text stringlengths 102 284k | nemo_id stringlengths 18 18 |
|---|---|
[an error occurred while processing this directive]
BBC News
watch One-Minute World News
Last Updated: Tuesday, 25 May, 2004, 16:18 GMT 17:18 UK
Abu Ghraib: Dark stain on Iraq's past
By Martin Asser
BBC News
US troops in Abu Ghraib, 22 April 2003 (Photo: BBC/Martin Asser)
US troops inspect a mass grave after taking control of Abu Ghraib in April 2003
Abu Ghraib prison lurks behind high walls and brooding watchtowers on the main highway west of Baghdad.
A square kilometre of hell during Saddam Hussein's horrific rule, it has retained some of its malevolence since US forces took over the facility, two weeks after toppling the Iraqi regime.
The huge prison complex was built by Western contractors in the 1960s.
The size of a small town, the area was divided into five separate walled compounds for different types of prisoners.
By the fall of the regime in 2003 these compounds were designated for foreign prisoners, long sentences, short sentences, capital crimes and "special" crimes.
Yehiye Ahmed
But there is little doubt that the Baathist regime used it as a vast holding tank for enemies and "undesirables", who were incarcerated, tortured and executed at the leisure of Saddam's security enforcers.
In contrast to the US occupation, there are no Saddam-era photographs from inside Abu Ghraib - but human rights agencies have numerous accounts of the violations witnessed there.
Amnesty International reports give some idea of the scale of the brutality - though researchers admit to being unable to provide a full picture because of the regime's secrecy.
• 1994 - More than 150 detainees executed over two days in January
• 1996 - Hundreds of opposition group members executed in November
Click here for a satellite image of the Abu Ghraib prison (51K)
• 1998 - 60 people executed in June, mostly detainees from 1991 Shia uprising
• 1999 - At least 100 prisoners executed on 12 October
• 2001 - 23 political prisoners, mainly Shia Muslims, executed in October
In addition to the mass executions, detainees were subjected to extreme torture - including the use of electric shocks, drills and lighted cigarettes on the body; the extraction of fingernails, beatings, mock executions and threats to rape detainees' relatives.
Local resident Yehiye Ahmed was quoted in April 2003 recalling the constant sound of prisoners' screams over the prison walls. He said he witnessed atrocities when he entered the compound to sell sandwiches and cigarettes.
"I saw three guards beat a man to death with sticks and cables. When they got tired, the guards would switch with other guards. I could only watch for a minute without getting caught, but I heard the screams, and it went on for an hour," he told the US publication Newsweek.
Bizarre decoration
It is reported that about 15,000 detainees were held at Abu Ghraib, most of them kept in row-upon-row of one- or two-storey cellblocks.
Mural at Abu Ghraib jail (Photo: BBC/Martin Asser)
Prison mural showing Palestinians celebrating as Saddam decapitates "Zionist snake"
Each block was as spartan as could be expected, with a dining room, prayer room, exercise area and rudimentary washing facilities.
The cells were horribly overcrowded, with up to 40 people in a space four metres by four.
The only decoration to break the drab oppressiveness of the surroundings was the bizarre adulatory portraits of Saddam Hussein and inscriptions of his "words of wisdom".
Pictures showed him liberating Palestine and benevolently presiding over grandiose infrastructure projects in Iraq, while the inscriptions urged prisoners to maintain hygiene and be loyal to the Arab nation.
Perhaps the most bitterly ironic image, given the benighted nature of his regime, was the monumental portrait at the main gate.
A smiling Saddam in business suit and Islamic architectural backdrop subtitled: "There is no life without the Sun and no dignity without Saddam".
New regime
By chance, while reporting for BBC News Online, I was at Abu Ghraib on 22 April 2003, the very day that US military police arrived to take over the facility after the fall of the regime.
It had been only lightly looted, vandalism mainly, and the MPs - reservists led by a colonel from Florida - were there to secure the location "as a possible centre for operations".
Section for Abu Ghraib prisoners at Karkh Islamic Cemetery (photo: BBC/Martin Asser)
Hundreds of victims of Abu Ghraib were buried in numbered graves at a nearby cemetery
Neither the colonel nor I had any idea that this little-known remnant of an ugly past was destined to become one of the most vivid and memorable locations of the "new" Iraq.
The American troops knew neither the name nor the past function of the set of map co-ordinates they had been given. I remember wondering whether they weren't sending the wrong message to Iraqis by installing themselves in the very heart of the darkness of Saddam's regime.
To underline the point, as the MPs fanned out through compound, we stumbled across the remains of probably the last victims of Saddam's Abu Ghraib nightmare.
Near the foreigners' section there was a half-buried, three-week old corpse - one of about 20 inmates apparently shot at the prison as the regime teetered on the brink of collapse.
Almost farcically, the commanding officer declared the site a "crime scene" and ordered the arrest of half a dozen local civilian police who had been sent by their commander to liaise with the US soldiers.
US abuses
In the months that followed, Abu Ghraib jail has been re-designated as the Baghdad Central Detention Center, now holding up to 5,000 Iraqis detained by US forces for a variety of offences.
Until recently, detainees were mainly kept in two tented areas - camps Vigilant and Ganci. These were replaced in May 2004 by Camp Avalanche, built on concrete to reduce the dust problem.
Abu Ghraib abuse picture (AP Photo/Courtesy of The New Yorker)
Under the dictator Abu Ghraib was a symbols of death and torture. That same prison became a symbol of disgraceful conduct by a few American troops
George W Bush
There is also the Hard Site, the Americans' name for the old cellblock complexes refurbished to US military specifications.
It is here that troublesome inmates and more serious cases are sent, and where by all accounts the infamous abuses took place and photographs taken.
Haydar Sabbar Abed has identified himself as one of the victims of US torture.
He told the BBC he was arrested for not carrying his ID card and he was taken to Abu Ghraib's Hard Site after having a fight with an Iraqi prison employee in one of the tent camps.
"They cut off our clothes and... told us to masturbate towards this female soldier. But we didn't agree to do it, so they beat us," he said.
"They made us act like dogs, putting leashes around our necks. They'd whistle and we'd have to bark like dogs. We thought they were going to kill us".
Apparently, an intrinsic part of the abuse was to take photographs of the humiliated prisoners, which is how the scandal has come to light.
The coalition has put the abuse down to the work of a "few bad apples" who do not represent the US army.
Critics say the prison guards must have been acting on higher authority and claim it was a routine used to soften up prisoners for interrogation, but this has been denied by the coalition.
Now, as Washington struggles to patch up its battered policies in Iraq after the prison scandal and as the anti-US insurgency continues unabated, President George W Bush has promised to demolish Abu Ghraib "as a fitting symbol of Iraq's new beginning".
The announcement drew enthusiastic applause from the assembled top brass at the US Army War College in Carlisle, Pennsylvania. But many Iraqis have spent the last year wondering why Abu Ghraib wasn't torn down long ago.
We asked if you thought Abu Ghraib should be closed and demolished?
Your comments:
It probably should be torn down, albeit a little late. At this point it's just a ploy by the president. I think that the president is now on a mission of damage control. It appears that the recent events there will yet again be covered up by the US government whose official comment anytime anything happens is "we didn't do it", "it wasn't us". As bad as it was, it's a good thing that pictures were taken so that my government could not say yet again, it's just a rumour.
Brian M, USA, WA
It should be kept as a reminder of America's double talk
Astra Chang, Trinidad
Abu Ghraib is a potent reminder of what can happen when people dehumanize and hate one another. I do not believe for a second that the US soldiers were acting independently, and it should be kept as a reminder of America's double talk. Why should I believe anything they now say?
Astra Chang, Trinidad, West Indies
I think the Abu Ghraib should be closed down but preserved so that this horrendous history of maltreatment and their victims will not be forgotten. Gas chambers by the Nazis and the site of Hiroshima nuclear bombing are preserved for these purposes, and hopefully the site of Abu Ghraib will continue to remind people that violence resolves nothing.
Miwa, Chicago, US
No, not demolished, for to demolish is to forget. Abu Ghraib should be severely dismantled, like the castles of England Cromwell "slighted," so that it cannot be used as a prison again. But part of it must be saved as a warning to ourselves and to future generations. Don't pave over a symbol of shame for Iraqis and Americans alike. Even so, I don't expect the US administration to promote the memory of its own mistakes.
Clinton Crowley, Fort Worth, Texas, US
Abu Ghraib should definitely be shut down because it was a symbol of Saddam's tyranny. By using Abu Ghraib, the US has also unfortunately tied itself to that prison's dark legacy.
Omair Saadat, Stanford, CA, USA
Abu Ghraib prison is an icon of cruelty against the humanity whether it is under USA or Saddam. Why somebody need a prison wall when the whole country is a prison - only the prison guards has changed.
Hussain Chirathodi, Riyadh, Saudi Arabia
This land should be left barren
Bo Arnold, Columbus
Yes! This prison and all of the prisoner/human rights abuses that it has stood for should be demolished. This land should be left barren to finally give the tortured souls a chance to seek their peace.
Bo Arnold, Columbus, USA
My first thought was to definitely destroy the prison, erase it from history. But then I thought of the concentration camps. We cannot erase history. Forever this prison will be a symbol of Saddam's regime and now it is also a symbol of the torture at the hands of the American soldiers. It should be preserved and memorialized so that we can visit with our kids and show them how horrible human beings can be to one another.
Carrie, Lincoln, Nebraska, USA
It should be transformed into a mausoleum for those who perished under tyranny everywhere for generations to come.
Shakib Ahsan, Oklahoma
No! It should not be torn down. It should be made a memorial to the atrocities of both Saddam Hussein, the US and UK Army.
Rakesh Jain, Edison, USA
No I do not think it should be demolished, especially if it is to make way to a new prison. Why spend money to remove a jail just to erect a new one when that same money could be used else where... say in opening up a new school. A prison is meant for criminals. Abu Ghraib housed many innocents. Maybe if it is used for what it was built for people would not object. But it is dumb to think that destroying it and erecting a new one would some how make the memories all better.
Rau, India
The BBC's Clive Myrie
"The speech didn't deliver"
Americas Africa Europe Middle East South Asia Asia Pacific | dclm-gs1-008830000 |
[an error occurred while processing this directive]
BBC News
watch One-Minute World News
Last Updated: Friday, 12 January 2007, 17:46 GMT
How to keep up with TV drama 24
Warning: This story contains plot spoilers
By Kevin Young
Entertainment reporter, BBC News
The new series of real-time TV drama 24 begins this Sunday in the US and on 21 January in the UK.
Kiefer Sutherland as Jack Bauer 24
Kiefer Sutherland stars as one-man crime-fighting machine Jack Bauer
The show, which stars Kiefer Sutherland, has won critical acclaim for its topical, fast-moving storylines.
But the pace can also leave infrequent viewers struggling to keep up with the changing characters and terrorist plots.
If you have missed any of the previous five seasons, or feel daunted at the prospect of watching 120 episodes from the start, our quick recap will bring you up to date ahead of the twists and turns of Day 6.
Leslie Hope and Elisha Cuthbert as Teri and Kim Bauer in 24
James Badge Dale as Chase Edmunds in 24
Gregory Itzin as Charles Logan in 24
Sarah Clarke as Nina Myers in 24
William Devane as James Heller in 24
We meet Jack Bauer, a special agent with the Counter-Terrorism Unit (CTU) in Los Angeles.
Leslie Hope and Elisha Cuthbert as Teri and Kim Bauer in 24
The kidnapping is organised by a man Bauer once tried to capture
Today, we learn, will be the longest day of his life.
Jack's wife Teri and daughter Kim are held hostage by terrorists wanting to kill Democrat politician David Palmer on the day he runs in the US presidential primaries.
The kidnappers demand that Jack assassinates David, threatening his family unless he complies.
They also have a mole within CTU.
Sarah Clarke as Nina Myers in 24
Nina Myers is introduced as an integral part of the 24 storyline
She turns out to be Nina Myers, Bauer's former lover and now the girlfriend of senior CTU figure Tony Almeida.
David Palmer's death is averted but Teri works out that Nina is the informer.
Teri is promptly shot dead by Nina, who is then captured.
It is the kind of plot twist for which 24 will become famous.
Jack Bauer has left the Counter-Terrorism Unit (CTU), while Kim has recovered from her kidnap ordeal to become a nanny.
Elisha Cuthbert and Skye McCole Bartusiak as Kim Bauer and Megan Matheson in 24
Kim Bauer (left) is on the run from Megan Matheson's abusive father
She goes on the run to rescue a young girl in her care from an abusive father, but does so on the day that terrorists threaten to detonate a nuclear bomb in the US.
Jack becomes embroiled in both storylines.
New character Kate Warner discovers that her sister is about to marry a man with connections to the planned bombing and helps CTU.
Nina Myers is employed by the baddies to share her knowledge of CTU, and double-crosses Jack to take him hostage.
Sarah Wynter and Phillip Rhys as Kate Warner and Reza Naiyeer in 24
Kate Warner (left) becomes a key witness as agents chase the bomb
Jack's efforts mean the bomb is found and former CTU director George Mason flies the device into the desert on a suicide mission.
David Palmer is now the US president but is removed from office by Cabinet members who lose faith in his handling of the bomb plot.
He is reinstated, but the series ends with an assassination attempt - he collapses after shaking the hand of a woman who has passed on a lethal substance.
Jack Bauer is back as a Counter-Terrorism Unit (CTU) agent. But he is addicted to heroin, the relationship he developed with Kate Warner is over, and he has a new partner at work, Chase Edmunds.
Penny Johnson Jerald and Dennis Haysbert and Sherry and David Palmer in 24
Interfering Sherry Palmer (left) is murdered in an act of revenge
Chase is going out with Jack's daughter Kim, who now also works for CTU.
Jack is upset about this and it distracts him as he searches for terrorists who want to release a deadly virus in Los Angeles.
Nina Myers returns, trying to buy the virus from shady characters in Mexico. Jack finds her and she tricks him into infecting CTU's computer system.
David Palmer has survived the attempt on his life but decides not to seek re-election when a political scandal hits his family, ending in the murder of his wife.
James Badge Dale as Chase Edmunds in 24
Jack is forced into drastic action when the virus is attached to Chase
Nina holds Kim at gunpoint but Jack finds them and shoots Nina.
Finally, his nemesis is dead.
A container holding the virus ends up being attached to Chase's arm.
Jack hacks off the limb so the substance can be made safe. Happily for Jack and Kim, Chase's arm is sewn back on in hospital.
Jack Bauer has been fired by the Counter-Terrorism Unit (CTU) and now works for Defense Secretary James Heller.
William Devane and Kim Raver as James Heller and Audrey Raines in 24
The execution of James Heller (left) is to be shown online by terrorists
He has to keep quiet about his new girlfriend, Audrey Raines, as she is Heller's daughter.
Turkish terrorist Habib Marwan kidnaps Audrey and her father and plans to execute them.
He is also behind several plots, including a meltdown at power plants and an attack on Air Force One.
US Vice-President Charles Logan takes over as leader following the plane crash.
Carlos Bernard and Shohreh Aghdashloo as Tony Almeida and Dina Araz in 24
Former CTU boss Tony Almeida (left) returns to help find terrorists
Jack manages to foil an attempt to steal and launch a nuclear missile but a botched raid from earlier in the day comes back to haunt him.
He went to catch a renegade official at the Chinese consultate, but this led to the death of the country's consul.
The Chinese are furious and want to kill Jack, but colleagues help him to fake his own death and he walks off into the sunset.
Jack Bauer is living as Frank Flynn and is asked to help foil terrorists targeting the Russian president's visit to the US.
DB Woodside and Dennis Haysbert as Wayne and David Palmer in 24
Ex-president David Palmer (right) is killed by a sniper as the day begins
The four people who saw Jack fake his own death become targets themselves. Ex-president David Palmer is assassinated, with Jack framed as the killer.
Jack's former Counter-Terrorism Unit (CTU) colleagues Michelle Dessler and Tony Almeida are also murdered, but IT geek Chloe O'Brian is saved, with Jack's help.
The terrorists take hostages at an airport, then steal nerve gas and release it at a shopping centre and CTU headquarters.
Gregory Itzin and Jean Smart as Charles and Martha Logan in 24
President Charles Logan (left) is involved in the terrorists' plot
David Palmer was killed because he found out that the terrorists' plot was part of a government conspiracy, with President Charles Logan at its heart.
Logan is arrested after Jack stops a submarine attack and kills the terrorists.
But as Jack is reunited with girlfriend Audrey Raines, he is lured away by Chinese agents in revenge for the botched raid on their consulate, and is held captive on a cargo ship.
The sixth series of 24 launches on Fox across the US on Sunday 14 January.
It will be shown on Sky One in the UK from Sunday 21 January.
Extras star lands 24 cameo role
21 Nov 06 | Entertainment
24 creators work on medical drama
13 Nov 06 | Entertainment
Emmy best drama and actor for 24
28 Aug 06 | Entertainment
Sutherland reveals 24 movie plans
05 May 06 | Entertainment
Patchy 24 ends second day
21 May 03 | Entertainment
24's finale worth the agony
18 Aug 02 | Entertainment
The BBC is not responsible for the content of external internet sites
Has China's housing bubble burst?
How the world's oldest clove tree defied an empire
Why Royal Ballet principal Sergei Polunin quit
Americas Africa Europe Middle East South Asia Asia Pacific | dclm-gs1-008840000 |
Page last updated at 23:11 GMT, Tuesday, 4 May 2010 00:11 UK
Lack of sleep 'linked to early death'
Not too little sleep, yet not too much, the experts advise
Getting less than six hours sleep a night can lead to an early grave, UK and Italian researchers have warned.
They said people regularly having such little sleep were 12% more likely to die over a 25-year period than those who got an "ideal" six to eight hours.
They also found an association between sleeping for more than nine hours and early death, although that much sleep may merely be a marker of ill health.
Sleep journal reports the findings, based on 1.5m people in 16 studies.
The study looked at the relationship between sleep and mortality by reviewing earlier studies from the UK, US and European and East Asian countries.
Premature death from all causes was linked to getting either too little or too much sleep outside of the "ideal" six to eight hours per night.
But while a lack of sleep may be a direct cause of ill health, ultimately leading to an earlier death, too much sleep may merely be a marker of ill health already, the UK and Italian researchers believe.
Time pressures
Professor Francesco Cappuccio, leader of the Sleep, Health and Society Programme at the UK's University of Warwick, said: "Modern society has seen a gradual reduction in the average amount of sleep people take and this pattern is more common amongst full-time workers, suggesting that it may be due to societal pressures for longer working hours and more shift-work.
"On the other hand, the deterioration of our health status is often accompanied by an extension of our sleeping time."
Five hours is insufficient for most people
Sleep expert Professor Jim Horne
If the link between a lack of sleep and death is truly causal, it would equate to over 6.3 million attributable deaths in the UK in people over 16 years of age.
Prof Cappuccio said more work was needed to understand exactly why sleep seemed to be so important for good health.
Professor Jim Horne, of the Loughborough Sleep Research Centre, said other factors may be involved rather than sleep per se.
"Sleep is just a litmus paper to physical and mental health. Sleep is affected by many diseases and conditions, including depression," he said.
And getting improved sleep may not make someone better or live longer, he said.
"But having less than five hours a night suggests something is probably not right.
"Five hours is insufficient for most people and being drowsy in the day increases your risk of having an accident if driving or operating dangerous machinery."
Print Sponsor
'Sleep lessons' for grumpy teens
15 Mar 10 | Scotland
Bank sleep to fight tiredness
09 Feb 10 | Health
Women 'underestimate their sleep'
01 Oct 09 | Health
The BBC is not responsible for the content of external internet sites
Has China's housing bubble burst?
How the world's oldest clove tree defied an empire
Why Royal Ballet principal Sergei Polunin quit
BBC navigation
Americas Africa Europe Middle East South Asia Asia Pacific | dclm-gs1-008850000 |
BBC OnePanorama
Page last updated at 10:36 GMT, Friday, 5 May 2006 11:36 UK
Panorama theme tune
Panorama logo
The original Panorama titles showed the London skyline
The current theme tune is called Aujourd'hui C'est Toi and was composed by Francis Lai in 1969.
The latest version was mixed by David Lowe in 2005 but there were two earlier versions of it.
Before that, in the late 1950s and 60s, the programme opened to a piece of music called Opening and Endings written by Robert Farnon.
The original music on November 11 1953 was an extract from Jean Silbelius' Pelleas and Melisande.
In 2001 a spin-off version of Aujourd'hui C'est Toi was secretly made by two BBC music librarians, Paul Jackson and Adam Dineen. Their remix has a Dallas-sounding opening and dance beat.
They made it after hearing a rumour that Paul Hardcastle was to be invited to remix the music. They played their version to the Panorama team who were so impressed the remix was broadcast in July 2001 in a programme about Jeffrey Archer.
The Panorama theme tune has never been commercially released.
Has China's housing bubble burst?
How the world's oldest clove tree defied an empire
Why Royal Ballet principal Sergei Polunin quit
| dclm-gs1-008860000 |
Microsoft's Web business spurring development of IE
Microsoft has something even more fearsome than Firefox snapping at its heels: its own online business. But the industry still needs to hedge against Microsoft with Firefox.
There was a time when Microsoft could skimp on Internet Explorer innovation. Having trounced its Netscape rival, Microsoft rested on its IE laurels for years, barely updating the browser.
Today, Microsoft can't afford to rest on any laurels, least of all with IE.
In part this is due to rising competition. The open-source Mozilla Firefox browser, for example, now tops 24 percent market share and it, along with the Google Chrome browser, and Apple's Safari browser, regularly push well beyond IE's comparatively glacial development.
However, the biggest challenge to Microsoft's IE development inertia is Microsoft itself. As Mozilla's Asa Dotzler posits:
That [IE] team has some really strong people and they're not going to let another release go by where they're still seen as badly trailing. Not with Office moving to the Web. Not with Search and other web services becoming huge revenue opportunities.
Falling short with IE 9 would be the last straw for Web developers' little remaining faith in Microsoft and so they won't miss this opportunity.
The browser used to be a sideshow to Microsoft's Windows and Office cash cows. In the future, however, the browser is the gateway to the next generation of Microsoft dominance...or irrelevance.
As the world moves online, how well Microsoft delivers an innovative browser experience will largely determine the future of the company.
At the same time, how well Mozilla delivers a neutral, innovative Firefox is the industry's best defense against Microsoft and Google too tightly coupling their browsers to their Web services.
It's therefore time for Facebook, IBM, Oracle, Salesforce, and others with a vested interest in an open gateway to an open Web to put their development resources where their mouths are. Contribute to Firefox. Microsoft (and Google) has an interest in building a better browser, yes, but to ensure that browser runs others' services as well as Microsoft's, Microsoft must be kept honest.
Firefox is the best way to accomplish this.
Tech to make part of your St. Patty's Day festivities
Play Video
Member Comments | dclm-gs1-008870000 |
As consumers continue to seek new but not unfamiliar ingredients, as well as vegetarian and vegan options, a different type of milk is emerging on the scene: nut milk.
