, the County Commissioners could levy as much as one half mill for the purpose of raising money to pay the salary of someone to give to the veterans the information they might need. At the time, this matter was discussed by the Board, the Budget had already been published and we did not feel that the tax payers should be burdened with an extra one half mill levy that they did not know anything about. Under the law, (Chapter 23017) laws of 1945, the Board was and is authorized to use any other funds that are available and inappropriate. In view of the work being done by the local draft board and the Red Cross in making this information available to veterans, we felt that the matter of establishing such an office premature and feel that when the next budget is made up and advertised, there will be an item included therein that will take care of this matter. For these reasons, we voted not to tax the tax payers an additional one half mill without their knowledge. From the Archives and History Center Levy County Clerk's Office Danny J. Shipp, Clerk of Court Danny J. Ship, Clerk of Court Now Has a Service Van Available To Handle Your Plumbing Needs and Make House Calls. -- President a& Am eilevcWr&N LeOy & Glchrlst CO. (352) 493-3801 DIxIO CO. (352) 498-0703 (352) 210-002 Licensed*Insured*Free Estimates Accepting major credit cards Walter Freeman State Certified Master Plumber #CF057595 This quickened things but the standoff continued throughout the night. Finally around 4 a.m., after much negotiation, the nurses announced that Kailey was threatening to come out. They promised after a big push or two we should all be able to get some sleep. (Of course I was to find out See Guy Page 18 iI s n A g e nc. 'Si 43 Low Rates Easy Terms Personal & Commercial Auto Insurance Home Life* Commercial Rapid Tax Returns "Guaranteed Lowest Down Payment" Tides for Cedar Key starting with Oct 5 Day High Tide Height Sunrise Moon Time % Moon /Low Time Feet Sunset Visible Th 5 High 1:14AM 3.6 7:28 AM Set 5:37AM 92 5 Low 7:10AM 0.6 7:13PM Rise 6:22PM 5 High 1:13 PM 4.3 5 Low 7:44 PM 0.2 F 6 High 1:41AM 3.8 7:28AM Set 6:46AM 97 6 Low 7:56AM 0.1 7:12PM Rise 6:56PM 6 High 2:05 PM 4.3 6 Low 8:21 PM 0.5 Sa 7 High 2:09AM 4.0 7:29 AM Set 7:55 AM 99 7 Low 8:40AM -0.3 7:11PM Rise 7:32PM 7 High 2:56 PM 4.2 7 Low 8:57 PM 0.8 Su 8' High 2:38 AM 4.2 7:29AM Set' 9:06AM" ..-99 8 Low 9:24AM -0.6 7:10 PM Rise 8:11PM 8 High 'r 3:5W: !-4:0 8 Low 9:31 PM 1.1 M 9 High 3:08AM 4.3 7:30AM Set 10:17AM 95 9 Low 10:09AM -0.6 7:09PM Rise 8:55 PM 9 High 4:34 PM 3.6 9 Low 10:04 PM 1.5 T 10 High 3:40 AM 4.3 7:30AM Set 11:28 AM 89 10 Low 10:55 AM -0.5 7:08 PM Rise 9:45 PM 10 High 5:25 PM 3.3 10 Low 10:37 PM 1.7 W 11 High 4:15 AM 4.2 7:31 AM Set 12:35 PM 80 11 Low 11:44AM -0.2 7:07PM Rise 10:40PM 11 High 6:21 PM 2.9 11 Low 11:12 PM 1.9 Thomas F. Philman, Certified Operator PO Box 872 4 South Main Chiefland, FL 32644 JPhone: (352) 493-4772' i"OMl (352) 493-1051 6i1F 1"m 1-800-242-9224 Central Florida Electric Cooperative, Inc. Central Floridi Annual Meeting Elctic Co operire, October 7, 2006 AT.hzgncEzb^r'QxCeranv_ Free door prizes and soft drinks, entertainment by Gary Claxton and drawings for cash and gift prizes will highlight Central Florida Electric Cooperative's Annual Meeting. The meeting will be held at the Cooperative's Operation Center located at 11350 NW 2006 ANNUAL MEETING A Partial List of Prizes are Shown Below: Quilt ......................................... Log Cabin Quilters Three 3-Night Getaways .................................................. Florida Media, Inc. $100.00 Saving Bond ............................................................................................. Drummond Community Bank 30" JVC Widescreen Color TV ... ..................................... Altec Industries, Inc. DVD Player ................................................................................ Langdale Forest Products Co. (2) $100.00 Saving Bonds ............................................................................................................. .................. Purvis, G ray & Com pany U m brella & B ags ...................................................... .....................................................................Perkins State B ank Rigid Professional 3/8" VSR Drill ................ .................... Original Calibrated Recloser Service (2) Car Replicas ............................. .......................... ... .. ......... Carquest Auto Parts G am e Set ........................ .... ...... ....... ................................................... O office M ax M r. Coffee ................................................ ....................................... M...., M cLean Engineering 4-Slice Toaster Oven ..................................... ........... Southeastern Testing Laboratory, Inc. $25.00 W al-M art Gift Card ......................................... ....................... ................ Kimball M idwest Igloo C ooler ......................................................... ..... .... ......... ..................................................... H ilm an Supply C om pany, Inc. (2) Lube Oil & Filter Gift Certificates ...................................... ..................... Scoggins Chev./Olds. (2) $50.00 Cash Prizes & (4) $25.00 Cash Prizes ............................ .............. Damron's Refrigeration Service D V D & V C R C om bo ......................................................... .. ......... ......... ................... ..................................................... G R E SC O Plant .................................................................. ................................... ...... ................................................. H ardeeTow n N nursery $50.00 Wal-Mart Gift Card ................................ ......... ........... .... S & C Electric Company (2) $50.00 Saving B onds ........................................ .......... ......... ..................................................................... C capital C ity B ank M microwave Oven & (2) Calculators ......................... ........................... ........................................................... Hughes Supply, Inc. Coffee Maker, Kitchen kettle & Toast-it-All .............................. .... ...... ..... .................................. Musgrove Construction, Inc. 5 Gallon Igloo Water Cooler, Caps & T-shirts ...................... ....... ..................... Construction Tire & Maintenance Ceiling Fan, Can Opener,Power Strip, Toaster .......................... ..................................................L............ Lawson Products, Inc One-Touch Chopper, Utility heater, Hand Mixer ....................................................................................... ... Lawson Products, Inc. Slow Cooker, Coffeemaker, Grilling M machine ............................................. ..... ........................................... Lawson Products, Inc. (2) Voyager Cargo Duffel Bags ........................................................................................... ........... Jacksonville Specialty Advertising (2) Gift Certificates for Windshirts ................................................. ..... .......................... Riverside Manufacturing Company 6- $100 Cash Prizes ..................................................................................................... Central Florida Electric Cooperative, Inc. 16- $50.00 Cash Prizes ............................ .... ..................... ....................................... Central Florida Electric Cooperative, Inc. 100 $25.00 Cash Prizes .............................:.................................................. ................ Central Florida Electric Cooperative, Inc. Page LEVY COUNTY JOURNAL SPORTS & RECREATION Red Devils ignite in second quarter THURSDAY, OCTOBER 5,2006 BY NEAL FISHER SPORTS WRITER For the third consecutive week the Williston Red Dev- ils exploded with a 21 point second quarter barrage. This time though, they were able to ride the outburst and hold off a late game rally to score a 35-34 victory over the Walton Braves. The difference between the result of this game and last week's out- come was the Red Devils made enough plays in the waning minutes to hold off their opponent's charge. In beating the Braves for the second consecutive year, Wil- liston upped their record to 4- 2 for the season and head into the meat of their season, three consecutive district contests, on a winning note and with momentum. "They jumped out to a quick lead and I don't know why we seemed to get off to a slow start," head coach Jamie Baker said. "We have a very good defense and we started moving the ball well. But we still had several three and outs, so we moved it well enough to win and do the things we had to, but we didn't move it as well as we would have liked to and thought we could have. "All in all we scored four touchdowns on offense so. we did pretty well. But we would not have. Won with- out the defense's play. They were a big part of us getting back into the game in the second quarter, because they were directly responsible for one score and had a part in the other two." Not only, for the third con- secutive week, did this game include a second quarter eruption, which positioned the Red Devils for a victory after a slow start, it could also boast of a highlight reel of big plays on both offense and defense. In fact, oddly enough, like last week, the unusual introduction of two fumble recoveries in the end zone was a huge part of this * Walton cut the deficit to less than a field goal only to see Williston respond by extend- ing its lead to more than a touchdown each time. Wal- ton scored during this period Williston 0 21 7 7 35 Walton 13 0 14 7 34 contest's, disposition. The Red Devils put them- selves in the position to win with three consecutive scores in the second quarter. It was keyed by Corey Days' inter- ception return for a touch- down. The other touchdowns came on short rushing.plays following fairly long drives. With Williston finding the end zone three times in the period, the Red Devils held a 21-13 lead at the half. "If the defense hadn't scored we would not have won, Baker "said. "They played as we expected and did what we needed them to do. When the defense scored, the offense began to it gain some control of the game." After the second quarter run put the Red Devils ahead, the teams exchanged touch- downs on two occasions in the second half before the Braves' Terrell Bramlet found Alex Smith in the end zone for a 38-yard touch- down strike with 5:10 left. It brought the Braves to within one point at 35-34. Following the, touchdown, which cut the deficit to one point, Williston was forced to punt on their ensuing pos- session. However, the Red Devils intercepted Bramlet and then earned a first down. With the first down, the Red Devils ran out the clock. On the exchange of scores, on a one-yard touchdown run by Bramlet and Smith haul- ing in the'first of his three touchdowns on a 64-yard touchdown pass. Williston found the end zone during this period when Timmons and Jiwan James connected one more time in the end zone after the defense recovered a fumble as well as Timmons scamper around the right tackle for a three-yard run. Heading into the stretch drive of their schedule, which includes three consecutive district games starting this week, the door for a district title was opened a little bit more with North Marion's loss to Dunnellon. The game completed the part of Williston's schedule, which prepared the. team for district play. Baker feels the team is ready, seeing what he describes as the gambit of offenses and styles, but will remind his team that it needs to play every contest with the same intensity and as if it was their toughest game of the season. , "The defense didn't' shiut the down, but they came up with several big plays and did what they had to finish off the win. Now it is time to really buckle down and make sure we are ready to play the dis- trict games," Baker said. -, a::m a Summa r -. Wiliton'0 21 T- 7 35 :Diie Cu ty. 13 0 14 7 34 ,... First .-.. Walto- .,Brap nlt to Sith 38-yad.touchdopwn pass Walton- ibsonr fumble recovery 63-yard touchdown return $Scond .. WVilliston- Days' ouchdokrm'rur (kick good).:. Williston- Corn Days interception toucfidown return (kick good) Williston- Evans' touchdown run (kick;good) . Third Walton. Brirhiet one-yar d b tbuchbW tn (kick good). Wilistdo- iTrriions to JoTs totouhtldwn:jass(kick good) Walton- fBirrdlet to Smith 64-yard'touchdown pass (kick good) . F' u rt h '-, ., .. _ Williston- Tirrmmons three-yard touchdoWn run (kick good) , Walton- Bramlet to Shnith 15- yard touchdown pass (kick good) Statistics: Williston Total yards: 310,' Rushing: 46-249,.Paing: 4-10-61 , Individual Rushing Wlllston: Days 21-98-1,,,Evans .14-70-1. Wlite.7-62, Timmons 9-22-1 Passing Wlllston- Timmons 4-10-61-1-1Recelving Williston: Jame'3-62 -1, Browff 1-9 . The Week Ahead WILLISTON HIGH SCHOOL Varsity Football Friday 10/13 @ Santa Fe Volleyball Tuesday 10/10 @ Interlachen Thursday 10/12 @ Bronson Boys Golf Thursday 10/5 Union County/Chiefland @ Quail Heights GCC Monday-Tuesday 10/9-10 Districts Girls Golf Monday-Tuesday 10/9-10 Districts BRONSON HIGH SCHOOL Varsity Football Friday 10/6 @ Jefferson County Friday 10/13 Lafayette County Friday 10/20 @ Trenton Friday 10/27 Hawthorne Middle School Football Thursday 10/5 Oak Hall Thursday 10/12 @ Trenton Middle School Volleyball 10/5 @ Trenton 10/9 Yankeetown Varsity/JV Volleyball 10/5 @ Trenton 10/12 Williston 10/16-19 Districts CHIEFLAND HIGH SCHOOL Varsity Football Friday 10/6 Crescent City Friday 10/13 @ P.K. Yonge Friday 10/20 Newberry Friday 10/27 @ Yulee Friday 11/3 Trenton Volleyball (JV/Varsity) Tuesday 10/10 Crystal River Thursday 10/12 @Trenton Tuesday/Thursday 10/17,19 Districts Cross Country Tuesday 10/10 @ Cedar Key Wednesday 10/18 County Meet @ Williston Boys Golf Thursday 10/5 @ Union County (Quail Heights) Monday/Tuesday 10/9-10 Districts Is Terrell Owens worth his hype? o, let me see if I' got this straight. Last Tuesday reports broke that Terrell Owens was being rushed to the hospital. The next morning I turned on my radio in search of more details. I listen to Mike and Mike in the morning and to my surprise there was no discussion of the breaking news that seemed so urgent and surprising the night before. Finally on ESPN's 20- minute Spprtscenter update it was reported Owens simply had an adverse reaction to the combination of the painkillers he had been taking due to his injured hand and the supplements most athletes take. So, I went to my first meeting that day thinking it was for once, simply a case of because Owens is Owens it was the epicenter of the sports world. It wasn't anything unusual and that would be the end of it. After I left my first meeting I turned on the Colin Cowherd show and more reports broke that Owens had some responsibility for the outcome of his actions. To make matters worse, for some inexplicable reason the media was asking and looking for information about an attention starved athlete's possible venture, :-'r into the realm of why can't this guy get it. Then the circus continued when the media's attempt to do its job became part of the story. Gee whiz, who would have thought the story within minutes would have grown legs, became the only story in sports that mattered and even find its ways into the headlines of hard news? In fact anybody who is anybody in the world of sports journalism was asked to come on any show that is any show to express their feelings and what they thought really happened. Then finally at about 3:30 that afternoon, Owens himself held a press conference, explaining reports of an attempted suicide was a misunderstanding. He was in a lot of pain and took more pills than he should have. They mixed with the workout supplements he takes and he became groggy. I did not see the press conference, but from what I heard on, the radio and how those who saw it explained it, Owens actually seemed to be a little embarrassed and sheepish by the events of the last 16 hours. What? Owens showed humility and traits of modesty. But I digress back to the circus that comes with Owens. As the minutes and hours wore on following the 100 and some odd chapter of what has become the odyssey known as "the world according to Terrell Owens," it was same old, same old. When news involves Terrell Owens, it is not the news and the ramifications that we focus on. When it comes to Terrell Owens, the focus is always on the fact that our astonishment at what he did or said stuns us so easily. Just when we thought it was safe to find another. athlete to put the spotlight on, the fact that this would only happen to the embattled wide receiver takes another one of its kind twists. The ease with which it shocks us, because we are waiting to see what could possibly top the exceptional storyline of his last adventure, becomes tabloid like fodder for everyone, not legitimate news, whether it be sports or hard news. When this opinion piece is published, it will have been 10 days since the incident was first reported. But rest assured, whether vxe buy the player's explanation or not or we feel sympathetic to him or not, it will not be forgotten and it will remain a part of the Owens' saga. When the Cowboys play the Eagles this Sunday, it will be but the first in what will be a long line of the incident being brought up again and again. It is no secret among sports fans that Santa Claus was once booed at Veterans' Stadium. So expect the incident to fuel an open invitation for boos, personal critiques of Owens' family and the fans' opinions of the franchise's once favorite malcontent. Of course, if we regular folks always formed our opinions and the news reported its stories through the lens of Philly fans, our mindsets would always be exaggerated, but when Owens has another one of his denunciations, complaints, dramas or dissertations of what has gone wrong in the tale of the "world according to Terrell Owens," it will be hard to look at this recently created chapter in the story of his life as a separate issue having nothing to do with whatever the present controversy may be. It has been well documented that Bill Parcels is a no nonsense kind of guy. He comes from a coaching tree that could be described as old school. A strong running game coupled with a pin your ears back, intimidate the offense and make the opposition pay for every yard they gain defense is how you win championships and stay at the top of the heap. Add in a we will not put ourselves in situations where we beat ourselves and the result is a hall of fame coach who has led three teams to the Super Bowl, winning two of then. While Parcels understandably played stupid, it is hard to believe he didn't know everything that was going on to the last detail. Jerry Jones shelled out a sum of money that makes the most accomplished of athletes like Jeff Gordon, Tiger Woods and Michael Jordon's salaries look like chump change. With that kind of money being thrown around, the penchant our society has for making sure everyone can remain in communication with each other with the touch of a button and the wide receiver's history, the Cowboys franchise would be below bush league if they didn't have their eye on Owens comings and goings before the incident, let alone after it. And does anybody think after Owens exits in both San Francisco and Philadelphia that Parcels isn't steaming inside when considering by the time this article is published he will have dealt with three more chapters in the ever-expanding saga of "the world according to Terrell Owens" ? The Cowboys-Terrell Owens relationship might be quiet for the near future, but sooner or later something will happen that displeases one of the parties and it will be the same old, same old. I have heard many opinions on the issue of who needs whom more. I find it hard to believe that a coach who has won three conference titles, two Super Bowls. and is a future hall of famer or a franchise that has won five championships, played in the "Ice Bowl" and even during a down period is among the top five franchises in merchandising revenue, needs a wide receiver who has the rap sheet of destroying two teams and many feel it is only a matter of time before it is three. Yes, Owens did have a role in the Eagles reaching the Super Bowl two years ago, but at what cost. The Eagles finished 6-10 last year and their main operation became finding a way to get rid of Owens, not defending their conference championship. Owens is perhaps the most physically gifted athlete of this generation and he does play hard. Unfortunately the circus his view of the world has created in his life and his place in it reminds me of the saying you reap what you sow, both for the man himself and those involved with him. The three teams Owens has played for might have needed him to win, but when the lights are turned off and everyone rides off into the sunset, do we think it will be Parcels, Jones, Donavon McNabb, Andy Reid, Jeff Garcia, Steve Mariucci, anyone he has problems with or Owens himself, who will appear in the news for doing something illegal or causing some kind of commotion above and beyond the normal? Colin Cowherd once said we make friends with those who have similar views. With Owens being such an aberration in that department and Dallas being a franchise built on conservatism and tradition is it any wonder the franchise has been overrun with the saga that is Terrell Owens in only two months? And when will we learn with Owens it is always the same old same old? Neal Fisher is the sportswriter for the Levy County Journal. He may be reached at jcpirahna@yahoo.com FA Sports a I NEAL FISHER R | LEVY COUNTY JOURNAL LEVY COUNTY JOURNAL SPORTS & RECREATION THURSDAY, OCTOBER 5, 2006 SIndians bested by Ocala Trinity WILLISTON RED DEVILS Excited about remainder of season BY NEAL FISHER SPORTS WRITER As the 2006 football season heads down its home stretch, the Red Devils are primed to make a name for themselves and eradicate the sting of last season's poor start. "We are excited about the rest of the season, head coach Jamie Baker said. "We have had some good wins this year. They are stepping-stones and have helped our confidence. We aren't doing anything new at this point, but we feel we match up with anybody. We get more and more comfortable with what we do every week." Of course the ultimate goal for every high school team is to capture their district championship. After earning a playoff berth by virtue of claiming the runner upspot last season, the Red Devils came into this season with the hunger to take the next step that comes with the taste of a playoff experience. Winning the first two games of the season by a combined score of 80-7, the Red Devils started the season primed to prove they were not going to let another slow start force them to dig out of a hole. And they have built on that start. Compiling a 4-2 overall record as the Red Devils approach | the eve of three consecutive district ames. After last year's .loss to Runnellon, they needed help to finish second inthe district. This year they'd yj ae tns'9napo witka~4fJ14 yj.try,o ver the Tigers and took another step in developing a championship team by learning how to beat a title contender. Passing the first of its four hurdles in their quest for the district championship, the Red Devils sent a statement to the rest of the district and made a match up between two undefeated teams in district play between themselves and North Marion on Oct. 27 a possibility. However, those aspirations were further boosted last week when Dunnellon defeated the defending district champions, leaving the Red Devils as the only undefeated eamn in district play. A win in two weeks against Santa Fe would give them clear command of the district race. "The luxury of being the only undefeated team in the district puts a new light on the playoffs," Baker said. "It is nice to be in that position, but we still have to get ready for the next two games (against Santa Fe and North Port) as if they were the toughest teams we will play this season or as if they were the Steelers. We have to play with the same intensity and take them as seriously as we did Ocala Trinity or Dixie County or any of the teams we have beaten." "I think the kids understand that and they play tough and that is what we need to win the district. We learned a lot playing the first six games this season, but now it is time to buckle down and get down to business. The kids are more experienced than a year ago, but they still have to be ready to play and be prepared foro whatever we see in district play." Even with the Red Devils' 4-1 finish during last year's regular season and a second round appearance in the playoffs, tpe coaching staff still saw the need to consider what they could do to avoid a poor start and further strengthen the team's performance. With that in mind three major events happened during the off-season. The offense was changed from a basic I to the spread option they now use. It utilizes their speeds and ability to gain angles better as well as uses the Red Devils physical stature to create mismatches on the offensive line. Most of the seniors who now start on defense were switched to that side of the ball from the offense and Baker's father, Alan, was brought onboard as an assistant. Alan coached at Osceola and St. Cloud high schools for a combined for over 25 years. He recently retired, but when the Red Devils asked him to come back to the sidelines he couldn't say no. The coach was a natural fit with the program, because he brings an intensity See Williston Page 10 Leslie Sapp ,Construction, Inc. 352-463-7589 7239 S.W. 80'h Avenue Trenton, Florida 32693 tlsapp@acceleration.net CR-C058431 BY NEAL FISHER SPORTS WRITER Considering Ocala Trinity Catholic has beaten their opponents by an average of 50.6 points and that figure becomes 57.2 when throwing out an 18- point victory over C Williston, it would T have required a perfect game and then some for Chiefland to hold the visitors close enough to make the final score of their contest a close score. Instead, the game followed the script most had envisioned as the Celtics rolled to a 65-0 victory over the Indians. The Indians played hard and kept their focus throughout the game, but the defending class 2B champions and undefeated Celtics simply outmatched, outmanned and overwhelmed Chiefland in every aspect of the game. The Celtics struck .quickly and with certainty in the second quarter. In one fell swoop of 15 minutes, they took command of the game and left no doubt that they not only were the better team, but one of the best in the state. The deluge of 41 points in the second quarter sealed the Indians' fate as in the blink of an eye they were looking at a 44-0 deficit "We just basically ran out of man power," Defensive Coordinator Mark Lundy said. "They can substitute freely and we can't. We did a good job of holding them to only three points in the first quarter. I don't think they have been held to three points very often in a quarter. SRWMD will meet Tuesday On Tuesday, Oct. 10 board meeting. All meetings, workshops and hearings are open to the public. There isn't much to say after the loss, but we did find some positives and we are very proud the guys for hanging in there." The only part of the game that did not live up to its expected plot was the first period. The Indians held the Celtics to a lone field goal. It was the result of a long ball control time-consuming drive on their first possession of the game, but it forecasted the future of the game. It gave the all important field possession advantage to Trinity. The drive swung the advantage to the side of the visitors and for the most part, the game was played on the Indians' half of the field as several of the visitor's scores came on drives of less than 50 yards and the Indians are still struggling with fumbles. While Chiefland's struggle was further complicated by having to move the ball long distances just to force Trinity to take over possession of the ball inside their own 35 yard line. The second quarter scoring and any opportunity for the Indians to climb back into the game came to an end when the home team was forced to punt from its own end zone late in the period. Antonio Allen caught the ball at the home team's 25-yard line and returned it to the. end zone. Trinity's John Brantley ,zipped an eight-yard touchdown pass to Johnny Lawroski in the third quarter. Allen followed the touchdown pass with a five-yard run late in the period and then closed out the scoring with a three- yard jaunt in the fourth. "The defense is definitely the stronger part of our team and they played well, considering the caliber of a team we played." Lundy said. "The last few scores were simply a case of us being worn down, because we don't have the manpower or quality to match up with Trinity. They are definitely a very good team with the ability to explode and they proved it. One positive thing we do take from the game is we have a group of guys who will stick with the program and finish out the season. We also did see some running ability by Zach Tyson and good pass coverage from Travis Donald. They are difficult team to begin with and fumbling as many times as we have certainly is not going to give us chance to win." Chiefland steps out of district play next week against Crescent City. The game will cap off homecoming week as the visitors come to town with a 2-3 record. Chieflpnd Homecoming Friday! LAND CLEARING. DRIVEWAYS, PONDS, GRADING, RE TRACTOR WORK, ROCK 6 DIRT... Call: (352) 4 6-1117 SjlO BComplete Veterinary Services ; S Ted S. Yoho, DVM *Marie Leslie, DVM g i Jackie Lnkous, MRCVS- Jill Brady. DVM S- Dental Care I Prescription Food IGrooming Vaccinations I Boarding I Early AM Drop-Off ' Microchip Identifications I Medicine & Surgery '' es !I Skin Disease Treatment I Puppy & Kitten Plan * 0, Large Animal Haul-In Available , 24 HOUR EMERGENCYSERVICE AVAILABLE . 7~M t71M"4414 -mo s S603N.MatainSLt em q'-- .0". .96 t, 1* .9. t* t* t -F t*' 4, t- 0 -* 40 . QUALITY HEALTH CARE FOR THE ENTIRE FAMILY Pr LAND . SEDI ICAL IENTTE LAND CLEARED for Homesites, etc. BOBCAT TRACKHOE FOR HIRE Concrete Driveways & Patios Gated Entryways Block, Brick, Stucco and Stone Driveway CULVERTS installed with Limerock Limerock & Fill Delivered '\s Phone/Fax (352) 486-3962 or Cell (352)441-0233 SAVE fGA$ 6 CASH Printing Legal Forms NCR Forms Fax Copies Notary Greeting Cards Office Supplies Lamination PC Sales PC Repairs PC Parts Ink Cartridges -- -----_- ---=-_ --... ..... ..- If We Don't Stock It... $50,00 OFF Any New Computer We'll Order It! .Just Bring In This Ad To Redeem! 310 Main Ave Bronson Mon-Fri 10-5 In te Re, White & Blue Builing amoss firn Petns Bank Cij I Page 9 'Fish Tales 'noto courtesy or Nina uwens BUCK OWENS of Bronson caught this 27- inch Red Fish while fishing with his dad, Chuck Owens, at Shell Mound. The Red Fish was caught with live baitfish. mom Page 10 LEVY COUNTY JOURNAL SPORTS & RECREATION THURSDAY, OCTOBER 5, 2006 THIS WEEK IN THE NEXTEL CUP: Talladega could be defining moment of the season BY NEAL FISHER SPORTS WRITER Talladega Distance 2.66 miles tri- oval Banking 33 degrees Last year's fall winner (UAW 500): Mark Martin Last year's spring winner: Jeff Gordon Known as the world's fastest superspeedway and for producing "the big one" due to restrictor plates being required. The state of the Chase: In each of the previous two cup chases, after the first three races 30-50 percent of the chase teams saw their championship opportunity effectively come to an end. This year's teams on the bubble heading into the fourth race of the chase at Talladega are Kasey Kahne, Kyle Busch and Jimmie Johnson. Kahne and Busch earned their spots in the playoff by claiming several top ten finishes in the final few races before the chase. In fact, their rise knocked defending cup champion Tony Stewart out of the chase. However, the first three races have brought trouble and problems for both teams, some of which were not of their doing. Although they will not be mathematically eliminated without a top five finish, their season as far as title possibilities will be over. Johnson limped into the chase, falling from the top. spot at the season's midway point to the bottom half of the top ten.. If any team can put their past failures behind them when their backed into a do or die situation, it is the Lowe's unit. While Dale Earnhardt Jr.'s and Jeff Gordon's crew are not facing elimination from title contention at Talladega, with only five races left after this week, a bad showing, which drops them more than 150 points behind the leader, could put them in a do or die situation next week at Concord. What does Talladega means to the chase? With their string of successes over the last five. years at the superspeedways, Jeff Gordon and Dale Earnhardt Jr. come into the race as the obvious favorites and for them it couldn't be at a better time. However, Richard Childress Racing has made a spectacular charge back to the AND THEY'RE OFF! front of the pack this year and seemed prime to reclaim their spot as the best when it comes to restrictor plate racing. How does this trip to Talladega affect the owners championship bids? With owners Speaking of Childress, with Burton leading the series and Harvick situated in the fifth spot, it seems the six-time championship owner has found the combination again is poised to stay at the top. In bringing Burton aboard his operation, they have built a championship contender step by step together at a time when both needed what the other had to offer. After his meteoric rise by racing standards during the most trying of times to fame and fortune in the sport, Harvick fell from grace. Perhaps reaching the top tier of drivers before he or his team was ready, Harvick's rebirth gives indications that he is here to stay. Talladega will put Childress' validation to the test. After placing all five of his drivers in the chase in its first two years, Jack Roush has only two drivers in the playoffs this year. However, they are his two most accomplished drivers, Mark Martin and Matt Kenseth. Talladega not only marks the return ofthe owner's near fatal plane crash, but a chance for the two time championship owner to raise his profile once again and begin a final charge as his two drivers sit only 84 and 70 points behind Burton. With the drop off and eventual release of Bobby Labonte, Tony Stewart was expected to carry the banner for the next few years at Joe Gibbs racing. After winning the title last year and positioning themselves in the top 10 for the first half of the season, Stewart and his team surprisingly fell out of the chase little by little each week. In his stead, at least for the time being, Danny Hamlin has become the man at Gibbs racing. Sitting in third heading to Talladega, Hamlin and his team have the opportunity to become the first rookie in the modern age of NASCAR to capture the cup championship. While Gibbs has claimed two championships as an owner, if Hamlin and his team were to win the title, considering it had never been done before by a rookie driver, it would be the feat of feats and set his organization up as the team to beat next year. With past success at Talladega this race could be that defining moment of the season when everything comes together and a championship team begins their run. What other facts involving the drivers and teams consider into this year's visit to Talladega? With his rise to the top of the championship, memories of the stretch between 1997- 2000 have flooded the Burton camp. During the period he finished in the top five every year and seemed poised to be the next driver to join that group of elite drivers. A somewhat understated personality in racing, the 18 time winner made a name for himself with consistency and a failure to put himself in a hole even in the worst of situations. With a new team he seems to have a unit behind him that is finding ways to accomplish those goals again and they seem to get stronger every week. With his previous experience as a title contender and his hunger to return to the top, he will be hard to knock offifhe has a strong finish. His style and reputation will also lend themselves to further strengthening his position as the leader as Talladega is a track of survival. His recent win at Dover and fifth place finish at Kansas were the last two hurdles for him to be able to claim his back. While he has cooled off somewhat during the last several seasons in comparison to the torrid pace he set during his first nine years, Gordon is still in. the top elite drivers. Much like Dale Earnhardt's twelfth place finish in the final 1992 point standings festered the hunger needed for him to claim his final two titles, Gordon missing the chase last year has fueled this year's turnaround. Combine that with a driver who has matured into a seasoned veteran who is more consistent than headlines these days, Gordon has been in the minds of NASCAR nation this year, but always ready to pounce. Talladega is his chance to pounce as he, like Burton, has come to understand how to survive at the world's fastest speedway. He comes into Talladega as the second hottest driver since the race started, with three consecutive top five finishes and the hottest since the midway point of the season, with eight top five finishes in the last 11 races and only two finishes outside the top ten. He credits his success to gelling with crew chief Steve Letarte. That spells bad news for the rest of NASCAR nation. Mark Martin is this year's grand old man. Nobody in the chase has as much experience as Martin. He was a pioneer of smooth and steady wins the race in the. long haul. With this being his last run it is time for him to make his move as well. This is track tailored for him making his move and considering he is the defending champion of the race, he should have a strong finish. Who has won atTalladega among the chase drivers? Earnhardt Jr. has won five times. Gordon has claimed four victories. Martin and Harvick have found victory lane twice apiece, while Burton has one win at the world's fastest speedway. Who else among the non- chase drivers could win at Talladega? With five victories, along with Eamhardt, tops among active drivers, as well as his victory last week, Stewart could pull off a victory. In addition, to his statistics as the 11th place driver in the standings, he has nothing to lose. So his team will not run a conservative race. Other Notes: With five tracks of the six left on the schedule of 1.5 miles remaining, Talladega presents another opportunity for the drivers to further strengthen their position and make some noise in the chase. This could be particularly true for Kahne who has three victories and four top four finishes. The track that produces "the big one" will require a survival mentality and the veterans are the ones who know how to leave Alabama with their championship bids still intact.' This stop on the circuit can make for great theater as any number ofcombinations as far as who in the championship chase will leave the track still alive, who strengthens their position and who makes a move is possible. iWilliston and fervor to the program that has added an additional element to its culture. He also came to the program with a wealth of knowledge at stopping other teams' offenses, particularly when stopping the run. With the part of their season that will define it here, the fate of what this season will be remembered for will lay in the team's speed and its option offense. In the team's four wins, the defense has come up with big plays due to their speed. Those plays have often been momentum-swinging, kick in the gut kind of plays that change an opponent's drive from a potential game ender to giving the Red Devils the lead or putting Williston in position to score and get back into the game. The spread offense utilizes as many as five backs. "As many as three guys can handle the ball on any given play and with us able to use so many runners, the opposition can't key in on just one guy," Baker said. "It gives us a good balance. The backs understand as long as we are winning, that is what is important. As far as our receivers they are playmakers and have made some big time plays when we needed to get the offense going. And our line has done well. Andre Greenlee has really stood out, but everyone has improved and played well." BRONSON SELF STORAGE (352) 486-2121 HOURS: Monday Friday 10 am 5 pm Saturday 10 am 3 pm 839 E Hathaway Ave Behind Dollar General Continued from page 9 With a 2-2 record against the teams they lost to last year and a much closer game to Ocala Trinity Catholic in 2006, this has been a season of substance and a different feeling has descended over the den. The Red Devils have an opportunity to do something of monumental significance, but the losses also indicate a penchant for losing focus. Which is the coaching staff's biggest concern. Baker pointed out the loss to Dixie County as an example. They had the lead, but Dixie County scored in the final minutes. It was a game he felt the Red Devils should have won. They missed several tackles, which is the most noteworthy consequence of a lack of focus. FHugh's t Concrete & Masonry Inc. 5790 NW 135 Street Chiefland, Florida 32626 Hugh S. Keen Owner Phone Fax 352-493-1094 352-490-5329 e-mail: hughsconcrete@bellsouth.net Free Estimates Foundations Slabs Brick Block Stone Fireplaces * Complete Concrete & Masonry Services I Licensed and Insured. Serving the Tri-County Area for 20 years *Sheriff Continued from page 5 identified two main culprits and began to build their case. Their work ultimately led to a confession that cleared eight break-ins plus two additional break-ins in Gainesville. As a result of this work, three computers and other items were recovered and returned to the owners. Your Patrol Division continues to strive for excellence. Their determination to "get the job done" and attention to detail allows a flow of continuous information between divisions. We also wish to thank our citizens that continue to provide us valuable information which help us solve these crimes. I i u"" 824 N. Main St. SWilliston, FL All your foori needs at oudetprices! LEVY COUNTY JOURNAL AROUND LEVY COUNTY THURSDAY, OCTOBER 5, 2006 FFAAlumi to host iHoney were two little b Sr*gave them each sh fy Fay They helped me without little pe The FFA Alumni.fish fry will be held Friday, Oct. 6 at the Where would w Chiefland High School Ag. Building. Lord fill my n Serving will begin at 5-p.m. and the menu includes fish, Lord when I've grits, hushpuppies, cole slaw, baked beans, dessert, tea and Until next we lemonade for $6. So says, Miss Honey Small business workshop N Cassie slated in Gainesville Oct. 12 knowledge of th who disagree in A workshop on "Choosing a Legal Structure for Your on of sgre liil Business...sole proprietorship, partnership, limited liability I didn't make company, corporation etc." will be held on Thursday, Oct. 12, church three tin from 6:30 and 8:30 p.m. in the SCORE office in downtown ls of crs in Gainesville in the SUN Center; Suite 104E, 101 Southeast on the lawn Th 2nd Place; Gainesville, FL 32601. For more information were gone. The telephone: (352) 375-8278. no chain of life The workshop will determine what kind of taxes you will don't know if th pay, who is liable financially and legally and what forms to (neither of which file. the rally organize The fee is $10 in advance ($15 at the door). Registration However, I di in advance is recommended. For a registration form please I was reminded call the SCORE office or visit the SCORE website at: www. communication scoregainesville.org/registration.htm. intended audien SOCRE, "Counselors to America's Small Business," is Cassie Journ a non-profit, nationwide resource partner of the U.S. Small may be reached Business Administration. Continued from page 4 boys who helped me get them back in so I a cereal bar and a stuffed toy out of my shed. and I made their day! Where would we be ts and little helpers? I love both, -don't you? e be without little ones? nouth with worth while stuff, and nudge me said enough! ek, nuff said. Continued from page 4 Le will of God, and attempt to place those the role of damned. But that is, I suppose, ities that freedom of speech brings. it to the protest rally. I did drive past the aes looking for it. The first two times I saw he parking lot and little pink and blue crosses e last time, around noon, most of the cars pink and blue crosses remained. But I saw stretching from church to high school. I he rally was postponed, if the two leads h gave me a time) got the facts wrong, or if zers failed to obtain a permit. .d find a lesson in an otherwise futile search. that freedom of speech only works when is complete-when the message reaches the ce. ligan is a writer for this newspaper. She d at cjournigan@levyjournal.com i Robinson Continued from page 4 monies were needed to provide services to the residents of the county. Unfortunately, with the pleas not being heard or no action taken on those pleas regarding the millage rate there may not be anyone left to provide service to. With the millage rate being passed at 7.9 percent the residents and businesses are feeling this expense and this gives the appearance that the BOCC is anti-business and anti-existing and new residents. It also appears that the BOCC wants the county to go backward to where it was 30-40 years ago instead of being in a controlled progressive mode. If the taxes keep going the way they are going not only are we not going to have future businesses but existing businesses will fall by the way side and those contemplating moving to Levy County will go elsewhere. This is only my personal feeling and others will have to make this judgment for themselves. We all know that being a commissioner is a thankless job at times and not everyone is going to be happy with all decisions that are made. But, the residents that spoke at the final budget hearing are all voters. These are the voters that placed the BOCC at the helm of our county government. These are the voters that gave the BOCC the fiduciary responsibility for their tax dollars. A question to ask yourself is, has the BOCC responded to act reasonably with your tax dollars or not? This is a question that each voter must ask themselves. Because of the way the BOCC voted last night and regardless of what transpires over the next two years, last night's vote by the BOCC will not be forgotten. Because you see commissioners these are the same voters that will be going to the polls in, a couple of years to vote when three of you will be up for re-election. Jerry Robinson is a Williston resident. Debbie & Jasmine of the A&A BBQ read the SEyY COUNTY JOURA HE COUNT TY IPAPE R EST. 192 Also available at these locations: Bronson A&A BBQ Boondocks Grill Bronson Post Office Courthouse-Bronson IGA Li'l Champ Nobles Pick-a-Flick Texaco/Chevron Van Lee's Jiffy Cedar Kej Cypress Station Island Jiffy #1173 Island Jiffy #3246 The Market SR 24 Chiefland ABC Pizza Bell's Restaurant US 19 Bill's BBQ US'19 Burger King US 19 Chiefland Flea Market US 19 Chiefland Post Office Park Ave Church's Chicken/Jiffy 3000 Dollar Tree US 19 Gas Mart Yogiraj En- terpr. Inc. Jiffy 2280-Manatee, Jiffy 2946-Midtown McDonald's US 19 Mya's Chinese Restaurant'I Champ 1181 Li'l Champ 1182 Li'l Food Ranch 3626 Li'l Food Ranch 4231 Raleigh General Store Williston Post Office Journal photo by Rhonda Griffiths The A Team of A&A BBQ in Bronson thinks the Levy County Journal rates an A+ on its sports coverage and current events. Pick up your copytoday. You'll be glad you did. To subscribe: call Robin at 490-4462 We accept Visa/Mastercard Two locations to serve you 440 South Court St., Bronson 13 South Main St., Chiefland Page 11 VISA II 1 Mr m Page 12 THURSDAY, OCTOBER 5, 2006, LEVY COUNTY JOURNAL Classified dA Deadline Monday 2 p.m. egals L COUNTYJO Wl -n I^K COUNTY lPAPEIl ESUrVI1. l2j Lio'levyjournal.com Visit: 13 South Mlain Street, Chiefland Bronson 352-486-2312 Bronson 352-486-5042 .,-440 South Court Street, Bronso 440 Solth Court Street, Bronsop. .,J; Miscellaneous i iol Personals a 1976 Forester travel trailer, VIN 6413239215, green and white in color. Anyone claiming ownership, write: Lyle Pointer, 1319 NE 8' Street, Williston, FL 32696. 10/5p 125 Servic TREES, TREES, TREES. Langs- ton Tree Services, Inc. Call (352) 490-4456. tfnb T&J TREE SEVi[CE~-ot-oear- ing, stump grinding, bushhog- ging, underbrushing, removals, boxblading, Bobcat work. In- sured, licensed, 19 years' expe- rience. Call 486-6297. tfnb. Employment 2,1 Help Wani 210 Full timni This space for sale. Call Robin to purchase at a low rate. 490-4462 S Help Want i 240 Part timrn AVON REPRESENTATIVES NEEDED for holiday season: Just $10 to get started & earn 50% on first 4 orders. Call Pam Owens, 538-1845, Independent Avon Representative. 10/5b Rentals Mobile Ho m 515 for Re i FOREST PARK ARCHER 3 BR/2 BA MH with carport. $900 security, $900/mo rent: You pay electricity. Available Oct. 1. 352-528-6411, leave message. 9/28,10/5f real Estate 40 Mobile Hoi 415 for Sale $76,500 3/2 28x60 MH on 1.25 acres near Bronson. Refurbished with new cabinetry, new flooring, new appliances and paint, etc. 352-47-2-4977. 10/12p ... .. 1,o, ,o, '"- "1 -'^tlond I-- 425 for Saloi INVESTORS LIQUIDATING for cash all our land properties In Levy and Marion Counties:' Williston Highlands, University Estates, Bronson Heights, Oak Ridge and Rainbow Lakes Estates. e-mail: sancheznichola s@bellsouth:net. Call 352-373- 9157 10/5p % This space for sale. Call Robin to purchase at a low rate 490-4462 For Sale 501 Auction l 510 FAT GOOSE AUCTION holding estate auctions each .Friday in downtown Chiefland at 7:00 pm. Always-outstanding .estate merchandise. We will start our outstanding box lots at 6:30 pm. This week we have some very nice tools 13" planer, 10" band saw, large router, table and stand, great glassware, several nice estate ladies' rings, 14K gold bracelets, & necklaces. Furniture, fishing gear .and all types of smalls, othqr tools, great primitives, and lots more. AU2738 (Bruce Denestein) AB692 10% BP. For more info. call (352) 356-1065. 1015b SOUTHERN AUCTION Marketing, 15991 Hwy. 27A, Williston, Monday Night, Oct. 9, at 7:00 p.m., Col. iJoel Kulcsar AU1437, AB2240, 10% buyer's premium. Toyota forklift, bedroom set, collection of Franklin Mint knives, Kenmore washer and dryer, entertainment center and atheSati:!Lee Reynlds,'lSSaO titaniumLTings, wickenflitwn?; glassware tools and jewelry. Contact 352-528-2950. Yard Sal 515 . YARD SALE, Chiefland. St. Albans Episcopal Church, 4 miles north of Chiafland on US 19 Fri.-Sat. Oct. 61t and 7h from 8:00 am to 2:00pm. 10/5.b 5 MiscelanU 550 B 560 W WANTED. LARGE ESTABLISHED healthy plum,, pear, persimmon, kumquat and, particularly, fig trees. Offering excellent pay. Will remove them in winter and will fill'in and level. the site. Call 352-493-2496. 10/19b Transportation 80, One man's junk is another man's treasure. Sell it or find it here! i UITEOSTATES S statement of Ownership, Management, and Circulation KOPOSTAL SERVICE, (All Periodicals Publications. Except Requester Publications) 1. PubIation Tle 2. Publication Number 3. Filing Date Levy County Journal 3 1 0 1 5 9 10/1/06 4 Issue Frequency 5. Number of Issues Published Annually 6. Annual Subscription Price Weekly 52 $17, $22, -$27 7. Complete Mailing Address of Known Office of Publication (Not pnnter) (Street city, county, state, and ZIP+4S) Contact Person P.O. Box 159 Carolyn Risner Bronson, FL 32621-0159 Telephone (Include area code) 352-490-4462 Complete Mailng Address of Headquarters or General Business Office of Publisher (Not printer) Levy County Publishing, Inc. 13 S. Main Street P.O. Box 2990 Chiefland. FL 32644-2990 9. Full Names and Complete Mailing Addresses of Publisher. Editor, and Managing Editor (Do not leave blank) Publisher (Name and complete making address) Levy County Publishing, Inc. 13 S. Main Street P.O. Box 2990 Chiefland, FL 32644-2990 Editor (Name and complete maiWng address) Caroly Risner, Editor C/O 13 S. Main Street r.e ...e.... ,--. :"' "' '- -.!p.o.Ui36S.h'2: 2tchi daini FL 32644-2990 -'t ditSq J ,SN Aoo8 Jl'- ... Managing Editor (hdaf a( Fr" pp( f)il dress ) 1A I- -i qt 1 --T vV9 J, 10 J Pboe1 Oildtl" Carolyn Risner, Editor lC0 173 S. Main Street .: P.O. Box 2990 Chiefland, FL 32644-2990 10. Owner (Do not leave blank. If the publication is owned by a corporation. give the name and address of the corporation immediately followed by the names and addresses of al stockholders owning or holding f percent or more f the total amount of stock. If not owned by a coporapoon. give the names andddresses f the iividual owners. f owned by apatneshipoorunincorporatedW r Mgve its name en dress as we as those of each 'inMlvdual owner.If the publication is published bye nonprofit organization, qiveits name and address) Full Name Complete Mailing Address 13 S. Main Street Levy County Publishing, Inc. P.O. Box 2990 Chiefland. FL 32644-2990 A. D. Andrews. Owner P.O. Box 1126 Chiefland. FL. 32644-1126 11. Known Bondholders, Mortgagees, and Other Security Holders Owning or Holding 1 Percent or More of TotalAmount of Bonds. Mortgages, or Other Securibties. If none, check box None 1" N None Full Name Complete Mailing Address 12. Tax Status (For completion by nonprolt organizations authorized to maR at nonprofit rates) (Checkone) The purpose, function, and nonprofit status of this organization and the exempt status for federal income tax purposes: Hl Has Not Changed During Preceding 12 Months 0 Has Changed Dunng Preceding 12Months (Publisher must submit explanation of change with tis statement) PS Form 3526, September 2006 (Page 1 of 3 (Instnctions Page 3)) PSN 7530-01-000-9931 PRIVACY NOTICE: See our privacy policy on'con 13. Publication Title Levy County Journal 16. Extent and Nature of Circulation a. Total Nlumber of Copies (Net press iun) Mailed Outside-County Paid Subscriptions Stated on (1) PS Form 3541hlnclude paiddlstributon above'rominal rate, advertiser's proof copies, and exchange copies) b. Paid Circulation (By Mall and " Outside he Mail) 14. Issue Date for Circulation Data 9/14/06 Average No. Copies Each Issue During Preceding 12 Months, No. Coples of Single Itsse Published Nearest to Filing Date 1972 2300 Mailed In-County Paid Subscriptions Staled on PS Form 3541 (Include paid distribution above nominal (2) rate, advertiser's proof copies, and exchange copies) Paid Distribution Outside the Malls Including Sales (3) Through Dealers and Carriers. StreetVendors, Counter Sales, and Other Paid Distribution Outside USPSO SPaid Distribution by OtherClasses of Mall Through . (4) the USPS (e.g. FIrst-Class Mail) c. Total Paid Distnbution (Sum of 15b (1), (2),(3), and (4)) Instrument Technician is needed for fast paced work environment. Responsibilities include cleaning, sterilizing and restocking surgical instruments. Ideal candidate will have basic knowledge of MS Windows/Word/Excel, strong organizational skills & attention to detail. One year of inventory management and/or warehouse experience is preferred. Please submit cover letter, resume & salary history to human.resources@exac.com or fax to 352-378-2617. ,. Visit our website d.,Free or Nominal Rate Distribution (By Mail and Outside the Mail) Free or Nominal Rate Outside-County Copies Included on PS Form 3541 Free or Nominal Rate In-County Copies Included on PS Form 3541 !', 1455 1643 32 33 Free or Nominal Rate Copies Mailed at Other (3) Classes Through the USPS (e.g. First-Class Mail) 4 Free or Nominal Rate Distribution Outside the Mall (Carriers or other means) q. Total Free or Nominal Rate Distribution (Sum of ISd(1). (2). (S) and (4) 84 103 f. Total Distribution (Sum of 1c and1S e ) 1539 1746 g. Copies not Distributed 'See Instructions to Publishers#4 (page #3)) 433 554 h. Total (Sm of 15fendg) 1972 2300 1. Percent Paid (15c divided by 15 times 100) 95% 16. Publication of Statement of Ownership E If the publication is a general publication, publication of this statement is required. Will be printed in the 10/5/06 Issue of this publication. 17, Signet rjd Tile or, P er, Business Manager, or Owner 95% n Publication not required Date 9/19/06 I certify that all Information fumished on this form is true and complete. I understand that anyone who fumishes false or misleading information on this form or who omits material or Information requested on the form may be subject to criminal sanctions (including fines and imprisonment) and/or civil sanctions (including civil penalties). PS Form 3526, September 2006 (Page 2 of 3) -- - --- --- ---- -- . LEVY COUNTY JOURNAL PI tASIFIFO a IFAhIS THURSDAY, OCTOBER 5, 2006 Page 13 IN THE CIRCUIT COURT OF THE EIGHTH JUDICIAL CIRCUIT. IN AND FOR LEVY COUNTY, FLORIDA Case No. 38-2006-CA- 0621 CYNTHIA HALL SMITH, AS PERSONAL REPRESENTATIVE OF THE ESTATE OF EARNESTINE B. HALL, also known as ERNESTINE HALL MORRIS, Plaintiff, vs. THE HEIRS, ADMINISTRATORS AND ASSIGNS OF J. W. MORRIS, Deceased, including ALICE MORRIS, his daughter, Defendants. AMENDED NOTICE OF ACTION TO: THE HEIRS, ADMINISTRATORS AND ASSIGNS OF J. W. MORRIS, Deceased Address Unknown ALICE MORRIS Address Unknown AS WELL AS any and all other parties claiming, by, through, under, or THE HEIRS, ADMINISTRATORS AND ASSIGNS OF J. W. MORRIS, Deceased, including ALICE MORRIS, his daughter, or her heirs, administrators and assigns, as well as all parties having or claiming, to have any right, title or interest in the property herein described. YOU ARE NOTIFIED that an action to quiet title to the following property in Levy County, Florida, to-wit: Lots 17 and 18, Block "C", PINEHURST SUBDIVISION, as shown by plat recorded in Plat Book 2, at page 37- A, public records of Levy County, Florida. 20, 2006 and file the original with the Clerk of this Court either before service on Plaintiff's attorney or immediately thereafter; otherwise a. default will be entered against you for the relief demanded in the Complaint or petition. Dated this 5* day of September 2006. DANNY J. SHIPP Clerk of Court By: Gwen McElroy, Deputy Clerk Pub.: Sept. 14, 21, 28, Oct. 5, 2006 IN THE CIRCUIT COURT IN AND FOR LEVY COUNTY, FLORIDA EIGHTH JUDICIAL CIRCUIT CIRCUIT CIVIL NO.: 38-2006- CA-000710 JAMES D. BAGOLY, III and EVA MARIE BAGOLY, his wife, Plaintiff, v. BILL SHERMAN, and all unknown parties claiming by, through, under and against the above named defendants who are not known to be dead or alive, whether said unknown parties may claim an interest as spouses, heirs, devisees, grantees or other claimants, Defendants. NOTICE OF ACTION To: BILLSHERMAN, residence unknown 5, BLOCK 3, RAINBOWLAKES ESTATES, SECTION "N", ACCORDING TO THE PLAT THEREOF AS RECORDED IN PLAT B6OK defenses to it. if any, on the Plaintiffs attorney. whose name and address is: H. Michael Evans, Esquire at 20702 W. Pennsylvania Avenue, -Dunnellon, FL 34431, and file the originalwith the clerk of this court on or before October 16, 2006 otherwise, a judgment may be entered against you for the relief demanded in the Complaint. Witness my hand and seal of this Court on this 8 day of September, 2006. Danny J. Shipp As Clerk of Court, Levy County P.O. Drawer 610 Bronson, FL 32621 By: Deanna Dobbins As Deputy Clerk Pub.: Sept. 14, 21, 28, Oct. 5,, 2006, Dovei- residence un- known W. Kenneth Hager resi- dence unknown Donald E. Hag- er, deceased and any unknown heirs at law of Donald E. Hager, deceased-c/o MAY CONCERN:I IN THE CIRCUIT COURT OF THE EIGHTH JUDICIAL CIRCUIT IN AND FOR LEVY COUNTY, FLORIDA. CASE NUMBER: 06-CA-000429 LEONARD LAING Plaintiff, VS KENNETH MILLER AND CLARICE MILLER Together With their heirs, .should they be deceased, and any natural unknown persons who might be the unknown spouse, heirs, devisees grantees, creditors, or other parties claiming by, through, under or against the above-named defendants . Defendants. NOTICE OF ACTION To: CLARICE MILLER Together With her heirs, should they be deceased, and any natural unknown persons who might be the unknown spouse, heirs, devisees, grantees, creditors, or other parties claiming by, through, under or against the above-named defendants. You are hereby notified that a Complaint to Quiet Title was filed in this court on May 30,2006. You are required to serve a copy of your written defenses, if any, on the petitioner's attorney, whose name and address is: Sherea- Ann Ferrer, P.O. Box 721894 Orlando Florida 32872, and file an original with the clerk of this court on or before Nov. 10, 2006. Otherwise, a judgment may be entered against you for the relief demanded in the petition. Property Description: RAINBOW LAKES ESTATES, SECTION N BLOCK ,16 LOT 10 OR BOOK 270,;r!:pAE60. SECTION'Z4', TOWNSHIP 15 SOUTH, RANGE 17 EAST. PARCEL #06841-006- 00. Witness my hand and seal on September 29, 2006 Danny J. Shipp. Clerk of the Court By: Gwen McElroy Deputy Clerk (COURT SEAL) Pub: Oct. 5, 12, 19, 26, 2006 STATE OF FLORIDA DEPARTMENT OF COMMUNITY AFFAIRS NOTICE OF INTENT TO FIND THE TOWN OF BRONSON COMPREHENSIVE PLAN AMENDMENTS) IN COMPLIANCE DOCKET NO. 06-1-NOI-3802- (A)-(l) The Departmentgives notice of its intentto find theAmendment(s) to the Comprehensive Plan for the Town of Bronson, adopted by Ordinance No(s). 2006-03 on August 7, 2006, IN COMPLIANCE, Pursuant to Sections 163.3184, 163.3187 and 163.3189, F.S. The adopted Town of Bronson :. Comprehensive Plan Amendment(s) and the Department's Objections, Recommendations and Comments Report, (if any), are available for public inspection Monday through Friday, except' for legal holidays, during normal business hours, at the Town of Bronson, Clerks Office, 660 East Buying Tax Deeds? JVeed toa dear the titee? Hathaway Avenue, Bronson, Florida 32621. Any affected person, as defined in Section 163.3184, F.S., has a right to petition for an administrative hearing to challenge the proposed agency determination that the Amendment(s) to the Town of BronsonbrePark, rimiation IN THE CIRCUIT COURT OF THE 8TH JUDICIAL CIRCUIT, IN AND FOR LEVY COUNTY, FLORIDA CIVIL DIVISION CASE NO.: 38-2005-CA- 001082 CHASE HOME FINANCE LLC SUCCESSOR BY MERGER TO CHASE MANHATTAN MORTGAGE CORPORATION Plaintiff, UNKNOWN BENEFICIARIES, ASSIGNEES, CREDITORS, TRUSTEES AND ALL OTHERS WHO MAY CLAIM AN INTEREST IN THE ESTATE OF MILDRED D. SHOOK, DECEASED et al, Defendants. NOTICE OF FORECLOSURE SALE NOTICE IS HEREBY GIVEN pursuant to a Final Judgment of Foreclosure dated the 25t day of September, 2006, and entered in Case No. 38-2005- CA-001082, of the Circuit Court of the 8TH Judicial Circuit in and for Levy County, Florida, wherein CHASE HOME FINANCE LLC SUCCESSOR BY MERGER TO CHASE MANHATTAN MORTGAGE CORPORATION is the Plaintiff and UNKNOWN HEIRS, BENEFICIARIES, DEVISEES, ASSIGNEES, LIENORS, CREDITORS, TRUSTEES AND ALL OTHERS WHO MAY CLAIMAN INTEREST IN THE ESTATE OF MILDRED D. SHOOK, DECEASED; DIANA SHOOK A/K/A DIANE SHOOK; JIM SHOOK; MARY PALMER; MICHAEL SHOOK; UNKNOWN SPOUSE OF MILDRED D. SHOOK; JOHN DOE; JANE DOE ASrd day of October, 2006, the following described property as set forth in said Final Judgment, to wit: LOT 40, SPRINGSIDE, A MOBILE HOME SUBDIVISION, ACCORDING TO THE PLAT THEREOF, FILED IN PLAT BOOK 6, PAGE 58 AND 59, OF THE PUBLIC RECORDS OF LEVY COUNTY, FLORIDA. TOGETHER WITH 1980 CHAM DOUBLEWIDE MOBILE HOME WITH VIN #'S F0601315205A&F0601315205B AND TITLE #'S 17351882 & 17351881. ANY PERSON CLAIMING AN INTEREST IN THE SURPLUS FROM THE. SALE, IF ANY, OTHER THAN THE PROPERTY OWNER AS OF THIS DATE OF THE LIS PENDENS MUST FILE A CLAIM WITHIN 60 DAYS AFT.RTHE SALE . If you are a person with Disabilities who need any accommodations. DANNY J. SHIPP Clerk of the Circuit Court By: Gwen: October 5, 12, 2006 HEIRS, DEVISEES, LIENORS, NOTICE Notice is hereby given that the books will close for registering to vote for the General Election on October 10, 2006. All persons interested in voting in the General Election are required by State Law to be registered by this date. State Law requires photo and signature identification to vote at the precincts or early voting in the office of the Supervisor of Elections. Absentee ballots will be available the first week of October for persons unable to vote at their precinct election day. If you have any questions please call Connie Asbell, Supervisor of Elections at 352-486-5163. /V&petenced, Dependalee Service and Reasonable Rates! Cafi etwldotte J Weidnet ATTORNEY AT LAW (352) 486-3753 VlnnVVnn II w Iiwrrir Page 14 LEVY COUNTY JOURNAL CLASSIFIED & LEGALS THURSDAY, OCTOBER 5, 2006. egals" IN THE CIRCUIT COURT OF THE EIGHTH JUDICIAL CIRCUIT, IN AND FOR LEVY COUNTY, FLORIDA. CASE NO. 38-2006-CA-000780 RONALD W. STEVENS,. Plaintiff, vs JOHN CATLETTE, if married, if alive, and if dead, his respec- tive unknown, spouses, heirs, devisees, grantees, creditors, or other parties claiming by, through, under or against him individually, Defendants. NOTICE OF ACTION TO: JOHN CATLETTE LAST KNOWN ADDRESS P.O. BOX 651 OLD TOWN, FLORIDA 32680 YOU ARE NOTIFIED that an action to Quiet Title as to the fol- lowing described lands: Those lands as described in Exhibit "A" attached hereto and made part hereof by reference. TAX PARCEL # 00560-001 EXHIBIT A S % of NW 4 of NE of Section 4, Township 11 South, Range 14 East, AND East 30 feet of N z of S % of NW % of NE /4 of Section 4, Township-11 South, Range 14 East, Levy County, Florida, ly- ing Southwesterly of maintained road right of way of Levy County Road #207. filed against you and you are required to serve a copy of your written defenses, if any, on RON- ALD W. STEVENNS, Petition- er's attorney, whose address is Post Office Box 1444, Bronson, FL 32621, on or before Nov. 10, Sept. 25,: Oct. 5, 12, 19, 26, 2006 NOTICE OF SALE The following vehicles) will be sold at public auction, free of all prior liens, per FI Stat 713.78 at 10:00 AM on October 20, 2006 at Lienor's address. No titles, as is, cash only. 95 Ford 1FTCR10A7SPA30379 97Mazd JM1TA2215V1310738 Lienor: Bronson Lube Inc 555 N Hathaway Ave Bronson FL 32621 Phone: 352-486-2100' Interested parties, contact: State Filing Service, Inc. (772) 595-9555 Pub. Oct. 5, 2006 NOTICE OF APPLICATION FOR TAX DEED NOTICE IS HEREBY GIVEN, that the holder(s) of Certificate number 596 #504, UNIVERSITY ESTATES, AN UN- RECORDED SUBDIVISION IN LEVY COUNTY, FLORIDA, BE- ING MORE PARTICULARLY DE- SCRIBED AS FOLLOWS: THE SOUTH 1/2 OF THE SOUTH- EAST 1/4 OF THE SOUTHEAST 1/4 OF THE SOUTHWEST 1/4 OF THE SOUTHEAST 1/4 OF SECTION 9, TOWNSHIP 12 SOUTH, RANGE 17 EAST, LEVY COUNTY, FLORIDA, PARCEL #03381-018-00. NAME(S) IN WHICH AS- SESSED: ANTONIO MEDINA CASTRO .02 #447, UNIVERSITY ESTATES, AN UN- RECORDED SUBDIVISION IN LEVY COUNTY, FLORIDA, BE- ING MORE PARTICULARLY DE- SCRIBED AS FOLLOWS: THE NORTH 1/2 OF THE SOUTH- EAST 1/4 OF THE NORTH- EAST 1/4 OF THE SOUTHEAST 1/4 OF THE SOUTHEAST 1/4 OF SECTION 9, TOWNSHIP 12 SOUTH, RANGE 17 EAST, LEVY COUNTY, FLORIDA, PARCEL-403381 064-00.., ., ; NAME(S)' IN WHICH" AS- SESSED: JOSE J. FIGUERO12 #282, UNIVERSITY ESTATES, AN UN- RECORDED SUBDIVISION IN LEVY COUNTY, FLORIDA, BE- ING MORE PARTICULARLY DE- SCRIBED AS FOLLOWS: THE SOUTH 1/2 OF THE NORTH- WEST 1/4 OF THE NORTH- WEST 1/4 OF THE NORTH- EAST 1/4 OF THE SOUTHEAST 1/4 OF SECTION 9, TOWNSHIP 12 SOUTH, RANGE 17 EAST, LEVY COUNTY, FLORIDA, PARCEL #03381-150-00. NAME(S) IN WHICH AS- SESSED: ANGELA A. DE- BUSTAMANTE .15-A CERTIFI- CATE HOLDER(i): WILLIAM A.GILREATH REV. TRUST. LEGAL DESCRIPTION OF THE PROPERTY: TRACT #440, UNIVERSITY ESTATES, AN UN- RECORDED SUBDIVISION IN LEVY COUNTY, FLORIDA, BE- ING MORE PARTICULARLY DE- SCRIBED AS FOLLOWS: THE SOUTH. 