Almond milk, which is popular among the juice-cleanse crowd, is leading the charge of these concoctions, which are generally made by pureeing nuts with water and sometimes flavoring, such as vanilla, sugar or trendier sweeteners like agave nectar, and sometimes a little salt. The mixture is strained and the liquid is used in a variety of preparations or drunk straight.
“We use it in the pig sauce,” said Dave Santos, chef of Louro in New York City, referring to his suckling pig with piquillo peppers, charred onion and new potatoes.
He lightly toasts almonds, purees them with salt and carbonated water, and mixes the milk with liquid used to braise the pork.
“The almond milk adds a nuttiness and a creaminess, but in addition, because of the nut starches that thicken when it cooks, it adds a nice viscosity to the sauce without over-reducing,” he said. “The result is a nice, bright, nutty and viscous sauce with all the porky deliciousness.”
Juice Press, an 11-unit chain in New York City, sells bottled almond milk.Will Foden of 83 ½ in New York City freezes almond milk and almond liqueur to make a granita, a popular Sicilian street dessert.
Gregory Gourdet, chef of Departure in Portland, Ore., serves his strawberry and Asian pear crisp with a side of almond-milk ice cream. “I am a health-focused chef, and people of all dietary distinctions dine at Departure, so it is crucial that we have enough options for everyone,” Gourdet said. “This dessert is vegan and gluten-free, and nut milks are heart-smart and a go-to for the dairy-challenged.”
He added that almonds and strawberries also happen to be delicious together.
Other dessert specialists, such as Brooklyn Farmacy in Brooklyn, N.Y., keep almond milk on hand for the dairy intolerant.
Chefs are also using cashew milk as a more neutral-tasting vegan thickener.
Marcus Antebi, owner of an 11-unit vegan and mostly raw food chain in New York City called Juice Press, pours cashew milk — simply cashews pureed with water — into a blend of raw oatmeal and raw chia seeds for an energy-dense chilled pudding. The fats in the cashew milk congeal better than those in almond milk, he said, and the mild hint of natural sweetness also enhances the dish.
This dessert at Departure in Portland, Ore., is made dairy-free by using almond milk instead of regular milk in the ice cream.At Todd English’s five-unit Olives chain, based in Charlestown, Mass., almond milk is used instead of regular milk in a breakfast dish of steel-cut oat porridge that also has blueberries and toasted almonds.
Thomas Dunklin, executive chef at Three Degrees in Portland, Ore., makes a doubly trendy breakfast dish by adding almond milk to quinoa. He said he prefers the lower-calorie, higher-antioxidant nutrition profile of almond milk compared to regular milk and other milk alternatives. He also likes its nutty, rich flavor.
Jason McClure of Sazerac in Seattle uses housemade pecan milk to reinforce the flavor of his pecan-bourbon bread pudding. “The process is easy,” he said. “I use any kind of nuts, sweetener [such as honey or agave syrup], and water blended together and then strained through cheesecloth.” He also said he uses nut milk as a lighter substitute for cream in chocolate ganache.
Although nut milks are relatively new to American restaurant menus, they were all the rage in medieval Europe, according to Reay Tannahill, author of “Food in History,” published in 1988 by Crowne Publishing in New York City. “Almond milk had a high nutritional reputation and was poured down the throats of privileged infants in astonishing quantities,” according to the book. Walnut milk was also consumed.
Contact Bret Thorn at
Follow him on Twitter: @foodwriterdiary | dclm-gs1-008890000 |
Skip to content, or skip to search.
Skip to content, or skip to search.
NYC-Bound Flight Grounded After ‘Non-Credible’ Threat
An American Airlines flight bound for New York from San Francisco was grounded for five hours after a phoned-in hijacking threat, which has since been deemed “non credible” by the San Francisco police and other law-enforcement authorities. After the call, the plane was taken to a remote location where passengers were interviewed and re-screened while the airplane was searched. An original report said two people were taken off the plane in handcuffs in conjunction with the threat, but the AP is reporting that the removed couple told authorities they were “picked at random for questioning.” A Yale sophomore on the flight posited their appearance may have led to their selection: "It definitely seems like it was racial profiling, based on what they look like physically and the fact they are Pakistani
. It seems like this was a false accusation," he told the AP. (Other passengers refuted this claim, explaining the twosome “looked like typical Californians.”) The FBI confirmed two passengers were taken off the plane “separately,” but refused to “discuss the specifics why.”
Jetliner grounded in San Francisco after threat [AP via MSNBC]
Hijack threat grounds New York-bound flight in San Francisco [NYP]
Photo: Jeff Chiu/AP | dclm-gs1-008900000 |
Wages in German Construction Industry Rise
By Friedrich Geiger
FRANKFURT--Employers and employees in the construction industry have agreed to increase wages by 3.2% in western Germany and by 4.0% in the east of the country, industry association Zentralverband Deutsches Baugewerbe said Friday.
The wage hikes for the industry's around 750,000 employees becomes effective from May 1 and the agreement lasts for 12 months, according to ZDB. The minimum wage will rise to 11.30 euros ($14.58) per hour by January 2017.
The German construction industry has been benefiting from increasing order intake in recent years. More and more Germans want to buy homes as they seek a safe investment amid financial market uncertainty and take advantage of low mortgage interest rates.
The association and the labor union also agreed to bring tariff and minimum wages in eastern Germany in line with wages in western Germany within nine years. Wages in the east have been less due to lower productivity in the region which used to be socialist.
Write to Friedrich Geiger at friedrich.geiger@dowjones.com | dclm-gs1-008910000 |
New York
Sometimes when he wants a little break Gino Francesconi leaves his office at Seventh Avenue and 57th Street and strolls outside to watch the tourists. "I'll see two people walking together and one will notify the other 'that's Carnegie Hall,'" said Mr. Francesconi, his face lighting with pleasure.
"If the moment is right, I'll say 'do you want to come inside and see it?' I'll show them the main stage, then return them to 57th Street and they go on their merry way."
Zina Saunders
No one could be better at such a show-and-tell than Mr. Francesconi, 59, the venerable hall's first and only archivist and director of its Rose Museum.
Hired in 1986 to gather memorabilia for Carnegie's 1991 centennial, he stayed on after the festivities, first as a solo act, then as head of a four-person department. And now the boyishly enthusiastic Mr. Francesconi has a new challenge: orchestrating the preservation and digitization of the 300,000 programs, fliers, ticket stubs, photographs, letters, albums, scrapbooks and recordings that have been amassed from 50,000 events in Carnegie's three concert spaces.
Mr. Francesconi had always hoped Carnegie would figure prominently in his career, but he'd been thinking more along the lines of conducting Respighi than conducting research. A San Francisco native, he came to New York in 1974 to further his musical studies and began working part time at the hall as an usher, a job that led to a 10-year stint as backstage attendant—seeing to the pre- and postperformance needs of Ella Fitzgerald, Helen Hayes, Vladimir Horowitz, Yo-Yo Ma and Frank Sinatra, among others. In the process, said Mr. Francesconi, "I made the history of the hall my hobby."
Heady stuff, meeting and greeting the great and near-great, but, in 1984, his ambitions on hold long enough, Mr. Francesconi went to Italy to study conducting with Franco Ferrara, a tutorial cut short by the maestro's death. A replacement mentor would be available in a year, but meanwhile Mr. Francesconi needed a job. Back it was to Carnegie, where plans were afoot for the 100th anniversary, a celebration that would include an exhibit on the hall's history. But who would take charge of it? More to the point, what was going to be on display? At the time, the Carnegie historical record was minimal—a few volumes of programs, at best.
"Judith had an uncanny talent for spotting unique talent in others," Mr. Francesconi said, referring to Judith Arron, the hall's late general manager and artistic director. "She must have seen something in me. We agreed that I would see them through the centennial."
While he had no training as an archivist, a situation later remedied with courses at the Library of Congress and elsewhere. "Judith said it would be easier to teach me about gray boxes and acid-free folders than it would be to teach a real archivist the 96-year history of this place."
Mr. Francesconi was a quick study. When he learned, for example, that the magazine Modern Maturity (now AARP the Magazine) reached 27 million people—and, by the way, his target demographic, the over-50 crowd who might have some choice old Carnegie souvenirs—he called to see about placing an ad.
"The editor and I started talking," Mr. Francesconi recalled, "and he said, 'You mean Carnegie Hall doesn't have an archive?'" Because for decades the hall had been a rental facility and in more recent years the focus had been on saving and restoring it rather than memorializing it, no, Carnegie didn't have an archive. "And the editor said 'this isn't an ad; it's a story.'"
Ah, the power of the press. "Overnight," Mr. Francesconi said, "I started getting posters, photographs, programs." All told, some 15,000 pieces. He also started getting the handwritten memories of countless couples who met at a Carnegie concert, of the man who, as a 10-year-old, was sitting in the hall's balcony on Dec. 7, 1941, when Arthur Rubinstein was playing Brahms and the Japanese were attacking Pearl Harbor.
A while later, Benny Goodman's daughters donated Dad's clarinet. It occupies a place of honor in the 1,200-square-foot Rose Museum on the hall's second floor, not far from Fitzgerald's spectacles, the trowel used to lay Carnegie's cornerstone and—most precious—a ticket from the opening-night concert, May 5, 1891.
"I was on a quest to get that for 20 years. I finally found it," said Mr. Francesconi, who's hoping similar determination will produce the original drawings and renderings by Carnegie's architect, William Burnet Tuthill. "You hear those stories about someone going up in an attic or opening a door that hasn't been opened in years—and bingo."
He checks eBay EBAY -2.21% eBay Inc. U.S.: Nasdaq $56.70 -1.28 -2.21% March 13, 2014 4:00 pm Volume (Delayed 15m) : 11.26M AFTER HOURS $57.10 +0.40 +0.71% March 13, 2014 4:09 pm Volume (Delayed 15m): P/E Ratio 25.74 Market Cap $73.58 Billion Dividend Yield N/A Rev. per Employee $479,134 03/12/14 EBay Shareholder Smead Says Ke... 03/12/14 Icahn Makes His Case to eBay S... 03/11/14 Morning Links: A Bubble Warnin... More quote details and news » twice a day, knowing that you can't always get what you want. Carnegie was outbid on a limited-edition series of jazz recordings signed by impresario Norman Granz and outbid twice on a flier heralding a lecture on spiritualism by Arthur Conan Doyle. "He could have sold out more nights than Liza," observed Mr. Francesconi, who, at some point bowed to the fact that while making music was well and good, his future lay in Carnegie's past.
"Every year I would say, 'I'm going back to Italy to conduct.' But I kept postponing it. I was having too much fun," he said. "My grandmother finally said: 'You're not coming back. You're doing what you're born to do.' Sometimes you don't realize it until it's staring you in the face.
"At one point I said to my conducting teacher: 'I don't know what to do. If I stay in Italy there's a chance that my career will take off. But if I don't do that archiving job, I don't think anyone else will do it.'
"And he said: 'Let me ask you something. How many conductors have there been at Carnegie?'" Four thousand, maybe five, Mr. Francesconi guessed.
"And how many historians have there been?" the teacher persisted.
"I said 'none,' and my teacher said, 'Well, think about that.'"
A chunk of a girder stamped "Carnegie" sits in Mr. Francesconi's office near a photo inscribed "To Gino, Best Wishes, Benny Goodman." It's a quick elevator ride down to the Isaac Stern auditorium, where Mr. Francesconi led a visitor to one of his favorite perches, the second-tier stage right, box number four. "From here you can experience the stage and the audience. You get the whole package," he said. "A week doesn't go by without people calling our office and saying they were on the stage. They were part of a student recital or a student concert or their graduation was here. It all adds to the patina of the place."
Collectibles are still showing up. In a recent batch of mail were two programs from the 1940s and the 1960s. "And I needed both of them," said Mr. Francesconi, who has his own plans for adding to the historical record.
For years, during his term as the backstage attendant, he asked performers to sign a poster-size photo of the hall. "And someday," Mr. Francesconi said, "I'm going to donate it to Carnegie. That will be my gift, a memento of a wonderful time."
Ms. Kaufman writes about culture for the Journal. | dclm-gs1-008940000 |
Walk the Blue Fields
By Claire Keegan
Black Cat, 168 pages, $13
Every nation has been changed by globalization but perhaps none so much as Ireland. In just a couple of decades it has gone from being one of the poorest countries in Europe to being one of the most prosperous, a leader in information technology and a mecca for foreign investors. The social and emotional adjustments have been wrenching, though, with the older generation challenged, as ever, by the pace of change.
One aging curmudgeon recounts what he has observed of the new Ireland in "Walk the Blue Fields," Claire Keegan's superb story collection: "Young people couldn't catch a fish or skim cream off milk. They went around in cars they couldn't afford, with small children who'd never tasted their mothers' milk, committing adultery at the drop of a hat. In fact, hats didn't drop fast enough for them. They drank beer straight from the bottle, came back from America and Prague looking for pizzas, and couldn't tell a common potato from a Victoria plum."
The short stories of Ms. Keegan, who was born on a farm south of Dublin in 1968, capture the poetic essence of this land in transition, a country tentatively facing the future while still consumed by ancient customs, outlooks, legends, fears and fantasies. Scratch the affluent surface, her tales suggest, and you'll find the immemorial Ireland of Synge and Yeats.
More Books
• "Grand New Party": Ross Douthat and Reihan Salam provide their scheme for Republican revival.
• Five Best: Sir Robin Knox-Johnson, the first person to sail solo and nonstop around the world, offers his favorite books about sailing.
• "The Post-Office Girl": Stefan Zweig's "The Ecstasy of Transformation," published in German in 1982, has finally been translated into English.
• "Cost": Roxana Robinson's novel about a family dealing with an adult son's heroin addiction.
While she seems to have inherited the national gift for language, Ms. Keegan resists its downside, a tendency toward gratuitous lyricism. She never overwritaes. The eight stories that make up "Walk the Blue Fields" are tight and economic -- one is almost tempted to say laconic -- and yet they are also filled with rich images. A priest, the hero of the title story, reflects on the perennial question "Where is God?" and discovers that "tonight God is answering back. All around the air is sharp with the tang of wild currant bushes. A lamb climbs out of a deep sleep and walks across the blue field. Overhead, the stars have rolled into place. God is nature."
Ms. Keegan specializes in lonely or at least solitary characters, reflective introverts whose lives mirror the meaningful quiet of the land. In "The Forester's Daughter," Martha Deegan can scarcely tolerate the crude, inarticulate husband she shouldn't have married; she chafes at the futility of married life, of "making a bed, of drawing and pulling curtains"; she "rose late, drank her tea on the doorstep and threw meals together same as she was packing a suitcase." In "Night of the Quicken Trees," the heartbroken Margaret moves to an isolated farm, deciding to "stay in that house for as long as she could without harming anybody or letting anybody harm her" but in the end can't help getting mixed up with her only neighbor, a man even more reclusive and eccentric than she.
In the manner of so many first-rate talents, Ms. Keegan apprehends the tragedy and the humor of her surroundings in almost equal measure. While her characters' lives have all been blighted in one way or another, they are not without beauty, and they seldom lack some measure of consolation.
Ms. Allen is a writer in Brooklyn, N.Y. | dclm-gs1-008950000 |
Take the 2-minute tour ×
Say I want to carve a spoon from wood that I find, are there any trees I shouldn't use due to their toxicity? Are any that are particularly easy to carve or hardy?
share|improve this question
Good question, I never considered toxicity of wood in carving a spoon. Sounds like a good excuse to buy a titanium spork! thinkgeek.com/homeoffice/kitchen/8ace – Timothy Strimple Jan 26 '12 at 0:39
@TimothyStrimple: I find the spork extremely impractical. I have a set of spoon, knife and fork that are extremely light and are bent in a way that they "spoon". They lock together so they don't wander around separate when packed. – Stefano Borini Jan 26 '12 at 0:45
You will never convince me that a spork isn't an essential piece of survival gear! – Timothy Strimple Jan 26 '12 at 0:49
add comment
2 Answers
up vote 7 down vote accepted
I have to say that "eating with" falls under the same rules as "eating". Don't go out in the woods and put something in your mouth unless you know exactly what you are dealing with.
Many woods are toxic. Also remember that "wood" doesn't just come from trees, but all woody plants, which is why some shrubs are also listed here.
Specifically avoid the following (If it's listed here it has at least one poisonous variant. Since tree variants are difficult to distinguish, it's best for amateurs to not try these:
• Rhododendron
• Pines & Cedars (some are safe, but identification can be tricky)
• Laurel
• Black Locust (may be safe if heated)
• Elderberry (not a tree, but small tree vs. big shrub can be an easy mistake)
• Water Hemlock is extremely poisonous and the sap is quite toxic
• Horse Chestnut (unless properly prepared)
• Red Baneberry
Anything you are not certain of is not safe. Plants develop poisons as a defense mechanism. The fact that you're not eating it helps a little, but when you use the spoon it will be in contact with your food, which will absorb and exchange with the wood. Heat, moisture, loose pieces, sucking... many ways to get a bit of some toxin in your system. And why take the chance? If you're not sure, just eat with your fingers and the next time you hit town buy something safe.
All that being said, generally woods which are safe for smoking, such as apple, hickory, alder, and maple, will be safe for utensils.
Also bamboo is fairly common in much of the US now, easily identified, and safe to use.
Some varieties elder may be safe
share|improve this answer
I don't think Elderberry wood is poissonous, only the berries and gren parts. Also see my answer. – Tomas Feb 11 '12 at 13:59
I'm sorry, I should have saved my toxicity link, but I'll have to settle for wiki: "Due to the possibility of cyanide poisoning, children should be discouraged from making whistles, slingshots or other toys from elderberry wood." en.wikipedia.org/wiki/Sambucus. – Russell Steen Feb 11 '12 at 16:25
Well, I had a look into my book (poissonous plants), and the bark is poissonous. However, as I said, the old Slavonians used it for making a whistles. Also look here: jonsbushcraft.com/elderwhistle.htm – Tomas Feb 11 '12 at 16:33
Old peoples have in the past used many toxic substances for many things, not realizing what they are. Old Americans also used mercury in tonics to treat diarrhea. Biologically speaking there is definitely a risk of cyanide poisoning from continuous and/or improper use of elder. A spoon is going to be much higher risk than a whistle. ces.ncsu.edu/depts/hort/consumer/poison/Sambuca.htm – Russell Steen Feb 11 '12 at 16:47
@Mr.Wizard -- Please visit the links already provided and you will see that one is an National Institute of Health article on toxicity of pines.... – Russell Steen Feb 29 '12 at 18:18
show 3 more comments
Lime wood is used by carvers as it is very soft! I can recommend it too, personal experience. And it is not poissonous of course.
My friend is using the wood from European elder to carve pipes. Its wood was traditionally used for this purpose. I haven't found any information on elder wood to be toxic (the bark can be though), but if you want to be sure, continue with your research.
share|improve this answer
There are about 20 or 30 variants of elder. Some are certainly safe. Your friend is probably skilled at identifying them. But they are not generally safe for non-experts. Another possibility is that some part of the pipe making process denatures the toxin. I used to heat cure my pipes with sugar and honey and that will denature some toxins and seal against others. It's also possible that smoking just doesn't get enough of the wood itself into your mouth. Regardless, elder is toxic, and I wouldn't try it as an amateur. – Russell Steen Feb 11 '12 at 16:26
@RussellSteen, I mean sambucus nigra. There are only 2 species in our country, and sambucus nigra can be very easily distinguished and is the only common species. He used some oil on it, but it was just to make the wood more resistant. – Tomas Feb 11 '12 at 16:36
If you can provide a credible link saying it's safe for use I'll happily update my answer. I don't know what country you are in, but I'll also need to include that to keep it accurate to locale. But Elder in general, and esp. in the Americas, is usually going to be poisonous ces.ncsu.edu/depts/hort/consumer/poison/Sambuca.htm – Russell Steen Feb 11 '12 at 16:51
@RussellSteen, en.wikipedia.org/wiki/Sambucus_nigra doesn't say anything about its wood being poissonous. As for me, I consider it safe as for the whistle. – Tomas Feb 11 '12 at 16:59
The question isn't about whistles. – Russell Steen Feb 11 '12 at 17:05
add comment
Your Answer
| dclm-gs1-008960000 |
» Ubuntu » Packages » lucid (10.04LTS) » misc » icicles
[ Source: icicles ]
Package: icicles (22.0+20091019-1) [universe]
Links for icicles
Ubuntu Resources:
Download Source Package icicles:
Original Maintainer (usually from Debian):
• Sebastien Delafond
External Resources:
Similar packages:
emacs library that enhances minibuffer/input completion
Icicles lets you do the following:
* cycle through completion candidates that match your current
* use a pattern to match completion candidates, including:
- regexp matching (including substring).
- fuzzy matching.
- prefix matching (as in vanilla Emacs).
- command abbreviation matching.
* use multiple regexps to match candidates, chaining these filters
together like piped 'grep' commands.
* see all possible complete inputs (pertinent commands, variables,
and so on) that match your partial or regexp input: the list is
updated dynamically (incrementally) if you change your input.
* see all previous inputs that match your partial or regexp input,
and selectively reuse them.
* match input against completion candidates that do not match a
given regexp; that is, complement the set of matches and use the
result for subsequent matching.
* use multiple regexps to search (and replace) text across
multiple buffers, files, or regions.
* search areas of text that have a certain text property, such as
a face.
* browse Imenu or tags entries that match your partial or regexp
* create and use multiple-choice menus; that is, menus where you
can choose multiple entries any number of times.
* create and use multi-commands so you can perform an action on
any number of candidate inputs any number of times.
* perform set operations (intersection, union, etc) on the fly,
using sets of completion candidates or other strings.
* persistently save and later reuse sets of completion candidates
(e.g. project file names).
* complete input piecewise, against multiple completion
candidates, in parallel.
* complete key sequences, and navigate the key-binding hierarchy
(this includes the menu bar menu hierarchy) (see also LaCarte)
* sort completion candidates on the fly, in multiple,
context-dependent ways.
Other Packages Related to icicles
• depends
• recommends
• suggests
Download icicles
Download for all available architectures
Architecture Package Size Installed Size Files
all 634.1 kB2,252.0 kB [list of files] | dclm-gs1-008970000 |
Meta Battle Subway PokeBase - Pokemon Q&A
How come nobody can become a champion?
0 votes
Everybody beats the elite 4 and the champion
asked Dec 25, 2012 by pokekid5
1 Answer
2 votes
Best answer
What? At the end you do become champion, you just don't sit there forever waiting to fight an NPC.
answered Dec 25, 2012 by Ike,Lloyd Irving
I wonder when he eats. Or goes to the bathroom o.O?
When do vid game trainers bw? They stand their and wait for battle! Lol | dclm-gs1-008980000 |
Take the 2-minute tour ×
There is a lot of conversation regarding best practices1 in software development. I've seen at least three major points get a lot of discussion both on SE and elsewhere:
• What qualifies as a best practice, and why?
• Are best practices even worth discussing in the first place, because it's reasonable to assert that no practice is a "best" practice?
• When should you forego a best practice -- or perhaps most best practices -- either because it doesn't seem applicable or because of external constraints (time, money, etc.) that make the trade-off impractical?
Something that seems to come up far less often, but more than never, is a notion of common sense in software development. Recent experience has brought this notion to the front of my mind again.
My initial impression is that it is a different discussion than best practices, but with perhaps some cross-pollination.
When I think of common sense in general, I think of a set of rules that you've either picked up or been taught that give you a baseline to reason and make decisions. Following common sense is a good way to avoid you shooting your entire leg off. But beyond a pretty low baseline, common sense gives way to a need to make educated decisions, and educated decisions can even override common sense when the evidence seems compelling enough. I might be playing a little loose with the definition here, but I think it is close enough to spearhead my example.
When I think of common sense in software development, I think of all of the rules of basic hygiene to prevent a codebase from rapidly decaying into an incomprehensible mess. As examples, things like: not using a single global structure to maintain and communicate state within a non-trivial program; not using variables/method/class names that are just random gibberish; things that probably resemble what we've come to call anti-patterns quite closely. Where applying best practices the practical analogue to learning patterns, applying common sense could be seen as the practical analogue of learning anti-patterns.
With this in mind, I'd like to pose a few questions that seeing the answers of others for might help me reason my way through this.
Do others believe that there is a notion of common sense in software development? Would be interested knowing the reasoning either way.
If so, is it a notion worth discussing? Is it something we should push for as much as we sometimes do with best practices? Is it something worth pushing for even harder?
If the analogy to anti-patterns seems reasonable, the general rule is that anti-patterns are only employed if there is no other way, and even then only under very limited circumstances. How flexible should one be in allowing a codebase to deviate from common sense? It seems unreasonable that the answer is "not at all," because sometimes expediency demands deviations. But, it seems like a different sort of argument than when to employ a "best practice." Maybe it isn't; if you don't think so, I'd like to learn why.
This is far more opened ended and maybe worthy of a follow-on question all its own, what sorts of recommendations would you point at that seem like matters of common sense?
Other thoughts are also welcome.
1Perhaps I would do better to call them "commonly recurring domain patterns", but the name "best practices" is common enough that everyone knows what they are, even if they don't agree that they are. If the "best" part bothers you, just imagine I replaced "best practices" with something less authoritative sounding.
share|improve this question
Having common sense means you can use it to reason out the pros and cons of several solutions and select the best one for the problem. Someone whose experience consists of reading a couple of books on design patterns and best practices doesn't understand where and how to apply them. – Blrfl Jul 24 '11 at 11:43
add comment
12 Answers
up vote 8 down vote accepted
Best practices are practices that have been found to work well in a relatively wide field of circumstances. The problem with them is that A) the expression sometimes is abused for marketing and B) as fixed rules, they are not flexible enough; no set of fixed rules should be followed without thinking about whether they apply to the current situation.
Best practices are great when they come with explanations why they are "best" and in what circumstances they should be used. Then you can reason about when not to use them.
The problem with "common sense" is that it's too flexible - it can be used to justify pretty much anything, and you can't really have a rational discussion when people disagree and both claim their position is "common sense". It's good to have but poor as a guideline for a team to follow.
share|improve this answer
add comment
It seems to me that this question is a semantic trickery. If we use these definitions then there is no question:
Best Practice: a field proven way of solving a problem in a given domain (ie. real time best practices are totally foreign to database best practices)
Common Sense: professional experience that serves to warn the programmer of pitfalls to avoid
In the end, a Best Practice is a meta design pattern to solve a particular congruence of problems and is chosen based on real world experiences while Common Sense is a guide to problem solving based on general observation across multiple problem sets.
share|improve this answer
Well... it's semantic something-or-other. Not sure about trickery. "Common sense" doesn't always mean what it says. It has acquired a sense of not-following-the-academic-rulebook - an aspect of the all-brains-and-no-common-sense thing that basically refers to thinking beyond the scope of the rulebook. Sometimes, best practices aren't really applicable - reality is too complex for any finite set of generalizations to be perfect - so there are times when you have to use your own experience and - ahem - "common sense". – Steve314 Jul 24 '11 at 18:25
@Patrick: it wasn't my intention to be all tricksy. Part of my asking of this question was to explore the understanding I had of these two concepts, especially of "common sense", up to this point. Any apparent trickery is probably just a sign that my intuition about these ideas is nowhere near perfect. – Ed Carrel Jul 24 '11 at 18:36
add comment
I think you have it backwards.
When teaching programmers the basics of security, I always teach them to use best practices, and yet when dealing with security experts (or more "security-experienced" programmers) I will never discuss best practices, in fact I will often violate them.
A better definition would be:
"Best Practices" are common sense from experts, as should be applied by non-experts.
That is, you don't get to claim "common sense" until you have enough expertise in the given field to understand the subtle tradeoffs; and when you do, you should no longer be blindly following the cookie-cutter "best practices".
"Best practices" are a temporary placeholder until you have enough experience to use your own "common sense".
share|improve this answer
Oh, and if you're not familiar with the best practices, you don't have common sense, either. – AviD Jul 25 '11 at 15:50
add comment
Best practices -> "first, you learn the rules". Experience -> "then, you learn when and how to break them".
Willingness to experiment with alternatives (in non-critical code, of course - preferably personal projects and throw-aways) can help build the experience you need to.
Common sense isn't the same as experience, of course, and you don't always need much experience to see the flaw in applying a good technique in the wrong place - but it's very easy to construct false rationalisations for both over-applying and under-applying a technique, and since "common sense" here clearly isn't an innate knowledge of programming, that sense is clearly "common" only within particular groups.
It's very easy to "take sides". Impossible to avoid, in fact - sometimes one side really is right, and the other really is wrong, and it would be irrational to argue for balance. The trouble here is that the real hell isn't so much weighing one best-practice for relevance, but when two conflicting best-practice opinions collide.
Dealing with this is probably much more about people skills than about technical skills. I'm very bad at it :-(
Despite that, it's still important to learn from other peoples experience as well as you're own - ie to find out what the best practices are, why they are used, and what the advantages (and disadvantages) are.
share|improve this answer
add comment
Interesting timing. Last week this article was published discussing why common sense is not necessarily ideal in all situations.
Common sense is exquisitely adapted to handling the kind of complexity that arises in everyday situations...And because it works so well in these situations, we're inclined to trust it in all situations
(my words in bold)
Basically - humans aren't good at using common sense in areas such as this where we haven't developed an ingrained system, so we should ALWAYS use a documented set of standards and not rely on our own common sense!
share|improve this answer
Cognitive bias... again. And that's why you need to be an acknowledged expert, before you rely on your common sense... – AviD Jul 25 '11 at 9:23
add comment
Common sense = You.CommonSense
Best practices = Sum(Experts.Experience + Experts.CommonSense)
share|improve this answer
... * Marketing – keppla Jul 25 '11 at 10:04
add comment
Common sense does not correspond to learning anti patterns, nor is it different from, or in contrast to best practice.
The first problem with common sense is its name - it leads to the conclusion that it is both common and sensible. As commonly used, it is subject to attack on both counts. Using your example:
It is my understanding that this is not the way that anti-patterns arise. It is from an accretion of cultural and social factors; of disregarding best practices and standards over a substantial period; of ignoring the costs in the future to achieve short term benefits - for example to meet a deadline by using a short cut solution that is a maintenance nightmare; etc. No body sets out to adopt an anti-pattern deliberately - they just grow.
Equally, common sense is far too often used to mean "that that is done commonly", and justifying lack of thought, insight, and hard work in resolving what is involved in providing a solution. It is also used as justification for "its the way I do it, so obviously it is common sense" - and as a defense against review and criticism.
As far as best practices are concerned @Michael's first two paragraphs are an excellent summary of what best practice should be - a resource to assist everybody to improve what they do. It also provides transparency of decisions (design decisions particularly) and the capability to learn from others. The downside of best practice is when it generates a checklist culture - "I've ticked all the boxes, so what I've done must be alright" - without applying thought, care and attention to the nature of the applicability of the checklist.
share|improve this answer
add comment
This is a slippery slope argument that often devolves into a religious war.
Almost any best practice can be countered with a valid case for doing the opposite.
Some best practices are more "best" than others. Global state variables are almost always better done a different way and GOTO is usually a bad idea, but when you get into the pattern/anti-pattern or direct data/abstracted data arguments it gets a little less clear. Even more so when you start talking about development methodologies and practices.
In some situations common sense and best practices are even in opposition to each other.
There is no governing body of best practices and no single group even if it did exist could define every possible "best" for every possible situation. Many things labeled as best practices are just bad marketing trying to sell uninformed individuals tools or training.
Even when your entire team agrees that something is best it is not always possible to implement it that way for various constraining factors.
IMHO you have to use best practice as a guide as to what to consider more carefully in your design. You may have a valid reason for deviating, but you probably need to make certain that everyone else on the team agrees before you go and build something odd.
Some of the arguments about best practices after that point pretty much boil down to not building something that the next developer that has to work on it will hate. Everyone hates code that isn't their style, and everyone blames everything on anyone that leaves, so either you are going to explain it to the next dev after they grumble about something, or you aren't going to be there and get talked bad of regardless of how you code it. This makes that concern mostly irrelevant.
share|improve this answer
add comment
Common sense does not always yield the best results. Best practices, however, have been tried. This makes best practices a more reliable source of information.
share|improve this answer
add comment
The best practices aren't best, and common sense isn't common. ;-)
For either best practices or common sense, I like to think of them as patterns; Remember the definition of a pattern: A solution in a context resolving forces into a resulting context.
For anything you want to do, you should know the context that it applies to, the forces it resolves, and the resulting context that it creates. Then, decide on your team what the patterns you are going to generally use are. (This can be formal or informal, but either way, it's much larger than just the Gang of Four book. This includes language idioms and local helper libraries, not just published patterns.)
If you feel, based on your experience, that in a certain circumstance, it would be better not to use a given pattern, but to do something else, let people know. Probably the context or forces are different here (or perhaps the resulting context would be unwanted.) I don't care if it's a meeting, a code comment or what, but if you make it clear that you have broken the pattern on purpose, you'll be miles ahead.
share|improve this answer
add comment
Best practice is what they teach you at school, Common sense is what the boss wants form you. The former creates software that meets certain standards of elegance, style and such like. The latter pays the bills/makes the money so you get paid each week.
One is art, the other business, too many of us forget it.
share|improve this answer
The boss doesnt care about how you rationalize your way of acting, he cares about not having problems. A solution you call 'achieved by common sense' is as good to hims as one 'achieved by following best practices' – keppla Jul 25 '11 at 9:58
Let me rephrase my answer. Best practice is often used as an excuse for over engineering, to the extent that they are synonymous in many software houses. Common Sense is refraining from over engineering in the interest of successful (usually commercial) completion of the project. – mattnz Jul 25 '11 at 22:33
add comment
To exaggerate a little: The difference is Common Sense is Prejudice, Best Practice is (should be) Science
In my experience, 'Common Sense' is used when one does not want to provide proof or at least arguments for a way of doing things. That does not mean the way is neccessarily wrong, but it doesnt mean it is good either.
Among the things i encountered, that were rationalized as beeing common sense are these gems.
• the HTTP-Method is largely irrelevant, use GET when you transmit little data, use POST when transmitting more (i.e., to much for the URL)
• functions should not be too small, because it's hard to remember what they do. one big function is preferable to 5 smaller ones, because you can read it as one
• the database and the webserver MUST run on the same machine, or else the webservice will get to slow. The only way to scale is to speed up the code by hacks and by forgoing abstraction, so that the power of one machine suffices.
The funny thing about 'Common Sense' is, that it is not that common: pick two teams and let them state what they thing is 'common sense', and enjoy the religious wars.
On the other hand, as 'Best Practice' i would consider ways of doing things, that have a little more 'peer review'. To consider something a 'best practice', i would expect it to be formulated clearly enough so that it can be presented as a concept ('structured programming' is best practice, 'gotos are confusing, avoid them' is common sense), and applied more than once, with good results.
share|improve this answer
Are you saying that "Best Practice" is always appropriate in every situation, and where best practice is consciously not performed it is bad ("not good"). – mattnz Jul 25 '11 at 22:38
No, i say "Best Practice" has a higher chance of not beeing completely unreasonable, because it survived "peer review", contrary to common sense, which only has to seem reasonable to one person. I am not against implementing something that one consideres "common sense", i am against justifying anything as common sense. – keppla Jul 26 '11 at 19:51
add comment
Your Answer
| dclm-gs1-008990000 |
Take the 2-minute tour ×
Let's say your team is working on 10 features/fixes for a sprint. At the end of the sprint, there are one or two things that the product owner does not accept. But, they would really like the other 8 or 9 to be released.
How do you handle this? Using subversion, what would be the best methodology to manage a sprint with the possibility that this could happen?
share|improve this question
You are so screwed ... hginit.com – Job Aug 4 '11 at 4:00
not yet :) It hasn't happened yet. I'm trying to anticipate and prepare for if/when it does. – Amy Anuszewski Aug 4 '11 at 13:24
add comment
4 Answers
up vote 3 down vote accepted
Subversion is going to be the killer for you.
I was going to say put each feature in its own branch and merge the branches to produce the release candidate. Then if the customer decides to pull one or more features you can re-merge excluding the branches of the rejected features.
This will not be a trivial exercise with Subversion however as its' branch merging isn't apparently that great. Could you switch to Mercurial? Or Git?
share|improve this answer
I disagree, this is trivial using Subversion. – Justin Shield Aug 4 '11 at 3:56
If you want to see trivial use Mercurial. Subversion is pretty famous for ugly merging as detailed by Joel Spolsky in his introduction to Mercurial. Theoretically SVN should be able to do this but when you have 3 developers working on 6 features that happen to hit the same bit of code in subtle ways you will not be calling it trivial, trust me. I've done that sort of merge in PVCS & it wasn't a pretty sight. – mcottle Aug 4 '11 at 8:28
I was able to convince the rest of the team that it was time to switch to git. And, I just did my first branch and merge with git. It integrated very nicely into my IDE, and was absolute cake to do.(We picked git over mercurial because the integration with our IDE was better.) Now that it's not a scary nightmare, we will willingly do one branch per fix/feature. – Amy Anuszewski Aug 7 '11 at 0:48
+1 Git is a good choice as well – mcottle Aug 7 '11 at 2:06
add comment
How you handle SubVersion / Repositories
Normally what I do for something like this is I actually get all developers to write features in separate branches and then I will perform a merge to trunk, but tag that as Pre-Release.
This also gives me a chance to review each feature for correctness, if a branch or feature fails my initial QA then I don't merge it. If any feature gets dropped after it goes to QA it's then trivial to revert a specific revision from trunk and then re-tag and re-test.
share|improve this answer
add comment
If you are getting surprised by this at the end of sprints, I'd say that you need to rethink how you architect applications. There are 2 philosophies that I've come across that I recommend that you look at: Feature driven development and Software Product Lines.
With FDD, you will be thinking about your application architecture as a collection of features. Each feature should be able to stand alone, or be pulled from the project if necessary.
With software product lines, the premise is you will be making a number of different products that will have some features in common, and some features that are different. This involves more upfront design to refactor the common things into separate feature-libraries.
share|improve this answer
add comment
You really have to code in anticipation, unless the features never ever touch any common code.
If you use separate branches, then if multiple branches need changes in the same code, you'll get kind of random results by dropping any particular branch.
It's much better to build something into your requirements, and into your code, that lets you disable specific features as needed. Sometimes this will require having code for both old and new behavior; other times it will just need a way to block new behavior.
share|improve this answer
add comment
Your Answer
| dclm-gs1-009000000 |
Search tips
Search criteria
ACS Chem Biol. Mar 19, 2010; 5(3): 265–272.
Published online Feb 12, 2010. doi: 10.1021/cb900293a
PMCID: PMC2842019
Why Does Binding of Proteins to DNA or Proteins to Proteins Not Necessarily Spell Function?
Buyong Ma, Chung-Jung Tsai, Yongping Pan, and Ruth Nussinov*
Basic Science Program, SAIC-Frederick, Inc., Center for Cancer Research Nanobiology Program, NCI-Frederick, Frederick, Maryland 21702
* Corresponding author, ruthnu/at/
Received November 22, 2009; Accepted February 12, 2010.
An external file that holds a picture, illustration, etc.
Object name is cb-2009-00293a_0003.jpg Object name is cb-2009-00293a_0003.jpg
Studies of binding are often question: first, is the observed binding functional, and second, if it is, which function? Is it activation or repression? The first question relates to binding at different sites; the second relates to binding at similar sites. These questions apply to transcription factors binding to genomic DNA and to protein interaction domains binding to their partners. Here, we explain that both can be understood in terms of allostery and the cellular (or in vitro) environment. The idea is simple yet powerful; it emphasizes the role of allostery in defining whether binding between transcription factors and (cognate or noncognate) DNA sequences will lead to function and to the type of function. Allosteric effects are the outcome of dynamically shifting populations; thus binding to even slightly different DNA sequences will lead to different transcription factor conformations that can be reflected in the binding sites to their co-regulators. Currently, allostery is not considered when trying to understand how binding phenomena determine the functional outcome. Allosteric effects can enhance the binding specificity in a function-oriented manner. Here we provide a biological rationale that considers cellular crowding effects.
To be functional, proteins need to bind their partners; expressing function in the cell entails a network of binding events. Yet, in vivo and in vitro, binding of transcriptional control (TC) proteins to their cognate DNA response elements (REs) or of protein molecules to their protein partners does not imply function. Function is based on events taking place following binding, that is, whether the binding leads to specific subsequent binding events as specified by the cellular program. Consequently, identification of the location of the REs in the genome by chromatin immunoprecipitation (ChIP) that obtains protein−DNA interactions is often coupled with microarray readout of these experiments (ChIP-chip) (1). Such a combination assists in defining the in vivo utilization of genomic sequences by the TC proteins and the functional consequences. Toward this aim, the higher resolution and greater coverage ChiP-seq technique for genome-wide profiling of DNA-binding proteins is also gaining momentum (2). In genomic DNA, not all REs are chromatin-available (3). However, even for chromatin-available REs, binding of a TC protein does not necessarily indicate function. Similarly, detection of protein−protein interactions by co-immunoprecipitation via endogenous (not overexpressed and not tagged) proteins with subsequent Western blotting implies direct or indirect (via a bridging protein) binding; however, again, the binding may or may not specify function. Moreover, REs that are very similar, with only a single base pair (bp) change, can lead to vastly different functional consequences (48). Yet while it is broadly accepted that binding, whether of a TC protein to its RE or between proteins, does not indicate function, the reasons are not entirely understood. At one end of the spectrum, some types of specific binding are linked to specific functions ((1,1, panel A); at the other, specific binding is insufficient. Function is determined by subsequent events ((1,1, panel B). There are examples for both. For the first (4), p53 has a very large number of similar REs in the genome. Binding to certain REs activates DNA repair, cell-cycle arrest, senescence, or apoptosis; binding to others represses or inactivates pathways via either involvement of the histone deacetylase, inactivation of other DNA-bound and DNA-unbound activators, or other routes (5). The transcriptional repressor REST (NRSF), which encodes DNA binding affinity hierarchies contributing to regulation during lineage-specific and developmental programs, provides another example (9). Canonical REST REs bind strongly and control REST targets common to all cell types, whereas atypical motifs involve weak interactions in cell- or tissue-specific targets. Hence, selective binding of a certain RE already determines the functional outcome. The nuclear receptor (NR) provides an example for the other end of the spectrum; NR binding to its REs is insufficient. The functional outcome is determined by subsequent co-regulator, co-activator, or co-repressor, binding events at different sites (6,7). The Apak (ATM and p53-associated KZNF protein), a Krüppel-associated box (KRAB)-type protein(10) that regulates p53-dependent apoptosis, provides an example for a yet different mechanism: binding to both p53 TC and to DNA via its zinc-finger motif. At the same time, not all binding events away from the co-activator binding site are functional ((1,1, panel C). Why then does binding not necessarily imply function? We propose that to be functional, binding either should be a consequence of allosteric amplification of a minor conformational change, as in p53 and REST, or should lead to it, as in NR, or both, as in Apak. A similar situation can be seen in protein interaction domains (PID) such as PDZ, 14-3-3, Bromo, SH2, SH3, and LRR (11). Ligand binding to PID, mutations, or post-translational modifications away from the binding site allosterically alter the PID binding site conformation (12,13). ).22 provides two examples illustrating how binding at other sites by an RE (6) or agonist/antagonist ligand (14) can alter the respective co-regulator binding site conformations leading to activation or inhibition. Cellular fluctuations play key roles in all, either in the initial allosteric event or in subsequent binding events. Similar conformational changes can be elicited by perturbation (binding, post-translational modification) events on major allosteric pathways elsewhere in the structure (12). On the other hand, in nonfunctional binding the perturbation site is not on a major pathway between the RE’s (or agonist’s) and the co-regulator’s ((1,1, panel C). Thus chromatin immunoprecipitation obtains binding; however, microarray readout may not present functional change. This emphasizes the shortcomings in cellular network diagrams: pathways are neither simply sequential nor “yes/no” contingent events. Mechanistically, pathway steps are the outcome of allosteric response reflected in conformational selection (1520). This mechanistic picture rests on a dynamic view of molecules as ensembles of conformations.
Figure 1
Figure 1
An illustration to explain why binding does not necessarily spell function. The response elements (REs, red boxes) of a given transcriptional control protein (TC) have very similar DNA sequences, with small base pair (bp) changes, yet they regulate genes (more ...)
Figure 2
Figure 2
Two examples illustrating how binding at other sites−by an RE (A) or agonist/antagonist ligand (B)−can allosterically alter the respective co-regulator binding site conformation leading to activation or inhibition. In the left panel of (more ...)
In solution proteins exist as conformational ensembles, which can be described by statistical mechanical laws, and their populations follow statistical distributions (2123). The number of states is vast, the conformational differences are generally small, and the barriers are low ((3).3). The more flexible the proteins are (as in the case of transcription factors that are often disordered), the larger the number of states. Ample data from single molecule, NMR, and other techniques (2434) validate this description (19,3537). During binding, higher energy lower population conformers that are most complementary to the ligand are selected and the equilibrium shifts toward these conformers (1518). This validated (19) “conformational selection and population shift” model1518 for molecular recognition provides an alternative to the 50-year old “induced fit” hypothesis(38). Relating this description to binding and function, in our first case type ((1,1, panel A), binding implies function; hence a key question is how the TC protein selects a particular RE among all similar and available REs in the genome (4) and similarly, how the PID (11), which can have hundreds of partners binding at the same site (39), selects a specific one. Since here the affinities are generally low, selection is dictated by prior binding (or post-translational modification) events. These allosterically shift the ensemble toward specific conformations. At the other end of the spectrum ((1,1, panel B), the TC already binds with high affinity many REs. One or two bps changes are amplified via population shifts in the TC ((2,2, panel A). Similar shifts are reflected in the PID(11) following phosphorylation/acetylation or ligand (e.g., agonist/antagonist (14,40,41), ),2,2, panel B) binding. The outcome is surfaces complementary to a specific co-repressor or co-activator ((1,1, panel B) (14). This explains the fundamental question of how the minor differences elicited by substitutions of single bps among REs or mutational, post-translational modification or ligand-binding events can lead to vastly different functional effects. This question is particularly crucial since protein factors and DNA generally present only small conformational changes. We note that here we assume that one RE is recognized by a specific TC. Although to date no cases of one RE recognized by multiple TCs has been observed, in principle this can happen; under such circumstances the RE can block the TC binding site, mimicking an antagonist.