1/2 OF THE SOUTH- EAST 1/4 OF THE NORTHEAST 1/4 OF THE SOUTHWEST 1/4 OF THE SOUTHEAST 1/4 OF SECTION 9, TOWNSHIP 12 SOUTH, RANGE 17 EAST, LEVY COUNTY, FLORIDA, PARCEL #03381-176-00. NAMES) IN WHICH AS- SESSED: MONS EUFRASIO OYA-GARCIA . All of said property'being in the County of Levy, State of Florida. Unless such Certifiate shall be redeemed according to law, the property described f;' uch Certificate will be sold to the highest bidder in the Courthouse lobby on Monday, the 13th day -i of -November, 2006, between' D thtiW'1fMiof 11:00dA.M.-'a W1 P.M .~. '' : in 4vt-r r1, DATED this 25th day of Sep- tember, 2006. DANNY J. SHIPP CLERK 'OF CIRCUIT COURT LEVY COUNTY, FLOR- IDA Pub.: Oct. 5, 12, 19, and 26, 2006 '1: I *: T,---- -S ', NOTICE OF APPLICATION FOR TAX DEED NOTICE IS HEREBY GIVEN, that the holders) of Certificate number 621 of the sale of 1999 has (have) filed said Certificate for a Tax Deed to be issued thereon. The names) of the holders) of said Certificate, the description of the property, and the name(s) in which it is as- sessed are as follows: NAME(S) OF CERTIFI- CATE HOLDERSS: WILLIAM A.GILREATH REV. TRUST. LEGAL DESCRIPTION OF THE PROPERTY: TRACT #430, UNIVERSITY ESTATES, AN UNRECORDED SUBDIVISION IN LEVY COUNTY, FLORIDA, BEING MORE PARTICULARLY DESCRIBED AS FOLLOWS: THE EAST 1/2 OF THE SOUTH- WEST 1/4 OF THE NORTH- EAST 1/4 OF THE SOUTHEAST 1/4 OF THE SOUTHWEST 1/4 OF SECTION 9,; TOWNSHIP 12 SOUTH, RANGE 17 EAST, LEVY COUNTY,' FLORIDA, PARCEL #03381-221-00. NAME(S) IN"'WHICH AS- SESSED: JUAN GAR IA . All of said property being in the County of Levy, State bf Florida. Unless such Certifiate shall be redeemed acc6rdii'g to law, the property described in such Certificate will be sold to the highest bidder in the Courthouse lobby on Monday, the 13th day of November, 2006, between the hours of 11:00 A.M. and 2:00 PM. DATED this 25th. dy of Sep- tember, 2006. DANNY J. SHIPP CLERK OF. CIRCUIT COURT LEVY COUNI'TY, FLOR- IDA Pub.: Oct. 5, 12, 19, and 26, 2006 NOTICE OF APPLICATION FOR TAX DEED NOTICE IS HEREBY GIVEN, that the holders) of Certificate number 679 #398, UNIVERSITY ESTATES, AN UNRECORDED SUBDIVISION IN LEVY COUNTY, FLORIDA, BEING MORE PARTICULARLY DESCRIBED AS FOLLOWS: THE EAST 1/2 OF THE NORTH- WEST 1/4 OF THE NORTH- EAST 1/4 OF THE SOUTHEAST 1/4 OF THE SOUTHWEST 1/4 OF SECTION 12, TOWNSHIP 12 SOUTH, RANGE 17 EAST, LEVY COUNTY, FLORIDA, PARCEL #03400-205-00. NAME(S) IN WHICH AS- SESSED: MONSENOR E. OYA GARCIA . NOTl~tei ISiWBREBYffG1EN, that the holders) of Certificate number 742 #223, UNIVERSITY ESTATES, AN UN- RECORDED SUBDIVISION IN LEVY COUNTY, FLORIDA, BE- ING MORE PARTICULARLY DE- SCRIBED AS FOLLOWS: THE NORTH 1/2 OF THE NORTH- EAST 1/4 OF THE SOUTHEAST 1/4 OF THE SOUTHEAST 1/4 OF THE NORTHEAST 1/4 OF SECTION 16, TOWNSHIP 12 SOUTH, RANGE 17 EAST, LEVY COUNTY, FLORIDA, PARCEL #03416-012-00. NAME(S) IN WHICH AS- SESSED: ANDRES PASTORI- Z76 of the sale of 2001 has (have) filed said Certificate for a Tax Deed to be issued thereon. The name(s) of the holders) of said Certificate, the description of the property, and the name(s) In which it is as- sessed are as follows: NAME(S) OF CERTIFICATE HOLDERSS: LEVY COUNTY. LEGAL DESCRIPTION OF THE PROPERTY: TRACT #385, UNIVERSITY ESTATES, AN UNRECORDED SUBDI- VISION IN LEVY CbUNTY, FLORIDA, BEING MORE PAR- TICULARLY DESCRIBED AS FOLLOWS: THE NORTH 1/2 OF THE NORTHWEST 1/4 OF THE NORTHWEST 1/4 OF THE SOUTHWEST 1/4 OF THE SOUTHWEST 1/4 OF SECTION 12, TOWNSHIP 12 SOUTH, RANGE 17 EAST, LEVY COUN- TY, FLORIDA, PARCEL#03400- 023-00. NAME(S) IN WHICH AS- SESSED: AURELIO RIVER65: LOTS 12, 13 & 15, BLOCK B, PINE OAK HILLS, UNIT 1, ACCORDING TO THE PLAT THEREOF RECORDED IN PLAT BOOK 3, PAGE 18, PUBLIC RECORDS OF LEVY COUNTY, FLORIDA, PARCEL #06771-011-00. NAME(S) IN WHICH AS- SESSED: LILIANE KOLKMAN . PM. DATED this 25th day of Sep- tember, 2006. DANNY J. SHIPP CLERK OF CIRCUIT COURT LEVY COUNTY, FLOR- IDA Pub.: Oct. 5, 12, 19, and 26, 2006 ----------- NOTICE OF APPLICATION FOR TAX DEED NOTICE IS HEREBY GIVEN, that the holders) of Certificate number 163: RON CLARK AND MARIA CLARK. LEGAL DESCRIPTION OF THE PROPERTY: LOT 30, BLOCK D-6 JEMLANDS, AN UNRECORDED SUBDIVISION IN LEVY COUNTY, FLORIDA, SAID TRACT MORE PAR- TICULARLY DESCRIBED IN THAT WARRANTY DEED RE- CORDED IN DEED BOOK 96, PAGE 165, PUBLIC RECORDS OF LEVY COUNTY, FLORIDA, PARCEL #01097-133-00. NAME(S) IN WHICH AS- SESSED: DUWARD U. SEE AND EDITH M. SEE.58. of the sale of 2004: LOT 17, BLOCK C, PINE OAK HILLS, UNIT 1, ACCORDING TO THE PLAT THEREOF RECORDED IN PLAT BOOK 3, PAGE 18, PUBLIC RECORDS OF LEVY. COUNTY, FLORIDA, PARCEL; #06772-010-00. NAME(S) IN WHIH AS-. SESSED: CONRADO MONROY AND VERONICA MONROY. All of said property being in the County of Levy, State of Florida. Unless such Certificate shall be redeemed according to law, the property described in such Certificate will be sold to the highest bidder in the Courthouse lobby on Monday, the 13h day of November, 2006, between the hours of 11:00 A.M. and 2:00 P.M. DATED this 25th day of Sep- tember, 2006. DANNY J. SHIPP CLERK OF CIRCUIT t LEVY COUNTY, FLOR-' IDA Pub.: Oct. 5, 12, 19, and 26, 2006 NOTICE OF APPLICATION FOR TAX DEED NOTICE IS HEREBY GIVEN, that the holders) of Certificate number 162: MICHAEL V. GLASS. LEGAL DESCRIPTION OF THE PROPERTY: LOT 26, BLOCK C-4, OF JEMLANDS, AN UN- RECORDED SUBDIVISION IN LEVY COUNTY, FLORIDA. SAID TRACT BEING MORE PARTICULARLY DESCRIBED IN THAT WARRANTY DEED RE- CORDED IN DEED BOOK 96, PAGE 183, PUBLIC RECORDS OF LEVY COUNTY, FLORIDA, PARCEL #01097-088-00. NAME(S) IN WHICH AS- SESSED: WILLEY LEE HIG- GINS AND AGNES MERLE HIGGINS. ___ _ COURT LEVY COUNTY JOURNAL CLASSIFIED & LEGALS THURSDAY, OCTOBER 5, 2006 Page 15 Legals 90| NOTICE OF APPLICATION FOR TAX DEED. NOTICE IS HEREBY GIVE that the holders) of Certifi6a number 2399 of the sale of 199 has (have) filed said Certifica for a Tax Deed to be issu thereon. The name(s) of t holders) of said Certifica the description of the proper and the name(s) in which it assessed are as follows: NAME(S) OF CERTIFICA HOLDERSS: JACQUELINE GILREATH. LEGAL DESCRIPTION ( THE PROPERTY: LOT BLOCK 8, THE REPLAT ( WILLISTON HIGHLANDS UNr 5, ACCORDING TO THE PL THEREOF RECORDED PLAT BOOK 4, PAGE 5, PUBL RECORDS OF LEVY COUNT FLORIDA. TOGETHER WIl A 1975 LONG MOBILE HOM BEARING ID #002751444 AN TITLE #1011011.9,. PARCI #09489-005-00. NAME(S) IN WHICH ASSESSED: STEPHEN CHERRIS EST. All of said property being in t County of Levy, State of Florid Unless such Certificate sh be redeemed according to la the property described in su Certificate will be sold to t highest bidder in the Courthou lobby on Monday, the 13th d of November, 2006, betwe the hours of 11:00 A.M. and 2: P.M. DATED this 25th day September, 2006. DANNY J. SHIPP CLERK OF CIRCLE COURT LEVY FLORIDA ,Pub.: Oct. 5, 12, 19, 20.6 if0,- T COUNT and ; c '(,o NOTICE OF APPLICATION FOR TAX DEED NOTICE IS HEREBY GIVEN, that the holders) of Certificate number 719 of the sale of 1999 #115, UNIVERSITY ESTATES, AN UNRECORDED SUBDIVISION IN LEVY COUNTY, FLORIDA, BEING MORE PARTICULARLY DESCRIBED AS FOLLOWS: THE WEST 1/2 OF THE SOUTHEAST 1/4 OF THE SOUTHWEST 1/4 OF THE NORTHWEST 1/4 OF THE NORTHEAST 1/4 OF SECTION 15, TOWNSHIP 12 SOUTH, RANGE 17 EAST, LEVY COUNTY, FLORIDA, PARCEL #03408-117-00. NAME(S)INWHICHASSESSED: S VICTOR M. HERNANDEZ SANZAND GERTRUDIS M. DE HERNANDEZ. September, 2006. DANNY J. SHIPP CLERK OF CIRCUIT COURT LEVY FLORIDA Pub.: Oct. 5, 12, 19, 2006 COUNTY, and 26, NOTICE OF APPLICATION' FOR TAX DEED NOTICE IS HEREBY GIVEN, that the holders) of Certificate number 676 of the sale of 1999 has (have) filed said Certificate for a Tax Deed to be issued I thereon. The names) of the holders) of said Certificate, the description of the property, and the name(s) in which it is assessed are as follows: S NAME(S) OF CERTIFICATE HOLDERSS: WILLIAM A. GILREATH REV. TRUST. Ne LEGAL DESCRIPTION OF te THE PROPERTY: THE EAST 9te 1/2 OF THE NORTHEAST 1/4 ed OF THE SOUTHWEST 1/4 OF he THE NORTHWEST 1/4 OF THE e, NORTHWEST 1/4 OF SECTION ty, 12, TOWNSHIP 12 SOUTH, is RANGE 17 EAST, LEVY COUNTY, FLORIDA, PARCEL #03400-151-00. TE E. NAME(S) IN WHICH ASSESSED: LUIS TORNES, JR.. OF 6, All of said property being in the OF County of Levy, State of Florida. lIT Unless such Certificate shall 1IT AT be redeemed according to law, IN the property described in such IC Certificate will be sold to the -, highest bidder in the Courthouse TH lobby on Monday, the 13th day VE of November, 2006, between Sthe hours of 11:00 A.M. and 2:00 EL P.M. - DATED this 25th day of September, 2006. ;H DANNY J. SHIPP J. CLERK OF CIRCUIT COURT LEVY COUNTY, he FLORIDA a. Pub.: Oct. 5, 12, 19, and 26, 2006 all Iw, NOTICE OF PUBLIC SALE ch he Todd Hubbard d/b/a Kip's Mini- se Storage, pursuant to the provi- ay sions of the Florida Self Storage en Facility Act (Fla. Stat. 83.801 et 00 sec.) hereby gives notice of sale under said Act to wit: of On Oct. 28, 2006 at Kip's Mini- Storage, 13645 N.W. Hwy #19, Chiefland, FL, Todd Hubbard lIT or his agent will conduct a sale at 10:00 a.m. by sealed bids. rY, Bids to be opened by Noon, with viewing from 9:00 a.m. until 26, 10:00 a.m. for the contents of ,;. the bay or bays, rented by the Following person/persons: I-r *A -lI'(I "N' - Latrice Watkins 4 N.E. 13 Ave. Chiefland, FL 32626 Tonya Akins 9809 SW 51 Ave. Trenton, FL 32693 ScotAdsitt P.O. Box 1419 Old Town, FL 32680 John Friskey P.O. Box 819 Cross City, FL 32628 Joseph Leonardo 8815 SE 144 St. Summerfield, FL 34491 Consists of household, personal items or miscellaneous merchan- dise, stored at Kip's Mini-Storage, 13645 N.W. Hwy #19, Chiefland, FL. Sale is being held to satisfy a statutory lien. Kip's Mini Storage 13645 NW Hwy #19 Chiefland, FL 32626 Phone: (352) 490-9592 Pub: Oct. 5,12, 2006 NOTICE OF ENACTMENT OF ORDINANCE 2006-08 BY THE BOARD OF COUNTY COMMISSIONERS OF LEVY COUNTY, FLORIDA. NOTICE IS HEREBY GIVEN the proposed Ordinance relating to the Levy County Code provisions governing traffic and vehicles, the title for which hereinafter appears, will be considered for enactment by the Levy County Board of County Commissioners, at a public hearing on Tuesday, October 16, 2006 at 9:30 hours or contact by phone at (352) 486- 5217. On the date, time and place first above-mentioned, all interested persons may appear and be heard with respect to the proposed Ordinance. ORDINANCE NO. 2006-08 AN ORDINANCE OF LEVY COUNTY, FLORIDA, PROVIDING THAT THE LEVY COUNTY CODE CHAPTER 90 (TRAFFIC AND VEHICLES), BE AMENDED BY ADDING SECTION 90-3 (ATVS PROHIBITED ON UNPAVED ROADS); PROVIDING FOR EXEMPTION OF LEVYCOUNTY FROM THE PROVISIONS OF SECTION 316.2123, FLORIDA STATUTES, WHICH OTHERWISE WOULD ALLOW, ATV USE ON UNPAVED ROADS WITH SPEED LIMITS OF LESS THAN 35 MPH; Commissioners Administration Office at (352) 486-5218. Nancy Bell, Chair Levy Co. Board of County Commissioners Pub. Oct. 5, 2006 IN THE CIRCUIT COURT OF THE EIGHTH JUDICIAL CIRCUIT, IN AND FOR LEVY COUNTY, FLORIDA. CASE NO. 38-2006-CA-000667 DANIEL JACOBS, Plaintiff, vs. JOSEPH J. AVINO, JAMIE RIVERA-COLON, a/k/a JAIME RIVERA-CQLON, if married, if alive, and if dead, their respective unknown spouse, heirs, devisees, grantees, creditors and all other parties claiming by, through, under or against them individually, Defendants. ,W- NOTICE'OPIACTION! I TO: JAMIE RIVERA-COLON a/k/a JAIME RIVERA-COLON N. TEXIDOR NO. 1760 URBANIZACION SANTIAGO IGLELIAS RIO PIDRAS PUERTO RICO 00921 YOU ARE NOTIFIED that a Complaint to Quiet Title as to the following described lands in Levy County, Florida: Tract No: 147, legally described as: The W i of the NE % of the NW % of the SW 4 of the NE %, of Section 10, Township 12 South, Range 17 East, Levy County, Florida. TAX PARCEL # 03394-133- 00 has been filed against you and you are required to serve a copy of your written defenses, if any, on RONALD W. STEVENS, Plaintiffs attorney, whose address is Post Office Box 1444,. Bronson, FL 32621, on or before November 10, 2006, and file the original with the Clerk of this. Court either before service on Plaintiffs attorney or immediately thereafter; otherwise a default will be entered against you for the relief demanded in the Complaint. WITNESS my hand and the seal of this Court' on September 29, 2006. DANNY J. SHIPP Clerk of Court By: Gwen McElroy Deputy Clerk Pub: Oct. 5, 12, 19, 26, 2006 PUBLIC HEARING The City Commission of the City of Chiefland will hold a Public Hearing on October 9, 2006 at 6:00 PM at City Hall, 214 East Park Avenue. The purpose of the Public Hearing is to read the final reading of Ordinance Number 06-17, creating Section 6-8 of the Code of Ordinances relating to the sale of alcoholic beverages and providing for the continuation of nonconformities caused by annexation of property by the City. If any person appeal the decision Commission he/she record of proceedir purpose and he/she ensure that a verbal the proceedings is I record includes th and evidence upor appeal is to be base decides to I of the City will need a igs for such may need to tim record of made, which e testimony n which the dd. In accordance with the Americans with Disabilities Act, individuals with disabilities needing a reasonable accommodation to participate in this proceeding 'should contact the office of the City Manager at City Hall, 214 East Park Avenue, Chieflarid, FL 32626 (352) 493- 6711. The proposed Ordinance can be inspected'during regular business hours at'City Hall, 214 East Park Avenue. Oct. 5, 2006 IN THE CIRCUIT COURT OF THE 8TH JUDICIAL CIRCUIT IN AND FOR LEVY COUNTY, FLORIDA PROBATE DIVISION File Number; 38-2006-CP-0189 IN RE: ESTATE OF SANTOS MENDOZA- MORALES,; Deceased. NOTICE TO CREDITORS You are hereby notified that the administration of the Estate of SANTOS MENDOZA- MORALES, Deceased, whose date of-death was. August 29, 2005, is pending in the Circuit Court of the Eighth (86) Judicial Circuit in and for Levy County, Florida, Probate Division, the address of whidh is Levy County Courthouse, 355 South Court Street, Bronson, Florida 32621, File Number 38-2006-CP-0189. The nare of the Personal Representative and the name and address of the Personal Representative's attorney are set forth below. AlIl creditors of the Decedent, SANTSM ,r,: MEN rQ;,-,, Mgf1L pRac[,,otheh r,B%9nri? who have claims or demands against the Decedent's estate, including unmatured, contingent or unliquidated claims, and who have been seized a copy of this Notice, must file their claims with this Honqrable Court, ON OR BEFORE THE LATER OF THE DATE THAT IS THREE (3) MONTHS AFTER THE DATE OF THE FIRST. PUBLICATION OF THIS NOTICE OR THIRTY (30) DAYS AFTER THE DATE OF SERVICE OF A COPY OF THIS NOTICE ON THEM. All other creditors of the Decedent, SANTOS MENDOZA- MORALES, and- other persons who have claims or demands against the Decedent's estate, including unmatured, contingent- or unliqidated Representative for S, Estate of SANTOS MENDOZA- MORALES M. TAMARA RIMES, ESQUIRE Attorney i for Personal Representative, Law Offices of Seller, Sautter, Zaden & Rimes, 2850 North Andrews Avenue Wilton Manors, Florida 33311 Telephone Number: (954) 568- 7000 Florida Bar Number: 896950 Pub: Oct. 5, 12,,2006 IN THE CIRCUIT COURT OF THE 8TH JUDICIAL CIRCUIT IN AND FOR LEVY COUNTY, FLORIDA PROBATE DIVISION File Number: 38-2006-CP-0190 IN RE: ESTATE OF TERESA CRUZ-SANDOVAL, Deceased. NOTICE TO CREDITORS You are hereby notified that the administration of the Estate of TERESA CRUZ-SANDOVAL, Deceased, whose date of death was August 29, 2005, is pending in the Circuit Court of the Eighth (81h) Judicial Circuit in and for Levy County, Florida, Probate Division, the address of which is Levy County Courthouse, 355 South Court Street, .Bronson, Florida 32631. The name of the Personal Representative and the name and address of the Personal Representative's attorney are set forth below. All creditors of the Decedent, TERESA CRUZ-SANDOVAL,, TERESA CRUZ- SANDOVAL,Representative for Estate of TERESA CRUZ-SANDOVAL M. TAMARA RIMES, ESQUIRE Attorney for Personal Representative Law Offices of Sellers, Sautter, Zaden & Rimes 2850 North Andrews Avenue Wilton Manors, Florida 33311 Telephone Number:.(954) 568- 7000 Florida Bar Number: 896950 Pub: Oct. 5, 12, 2006 . Levy Land Transactions 9/12/06 9/14/06 Transaction Code: AAA-Agree Additional Advances, A-Assignment, AAD- Assign Agree Deed, ACT-Amended Certificate of Title, AD-Agree Deed, AI-Assumption of Indebtedness, CD-Correctory Deed, CT-Certificate of Title, D-Deed, E-Easement, FJDX-Final Judgment Divorce X, MMA-Mort- gage ModifyAgreement, NL-Notice of Limitation, PX Probate X, QCD-Quit Claim Deed, TD-Tax Deed, TBRD-Timber Deed, WD-Warranty Deed WD, $15,000.00, L15(13) OAK RIDGE ESTATES Grantee(s): SIMON COLLINS ANGELA, COLLINS ANGELA SIMON Grantor(s): ROBERTS MICHAEL WD, $10.00, L10-11(17) J.B. EPPERSON ADDITION TO WILLISTON Grantee(s): FLOYD SHELLIN STEPHENS Grantor(s)! STEPHENS VIRGINIA, CASEY DORIS WD, $10.00, L135(B) WHITTEDS ESTATES Grantee(s): BUNTON CHARLES Grantor(s): PERKINS GERY LINDA, PERKINS ROBERTJ M, $35,000.00, L135(B) WHITTEDS ESTATES, W/MH Grantee(s): CAPITAL CITY BANK Grantor(s): BUNTON CHARLES SWD, $10.00, L7(88) WILLISTON HGH G&CC ESTATES Grantee(s): KUHNS JOINT TRUST, KUHNS LEONARD D TRUSTEE, KUHNS SAlNDRAL TRUSTEE Grantor(s): KUHNS SANDRAL, KUHNS LEONARD, ,,,. .., M, $108,600.00, L3 SOUTHERN PINES Grantee(s): COUNTRYWIDE HOME LOANS INC, MERS, MORTGAGE ELECTRONIC REGISTRATION SYSTEMS INC Grantor(s): BROWN AUBREY N, STURGEON DEBORAH L M, $25,000.00, BDYNW1/4 SW1/41-13-14, PARCEL #01149-002-OA, ETC Grantee(s): COUNTRYWIDE BANK NA, MERS, MORTGAGE ELECTRON- IC REGISTRATION SYSTEMS INC Grantor(s): BOWEN.GEORGIA, BOWEN CURTIS D WD, $135,000.00, BDY L6-7 BRONSON HTS SD & BDY 22-12-17, ETC Grantee(s): PARTIN VICTOR GLENN Grantor(s): PARTIN FLORENCE S, PARTIN PRESTON M M, $135,000.00, BDY L6-7 BRONSON HTS SD & BDY 22-12-17, ETC Grantee(s): MARTIN FLORENCE S, PARTIN PRESTON M Grantor(s): PARTIN VICTOR GLENN M, $100,000.00, BDY L6-7 BRONSON HTS SD & BDY 22-12-17, ETC Grantee(s): ABRAMS LEHN E TRUSTEE Grantor(s): PARTIN VICTOR GLENN M, $25,000.00, BDY SWI/4 SE1/4 26-14-13, ETC Grantee(s): DRUMMOND COMMUNITY BANK Grantor(s): BARRY CHARLES M SM, $92,853.91 L9(38) UNIVERSITY OAKS, W/MH Grantee(s): U S BANK NA Grantor(s): KALINOWSKI FRANCIS R, KALINOWSKI MICHELENE A WD, $40,000.00, L1-2(37) OAK RIDGE ESTATES Grantee(s): CENTRAL STATE CONSTRUCTION INC Grantor(s): NORTON MAURICETTE A WD, $242,000.00, BDYNE1/4 NE1/44-17-16, PARCEL #03104-000-00 Grantee(s): PETERS MICHAEL, PETERS MARGARET R CONKLIN, CONK- LIN PETERS MARGARET R Grantor(s): FURSE MARILYN K, FURSE WILLIAM J JR M, $229,900.00, BDYNE1/4 NE1/44-17-16, PARCEL #03104-000-00 Grantee(s): WELLS FARGO BANK NA Grantor(s): PETERS MICHAEL, PETERS MARGARET R CONKLIN, CONK- LIN PETERS MARGARET R M, $57,272.60 L6(1) UNIVERSITY ESTATES,W/MH Grantee(s): WACHOVIABANK NATIONAL ASSOCIATION Grantor(s): RALEY JAMES E, RALEY JAMES W, RALEY VICTORIA M M, $163,000.00, L9(1) EASTSIDE ESTATES Grantee(s): ACCESSIBLE MORTGAGE INC Grantor(s): WOLFGRAM DONALD A, WOLFGRAM THERESA R D, $100.00, L46-47 CAROLYN SD, ETC Grantee(s):, BISHOP OF THE DIOCESE OF ST AUGUSTINE, GALEONE VICTOR Grantor(s): BONEMA CAROLINE M, BONEMA CAROLINE M TRUSTEE CAROLINE M BONEMA REVOCABLE LIVING TRUST Continued on page 16 NOTICE OF ELECTION Be it known that the Levy County Board of County Commissioners, Levy County, Florida, does hereby give notice that an election will be held on November 7, 2006, to hold a public referendum to determine whether it may grant economic ad valorem tax exemptions under s.3, Article VII of the State Constitution. ECONOMIC DEVELOPMENT AD VALOREM TAX EXEMPTION Shall the Board of County Commissioners of Levy County be authorized to grant, pursuant to s.3, Art VII of the State Constitution, property tax exemptions to new businesses and expansions of existing businesses? Yes For authority to grant exemptions. S No Against authority to grant exemptions. Page 16 LEVY COUNTY JOURNAL CLASSIFIED & LEGALS THURSDAY, OCTOBER 5, 2006 Levy Land Transactions WD, $50,000.00, L25(B) CASONS INGLIS ACRES #5 Grantee(s): TATE ANDREW Grantor(s): WILLIAMS JOHNNY- CT, $65,000.00, 38-06-CA-223, L5-7(38) OCALA HGH WEST, WIMH Grantee(s): MID OHIO SECURITIES, RICHARD H WHITE IRA Grantor(s): CLERK OF COURT DANNY J SHIPP, HAND KAREN LEE, WAYNE FRIERS 13 STREET MH SALES INC, WAYNE FRIERS 13TH STREET MOBILE HOME SALES INC CT, $100.00, 38-04-CA-362, BDY SW U4 SEl/5 26-10-14, W/MH Grantee(s): NATIONAL CITY BANK OF INDIANA Grantor(s): BARLATTO MICHAEL J, CLERK OF COURT DANNY J SHIPP, LYNCH JOSHUA, LYNCH LELAANNE WD, $6,995.00, L7-9(F) COLFAX CITY Grantee(s): ASBELL GAIL H Grantor(s): GILREATH JACQUELINE W TRUSTEE, WILLIAM A GILREATH REVOCABLE TRUST WD, $3,695.00, L89(8) UNIVERSITY ESTATES Grantee(s): BAKER RUDI ANN Grantor(s): GILREATH JACQUELINE W TRUSTEE, WILLIAM A GILREATH REVOCABLE TRUST WD, $5,000.00, BDY NE1/4 NW1/4 25-14-17, PARCEL 03743-039-00, 03743-081-OA, ETC Grantee(s): OFFII T MARIE, 01111 T GEORGE JR Grantor(s): GOLDING MARY R QCD, $10.00, L17(124) WILLISTON HGH G&CC ESTATES Grantee(s): A& D INVESTMENTS LLC Grantor(s): CHIN ANGELA, CHIN DONALD QCD, $20,000.00, L62 CARSON INGLIS ACRES #4 Grantee(s): SUTTON MARVIN R Grantor(s): GOUDREAU JEAN PEGGY QCD, $15,000.00, L1(8) KNOTTS LAND CO SD OF YANKEETOWN Grantee(s): SUTTON MARVIN R Grantor(s): BRATTEN DONNA MARIE, BRATTEN JEFFORY P WD, $100.00, L82(10) FANNINS SPRINGS ANNEX, W/MH Grantee(s): ANKLAM DENNIS DEAN, SPIVEY BOBBIE JEAN Grantor(s): SPIVEY BOBBIE JEAN, PARTLOW RUSSELL LEROY WD, $49,000.00, L5(3) CEDARHAVEN ESTATES Grantee(s): BUSINESS WINNER LLC Grantor(s): WHITTALL LAURA E, WHITTALL DONALD E CD, $10.00, L6(3) TOWN OF CEDAR KEY, ETC Grantee(s): MARIGOLD TRUST, MIKELL VONDOLTEREN TRUSTEE, WHITTALL LAURA EMERSON TRUSTEE Grantor(s): WHITTALL LAURA E, WHITTALL DONALD E WD, $1,200.00, BDY L16(31) CHIEFLAND DEVELOPMENT COMPANY ADD, BDY 36-11-14 Grantee(s): STATE OF FLORIDA DEPARTMENT OF TRANSPORTATION Grantor(s): WARE OIL AND SUPPLY COMPANY, WARE OIL AND SUPPLY COMPANY INC QCD, $10.00, BDY 6-17-16, PARCEL #03127-000-00, ETC Grantee(s): OESTERLE RALPH E II Grantor(s): OESTERLE CLARA R QCD, $11,000.00, BDY SEl/4 NW U4 10-12-17 Grantee(s): LIVONI RICHARD, KIRBY DARYL Grantor(s): RIVERA NYDIA MARIA CAPO QCD, $10.00, BDY NE1/4 NE1/4 26-13-17, PARCEL #03680-000-00, ETC Grantee(s): DOUGLAS FRANKIE, DOUGLAS EPHRIAM MCCOY Grantor(s): DOUGLAS EPHRIAM MCCOY WD, $5,000.00, L8(30) WILLISTONHGH#14 Grantee(s): LIVONI RICHARD, KIRBY DARYL Grantor(s): NOWAK JOSEPH M, $114,000.00, L12(14) UNIVERSITY OAKS Grantee(s): FLORIDA CITIZENS BANK Grantor(s): INKS SHERI, INKS SHERI L M, $15,600.00, L12(14) UNIVERSITY OAKS Grantee(s): LEVY COUNTY Grantor(s): INKS SHERI L WD, $4,000.00, BDYNEl/4 SW1/429-11-17, PARCEL #03233-113-0 Grantee(s): COLLINS JEFFREY L Grantor(s): STANLEY ELIZABETH T, STANLEY GEORGE H M, $47,500.00, L9(134) WILLISTON HGH G&CC ESTATES Grantee(s): FLAGSTAR BANK FSB Grantor(s): PHELPS RHEA C JR, PHELPS LOLETA M CD, $100.00, OR 689/386, L69(6) FANNIN SPRINGS ANNEX Grantee(s): COLLINS JEFFREY L Grantor(s): KAPIGIAN BETTY J, WILLIAMS BETTY) WD, $185,000.00, L9(134) WILLISTON HGH G&CC ESTATES Grantee(s): PHELPS LOLETA M,PHELPS RHEA C JR Grantor(s): STEVE SMITH CONSTRUCTION INC M, $137,500.00, L9(134) WILLISTON HGH G&CC ESTATES Grantee(s): CONTEMPORARY MORTGAGE SERVICES INC, MFRS, MORTGAGE ELECTRONIC REGISTRATION SYSTEMS INC Grantor(s): PHELPS LOLETA M, PHELPS RHEA C JR CD, $10.00, BDY SE1/4 W1/4 3-12-17, PARCEL #03282-041-00 Grantee(s): ROPPOCCIO JODI, ROPPOCCIO RONALD Grantor(s): BURDA KENNETH M, $101,246.00, L15 WATSON VILLAGE SD Grantee(s): TAYLOR BEAN & WHITAKER MORTGAGE CORP,-MFRS, MORTGAGE ELECTRONIC REGISTRATION SYSTEMS INC Grantor(s): DOCKERY MICHAEL M, $51,400.00, L4(4) KEY CEDAR HTS, W/MH Grantee(s): TAYLOR BEAN & WHITAKER MORTGAGE CORP, MFRS, MORTGAGE ELECTRONIC REGISTRATION SYSTEMS INC Grantor(s): LOMBARDO RHONDA MEEKS WD, $26,700.00, L454 UNIVERSITY ESTATES, BDY 12-12-17 'Grantee(s): ANGULO ZAIDA Grantor(s): DOPPLERDAVE INC M, $26,651.78 L454 UNIVERSITY ESTATES, BDY 12-12-17 Grantee(s): WACHOVIA BANK NATIONALASSOCIATION Grantor(s): ANGULO ZAIDA WD, $25,000.00, BDYNE1/4 W1/4 18-12-17 Grantee(s): RODRIGUEZ LISA, RODRIGUEZ MARK Grantor(s): THOMAS LA, THOMAS KENNY, STRONG SHARON, SCHUL- ER SHIRLEY M, $21,750.00, BDYNE1/4 W1/4 18-12-17, PARCEL #03519-000-00 Grantee(s): CAMPUS USA CREDIT UNION Grantor(s): RODRIGUEZ LISA, RODRIGUEZ MARK M, $187,425.00, LI SHADY LANE, Grantee(s): FREMONT INVESTMENT & LOAN, MFRS, MORTGAGE ELEC- TRONIC REGISTRATION SYSTEMS INC Grantor(s): RAIN WILLIAM H Grantor(s): RAIN ANGELA G M, $108,000.00, L6(4) WOODPECKER RIDGE Grantee(s): LENDING CENTER, MFRS, MORTGAGE ELECTRONIC REG- ISTRATION SYSTEMS INC, FIRST NLC FINANCIAL SERVICES LLC Grantor(s): MCBRIDE BEVERLY K QCD, $10.00, BDY E1/2 SW 1/4 35-10-14, PARCEL #00519-004-00, ETC Grantee(s): BUONO KATHY, BUONO KEITH Grantor(s): BUONO KATHY, BUONO KEITH M, $183,000.00, BDY E1/2 SW1/435-10-14, ETC Grantee(s): MORTGAGE LENDERS NETWORK USA INC, MFRS, MORT- GAGE ELECTRONIC REGISTRATION SYSTEMS INC Grantor(s): BUONO KATHY,BUONO KEITH QCD, $10.00, L15, BDY L14(E) PINEHURST SD Grantee(s): HILL EVELENA.. Grantor(s): HILL MADE LEE, WILLIAMS MADE LEE M, $76,500.00, L15, BDY L14(E) PINEHURST SD Grantee(s): FREMONT INVESTMENT & LOAN, MERS, MORTGAGE ELEC- TRONIC REGISTRATION SYSTEMS INC Grantor(s): HILL EVELENA M, $147,200.00, BDYNE1/4 SW1/432-14-16, PARCEL #02722-001-OC Grantee(s): OWNIT MORTGAGE SOLUTIONS INC, MERS, MORTGAGE ELECTRONIC REGISTRATION SYSTEMS INC Grantor(s): TUCCI TRACY, TUCCI GEORGE M, $80,750.00, L20(4) EAST WILLISTON Grantee(s): FREMONT INVESTMENT & LOAN, MERS, MORTGAGE ELEC- TRONIC REGISTRATION SYSTEMS INC Grantor(s): MANN GERTIE BELL, MANN BOOKER T WD, $47,000.00, LS BUCKWHEAT ESTATES,W/MH Grantee(s): CLINE VICTOR D JR, CLINE CANDACE M Grantor(s): DEAL FAMILY REVOCABLE TRUST, DEAL BUFORD M TRUST- EE, DEAL JENNIE ELIZABETH TRUSTEE M, $47,000.00, L5 BUCKWHEAT ESTATES, W/MH Grantee(s): DEAL FAMILY REVOCABLE TRUST, DEAL BUFORD M TRUST- EE, DEAL JENNIE ELIZABETH TRUSTEE Grantor(s): CLINE VICTOR D JR, CLINE CANDACE M WD, $10.00, BDY 20-12-18, PARCEL #04103-000-00(PART OF), ETC Grantee(s): MORGAN JADE S, MORGAN MICHAELS Grantor(s): HUBER PAMELA G, HUBER GEORGE JAY WD, $10.00, BDY 20-12-18, PARCEL #04103-000-00(PART OF), ETC Grantee(s): CRAMER BRENT, CRAMER LINDA JANE, STEELE CHERYL, STEELE JOHNIE Grantor(s): HUBER PAMELA G, HUBER GEORGE JAY WD, $69,640.00, L7 SUNSHINE ESTATES ADD #1, W/MH Grantee(s): MALMEN YVONNE, MALMEN JOHN Grantor(s): J 0 T LLC M, $73,552.29 L7 SUNSHINE ESTATES ADD#1,W/MH Grantee(s): DRUMMOND COMMUNITY BANK Grantor(s): MALMEN YVONNE D, MALMEN JOHN WD, $5,900.00, L9-10(A) PINEHURST SD Grantee(s): BROWN VONICAR Grantor(s): RUSSELL MARILYN, DALLAS RUDOLPH M, $1,300,000.00, L8-13,38-42(H) ELEANOR VILLAGE Grantee(s): INDEPENDENT BANKERS BANK OF FLORIDA Grantor(s): DRUMMOND BANKING COMPANY, DRUMMOND COMMU- NITY BANK QCD, $68,100.00, L22 COUNTRYSIDE ESTATES Grantee(s): KENNEDY JEFFREY W, KENNEDY ALISSA D Grantor(s): KENNEDY ALISSA D Continued on page 19 NOTICE OF PUBLIC HEARING A Public Hearing regarding the Enterprise Zone will be held at Chiefland City Hall, 214 East Park Avenue, Chiefland, FL on Monday, October 9, 2006 at 6 p.m. The proposed areas) are from Williston encompassing the Williston Industrial Airport, Alternate 27 [highway only] up to Bronson incorporating three commercial nodes and the Alt. 27 route in the city limits. The second area is in Chiefland, indicating major industrial/commerlcal areas incorporating the Industrial Park and the corridor leading into Fanning Springs. These areas will be modified as needed to meet the criteria of the application and comport to the County's Comprehensive Plan. The actual nominated areasare in rough draft at this time. STRATEGIC PLAN Description of the community's goals for: Monitoring of municipality utility reports, municipality occupational licenses, leases on compatibly used property, change of zoning requests for compatible zoning usage, Florida Enterprise Zone report to track those businesses requesting zone wage credit, and surveys [workforce, grants, etc].. Goal #4 -AffordableAirport Layout Plan o US41/SR45 currently being resurfaced and improved by FDOT in Williston *Goal #7 Expansion.ofUtility put migration, lack of technical and/or vocation training in Levy County,'additional incentived'needed compete Tegionallyand state- wide. Affordable housing inventory non-existent. Verification that local institutions and organizations participated in the planning process and will be partners in implementing the Strategic Plan. The Enterprise Zone'Development Agency, Levy County Board of County Commission, City of Bronson, City of Chiefland, governing body to enact local fiscal and regulatory incentives. These incentives may include: the municipal public service tax exemption provided by s. 166.231, the dfco.omic loans to businesses for revitalization, and Municipal public service tax exemption Identification of the local and private resources available in the Nominated Area. Enterprise Zone Development Agency; Chamber of. PROPOSED ENTERPRISE ZONE Identification of the baseline data and benchmarks for measuring the success of the strategic Baseline Data: Enterprise Florida incorporated, public & private utility companies, municipal occupational licenses, Bureau of Economic & Business Research, UF, Levy County Housing Authority, USDA, HUD, FHA, State Housing Initiative Program (SHIP); building permit reports from the County and Municipalities will provide benchmark results. Benchmark: The measurement will be of generally approved qualitative and quantitative methods in support of the mirketifg plan o Local newspaper advertising o Statewide publications o Website o Radio/TV media o Collateral media Loans, grants & other financial assistance from local, state, and federal governments. Execute contracts as.are necessary with the Implementation of the strategic plan. Identification of resources supporting the proposed activities of economic human and community development. The North Florida Rural Area of Critical Economic Concern (RACEC) makes up 13 counties of "Counties of Critical Economic Concern,: Enterprise Zone Development Agency on 10/10/06 at 9 a.m. Levy Abstract & Title, 50 Picnic Street, Bronson, FL. Publish: Oct.,,,,2006 For information contact: Pamela W. Blair, Executive Director Nature Coast Business Development Council, Inc. Enterprise Zone Development Agency PO Box 1112 Bronson, Florida 32621 (352) 486-5470 Office (352) 486-5471 Fax (352) 572-8072 Cell I LEVY COUNTY JOURNAL AROUND LEVY COUNTY *' ;,A', , THURSDAY, OCTOBER 5, 2006 Quilters entertain law enforcement agents BY WINNELLE HORNE CORRESPONDENT Log Cabin Quilters met Thursday, Sept. 28, at the Levy County Quilt Museum. Several quilt tops were brought in and will be for sale. We' also have another small house donated. We still don't know what we will do with it. Quilting will go on each week and we hope to have them finished by Quilt Show Time. We were' honored to have Sheriff Johnny Smith, Chiefland Chief of Police Robert Douglas, Lt. Jeremy Anderson of the Chiefland Police Department and Lt. Scott Anderson of Levy County Sheriff's Department to have lunch with us. We met them at Law Appreciation night and they were promised chicken and dumplings. It's great to know we have these men to keep us safe; they do a job that puts them on the line everyday. We say thank you for a great job and we know they will keep it up. Jarrod and 10 boys were out Tuesday and they got the yard looking great. They cleaned flowerbeds, trimmed roses and so much more. It's great to teach some of these boys who have never done ,much in a yard and see what a wonderful job they do. Lunch was ajob of deciding on what to eat: chicken and dumplings, potato and corn fritters, cheese and macaroni, four kinds of potato salad, chicken salad, coleslaw, beans, pecan cake, pumpkin cake, lemon cake, persimmons and so much more. We had 14 members and four guests present. Winnelle Horne is the director of the Levy County Quilt Museum, Inc. Charlie Dean will speak at Oct. 21 GOP luncheon Charlie Dean, State House Representative, District 43 will be the guest speaker at the next meeting of The Yankeetown- Inglis Republican Club. The meeting is Saturday, Oct. 21 at noon, at the Inglis Community Center, which is behind Inglis Town Hall on Hwy. 40. Please note that the group is not meeting at the Y-I Woman's Club House. Lunch of Black Angus baked ham, sweet and/or white potatoes, salad, veggie, dessert and beverage will be available for $5 per person. Please call Edith at 447-2622 or Scotty at 447-2895 to allocate your space. Tourism council to meet J aiiiwinublo qu doi ns. ide. o ,.si '.ilc i,; iw-c vionii i0 ;i!( . IThe Levyogunty-nTo;e rst-eveloplm ent-ouinil will hold a special meeting on Thursday, Oct. 5 at 10 a.m. at the Levy County Visitor's Bureau, 620 N. Hathaway Avenue, Bronson. The meeting is open to the public. h e I I SI Nancy Bell Westbury Enrolled Agent * Personal and Business Tax Returns * Partnership & Corporate Tax Returns * Computerized Monthly Accounting New Monthly Clients Welcomed ! .712 North Main Street, Chiefland 493-4996 MR. AND MRS. WARREN JOHNSON Warren and Louise Johnson celebrate Diamond Anniversary Warren and Louise Johnson of Fanning:Springs celebrated their 60th wedding anniversary Friday, Sept. 29. They met in Seattle, Wash. when he was 10 and she 9. Both served in the U. S. Army: Louise in the Women's Army Corps, and the Canadian Army, Warren retired from the U.S. Army and the Central Intelligence Agency. Their four children, Karen Preston and her husband Richard, of Kentucky, both retired U.S. Army, Sandra Selby R.N., of Maryland, Rick Johnson of Kentucky retired U.S. Army and Mike Johnson of Florida all joined in the celebration. Of course it was a COMMAND performance; a milestone not to be missed, a family spokesman said. WWII vets meet Oct. 12 All World War II veterans are invited to meet Thutsday, Oct. 12 at 11:30 a.m., at Billie Jack's Restaurant-on US 27A in Williston. Ruby and Ed Duke of Trenton are the inewest members. He served his tour of duty in the U.S. Navy. Twenty-three members enjoyed our September meeting at the Carriage Inn. Bill Ingersoll and Luther Mills exchanged a few stories that go back some 65 years. Harry Simmons renewed a friendship with Ed Duke going back to the time they both lived in Archer. May Moyer arrived with her broken arm, having slipped on a throw rug. Dick g aes'ti' houtis tn p t Wasmt and all the great WW Itribut'es 'aidd: displays- awaitiig-:. Group histofian, Edie brought the three books that she has put together with our 14-year history. If you have any questions, call Dick Halvorsen, 352-542- 7697. BOAT INSURANCE lionra.'' |^^^%^^^^B^^~~ MkIEI~i~e Personal Commercial Randy Stefanelli Agency 493-2016yi. Ham radio license exam set. Church plans yard sale The Gulf Hammock Church of God will hold a yard sale on Saturday, Oct. starting at 7:30 a.m. west of Bronson on US 27. Come out and enjoy the day with us and shop until you drop. Women forming own cattle association Attention al atdiesi hathitight beHiterestedi in j oining the Florida Cattlewomen's Association. SLevy County is starting' a cattlewomen's group. The first meeting will be held on Thursday, Oct. 5 at 7 p.m. It will be held at Thomas Cattle Company. If you have any questions please feel free to call Ashley Bellamy at 352-494-1664. Is Preventative and emergency. veterinary care for all small animals and exotics M^SSE^^^ V 'p.-uwerch iefliwadnda imalhospifal.coaN4zKl 00 1. 11 Log cabin next to TirelMarl * REEN Cl L'~S Building and Development Your Custom Home Specialist Locally Owned and Operated By Steve and Karen Smith Office: (352) 486-4290 Mobile: (352) 538-1388 or (352)-538-3141 stevesmithconst@aol.com Personal Attention Quality Craftsmanship & Materials Framing and Concrete Finishing Let itbsaid"~mwiw Let it be wite U Equipment, Inc.r Come in and see or ask John about all your OUTDOOR POWER E4UIPEENT Phone: 352-493-4121 SFax: 352-493-9100 107 SW 4th Ave. Chiefland, FL. 32644 w~ea'!i~ ~. 'I / & "i' Page 17 0 CP~lrl -' imainospita E hieflan 12 74 N H Y.19 ./1 I Page 18 LEVY COUNTY JOURNAL AROUND LEVY COUNTY THURSDAY, OCTOBER 5, 2006 Peanut Festival is Saturday Williston is the place to be this Saturday, Oct. 7 from 9 a.m. until 4 p.m. as the town welcomes the 18' Annual Central Florida Fall Harvest & Peanut Festival. Admission is free and festival goers can enjoy Arts, crafts, food, fine art displays, horse drawn carriage rides, pony rides for children and an antique tractors display. There will be entertainment all day and the crowning of Little Peanut King and Queen and the baby pageant. For additional information, call 352-528-5552 Chiefland will discuss development Oct. 12 A joint workshop between the city of Chiefland Planning Board and city commissioners will be held Oct. 12 at 6:30 p.m. at city hall, 214 East Park Ave. The purpose of the workshop is to review and discuss the proposed development in Chiefland.. For more information contact Matt Brock or Mary Ellzey at 493-6711. Blackwoods in concert The First Baptist Church of Williston will host a Southern Gospel Sing on Oct. 216 at 6:30 p.m. The Blackwood Brothers Quartet was formed in 1934 with brothers Roy, Doyle, James and Roy's oldest son R.W. That heritage of gospel music izzs still carried on today as James' oldest son Jimmy joins tenor great Wayne Little, the smooth bass of Randy Byrd and the piano artistry of Brad White to present a modem-day version of the great quartet sound. A love offering will be received for the Blackwood Brothers Quartet. The Worship Center is located at 339 East Noble Ave. in Williston, just east of Billy Jack's and across the road from Perkins State Bank. --, 4-. -r ',,. .-,.. .. ;,._ School N!M Monday, Oct. 9 Rib-A-Que on Bun Tater Tots Buttered Corn Chilled Peaches Asst. Milk Tuesday, Oct. 10 Chicken Patty Mashed Potatoes w/Gravy Steamed Cabbage Chilled Mix Fruit Hot Cornbread Asst. Milk Wednesday, Oct. 11 Pizza Tater Tots Garden Salad Fresh Fruit Asst. Milk Thursday, Oct. 12 Spaghetti w/Meat Sauce Tossed Salad Green Beans Chilled Pears Hot Garlic Roll Asst. Milk Friday, Oct. 13 Chicken Nuggets Mashed Potatoes Green Peas Apple Crisp Homemade Rolls Asst. Milk *Guy Continued from page 7 I different, since after the baby is born is when the real sleep deprivation begins.) Angie started to push. Right off I was glad I had gone to the Lamaze class. Her breathing was all over the place. Frankly I'm not sure she would have corer." She pushed on Angie's side and immediately the head began to come out. "Hold on Mrs. Sheffield," she said in all her early morning freshness, "Don't get in a hurry. Let me get my scrubs on." I growled, and I think Angie did too. All my anger ceased in the coming moments. Little Kailey was born at 8 lbs. 10 ounces; so beautiful she instantly stole my heart. I turned to clutch Angie's hand. As our eyes met I believe we both realized our lives had been forever fused together. My love for her welled up in my heart and spilled over to roll down my cheeks. Angie and I would forever ride together on a higher plane now. She had been truly amazing; heroic in my eyes. The whole process had been miraculous; the conception, the pregnancy, and now concluding with the birth. I could not explain away what I had witnessed. had just witnessed the miracle of life, the labor of love, and the inherent struggle a woman willingly endures to bring them forth. Suddenly I became deeply aware of my role as a man regarding these matters of life and love. I was a husband. I was a dad. I was a little boy that had just brushed up against the hand of the God at work. Could I possibly walk away the same? But anyway, it wasn't long after our stay in the hospital that we began attending church as a family. Two years later I finally stopped running from who I was called to be and gave my life to Jesus. Ironically the Lord had used the birth of my child to help me put away my childish thinking. He helped me see the things that truly matter; life and love. He had shown me that neither can be found apart from Him. And he said unto me, It is done. I am Alpha and Omega, the beginning and the end. I will give unto him that is athirst of the fountain of the water oflife freely. He that overcometh shall inherit all things; and I will be his God, and he shall be my son. Revelation 21:6-7. Guy E..Sheffield, of Hernando, Miss,, is the president of the nonprofit ministry SoulFood. This Week's Feature DOUBLEWIDE MOBILE in Whitted Mobile-iHome Estatfes. 3BR, rSBA. 4 older home with roofover, screened porch, covered patios, detached carport and storage buildings. Priced right at $69,000 with owner financing to qualified buyer. BEAUTIFUL 5-ACRE parcel comes with this 2BR, 2 BA sin- glewide mobile home. Aluminum. roof over extends to encompass a 24'x24' carport. Rear screen porch overlooks park-like yard. A great deal at $110,000. Presented by Goss Williams Real Estate Inc. 102 S. Main Street, Chiefland 352-493-2838 K IWW 1I0 II IW I6 IW i[ Iho ho IK i IW IR Iho NIO I IWIho W K SBeautiful 4 BR/ 2.5 BA house in Williston E at 21350 NE 40th Ave., 1,630 sq. ft. with _ carport & bonus room on large corner lot. It is Q i 2 miles east of City Hall on C.R. 318. Listed for gj S. $125,000, thousands under appraisal! SHIP , S[ down payment assistance for moderate income families on this house is $15,600. Call [ Florida U.S.A. Realty, Inc. 352-378-3783. 1 IN II lB IB IB 1 IB I IB IB I IBI IBI IB I& IB IK h IB I- WANT TO BE IN TOWN? Home is located in City of Chiefland, close. to ,WaY.:IMa-,,JAnate Springs and Suwannee River. Home has been completely refinished walls have been redone, wiring, plumbing, as well as being painted inside and out. SReady to move into! $140,000 Location and Durability! This fine brick home is located just a couple of miles from Chiefland on a pave road! Yet it is on 1.13 acres for some room to roam! This is a must see home. Com- pact but great to fit any of your requests in a home! Call today i, -- . to see this one! $175,000 - F I PiiD.Relsae | C|ie$(52)43 1069,Sld Town (352)5421313 0 -. f^^ ^^ ^^ ^^ ^^^Ib TURN THIS... .FOR ISALE ...INTO THIS! Find your dream home in the Marketplace! L.Q ..t,&S L acres wooded) in Crenshaw Co., AL. ( 15 minutes~C I I ~ hunin e/tuke).Inluds0rato/bshog Aaee meyeia addition 4 aces.Idea fo hutin an i ma I i -r II I 7 -I_ ..... '. I "" LEVY COUNTY JOURNAL THURSDAY, OCTOBER 5, 2006 Land Transactions Page 19 M, $136,200.00, L22 COUNTRYSIDE ESTATES Grantee(s): QUICKEN LOANS INC, MERS, MORTGAGE ELECTRONIC REGISTRATION SYSTEMS INC Grantor(s): KENNEDY JEFFREY W, KENNEDY ALISSA D M, $195,000.00, BDY L16 BACKWATER FARMSITES, ETC Grantee(s):.OLD HARBOR BANK Grantor(s): LAMB CLAIRE M, LAMB MICHAEL T, WORKMAN CLAIRE M M, $112,000.00, L51 CASONS INGLIS ACRES #4 Grantee(s): COUNTRYWIDE HOME LOANS INC, MERS, MORTGAGE ELECTRONIC REGISTRATION SYSTEMS INC Grantor(s): LAY SHARON DIANE, LAY TERRY MIKE WD, $6,500.00, L20(2) OAK RIDGE ESTATES Grantee(s): N R L L EAST LLC Grantor(s): FROMETA CARIDADFROMETA JOSEE WD, $8,400.00, L8(2) GEORGE WILLIS ADDITION TO THE TOWN OF WILLISTON Grantee(s): CRABTREE EDWIN Grantor(s): CRABTREE LOUISE S WD, $50,000.00, L5(2) WOODPECKER RIDGE #2,W/MH Grantee(s): MICHAUX WARREN A Grantor(s): PORT INGLIS REALTY INC WD, $90,500.00, L2-3(F) RAYS SD #1REVISED Grantee(s): BUZBEE DONALD R, BUZBEE ALICIAA Grantor(s): RISHER CAROLYN, RISHER JAMES V M, $75,000.00, L2-3(F) RAYS SD #1REVISED Grantee(s): CAPITAL CITY BANK Grantor(s): BUZBEE DONALD R, BUZBEE ALICIAA M, $14,000.00, L1(50) WILLISTONHGH#12 Grantee(s): PERKINS STATE BANK Grantor(s): WALLACE BERNARD L D, $10.00, BDY SE1/4 SE1/4 16-14-16, ETC, PARCEL #02618-002-00 Grantee(s): LEO B SOWELL LIVING TRUST, SOWELL LEO B TRUSTEE Grantor(s): SOWELL LEO B WD, $10.00, BDY SE1/4 SW1/48-13-19, PARCEL #05116-004-00, ETC Grantee(s): HOWELL DIXIE, HOWELL TERREL Grantor(s): HOWELL DIXIE, HOWELL TERREL D M, $89,298.11 BDY SW1/4 SE1/4 8-12-17, ETC Grantee(s): CITIFINANCIAL EQUITY SERVICES INC Grantor(s): PARKER QUANDA CARNEGIE, PARKER QUINTON WD, $127,400.00, L1(63) UNIVERSITY OAKS Grantee(s): HENDERSON LAURA, HENDERSON JAMES M Grantor(s): FRIENDS OF LUBAVITCH OF FLORIDA M, $127,400.00, L1(63) UNIVERSITY OAKS Grantee(s): COUNTRYWIDE HOME LOANS INC,MERS, MORTGAGE ELECTRONIC REGISTRATION SYSTEMS INC Grantor(s): HENDERSON JAMES M, HENDERSON LAURA K QCD, $10.00, BDY 15, 14, 21, 22-12-15, PARCEL #01809-000-00, 01811- 000-00, 01827-000-00 01828-000-00 Grantee(s): WILLIAMS HERITAGE LLLP Grantor(s): EMILEE ANNE WILLIAMS IRREVOCABLE TRUST, THOMAS WESLEY WILLIAMS III IRREVOCABLE TRUST, VIRGINIA MCKEE WIL- LIAMS IRREVOCABLE TRUST, WILLIAMS ANNE E, WILLIAMS THOMAS W JR, WILLIAMS THOMAS W JR TRUSTEE WD, $10.00, BDY SW 1/4 SW 1/4 5-14-19, PARCEL #05279-000-00, ETC Grantee(s): ROBERT L JONES REVOCABLE TRUST, JONES ROBERT L TRUSTEE Grantor(s): JONES ROBERT L WD, $70,000.00, BDYNW1/4 NW1/425-10-14, ETC Grantee(s): AMES HELEN Grantor(s): HAYNES CINDY B, HAYNES BILL J MMA, $24,100.00, OR 952/84, L1(14) VIL GREEN THUMBS Grantee(s): WACHOVIA BANK NATIONAL ASSOCIATION Grantor(s): DOMENICO BRIDGETTE, DOMENICO BRIGETTE, DOMENI- CO JOSEPH A JR M, $20,971.50 L18 FOREST PARK #2,W/MH Grantee(s): PERKINS STATE BANK Grantor(s): EWING LOIS, WEBSTER MARK' M, $159,780.46 L8(A) STEEPLECHASE FARMS SD Grantee(s): WELLS FARGO FINANCIAL SYSTEM FLORIDA INC Grantor(s): WESA CAROL, WESA DONALD L QCD, $10.00, L1-3 30-32(3) OAK DALE HTS, BDY 36-11-17, PARCEL #06589-000-00 Grantee(s): JONES EUGENE B Grantor(s): ROBISON LEIKA WD, $100.00, L2 THE OAKS Grantee(s): COLE JAMES CLIFFORD JR, SMITH KATHERINE) Grantor(s): SMITH KIRBY S JR, SMITH KATHERINE J, COLE KATHER- INE) CD, $10.00, L9(13) OLD CHIEFLAND Grantee(s): REDMON CAROLYN, MEEKS JERRY W Grantor(s): DANIEL JERRY WD, $36,000.00, L21(A) SUNNY RIDGE Grantee(s): ALl MIR A, ALI MIR 0 Grantor(s): NARAIN JASMATTIE, NARAIN HEMAN F M, $29,000.00, L21(A) SUNNY RIDGE Grantee(s): NARAIN JASMATTIE, NARAIN HEMAN F Grantor(s): ALI MIR A, ALI MIR 0 WD, $10,000.00, L12(64) WILLISTON HGH G&CC ESTATES Grantee(s): LIVONI RICHARD, KIRBY DARYL Grantor(s): DE GARCIA CARMEN FELICIANO, GARCIAANGEL LUIS WD, $11,000.00, L 12(7) GREEN HGH PARK Grantee(s): BKE VENTURES INC Grantor(s): ORSINI CATERINA,ORSINI RENA M, $11,960.42 L1.2(7) GREEN HGH PARK Grantee(s): DRUMMOND COMMUNITY BANK Grantor(s): BKE VENTURES INC '. Keep on Flushing *- A&M Plumbing Enterprises Inc. Remodel, Re-Pipe, New Construction, Mobile Home Hook-Ups and Water Heaters. Serving the Tri-County area. Bronson (352)486-3509. Beware of slick lenders The number of home fore- closures around the nation has risen sharply in 2006 -- a sign of a cooling economy. It's also a sign that preda- tory home, mortgage, lenders "have been taking advantage of vulnerable borrowers. Tips for financing or refinancing include: 1. Don't get sucked in by an incredibly low interest rate. If an interest rate offer sounds too good to be true, it prob- ably is. 2. Talk directly to a reputa- ble lender or a broker. Avoid web-based mortgage enti- ties who say that they screen lendersup front and make them "compete for your busi- ness." 3. Quicker is not better. A. responsible lender will invest a considerable amount of time with you to go over your individual circumstances. 4. Avoid "equity stripping." Don't refinance repeatedly in a short time period. 5. Insist on a "tangible benefit." An ethical lender should be willing to provide such documentation regard- less of where you live. Nice DW MH on .70 acre MOL. This home will need a few repairs & is missing the AC unit, but at $49,900 It will MOTIVATED SELLER-Well maintained, not last lon. This home is close to the springs, the concrete block house on a half acre lot. The Beautiful Suwannee River, Schools, Shopping, ATFRA TVv AND IPALIOU- mLC carport'has been enclosed and could be used approximately 45 minutes t Gainesville, and not far asa den orfourth bedroom.There is one ceiling from the Gulf of Mexico. "SOLD AS IS" $45,000. (LMH- CHAIN LINK FENCE.THIS HOME IS CONVIENTLY LOCATED fan with central heat and air. $112,000. (DR- 753333-JW) 352-463-6144or 542-0009 IN CROSS CTY. $69,500. (DMH-753763-RH) 493-2221 752241-RH) 493-2221 , COZY COASTAL RHE0 M E R OMPL0DE LYE and CSEr- T h r A p , .' r.. National Wijl., Rp..t I ,- r.. i. ~,., ir.I,,,Iii This 3 Bedoom. Bath on paved street manning l r manufactured home on 48 aces. located t Noth of Cathedral ceilings. Call your agent and make known" for. Its perfect for your retreat or Chiefland with all the conveniences within minutes ntment today.$164,500. (LR753863-K) 493 retirement! $199,000 (DR-753878-JH) iriuv e1.nn.0 ILMH-752728-DI 493-2221 .... 542-9007 TJ RN THIS... .. INTO L.Y COUNTY JOURA Regina Goss Licensed Real Estate Broker T GOSSWILLIAM MOBILE HOMES: REAL ESTATE INC. Whitted Mobile Home Estates -3/2 DWMH on 2 lots, screened porch, detached carport & more. $69,000 Owner financing to qualified buyer!. New Listing Hideaway Adult Park- 2 BR, 2 Bath, DW MH on landscaped lot. Carport, storage & screen porch Additions. Includes private well. $84. $4-30;00 Reduced: $105,000 8.9 Acres -just off U.S. Alt. 27. $-14eO-TTReduced: $110,000 5 Wooded Acres -'Gilchrist County, some pecan trees. $85;00 Reduced to $76,500! 100 Acres Williston area, pines, oaks, holly & more, small ponds. $ 1001J per acre. Reduced to $15,000 per acre. Motivated seller. Corer Parcel 80 Ac at corer of 2 paved roads, planted pines. $15,000 per acre 80 Acres 1/4 mile paved road frontage, large oaks. $4-2600~-on. on comer parcel. Great for SHIP. $89, a e -e Waterfront- 1.5 Acres w/ 390' on canal 3/2 home par- tially furnished. Immaculate. $285,000. Details and photos at. com 102 S. Main Street, Chiefland, FL 32626 Office: 352-493-2838 Evenings: 352-493-1380 I I Page 20 LEVY COUNTY JOURNAL THURSDAY, OCTOBER 5,2006 ERoad In other action, the commissioners voted to accept the right of way and private funds to help offset paving costs on LCR 104. Chairwoman Nancy Bell asked Road Administrative Su- perintendent Bruce Greenlee if this would put that road ahead of others on the list. Commissioner Danny Stevens said the board had already agreed that if the road crew is working in an area and a road that has had money donated to it is nearby, that road would be worked. He and Greenlee said it didn't necessarily mean the roads were ahead of others waiting, but the funds were there and needed to be utilized. Moody said a policy needed to be developed and perhaps the private funds be held in escrow. Greenlee said he would hate to put money in escrow for four or five years and he was of the understanding that in such public-private partnerships, the work was done at the discre- tion of the road department. Stevens made a motion to accept the money and improve the road when the department was in the area. Yearty second- ed it and it passed 4-1 with Bell dissenting, saying she favored Deadline for new hospital support nears BY FRANK SCHUPP SPECIAL TO THE JOURNAL- Thursday, Sept. 28, representatives of Ameris Health Systems, Frank Schupp and consulting firm, met with Jeff Gregg, Bureau Chief-Agency Healthcare Administration (ACHA), Karen Rivera, senior analyst, and Karen Webb, analyst, regarding the Tri-County Hospital Project application. The meeting went ex- tremely well and was very informative for all parties in that Ameris had the opportunity to expound on their rural hospital ex- pertise, and, likewise, re- ceived good suggestions from the ACHA staff. Friday, Sept. 29, Webb met Ameris officials at Smith North Hospital in Valdosta, Ga., to tour the facility, meet physicians, staff and community lead- ers in order to see first- hand one ofAmeris' facil- ities operations. "I believe she left with a positive impression of the opera- tions," Schupp said. For all those who have not yet written a letter of support for this much- needed Tri-County Hospi- tal in our area, the deadline for submission is Friday, Oct. 13, 2006. Please send your letter to: Frank Schupp at 193 Ventana Blvd., Santa Rosa Beach, FL. 32459. Get a flu shot and a bowl of chili! The third annual Health Assessment Day and Chili Cook-Off will be held Tuesday, Oct. 11 from 10 a.m. until 2 p.m. at the Chief- land Senior Center on 305 SW 1st St. Flu shots will be available and health screenings will be provided. Sponsors ask you bring your Medicare card and be prepared for some of the best chili for miles around. The Heath Assessment Day is sponsored by Sponsored by Department of Elder Af- fairs, Suwannee River Area Health Education Center, Suwannee River Economic Council and Levy County Health Department. For more information, call Barbara at 493- 6709. Journal photo Dy Gassie Journigan ON YOUR MARK; get set; gol Hilltop Alternative School students in Ms. Gru- ber's class read along with Gov. Jeb Bush on webcast in an attempt to break a world record Thursday. *ll- 9J^Jg7Jf / Gibbs Family in concert The Gibbs Family will be in concert Saturday, Oct. 7 at 7 p.m. at Otter Springs RV Resort near Trenton. A cover dish dinner is planned. For more information, call Trish Keene at 352-463-0800 or 800-883-9107. To reach Otter Springs from Hwy. 26, turn north on CR 232 and then left on 70th Street. The entrance is one mile on the right. GATOR WORKS COMPUTING Sales Repair. Upgrade __ Consulting I Programming 0 Networking AMcrousoft CERIFILED Computer Training Classes Peanut Festival and Day of Unity coverage in next week's edition! wA L S 09 Continued from front some type formality in place. During commissioners' reports, Bell also asked that a foot- note be added to last week's budget public hearing. ' Bell said it had come to her attention that she misspoke when she asked the millage be set at 7 percent. She said she did not realize she had said percent instead of millage. Commissioner Lilly Rooks said she didn't think the com- missioners should get in the habit of changing the official re- cord. Bell countered she wasn't asking for a change, only a footnote to clear up her mistake. Commissioner Tony Parker made the motion to allow the footnote, but it died for lack of a second. In other business, the commissioners: approved department head salary increases at 5 percent and union contracts with laborers. approved the settlement of inmate medical expenses for a former Levy County Jail inmate who was treated at Shands. The county agreed to pay 65 percent of the $18,323 bill. The amount is more than the sheriff had allocated and the money will come from the general fund. accepted a $50,000 grant for the Drug Task Force. Vote Continuedfromfront office, any Department of Highway Safety and Motor Vehi- cles office or to the Department of State by Tuesday, Oct. 10. Citizens should have a current address and signature on file with their Supervisor of Elections prior to voting. To register to vote, applicants must: Be a citizen of the United States of America Be a Florida resident Be 18 years old (17-year-olds may pre-register) Not now be adjudicated mentally incapacitated with re- spect to voting in Florida or any other state And not have been convicted of a felony without their civil rights having been restored. Town Continuedfrom front emergency. That board acted from mid-July until August spe- cial elections restored a full town government. According to the Sept. 28 letter, Bush will leave local gov- ernance to the town. The letter states the council "has a quo- rum and can act in the absence of the mayor to address time sensitive issues until the general election." The mayor resigned her post after receiving resignations from the two council members who had remained after an earlier round of resignations left the town government unable to muster a quorum. The departure of council members Dan Bowman and Glen Spetz leaves a council of three. Remaining council members Dawn Clary, Douglas Dame and Larry Feldhusen were seated after special elections Aug. 29. Once Yankeetown has a full government, the five-member council will appoint one of its members to act as mayor, ac- cording to the town charter and as cited in the governor's of- fice letter. The governor encourages local residents to act in their own behalf: "The Governor strongly favors local governance and deference to elected officials, so he encourages responsible residents concerned about their community to qualify for of- fice...The time for division is past. The time for responsible leadership and cooperation has arrived. This office will not reinstate the board (Lambka's emergency board) or consider more severe actions such as...dissolving the town charter, as long as Yankeetown continues to make progress." srre p ~1 Contact Us | Permissions | Preferences | Technical Aspects | Statistics | Internal | Privacy Policy © 2004 - 2011 University of Florida George A. Smathers Libraries.All rights reserved. Acceptable Use, Copyright, and Disclaimer Statement Powered by SobekCM | http://ufdc.ufl.edu/UF00028309/00090 | CC-MAIN-2017-34 | refinedweb | 30,419 | 71.85 |
Anti-aliased StretchBlt() / pure win32/x64 c++(repost)
This project received 3 bids from talented freelancers with an average bid price of $334 USD.Get free quotes for a project like this
Skills Required
Project BudgetN/A
Total Bids3
Project Description
See detailed reqs.
## Deliverables
Hello,
Since first posting this project I found I could get a good enough solution using Gdiplus; however I would still much prefer a custom implementation which:
(a) Removes the dependence on Gdiplus
(b) Is faster than the Gdiplus version.
Please see the attached zip for exact spec. The .zip contains the current Gdiplus-based function and screenshots on XP (with default theme active) of it's result.
What I need you to do is replicate the functionality exactly. Note this will involve both bilinear and bicubic filtering algorithms. You can, however, assume that the bilinear algorithm will only ever be used to scale up, while the bicubic will only ever be used to scale down. (See code in attached .zip)
The most important requirements here are:
1. That your implementation is deterministic in producing exactly the same result as the existing function (within reason).
Specifically, on XP with default theme active, if you use [url removed, login to view] (for testing just link with [url removed, login to view] and assume the DLL is present) to draw the background of a progress bar, and then draw the fill part over the top (let's say to half-way/50%). If, having drawn this to an offscreen memory DC with a 32-bit DIB-section HBITMAP selected into it (on a COLOR_BTNFACE background) then call my function (see .zip) to blt from your memdc to some real HDC (most likely in response to WM_PAINT) you'll see what the result looks like.
Note there are also screenshots in the .zip which illustrate the result as well.
What I need is a drop-in replacement for the SmoothSBlt() function which produces as close a match as you can get to the existing Gdiplus-based implementation but without any dependency on Gdiplus (or anything else).
2. I also need your implementation to be as fast as possible so for starters absolutely 0 error checking. You can use the assert() macro from <assert.h> or include specialist checks inside #ifdef _DEBUG ... #endif blocks, but nothing at all for release builds.
2a. I would also prefer that you avoid using a c++ class (thus avoiding the overhead of vtable/vftable/this pointer etc. and just produce a .cpp/.h pair where public functions are declared in the .h and any private functions are simply declared/defined using the "static" keyword in the .cpp **unless** you use a single static object which you create on the stack on startup, and which is wholly contained in the .cpp
Using namespacing for public functions is fine but not required. In fact the only function that should be declared in the header file is SmoothSBlt() (I suggest you change the name to SmoothSBlt_NGdiplus() or SSBlt() or something so I- (and you) can easily have both versions available to produce test programs where you can visually inspect the results by screen-grabbing and zooming in in any bitmap app you like.)
2b. We're going for absolute speed here, so the following also apply:
2bi. If at any point you need random values, don't call rand() or any custom RNG function, simply pre-determine a large enough array of suitable random values and store this in the .cpp as a static array.
2bii. Do not include unnecessary functions. Ideally write the whole lot into the single SSBlt() - or whatever name you use - function, with no calls to anything else (unless it's the single static object I mentioned earlier).
2biii. Following on from that, don't use any unnecessary GDI/USER/stdlib functions. For example instead of calling SetRectEmpty(&rcExample); simply do: *((ULONGLONG*)&rcExample) = 0; *((ULONGLONG*)&rcExample + 1) = 0; thus avoiding the overhead of calling a function when you don't need to, and also using the most efficient way to zero the object. You could if you wish include a justifying assert() such as assert(sizeof(RECT) == (sizeof(ULONGLONG) << 1));
(The principal advantage in using ULONGLONG is that when compiled for x64, ULONGLONG (which is the Windows type corresponding to unsigned __int64) becomes a single primitive type, and the two statements are basicaly guaranteed to become exactly two machine code instructions in the compiled exe. Whereas if you set .left, .top .right, .bottom individually to 0 the optimiser might miss it.)
Also don't be tempted to use memset() for this type of thing. It is preferable to other functions, but it's still an unnecessary function call which means unnecessary saving of registers, unnecessary stack reservation, and unnecessary calling convention code.
2c. Another way to potentially speed this up is to combine the two operations. i.e. rather than doing the bilinear stretch then the bicubic shrink, if you could find some way to integrate the two that would be brilliant, but again, that's up to you. The status quo is fine as long as you make it as fast (efficient) as possible.
2d. Also, as another example, if you use any loops which are of either fixed iteration count, or one of a discrete set of fixed iteration counts depending on other things, unwind these loops completely: i.e. include every in-loop statement individually with no loop.
2di. Also apply this as far as possible for loops that aren't 100% predictable, but where they are just inline the unwound 'sub-loop'. Note: I don't care how much stack/heap mem you use (within reason) specifically in relation to code: i.e. because speed is so important here, I'd rather see an 'ugly' low-level (heavily commented) set of code which is much larger than could be achieved with more function use.
2e. Any other way you can think of speeding up the function, and pease back up your ideas by trying them out and discarding any that don't actually work in practice. Note you can use XP with SP2 or SP3 (and themed) exclusively as your test OS. No need to test on any other Windows versions.
3. Absolutely do not involve any hidden windows or anything of that nature. There should be no need since you're simply manipulating bitmap data in a single thread. (Essentially, this needs to be lean in order to be fast so absolutely nothing unnecessary.)
4. **BONUS STAGE** Once you have completed the main part of the project I will guarantee a decent and negotiable bonus payment if you can also build in a genuinely-time-saving caching system, where you maintain a reasonably small cache containing a subset of all the results of every call to the function.
You then, on entry to the function, compare the parameters and iff there is an exact match in the cache, you just blt the cached copy.
4a. Of course, iff the HDC address doesn't match OR the HBITMAP selected into it doesn't match the cached address, you will need to compare the actual HBITMAPS. I realise this is potentially adding overhead but that's the challenge of this extra step: can you build in the cache such that overall the function performs significantly quicker than without the cache, even if it might be very slightly slower when there is no cache match.
4b. Iff possible the cache should be contained in the function itself (again, minimise function calling)
5. Finally, must work on Windows XP+ and must not prevent execution on Win2K (other than assuming [url removed, login to view] is available). Also, please explicity state function calling convention when declaring or defining a function (unless it's __thiscall when calling an instantiated a c++ class object). As a general rule: if your function takes no paramtere use __stdcall; otherwise use __fastcall. Only use __cdecl if you need to. Also don't bother trying to write inline functions and don't use intrinsics. You can use #define'd macros however.
Note: The function I use to wrap drawing of progress bar via [url removed, login to view] is not included in the .zip but it does apply some 'touching up' post SmoothSBlt() and also does a 'pseudo-alpha-blend' by combining the final HBITMAP bits with COLOR_BTNFACE with some ratio, so the .bmp in the zip is not really definitive. It is included mainly for the look of the 'gray' part of the bar.
Also note **IMPORTANT** the progress bar in the .bmp actually uses two calls to the existing SmoothSBlt() function. The first reduces the original (actual size) bitmap to 1/8th actual size. The second then stretches back to normal size. If you really need the exact function then once the funds are escrowed I can give you whatever you need.
That's it. Serious bidders only please.
Many thanks.
* * *This broadcast message was sent to all bidders on Sunday Aug 19, 2012 9:29:24 PM:
[This is just to force the site to start/display message thread with invited workers.]
* * *This broadcast message was sent to all bidders on Sunday Aug 19, 2012 9:58:28 PM:
Brief note on caching (if you decide to include it): use only custom types. For example if you maintain your cache as a linked-list, don't use std::list, write a specialised POD struct{} and store your own first/last pointers. Again, this is an efficiency/speed consideration and is a theme you should adopt throughout the whole | https://www.freelancer.com/projects/C-Programming-assembly/Anti-aliased-StretchBlt-pure-win.2769675/ | CC-MAIN-2016-36 | refinedweb | 1,603 | 60.24 |
Download presentation
Presentation is loading. Please wait.