Figure 3
Figure 3
Simple illustration of conformational selection in terms of the free energy landscape. Several crystal structures of the glucocorticoid receptors and their corresponding REs are used here as examples. GR samples the conformational space around the native (more ...)
Gene expression is controlled by cellular networks, which consist of linked processes. Text books, such as Cell Biology(42) depict processes as diagrams of series of binding events, where one follows the other or is contingent on the other. However, events like those of the nuclear receptor (5,6) question such simple descriptions ((4).4). Conformational changes elicited by one RE differ from those of another. Eventually, which co-regulator, e.g., acetylase or deacetylase, is selectively recruited depends on co-regulator concentration, post-translational modification states, etc., that is, on the network. In turn, the network reflects the cellular environment. Similarly, a PID can bind similar ligands but elicit different conformational changes in the partner-binding site ((1,1, panel B). Hence, here DNA (or, ligand) binding observed by experiment does not indicate whether it activates or inhibits expression; function depends on sufficiently high concentration of protein factors that recognize a specific binding site conformation amplified by a certain RE (or ligand). On the other hand, in the first case (e.g., of p53 (4) or REST (9), ),1,1, panel A), binding implicates function. Such a description further sheds light on the often observed low affinity binding: affinity measurements may not reflect in vivo scenarios.
Figure 4
Figure 4
Allosteric regulation underlies the complex binding−function relationship in cellular networks. The figure highlights the inadequacy of current cellular diagrams that depict series of binding events. As an example. we depict the estrogen receptor, (more ...)
From the mechanistic standpoint, we face two problems: first, if binding is at different sites, is it functional or nonfunctional, and second, if at similar sites, what is the outcome, activation or inhibition? Experiments reflect steady-state concentrations; they do not follow the time course of the immense fluctuations in the cellular environment and the consequent allosteric effects. This problem transcends into cellular network binding diagrams that do not reflect this changing selectivity. Yet affinity is a function of allosteric effects, and “yes/no” contingencies cannot mirror such changes. Binding can be a function of concentration or selectivity; in turn, selectivity is the outcome of shifts of the ensemble of conformational states following perturbation events, that is, the outcome of allostery. To increase binding selectivity is then the key role of allosteric events, and allosteric effects are not accounted for in cellular network diagrams.
Binding is not necessarily highly selective, as in the case of the transcriptional repressor CoR or NotchIC binding to CSL (43), where binding reflects cellular concentrations; at the same time, cellular events reflect allosteric effects that amplify minor conformational changes, thus spelling higher selectivity. Cellular network descriptions should mirror both. Network modules have been featured from the topological standpoint (44,45). Recent work highlighted the relationship between protein conformational fluctuations and their “promiscuous functions” and how they can greatly facilitate the evolution of new functions. Such mechanisms have been delineated both experimentally (46) and theoretically(47). Phenomena described here further apply to the biological functions of protein disordered states where similar conformational principles apply (48,49). Here we suggest a mechanistic conformational level description where cellular processes consist of independent components governed by dynamically shifting populations. Such a description accounts for molecular level binding selectivity and incorporates the immense fluctuations in cellular conditions. It is based on a picture of molecules as dynamic conformational ensembles and at the same time explains how evolution minimizes errors in molecular recognition. Development increases functional complexity. We speculate that evolution faced the question of how to exert efficient response to the environment: engineer new control proteins or make use of the conformational space of existing ones? Developing new molecules is risky and slower, yet expanding existing ones is wasteful, requiring high concentrations with only some of the binding events being productive. To minimize the chance of errors, evolution nonetheless chose this route. The number of similar REs and similar PID partners increased dramatically (3,39,50,51), leading to numerous nonproductive binding events as in the case of the NR. However, at the same time, evolution embraced allostery: through environment-triggered conformational changes that lead to enhanced specificity, allosteric effects enforce an ordered sequence of events in multimolecular associations, leading to complex yet less error-prone structures as in the case of viral capsids. Allostery limits the conformational space of the association, reducing the chances of nonproductive associations inherent to diffusion-collision-type processes, thus offering advantageous solutions. We further note that our definition of function as binding that leads to specific subsequent events explains why interface design is so difficult: the binding should be such that it would elicit an allosteric transition culminating with (far away) binding sites that have “correct” conformations. To conclude, here we present a perspective of protein−DNA binding that suggests possible criteria that can be used to discriminate between functional and nonfunctional binding events. A key ingredient of the discriminant criteria is the presence of allosteric effects that are capable of enhancing the binding specificity in a function-oriented manner. Allostery plays a key role in determining whether a binding event is functional and the type of function (4,8,13,1520,52,53). This provides a new definition of function and as such of biophysical events that qualify as “functional”.
This project has been funded in whole or in part with Federal funds from the National Cancer Institute, National Institutes of Health, under contract number HHSN261200800001E. The content of this publication does not necessarily reflect the views or policies of the Department of Health and Human Services, nor does mention of trade names, commercial products, or organizations imply endorsement by the U.S. Government. This research was supported (in part) by the Intramural Research Program of the NIH, National Cancer Institute, Center for Cancer Research.
Funding Statement
National Institutes of Health, United States
• Ren B.; Robert F.; Wyrick J. J.; Aparicio O.; Jennings E. G.; Simon I.; Zeitlinger J.; Schreiber J.; Hannett N.; Kanin E.; Volkert T. L.; Wilson C. J.; Bell S. P.; Young R. A. (2000) Genome-wide location and function of DNA binding proteins. Science 290, 2306–2309. [PubMed]
• Park C.; Makova K. (2009) Coding region structural heterogeneity and turnover of transcription start sites contribute to divergence in expression between duplicate genes. Genome Biol. 10, R10. [PubMed]
• Heintzman N. D.; Hon G. C.; Hawkins R. D.; Kheradpour P.; Stark A.; Harp L. F.; Ye Z.; Lee L. K.; Stuart R. K.; Ching C. W.; Ching K. A.; Antosiewicz-Bourget J. E.; Liu H.; Zhang X.; Green R. D.; Lobanenkov V. V.; Stewart R.; Thomson J. A.; Crawford G. E.; Kellis M.; Ren B. (2009) Histone modifications at human enhancers reflect global cell-type-specific gene expression. Nature 459, 108–112. [PubMed]
• Pan Y.; Tsai C. J.; Ma B.; Nussinov R. (2009) How do transcription factors select specific binding sites among many similar ones in the genome?. Nat. Struct. Mol. Biol. 16, 1118–1120. [PubMed]
• Riley T.; Sontag E.; Chen P.; Levine A. (2008) Transcriptional control of human p53-regulated genes. Nat. Rev. Mol. Cell Biol. 9, 402–412. [PubMed]
• Meijsing S. H.; Pufall M. A.; So A. Y.; Bates D. L.; Chen L.; Yamamoto K. R. (2009) DNA binding site sequence directs glucocorticoid receptor structure and activity. Science 324, 407–410. [PubMed]
• Gronemeyer H.; Bourguet W. (2009) Allosteric effects govern nuclear receptor action: DNA appears as a player. Sci. Signal. 2, pe34. [PubMed]
• Pan Y.; Tsai C. J.; Ma B.; Nussinov R. (2010) Mechanisms of transcription factor selectivity. Trends Genet. 26, 75–83. [PubMed]
• Bruce A. W.; Lopez-Contreras A. J.; Flicek P.; Down T. A.; Dhami P.; Dillon S. C.; Koch C. M.; Langford C. F.; Dunham I.; Andrews R. M.; Vetrie D. (2009) Functional diversity for REST (NRSF) is defined by in vivo binding affinity hierarchies at the DNA sequence level. Genome Res. 19, 994–1005. [PubMed]
• Tian C.; Xing G.; Xie P.; Lu K.; Nie J.; Wang J.; Li L.; Gao M.; Zhang L.; He F. (2009) KRAB-type zinc-finger protein Apak specifically regulates p53-dependent apoptosis. Nat. Cell Biol. 11, 580–591. [PubMed]
• Seet B. T.; Dikic I.; Zhou M. M.; Pawson T. (2006) Reading protein modifications with interaction domains. Nat. Rev. Mol. Cell. Biol. 7, 473–483. [PubMed]
• Carbonell P.; Nussinov R.; Del Sol A. (2009) Energetic determinants of protein binding specificity: Insights into protein interaction networks. Proteomics 9, 1744–1753. [PubMed]
• Tsai C.-J.; Sol A.; Nussinov R. (2009) Protein allostery, signal transmission and dynamics: a classification scheme of allosteric mechanisms. Mol. BioSyst. 5, 207–216. [PubMed]
• Brzozowski A. M.; Pike A. C.; Dauter Z.; Hubbard R. E.; Bonn T.; Engstrom O.; Ohman L.; Greene G. L.; Gustafsson J. A.; Carlquist M. (1997) Molecular basis of agonism and antagonism in the oestrogen receptor. Nature 389, 753–758. [PubMed]
• Ma B.; Kumar S.; Tsai C. J.; Nussinov R. (1999) Folding funnels and binding mechanisms. Protein Eng. 12, 713–720. [PubMed]
• Tsai C. J.; Ma B.; Nussinov R. (1999) Folding and binding cascades: shifts in energy landscapes. Proc. Natl. Acad. Sci. U.S.A. 96, 9970–9972. [PubMed]
• Tsai C. J.; Kumar S.; Ma B.; Nussinov R. (1999) Folding funnels, binding funnels, and protein function. Protein Sci. 8, 1181–1190. [PubMed]
• Kumar S.; Ma B.; Tsai C. J.; Sinha N.; Nussinov R. (2000) Folding and binding cascades: dynamic landscapes and population shifts. Protein Sci. 9, 10–19. [PubMed]
• Boher D. D.; Nussinov R.; Wright P. E. (2009) The role of dynamic conformational ensembles in biomolecular recognition. Nat. Chem. Biol. 5, 789–796. [PubMed]
• Tzeng S. R.; Kalodimos C. G. (2009) Dynamic activation of an allosteric regulatory protein. Nature 462, 368–372. [PubMed]
• Ansari A.; Berendzen J.; Bowne S. F.; Frauenfelder H.; Iben I. E. T.; Sauke T. B.; Shyamsunder E.; Young R. D. (1985) Protein states and protein quakes. Proc. Natl. Acad. Sci. U.S.A. 82, 5000–5004. [PubMed]
• Miller D. W.; Dill K. A. (1997) Ligand binding to proteins: the binding landscape model. Protein Sci. 6, 2166–2179. [PubMed]
• Dill K. A.; Chan H. S. (1997) From Levinthal to pathways to funnels. Nat. Struct. Biol. 4, 10–19. [PubMed]
• Greenleaf W. J.; Woodside M. T.; Block S. M. (2007) High-resolution, single-molecule measurements of biomolecular motion. Annu. Rev. Biophys. Biomol. Struct. 36, 171–190. [PubMed]
• Parak F. G. (2003) Proteins in action: the physics of structural fluctuations and conformational changes. Curr. Opin. Struct. Biol. 13, 552–557. [PubMed]
• Hinterdorfer P.; Dufrene Y. F. (2006) Detection and localization of single molecular recognition events using atomic force microscopy. Nat. Methods 3, 347–355. [PubMed]
• Busenlehner L. S.; Armstrong R. N. (2005) Insights into enzyme structure and dynamics elucidated by amide H/D exchange mass spectrometry. Arch. Biochem. Biophys. 433, 34–46. [PubMed]
• Palmer A. G. (2001) Nmr probes of molecular dynamics: overview and comparison with other techniques. Annu. Rev. Biophys. Biomol. Struct. 30, 129–155. [PubMed]
• Henzler-Wildman K.; Kern D. (2007) Dynamic personalities of proteins. Nature 450, 964–972. [PubMed]
• Bullock A. N.; Rodriguez M. C.; Debreczeni J. E.; Songyang Z.; Knapp S. (2007) Structure of the SOCS4-ElonginB/C complex reveals a distinct SOCS box interface and the molecular basis for SOCS-dependent EGFR degradation. Structure 15, 1493–1504. [PubMed]
• Sato A.; Gao Y.; Kitagawa T.; Mizutani Y. (2007) Primary protein response after ligand photodissociation in carbonmonoxy myoglobin. Proc. Natl. Acad. Sci. U.S.A. 104, 9627–9632. [PubMed]
• Xu G.; Liu R.; Zak O.; Aisen P.; Chance M. R. (2005) Structural allostery and binding of the transferrin*receptor complex. Mol. Cell. Proteomics 4, 1959–1967. [PubMed]
• Hanson J. A.; Duderstadt K.; Watkins L. P.; Bhattacharyya S.; Brokaw J.; Chu J. W.; Yang H. (2007) Illuminating the mechanistic roles of enzyme conformational dynamics. Proc. Natl. Acad. Sci. U.S.A. 104, 18055–18060. [PubMed]
• Pontiggia F.; Zen A.; Micheletti C. (2008) Small- and large-scale conformational changes of adenylate kinase: a molecular dynamics study of the subdomain motion and mechanics. Biophys. J. 95, 5901–5912. [PubMed]
• Boehr D. D.; Wright P. E. (2008) How do proteins interact?. Science 320, 1429–1430. [PubMed]
• Lange O. F.; Lakomek N.-A.; Fares C.; Schroder G. F.; Walter K. F. A.; Becker S.; Meiler J.; Grubmuller H.; Griesinger C.; de Groot B. L. (2008) Recognition dynamics up to microseconds revealed from an RDC-derived ubiquitin ensemble in solution. Science 320, 1471–1475. [PubMed]
• Gavin A.-C.; Bosche M.; Krause R.; Grandi P.; Marzioch M.; Bauer A.; Schultz J.; Rick J. M.; Michon A.-M.; Cruciat C.-M.; Remor M.; Hofert C.; Schelder M.; Brajenovic M.; Ruffner H.; Merino A.; Klein K.; Hudak M.; Dickson D.; Rudi T.; Gnau V.; Bauch A.; Bastuck S.; Huhse B.; Leutwein C.; Heurtier M.-A.; Copley R. R.; Edelmann A.; Querfurth E.; Rybin V.; Drewes G.; Raida M.; Bouwmeester T.; Bork P.; Seraphin B.; Kuster B.; Neubauer G.; Superti-Furga G. (2002) Functional organization of the yeast proteome by systematic analysis of protein complexes. Nature 415, 141–147. [PubMed]
• Koshland D. E. (1958) Application of a theory of enzyme specificity to protein synthesis. Proc. Natl. Acad. Sci. U.S.A. 44, 98–104. [PubMed]
• Ernst A.; Sazinsky S. L.; Hui S.; Currell B.; Dharsee M.; Seshagiri S.; Bader G. D.; Sidhu S. S. (2009) Rapid evolution of functional complexity in a domain family. Sci. Signal. 2, ra50. [PubMed]
• Kenakin T. P. (2008) Seven transmembrane receptors as nature’s prototype allosteric protein: de-emphasizing the geography of binding. Mol. Pharmacol. 74, 541–543. [PubMed]
• Lu J.; Dawson M. I.; Hu Q. Y.; Xia Z.; Dambacher J. D.; Ye M.; Zhang X. K.; Li E. (2009) The effect of antagonists on the conformational exchange of the retinoid X receptor alpha ligand-binding domain. Magn. Reson. Chem. 47, 1071–1080. [PubMed]
• Pollard T. D., Earnshaw W. C., and Lippincott-Schwartz J. (2007). Cell Biology, 2nd edition Edition, 2nd ed., W.B. Saunders Company, Philadelphia.
• Friedmann D. R.; Wilson J. J.; Kovall R. A. (2008) RAM-induced allostery facilitates assembly of a Notch pathway active transcription complex. J. Biol. Chem. 283, 14781–14791. [PubMed]
• Yeger-Lotem E.; Sattath S.; Kashtan N.; Itzkovitz S.; Milo R.; Pinter R. Y.; Alon U.; Margalit H. (2004) Network motifs in integrated cellular networks of transcription-regulation and protein-protein interaction. Proc. Natl. Acad. Sci. U.S.A. 101, 5934–5939. [PubMed]
• Shen-Orr S. S.; Milo R.; Mangan S.; Alon U. (2002) Network motifs in the transcriptional regulation network of Escherichia coli. Nat. Genet. 31, 64–68. [PubMed]
• Amitai G.; Gupta R. D.; Tawfik D. S. (2007) Latent evolutionary potentials under the neutral mutational drift of an enzyme. Hfsp J 1, 67–78. [PubMed]
• Wroe R.; Chan H. S.; Bornberg-Bauer E. (2007) A structural model of latent evolutionary potentials underlying neutral networks in proteins. HFSP J. 1, 79–87. [PubMed]
• Tsai C. J.; Ma B. Y.; Sham Y. Y.; Kumar S.; Nussinov R. (2001) Structured disorder and conformational selection. Proteins: Struct., Funct., Genet. 44, 418–427. [PubMed]
• Gunasekaran K.; Tsai C. J.; Kumar S.; Zanuy D.; Nussinov R. (2003) Extended disordered proteins: targeting function with less scaffold. Trends Biochem. Sci. 28, 81–85. [PubMed]
• Grigoryan G.; Reinke A. W.; Keating A. E. (2009) Design of protein-interaction specificity gives selective bZIP-binding peptides. Nature 458, 859–864. [PubMed]
• Stiffler M. A.; Chen J. R.; Grantcharova V. P.; Lei Y.; Fuchs D.; Allen J. E.; Zaslavskaia L. A.; MacBeath G. (2007) PDZ domain binding selectivity is optimized across the mouse proteome. Science 317, 364–369. [PubMed]
• Gunasekaran K.; Ma B. Y.; Nussinov R. (2004) Is allostery an intrinsic property of all dynamic proteins?. Proteins: Struct., Funct., Bioinf. 57, 433–443. [PubMed]
• Tsai C. J.; del Sol A.; Nussinov R. (2008) Allostery: Absence of a change in shape does not imply that allostery is not at play. J. Mol. Biol. 378, 1–10. [PubMed]
• Tsai C. J., Ma B., and Nussinov R.Protein-protein interaction networks: how can a hub protein bind so many different partners? Trends Biochem Sci. 2009, 34, 594−600.
• Nettles K. W.; Sun J.; Radek J. T.; Sheng S.; Rodriguez A. L.; Katzenellenbogen J. A.; Katzenellenbogen B. S.; Greene G. L. (2004) Allosteric control of ligand selectivity between estrogen receptors alpha and beta: implications for other nuclear receptors. Mol. Cell 13, 317–327. [PubMed]
• Shao W.; Brown M. (2004) Advances in estrogen receptor biology: prospects for improvements in targeted breast cancer therapy. Breast Cancer Res 6, 39–52. [PubMed]
• Hall J. M.; McDonnell D. P. (2005) Coregulators in nuclear estrogen receptor action: from concept to therapeutic targeting. Mol. Interventions 5, 343–357. [PubMed]
• Bhavnani B. R.; Tam S. P.; Lu X. (2008) Structure activity relationships and differential interactions and functional activity of various equine estrogens mediated via estrogen receptors (ERs) ERalpha and ERbeta. Endocrinology 149, 4857–4870. [PubMed]
Articles from ACS AuthorChoice are provided here courtesy of
American Chemical Society | dclm-gs1-009010000 |
Take the 2-minute tour ×
I am interested in references on research regarding the consistency of economic scenarios in nested stochastics for risk measurement.
1. Pricing by Monte-Carlo: For pricing complex derivatives Monte-Carlo simulation is a well established method. It works by generating iid samples of the underlying risk-factors, evaluating and discounting the pay-off in each sample path and finally calculating the average over all samples. The distribution used for sampling is a "risk-neutral" distribution. The process of deriving and calibrating those distributions is technically difficult but well understood on a conceptual level.
2. Risk Measurement There are several approaches to measuring the risk of such a position. One approach, which is employed in an insurance and banking regulation context, works by estimating the distribution of position prices after a prescribed period (such as one year for insurance) and applying a risk measure such as Value at Risk to the resulting p&l, which is just the difference in value between t=1 and t=0, say.Of course the change in the underlying risk factors over the measurement period is modeled by a distribution. This distribution is different from the distribution for valuation under 1. on the interval [0;1] and is called the real-world distribution of market states.
3. Nested Stochastics for risk measurement: Creating sample paths for risk measurement using Monte-Carlo simulation, now works in a two-step process. i) Generate a sample of market states at t=1 according to the/a real world distribution (these are called outer nodes or outer samples) ii) For each of those samples of market states, generate risk neutral samples of paths from t=1 onwards which are consistent with the market state. (called inner samples) The actual distribution of prices at t=1 is then calculated by applying the Monte-Carlo valuation as described in 1. for each set of inner samples created in ii).
Question of consistency: There is one straightforward question of market consistency at each outer node, i.e. how to ensure that risk neutral scenarios are consistent with the market states of the outer node. But except for practical issues, I think this is just the same question as the calibration at t=0, i.e. how to ensure pricing consistent with current market parameters.
But I see another issue with consistency, which is harder for me to understand. Already at t=0 risk neutral and real world measures are constrained by well defined consistency conditions. They are equivalent measures connected by a change of measure involving the current price of risk.For nested stochastics, you need to have some sort of consistency between the t=0 risk neutral measure and the sample of measures, each being contingent on the market states at t=1. Already in plain-vanilla processes, there are straightforward consistency requirements, such as expectation at t=0 being the integral of expectations at t=1. But the case here is more difficult, due to the mix of measures over the first and subsequent periods.
So here is my question: Do you know of any research such as textbooks or papers explaining or discussing these questions? Note that I am currently neither concerned with the formidable practical questions of the approach nor with potential alternatives or any simplifications to it.
Any hints are highly appreciated
share|improve this question
hope someone else can help you with that. Seems we don't get much further due to lost-in-translation. Cheers – Matt Wolf Jan 30 '13 at 11:10
Sorry, could you please state the consistency part more precisely, to better agree on terms and the problem? Anyway I do not see well what's the issue: at the different RW scenarios in t=1 you calibrate and price with a corresponding RNt1_i measure, which sure will all be somehow related to RNt0 by construction, but why care about that? – Quartz Jan 31 '13 at 14:00
The question is exactly how this “related somehow by construction” can be achieved. Look at a 2period option in a Black-Scholes Model. Black-Scholes assumes deterministic implied vola. So it makes no sense within this model to apply an implied vola distribution after one period to assess the risk of this option. The price at t=0 will be inconsistent with all prices at t=1 by construction. – g g Feb 2 '13 at 12:08
"Why care": This is more difficult to comment on. Some people think logical consistency is an end in itself, some are more pragmatic But I think that a logically inconsistent risk measuring approach is inherently dangerous. At least as long as you do not understand the nature and scope of those limitations. – g g Feb 2 '13 at 12:15
Only once one understands what is going, one might start to ask commercial questions. Imagine an institution managing vega-risk in such a dont-care fashion with a model where implied vola is assumed constant. Can you make money off of them? Or at least offer them vega-protection cheaper by having a better(?) model? – g g Feb 2 '13 at 12:25
add comment
1 Answer
The Global Calibration paper outlines a method which is one approach to resolve inconsistencies between pricing and calculating risk measures.
share|improve this answer
It does not address the question as there is no reference to nested stochastics. Actually I could not even find a clear distinction between real world and risk neutral dynamics. From a quick glance the author seems to suggest a discrete Markov chain approach for calibrating an economic scenario generator. This is a straightforward idea but in my opinion such an approach will work only if the state space has very low dimension (<5), since in higher dimensions this discretisation of the state space is no longer feasible. – g g Jan 30 at 8:43
add comment
Your Answer
| dclm-gs1-009020000 |
Clear Spot 4G (Apollo)
Average User Rating
2.0 stars 20 user reviews
My rating: 0 stars
you have not rated this yet
• Rating Breakdown:
• 5 star:
• 4 star:
• 3 star:
• 2 star:
• 1 star:
Results 1 of 20
0.5 stars
on by Frannie98
Pros: Not sure there are any pros...
Cons: Service constantly drops. HORRIBLE customer service.
Summary: If I could give zero stars I would. CLEAR service constantly drops. I'm talkin' several times a day - up to every 30 minutes or so. I contacted customer service several times to get some help. First they said they would refresh my connection - that it would take 24 hours. That didn't work. Then they said they would send me a new modem. They wanted to charge me $9.95 to pay for shipping! I had to speak to a manager to get them to waive the shipping charge! When I talked to the manager, I expressed my unhappiness about their service. At the end of my call, they said I would get the new modem in a few days. Then a few minutes after the phone call ended, my internet showed a Certificate Error - - - I COULD NO LONGER USE MY INTERNET! The Certificate Error was from CLEAR! My internet access would only allow me to open the CLEAR website and the error message stated that I needed to contact customer service. I first used their chat and began chatting with a customer service agent who said there was nothing they could do - that my account showed that my modem was broken and I needed to wait until my new modem arrived!!! Then I called customer service and spoke to a woman who tried to feed me the same bull. The new modem would take several days to get to me and there was nothing she could do for me! What REALLY happened was they decided to cut me off because I spoke up about their crappy service. I finally asked to speak to a manager and asked her if CLEAR planned to pay me for the wages I would lose due to not having internet access, since I work at home and need internet. She went away for a few minutes. When she came back she was magically able to restore my internet access!
LIARS!!! They are evil! They will screw with you just because they can. HORRIBLE!!!! The worst customer service I have ever experienced!!!
Write a Review
Online Stores
In Stock
Total Cost
Initial Sort Order Marketplace No
Ship: TBD
Tax: TBD
See all prices
Back to CNET's review of the Clear Spot 4G - Apollo | dclm-gs1-009030000 |
What’s Missing from Democratic Exit Polls?
What are exit polls for? When responsibly analyzed, final exit poll results-not the early, leaked numbers that so often misrepresent outcomes-are most helpful in determining not who won an election, but what types of voters supported which candidates.
Exit polls have identified Hillary Clinton's strong showing among women, highly educated voters' affinity for Barack Obama, and confirmed evangelicals' affection for Mike Huckabee. They've also shed light on peculiarities such as John McCain's support among pro-choice Republicans, even in Florida, when the nominally pro-choice Rudy Giuliani was still in the race. Over 40 percent of Sunshine State GOP voters believe abortion should be legal, and McCain won more of their votes than any other candidate in the race. Those folks need a political reality check; McCain's opposition to Roe v. Wade is increasingly vociferous.
But what's usually ignored is that Democratic and Republican exit polls are quite different. Only Republican exit polls ask voters if they identify as "evangelical," for example, obscuring the fact that up to one-third of self-described evangelical Christians actually vote Democratic, regardless of the party's support for abortion rights and LGBT civil rights. And while Republican exit polls typically ask several questions about abortion, Democratic exit polls don't quiz voters about abortion at all.
Yep, you heard that right. The domestic "culture war" issue most identified as a "wedge" is totally absent from Democratic exit polling.
That's because the National Election Pool-the exit polling collective made up of the Associated Press, CNN, ABC, NBC, CBS, and Fox-isn't concerned with polling issue preferences when major candidates actually agree with one another. Indeed, Clinton and Obama have virtually indistinguishable platforms on reproductive health, despite Clinton's longer record advocating on the issue, and all the hang-wringing over Obama's "present" votes on abortion during his time in the Illinois State Senate.
For reproductive health advocates and pro-choice voters, that's a good thing. Both Democratic candidates have pledged to appoint pro-Roe justices to the Supreme Court, overturn the Hyde Amendment (which prevents Medicaid from paying for abortions for low-income women), protect access to contraception, and promote comprehensive sexuality education in public schools. And both Clinton and Obama support abortion and contraception rights alongside a broader parenting agenda, in which the federal government would support mothers and fathers with broadened family and medical leave rights, affordable child care, and better schools.
In other words, Clinton and Obama get it.
So some reproductive health advocates might argue that leaving abortion out of Democratic exit polls is helpful to the cause, since it clamps down on potentially divisive media coverage of abortion around election time. But in actuality, by including questions about abortion on Republican exit polls, but not Democratic ones, pollsters have guaranteed that the media pays extra attention to how conservative, anti-choice voters feel about the issue, while largely overlooking the majority of Americans' support for broad access to abortion and contraception.
In the wake of this past weekend's primary in Louisiana, for example (the only weekend primary to be exit polled), the anti-choice website LifeNews was able to report that three-quarters of Louisiana Republicans oppose abortion rights. And as Huckabee carried Louisiana and Kansas, the media had the exit poll numbers to back up yet another round of stories about his support among social conservative voters. That kept the preferences of anti-choicers in the headlines.
In the meantime, there were no equivalent exit poll statistics on pro-choice voters. Those numbers, if they existed, would likely show strong support across the Democratic electorate for reproductive rights — after all, in some states, over half of Republicans are pro-choice! Consider this: Although 70 percent of Americans support abortion rights in the case of rape or incest, Mike Huckabee doesn't — and yet it's Huckabee's supporters whose abortion position is covered by the media. And in 2004's general election, well over half of all voters told pollsters abortion should be legal. Yet during the primaries, the partisan discrepancy in exit polling on abortion completely obscures Americans' relative moderation on the issue.
The fact that abortion is a settled issue in the Democratic primary-at least this year-doesn't meant that polling should ignore progressive voters' preferences on the issue. Indeed, exit polls should ask voters not only about abortion, but about some of the other reproductive health issues that will starkly split the candidates during the general election, such as sex-ed and access to birth control. That would ensure that the public and media have a realistic view of Americans' support for reproductive rights.
• scott-swenson
Dana: Great piece and welcome to the RH Reality Check team! Another issue that 2008 is teaching, along these same lines, is that the nation is ready for an overhaul to the electoral system. While Huckabee is doing well in states with large evangelical bases of support, and picking up on the anti-McCain protest vote, he is doing so based on his ability to surprise people in Iowa. Super Tuesday proved that our democracy is ready for regional primaries and that the process should not be front-loaded — that we all benefit when more states from more parts of the country have a real voice in the nominating process. If the media would not wedge the issues they discuss in exit polls as you suggest, and 3-5 states clustered together for a series of rolling primaries, we would have candidates that are forced to prove they can build coalitions and work with all kinds of people … you know, all the kinds that actually make up America, not just special interests. This is important to focus on now, because the candidates finishing second in both parties often extract changes to the nominating process as they negotiate their way off stage; case in point, proportional representation for the Democrats was negotiated in 1988. It is serving to make the process more representative, as was intended, putting more power in the hands of voters where it belongs.
Be the change you seek,
Scott Swenson, Editor | dclm-gs1-009040000 |
Pope Saint Damasus I
[Pope Saint Damasus]Memorial
Raised in a pious family; his father was a priest in Rome, Italy and Damasus served for a time as deacon in his father‘s church, Saint Laurence. Priest. Assistant to Pope Liberius. Chosen 37th pope in a disputed election in which a minority chose the anti-pope Ursinus. The two reigned simultaneously in Rome which eventually led to violence between their supporters and false accusations of Damasus having committed a crime.
His pontificate suffered from the rise of Arianism, and from several schisms including break-away groups in Antioch, Constantinople, Sardinia, and Rome. However, it was during Damasus’s reign that Christianity was declared the religion of the Roman state. He enforced the 370 edict of Emperor Valentinian controlling gifts to prelates, and opposed Arianism and Apollinarianism. He supported the 374 council of Rome which decreed the valid books of the Bible, and the Grand Council of Constantinople in 381 which condemned Arianism.
Economic patron of his secretary, Saint Jerome, commissioning him to make the translation of scripture now known as the Vulgate. Damasus restored catacombs, shrines, and the tombs of martyrs, and wrote poetry and metrical inscriptions about and dedicated to martyrs. They state that he would like to be buried in the catacombs with the early martyrs, but that the presence of one of his lowly status would profane such an august place. Ten of his letters, personal and pontifical, have survived.
Papal Ascension
Additional Information
He who walking on the sea could calm the bitter waves, who gives life to the dying seeds of the earth; he who was able to loose the mortal chains of death, and after three days’ darkness could bring again to the upper world the brother for his sister Martha: he, I believe, will make Damasus rise again from the dust. - epitaph Damasus wrote for himself
The arrangement of the names of Christ, however, is manifold: Lord, because He is Spirit; Word, because He is God; Son, because He is the only-begotten son of the Father; Man, because He was born of the Virgin; Priest, because He offered Himself as a sacrifice; Shepherd, because He is a guardian; Worm, because He rose again; Mountain, because He is strong; Way, because there is a straight path through Him to life; Lamb, because He suffered; Corner-Stone, because instruction is His; Teacher, because He demonstrates how to live; Sun, because He is the illuminator; Truth, because He is from the Father; Life, because He is the creator; Bread because He is flesh; Samaritan, because He is the merciful protector; Christ, because He is anointed; Jesus, because He is a mediator; Vine, because we are redeemed by His blood; Lion, because he is king; Rock, because He is firm; Flower, because He is the chosen one; Prophet, because He has revealed what is to come. - from the Decree of Damasus (attributed to Damasus); from The Faith of the Early Fathers, by William A Jurgens, copyright 1970, the Order of Saint Benedict, Collegeville, Minnesota
MLA Citation
• “Pope Saint Damasus I“. Saints.SQPN.com. 12 December 2013. Web. 13 March 2014. <> | dclm-gs1-009050000 |
Dan Kogai > Encode-2.47 > Encode
Annotate this POD (5)
New 4
Open 42
View/Report Bugs
Module Version: 2.47 Source Latest Release: Encode-2.57
Encode - character encodings in Perl
use Encode qw(decode encode);
$characters = decode('UTF-8', $octets, Encode::FB_CROAK);
$octets = encode('UTF-8', $characters, Encode::FB_CROAK);
Table of Contents
Encode consists of a collection of modules whose details are too extensive to fit in one document. This one itself explains the top-level APIs and general topics at a glance. For other topics and more details, see the documentation for these modules:
Encode::Alias - Alias definitions to encodings
Encode::Encoding - Encode Implementation Base Class
Encode::Supported - List of Supported Encodings
Encode::CN - Simplified Chinese Encodings
Encode::JP - Japanese Encodings
Encode::KR - Korean Encodings
Encode::TW - Traditional Chinese Encodings
The repertoire of characters that Perl can represent is a superset of those defined by the Unicode Consortium. On most platforms the ordinal values of a character as returned by ord(S) is the Unicode codepoint for that character. The exceptions are platforms where the legacy encoding is some variant of EBCDIC rather than a superset of ASCII; see perlebcdic.
During recent history, data is moved around a computer in 8-bit chunks, often called "bytes" but also known as "octets" in standards documents. Perl is widely used to manipulate data of many types: not only strings of characters representing human or computer languages, but also "binary" data, being the machine's representation of numbers, pixels in an image, or just about anything.
When Perl is processing "binary data", the programmer wants Perl to process "sequences of bytes". This is not a problem for Perl: because a byte has 256 possible values, it easily fits in Perl's much larger "logical character".
This document mostly explains the how. perlunitut and perlunifaq explain the why.
A character in the range 0 .. 2**32-1 (or more); what Perl's strings are made of.
A character in the range 0..255; a special case of a Perl character.
8 bits of data, with ordinal values 0..255; term for bytes passed to or from a non-Perl context, such as a disk file, standard I/O stream, database, command-line argument, environment variable, socket etc.
Basic methods
$octets = encode(ENCODING, STRING[, CHECK])
For example, to convert a string from Perl's internal format into ISO-8859-1, also known as Latin1:
CAVEAT: When you run $octets = encode("utf8", $string), then $octets might not be equal to $string. Though both contain the same data, the UTF8 flag for $octets is always off. When you encode anything, the UTF8 flag on the result is always off, even when it contains a completely valid utf8 string. See "The UTF8 flag" below.
If the $string is undef, then undef is returned.
This function returns the string that results from decoding the scalar value OCTETS, assumed to be a sequence of octets in ENCODING, into Perl's internal form. The returns the resulting string. As with encode(), ENCODING can be either a canonical name or an alias. For encoding names and aliases, see "Defining Aliases"; for CHECK, see "Handling Malformed Data".
For example, to convert ISO-8859-1 data into a string in Perl's internal format:
CAVEAT: When you run $string = decode("utf8", $octets), then $string might not be equal to $octets. Though both contain the same data, the UTF8 flag for $string is on unless $octets consists entirely of ASCII data on ASCII machines or EBCDIC on EBCDIC machines. See "The UTF8 flag" below.
If the $string is undef, then undef is returned.
[$obj =] find_encoding(ENCODING)
Returns the encoding object corresponding to ENCODING. Returns undef if no matching ENCODING is find. The returned object is what does the actual encoding or decoding.
$utf8 = decode($name, $bytes);
is in fact
$utf8 = do {
$obj = find_encoding($name);
with more error checking.
You can therefore save time by reusing this object as follows;
while(<>) {
... # now do something with $utf8;
Besides "decode" and "encode", other methods are available as well. For instance, name() returns the canonical name of the encoding object.
See Encode::Encoding for details.
and to convert it back:
Because the conversion happens in place, the data to be converted cannot be a string constant: it must be a scalar variable.
from_to() returns the length of the converted string in octets on success, and undef on error.
CAVEAT: The following operations may look the same, but are not:
Both #1 and #2 make $data consist of a completely valid UTF-8 string, but only #2 turns the UTF8 flag on. #1 is equivalent to:
See "The UTF8 flag" below.
Also note that:
is equivalent t:o
Yes, it does not respect the $check during decoding. It is deliberately done that way. If you need minute control, use decode followed by encode as follows:
$octets = encode_utf8($string);
Equivalent to $octets = encode("utf8", $string). The characters in $string are encoded in Perl's internal format, and the result is returned as a sequence of octets. Because all possible characters in Perl have a (loose, not strict) UTF-8 representation, this function cannot fail.
Equivalent to $string = decode("utf8", $octets [, CHECK]). The sequence of octets represented by $octets is decoded from UTF-8 into a sequence of logical characters. Because not all sequences of octets are valid UTF-8, it is quite possible for this function to fail. For CHECK, see "Handling Malformed Data".
Listing available encodings
use Encode;
@list = Encode->encodings();
Returns a list of canonical names of available encodings that have already been loaded. To get a list of all available encodings including those that have not yet been loaded, say:
Or you can give the name of a specific module:
Defining Aliases
To add a new alias to a given encoding, use:
use Encode;
use Encode::Alias;
define_alias(NEWNAME => ENCODING);
After that, NEWNAME can be used as an alias for ENCODING. ENCODING may be either the name of an encoding or an encoding object.
Before you do that, first make sure the alias is nonexistent using resolve_alias(), which returns the canonical name thereof. For example:
resolve_alias() does not need use Encode::Alias; it can be imported via use Encode qw(resolve_alias).
See Encode::Alias for details.
Finding IANA Character Set Registry names
The canonical name of a given encoding does not necessarily agree with IANA Character Set Registry, commonly seen as Content-Type: text/plain; charset=WHATEVER. For most cases, the canonical name works, but sometimes it does not, most notably with "utf-8-strict".
As of Encode version 2.21, a new method mime_name() is therefore added.
use Encode;
my $enc = find_encoding("UTF-8");
warn $enc->mime_name; # UTF-8
See also: Encode::Encoding
Encoding via PerlIO ^
If your perl supports PerlIO (which is the default), you can use a PerlIO layer to decode and encode directly via a filehandle. The following two examples are fully identical in functionality:
### Version 1 via PerlIO
open(INPUT, "< :encoding(shiftjis)", $infile)
|| die "Can't open < $infile for reading: $!";
open(OUTPUT, "> :encoding(euc-jp)", $outfile)
|| die "Can't open > $output for writing: $!";
while (<INPUT>) { # auto decodes $_
print OUTPUT; # auto encodes $_
close(INPUT) || die "can't close $infile: $!";
close(OUTPUT) || die "can't close $outfile: $!";
### Version 2 via from_to()
open(INPUT, "< :raw", $infile)
open(OUTPUT, "> :raw", $outfile)
while (<INPUT>) {
from_to($_, "shiftjis", "euc-jp", 1); # switch encoding
print OUTPUT; # emit raw (but properly encoded) data
In the first version above, you let the appropriate encoding layer handle the conversion. In the second, you explicitly translate from one encoding to the other.
Unfortunately, it may be that encodings are PerlIO-savvy. You can check to see whether your encoding is supported by PerlIO by invoking the perlio_ok method on it:
Encode::perlio_ok("hz"); # false
find_encoding("euc-cn")->perlio_ok; # true wherever PerlIO is available
use Encode qw(perlio_ok); # imported upon request
Fortunately, all encodings that come with Encode core are PerlIO-savvy except for hz and ISO-2022-kr. For the gory details, see Encode::Encoding and Encode::PerlIO.
Handling Malformed Data ^
The optional CHECK argument tells Encode what to do when encountering malformed data. Without CHECK, Encode::FB_DEFAULT (== 0) is assumed.
As of version 2.12, Encode supports coderef values for CHECK; see below.
NOTE: Not all encodings support this feature. Some encodings ignore the CHECK argument. For example, Encode::Unicode ignores CHECK and it always croaks on error.
List of CHECK values
I<CHECK> = Encode::FB_DEFAULT ( == 0)
If CHECK is 0, encoding and decoding replace any malformed character with a substitution character. When you encode, SUBCHAR is used. When you decode, the Unicode REPLACEMENT CHARACTER, code point U+FFFD, is used. If the data is supposed to be UTF-8, an optional lexical warning of warning category "utf8" is given.
I<CHECK> = Encode::FB_CROAK ( == 1)
If CHECK is 1, methods immediately die with an error message. Therefore, when CHECK is 1, you should trap exceptions with eval{}, unless you really want to let it die.
I<CHECK> = Encode::FB_QUIET
If CHECK is set to Encode::FB_QUIET, encoding and decoding immediately return the portion of the data that has been processed so far when an error occurs. The data argument is overwritten with everything after that point; that is, the unprocessed portion of the data. This is handy when you have to call decode repeatedly in the case where your source data may contain partial multi-byte character sequences, (that is, you are reading with a fixed-width buffer). Here's some sample code to do exactly that:
my($buffer, $string) = ("", "");
while (read($fh, $buffer, 256, length($buffer))) {
# $buffer now contains the unprocessed partial character
I<CHECK> = Encode::FB_WARN
This is the same as FB_QUIET above, except that instead of being silent on errors, it issues a warning. This is handy for when you are debugging.
perlqq mode (CHECK = Encode::FB_PERLQQ)
HTML charref mode (CHECK = Encode::FB_HTMLCREF)
XML charref mode (CHECK = Encode::FB_XMLCREF)
For encodings that are implemented by the Encode::XS module, CHECK == Encode::FB_PERLQQ puts encode and decode into perlqq fallback mode.
When you decode, \xHH is inserted for a malformed character, where HH is the hex representation of the octet that could not be decoded to utf8. When you encode, \x{HHHH} will be inserted, where HHHH is the Unicode code point (in any number of hex digits) of the character that cannot be found in the character repertoire of the encoding.
The HTML/XML character reference modes are about the same. In place of \x{HHHH}, HTML uses &#NNN; where NNN is a decimal number, and XML uses &#xHHHH; where HHHH is the hexadecimal number.
In Encode 2.10 or later, LEAVE_SRC is also implied.
The bitmask
These modes are all actually set via a bitmask. Here is how the FB_XXX constants are laid out. You can import the FB_XXX constants via use Encode qw(:fallbacks), and you can import the generic bitmask constants via use Encode qw(:fallback_all).
DIE_ON_ERR 0x0001 X
WARN_ON_ERR 0x0002 X
RETURN_ON_ERR 0x0004 X X
LEAVE_SRC 0x0008 X
PERLQQ 0x0100 X
HTMLCREF 0x0200
XMLCREF 0x0400
If the Encode::LEAVE_SRC bit is not set but CHECK is set, then the second argument to encode() or decode() will be overwritten in place. If you're not interested in this, then bitwise-OR it with the bitmask.
coderef for CHECK
As of Encode 2.12, CHECK can also be a code reference which takes the ordinal value of the unmapped character as an argument and returns a string that represents the fallback character. For instance:
Acts like FB_PERLQQ but U+XXXX is used instead of \x{XXXX}.
Defining Encodings ^
To define a new encoding, use:
use Encode qw(define_encoding);
define_encoding($object, CANONICAL_NAME [, alias...]);
CANONICAL_NAME will be associated with $object. The object should provide the interface described in Encode::Encoding. If more than two arguments are provided, additional arguments are considered aliases for $object.
See Encode::Encoding for details.
The UTF8 flag ^
Before the introduction of Unicode support in Perl, The eq operator just compared the strings represented by two scalars. Beginning with Perl 5.8, eq compares two strings with simultaneous consideration of the UTF8 flag. To explain why we made it so, I quote from page 402 of Programming Perl, 3rd ed.