2
Risk and Return Various Ways to Discount Cash Flows - WACC - APV - FTE
We shall see these in action shortly But First What is the WACC
3
Risk and Return WACC, A Simple Example
A Company wishes to finance a project with 70 % Equity and 30 %Debt Total needed GBP 50,000,000 Tax rate 30 % Cost of Equity 12 % Cost of Debt 7 %
4
Risk and Return WACC, A Simple Example
So WACC = Equity bit = 35,000,000 x 12 = 50,000,000 Debt bit = 15,000,000 x (1 - .3) = WACC =
5
Risk and Return But, A Few Quick Questions
How do we get the cost of debt? Easy, ask a bank (We will return to the 1-t issue) How do we get the cost of equity? A bit trickier
6
Risk and Return Cost of Equity
Rational ‘Economic’ Person Risk is not bad but greater risk, greater expected return Risk Measurements Expected return Variance Standard deviation
7
Risk and Return Cost of Equity
Returns Deviation from Mean Deviation Squared (9) (8) (6) (18) (2) (8) Mean Var = 1068/n-1 SD
8
Risk and Return Cost of Equity
Assuming a normal distribution Range Probability Downside risk Within + / - 1 SD + / - 2 SD + / - 3 SD Share has Av return of 14% SD of 4 % Need min return of 8%, with only 2.5% chance of less Do we invest? No as 2.5 = 2 SD = 8 % and 14% -8% = 6%
9
Risk and Return Cost of Equity
Risk ‘changes’ in a portfolio( = 2 or more assets) Expected Return of a portfolio = Weighted average of the assets in a portfolio E.g. Asset A, ER = 8%, = 30% of portfolio Asset B, ER = 12% = 70% of portfolio Portfolio ER = 8 x x .7 = 10.8%
10
Risk and Return Cost of Equity
But what about the risk of a portfolio? What happens when we put assets together that react differently to overall market movements?
11
Variance of a Portfolio
But what is the variance? ER Umbrellas ER ER Cider
12
Risk and Return Cost of Equity
We may have a range of portfolios of differing expected returns and risks There is a risk free asset, Government stocks (Gilts - Bills and Bonds) Capital Market line Market Portfolio
14
Risk and Return Cost of Equity
But how to ‘price’ an individual asset? How does the risk of the individual asset vary from that of the Market Portfolio? Risk split into Market risk = systematic = non-diversifiable risk Specific risk = unsystematic = diversifiable risk
15
Risk and Return Cost of Equity
Since diversifiable risk may be diversified away just left to focus on Market Risk Some shares riskier than others Measure of relative risk is Beta Beta = Covariance of the Market and Asset Variance of the Market
16
Variance of a Portfolio
The riskiness of an asset held in a portfolio is different from that of an asset held on its own Variance can be found using the following formula Var Rp = w2Var(RA) + 2w(1-w)Cov(RARB)+(1-w)2VarRB Cov stands for Covariance Covariance is a measure of how random variables, A & B move away from their means at the same time
17
Risk and Return Cost of Equity
Required return (or expected return) ERA = RF + (ERM – RF)B Example Company A Beta of 1.4, Risk Free = 5 % Expected return on market = 10 % ERA = 5 + (10 -5) 1.4 = 12
18
CAPM Security Market Line Rm Market Portfolio Rf Beta
19
Risk and Return Cost of Equity
Other models Gordon Dividend Growth ER = D1 + g P0 E.g. Share price = 275 pence Current Div = 8.25 pence Historic growth = 9 % = 12.27 275 Arbitrage Pricing Theory. Not going to bother but …
20
Fama-French 3 Factor Model
To estimate the expected returns under APT Expected risk premium, r - rf = b1 (rfactor1-rf) + b2(r factor2 -rf) +b3 (r factor3 -rf) etc etc So all we have to do is Step 1. Identify a reasonably short list of macroeconomic factors that could affect stock returns Step 2. Estimate the expected risk premium on each of these factors Step 3. Measure the sensitivity of each stock to the factors
21
Fama-French 3 Factor Model
Above average returns on Small sized companies and High book to market value R – rf = bmarket(rmarket factor)+bsize(rsize factor) +bbook too market(rbook to market factor)
22
Fama-French 3 Factor Model
Having worked out from market data that Market premium = 7% Size premium = 3.7% Book to market premium = 5.2% Then for E.g. computers bmkt =1.67, bsz = .39 and bmkt to bk = -1.07 ER = (1.67x7)+(.39 x 3.7) + (-1.07x5.2)= = Rf
23
Risk and Return Cost of Equity
Any problems? Market returns/Market risk premium It varies from - market to market - period to period - arithmetic or geometric So anywhere between 0 and 10!!
24
Risk and Return Cost of Equity
Real WACC Should always use market values for Equity and Book values are used for debt (relevant for leverage discussions) WACC we work out will probably be nominal cost of capital. Suppose we want the real cost of capital?
25
Risk and Return Cost of Equity
Say WACC = 9.87 and inflation is 3% Then the real WACC is 1 + nominal wacc - 1 1 + inflation rate = – 1 = .061 or 6.1 % 1.03
26
Risk and Return Cost of Equity
Lastly the 1 – t issue. Because interest on debt is allowed as an expense before tax the government subsidises the cost of debt. EBIT , ,000 Int* _____ EBT , ,000 40% 1, ,000 Net , ,000 Tot returns 3, ,000 Dif = 120 x .4 = 48
Similar presentations
© 2017 SlidePlayer.com Inc. | http://slideplayer.com/slide/781209/ | CC-MAIN-2017-17 | refinedweb | 958 | 57.61 |
QT Gui Application, alingment and/or anchoring...
Hello everyone, I'm trying to anchor some elements (link a tabWidget) inside the widget with VerticalLayout, but my tabWidget don't expand/anchor with the widget element.
And the same think to widget, is not anchored with your parent (MainWindow/CentralWidget), and the widget to resize when I resize the mainWindow.
How can I make elements/widgets to be anchors with your parents and auto-resize with the parent..
Can anyone understand my problem?
Use add your widgets into a "layout":
It's possible to create an application with using .ui files and make some .ui works like a component?
I mean:
UI:
Main.ui
MenuBar.ui
Login.ui
Settings.ui
I want to add to my Main.ui the login.ui, and after the user do the login on the system show the MenuBar.ui and if select the option settings on my MenuBar I load the Settings.ui side-by-side with Menu.ui.
If it's possible... How can I make that? Some examples, videos... anything that can Helps me to create my application using QT.
Thanks all!
This might get you started:
Unfortunately, you cannot directly use a .ui as a component in another .ui. What you can do, is use the (or simply a) base class of the component you want to have in your form, and use the "widget promotion":/doc/qt-4.8/designer-using-custom-widgets.html#promoting-widgets feature of Qt Designer.
I can't use this 2 class, the compiler give me an error everytime.
[quote author="dcbasso" date="1341232276"]
I can't use this 2 class, the compiler give me an error everytime.[/quote]
It would be so much easier to help you if you told us what error you are getting...
Please consider that Qt is quite thoroughly tested, and is used by many of thousands of developers all over the world. That makes it likely (but of course, not guaranteed) that any error you run into are located in your code, not in Qt itself. I, at least, find that a helpful assumption when I'm debugging my applications.
Hi Andre! Thanks for the help, follow:
@#include <QFormBuilder>
void MainWindow::abrirMCI() {
QFormBuilder builder;
QFile file(":/forms/modulocentralinterface.ui");
file.open(QFile::ReadOnly);
QWidget *myWidget = builder.load( &file, this );
ui->contentWidget->layout()->addWidget( myWidget );
}@
This code returns this:
"QFormBuilder: No such file or directory"
@#include :
"QUiLoader: No such file or directory"
I try this resources too:
@
#include "QtUiTools:
"undefined reference to 'QUiLoader::QUiLoader(QObject)'
undefined reference to 'QUiLoader::load(QIODevice*, QWidget*)'
undefined reference to 'QUiLoader::~QUiLoader()'"*
That is because these classes are in the UiTools module. You should add this to your .pro file:
@
CONFIG += uitools
@
Andre, where I can find this information (in docs and other stuffs)?
In the documentation, where I found it too!
However, I will admit that module information is not always easy to find, and in fact in this case I made a mistake here: uitools contains the QUiLoader class, but not the QFormBuilder class. The QFormBuilder class resides in the QtDesigner module, which you can add to your project using
@
CONFIG += designer
@
There is a reference to the uitools module in both the documentation of QFormBuilder and QUiLoader though, hence my confusion. The module page will give an overview of the classes in the module, and the .pro statement to use it.
Thanks.
Now I can continue my study with QT!
I'm still trying to load the .ui on a widget component, it's not easy to do so.
It is not clear what you want to achieve to me. Why are you not using the "standard way":/doc/qt-4.8/designer-using-a-ui-file.html to use a .ui file?
I have to many User Interface On My Application, and I was thinking to create a menu button and every button will change the contextWidget...
Undestand?
Nope. No idea.
Well...
My application will have many screens... something about 23 screens (User Interface).
It is complex to make all this screen on a single .ui file, and I was thinking to create a .ui file for every screen, because all screen will have many controls and elements (buttons, text area, comboBox and etc...)!
So, my main UI (main.ui) will have the menu buttons on right side on screen and just want to change the "central elements" of this screen. This "central elements" I would to to load the .ui file on set on them...
Undestand?
Ok, yes.
Notice that those screens will then become separate classes. That may or may not be what you want; usually it is exactly what you want.
You can use the method I pointed you to earlier to create these classes using your .ui files. Then, in your main file, you add these as pages in your view. I find it easiest to do that in code.
The UiTools Approach
@ QWidget* TextFinder::loadUiFile()
{
QUiLoader loader;
QFile file(":/forms/textfinder.ui"); file.open(QFile::ReadOnly); QWidget *formWidget = loader.load(&file, this); file.close(); return formWidget;
}@
It's that you are saying?
Thanks Andre, I was thinking that Was my Crazy Idea to make something like this, but Now I see that can be done in Qt.
Thank you very much.
You probably don't need UiLoader or QFormBuilder. I have, in the 10 or so years I now work with Qt, only used these once or twice. If you've just started using Qt, chances are they really are not what you need.
Just use the approach described in the first section of "the documentation":/doc/qt-4.8/designer-using-a-ui-file.html on how to use .ui files. This is also the standard way everything is created if you use File -> New File or Project -> Qt -> Qt Designer Form Class. Use that approach to create your pages. If you want to put all of those pages on a main form, use either code to create instances of your different widgets and add them to a tab widget on your main form, or add them from the main form .ui file using widget promotion.
Sorry Andre, It's a very different concept for me and I'm not understanding how can I make this works....
I try this:
@
WidgetMCI wMCI;
ui->contentWidget->layout()->addWidget( &wMCI );
@
but another runtime error appers!
I have used "File -> New File or Project -> Qt -> Qt Designer Form Class".
I try do this too and nothing:
@
WidgetMCI *wMCI = new WidgetMCI( this );
contentWidget->layout()->addWidget( wMCI );
@
Sorry, my layout was missing the layout component to handle with added widget!
[quote author="dcbasso" date="1341259385"]Sorry, my layout was missing the layout component to handle with added widget![/quote]
So... it is solved? | https://forum.qt.io/topic/17941/qt-gui-application-alingment-and-or-anchoring | CC-MAIN-2018-34 | refinedweb | 1,131 | 66.84 |
How to Reindex and Rename Pandas Dataframe in Python
In this blog, we will learn how to re-index and rename a Pandas Dataframe in Python. After forming a Dataframe, naming the columns and giving an index to the records, one might want to re-index the Dataframe. In Pandas Dataframe, indexing originally is done in the form of 0,1,2,3 and so on.
Now suppose I want to index my records according to the data that they represent. I can do this by using index function in Pandas Dataframe, there I can specify the name of my index for different records. Now if I want to change my index because of some error made previously then reindex function can be used. Let us see through this explanation.
Re-indexing in Pandas Dataframe in Python
Let us make a Dataframe consisting of three students namely, Arun, Karan and Aman. Let us take their marks in three subjects such as Maths, Physics and Chemistry. Here the marks of students in three subjects are taken as the index. Now if I want to replace the subject Physics from the index to English then I will use the reindex function. The reindex() function with replace index Physics to English and it will also replace the data in the Physics record by NA. Here fill_value function will be used to insert value to the index English.
Steps to follow for re-indexing
We will first form a Dataframe. To know about how a Pandas Dataframe is made please click here.
- Here data on marks of Arun, Karan and Aman in various subjects are stored in the variable named as “Student_Data”
- Dataframe is accessed through Pandas where “Student_Data” is taken as the data, columns are mentioned as the name of students and subjects are mentioned as the various index. This Dataframe is stored under the variable “Table”
- Now to view the Dataframe we print Table
Code:
import pandas as pd import numpy as np Student_Data={'Arun':[11,12,14],'Karan':[9,15,14],'Aman':[12,13,12]} Table=pd.DataFrame(Student_Data,columns=["Arun","Karan","Aman"],index=["Maths","Physics","Chemistry"]) Table
Output:
Now for re-indexing we follow the following steps:
- We take the “Table” which is our Dataframe and then we apple re-index function on it.
- In the function, we specify the new index that will be replacing the old ones. Then we use function fill_value to replace the values in the old index with the new ones. For example, if Physics is re-indexed by English then all marks of all students in English will show as NA or Not Available. This will happen because the system does not has data on marks of students in English subject. With fill_value function, the value given in fill_value will be stored in replacement to “NA”
Code:
Table.reindex(["Maths","English","Chemistry"],fill_value=10)
Output:
Here as we can see that English has been included as an index in place of Physics. Also, the marks of students have been replaced by 10, the number that we had given in the function fill_value.
Renaming axis in Python
Let us get to the second part of our objective, renaming the axis in Python. Now taking the same example forward, the Dataframe “Table” does not give me a clear picture of what my rows and columns represent. How do I give a name to my columns and rows so that my Dataframe is well defined? Here rename_axis() function plays an important role.
Steps to rename axis in Python
- We first use the function rename_axis on Dataframe “Table” and give the name “Subject”. Python will automatically assume that “Subject” is the name for rows or indexes. We save this in a variable named “New_Table”
- Now we take “New_table” and apply the function of rename_axis() on it. Here Student_Name is taken and axis is mentioned as columns. Through this, the system will get to know that “Student_Name” is for columns and not for rows
Code:
New_Table=Table.rename_axis("Subject") New_Table
Output:
Code for renaming column axis:
New_Table.rename_axis("Student_Name",axis="columns")
Output:
As we can see in the output, through this code we have named the two axis of the Dataframe and now it is clear what the rows and columns mean. This makes the Table easy to interpret and manipulate further.
i can’t understand this language programiming | https://www.codespeedy.com/how-to-reindex-and-rename-pandas-dataframe-in-python/ | CC-MAIN-2021-43 | refinedweb | 730 | 70.13 |
how can i reply last received sms or mms
how can i reply last received sms or mms
Just read the last msg id (number) and send a sms using messaging module to that number !
Best Regards,
Croozeus
Before, you ask for an example :
Best Regards,Best Regards,Code:import inbox #Create an instance of the inbox i=inbox.Inbox() #Get the ID of the latest SMS id=i.sms_messages()[0] messaging.sms_send(id, u"Your reply here Mr. Eagle")
Croozeus
there is nothing much more easier! That's what you need.
import my_wish
my_wish.go()
unfortunately my_wish module requires importing read_doc_first. This module can be found all over the forum or google | http://developer.nokia.com/community/discussion/showthread.php/141882-how-can-i-reply-sms?p=456498&viewfull=1 | CC-MAIN-2014-23 | refinedweb | 113 | 68.67 |
On Sun, 2009-09-27 at 01:45 -0700, Russ Allbery wrote: > Holger Levsen <holger@layer-acht.org> writes: > > > I think having munin working out-of-the-box is a very neat feature. > > I think we need better support in the Apache package for adding particular > aliases and similar URL configuration into the default site, so that those > who want to do things like this can add the necessary URL mappings to the > default site and those of us who are doing anything more complex and who > are therefore disabling the default site anyway don't have random packages > suddenly taking over portions of our URL space. The URL namespace isn't "suddenly" taken over: 1. The admin deliberately install the package. 2. The admin choose to use the default settings of the package. (editing the conf files is usually trivial) Personally, on my modest production websites, I always disable the default website (a2dissite 000-default), then disable the "Include" lines in /etc/apache2/apache2.conf... So I can cherry pick (Include or copy) the configuration files snippets in my vhosts. On some other machines, I am often very happy to just "apt-get install" and simply _read_ the fine manual. I would be really annoyed I had to manually configure and enable ssh-server on every machine (generating the host key, configure sshd, enabling sshd in /etc/default/ssh, then start the service). Same applies to most webapps. Regards | https://lists.debian.org/debian-devel/2009/10/msg00052.html | CC-MAIN-2016-36 | refinedweb | 240 | 51.07 |
However, several users reported that when they looked at the files actually available offline (by starting Manage offline files and clicking View your offline files), they had files not only from No synchronization occurs. I have not seen any information regarding Offline Files in Windows 8 either. sharetweetshare More Information Subscribe to our blog feed: Related Posts: Citrix XenApp/XenDesktop API Hooking Explained Manual Folder Redirection with Symbolic Links Thoughts on Cloud File Synchronization Security How to Enable BitLocker get redirected here
Would be a useful addition to this article Reply Leave a Reply Click here to cancel reply. Solution I We found the reason to be redirected Cookies and IE History. See for more information on this.I have see this problem occurring most commonly in scenarios where the remote share is not a native windows smb share. In such a situation Offline Files remain in online mode.
When he changed to online (via the toggle) he was able to see all folders. If the average round-trip time is below 80 ms (Windows 7) or 35 ms (Windows 8), the connection is put into online mode, otherwise into slow link mode. If you click on the details section you will see a detailed error message.Here you can read the error that says "Offline Files unable to make available offline on . Any thoughts?
Too Many Files Available Offline Problem You have administratively assigned one or more directories to be available offline. TinyXP rules. Before I show you how to fix it, I'll tell you what's most probably gone wrong. Delete Offline Files Cache Windows 10 sharetweetshare More Information Subscribe to our blog feed: Related Posts: Citrix XenApp/XenDesktop API Hooking Explained How to Enable BitLocker Hardware Encryption with SSDs Measuring the Impact of Folder Redirection - Application
Microsoft releases new patches for Offline Files regularly. Clear Offline Files Cache Windows 10 The user can always override the automatic mode selection by manually switching to manual offline mode. The latency value of 35/80 ms is configurable through the Group Policy setting Configure slow-link mode. Initial & Logon Synchronization When a user first logs on to a computer, initial synchronization occurs in the background.
Solution The free tool Run As System can start arbitrary processes as local system. Reinitialize Offline Files Windows 10 Richard Artes. Hello. Once we changed the location of Cookies and History back to the default locations in the user profile and rebooted, Offline Files synchronization worked as expected.
Confused!!! If you go to the mapped drive the exact same thing happens. Clear Offline Files Cache Windows 7 Template images by latex. Reset Offline Files Windows 10 About the "explorer cannot be run as a different user" - that's only partially true.
I have been reluctant to "pull the trigger" on this project because of the potential for data loss. Get More Info One thing I still can't get my head around: Offline files are configured in Computer policies, but access to the Sync Centre in control panel is configured at User policy. Solution When Offline Files is enabled, network access is filtered and potentially redirected to the local offline files cache. It seams to be working, but I'm curious if either of you know how/where in the registry to confirm that this setting is being applied on the local users machine after Delete Offline Files Windows 10
Fix Windows Installer "Invalid Drive" error Problem You may get an error like this when trying to install something on Windows (Windows 7 in my case). The synchronization runs as planned: the Offline Files icon in the notification area of the taskbar spins regularly and the Offline Files event log (Applications and Services Logs -> Microsoft -> Just install **Long Path Tool** For this problem.regards,brianfo 17/02/2015, 08:09 Post a Comment Newer Post Older Post Home Subscribe to: Post Comments (Atom) Shallow HackerPromote Your Page Too last The default limit for the Offline Files cache size is 25% of the total disk space of the drive where the Offline Files cache is located (typically C:\Windows\CSC).
To look directly at the file server a path must be used that is not configured to be available offline. Clear Offline Files Cache Windows 8 In one manifestation of this issue the customer had administratively assigned drive H: to be available offline. Many messages are cryptic and difficult to interpret.
We need to disable Offline Files across 10,000+ desktop PCs but if any machines have existing sync errors and we just turn it off via GPO data will be lost… Thanks Initial Synchronization There is no visual feedback that indicates whether initial synchronization has completed. With a normal share you can use Value Name="\\server\share\*" Can you do this also with a DFS namespace or do I have to put every subfolder in the policy. Clear Offline Cache Windows 10 In auto offline mode, all reads and writes go to the local cache.
Cheers. Ensuring that no data is lost is much more difficult. Analytic and Debug have always been empty during my tests. this page Reply Helge Klein May 27, 2013 at 09:06 # From my experience there is nobody, even at Microsoft, who fully understands Offline Files.
Locate and right-click the My Documents folder and click on Make Available Offline option and close the Windows. Go ge tthe "Beast" edition To break it down for you. Caution: when a user's password is reset, the EFS key is discarded and cached Offline Files become invalid: files that have not been synchronized yet are lost. because they do not have the right to read at the root of the structure offline files will not cache.
I say "problems"; I'm sure there's ONE guy in Redmond to whom many of the answers to my questions are obvious. Cache size management Files that were cached automatically are removed on a least-recently used basis if the maximum cache size is reached. Powered by Blogger. it.
There is only one problem: no files are synchronized. We started tinkering with GPO's and here are my settings - Configure slow-link mode - Enabled and UNC Path: \\users\UserFolderRedirection / Latency = 50. ( I even tried UNC Path \\mydomain.com\files Permissions are synchronized to the offline cache, too. At the moment the GPO is unlinked and user is using his files saved directly to his pc.
Why is it "bad" to turn it off from here? >Availability of Offline Files can be controlled via caching options of network shares. Adding Read to the user rights fixes all these problems. Offline Files still tries to synchronize user A's offline files and prompts user B for credentials. Why does CDO.Message give me 8004020F errors?
One tip that might be worth adding is that in Windows 8/8.1, the Work Offline/Work Online action in Windows Explorer has been buried. I used Total Commander; other similar applications should work well, too. | http://dlldesigner.com/offline-files/offline-files-synchronization-error-xp.php | CC-MAIN-2017-51 | refinedweb | 1,166 | 60.55 |
After reading the title of this post, you were probably wondering the same thing everyone asked us while working on this project:
Why?
And you would be right. Why would we want to remove Coveo’s most useful features: Machine Learning, sorting, and automatically-tuned relevancy?
There are 4 reasons:
- For fun
- To try to get different results each time you execute a query
- To test what we could achieve with the current infrastructure and tools
- But yeah, mostly for fun
This post will cover the road we had to walk to achieve such results.
Context
Our first tests for this component came in August 2016, during a Coveo Hackathon, when we had the idea to use the Coveo index and UI to solve a problem many gamers like us have faced before: find the right game to play in the mountain of games we own.
Like a lot of gamers, we own different games of different genres on different platforms, and we don’t always feel like playing the same genre on the same platform over and over again. Our idea was to index those games and create a search interface that could return a random game from our index.
We had a few criteria that our search page had to satisfy:
- Index metadata alongside the items and store it in fields
- Be able to filter according to those fields
- Return only one result per query
- Return a different, random result every time a search is performed, even when the query is the same
Thankfully, a normal out-of-the-box Coveo index allowed us to achieve the first three criteria very easily. However, that last one needed a bit more customization.
As an index built for Enterprise search, the Coveo index is made to be relevant, not random.
During the course of the hackathon, we were however able to make our search page work and behave in the way we wanted it to. It was a great learning experience for the both of us, allowing us to touch aspects of Coveo we don’t usually touch in our day-to-day lives. But, as is the case with too many hackathon projects, we let the project sleep in folders on our hard drives, accumulating digital dust. As fun as the project was, we didn’t think any of our customers would want to use it.
But then, this post on answers.coveo.com happened, and we knew we were not the only ones that wanted randomized results. That was when we decided to dust off the project and build it better so that we could share with the world the way we did it.
Introducing a random field on items
First, we had to find a way to change the ranking based on a randomized value. Since the Query Function extensions does not allow the
rand() operator, we had to find another clever way to handle this.
We though we could use the new Indexing Pipeline Extensions and its Python libraries to add a field that would be different for all documents.
We added a new field in our organization and coveniently named it
randomfield. The field need to be the
Long type; more information will come on that later.
We picked an arbitrarily large number (1000000) and injected that number value in a pretty simple extension:
import random randomValue = random.randint(1, 1000000) document.add_meta_data({ 'randomfield': randomValue })
We then needed to apply that extension to every source to be included in the random results. These steps are subject to change, so we suggest you take a look at the documentation on Applying an Indexing Pipeline Extension to a Source with the API.
Adding a ranking function client-side
To leverage this random field, we used a Query Function that is used to “wrap” the results around and give a different ranking each time.
let searchInterface = document.getElementById("mysearchinterface"); searchInterface.addEventListener(Coveo.QueryEvents.buildingQuery, function(args) { setFeelingLuckyInQueryBuilder(args.queryBuilder); }); function setFeelingLuckyInQueryBuilder(queryBuilder): void { // Create a ranking expression, shifting every randomField value to a random number, and wrapping them with the maximum range. // This ensures that we have different results every time. let rankingFunction = { expression: "(@randomField + " + randomNumber + ") % 1000000", normalizeWeight: false, }; queryBuilder.rankingFunctions.push(rankingFunction); // Adds @randomField to the expression to ensure the results have the required field. queryBuilder.advancedExpression.add("@randomField"); // Use the empty pipeline to remove Featured Results, Automatic Ranking, and all the other pipeline features. queryBuilder.pipeline = ''; queryBuilder.sortCriteria = 'relevancy'; queryBuilder.maximumAge = 0; queryBuilder.numberOfResults = 1; }
This code adds a ranking function that injects a random seed. The trick here is the modulo (
%) operator.
Since we know all the results are contained within 0 and 1000000, we are effectively changing the result that will be boosted the most and bringing it up to the top.
We set the index to only return one result, so once the result with the best boosting is found, that result is returned. This is lightning-fast on a Coveo Cloud index, and has no impact whatsover.
Caveats
We know this is far from a perfectly random solution. Here are some problems we know about.
Even distribution
The largest issue is that the results are not evenly distributed.
If we happen to be unlucky, two random values might be too close to each other when the extension is executed in a way that the first result of the two is less likely to be picked by our ranking function.
However, this problem is mitigated if your items are constantly changing, since the value will be recomputed every time an item is reindexed or the index is rebuilt.
More than one result
If you set more than one result and randomly get the same first result, the second result will also be the same second result.
In other words, our randomizer is deterministic. If you get the same seed twice, you will get the same results twice.
It appears more random simply because we are only showing one result.
Room for improvement
The previous code snippet gets us our randomizer, but there are a couple of features that we wanted to have:
- Add a togglable button to enable/disable the feature.
- Allow the button to be easily personalized
- Allow the button to be put anywhere in the page.
- Hide the sections that don’t matter any more, like sorts, number of results, and so on when the button is selected.
This is why we turned to a custom
coveo-search-ui component, which we will cover in our next blog post. | https://source.coveo.com/2017/06/20/randomizing-results-from-a-coveo-index/ | CC-MAIN-2019-18 | refinedweb | 1,088 | 60.24 |
Today, we released a new Windows 10 Anniversary SDK Preview to be used in conjunction with Windows 10 Insider Preview (Build 14383 or greater). The Preview SDK is a pre-release and cannot be used in a production environment. Please only install the SDK on your test machine. The Preview SDK Build 14383.
Things to note:
- We are getting close to Windows 10 Anniversary Update on August 2nd, 2016. It is a great time to start testing end to end with all the new APIs Windows 10 Anniversary Update provides.
- This is still a pre-release build of the SDK. While the EULA does state this is an RTM release, it is not. This release does not have a go-live license. Apps built with this SDK will not be allowed to be on-boarded to the store.
What’s New since 14366
[code lang=”csharp”]
namespace Windows.Media.Audio {
public sealed class AudioNodeEmitter {
SpatialAudioModel SpatialAudioModel { get; set; }
}
public enum SpatialAudioModel
}
[/code] | https://blogs.windows.com/windowsdeveloper/2016/07/07/windows-10-anniversary-sdk-preview-build-14383-released/ | CC-MAIN-2021-10 | refinedweb | 162 | 75.4 |
Last Updated on August 27, 2020
Predictive modeling with deep learning is a skill that modern developers need to know.
TensorFlow is the premier open-source deep learning framework developed and maintained by Google. Although using TensorFlow directly can be challenging, the modern tf.keras API beings the simplicity and ease of use of Keras to the TensorFlow project.
Using tf.keras allows you to design, fit, evaluate, and use deep learning models to make predictions in just a few lines of code. It makes common deep learning tasks, such as classification and regression predictive modeling, accessible to average developers looking to get things done.
In this tutorial, you will discover a step-by-step guide to developing deep learning models in TensorFlow using the tf.keras API.
After completing this tutorial, you will know:
-.
This is a large tutorial, and a lot of fun. You might want to bookmark it.
The examples are small and focused; you can finish this tutorial in about 60 minutes.
Kick-start your project with my new book Deep Learning With Python, including step-by-step tutorials and the Python source code files for all examples.
Let’s get started.
- Update Jun/2020: Updated for changes to the API in TensorFlow 2.2.0.
How to Develop Deep Learning Models With tf.keras
Photo by Stephen Harlan, some rights reserved.
TensorFlow Tutorial Overview
This tutorial is designed to be your complete introduction to tf.keras for your deep learning project.
The focus is on using the API for common deep learning model development tasks; we will not be diving into the math and theory of deep learning. For that, I recommend starting with this excellent book.
The best way to learn deep learning in python is by doing. Dive in. You can circle back for more theory later.
I have designed each code example to use best practices and to be standalone so that you can copy and paste it directly into your project and adapt it to your specific needs. This will give you a massive head start over trying to figure out the API from official documentation alone.
It is a large tutorial and as such, it is divided into five parts; they are:
- Install TensorFlow and tf.keras
- What Are Keras and tf.keras?
- How to Install TensorFlow
- How to Confirm TensorFlow Is Installed
- Deep Learning Model Life-Cycle
- The 5-Step Model Life-Cycle
- Sequential Model API (Simple)
- Functional Model API (Advanced)
- How to Develop Deep Learning Models
- Develop Multilayer Perceptron Models
- Develop Convolutional Neural Network Models
- Develop Recurrent Neural Network Models
- How to Use Advanced Model Features
- How to Visualize a Deep Learning Model
- How to Plot Model Learning Curves
- How to Save and Load Your Model
- How to Get Better Model Performance
- How to Reduce Overfitting With Dropout
- How to Accelerate Training With Batch Normalization
- How to Halt Training at the Right Time With Early Stopping
You Can Do Deep Learning in Python!
Work through the tutorial at your own pace.
You do not need to understand everything (at least not right now). Your goal is to run through the tutorial end-to-end and get results. You do not need to understand everything on the first pass. List down your questions as you go. Make heavy use of the API documentation to learn about all of the functions that you’re using.
You do not need to know the math first. Math is a compact way of describing how algorithms work, specifically tools from linear algebra, probability, and statistics. These are not the only tools that you can use to learn how algorithms work. You can also use code and explore algorithm behavior with different inputs and outputs. Knowing the math will not tell you what algorithm to choose or how to best configure it. You can only discover that through careful, controlled experiments.
You do not need to know how the algorithms work. It is important to know about the limitations and how to configure deep learning algorithms. But learning about algorithms can come later. You need to build up this algorithm knowledge slowly over a long period of time. Today, start, so you know how to pick up the basics of a language really fast. Just get started and dive into the details later.
You do not need to be a deep learning expert. You can learn about the benefits and limitations of various algorithms later, and there are plenty of posts that you can read later to brush up on the steps of a deep learning project and the importance of evaluating model skill using cross-validation.
1. Install TensorFlow and tf.keras
In this section, you will discover what tf.keras is, how to install it, and how to confirm that it is installed correctly.
1.1 What Are Keras and tf.keras?
Keras is an open-source deep learning library written in Python.
The project was started in 2015 by Francois Chollet. It quickly became a popular framework for developers, becoming one of, if not the most, popular deep learning libraries.
During the period of 2015-2019, developing deep learning models using mathematical libraries like TensorFlow, Theano, and PyTorch was cumbersome, requiring tens or even hundreds of lines of code to achieve the simplest tasks. The focus of these libraries was on research, flexibility, and speed, not ease of use.
Keras was popular because the API was clean and simple, allowing standard deep learning models to be defined, fit, and evaluated in just a few lines of code.
A secondary reason Keras took-off was because it allowed you to use any one among the range of popular deep learning mathematical libraries as the backend (e.g. used to perform the computation), such as TensorFlow, Theano, and later, CNTK. This allowed the power of these libraries to be harnessed (e.g. GPUs) with a very clean and simple interface.
In 2019, Google released a new version of their TensorFlow deep learning library (TensorFlow 2) that integrated the Keras API directly and promoted this interface as the default or standard interface for deep learning development on the platform.
This integration is commonly referred to as the tf.keras interface or API (“tf” is short for “TensorFlow“). This is to distinguish it from the so-called standalone Keras open source project.
- Standalone Keras. The standalone open source project that supports TensorFlow, Theano and CNTK backends.
- tf.keras. The Keras API integrated into TensorFlow 2.
The Keras API implementation in Keras is referred to as “tf.keras” because this is the Python idiom used when referencing the API. First, the TensorFlow module is imported and named “tf“; then, Keras API elements are accessed via calls to tf.keras; for example:
I generally don’t use this idiom myself; I don’t think it reads cleanly.
Given that TensorFlow was the de facto standard backend for the Keras open source project, the integration means that a single library can now be used instead of two separate libraries. Further, the standalone Keras project now recommends all future Keras development use the tf.keras API..
1.2 How to Install TensorFlow
Before installing TensorFlow, ensure that you have Python installed, such as Python 3.6 or higher.
If you don’t have Python installed, you can install it using Anaconda. This tutorial will show you how:
There are many ways to install the TensorFlow open-source deep learning library.
The most common, and perhaps the simplest, way to install TensorFlow on your workstation is by using pip.
For example, on the command line, you can type:
If you prefer to use an installation method more specific to your platform or package manager, you can see a complete list of installation instructions here:
There is no need to set up the GPU now.
All examples in this tutorial will work just fine on a modern CPU. If you want to configure TensorFlow for your GPU, you can do that after completing this tutorial. Don’t get distracted!
1.3 How to Confirm TensorFlow Is Installed
Once TensorFlow is installed, it is important to confirm that the library was installed successfully and that you can start using it.
Don’t skip this step.
If TensorFlow is not installed correctly or raises an error on this step, you won’t be able to run the examples later.
Create a new file called versions.py and copy and paste the following code into the file.
Save the file, then open your command line and change directory to where you saved the file.
Then type:
You should then see output like the following:
This confirms that TensorFlow is installed correctly and that we are all using the same version.
What version did you get?
Post your output in the comments below.
This also shows you how to run a Python script from the command line. I recommend running all code from the command line in this manner, and not from a notebook or an IDE.
If You Get Warning Messages
Sometimes when you use the tf.keras API, you may see warnings printed.
This might include messages that your hardware supports features that your TensorFlow installation was not configured to use.
Some examples on my workstation include:
They are not your fault. You did nothing wrong.
These are information messages and they will not prevent the execution of your code. You can safely ignore messages of this type for now.
It’s an intentional design decision made by the TensorFlow team to show these warning messages. A downside of this decision is that it confuses beginners and it trains developers to ignore all messages, including those that potentially may impact the execution.
Now that you know what tf.keras is, how to install TensorFlow, and how to confirm your development environment is working, let’s look at the life-cycle of deep learning models in TensorFlow.
2. Deep Learning Model Life-Cycle
In this section, you will discover the life-cycle for a deep learning model and the two tf.keras APIs that you can use to define models.
2.1 The 5-Step Model Life-Cycle
A model has a life-cycle, and this very simple knowledge provides the backbone for both modeling a dataset and understanding the tf.keras API.
The five steps in the life-cycle are as follows:
- Define the model.
- Compile the model.
- Fit the model.
- Evaluate the model.
- Make predictions.
Let’s take a closer look at each step in turn.
Define the Model
Defining the model requires that you first select the type of model that you need and then choose the architecture or network topology.
From an API perspective, this involves defining the layers of the model, configuring each layer with a number of nodes and activation function, and connecting the layers together into a cohesive model.
Models can be defined either with the Sequential API or the Functional API, and we will take a look at this in the next section.
Compile the Model
Compiling the model requires that you first select a loss function that you want to optimize, such as mean squared error or cross-entropy.
It also requires that you select an algorithm to perform the optimization procedure, typically stochastic gradient descent, or a modern variation, such as Adam. It may also require that you select any performance metrics to keep track of during the model training process.
From an API perspective, this involves calling a function to compile the model with the chosen configuration, which will prepare the appropriate data structures required for the efficient use of the model you have defined.
The optimizer can be specified as a string for a known optimizer class, e.g. ‘sgd‘ for stochastic gradient descent, or you can configure an instance of an optimizer class and use that.
For a list of supported optimizers, see this:
The three most common loss functions are:
- ‘binary_crossentropy‘ for binary classification.
- ‘sparse_categorical_crossentropy‘ for multi-class classification.
- ‘mse‘ (mean squared error) for regression.
For a list of supported loss functions, see:
Metrics are defined as a list of strings for known metric functions or a list of functions to call to evaluate predictions.
For a list of supported metrics, see:
Fit the Model
Fitting the model requires that you first select the training configuration, such as the number of epochs (loops through the training dataset) and the batch size (number of samples in an epoch used to estimate model error).
Training applies the chosen optimization algorithm to minimize the chosen loss function and updates the model using the backpropagation of error algorithm.
Fitting the model is the slow part of the whole process and can take seconds to hours to days, depending on the complexity of the model, the hardware you’re using, and the size of the training dataset.
From an API perspective, this involves calling a function to perform the training process. This function will block (not return) until the training process has finished.
For help on how to choose the batch size, see this tutorial:
While fitting the model, a progress bar will summarize the status of each epoch and the overall training process. This can be simplified to a simple report of model performance each epoch by setting the “verbose” argument to 2. All output can be turned off during training by setting “verbose” to 0.
Evaluate the Model
Evaluating the model requires that you first choose a holdout dataset used to evaluate the model. This should be data not used in the training process so that we can get an unbiased estimate of the performance of the model when making predictions on new data.
The speed of model evaluation is proportional to the amount of data you want to use for the evaluation, although it is much faster than training as the model is not changed.
From an API perspective, this involves calling a function with the holdout dataset and getting a loss and perhaps other metrics that can be reported.
Make a Prediction
Making a prediction is the final step in the life-cycle. It is why we wanted the model in the first place.
It requires you have new data for which a prediction is required, e.g. where you do not have the target values.
From an API perspective, you simply call a function to make a prediction of a class label, probability, or numerical value: whatever you designed your model to predict.
You may want to save the model and later load it to make predictions. You may also choose to fit a model on all of the available data before you start using it.
Now that we are familiar with the model life-cycle, let’s take a look at the two main ways to use the tf.keras API to build models: sequential and functional.
2.2 Sequential Model API (Simple)
The sequential model API is the simplest and is the API that I recommend, especially when getting started.
It is referred to as “sequential” because it involves defining a Sequential class and adding layers to the model one by one in a linear manner, from input to output.
The example below defines a Sequential MLP model that accepts eight inputs, has one hidden layer with 10 nodes and then an output layer with one node to predict a numerical value.
Note that the visible layer of the network is defined by the “input_shape” argument on the first hidden layer. That means in the above example, the model expects the input for one sample to be a vector of eight numbers.
The sequential API is easy to use because you keep calling model.add() until you have added all of your layers.
For example, here is a deep MLP with five hidden layers.
2.3 Functional Model API (Advanced)
The functional API is more complex but is also more flexible.
It involves explicitly connecting the output of one layer to the input of another layer. Each connection is specified.
First, an input layer must be defined via the Input class, and the shape of an input sample is specified. We must retain a reference to the input layer when defining the model.
Next, a fully connected layer can be connected to the input by calling the layer and passing the input layer. This will return a reference to the output connection in this new layer.
We can then connect this to an output layer in the same manner.
Once connected, we define a Model object and specify the input and output layers. The complete example is listed below.
As such, it allows for more complicated model designs, such as models that may have multiple input paths (separate vectors) and models that have multiple output paths (e.g. a word and a number).
The functional API can be a lot of fun when you get used to it.
For more on the functional API, see:
Now that we are familiar with the model life-cycle and the two APIs that can be used to define models, let’s look at developing some standard models.
3. How to Develop Deep Learning Models
In this section, you will discover how to develop, evaluate, and make predictions with standard deep learning models, including Multilayer Perceptrons (MLP), Convolutional Neural Networks (CNNs), and Recurrent Neural Networks (RNNs).
3.1 Develop Multilayer Perceptron Models
A Multilayer Perceptron model, or MLP for short, is a standard fully connected neural network model.
It is comprised of layers of nodes where each node is connected to all outputs from the previous layer and the output of each node is connected to all inputs for nodes in the next layer.
An MLP is created by with one or more Dense layers. This model is appropriate for tabular data, that is data as it looks in a table or spreadsheet with one column for each variable and one row for each variable. There are three predictive modeling problems you may want to explore with an MLP; they are binary classification, multiclass classification, and regression.
Let’s fit a model on a real dataset for each of these cases.
Note, the models in this section are effective, but not optimized. See if you can improve their performance. Post your findings in the comments below.
MLP for Binary Classification
We will use the Ionosphere binary (two-class) classification dataset to demonstrate an MLP for binary classification.
This dataset involves predicting whether a structure is in the atmosphere or not given radar returns.
The dataset will be downloaded automatically using Pandas, but you can learn more about it here.
We will use a LabelEncoder to encode the string labels to integer values 0 and 1. The model will be fit on 67 percent of the data, and the remaining 33 percent will be used for evaluation, split using the train_test_split() function.
It is a good practice to use ‘relu‘ activation with a ‘he_normal‘ weight initialization. This combination goes a long way to overcome the problem of vanishing gradients when training deep neural network models. For more on ReLU, see the tutorial:
The model predicts the probability of class 1 and uses the sigmoid activation function. The model is optimized using the adam version of stochastic gradient descent and seeks to minimize the cross-entropy loss.
The complete example 94 percent and then predicted a probability of 0.9 that the one row of data belongs to class 1.
MLP for Multiclass Classification
We will use the Iris flowers multiclass classification dataset to demonstrate an MLP for multiclass classification.
This problem involves predicting the species of iris flower given measures of the flower.
The dataset will be downloaded automatically using Pandas, but you can learn more about it here.
Given that it is a multiclass classification, the model must have one node for each class in the output layer and use the softmax activation function. The loss function is the ‘sparse_categorical_crossentropy‘, which is appropriate for integer encoded class labels (e.g. 0 for one class, 1 for the next class, etc.)
The complete example of fitting and evaluating an MLP on the iris flowers 98 percent and then predicted a probability of a row of data belonging to each class, although class 0 has the highest probability.
MLP for Regression
We will use the Boston housing regression dataset to demonstrate an MLP for regression predictive modeling.
This problem involves predicting house value based on properties of the house and neighborhood.
The dataset will be downloaded automatically using Pandas, but you can learn more about it here.
This is a regression problem that involves predicting a single numerical value. As such, the output layer has a single node and uses the default or linear activation function (no activation function). The mean squared error (mse) loss is minimized when fitting the model.
Recall that this is a regression, not classification; therefore, we cannot calculate classification accuracy. For more on this, see the tutorial:
The complete example of fitting and evaluating an MLP on the Boston housing an MSE of about 60 which is an RMSE of about 7 (units are thousands of dollars). A value of about 26 is then predicted for the single example.
3.2 Develop Convolutional Neural Network Models
Convolutional Neural Networks, or CNNs for short, are a type of network designed for image input.
They are comprised of models with convolutional layers that extract features (called feature maps) and pooling layers that distill features down to the most salient elements.
CNNs are most well-suited to image classification tasks, although they can be used on a wide array of tasks that take images as input.
A popular image classification task is the MNIST handwritten digit classification. It involves tens of thousands of handwritten digits that must be classified as a number between 0 and 9.
The tf.keras API provides a convenience function to download and load this dataset directly.
The example below loads the dataset and plots the first few images.
Running the example loads the MNIST dataset, then summarizes the default train and test datasets.
A plot is then created showing a grid of examples of handwritten images in the training dataset.
Plot of Handwritten Digits From the MNIST dataset
We can train a CNN model to classify the images in the MNIST dataset.
Note that the images are arrays of grayscale pixel data; therefore, we must add a channel dimension to the data before we can use the images as input to the model. The reason is that CNN models expect images in a channels-last format, that is each example to the network has the dimensions [rows, columns, channels], where channels represent the color channels of the image data.
It is also a good idea to scale the pixel values from the default range of 0-255 to 0-1 when training a CNN. For more on scaling pixel values, see the tutorial:
The complete example of fitting and evaluating a CNN model on the MNIST dataset is listed below.
Running the example first reports the shape of the dataset, then fits the model and evaluates it on the test dataset. Finally, a prediction is made for a single image. each image is reported along with the number of classes; we can see that each image is 28×28 pixels and there are 10 classes as we expected.
In this case, we can see that the model achieved a classification accuracy of about 98 percent on the test dataset. We can then see that the model predicted class 5 for the first image in the training set.
3.3 Develop Recurrent Neural Network Models
Recurrent Neural Networks, or RNNs for short, are designed to operate upon sequences of data.
They have proven to be very effective for natural language processing problems where sequences of text are provided as input to the model. RNNs have also seen some modest success for time series forecasting and speech recognition.
The most popular type of RNN is the Long Short-Term Memory network, or LSTM for short. LSTMs can be used in a model to accept a sequence of input data and make a prediction, such as assign a class label or predict a numerical value like the next value or values in the sequence.
We will use the car sales dataset to demonstrate an LSTM RNN for univariate time series forecasting.
This problem involves predicting the number of car sales per month.
The dataset will be downloaded automatically using Pandas, but you can learn more about it here.
We will frame the problem to take a window of the last five months of data to predict the current month’s data.
To achieve this, we will define a new function named split_sequence() that will split the input sequence into windows of data appropriate for fitting a supervised learning model, like an LSTM.
For example, if the sequence was:
Then the samples for training the model will look like:
We will use the last 12 months of data as the test dataset.
LSTMs expect each sample in the dataset to have two dimensions; the first is the number of time steps (in this case it is 5), and the second is the number of observations per time step (in this case it is 1).
Because it is a regression type problem, we will use a linear activation function (no activation
function) in the output layer and optimize the mean squared error loss function. We will also evaluate the model using the mean absolute error (MAE) metric.
The complete example of fitting and evaluating an LSTM for a univariate time series forecasting problem is listed below.
Running the example first reports the shape of the dataset, then fits the model and evaluates it on the test dataset. Finally, a prediction is made for a single example. the train and test datasets is displayed, confirming that the last 12 examples are used for model evaluation.
In this case, the model achieved an MAE of about 2,800 and predicted the next value in the sequence from the test set as 13,199, where the expected value is 14,577 (pretty close).
Note: it is good practice to scale and make the series stationary the data prior to fitting the model. I recommend this as an extension in order to achieve better performance. For more on preparing time series data for modeling, see the tutorial:
4. How to Use Advanced Model Features
In this section, you will discover how to use some of the slightly more advanced model features, such as reviewing learning curves and saving models for later use.
4.1 How to Visualize a Deep Learning Model
The architecture of deep learning models can quickly become large and complex.
As such, it is important to have a clear idea of the connections and data flow in your model. This is especially important if you are using the functional API to ensure you have indeed connected the layers of the model in the way you intended.
There are two tools you can use to visualize your model: a text description and a plot.
Model Text Description
A text description of your model can be displayed by calling the summary() function on your model.
The example below defines a small model with three layers and then summarizes the structure.
Running the example prints a summary of each layer, as well as a total summary.
This is an invaluable diagnostic for checking the output shapes and number of parameters (weights) in your model.
Model Architecture Plot
You can create a plot of your model by calling the plot_model() function.
This will create an image file that contains a box and line diagram of the layers in your model.
The example below creates a small three-layer model and saves a plot of the model architecture to ‘model.png‘ that includes input and output shapes.
Running the example creates a plot of the model showing a box for each layer with shape information, and arrows that connect the layers, showing the flow of data through the network.
Plot of Neural Network Architecture
4.2 How to Plot Model Learning Curves
Learning curves are a plot of neural network model performance over time, such as calculated at the end of each training epoch.
Plots of learning curves provide insight into the learning dynamics of the model, such as whether the model is learning well, whether it is underfitting the training dataset, or whether it is overfitting the training dataset.
For a gentle introduction to learning curves and how to use them to diagnose learning dynamics of models, see the tutorial:
You can easily create learning curves for your deep learning models.
First, you must update your call to the fit function to include reference to a validation dataset. This is a portion of the training set not used to fit the model, and is instead used to evaluate the performance of the model during training.
You can split the data manually and specify the validation_data argument, or you can use the validation_split argument and specify a percentage split of the training dataset and let the API perform the split for you. The latter is simpler for now.
The fit function will return a history object that contains a trace of performance metrics recorded at the end of each training epoch. This includes the chosen loss function and each configured metric, such as accuracy, and each loss and metric is calculated for the training and validation datasets.
A learning curve is a plot of the loss on the training dataset and the validation dataset. We can create this plot from the history object using the Matplotlib library.
The example below fits a small neural network on a synthetic binary classification problem. A validation split of 30 percent is used to evaluate the model during training and the cross-entropy loss on the train and validation datasets are then graphed using a line plot.
Running the example fits the model on the dataset. At the end of the run, the history object is returned and used as the basis for creating the line plot.
The cross-entropy loss for the training dataset is accessed via the ‘loss‘ key and the loss on the validation dataset is accessed via the ‘val_loss‘ key on the history attribute of the history object.
Learning Curves of Cross-Entropy Loss for a Deep Learning Model
4.3 How to Save and Load Your Model
Training and evaluating models is great, but we may want to use a model later without retraining it each time.
This can be achieved by saving the model to file and later loading it and using it to make predictions.
This can be achieved using the save() function on the model to save the model. It can be loaded later using the load_model() function.
The model is saved in H5 format, an efficient array storage format. As such, you must ensure that the h5py library is installed on your workstation. This can be achieved using pip; for example:
The example below fits a simple model on a synthetic binary classification problem and then saves the model file.
Running the example fits the model and saves it to file with the name ‘model.h5‘.
We can then load the model and use it to make a prediction, or continue training it, or do whatever we wish with it.
The example below loads the model and uses it to make a prediction.
Running the example loads the image from file, then uses it to make a prediction on a new row of data and prints the result.
5. How to Get Better Model Performance
In this section, you will discover some of the techniques that you can use to improve the performance of your deep learning models.
A big part of improving deep learning performance involves avoiding overfitting by slowing down the learning process or stopping the learning process at the right time.
5.1 How to Reduce Overfitting With Dropout
Dropout is a clever regularization method that reduces overfitting of the training dataset and makes the model more robust.
This is achieved during training, where some number of layer outputs are randomly ignored or “dropped out.” This has the effect of making the layer look like – and be treated like – a layer with a different number of nodes and connectivity to the prior layer.
Dropout has the effect of making the training process noisy, forcing nodes within a layer to probabilistically take on more or less responsibility for the inputs.
For more on how dropout works, see this tutorial:
You can add dropout to your models as a new layer prior to the layer that you want to have input connections dropped-out.
This involves adding a layer called Dropout() that takes an argument that specifies the probability that each output from the previous to drop. E.g. 0.4 means 40 percent of inputs will be dropped each update to the model.
You can add Dropout layers in MLP, CNN, and RNN models, although there are also specialized versions of dropout for use with CNN and RNN models that you might also want to explore.
The example below fits a small neural network model on a synthetic binary classification problem.
A dropout layer with 50 percent dropout is inserted between the first hidden layer and the output layer.
5.2 How to Accelerate Training With Batch Normalization
The scale and distribution of inputs to a layer can greatly impact how easy or quickly that layer can be trained.
This is generally why it is a good idea to scale input data prior to modeling it with a neural network model.
Batch normalization is a technique for training very deep neural networks that standardizes the inputs to a layer for each mini-batch. This has the effect of stabilizing the learning process and dramatically reducing the number of training epochs required to train deep networks.
For more on how batch normalization works, see this tutorial:
You can use batch normalization in your network by adding a batch normalization layer prior to the layer that you wish to have standardized inputs. You can use batch normalization with MLP, CNN, and RNN models.
This can be achieved by adding the BatchNormalization layer directly.
The example below defines a small MLP network for a binary classification prediction problem with a batch normalization layer between the first hidden layer and the output layer.
Also, tf.keras has a range of other normalization layers you might like to explore; see:
5.3 How to Halt Training at the Right Time With Early Stopping
Neural networks are challenging to train.
Too little training and the model is underfit; too much training and the model overfits the training dataset. Both cases result in a model that is less effective than it could be.
One approach to solving this problem is to use early stopping. This involves monitoring the loss on the training dataset and a validation dataset (a subset of the training set not used to fit the model). As soon as loss for the validation set starts to show signs of overfitting, the training process can be stopped.
For more on early stopping, see the tutorial:
Early stopping can be used with your model by first ensuring that you have a validation dataset. You can define the validation dataset manually via the validation_data argument to the fit() function, or you can use the validation_split and specify the amount of the training dataset to hold back for validation.
You can then define an EarlyStopping and instruct it on which performance measure to monitor, such as ‘val_loss‘ for loss on the validation dataset, and the number of epochs to observed overfitting before taking action, e.g. 5.
This configured EarlyStopping callback can then be provided to the fit() function via the “callbacks” argument that takes a list of callbacks.
This allows you to set the number of epochs to a large number and be confident that training will end as soon as the model starts overfitting. You might also like to create a learning curve to discover more insights into the learning dynamics of the run and when training was halted.
The example below demonstrates a small neural network on a synthetic binary classification problem that uses early stopping to halt training as soon as the model starts overfitting (after about 50 epochs).
The tf.keras API provides a number of callbacks that you might like to explore; you can learn more here:
Further Reading
This section provides more resources on the topic if you are looking to go deeper.
Tutorials
- How to Control the Stability of Training Neural Networks With the Batch Size
- A Gentle Introduction to the Rectified Linear Unit (ReLU)
- Difference Between Classification and Regression in Machine Learning
- How to Manually Scale Image Pixel Data for Deep Learning
- 4 Common Machine Learning Data Transforms for Time Series Forecasting
- How to use Learning Curves to Diagnose Machine Learning Model Performance
- A Gentle Introduction to Dropout for Regularizing Deep Neural Networks
- A Gentle Introduction to Batch Normalization for Deep Neural Networks
- A Gentle Introduction to Early Stopping to Avoid Overtraining Neural Networks
Books
- Deep Learning, 2016.
Guides
- Install TensorFlow 2 Guide.
- TensorFlow Core: Keras
- Tensorflow Core: Keras Overview Guide
- The Keras functional API in TensorFlow
- Save and load models
- Normalization Layers Guide.
APIs
Summary
In this tutorial, you discovered a step-by-step guide to developing deep learning models in TensorFlow using the tf.keras API.
Specifically, you learned:
-.
Do you have any questions?
Ask your questions in the comments below and I will do my best to answer.
Hi
Thanks for this awesome blog post.
In case of the MLP for Regression example, by the first hidden layer with 10 nodes, if I change the activation function from ‘relu’ to ‘sigmoid’ I always get much better result: Following couple of tries with that change:
MSE: 1078.271, RMSE: 32.837
Predicted: 154.961
MSE: 1306.771, RMSE: 36.149
Predicted: 153.267
MSE: 2511.747, RMSE: 50.117
Predicted: 142.649
Do you know why?
Sorry I meant vice versa, that’s ‘sigmoid’ to ‘relu’.
Agreed.
I found the same and updated the example accordingly.
Thanks Markus!
You’re welcome.
Nice finding, I’ll explore and update the post.
The reason. My guess is the data needs to be transformed prior to scaling.
Hi
Thanks.
Could you please elaborate your answer a bit as I didn’t understand it? That model doesn’t have any scaling like the CNN example.
Yes, I believe that the model would perform better with sigmoid activations if the data was scaled (normalized) prior to fitting the model.
The relu is more robust and is in less need of normalized inputs.
Jason, This is a great tutorial on TF 2.0 !
To add on the discussion of ‘Relu’ vs ‘Sigmoid’ output function, ‘Relu’ is used after ‘Sigmoid’ has the problem of disappearing gradient for deep structure network, like 30-100 layers. The particular example used here is actually more a ‘shallow’ network relative to the ‘deep’ one more people are used in real project these days. So, it’s not surprised that a ‘sigmoid’ function is fine or even better.
Thanks!
Yes, this gives an example:
# mlp for regression
Why use y = LabelEncoder().fit_transform(y)? It’s not necessary, and the prediction of yhat() is too large than y which max is 50.0,
You’re right, looks like a bug!
Thanks Todd.
Updated.
Little bug in last example:
from:
from keras.callbacks import EarlyStopping
to:
from tensorflow.keras.callbacks import EarlyStopping
Thanks, fixed!
Is it necessary yo set a seed before fitting the model?
No.
well explained and liked very much . I request you to please write one blog using below steps?
1) tf.keras.layers.GRUCell()
2) tf.keras.layers.LSTMCell()
3) tf.nn.RNNCellDropoutWrapper()
4) tf.keras.layers.RNN()
Great suggestions!
Awesome stuff. It has very good information on TensorFlow 2. Best guide to developing deep learning models for Business intelligence .Thanks for sharing!
Thanks!
Nice guide! Thanks a lot!
I have a question related to the MLP Binary Classification problem.
During the evaluation process, i’ve changed the verbose argument to 2, and got this:
116/1 – 0s – loss: 0.1011 – accuracy: 0.9483
I’ve added a print command to show the test loss line:
print(‘Test loss: %.3f’ % loss)
print(‘Test Accuracy: %.3f’ % acc)
And i’m getting this result:
Loss Test: 0.169
Test Accuracy: 0.948
Why is it different from the reported by the evaluate function?
You have clipped precision at 3 decimal places.
Also, the end of epoch loss/accuracy is an average over the batches, it is better to call evaluate() at the end of the run to get a true estimate of model performance on a hold out dataset.
Thank you so much for the blog, provides lot of information to learners
Please help with more information on forecasting using RNN
You’re welcome!
See the tutorials here:
Hi Jason,
in the CNN example, wouldn’t it be MaxPool2D instead of MaxPooling2D?
I believe you’re correct:
thanks Jason brownlee!
i am following your tutorial since i start my machine/deep learning journey, it really help me alot. Since deep learning models are becoming bigger which require multi-GPU support. It will be great if you write a tutorial on tf.keras for multi-GPU preferably some GAN model like CycleGAN or MUNIT. Thank
Thanks for the suggestion!
Hi Israr and Jason, yes I second that, it a tutorial for multi gpu using Keras would be awesome. That said, I am reading about issued of multi GPU not working with a number of tensorflow backend versions. Thanks, Mark
Thanks.
Thanks for another great post!
In the functional model API section you mention that this allows for multiple input paths. My question is related to that. The output of my MLP model will be reshaped and 2d convolved with an image (another data input midstream to the network). How do I keep this result as a part of the overall model for further processing? (model.add(intermediate_result)?)
Thanks.
Yes, you could have one output for each element you require, e.g. each layer that produces an output you want would be an “output” layer.
See this:
never mind, I figured it out, the functional API does make it easy!
Well done!
This blog was written so well, it filled me up with emotions!
I am now doing the monthly donation. And I would suggest for everyone to give back to this awesome blog to keep it up and running!
Thank you Jason for this fantastic initiative, you are literally creating jobs!
Thanks!!!
Hi
For the input_shape parameter of a a Dense layer it seems that one can pass over a list instead of a tuple. That’s
model.add(Dense(10, input_shape=[8]))
Instead of:
model.add(Dense(10, input_shape=(8,)))
My questions are:
Is that the same?
Why is that so that both works?
Probably it’s even possible for any layer type that has input_shape parameter (which I’ve not tested).
Thanks
I think I figured it out by myself, BUT please correct me if I’m wrong. It’s happening here:
So no matter if you pass over a list or a tuple object, the return value of:
tuple(kwargs[‘input_shape’])
will be always the same as a tuple object because:
>>> tuple((2,))
(2,)
>>> tuple([2])
(2,)
Am I right?
Thanks.
Identical.
Hi Jason
Thanks for your reply.
What do you mean with identical? Sorry my English is a bit poor.
Equilivient. They do the same thing.
Hi Jason,
In Ionosphere data code block line 32, should it be
yhat = model.predict(([row],)) instead of yhat = model.predict([row])?
Just to match the input_shape, which is required to be a one-element tuple?
The model expects 2d input: rows,cols or samples,features.
Hi Jason:
Great tutorial ! It is a good summary of different MLP, CNN and RNN models (including the datasets cases approached by simple few lines codes). Congratulations !.
1.) Here are my results, at the time being I have only worked with Ionosphere and Iris data cases (I will continue the next ones) but, I share the first two:
1.1) in the fist Ionosphere study Case (MLP model for Binary Classification), I apply some differences (complementing your codes) such as:
80% training data, 10% validation data (that I included in model.fit data) and 10% test data (unseen for accuracy evaluation). Plus I add batchnormalization and dropout (0.5) layers to each of any dense layer (for regularization purposes) and I use 34 units and 8 units for the 2 hidden layers respectively.
I got 97.2% (a little be better of yours 94.% accuracy for unseen test) and 97.3% class good for the example given
1.2) in the second Iris study Case (MLP Multiclassification), I apply some differences (complementing your codes) such as:
80% training data, 10% validation data (I include in model.fit data) and 10% test data (unseen for accuracy evaluation). Plus I add batchnormalization and dropout (0.5) layers to each of any dense layer (for regularization purposes) and I use 64 units, 32 units and 8 units for the now 3 hidden layers respectively.
I got 100.% (a little be better of yours 98.% accuracy for unseen test) and 99.9% class Iris-setosa for the example given
2.) Here are my persistent doubts, in case you can help me:
2.1) if applyng tf.keras new wrapper over tf. 2.x version it is only impact on change the libraries importation such as for example replacing this Keras one example:
from keras.utils import plot_model
for a new one using the tf.keras wrappers
from tensorflow.keras.utils import plot_model
it is highly recommended to apply tf.keras directly due to better guarantee of maintenance by Google/tensorflow team. Do you agree?
2.2) do you expect any efficiency improvement (e.g. on execution time) using tf.keras vs keras ? I apply it but I do not see any change at all. Do you agree?
2.3) I see you have changed loss parameter in Multiclassification (e.g. Iris study case) from previous tutorials of your from categorical_crossentropy to the new one sparse_categorical_crossentroypy. I think it is better the second one. Do you agree?
thank you very much for make these awesome tutorials for us!!
I will continue with the rest of study cases under this tutorial !
regards
JG
Nice work, but the test/val sets are very small. I guess we should be using repeated 10 fold cross-validation.
Yes, we should cut over to tf.keras soon:
Not sure about efficiency differences. No.
They do the same thing, I used the sparse loss so I didn’t have to one hot encode.
Thanks for your valuable suggestions !
I’m hooked on your tutorials !
Thanks!
Hi Jason,
I spent some time implementing different models for MNIST Images Digits Multiclass.
Here I share my main comments:
the 10,000 Test Image I split between 5,000 for Validation (besides training images) and another 5,000 for test (unseeing images for model.evaluate() ), so I think it is more Objetive.
1.) Replicating your same model architecture I got 98.3% Accuracy and, if I replace your 32 filters of your first Conv2D layer for “784” filters I got 98.2%, but the 2 minutes CPU time goes to 45 minutes.
2.) I define a new model with “4 blocks” of increasing number of filters [16,32,64,128] of conv2D`s plus batchnormalization+MaxPoool2D+ Dropout layers as regularizers. But I got I worst result (97.2% and 97.4% if I replace the batch size from 128 for 32).
3.) I apply “Data Augmentation” to your model (with soft images distortion due to poor 28×28 resolution), but I got 96.7%, 97.3% and 97.9% respectively for witdth_shift_range adn similiar height_shiftrange_ arguments values of 0.1, 0.05 and 0.01.
3.1) But also Applying “reTrain” (from 10 epochs to 20 epochs and even 40 epochs9 where I get 98.2% Accuracy, very close to your model.
I noticed that tensorflow.keras… apply the unique method of “model.fit() “even with ‘ImageDataGenerator’.So “model.fit_genetator()” of keras for imaging iterator is going to be deprecated !
4.) I apply ‘transfer learning’, using VGG16.
But first I have to expand each 28×28 pixels image to 32×32 (VGG16 requirement), filling with zeros the rest of rows and columns of image. I also expand from 1 channel Black/White to 3 channel (VGG16 requirement), stacking the same image 3 times ( np.stack() for the new axis) and,
4.1) I got a poor result of 95.2% accuracy for frozen the whole VGG16 (5 blocks) and using only head dense layer as trainable.
4.2) I reTraining several more epochs + 10 + 10 etc. I got moderate accuracy results such as 96.2% and 96.7%
4.3) I decided to “defrost” (be trainable) also the last block (5º) of VGG16 and I got for 10 epoch 97.2% but I went from 2 minutes CPU time to 45 minutes and also from 52 K weights to 7.1 M trainable
4.3) I decided to “defrost” also the penultimate block number 4th (so 4 and 5 blocks are trainable ) and I went from 45minutes to 85 minutes of CPU and from 7.1 M parameters to 13. M trainable parameters. But I got 98.4 % Accuracy
4.4) Finally I “reTrain” the VGG16 (defrosting 4 and 5th block) and I got for 20 more epochs and 20 more 99.4% and 99.4% also replacing ‘Adam’ optimizer by more soft “SGD” for fine tuning.
At the cost of increasing cpu time goes from 45 minutes to 85 minutes.
My conclusions are:
a) your simple model is very efficient, and robust (without implementing any complexity such as data_augmentation)
b) I can beat yours result I get the best one 99.4%, at the cost fo implementing VGG16 transfer Learning, besides defrosting 4th and 5 blocks of VGG16. At the cost of more complexity and more CPU time.
c) These models are sensitives to retrain from the 10 initial epochs up to 40 where the system does nor learn anymore.
regards,
JG
Very cool experiments, great learnings!
Thanks for sharing your findings.
You showed how to predict for one instance of data, but how to do the same for all the test dataset? Instead of passing yhat = model.predict([row]) what should we do to get all the predictions from the test dataset?
Pass in all rows into the predict() function to make a prediction for them.
This will help if you need it:
Hi Jason, thank you too much for the helpful topic.
I have a problem that I need your help on it.
Due to the suggestion from keras.io and from your topic, I turned to use “tf.keras” instead of “keras” to build my Deep NNs model. I am trying to define a custom loss function for my model.
Firstly, I took a look at how “tf.keras” and “keras” define (by codes) their loss function so that I could follow for my custom loss fn. I took the available MeanSquaredError() for the observation, and I found that they don’t seem to give identical results. Particularly,
My first case ===========================================================
”
import numpy as np
import tensorflow as tf
y_t = np.array([[1, 2, 3, 4], [8, 9, 1, 5], [7, 8, 7, 13]])
y_p = np.array([[4, 5, 23, 14], [18, 91, 7, 10], [3, 6, 5, 7]])
mse = tf.keras.losses.MeanSquaredError()
loss1 = mse(y_t, y_p)
print(‘—‘)
print(‘tf.keras.losses:’, loss1)
”
The result is:
— tf.keras.losses: tf.Tensor(621, shape=(), dtype=int32) —
My second case =========================================================
”
import numpy as np
import keras
y_t = np.array([[1, 2, 3, 4],[8, 9, 1, 5],[7, 8, 7, 13]])
y_p = np.array([[4, 5, 23, 14],[18, 91, 7, 10],[3, 6, 5, 7]])
mse2 = keras.losses.MeanSquaredError()
loss2 = mse2(y_t, y_p)
print(‘—‘)
print(‘keras.losses:’, loss2)
”
The result is:
— keras.losses: tf.Tensor(621.9167, shape=(), dtype=float32) —
======================================================================
Well, the former gives the “dtype=int32” and the later gives “dtype=float32” although they were run with the same input data.
So, what could be the explanations for the difference?
I believe, when the model is trained, the loss values are unlikely to be integer, so is it a problem if I use the “tf.keras.losses.MeanSquaredError()” for my model?
Lastly, is there any problem of using some loss fns from keras.losses for the model.compile() if the model is built by tf.keras.Sequential()?
I generally recommend sticking with standalone Keras for now:
I cannot help you debug the conversion, sorry.
Thanks for your reply Jason!
I have been trying to implement this for a few days and I have not been successful.
I am getting the errors: ERROR:
root:Internal Python error in the inspect module.
Below is the traceback from this internal error.
Traceback (most recent call last):
File “C:\ProgramData\Anaconda3\lib\site-packages\IPython\core\interactiveshell.py”, line 3331, in run_code
exec(code_obj, self.user_global_ns, self.user_ns)
File “”, line 1, in
model = tf.keras.Sequential()
AttributeError: module ‘tensorflow’ has no attribute ‘keras’
got it working,
(235, 34) (116, 34) (235,) (116,)
WARNING:tensorflow:From D:\Anaconda3\lib\site-packages\tensorflow\python\ops\resource_variable_ops.py:435: colocate_with (from tensorflow.python.framework.ops) is deprecated and will be removed in a future version.
Instructions for updating:
Colocations handled automatically by placer.
WARNING:tensorflow:From D:\Anaconda3\lib\site-packages\tensorflow\python\ops\math_ops.py:3066: to_int32 (from tensorflow.python.ops.math_ops) is deprecated and will be removed in a future version.
Instructions for updating:
Use tf.cast instead.
Test Accuracy: 0.914
Traceback (most recent call last):
File “D:\tflowdata\untitled3.py”, line 44, in
yhat = model.predict([row])
File “D:\Anaconda3\lib\site-packages\tensorflow\python\keras\engine\training.py”, line 1096, in predict
x, check_steps=True, steps_name=’steps’, steps=steps)
Well done!
I believe you need to upgrade hour version of tensorflow to 2.0 or higher.
I cut and paste the example and got this error:
How did I get it wrong?
import tensorflow
print(tensorflow.__version__)# example of a model defined with the sequential api
from tensorflow.keras import Sequential
from tensorflow.keras.layers import Dense
# define the model
model = Sequential()
model.add(Dense(100, input_shape=(8,0)))
model.add(Dense(80))
model.add(Dense(30))
model.add(Dense(10))
model.add(Dense(5))
model.add(Dense(1))
2.1.0
—————————————————————————
InternalError Traceback (most recent call last)
in
6 # define the model
7 model = Sequential()
—-> 8 model.add(Dense(100, input_shape=(8,0)))
9 model.add(Dense(80))
10 model.add(Dense(30))
~\Anaconda3\lib\site-packages\tensorflow_core\python\training\tracking\base.py in _method_wrapper(self, *args, **kwargs)
455 self._self_setattr_tracking = False # pylint: disable=protected-access
456 try:
–> 457 result = method(self, *args, **kwargs)
458 finally:
459 self._self_setattr_tracking = previous_value # pylint: disable=protected-access
~\Anaconda3\lib\site-packages\tensorflow_core\python\keras\engine\sequential.py in add(self, layer)
183 # and create the node connecting the current layer
184 # to the input layer we just created.