Goal #1:
Goal #2:
Goal #3:
Goal #4:
When Programming Perl, 3rd ed. was written, not even Perl 5.6.0 had been born yet, many features documented in the book remained unimplemented for a long time. Perl 5.8 corrected much of this, and the introduction of the UTF8 flag is one of them. You can think of there being two fundamentally different kinds of strings and string-operations in Perl: one a byte-oriented mode for when the internal UTF8 flag is off, and the other a character-oriented mode for when the internal UTF8 flag is on.
Here is how Encode handles the UTF8 flag.
Messing with Perl's Internals
The following API uses parts of Perl's internals in the current implementation. As such, they are efficient but may change in a future release.
is_utf8(STRING [, CHECK])
[INTERNAL] Tests whether the UTF8 flag is turned on in the STRING. If CHECK is true, also checks whether STRING contains well-formed UTF-8. Returns true if successful, false otherwise.
As of Perl 5.8.1, utf8 also has the utf8::is_utf8 function.
[INTERNAL] Turns the STRING's internal UTF8 flag on. The STRING is not checked for containing only well-formed UTF-8. Do not use this unless you know with absolute certainty that the STRING holds only well-formed UTF-8. Returns the previous state of the UTF8 flag (so please don't treat the return value as indicating success or failure), or undef if STRING is not a string.
NOTE: For security reasons, this function does not work on tainted values.
[INTERNAL] Turns the STRING's internal UTF8 flag off. Do not use frivolously. Returns the previous state of the UTF8 flag, or undef if STRING is not a string. Do not treat the return value as indicative of success or failure, because that isn't what it means: it is only the previous setting.
UTF-8 vs. utf8 vs. UTF8 ^
That has historically been Perl's notion of UTF-8, as that is how UTF-8 was first conceived by Ken Thompson when he invented it. However, thanks to later revisions to the applicable standards, official UTF-8 is now rather stricter than that. For example, its range is much narrower (0 .. 0x10_FFFF to cover only 21 bits instead of 32 or 64 bits) and some sequences are not allowed, like those used in surrogate pairs, the 31 non-character code points 0xFDD0 .. 0xFDEF, the last two code points in any plane (0xXX_FFFE and 0xXX_FFFF), all non-shortest encodings, etc.
The former default in which Perl would always use a loose interpretation of UTF-8 has now been overruled:
From: Larry Wall <larry@wall.org>
Date: December 04, 2004 11:51:58 JST
To: perl-unicode@perl.org
Subject: Re: Make Encode.pm support the real UTF-8
Message-Id: <20041204025158.GA28754@wall.org>
: corresponding behaviour.
make it easy to switch back to lax.
Got that? As of Perl 5.8.7, "UTF-8" means UTF-8 in its current sense, which is conservative and strict and security-conscious, whereas "utf8" means UTF-8 in its former sense, which was liberal and loose and lax. Encode version 2.10 or later thus groks this subtle but critically important distinction between "UTF-8" and "utf8".
In the Encode module, "UTF-8" is actually a canonical name for "utf-8-strict". That hyphen between the "UTF" and the "8" is critical; without it, Encode goes "liberal" and (perhaps overly-)permissive:
Perl's internal UTF8 flag is called "UTF8", without a hyphen. It indicates whether a string is internally encoded as "utf8", also without a hyphen.
Encode::Encoding, Encode::Supported, Encode::PerlIO, encoding, perlebcdic, "open" in perlfunc, perlunicode, perluniintro, perlunifaq, perlunitut utf8, the Perl Unicode Mailing List http://lists.perl.org/list/perl-unicode.html
This project was originated by the late Nick Ing-Simmons and later maintained by Dan Kogai <dankogai@cpan.org>. See AUTHORS for a full list of people involved. For any questions, send mail to <perl-unicode@perl.org> so that we can all share.
While Dan Kogai retains the copyright as a maintainer, credit should go to all those involved. See AUTHORS for a list of those who submitted code to the project.
Copyright 2002-2012 Dan Kogai <dankogai@cpan.org>.
syntax highlighting: | dclm-gs1-009060000 |
Take the 2-minute tour ×
Here goes a very specific question about the insides of Shorewall and Iptables in general.
Shorewall supports configuration of "Stopped Policies" using the file routestopped, which defines the behaviour of the firewall when Shorewall is stopped. This works very well, but there is a parameter that we can configure in the options called "routeback" which according to the documentation enables the "traffic from a host back to itself". I'm trying to understand this option and a case where it could be applied but honestly i just don't see a use case for this option.
I've checked the Iptables rules before and after applying this option, and these 3 rules are additionally added when the option routeback is activated (for the 3 hosts i've configured):
-A FORWARD -s -d -i eth0 -o eth0 -c 0 0
I'm not really an expert in Iptables, but i've read the documentation and it says that when the -j (ACTION) parameter is missing, Iptables doesn't do anything with the packet, it just adds the counters.
So this option is kind of useless in my opinion. Does anyone knows a use case for this option?
share|improve this question
add comment
Your Answer
Browse other questions tagged or ask your own question. | dclm-gs1-009070000 |
Seeking Alpha
Seeking Alpha Portfolio App for iPad
Profile| Send Message| (25)
Should an investor buy shares in an ETF or buy the individual stocks that make up the ETF? As we will see, it depends in part on how big the investments are, and how long one wants to hold them.
An Example:
• The ETF comprises 25 stocks, and its yearly management fees are 1%.
• The shares comprising the ETF would cost an average of $100/share.
• Brokerage fees are $5/trade.
• Changes in share prices or dividends were not included.
By buying the individual stocks we can create our own "ETP", or exchange traded portfolio. Of course, it's not a true ETF, for many reasons, including the fact that we might be the only one owing it, and the fact that we will have to deal with each stock individually.
Case #1. We buy either $2,500 of shares in the ETF, or alternatively we buy shares of each of the 25 same stocks for $2,500. We hold either investment for one year and then sell them.
Brokers fees (buying and selling)Management feesTotal fees
ETP (25 stocks)$250.00-$250.00
Case #2. Same as #1, but we buy and hold the ETF shares or the shares in the 25 companies for 5 years and then sell them.
Brokers feesManagement feesTotal fees
ETP (25 stocks)$250.00-$250.00
Case #3. Same, but we buy and hold for 10 years.
Brokers feesManagement feesTotal fees
ETP (25 stocks)$250.00-$250.00
It was finally advantageous to make our own "ETP" from the same 25 stocks as the ETF, but only if we bought and held them for 10 years.
Now, let's see what happens when we start to run with the big dogs. We buy $25,000 worth of ETF shares or 10 shares of each of the 25 stocks (again assuming an average price of $100/share).
Case #1. We buy the $25,000 of shares in the ETF or ten shares of each of the 25 stocks for $25,000, hold them for one year and sell them.
Brokers feesManagement feesTotal fees
After only one year, it was cheaper to make our own ETP when we invested $25,000, rather than buy $25,000 of an ETF. This explains, at least partially, why big investors seem to buy individual stocks rather than ETFs.
Let's try a real life example, using an ETF, in this case, the Vanguard Information Technology (VGT) ETF. (information from Yahoo! Finance, May 6, 2012).
VGT. Share price as of May 4, 2012, 70.57
Top 10 Holdings (57.29% of Total Assets)
CompanySymbol% Assets
Apple Inc.AAPL14.50
International Business MachinesIBM8.48
Microsoft CorporationMSFT7.56
Google Inc.GOOG6.34
Intel CorporationINTC4.92
Oracle CorporationORCL4.01
Cisco Systems, Inc.CSCO3.84
QUALCOMM IncorporatedQCOM3.54
Hewlett-Packard Company CommonHPQ2.06
Visa Inc.V2.04
If we were to buy approximately $25,000 of VGT or approximately $25,000 of just the top ten holdings, and sell those investments after 2 years, then:
Brokers fees (assuming non-Vanguard account holder) at $5/tradeManagement fees - Annual Expense Ratio (.19)Total fees
ETP 149.08 shares (14.91 shares of each of the 10 companies) Prices as of May 4, 2012, rounded.$100.00-$100.00
Total of 10 share prices:1677
Our ETP, comprising approximately $25,000 of the top ten holding of VGT, would match the VGT costs at approximately 2 years.
Note that changes in broker's fees or management fees (for example, the low fees of an index ETF) might affect the point at which making your own ETP becomes less costly than buying shares in an ETF. Also, if an ETF owns stock in hundreds of companies, such as an ETF covering the S&P 500, then trying to buy and sell shares that match the ETF would result in very large brokers' fees.
Conclusion. Buying the individual stocks that make up an ETF results in lower costs when: a) the holding period is long enough, and/or b) the purchase is large enough. So large investors, and "buy and hold" investors, might prefer to buy individual stocks rather than ETFs. On the other hand, those who turn over stock often or who are small investors might prefer ETFs rather than buying and selling the stock that make up the ETF. You might want to look up the stocks in an ETF and the yearly fees, determine how long you want to hold this investment, determine the round trip broker's fees, and then calculate which form of investment has lower costs.
Of course, there many other factors that would affect a decision to buy (or sell) the ETF or the individual stocks that make up the ETF, including the following:
• Simplicity. Dealing with 25 stocks (or more) takes more work than dealing with one ETF. Calculating the return on your investment would also be more difficult with individual stocks.
• Liquidity The ETF might be more liquid than the individual stocks, or at least some of them.
• Flexibility. With individual stocks one can vary the relative percentages of companies included, leave some companies off the list, or add some new ones. One could also sell the individual stocks at different times from each other, or sell them over a long period of time.
• Tax Consequences. It's possible that dealing with individual stocks could result in different tax consequences than buying and selling shares of the ETF.
• Power. Some ETFs include investments that ordinary investors could not otherwise easily invest in, such as financial derivatives, futures contracts, stock on foreign stock exchanges, large bonds, etc.
In the future, we may design some sample ETPs together. (By the way, do you prefer the term ETP or PET (Portfolio Exchange Trades)? Thank you. Bill.)
Disclaimer. This article is provided for information and educational purposes only. There is no suggestion, advice or recommendation that you take or refrain from any action, or that you buy, sell, hold, short or borrow any security, or group of securities. No particular investment or group of investments is either recommended, or discouraged. Any given strategy might or might not work at any moment in time. Investing is extremely risky, and markets can move in any direction at any time. For these and other reasons, investors, even the most experienced, can suffer heavy losses at any time. Consult a professional advisor and/or do your own research. I believe that most investors do not beat the market, but I also believe that learning as much as possible about the investments that you make and about your own emotional make-up may improve your performance.
Source: ETFs Vs. Stocks--Should You Start Your Own ETP?
Additional disclosure: I own various Vanguard ETF shares. I have held shares in VGT in the past and may own them in the future. | dclm-gs1-009080000 |
Take the 2-minute tour ×
I'm not well versed in the monitoring of performance when it comes to Windows (WinXP, Vista, Server 2k3 and above and now Win7). But I know Linux monitoring and I know that I really like collectl. In particular I like that:
1. By default it grabs everything it can on each monitor cycle. I don't find myself wishing I'd been collecting X all along, collectl just happened to be grabbing it all, all along.
2. I can have it export the data to my own aggregation tools using the output plugin architecture.
Add to that it's free.
Is there a comparable free product that can do the all-in type monitoring and data export for Windows? I'd even be okay writing my own data export if there's an all-in monitoring solution that can write the data to local disk.
share|improve this question
not exactly collectl but microsofts SPA tool works quite well and its free just goto microsoft.com/downloads – tony roth Nov 29 '10 at 20:34
add comment
1 Answer
I know very little about performance monitoring on windows other than by using perfmon. When I wrote collectl I actually did toy with the idea of seeing what I could do with windows and even played around with WMI - turns out you can connect to a windows box with WMI and retrieve the same data as you can with perfmon. The only thing is when I tried it the numbers I got were different than what perfmon reports. For example, there are a couple of CPU counters called %, but the numbers they report look nothing like percentages. I was able to get disk numbers and even some of network and memory.
The next thing I did was include collectl's formatit.ph file since that's where all the print routines live and by populating the right variables with WMI data I could then simply call the right routines and I could get data in any format collectl reports it in.=, including time stamps and space-separated data.
BUT as I said the data was not consistent or complete and it was really more of an exercise than anything else. However, if someone wants to write their own WMI data collection routines in perl and is looking to integrate them with the collectl print routines I can probably provide some consulting to help you take it to that next level. But the first step is getting the data.
share|improve this answer
Mark, I may take that on. – Ian C. Nov 30 '10 at 18:18
add comment
Your Answer
| dclm-gs1-009090000 |
Take the 2-minute tour ×
It was recently suggested to me that I use FastCGI with PHP. Now I went to the FastCGI page and read it but I don't really understand what the advantages are.
share|improve this question
add comment
3 Answers
up vote 32 down vote accepted
Using mod_php each Apache worker has the entire PHP interpreter loaded into it. Because Apache needs one worker process per incoming request, you can quickly end up with hundreds of Apache workers in use, each with their own PHP interpreter loaded, consuming huge amounts of memory.
(Note, this isn't exactly true, Apache's worker_mpm allows you to serve many requests with a single threaded Apache worker. However, even in 2009, this is not the recommended way to deploy PHP because of suspected threading issues with the PHP extensions.)
By using PHP in fast_cgi mode (using something like spawn-fcgi from the lighttpd package) has the following benefits
• tune the number of PHP workers separately from the number of incoming connections
• allow you to put you PHP workers on a different server, or scale across many servers without changing you web tier
• gives you flexibility to choose a different web server, like nginx, or lighttpd
• allow you to run your PHP application in a different security domain on your web server
share|improve this answer
add comment
FastCGI means that the php bits aren't running in the same process as the apache bits, unlike with mod_php. This separation can have some definite advantages when it comes to restarting the server or dealing with runaway applications - in the mod_php case that means that it's the apache process that's "runaway", but under fastcgi it's just a process that apache is talking to, so the entire server doesn't have to be taken down.
share|improve this answer
add comment
Another advantage not yet mentioned is the fact that with mod_fcgid (which is a newer implementation for using FastCGI on Apache) and suexec you can realize setups where different vhosts use different Linux users for execution, which can be a real security benefit in a shared hosting szenario.
With mod_php, all vhosts share the same user, which is Apache's user. This can lead to security issues.
share|improve this answer
It depends on the MPM used in this particular Apache httpd setup. For example with MPM-itk (mpm-itk.sesse.net) it is possible to use mod_php and have the scripts (or better: the httpd processes) being run in the context of another user. – joschi Jun 1 '09 at 10:37
add comment
Your Answer
| dclm-gs1-009100000 |
Can you feel bad for designers failing when they put out $400 bike shorts?
ShopbopShopbopIf you're not already familiar with Alexander Wang, he's a young designer in New York with an ever-expanding celebrity fanbase. Lindsay Lohan and Rihanna regularly wear his clothing while others like Paris Hilton and Christina Aguilera might be spotted in one of his dresses or handbags.
Wang's Fall 2009 merchandise has just been released and one of the items is this $395 pair of bike shorts. Aside from a few interestingly placed seams, they are your average nylon and spandex shorts you might wear to the gym, or if you're going for a '90s look, under a skirt or oversized t-shirt. Is an item of this kind worth nearly $400? Hell no! But then again, Wang also released some cuffed, cutoff sweatpants last season for $225.
How do designers expect us to pay five times more than we'd like to on what is supposed to be a casual, affordable article of clothing? Are they just turning a blind eye to this recession we're in? $400 bike shorts are outrageous and almost infuriating. If designers continue producing "fashionable" items like this, we have no remorse for their declining sales figures. It's one thing to save up for a well crafted pair of leather shoes or couture gown, but bike shorts? We can scoop up a $20 pair from a sporting goods shop, or dare we say, American Apparel. [NY Mag] | dclm-gs1-009110000 |
4 Secrets for the Best Slow Cooker Beef Stew
4 Secrets for the Best Slow Cooker Beef StewBy Hilary Meyer, Associate Food Editor, EatingWell Magazine
When I was in culinary school we learned a lot about how to develop flavors. These methods usually involved high-end ingredients, a lot of prep time and sometimes following complicated procedures to get good results. Little did I know a much easier path to culinary greatness was sitting in my pantry the whole time I was sweating in a restaurant kitchen. That would be my slow cooker.
The humble slow cooker can turn out some pretty mean food if you know a few tricks. Not to mention it's convenient, relatively inexpensive and very easy to use. (Dinner practically cooks itself!) Take EatingWell's recipe for Flemish Beef Stew (see full recipe below), for example. In culinary school I would have been meticulously trimming an expensive cut of meat, tournéing vegetables and bathing them all in veal stock.
Don't Miss: 12 Tips to Think Like a Chef
But in this version, I'm simply searing bottom round, chopping my veggies and stewing it all together in beer in my slow cooker. The results are just as delicious. Here are some tricks to getting restaurant-worthy results with your slow cooker:
Don't Miss: 7 Tricks for Better Slow-Cooking in Your Crock Pot
Tip 1. Maximize Flavor On Your Stove First
Dumping ingredients into your slow cooker and walking away may be convenient, but it's usually not the best way to get the most flavor out of your food. You need the caramelized bits you get from searing your meat and vegetables on the stovetop first. Since you don't need to worry about cooking things through (they'll finish in your slow cooker) the process doesn't take long. Just heat up a small amount of oil and give your meat and vegetables a sear before adding them to the slow cooker. Then "deglaze" the pan with liquid to get all the brown, caramelized bits from the sauté pan and pour the flavorful liquid into the slow cooker.
Tip 2. Pick the Right Meat
When it comes to your slow cooker, not all meat is created equal. To get richly flavored, melt-in-your-mouth-tender meat, you need to choose tougher cuts that can benefit from hours of cooking. Cuts like chuck, brisket and bottom round are all good choices--full of flavor and, another perk, relatively cheap too. As your stew cooks, the collagen inside the meat breaks down, making it tender and delicious.
Recipes to Try: Cheap Recipes for a Crock Pot
Tip 3. Pick the Right Vegetables
Just like meat, there are some vegetables that are born to go into the slow cooker. When you're picking vegetables for your stew, think hearty: root vegetables like potatoes, turnips and rutabaga are all good options--they can take the prolonged cooking and still hold their shape. Mushrooms also hold up well. More tender vegetables like snow peas, spinach and other leafy greens can certainly have their place in the slow cooker, but you may want to add them later; they can disintegrate if they spend too much time cooking.
Recipes to Try: Fall Recipes for a Crock Pot
Tip 4. Cut Your Ingredients to Size
Bigger is better when it comes to the size of vegetables that will be going into your slow cooker. For vegetables where holding their shape is important (like chunks of potato or carrots), a good rule of thumb would be pieces no smaller than 1 inch. By cutting them a little larger, they remain toothsome, not mushy when you cook them. For vegetables that contribute flavor more than texture (like onions and garlic), cutting them smaller is fine. Meat for beef stew should also be cut into 1-inch pieces. Cut the pieces too large and they may not come out as tender.
Flemish Beef Stew
Active time: 45 minutes | Total: 8 3/4 hours
To make ahead: Prepare through Step 3; cover and refrigerate for up to 1 day before cooking.
4 teaspoons canola oil, divided
3/4 pound sliced cremini or white button mushrooms
3 tablespoons all-purpose flour
2 cups brown ale or dark beer
4 large carrots, peeled and cut into 1-inch pieces
1 large onion, chopped
1 clove garlic, minced
1 1/2 tablespoons Dijon mustard
1 teaspoon caraway seeds
3/4 teaspoon salt
1/2 teaspoon freshly ground pepper
1 bay leaf
Makes 8 servings.
Per serving: 272 calories; 9 g fat (3 g sat, 4 g mono); 72 mg cholesterol; 16 g carbohydrate; 0 g added sugars; 27 g protein; 2 g fiber; 359 mg sodium; 645 mg potassium.
Nutrition bonus: Vitamin A (110% daily value), Zinc (33% dv), Potassium (17% dv), Iron (15% dv).
What are your tricks for better slow-cooker meals?
By Hilary Meyer
Hilary Meyer
Related Links from EatingWell: | dclm-gs1-009120000 |
Forgot your password?
United States
Spectrum Wars: The Hidden Battle 159
Posted by michael
from the pretty-soon-we-are-talking-about-real-money dept.
PacketMaster writes: "The USA Today is carrying an interesting commentary entitled All-but-secret battle rages over fate of airwaves. The article sheds light on some topics that many people are completely ignorant on - the fight over the broadcast spectrum. The most interesting tidbit is that the current broadcasters, who were given the new digital spectrum for applications like HDTV for free, now want to keep their old ones too and auction them off for industry profit to help pay for the transition to the new spectrum."
Spectrum Wars: The Hidden Battle
Comments Filter:
• 3G (slightly OT) (Score:2, Interesting)
by Sawbones (176430) on Wednesday September 05, 2001 @04:57PM (#2257312)
While the whole process is working out less than ideal, I'm pleased to see the government taking an active stance on bringing 3G to the states. I know there are a couple of GSM cel carriers here in the states now but they don't really have the same coverage as the old CDM and TDMA (I think those are the acronymns) systems that AT&T and such have. I'd love to have some of the whiz-bang new phones (or one of the more stylish [nokia-asia.com] australian models) but because the rest of the world operates on a different system I'm out of luck.
Chalk it up to good intentions but (potentially) poor implementation I suppose.
• by LordNimon (85072) on Wednesday September 05, 2001 @04:57PM (#2257313)
Or are they just inefficiently allocated or something?
You think?
The rest of the world waits until the U.S. is finished making the mistakes that often come when a new technology is introduced. The problem is that once we realize we've made mistakes, our "solution" is to patch things up, not throw the whole thing out and start over. In the meantime, the rest of the world says, "Ok, the U.S. has invented this technology and discovered some of the problems. Now how can we implement it correctly?"
• by prisoner (133137) on Wednesday September 05, 2001 @05:03PM (#2257346)
while it brings in alot of $$$ has always seemed somewhat shady to me. While this article isn't well balanced, it has always seemed like the users of that spectrum have been well-funded businesses and I get nervous when they get in too tight with the regulating agency. A breath-taking example of this coziness is that the NAB would have the balls to propose auctioning their old analog spectrum and keeping the money. And yes, I read the article and if you don't think they won't manage to stuff most of that money in their own pockets, you're crazy. I thought that by giving the networks free spectrum for HDTV (or whatever it may be called by now) the Gov't and, by extension, the people *were* speeding up the process and cutting broadcasters costs.....sheesh.
• by mellifluous (249700) on Wednesday September 05, 2001 @05:09PM (#2257372)
Actually the amount of spectrum currently allocated to cellular is similar in the US to many other countries. One of the main reasons we do not see 3G yet is the expensive of overhauling infrastructure on a massive scale compared to many other countries, combined with an economic slowdown in the communications sector. US users have also been historically slower to adopt new features, so carriers are more cautious. Its the classic chicken and egg problem of new technology - industry needs users to spur revenue for 3G development, but users want widespread 3G technology before adopting.
• It's TV (Score:3, Interesting)
by Anonymous Coward on Wednesday September 05, 2001 @05:09PM (#2257379)
The US gives a lot of spectrum to TV (and the military, but that's another story). So, Americans are behind in cell phone technology, but get to watch more TV channels (even without cable).Network Magazine [networkmagazine.com] has an interesting article about this.