–> 185 layer(x)
186 set_inputs = True
187
~\Anaconda3\lib\site-packages\tensorflow_core\python\keras\engine\base_layer.py in __call__(self, inputs, *args, **kwargs)
746 # Build layer if applicable (if the
buildmethod has been
747 # overridden).
–> 748 self._maybe_build(inputs)
749 cast_inputs = self._maybe_cast_inputs(inputs)
750
~\Anaconda3\lib\site-packages\tensorflow_core\python\keras\engine\base_layer.py in _maybe_build(self, inputs)
2114 # operations.
2115 with tf_utils.maybe_init_scope(self):
-> 2116 self.build(input_shapes)
2117 # We must set self.built since user defined build functions are not
2118 # constrained to set self.built.
You have custom code, this may help:
I did find the problem:
I had been successfully using TensorFlow-GPU 1 and Keras.
When I upgraded to 2, this same code failed.
It was because my NVIDIA CUDA drivers needed to be updated in order to support TF 2.
Sorry for the question, but maybe it will help someone else.
Well done on fixing your issue!
To predict from a model, I need to set up the test observation row like this:-
row = [[0.00632],[18.00],[2.310],[0],[0.5380],[6.5750],[65.20],[4.0900],[1],[296.0],[15.30],[396.90],[4.98]]
yhat = model.predict(np.array(row).T)
It does not work like in this article:-
row = [0.00632,18.00,2.310,0,0.5380,6.5750,65.20,4.0900,1,296.0,15.30,396.90,4.98]
yhat = model.predict([row])
Why?
Are you sure? Perhaps this will help:
I guess it is the tensorflow version which is causing the problem. Other code working perfectly (except for predicts).
Great.
Excellent blog. It just covers everything in TF . Thanks again for the great blog.
Thanks!
In the batch normalization part, you make a dense layer, activate it with relu and then perform batch norm.
So, layer -> activation -> batch norm
In models like resnet50, the ordering goes like :
layer -> batch norm -> activation(relu)
Does both of them work the same or does the ordering matter? if it matter then how significant is it?
Would you please answer these….
Great question!
Ordering can matter. Some models prefer to batch norm then relu. Perhaps experiment and discover what works best for your model and dataset.
Hi Jason, in your example for regression for boston house price prediction, the mse is about 60. Is it ok for a prediction to have mean square error with a high value?Sorry for asking.
Good question, see this:
With MNIST CNN model, I get the good “fit” to the data. When I run:
# make a prediction
image = x_train[0]
yhat = model.predict([[image]])
print(‘Predicted: class=%d’ % argmax(yhat))
at the end of the model, “yhat = model.predict([[image]])” I get a Value Error:
ValueError Traceback (most recent call last)
in
41 #yhat = model.predict([[image]]) all these gave errors
42 #yhat = model.predict([image])
—> 43 yhat = model.predict(image)
44 print(‘Predicted: class={0}’.format(argmax(yhat)))
45 #should get for output
~\Anaconda3\lib\site-packages\tensorflow\python\keras\engine\training.py in _method_wrapper(self, *args, **kwargs)
86 raise ValueError(‘{} is not supported in multi-worker mode.’.format(
87 method.__name__))
—> 88 return method(self, *args, **kwargs)
89
90 return tf_decorator.make_decorator(
~\Anaconda3\lib\site-packages\tensorflow\python\keras\engine\training.py in predict(self, x, batch_size, verbose, steps, callbacks, max_queue_size, workers, use_multiprocessing)
1266 for step in data_handler.steps():
1267 callbacks.on_predict_batch_begin(step)
-> 1268 tmp_batch_outputs = predict_function(iterator)
1269 # Catch OutOfRangeError for Datasets of unknown size.
1270 # This blocks until the batch has finished executing.
~\Anaconda3\lib\site-packages\tensorflow\python\eager\def_function.py in __call__(self, *args, **kwds)
578 xla_context.Exit()
579 else:
–> 580 result = self._call(*args, **kwds)
581
582 if tracing_count == self._get_tracing_count():
~\Anaconda3\lib\site-packages\tensorflow\python\eager\def_function.py in _call(self, *args, **kwds)
625 # This is the first call of __call__, so we have to initialize.
626 initializers = []
–> 627 self._initialize(args, kwds, add_initializers_to=initializers)
628 finally:
629 # At this point we know that the initialization is complete (or less
~\Anaconda3\lib\site-packages\tensorflow\python\eager\def_function.py in _initialize(self, args, kwds, add_initializers_to)
504 self._concrete_stateful_fn = (
505 self._stateful_fn._get_concrete_function_internal_garbage_collected( # pylint: disable=protected-access
–> 506 *args, **kwds))
507
508 def invalid_creator_scope(*unused_args, **unused_kwds):
~\Anaconda3\lib\site-packages\tensorflow\python\eager\function.py in _get_concrete_function_internal_garbage_collected(self, *args, **kwargs)
2444 args, kwargs = None, None
2445 with self._lock:
-> 2446 graph_function, _, _ = self._maybe_define_function(args, kwargs)
2447 return graph_function
2448
~\Anaconda3\lib\site-packages\tensorflow\python\eager\function.py in _maybe_define_function(self, args, kwargs)
2775
2776 self._function_cache.missed.add(call_context_key)
-> 2777 graph_function = self._create_graph_function(args, kwargs)
2778 self._function_cache.primary[cache_key] = graph_function
2779 return graph_function, args, kwargs
~\Anaconda3\lib\site-packages\tensorflow\python\eager\function.py in _create_graph_function(self, args, kwargs, override_flat_arg_shapes)
2665 arg_names=arg_names,
2666 override_flat_arg_shapes=override_flat_arg_shapes,
-> 2667 capture_by_value=self._capture_by_value),
2668 self._function_attributes,
2669 # Tell the ConcreteFunction to clean up its graph once it goes out of
~\Anaconda3\lib\site-packages\tensorflow\python\framework\func_graph.py in func_graph_from_py_func(name, python_func, args, kwargs, signature, func_graph, autograph, autograph_options, add_control_dependencies, arg_names, op_return_value, collections, capture_by_value, override_flat_arg_shapes)
979 _, original_func = tf_decorator.unwrap(python_func)
980
–> 981 func_outputs = python_func(*func_args, **func_kwargs)
982
983 # invariant:
func_outputscontains only Tensors, CompositeTensors,
~\Anaconda3\lib\site-packages\tensorflow\python\eager\def_function.py in wrapped_fn(*args, **kwds)
439 # __wrapped__ allows AutoGraph to swap in a converted function. We give
440 # the function a weak reference to itself to avoid a reference cycle.
–> 441 return weak_wrapped_fn().__wrapped__(*args, **kwds)
442 weak_wrapped_fn = weakref.ref(wrapped_fn)
443
~\Anaconda3\lib\site-packages\tensorflow\python\framework\func_graph.py in wrapper(*args, **kwargs)
966 except Exception as e: # pylint:disable=broad-except
967 if hasattr(e, “ag_error_metadata”):
–> 968 raise e.ag_error_metadata.to_exception(e)
969 else:
970 raise
ValueError: in user code:
C:\Users\James\Anaconda3\lib\site-packages\tensorflow\python\keras\engine\training.py:1147 predict_function *
…More…
Sorry to hear that, this may help:
Now I change the end of your program that is used to “predict” and I got it to work.
I’m happy to hear that.
In addition, when I get the class for x_test[0] it “7” and when I print y_test[0] is also get “7.” I would suggest checking your code.
I see you used x_train[0] in your predict step. I get class =5 and y_train = 5 just like you.
That didn’t help. Code was copied from the website. The code worked other than the model.predict step.
I am a big fanboy of your tutorial … I get to learn a lot from your tutorial… please accept my gratitude for the same and really thank you for sharing knowledge in best possible way….
One update:
Code for ‘Develop Convolutional Neural Network Models’ has one small bug related to the mismatch of model’s input dimension against providing input’s dimension for prediction in line no: 41:
yhat = model.predict([[image]])
correct line could be :
—————————–
from numpy import array
yhat = model.predict(array([image]))
I have already ran the code and posting this update.
P.S. I could be wrong … in that case please correct me
Thanks, fixed!
I done this experiment for my researchwork…….i got below error can anyone help
values = dataframe.values.astype(‘float32′)
# specify the window size
n_steps = 3
# split into samples
X, Y = split_sequence(values, n_steps)
# reshape into [samples, timesteps, features]
X = X.reshape((46017, 3, 4))
n_test = 36804
X_train, Y_train, X_test, Y_test = X[:-n_test], X[:-n_test], Y[-n_test:], Y[-n_test:]
print(X_train.shape, Y_train.shape, X_test.shape, Y_test.shape)
# define model
model = Sequential()
model.add(LSTM(100, activation=’relu’, kernel_initializer=’he_normal’, input_shape=(n_steps,1)))
model.add(Dense(50, activation=’relu’, kernel_initializer=’he_normal’))
model.add(Dense(50, activation=’relu’, kernel_initializer=’he_normal’))
model.add(Dense(1))
# compile the model
model.compile(optimizer=’Adamax’, loss=’mse’, metrics=[‘mae’])
model.fit(X_train, Y_train, epochs=3, batch_size=32, verbose=1, validation_data=(X_test, Y_test))
ValueError: Input 0 is incompatible with layer sequential_5: expected shape=(None, None, 1), found shape=[None, 3, 4]
Sorry, you will have to debug your custom code, or perhaps post it to stackoverflow.
Hi Jason,
thank you for your contribution.
I have a dummy question:
When model.fit() finishes, the deep model has the weights if the best model found during the epochs?
Or should I use a ModelCheckpoint callback, with save_best_only=True, and after .fit() to load the ‘best’ weights and then .evaluate(X_test, y_test) and in order to get some metrics?
Thank you in advance.
Maria.
The model at the end of fit will have weights from the end of the run.
You will need to load the model from the checkpoint before using it.
Thanks a lot been struggling with neural network input layer for digits regression , neural network of ionosphere helped a lot 🙂
I’m happy to hear that.
Hey , thanks a lot for creating this kind of tutorial really i want this and i found it i learn a lot from your tutorial , can you please create a web app with ml and django , please i needed
You’re welcome.
Sorry, I don’t know about django.
Hi Jason. Thanks for your sharing! I have a question that in the Convolutional Neural Network Model, why you use the training image (x_train[0]) to predict, shouldn’t we use an unseen image?
You’re welcome.
Good question. I use an image that we have available as an example. You can predict any image you like.
Just wanted to say that your tutorials are the best. So helpful. Thank you for making these available.
Thank you!
Hi ,
so now with tensorflow 2, model = Sequential() and model = tf.keras.models.Sequential are considered the same?
thank you
Yes.
Hi Jason. I am doing the MLP for binary classification now, and I encountered this in my code:
model.fit(X_train, y_train, epochs=150, batch_size=32, verbose=1)
ValueError: Data cardinality is ambiguous:
x sizes: 234
y sizes: 116
Please provide data which shares the same first dimension.
Why is this error occurring and how to fix it?
Thanks in advance!
I figured out the mistake I had made.
I had typed
X_train, y_train,X_test, y_test = train_test_split(X, y, test_size=0.33) instead of X_train, X_test, y_train, y_test = train_test_split(X, y, test_size=0.33)
Great tutorials! I have just initiated learning DL and I only refer your content because it’s so clear! Thanks again.
Sorry, I have not seen this error. Perhaps try posting your code and error to stackoverflow.com
Hi Jason. I don’t understand this line
#CNN
x_train = x_train.reshape((x_train.shape[0], x_train.shape[1], x_train.shape[2], 1))
Can you please explain what it does? Thank you
Yes, it reshapes the data into a 3d shape.
You can learn more about reshaping arrays here:
You can learn more about this requirement here:
Thanks for this great tutorial!
Thanks! | https://machinelearningmastery.com/tensorflow-tutorial-deep-learning-with-tf-keras/ | CC-MAIN-2021-04 | refinedweb | 11,045 | 56.96 |
I am writing a chatbot and it's database is going to be contained in a .txt file.
Now i have this code:
#include <iostream> #include <string> #include <fstream> using namespace std; int main() { string line; string uinput, resp; char key = line[0]; ifstream file("t.txt"); cout<<": "; getline(cin, line); while(getline(file, line)) { switch(key) { case 'i': { if(uinput == line) { continue; } } case 'r': resp = line; break; default: continue; break; } cout<<resp; } }
This code is suppose to read the filem line by line. And if the virst letter = i; It must check to see if the user's input match that line, else if the first letter = r and the previos line matched the user's input it must read that line into another string and then print it.
The problem is I dont really know how to do this...
So how is this going to be done? (Sample code would be appreciate)
Thanks... | https://www.daniweb.com/programming/software-development/threads/428017/need-help-with-database-file | CC-MAIN-2022-21 | refinedweb | 155 | 76.15 |
Opened 3 years ago
Closed 3 years ago
Last modified 3 years ago
#20543 closed Cleanup/optimization (fixed)
Possible typo in Django's documentation
Description lists following example (under "choices" sub-section):
from django.db import models class Person(models.Model): SHIRT_SIZES = ( ('S', 'Small'), ('M', 'Medium'), ('L', 'Large'), ) name = models.CharField(max_length=60) shirt_size = models.CharField(max_length=2, choices=SHIRT_SIZES)
Why does the example below has
max_length=2 instead of
max_length=1 ? Is this because of some DB/vendor issue (I could not find anything about this at)?
Someone on #django (freenode) suggested this could be a typo. So, I thought of reporting it here.
Thanks!
In f315693304865162d0b1bb8f913e9c5f14fb351e: | https://code.djangoproject.com/ticket/20543 | CC-MAIN-2016-40 | refinedweb | 108 | 59.8 |
Building your first Django app Part 2 has us add more views to our polls/views.py which takes a string specifier and replaces it with values from question_id which is given to the function as a parametre.
The issue here is, I get the string as it is in views.py with the %s placeholder still there like so
You are looking at the results of question %s
Below are my views and urls.py code snippet
Views.py
from django.shortcuts import render from django.http import HttpResponse from .models import Question from django.template import loader def index(request): latest_question_list = Question.objects.order_by('-pub_date')[:5] template = loader.get_template('polls/index.html') context = { 'latest_question_list': latest_question_list, } return HttpResponse(template.render(context, request)) def detail(request, question_id): return HttpResponse("You are looking at %s ", question_id) def results(request, question_id): response = "You are looking at the results of question %s " return HttpResponse(response, question_id) def vote(request, question_id): return HttpResponse("You are voting on question %s ", question_id)
Urls.py
from django.urls import path from . import views urlpatterns = [ # ex: polls path('', views.index, name='index'), # ex: polls/5/detail path('<int:question_id>/', views.detail, name='detail'), # ex: polls/5/results path('<int:question_id>/results/', views.results, name='results'), # ex: polls/5/vote path('<int:question_id>/vote/', views.vote, name='vote'), | https://forum.djangoproject.com/t/views-py-and-urls-py-not-rendering-properly/5090 | CC-MAIN-2022-21 | refinedweb | 219 | 53.98 |
08 June 2012 21:01 [Source: ICIS news]
HOUSTON (ICIS)--US polyvinyl chloride (PVC) exports were 205,628 tonnes in April, down 14.6% from the same month one year earlier, according to US International Trade Commission (ITC) data released on Friday.?xml:namespace>
Exports in April were also 17.2% lower than the 248,464 tonnes shipped in March, the ITC said.
While exports of PVC have generally been more robust than the domestic market in recent months, activity has dropped off markedly as buyers have waited to see how far a recent drop in prices might go.
Canada was the top destination for US PVC exports in April at 33,719 tonnes, followed by Mexico, China and Turkey, the ITC said.
US PVC export prices were assessed at $880-950/tonne (€695-751/tonne) FOB (free on board) US Gulf last week.
Major US PVC producers include Westlake Chemical, Occidental Chemical, Formosa Plastics, Shintech and Georgia Gulf.
( | http://www.icis.com/Articles/2012/06/08/9567908/us-pvc-exports-in-april-fall-14.6-year-on-year.html | CC-MAIN-2014-10 | refinedweb | 159 | 61.36 |
In case you missed it, the big news is that a minimal Arduino core is up and working on the ESP32. There’s still lots left to do, but the core functionality — GPIO, UART, SPI, I2C, and WiFi — are all up and ready to be tested out. Installing the library is as easy as checking out the code from GitHub into your Arduino install, so that’s exactly what I did.
I then spent a couple days playing around with it. It’s a work in progress, but it’s getting to the point of being useful, and the codebase itself contains some hidden gems. Come on along and take a sneak peek.
The Core
An Arduino isn’t worth very much unless it can talk to the outside world, and making the familiar Arduino commands work with the ESP32’s peripheral hardware is the job of the core firmware. As of this writing, GPIO, WiFi, SPI and I2C were ready to test out. GPIO means basically
digitalWrite() and
digitalRead() and there’s not much to say — they work. WiFi is very similar to the ESP8266 version, and aside from getting the ESP32 onto our home WiFi network, I didn’t push it hard yet. When other libraries come online that use WiFi, I’ll give it a second look.
SPI
The SPI routines in the ESP32 Arduino port both work just fine. I tested it out by connecting a 25LC256 SPI EEPROM to the chip. The ESP’s extremely flexible hardware peripheral routing matrix allows it to assign the SPI functions to any pins, but the Arduino implementation is preset to a default pinout, so you just need to look it up, and hook up MOSI to MOSI and so on. As of now, it only uses one of the ESP32’s two free SPI units.
With SPI, some of the weirdness of using Arduino on a powerful chip like the ESP32 start to poke through. To set the speed of the SPI peripheral, you can use the familiar
SPI_CLOCK_DIV_XX macros, only they’re scaled up to match the ESP32’s faster CPU clock speed..
There were also two extra definitions that I had to add to the program to make it run, but they’ve both been streamlined into the mainline in the last eighteen hours. That’s the deal with quickly evolving, openly developed software. One day you write that the macro
MSBFIRST isn’t defined, and before you can go to press, it’s defined right there in
Arduino.h. Great stuff!
I2C: The Wire
The I2C (“Wire”) library has also gotten the ESP32 treatment, and worked just as it should with an LM75 temperature sensor. This is my standard I2C test device, because it lets you read a few registers by default, but you can also send the sensor a few configuration options and read them back out. It’s not a particularly demanding device, but when it works you know the basics are working. And it did.
The ESP’s dedicated I2C pins are on GPIO 21 and 22 for data and clock respectively. Some I2C implementations will use the microcontroller’s pullup resistors to pull the I2C bus lines high, so I tested that out by pulling the 10 KOhm resistors out. The ESP stopped getting data back instantly, so that answers that. Don’t forget your pullup resistors on the I2C lines and all is well. Otherwise, it’s just connecting up two wires, double-checking the I2C device address, and reading in the data. That was easy.
External Libraries
More than half of the reason to use Arduino is the wide range of external, add-on libraries that make interfacing with all sorts of hardware easy and painless. Many of these libraries are built strictly on top of the Arduino core, and should “just work”. Of course, when you’re actually coding this close to the hardware, nothing is going to be as portable as it is a few layers of abstraction higher up on your desktop computer. Let’s go test this hypothesis out.
El Cheapo IL9341 TFT Display
Since the SPI library works out of the box, the other various libraries that depend on it should as well, right? Well, kinda. I wasted an afternoon, and still failed. Why? I have a cheapo ILI9341 screen that only works with an old
TFTLCD library, rather than with the nice
Adafruit_ILI9341 libs. The former is so full of AVR-specific voodoo that it completely fails to compile, and is probably easier to re-write from scratch for the ESP32 than make work in its present form. The Adafruit library compiles fine, because it only depends on the SPI library, but it doesn’t work with my lousy screen.
Going repeatedly back and forth between these two libraries, my LCD experiment ended in tears and frustration: I couldn’t make either of them work. I scoped out the SPI data on a logic analyser, and it looked good, but it wasn’t drawing on the screen. At this point, a full line-by-line protocol analysis would have been needed, and that’s a few days worth of work. If I just wanted a running ILI9341 driver, I would go grab [Sprite_tm]’s NES emulator demo and use the one there, but it’s not Arduinified yet, so it’s out of bounds for the scope of this article.
DHT22 Humidity and Temperature Sensor
Seeking a quick-and-dirty success, and beaten down by hours of hacking away for naught, I pulled a DHT22 sensor out of the eBay bin, and cloned Adafruit’s DHT library. Of course it didn’t compile straight out of the box, but there were only a couple of things that were wrong, and both turned out to be easily fixable.
ESP32’s Arduino didn’t have a
microsecondsToClockCycles() function yet so I commented it out, multiplied by 240 MHz, and left a hard-coded constant in my code. This value was just used for a timeout anyway, so I wasn’t too worried. There are also some timing-critical code sections during which the Adafruit code uses an
InterruptLock() function to globally enable and disable interrupts, but these functions weren’t yet implemented, so I just commented it all out and crossed my fingers.
After reassigning the data pin to one of the ESP32’s free ones (GPIO 27, FWIW), it compiled, uploaded, and ran just fine. I now know exactly how hot and humid it is up here in my office, but moreover have had a quick success with an Arduino external library, and my faith is restored.
Lessons from the Libraries
I suspect that these two examples are going to be representative of the ESP32-Arduino experience for a little while. Oddball hardware is going to take some time to get supported. Highly optimized libraries with cycle-correct timings or other microcontroller-architecture specific code in them will need to be ported over as well, despite being “Arduino” code. If you’re a code consumer, you’ll just have to wait while the wizards work their behind-the-scenes magic.
But there will also be a broad group of libraries that are written in a more-or-less device-independent way, and these should be easy enough to get working within fifteen minutes or so, as with the DHT sensor library. If you’re willing to compile, read the errors, and comment out or fix whatever shows up, some codebases will work in short order.
What’s Next? Turning Servos
Given that the Arduino-ESP32 port is brand new, indeed it’s still in progress, there is a lot of work for the community to do in getting it up to speed. Suppose that you need to drive a lot of servos, but the “Servo” library isn’t implemented yet. You’re an impatient coder. What to do? Get hacking!
The good news is that the Arduino-ESP32 libraries themselves are full of hints and examples for getting started. Open up the ESP32-specific directory that you cloned from GitHub. The usual
*.cpp files provide the standard Arduino core functionality. The
esp32-hal-xxx.h and
esp32-hal-xxx.c files are chip-specific, and a tremendous help in taking advantage of the chip’s stranger options. For instance,
esp32-hal-matrix.* gives you nice and easy access to the pin-routing matrix, which is a daunting task if you’re starting just from the datasheet.
But let’s get back to servos. The ESP32 chip has an intriguing hardware LED PWM peripheral that lets you assign up to sixteen channels to individual LEDS, specify the PWM frequency and bit-depth, and then control them by appropriately setting bits in hardware registers. If you think this would be hard to do by hand, you’d be right. The
esp32-hal-ledc.* files provide helper functions to set up the hardware PWM generator, and with these libraries, getting a 16-bit LED fade in straight C or “Arduino” is easy. But our sights are set on servos.
To drive a hobby servo, one needs pulses between 1,000 and 2,000 microseconds each, repeated every twenty milliseconds or so. Setting the repetition rate to 50 Hz takes care of the first part, and each count is 20 ms / 65,635 ticks long, or roughly 0.3 microseconds. Setting the PWM width value to something between 3,300 and 6,500 generates pulses in the right ballpark, and my servo ran jitter-free (and a clean signal was confirmed on the oscilloscope). Here’s all it took:
#include "esp32-hal-ledc.h" void setup() { ledcSetup(1, 50, 16); // channel 1, 50 Hz, 16-bit depth ledcAttachPin(22, 1); // GPIO 22 on channel 1 } void loop() { for (int i=3300 ; i < 6500 ; i=i+100){ ledcWrite(1, i); // sweep the servo delay(100); } }
That wasn’t so hard, was it? It’s not “Arduino”-style — there’s no objects or classes or methods anywhere in sight — but thanks to a straightforward and well-written hardware abstraction layer, using the very complicated peripherals is made pretty simple. Kudos to [me-no-dev] for his work on the back-end here. The HAL inside the Arduino libraries is currently the best source of code examples on many of the chip’s more esoteric and interesting peripherals.
Conclusion?
The short version of my dive into
Arduino-esp32 is that there’s a lot here, even though it’s not done yet. Blinking LEDs and other simple GPIO is a given, and the core communication libraries that are already implemented worked for me: GPIO, WiFi, SPI, and I2C are up and running.
Non-core libraries are hit and miss. I suspect that a lot of them will work with just a little bit of tweaking. Others, especially those that are architecture-dependent, may not be worth the effort to port and will need to be re-written. The ESP32 has a bunch of interesting and innovative hardware peripherals onboard and there’s certainly no Arduino libraries written for them yet, but there’s some great HAL code hidden away in the Arduino-ESP32 codebase that’ll give you a head start. We could get lost in there for hours. Time to get hacking!
The ESP32 is still a new chip, but orders should be coming in soon. Have one? Want to see us put other libraries or languages through their paces? Let us know in the comments.
27 | http://hackaday.com/2016/10/31/whats-new-esp-32-testing-the-arduino-esp32-library/ | CC-MAIN-2017-26 | refinedweb | 1,927 | 68.3 |
24 July 2012 06:55 [Source: ICIS news]
SINGAPORE (ICIS)--China’s Befar Group Ltd posted a 43% year-on-year decline in its first-half 2012 net profit to yuan (CNY) 200m ($31m) on weak demand and lower prices of propylene oxide and trichloroethylene, the company said on Tuesday.
Its revenue for the first six months of the year declined 9% to CNY2.12bn, Befar said in a filing to the Shanghai Stock Exchange.
The company’s operating profit for the period was down 43% to CNY 277m, it added.
Befar Group is major producer of propylene oxide, trichloroethylene and a leading producer of caustic soda in ?xml:namespace>
The company is headquartered at Binzhou city in
( | http://www.icis.com/Articles/2012/07/24/9580352/chinas-befar-group-h1-net-profit-falls-43-as-product-prices-dip.html | CC-MAIN-2014-49 | refinedweb | 118 | 69.92 |
this is weird to explain in the title alone, but i created a program below that works and compiles properly. it does everything i need it to do.
user inputs however many scores he/she wants.
6 scores get calculated for the desired calculations.
if user inputs more than 6, the other scores are irrelevant.
PROBLEM:
if user inputs LESS than 6, i get weird numbers.
i feel like my code is right, maybe im missing something really small? or possibly something extremely critical? im really not sure.
can anyone kindly look at my program below and see what could possibly be the issue? ill prolly turn it in to my teacher the way it is and lose a few points, but for my personal knowledge, id like to know what i could have possibly done wrong.
thanks you
#include <fstream> #include <iostream> using namespace std; const int SIZE = 6; // function to sort scores int compare(const void*pa, const void* pb) { const int& a = *static_cast<const int*>(pa); const int& b = *static_cast<const int*>(pb); if (a < b) return -1; if (a > b) return 1; return 0; } // function to average scores double getAverage(int* score, int n) { int sum = 0; int i = 0; for (i = 0; i < n; i++) sum += score[i]; double average = double(sum) / n; return average; } // function to find A-scores int countScoresGreater(int* score, int nScores, int b, int c) { int nGreater = 0; int i; for (i = 0; i < nScores; i++) if (score[i] >= b && score[i] < c) nGreater++; return nGreater; } // main hub for all int main() { //create an empty list const int MAX_SCORES = 6; int nScores = 0; int score[MAX_SCORES]; // prompt for how many students cout << "How many records would you like to view? "; cin >> nScores; cin.ignore(1000, 10); cout << " " << endl; // read and save the scores for (int i = 0; i < nScores; i++) { // read score from user int aScore; cout << "Enter score: "; cin >> aScore; cin.ignore(1000, 10); if(i < MAX_SCORES) score[i] = aScore; } qsort (score, MAX_SCORES, sizeof(int), compare); cout << "\n Sorted: "; int i; for (i = 0; i < MAX_SCORES; i++) cout << score[i] << ' '; cout << endl; int max = score[0]; int min = score[0]; for (i = 0; i < MAX_SCORES; i++) { if (max < score[i]) max = score[i]; if (min > score[i]) min = score[i]; } cout << " " << endl; cout << "highest score: " << max << endl; cout << "lowest score: " << min << endl; cout << "average score: " << getAverage(score, MAX_SCORES) << endl; cout << "number of A scores: " << countScoresGreater(score, nScores, 90, 101) << endl; cout << "number of B scores: " << countScoresGreater(score, nScores, 80, 90) << endl; cout << "number of C scores: " << countScoresGreater(score, nScores, 70, 80) << endl; cout << "number of passing scores: " << countScoresGreater(score, nScores, 70, 101) << endl; cin >> i; cin.ignore(1000, 10); cin.ignore(); cin.get(); return 0; } | https://www.daniweb.com/programming/software-development/threads/207318/lists-output-is-weird | CC-MAIN-2017-17 | refinedweb | 456 | 63.43 |
Table of Contents
Learn how to test iOS applications.
Table of Contents
This tutorial will show you how to create, run, and modify tests for an example iOS application. In the process you will learn about Squish's most frequently used features so that by the end of the tutorial you will be able to start writing your own tests for your own applications.
This chapter presents many).
Often, after we show how to achieve something using the IDE we will.. And naturally, the User Guide (Chapter 5) has
many more examples.
The screenshot shows the application in action; the left hand image shows an element being displayed and the right hand image shows the application's main window.
The iOS
Elements.app example in the simulator.).
A test suite is a collection of one or more test cases (tests). Using a test suite is convenient since it makes it easy to share tests scripts and test data between tests.
Start up the Squish IDE, either by clicking or double-clicking
the squishide icon, or by launching squishide from the taskbar menu
or by executing
open squishide.app on the command
line—whichever you prefer. macOS version, put it in a
squish-ios-test folder; the actual example code is
in Squish's
examples/ios/elements folder. (For
your own tests you might use a more meaningful name such as
"suite_elements";, you must click iOS since we are testing a iOS application.—this will pop-up a file open dialog from which you
can choose your AUT. In the case of iOS programs, the AUT is the
application's executable (e.g.,
Elements on
iOS). Once you have chosen the AUT,.9 (
) (to the right of the Test
Cases in the Test Suites view); this will
create a new test case with a default name (which you can easily change).
depending on the
| | setting—the test case.
(Incidentally, the checkboxes are used to control which test cases are
run when the toolbar button is
clicked; we can always run a single test case by clicking its
button.) Initially, the script is empty.
If we were to create a test manually, we must
define a
main(). The name
main is special to
Squish—tests may contain as many functions and other code as we
like (providing it is legal for the scripting language), but when the
test is executed (i.e., run), Squish always executes
main() [15].
This is actually very convenient since it
means we are free to define other functions, import libraries, and so
on, without problems. It is also possible to share commonly used code
between test scripts—this is covered in the User Guide (Chapter 5).
Once the new empty test case has been created, we are free to write test code manually, or to record a test. If we choose to record we can either replace all the test's code with the recorded code, or insert recorded code into the middle of some existing test code (using).
)
to the right of the
tst_general test case shown in the Test Suites view (Section 8.2.18)item. Once the list of elements appears, click the item.
When the Argon screen appears you want to verify that it has the correct Category. For this verification you will take a slightly long-winded approach. First, click the Squish Control Bar Window (Section 8.1.3) (the second button from the left) and select .toolbar button in the
This makes the Squish IDE reappear. In the Application
Objects view, expand the
Elements item (by clicking its
gray triangle), then the
UI_Window_0 item, then the
UILayoutContainerView_0 item, then the
UINavigationTransitionView_0 item, then the
UIViewControllerWrapperView_0 item, and then the
UITableView_0 item. Now the table's items should be
visible. Now expand the
Category_UITableViewCell_8 item and
then the
UITableViewCellContentView_0 item. Now click the
Noble
Gases_UITableViewLabel_0 item. At last we've found the item we want.
(Don't worry, when you do the next verification you'll make Squish find
the item for you!)
In the Properties view expand the label's text property. Now click the checkbox beside the stringValue subproperty. Squish should now look similar to the screenshot.
Now click the Squish IDE will disappear and you can continue to record interactions with the AUT.button. This will insert the Category verification into the recorded script. The
Back in the Elements AUT, clickto return to the list of elements by name, then click to return to the main window.
Click the pluto” in the Name Contains line edit. Then click the button.item and in the Search window enter the text “
When the Search Results appears you want to verify that element 94, Plutonium was found. This time, you will make Squish find the relevant object for you. Once again click the toolbar button in the Squish Control Bar and choose . As before, this will make the Squish IDE appear.
In the Application Objects view click the Object Picker (
). This property. Now click the checkbox beside the stringValue subproperty. Squish should now look similar to the screenshot.
Now click the Squish IDE will disappear and you can continue to record interactions with the AUT.button. This will insert the verification into the recorded script. The
We have now finished our test and inserted the verifications. Click the Squish Control Bar. The Elements AUT and the simulator will stop and the Squish IDE will reappear.toolbar button in the
Once you stop recording, the recorded test will appear in Squish's IDE as the screenshot illustrates. (Note that the exact code that is recorded will vary depending on how you interact with the AUT and which scripting language you have chosen.)
After recording is finished, you can play it back to see
that it works as expected by clicking the
tst_general's (Section 4.9 Test Suites view (Section 8.2.18))..toolbar button (the green right-pointing triangle that appears when the test case is selected in the
When we have two or more test cases we can run them individually by clicking the test case we want to run to select it and then clicking thebutton, or we can run them all (one after the other) by clicking the toolbar button (which is above and slightly to the left of the button. (Actually, only those test cases that are checked are run by clicking the toolbar button, so we can easily run a particular group of tests.)
If you look at the code in the screenshot (or the code snippet shown
below) you will see that it consists of lots of
waitForObject calls as parameters to various
other calls such as
tapObject and
type. The
waitForObject function waits until a GUI object
is ready to be interacted with (i.e., becomes visible and enabled), and
is then followed by some function that interacts with the object. The
typical interactions are click.)
startApplication function.
The rest of the function calls are concerned with replaying the
interactions that were recorded, in this case, clicking widgets and
typing in text using the
tapObject
and
type functions. Argon element's Symbol is
“Ar” and that its Number is 18. We will put these
verifications immediately after the one we inserted during recording
that verified its Category.
To insert a verification point using the.)
The Squish IDE showing the tst_argon test case with a breakpoint
As the above screenshot shows, we have set a breakpoint at line 9. This is done simply by Ctrl+Clicking the line number and then clicking the menu item in the context menu. We chose this line because it follows the first verification point we added during recording, so at this point the details of Argon will be visible on the screen. (Note that your line number may be different if you recorded the test in a different way.)
Having set the breakpoint, we now run the test as usual by clicking the Squish's main window will reappear (which will probably obscure the AUT). At this point the Squish IDE will automatically switch to the Squish Test Debugging Perspective (Section 8.1.2.3).button, or by clicking the | menu option. Unlike a normal test run the test will stop when the breakpoint is reached (i.e., at line 9, or at whatever line you set), (Section 8.2.12) view
and check the stringValue subproperty.
To add the verification point we must click the verification point editor's button. After the insertion the test replay remains stopped: we can either continue by clicking the toolbar button in the Debug view (or press F8), or we can stop by clicking the toolbar button. This is to allow us to enter more verifications. In this example we have finished for now, so either resume or terminate the test.
Incidentally,.
Once we have finished inserting verifications we should now disable the break point. Just Ctrl+Click the break point and click the menu option in the context menu. We are now ready to run the test without any breakpoints but with the verification points in place. Click the and
test.verify (Section 8.2.1) until we find the
object we want to verify. At this point it is wise to
Ctrl+Click the
object we are interested in and click the context menu option. This will ensure that Squish
can access the object. Then
Ctrl the item's
properties and methods—in this case the
UILabel's
stringValue subproperty—and verify that the value is
what we expect it to be using the
test.compare., as well as how to do data-driven and keyword-driven testing..
Squish for iOS allows you to test your iOS apps in the iOS Simulator that is included in Xcode installations. This makes it much easier and more convenient to test iOS AUTs without having to use an actual iOS device.>
If you are using Xcode 6 or later, you can specify the device ID of the
simulated device to be used.
Use
iphonelauncher command with the option
--list-devices in the terminal to determine the device ID.
You can't use the
--device or
--sdk in
conjunction with this option since the device ID already defines the
simulated hardware and SDK and these value can't be overriden.
--device=<device-family>
If your application is a universal application (i.e. runs on both, the
iPhone and the iPad), you can use this option to specify if Squish start
the application in a simulated iPhone or iPad. For
<device-family> you can use either
iPhone or
iPad.
If you are using Xcode 5.0 or newer, you have more fine grained
control over the exact device type and you can also specify
iPhone-retina-3.5-inch,
iPhone-retina-4-inch and
iPad-retina as the
<device-family>.
--sdk=<version>
Squ.
--xcode-root=<directory>
Squish uses the iOS Simulator in the default Xcode installation
directory. Use this option if you want to
use an Xcode installation in a different directory.
For example, if your Xcode is installed in the directory
/Developer4.0, specify the option
--xcode-root=/Developer4.0..
First you must modify your application's
main function
that it calls Squish's
squish_allowAttaching function when
running for testing. Here is a typical
main function for iOS
applications with the necessary modifications (the modifications are shown
in bold). Please note that; }#endif int retVal = UIApplicationMain(argc, argv, nil, NSStringFromClass([AppDelegate class])); [pool release]; return retVal; }
After the modifications to the application's
main
function, we also have to link the app against the static library
libsquishioswrapper.a that is shipped with the
Squish package and can be found in the package's
lib
directory.button in the popup to add a new flag.
Enter the flag
-DSQUISH_TESTINGbutton.a without any
path.
| | menu item, then
click the Attachable AUTs item. Now click the
button. Give the configuration a name, for
example, “iPhoneDevice”. Enter the iOS device's IP
address as the host and for the port give the number used when calling
the
squish_allowAttaching function .
Table of Contents.
The iOS
Elements example..
First, we need to create a Test Suite, which is a container for all Test Cases. Start the Squish IDE and select | . Please follow the New Test Suite wizard, provide a Test Suite name, choose the iOS Toolkit and scripting language of your choice and finally register Elements app as AUT. Please refer to Creating a Test Suite (Section 4.9.1.2) for more details about creating new Test Suites.
Squish offers two types of Test Cases: "Script Test Case" and "BDD Test Case". As "Script Test Case" is the default one, in order to create new "BDD Test Case" we need to use the context menu by clicking on the expander next to button and choosing the option ..
In order to record the
Scenario, press the
(
)
( (
))
again proceeds to the recording of the last step,
the search field is
empty. To record this verification, click on while
recording, and select . (Section 6.19.10).
, hit the
) next to the
test case name in the Test Suites view. The script will play until it gets to
the missing step and then prompt you to implement it. Click on
(
)|'.
Note that each parameter will be passed to the step implementation function in
the order of appearance in the descriptive name of the step. Finish
parametrizing by editing |
Please note that the
OnScenarioEnd hook will be executed at the end of
each loop iteration in a
Scenario Outline.
In the Squish IDE, users can execute all
Scenarios in a
Feature, or execute only one selected
Scenario. In
order to execute all
Scenarios, the proper Test Case has to be
executed by clicking on the button in the Test Suites view.
In order to execute only one
Scenario, you need to open the
Feature file, right-click on the given
Scenario and
choose . An alternative approach is to click on the
button next to the respective
Scenario in
the Scenarios tab in Test Case Resources.
After a
Scenario is executed, the
Feature file is
colored according to the execution results. More detailed information (like logs) can
be found in the Test Results View..
BDD test maintainability can be increased by reusing step definitions in test cases located in another directory. For more information, see collectStepDefinitions() (Section 6.19) in API Reference Manual (Chapter 6).
[14].
[15] In fact, two other function names
are special to Squish,
cleanup and
init; see Tester-Created Special Functions (Section 6.1) for details. | https://doc.froglogic.com/squish/latest/tutorials-iphone.html | CC-MAIN-2019-18 | refinedweb | 2,424 | 64.61 |
A Personal Note About Argument-Dependent Lookup
One of the comments on my article last week noted that argument-dependent lookup in C++ is often called "Koenig lookup" — and, indeed, Wikipedia claims (as of May 1, 2012) that I invented it. I didn't invent it, but unfortunately, I don't know who did, so I don't know where the credit — or blame — is really due. The reason that my name is associated with argument-dependent lookup is that although I did not invent the idea, I did recognize that the introduction of namespaces causes a severe problem that ADL, or something similar, was needed to solve.
More Insights
White PapersMore >>
ReportsMore >>
WebcastsMore >>
The Wikipedia article identifies this problem by claiming that the following simple program would not compile were it not for ADL:
#include<iostream> int main() { std::cout << "Hello World, where did operator<<() come from?" << std::endl; return 0; }
This claim is incorrect, although only a trifling change is needed to correct it.
To understand the problem, let's start by thinking about the meaning of the expression
a<<b. In general,
a<<b can mean either
a.operator<< (b) or
operator<< (a, b), and the compiler considers both possible meanings when it looks for candidates for an overloaded operator. This duality is necessary only when we are calling an overloaded operator, because if we call a function that is not an operator, the form of the call removes any ambiguity. Either we call
a.f(b) or we call
f(a, b), and never the twain shall meet.
Now let's consider how a runtime library might have been written before namespaces:
class ostream { public: // … ostream& operator<< (int); ostream& operator<< (const char*); // … }; ostream cout;
The library would define an
ostream class and a global object of that class named
cout. That class, in turn, would have members to handle output of each of the built-in types. Writing a statement such as
cout << "Hello World" <<endl;
would be equivalent to writing
cout.operator<< ("Hello World").operator<< (endl);
because the nonmember versions of
operator<< would not exist, and therefore would not participate in overloading.
Next, let's add a
string class:
class string { // … }; ostream& operator<< (const string&);
Note that
operator<< for strings is not a member of class
ostream. It can't be, because only programmers who want to use the string library should have to pay for it. If we change our use of
operator<< to include a string:
string hello = "Hello World"; cout << hello << endl;
the program still works, but it is now treated as
string hello = "Hello world"; operator<< (cout, hello).operator<< (endl);
where the first call to
operator<< finds the nonmember associated with the
string class, and the second finds the member associated with
endl.
Now let's introduce namespaces, and put
ostream,
cout,
endl, and
string (along with its associated
operator<<) into namespace
std. The obvious code
std::cout << "Hello World" << std::endl;
still works, because it is treated as
std::cout.operator<< ("Hello World").operator<< (std::endl);
Once
std::cout has been identified, no additional special treatment is needed in order to find the right
operator<<.
In contrast, the
string class' users are not so lucky, because
std::cout << hello << std::endl;
will not find the first
operator<<. Moreover, it is far from obvious how to tell the compiler to find it. One possibility might be
using std::operator<<;
and another might be
std::operator<< (std::cout, hello) << std::endl;
but it is hard to explain — especially to a beginning programmer — why this technique is necessary for a string variable, but not for a string literal. Moreover, if we were to change the variable to a literal:
std::operator<< (std::cout, "Hello World") << std::endl;
the code would stop working because we need the member
operator<<, not the one in namespace
std.
In other words, the standards committee was faced with the situation that introducing namespaces into the standard library would break some very common code examples. Moreover, the obvious ways of fixing those examples would work for some types (such as
const char*) but fail for others (such as
string) that would seem to be similar. Even worse would be that the ways of fixing the problem that worked would be clumsy and error-prone enough to make them unusable in practice. Not only that, but the committee expected that many implementations would leave the standard-library names in the global namespace as a transition aid, thereby making it harder for developers to find the problems in their code.
As I said at the beginning of the article, I did not solve this problem; someone else did. I don't remember who it was — it was probably part of a discussion on the Usenet comp.lang.c++ newsgroup. What I did do was to come up with these examples, which, in turn, helped convince the standards committee that introducing namespaces caused a problem that had to be solved somehow before the C++ standard was released. Moreover, time was running short, a solution was available, and no one else had any ideas for a better solution.
The rest, as they say, is history. | http://www.drdobbs.com/cpp/a-personal-note-about-argument-dependent/232901443 | CC-MAIN-2015-40 | refinedweb | 862 | 57.5 |
This is the mail archive of the binutils@sourceware.org mailing list for the binutils project.
Hi Nick, On Fri, 2006-01-27 at 17:51 +0000, Nick Clifton wrote: > There is no reason why such a patch cannot be included in binutils. > People are free to modify glibc after all. Ok; that's encouraging. > > + case DT_SUSE_HASHVALS: name = "SUSE_HASHVALS"; break; > > I assume that this feature does not have to be specific to SUSE, so I > would suggest a more generic name, eg DT_GNU_HASHVALS. No of course not; however - in an effort not to tread on namespaces other people 'own', and for which the allocation authority is unclear; I plumped for such suse-isms. Using GNU instead would be perfect. > If the name of the section is going to be fixed > however then it ought to be specified as a #defined constant in a header Fair enough - easy to fix. > Other than that though the binutils part of the patch looks fine to me. > A few formatting tidy ups and replacements of fprintf with calls to > bfd_error_handler, but otherwise OK. Sure - I just got a metric bus-load of formatting / stylistic feedback from Andreas Schwab that I'll work through too. Thanks, Michael. -- michael.meeks@novell.com <><, Pseudo Engineer, itinerant idiot | http://sourceware.org/ml/binutils/2006-01/msg00241.html | CC-MAIN-2016-18 | refinedweb | 210 | 72.97 |
Attached to this e-mail are patches which provide support for late
binding of PCI devices to the PCI backend driver in dom0. This allows
you to bind devices to the backend driver *after* dom0 has booted. You
are no longer required to specify the devices to hide on the kernel
command-line. Using the bind/unbind driver attributes
(see /sys/bus/pci/drivers/pciback), you can specify which devices that
the PCI backend will seize. There are three new driver attributes in
that directory:
slots - lists all of the PCI slots that
the PCI backend will try to seize).
For Example:
#
Unfortunately, Linux makes it possible to remove (unbind) a PCI device
from the PCI backend while that device is attached to a driver domain.
It is also possible to unload the PCI Backend module while a PCI
Frontend is attached. DON'T DO EITHER OF THESE ACTIONS. This patch will
output warnings if you do try and do these. Be aware that while access
to the configuration space of the device has been revoked, the driver
domain can still access the I/O resources of the device as they have not
been revoked (although I *hope* to explore adding support for this
soon). Before unloading the module or unbinding a device, shutdown your
driver domain.
These patches also convert a few function and variable declarations to
static (no sense in polluting the global namespace with local function
names) and rename a few structures in drivers/xen/pciback/pci_stub.c.
device_bind.patch patches a Linux bug in the driver core in regards to
the bind sysfs driver attribute. I've submitted this to lkml, but it
should be included in Xen now for people who will use this late binding
capability.
Signed-off-by: Ryan Wilson <hap9@xxxxxxxxxxxxxx>
Attachment:
device_bind.patch
Description: Text Data
Attachment:
pci-late-binding. | https://lists.xenproject.org/archives/html/xen-devel/2006-03/msg01031.html | CC-MAIN-2021-25 | refinedweb | 309 | 61.67 |
I do have a question though. Why is C# a "productivity language"? I've searched a bit and read couple threads on stack overflow but haven't found huge advantages in using C# over let's say C++ & QT. I've been programming with C++ for a loooong time now. Why should I pick up C# to further my productivity?
Two reasons:
1. The language itself has many features that makes it easier to be productive. You can do more with less lines of code, and the code that you do have to write tends to be less repetitive and more direct. Simplicity and elegance have been major design goals throughout the lifetime of the language. As a result, it's just easier and more enjoyable to use C# than C++. I always find it a little tedious having to go back to C++.
2. The ability to access the .NET Framework Library and all of the related frameworks means a whole lot of code is written for you when using C#. If you just look at some of the namespaces of the .NET Framework Library there is MS Build integration, all the container classes, language generation, SQL Server bindings, OO wrappers around Win32 API Library Functions, CodeDOM, Diagnostics, Drawing, Enterprise Services, IO, Isolated Storage, Ports, Media, Messaging, Network programming, Reflection, RPC, Security, Authentication, Cryptography, Threading, Transactions, XML parsers & Serializers, XPath queries, and tons of Web stuff: Complete HTTP engines, Email classes, various protocols, etc...
In addition to all the basic classes in the .NET Framework Library you also have WinForms for creating GUI Windows applications, WPF, WF, WCF, and ASP.NET.
So I guess the better question is, when you want to write a complex Windows Application with multiple windows, tab controls, tree controls, animations, etc... How do you do it in C++? Likewise, if I asked you to create a database application that made connections to multiple databases, performed transacted queries against the databases and displayed results in a GUI application, how would you go about doing it? How about, write a GUI application that lets you enter in the email address of multiple people, subject, and a message body and then send the message out to all the people in the email list in formatted HTML over TLS secured SMTP?
Most of these things would make the average C++ programmer shiver. At the very least they'd be searching the interwebs for available libraries, and at worst they'd be looking for RFCs on protocols to begin implementing them themselves. In C#, the above programs range from a couple dozen lines of code to a couple hundred (maybe some in the low thousands), because most of the boilerplate stuff is done for you. It's literally half a dozen lines of code or less to open a database connection to SQL database and make a query. The support provided to programmers to develop "every-day" applications is just amazing to me. | http://www.gamedev.net/topic/628852-directx11-which-programming-language/page-2 | CC-MAIN-2014-42 | refinedweb | 494 | 61.06 |
[
]
Thomas Neidhart commented on MATH-905:
--------------------------------------
Looks good to me.
Any specific reason why you prefer multiplication by 0.5 over division by 2, or just personal
preference?
Searching in the FastMath source, there are several occurrences of both variants.
> FastMath.[cosh, sinh] do not support the same range of values as the Math counterparts
> --------------------------------------------------------------------------------------
>
> Key: MATH-905
> URL:
> Project: Commons Math
> Issue Type: Bug
> Affects Versions: 3.0
> Reporter: Thomas Neidhart
> Fix For: 3.1
>
> Attachments: MATH-905.diff
>
>
> As reported by Jeff Hain:
> cosh(double) and sinh(double):
> Math.cosh(709.783) = 8.991046692770538E307
> FastMath.cosh(709.783) = Infinity
> Math.sinh(709.783) = 8.991046692770538E307
> FastMath.sinh(709.783) = Infinity
> ===> This is due to using exp( x )/2 for values of |x|
> above 20: the result sometimes should not overflow,
> but exp( x ) does, so we end up with some infinity.
> ===> for values of |x| >= StrictMath.log(Double.MAX_VALUE),
> exp will overflow, so you need to use that instead:
> for x positive:
> double t = exp(x*0.5);
> return (0.5*t)*t;
> for x negative:
> double t = exp(-x*0.5);
> return (-0.5*t)*t;
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: | http://mail-archives.apache.org/mod_mbox/commons-issues/201211.mbox/%3C407995267.21624.1353879178702.JavaMail.jiratomcat@arcas%3E | CC-MAIN-2017-51 | refinedweb | 214 | 52.56 |
Solving Big Data Challenges for Enterprise Application Performance Management
- Elfreda Allen
- 1 years ago
- Views:
Transcription
1 Solving Big Data Challenges for Enterprise Application Performance Management Tilmann Rabl Middleware Systems Research Group University of Toronto, Canada Sergio Gómez Villamor DAMA UPC Universitat Politècnica de Catalunya, Spain Mohammad Sadoghi Middleware Systems Research Group University of Toronto, Canada Victor Muntés Mulero CA Labs Europe Barcelona, Spain Hans Arno Jacobsen Middleware Systems Research Group University of Toronto, Canada Serge Mankovskii CA Labs San Francisco, USA ABSTRACT As the complexity of enterprise systems increases, the need for monitoring and analyzing such systems also grows. A number of companies have built sophisticated monitoring tools that go far beyond simple resource utilization reports. For example, based on instrumentation and specialized APIs, it is now possible to monitor single method invocations and trace individual transactions across geographically distributed systems. This high-level of detail enables more precise forms of analysis and prediction but comes at the price of high data rates (i.e., big data). To maximize the benefit of data monitoring, the data has to be stored for an extended period of time for ulterior analysis. This new wave of big data analytics imposes new challenges especially for the application performance monitoring systems. The monitoring data has to be stored in a system that can sustain the high data rates and at the same time enable an up-to-date view of the underlying infrastructure. With the advent of modern key-value stores, a variety of data storage systems have emerged that are built with a focus on scalability and high data rates as predominant in this monitoring use case. In this work, we present our experience and a comprehensive performance evaluation of six modern (open-source) data stores in the context of application performance monitoring as part of CA Technologies initiative. We evaluated these systems with data and workloads that can be found in application performance monitoring, as well as, on-line advertisement, power monitoring, and many other use cases. We present our insights not only as performance results but also as lessons learned and our experience relating to the setup and configuration complexity of these data stores in an industry - 3st 22, Istanbul, Turkey. Proceedings of the VLDB Endowment, Vol. 5, No. 2 Copyright 22 VLDB Endowment /2/8... $... INTRODUCTION Large scale enterprise systems today can comprise complete data centers with thousands of servers. These systems are heterogeneous and have many interdependencies which makes their administration a very complex task. To give administrators an on-line view of the system health, monitoring frameworks have been developed. Common examples are Ganglia [2] and Nagios [2]. These are widely used in open-source projects and academia (e.g., Wikipedia ). However, in industry settings, in presence of stringent response time and availability requirements, a more thorough view of the monitored system is needed. Application Performance Management (APM) tools, such as Dynatrace 2, Quest PerformaSure 3, AppDynamics 4, and CA APM 5 provide a more sophisticated view on the monitored system. These tools instrument the applications to retrieve information about the response times of specific services or combinations of services, as well as about failure rates, resource utilization, etc. Different monitoring targets such as the response time of a specific servlet or the CPU utilization of a host are usually referred to as metrics. In modern enterprise systems it is not uncommon to have thousands of different metrics that are reported from a single host machine. In order to allow for detailed on-line as well as off-line analysis of this data, it is persisted at a centralized store. With the continuous growth of enterprise systems, sometimes extending over multiple data centers, and the need to track and report more detailed information, that has to be stored for longer periods of time, a centralized storage philosophy is no longer viable. This is critical since monitoring systems are required to introduce a low overhead i.e., -2% on the system resources [2] to not degrade the monitored system s performance and to keep maintenance budgets low. Because of these requirements, emerging storage systems have to be explored in order to develop an APM platform for monitoring big data with a tight resource budget and fast response time. Wikipedia s Ganglia installation can be accessed at ganglia.wikimedia.org/latest/. 2 Dynatrace homepage - 3 PerformaSure homepage - performasure/ 4 AppDynamics homepage - com 5 CA APM homepage - application-management.aspx 724
2 APM has similar requirements to current Web-based information systems such as weaker consistency requirements, geographical distribution, and asynchronous processing. Furthermore, the amount of data generated by monitoring applications can be enormous. Consider a common customer scenario: The customer s data center has K nodes, in which each node can report up to 5K metrics with an average of K metrics. As mentioned above, the high number of metrics result from the need for a high-degree of detail in monitoring, an individual metric for response time, failure rate, resource utilization, etc. of each system component can be reported. In the example above, with a modest monitoring interval of seconds, million individual measurements are reported per second. Even though a single measurement is small in size, below bytes, the mass of measurements poses similar big data challenges as those found in Web information system applications such as on-line advertisement [9] or on-line analytics for social Web data [25]. These applications use modern storage systems with focus on scalability as opposed to relational database systems with a strong focus on consistency. Because of the similarity of APM storage requirements to the requirements of Web information system applications, obvious candidates for new APM storage systems are key-value stores and their derivatives. Therefore, we present a performance evaluation of different key-value stores and related systems for APM storage. Specifically, we present our benchmarking effort on open source key-value stores and their close competitors. We compare the throughput of Apache, Apache, Project,,, and a Cluster. Although, there would have been other candidates for the performance comparison, these systems cover a broad area of modern storage architectures. In contrast to previous work (e.g., [7, 23, 22]), we present details on the maximum sustainable throughput of each system. We test the systems in two different hardware setups: () a memory- and (2) a disk-bound setup. Our contributions are threefold: () we present the use case and big data challenge of application performance management and specify its data and workload requirements; (2) we present an upto-date performance comparison of six different data store architectures on two differently structured compute clusters; and, (3) finally, we report on details of our experiences with these systems from an industry perspective. The rest of the paper is organized as follows. In the next section, we describe our use case: application performance management. Section 3 gives an overview of the benchmarking setup and the testbed. In Section 4, we introduce the benchmarked data stores. In Section 5, we discuss our benchmarking results in detail. Section 6 summarizes additional findings that we made during our benchmarking effort. In Section 7, we discuss related work before concluding in Section 8 with future work. 2. APPLICATION PERFORMANCE MAN AGEMENT Usually enterprise systems are highly distributed and heterogeneous. They comprise a multitude of applications that are often interrelated. An example of such a system can be seen in Figure. Clients connect to a frontend, which can be a Web server or a client application. A single client interaction may start a transaction that can span over more than a thousand components, which can be hosted on an equal number of physical machines [26]. Nevertheless, response time is critical in most situations. For example, for Web page loads the consumer expectation is constantly decreasing and is already as low as 5 ms to 2 s [3]. In a highly distributed Client Client Client Client Identity Manager Web server Application server Application server Application server 3 rd Party Message Queue Message Broker Main Frame Database Database Web Service Figure : Example of an enterprise system architecture system, it is difficult to determine the root cause of performance deterioration especially since it is often not tied to a single component, but to a specific interaction of components. System components themselves are highly heterogeneous due to the constant changes in application software and hardware. There is no unified code base and often access to the entire source code is not possible. Thus, an in depth analysis of the components or the integration of a profiling infrastructure is not possible. To overcome this challenges, application performance management systems (APM) have been developed and are now a highly profitable niche in enterprise system deployment. APM refers to the monitoring and managing of enterprise software systems. There are two common approaches to monitor enterprise systems: () an API-based approach, which provides a programming interface and a library that has to be utilized by all monitored components; (2) a black-box approach, which instruments the underlying system components or virtual machines to obtain information about the monitored system. The first approach gives a high degree of freedom to the programmer on how to utilize the monitoring toolbox. A popular example is the ARM standard []. In this approach every component has to implement the ARM API that is available for C and Java. Prominent ARM-instrumented applications are the Apache HTTP server and IBM DB2. Although several common enterprise software systems are already ARM enabled, it is often not feasible to implement the ARM API in legacy systems. In general, this solution is often not possible, especially when 3 rd party software components are used. The instrumentation of virtual machines and system libraries is a non-intrusive way of monitoring an application. In the case of Java programs, this is enabled by the Virtual Machine Tool Interface that was specified in JSR-63 and introduced in J2SE 5. []. The intention of JSR-63 is to present an interface for profiling and debugging. Byte code instrumentation allows to augment software components with agents that have access to the state and the method invocations. This approach enables monitoring components, tracing transactions, and performing root cause analysis without changing the code base of the monitored system. Another benefit of this approach is the low performance overhead incurred. By making it possible to capture every method invocation in a large enterprise system, APM tools can generate a vast amount of data. However, in general, only specific method invocations are actually of interest. Most notably, these are communication methods such as RMI calls, Web service calls, socket connections and such. Still, current systems process thousands of transactions per second with each transaction being processed by multiple nodes. Due to the resulting amount of data, monitoring agents do not report every single event but instead aggregate events in fixed time intervals in the order of seconds. Nevertheless, each agent can report thousands of different measurements in each interval. In larger 725
3 deployments, i.e., hundreds to thousands of hosts, this results in a sustained rate of millions of measurements per second. This information is valuable for later analysis and, therefore, should be stored in a long-term archive. At the same time, the most recent data has to be readily available for on-line monitoring and for generating emergency notifications. Typical requirements are sliding window aggregates over the most recent data of a certain type of measurement or metric as well as aggregates over multiple metrics of the same type measured on different machines. For instance two typical on-line queries are: What was the maximum number of connections on host X within the last minutes? What was the average CPU utilization of Web servers of type Y within the last 5 minutes? For the archived data more analytical queries are as follows: What was the average total response time for Web requests served by replications of servletx in December 2? What was maximum average response time of calls from applicationy to databasez within the last month? While the on-line queries have to be processed in real-time, i.e., in subsecond ranges, historical queries may finish in the order of minutes. In comparison to the insertion rate, these queries are however issued rarely. Even large clusters are monitored by a modest number of administrators which makes the ad-hoc query rate rather small. Some of the metrics are monitored by certain triggers that issue notifications in extreme cases. However, the overall write to read ratio is : or more (i.e., write-dominated workloads). While the writes are simple inserts, the reads often scan a small set of records. For example, for a ten minute scan window with seconds resolution, the number of scanned values is 6. An important prerequisite for APM is that the performance of the monitored application should not be deteriorated by the monitoring (i.e., monitoring should not effect SLAs.) As a rule of thumb, a maximum tolerable overhead is five percent, but a smaller rate is preferable. This is also true for the size of the storage system. This means that for an enterprise system of hundreds of nodes only tens of nodes may be dedicated to archiving monitoring data. 3. BENCHMARK AND SETUP As explained above, the APM data is in general relatively simple. It usually consists of a metric name, a value, and a time stamp. Since many agents report their data in fixed length intervals, the data has the potential to be aggregated over a (short) time-based sliding window, and may also contain additional aggregation values such as minimum, maximum, average, and the duration. A typical example could look as shown in Figure 2. The record structure is usually fixed. As for the workload, the agents report the measurements for each metric in certain periodic intervals. These intervals are in the order of seconds. Using this approach, the data rate at the agent is in general constant regardless of the system load. Nevertheless, current APM tools make it possible to define different monitoring levels, e.g., basic monitoring mode, transaction trace mode, and incident triage mode, that results in different data rates. It is important to mention that the monitoring data is append only. Every new reported measurement is appended to the existing monitoring information rather than updating or replacing it. Since the agents report changes in the system in an aggregated manner, for example, every Table : Workload specifications Workload % Read % Scans % Inserts R 95 5 RW 5 5 W 99 RS RSW seconds, the queries on the reported measurements do not have latency as low as that found in OLTP use cases, rather a latency in the same order as the reporting interval is still adequate. As far as the storage system is concerned, the queries can be distinguished into two major types: () single value lookups to retrieve the most current value and (2) small scans for retrieving system health information and for computing aggregates over time windows. Based on the properties of the APM use case described above, we designed a benchmark that models this use case, which at the same time is generic enough to be valid for similar monitoring applications. We used the popular Yahoo! Cloud Serving Benchmark (YCSB) benchmark suite [7] as a basis. YCSB is an extensible and generic framework for the evaluation of key-value stores. It allows to generate synthetic workloads which are defined as a configurable distribution of CRUD (create, read, update and delete) operations on a set of records. Records have a predefined number of fields and are logically indexed by a key. This generic data model can easily be mapped to a specific key-value or column-based data model. The reason for YCSB s popularity is that it comprises a data generator, a workload generator, as well as drivers for several key-value stores, some of which are also used in this evaluation. Our data set consists of records with a single alphanumeric key with a length of 25 bytes and 5 value fields each with bytes. Thus, a single record has a raw size of 75 bytes. This is consistent with the real data structure as shown in Figure 2. We defined five different workloads. They are shown in Table. As mentioned above, APM data is append only which is why we only included insert, read, and scan operations. Since not all tested stores support scans, we defined workloads with (RS,RSW) and without scans (R,RW,W). As explained above, APM systems exhibit a write to read ratio of : or more as defined in workloads However, to give a more complete view on the systems under test, we defined workloads that vary the write to read ratio. Workload R and RS are read-intensive where 5% of the read accesses in RS are scans. Workload RW and RSW have an equal ratio of reads and writes. These workloads are commonly considered write-heavy in other environments [7]. All access patterns were uniformly distributed. We also tested a write intensive workload with scans, but we omit it here due to space constraints. We used two independent clusters for our tests: memory-bound cluster (Cluster M) and disk-bound cluster (Cluster D). Cluster M consists of 6 Linux nodes. Each node has two Intel Xeon quad core CPUs, 6 GB of RAM, and two 74 GB disks configured in RAID, resulting in 48 GB of disk space per node. The nodes are connected with a gigabit ethernet network over a single switch. Additionally, we used an additional server with the same configuration but an additional 6 disk RAID 5 array with 5 GB disk per node for a total of 2.5 TB of disk space. This RAID disk is mounted on all nodes and is used to store the binaries and configuration files. During the test, the nodes do, however, use only their local disks. Cluster D consists of a 24 Linux nodes, in which each node has two Intel Xeon dual core CPUs, 4 GB of RAM and a single 74 GB disk. The nodes are connected with a gigabit ethernet network over a sin- 726
4 Metric Name Value Min Max Timestamp Duration HostA/AgentX/ServletB/AverageResponseTime Figure 2: Example of an APM measurement gle switch. We use the Cluster M for memory-bound experiments and the Cluster D for disk-bound tests. For Cluster M the size of the data set was set to million records per node resulting 7 MB of raw data per node. The raw data in this context does not include the keys which increases the total data footprint. For Cluster D we tested a single setup with 5 million records for a total of.5 GB of raw data and thus making memory-only processing impossible. Each test was run for 6 seconds and the reported results are the average of at least 3 independent executions. We automated the benchmarking process as much as possible to be able to experiment with many different settings. For each system, we wrote a set of scripts that performed the complete benchmark for a given configuration. The scripts installed the systems from scratch for each workload on the required number of nodes, thus making sure that there was no interference between different setups. We made extensive use of the Parallel Distributed Shell (pdsh). Many configuration parameters were adapted within the scripts using the stream editor sed. Our workloads were generated using 28 connections per server node, i.e., 8 connections per core in Cluster M. In Cluster D, we reduced the number of connection to 2 per core to not overload the system. The number of connections is equal to the number of independently simulated clients for most systems. Thus, we scaled the number of threads from 28 for one node up to 536 for 2 nodes, all of them working as intensively as possible. To be on the safe side, we used up to 5 nodes to generate the workload in order to fully saturate the storage systems. So no client node was running more than 37 threads. We set a scan-length of 5 records as well as fetched all the fields of the record for read operations. 4. BENCHMARKED KEY VALUE STORES We benchmarked six different open-source key-value stores. We chose them to get an overview of the performance impact of different storage architectures and design decisions. Our goal was not only to get a pure performance comparison but also a broad overview of available solutions. According to Cartell, new generation data stores can be classified in four main categories [4]. We chose each two of the following classes according to this classification: Key-value stores: Project and Extensible record stores: and Scalable relational stores: Cluster and Our choice of systems was based on previously reported performance results, popularity and maturity. Cartell also describes a fourth type of store, document stores. However, in our initial research we did not find any document store that seemed to match our requirements and therefore did not include them in the comparison. In the following, we give a basic overview on the benchmarked systems focusing on the differences. Detailed descriptions can be found in the referenced literature. 4. [28] is an open source, distributed, column-oriented database system based on Google s BigTable [5]. is written in Java, runs on top of Apache Hadoop and Apache ZooKeeper [5] and uses the Hadoop Distributed Filesystem (HDFS) [27] (also an open source implementation of Google s file system GFS [3]) in order to provide fault-tolerance and replication. Specifically, it provides linear and modular scalability, strictly consistent data access, automatic and configurable sharding of data. Tables in can be accessed through an API as well as serve as the input and output for MapReduce jobs run in Hadoop. In short, applications store data into tables which consist of rows and column families containing columns. Moreover, each row may have a different set of columns. Furthermore, all columns are indexed with a user-provided key column and are grouped into column families. Also, all table cells the intersection of row and column coordinates are versioned and their content is an uninterpreted array of bytes. For our benchmarks, we used v.9.4 running on top of Hadoop v The configuration was done using a dedicated node for the running master processes (NameNode and Secondary- NameNode), therefore for all the benchmarks the specified number of servers correspond to nodes running slave processes (DataNodes and TaskTrackers) as well as s region server processes. We used the already implemented YCSB client, which required one table for all the data, storing each field into a different column. 4.2 Apache is a second generation distributed key value store developed at Facebook [9]. It was designed to handle very large amounts of data spread out across many commodity servers while providing a highly available service without single point of failure allowing replication even across multiple data centers as well as for choosing between synchronous or asynchronous replication for each update. Also, its elasticity allows read and write throughput, both increasing linearly as new machines are added, with no downtime or interruption to applications. In short, its architecture is a mixture of Google s BigTable [5] and Amazon s Dynamo [8]. As in Amazon s Dynamo, every node in the cluster has the same role, so there is no single point of failure as there is in the case of. The data model provides a structured key-value store where columns are added only to specified keys, so different keys can have different number of columns in any given family as in. The main differences between and are columns that can be grouped into column families in a nested way and consistency requirements that can be specified at query time. Moreover, whereas is a write-oriented system, was designed to get high performance for intensive read workloads. For our benchmark, we used the recent..-rc2 version and used mainly the default configuration. Since we aim for a high write throughput and have only small scans, we used the default RandomPartitioner that distributes the data across the nodes randomly. We used the already implemented YCSB client which required to set just one column family to store all the fields, each of them corresponding to a column. 4.3 Project [29] is a distributed key-value store (developed by LinkedIn) that provides highly scalable storage system. 727
5 With a simpler design compared to a relational database, neither tries to support general relational model nor to guarantee full ACID properties, instead it simply offers a distributed, fault-tolerant, persistent hash table. In, data is automatically replicated and partitioned across nodes such that each node is responsible for only a subset of data independent from all other nodes. This data model eliminates the central point of failure or the need for central coordination and allows cluster expansion without rebalancing all data, which ultimately allow horizontal scaling of. Through simple API, data placement and replication can easily be tuned to accommodate a wide range of application domains. For instance, to add persistence, can use different storage systems such as embedded databases (e.g., BerkeleyDB) or standalone relational data stores (e.g., ). Other notable features of are in-memory caching coupled with storage system so a separate caching tier is no longer required and multi-version data model for improved data availability in case of system failure. In our benchmark, we used version.9.. with the embedded BerkeleyDB storage and the already implemented YCSB client. Specifically, when configuring the cluster, we set two partitions per node. In both clusters, we set to use about 75% of the memory whereas the remaining 25% was used for the embedded BerkeleyDB storage. The data is stored in a single table where each key is associated with an indexed set of values. 4.4 [24] is an in-memory, key-value data store with the data durability option. data model supports strings, hashes, lists, sets, and sorted sets. Although is designed for in-memory data, depending on the use case, data can be (semi-) persisted either by taking snapshot of the data and dumping it on disk periodically or by maintaining an append-only log of all operations. Furthermore, can be replicated using a master-slave architecture. Specifically, supports relaxed form of master-slave replication, in which data from any master can be replicated to any number of slaves while a slave may acts as a master to other slaves allowing to model a single-rooted replication tree. Moreover, replication is non-blocking on both the master and slave, which means that the master can continue serving queries when one or more slaves are synchronizing and slaves can answer queries using the old version of the data during the synchronization. This replication model allows for having multiple slaves to answer read-only queries resulting in highly scalable architecture. For our benchmark, we used version Although a cluster version is expected in the future, at the time of writing this paper, the cluster version is in an unstable state and we were not able to run a complete test. Therefore, we deployed a single-node version on each of the nodes and used the Jedis 6 library to implement a distributed store. We updated the default YCSB client to use ShardedJedisPool, a class which automatically shards and accordingly accesses the data in a set of independent servers. This gives considerable advantage to in our benchmark since there is no interaction between the instances. For the storage of the data, YCSB uses a hash map as well as a sorted set. 4.5 [3] is an ACID compliant relational in-memory database system derived from the research prototype H-Store [7]. It has a shared nothing architecture and is designed to run on a multi-node 6 Jedis, a Java client for - xetorthio/jedis. cluster by dividing the database into disjoint partitions by making each node the unique owner and responsible for a subset of the partitions. The unit of transaction is a stored procedure which is Java interspersed with SQL. Forcing stored procedures as the unit of transaction and executing them at the partition containing the necessary data makes it possible to eliminate round trip messaging between SQL statements. The statements are executed serially and in a single threaded manner without any locking or latching. The data is in-memory, hence, if it is local to a node a stored procedure can execute without any I/O or network access, providing very high throughput for transactional workloads. Furthermore, supports multi-partition transactions, which require data from more than one partition and are therefore more expensive to execute. Multi-partition transactions can completely be avoided if the database is cleanly partitionable. For our benchmarking we used v2..3 and the default configuration. We set 6 sites per host which is the recommendation for our platform. We implemented an YCSB client driver for that connects to all servers as suggested in the documentation. We set a single table with 5 columns for each of the fields and the key as the primary key as well as being the column which allows for computing the partition of the table. This way, as read, write and insert operations are performed for a single key, they are implemented as single-partition transactions and just the scan operation is a multi-partition transaction. Also, we implemented the required stored procedures for each of the operations as well as the YCSB client. 4.6 [2] is the world s most used relational database system with full SQL support and ACID properties. supports two main storage engines: MyISAM (for managing non-transactional tables) and InnoDB (for providing standard transactional support). In addition, delivers an in-memory storage abstraction for temporary or non-persistent data. Furthermore, the cluster edition is a distributed, multi-master database with no single point of failure. In cluster, tables are automatically sharded across a pool of low-cost commodity nodes, enabling the database to scale horizontally to serve read and write-intensive workloads. For our benchmarking we used v5.5.7 and InnoDB as the storage engine. Although cluster already provides shared-nothing distribution capabilities, instead we spread independent single-node servers on each node. Thus, we were able to use the already implemented RDBMS YCSB client which connects to the databases using JDBC and shards the data using a consistent hashing algorithm. For the storage of the data, a single table with a column for each value was used. 5. EXPERIMENTAL RESULTS In this section, we report the results of our benchmarking efforts. For each workload, we present the throughput and the latencies of operations. Since there are huge variations in the latencies, we present our results using logarithmic scale. We will first report our results and point out significant values, then we will discuss the results. Most of our experiments were conducted on Cluster M which is the faster system with more main memory. Unless we explicitly specify the systems were tested on Cluster M. 5. Workload R The first workload was Workload R, which was the most read intensive with 95% reads and only 5% writes. This kind of workload is common in many social web information systems where the read operations are dominant. As explained above, we used 728
6 Throughput (Operations/sec) Latency (ms) - Logarithmic. Figure 3: Throughput for Workload R Figure 4: Read latency for Workload R million records per node, thus, scaling the problem size with the cluster size. For each run, we used a freshly installed system and loaded the data. We ran the workload for minutes with maximum throughput. Figure 3 shows the maximum throughput for workload R for all six systems. In the experiment with only one node, has the highest throughput (more than 5K ops/sec) followed by. There are no significant differences between the throughput of and, which is about half that of (25K ops/sec). is 2 times slower than (with 2K ops/sec). The slowest system in this test on a single node is with 2.5K operation per second. However, it is interesting to observe that the three web data stores that were explicitly built for scalability in web scale i.e.,, and demonstrate a nice linear behavior in the maximum throughput. As discussed previously, we were not able to run the cluster version of, therefore, we used the Jedis library that shards the data on standalone instances for multiple nodes. In theory, this is a big advantage for, since it does not have to deal with propagating data and such. This also puts much more load on the client, therefore, we had to double the number of machines for the YCSB clients for to fully saturate the standalone instances. However, the results do not show the expected scalability. During the tests, we noticed that the data distribution is unbalanced. This actually caused one node to consistently run out of memory in the 2 node configuration 7. For, all configurations that we tested showed a slow-down for multiple nodes. It seems that the synchronous querying in YCSB is not suitable for a distributed configuration. For we used a similar approach as for. Each node was independent and the client managed the sharding. Interestingly, the YCSB client for did a much better sharding than the Jedis library, and we observed an almost perfect speed-up from one to two nodes. For higher number of nodes the increase of the throughput decreased slightly but was comparable to the throughput of. Workload R was read-intensive and modeled after the requirements of web information systems. Thus, we expected a low latency for read operations at the three web data stores. The average latencies for read operations for Workload R can be seen in Figure 4. As mentioned before, the latencies are presented in logarithmic scale. For most systems, the read latencies are fairly stable, while they differ strongly in the actual value. Again,,, and illustrate a similar pattern the latency increases slightly for two nodes and then stays constant. Project 7 We tried both supported hashing algorithms in Jedis, Mur- MurHash and MD5, with the same result. The presented results are achieved with MurMurHash Latency (ms) - Logarithmic.. Figure 5: Write latency for Workload R has the lowest latency of 23 sك for one node and 26 sك for 2 nodes. has a higher average latency of 5-8 ms and has a much higher latency of 5-9 ms. Both sharded stores,, and, have a similar pattern as well, with having the best latency among all systems. In contrast to the web data stores, they have a latency that tends to decrease with the scale of the system. This is due to the reduced load per system that reduces the latency as will be further discussed in Section 5.6. The latency for reads in is increasing which is consistent with the decreasing throughput. The read latency is surprisingly high also for the single node case which, however, has a solid throughput. The latencies for write operations in Workload R can be seen in Figure 5. The differences in the write latencies are slightly bigger than the differences in the read latencies. The best latency has which clearly trades a read latency for write latency. It is, however, not as stable as the latencies of the other systems. has the highest (stable) write latency of the benchmarked systems, which is surprising since it was explicitly built for high insertion rates [9]. Project has roughly the same write as read latency and, thus, is a good compromise for write and read speed in this type of workload. The sharded solutions, and, exhibit the same behavior as for read operations. However, has much lower latency then while it has less throughput for more than 4 nodes. again has a high latency from the start which gets prohibitive for more than 4 nodes. 5.2 Workload RW In our second experiment, we ran Workload RW which has 5% writes. This is commonly classified as a very high write rate. In Figure 6, the throughput of the systems is shown. For a single node, achieves the highest throughput, which is only slightly lower than its throughput for Workload R. has a similar throughput, but it has 2% less throughput than for Workload R. 729
7 25 25 Throughput (Ops/sec) Throughput (Ops/sec) Project Figure 6: Throughput for Workload RW Figure 9: Throughput for Workload W Latency (ms) - Logarithmic. Latency (ms) - Logaritmic. Figure 7: Read latency for Workload RW Figure : Read latency for Workload W has a throughput that is about % higher than for the first workload. s throughput increases by 4% for the higher write rate, while Project s throughput shrinks by 33% as does s throughput. For multiple nodes,,, and Project follow the same linear behavior as well. exhibits a good speed-up up to 8 nodes, in which s throughput matches s throughput. For 2 nodes, its throughput does no longer grow noticeably. Finally, and exhibit the same behavior as for the Workload R. As can be seen in Figure 7, the read latency of all systems is essentially the same for both Workloads R and RW. The only notable difference is, which is 75% less for one node and 4% less for 2 nodes. In Figure 8, the write latency for Workload RW is summarized. The trends closely follows the write latency of Workload R. However, there are two important subtle differences: () s la- Latency (ms) - Logarithmic.. Figure 8: Write latency for Workload RW tency is almost 5% lower than for Workload R; and (2) s latency is twice as high on average for all scales. 5.3 Workload W Workload W is the one that is closest to the APM use case (without scans). It has a write rate of 99% which is too high for web information systems production workloads. Therefore, this is a workload neither of the systems was specifically designed for. The throughput results can be seen in Figure 9. The results for one node are similar to the results for Workload RW with the difference that all system have a worse throughput except for and. While s throughput increases modestly (2% for 2 nodes), s throughput increases almost by a factor of 2 (for 2 nodes). For the read latency in Workload W, shown in Figure 7, the most apparent change is the high latency of. For 2 nodes, it goes up to second on average. Furthermore, s read latency almost twice as high while it was constant for Workload R and RW. For the other systems the read latency does not change significantly. The write latency for Workload W is captured in Figure. It can be seen that s write latency increased significantly, by a factor of 2. In contrast to the read latency, Project s write latency is almost identical to workload RW. For the other systems the write latency increased in the order of 5-5%. 5.4 Workload RS In the second part of our experiments, we also introduce scans in the workloads. In particular, we used the existing YCSB client for Project which does not support scans. Therefore, we omitted Project in the following experiments. In the scan experiments, we split the read percentage in equal sized scan and read parts. For Workload RS this results in 47% read and scan operations and 6% write operations. 73
8 Latency (ms) - Logarithmic. Latency (ms) - Logarithmic Figure : Write latency for Workload W Figure 3: Scan latency for Workload RS Throughput (Ops/sec) Throughput (Ops/sec) Figure 2: Throughput for Workload RS Figure 4: Throughput for Workload RSW In Figure 2, the throughput results can be seen. has the best throughput for a single node, but does not scale with the number of nodes. The same is true for which is, however, consistent with the general performance of in our evaluation. Furthermore, achieves similar performance as in the workloads without scans. Lastly, and, again, obtain a linear increase in throughput with the number of nodes. The scan latency results, shown in Figure 3, signify that the scans are slow for setup with larger than two nodes. This justifies the low throughput. s weak performance for scans can also be justified with the way the scans are done in the YCSB client. The scan is translated to a SQL query that retrieves all records with a key equal or greater than the start key of the scan. In the case of this is inefficient. s latency is almost in the second range. Likewise, s scans are constant and are in the range of 2-25 milliseconds. Although not shown, it is interesting to note that s latency for read and write operations is the same as without scans. In addition, the scans are not significantly slower than read operations. This is not true for, here all operations have the same increase of latency, and, in general, scans are 4 times slower than reads. behaves like, but has a latency that is in the range of 4-8 milliseconds. Similar to, has the same latency for all different operations. 5.5 Workload RSW Workload RSW has 5% reads of which 25% are scans. The throughput results can be seen in Figure 4. The results are similar to workload RS with the difference that s throughput is as low as 2 operations per second for one node and goes below one operation per second for four and more nodes. This can again be explained with the implementation of the YCSB client. and gain from the lower scan rate and have, therefore, a throughput that is twice as high as for Workload RS. achieves the best throughput for one node. Furthermore, s throughput only slightly decreases from two to four nodes which can also be seen for Workload RS. The scan operation latency is for Workload RSW for and, all other systems have a slightly increased scan latency. The scan latencies are all stable with the exception of. We omit the graph due to space restrictions. 5.6 Varying Throughput The maximum throughput tests above are a corner case for some of the systems as the high latencies show. To get more insights into the latencies in less loaded system we made a series of tests where we limited the maximum workload. In this test, we used the configuration with 8 nodes for each system and limited the load to 95% to 5% of the maximum throughput that was determined in Latency (Normalized) Percentage of Maximum Throughput Figure 5: Read latency for bounded throughput on Workload R 5 73
9 Latency (Normalized) Percentage of Maximum Throughput 5 Throughput (Ops/sec) - Logarithmic R RW W Workload Figure 6: Write latency for bounded throughput on Workload R Figure 8: Throughput for 8 nodes in Cluster D Disk Usage (GB) Project Raw Data Latency (ms) - Logarithmic R RW W Workload Figure 7: Disk usage for million records the previous tests 8. Due to space restrictions, we only present our results for Workload R. In Figure 5, the normalized read latency for Workload R can be seen. For the latency decreases almost linearly with the reduction of the workload. and have only small but steady reductions in the latencies. This shows that for these systems the bottleneck was probably not the query processing itself. has an interesting behavior that lets assume that the system has different states of operation based on the system load. Below 8% of the maximum load the read latency decreases linearly while being very constant above. For the latency first decreases rapidly and then stays steady which is due to the imbalanced load on the nodes. The write latencies have a similar development for,, and, as can be seen in Figure 6. is very unstable, however, the actual value for the write latency is always well below. milliseconds. has a more constant latency as for the read latency. 5.7 Disk Usage The disk usage of the key value stores initially came as a surprise to us. Figure 7 summarizes the disk usage of all systems that rely on disks. Since and do not store the data on disk, we omit these systems. As explained above, the size of each record is 75 bytes. Since we insert million records per node, the data set grows linearly from 7 megabytes for one node to 8.4 gigabytes for 2 nodes. As expected, all system undergo a linear increase of the disk usage since we use no replication. stores the data most efficiently and uses 2.5 gigabytes per node after the load phase. uses 5 gigabytes per node 8 Due to the prohibitive latency of above 4 nodes we omitted it in this test. Figure 9: Read latency for 8 nodes in Cluster D and Project 5.5 gigabytes. The most inefficient system in terms of storage is that uses 7.5 gigabytes per node and therefore times as much as the raw data size. In the case of, the disk usage also includes the binary log without this feature the disk usage is essentially reduced by half. The high increase of the disk usage compared to the raw data is due to the additional schema as well as version information that is stored with each key-value pair. This is necessary for the flexible schema support in these systems. The effect of increased disk usage is stronger in our tests then other setups because of the small records. The disk usage can be reduced by using compression which, however, will decrease the throughput and thus is not used in our tests. 5.8 Disk bound Cluster (Cluster D) We conducted a second series of tests on Cluster D. In this case, all systems had to use disk since the inserted data set was larger than the available memory. Therefore, we could not test and in this setup. We also omitted in this test, due to limited availability of the cluster. Also we only focused on a single scale for workloads R, RW, and W. In Figure 8, the throughput on this system can be seen for all three workloads on a logarithmic scale. In this test, the throughput increases for all systems significantly with higher write ratios. This most significant result is for which had relatively constant throughput for different tests in Cluster M. In Cluster D, the throughput increases by a factor of 26 from Workload R to Workload W. s throughput also benefits significantly by factor of 5. Project s throughput also increases only by a factor of 3. These results are especially interesting since these systems were originally designed for read-intensive workloads. As can be seen in Figure 9, the read latencies of all systems are in the order of milliseconds. has a read latency of 732
10 Latency (ms) - Logarithmic.. R RW W Workload Figure 2: Write latency for 8 nodes in Cluster D 4 ms for Workload R and RW. For workload W the latency is 25 ms. s read latency is surprisingly best in the mixed Workload RW with 7 ms on average, for Workload W it is worst with over 2 ms. has by far the best latency that is 5 and 6 ms for Workload R and Workload RW and increases to 2 ms for Workload W. The write latency is less dependent on the workload as can be seen in Figure 2. As in Cluster M, has a very low latency, well below ms. Interestingly, it is best for Workload RW. and Project exhibit a similar behavior. The write latency of these two systems is stable with a slight decrease for Workload RW. 5.9 Discussion In terms of scalability, there is a clear winner throughout our experiments. achieves the highest throughput for the maximum number of nodes in all experiments with a linear increasing throughput from to 2 nodes. This comes at the price of a high write and read latencies. s performance is best for high insertion rates. s throughput in many experiments is the lowest for one node but also increases almost linearly with the number of nodes. has a low write latency, especially in workloads with a considerable number of reads. The read latency, however, is much higher than in other systems. Project in our tests positions itself in between and. It also exhibits a near linear scalability. The read and write latency in Project are similar and are stable at a lowlevel.,, and Project were also evaluated on Cluster D. In this disk-bound setup, all systems have much lower throughputs and higher latencies. Our sharded installation achieves a high throughput as well which is almost as high as s. Interestingly, the latency of the sharded system decreases with the number of nodes due to the decreased relative load of the individual systems. For scans, the performance of is low which is due to the implementation of scans in the sharding library. Since we were not able to successfully run the cluster version, we used the sharding library Jedis. The standalone version of has a high throughput that exceeds all other systems for read-intensive workloads. The sharding library, however, does not balance the workload well which is why the the throughput does not increase in the same manner as for. However, the latencies for both read and write operations also decrease with increasing number of nodes for the sharded setup. Intrigued by the promised performance, we also included in our experiments. The performance for a single instance is in fact high and comparable to. However, we never achieved any throughput increase with more than one node. 6. EXPERIENCES In this section, we report, from an industry perspective, additional findings and observations that we encountered while benchmarking the various systems. We report on the difficulty to setup, to configure, and, most importantly, to tune these systems for an industry-scale evaluation. In our initial test runs, we ran every system with the default configuration, and then tried to improve the performance by changing various tuning parameters. We dedicated at least a week for configuring and tuning each system (concentrating on one system at a time) to get a fair comparison. 6. YCSB The YCSB benchmark was intuitive to use and fit our needs precisely. In the first version of YCSB that we used to benchmark the system, we, however, had a problem with its scalability. Because of the high performance of some of the systems under test, YCSB was not able to fully saturate them with one client node assigned to four storage nodes. Partly due to a recent YCSB patch (during our experimental evaluation) and by decreasing the ratio of client nodes to store nodes up to :2, we were able to saturate all data stores. s setup was relatively easy, since there are quick-start manuals available at the official website 9. Since is a symmetric system, i.e., all nodes are equal, a single setup for all nodes is virtually sufficient. There are only a few changes necessary in the configuration file to setup a cluster of. In our tests, we had no major issues in setting up the cluster. Like other key-value store systems, employs consistent hashing for distributing the values across the nodes. In, this is done by hashing the keys in the a range of 2 27 values and dividing this range by certain tokens. The default configuration selects a random seed (token) for each node that determines its range of hashed keys. In our tests, this default behavior frequently resulted in a highly unbalanced workload. Therefore, we assigned an optimal set of tokens to the nodes after the installation and before the load. This resulted in an optimally balanced data placement it, however, requires that the number of nodes is known in advance. Otherwise, a costly repartitioning has to be done for achieving a balanced data load. The configuration and installation of was more challenge than in the case of. Since uses HDFS, it also requires the installation and configuration of Hadoop. Furthermore, is not symmetric and, hence, the placement of the different services has an impact on the performance as well. Since we focused on a setup with a maximum of 2 nodes, we did not assign the master node and jobtracker to separate nodes instead we deployed them with data nodes. During the evaluations, we encountered several additional problems, in which the benchmark unexpectedly failed. The first issue that randomly interrupted the benchmarks was a suspected memory leak in the client that was also documented in the Apache Reference Guide. Although we were able to fix this issue with specific memory settings for the Java Virtual Machine, determine the root cause was non-trivial and demanded extensive amount of debugging. Another configuration problem, which almost undetectable was due to an incorrect permission setting for the HDFS data directory, in which the actual errors in log file were misleading. is strict in the permission settings for its directories and does not permit write access from other users on the data 9 website: Apache Reference Guide - org/book.html 733
11 directory. Although the error is written to the data node log, the error returned to the client reports a missing master. In contrast to the other systems in our test, the benchmark runs frequently failed when there was no obvious issue. These failures were non-deterministic and usually resulted in a broken test run that had to be repeated many times. The installation of was simple and the default configuration was used with no major problems. However, requires additional work to be done on the YCSB client side, which was implemented only to work against a single-node server instance. Since the cluster version is still in development, we implemented our own YCSB client using the sharding capabilities of the Java Jedis library. Thus, we spread out a set of independent single-node instances among the client nodes responsible of the sharding. Therefore, as each thread was required to manage a connection for each of the server, the system got quickly saturated because of the number of connections. As a result, we were forced to use a smaller number of threads. Fortunately, smaller number of threads were enough to intensively saturate the systems. Project The configuration of Project was easy for the most part. However, in contrast to the other systems, we had to create a separate configuration file for each node. One rather involved issue was tuning the configuration of the client. In the default setting, the client is able to use up to threads and up to 5 connections. However, in our maximum throughput setup this limit was always reached. This triggered problems in the storage nodes because each node configured to have a fixed number of open connections which is in the default configuration this limit is quickly reached in our tests (with only two YCSB client threads). Therefore, we had to adjust the number of server side threads and the number of threads per YCSB instances. Furthermore, we had to optimize the cache for the embedded BerkeleyDB so that Project itself had enough memory to run. For inadequate settings the server was unreachable after the clients established their connections. is a well-known and widely documented project, thus the installation and configuration of the system was smooth. In short, we just set InnoDB as the storage system and the size of the buffer pool accordingly to the size of the memory. As we used the default RDBMS YCSB client, which automatically shards the data on a set of independent database servers and forces each client thread to manage a JDBC connection with each of the servers, we required to decrease the number of threads per client in order to not saturate the systems. An alternative approach would be to write a different YCSB client and use a cluster version. Our configuration was mostly inspired by the community documentation that suggested the client implementation and configuration of the store. The developers benchmarked the speed of vs. themselves with a similar configuration but only up to 3 nodes [4]. Unlike our results they achieved a speed-up with a fixed sized database. In contrast to our setup, their tests used asynchronous communication which seems to better fit s execution model. 7. RELATED WORK After many years in which general purpose relational database systems dominated not only the market but also academic research, there has been an advent of highly specialized data stores. Based Performance Guide -. com/docs/perfguide/index on the key-value paradigm many different architectures where created. Today, all major companies in the area of social Web have deployed a key-value store: Google has BigTable, Facebook, LinkedIn Project, Yahoo! PNUTS [6], and Amazon Dynamo [8]. In our benchmarking effort, we compared six wellknown, modern data stores, all of which are publicly available. In our comparison, we cover a broad range of architectures and chose systems that were shown or at least said to be performant. Other stores we considered for our experiments but excluded in order to present a more thorough comparison of the systems tested were: Riak 2, Hypertable 3, and Kyoto Cabinet 4. A high-level overview of different existing systems can be found in [4]. As explained above, we used the YCSB benchmark for our evaluation [7]. This benchmark is fairly simple and has a broad user base. It also fits our needs for the APM use case. In the YCSB s publication, a comparison of PNUTS,,, and My- SQL is shown. Interestingly enough, there is no other large scale comparison across so many different systems available. However, there are a multiple online one-on-one comparisons as well as scientific publications. We summarize the findings of other comparisons without claiming to be exhaustive. Hugh compared the performance of and in [4], in his setup outperformed for up to 3 nodes on a data set of 5K values. We see a similar result for Workload R, however, for 4 and more nodes the performance drastically decreases in our setup. In [6], Jeong compared,, and MongoDB on a three node, triple replicated setup. In the test, the author inserted 5M KB records in the system and measured the write throughput, the read-only throughput, and a : read-write throughput which is similar to our Workload RW. The results show that Cassandara outperforms with less difference than we observed in our tests. MongoDB is shown to be less performant, however, the authors note that they observed high latencies for and which is consistent with our results. Erdody compared the performance and latency for Project and in []. In the three node, triple replicated setup,.5kb and 5KB records are used which is much larger than our record size. In this setup, the performance difference of Project and is not as significant as in our setup. Pirzadeh et al. used YCSB to evaluate the performance of scan operations in key value stores [23]. The authors compared the performance of,, and Project with a focus on scan workloads to determine the scan characteristics of these systems. Patil et al. developed the YCSB++ benchmark [22]. In their tests, they compared to their own techniques with up to 6 nodes. An interesting feature of the YCSB++ benchmark is the more enhanced monitoring using an extension of Ganglia. A comparison of,, and Riak discussing their elasticity was presented by Konstantinou et al. [8]. The authors also use the YCSB benchmark suite. In the presented results, consistently outperforms which could be the case because of the older version of (.7. beta vs...-rc2). We are not aware of any other study that compares the performance of such a wide selection of systems on a scale of up to 2+ nodes. In contrast to previous work, our data set consists of small records which increases the impact of inefficient resource usage for memory, disk and network. Our performance numbers are in many cases consistent with previous findings but give a comprehensive comparison of all systems for a broad range of workloads. 2 Riak homepage - 3 Hypertable homepage - 4 Kyoto Cabinet homepage - kyotocabinet/ 734
12 8. CONCLUSION In this paper, we present the challenge of storing monitoring data as generated by application performance management tools. Due to their superior scalability and high performance for other comparable workloads, we analyzed the suitability of six different storage systems for the APM use case. Our results are valid also for related use cases, such as on-line advertisement marketing, click stream storage, and power monitoring. Unlike previous work, we have focused on the maximum throughput that can be achieved by the systems. We observed linear scalability for,, and Project in most of the tests. s throughput dominated in all the tests, however, its latency was in all tests peculiarly high. Project exhibits a stable latency that is much lower than s latency. had the least throughput of the three but exhibited a low write latency at the cost of a high read latency. The sharded systems, i.e., and, showed good throughput that was, however, not as scalable as the first three systems throughput. It has to be noted, however, that the throughput of multiple nodes in the sharded case depends largely on the sharding library. The last system in our test was, a sharednothing, in-memory database system. Although it exhibited a high throughput for a single node, the multi-node setup did not scale. In our tests, we optimized each system for our workload and tested it with a number of open connections which was 4 times higher than the number of cores in the host CPUs. Higher numbers of connections led to congestion and slowed down the systems considerably while lower numbers did not fully utilize the systems. This configuration resulted in an average latency of the request processing that was much higher than in previously published performance measurements. Since our use case does not have the strict latency requirements that are common in on-line applications and similar environments, the latencies in most results are still adequate. Considering the initial statement that a maximum of 5% of the nodes are designated for storing monitoring data in a customer s data center, for 2 monitoring nodes, the number of nodes monitored would be around 24. If agents on each of these report K measurements every seconds, the total number of inserts per second is 24K. This is higher than the maximum throughput that achieves for Workload W on Cluster M but not drastically. However, since data is stored in-memory on Cluster M further improvements are needed in order to reliably sustain the requirements for APM. In future work, we will determine the impact of replication and compression on the throughput in our use case. Furthermore, we will extend the range of tested architectures. 9. ACKNOWLEDGEMENTS The authors would like to acknowledge the Invest in Spain society, the Ministerio de Economa y Competitividad of Spain and the EU through FEDER funds for their support through grant C2 8. Furthermore, we would like to thank Harald Kosch and his group for the generous access to his compute cluster.. REFERENCES [] Application response measurement (arm) issue 4. v. [2] The real overhead of managing application performance. [3] J. Buten. Performance & security of applications, tools, sites, & social networks on the internet. In Health 2. Europe, 2. [4] R. Cartell. Scalable sql and nosql data stores. SIGMOD Record, 39(4):2 27, 2. [5] F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. E. Gruber. Bigtable: A distributed storage system for structured data. In OSDI, pages 25 28, 26. , (2): , 28. [7] B. F. Cooper, A. Silberstein, E. Tam, R. Ramakrishnan, and R. Sears. Benchmarking cloud serving systems with ycsb. In SoCC, pages 43 54, 2. [8], pages 25 22, 27. [9] M. Driscoll. One billion rows a second: Fast, scalable olap in the cloud. In XLDB, 2. [] D. Erdody. Choosing a key-value storage system (cassandra vs. voldemort). choosing a keyvalue storage sy.html. [] R. Field. Java virtual machine profiling interface specification (jsr-63). [2] C. Gaspar. Deploying nagios in a large enterprise environment. In LISA, 27. [3] S. Ghemawat, H. Gobioff, and S.-T. Leung. The google file system. In SOSP, pages 29 43, 23. [4] J. Hugg. Key-value benchmarking. [5] P. Hunt, M. Konar, F. P. Junqueira, and B. Reed. Zookeeper: Wait-free coordination for internet-scale systems. In USENIX ATC, pages 45 58, 2. [6] L. H. Jeong. Nosql benchmarking. [7]. PVLDB, (2): , 28. [8] I. Konstantinou, E. Angelou, C. Boumpouka, D. Tsoumakos, and N. Koziris. On the elasticity of nosql databases over cloud management platforms. In CIKM, pages , 2. [9] A. Lakshman and P. Malik. : a decentralized structured storage system. SIGOPS Operating Systems Review, 44(2):35 4, 2. [2] M. L. Massie, B. N. Chun, and D. E. Culler. The ganglia distributed monitoring system: Design, implementation, and experience. Parallel Computing, 3(7):87 84, 24. [2].. [22]: 9:4, 2. [23] P. Pirzadeh, J. Tatemura, and H. Hacigumus. Performance evaluation of range queries in key value stores. In IPDPSW, pages 92, 2. [24] S. Sanfilippo.. [25] Z. Shao. Real-time analytics at facebook. In XLDB, 2. [26] B. H. Sigelman, L. A. Barroso, M. Burrows, P. Stephenson, M. Plakal, D. Beaver, S. Jaspan, and C. Shanbhag. Dapper, a large-scale distributed systems tracing infrastructure. Technical Report dapper-2-, Google Inc., 2. [27] The Apache Software Foundation. Apache Hadoop. [28] The Apache Software Foundation. Apache. [29]. Project. [3]
Solving Big Data Challenges for Enterprise Application Performance Management
Solving Big Data Challenges for Enterprise Application Performance Management Tilmann Rabl Middleware Systems Research Group University of Toronto, Canada tilmann@msrg.utoronto.ca Sergio Gómez Villamor Approach to Implement Map Reduce with NoSQL Databases International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 8 Aug 2015, Page No. 13635-13639 An Approach to Implement Map Reduce with NoSQL Databases Ashutosh
ZooKeeper. Table of contents
by Table of contents 1 ZooKeeper: A Distributed Coordination Service for Distributed Applications... 2 1.1 Design Goals...2 1.2 Data model and the hierarchical namespace...3 1.3 Nodes and ephemeral nodes... Architecture. Part 1
Hadoop Architecture Part 1 Node, Rack and Cluster: A node is simply a computer, typically non-enterprise, commodity hardware for nodes that contain data. Consider we have Node 1.Then we can add more nodes,
Hypertable Architecture Overview
WHITE PAPER - MARCH 2012 Hypertable Architecture Overview Hypertable is an open source, scalable NoSQL database modeled after Bigtable, Google s proprietary scalable database. It is written in C++
A Survey of Distributed Database Management Systems
Brady Kyle CSC-557 4-27-14 A Survey of Distributed Database Management Systems Big data has been described as having some or all of the following characteristics: high velocity, heterogeneous structure,,
Hadoop. Sunday, November 25, 12
Hadoop What Is Apache Hadoop? The Apache Hadoop software library is a framework that allows for the distributed processing of large data sets across clusters of computers using
NoSQL Data Base Basics
NoSQL Data Base Basics Course Notes in Transparency Format Cloud Computing MIRI (CLC-MIRI) UPC Master in Innovation & Research in Informatics Spring- 2013 Jordi Torres, UPC - BSC HDFS
Energy Efficient MapReduce
Energy Efficient MapReduce Motivation: Energy consumption is an important aspect of datacenters efficiency, the total power consumption in the united states has doubled from 2000 to 2005, representing
Comparing SQL and NOSQL databases
COSC 6397 Big Data Analytics Data Formats (II) HBase Edgar Gabriel Spring 2015 Comparing SQL and NOSQL databases Types Development History Data Storage Model SQL One type (SQL database) with minor variations implementation of MapReduce computational model. Ján Vaňo
Hadoop implementation of MapReduce computational model Ján Vaňo What is MapReduce? A computational model published in a paper by Google in 2004 Based on distributed computation Complements Google s distributed
Virtuoso and Database Scalability
Virtuoso and Database Scalability By Orri Erling Table of Contents Abstract Metrics Results Transaction Throughput Initializing 40 warehouses Serial Read Test Conditions Analysis Working Set Effect
PostgreSQL Performance Characteristics on Joyent and Amazon EC2
OVERVIEW In today's big data world, high performance databases are not only required but are a major part of any critical business function. With the advent of mobile devices, users are consuming data
HADOOP PERFORMANCE TUNING
PERFORMANCE TUNING Abstract This paper explains tuning of Hadoop configuration parameters which directly affects Map-Reduce job performance under various conditions, to achieve maximum performance. The
Oracle NoSQL Database A Distributed Key-Value Store
Oracle NoSQL Database A Distributed Key-Value Store Charles Lamb, Consulting MTS The following is intended to outline our general product direction. It is intended for information
Graph Database Proof of Concept Report
Objectivity, Inc. Graph Database Proof of Concept Report Managing The Internet of Things Table of Contents Executive Summary 3 Background 3 Proof of Concept 4 Dataset 4 Process 4 Query Catalog 4 Environment Systems, Big Data
Big Systems, Big Data When considering Big Distributed Systems, it can be noted that a major concern is dealing with data, and in particular, Big Data Have general data issues (such as latency, availability,...
Hadoop & its Usage at Facebook
Hadoop & its Usage at Facebook Dhruba Borthakur Project Lead, Hadoop Distributed File System dhruba@apache.org Presented at the Storage Developer Conference, Santa Clara September 15, 2009 Outline Introduction
Domain driven design, NoSQL and multi-model databases
Domain driven design, NoSQL and multi-model databases Java Meetup New York, 10 November 2014 Max Neunhöffer Max Neunhöffer I am a mathematician Earlier life : Research in Computer Algebra
Distributed File Systems
Distributed File Systems Paul Krzyzanowski Rutgers University October 28, 2012 1 Introduction The classic network file systems we examined, NFS, CIFS, AFS, Coda, were designed as client-server applications.
Understanding Neo4j Scalability
Understanding Neo4j Scalability David Montag January 2013 Understanding Neo4j Scalability Scalability means different things to different people. Common traits associated include: 1. Redundancy in
Integrating Big Data into the Computing Curricula
Integrating Big Data into the Computing Curricula Yasin Silva, Suzanne Dietrich, Jason Reed, Lisa Tsosie Arizona State University 1 Overview Motivation Big
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
Big Data Storage Options for Hadoop Sam Fineberg, HP Storage
Sam Fineberg, HP Storage SNIA Legal Notice The material contained in this tutorial is copyrighted by the SNIA unless otherwise noted. Member companies and individual members may use this material in presentations
Scalable Architecture on Amazon AWS Cloud
Scalable Architecture on Amazon AWS Cloud Kalpak Shah Founder & CEO, Clogeny Technologies kalpak@clogeny.com 1 * 2 Architect
In-Memory Databases MemSQL
IT4BI - Université Libre de Bruxelles In-Memory Databases MemSQL Gabby Nikolova Thao Ha Contents I. In-memory Databases...4 1. Concept:...4 2. Indexing:...4 a. b. c. d. AVL Tree:...4 B-Tree and B+ Tree:..
MyISAM Default Storage Engine before MySQL 5.5 Table level locking Small footprint on disk Read Only during backups GIS and FTS indexing Copyright 2014, Oracle and/or its affiliates. All rights reserved.
Hadoop: Embracing future hardware
Hadoop: Embracing future hardware Suresh Srinivas @suresh_m_s Page 1 About Me Architect & Founder at Hortonworks Long time Apache Hadoop committer and PMC member Designed and developed many key Hadoop
Leveraging EMC Fully Automated Storage Tiering (FAST) and FAST Cache for SQL Server Enterprise Deployments
Leveraging EMC Fully Automated Storage Tiering (FAST) and FAST Cache for SQL Server Enterprise Deployments Applied Technology Abstract This white paper introduces EMC s latest groundbreaking technologies,
International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 8, August 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
Data Management in the Cloud
Data Management in the Cloud Ryan Stern stern@cs.colostate.edu : Advanced Topics in Distributed Systems Department of Computer Science Colorado State University Outline Today Microsoft Cloud SQL Server
Storage Systems Autumn 2009. Chapter 6: Distributed Hash Tables and their Applications André Brinkmann
Storage Systems Autumn 2009 Chapter 6: Distributed Hash Tables and their Applications André Brinkmann Scaling RAID architectures Using traditional RAID architecture does not scale Adding news disk implies
2009 Oracle Corporation 1
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
SQL Server 2008 Performance and Scale
SQL Server 2008 Performance and Scale White Paper Published: February 2008 Updated: July 2008 Summary: Microsoft SQL Server 2008 incorporates the tools and technologies that are necessary to implement
Introduction to Hadoop
Introduction to Hadoop 1 What is Hadoop? the big data revolution extracting value from data cloud computing 2 Understanding MapReduce the word count problem more examples MCS 572 Lecture 24 Introduction. Optimizing the Performance Of MySQL Cluster
White Paper Optimizing the Performance Of MySQL Cluster Table of Contents Introduction and Background Information... 2 Optimal Applications for MySQL Cluster... 3 Identifying the Performance Issues..... | http://docplayer.net/498091-Solving-big-data-challenges-for-enterprise-application-performance-management.html | CC-MAIN-2017-26 | refinedweb | 12,231 | 53.21 |
Summary
When people think of code-reuse they usually think of function libraries, object hierarchies or cut-and-paste. A very powerful and too frequently overlooked method of code reuse is reuse of programs.
I have always been in awe of the productivity of unix wizards. Given a simple bash shell, they can write in one line a comple program which would take me possibly hundreds of lines of code to write in C++.
The secret to the productivity is code reuse. By piping from one program to another, it is a deceptively simple way to write a new program. Perhaps it is due to this simplicity that it has been overlooked by languages like Java, C++, C#, Delphi, etc.
I know that the Perl, Ruby and Perl programmers reading this right now are probably smirking. They know something that programmers like myself, who grew up on Dos and Windows, have trouble realizing. Why reinvent the wheel, when you can just invoke it from the shell? Of course, Windows and Dos never had a wheel!
Now here is an interesting problem, there is no simple and portable way to write a program in C++, and then reuse it within another program without resorting to the OS. Of course in Windows we can write something like:
ShellExecute("some_program.exe > some_file.txt");
This is fine if we are always going to be in Windows, except that it isn't integrated with the language. It is very hard to run a program and redirect its output into a stringstream without generating a file. What I think is really lacking in C++ is the ability to write directly:
SomeProgram() > SomeStream();
The ability to write such code, would make C++ behave much more like a higher level language (or agile language, if you accept such a thing can exist).
Since C++ is so darn powerful, I have written a library which facilitates reuse of programs by allowing them to be written as objects. I have also providing them with an operator so they can be redirected to and from a stream, or piped to other programs. For instance:
#include "programs.hpp" #include "hello_world.hpp" #include "upper_case.hpp" #include <fstream> #include <sstream> fstream f("c:\\tmp.txt"); stringstream s; HelloWorldProgram() > f > UpperCaseProgram() > s;
A program like
UpperCaseProgram is written as follows:
// upper_case.hpp #include <iostream.hpp> #include <cctype.hpp> #include "programs.hpp" class UpperCaseProgram : public Program { protected: virtual void Main() { char c; while (cin.get(c)) cout.put(toupper(c)); } };
So what I am proposing is both a library and a technique to make program reuse in C++ much easier by writing them as objects. The source code, and more a detailed explanation of the technique is available at CodeProject.com
Have an opinion? Readers have already posted 11 comments about this weblog entry. Why not add yours?
If you'd like to be notified whenever Christopher Diggins adds a new entry to his weblog, subscribe to his RSS feed. | http://www.artima.com/weblogs/viewpost.jsp?thread=87459 | CC-MAIN-2016-18 | refinedweb | 494 | 65.52 |
csv — CSV File Reading and Writing¶
Source code: Lib/csv.py
The so-called CSV (Comma Separated Values) format is the most common import and export format for spreadsheets and databases. a
dictwhose keys are given by the optional fieldnames parameter.
The fieldnames parameter is a sequence. If fieldnames is omitted, the values in the first row of file f will be used as the fieldnames. Regardless of how the fieldnames are determined, the the value of restval (which defaults to
None).
All other optional or keyword arguments are passed to the underlying
readerinstance.
Changed in version 3.6: Returned rows are now of type
OrderedDict.
A short usage example:
>>> import csv >>> with open('names.csv', newline='') as csvfile: ... reader = csv.DictReader(csvfile) ... for row in reader: ... print(row['first_name'], row['last_name']) ... Eric Idle John Cleese >>> print(row) {class is not optional.
A short usage example:
import csv with open('names.csv', 'w', newline='')'})
-', newline=''):
Dialects and Formatting Parameters¶:
Dialect.:
Writer Objects¶
Writer objects (
DictWriter instances and objects returned by
the
writer() function) have the following public methods. A row must be
an iterable).
csvwriter.
writerow(row)¶
Write the row parameter to the writer’s file object, formatted according to the current dialect. Return the return value of the call to the write method of the underlying file object.
Changed in version 3.5: Added support of arbitrary iterables.
csvwriter.
writerows(rows)¶
Write all elements in rows (an iterable of row objects as described above) to the writer’s file object, formatted according to the current dialect.
Writer objects have the following public attribute:
DictWriter objects have the following public method:
DictWriter.
writeheader()¶
Write a row with the field names (as specified in the constructor) to the writer’s file object, formatted according to the current dialect. Return the return value of the
csvwriter.writerow()call used internally.
New in version 3.2.
Changed in version 3.8:
writeheader()now also returns the value returned by the
csvwriter.writerow()method it uses internally.
Examples¶
- 1(1,2)
If
newline=''is not specified, newlines embedded inside quoted fields will not be interpreted correctly, and on platforms that use
\r\nlinendings on write an extra
\rwill be added. It should always be safe to specify
newline='', since the csv module does its own (universal) newline handling. | https://docs.python.org/3.9/library/csv.html | CC-MAIN-2020-34 | refinedweb | 384 | 60.31 |
This part of the documentation documents all the public classes and functions in Flask-SQLAlchemy.
This class is used to control the SQLAlchemy integration to one or more Flask applications. Depending on how you initialize the object it is usable right away or will attach as needed to a Flask application.
There are two usage modes which work very similar..requestODE configuration key) to False. Note that the configuration key overrides the value you pass to the constructor.
This class also provides access to all the SQLAlchemy functions and classes from the sqlalchemy and sqlalchemy.orm modules. So you can declare models like this:
class User(db.Model): username = db.Column(db.String(80), unique=True) pw_hash = db.Column(db.String(80))
You can still use sqlalchemy and sqlalchemy.orm directly, but note that Flask-SQLAlchemy customizations are available only through an instance of this SQLAlchemy class. Query classes default to BaseQuery for db.Query, db.Model.query_class, and the default query_class for db.relationship and db.backref. If you use these interfaces through sqlalchemy and sqlalchemy.orm directly,.
You may also define your own SessionExtension instances as well when defining your SQLAlchemy class instance. You may pass your custom instances to the session_extensions keyword. This can be either a single SessionExtension instance, or a list of SessionExtension instances. In the following use case we use the VersionedListener from the SQLAlchemy versioning examples.:
from history_meta import VersionedMeta, VersionedListener app = Flask(__name__) db = SQLAlchemy(app, session_extensions=[VersionedListener()]) class User(db.Model): __metaclass__ = VersionedMeta username = db.Column(db.String(80), unique=True) pw_hash = db.Column(db.String(80))
The session_options parameter can be used to override session options. If provided it’s a dict of parameters passed to the session’s constructor.
New in version 0.10: The session_options parameter was added.
New in version 0.16: scopefunc is now accepted on session_options. It allows specifying a custom function which will define the SQLAlchemy session’s scoping..
Creates all tables.
Changed in version 0.12: Parameters were added
Helper factory method that creates a scoped session.
Drops all tables.
Changed in version 0.12: Parameters were added
Gives access to the engine. If the database configuration is bound to a specific application (initialized with an application) this will always return a database connection. If however the current application is used this might raise a RuntimeError if no application is active at the moment.
Helper method that implements the logic to look up an application.
Returns a dictionary with a table->engine mapping.
This is suitable for use of sessionmaker(binds=db.get_binds(app)).
Returns a specific engine.
New in version 0.12.
Returns a list of all tables relevant for a bind.
This callback can be used to initialize an application for the use with this database setup. Never use a database in the context of an application not initialized that way or connections will leak.
Creates the connector for a given state and bind.
Creates the declarative base.
Returns the metadata
Reflects tables from the database.
Changed in version 0.12: Parameters were added
Baseclass for custom user models.
Optionally declares the bind to use. None refers to the default bind. For more information see Multiple Databases with Binds.
an instance of query_class. Can be used to query the database for instances of this model.
the query class used. The query attribute is an instance of this class. By default a BaseQuery is used.
The default query object used for models, and exposed as Query. This can be subclassed and replaced for individual models by setting the query_class attribute. This is a subclass of a standard SQLAlchemy Query class and has all the methods of a standard query as well.
Return the results represented by this query as a list. This results in an execution of the underlying query.
apply one or more ORDER BY criterion to the query and return the newly resulting query.
Apply a LIMIT to the query and return the newly resulting query.
Apply an OFFSET to the query and return the newly resulting query.
Return the first result of this query or None if the result doesn’t contain any rows. This results in an execution of the underlying query.
Like first() but aborts with 404 if not found instead of returning None.
Return an instance based on the given primary key identifier, or None if is raised.
get() is only used to return a single mapped instance, not multiple instances or individual column constructs, and strictly on a single primary key value. The originating Query must loading_toplevel for further details on relationship loading.
Like get() but aborts with 404 if not found instead of returning None.
Returns per_page items from page page. By default it will abort with 404 if no items were found and the page was larger than 1. This behavor can be disabled by setting error_out to False.
Returns an Pagination object..
True if a next page exists.
True if a previous page exists
the items for the current page %}
Returns a Pagination object for the next page.
Number of the next page
the current page number (1 indexed)
The total number of pages
the number of items to be displayed on a page.
Returns a Pagination object for the previous page.
Number of the previous page.
the unlimited query object that was used to create this pagination object.
the total number of items matching the query: | http://pythonhosted.org/Flask-SQLAlchemy/api.html?highlight=reflect?highlight=reflect | CC-MAIN-2013-48 | refinedweb | 905 | 61.33 |
Is this the cleanest way to write a list to a file, since
writelines() doesn't insert newline characters?
file.writelines(["%s\n" % item for item in list])
It seems like there would be a standard way...
You can use a loop:
with open('your_file.txt', 'w') as f: for item in my_list: f.write("%s\n" % item)
In Python 2, you can also use
with open('your_file.txt', 'w') as f: for item in my_list: print >> f, item
If you're keen on a single function call, at least remove the square brackets
[], so that the strings to be printed get made one at a time (a genexp rather than a listcomp) -- no reason to take up all the memory required to materialize the whole list of strings.
What are you going to do with the file? Does this file exist for humans, or other programs with clear interoperability requirements?
If you are just trying to serialize a list to disk for later use by the same python app, you should be pickleing the list.
import pickle with open('outfile', 'wb') as fp: pickle.dump(itemlist, fp)
To read it back:
with open ('outfile', 'rb') as fp: itemlist = pickle.load(fp) | https://pythonpedia.com/en/knowledge-base/899103/writing-a-list-to-a-file-with-python | CC-MAIN-2020-16 | refinedweb | 202 | 79.8 |
SessionContext and LocalContext within RPCfvitorc Feb 4, 2012 1:25 AM
Hi,
I've seen in the reference guide that one can get the SessionContext or the LocalContext using the Message object.
But in a RPC there is no Message object. How can we get access to those contexts within a RPC?
Regards,
Vitor.
1. Re: SessionContext and LocalContext within RPCChristian Sadilek Feb 7, 2012 1:42 PM (in response to fvitorc)
I assume your use case for this is to get access to the HTTP session? I have created a JIRA for this a while back:
If it's for the session object, you could add a servlet filter and store the object in a ThreadLocal, given you use the SimpleDispatcher.
2. Re: SessionContext and LocalContext within RPCfvitorc Feb 7, 2012 2:19 PM (in response to Christian Sadilek)
Not actually. I wanted acess to the queue id of the client invoking the RPC. I guess that information is in LocalContext right?
I just put SessionContext in this discussion because those are the contexts provided by errai, so that would be a helpful information.
Anyway, does errai have acess to the Message object just before invoking the RPC?
I assume it does, and so, it would be possible to store the Message object in a ThreadLocal.
Then from the RPC we can grab it, and access LocalContext and SessionContext.
Regards,
Vitor.
3. Re: SessionContext and LocalContext within RPCChristian Sadilek Feb 7, 2012 3:41 PM (in response to fvitorc)
There's currently no API you could use to get access to the message from within an RPC endpoint. Can you elaborate on the feature you want to implement? Maybe we can come up with an alternative.
4. Re: SessionContext and LocalContext within RPCfvitorc Feb 7, 2012 11:17 PM (in response to Christian Sadilek)
Ok, so the first thing that comes into my mind in this situation is to use a ThreadLocal. Let me try to show a simple and ugly way to do this.
As I've seen from the source code, RPCs are initiated from class ConversationalEndpointCallback, correct?
Let's add ThreadLocal to it:
private static ThreadLocal<Message> currentMessage = new ThreadLocal<Message>();
public static Message getCurrentMessage() {
return currentMessage.get();
}
and right before the createConversation(message) statement, in the beginning of the try block, place this statement:
try {
currentMessage.set(message);
createConversation(message)
....
and create a finally block to the above try block like this:
...
finally {
currentMessage.remove();
}
Now, in our RPC service, we access the current message object using ConversationEndpointCallback.getCurrentMessage();
It's ugly but it works. So let's make it look nice. We can use resource injection for that.
First, let's make getCurrentMessage() protected, so that only classes in the same package can access it.
protected static Message getCurrentMessage() {
return currentMessage.get();
}
Now, create an extension component in the same package as ConversationalEndpointCallback that will add bindings to a resource provider:
@ExtensionComponent
public class MessageAccessorExtension implements ErraiConfigExtension {
@Override
public void configure(ErraiConfig config) {
config.addBinding(Message.class, new ResourceProvider<Message>() {
@Override
public Message get() {
return ConversationalEndpointCallback.getCurrentMessage();
}
});
}
}
That's it. Now we add a provider to our RPC service and access the Message object through this provider:
@Service
public class MyServiceImpl implements MyService {
@Inject
private Provider<Message> message;
@Override
public void doYourWork() {
Message m = message.get();
}
}
It would also be possible to add more bindings to simplify access of commonly used objects in RPC services, like:
@Override
public LocalContext get() {
Message m = ConversationalEndpointCallback.getCurrentMessage();
return LocalContext.get(m);
}
@Override
public SessionContext get() {
Message m = ConversationalEndpointCallback.getCurrentMessage();
return SessionContext.get(m);
}
What do you think of this solution?
Regards,
Vitor.
5. Re: SessionContext and LocalContext within RPCChristian Sadilek Feb 8, 2012 11:35 AM (in response to fvitorc)
Nice! I think your solution would work. However, it seems there's an opportunity for us to provide a higher level abstraction for what you are trying to do. What is your exact use case for this? To identify the client? I am thinking we could make a provider for the context itself which could then be injected.
6. Re: SessionContext and LocalContext within RPCfvitorc Feb 8, 2012 12:21 PM (in response to Christian Sadilek)
Yes, I need to identify the client. What I need is a list of all users currently logged in, along with their respective queue id. There's no specific need for the Message object. But I know that with it I can get the LocalContext of the currently running RPC.
Think of it as chat application (it's a little more complex than a chat application, but it serves as an example). When a user logs in, I register that user as logged in along with his queue id in a application scoped variable. So, if user A wants to send a private message to user B, I get the user B from the application scoped variable along with his queue id. With his queue id, it's now possible to send a message directly to user B.
I can use my hack for the moment, but I am looking forward to see this feature in future releases.
I've recently opened up another discussion about detecting user presence, because I need to know when a queue has been started or finished. But I still have no response for that.
Regards,
Vitor. | https://community.jboss.org/message/715278?tstart=0 | CC-MAIN-2015-22 | refinedweb | 891 | 55.24 |
Today I’d like to talk about a few of the key changes we are planning in the Logging & Instrumentation Application Block which will be included in Enterprise Library for .NET 2.0. A lot of this will probably make more sense once we release the preview drop later in the month – but I’m going to go through this anyway so you know what to expect in the preview and so you can provide us with earlier feedback.
I’m sure the first question on everyone’s minds is how different the new version will be to the current one. A somewhat accurate but cryptic answer is that it will be very different while staying very similar. By this I mean that we are making some major changes to the internals of the block (for reasons described below), but the public API will remain largely unchanged. Probably the next question will be about the performance of the new block. However you’ll need to wait for an answer to this – the preview is still early code and so far we haven’t done enough testing or optimizing to get a good picture of this. Rest assured that we’ll be spending time on this later to ensure the performance is in improvement over the current block for the core scenarios.
So here are some of the main changes we are planning for the next release. Nothing is set in stone yet so if you have any comments about any this, let us know!
Alignment with System.Diagnostics
The System.Diagnostics namespace isn’t new, but before .NET 2.0 it only targeted some pretty narrow scenarios. However in .NET 2.0, there are a bunch of enhancements, most notably the TraceSource (which aggregates a bunch of TraceListeners into a named instance) and the CorrelationManager (which helps keep track of nested activities).
With all of this new stuff, you may be wondering whether we still need a Logging Block – well at least we wondered this. We determined that the block still provides a bunch of value – particularly in its ability to support strongly-typed events and formatted messages, simple configuration and good support for non-tracing scenarios such as operational events, audits and business events. Still, the new System.Diagnostics functionality provides a lot of useful plumbing pieces that we’ve been able to leverage in the block. Most significantly:
- Our Log Sinks will be changed to derive from TraceListener, but they will still support formatting and work in much the same way as the current sinks. This is cool as you will be able to use our Trace Listeners outside of Enterprise Library, and you can use system or third-party Trace Listeners with the block
- We’ll use TraceSources to aggregate the set of listeners that belong to a single category, and rely on the platform functionality to distribute messages to sinks
- Our Tracer class will make use of the CorrelationManager to start and stop activities. This will help align this behavior with other parts of the platform (such as support for the end-to-end tracing schema via the XmlWriterTraceListener).
These changes are pretty significant, but almost entirely under the covers. If you just use the block via the Logger and Tracer classes, you will not notice any significant changes. If you have built your own log sinks, you will need to modify them to derive from TraceListener (but most of the interesting code will remain the same).
Support for Multiple Categories
In the current version of the Logging block, each LogEntry can only be in one category. While this is OK for simple scenarios, many customers want to use categories across more than one dimension. For example, you may want to use categories to define the event type (audit, operational, diagnostic) as well as to describe which part of the application the event was raised (UI, Business, Data). There are no clean ways of doing this (Audit_UI, Audit_Business, …? Yuk!). And the problem was compounded by the Tracer class’s use of categories to indicate the current activities.
To provide some additional flexibility, we will allow a LogEntry to be in as many categories as you wish (yes, you can still choose only one if that’s all you need!). In the configuration file, you still specify where you want events to go on a per-category basis, and you can enable and disable categories the same way you can today.
So you could configure the block to say:
- Audit events get logged using the Database listener
- UI events get logged to a text file
If a single log entry is in both categories, it will go to both places. Simple!
Things get a little complicated when you consider how the Category Filters will work. Consider the following potential category filters:
- Allow all categories, except deny any events in the Audit category
- Deny all categories, except allow any events in the UI category.
Our code currently takes these statements as literally as possible. So if the first filter was set, and an event is in the UI and Audit categories, it would be denied (since it is in the Audit category). If the second filter was set, that event would be allowed, since it is in the UI category. We’d love to hear your thoughts on whether we’ve got this right.
Finally, we want to update the Tracer class so that any messages being logged in the context of an active trace session will automatically inherit the category specified for the trace. For example:
using (new Tracer("CheckoutCart"))
{
Logger.Write("My Message", "UI");
}
In this example, “CheckoutCart” is the category for the tracer (which the start and end messages would be sent to), and the nested Logger call sends a message to the “UI” category. However since that call is in the context of the CheckOutCart tracer, the CheckOutCart category would be implicitly added to that same message. If you had two nested Tracer blocks (most likely in different methods, of course), both categories would be added to any enclosed Logger calls. This will make it very easy to send all messages related to a particular category to a single place, which should be great for debugging.
Goodbye Distribution Strategies?
The last major change we are considering is the elimination of Distribution Strategies – at least in their current form. We still think the idea behind Distribution Strategies is pretty sound – which is that we wanted a way of configuring the block so that the distribution of log events can occur in some centralized place, distributing events from multiple processes. Out of the box we supply an MSMQ distribution strategy and associated Windows service, but we’ve heard of people using other techniques such as web services or MQSeries.
The basic architecture in the current Logging block looks like this:
Client code -> Logger Client -> Distribution Strategy -> Distributor -> Sinks
When the MSMQ Distribution Strategy is chosen, the block looks like this:
Client code -> Logger Client -> MSMQ Distribution Strategy -> (MSMQ Queue) -> MSMQ Distributor Service Listener -> Distributor -> Sinks
While the idea is sound, we’ve heard people say that the complexity of the design can outweigh its benefits, and that there are a few limitations to the design. For example, many people are confused as to why we have an MSMQ distribution strategy as well as an MSMQ sink. Also some people have wanted to process some events in-process and others in a remote process, which isn’t possible since all events must go through the same distribution strategy.
So our idea is to simplify things by eliminating distribution strategies, and to update the existing MSMQ sink (soon to become a trace listener) so that it works with our out-of-proc distributor service. That would make the architecture look like this:
Client code -> Log Writer -> MSMQ Trace Listener -> (MSMQ Queue) -> MSMQ Distributor Service Listener -> Log Writer -> Trace Listeners
In a nutshell, we would support the same scenarios by chaining instances of the block together through trace listeners, rather than have the separate distribution strategy concept. There are just a couple of other pieces we need to make this work. As mentioned above, the distribution strategies currently process all events, regardless of which category they are in. If you want to process all (or most) messages remotely, it shouldn’t be necessary to configure every single category on the client. To support this, we are thinking of supporting two special trace sources in configuration:
- If you configure a trace source called *, all events will be sent to it
- If you configure a trace source called %, all events that have not been processed by other trace sources will be sent to it.
For example, you could configure the block like this on the client:
- Category A -> Event Log
- Category B -> Text File
- % -> MSMQ Sink
This would process categories A and B locally, and send everything else to the MSMQ sink for remote distribution.
Or you could just do this:
- * -> MSMQ Sink
This would be equivalent with using an MSMQ Distribution Strategy in the current versions of Enterprise Library.
That’s all for now – sorry for the long post. Please let us know what you think about the proposed changed, and whether you have any other great ideas.
This posting is provided "AS IS" with no warranties, and confers no rights.
I recommend adding options for disabling the configuration watchers. They tend to cause major performance issues in a server environment.
I am sure everyone is getting anxious, and I am definitely getting excited. Tom covers what you…
[MAJOR RELEASE] WSCF 0.51 [Via:
Christian Weyer ]
Awesome security content for ASP.NET 2.0 — a bunch…
[MAJOR RELEASE] WSCF 0.51 [Via: Christian Weyer ]
Awesome security content for ASP.NET 2.0 — a bunch…
I think it would be cool if in code we could see if the Category is "enabled" so that we can avoid performance hits with string concatenation. So if the category is denied, then why both processing the string in the first place.
Thanks for the suggestion Adam. This is already in our plans.
Tom
Tom has posted some initial thoughts on how Logging for Enterprise Library 2.0 will look. My gut reaction…
Microsoft’s Data Access Block
Team Systems a la Rob CaronProject Management EditionTeam FoundationDomain…
Will the new TraceListener classes be able to write from several processes/appdomains into one log file as it is currently the case with the File Sink? The TraceListener has some Flush and Close methods in it. This could cause some problems when the last most interesting log entries are missing because nobody did call close. I propose some intelligent file naming pattern where for each component (dll) an extra log file could be used. E.g One File Sink could write to to many log files because we do want to have a file log with
3 Generations
20 MB Max Size for each Generation
4 Weeks Max Log File Age
For each component an extra log file e.g. as file name %ENVLOGPATH$ASSEMBLY_YourCompany.log where %ENVLOGPATH is an environment variable which is expanded at runtime and $ASSEMBLY is the assembly name which called the Log API. I could imagine some quite handy file name expansion variables.
%ENVLOGPATH Environment variables
$ASSEMBLY Assembly name from which the log originated
$APPDOMAIN_NAME
$PROCESS_NAME
$PROCESS_ID
$THREAD_NAME Yes threads can have names. If the names are not "" the different logs could provide some good overview who did what.
…
Last but not least there might exist an extended LogEntry object which internally has a ResourceManager object attached. Resource based messaged should be logged in different languages. The logging language should be for each sink configurable (There are only two useful languages anyway: Invariant Culture for the orignal English messages and the current thread culture otherwise). For chained sinks this one would be very usefull.
Hi Tom,
This question is not related to Enterprise Logging in .NET 2.0, but the current version. We are using the instrumentation block and have configured the same to write it into a queue. When we see the queue message, it is formatted as follows:
<String>
… other content, including our message
</String>
Now, how do we read this message from the queue? We tried an XML formatter, but we are not able to extract only the Message portion. The Q distributor seems to be doing some stuff, but we are not able to get the hang of it.
Also, our performance testing indicated that the Distribution strategy with MSMQ is very slow when compared to straight logging into MSMQ and then draining the Q ourselves. Any clues as to why this might be happening?
Thanks for your time.
Microsoft’s Data Access Block
Team Systems a la Rob CaronProject Management EditionTeam FoundationDomain…
I decided to create an EntLib 2.0 version of the Rolling File Sink. My extension is called the Rolling File Trace Listener. It allows log files to roll over based on both age and size limits. | https://blogs.msdn.microsoft.com/tomholl/2005/08/12/logging-in-enterprise-library-for-net-2-0/ | CC-MAIN-2018-47 | refinedweb | 2,173 | 59.03 |
I am currently binding a Treeview to an Entity Framework objectset, which is working just fine. However I would like to organize the nodes in the treeview differently.
For example, if I bind so the root nodes represent the Students collection and the leaf nodes are that student's Subjects collection, that is just fine, but can I change the arrangement so that there are two root nodes, say Male and Female students, according
to a property of the Student, and underneath those, the leaf nodes are say Bob, Dave, Steve under the Male root. And Jane, Sheila and Gertrude under the Female root?
In other words, instead of binding to Students and a collection belonging to Students, can I set up the treeview in such a way that the root nodes are manually specified, and the leaf nodes are under the correct root based on a property of the Students?
Thanks for any advice.
View Complete Post
Hi all,
I have a LinQtoSQL class which encapsulates a table with the following relationship:
Id (int)
Parent ID(int)
Name (string)
Here, the parent ID is the id of another row int he same table. So, the table could look like:
1, null, grandpa
2,1, mom
3,2,me
3,2,sis
What I want to do is the create a treeview that binds to the table so that it looks like this:
grandpa
mom
me
sis
Also, I should be able to add or delete nodes/rows...
Any ideas on how to do this? Is this even possible without writing the code to do all the population and the edit etc?
thanks,
Jas
Hi!
I want to achieve this:
through data binding. That is, I've got this collection of objects of the same class (currently stored in a ArrayList), and I want to display them in a treeview, so that when you expand them you can see the values of their attributes.
Is it possible to do it via DataBinding?
Hello All,
I am having a heck of a time trying to get a TreeView control bounded to a List which is a member of Class which is a member of the MainWindow. Here is a contrived example similar to what I am trying today. Can anyone help me bind so that the Server Names
show as Items in the TreeView. This would be a huge help.
Custom Classes:
using System;
using System.Collections.Generic;
using System.Linq;
using System.Text;
namespace SystemsManagement
{
public class ServerManager
{
public List<Server> Servers { get; private set; }
public ServerManager()
{
Servers = new List<Server>();
Servers.Add(new Server("Server1"));
Servers.Add(new Server("Server2"));
}
}
public class Server
{
pub>();
}
} =
Hall of Fame Twitter Terms of Service Privacy Policy Contact Us Archives Tell A Friend | http://www.dotnetspark.com/links/49704-nonstandard-treeview-binding.aspx | CC-MAIN-2017-30 | refinedweb | 460 | 69.82 |
Don’t like where a button is by default? Go ahead and move it. To speed up your workflow, add handy commands to a context menu. To reduce clutter, remove commands that you never use. Yes, customizing the UI can take a little while to get it just right, but doing so will provide you with a workspace that can boost your productivity.
I recorded a video (split in two parts) to demonstrate some of the different UI customizations that can be done in Visual Studio 2010. In Part 1, I demonstrate creating a new toolbar, adding/removing commands to/from a toolbar, changing toolbar dock locations. In Part 2, I show how to add a command to the Editor’s context menu.
Part 1:
Part 2:
When we switched over to the WPF shell, we had to re-implement much of the customization UI. Our priority was to include a customization experience that was accessible to all users (e.g. those who rely on screen readers). Unfortunately, the drag and drop interaction for customization that we has in previous versions of Visual Studio was expensive to re-write, and we weren’t able to include it. I’ve received a number of comments on this via bug reports through Microsoft Connect, and I want to reassure people that we will be exploring improvements in future releases.
Good stuff! It looks like the Add Command dialog would really benefit from some substring search or filtering instead of just type-ahead-find.
Hi Michael – thanks for the feedback! I agree that a search feature would improve the experience of adding commands. It’s not always clear what category a command is in, and there are so many commands available.
These are all good changes, especially the context menus are a lot.. less impossible to edit than they were (though the amount of them does make it rather cumbersome)
Another area that, at least for me, is used a lot more frequently and is rather awful to manage is the Keyboard page in the Options dialog.. There are just tons of unsorted items (the search there helps a lot), and only 4 per page.
If nothing else, making the Options dialog larger would have been really nice.
Still, good changes.. and merry christmas!
Thank you Daniel – Merry Christmas to you too! I’m glad to hear that the changes have made editing context menus simpler. (I agree that there are a lot of menu and commands to sort through as you try to locate a particular item. We need to look into improvements to that experience in the next release.)
As for your comments on the Options dialog, we have receieved several customer requests to make that dialog resizable. While we’re not able to make this change for Visual Studio 2010 (it actually involves coordination between many teams) it’s something that we will consider for the next release of Visual Studio.
The secornd vedio is really useful and saves time.
Small things but developers must know these things.
Really useful stuff based on usage
Hello, thanks for great videos.
Have some question.
I add macros to my toolbar. I cannot select an icon to represent the macro, can only rename the macro. How can i set an icon?
This functionality seems present in some form. If i load my VS2008 settings, the icon is there until i save as 2010 settings and load back again.
@Valamas: Unfortunately assigning or editing icons to commands through Customize dialog is not possible in VS2010. It is one of the features got cut for lack of time. This is however something we’ll consider adding back in next version.
Until then, you can still set icons on your commands by using an add-in, then accessing the command through DTE.
You can set CommandBarButton.Style to msoButtonIcon then set CommandBarButton.Picture with a stdole.IPicture. You can create IPicture objects using a helper class deriving from AxHost, e.g.
public class ImageHelper : System.Windows.Forms.AxHost
{
// private constructor, needed for extending AxHost
private ImageHelper (): base (null)
{
}
/// <summary>
/// Get an IPicture object from an Image.
/// </summary>
public static object GetIPictureFromImage (Image image)
{
return GetIPictureFromPicture(image);
}
};
(a similar sample code in VB is given here)
@Valamas
What version of the product are you trying this on? Beta2? RC? What do you mean ‘save as 2010 settings’ exactly? Shut down VS after import? Make further customizations to the same menu/toolbar and then shut down VS? Export Settings?
Ryan
@visualstudioblog: thanks for the response. It is not a tragedy; im using a single word as the command.
@Ryan : Im using RC1 and I have macros to save and load my settings (like Export Settings in options). That way, I can save my "template perspective" of the editor and the editor in attach mode… and be able to close and modify my layout as i need for more space etc, then at the click of the command, i load my template layout again.
I found that importing my current vs2008 settings and then saving and loading as vs2010 settings caused the file to grow massive, 40Megs massive. So i reset the to default vs2010 settings and started again. Now my file size is back under 300k and load and saves in normal time, unlike some 10 minutes at one stage.
Cheers, Valamas
Is there a way to modify an icon for a command?
Lots of commands do not have icons in 2010, even they had in 2008.
@Andy: Unfortunately, not for RTM. We are, however, working on an extension that should enable some of these customization scenarios. We’ll blog about it here when the extension is ready for release.
Weston Hutchins
Program Manager – VS Platform
Wow! Capability to create and modify icons was available in VS 2008, 2005, and if I remember also in 6.0 all the way to 2.0.
What is worse than the inability to create icons in 2010, is that many of the pre-existing ones are gone and only some long texts are the defaults.
I do not know about others, but for me it is v. unhandy to see my long-used favorite custom toolbars imported from prior versions are rather practically useless.
"Visual" is everything these days. 🙂
I completely agree with Andy Hoffman. Having no way to display icons for many toolbar items makes them often useless. The texts in the toolbars take up much too much space.
I have been using the "C" IDEs since Visual C/C++ 1.0. I like the setup that I use. I have been refining it since since Visual C/C++ 6.
The very first thing I do when I load a new compiler is setup all of the toolbars the way I like them. This includes adding all of the compile/run/debug commands so they are always visible, on the same toolbar, and make sure that that toolbar is always in the same place. Why because I like it that way.
In Visual Studio 2008 it takes about 10 minutes to get things setup the way I like. In Visual Studio it will take 3-4 hours.
Something that would speed things up a lot that could be done easily is when you are adding a command to remember where you are. So when you add the next command, you don’t have to re-find your location.
Also, when you are reordering the commands on a toolbar, it would not be that hard to implement drag and drop within the list control instead of replying on the "Move up" and "Move down" buttons.
I consider the current implementation of the customization dialog just this side of a DOS application. I can’t help but wonder what Microsoft was thinking when they created it.
Ed, you can export your settings from VS 2008 and import them into VS 2010. That includes command bar customizations.
Add my voice to the chorus of dismay that Microsoft has removed the ability to easily set an icon to a toolbar button. I strongly encourage you to restore this capability with the next SP!
The toolbar customization feature is essential to efficient work. Just like others, I used the same toolbar layout since about 2002-2003. This feature must be put back in the first service pack, on the double.
Plus, the people that made the decision to leave this feature out should be promptly fired. Lately Microsoft is projecting an image of total, utter incompetence, in large part thanks to the droids that design / work on product user interfaces.
>Plus, the people that made the decision to leave this feature out should be promptly fired.
As the person that 'should be fired' I feel I should respond. The choice to leave out some customization functionality was extremely difficult and was not made lightly. In the end decisions come down to time and resource availability. We made a massive move in 2010 from a Win32 based UI (shell and command system) to one based solely on WPF. To add to that a significant portion of the underlying shell and commanding mechanism is still written in native C++. To that end it was far from trivial to 'make the move', and even getting back to the state of customization we have in RTM was a ton of work. To act like we just 'chose' to leave it out (why? For fun?) is not accurate, but as a user who apparently used it frequently I understand the frustration and apologize. We do support import of customizations from previous versions, does this not work in your situation? Did you want to redo all your customizations you made in 2008 in 2010 by hand?