• by Tattva (53901) on Wednesday September 05, 2001 @05:15PM (#2257409) Homepage Journal
Well, of course the broadcasters are going to try to do this. Do the math, they only need to contribute 20 million or so of soft money to reap a 200 billion windfall. That's a 1000000% return on investment.
• by Anonymous Coward on Wednesday September 05, 2001 @05:18PM (#2257416)
Eben Moglen (Prof. at Columbia Univ. and General Counsel for the FSF) was talking about the spectrum giveaway to TV broadcasters 4 years ago. See here [columbia.edu]. Interesting historical perspective.
• by mfarver (43681) on Wednesday September 05, 2001 @05:34PM (#2257477) Journal
We're faced with a problem of a scarce but valuable resource. As usual the government and the corporations that control it are loudly contemplating how much money its worth, but everyone forgets that the government holds this spectrum in the public trust. The government remembers this occasionally, which is why there were minority clauses in the last spectrum auctions, allowing disadvantaged organizations to buy spectrum at a reduced price.. a dismal failure since it turned out small organizations didn't have enough money to build giant centralized systems using that spectrum.
It turns out the idea that spectrum must be parcelled out to monopolies in order to avoid interferce is largely a lie. New technologies like spread spectrum make it possible to cram far more signals into the same spectrum and do so in a decentralized way. Take the unlicensed 2.4GHz band for example, this bit of free for all spectrum suffers from some interference, but at the same time wireless devices utilizing it (cordless phones, 802.11) are dirt cheap, and widely available.
The best (for the public) way to parcel out 3G spectrum is to make it unlicensed, and force everyone one to the same playing field.
• Re:Digital Radio (Score:1, Interesting)
by Anonymous Coward on Wednesday September 05, 2001 @06:58PM (#2257773)
The entire FM broadcast band occupies the equivalent of 5 TV channels. Any attempt to monkey with the FM BC allocation will render hundreds of millions of home and car radios obsolete.
5 stations is about that number that gets broadcast in most areas - if we're intent on reclaiming the analog TV spectrum as valuable, then the same should be done with radio. I don't think I need to point out that the TVs are rendered obsolete under digital TV.
1 Sagan = Billions & Billions | dclm-gs1-009130000 |
Forgot your password?
Comment: Re:Roomba sucks (but not in the way I paid for) (Score 1) 88
by FirstNoel (#41322571) Attached to: What's Next For iRobot?
Same here. Have the Pet one for the basement/rec-room/man-cave/whatever. Runs twice a week. Only issues I've had are when he wonders into the laundry room or closet and can't get back out. Some times he may try to crawl under the couch and get stuck, or if my 5 year old leaves some toys out he may try to pull them in.
Over all, great investment for me. Keeps the cat/dog hair in check. And I don't have to lug the big vacuum downstairs and go through that hassle.. I like him.
He does need maintenance once in a while, but that's more fun than vacuuming.
by FirstNoel (#39367683) Attached to: Wikipedia Didn't Kill Brittanica — Encarta Did
. Encyclopedias are what you read when you don't really care all that much about the subject.
Thinking about this...you are correct. If you want real in debt knowledge go to the sources. If you want a basic understanding, but not be inundated in the details Encyclopedias do that.
I remember grabbing a World-Book Encyclopedia whenever I needed quick bathroom reading. For a pre-teen/teenager it was perfect. I got a lot of real basic info about interesting subjects. But other than for a grade-school writing assignment, they were just dead trees. I think we got the update books up till 1980...so talk about outdated info.
Encarta was like a breath of fresh air. except you couldn't lug your PC into the restroom to read it.
Now...hell, smartphone+wikipedia and I'm set for life.
Comment: What about that pen that records everything (Score 1) 425
by FirstNoel (#38061404) Attached to: Ask Slashdot: What's a Good Tablet/App Combination For Note-Taking?
Staples had a pen that would record your strokes as you wrote, that you could then download into your PC.
Forget the name, (don't feel like googling), you still need paper though.
I like to write my pseudo-code out ahead of time on certain projects, it would be nice to then import that in when I'm done.
tablets are nice and all, but there's something about hand-writing it out. helps me with memorizing. Typing, "seems" less so.
Comment: Re:Which is what, exactly? (Score 1) 2247
by FirstNoel (#37778242) Attached to: Ron Paul Suggests Axing 5 U.S. Federal Departments (and Budgets)
Um, because we're all citizens of the same country?
I personally do not have any need for a tsunami warning system. But I'll be damned if I want my fellow citizens put in harms way if we can avoid it.
Why can't we all watch each other's backs instead of trying to stab them there?
Damn. it's not socialism, it's good citizenship.
1 Sagan = Billions & Billions | dclm-gs1-009140000 |
Forgot your password?
Comment: Re:For the Nth time now! (Score 1) 532
by Gekke Eekhoorn (#34951662) Attached to: Electronics In Flight — Danger Or Distraction?
While I don't doubt your facts, they never get mentioned as a reason and they don't get acted upon either:
- People reading heavy books aren't told to stow them
- People sleeping aren't awoken so they pay attention
- People with glasses aren't told to hang on to them
Furthermore, I would think that people will notice when they're about to crash and assume suitable positions, including quickly hanging on to loose items.
The electronic interference story is no good and everybody knows it. Heck, I don't turn off my laptop/phone - I switch it to sleep mode. It's still active...
The deadly projectile story is a lot better but presumably a lightweight phone or ebook reader won't be all that deadly, and whether it's on or off won't make a difference.
Comment: Re:Why Can't It Just Act As Write-Back Cache? (Score 1) 67
by Gekke Eekhoorn (#32450094) Attached to: Hybrid Seagate Hard Drive Has Performance Issues
Wait, what? Oh I see - are you proposing to add a fully associative cache in front of the 4GB Flash memory to speed up cache lookups and thus lazily storing writes as well?
I thought you were caching the stored data in a cache. I must admit I kinda glossed over the "fully associative with write-back" bit :-)
I suppose that can work - SLC is great for caching writes on. However, it's a lot more work than simply copying hot reads onto the Flash and caching them there. What you're proposing means a lot of new work on the disk controller, whereas now they simply slapped a caching thing on top of what they had.
However, at http://www.cs.umd.edu/class/sum2003/cmsc311/Notes/Memory/fully.html they explain fully associative caches nicely and add that "The hardware for finding the right slot, then picking the slot if more than one choice is available is rather large, so fully associative caches are not used in practice".
I don't think it really matters how Seagate exactly decides to cache stuff - right now they do read-cache only and it would be nice if they did a write-cache as well. You can do that just fine without using fully associative caches for the addressing.
Doing caching right is just not a trivial thing, especially if you have to do it on a tiny embedded platform.
by Gekke Eekhoorn (#32429226) Attached to: Hybrid Seagate Hard Drive Has Performance Issues
Three reasons:
- RAM is expensive
- The OS can do it better than the disk (except at boot time)
- Doing it right is not trivial (complicated firmware is a bad thing)
If you want a disk cache with write-back, buy more memory for your system, that's what the OS does with it.
UK Students Build Electric Car With 248-Mile Range 192
Posted by kdawson
from the helmets-and-goggles dept.
da_how writes "A group of students and graduates at Imperial College London have built an electric car with a massive range — 248+ miles on a charge at 'reasonable' highway speeds (60 mph). They did this by filling the car to the absolute max with as many lithium iron phosphate batteries as possible — 56 kWh — and designing a very efficient direct drive powertrain, about 90% batteries-to-wheels at highway speeds. The choice of vehicle is an interesting one: it's a converted Radical SR8 — a track racing car with a speed record on the Nurburgring. Not an obvious contender for an endurance vehicle (no windscreen either!) — but then they claim it's lightweight to start with, being constructed of steel space frame and glass fiber. Also, Radical is based in the UK and provided some help and sponsorship. The students plan to drive their 'SRZero' 15,000 miles down the Pan American Highway, beginning July 8 in Prudhoe Bay, Alaska, and ending up in Tierra Del Fuego three month later. That's about 60 charges."
Students Show a Dramatic Drop In Empathy 659
Posted by kdawson
from the well-boo-hoo dept.
MotorMachineMercenar writes "Several news sources report that today's college students show a precipitous drop in empathy (here's MSNBC's take). The study of 14,000 students shows that students since the year 2000 had 40% less empathy than those 20 and 30 years before them. The article lays out a laundry list of culprits, from child-rearing practices and the self-help movement, to video games and social media, to a free-market economy and income inequality. There's also a link so you can test your very own level of narcissism. Let's hope the Slashdot crowd doesn't break the empathy counter on the downside."
Comment: Re:FTL information (Score 2, Informative) 236
by Gekke Eekhoorn (#30829492) Attached to: FTL Currents May Power Pulsar Beams
Read this: http://www.eskimo.com/~billb/miscon/elect.html
and then come back to educate other /.-ers. I'm a civil engineer and even I didn't know some of the stuff in there. Did you know that electrons flow through metal at a few cm/minute? I sure didn't, but after reading this text a lot of other stuff made a lot more sense to me.
Comment: Re:Pricey - no, it's VERY PRICEY (Score 2, Informative) 458
by Gekke Eekhoorn (#30829380) Attached to: 100% Free Software Compatible PC Launches
Please don't confuse American prices with European prices. €359 is very reasonable over here - you won't find a laptop for that price over here either. The laptop you describe would be €600 if you're willing to stand in line at 8AM.
Remember, we pay around 20% in sales tax.
+ - Intel's future processors
Submitted by madison
madison writes "Researchers at Intel are working on ways to mask the intricate functionality of massive multicore chips to make it easier for computer makers and software developers to adapt to them, said Jerry Bautista, co-director of Intel's Tera-scale Computing Research Program. These multicore chips, he added, will also likely contain both x86 processing cores, as well as other types of cores. A 64-core chip, for instance, might contain 42 x86 cores, 18 accelerators and four embedded graphics cores.
In another development Intel has updated its Itanium roadmap to include a new chip dubbed "Kittson" which will follow the release of Poulson- which will be based on a new microarchitecture that provides higher levels of parallelism. "There will be four or more cores, multithreading enhancements, and we'll also introduce more instructions to take advantage of parallelism, especially in virtualization." said William Wu, regional marketing manager for server platforms at Intel Asia-Pacific."
1 Sagan = Billions & Billions | dclm-gs1-009150000 |
Forgot your password?
Comment: HP Workhorses... (Score 1) 310
by Slurpee (#36235342) Attached to: My current printer has printed ...
I've been using a HP Laserjet 2100 since about 1999, and I've printed hundreds of thousands of pages. Still going very very strong. I've got friends with 4000 series that are still working very well.
Some of those HP SOHO or Buisness laser printers from the 90s and early 2000s just kept going.
Of course - they cost an arm and a leg. But they were worth it!
Comment: Many users are on 10 or 25gig? (Score 4, Informative) 173
by Slurpee (#32701082) Attached to: Australia's Largest ISP Ditches Linux Mirror
10 gig or 25 gig a month? They're the luck users!
Seriously - their most popular plan has a 2gig limit for "only" $40 a month - with excess usage charged at 15c a meg. That's over $2,000 a gig! Both up and down are counted.
People who use bigpond are seriously deluded. Considering rivals offer 130gig a month for $40, no excess usage charges, and only downloads count...
no linux user users bigpond.
Friends don't let friends use bigpond.
Comment: can't both be true... (Score 1, Troll) 248
by Slurpee (#31604996) Attached to: Best Buy Offers Bogus "3D Sync" Service
The offer's only problem is that there is no such thing as syncing 3D glasses. They sync automatically."
Both these statements can't be true. If the glasses sync automatically, then there is such a thing as syncing 3D glasses.
The real question is, considering that the glasses sync automatically, should they be advertise this as a service they provide.
Most likely not.
Comment: We dontated ours.... (Score 1) 409
by Slurpee (#26636739) Attached to: Umbilical Cord Blood Banking?
I've never heard of the exact thing you're talking about - I suspect it's a USA only thing.
But we were given the chance to donate the umbilical cord blood to help with research (Stem Cell in particular). And why wouldn't we do it? Helps others, and something we obviously won't be using ourselves. That was 11 months ago.
I suspect what you're talking about is some sort of scheme where a third party stores the blood "just in case" (the same sort of "just in case" as freezing your body when you die) - the hope is that possibly in the future it will help your child - though currently there's no known proven benefits.
If that's the case - may I suggest donating the blood to the appropriate people. That way - we all benefit. And you're not ripped off.
| dclm-gs1-009160000 |
Forgot your password?
Comment: Re:So they can't talk about proprietary products?? (Score 1) 587
by dragonmantank (#30420382) Attached to: GNOME Developer Suggests Split From GNU Project
You do realize that you own the copyright to your code and you can license it however you please to businesses?
Yes. I choose to license it as BSD as my first option. If a company really wants GPL'd code I could do that too, but I find BSD is more business friendly. GPL, to a business, might not be as attractive of an option (or even an option at all) depending on what the project is. If it's extending an existing product, GPL might not be a compatible license.
Basically you're saying that businesses are attracted to your code because they can use it for free without compensating you in anyway.
No, I'm not saying that. If they want me to do work, they will pay me for it. After they, they can do what they want with it, and I can continue to do what I want with it. If they decide they love it and want to resell it, they can. I may not help them anymore, or I may charge them.
Developers who own copyright on valuable code might be better off to dual-license the code. Proprietary/GPL. Give your code a life of its own if it is that valuable to you, while at the same time allowing companies who really do value your code to have access to it under terms that are agreeable to you and to their business aims. This idea was related very well by the guy who said he writes code under the GPL because he wants to make money on his code if someone else wants to benefit from it monetarily.
I never once said I worked for free. You can make just as much money off of BSD code as GPL. If I make a piece of code under BSD, it can have a life of its own. I can choose to release it to the world at the same time as I give it to the client. I can keep it all to myself and use it in other projects without fear of anyone complaining. Depends on the code. The only difference GPL or BSD makes is what happens /after/ the code has been given to a client and what the client can do with it. Under BSD, the client can do /anything/ to it but claim they wrote it (I would still own the copyright). The GPL places additional restrictions on what the client can do, things like releasing the source code, what kinds of licenses are compatible with the code, what kind of code can talk to the GPL'd code, etc
by dragonmantank (#30418662) Attached to: GNOME Developer Suggests Split From GNU Project
Care to back that up with anything?
I am a software developer. I release my code as BSD licensed code. Do you know why? Business are more attracted to it than other code. When I make the case to sell my services and prepackaged code the business knows that they can use my code for whatever they want. As a developer, I'm fine with that. If they want to lock it up and sell it as their own, feel free.
I will keep my own, original branch of code BSD. If I don't like the company that locks it up, its well within my rights to not help them anymore. They can spend their own time taking my work and trying to get it to work with their fork. I make my money off of services anyway.
This assumes they take the code and lock it up without my approval. If I'm contracted to do work for a company I always do the work as BSD licensed. It takes the complications out of things but still gives me access to a large body of code to work from. The stuff I do for them they can resell/lock away without worrying.
Most FOSS projects who will use GPL'd or BSD'd code know and understand the moral implications of locking up code or trying to ignore the license and they will play fair. Yes, there are companies like MS that lock things away and try to keep it under wraps. Know what though? Developers aren't stupid, and if we pick licenses like MIT or BSD, *we* understand what might happen.
End users really don't care. As long as the software works. 99% of end users are never going to modify the code or attempt to redistribute it, so the choice of license becomes moot. This isn't the 1980s where code is being shared amongst companies to make their mainframes work nicer.
Comment: Re:So they can't talk about proprietary products?? (Score 3, Insightful) 587
by dragonmantank (#30414020) Attached to: GNOME Developer Suggests Split From GNU Project
Have you ever read any of Stallman's rants? Stallman is about the freedom of the /software/, not the end user. He wants all software to be free no matter what the end cost for the user actually is. Why do you think he has a problem with licenses like BSD (which is less restrictive than the GPL)? They give more power the user than the software itself to determine how it can be used. If you take the time to actually read the GPL and some of Stallman's writings, you begin to see that he is a religious zealot who is banging the wardrum for software to forever be 100% free and open. If the user doesn't like that, he doesn't care. As a developer, I personally go for projects that are BSD-based. Yes, there is potential that the code could get locked up in a proprietary stack (MS using the BSD network stack, for example), but as long as it was released under BSD it will forever be open to be used as USERS see fit.
| dclm-gs1-009170000 |
Forgot your password?
Comment: Skipping Tracks (Score 1) 606
by thedoe (#27213457) Attached to: What Features Should Be Included With iPhone 3.0?
Actually, most people don't seem to have realized this, but the mic on Apple's default white headset works for this. One squeeze pauses the current track, a double squeeze is equivalent to "Next", and 3 squeezes is "Previous". That was a lifesaver during the winter when I had no desire to take off my gloves. It's also the reason I haven't felt the need to get better headphones.
1 Sagan = Billions & Billions | dclm-gs1-009180000 |
Contents of /trunk/INSTALL
Parent Directory Parent Directory | Revision Log Revision Log
Revision 364 - (show annotations) (download)
Sun Nov 9 08:30:19 2008 UTC (5 years, 4 months ago) by vapier
File size: 9512 byte(s)
update to latest INSTALL doc
1 Installation Instructions
5 2006, 2007 Free Software Foundation, Inc.
7 This file is free documentation; the Free Software Foundation gives
8 unlimited permission to copy, distribute and modify it.
10 Basic Installation
13 Briefly, the shell commands `./configure; make; make install' should
14 configure, build, and install this package. The following
15 more-detailed instructions are generic; see the `README' file for
16 instructions specific to this package.
18 The `configure' shell script attempts to guess correct values for
19 various system-dependent variables used during compilation. It uses
20 those values to create a `Makefile' in each directory of the package.
21 It may also create one or more `.h' files containing system-dependent
22 definitions. Finally, it creates a shell script `config.status' that
23 you can run in the future to recreate the current configuration, and a
24 file `config.log' containing compiler output (useful mainly for
25 debugging `configure').
27 It can also use an optional file (typically called `config.cache'
29 the results of its tests to speed up reconfiguring. Caching is
30 disabled by default to prevent problems with accidental use of stale
31 cache files.
33 If you need to do unusual things to compile the package, please try
34 to figure out how `configure' could check whether to do them, and mail
35 diffs or instructions to the address given in the `README' so they can
36 be considered for the next release. If you are using the cache, and at
37 some point `config.cache' contains results you don't want to keep, you
38 may remove or edit it.
40 The file `configure.ac' (or `configure.in') is used to create
41 `configure' by a program called `autoconf'. You need `configure.ac' if
42 you want to change it or regenerate `configure' using a newer version
43 of `autoconf'.
45 The simplest way to compile this package is:
47 1. `cd' to the directory containing the package's source code and type
48 `./configure' to configure the package for your system.
50 Running `configure' might take a while. While running, it prints
51 some messages telling which features it is checking for.
53 2. Type `make' to compile the package.
56 the package.
58 4. Type `make install' to install the programs and any data files and
59 documentation.
61 5. You can remove the program binaries and object files from the
62 source code directory by typing `make clean'. To also remove the
63 files that `configure' created (so you can compile the package for
64 a different kind of computer), type `make distclean'. There is
65 also a `make maintainer-clean' target, but that is intended mainly
66 for the package's developers. If you use it, you may have to get
67 all sorts of other programs in order to regenerate files that came
68 with the distribution.
70 6. Often, you can also type `make uninstall' to remove the installed
71 files again.
73 Compilers and Options
76 Some systems require unusual options for compilation or linking that the
78 details on some of the pertinent environment variables.
80 You can give `configure' initial values for configuration parameters
81 by setting variables in the command line or in the environment. Here
82 is an example:
84 ./configure CC=c99 CFLAGS=-g LIBS=-lposix
86 *Note Defining Variables::, for more details.
88 Compiling For Multiple Architectures
91 You can compile the package for more than one kind of computer at the
92 same time, by placing the object files for each architecture in their
94 directory where you want the object files and executables to go and run
95 the `configure' script. `configure' automatically checks for the
99 architecture at a time in the source code directory. After you have
100 installed the package for one architecture, use `make distclean' before
101 reconfiguring for another architecture.
103 Installation Names
106 By default, `make install' installs the package's commands under
108 can specify an installation prefix other than `/usr/local' by giving
109 `configure' the option `--prefix=PREFIX'.
111 You can specify separate installation prefixes for
112 architecture-specific files and architecture-independent files. If you
114 PREFIX as the prefix for installing programs and libraries.
115 Documentation and other data files still use the regular prefix.
117 In addition, if you use an unusual directory layout you can give
118 options like `--bindir=DIR' to specify different values for particular
120 you can set and what kinds of files go in them.
122 If the package supports it, you can cause programs to be installed
123 with an extra prefix or suffix on their names by giving `configure' the
126 Optional Features
129 Some packages pay attention to `--enable-FEATURE' options to
130 `configure', where FEATURE indicates an optional part of the package.
134 package recognizes.
136 For packages that use the X Window System, `configure' can usually
137 find the X include and library files automatically, but if it doesn't,
139 `--x-libraries=DIR' to specify their locations.
141 Specifying the System Type
144 There may be some features `configure' cannot figure out automatically,
145 but needs to determine by the type of machine the package will run on.
146 Usually, assuming the package is built to be run on the _same_
147 architectures, `configure' can figure that out, but if it prints a
148 message saying it cannot guess the machine type, give it the
154 where SYSTEM can have one of these forms:
158 See the file `config.sub' for the possible values of each field. If
159 `config.sub' isn't included in this package, then this package doesn't
160 need to know the machine type.
162 If you are _building_ compiler tools for cross-compiling, you should
164 produce code for.
166 If you want to _use_ a cross compiler, that generates code for a
167 platform different from the build platform, you should specify the
168 "host" platform (i.e., that on which the generated programs will
169 eventually be run) with `--host=TYPE'.
171 Sharing Defaults
172 ================
174 If you want to set default values for `configure' scripts to share, you
175 can create a site shell script called `config.site' that gives default
179 `CONFIG_SITE' environment variable to the location of the site script.
180 A warning: not all `configure' scripts look for a site script.
182 Defining Variables
185 Variables not defined in a site shell script can be set in the
186 environment passed to `configure'. However, some packages may run
187 configure again during the build, and the customized values of these
188 variables may be lost. In order to avoid this problem, you should set
191 ./configure CC=/usr/local2/bin/gcc
194 overridden in the site shell script).
196 Unfortunately, this technique does not work for `CONFIG_SHELL' due to
197 an Autoconf bug. Until the bug is fixed you can use this workaround:
201 `configure' Invocation
204 `configure' recognizes the following options to control how it operates.
206 `--help'
207 `-h'
208 Print a summary of the options to `configure', and exit.
210 `--version'
211 `-V'
212 Print the version of Autoconf used to generate the `configure'
213 script, and exit.