>Lately Microsoft is projecting an image of total, utter incompetence, in large part thanks to the droids that design / work on product user interfaces.
I appreciate the feedback, and everyone is welcome to their own opinons, but the people that work on our UI (designers, QA, developers, writers, etc..) are very hard working, competent people (with the exception of myself perhaps). Feedback is always appreciated, though I don't know if abusive feedback is all that effective if your goal is to affect actual change.
Ryan
Ryan,
By even responding to this kind of remark you lend them merit. Microsoft provides some of the best (if not THE best) development tools in the world, the Visual Studio IDE included. Most of us know that, and also know that there are ALWAYS trade-offs to be made between perfection and practicality. Why acknowledge people that take that much time and energy just to be rude?
If there are objective remarks in there, take them to heart, but ignore these guys and do something productive with your time and energy.
My two cents.
Thanks, Eric. I always try to respond to any blog feedback we get, mainly because Microsoft in general has a reputation of being aloof and unconcerned with customer feedback. Some of the reputation is warranted, some isn't, but such is life. I hope this blog can be a place where users can come to read about what we are doing, voice concerns/complaints/feedback and generally be a direct conduit between our users and the various VS teams that call this home (since it can be hard to have such a conduit for us otherwise). That said I would hope the general level of conversation could remain adult and reality based. We don't do things based on incompetence or callousness, rather it is likely just the common fact that life is generally a series of trade-offs. Rarely do any of us have the time and energy to do everything we may want to, but we really do try to do the things we think best. If you think we made the wrong call by all means bring it up, explain your position / usage pattern, perhaps it is one we hadn't thought of. However, if you come and say 'you guys are the suckzorz!' there isn't much we can do with that 🙂
Ryan
I too have a completely customized set of VS toolbars that I have used for years. I too find that you have broken them all. Yes, VS2010 imported my VS2008 settings, but it changed the sizes of the combo boxes, making them absurdly wide. And in the new GUI I cannot change them. I like to set short text strings instead of icons on most of my buttons: now I can't change those either. As those above have described, the entire customability of the menus and toolbars have been removed. I am _extremely_ pissed.
I have questions for you: If WPF is so inflexible and difficult to program that you cannot implement your own successful GUI design in your own flagship app for programmers, why the hell did you use it? Do you seriously think this is how to evangelize its use to the people who build the apps that bind your customers to your platform?
You have resoundingly confirmed my existing suspicion that WPF is worse than useless. I work on the server side, but have had indirect experience with WPF. We have (or had) a rather trivial app (a glorified chat client, really) which was ugly but functional. We turned it over to a lightweight programmer for enhancement. He, seduced by your WPF marketing circa VS2008, decided that the wave of the future was to reimplement the GUI with WPF. He spent several months screwing around with toolbars and fonts and XML layout, and produced an unstable mess that cannot paint its own windows correctly in finite time. Our users are now migrating back to AIM and Trillium.
Granting the inexperience of our developer, I was willing to give WPF some benefit of doubt for awhile. But if the VS dev team can't do what they need to do with WPF, who can? I figure WPF poured about $100K of my budget down a rathole. I promise you, there will be no further experiments with it in this shop. If you desupport Windows.Forms, you will lose our desktop apps with it.
OK, so much for your GUI: now comes the serious part. I am about to port several heavyweight, highly successful, .NET implemented, realtime trading system servers to .NET4.0 using VS2010. I am branching first (in Subversion, natch: your revision control systems are all also useless, and I _do_ have direct experience with them). If I encounter any more half-baked half-finished nonsense, I will dump it and move all our servers to Mono and Linux. Now is the time: before I become dependent on .NET 4 language features. I have the ability and the authority to do it. And I am damned tired of rebooting Windows.
If, by chance, you would like to discuss the above, I am willing. Just give me some way to give you my email address without posting it publicly on the Web.
@Karl: > And in the new GUI I cannot change them [sizes of comboboxes]. I like to set short text strings instead of icons on most of my buttons: now I can't change those either.
I don't know exactly how you tried to do these, but both the above should be possible in VS10.
E.g. To make toolbar buttons display text only – in Tools/Customize dialog, select Commands tab, select the Standard toolbar in the toolbars combo, select one of the buttons in the toobar, click Modify Selection button, and pick "Text only (Always)" style. You can also rename the button's text by editing the Name in the same context menu and type a shorter text.
If you select a combobox in the Controls list then drop the ModifySelection menu you'll also have another menu item there which allows you to change the Width of the combobox.
Granted, it's not as easier as it was in VS2008, but it should be possible to do these customizations; we hope to make things easier in Dev11.
> Yes, VS2010 imported my VS2008 settings, but it changed the sizes of the combo boxes, making them absurdly wide.
I tried an import of VS settings where I customized previously the size of comboboxes and I was not able to reproduce the problem. Can you please open a bug on connect.microsoft.com/visualstudio and attach one of the vssettings files that made VS10 to incorrectly import the comboboxes sizes?
Thank you,
Alin Constantin [VS Shell development]
@Karl Botts,
Thank you, Karl, for your candid feedback.
To ensure your feedback and bug reports reach the right people, please submit your feedback through the Connect site, connect.microsoft.com/VisualStudio or by selecting "Report a Bug" from the Help menu within Visual Studio 2010.
In addition to bugs reports, you may use Connect for suggestions and feature requests, but please ensure your feedback is actionable and not just emotional. Your opinion counts and a well-thought out and balanced business justification for your decisions counts even more.
If you still can't get what you need from Connect, then please contact me directly at Paul.Harrington@microsoft.com
Thank you,
Paul Harrington
It's sad that the drag-and-drop features are gone, but I could have lived with that as long as the options would still be available in some other way. Unfortunately, that is not the case. What bothers me (and many others, it seems) most is that the abaility to set custom icons for macros etc. is now gone. Please bring it back!
@Anders: > "What bothers me (and many others, it seems) most is that the abaility to set custom icons for macros etc. is now gone. Please bring it back!"
We will be looking into having this functionality back in Dev11. Meanwhile, try the nice extension done by Ryan that adds this functionality for Dev10: blogs.msdn.com/…/command-image-changing-extension.aspx
Alin
I stumbled upon this blog while searching the internet for information how to implement such functionality in WPF, I hoped it was built in somewhere in WPF (like it was in Delphi), but unfortunately there is no such framework, so any chances of you open sourcing this part of Visual Studio (Toolbar building framework ? or something like this ?), or maybe just writing a blog entry about how you did it? (no need for others to reinvent the wheel). Thanks.
Did you also not have enough time to make it so it remembers new button groups (seperators) ?
<body>
<p>Odd things are happening to Brits… we seem to be developing green fingers!<br />
The number of <a href="">christian louboutin</a> growing their own fruit and veg has almost doubled in the past year, according to Gardeners' World magazine.<br />
Gardens and allotments across the UK have been put <a href=" to use as people discover the joys of <a href=" Louboutin Sale</a> home-grown produce.<br />
But not everyone has space for <a href="">christian louboutin shoes</a> a vegetable patch or a flowerbed. And sometimes a window box just isn't enough of a gardening challenge.<br />
That's why some people have been turning to guerrilla gardening. This is when people plant <a href=" shoes</a> flowers or vegetables in public spaces to make them greener and morepleasing to the eye.<br />
Many people would approve of <a href=" uk</a> prettifying towns and cities, but guerrilla gardening is not strictly legal. Therefore, this type of <a href=" louboutin uk</a> gardening often takes place in the dead of night.</p>
</body>
I see "future release" didn't mean Visual Studio 2012. WTF? | https://blogs.msdn.microsoft.com/visualstudio/2009/12/14/customizing-visual-studio-2010/ | CC-MAIN-2016-50 | refinedweb | 3,290 | 72.26 |
The Swing components have provided an easy approach to the idea of objects, but there comes a time when you have to find out how to create your own. In this part of Modern Java, we look at the standard ideas of object-oriented programming.
We have encountered objects in Java in earlier chapters. When you drag a button onto a form you are working with a Java object. However, a lot of the work is done for you by the NetBeans IDE. When it comes to creating and working with your own objects you can't expect the same sort of support.
In particular, we have to make the distinction between a class and an object. A class is a like a recipe or a blue print for an object. Consider the button that sits in the Netbean's toolbox. This isn't actually a button but a template for a button that you can use to stamp out real buttons. You can think of the button in the toolbar as being a button class and the real buttons that it can create are objects or instances of the class.
We need to learn some jargon.
A class is a specification for an object but it isn't an object.
Using a class to create an object is described as creating and instance of the class.
The act of creating an object from a class is called instantiation.
You also need to know that while buttons and similar are good examples of class and object not all classes and objects have a visual representation. Not all objects are user interface components. So while it helps to think about user interface components when you are learning about class and object things aren't 100% the same.
One big difference is that to create our own objects we first have to create our own class. So let's see how this works.
A class definition looks a lot like the sort of Java code we have been writing up to this point. This is a good thing because it looks familiar but it is also a bad thing because you need to keep in mind that you can't acutely run the code in a class unless you first create an instance of it.
That is a class definition is a template for a chunk of program. It can include variables and functions but when you write it the program doesn’t actually exist anywhere all you have is a recipe for making the program when you want to.
For example, if you write a simple class called Point which is going to be used in our programs to represent a 2D point with an x and y co-ordinate. That is a point object is going to store two numbers representing x and y as properties of the object, its class definition would be -
public class Point { public int x; public int y; }
Don’t worry for the moment about the use of public, all this means is that class and variables are accessible from outside of the class.
Concentrate on the fact that what you have defined here is a template that can be used to “stamp out” multiple copies of this code object.
At the moment there is no variable called x and no variable called y allocated in memory waiting for you to use them. To make something happen you have to take the class definition and use it to create an example, or an "instance", of the class or an object.
Unfortunately in Java creating an object is a bit more complicated than creating a simple variable but the process is more or less the same once you have untangled it. Firstly you need a variable of the right type to store the new object. This you create just as you would any other variable. For example,
Point Current;
declares a variable called Current suitable for storing a point object i.e an instance of the Point class.
Compare this with
int x;
which declares a variable suitable for storing an integer.
After the variable has been declared it doesn’t actually contain an example of the class - just in the same way x doesn't contain an particular integer. It’s just ready and waiting to store a new class and the keyword “new” is exactly how you go about making an instance of the class.
For example
Current=new Point();
creates an instance of the class and stores it in Current
We have already met properties as part of our look at Swing components but there is a more basic form of property that we need to master first.
We have just created an instance of the Point class. Now there are two integer variables, called x and y, waiting for you to store data in them but you don’t refer to them just as x and y. To gain access to any of the components or “members” of an instance of a class you have to specify the particular instance name as well as the member name.
Put more directly to store something in x you would write
Current.x=10;
In general when you create an instance called myobject you refer to any of its members using a fully qualified name:
myobject.myproperty
If you are wondering why it isn't
Point.x=10;
then you need to remember that it is the instances you create from the Point class that are objects you can work with. Point is simply a template that you can use to create Point objects. | http://i-programmer.info/ebooks/modern-java/4569-java-working-with-class.html | CC-MAIN-2015-48 | refinedweb | 939 | 68.2 |
14-12 describes the various repository
locator types and their respective access methods.
Method
Locator Format
Description
Local
path
If the repository directory is local to the computer from which you
will access it (or appears local, such as an NFS or Samba mounted
filesystem), the repository string is just the pathname of the
repository directory, such as /usr/local/cvsrep.
External
:ext:user@host:path
External repositories are accessed via a remote shell utility, usually
rsh (the default) or ssh. The
environment variable $CVS_RSH is used to specify
the remote shell program.
Password server
:pserver:user@host:path
Password server repositories require authentication to a user account
before allowing use of the repository. Public CVS servers are commonly
configured this way so they can provide anonymous CVS access. See
Section 14.3.3.11, "The passwd file", earlier in this chapter, for more information on
anonymous CVS.
GSS-API server
:gserver:
This locator type is used for servers accessible via Kerberos 5 or
other authentication mechanisms supported by
GSS-API.
Kerberos server
:kserver:
This locator type is used for servers accessible via Kerberos 4.
CVS's behavior can be influenced by two classes of settings other than
the
command-line arguments: the environment
variables (see Table 14-13) and
special files (see Table 14-14).
Variable
$COMSPEC
Command interpreter on OS/2, if not cmd.exe.
$CVS_CLIENT_LOG
Client-side debugging file specification for client/server connections.
$CVS_CLIENT_LOG is the basename for the
$CVS_CLIENT_LOG.in and
$CVS_CLIENT_LOG.out files, which will be
written in the current working directory at the time a command is
executed.
$CVS_CLIENT_PORT
$CVS_IGNORE_REMOTE_ROOT
The port number for :kserver: locators.
$CVS_CLIENT_PORT doesn't need to be set
if the kserver is listening on
port 1999 (the default).
According to the ChangeLog, this
variable was removed from CVS with Version 1.10.3.
$CVS_PASSFILE
Password file for :PSERVER: locators. This variable
must be set before issuing the cvs login to have the
desired effect. Defaults to $HOME/.cvspass.
$CVS_RCMD_PORT
For non-Unix clients, the port for connecting to the server's
rcmd daemon.
$CVS_RSH
Remote shell for :ext: locators, if not
rsh.
$CVS_SERVER
Remote server program for :ext: locators,
if not cvs.
$CVS_SERVER_SLEEP
Server-side execution delay (in seconds) to allow time to attach a
debugger.
$CVSEDITOR
Editor used for log messages; overrides $EDITOR.
$CVSIGNORE
A list of filename patterns to ignore, separated by white space. (See
also cvsignore in
Table 14-4 and
.cvsignore in
Table 14-14.)
$CVSREAD
Determines read-only (if the variable is set) or read/write (if the
variable is not set) for checkout and
update.
$CVSROOT
Default repository locator.
$CVSUMASK
Used to determine permissions for (local) repository files.
$CVSWRAPPERS
A list of filename patterns for the cvswrappers
function. See also Section 14.3.3, "Repository Structure".
$EDITOR
Specifies the editor to use for log messages; see notes for
$CVSEDITOR earlier in this table.
On Unix, used to find the .cvsrc file.
$HOMEDRIVE
On Windows NT, used to find the .cvsrc file.
$HOMEPATH
$PATH
Used to locate programs to run.
$RCSBIN
Used to locate RCS programs to run. This variable is obsolete.
$TEMP
$TMP
$TMPDIR
Location for temporary files. $TMPDIR
is used by the server. On Unix, /tmp (and TMP on
Windows NT) may not be overridden for some functions of CVS due to
reliance on the system's tmpnam() function.
Despite the similarity in names, the $CVSROOT
environment variable and the
CVSROOT directory
in a repository are not related to each other.
The "RSH" in the name of the $CVS_RSH environment
variable doesn't refer to the particular program
(rsh), but rather to the program CVS is supposed to
use for creating remote shell connections (which could be some program
other than rsh, such as ssh).
Since there is only one way to specify the remote shell program to use
($CVS_RSH), and since this is a global setting,
users that commonly access multiple repositories may need to pay close
attention to which repository they are using. If one repository
requires one setting of this variable and another requires a different
setting, then you will have to change this variable between accesses
to repositories requiring different settings. This aspect of the
repository access method is not stored in the
CVS/Root file in the sandbox (see Section 14.4.4.3, "CVS directories", later in this chapter). For
example, if you access some repositories via rsh
and some via ssh, then you can create the following
two utility aliases (bash syntax):
user@localhost$ alias cvs="export CVS_RSH=ssh; cvs"
user@localhost$ alias cvr="export CVS_RSH=rsh; cvs"
Table 14-14 shows the files used by the CVS
command-line client for server connection and client configuration
information. These files reside in the user's home directory.
Option
~/.cvsignore
Filename patterns of files to ignore
~/.cvspass
Passwords cached by cvs login
~/.cvsrc
Default command options
~/.cvswrappers
User-specific checkout and commit
filters
The ~/.cvspass file is really an operational file,
not a configuration file. It is used by the cvs
client program to store the repository user account password between
cvs login and cvs logoff.
Some common .cvsrc settings are:
Brings in new directories and prunes empty directories on
cvs update.
Give output in context diff format.
In order to use CVS, you must create a sandbox or have one created for
you. This section describes sandbox creation, assuming there is
already a module in the repository you want to work with. See Section 14.4.7.11, "import" for information
on importing a new module into the repository.
Determine the repository locator. Talk to the repository administrator
if you need help finding the repository or getting the locator syntax
right.
If this will be the main repository you use, set
$CVSROOT; otherwise, use the -d option
when running CVS commands that don't infer the repository from the sandbox
files.
Pick a module to check out.
Pick a sandbox location, and cd to the parent directory.
If the repository requires login, do cvs login.
Run cvs checkout module.
For example:
export CVSROOT=/usr/local/cvsroot
cd ~/work
cvs checkout hello
This section describes the files and directories that may be encountered
in sandboxes.
Sandboxes may contain .cvsignore files. These files
specify filename patterns for files that may exist in the sandbox but
which normally won't be checked into CVS. This is commonly used to cause
CVS to bypass derived files.
Sandboxes may contain .cvswrappers files, which
provide directory-specific file handling information like that in the
repository configuration file cvswrappers (see
Section 14.3.3.6, "The cvswrappers file", earlier in this chapter).
Each directory in a sandbox contains a CVS directory.
The files in this directory (see Table 14-15)
contain metadata used by CVS to locate the repository and track which file
versions have been copied into the sandbox.
File
Base
Baserev
Baserev.tmp
The Base directory stores
copies of files when the edit command is in use.
The Baserev file contains the revision numbers
of the files in Base. The
Baserev.tmp file is used in updating the
Baserev file.
Checkin.prog
Update.prog
The programs specified in the modules file for options
-i and -u, respectively (if any).
Entries
Version numbers and timestamps for the files as they were copied
from the repository when checked out or updated.
Entries.Backup
Entries.Log
Entries.Static
These are temporary and intermediate files used by CVS.
Notify
Notify.tmp
These are temporary files used by CVS for dealing with notifications
for commands like edit and unedit.
Repository
The name by which the directory is known in the repository.
Root
The repository locator in effect when the sandbox was created (via
cvs checkout).
Tag
Information about sticky tags and dates for files in the directory.
Template
Used to store the contents of the rcsinfo
administrative file from the repository for remote repositories.
Since each sandbox directory has one CVS/Root file,
a sandbox directory corresponds to exactly one repository. You cannot
check out some files from one repository and some from another into a
single sandbox directory.
Table 14-16 lists the global options that
control the operation of the CVS client program.
-a
Authenticate (gserver only).
-d root
Locate the repository. Overrides the setting of
$CVSROOT.
-e editor
Specify message editor. Overrides the settings of
$CVSEDITOR and $EDITOR.
-f
Don't read ~/.cvsrc. Useful when you have
.cvsrc settings that you want to forgo for a
particular command.
-H [command]
--help [command]
Display help. If no command is specified, general CVS help,
including a list of other help options, is displayed.
-l
Don't log command in history.
-n
Don't change any files. Useful when you want to know ahead
of time which files will be affected by a particular command.
-q
Be quiet.
-Q
Be very quiet. Print messages only for serious problems.
-r
Make new working files read-only.
-s variable=value
Set the value of a user variable to a given value. User variables can
be used in the contents of administrative files.
-t
Trace execution. Helpful in debugging remote repository connection
problems and, in conjunction with -n, in determining
the effect of an unfamiliar command.
-w
Make new working files read/write. Overrides $CVSREAD.
Files are read/write unless $CVSREAD is set or
-r is specified.
-x
Encrypt. (Introduced in Version 1.10.)
-z gzip_level
Set the compression level. Useful when using CVS in client/server
mode across slow connections.
Table 14-17 and Table 14-18 describe the options that are common
to many CVS commands. Table 14-17 lists
the common options with a description of their function, while Table 14-18 lists which options can be used with
the user commands. In the sections that follow, details will be
provided only for options that are not listed here and for those that
do not function as described here.
-D date
Use the most recent revision no later than date.
For commands that involve tags (via -r) or dates
(via -D), include files not tagged with the specified
tag or not present on the specified date. The most
recent revision will be included.
-k kflag
Determine how keyword substitution will be performed. The space between
-k and kflag is
optional. See Table 14-19 for the
list of keyword substitution modes.
Do not recurse into subdirectories.
Don't run module programs.
-R
Do recurse into subdirectories (the default).
-r rev
Use a particular revision number or symbolic tag.
Table 14-18 shows which common options are
applicable to each user command.
User Command
-D
-f
-k
-l
-n
-R
-r
add
annotate
commit
diff
edit
editors
export
history
import
log
rdiff
release
remove
rtag
status
tag
unedit
update
watch
watchers
CVS can understand dates in a wide variety of formats, including:
The preferred format is YYYY-MM-DD HH:MM, which would
read as 2000-05-17, or
2000-05-17 22:00. The technical details of the format
are defined in the ISO 8601 standard.
17 May 2000. The technical details of the format
are defined in the RFC 822 and RFC 1123 standards.
10 days ago, 4 years ago.
month/day/year.
This form can cause confusion because not all cultures use the first
two fields in this order (1/2/2000 would
be ambiguous).
Other formats are accepted, including YYYY/MM/DD
and those omitting the year (which is assumed to be the current year).
Table 14-19 describes the keyword
substitution modes that can be selected with the
-k option. CVS uses keyword substitutions to insert revision information into files when they are checked
out or updated.
Mode
b
Binary mode. Treat the file the same as with mode o,
but also avoid newline conversion.
k
Keyword-only mode. Flatten all keywords to just the keyword name. Use
this mode if you want to compare two revisions of a file without seeing
the keyword substitution differences.
kv
Keyword-value mode. The keyword and the corresponding value are
substituted. This is the default mode.
kvl
Keyword-value-locker mode. This mode is the same as kv
mode, except it always adds the lock holder's user ID if the revision is
locked. The lock is obtained via the cvs admin -l
command.
o
Old-contents mode. Use the keyword values as they appear in the repository
rather than generate new values.
v
Value-only mode. Substitute the value of each keyword for the entire
keyword field, omitting even the $
delimiters. This mode destroys the field in the process, so use it
cautiously.
Keyword substitution fields are strings of the form
$Keyword ...$.
The valid keywords are:
The user ID of the person who committed the revision.
The date and time (in standard UTC format) the revision was committed.
The full path of the repository RCS file, the revision number, the commit
date, time, and user ID, the file's state, and the lock holder's user ID if
the file is locked.
A shorter form of Header, omitting the leading directory
name(s) from the RCS file's path, leaving only the filename.
The tag name used to retrieve the file, or empty if the no explicit
tag was given when the file was retrieved.
The user ID of the user holding a lock on the file, or empty if the file
is not locked.
The RCS filename. In addition to keyword expansion in the keyword field,
each commit adds additional lines in the file immediately
following the line containing this keyword. The first such line contains
the revision number, the commit date, time, and user ID. Subsequent lines
are the contents of the commit log message. The result over time is a
reverse-chronological list of log entries for the file. Each of the
additional lines is preceded by the same characters that precede the
keyword field on its line. This allows the log information to be formatted
in a comment for most languages. For example:
#
# ch14_04.htm
#
# $Log: ch14_04.htm,v $
# Revision 1.3 2001/06/22 16:14:09 ellie
# replaced grave entity w/literal backtic
#
# Revision 1.2 2001/06/18 18:28:37 ellie
# regenerated after xslt fixes
#
# Revision 1.1 2000/06/09 18:07:51 ellie
# Fixed the last remaining bug in the system.
#
Be sure that you don't place any keyword fields in your log messages if you
use this keyword, since they will get expanded if you do.
The name of the RCS file (without any leading directories).
The revision number of the file.
The full path of the RCS file.
The file's state, as assigned by cvs admin -s
(if you don't set the state explicitly, it will be Exp
by default).
The CVS client program provides the user commands defined in
Table 14-20.
Command
ad
add
new
Indicate that files/directories should be added to the repository.
ann
annotate
Display contents of the head revision of a file, annotated with
the revision number, user, and date of the last change for each line.
co
get
Create a sandbox for a module.
ci
com
commit
Commit changes from the sandbox back to the repository.
di
dif
diff
View differences between file versions.
edit
Prepare to edit files. This is used for enhanced developer coordination.
editors
Display a list of users working on the files. This is used for enhanced
developer coordination.
ex
exp
export
Retrieve a module, but don't make the result a sandbox.
Get help.
hi
his
history
Display the log information for files.
im
imp
import
Import new modules into the repository.
lgn
logon
Log in to (cache the password for) a remote CVS server.
lo
log
rlog
Show the activity log for the file(s).
Log off from (flush the password for) a remote CVS server.
pa
patch
rdiff
Release diff. The output is the format of input to
Larry Wall's patch command. Does not have to be
run from within a sandbox.
re
rel
release
p
Perform a logged delete on a sandbox.
remove
rm
delete
Remove a file or directory from the repository.
rt
rtag
rfreeze
Tag a particular revision.
st
stat
status
Show detailed status for files.
ta
tag
freeze
Attach a tag to files in the repository.
unedit
Abandon file modifications and make read-only again.
up
upd
update
Synchronize sandbox to repository.
watch
Manage the watch settings. This is used for enhanced developer
coordination.
watchers
Display the list of users watching for changes to the files. This is
used for enhanced developer coordination.
add
[ -k kflag ]
[ -m message ]
file ...
Indicate that files/directories should be added to the repository. They are not
actually added until they are committed via cvs commit.
This command is also used to resurrect files that have been deleted with
cvs remove.
The standard meaning of the common client option -k
applies. There is only one additional option that can be used with the
add command:
-m message. This option is
used to provide a description of the file (which appears in the output
of the log command).
annotate
[ [ -D date | -r rev ] -f ]
[ -l | -R ]
file ...
CVS prints a report showing each line of the specified file. Each line
is prefixed by information about the most recent change to the line,
including the revision number, the user, and the date. If no revision
is specified, then the head of the trunk is used.
The standard meanings of the common client options
-D, -f,
-l, -r, and
-R apply.
[ -A ]
[ -c | -s ]
[ -d dir [ -N ] ]
[ [ -D date | -r rev ] -f ]
[ -j rev1 [ -j rev2 ] ]
[ -k kflag ]
[ -l | -R ]
[ -n ]
[ -p ]
[ -P ]
module ...
Copy files from the repository to the sandbox.
The standard meanings of the common client options
-D, -f,
-k, -l,
-r, and -R apply.
Additional options are listed in Table 14-21.
-A
Reset any sticky tags or dates.
-c
Copy the module file to standard output.
-d dir
Override the default directory name.
-j rev
Join branches together.
-N
Don't shorten module paths.
-p
Pipe the files to standard output, with header lines between them
showing the filename, RCS filename, and version.
-P
Prune empty directories.
-s
Show status for each module from the modules file.
commit
[ -f | [ -l | -R ] ]
[ -F file | -m message ]
[ -n ]
[ -r revision ]
[ files ... ]
Commit the changes made to files in the sandbox to the repository.
The standard meanings of the common client options
-l, -n,
-r, and -R apply.
Additional options are listed in Table 14-22.
Force commit, even if no changes were made.
-F file
Use the contents of the file as the message.
-m message
Use the message specified.
Use of the -r option causes the revision to be
sticky, requiring the use of admin -A to
continue to use the sandbox.
diff
[ -k kflag ]
[ -l | -R ]
[ format ]
[ [ -r rev1 | -D date1 ] [ -r rev2 | -D date2 ] ]
[ file ... ]
The diff command compares two versions of a file and
displays the differences in a format determined by the options.
By default, the sandbox version of the file will be compared to
the repository version it was originally copied from.
The standard meanings of the common client options
-D, -k,
-l, -r, and
-R apply. All options for the
diff command in Chapter 3, "Linux Commands" can also be used.
edit
[ -a action ]
[ -l | -R ]
[ file ... ]
The edit command is used in conjunction with
watch to permit a more coordinated (serialized)
development process. It makes the file writable and sends out an
advisory to any users who have requested them. A temporary
watch is established and will be removed
automatically when either the unedit or the
commit command is issued.
The standard meanings of the common client options
-l and -R apply. There
is only one additional option that can be used with the
edit command: -a
actions. This option is used to specify the
actions to watch. The legal values for actions are described in the
entry for the watch command.
editors
[ -l | -R ]
[ file ... ]
Display a list of users working on the files specified. This is
determined by checking which users have run the edit
command on those files. If the edit command has not been
used, no results will be displayed.
The standard meanings of the common client options
-l and -R apply.
See also the later section on watch.
export
[ -d dir [ -N ] ]
[ -D date | -r rev ]
[ -f ]
[ -k kflag ]
[ -l | -R ]
[ -n ]
[ -P ]
module ...
Export files from the repository, much like the checkout
command, except that the result is not a sandbox (i.e.,
CVS subdirectories are not created). This can be
used to prepare a directory for distribution. For example:
user@localhost$ cvs export -r foo-1_0 -d foo-1.0 foo
user@localhost$ tar czf foo-1.0.tar.gz foo-1.0
The standard meanings of the common client options
-D, -f,
-k, -l,
-n, -r, and
-R apply. Additional options are listed in
Table 14-23.
Option
Description
-d dir
Use dir as the directory name
instead of using the module name.
Don't run any checkout programs.
-N
Don't shorten paths.
When checking out a single file located one or more directories down in a
module's directory structure, the -N option can be used
with -d to prevent the creation of intermediate directories.
Display helpful information about using the cvs program.
history
[ -a | -u user ]
[ -b string ]
[ -c ]
[ -D date ]
[ -e | -x type ]
[ -f file | -m module | -n module | -p repository ]...
[ -l ]
[ -o ]
[ -r rev ]
[ -t tag ]
[ -T ]
[ -w ]
[ -z zone ]
[ file ... ]
Display historical information. To use the history
command, you must first set up the history file
in the repository. See Section 14.3.3, "Repository Structure" for more information on this file.
NOTE
When used with the history command, the functions
of -f, -l,
-n, and -p are not the
same as elsewhere in CVS.
When used with the history command, the functions
of -f, -l,
-n, and -p are not the
same as elsewhere in CVS.
The standard meanings of the common client options
-D, and -r
apply. History is reported for activity subsequent to the date or
revision indicated. Additional options are listed in Table 14-24.
Show history for all users (default is current user).
-b str
Show history back to the first record containing str
in the module name, filename, or repository path.
Report each commit.
-e
Report everything.
-f file
Show the most recent event for file.
Show last event only.
-m module
Produce a full report on module.
-n module
Report the last event for module.
-o
Report on modules that have been checked out.
-p repository
Show history for a particular repository directory.
-t tag
Show history since the tag tag was last added
to the history file.
-T
Report on all tags.
-u name
Show history for a particular user.
Show history only for the current working directory.
-w zone
Display times according to the time zone zone.
-x type
Report on specific types of activity. See Table 14-25.
The -p option should limit the
history report to entries for the directory or
directories (if multiple -p options are
specified) given, but as of Version 1.10.8, it doesn't seem to affect
the output. For example, to report history for the
CVSROOT and hello modules,
run the command:
cvs history -p CVSROOT -p hello
Using -t is faster than using
-r because it only needs to search through the
history file, not all of the RCS files.
The record types shown in Table 14-25 are generated by
update commands.
Type
Description
C
Merge was necessary, but conflicts requiring manual intervention
occurred.
G
Successful automatic merge.
U
Working file copied from repository.
W
Working copy deleted.
The record types shown in Table 14-26 are generated by
commit commands:
A
Added for the first time
M
Modified
R
Removed
Each of the record types shown in Table 14-27 is generated by a different
command.
Command
E
export
F
release
O
T
rtag
import
[ -b branch ]
[ -d ]
[ -I pattern ]
[ -k kflag ]
[ -m message ]
[ -W spec ]
module
vendor_tag
release_tag ...
Import an entire directory into the repository as a new module. Used to
incorporate code from outside sources or other code that was initially
created outside the control of the CVS repository. More than one
release_tag may be specified, in which case multiple
symbolic tags will be created for the initial revision.
The standard meaning of the common client option
-k applies. Additional options are listed in
Table 14-28.
-b branch
Import to a vendor branch.
-d
Use the modification date and time of the file instead of the current date
and time as the import date and time. For local repository locators only.
-I pattern
Filename patterns for files to ignore.
Use message as the log message instead
of invoking the editor.
-W spec
Wrapper specification.
The -k setting will apply only to those files
imported during this execution of the command. The keyword
substitution modes of files already in the repository are not
modified.
When used with -W, the
spec variable is in the same format as entries in
the cvswrappers administrative file (see Section 14.3.3.6, "The cvswrappers file").
Table 14-29 describes the status codes
displayed by the import command.
Status
C
Changed. The file is in the repository, and the sandbox version
is different; a merge is required.
I
Ignored. The .cvsignore file is causing
CVS to ignore the file.
L
Link. Symbolic links are ignored by CVS.
N
New. The file is new. It has been added to the repository.
U
Update. The file is in the repository, and the sandbox version is
not different.
log
[ -b ]
[ -d dates ]
[ -h ]
[ -N ]
[ -rrevisions ]
[ -R ]
[ -s state ]
[ -t ]
[ -wlogins ]
[ file ... ]
Print an activity log for the files.
The standard meaning of the common client option
-l applies. Additional options are listed in
Table 14-30.
-b
List revisions on default branch.
-d dates
Report on these dates.
-h
Print header only.
Don't print tags.
-r[revisions]
Report on the listed revisions. There is no space between
-r and its argument. Without an argument, the latest
revision of the default branch is used.
Print RCS filename only. The usage of -R here
is different than elsewhere in CVS (-R
usually causes CVS to operate recursively).
-s state
Print only those revisions having the specified state.
Print only header and descriptive text.
-wlogins
Report on checkins by the listed logins. There is no
space between -w and its argument.
For -d, use the date specifications in
Table 14-31.
Multiple specifications separated by semicolons may be provided.
Specification
d1<d2, or
d2>d1
The revisions dated between d1 and
d2, exclusive
d1<=d2, or
d2>=d1
The revisions dated between d1 and
d2, inclusive
<d, or
d>
The revisions dated before d
<=d, or
d>=
The revisions dated on or before d
d<, or
>d
The revisions dated after d
d<=, or
>=d
The revisions dated on or after d
d
The most recent revision dated d or earlier
For -r, use the revision specifications in
Table 14-32.
Specification
rev1:
rev2
The revisions between rev1 and
rev2, inclusive.
:rev
The revisions from the beginning of the branch to
rev, inclusive.
rev:
The revisions from rev to the end of
the branch, inclusive.
branch
All revisions on the branch.
branch1:
branch2
All revisions on all branches between
branch1 and branch2
inclusive.
branch.
The latest revision on the branch.
For
rev1:rev2,
it is an error if the revisions are not on the same branch.
This command is used to log in to remote repositories. The password
entered will be cached in the ~/.cvspass file, since
a connection to the server is not maintained across invocations.
This command logs out of a remote repository. The password cached in the
~/.cvspass file will be deleted.
rdiff
[ -c | -s | -u ]
[ { { -D date1 | -r rev1 } [ -D date2 | -r rev2 ] } | -t ]
[ -f ]
[ -l | -R ]
[-V vn]
file ...
The rdiff command creates a patch
file that can be used to convert a directory containing one release
into a different release.
The standard meanings of the common client options
-D, -f,
-l, -r, and
-R apply. Additional options are listed in
Table 14-33.
Use context diff format (the default).
Output a summary of changed files instead of a patch file.
Show the differences between the two most recent revisions.
-u
Use unidiff format.
-V rcsver
Obsolete. Used to specify version of RCS to emulate for keyword
expansion. (Keyword expansion emulates RCS Version 5.)
release
[ -d ]
directory ...
Sandboxes can be abandoned or deleted without using cvs
release if desired; using the release
command will log an entry to the history file (if this mechanism is
configured) about the sandbox being destroyed. In addition, it will
check the disposition (recursively) of each of the sandbox files
before deleting anything. This can help prevent destroying work that
has not yet been committed.
There is only one option that can be used with the
release command, -d. The
-d option will delete the sandbox copy if no
uncommitted changes are present.
NOTE
New directories (including any files in them) in the sandbox will be
deleted if the -d option is used with
release.
New directories (including any files in them) in the sandbox will be
deleted if the -d option is used with
release.
The status codes listed in Table 14-34
are used to describe the disposition of each file encountered in the
repository and the sandbox.
Status
A
The sandbox file has been added (the file was created and
cvs add was run), but the addition has not
been committed.
M
The sandbox copy of the file has been modified.
P
Update available. There is a newer version of the file in the
repository, and the copy in the sandbox has not been modified.
R
The sandbox copy was removed (the file was deleted and
cvs remove was run), but the removal was not
committed.
?
The file is present in the sandbox but not in the
repository.
remove
[ -f ]
[ -l | -R ]
[ file ... ]
Indicate that files should be removed from the repository. The files
will not actually be removed until they are committed. Use
cvs add to resurrect files that have been removed
if you change your mind later.
The standard meanings of the common client options
-l and -R apply. Only
one other option may be used with the remove
command, -f. When used,
-f will delete the file from the sandbox first.
rtag
[ -a ]
[ -b ]
[ -d ]
[ -D date | -r rev ]
[ -f ]
[ -F ]
[ -l | - R ]
[ -n ]
tag
file ...
Assign a tag to a particular revision of a set of files. If the file
already uses the tag for a different revision, cvs
rtag will complain unless the -F
option is used. This command does not refer to the sandbox file
revisions (use cvs tag for that), so it can be run
outside of a sandbox, if desired.
The standard meanings of the common client options
-D, -f,
-l, -r, and
-R apply. Additional options are listed in
Table 14-35.
-a
Search the Attic for removed files
containing the tag.
-b
Make it a branch tag.
-d
Delete the tag.
-F
Force. Move the tag from its current revision to the one
specified.
Don't run any tag program from the
modules file.
status
[ -l | -R ]
[ -v ]
[ file ... ]
Display the status of the files.
The standard meanings of the common client options
-l and -R apply. The
other option that can be used with the status command,
-v, may be used to include tag information.
tag
[ -b ]
[ -c ]
[ -d ]
[ -D date | -r rev ]
[ -f ]
[ -F ]
[ -l | R ]
tag
[ file ... ]
Assign a tag to the sandbox revisions of a set of files. You can use
the status -v command to list the existing
tags for a file.
The tag must start with a letter and must
consist entirely of letters, numbers, dashes (-) and
underscores (_). Therefore, while you might want to
tag your hello project with 1.0
when you release Version 1.0, you'll need to tag it with something like
hello-1_0 instead.
The standard meanings of the common client options
-D, -f,
-l, -r, and
-R apply. Additional options are listed in
Table 14-36.
Make a branch.
-c
Check for changes. Make sure the files are not locally modified
before tagging.
Since the -d option throws away information
that might be important, it is recommended that you use it only when
absolutely necessary. It is usually better to create a different tag
with a similar name.
unedit
[ -l | -R ]
[ file ... ]
Abandon file modifications and make the file read-only again.
Watchers will be notified.
update
[ -A ]
[ -d ]
[ -D date | -r rev ]
[ -f ]
[ -I pattern ]
[ -j rev1 [ -j rev2 ] ]
[ -k kflag ]
[ -l | -R ]
[ -p ]
[ -P ]
[ -W spec ]
[ file ... ]
Update the sandbox, merging in any changes from the repository.
For example:
cvs -n -q update -AdP
can be used to do a quick status check of the current sandbox
versus the head of the trunk of development.
The standard meanings of the common client options
-D, -f,
-k, -l,
-r, and -R apply.
Additional options are listed in Table 14-37.
Reset sticky tags.
Create and update new directories.
Provide filename patterns for files to ignore.
-j revision
Merge in changes between two revisions. Mnemonic: join.
Provide wrapper specification.
Using -D or -r results
in sticky dates or tags, respectively, on the affected files (using
-p along with these prevents stickiness). Use
-A to reset any sticky tags or dates.
If two -j specifications are made, the
differences between them are computed and applied to the current
file. If only one is given, then the common ancestor of the sandbox
revision and the specified revision is used as a basis for computing
differences to be merged.
For example, suppose a project has an experimental branch, and important
changes to the file foo.c were introduced
between revisions 1.2.2.1 and 1.2.2.2. Once those changes have proven
stable, you want them reflected in the main line of development. From
a sandbox with the head revisions checked out, we run:
user@localhost$ cvs update -j 1.2.2.1 -j 1.2.2.2 foo.c
CVS finds the differences between the two revisions and applies those
differences to the file in our sandbox.
The spec used with -W is
in the same format as entries in the cvswrappers
administrative file (see Section 14.3.3.6, "The cvswrappers file").
The status codes listed in Table 14-38
are used to describe the action taken on each file encountered in the
repository and the sandbox.
Status Code
Added. Server took no action because there was no repository
file. Indicates that cvs add, but not
cvs commit, has been run.
C
Conflict. Sandbox copy is modified (it has been edited since it
was checked out or last committed). There was a new revision in the
repository, and there were conflicts when CVS merged its changes into
the sandbox version.
Modified. Sandbox copy is modified (it has been edited since it
was checked out or last committed). If there was a new revision in
the repository, its changes were successfully merged into the file (no
conflicts).
P
Patched. Same as U but indicates the server
used a patch.
Removed. Server took no action. Indicates that
cvs remove, but not
cvs commit, has been run.
U
Updated. The file was brought up-to-date.
File is present in sandbox but not in repository.
watch
{ { on | off } | { add | remove } [ -a action ] }
[ -l | -R ]
file ...
The watch command controls CVS's edit-tracking
mechanism. By default, CVS operates in its concurrent development
mode, allowing any user to edit any file at any time. CVS includes
this watch mechanism to support developers who
would rather be notified of edits made by others proactively than
discover them when doing an update.
The CVSROOT/notify file determines how
notifications are performed.
Table 14-39 shows the
watch sub-commands and their uses.
Sub-command
Start watching files.
off
Turn off watching.
on
Turn on watching.
Stop watching files.
The standard meanings of the common client options
-l and -R apply. The
only other option that can be used with the watch
command is -a
action. The -a
option is used in conjunction with one of the actions listed in Table 14-40.
Action
all
All of the following.
A user has committed changes.
A user ran cvs edit.
none
Don't watch. Used by the edit
command.
A user ran cvs unedit, cvs
release, or deleted the file and ran cvs
update, re-creating it.
See also the descriptions of the edit,
editors, unedit, and
watchers commands.
watchers
[ -l | -R ]
[ file ... ]
Display a list of users watching the specified files. This is
determined by checking which users have run the
watch command on a particular file (or set of
files). If the watch command has not been used, no
results will be displayed.
The standard meanings of the common client options -l
and -R apply.
See also watch. | https://docstore.mik.ua/orelly/linux/lnut/ch14_04.htm | CC-MAIN-2019-35 | refinedweb | 6,191 | 67.86 |
Google Cloud Functions for Go
In January 2019, Google Cloud Functions finally announced beta support for Go. Check out the official blog post for more details.
Hello World
Let me start with a simple “hello world” to introduce you to the overall build+deploy experience. GCF expects an http.HandlerFunc to be the entry point. Create a package called “hello” and add a trivial handler:
$ cat hello/fn.go
package hello
import (
"fmt"
"net/http"
)
func HelloWorld(w http.ResponseWriter, r *http.Request) {
fmt.Fprintf(w, "Hello, World!")
}
In order to deploy, use the following command. It will create a new function called hello and will use HelloWorld as the entry point. The Go runtime to be used will be Go.11.
$ gcloud functions deploy hello --entry-point HelloWorld --runtime go111 --trigger-http
Deploying function (may take a while - up to 2 minutes)...
Deploying may take a while as it is noted. Once deployed, you will be able to see the HTTP endpoints on your terminal. You can also view your functions at the Cloud Console.
On the console, you can see “hello” function is deployed. You can access to logs and basic metrics such as number of invocations, execution time and memory usage.
Dependencies
If you have external dependencies, go.mod file will be used to get the dependencies. You can also vendor them under the function module. I imported the golang.org/x/sync/errgroup package as an example. See GCF guideline on dependencies if you need more information.
$ export GO111MODULE=on
$ cd hello
$ go mod init
$ tree
hello
├── fn.go
├── go.mod
├── go.sum
...
The dependency is going to be go-getted when I redeploy the function again.
$ gcloud functions deploy hello --entry-point HelloWorld --runtime go111 --trigger-http
Deploying function (may take a while - up to 2 minutes)...
availableMemoryMb: 256
entryPoint: HelloWorld
httpsTrigger:
url:
...
Function is redeployed at. See it yourself. You can also call the function from command line:
$ gcloud functions call hello
executionId: x71xpor7tasd
result: Hello, World!
I also generated some load from my laptop to the function to provide you a more realistic response time data. I made 1000 requests, 10 concurrently at a time. You can see that there are some outliers but most calls fall into the 213 milliseconds bucket.
Code Organization
In Go, we organize packages by responsibility. This also fits well with serverless design patterns — a function is representing one responsibility. I create a new module for each function, provide function-specific other APIs from the same module.
The main entry point handler is always in fn.go, this helps me to quickly find the main handler the way main.go would help me to find the main function.
Common functionality lives in a separate module and vendored on the function package because GCF CLI uploads and deploys only one module at a time. We are thinking about how this situation can be improved but, currently a module should contain all of its dependencies itself.
An example tree is below. Package config contains configuration-related common functionality. It is a module and is imported and vendored by the other functions (hello and user).
$ tree
fns
├── config (commonly used module)
│ ├── config.go
│ ├── go.mod
│ └── go.sum
├── hello
│ ├── fn.go
│ ├── go.mod
│ ├── go.sum
│ └── vendor (contains all dependencies + config)
│ ├── ...
│ └── modules.txt
└── user
├── fn.go
├── go.mod
└── vendor (contains all dependencies + config)
├── ...
└── modules.txt
Chaining Handlers
Unlike other providers, we decided to go with Go idiomatic handler APIs (func(ResponseWriter, *Request)) as the main entry point. This allows you to utilize existing middlewares available in the Go ecosystem more easily. For example, in the following example, I am using ochttp to automatically create traces for incoming HTTP requests.
package hello
import (
"fmt"
"net/http"
"go.opencensus.io/plugin/ochttp"
)
func HelloWorld(w http.ResponseWriter, r *http.Request) {
fn := func(w http.ResponseWriter, r *http.Request) {
fmt.Fprintln(w, "Hello world")
}
traced := &ochttp.Handler{
Handler: http.HandlerFunc(fn),
}
traced.ServeHTTP(w, r)
}
For each incoming request, an incoming trace span is created. If you register an exporter, you can upload the traces to any backend we support including Stackdriver Trace of course. | https://medium.com/google-cloud/google-cloud-functions-for-go-57e4af9b10da?_branch_match_id=578207060743205115 | CC-MAIN-2019-13 | refinedweb | 689 | 52.66 |
Error importing pygments.lexers.web on Python 2.5
{{{ $ python Python 2.5 (r25:51908, May 15 2012, 16:19:31) [GCC 4.1.2 20080704 (Red Hat 4.1.2-52)] on linux2 Type "help", "copyright", "credits" or "license" for more information.
import pygments.lexers.web Traceback (most recent call last): File "<stdin>", line 1, in <module> UnicodeDecodeError: 'rawunicodeescape' codec can't decode bytes in position 12-22: \Uxxxxxxxx out of range
}}}
Hey I had the same problem: The import of pygments.lexers.web did not work. I switched to Python version 2.5.4 and there is the bug fixed. I hope this helps.
Yes, this is an issue with one of my last commits. It affects all narrow builds of python (sys.maxunicode == 65535ish).
I'm working on a fix as well as making regexlint recognize this case.
Tim
Any updates on this?
The fix is merged to pygments-main here.
Georg, I think this can be closed. | https://bitbucket.org/birkenfeld/pygments-main/issues/778/error-importing-pygmentslexersweb-on | CC-MAIN-2017-43 | refinedweb | 161 | 80.17 |
10 August 2007 12:36 [Source: ICIS news]
LONDON (ICIS news)--OPEC producers increased crude supply 385,000 bbl/day in July to 30.5m bbl/day, reflecting the restart of previously shuttered Iraqi and Nigerian output rather than a policy shift to meet demand, the International Energy Agency (IEA) said on Friday. ?xml:namespace>
In its monthly oil market report, the IEA said global oil supply was lagging demand in July, despite a 1.1m bbl/day monthly increase to 85.3m bbl/day.
However, monthly gains from non-OPEC producers were expected to be shortlived as maintenance and seasonal factors would likely reverse the July increase in August and September.
Benchmark WTI reached a record high of more than $78/bbl in July but moved into backwardation, falling back sharply on concerns over growth, the unwinding of speculative positions and poor refining margins, said IEA.
“High crude prices and increased refinery throughput further pressured already negative returns from marginal refineries in July, but these have subsequently recovered somewhat,” said the report.
Forecast global oil production remained unchanged at 86m bbl/day in 2007, 1.8% up over 2006, and 88.2m bbl/day in 2008, a rise of 2.5%.
IEA said a surge of demand for fuel oil and gasoil in ?xml:namespace>
Global refinery throughput was estimated at 73.3m bbl/day in July as scheduled and unscheduled shutdowns came to an end.
August throughput has been revised lower to 75.1m bbl/day to reflect economic run cuts and higher non-OECD maintenance activity, | http://www.icis.com/Articles/2007/08/10/9052044/july-opec-output-up-on-iraq-nigeria-restarts-iea.html | CC-MAIN-2015-06 | refinedweb | 259 | 55.54 |
2016-08-22 05:34 AM - edited 2016-08-22 05:37 AM
Hi,
we have a nice netapp cluster with 8.3.1 running.
We have multiple vservers for NFS iscsci and CIFS. I am running into the following problem.
A linux coworker of mine is able to mount all the NFS volumes on my filers within /
We have NFS export policies enabled with allows servers in 2 vlans with acces to certain mounts.
However, my coworker can mount / and see all the mounts on the filers.(because he is in one of the 2 vlans)
How can I disable this? The volumes are all mounted under namespaces under /.
So if I remove the export rights of / all the other volumes beneath / will also be unmountable?
thanks!
2016-08-22 05:41 AM
do I even need an export policy on the / ?
(or a blank one)
2016-08-22 05:50 AM
Yes, you do. Clients must be able to traverse junction tree starting from the top (i.e. "/"), which means "/" must allow at least read-only mount. The only way to harden it would be to restrict visibility of files/directories under "/", so that even if clients mount it, they won't be able to see its content.
2016-08-22 05:57 AM
thanks for your reply!
How can I make it invisible under /?
2016-08-22 06:43 AM
Set "/" unix-permissions to something like 0711 (of course make sure owner is root) and create mninimal export-policy that only allows ro mount, but no rw, no root etc. Then nobody can list content of /, but still explicitly enter subvolumes or mount them. | http://community.netapp.com/t5/Data-ONTAP-Discussions/Netapp-ONTAP-8-3-1-NFS-hardening/td-p/122514 | CC-MAIN-2017-39 | refinedweb | 277 | 73.47 |
01 March 2010 03:58 [Source: ICIS news]
SINGAPORE (ICIS news)--Asia’s largest adipic acid producer, Japan's Asahi Kasei, will halt production at its 120,000 tonne/year plant in Nobeoka, Miyazaki prefecture for an annual one month maintenance from May to June, a company source said on Monday.
This would follow shortly after maintenance of its feedstock cyclohexanol plant, the producer said.
Sellers and buyers said this would continue to keep adipic acid supply tight, and thus prices were expected to trend up.
Adipic acid prices were at $2,200-2,300/tonne (€1,628-1,702/tonne) CFR (cost and freight) ?xml:namespace>
( | http://www.icis.com/Articles/2010/03/01/9338522/japans-asahi-kasei-plans-adipic-acid-plant-maintenance.html | CC-MAIN-2014-52 | refinedweb | 107 | 65.05 |
Teaching Kids to Code Subprograms with Parameters
Your coder can provide flexibility to her programs by coding parameters to subprograms. For example, coding a square subprogram allows the program to draw a square of a defined size each time the subprogram is called. But what if you want the square subprogram to draw squares of differing sizes? By adding a parameter to the subprogram you can do just that. A parameter is a variable that you pass into a subprogram, which the subprogram uses as it executes. You can pass a parameter into the square subprogram that tells the code how big to draw the square.
Scratch code block with parameters
Scratch allows you to add one or more parameters to any subprogram block you create. Your coder can begin by making a simple block. Then, your coder can add parameters when she first creates the block, or she can edit the block after it has been created — the process is essentially the same. Here are the steps for editing the square code block previously created:
- In the More Blocks category, right-click (Windows) or control+click (Mac) the instance code block tile that you previously created.
- Select Edit from the pop-up menu which appears.
The Edit Block dialog box appears.
- At the Edit Block dialog box, click the Options tab to expand the options for adding parameters.
- Click the icon for any of the parameter options shown to add that parameter to your block.
You can choose Add Number Input, Add String Input, Add Boolean Input, or Add Label Text. When you click an icon to add that parameter, a blank field is added to your instance code block tile. You can add more than one parameter.
- Inside the blank field on the instance code block tile, type the variable name of the parameter(s) you’re adding.
- Select the Run without Screen Refresh check box.
This allows for faster execution of your program.
- Click OK.
The dialog box closes and the code block tile now shows the added parameter(s).
In Scratch, parameters added to code blocks play the same role as variables. When the parameter is added, you can use it just like a variable in your program — although be aware that it doesn’t appear in your list of variables in the Data category.
Using your edited block with parameters is easy! Just drag the parameter tile from the code block definition (the big “hat” tile) into your code when you want to use the parameter. The parameter replaces code which you previously defined outright. Instead of the code tile for
move 100 steps, you now have a code tile for
move size steps. This allows for more flexible usage of the code block because it can now accept a number for the size, sent by the main program, and execute the code block with that size as the side length.
Your main program then calls the parameterized block, sending it a number to use for the size:
square 30 draws a square with side lengths of 30 pixels;
square 110 draws a square with side lengths of 110 pixels.
JavaScript, with parameters
You can add parameters to your JavaScript functions to add flexibility to your programs. To create a function with a parameter in Code.org’s App Lab, using JavaScript, complete these steps:
- At the Functions category of tiles, drag a function
myFunction(n)tile into the program workspace.
The n is a parameter. If you already added a
myFunction()command without a parameter, you can add the parameter by typing the parameter inside the parentheses. (Or, if you are working in tile mode, press the little horizontal arrows to add or remove parameters from your function.) In text mode, separate multiple parameters using a comma and a space following each parameter.
- Replace the
myFunction(n)placehoder, by typing a name for the function, and a name for your parameter(s).
Use camelCase naming conventions for JavaScript. Each parameter is a variable in your program.
- Attach commands to define your function.
The parameters are referenced by their variable names inside the function.
- Use the function name and parameter values to call it from your main program.
The parameters values are passed into the function. Parameter values are assigned to the parameter variables and used inside the function.
See the image below for a JavaScript program with functions and parameters, written in the App Lab. This program draws a field of twenty flowers of different sizes and pink color, randomly distributed in the display. Note that there are two parameterized functions: one to draw
oneFlower(size), and one to draw
onePetal(size) of the flower.
Here, the main program calls the
oneFlower(size) function that has been defined to include a
size parameter. The
oneFlower (randomNumber(5, 20)) function call sends a random number, from 5 to 20, to the
oneFlower(size) function;
size takes on a new value between 5 and 20 each time the function is called. The
oneFlower(size) function then calls the
onePetal(size) function. The
onePetal(size) function receives whatever value its parent subprogram received for
size. The effect is that flowers of different sizes are drawn onscreen. The emulator shows the result of executing the program.
Java, with parameters
The image below shows a Java class named Product, written in the BlueJ IDE. The class contains one method,
Product, which has two parameters,
a and
b.
Here’s how to code this program:
- Code the class name:
public class Product {.
- Code the main program.
This is the section labeled
main. The
mainprogram calls the
multiplymethod, which receives two parameters.
- Code the
multiplymethod, which has two parameters,
aand
b.
The
multiplymethod defines three variables,
a,
b, and
total. Variables a and b are parameters defined as integers. Their values, 5 and 7, are received from the call located in the main program. The
multiplymethod computes
totaland prints out its value.
- Close the
classwith a curly bracket.
The image below shows the execution of
Product. Notice that the values of the variables
a and
b can be changed outside of the
multiply method to result in a new product for
total. This makes the
multiply method modular and easy to reuse with different variable values on each use. Parameterizing methods build a more flexible program.
Subprograms can also generate information that they pass onto other subprograms or back to the main program. In Java, your coder sometimes sees the code
void. This means that, when the subprogram is called, it’s not sending anything back to the program that called it. In other cases, your coder sees a variable type and name following the name of the main program or of a subprogram. That type and name tells you what type of information is going to be received by the program making the call. The subprogram contains a
return command indicating what variable value is being returned (passed back to) the program that called it. | https://www.dummies.com/programming/coding-for-kids/teaching-kids-code-subprograms-parameters/ | CC-MAIN-2019-47 | refinedweb | 1,165 | 64.51 |
You can define a function anywhere in code. When you first start with Python this generally means defining functions within a module i.e. at the “top level”. However, there is nothing wrong with defining functions within the code of another function.
For example:
def myFunction():
def myInnerFunction():
myInnerVariable=20
print(myInnerVariable)
myInnerFunction()
myFunction()
Notice that myFunction contains a definition of another function, myInnerFunction. This has a single local variable, myInnerVariable, which it prints. Calling the outer function, myFunction results in calling the inner function and the display of its local variable.
You can repeat this as many times as you like defining one function in the code of another. In practice it is rare for functions to be nested more than one deep but there is nothing in Python that rules it out. Each function is local to the function that immediately contains its definition.
This should be all very clear and obvious but notice that in the preceding example we have created two function objects. The first comes into existence immediately i.e. the one referenced by myFunction. The second only comes into existence when we call myFunction and its code is executed i.e. the one referenced by myInnerFunction.
Notice that the local variables for the inner function only exist while it is being executed and so there is no prospect of the outer function accessing them. However, the local variables of the outer function exist for the entire time that the inner function is executing – can it access them? In other words, are the containing function’s local variables like globals to the inner function?
The answer is yes, but it is far more involved a story than you might imagine.
The reason is once again the fact that Python has no keyword for defining a variable. When you assign to a variable it is created if it doesn’t already exist in the local context.
What this means is that the inner function can access the local variables of the outer function, but it cannot assign to them without taking an extra step.
def myFunction():
myOuterVariable=10
def myInnerFunction():
print(myOuterVariable)
myInnerFunction()
myFunction()
This accesses myOuterVariable as defined as a local variable of myFunction. However, if you assign to myOuterVariable within the inner function a local variable is created:
def myFunction():
myOuterVariable=10
def myInnerFunction():
myOuterVariable=20
print(myOuterVariable)
myInnerFunction()
print(myOuterVariable)
myFunction()
This prints 20 followed by 10 demonstrating that the inner function used its own local variable and didn’t use the outer variable.
If you want to assign to an outer variable you have to declare it as nonlocal. The nonlocal statement works like the global statement in that it stops assignment from creating a local variable.
def myFunction():
myOuterVariable=10
def myInnerFunction():
nonlocal myOuterVariable
myOuterVariable=20
print(myOuterVariable)
myInnerFunction()
print(myOuterVariable)
myFunction()
declaring myOuterVariable nonlocal stops the Python system from creating a new local variable and forces it to search for the variable in the variable table of the enclosing function. That is, what you see printed is 20 followed by 20 as the variable defined in the outer function is used.
You might ask what is the difference between nonlocal and global.
Declaring a variable as global within a function will either create the global variable or make use of the one already defined. Notice this has to be a global variable defined at the module level.
Declaring a variable as nonlocal within a function makes use of the variable defined within the containing function. If there isn’t one then the next containing function is used to supply the variable and so on. If no variable that is local to a containing function is found then an error occurs.
This means that a nonlocal declaration never creates a new variable and never makes use of a global variable. It searches any set of nested functions from the innermost and uses the first variable of the same name it finds.
This might seem complicated but it is a perfectly logical consequence of Python defining a variable by assignment.
Use global in a function when you want to use or create a global variable.
Use nonlocal in a function when you want to use the first local variable available in the containing functions.
See book for final version
See book for final version
A variable that a function assigns to is created as a local variable.
To reference a global variable that the function assigns to it has to be declared as global.
Functions can be defined within other functions and the inner functions have access to the containing function’s local variables but not vice versa.
If an inner function assigns to a variable then it is created as a local variable.
To refer to a local variable of a containing function in assignment you have to declare the variable nonlocal.
Closure is a natural consequence of function objects outliving their local variables. If an inner function exists and can be invoked after its containing function has ended, then it still has access to the same local variable via the closure.
The closure consists of all of the variables in scope when a function is declared – its execution context.
All functions declared within the same execution context share that context as their closure.
The values of variables in the closure are the last values they had before the outer function terminated.
Closures have many uses but the main ones are to provide private state variables, provide a self reference, and to provide context to callback functions.
You can work with the __closure__ magic attribute to access and even change the closure but how this works is platform dependent. Use the inspect module to isolate your code from such changes.> | https://i-programmer.info/programming/python/12493-programmers-python-local-and-global.html?start=1 | CC-MAIN-2021-25 | refinedweb | 959 | 53.1 |
Creating tag cloud using ASP.NET MVC and Entity Framework
I am building events site on ASP.NET MVC 3 and Entity Framework. Today I added tagging support to my site and created simple tag cloud. In this posting I will show you how my tag cloud is implemented. Feel free to use my code if you like it.
Model
To give you better idea about the structure of my classes here is my Entity Framework model. You can see that events and tags have many-to-many relationship defined between them.
In database I have one table between events and tags but as this table contains primary key that is 100% made up of foreign keys of events and tags table then Entity Framework is able to create many-to-many mapping automatically without creating additional object for relation.
You can also see that there is Events navigation property defined for Tag class. It is not good idea to create more navigation paths than you need and in the case of Tag class we need this navigation property.
Tag cloud solution
To create tag cloud we need to go through the following steps:
- Create Tag table and bind it to Event.
- Update your Entity Framework model to reflect new changes made to database.
- Add some classes that hold tag cloud data (TagCloud is container class that keeps collection of MenuTag objects).
- Create extension method to Html class that generates tag cloud.
I started with code I found from Mikesdotnetting blog posting Creating a Tag Cloud using ASP.NET MVC and the Entity Framework and worked out my own solution. Referred posting was great help for me and let’s say thanks to author for sharing his ideas with us.
Tag cloud implementation
As a first thing let’s create the class that holds tag data. I named this class as MenuTag.
public class MenuTag
{
public string Tag;
public int Count;
}
Tag is the title of tag and Count shows how many events are tagged with this tag.
Next we need the class that packs everything up and provides us with tag rank calculation. For that I defined class called TagCloud.
public class TagCloud
{
public int EventsCount;
public List<MenuTag> MenuTags = new List<MenuTag>();
public int GetRankForTag(MenuTag tag)
{
if (EventsCount == 0)
return 1;
var result = (tag.Count * 100) / EventsCount;
if (result <= 1)
return 1;
if (result <= 4)
return 2;
if (result <= 8)
return 3;
if (result <= 12)
return 4;
if (result <= 18)
return 5;
if (result <= 30)
return 6;
return result <= 50 ? 7 : 8;
}
}
Now we have to add new method to our Entity Framework model that asks data from database and creates us TagCloud object. To add new methods to model I am using partial classes.
public partial class EventsEntities
{
private IQueryable<Event> ListPublicEvents()
{
var query = from e in events
where e.PublishDate <= DateTime.Now
&& e.Visible
orderby e.StartDate descending
select e;
return query;
}
public TagCloud GetTagCloud()
{
var tagCloud = new TagCloud();
tagCloud.EventsCount = ListPublicEvents().Count();
var query = from t in Tags
where t.Events.Count() > 0
orderby t.Title
select new MenuTag
{
Tag = t.Title,
Count = t.Events.Count()
};
tagCloud.MenuTags = query.ToList();
return tagCloud;
}
}
And as a last thing we will define new extension method for Html class.
public static class HtmlExtensions
{
public static string TagCloud(this HtmlHelper helper)
{
var output = new StringBuilder();
output.Append(@"<div class=""TagCloud"">");
using (var model = new EventsEntities())
{
TagCloud tagCloud = model.GetTagCloud();
foreach(MenuTag tag in tagCloud.MenuTags)
{
output.AppendFormat(@"<div class=""tag{0}"">",
tagCloud.GetRankForTag(tag));
output.Append(tag.Tag);
output.Append("</div>");
}
}
output.Append("</div>");
return output.ToString();
}
}
And you are almost done. I added my tag cloud to my site master page. This is how what you should write to show tag cloud in your view:
@Html.Raw(Html.TagCloud())
You can also go on and create partial view but then you have to give data to it through your view model because writing code behind views is not a good idea. If you look at my extension method you will see it’s simple and short and that’s why I prefer to keep it this way.
Conclusion
ASP.NET MVC and Entity Framework make it easy to create modern widgets for your site. Just keep as close to ASP.NET MVC framework as you can and orchestrate it with Entity Framework models. In this posting I showed you how to create simple tag cloud component that plays well together with ASP.NET MVC framework. We created some classes where we keep our data. Tag cloud data is coming from Entity Framework model and tag cloud is included in views using Html extension method. | http://weblogs.asp.net/gunnarpeipman/creating-tag-cloud-using-asp-net-mvc-and-entity-framework | CC-MAIN-2014-49 | refinedweb | 777 | 65.93 |
Test::Plan - add some intelligence to your test plan
use Test::More; use Test::Plan; plan tests => 2, need_module('Foo::Bar'); # ... do something that requires Foo::Bar in your test environment... ok($foo, 'this is Test::More::ok()');
Test::Plan provides a convenient way of scheduling tests (or not) when the test environment has complex needs. it includes an alternate
plan() function that is
Test::Builder compliant, which means
Test::Plan can be used alongside
Test::More and other popular
Test:: modules. it also includes a few helper functions specifically designed to be used with
plan() to make test planning that much easier.
in reality, there is nothing you can't do with this module that cannot be accomplished via the traditional
skip_all. however, the syntax and convenient helper functions may appeal to some folks. in fact, if you are familiar with
Apache-Test then you should feel right at home - the
plan() syntax and associated helper functions are idential in almost all respects to what
Apache::Test provides.
so yes, there is lots of code duplication between this module and
Apache::Test. but I like this syntax so much I wanted to share it with the non-Apache inspired world.
the following functions are identical in almost all respects to those found in the
Apache::Test package, so reading the
Apache::Test manpage is highly encouraged.
for all practical purposes,
Test::Plan::plan() is a drop-in replacement for the other
plan() functions you have been using already. in other words you can just
use Test::Plan; plan tests => 3;
and be on your way. where
Test::Plan::plan() is different is that it takes an optional final argument that is used to decide whether the plan should occur or not. that is
use Test::Plan; plan tests => 3, sub { $^O ne 'MSWin32' };
has the same results as
use Test::More; if ( $^O ne 'MSWin32' ) { plan tests => 3; } else { plan 'skip_all'; }
much better, eh? here is what you need to know...
first, the final argument to
plan() can be in any of the following formats. if the result evaluates to true the test is planned, otherwise the entire test is skipped a la
skip_all.
the boolean option is typically the result from a subroutine that has already been evaluated. here is an example
plan tests => 3, foo();
at runtime,
foo() will be evaluated and the results passed as the final argument to
plan(). if the results are true then
plan() will plan your tests, otherwise the entire test file is skipped.
while you can write your own subroutines, as in the above example, you may be interested in using some of the helper functions
Test::Plan provides.
if the final argument to
plan() is a reference to a subroutine that subroutine will be evaluated and the results used to decide whether to plan your tests.
plan tests => 3, sub { 1 };
or
plan tests => 3, \&foo;
if the subroutine evaluates to true then
plan() will plan your tests, otherwise the entire test file is skipped.
this is a shortcut to calling
need_module() for each element in the array. for example
plan tests => 3, [ qw(CGI LWP::UserAgent) ];
is exactly equivalent to
plan tests => 3, need_module(qw(CGI LWP::UserAgent));
see the below explanation of
need_module() for more details.
in general,
Test::Plan::plan() functions identically to
Apache::Test::plan(), so reading the
Apache::Test manpage is highly encouraged.
you might be wondering where the skip message comes from when you use
Test::Plan::plan() as described above. the answer is that it comes from using one or more of the following helper functions.
need() is a special function that is best described via an illustration.
plan tests => 3, need need_module('Foo::Bar'), need_min_module_version(CGI => 3.0), need_min_perl_version(5.6);
what happens here is that
need() is dispatching to each decision-making function and aggregating the results. the result is that the skip message contains all the conditions that failed, not merely the first one. contrast the above to this
plan tests => 3, need_module('Foo::Bar') && need_min_module_version(CGI => 3.0) && need_min_perl_version(5.6);
in this example if
Foo::Bar is not present the list of preconditions is short-circuited and the others not even tried, which means that if you fix the
Foo::Bar problem and run the test again you might be hit with other precondition failures.
need() is a function of convenience, showing you all your failed preconditions at once.
need() can accept arguments in the following forms:
this corresponds to the
need() examples shown to this point. note that this is not the same as a boolean -
need() looks specifically for 0 or 1 to be returned from its functions. for the reasons why see the next entry or read that
Apache::Test manpage.
a simple scalar will be passed to
need_module()
plan tests => 3, need qw(Foo::Bar CGI);
see the below entry for
need_module() for the specifics.
the key to the hash should be the skip message and the value the thing to be evaluated, either a boolean or a reference to a subroutine.
plan tests => 3, need { 'not Win32' => sub { $^O eq 'MSWin32' }, 'no Foo' => need_module('Foo::Bar'), };
if the value evaluates to true then key is used as the skip message.
this is all rather complex, so if you are confused please see the
Apache::Test manpage. remember, I didn't write this stuff :)
determines whether a Perl module can be successfully required.
plan tests => 3, need_module('Foo::Bar');
will plan the tests only if
Foo::Bar is present. the skip message will show that the module could not be found.
need_module() accepts either a list or a reference to an array. in both cases all modules must be present for
plan() to plan tests.
plan tests => 3, need_module [ 'CGI', 'Foo::Bar', 'File::Spec' ];
this first calls
need_module(). if that succeeds then the module version is checked using
UNIVERSAL::VERSION. if the version is greater than or equal to the specified version tests are planned.
plan tests => 3, need_min_module_version(CGI => 3.01);
if no version is specified then a version check is not performed. this is a difference between
Test::Plan and
Apache::Test.
similar to
need_min_module_version(), checks to make sure that the version of perl currently running is greater than or equal to the version specified.
plan tests => 3, need_min_perl_version(5.6);
need_perl() queries
Config for various properties. for example
plan tests => 3, need_perl('ithreads');
is equivalent to
plan tests => 3, sub { $Config{useithreads} eq 'define' };
in general, the argument to
need_perl() is prepended with the string
'use' and the value within
%Config checked. a special case is
'iolayers' which is dispatched to
need_perl_iolayers().
a shortcut to
need_perl('ithreads').
returns true if perl contains PerlIO extensions.
this is a direct interface into the skip reason mechanism
Test::Plan uses behind the scenes.
plan tests => 3, skip_reason("I haven't implemented this feature yet");
while it is useful for one liners, you can also use it from your own custom subroutine
plan tests => 3, \&foo; sub foo { ... return 1 if $foo; # success return skip_reason('condition foo not met'); }
skips the test with a generic 'under construction' skip message
plan tests => 3, under_construction;
this module jumps through some hoops so that you can use both
Test::Plan and
Test::More in the same script without a lot of trouble. the main issue is that both modules want to export
plan() into your namespace, which results in warnings and collisions.
if you want to keep things simple, load
Test::More before
Test::Plan and everything should work out ok.
use Test::More; use Test::Plan; plan tests => 3, need_min_perl_version(5.6); # nary a warning to be found.
otherwise you would need to be explicit in what you import from each module
use Test::Plan qw(plan need_module); use Test::More import => [qw(!plan)]; plan tests => 3, need_module('Foo::Bar');
yucko.
since the vast majority of the code here has been lifted from
Apache::Test it is very well tested. the only novel thing is the
Test::More workarounds mentioned in CAVEATS.
Geoffrey Young <geoff@modperlcookbook.org>
This module is free software. It may be used, redistributed and/or modified under the same terms as Perl itself. | http://search.cpan.org/~geoff/Test-Plan-0.03/lib/Test/Plan.pm | CC-MAIN-2014-15 | refinedweb | 1,370 | 62.78 |
floorf
Round to largest integral value not greater than x
DescriptionThe floor functions return the largest integral value less than or equal to x.
Example:
Example - Round to largest integral value not greater than x
Workings
#include <stdio.h> #include <math.h> int main(void) { for (double a = 12.5; a < 13.4; a += 0.1) printf("floor of %.1lf is %.1lf\n", a, floor(a)); return 0; }
Solution
Output:
floor of 12.5 is 12.0 floor of 12.6 is 12.0 floor of 12.7 is 12.0 floor of 12.8 is 12.0 floor of 12.9 is 12.0 floor of 13.0 is 13.0 floor of 13.1 is 13.0 floor of 13.2 is 13.0 floor of 13.3 is 13.0 floor of 13.4 is 13.0 | http://www.codecogs.com/library/computing/c/math.h/floor.php?alias=floorf | CC-MAIN-2018-34 | refinedweb | 140 | 92.69 |
While CDs and old vinyls are almost extinct, I'm sure many of you still blast the old tunes once in awhile, or maybe you're more of a modern tunes type of person. Either way, what melodic sounds are making their way to your ears?
30 Replies
Apr 27, 2010 at 11:38 UTC
Breaking Benjamin , a bit nickleback but better
Apr 27, 2010 at 11:40 UTC
Breaking Benjamin is way way better than Nickleback. Also check out 10 Years if you like BB.
I listen to rock, alternative, techno (trance, house, etc), hip hop, and pretty much everything except top 40 and country
Apr 27, 2010 at 11:46 UTC
I've been listening to BNL and Garth Brooks (mostly BNL with the History of Everything (Big Bang Theory theme)). If I'm not listening to one of those in particular, I usually just hit shuffle on my iPod and get one of 9000 songs ranging from everything to everything (with a little bit of everything thrown in for good measure).
Apr 27, 2010 at 11:56 UTC
Presently, it's the soundtrack from "Whip It". Great mix.
I'm a movie guy....see all kinds. I find a lot of great stuff from movie soundtracks.
The Ryan Montbleau Bands' latest has been gettin' a lot of play on my 'pewter as well.
Apr 27, 2010 at 12:32 UTC
Local news radio!
Apr 27, 2010 at 12:53 UTC
No music?No music?
Local news radio!
Apr 27, 2010 at 12:54 UTC
Right now I'm listening to "Punky Reggae Party" from Bob Marley.
Apr 27, 2010 at 2:09 UTC
Anybody listen to nerdcore hip hop? Its some pretty good stuff, if your interested check out MC Lars, Ytcracker, Beefy or Dual Core.
Other than that my ex - girlfriend describes my taste in music as "angry" but just because there is screaming doesn't make it angry. Ha ha. My favorite right now is the band Four Year Strong, I just saw them in concert in Detroit about a month ago.
Apr 27, 2010 at 2:20 UTC
3 days grace, flyleaf, volbeat...it just goes on and on...
Apr 27, 2010 at 2:44 UTC
No music?No music?
Local news radio!
Unless I'm falling sleep!
In my commute I listen to the news.
At work I don't listen to music, I could but....
Apr 27, 2010 at 2:47 UTC
if ever i am stressed, i like to listen to my favorite local bands:
explosions in the sky
balmorhea
Apr 27, 2010 at 2:57 UTC
well i'm more on the downtempo side of the spectrum. i listen to a lot of the artist on the ESL (Eighteenth Street Lounge) label. they're a label out of Washington DC started by the guys from Thievery Corporation. they have a lot of great talent on their label: Federico Aubele, Natalia Clavier, Ancient Astronauts, Thunderball, Karminsky Experience, Chris Joss... just to name a few. They actually just had their 15th anniversary this past summer. It was a BLAST!!!
But the one that's CONSTANTLY in my rotation right now is Little Dragon. I have been listening to their albums non-stop lately. The singer has an amazing voice! She actually does a few guest spots on the new Gorillaz album. She also did some work with a group called Koop a few years back. They have an amazing jazz downtempo feel.
Apr 27, 2010 at 3:04 UTC
I have one vinyl record but no record player. Ha! It's for the novelty of it, but I do want a record player some day. Supposedly, vinyls produce better quality music, too.
Apr 27, 2010 at 3:26 UTC
Right now I'm listening to "Punky Reggae Party" from Bob Marley.
Oh yeah!
Me? Grace Potter and the Nocturnals "This is Somewhere".
Apr 27, 2010 at 3:35 UTC
Def Leppard
Apr 27, 2010 at 3:39 UTC
Over the weekend I found some old vinyl records from my dad in the attic. Good albums by the way. Santana, Queen, Beatles, MJ, Led Zep II III & some other ones. I found a old player online for $5 brand new in the box & a receiver for $20.
So now I'm able to listen to those old but good albums =b
Apr 27, 2010 at 7:23 UTC
I listen to a lot of underground hiphop. aesop rock - labor days is in my deck right now.
Apr 28, 2010 at 1:51 UTC
I buy MP3 or Vinyl. CD's aren't for me.
I think I have around 500 vinyls now. Mostly newer stuff but I have some classics in there too.
Apr 28, 2010 at 4:26 UTC
Local news radio!
I have a friend who doesn't listen to any music ...
def weird.
I couldn't live without music, it would just be an existence.
Apr 28, 2010 at 4:30 UTC
Breaking Benjamin and Rascal Flatts at the moment. Also a little Jason Maraz and Ari Hest.
Apr 28, 2010 at 4:41 UTC
Right now and without interruption: Pink Floyd´s Dark side of the moon.
Apr 28, 2010 at 5:09 UTC
Just loading my bosses iPad with his music collection, and currently listening to ABBA Gold.
ABBA, Queen, Status Quo had some of the best music from the 70's, and feature on my playlists.
Apr 28, 2010 at 7:54 UTC
Ivan, I just thought about the Quo at the weekend for some unknown reason. Popped into my head, I used to have a tape of one album and would listen to it on the 3 mile walk to work.
I'm just updating iTunes on the Mac, then I'll be listening to Dire Straits. Sudden jonesing based on an article in the paper about Mark Knopfler. Plus I have a plan that involves a Dire Straits song and our profession, stay tuned....
+1 for Jovani
@Magan, it's true. Vinyl is supposed to give a warmer feel to the music, plus there's just something about it.Putting the needle on the track, hearing the slight hiss then sweet, sweet music.Followed by the click, click, click at the end until you go and lift the arm.
I wish I had my dad's old record player, one of the box type portable ones from the late 60's or early 70's. Orange with the white removable lid, would play 33's, 45's and 78's. I have his collection of 78's but nothing to play them on. Unfortunately the copy of Ravel's Bolero was broken in storage, and I was heartbroken.
I need to get my vinyl digitised, either buy one of the USB turntables or I'll have to hook the DJ gear back up and do it that way.
Apr 28, 2010 at 8:31 UTC
At the time of this post, I was listening to Danny Schmidt. Brilliant little songwriter. But early this morning it was Rolling Stones and Snoop Dogg.. So take that all into consideration.
This discussion has been inactive for over a year.
You may get a better answer to your question by starting a new discussion. | https://community.spiceworks.com/topic/96853-what-are-you-spinning | CC-MAIN-2017-30 | refinedweb | 1,215 | 82.65 |
In A Module Far, Far Away Part 2
In the last installment, we talked about how changing a declaration in one module can unexpectedly change the behavior of another module, and how language features can mitigate that. Here are some more features of the D programming language designed for that purpose.
Final Switch
Given an enum declaration:
enum E { A, B, C }
and in the remote module there's a switch statement:
E e;
...
switch (e)
{ case A: ...
case B: ...
case C: ...
default: assert(0);
}
The declaration for E gets updated to add a member D:
enum E { A, B, C, D }
and the switch statement, which is supposed to handle all the possibilities of E, is now incorrect. At least our intrepid programmer has anticipated this and put in a default that asserts. But this identifies the problem at runtime, if the test suites are thorough. We'd prefer to catch it at compile time in a guaranteed manner.
Enter the final switch statement:
final switch (e)
{ case A: ...
case B: ...
case C: ...
}
In a final switch statement, all enum members must be represented in the case statements. A default statement has no point, and is not even allowed in a final switch. If we add an unrepresented member D, the compiler dings us in the final switch.
Override
Given a class C declared in one module:
class C { }
and another module declares class D that derives from C, and declares a virtual method foo():
class D : C { void foo(); }
Later, a method foo() is added to class C:
class C { void foo(); }
Now, the call to C.foo() gets inadvertently hijacked by D.foo(), which may be quite unrelated. The solution is to mark intentional overriding with the override keyword:
class B : A { override void bar(); }
Then, if a method overrides a base class method, but is not marked with override, the compiler issues an error.
Function Hijacking
In module A, there's a function:
void foo(long x);
Module C imports A, and B and calls foo() with an int argument:
import A;
import B;
...
foo(3);
Now, the designer of B, having no knowledge of A or that C imports A and B, adds the following declaration to B:
void foo(int x);
Suddenly, C.foo(3) is calling B.foo(3) because B.foo(int) is a better match for 3 than A.foo(long). B.foo(int) is said to have hijacked the call to A.foo(long). In D, such overloading across modules would generate a compile time error if a call from C matches functions from more than one import. Overloading across imports must be done intentionally, not by default, by using an alias declaration:
import A;
import B;
alias A.foo foo;
alias B.foo foo;
...
foo(3); // calls B.foo(int)
There's a lot more to function hijacking.
Conclusion
It's a worthy goal of language design to be able to prevent changes in declarations in one module from producing unexpected bad behavior in another. While I know of no way to eliminate all such cases, D makes some major steps in closing common loopholes.
If you want to learn more about how real compilers work, I am hosting
a seminar in the fall on compiler construction.
Thanks to Jason House and Don Clugston for their helpful comments on this. | http://www.drdobbs.com/architecture-and-design/in-a-module-far-far-away-part-2/228700109 | CC-MAIN-2015-35 | refinedweb | 561 | 70.94 |
Structure that contains all needed information for a parameter in a function. More...
#include <xlformula.hxx>
Structure that contains all needed information for a parameter in a function.
The member meValid specifies which application supports the parameter. If set to CALCONLY, import filters have to insert a default value for this parameter, and export filters have to skip the parameter. If set to EXCELONLY, import filters have to skip the parameter, and export filters have to insert a default value for this parameter.
The member mbValType specifies whether the parameter requires tokens to be of value type (VAL or ARR class).
If set to false, the parameter is called to be REFTYPE. Tokens with REF default class can be inserted for the parameter (e.g. tAreaR tokens). If set to true, the parameter is called to be VALTYPE. Tokens with REF class need to be converted to VAL tokens first (e.g. tAreaR will be converted to tAreaV), and further conversion is done according to this new token class.
The member meConv specifies how to convert the current token class of the token inserted for the parameter. If the token class is still REF this means that the token has default REF class and the parameter is REFTYPE (see member mbValType), the token will not be converted at all and remains in REF class. Otherwise, token class conversion is depending on the actual token class of the return value of the function containing this parameter. The function may return REF class (tFuncR, tFuncVarR, tFuncCER), or it may return VAL or ARR class (tFuncV, tFuncA, tFuncVarV, tFuncVarA, tFuncCEV, tFuncCEA). Even if the function is able to return REF class, it may return VAL or ARR class instead due to the VALTYPE data type of the parent function parameter that calls the own function. Example: The INDIRECT function returns REF class by default. But if called from a VALTYPE function parameter, e.g. in the formula =ABS(INDIRECT("A1")), it returns VAL or ARR class instead. Additionally, the repeating conversion types RPT and RPX rely on the conversion executed for the function token class.
1) ORG: Use the original class of the token (VAL or ARR), regardless of any conversion done for the function return class. 2) VAL: Convert ARR tokens to VAL class, regardless of any conversion done for the function return class. 3) ARR: Convert VAL tokens to ARR class, regardless of any conversion done for the function return class. 4) RPT: If the own function returns REF class (thus it is called from a REFTYPE parameter, see above), and the parent conversion type (for the function return class) was ORG, VAL, or ARR, ignore that conversion and always use VAL conversion for the own token instead. If the parent conversion type was RPT or RPX, repeat the conversion that would have been used if the function would return value type. If the own function returns value type (VAL or ARR class, see above), and the parent conversion type (for the function return class) was ORG, VAL, ARR, or RPT, repeat this conversion for the own token. If the parent conversion type was RPX, always use ORG conversion type for the own token instead. 5) RPX: This type of conversion only occurs in functions returning VAL class by default. If the own token is value type, and the VAL return class of the own function has been changed to ARR class (due to direct ARR conversion, or due to ARR conversion repeated by RPT or RPX), set the own token to ARR type. Otherwise use the original token type (VAL conversion from parent parameter will not be repeated at all). If nested functions have RPT or value-type RPX parameters, they will not repeat this conversion type, but will use ORG conversion instead (see description of RPT above). 6) RPO: This type of conversion is only used for the operands of all operators (unary and binary arithmetic operators, comparison operators, and range operators). It is not used for function parameters. On conversion, it will be replaced by the last conversion type that was not the RPO conversion. This leads to a slightly different behaviour than the RPT conversion for operands in conjunction with a parent RPX conversion.
Definition at line 276 of file xlformula.hxx.
Token class conversion type.
Definition at line 280 of file xlformula.hxx.
Parameter validity.
Definition at line 279 of file xlformula.hxx.
Definition at line 278 of file xlformula.hxx. | https://docs.libreoffice.org/sc/html/structXclFuncParamInfo.html | CC-MAIN-2020-40 | refinedweb | 745 | 52.8 |
Mozilla.org Releases Protozilla 155
An anonymous reader wrote in to tell us about Protozilla's release. "Protozilla enables Mozilla to execute any CGI program on the local disk directly, without passing it through an HTTP server." Its a strange little idea that could definitely simplify development.
When and why? (Score:1)
I am puzzled, aren't the developers aware that there are slightly more pressing matters to tie up than think up "tricks". I do not want to be appear harsh but I have come to think of this mozilla group as being a bunch of developers who imagine membership of the club is an end in itself. The only products released or discussed are tools to enable rapid development. Something they seem singularly unable of doing themselves. (gulp, I suspect I may be bitten for these thoughts)
Re:Philosophy (Score:1)
Re:Not a New Idea, but Not Widespread (Score:1)
Good isn't it. Just as virtually every other app on the Linux desktop is converging onto either the KDE or GNOME widget sets, Mozilla intoduces a new proprietary way to do things, totally seperate to anything else.
Now that's what I call forward thinking (NOT).
Hopefully Konqueror will continue to evolve to the point where Mozilla is irrelevant; and Galleon will do the same for the GNOME camp. Both projects have Email/Groupware clients that are superior to the "extra" bundled Mozilla features anyway.
Ok, so this is old news, and my bitching won't re-write history. But I've not voiced my thoughts about this in the internet before
Macka
Re:Keep It Simple, Stupid (Score:1)
It's time people realize that it makes no sense whining about the work other people do for free to provide software they want or need, and expect those people to work on something that matters less for them.
Re:Merely the tip of the development iceberg! (Score:1)
Any idea how extensible this is? (Score:1)
I've looked into Jini lately and that seems to be quite interesting. I just wondered, could this be a way to use Jini based services on net via browers. There aren't probably any yet, but plugging Jini -services to brower might by a killer. Jini might be one good technique for doing 2nd generation Internet services.. Services that are dynamic, not-flashy-html-www stuff which makes it real hard to actually USE the information on the net for anything else except human browsing.. Well this might be quite far feched, but I'd say that anyone who has thought these things might have some clue about what I'm talking about..
Re:So Mozilla is the center of the I/O universe? (Score:1)
And if that matters, it's trivial to split the connection management into a separate daemon.
Re:Can we say "feature bloat"? (Score:1)
> I'm annoyed by all the people that just whine;
> help out with something god damnit!
Why should we? Quite frankly you deserve a good roasting for taking what should have been an MS killer, then sitting on it and fiddling with the engine; adding bigger wheels, better spoilers, windscreen wipers, go faster stripes and fluffy dice
When you eventually ship V1.0, you'll deliver a product that will be the Open Source equivelant of MS Word. i.e. 10% of the features will be used 90% of the time. But that won't matter, because so many people will have settled on IE, or will be getting by with Konqueror, Gallion, or Opera that Mozilla will make little more than a plop, never mind a splash.
If this all sounds harsh, then it's meant to be, because I'm annoyed, and because I have a right to be. If I'd know it was going to take this long 2 years ago I'd have invested the time to learn C++ and chipped in
Macka
Re:How irrelevant and useless! (Score:1)
Re:Merely the tip of the development iceberg! (Score:1)
Doesn't it strike you that Mozilla is actually competing with the KDE & GNOME projects here? Tell me why this is a good thing?
Macka:Keep It Simple, Stupid (Score:1)
They are ! If you'd read the article you would've seen it was being developed by mozdev, not by the Mozilla team.
As MKB says, I'm surprised I have to explain this.
;-)
Prior art: x-exec: (Score:1)
Anyhow, you can read all about it at [cs.ubc.ca].
Yes,we need rtsp:// napster://, freenet://, mojo:/ (Score:1)
Years ago, netscape had "all" the protocols:
ftp,http,gopher,and mail.
Now we have many streaming and file sharing protocols which are cludged into netscape somehow.
If mozilla fixed this and had protocol plugins, life would be great.
Re:security (Score:1)
Sure.
localcgi:/dos/format?c%3A [localcgi]
Re:Not just for local CGIs (Score:2)
Does it have to be only for development? Assuming it can be done safely, imagine using local CGI scripts as an alternative to local shell scripts. This becomes particularly relevant for your casual users, epsecially as a means of establishing Linux as an OS for the computer novice. Imagine J. Random User being able to use Mozilla as their program launcher -- everyone and their mothers've already learned how to more or less use web browsers.
And using the web browser as an interface is certainly not a new idea. Even before IE sprung up (and the infamous "The web browser is part of the OS" statement along with it), we had software packages like SATAN [fish.com] doing this back in early '95. And if we look at the web browser abstractly, as a mechanism that allows files to be selected, retrieved, and viewed, its origins can be traced back to products like Norton Commander.
Re:security (Score:1)
I think that is actually the whole point. If you can rm -rf so can any mischievous web page author over whose sorry ass^H^H^Hpage you might stumble. And that's a bad thing. This kind of security is about securing the client against the server, not the other way round. Thus "securing ports" or whatever is entirely irrelevant here. The only port to secure would be outgoing 80. And if you do that, you basically shut down any browsing...
Mozilla is dead. (Score:1)
anybody else scared? (Score:1)
ack!
________
Re:At first glance... (Score:1)
Cool! (Score:1)
-Moondog
Re:security (Score:1)
ActiveX (Score:1)
Seems that people that don't like ActiveX shouldn't be to happy with this new feature. But it has worked well in IE for 3 years.
Question about this. (Score:1).
Re:Internet Explorer can (Score:1)
well, I think it's a good idea, therefore it is. (Score:1)
Re:WOW! (Score:2)
Zontar The Mindless,
Re:Not just for local CGIs (Score:2)
Of course, it's a security nightmare as you couldn't tell where the file had come from. Perhaps the files could use some form of authentication. Hmm. Yes, for example, NT users could "sign" launching controls then, on a company based intranet, they could launch programs as required from any networked machine. In unix, it could be used to launch programs running suid the creater of the launch control.
Rich
Re:Not a New Idea, but Not Widespread (Score:2)
Zontar The Mindless,
Re:Not just for local CGIs (Score:2)
True, although the impression I got was that this framework would provide a nice helper app to do the magic for us. Furthermore, a CGI-based scheme would allow for easily porting apps from intranet use to local use and vice-versa. Finally, something that delves in to the realm of figuring out when to properly execute content that's trusted is something that I, personally, would feel less than comfortable writing. I would much prefer a system with some peer review.
security (Score:1)
---
Ryan Wilhelm
"Official" response to comments on Protozilla (Score:1)
To clear up some misconceptions, here's a response to some of the comments on Protozilla:
-Protozilla is not an "official" mozilla.org project. It is hosted at mozdev.org, as evident from the URL. (It is not the intent of Protozilla to delay the development of a viable Mozilla-based browser, which is proceeding at its own pace.)
-"Client-side CGI" is just one of Protozilla's features, and by no means the most important. As the name susggests, Protozilla is about implementing new protocols easily in Mozilla.
-Can the "client-side CGI" be used to maliciously access your local files etc.?
Protozilla is carefully designed to prevent this. The client-side CGI feature may only be used to execute files residing within the user's profile directory, which should be inaccessible to malicious web scripts. Furthermore, the request to execute the file is a special "restricted" URL which can only be loaded by the user typing it in in a special URL box (or from a privileged script). Unprivileged scripts downloaded from the web cannot load this URL. Nor can the URL be loaded by a "dumb" user clicking a malicious link on a web page. (Only executables which are specifically designated as implementing "public" protocols will be accessible to web page scripts through general-purpose URLs.)
However, any new functionality does open up the possibility of exploits and Protozilla is far from being fully tested/audited. So use it with care!
-Some posters on slashdot pointed out "prior art". These are useful to put Protozilla in context. Here are the links:
Pluggable protocol handlers in IE (
u ggable/overview/overview.asp)
Asynchronous pluggable protocols enable developers to create pluggable protocol handlers, MIME filters, and namespace handlers that work with Microsoft Internet Explorer 4.0 and later and a URL moniker.
W3M (
t ml)
A lot of browsers try to do everything in one program - W3M does exactly the opposite by calling external programs whenever possible. To make this easier it contains a "local CGI" mechanism that is capable of running CGI scripts locally without the help of a web server.
Jellybean ()
Jellybean is a Perl Object Server with an HTTP interface, based upon an idea by Jon Udell.
MMM ()
local CGIs [...] providing cheap and sophisticated MMM interfaces for applications.
Re:Internet Explorer can (Score:1)
Re:When and why? (Score:2)
Lots of people (particularly Netscape people) are already working on Mozilla's "pressing matters", and they are making huge strides.
And as others have pointed out, this isn't even an official mozilla.org project.
my first thought (Score:1)
Not really a new idea (Score:4)
Re:security (Score:2)
Re:CGI is dead (Score:1)
PHP is a fossil, a relic of the late-90's
As is C++ (flamebait!!)
Doh! (Score:1)
Re:Speaking of large things (Score:2)
Re:CGI is dead (Score:2)
Do you program at all?
PHP is a language.
"CGI" is NOT a language.
PHP on many virtual hosting environments is running in CGI mode.
Please put a bit more thought into the next post before a knee-jerk post like this. "PHP is great, CGI is bad!". It's not even apples v. oranges, because at least both of those are fruits.
Re:Ok, but don't expect big impact (Score:1)
Having said that I still question the value of this for testing, as someone else pointed out it if it doesnt mirror the server you are going to use then you still might have to make changes when you upload it.
I run apache with PHP,SSI,CGI support on my p133 40MB linux box and it works great so i'm not sure of the value of protozilla (especially given the resource requirements of mozilla!)
this sounds a little dangerous (Score:1)
What I'd like to see the mozilla team is to invent a browser that does not suck up all my system resources. I just want a browser. A simple browser that runs on UNIX / Linux. That handles html 4.0 as well as Java and JavaScript and can do netscape plugins, like real audio, mp3, midi, flash and wave files.
Mozilla
.7 was still to bloated to run at home, after installing the jvm. Personally I think that the jvm that they are using sucks butt. It launches about 30 threads that just take up all my memory. Why????
I don't want a lot, I just want it all!
Flame away, I have a hose!
Re:security (Score:1)
Your wish [slashdot.org] might come true...
--
FALSE (Score:2)
secure dynamic content creation in the case of
multiple users. mod_perl, mod_php, etc, do not
permit security boundaries between the users.
Using the term "CGI" was a bad idea for them... (Score:2)
Although the mozilla people mention using it to test CGI programs locally, that seems probably the worst use of this technology. MUCH more interesting would be to tie in existing code (perl, javascript, etc) into one cohesive app, and run it *locally* with the mozilla app as the interface. No need for a net connection at all - you could write apps in Perl and distribute them to be used with a standalone Mozilla machine. Yes it could be done now if you're also shipping a webserver, but this is less to install and maintain.
Think standalone kiosks for starters. I was given a demo of a standalone kiosk system over a year ago (never got off the ground). The machine it came with was an NT box with VB Scripts, SQL server and some other stuff - huge $$$. Yes, you could replicate all of this with Apache/Mysql, etc. This just seems to make it even easier. Rather than treating the browser as just a client, it becomes more integrated - it becomes the app itself. Also, by using this IPC stuff, my Perl scripts can do one thing, my javascripts can do something else, and the mozilla frontend would tie it together (that's my impression, anyway).
I personally am becoming disenchanted with the whole mozilla thing - yes all this stuff is cool, but I think we all just wanted a decent browser about a year ago. Yes, keep developing and adding on, but a small, quick browser (with a netscape 4.7 compatibility toggle switch!) would have helped stave off the decline of this browser technology.
FALSE (Score:2)
Re:nice idea... (Score:1)
Re:Internet Explorer can (Score:2)
Re:Not just for local CGIs (Score:2)
--
Re:security (Score:2)
> ass^H^H^Hpage you might stumble. And that's a bad thing. This kind of security is about securing the client against the server, not the
> other way round.
Hence my statement, ``Although it would be even safer if anything that ran in this wise ran in rsh as `nobody'." On one hand, a malicious application could no nothing more than writhe around in
All of this are just some random thoughts about this ``new feature". After all, it's Sunday, & I should have better things to concern myself on this day of rest than computers.
Yet I hope that the folks responsible for this ``new feature" weigh the plusses & minuses carefully: if they can't make it work without emasculating it due to security concerns, then don't bother diddling with this.
The reason is this: there's this company up in Redmond, WA that is eager to deliver us all of this k-rad k3wl software, but because security puts a crimp in all of their 3l33t featurez, they don't consider security. It crimps their style. And as a resutl knowledgeable computer users hate them.
Geoff
Re:How irrelevant and useless! (Score:1)
Ok, it's somewhat cool, but how about making Linux Netscape take less memory, and not crash every twenty pages before adding these new features?
The PC is Dead, Long Live the PC (Score:1)
I've been waiting for something like this! (Score:1)
Being able to do it right inside the web browser is a great idea. Now, lets just hope it isn't as buggy as JavaScript!
DON'T CLICK THAT LINK! (Score:1)
Sites REQUIRE java if run by fools. (Score:1)
It is foolish to write a site that depends on java. That mistake is right up there with using Microsoft tools that only display properly on Microsoft browsers. (Unless you're Microsoft, of course. For them it's good marketing.)
One big reason is that a significant fraction of the potential audience browses with java and javascript disabled due to concern over security flaws. (Given that there's a netscape hole that lets a hostile site set up a server on YOUR machine to publish every file you can read, AND notify the hostile site that this is up and running, it's a reasonable concern. B-) )
So if you want a web site to reach the max audience, either forget java or provide a non-java alternate functionality.
CGI runs on the server, so you only depend on the client browser's ability to display.
Re:It is a nice idea. (Score:1)
Now personally, is this Mozilla idea a good one? Probably not, only a serious developer would need this, and a serious developer already has a webserver on their LAN. And if you are worried about being on the road, make the web server accessible via SSL and some type of login method. If you don't wanna do that, put apache on your web server. On my pentium 75 laptop, with 16 megs of ram, it only takes
Ohh wait, are you complaining that a web server is too hard to setup with ssl?
cd
cd
damn, that was too much effort.
not mozilla.org - mozdev.org! (Score:4)
not a mozilla.org release (Score:1)
Re:client-side CGI defeats the purpose, damn idiot (Score:1).
Merely the tip of the development iceberg! (Score:2)
While many readers have taken pains to point out that this is really a mozdev project, and others have opined that this is great or just a yawn, we may have missed the overall point here..
Since mozilla's architechture is open and documentated, we are begininng to see more and more projects (been to mozdev lately?) that are extending the traditional "web browser" into something we cannot even fully comprehend yet.
Mozilla itself may not be ready for prime time, but the *concept* of a stable base on which to build other nifty tools is.. well.. like LINUX itself.
Way to go mozilla team. Hopefully next year, we wont have to have these "its too bloated" and "no its not, its our savior" arguments anymore - we can just sit and surf like we should.
..Brent
"We should not enthrone ignorance simply because there is so much of it."
Re:nice idea... (Score:1)
Oh no ! Another feature ! (Score:1)
Oh goodie...... (Score:1)
Re:Sites REQUIRE java if run by fools. (Score:1)
Wrong (Score:3)
Can we say "feature bloat"? (Score:2).
This happens in a lot of volunteer organizations. In one organization that I belong to, we rotate cooking a meal before the meeting. We can generally find someone to cook, but it's very difficult to get people to clean. Why? Because cooking is a kind of "glory" job; if you do it right, you'll get compliments and thanks. Cleaning, on the other hand, is just as necessary, but people that do the cleaning aren't noticed or thanked.
So, in closing, I'd like to thank all of the under-appreciated people who make Mozilla a _browser_. And I'd like to tell all of the people who are busy bloating the hell out of it before it even gets out of beta to STOP killing a great product. If you really want to help, work on the rendering code, or the Javascript interpreter. Heck, just use the browser and submit bug reports so that they're found and fixed faster. Just stop killing on of the few alternative browsers that are available.
Good idea... (Score:2)
Re:Not just for local CGIs (Score:2)
Actually, in mozilla, that's built in. Try finger:raduffy@idsoftware.com [finger]
--
How this article should have read: (Score:2)
An anonymous reader wrote in to tell us about Protozilla's first alpha release. "Protozilla enables Mozilla to execute any CGI program on the local disk directly, without passing it through an HTTP server. It also allows stateless interprocess communication, the use of external programs as protocol handlers (telnet, ping, etc.), and the use of local-only pseudo-URLs (similar to about:)." This is a project by independent developers unconnected to the Mozilla browser effort that adds a lot of neat functionality.
Re:FALSE? (Score:2)
And as much as everyone rags on Java speed, Servlets are far and away faster than CGI.
w3m does this already! (Score:2)
FALSE? (Score:2)
I suppose you could run the HTTPd as root and use the HTTP Basic Authentication info to su, but then you're running your web server as root, which is considerably less secure than running it as an unprivileged user.
Re:nice idea... (Score:2)
So the parent is misinformative.
Re:It is a nice idea. (Score:2)
If you want to see what CGI really means and what is CGI and what is not CGI, please refer to the CGI spec [uiuc.edu]. CGI refers to an interface that requires a set of environment variables to be set, passes in POST and PUT information via stdin, and returns HTTP response results on stdout.
This allows almost any language to be used to write CGI programs (C, perl, tcl, bash, whatever you want). But it doesn't imply that every interface to the HTTP protocol is CGI.
Re:Internet Explorer can (Score:2)
(Unless you're running Halcyon's Java-based ASP engine under Apache Tomcat, but that's just the first step on a road to madness.).
--
Re:nice idea... (Score:2)
Re:this sounds a little dangerous (Score:2)
You do?? Shit, I don't think netscape/aol got word of this, I'll get on the horn to them right away. I'll say, "damn it, josepha48 just wants a browser, what are you guys doing!!"
Netscape does not follow the average hacker's agenda or requirements. It has a design, that includes a mail client, composer, etc, and thats what they make. Does it matter that the mozilla includes these things? If you dont like them, dont use them. It's not as though the mail client is resident in memory if you're not using it, just the browser is. If you're going to argue that they are wasting development effort on the other things, thats wrong too, because they have plenty of people working on each component. If everyone at netscape was working on just the browser, jack shit would get done.
As for the plugins, Edit, Preferences, Navigator, Helper Applications. Configure your normal apps for those things. Additionally, the Netscape 4.x flash plugin works under mozilla. Just copy it to the plugins/ directory.
(I'm not blind to mozilla's performance woes, however. But blame that on lack of usage of native widgetry, and usage of XUL.)
--
nice idea... (Score:2)
mod_php, mod_perl, mod_python, zope, roxen,
greetings, eMBee.
--
Excellent idea. (Score:2)
It doesnt seem to be in Mozilla yet, after reading the article, and tinkering with my new build, but still a wonderful idea. But how can it interact with other files that need to be on the server that you dont have? And what if you dont use absolute URLs? Im curious to see how it handles stuff like this.
Mozilla is really getting stable, I know some peoples opinions of Mozilla are tarnished, but seriously, give it a try, its come a long way in the past 6 months, I havnt used anything else in months. And please dont compare the current Mozilla tree to Netscape6, They are not the same thing. Netscape took Mozilla M18 (which is old nowadays) and messed up a very decent product. Try out the nightlies, then if you want to flame it, your at least qualified to do so.
And lets not forget that Mozilla 0.8 is supposed to be released the first week of Febuary, 1.0 is expected as early as Mid-April. We're almost there!!
Re:security (Score:2)
Well, you know that if some other big company introduced it as a feature for their browser, everyone would be all over it in a heartbeat. Can you say "format c:"?
Fortunately, it is something that you have to actively seek out. It is not pre-packaged.
And you would suppose that developers would be up to speed on security and protection vs hackers and kiddies and industrial espionage
It is likely not to be broadly used by the public at large. Not until someone includes it in the public version of their browser.
Maybe MS will include it in the next version of their browser. One could only hope?
How irrelevant and useless! (Score:2)
And how well will you be testing your CGI, if you're not running it in the same (apache/thttpd/whatever) environment as the real server? You'll probably end up wasting more time modifying your code after the fact than it would take to set up a local web server!
Wow, I must be in a bad mood today. ;).
----------
Re:client-side CGI defeats the purpose, damn idiot (Score:2)
//rdj
Re:HotJava (Score:2)
--
Re:It is a nice idea. (Score:2)
Correct.
All web languages use CGI, java, mod_perl, mod_python, everything.
Incorrect. There exist several other interfaces to use for dynamic content generation. ISAPI, NSAPI, and fastCGI are all faster alternatives.
When you put text in a textbox, and hit submit, thats normally CGI.
OK, you're quite some way from the truth now. When you put text in a text box and hit submit, you are performing a HTTP GET or HTTP POST. Whether the web server then uses CGI or fastCGI to interface with an out of process executable, or one of the many ways of dealing with the request in-process, has nothing to do with your form.
(unless the form uses mail, or whatnot).
You've finally lost me there. Could you explain how a form can "use mail". Surely you aren't talking about hyperlinks to mailto: URLs, which have nothing to o with forms?:FALSE? (Score:2)
CGIwrap, Apache's suexec, etc support this via setuid binaries. Zeus has some sort of CGI spawning daemon. The webserver itself need not and should not run as root. One or the other method should work for almost any webserver which runs on UNIX.
Re:security (Score:4)
Interesting point, now that I have thought thru your question, & read the source page. What they wrote at Mozilla is:
>.:security (Score:2)
(secure Linux, here we come!)
`ø,,ø!
Re:nice idea... (Score:3)
without CGI, no PHP (Score:2)
But you should see CGI as a low-level protocol (the Common Gateway Interface) for transferring data, not as "a webscripting environment for Perl".
And you should (definitely) see PHP as a high-level language using the CGI protocol internally (to transfer form data, mostly).
I guess it's valid to compare the difference between PHP and plain CGI to the difference between Bonobo and plain CORBA (for as far as I know Bonobo, this seems quite a useful comparision).
It's... It's...
Not Mozilla... but mozdev.. still awesome. (Score:2)
Protozilla is great stuff. There is some really cool stuff you can do. For example you can write javascript or a bash script within Mozilla to do crazy stuff.
I created a cups:// protocol for the Common Unix Printing System. Basically since cups runs on a non-standard port I can just do a :
cups://localhost
which is cleaner IMO.
There are some significant security concepts here. Your web application could use XPCOM and XSLT to build a full web application BUT use different users to request subsets of the same content.
For example... My primary psuedonym could request the first part of my document (cars) then on the second part it could request contra-band like DeCSS et al. This without having my car psuedonym exposed.
Good stuff. Here comes the semantic web!
Great for file sharing. (Score:2)
Internet Explorer can (Score:4) | https://slashdot.org/story/01/01/28/151234/mozillaorg-releases-protozilla | CC-MAIN-2017-13 | refinedweb | 4,792 | 72.97 |
1. Introduction
In this short article, we will see packing multiple SQL statements in SqlCommand and process it through the SqlDataReader object. The previous article on ado.net already made you familiar with Connection, Command and Reader objects. Hence, we will concentrate on processing multiple results.
Have a look at the below picture. There are three result sets returned by the SqlCommand and the SQLDataReader object processes all of them. The Read method reads records of the single result set and the when there is no record to read the method return false stating that. Similarly, the NextResult method of the SqlDataReader iterates through the result sets and returns false when there is no more to read.
You can use this technique to avoid multiple hits to the database. In our example, we process three results one at a time avoiding multiple hits to the database.
2. About the Example
The below screen shot shows the example we are going to create:
The example retrieves the data from the SQL Server sample database Pubs. A total number of authors queried from the table authors is displayed in a label control marked as 1 and author name from the same table is displayed in the combo box item marked as 2. The list box marked as 3 displays all store names by querying the table stores from the Pubs database. When Get Data button is clicked (Marked as 4), all the data is retrieved through a single SqlCommand formed by three SQL statements.
3. Making the Example
The below video explains making the sample application:
Video 1: Making the Sample App
4. Code Explanation
1) A using statement is placed at the top of form code file frmResults.cs and the code is given below:
//Sample 01: Using Statements
using System.Data.SqlClient;
2) Click event for the “Get Data” button is handled and in the handler, SqlConnection object is created which tells how the application can make a successful connection to the ‘SQL Server Pubs’ database. Note that the connection string is referred from the application settings like “Properties.Settings.Default.PubsConstr”. Making the connection string can be referred in the video mentioned below the code snippet.
//Sample 02: Open connection to Pub Db of Sql Server
SqlConnection PubsDbCon = new SqlConnection(Properties.Settings.Default.PubsConstr);
PubsDbCon.Open();
Video 2: Forming the connection string
3) After we have a valid connection object, SqlCommand object is created. Once SqlCommand object is created, a single string containing three SQL queries is supplied to it through its property CommandText and the same way database connection also supplied through the property Connection. Note that the SQL queries are separated by the semi-colon. Preparing the SqlCommand object is shown in the below code:
//Sample 03: Form Multiple Single Command for More than one Query
String sqlQuery = "Select count(au_id) as TotAuthors from authors;" +
"Select Au_fname + ' ' + Au_lname as FullName from authors;" +
"Select stor_name from stores;";
SqlCommand MultiCmd = new SqlCommand();
MultiCmd.Connection = PubsDbCon;
MultiCmd.CommandText = sqlQuery;
4) The call to ExecuteReader on the SqlCommand object returns the SqlDataReader object. Since the SqlCommand contains three SQL select statements there will be three corresponding result set objects. Below is the code, which retrieves the reader object:
//Sample 04: Open the Reader and Iterate through all three result sets
SqlDataReader ReaderMultiSet = MultiCmd.ExecuteReader();
5) Once we have the reader in hand, we can retrieve all the data returned as three separate result sets. To iterate through these results sets, make a call to the NextResult method and this method moves the reader to the next valid result set. When there is no result to process, the methods returns false. This will be useful if you want to form a while loop based on the returned value. In our example, we are not using the loops. Once your reader is at the required result set you can read the individual record from the result set by making the call to Read() method on the SqlDataReader object. Note that the Result sets are ordered in the same order it was given to the SqlCommand object. In our case, the first result set is, Total authors (One Record), the next result is a list of authors and the final one is the list of stores. Have a look at the picture at the Introduction section again to have a better understanding. Below is the piece of code, which iterates through the records on each result sets:
//4.1: Process First Result Set.
bool ret = ReaderMultiSet.Read();
if (ret == true)
lblTotAuthors.Text = ReaderMultiSet["TotAuthors"].ToString();
//4.2: Retrive List of Authors from Next Result set
bool ResultExits = ReaderMultiSet.NextResult();
if (ResultExits == true)
{
while (ReaderMultiSet.Read())
{
string AuthorName = ReaderMultiSet["FullName"].ToString(); ;
cmbAuthors.Items.Add(AuthorName);
cmbAuthors.SelectedIndex = 0;
}
}
//4.3: Retrive List of Stores from Next Result set
ResultExits = ReaderMultiSet.NextResult();
if (ResultExits == true)
{
while (ReaderMultiSet.Read())
{
string StoreName = ReaderMultiSet["stor_name"].ToString(); ;
lstBStores.Items.Add(StoreName);
}
}
5. Running the Example
To run the example you need Pubs sample database, visit the page to get the sample database. Visit this video to know creating the Connection string. The below video shows running the Example:
Leave your comment(s) here. | http://www.mstecharticles.com/2015/04/adonet-processing-multiple-result-set.html | CC-MAIN-2017-17 | refinedweb | 863 | 55.44 |
(For more resources on Python, see here.)
Introduction
This article will show you how to do various transforms on both chunks and trees. The chunk transforms are for grammatical correction and rearranging phrases without loss of meaning. The tree transforms give you ways to modify and flatten deep parse trees.
The functions detailed in these recipes modify data, as opposed to learning from it. That means it's not safe to apply them indiscriminately. A thorough knowledge of the data you want to transform, along with a few experiments, should help you decide which functions to apply and when.
Whenever the term chunk is used in this article, it could refer to an actual chunk extracted by a chunker, or it could simply refer to a short phrase or sentence in the form of a list of tagged words. What's important in this article is what you can do with a chunk, not where it came from.
Filtering insignificant words
Many of the most commonly used words are insignificant when it comes to discerning the meaning of a phrase. For example, in the phrase "the movie was terrible", the most significant words are "movie" and "terrible", while "the" and "was" are almost useless. You could get the same meaning if you took them out, such as "movie terrible" or "terrible movie". Either way, the sentiment is the same. In this recipe, we'll learn how to remove the insignificant words, and keep the significant ones, by looking at their part-of-speech tags.
Getting ready
First, we need to decide which part-of-speech tags are significant and which are not. Looking through the treebank corpus for stopwords yields the following table of insignificant words and tags:
Other than CC, all the tags end with DT. This means we can filter out insignificant words by looking at the tag's suffix.
How to do it...
In transforms.py there is a function called filter_insignificant(). It takes a single chunk, which should be a list of tagged words, and returns a new chunk without any insignificant tagged words. It defaults to filtering out any tags that end with DT or CC.
def filter_insignificant(chunk, tag_suffixes=['DT', 'CC']):
good = []
for word, tag in chunk:
ok = True
for suffix in tag_suffixes:
if tag.endswith(suffix):
ok = False
break
if ok:
good.append((word, tag))
return good
Now we can use it on the part-of-speech tagged version of "the terrible movie".
>>> from transforms import filter_insignificant
>>> filter_insignificant([('the', 'DT'), ('terrible', 'JJ'), ('movie',
'NN')])
[('terrible', 'JJ'), ('movie', 'NN')]
As you can see, the word "the" is eliminated from the chunk.
How it works...
filter_insignificant() iterates over the tagged words in the chunk. For each tag, it checks if that tag ends with any of the tag_suffixes. If it does, then the tagged word is skipped. However if the tag is ok, then the tagged word is appended to a new good chunk that is returned.
There's more...
The way filter_insignificant() is defined, you can pass in your own tag suffixes if DT and CC are not enough, or are incorrect for your case. For example, you might decide that possessive words and pronouns such as "you", "your", "their", and "theirs" are no good but DT and CC words are ok. The tag suffixes would then be PRP and PRP$. Following is an example of this function:
>>> filter_insignificant([('your', 'PRP$'), ('book', 'NN'), ('is',
'VBZ'), ('great', 'JJ')], tag_suffixes=['PRP', 'PRP$'])
[('book', 'NN'), ('is', 'VBZ'), ('great', 'JJ')]
Filtering insignificant words can be a good complement to stopword filtering for purposes such as search engine indexing, querying, and text classification.
Correcting verb forms
It's fairly common to find incorrect verb forms in real-world language. For example, the correct form of "is our children learning?" is "are our children learning?". The verb "is" should only be used with singular nouns, while "are" is for plural nouns, such as "children". We can correct these mistakes by creating verb correction mappings that are used depending on whether there's a plural or singular noun in the chunk.
Getting ready
We first need to define the verb correction mappings in transforms.py. We'll create two mappings, one for plural to singular, and another for singular to plural.
plural_verb_forms = {
('is', 'VBZ'): ('are', 'VBP'),
('was', 'VBD'): ('were', 'VBD')
}
singular_verb_forms = {
('are', 'VBP'): ('is', 'VBZ'),
('were', 'VBD'): ('was', 'VBD')
}
Each mapping has a tagged verb that maps to another tagged verb. These initial mappings cover the basics of mapping, is to are, was to were, and vice versa.
How to do it...
In transforms.py there is a function called correct_verbs(). Pass it a chunk with incorrect verb forms, and you'll get a corrected chunk back. It uses a helper function first_chunk_index() to search the chunk for the position of the first tagged word where pred returns True.
def first_chunk_index(chunk, pred, start=0, step=1):
l = len(chunk)
end = l if step > 0 else -1
for i in range(start, end, step):
if pred(chunk[i]):
return i
return None
def correct_verbs(chunk):
vbidx = first_chunk_index(chunk, lambda (word, tag): tag.
startswith('VB'))
# if no verb found, do nothing
if vbidx is None:
return chunk
verb, vbtag = chunk[vbidx]
nnpred = lambda (word, tag): tag.startswith('NN')
# find nearest noun to the right of verb
nnidx = first_chunk_index(chunk, nnpred, start=vbidx+1)
# if no noun found to right, look to the left
if nnidx is None:
nnidx = first_chunk_index(chunk, nnpred, start=vbidx-1, step=-1)
# if no noun found, do nothing
if nnidx is None:
return chunk
noun, nntag = chunk[nnidx]
# get correct verb form and insert into chunk
if nntag.endswith('S'):
chunk[vbidx] = plural_verb_forms.get((verb, vbtag), (verb, vbtag))
else:
chunk[vbidx] = singular_verb_forms.get((verb, vbtag), (verb,
vbtag))
return chunk
When we call it on a part-of-speech tagged "is our children learning" chunk, we get back the correct form, "are our children learning".
>>> from transforms import correct_verbs
>>> correct_verbs([('is', 'VBZ'), ('our', 'PRP$'), ('children',
'NNS'), ('learning', 'VBG')])
[('are', 'VBP'), ('our', 'PRP$'), ('children', 'NNS'), ('learning',
'VBG')]
We can also try this with a singular noun and an incorrect plural verb.
>>> correct_verbs([('our', 'PRP$'), ('child', 'NN'), ('were', 'VBD'),
('learning', 'VBG')])
[('our', 'PRP$'), ('child', 'NN'), ('was', 'VBD'), ('learning',
'VBG')]
In this case, "were" becomes "was" because "child" is a singular noun.
How it works...
The correct_verbs() function starts by looking for a verb in the chunk. If no verb is found, the chunk is returned with no changes. Once a verb is found, we keep the verb, its tag, and its index in the chunk. Then we look on either side of the verb to find the nearest noun, starting on the right, and only looking to the left if no noun is found on the right. If no noun is found at all, the chunk is returned as is. But if a noun is found, then we lookup the correct verb form depending on whether or not the noun is plural.
Plural nouns are tagged with NNS, while singular nouns are tagged with NN. This means we can check the plurality of a noun by seeing if its tag ends with S. Once we get the corrected verb form, it is inserted into the chunk to replace the original verb form.
To make searching through the chunk easier, we define a function called first_chunk_ index(). It takes a chunk, a lambda predicate, the starting index, and a step increment. The predicate function is called with each tagged word until it returns True. If it never returns True, then None is returned. The starting index defaults to zero and the step increment to one. As you'll see in upcoming recipes, we can search backwards by overriding start and setting step to -1. This small utility function will be a key part of subsequent transform functions.
Swapping verb phrases
Swapping the words around a verb can eliminate the passive voice from particular phrases. For example, "the book was great" can be transformed into "the great book".
How to do it...
In transforms.py there is a function called swap_verb_phrase(). It swaps the right-hand side of the chunk with the left-hand side, using the verb as the pivot point. It uses the first_chunk_index() function defined in the previous recipe to find the verb to pivot around.
def swap_verb_phrase(chunk):
# find location of verb
vbpred = lambda (word, tag): tag != 'VBG' and tag.startswith('VB')
and len(tag) > 2
vbidx = first_chunk_index(chunk, vbpred)
if vbidx is None:
return chunk
return chunk[vbidx+1:] + chunk[:vbidx]
Now we can see how it works on the part-of-speech tagged phrase "the book was great".
>>> from transforms import swap_verb_phrase
>>> swap_verb_phrase([('the', 'DT'), ('book', 'NN'), ('was', 'VBD'),
('great', 'JJ')])
[('great', 'JJ'), ('the', 'DT'), ('book', 'NN')]
The result is "great the book". This phrase clearly isn't grammatically correct, so read on to learn how to fix it.
How it works...
Using first_chunk_index() from the previous recipe, we start by finding the first matching verb that is not a gerund (a word that ends in "ing") tagged with VBG. Once we've found the verb, we return the chunk with the right side before the left, and remove the verb.
The reason we don't want to pivot around a gerund is that gerunds are commonly used to describe nouns, and pivoting around one would remove that description. Here's an example where you can see how not pivoting around a gerund is a good thing:
>>> swap_verb_phrase([('this', 'DT'), ('gripping', 'VBG'), ('book',
'NN'), ('is', 'VBZ'), ('fantastic', 'JJ')])
[('fantastic', 'JJ'), ('this', 'DT'), ('gripping', 'VBG'), ('book',
'NN')]
If we had pivoted around the gerund, the result would be "book is fantastic this", and we'd lose the gerund "gripping".
There's more...
Filtering insignificant words makes the final result more readable. By filtering either before or after swap_verb_phrase(), we get "fantastic gripping book" instead of "fantastic this gripping book".
>>> from transforms import swap_verb_phrase, filter_insignificant
>>> swap_verb_phrase(filter_insignificant([('this', 'DT'),
('gripping', 'VBG'), ('book', 'NN'), ('is', 'VBZ'), ('fantastic',
'JJ')]))
[('fantastic', 'JJ'), ('gripping', 'VBG'), ('book', 'NN')]
>>> filter_insignificant(swap_verb_phrase([('this', 'DT'),
('gripping', 'VBG'), ('book', 'NN'), ('is', 'VBZ'), ('fantastic',
'JJ')]))
[('fantastic', 'JJ'), ('gripping', 'VBG'), ('book', 'NN')]
Either way, we get a shorter grammatical chunk with no loss of meaning.
(For more resources on Python, see here.)
Swapping noun cardinals
In a chunk, a cardinal word—tagged as CD—refers to a number, such as "10". These cardinals often occur before or after a noun. For normalization purposes, it can be useful to always put the cardinal before the noun.
How to do it...
The function swap_noun_cardinal() is defined in transforms.py. It swaps any cardinal that occurs immediately after a noun with the noun, so that the cardinal occurs immediately before the noun.
def swap_noun_cardinal(chunk):
cdidx = first_chunk_index(chunk, lambda (word, tag): tag == 'CD')
# cdidx must be > 0 and there must be a noun immediately before it
if not cdidx or not chunk[cdidx-1][1].startswith('NN'):
return chunk
noun, nntag = chunk[cdidx-1]
chunk[cdidx-1] = chunk[cdidx]
chunk[cdidx] = noun, nntag
return chunk
Let's try it on a date, such as "Dec 10", and another common phrase "the top 10".
>>> from transforms import swap_noun_cardinal
>>> swap_noun_cardinal([('Dec.', 'NNP'), ('10', 'CD')])
[('10', 'CD'), ('Dec.', 'NNP')]
>>> swap_noun_cardinal([('the', 'DT'), ('top', 'NN'), ('10', 'CD')])
[('the', 'DT'), ('10', 'CD'), ('top', 'NN')]
The result is that the numbers are now in front of the noun, creating "10 Dec" and "the 10 top".
How it works...
We start by looking for a CD tag in the chunk. If no CD is found, or if the CD is at the beginning of the chunk, then the chunk is returned as is. There must also be a noun immediately before the CD. If we do find a CD with a noun preceding it, then we swap the noun and cardinal in place.
Swapping infinitive phrases
An infinitive phrase has the form "A of B", such as "book of recipes". These can often be transformed into a new form while retaining the same meaning, such as "recipes book".
How to do it...
An infinitive phrase can be found by looking for a word tagged with IN. The function swap_infinitive_phrase(), defined in transforms.py, will return a chunk that swaps the portion of the phrase after the IN word with the portion before the IN word.
def swap_infinitive_phrase(chunk):
inpred = lambda (word, tag): tag == 'IN' and word != 'like'
inidx = first_chunk_index(chunk, inpred)
if inidx is None:
return chunk
nnpred = lambda (word, tag): tag.startswith('NN')
nnidx = first_chunk_index(chunk, nnpred, start=inidx, step=-1) or 0
return chunk[:nnidx] + chunk[inidx+1:] + chunk[nnidx:inidx]
The function can now be used to transform "book of recipes" into "recipes book".
>>> from transforms import swap_infinitive_phrase
>>> swap_infinitive_phrase([('book', 'NN'), ('of', 'IN'), ('recipes',
'NNS')])
[('recipes', 'NNS'), ('book', 'NN')]
How it works...
This function is similar to the swap_verb_phrase() function described in the Swapping verb phrases recipe. The inpred lambda is passed to first_chunk_index() to look for a word whose tag is IN. Next, nnpred is used to find the first noun that occurs before the IN word, so we can insert the portion of the chunk after the IN word between the noun and the beginning of the chunk. A more complicated example should demonstrate this:
>>> swap_infinitive_phrase([('delicious', 'JJ'), ('book', 'NN'),
('of', 'IN'), ('recipes', 'NNS')])
[('delicious', 'JJ'), ('recipes', 'NNS'), ('book', 'NN')]
We don't want the result to be "recipes delicious book". Instead, we want to insert "recipes" before the noun "book", but after the adjective "delicious". Hence, the need to find the nnidx occurring before the inidx.
There's more...
You'll notice that the inpred lambda checks to make sure the word is not "like". That's because "like" phrases must be treated differently, as transforming them the same way will result in an ungrammatical phrase. For example, "tastes like chicken" should not be transformed into "chicken tastes":
>>> swap_infinitive_phrase([('tastes', 'VBZ'), ('like', 'IN'),
('chicken', 'NN')])
[('tastes', 'VBZ'), ('like', 'IN'), ('chicken', 'NN')]
Singularizing plural nouns
As we saw in the previous recipe, the transformation process can result in phrases such as "recipes book". This is a NNS followed by an NN, when a more proper version of the phrase would be "recipe book", which is an NN followed by another NN. We can do another transform to correct these improper plural nouns.
How to do it...
transforms.py defines a function called singularize_plural_noun(), which will de-pluralize a plural noun (tagged with NNS) that is followed by another noun.
def singularize_plural_noun(chunk):
nnspred = lambda (word, tag): tag == 'NNS'
nnsidx = first_chunk_index(chunk, nnspred)
if nnsidx is not None and nnsidx+1 < len(chunk) and chunk[nnsidx+1]
[1][:2] == 'NN':
noun, nnstag = chunk[nnsidx]
chunk[nnsidx] = (noun.rstrip('s'), nnstag.rstrip('S'))
return chunk
Using it on "recipes book", we get the more correct form, "recipe book".
>>> from transforms import singularize_plural_noun
>>> singularize_plural_noun([('recipes', 'NNS'), ('book', 'NN')])
[('recipe', 'NN'), ('book', 'NN')]
How it works...
We start by looking for a plural noun with the tag NNS. If found, and if the next word is a noun (determined by making sure the tag starts with NN), then we de-pluralize the plural noun by removing an "s" from the right side of both the tag and the word.
The tag is assumed to be capitalized, so an uppercase "S" is removed from the right side of the tag, while a lowercase "s" is removed from the right side of the word.
Chaining chunk transformations
The transform functions defined in the previous recipes can be chained together to normalize chunks. The resulting chunks are often shorter with no loss of meaning.
How to do it...
In transforms.py is the function transform_chunk(). It takes a single chunk and an optional list of transform functions. It calls each transform function on the chunk, one at a time, and returns the final chunk.
def transform_chunk(chunk, chain=[filter_insignificant, swap_verb_
phrase, swap_infinitive_phrase, singularize_plural_noun], trace=0):
for f in chain:
chunk = f(chunk)
if trace:
print f.__name__, ':', chunk
return chunk
Using it on the phrase "the book of recipes is delicious", we get "delicious recipe book":
>>> from transforms import transform_chunk
>>> transform_chunk([('the', 'DT'), ('book', 'NN'), ('of', 'IN'),
('recipes', 'NNS'), ('is', 'VBZ'), ('delicious', 'JJ')])
[('delicious', 'JJ'), ('recipe', 'NN'), ('book', 'NN')]
How it works...
The transform_chunk() function defaults to chaining the following functions in order:
- filter_insignificant()
- swap_verb_phrase()
- swap_infinitive_phrase()
- singularize_plural_noun()
Each function transforms the chunk that results from the previous function, starting with the original chunk.
The order in which you apply transform functions can be significant. Experiment with your own data to determine which transforms are best, and in which order they should be applied.
There's more...
You can pass trace=1 into transform_chunk() to get an output at each step.
>>> from transforms import transform_chunk
>>> transform_chunk([('the', 'DT'), ('book', 'NN'), ('of', 'IN'),
('recipes', 'NNS'), ('is', 'VBZ'), ('delicious', 'JJ')], trace=1)
filter_insignificant : [('book', 'NN'), ('of', 'IN'), ('recipes',
'NNS'), ('is', 'VBZ'), ('delicious', 'JJ')]
swap_verb_phrase : [('delicious', 'JJ'), ('book', 'NN'), ('of', 'IN'),
('recipes', 'NNS')]
swap_infinitive_phrase : [('delicious', 'JJ'), ('recipes', 'NNS'),
('book', 'NN')]
singularize_plural_noun : [('delicious', 'JJ'), ('recipe', 'NN'),
('book', 'NN')]
[('delicious', 'JJ'), ('recipe', 'NN'), ('book', 'NN')]
This shows you the result of each transform function, which is then passed in to the next transform function until a final chunk is returned.
(For more resources on Python, see here.)
Converting a chunk tree to text
At some point, you may want to convert a Tree or sub-tree back to a sentence or chunk string. This is mostly straightforward, except when it comes to properly outputting punctuation.
How to do it...
We'll use the first Tree of the treebank_chunk as our example. The obvious first step is to join all the words in the tree with a space.
>>> from nltk.corpus import treebank_chunk
>>> tree = treebank_chunk.chunked_sents()[0]
>>> ' '.join([w for w, t in tree.leaves()])
'Pierre Vinken , 61 years old , will join the board as a nonexecutive
director Nov. 29 .'
As you can see, the punctuation isn't quite right. The commas and period are treated as individual words, and so get the surrounding spaces as well. We can fix this using regular expression substitution. This is implemented in the chunk_tree_to_sent() function found in transforms.py.
import re
punct_re = re.compile(r'\s([,\.;\?])')
def chunk_tree_to_sent(tree, concat=' '):
s = concat.join([w for w, t in tree.leaves()])
return re.sub(punct_re, r'\g<1>', s)
Using this function results in a much cleaner sentence, with no space before each punctuation mark:
>>> from transforms import chunk_tree_to_sent
>>> chunk_tree_to_sent(tree)
'Pierre Vinken, 61 years old, will join the board as a nonexecutive
director Nov. 29.'
How it works...
To correct the extra spaces in front of the punctuation, we create a regular expression punct_re that will match a space followed by any of the known punctuation characters. We have to escape both '.' and '?' with a '\' since they are special characters. The punctuation is surrounded by parenthesis so we can use the matched group for substitution.
Once we have our regular expression, we define chunk_tree_to_sent(), whose first step is to join the words by a concatenation character that defaults to a space. Then we can call re.sub() to replace all the punctuation matches with just the punctuation group. This eliminates the space in front of the punctuation characters, resulting in a more correct string.
There's more...
We can simplify this function a little by using nltk.tag.untag() to get words from the tree's leaves, instead of using our own list comprehension.
import nltk.tag, re
punct_re = re.compile(r'\s([,\.;\?])')
def chunk_tree_to_sent(tree, concat=' '):
s = concat.join(nltk.tag.untag(tree.leaves()))
return re.sub(punct_re, r'\g<1>', s)
Flattening a deep tree
Some of the included corpora contain parsed sentences, which are often deep trees of nested phrases. Unfortunately, these trees are too deep to use for training a chunker, since IOB tag parsing is not designed for nested chunks. To make these trees usable for chunker training, we must flatten them.
Getting ready
We're going to use the first parsed sentence of the treebank corpus as our example. Here's a diagram showing how deeply nested this tree is:
You may notice that the part-of-speech tags are part of the tree structure, instead of being included with the word. This will be handled next using the Tree.pos() method, which was designed specifically for combining words with pre-terminal Tree nodes such as part-of-speech tags.
How to do it...
In transforms.py there is a function named flatten_deeptree(). It takes a single Tree and will return a new Tree that keeps only the lowest level trees. It uses a helper function flatten_childtrees() to do most of the work.
from nltk.tree import Tree
def flatten_childtrees(trees):
children = []
for t in trees:
if t.height() < 3:
children.extend(t.pos())
elif t.height() == 3:
children.append(Tree(t.node, t.pos()))
else:
children.extend(flatten_childtrees([c for c in t]))
return children
def flatten_deeptree(tree):
return Tree(tree.node, flatten_childtrees([c for c in tree]))
We can use it on the first parsed sentence of the treebank corpus to get a flatter tree:
>>> from nltk.corpus import treebank
>>> from transforms import flatten_deeptree
>>> flatten_deeptree(treebank.parsed_sents()[0])
Tree('S', [Tree('NP', [('Pierre', 'NNP'), ('Vinken', 'NNP')]), (',',
','), Tree('NP', [('61', 'CD'), ('years', 'NNS')]), ('old', 'JJ'),
(',', ','), ('will', 'MD'), ('join', 'VB'), Tree('NP', [('the',
'DT'), ('board', 'NN')]), ('as', 'IN'), Tree('NP', [('a', 'DT'),
('nonexecutive', 'JJ'), ('director', 'NN')]), Tree('NP-TMP', [('Nov.',
'NNP'), ('29', 'CD')]), ('.', '.')])
The result is a much flatter Tree that only includes NP phrases. Words that are not part of a NP phrase are separated. This flatter tree is shown as follows:
This Tree is quite similar to the first chunk Tree from the treebank_chunk corpus. The main difference is that the rightmost NP Tree is separated into two sub-trees in the previous diagram, one of them named NP-TMP.
The first tree from treebank_chunk is shown as follows for comparison:
How it works...
The solution is composed of two functions: flatten_deeptree() returns a new Tree from the given tree by calling flatten_childtrees() on each of the given tree's children.
flatten_childtrees() is a recursive function that drills down into the Tree until it finds child trees whose height() is equal to or less than three. A Tree whose height() is less than three looks like this:
>>> from nltk.tree import Tree
>>> Tree('NNP', ['Pierre']).height()
2
These short trees are converted into lists of tuples using the pos() function.
>>> Tree('NNP', ['Pierre']).pos()
[('Pierre', 'NNP')]
Trees whose height() is equal to three are the lowest level trees that we're interested in keeping. These trees look like this:
>>> Tree('NP', [Tree('NNP', ['Pierre']), Tree('NNP', ['Vinken'])]).
height()
3
When we call pos() on that tree, we get:
>>> Tree('NP', [Tree('NNP', ['Pierre']), Tree('NNP', ['Vinken'])]).
pos()
[('Pierre', 'NNP'), ('Vinken', 'NNP')]
The recursive nature of flatten_childtrees() eliminates all trees whose height is greater than three.
There's more...
Flattening a deep Tree allows us to call nltk.chunk.util.tree2conlltags() on the flattened Tree, a necessary step to train a chunker. If you try to call this function before flattening the Tree, you get a ValueError exception.
>>> from nltk.chunk.util import tree2conlltags
>>> tree2conlltags(treebank.parsed_sents()[0])
Traceback (most recent call last):
File "<stdin>", line 1, in <module>
File "/usr/local/lib/python2.6/dist-packages/nltk/chunk/util.py",
line 417, in tree2conlltags
raise ValueError, "Tree is too deeply nested to be printed in
CoNLL format"
ValueError: Tree is too deeply nested to be printed in CoNLL format
However, after flattening there's no problem:
>>> tree2conlltags(flatten_deeptree(treebank.parsed_sents()[0]))
[('Pierre', 'NNP', 'B-NP'), ('Vinken', 'NNP', 'I-NP'), (',', ',',
'O'), ('61', 'CD', 'B-NP'), ('years', 'NNS', 'I-NP'), ('old', 'JJ',
'O'), (',', ',', 'O'), ('will', 'MD', 'O'), ('join', 'VB', 'O'),
('the', 'DT', 'B-NP'), ('board', 'NN', 'I-NP'), ('as', 'IN', 'O'),
('a', 'DT', 'B-NP'), ('nonexecutive', 'JJ', 'I-NP'), ('director',
'NN', 'I-NP'), ('Nov.', 'NNP', 'B-NP-TMP'), ('29', 'CD', 'I-NP-TMP'),
('.', '.', 'O')]
Being able to flatten trees, opens up the possibility of training a chunker on corpora consisting of deep parse trees.
CESS-ESP and CESS-CAT treebank
The cess_esp and cess_cat corpora have parsed sentences, but no chunked sentences. In other words, they have deep trees that must be flattened in order to train a chunker. In fact, the trees are so deep that a diagram can't be shown, but the flattening can be demonstrated by showing the height() of the tree before and after flattening.
>>> from nltk.corpus import cess_esp
>>> cess_esp.parsed_sents()[0].height()
22
>>> flatten_deeptree(cess_esp.parsed_sents()[0]).height()
3
Creating a shallow tree
In the previous recipe, we flattened a deep Tree by only keeping the lowest level sub-trees. In this recipe, we'll keep only the highest level sub-trees instead.
How to do it...
We'll be using the first parsed sentence from the treebank corpus as our example. Recall from the previous recipe that the sentence Tree looks like this:
The shallow_tree() function defined in transforms.py eliminates all the nested sub-trees, keeping only the top tree nodes.
from nltk.tree import Tree
def shallow_tree(tree):
children = []
for t in tree:
if t.height() < 3:
children.extend(t.pos())
else:
children.append(Tree(t.node, t.pos()))
return Tree(tree.node, children)
Using it on the first parsed sentence in treebank results in a Tree with only two sub-trees.
>>> from transforms import shallow_tree
>>> shallow_tree(treebank.parsed_sents()[0])
Tree('S', [Tree('NP-SBJ', [('Pierre', 'NNP'), ('Vinken', 'NNP'), (',',
','), ('61', 'CD'), ('years', 'NNS'), ('old', 'JJ'), (',', ',')]),
Tree('VP', [('will', 'MD'), ('join', 'VB'), ('the', 'DT'), ('board',
'NN'), ('as', 'IN'), ('a', 'DT'), ('nonexecutive', 'JJ'), ('director',
'NN'), ('Nov.', 'NNP'), ('29', 'CD')]), ('.', '.')])
We can visually and programmatically see the difference, as shown in the following diagram and code:
>>> treebank.parsed_sents()[0].height()
7
>>> shallow_tree(treebank.parsed_sents()[0]).height()
3
As in the previous recipe, the height of the new tree is three so it can be used for training a chunker.
How it works...
The shallow_tree() function iterates over each of the top-level sub-trees in order to create new child trees. If the height() of a sub-tree is less than three, then that sub-tree is replaced by a list of its part-of-speech tagged children. All other sub-trees are replaced by a new Tree whose children are the part-of-speech tagged leaves. This eliminates all nested sub-trees while retaining the top-level sub-trees.
This function is an alternative to flatten_deeptree() from the previous recipe, for when you want to keep the higher level tree nodes and ignore the lower level nodes.
Converting tree nodes
As you've seen in previous recipes, parse trees often have a variety of Tree node types that are not present in chunk trees. If you want to use the parse trees to train a chunker, then you'll probably want to reduce this variety by converting some of these tree nodes to more common node types.
Getting ready
First, we have to decide what Tree nodes need to be converted. Let's take a look at that first Tree again:
Immediately you can see that there are two alternative NP sub-trees: NP-SBJ and NP-TMP. Let's convert both of those to NP. The mapping will be as follows:
How to do it...
In transforms.py there is a function convert_tree_nodes(). It takes two arguments: the Tree to convert, and a node conversion mapping. It returns a new Tree with all matching nodes replaced based on the values in the mapping.
from nltk.tree import Tree
def convert_tree_nodes(tree, mapping):
children = []
for t in tree:
if isinstance(t, Tree):
children.append(convert_tree_nodes(t, mapping))
else:
children.append(t)
node = mapping.get(tree.node, tree.node)
return Tree(node, children)
Using the mapping table shown earlier, we can pass it in as a dict to convert_tree_ nodes() and convert the first parsed sentence from treebank.
>>> from transforms import convert_tree_nodes
>>> mapping = {'NP-SBJ': 'NP', 'NP-TMP': 'NP'}
>>> convert_tree_nodes(treebank.parsed_sents()[0], mapping)
Tree('S', [Tree('NP', [Tree('NP', [Tree('NNP', ['Pierre']),
Tree('NNP', ['Vinken'])]), Tree(',', [',']), Tree('ADJP', [Tree('NP',
[Tree('CD', ['61']), Tree('NNS', ['years'])]), Tree('JJ', ['old'])]),
Tree(',', [','])]), Tree('VP', [Tree('MD', ['will']), Tree('VP',
[Tree('VB', ['join']), Tree('NP', [Tree('DT', ['the']), Tree('NN',
['board'])]), Tree('PP-CLR', [Tree('IN', ['as']), Tree('NP',
[Tree('DT', ['a']), Tree('JJ', ['nonexecutive']), Tree('NN',
['director'])])]), Tree('NP', [Tree('NNP', ['Nov.']), Tree('CD',
['29'])])])]), Tree('.', ['.'])])
In the following diagram, you can see that the NP-* sub-trees have been replaced with NP sub-trees:
How it works...
convert_tree_nodes() recursively converts every child sub-tree using the mapping. The Treeis then rebuilt with the converted nodes and children until the entire Tree has been converted.
The result is a brand new Tree instance with new sub-trees whose nodes have been converted.
Summary
This article showed you how to do various transforms on both chunks and trees. The functions detailed in these recipes modify data, as opposed to learning from it.
Further resources on this subject:
- Python 3: Object-Oriented Design [article]
- Getting Started with Spring Python [article]
- wxPython: Design Approaches and Techniques [article]
- Creating Skeleton Apps with Coily in Spring Python [article]
- Python Multimedia: Video Format Conversion, Manipulations and Effects [article] | https://www.packtpub.com/books/content/python-text-processing-nltk-2-transforming-chunks-and-trees | CC-MAIN-2016-30 | refinedweb | 4,882 | 71.95 |
#include <ext/app/exttesttools/taspluginloader.h>
Loads tastraverser helper plugins and tasfixture plugins.
Loads tas traversal helper plugins. Helper plugins are loaded based on the QObject or QGraphicsItem details. Detection is done using the class name and inheritance details. TasFixturePlugins are loaded simply based on the path given as parameter. The most common place to look for the plugins is under QT plugins directory.
All plugin load functions may return null if no plugin can be loaded.
The plugin loader class will store will unload all of the pluginloaders when deleted. Note that the unload can fail if other loaders are using the same plugin.
Loads all plugins from QT_PLUGINS/tasfixtures directory into to a local cache.
Tries to load a fixture plugin based on the path given. When initialized the all plugins from QT_PLUGINS/tasfixtures are loaded and if the given path name matches then it is returned. If the plugin is not found from the loaded plugins the it a load is attempted. If no plugins is loaded null is returned. | http://devlib.symbian.slions.net/belle/GUID-C6E5F800-0637-419E-8FE5-1EBB40E725AA/GUID-232A27D3-D373-3458-B5E4-EE7AA873E71A.html | CC-MAIN-2018-47 | refinedweb | 173 | 59.4 |
An introduction to the event loop in napari¶
Brief summary¶
It is not necessary to have a deep understanding of Qt or event loops to use napari. napari attempts to use “sane defaults” for most scenarios. Here are the most important details:
In IPython or Jupyter Notebook¶
napari will detect if you are running an IPython or Jupyter shell, and will
automatically use the IPython GUI event
loop.
As of version 0.4.7, it is
no longer necessary to call
%gui qt manually. Just create a viewer:
In [1]: import napari In [2]: viewer = napari.Viewer() # Viewer will show in a new window In [3]: ... # Continue interactive usage
In a script¶
Outside of IPython, you must tell napari when to “start the program” using
napari.run(). This will block execution of your script at that point,
show the viewer, and wait for any user interaction. When the last viewer
closes, execution of the script will proceed.
import napari viewer = napari.Viewer() ... # Continue setting up your program # Start the program, show the viewer, wait for GUI interaction. napari.run() # Anything below here will execute only after the viewer is closed.
More in depth…¶
Like most applications with a graphical user interface (GUI), napari operates within an event loop that waits for – and responds to – events triggered by the user’s interactions with the interface. These events might be something like a mouse click, or a keypress, and usually correspond to some specific action taken by the user (e.g. “user moved the gamma slider”).
At its core, an event loop is rather simple. It amounts to something that looks like this (in pseudo-code):
event_queue = Queue() while True: # infinite loop! if not event_queue.is_empty(): event = get_next_event() if event.value == 'Quit': break else: process_event(event)
Actions taken by the user add events to the queue (e.g. “button pressed”, “slider moved”, etc…), and the event loop handles them one at a time.
Qt applications and event loops¶
Currently, napari uses Qt as its GUI backend, and the main loop handling events in napari is the Qt EventLoop.
A deep dive into the Qt event loop is beyond the scope of this document, but it’s worth being aware of two critical steps in the “lifetime” of a Qt Application:
Any program that would like to create a
QWidget(the class from which all napari’s graphical elements are subclassed), must create a
QApplicationinstance before instantiating any widgets.
from qtpy.QtWidgets import QApplication app = QApplication([]) # where [] is a list of args passed to the App
In order to actually show and interact with widgets, one must start the application’s event loop:
app.exec_()
napari’s
QApplication¶
In napari, the initial step of creating the
QApplication is handled by
napari.qt.get_app(). (Note however, that napari will do this for you
automatically behind the scenes when you create a viewer with
napari.Viewer())
The second step – starting the Qt event loop – is handled by
napari.run()
import napari viewer = napari.Viewer() # This will create a Application if one doesn't exist napari.run() # This will call `app.exec_()` and start the event loop.
What about
napari.gui_qt?
napari.gui_qt() was deprecated in version 0.4.8.
The autocreation of the
QApplication instance and the
napari.run()
function was introduced in
PR#2056, and released in version
0.4.3. Prior to that,
all napari examples included this
gui_qt() context manager:
# deprecated with napari.gui_qt(): viewer = napari.Viewer()
On entering the context,
gui_qt would create a
QApplication, and on exiting
the context, it would start the event loop (the two critical steps mentioned
above).
Unlike a typical context manager, however, it did not actually destroy the
QApplication (since it may still be needed in the same session)… and future
calls to
gui_qt were only needed to start the event loop. By auto-creating
the
QApplication during
Viewer creation, introducing the
explicit
napari.run() function, and using the integrated IPython event
loop when applicable, we hope to simplify the
usage of napari.
Now that you have an understanding of how napari creates the event loop, you may wish to learn more about hooking up your own actions and callbacks to specific events. | https://napari.org/docs/dev/guides/event_loop.html | CC-MAIN-2022-05 | refinedweb | 698 | 55.95 |
.
The DokuWiki comes with a default template which is rather bland. Their avtively developed and many nice features have been added recently, which make it even better to customize.
Installing the dokuwiki tarball
- Download the latest and greatest DokuWiki archive at the download page.
-!
- Configuration.
You can customize the Wiki by overriding any of the values that are found in ./conf/dokuwiki.php. Just run
cd conf cp -a local.php.dist local.php
and add any line from
dokuwiki.conf nobody:wheel .
In this example command, I assumed that you are running your Apache as the user “nobody”
==== Template and plugins ==== === Template: MonoBook === * Get the archive file for the monobook template from [[: <code>unzip monobook-03142006.zip -d /path/to/dokuwiki/lib/tpl/
- Fix the permissions and ownership of the monobook directory tree, so that the webserver can at least read them.
- (16-mar-2006) The monobook template misses the file
./lib/tpl/default/style.ini, so I copied it over to the monobook directory. This takes care of some custom definitions in the blog plugin.
- (21-mar-2006) The new version of the template (03182006) fixes the style issues I had with the previous version. I also adapted the tabs on the top of the wiki pages (the 'article' 'show page' etc…) to be more conformant with the MediaWiki's original Monobook template. These are my fixes:
--- main.css.org 2006-03-20 15:56:32.000000000 -0800 +++ main.css 2006-03-20 15:43:56.000000000 -0800 @@ -827,6 +827,7 @@ #p-cactions li.selected { border-color: #fabd23; padding: 0 0 .2em 0; + font-weight: bold; } #p-cactions li a { background-color: white; --- main.php.org 2006-03-20 15:55:01.000000000 -0800 +++ main.php 2006-03-20 15:54:35.000000000 -0800 @@ -59,12 +59,13 @@ <div id="p-cactions" class="portlet"> <h5>Views</h5> <ul> - <li id="ca-nstab-main" class="selected"><b><a href="<?php echo DOKU_BASE?>doku.php?id=<?php echo $ID?>">article</a></b></li> + <li id="ca-nstab-main" class="selected"><a href="<?php echo DOKU_BASE?>doku.php?id=<?php echo $ID?>">article</a></li> <?php if($INFO['perm'] == AUTH_ADMIN) { ?> - <li id="ca-talk" class="new"><?php tpl_actionlink('admin'); ?></li> + <li id="ca-talk" class="new<?php if($ACT == 'admin') { echo " selected"; } ?>"><?php tpl_actionlink('admin'); ?></li> <?php } ?> - <li id="ca-edit"><b><?php tpl_actionlink('edit'); ?></b></li> - <li id="ca-history"><?php tpl_actionlink('history'); ?></li> + <li id="ca-edit" <?php if($ACT == 'edit') { echo "class=\"selected\""; } ?>><?php tpl_actionlink('edit'); ?></li> + <li id="ca-history" <?php if($ACT == 'revisions') { echo "class=\"selected\""; } ?>><?php tpl_actionlink('history'); ?></li> + <li id="ca-backlink" <?php if($ACT == 'backlink') { echo "class=\"selected\""; } ?>><?php tpl_actionlink('backlink'); ?></li> </ul> </div> <div class="portlet" id="p-logo">
Plugin: blog
- Unzip the blog plugin into
./lib/plugins/. Add this to the top of your template's
main.php- in my case that is the file
./lib/tpl/monobook/main.php:
<?php // include discussion code include(DOKU_PLUGIN.'blog/functions.php'); // we must move the doctype down (unfortunately) - headers need to be first ?>
It should come right before the line
<!DOCTYPE html PUBLIC …..>.
And add this line immediately below the line that says
<?php tpl_content()?>:
<?php tpl_discussion()?>
- (24-mar-2006) Actually, this introduces an error when you want to click the plugin's info button in the plugin manager. I get the following error
Fatal error: Cannot redeclare html_discussion() (previously declared in /home/tag-am-meer.info/public_html/wiki/lib/plugins/blog/functions.php:77) in /home/tag-am-meer.info/public_html/wiki/lib/plugins/blog/functions.php on line 76
This is easily solved by changing the line you include at the top of your template’s main.php from
include(DOKU_PLUGIN.’blog/functions.php’);
to
include_once(DOKU_PLUGIN.'blog/functions.php');
- Customization of the blog plugin.
Create a file
./lib/plugins/blog/conf/local.phpand copy the parameters from the file
./lib/plugins/blog/conf/default.phpover into this file if you want them changed. My only change was:
$conf['plugin']['blog']['tag_namespace'] = 'blog:categories'; // where should tag links point to?
This way, the tags or “categories” get their own namespace.
Note that the original $conf['tag_namespace'] must change to $conf['plugin']['blog']['tag_namespace'].
- Now, the blog plugin is ready for use. How to use it, is another story entirely, and I am in the process of finding out.
Plugin: boxes
The boxes plugin enables the
<box></box> tag which shows up in your page as a floating box, with several possible styles. The feature that attracted me to it is the “left” and “right” styles which create floating boxes that are left- or right-aligned.
Unfortunately, my Mozilla browser does not display these floating boxes correctly
This wiki shows boxes correctly though… who can explain why?
Installation:
- Download the plugin-box.tar.gz archive and unpack it into
./lib/plugins/. That is all!
- If your
<box>tags don't show up, the wiki cache is interfering. Altering something in your Wiki configuration (like the used template) seems to force a cache flush, so that is what I did to make the boxes display right away.
Plugin: note
I downloaded the “note” plugin for DokuWiki. This plugin displays nice informational icons in the margin, like “tip” “warning” “note” and “note”. The plugin source is available at the DokuWiki site but it did not do what I wanted from it, plus it requires you to copy the images into your template directory, and add the CSS to the template's stylesheet. So I hacked it, so that now the plugin is fully contained into the DokuWiki's
./lib/plugins/note/ directory. You can download my modified plugin and unpack it into your DokuWiki's
./lib/plugins/ directory.
- (23-mar-2006) My changes were picked up by Olivier, the author of the note plugin, and therefore I changed back to the “official” newly released version (which now uses nice rounded corners)./wiki-dokuwiki-128. This is as easy as editing the “user-modifiable” files found in
./lib/tpl/monobook/user/*.php
I added a few lines to monobook's main.css file that makes the Wiki links appear in red when they point to a not yet existing Wiki page.The 14-mar-2006 version of MonoBook has a doku.css which contains the “missing wikilink” style definition. It now works out of the box.
- The blog plugin has a bland color scheme. I found a better looking style.css in Doogie's blog and used that to replace
./lib/plugins/blog/style.css
- To silence Apache in it's error_log, I also copied a favicon.ico file to the DokuWiki image library:
cp /path/to/documentroot/favicon.ico /path/to/dokuwiki/lib/images/
Adding an editor toolbar button! | http://alien.slackbook.org/dokuwiki/doku.php?id=slackware:wikinotes&rev=1143237065 | CC-MAIN-2014-10 | refinedweb | 1,126 | 52.97 |
First time here? Check out the FAQ!
This works with ROS Melodic, rosserial_arduino, and ros-teensy on a Teensy 4.1
#include "ros.h"
#include "diagnostic_ms
I'm using:
ROS Melodic
ubuntu 18.04
Python 3.6.9
My ROS project name is "ros_moos" and my Python package name is "ros_moos".
My directory structure under ~/catkin_ws/src/ros_moos is:
├── CMakeLists.txt
├── launch
│ └── ros_moos.launch
├── LICENSE
├── msg
│ ├── AuvMove.msg
│ ├── AuvPose.msg
│ ├── AuvSafety.msg
│ └── AuvSystems.msg
├── nodes
│ ├── ros_moos
│ │ ├── auv_control.py
│ │ ├── auv_status.py
│ │ ├── __init__.py
│ │ ├── moos_ros.py
│ │ ├── moos_test.py
│ │ └── uuv_moos.py
│ └── tests
├── package.xml
├── params
│ └── auv_params.yaml
├── README.md
├── requirements.txt
└── setup.py
setup.py contains:
from setuptools import setup
from catkin_pkg.python_setup import generate_distutils_setup
setup_args = generate_distutils_setup(
version="0.0.1",
packages=['ros_moos'],
package_dir={'': 'src'})
setup(**setup_args)
In the CMakeLists.txt I have catkin_python_setup() enabled.
I build the project with "catkin_make -DPYTHON_EXECUTABLE=/usr/bin/python3" and there are no errors.
roslaunch can find my ROS package and start my two Python nodes, auv_control.py and auv_status.py. rostopic and rosmsg can find the definitions for AuvPose and the other messages.
The problem is the other Python modules, moos_ros.py and uuv_moos.py are NOT installed into the /devel/ environment and auv_status.py can't import those modules when started by roslaunch.
According to... and... I've done what's required.
Is this a known issue or need I do something more?
Thanks to a nudge and some suggestions from Jarvis Schultz I found the problem with my setup. In my definition of the pa
A few paragraphs earlier in that same document one can find "Standard ROS practice is to place all executable Python pro
How to install my Python modules as part of my ROS package
I'm using:
ROS Melodic
ubuntu 18.04
Python 3.6.9
My ROS p
After reading
how to run rqt with ubuntu and eloquent, service not available
I have a clean installation of ROS2 Eloquent on an ubuntu
My intent is to provide a simpler description, instead of a mathematical proof, and a practical example of a covariance matrix, especially as they are used in ROS.
Did I hit the mark with:
Covariance matrices with a practical example
In the following example, I would like to have the value of the parameter "myString" to contain only two ASCII characters: CarriageReturn and LineFeed. How do I specify them in the definition of a parameter in a launch file?
<param name="myString" type="string" value="\r\n"/>
I've searched for the definition for all of the "special characters" but have not yet found the right combination of search terms.? | https://answers.ros.org/users/1420/billmania/?sort=recent | CC-MAIN-2022-05 | refinedweb | 433 | 60.21 |
an interactive course on Educative.io!
"Redux Fundamentals" workshop in New York City on April 19-20. Tickets still available!
Practical Redux, Part 9: Upgrading Redux-ORM and Updating Dependencies
This is a post in the Practical Redux series.
Updates to app dependencies, use of Redux-ORM 0.9, and caching NPM dependency files
Intro
Greetings, and welcome back to the Practical Redux series! It's been a few months since the last post, but as promised, I still have a lot of topics I want to cover for this series.
Picking up where we left off: in Part 8, we added the ability to delete Pilot entries, used our generic entity reducer logic to implement "draft data" handling for the Pilot editing form, and added the ability to cancel and reset form edits. This time around, we have some housekeeping to do: we'll update Redux-ORM to 0.9 and discuss the migration and API changes, update our other dependencies to the latest versions, and look at ways to cache NPM dependencies for consistent project installation even if you're offline.
The code for this project is on Github at github.com/markerikson/project-minimek. The original WIP commits I made for this post can be seen in PR #10: Practical Redux Part 9 WIP, and the final "clean" commits can be seen in in PR #11: Practical Redux Part
- Using Redux-ORM 0.9
- Updating Dependencies
- Managing Dependency Packages for Offline Installation
- Final Thoughts
- Further Information
Using Redux-ORM 0.9
When I started the series, the current version of Redux-ORM was 0.8.1. Since then, there have been some noticeable changes. Author Tommi Kaikkonen built and released version 0.9, which includes a number of breaking changes to the API and the library's behavior. Sadly, he also no longer has time to maintain the library by himself, but a call for new maintainers resulted in a couple people being given full ownership of the library, and several others (including myself) were given commit rights. So, Redux-ORM is definitely alive and well.
Let's take a look at the major changes in Redux-ORM 0.9, then tackle upgrading Project Mini-Mek to use it.
Redux-ORM 0.9 Changes
One of the nice things about the Redux-ORM library is its documentation. Too many JS libraries have nothing more than a few example snippets in their README, but Redux-ORM has had a couple pretty good intro tutorials and decent API docs since the beginning.
The Redux-ORM 0.9 changes included a helpful migration guide for using 0.9. Since that document is pretty good as-is, I won't try to restate everything, but I will highlight the biggest changes:
- The 0.8
Schemaclass has been renamed to
ORM, due to conceptual changes in how it works internally. Some of the Schema methods have been replaced:
schema.from(state)is now
orm.from(state)
schema.withMutations(state)is now
orm.mutableSession(state)
schema.getDefaultState()is now
orm.getEmptyState()
Sessioninstances now apply changes immediately, instead of queueing up changes to be applied when you called
session.reduce(). That means that after any change, like
myModel.someField = 123, the
session.stateobject will have been correctly immutably updated to reflect the current values (so
session.state.MyModel.byId[id].someFieldwould now be
123right away). This simplifies complex reducer logic considerably, since you no longer have to worry about what updates are currently pending inside the session's queue and which have been applied. This also means that the
session.state = session.reduce()trick I showed previously can be dropped, as the session basically does that for you automatically.
- The prior APIs for creating an entities reducer and selectors from a schema have been moved into separate functions. I haven't yet used any of those myself, in either this series or elsewhere.
- The
QuerySet"flag" properties for
someQuerySet.withModelsand
someQuerySet.withRefshave been removed, and you should now use
toModelArray()or
toRefArray()instead.
QuerySets are now lazy, so you can chain them together and only execute when needed
Modelclasses now can take declarations of expected field names. In 0.8,
Modelinstances dynamically created ES5 properties for values that were in the underlying plain data object and for relational fields, each time an instance was built. In 0.9, you can add field declarations to your model class, and Redux-ORM can more efficiently handle those. (The field declarations are still optional if you prefer not to use them.)
In addition, 0.9.1 added a
Model.upsert() method. As mentioned in Part 2, Redux-ORM didn't merge or de-duplicate items with the same ID the way Normalizr does. I had opened up an issue to discuss possible fixes, and the new
upsert() method was added as a result. So, calling
upsert() instead of
create() takes care of things nicely.
Upgrading Project Mini-Mek to Redux-ORM 0.9
With those changes in mind, let's go ahead and migrate Project Mini-Mek to use the latest version of Redux-ORM. At the time of writing, that's 0.9.4. For this step, we'll update this version explicitly. I played around with both
yarn add and
yarn upgrade a bit. Both work, but
yarn upgrade seemed to lock the entry in
package.json to the given version even if I added the
^ in front of it. So, we'll do it with
add:
yarn add redux-orm@0.9.4
That updates the contents of
node_modules/redux-orm and modifies our
package.json and
yarn.lock files, so let's commit those:
Commit 2dd6024: Update Redux-ORM to 0.9.4
Now we can move on to actually modifying the application code to match. Fortunately, the changes aren't overly complicated, and mostly break down into a few edits repeated several times.
Commit 3c19945: Update Redux-ORM usage to work with 0.9.x
Let's go through examples of each change:
First, we need to replace creating a
Schema with an
ORM instead:
app/schema/schema.js
-import {Schema} from "redux-orm"; +import {ORM } from "redux-orm"; import Pilot from "features/pilots/Pilot"; import MechDesign from "features/mechs/MechDesign"; import Mech from "features/mechs/Mech"; -const schema = new Schema(); -schema.register(Pilot, MechDesign, Mech); +const orm = new ORM(); +orm.register(Pilot, MechDesign, Mech);
Second, we need to use
orm.getEmptyState(), our reducers that use a
Session should stop using
session.state = session.reduce(), and we should use
toModelArray() instead of
withModels:
app/reducers/entitiesReducer.js
import {DATA_LOADED} from "features/tools/toolConstants"; -import schema from "app/schema" +import orm from "app/schema" -const initialState = schema.getDefaultState(); +const initialState = orm.getEmptyState(); export function loadData(state, payload) { // Create a Redux-ORM session from our entities "tables" - const session = schema.from(state); + const session = orm.session(state); // Get a reference to the correct version of model classes for this Session const {Pilot, MechDesign, Mech} = session; // skip ahead // Clear out any existing models from state so that we can avoid // conflicts from the new data coming in if data is reloaded [Pilot, Mech, MechDesign].forEach(modelType => { - modelType.all().withModels.forEach(model => model.delete()); - session.state = session.reduce(); + modelType.all().toModelArray().forEach(model => model.delete()); }); - // Queue up creation commands for each entry + // Immutably update the session state as we insert items pilots.forEach(pilot => Pilot.parse(pilot)); designs.forEach(design => MechDesign.parse(design)); mechs.forEach(mech => Mech.parse(mech)); - // Apply the queued updates and return the updated "tables" - return session.reduce(); + // Return the new "tables" object containing the updates + return session.state; }
Third, our
Model classes should be updated to add declarations for the fields they contain, and we can replace uses of
create() with
upsert():
features/pilots/Pilot.js
-import {Model, fk} from "redux-orm"; +import {Model, fk, attr} from "redux-orm"; export default class Pilot extends Model { static get fields() { return { + id : attr(), + name : attr(), + rank : attr(), + gunnery : attr(), + piloting : attr(), + age : attr(), mech : fk("Mech"), }; } static parse(pilotData) { // We could do useful stuff in here with relations, // but since we have no relations yet, all we need // to do is pass the pilot data on to create() or upsert() // Note that in a static class method, `this` is the // class itself, not an instance - return this.create(pilotData) + return this.upsert(pilotData); }
Once we apply those edits consistently across the rest of the codebase, our application should now run correctly with no errors.
I haven't yet played with
upsert() all that much, but at the moment I don't see any real downside to using it pretty much anywhere in place of
create(). Note that because we're now using it, you could actually copy and paste the
pilots.forEach(pilot => Pilot.parse(pilot)); line in
loadData(), and those Pilot entries would load okay. You could also load a Pilot entry with an existing ID but a couple different values, and it should be merged in correctly (only overwriting the changed values).
Updating Dependencies
The React world has continued to move forward over the last few months as well. React is up to 15.6, Create-React-App hit the big 1.0 and is now at 1.0.10, and many other libs have been updated. Since we're updating things, tt would be good to get everything else up to date too.
Updating React-Scripts
As mentioned in Part 5, Create-React-App is really just the CLI tool that sets up your initial project. All the build system magic is taken care of inside the
react-scripts package, and we only need to update that one dependency to take advantage of the latest improvements.
yarn add --dev react-scripts@latest
Commit c6621b3: Update react-scripts to 1.0.10
Updating Other Dependencies
We've got several other dependencies that need to be updated as well. We could list them all in a single
yarn add or
yarn upgrade command, but maybe we don't want to actually just automatically bump them all to the latest versions. Yarn includes a
upgrade-interactive command that shows us the latest versions of each one, and lets us pick and choose which ones to update:
project-minimek> yarn upgrade-interactive yarn upgrade-interactive ? Choose which packages to update. (Press <space> to select, <a> to toggle all, <i> to inverse selection) dependencies ( ) lodash 4.16.6 ? 4.17.4 ( ) react 15.3.2 ? 15.6.1 ( ) react-dom 15.3.2 ? 15.6.1 ( ) react-redux 5.0.0-beta.3 ? 5.0.5 ( ) react-toggle-display 2.1.1 ? 2.2.0 ( ) redbox-react 1.3.3 ? 1.4.3 ( ) redux 3.6.0 ? 3.7.1 ( ) redux-devtools-extension 1.0.0 ? 2.13.2 ( ) redux-thunk 2.1.0 ? 2.2.0 ( ) reselect 2.5.4 ? 3.0.1 ( ) semantic-ui-css 2.2.4 ? 2.2.10 ( ) semantic-ui-react 0.61.1 ? 0.71.0
Having said that, we might as well go ahead and bump all of them to the latest versions after all.
Commit e179c95: Update app dependencies to current versions
Removing the Custom Error Overlay
When I first set up the support for Hot Module Replacement in Part 3, I used a library called Redbox-React to show error messages. I'll temporarily throw an error inside a component's render method to show what it looks like:
That helps, but it could be better.
Since that time, Create-React-App has added a powerful and informative built-in error overlay. All we need to do to make use of it is remove our own error handling code from
src/index.js. While we're at it, we'll also remove the dependency on
redbox-react:
yarn remove redbox-react
Commit 9782e30: Remove custom error overlay in favor of CRA's built-in overlay
src/index.js); - } - }; - + // Support hot reloading of components. // Whenever the App component file or one of its dependencies // is changed, re-import the updated component and re-render it module.hot.accept("./app/layout/App", () => {
Now if we throw the same error, the overlay looks like this:
Ahhh... much more readable, informative, and soothing. (Now all we need is a towel, and an electronic book with the words "Don't Panic" written on the front.)
Fixing PropTypes
If we restart our dev server and re-run the page, Create-React-App prints out a warning:
Compiled with warnings. ./src/common/components/FormEditWrapper.jsx Line 1: React.PropTypes is deprecated since React 15.5.0, use the npm module prop-types instead react/no-deprecated Search for the keywords to learn more about each warning. To ignore, add // eslint-disable-next-line to the line before.
As part of the preparation for React 16, the React team is working on splitting several capabilities out into separate packages. This includes
React.createClass() and the
PropTypes API. React 15.5 started showing warnings any time you try to use those out of the
"react" package, Most of the major libraries in the React ecosystem have now been updated, but we need to do the same. Fortunately, this is an easy change:
Commit 8573ed7: Use prop-types lib instead of React.PropTypes
common/components/FormEditWrapper.jsx
-import React, {Component, PropTypes} from "react"; +import React, {Component} from "react"; +import PropTypes from "prop-types"
If we restart the server one more time, the warning should be gone.
Managing Dependency Packages for Offline Installation
Package managers are powerful tools. With just a config file and a command, we can download all the dependencies our application needs. Unfortunately, this also introduces many weaknesses and concerns. What happens if the latest version of a package breaks something for me? How can I know that I'm getting the same package contents every time? What if something happens to a package server, or I need to be able to install these packages offline?
The infamous
left-pad incident and various Github outages have shown that these are very real questions. While the use of hashes and locked URLs can ensure that a package manager like NPM is actually seeing the same file each time, that doesn't help if the network is down.
There's been a few approaches suggested for handling NPM dependencies without needing a network connection. Using NPM or Yarn's local per-machine cache works, but only if you've downloaded the necessary packages on that machine before. A number of people have suggested that you check in your entire
node_modules folder, but that's a very bad idea for a variety of reasons. That's potentially tens or hundreds of thousands of files taking up hundreds of megs on disk, AND that can include platform-specific binaries built post-install (like
node-sass's inclusion of
libsass). If you check in your
node_modules on a Mac, there's a good chance that it won't work on Windows or Linux (and vice versa).
The most ideal solution is to actually check in the downloaded archives for each package. Since platform-specific artifacts like
libsass are built after installation, you can safely clone a repo on any machine, install the packages from that per-repo cache, and have things built properly for that machine.
Yarn includes an "offline mirror" feature built in. As far as I know, NPM has not had this built in as a specific capability, but there's a third-party tool called Shrinkpack that can use an NPM "shrinkwrap" file file as the basis for caching package tarballs in the repo. Based on a recent Twitter conversation, it seems that this is also a future planned feature for a future NPM5 release, and that it's possible to sorta-kinda mimic that with a
.npmrc file and the
--prefer-offline flag for NPM right now.
So, let's set up a package cache for Yarn to work with. First, we need to create a
.yarnrc file in the repo:
Commit 326f253: Add Yarn config file for an offline cache
.yarnrc
yarn-offline-mirror "./offline-mirror" yarn-offline-mirror-pruning true
We'll set two values.
yarn-offline-mirror is the folder where we want Yarn to save the package tarballs. By default, if you update package versions, Yarn will only add new files to that folder, but not remove outdated ones. If we set
yarn-offline-mirror-prune to
true, it will also remove old package tarballs to match what's currently installed.
Next, we need to actually force Yarn to reinstall everything. The simplest way is to rename the
node_modules folder to something like
node_modules.bak, then run
yarn again. Now, if you look inside the
offline-mirror older, you should see around 1000 archives, like
react-15.6.1.tgz. We can
git add the entire folder, and check them all in:
Commit XYZ: Commit dependency packages
And with that, anyone else who is using Yarn along with this project should be able to use exactly the same packages that I have right now, even if you try to install them while you're offline. In theory, anyway. For full disclosure, this is a feature that I've only partly played with myself, and I've actually spent the last couple days fighting Yarn trying to get a variation of this to cooperate in my project at work, without success. (Nitty-gritty details at yarn#3910.) So, seems really useful, but YMMV in practice.
Final Thoughts
This post was probably a lot less exciting than the last few parts, but in today's world, updating dependencies is a pretty important topic. I'm still learning a lot of these intricacies myself (and in some cases, actively struggling with the tools), so please don't take the steps I showed as absolute gospel.
The good news is that we can now get back to writing code, adding features, and demonstrating useful techniques. Next time, we'll look at how to implement Redux-driven modal dialogs and context menus.
Further Information
- Redux-ORM 0.9
- Create-React-App 1.0
- Offline Package Caching | http://blog.isquaredsoftware.com/2017/07/practical-redux-part-9-managing-dependencies/ | CC-MAIN-2018-17 | refinedweb | 3,019 | 56.35 |
- NAME
- SYNOPSIS
- DESCRIPTION
- FUNCTIONS
- AUTHOR
NAME
Struct::Dumb - make simple lightweight record-like structures
SYNOPSIS;
use Struct::Dumb qw( -named_constructors ) struct Point3D => [qw( x y z ]; my $point3d = Point3D( x => 100, z => 12, y => 50 );
DESCRIPTION.
$ perl -E 'use Struct::Dumb; struct Point => [qw( x y )]; Point(30)' usage: main::Point($x, $y) at -e line 1 $ perl -E 'use Struct::Dumb; struct Point => [qw( x y )]; Point(10,20)->z' main::Point does not have a 'z' field at -e line 1
CONSTRUCTOR FORMS.
FUNCTIONS
struct $name => [ @fieldnames ], %opts
Creates a new structure type. This exports a new function of the type's name into the caller's namespace. Invoking this function returns a new instance of a type that implements those field names, as accessors and mutators for the fields.
Takes the following options:
- named_constructor => BOOL
Determines whether the structure will take positional or named arguments.
readonly_struct $name => [ @fieldnames ], %opts
Similar to
struct, but instances of this type are immutable once constructed. The field accessor methods will not be marked with the
:lvalue attribute.
Takes the same options as
struct.
AUTHOR
Paul Evans <leonerd@leonerd.org.uk> | https://metacpan.org/pod/Struct::Dumb | CC-MAIN-2015-18 | refinedweb | 189 | 62.48 |
A small integration between Fastapi and Alembic.
Project description
Fastapi Migrations
This library provides a small wrapper for alembic.
Notice
Under inital development. This can not be ready-for-production library.
This can means:
- Breaking changes may be introduced
- Poor documentation and changeslogs
- Not totally tested
- Be forced to navigate through the source code to find out how it works
Wait to a version > 0.1.0 for usage in production environments.
Installation
You can install this library with:
pip3 install fastapi-migrations
Usage
You can use both programatically and by CLI (command line interface).
Imagine your project folders
app/ cli/ __init__.py action.py db/ __init__.py base.py models/ __init__.py my_model.py endpoints/ __init__.py my_endpoint.py __init__.py config.py main.py
This is an example of
main.py:
from fastapi import FastAPI from fastapi_sqlalchemy import DBSessionMiddleware # Load configs and endpoints from app.config import settings from app.endpoints import router app: FastAPI = FastAPI(title=settings.project_name) # register routes app.include_router(router) # add middlewares app.add_middleware(DBSessionMiddleware, db_url=settings.database_uri) if __name__ == '__main__': # Load cli commands from app.cli import app as cli cli()
Then your
app/cli/__init__.py can be like:
import typer from fastapi_migrations.cli import MigrationsCli import app.cli.action as action # main cli app app: typer.Typer = typer.Typer() # these are our cli actions app.add_typer(action.app, name='action', help='Common actions the app do') # this line adds the fastapi-migrations cli commands to our app app.add_typer(MigrationsCli())
Now you can call your app from the command line and use
fastapi-migrations like:
py app/main.py db show
If you want to use this library programatically, this is an example:
The file
app/cli/action.py can be like:
import typer from fastapi_migrations import MigrationsConfig, Migrations app: typer.Typer = typer.Typer() @app.command() def show() -> None: config = MigrationsConfig() migrations = Migrations(config) migrations.show()
You can add this lines where you wish in your proyect. Here we ar adding it to a command line so we can call our app like:
py app/main.py action show
License
This software is distributed under MIT license.
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages. | https://pypi.org/project/fastapi-migrations/ | CC-MAIN-2022-05 | refinedweb | 379 | 53.17 |
I'm in the process of learning OOP, as my "teacher/link referencer" told me was the best thing to learn next. I started working on a simple T-RPG to put the concepts to use, while learning. But I made a function that couts "Hi!" and it gives an error(could not execute function without object), when ad an object it scolds me for not using it(folowing another tip from my "teacher", to make all warnings errors)
<b>main.cpp</b>
<b>player.cpp</b><b>player.cpp</b>Code:#include <iostream> #include "player.h" using namespace std; int main() { hero::say_hi(); }
<b>player.h</b><b>player.h</b>Code:#include <iostream> #include "player.h" using namespace std; char hero::namehero(){ //To get desired name cin.get(); } void hero::say_hi(){cout<<"Hi!";}
If you could help me find the error it would greatly help as I am befowled at the problem at hand.(my guess is that it's really obvious)If you could help me find the error it would greatly help as I am befowled at the problem at hand.(my guess is that it's really obvious)Code:#ifndef PLAYER_H_INCLUDED #define PLAYER_H_INCLUDED #endif // PLAYER_H_INCLUDED class hero{ public: /** Set/Get functions **/ char namehero(); void say_hi(); /** End of Set/Get functions **/ private: /** Needed variables **/ char hero_name; /** End of variables list **/ }; | https://cboard.cprogramming.com/cplusplus-programming/128561-simple-oop-help.html | CC-MAIN-2017-51 | refinedweb | 224 | 64.61 |
Go for Beginners — Part 2
In the previous Article (Which you can check out HERE), I laid the groundwork for me learning another language called Go.
In this Article I’m going to cover an Introduction to Go.
If you’re genuinely interested in this you can view all of my progress on my GitHub repo HERE
Lets get started…
An Introduction to Go
Compiling
When you write Go code, we’re writing it to be readable for developers. However it’s not readable by computers.
Go comes with a compiler which compiles our code to be able to be executed and turns it into a binary file similar to C.
To do this we go to terminal and type in
go build nameOfFile.go
After this compiles, we will be given a new file called
nameOfFile which is an executable binary file containing our translated Go code.
Running Our Code
Go also gives us the ability to automatically run our code after compiling with the command.
go run nameOfFile.go
Packages
So now we are starting to take a deeper look into a Go programs structure.
Just like Python, Go’s compiler reads code from Top to Bottom.
However with it’s similarities to C every program in Go needs a
mainfunction.
We also need to include the line
package main as every Go program needs a
package declarationto start off every file.
Importing Packages
Cool so now we need to import some basic packages for use to be able to do anything within Go. So lets import the
fmt package for us to use.
Libraries are referred to as Packages within GoLang
We can do this with the keyword
import and then the name of the package we want to import.
When importing Packages make sure to enclose them in double quotes
"or else you'll get an error
Lets
import the
fmt Package to be able to use one of it's functions
Println to be able to output text to the console
So far our code should look like this;
// main.go
package mainimport "fmt"
Functions
Functions are things we can call upon to run a specific piece of code when we want too.
Just like in Python, Functions can only be called after they have been declared. In layman’s terms, the Function needs to be higher up in the code then where you call it.
So lets create our first basic function within Go
To declare the Function we are going to use the keyword
func followed by the name of the Function and two brackets
(), then two curly brackets `{}
func nameOfFunction() {
// Write Code Here
}
Hello World
Lets put this all together now,
// main.gopackage mainimport "fmt"func main() {
fmt.Println("Hello World!")
}
Go uses Dot Syntax to refer to Methods / Functions
Then using
go run main.go we get the output;
$ go run main.go
Hello World!
>
Boom! We’ve written our first program in Go
Importing Multiple Packages
If we want to import multiple Packages in go we can use a tiny bit of a different syntax to achieve this.
import (
"package1"
"package2"
)
The great thing is this also allows us to create allias’ so you don’t have to type out the full Package name every time
import (
package1Allias "package1"
package2Allias "package2"
)
This means we can refer to
package1as
package1Allias
package1Allias.someFunction()
We could change
package1Alliasto anything such as a shorter way to remember the Package name such as `p1``
p1.someFunction()
Comments in Go are similar to many other languages by using the keyword
// this comments off the entire line after that keyword and it will not be read by the compiler
// Hello!
package main
// import "fmt" (This line won't be read)
Summary
That is a basic introduction to the foundation of Go and it’s little quirks compared to other languages. | https://kodeythomas.medium.com/learning-go-part-2-1e3c8180e6ef?source=user_profile---------4------------------------------- | CC-MAIN-2021-49 | refinedweb | 643 | 67.49 |
import com.cosl.security.armorcs.api.*;
i have a sample program but does not have the library archives files yet which is to be in the JAR type. i would love if some1 can tell me what does the above package actually imports... izzit in package something like from folder to folder
com\cosl\security\. then the armorcs.api, and the ".*" means all the files after it?
Thanks
the compiler just imports the classes used within the code.
import com.cosl.security.armorcs.api.*;
just says, that when you declare a class that it doesn't know, it should search in the whole package.
eg.:
import java.util.*;
public class test{
private Map map = new HashMap();
}
here the compiler first doesn't know where to find Map and HashMap. But the import tells him to search within the package java.util.
It's the same as writing
import java.util.Map;
import java.util.HashMap;
the classes you import have their own imports, so if you use a class from an external jar, you can be shure, that class itself will import more of the appropriate package. thus you have to include the whole jar with your application.
wow thx, i think i understands whats the ".*" works behind the syntax but i cant get the understand of how the "com.cosl.security" works behind it?
is it also function inside the armorcs or its a package? or folder combination?
Thx dude
"com.cosl.security" is a package. packages usually are organized within folders. Thus the package "com.cosl.security" denotes the folder structure "com/cosl/security".
within that package / folders there are a lot of classes with lot's of code.
packages exist for two purposes:
1. to organize your code. so you can put classes that work together or have a logical common point into one package. example: mypackage.model, mypackage.view
2. to allow the programmer to use classnames twice. in different packages there may be classes with the same name, but not in the same package. since every class file is represented by a file in a folder, there can't be two files with the same name in the same folder. but there may be in different folders.
hmm ok, thx alot i think i understand it already
thanks
Forum Rules
Development Centers
-- Android Development Center
-- Cloud Development Project Center
-- HTML5 Development Center
-- Windows Mobile Development Center | http://forums.devx.com/showthread.php?153903-Maybe-too-general&goto=nextnewest | CC-MAIN-2017-09 | refinedweb | 401 | 68.57 |
The first blog in this series gave an overview of network Plug and Play and how it could be used on APIC-EM. The second blog gave examples of how network-device configuration template could be created programmatically and using the REST API, uploaded to the controller along with the PnP rules and projects. This blog provides an "all-in-one" script to tie all the scripts together using a client library called Uniq.
I also cover the code needed to build a Cisco-Spark chat-ops bot to integrate into the PnP API. The output is shown below.
As usual, all the source code is in a Github repository. Here are the steps you need to take to download them in a terminal session.
Here is what the output should look like when you run the commands above in a command window. NOTE: This is for linux/MAC, windows is outside the scope of this blog.
Cisco has recently published a client library for APIC-EM. It does require python3. As per recommended best practice I am going to use a virtual environment for installing custom packages. Here are the commands you need to use in a terminal window:
Here is the output from running those commands:
As discussed in blog2, a jinja2 template is used to aid the generation of configuration files. The config_template.jnj file you can see there are two variables: "hostname" and "ipAddress". These correspond to columns in the inventory.csv file. You could have as many variables as you like.
It is critical to have "end" as the last statement in the file.
Here is an example of running this script. The output files are stored in the "work_files/configs" directory. Notice that a suffix has been added to the filenames to make them unique. As the example scripts are using a sandboxapic in the cloud, multiple people can be running the scripts at a time. This suffix should be unique, so you do not clash with other users. In production you would not do this.
In this blog all of the steps are combined into one script. A template file is created, it is uploaded to the controller, a project is created and a rule is added to the project.
A file is created in "work_files/configs/sw01-config-6230. A project is created called "Sydney-6230", and a rule created using the configId of the file "sw01-config-6230".
The first thing needed is a client manager to interact with the controller API. The file in the parent directory "../login.py" contains the code to do this:
def login():
""" Login to APIC-EM northbound APIs in shell.
Returns:
Client (NbClientManager) which is already logged in.
"""
try:
client = NbClientManager(
server=APIC,
username=APIC_USER,
password=APIC_PASSWORD,
connect=True)
In the code we open a client manager called "apic" that will be used to make all of the REST APIC calls. Below is a simple example of uploading a configuration file.
Note the apic.file.uploadFile call. This is using the file API, and the uploadFile method.
def upload_file(apic, filename):
file_id = is_file_present(apic, "config", os.path.basename(filename))
if file_id is not None:
print ("File %s already uploaded: %s" %(filename, file_id))
return file_id
file_result = apic.file.uploadFile(nameSpace="config", fileUpload=filename)
file_id = file_result.response.id
return file_id
Looking at swagger, you can see how this call was generated. You can see "file" is the collection of filesystem API. "uploadFile" in red box is the call required to upload a file to the controller. Obviously it is a POST call.
Click on the /file/{namespace} POST API, to see the details of which parameters can be provided. Both "nameSpace" and "fileUpload" are used in the earlier call.
The /file API are synchronous, meaning they block until the call is complete, then return the status and the id of the resource that was created. For example, when uploading a file, you will not see a response until the file upload is complete. For a large file, this might take a while.
All other POST/PUT/DELETE API calls are asynchronous, meaning they return a 202 response code and a taskId for the request made. For example, to create a new pnp-project, with a "siteName":"Sydney", you would make a POST to /pnp-project, you would expect a 201 HTTP response code, with the UUID of the resource. Instead the following happens:
Uniq simplifies task management with the wait_for_task_complete method. The id of the project that was created is in the "progress" attribute (it is the "siteId" attribute).
def lookup_and_create(apic, project_name):
project_name = name_wrap(project_name)
project = apic.pnpproject.getPnpSiteByRange(siteName=project_name)
if project.response != []:
project_id = project.response[0].id
else:
# create it
print ("creating project:{project}".format(project=project_name))
pnp_task_response= apic.pnpproject.createPnpSite(project=[{'siteName' :project_name}])
task_response = apic.task_util.wait_for_task_complete(pnp_task_response, timeout=5)
# 'progress': '{"message":"Success creating new site","siteId":"6e059831-b399-4667-b96d-8b184b6bc8ae"}'
progress = task_response.progress
project_id = json.loads(progress)['siteId']
return project_id
Cisco spark is a collaboration tool that has "room" based messaging. Spark has a powerful API that is easy to integrate. This post is not going to cover every detail for Spark integration, just the highlights for the APIC-EM PnP integration.
There are two parts to the spark integration. The first is the ability to post to a room. This is done for each PnP project created, or when a PnP device rule is provisioned.
The code below shows how this works. You need to get an "authentication token" from. This is used in the "authorization" header. You also need to know the roomId you are posting to. Spark has an API you can call to get a list of rooms you are a member of, join a room etc.
def post_message(message, roomid):
payload = {"roomId" : roomid,"text" : message}
headers = {
'authorization': AUTH,
'content-type': "application/json"
}
response = requests.request("POST", url, data=json.dumps(payload), headers=headers)
The second part is the ability to issue commands to the bot, and have it respond. For example "apic show pnp-projects". This requires a webhook to integrate to the Spark chatroom (see for more information) All SparkRoom messages will be received by My-BOT server. The steps are illustrated below:
The code to receive the webhook post on My-Bot is shown below (this is step #3)
def bot_webhook():
messageid = request.json['data']['id']
roomid = request.json['data']['roomId']
message = get_message(messageid)
process_message(message, roomid)
return jsonify(""), 201
You then need to make an API call to spark to get the contents of the message (Step #4).
url = ""
def get_message(messageid):
messageurl = url + "/" + messageid
headers = {
'authorization': AUTH,
'content-type': "application/json"}
print ("getting: %s" % messageurl)
response = requests.request("GET", messageurl, headers=headers)
response.raise_for_status()
return response.json()['text']
Next you need to process the messages, for example "apic show pnp-project". This requires an API call to APIC-EM (step #5)
def apic_login():
apic = NbClientManager(server="sandboxapic.cisco.com",
username="devnetuser",
password="Cisco123!",
connect=True)
return apic
def apic_show_pnp_project(apic):
response = ""
projects = apic.pnpproject.getPnpSiteByRange()
for project in projects.response:
response += "Project {project}: count {count}\n".format(
project=project.siteName,
count=project.deviceCount)
return response
The function post_to_spark(message) described earlier can be used to reply to the spark room.
NOTE: ANY messages that are sent to the room (including the ones you post) will be sent to the chat-bot. Make sure you do not auto respond to your own messages! You will end up in a loop.
A PnP configuration file is downloaded when the network-device first boots. Some elements of configuration might be time sensitive (e.g. a virtual routing and forwarding (VRF) configuration). In addition, there are some things such as VLAN defined outside the configuration file (e.g. vlan.dat – the vlan database).
To address this problem, an embedded event manager (EEM) script can be put into the configuration file. This contains commands to be run after the configuration is downloaded. To ensure it is only run once, you can tell the EEM script to "self destruct" i.e. remove itself after it has run. The highlighted EEM commands below will:
This blog covered more advanced topics such as embedded EEM scripts in the day zero configurations, using a client library (uniq) to make the code more efficient and integrating all of the components into a single tool. It also showed how the API could be used to integrate into a spark chat room (Thanks to Jose Bogarín for that idea)
In the meantime, if you would like to learn more about this, you could visit Cisco Devnet. DevNet has further explanations about this. In addition, we have a Github repository where you can get examples related to PnP.
Thanks for reading
The EEM stuff is really cool. Would never have thought of it. Very useful.
Integrating Spark with APIC-EM is great. I'm still thinking about use cases for POST calls but for GET is quite nice. We are working in a project with a big rollout and we are working in this chat bot to allow the project manager to get the information that he needs without having to go to an engineer.
I don't know if it's a feature in the roadmap but I think that having some kind of webhook in APIC-EM would be great for a use case like this. For example I can register to a PnP event and trigger an action in the chat bot, or any other system for that matter, when a new device is configured.
Again, great blog.
Thanks Jose,
I appreciate the comments.
Yes, we are looking to add notifications in APIC-EM. Please "make a wish" to add support for this. At present, the only way to do this is poll/store state... which is how i am doing it right now.
Thanks. As soon as I'm in front of the computer. I'll get to my APIC-EM and make that feature request.
Oh my god, just spent about 8 hours trying to isolate why my PnP configs were failing...VLANS!!! When I remove the vlans from my configuration, the configuration deploys with no errors as I would expect it would.
Is the EEM script to deploy VLANs the only workaround for this behavior? I can't believe the documentation doesnt mention this at all.
Hi Jonathan,
It depends on the mode that you have chosen for VTP. If you are using VTP transparent mode, then the vlans will appear in the configuration file and you should be fine.
If you are using VTP, then there are different considerations. VTPv1 is default, but many people use transparent mode.
Adam
Maybe I'm hitting a caveat then. On 9300 running 16.6 code, I cannot push VLANs using the nomenclature:
vtp mode transparent (or off)
vlan XXX
name YYYY
With the VLAN statements present, i get a error 1410 in the PnP logs. Without them present, this process works flawlessly. Using your EEM script VLANs are added just fine, and VTP is also set fine with no EEM. It seems to me that MAYBE VTP isnt being properly set "in time" or "quickly enough" for the VLANs to be pushed properly.
I'll try an older platform (3650 on 16.3) to see if this still occurs. Your blog series has been awesome by the way.
Hi Jonathan,
Just to save you some time, I tested with 3650 - IOS-XE 3.6.6 and it works fine. I am also able to replicate the issue on 16.6.1 with 3650. It looks like the behvaior has changed in 16.x, so nothing to do with hardware.
I will chase down the root cause and update.
Thanks for the note about the blogs. Just trying to help people out.
Adam
Hi Jonathon,
There is a long back story, but the short story is if you are running the latest PnP v1.5.1.35 - released 14th Aug
you will be fine.
You can just download the PnP application (it is only 16M) and drag and drop it into admin -> app management
We have separated out the PnP app from the base platform now.
Adam
I was on 1.5.0.211 before. Just updated to the 1.5.1 as you suggested and it shows success but doesn't actually push the vlans down.
Super simple config I'm using to test
hostname vlantest
vlan 10
name test1
vlan 100
name mgmt
vlan 689
name test2
end
You need to have vtp mode transparent or off as well
Sent from my iPhone
Here is my config file. Note: I need to have vtp in either transparent of off mode.
vtp mode off
vlan 14
name management
!
vlan 20
name fred
!
vlan 999
end
I'm a knuckle-head. My last mini-test after the PnP upgrade I forgot the VTP step, everything is working great.
In summary:
We made some changes in 16.x around strict syntax checking for configuration files. PnP1.5.1 will take that into account. It is actually a false negative, but PnP will do the right thing.
BTW, if you are really keen, you should notice that it is actually the "name" statement that causes the issue in 1.5.0. You should be able to push vlan if the do not have a name.
Adam | https://community.cisco.com/t5/networking-blogs/network-automation-with-plug-and-play-pnp-part-3/bc-p/3662594 | CC-MAIN-2019-47 | refinedweb | 2,232 | 67.04 |
I am going to do my first Java Project the ElGamal's Encryption.
Honestly, i have no idea yet on how to start my program because i don't have idea in encryption but i have to do it. Because it was assigned to me by our instructor. Please help me.
- 4 Contributors
- forum16 Replies
- 27 Views
- 7 Years Discussion Span
- comment Latest Post by mrjillberth
Honestly, i still don't have the algorithm but i am still looking for it although I already read some. It's just like this.
By the way, that could be a simple GUI just a TextField and a Button.
Algorithm:
Public parameters: q is a prime
p = 2kq+1 is a prime
g generator of Gp
Secret key of a user: x (where 0 < x < q)
Public key of this user: y = gx mod p
Message (or “plaintext”) : m
Encryption technique (to encrypt m using y)
1. Pick a number k randomly from [0…q-1]
2. Compute a = yk. m mod p . b = gk mod p
3. Output (a,b)
Honestly, I found it hard to understand in just reading this. That nobody is there to communicate with me. Please help me.
By the way, k is a random number to pick.
p = 2^k q + 1. and that is a prime.
g generator of Gp, honestly sir, i don't understand what's it. Maybe i still have to search more on that. So i can make it.
Do you have knowledge in cryptography sir? Especially in ElGamal. Can i have an explanation?
To do this encryption, you have to break it into 3 parts - key generation, encryption, and decryption. You need to read how to generate a set of group which satisfies the rules. Please read about it at to understand what it is. Read about elgamal encryption at. Not too difficult but you need to understand symbols. It is similar to PKI stuff.
I believe this is one of your CS class. I thought your professor would have discussed about basic concept of this encryption algorithm?
No, she only gave this to us because she said we can just search for it in the internet. She didn't gave any concept in crytography. I really wondered why she gave this to me.
Anyway thanks for the help. If you can give me just a little overview about cryptography it would be highly appreciated by me.
If you have no idea at all about cryptography, it is difficult to explain... You need to read more. One book may fit to your understanding than the other. Here are 2 links about Elgamal encryption.
In plain word, a recipient must generate a public key using his or her own private key (in this case is a prime number). Then give the public key to any sender. A sender would encrypt the message (string) using the given public key value in the computation. The recipient will then be able to decrypt the message using another computation set and his or her private key.
Each cryptographic method has its own way to do. Though, many are very similar. Just take time to try to understand what it does. You could ignore the mathematical parts when you read it the first time even though the part is actually used to determine how well your encryption is. Hope these links would give you a bit more of the idea.
Edited by Taywin: n/a
maybe try reading this
What I know of encryption so far is that it uses matrices to hide the message. for example
[
[ = one large [
lets say your encryption matrix is
[1 2] [a b]
[3 4] [c d]
your decryption matrix would be
1r(ad-bc) [d -b]
----------[-c a]
so if you use the encryption matrix to encrypt a message hi
you would need to arrange the message into a matrix
[h i]
[z z]
the 'z' is nothing. If you wanted you could use key codes and replace the 'z' with a -
then you want to convert the message into either key codes, or alphabet values
[8 9]
[26 26]
once you have that you will want to multiply it by the encryption matrix (think of it as a 2d array. multiply row 1 by column 1 ([1][1] * [1][1] + [1][2] * [2][1]) would be your first value)
[1 2] . [8 9]
[3 4] [26 26]
which would give you
[60 61]
[128 131]
That is your encrypted message. if you were to find out your original message you will need to find the inverse or the encryption matrix, and then multiply the decryption matrix * encrypted message to get your original message back.
This is a simple encryption, but finding the inverse of a 3x3 matrix is much harder. This is the way I will try to encrypt. The other way is to think of a random algorithm to multiply each of the values with, and then just multiply it by the inverse of the algorithm to get the original value back.
I have no idea why I wrote this tutorial, but it seems to me that it is useful knowledge for a programmer to know, so I hope helps with some information for cryptography.
Is it okay to encrypt a String with letters? How come! Mathematical expressions can only generate numbers and variables.
I already read some articles about ElGamal cryptography. But i really found it hard to easily understand all. Because I have nothing to communicate with and ask for explanation.
I am sure if you made a chart that just replaces letters with other ones you would do something like that.
lets say again that you message was hello if you swapped the letters like this
h = z
e = t
l = m
o = q
your message would look like
xtmmq
if you do not have the chart then it would be difficult to decode the message, but not impossible. It would make it easier if you had more words, because then you could reference the letters with other ones for example if you had a message like
m fmsn ntaskgvpwq
you would know that the m = a or an i because those are the only single letters that are used in a sentence
so you would know this
i fisn ntaskgvpq
or
a fasn ntaskgvpq
then you would know that n needs to be the same for both. As you can tell the more words you have the more references you have and the easier it is to decrypt the message. This is why numbers are used.
and lets say you tried multiplying the matrix example that I gave
encryption matrix
[a g]
[x q]
and your message was hi
[a g] . [h i]
[x q] [z z]
your new matrix would be
[ah+gz ai+gz]
[xh+qz xi+qz]
it would look like that. now if you see what is in common for the rows
first row has in common an 'a' and a 'g'. The second row has in common and x and an 'x' a 'q' and a 'z', since 'z' also appears in the top portion of the matrix we can assume that 'z' is in the lower half of the matrix. Then we divide each of the terms by what in the list of the common letters ('a','g','x','q') is in the term. Then we get the original message back
[h i]
[z z]
even if your message had an 'a' in it and you multiplied it by an a you would get a^2 and even if you divide by a you will get your a back. This is probably why they use letters, as you cannot reverse engineer the message without knowing the encryption matrix.
Edited by sirlink99: n/a
Thanks Sir. It had been a great help for me. I'll be back if I have more questions.
Encryption
package hahay; import java.math.*; import java.util.*; import java.security.*; import java.io.*; public class ElGamal{ public static void main(String[] args) throws IOException{ BufferedReader jill = new BufferedReader (new InputStreamReader (System.in)); System.out.print("Enter the secret key: "); String sk = jill.readLine(); System.out.print("Enter value of b: "); String pp = jill.readLine(); BigInteger p, b, c, secretKey; Random sc = new SecureRandom(); secretKey = new BigInteger(sk); p = BigInteger.probablePrime(64, sc); b = new BigInteger(pp); c = b.modPow(secretKey, p); System.out.print("Enter your Big Number message: "); String s = jill.readLine(); BigInteger X = new BigInteger(s); BigInteger r = new BigInteger(64, sc); BigInteger EC = X.multiply(c.modPow(r, p)).mod(p); BigInteger brmodp = b.modPow(r, p); System.out.println("p = " + p); System.out.println("secretKey = " + secretKey); System.out.println("EC = " + EC); System.out.println("b^r mod p = " + brmodp); } }
Decryption
package hahay; import java.math.*; import java.util.*; public class Decrption { public static void main (String[]yeah){ Scanner jill = new Scanner (System.in); System.out.print("b^r mod p: "); String brmodpp = jill.next(); BigInteger brmodp = new BigInteger(brmodpp); System.out.print("Enter the secret key: "); String sk = jill.next(); BigInteger secretkey = new BigInteger(sk); System.out.print("Enter the value of p: "); String pp = jill.next(); BigInteger p = new BigInteger(pp); System.out.print("Enter the value of EC: "); String ec = jill.next(); BigInteger EC = new BigInteger(ec); BigInteger crmodp = brmodp.modPow(secretkey, p); BigInteger d = crmodp.modInverse(p); BigInteger ad = d.multiply(EC).mod(p); System.out.println("\n\nc^r mod p = " + crmodp); System.out.println("d = " + d); System.out.println("Alice decodes: " + ad); } }
I can only generate numbers but not with letters. I don't know how to generate letters.
Yes, thanks!
But i will mark it as solved as soon as my problem could be solved. But your help will contribute to my success. Thanks! | https://www.daniweb.com/programming/software-development/threads/384603/need-help-in-elgamal-s-encryption | CC-MAIN-2018-47 | refinedweb | 1,640 | 74.59 |
Tracking user views on content items marked as must-read
Project description
Track reads on content objects in Plone.
Features
- Mark objects as must-read
- Keep a record of first reads of content objects per user
- Query if a specific user has read a specific content object
- List top-x of content objects by user reads in a specific time window
Compatibility
Plone 5.2 and Plone 5.1 users should use version 2.x of collective.mustread. Plone 5.0 users should use version 1.x of collective.mustread.
Limitations
This is not a install-and-forget plugin for Plone.
This product does not track reads out of the box. It merely provides a backend you can use for doing so.
Development of this backend was sponsored by Quaive. Quaive has it’s own frontend integration on top of this backend to cater for the specific use cases Quaive needs. We hope that this generic backend is useful for other Plone projects as well.
Rationale
If you’d want a naive implementation to track reads, you could simply create a behavior that stores a list of user ids on every content object.
Obviously that would soon destroy your site with database writes.
Instead, this backend is designed to:
- Be compatible with async scheduling, even if it does not provide async itself.
- Be flexible to support multiple policy scenarios, without having to rewrite or fork the whole backend.
- Use a pluggable SQL backend instead of the ZODB, both to offload writes and to make it easier to run reporting queries.
Architecture
You’re forgiven for thinking the architecture below is overly complex. Please see the rationale above.
Not included in collective.mustread is the frontend and async part:
[ user browser ] -> [ view ] -> [ async queue ]
The backend implementation in this package provides the following:
[ @@mustread-hit ] -> [behavior] -> [database store]
Let’s narrate that starting at the database end.
Database
The database storage provides a rich API as specified in collective.mustread.interfaces.ITracker.
By default collective.mustread writes to an in-memory sqlite database. Data will be lost on zope-server restarts.
To persist your data you can use a sqlite-database-file.
- Either call the @@init-mustread-db view (to create a sqlite db located in BUILDOUT/var/mustread.db)
- or set up your database path manually in the registry and call the @@init-mustread-db view after that ( e.g. to share it with other addons - see Auditlog compatibility)
Auditlog compatibility
If you’re running collective.auditlog on your site, you might consider using the same database (so you only need one active database-connector)
The SQL store is derived from the collective.auditlog implementation. We’ve designed collective.mustread to be compatible with collective.auditlog to the point where we’ll even re-use the database connector from auditlog if possible.
The database connection is configured via a registry record collective.mustread.interfaces.IMustReadSettings. You typically want this to contain the same value as your auditlog configuration.
Make sure to call @@init-mustread-db to create the necessary tables/columns needed by this package in the database.
Behaviors
We provide two behaviors:
- collective.mustread.maybe_must_read basically only provides a checkbox where you can specify whether a content object is ‘must-read’.
- collective.mustread.track_read_enabled activates view tracking on a content object. We track views even if IMaybeMustRead does not mark the object as ‘must-read’. The reason for this is we’d like to track popular content even if the items are not compulsory.
You’d typically activate both these behaviors on the content types you’d like to track.
These behaviors are not activated by default - the :default install profile only provides a browser layer and configures the database connector. It’s up to you to choose and implement your tracking policy in your own projects.
The behaviors provide a flex point where you can implement different tracking policies. You could create a behavior that only tracks reads for certain groups of users for example. You can easily do that by creating a new behavior in a few lines of code, with some extra business logic, which then re-uses our extensive read tracking API for the heavy lifting.
View
A helper view @@mustread-hit is available for all ITrackReadEnabledMarker i.e. all objects with the collective.mustread.track_read_enabled behavior activated. Hitting that view will store a read record in the database for the content object.
In Quaive we will hit this view from our async stack.
You could conceivably, instead of this view, provide a viewlet that accesses the tracking behavior and API. Just be aware that doing all of that full sync is a risk. YMMV.
There’s also a special debugging view @@mustread-hasread which will tell you whether the user you’re logged in as, has read the object you’re calling this view on.
Installation
Install collective.mustread by adding it to your buildout:
[buildout] ... eggs = collective.mustread
and then running bin/buildout
Or use the built-in buildout:
virtualenv . bin/pip install -r requirements.txt bin/buildout bootstrap bin/buildout
Using collective.mustread
The minimal steps required to actually use collective.mustread in your own project:
Install collective.mustread and configure a database connector. The default connector is a in-memory database which is not suitable for production.
Activate the collective.mustread.maybe_must_read and collective.mustread.track_read_enabled behaviors on the content types you’d like to track, via GenericSetup. Or roll your own custom behaviors.
For these content types, hit ${context/absolute_url}/@@mustread-hit when viewing the content. Ideally you’ll use some kind of async queue at this stage.
Use the tracker API to query the database and adjust your own browser views based on your own business logic. The recommended way to obtain the tracker is:
from collective.mustread.interfaces import ITracker from zope.component import getUtility tracker = getUtility(ITracker)
Contribute
- Issue Tracker:
- Source Code:
Support
If you are having issues, please let us know via the issue tracker.
License
The project is licensed under the GPLv2.
Contributors
- Guido A.J. Stevens, guido.stevens@cosent.net
- Harald Friessnegger, harald@webmeisterei.com
Changelog
2.0.0 (2020-01-27)
- Indicate end of database initialization in logs [thet]
- Support Plone 5.2 and Python2.7, Python 3.6 and Python 3.7 [ale-rt, thet]
1.1.1 (2019-03-25)
- Do not break on the upgrade step that adds columns to the mustread table [ale-rt]
1.1.0 (2017-05-11)
Added the possibility to specify engine parameters through the registry [ale-rt]
remove unneeded columns in ORM model (site_name, title, info) [fRiSi]
Implemented API for scheduling items as must-read for certain users. (see collective.contentrules.mustread for usage)
This required new database columns. The provided upgrade step works for sqlite databases but might need changes for mysql or postgres. [fRiSi]
Allow to create and configure a database file by using the @@init-mustread-db view [fRiSI]
1.0.1 (2016-12-28)
- Provide verbose error logging when database is not accessible [gyst]
- Trivial testing change [gyst]
1.0 (2016-11-24)
- Initial release. [gyst]
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages. | https://pypi.org/project/collective.mustread/ | CC-MAIN-2021-17 | refinedweb | 1,209 | 51.24 |
Django Template - Convert a Python list into a JavaScript object
I am working on a Django / Python website. I have a page where I want to display a table of search results. The list of results is passed in to the template as normal.
I also want to make this list of objects accessible to the JavaScript code.
My first solution was just create another view that returned JSON format. But each page load required calling the query twice. So then I tried only downloading the data using the JSON view and printing the table using JavaScript.
But this is also not desirable as now the presentation layer is mixed into the JavaScript code.
Is there a way to create a JavaScript object from the Python list as the page is rendered?
How about a filter that dumps a Python value to JSON? Here's a sample implementation:
Since a JSON value also happens to be a valid right-hand side for a Javascript assignment, you can simply put something like...
var results = {{results|jsonify}};
inside your script.
It's nice to be able to quickly make Python lists and dictionaries into JSON. Change History (51) That is, binding some data to a JavaScript variable. The library parses JSON into a Python dictionary or list. It can also convert Python dictionaries or lists into JSON strings. We often came across a situation where we need to convert from one data structure to another. Python has so many data structures to work with, and each structure adds something to the table.
Solution
I created a custom template filter, see custom template tags and filters.
from django.core.serializers import serialize from django.db.models.query import QuerySet from django.utils import simplejson from django.utils.safestring import mark_safe from django.template import Library register = Library() def jsonify(object): if isinstance(object, QuerySet): return mark_safe(serialize('json', object)) return mark_safe(simplejson.dumps(object)) register.filter('jsonify', jsonify) jsonify.is_safe = True
The calls to mark_safe are important. Otherwise Django will escape it.
In the template:
//Without template filter (you'll need to serialise in the view) var data = jQuery.parseJSON('{{ json_data|safe }}'); alert(data.length); //Using the template filter var data2 = jQuery.parseJSON('{{ record_list|jsonify }}'); alert(data2.length);
Note the single quotes around the template tag.
Although my next question would be - is it REALLY safe?
Update
An updated version working in django 1.8 of the above template tag that also handles being passed a flat values list, ie. values_list('myfield', flat=True):
from django.core.serializers import serialize from django.db.models.query import QuerySet, ValuesListQuerySet from django.template import Library import json register = Library() @register.filter( is_safe=True ) def jsonify(object): if isinstance(object, ValuesListQuerySet): return json.dumps(list(object)) if isinstance(object, QuerySet): return serialize('json', object) return json.dumps(object)
If the variable evaluates to a Template object, Django will use that object as the parent You can loop over a list in reverse by using {% for obj in list reversed %} . This operator is supported by many Python containers to test whether the given This does not make the string safe for use in HTML or JavaScript template Convert list with each element an object of class into json Tag: python , json , flask I have a python list where each element in the list is the object of a class Summershum.Model.File:
New in Django 2.1:
json_script
Django 2.1 introduced a new template tag:
json_script. It is almost exactly what you are looking for, it might be even better. It converts a Python value into JSON, wrapped in a
<script> tag. So this template:
{{ value|json_script:"foobar" }}
... would produce this:
<script id="foobar" type="application/json">{"example": "example"}</script>
This is not a normal Javascript
<script> tag, it doesn't run, it's just JSON. If you want to access the contents in your Javascript, you can do so like this:
var value = JSON.parse(document.getElementById('foobar').textContent);
This tag has been coded so that it is properly escaped, a string with
</script> in it won't break anything, for instance.
The for tag in Django will loop over each item in a list, making that item The slugify filter will convert the spaces of a string into hyphens and convert the string to Django loads the page and returns in a JavaScript object that you can then Unlike select_related , prefetch_related does its magic in Python, For a JavaScript object stored in a Django field as text, which needs to again become a JavaScript object dynamically inserted into on-page script, you need to use both escapejs and JSON.parse(): var CropOpts = JSON.parse("{{ profile.last_crop_coords|escapejs }}");
Look this answer too.
But it isn't highload way. You must:
a) Create JSON files, place to disk or S3. In case is JSON static
b) If JSON is dynamic. Generate JSON on separately url (like API) in your app.
And, load by JS directly in any case. For example:
$.ajax('/get_json_file.json')
P.S.: Sorry for my English.
Django's templates are not simply Python code embedded into HTML. Style Sheets (CSS), semantic markup and JavaScript in the front end to create the This is a sample of the template tags, variable methods and filters available in Django. Note that Django will search your DIRS list in the order listed, so keep in mind Django knows how to convert these Python values into their corresponding database type. The output_field argument should be a model field instance, like IntegerField() or BooleanField(), into which Django will load the value after it’s retrieved from the database.
The list is available in template (template.html) by using. {% for shbf in That will convert a Django queryset into a JSON object. Then, in your JS But note that not all python objects can be sent this way. You can't, for If the variable evaluates to a string, Django will use that string as the name of the parent template. If the variable evaluates to a Template object, Django will use that object as the parent template. See Template inheritance for more information. Normally the template name is relative to the template loader’s root directory.
Let's focus on the parts which are relevant to adding Vue.js into a Django project. added to a list, and the list is passed on inside a context dictionary to the template. As the template is going to change quite a bit, I created a new one, and called it This way, we get a JavaScript variable people which is being set to the The Django template language¶.
You should be able to serialize the data as JSON, and pass it down in an object in a script tag. This way, you can access the injected code as a global. 10.1K views For the time series we need to convert Python’s datetime objects to Javascript Date objects and we do so in line 44. line 62-69 vectorises the tweet content to tf-idf counts, which is a common | http://thetopsites.net/article/52651795.shtml | CC-MAIN-2020-40 | refinedweb | 1,180 | 66.33 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.