215 `--cache-file=FILE'
216 Enable the cache: use and save the results of the tests in FILE,
217 traditionally `config.cache'. FILE defaults to `/dev/null' to
218 disable caching.
220 `--config-cache'
221 `-C'
222 Alias for `--cache-file=config.cache'.
224 `--quiet'
225 `--silent'
226 `-q'
227 Do not print messages saying which checks are being made. To
229 messages will still be shown).
231 `--srcdir=DIR'
232 Look for the package's source code in directory DIR. Usually
233 `configure' can determine that directory automatically.
235 `configure' also accepts some other, not widely useful, options. Run
236 `configure --help' for more details.
Name Value
svn:eol-style native
svn:keywords Author Date Id Revision
ViewVC Help
Powered by ViewVC 1.1.20 | dclm-gs1-009190000 |
Take the 2-minute tour ×
As part of our recent recruiting effort we need to decide on the best approach for choosing automation engineers. On the one hand software engineers, or programmers, can write great automation software, faster and better leaving the "what to test" to others.
On the other hand engineers with solid testing background but only with basic programming skills might be able to write good-enough automation but with much better "what to test" in it.
I worked with both types and seen advantages to both, but with no conclusive winner. Am I missing something ?
share|improve this question
What sort of answer are ou expecting apart from 'it depends' ? Won't it be dependent on what skills you gave in place, what gaps need filling, what sort of environment you work in ? – Phil Kirkham Sep 9 '12 at 13:40
add comment
3 Answers
For the past three years, I've spent all of my time consulting to test automation groups in a variety of organizations. My clients' test automation focuses entirely on basic happy path and boundary case tests. In that context, I would go with good programmers with little testing skill over good testers with little programming skill.
Test automation is software engineering. Automated tests are software. Like other software, the majority of the cost happens after the code is initially written. Writing software that reduces those ongoing costs is hard. It's real programming that takes just as much skill as writing applications.
My experience is this: Testers who have a little programming skill can usually write automated tests that work. Their code tends to be procedural, and filled with lots of incidental details, such as GUI terminology, test framework terminology, or literal data values.
Generally they have not developed skill in abstracting important concepts from the details, such as classes, "page objects," and other common test automation patterns.
Generally, they have not learned about how to write code that is expressive, with low coupling and high cohesion. As a result, their code poorly describes the responsibility being tested, and it's difficult to change. Given that automated tests have to change in response to changes in both requirements and implementation, and that these changes happen regularly, the difficulty of changing the tests creates a great deal of pain. Further, when the test fails, the code and the stack traces give little aid in diagnosing the failure.
I've talked with scores of people about successful and failed test automation programs. The ongoing cost of automation is one a huge contributor to test automation program failure. (Actually, the biggest factor is not the cost, but people's surprise at the cost, but that's a story for another day.) Initial cost matters. Ongoing cost matters more.
On the other hand, not all programmers are great at programming. If you want a great test automator, you'll need some reasonable way to assess programming skill.
Of course you will also need testing skill. Given the ongoing expense of test automation, you'll want to make sure the tests you automate are worth the cost. Programming skills can reduce the costs of automated tests, but you'll need testing skills to make sure the automated tests test provide value.
With a few rare and delightful exceptions, I have not been able to help testers improve their programming skills to any great degree. I have, on the other hand, been able to help programmers improve their testing skills and practices, at least for the kinds of basic tests that are the core of most test automation efforts. Perhaps some or all of the difference can be attributed to my coaching skill and style.
I want to reiterate that my experience is entirely with people automating fairly basic happy path and boundary tests. If you're doing performance testing, security testing, or some other kind of test that requires specialized skills beyond the basics, I don't know how to advise there.
And no matter what amount and type of test automation you're doing, you will also want people with excellent testing skills to do exploratory testing.
share|improve this answer
add comment
The hiring decision really between a developer with limited testing knowledge and someone with testing experience and limited coding skills.
In my experience, hiring developers with no/limited testing knowledge will get you "automated tests" that are barely a notch above unit tests in complexity and value because the "test automator" lacks an understanding of testing paradigms which will limit the overall effectiveness of their automated test designs. (so while they may write code faster it may not be necessarily be 'better.')
On the other extreme, testers with little programming background tend to automate things that replicate a bunch of steps through the UI attempting to emulate a rudimentary sequence of repetitive actions. This automation also provides little long term value and tends to require a lot of maintenance costs.
I would like to think that there are more folks who have a solid understanding of software testing coupled with solid programming skills.
The pool of potential candidates should not be limited to these "either/or" profiles. But, if you need software testers and you can't find well rounded software testers who are multi-faceted then the best course of action may be to hire people who are a good fit for the team and then invest in that person and help them either obtain the knowledge/skills they lack.
share|improve this answer
+1 for the last paragraph. Unfortunately, a lot of companies look for people who can start contributing asap concentrating more on what the person has achieved so far rather than what they can achieve in the future. Building a team with solid individuals with a good team environment will have better and consistent long term returns. – Suchit Parikh Sep 11 '12 at 18:54
add comment
You are not missing anything. "Software engineer", "programmer", and "engineer with solid testing background" are general terms that could describe a wide spectrum of personalities and abilities. Any of those terms could describe a great automation engineer or a terrible automation engineer. And of course there are many other aspects of the candidate that you did not mention but which are just as important to evaluate during the interview, e.g. curiosity, interest in the job, compatibility with the test of the team, ability to communicate clearly in person and in writing, and organizational skills.
Sometimes you just have to pick something, pay attention to what happens, and adjust as you go along.
share|improve this answer
"Sometimes you just have to pick something, pay attention to what happens, and adjust as you go along." Well said. Just like prototyping a software design, sometimes it pays to prototype a new role. – Joe Strazzere Sep 9 '12 at 20:22
add comment
Your Answer
| dclm-gs1-009200000 |
Take the 2-minute tour ×
I have a point3 struct with 3 floats x y z (coordinates in 3-D space).
I create a few instances of point3, and then create a list and push those instances onto the list. Then I apply a translation function to the entire list.
Question: After applying the translation, how can I print out the X coordinate of one of the points in the list to check if my translation function does what I want it to?
Here is my code:
int main()
point3 p1 = point3(0.0f, 0.0f, 0.0f);
point3 p2 = point3(1.0f, 1.0f, 1.0f);
point3 p3 = point3(2.0f, 2.0f, 2.0f);
list<point3> myList;
list<point3> myList2 = translateFact(myList, 1, 1, 1);
std::cout << myList2.front.x; //<--- This is the line I'm having trouble with
//Translates the face by dx, dy, dz coordinates
list<point3> translateFact(list<point3> lop, float dx, float dy, float dz)
list<point3>::iterator iter;
for (iter = lop.begin() ; iter != lop.end(); iter++){
point3 p = *iter;
iter->x - dx;
iter->y - dy;
iter->z - dz;
return lop;
The error I receive when trying to print myList2.front.x is
IntelliSense: a pointer to a bound function may only be used to call the function
so I think my issue is related to pointers, but I am unsure how. I just picked up C++ recently so I don't know enough about pointers to diagnose/fix the error.
share|improve this question
add comment
1 Answer
up vote 2 down vote accepted
You need parentheses to indicate that you want to call the front method:
std::cout << myList2.front().x;
share|improve this answer
Oh thank god it's something simple. Thank you very much Mr. Reed. Another quick question, do you know why my translateFact function is causing the error "identifier not found" when I call it on myList? – Murkantilism Apr 18 '12 at 1:26
That's because compiler compiles code top to bottom. When it compiles main function, it doesn't see translateFact function, yet. Either put translateFact definition before main function, or declare translateFact function before main function and leave definition where it is now. – Mārtiņš Možeiko Apr 18 '12 at 1:36
Ahhh I see, that makes sense thank you! – Murkantilism Apr 18 '12 at 1:38
You're welcome! But note that editing the post and removing the original question results in a page that is confusing to those who come later; SO answers are for posterity as well as the original poster. You might want to put back the original error message, etc. – Mark Reed Apr 18 '12 at 2:00
add comment
Your Answer
| dclm-gs1-009210000 |
Take the 2-minute tour ×
I am trying to implement SSE vectorization on a piece of code for which I need my 1D array to be 16 byte memory aligned. However, I have tried several ways to allocate 16byte memory aligned data but it ends up being 4byte memory aligned.
I have to work with the Intel icc compiler. This is a sample code I am testing with:
#include <stdio.h>
#include <stdlib.h>
void error(char *str)
int main()
int i;
//float *A=NULL;
float *A = (float*) memalign(16,20*sizeof(float));
// if (posix_memalign((void **)&A, 16, 20*sizeof(void*)) != 0)
// error("Cannot align");
printf("&A[%d] = %p\n",i,&A[i]);
return 0;
This is the output I get:
&A[0] = 0x11fe010
&A[1] = 0x11fe014
&A[2] = 0x11fe018
&A[3] = 0x11fe01c
&A[4] = 0x11fe020
&A[5] = 0x11fe024
&A[6] = 0x11fe028
&A[7] = 0x11fe02c
&A[8] = 0x11fe030
&A[9] = 0x11fe034
&A[10] = 0x11fe038
&A[11] = 0x11fe03c
&A[12] = 0x11fe040
&A[13] = 0x11fe044
&A[14] = 0x11fe048
&A[15] = 0x11fe04c
&A[16] = 0x11fe050
&A[17] = 0x11fe054
&A[18] = 0x11fe058
&A[19] = 0x11fe05c
It is 4byte aligned everytime, i have used both memalign, posix memalign. Since I am working on Linux, I cannot use _mm_malloc neither can I use _aligned_malloc. I get a memory corruption error when I try to use _aligned_attribute (which is suitable for gcc alone I think).
Can anyone assist me in accurately generating 16byte memory aligned data for icc on linux platform.
share|improve this question
How do you know it is 4 byte aligned, simply because printf is only outputting 4 bytes at a time? Just because you are using the memalign routine, you are putting it into a float type. When you print using printf, it knows how to process through it's primitive type (float). – trumpetlicks Jun 18 '12 at 14:05
Why can't you use "_mm_malloc" on Linux? – Z boson Oct 28 '13 at 7:32
add comment
5 Answers
up vote 8 down vote accepted
The memory you allocate is 16-byte aligned. See:
&A[0] = 0x11fe010
But in an array of float, each element is 4 bytes, so the second is 4-byte aligned.
You can use an array of structures, each containing a single float, with the aligned attribute:
struct x {
float y;
} __attribute__((aligned(16)));
struct x *A = memalign(...);
share|improve this answer
I think __attribute__ is a GCC's builtin, not available for ICC. – Benoit Jun 18 '12 at 14:12
@Benoit, GCC specific indeed, but I think ICC does support it. See here – ugoren Jun 18 '12 at 14:32
@Benoit: If you need to align a struct on 16, just add 12 bytes of padding at the end... – Vlad Lazarenko Jun 18 '12 at 14:32
@VladLazarenko, Works, but not nice and portable. If, in some compiler, float is changed, you'll have bad alignment again. – ugoren Jun 18 '12 at 14:36
@ugoren: For that reason you could add a static assertion, disable padding for a structure, etc. __attribute__((aligned(16))) doesn't really work with gcc, and is not portable either. – Vlad Lazarenko Jun 18 '12 at 14:40
show 3 more comments
The address returned by memalign function is 0x11fe010, which is a multiple of 0x10. So the function is doing a right thing. This also means that your array is properly aligned on a 16-byte boundary. What you are doing later is printing an address of every next element of type float in your array. Since float size is exactly 4 bytes in your case, every next address will be equal to the previous one +4. For instance, 0x11fe010 + 0x4 = 0x11FE014. Of course, address 0x11FE014 is not a multiple of 0x10. If you were to align all floats on 16 byte boundary, then you will have to waste 16 / 4 - 1 bytes per element. Double-check the requirements for the intrinsics that you are using.
share|improve this answer
add comment
I found this code on Wikipedia:
Example: get a 12bit aligned 4KBytes buffer with malloc()
// unaligned pointer to large area
void *up=malloc((1<<13)-1);
// well aligned pointer to 4KBytes
void *ap=aligntonext(up,12);
where aligntonext() is meant as:
move p to the right until next well aligned address if
not correct already. A possible implementation is
// PSEUDOCODE assumes uint32_t p,bits; for readability
// --- not typesafe, not side-effect safe
#define alignto(p,bits) (p>>bits<<bits)
#define aligntonext(p,bits) alignto((p+(1<<bits)-1),bits)
share|improve this answer
add comment
AFAIK, both memalign and posix_memalign are doing their job.
&A[0] = 0x11fe010
This is aligned to 16 byte.
&A[1] = 0x11fe014
When you do &A[1] you are telling the compiller to add one position to a float pointer. It will unavoidably lead to:
&A[0] + sizeof( float ) = 0x11fe010 + 4 = 0x11fe014
If you intend to have every element inside your vector aligned to 16 bytes, you should consider declaring an array of structures that are 16 byte wide.
struct float_16byte
float data;
float padding[ 3 ];
Then you must allocate memory for ELEMENT_COUNT (20, in your example) variables:
struct float_16byte *A = ( struct float_16byte * )memalign( 16, ELEMENT_COUNT * sizeof( struct float_16byte ) );
share|improve this answer
add comment
I personally believe your code is correct and is suitable for Intel SSE code. When you load data into an XMM register, I believe the processor can only load 4 contiguous float data from main memory with the first one aligned by 16 byte.
In short, I believe what you have done is exactly what you want.
share|improve this answer
add comment
Your Answer
| dclm-gs1-009220000 |
Take the 2-minute tour ×
I'm working on a bare-metal cortex-M3 in C++ for fun and profit.
Lately I decided to try and use the STL library as I needed some containers. I thought that by simply providing my allocator it wouldn't add much code to the final binary, since you get only what you use. I actually didn't even expect any linking process at all with the STL (giving my allocator), as I thought it was all template code.
I am compiling with -fno-exception by the way.
Unfortunately, about 600KB or more are added to my binary. I looked up what symbols are included in the final binary with nm and it seemed a joke to me. The list is so long I won't try and past it. Although there are some weak symbols.
I also looked in the .map file generated by the linker and I even found the scanf symbols
.text 0x000158bc 0x30 /CodeSourcery/Sourcery_CodeBench_Lite_for_ARM_GNU_Linux/bin/../arm-none-linux-gnueabi/libc/usr/lib/libc.a(sscanf.o)¶
0x000158bc __sscanf¶
0x000158bc sscanf¶
0x000158bc _IO_sscanf¶
$ arm-none-linux-gnueabi-nm binary | grep scanf
000158bc T _IO_sscanf
0003e5f4 T _IO_vfscanf
0003e5f4 T _IO_vfscanf_internal
000164a8 T _IO_vsscanf
00046814 T ___vfscanf
000158bc T __sscanf
00046814 T __vfscanf
000164a8 W __vsscanf
000158bc T sscanf
00046814 W vfscanf
000164a8 W vsscanf
How can I debug this? For first I wanted to understand what exactly GCC is using for linking (I'm linking through GCC). I know that if symbol is found in a text segment, the whole segment is used, but still that's too much.
Any suggestion on how to tackle this would really be appreciated.
Thanks, S.
share|improve this question
add comment
2 Answers
up vote 2 down vote accepted
Using GCC's -v and -Wl,-v options will show you the linker commands (and version info of the linker) being used.
Which version of GCC are you using? I made some changes for GCC 4.6 (see PR 44647 and PR 43863) to reduce code size to help embedded systems. There's still an outstanding enhancement request (PR 43852) to allow disabling the inclusion of the IO symbols you're seeing - some of them come from the verbose terminate handler, which prints a message when the process is terminated with an active exception. If you're not using execptions then some of that code is useless to you.
share|improve this answer
I'm using gcc version 4.6.3 from Code Sourcery. The -Wl,-v option was very useful. Along the flags I passed to the linker, it also included the following -lstdc++ -lm --start-group -lgcc -lgcc_eh -lc --end-group now I have to understand why, and how to remove them. Especially the gcc_eh which I suppose stands for exception handling. Any suggestions or reading about this? – emitrax Jul 22 '12 at 8:29
If you link with gcc instead of g++ then it won't pass -lstdc++ to the linker, and that might also remove the need for -lgcc -lgcc_eh (I don't remember offhand, I'd have to check) but if you don't use any code from those libs then it shouldn't increase the executable size anyway - the verbose terminate handler in libstdc++ is probably what pulls in the unwanted code – Jonathan Wakely Jul 22 '12 at 11:31
If I use gcc it won't find the _List_node_base::_M_hook symbol.Passing -lstdc++ includes everything else. To narrow down the problem I tried linking directly with ld adding those flags one by one. It's missing __aeabi_unwind_cpp_pr0 in libstdc++.a(list.o):(..._List_node_base7_M_hookE) which then links to libc (memcpy and other), which then links everything else. It's a big chain and a PITA. I just wanted a container. :-) I also figured that,since I have a global object, it needs __static_initialization_and_destruction_0 which I didn't expect. Thanks for your help. – emitrax Jul 22 '12 at 12:21
Ah yes, std::__detail::_List_node_base::_M_hook is not inline, it's defined in libstdc++.a, but the file it's in (list.cc) is pretty small and I'm surprised it requires the unwind support if you've disabled exceptions ... strange. – Jonathan Wakely Jul 23 '12 at 8:14
add comment
The problem is not about the STL, it is about the Standard library.
The STL itself is pure (in a way), but the Standard Library also includes all those streams packages and it seems that you also managed to pull in the libc as well...
The problem is that the Standard Library has never been meant to be picked apart, so there might not have been much concern into re-using stuff from the C Standard Library...
You should first try to identify which files are pulled in when you compile (using strace for example), this way you can verify that you only ever use header-only files.
Then you can try and remove the linking that occurs. There are options to pass to gcc to precise that you would like a standard library-free build, something like --nostdlib for example, however I am not well versed enough in those to instruct you exactly here.
share|improve this answer
I am already passing -nostdlib to the compiler, along with -fno-exception, but it seems not to work. – emitrax Jul 22 '12 at 8:35
add comment
Your Answer
| dclm-gs1-009230000 |
Take the 2-minute tour ×
Simple question: I want to open a URL using the Default Browser, so I just do Process.Start(url). However, I noticed that this returns an IDisposable object.
So now I wonder if I have to dispose it? Or, for that matter, if my Application is in any way responsible for this process? The intended functionality is simply "Fire and forget", I do not want to have my application as a parent of the new process and it does not need to interact with it.
I've seen some similar but unrelated questions on SO that seem to say that simply calling Process.Start on a URL is fine, but I do not want to run into some hard to debug memory leaks/resource exhaustion issues caused my me program keeping references to long dead browser processes.
share|improve this question
add comment
4 Answers
up vote 8 down vote accepted
Couldn't you just wrap it in a using clause to ensure the GC does whatever it needs to do with it IF you are required to dispose of it? This would still allow a sort of "fire and forget" but not leave memory/resources in a bad state.
Probably overkill but there is a really good article on CodeProject about the IDisposable interface: http://www.codeproject.com/KB/dotnet/idisposable.aspx
share|improve this answer
The problem is that I do not fully understand the object life in this situation. If I do using(Process.Start(url)); then will it wait at that point? Or will it dispose the process to early? At the moment, that makes no difference in behavior so I guess that there are no resources that are kept open, but I don't know for sure and i do not know how to measure that. – Michael Stum Aug 6 '09 at 20:34
Since the "using" clause implicitly instructs the compiler to build a try/finally and implement a dispose and the fact that they are returning an IDisposable object I think you'd be safe to do that. By not deallocating it you may be tying resources up. You could try building a loop that opens several URLs without disposing them and see if your resources balloon out of control and another test by wrapping them in using clauses. The caveat is you'll have a bunch of windows to close after that. :) – Fooberichu Aug 6 '09 at 20:49
add comment
Starting the process is a native call which returns a native process handle, which is stored in the instance of Process that is returned. There are methods in Process that use the handle so you can do things like wait for the process to exit, or become idle.
Disposing the Process frees that handle. I agree with Jon, wrap it in a using clause.
share|improve this answer
add comment
No, you do not.
void Main()
Process result = Process.Start("http://www.google.com");
if (result == null)
Console.WriteLine("It returned null");
It returned null
From Process.Start Method (String) on MSDN (.NET Framework 4):
If the address of the executable file to start is a URL, the process is not started and null is returned.
(In general, though, the using statement is the right way to work with IDisposable objects. Except for WCF clients.)
share|improve this answer
add comment
@Fooberichu's answer is spot on, but I think it's also worth pointing out that usually only a few things "need" to be explicitly disposed.
Objects are always effectively disposed at some point:
• Any time the GC does a collection, it will (eventually) dispose of objects that are no longer referenced. So if you don't manually dispose, the object may still be disposed within a few seconds of it going out of scope.
• When your application quits, all resources it held are released. (Although the objects may not be disposed by C#/.net, the OS will claim back pretty much anything your process grabbed. If the lifetime of the resource extends beyond your application, then the OS is usually responsible for cleaning it up)
The point of manually disposing (or employing a 'using') is therefore not to ensure that the resources will be released, but to release them as early as possible.
These days you are unlikely to run out of most types of resources (e.g. memory, file handles, or system brushes). However, if you hold on to resources when you don't need to, your program is likely to be less efficient, you might use more memory than necessary, or perhaps cause delays by temporarily blocking other applications from doing useful things, etc. In general, then, Disposing is about good etiquette, tidiness and cutting out unnecessary inefficiencies.
There are a few cases where resources must be released (e.g. if you don't close a file, you can't open/rename/move/delete it from elsewhere in your program or other programs; if you keep allocating textures on your graphics card without releasing them, you'll run out of VRAM and the computer's display will fail), but in general, you will encounter these situations infrequently, and if you follow best practices (explicitly disposing objects when they're no longer needed), you won't usually need to know when these situations are occurring because you'll already be dealing with them correctly.
share|improve this answer
In many cases IDisposable classes do not have finalizers. If they are GC'd without being explicitly disposed, any unmanaged resources associated with them will be leaked. The framework classes do a good job of protecting us in most cases, but the best practice is to always dispose of IDisposable objects. This and WCF clients happen to be two weird edge cases. – TrueWill Oct 11 '13 at 17:44
add comment
Your Answer
| dclm-gs1-009240000 |
Take the 2-minute tour ×
I've been working on adding to my project (which is quite a pain in the buns) and I'm able to save and remove files, but I can't get a list of the files stored in iCloud. I've tried solutions from about 10 different websites (including the Apple documentation). Whenever I call [self.query startQuery]; everything seems to be working: The correct methods get called, the methods execute exactly as they should. Then when I ask for an of the files in my app's iCloud Documents directory I get two parenthesis with nothing between them (when I view in NSLog): File List: ( ). I know for a fact that there are many different documents of all shapes, extensions, sizes, and names in my app's iCloud Documents directory because I've been using the iCloud Developer site to check if things are working. My first method to setup the query is as follows:
- (void)syncWithCloud {
self.query = [[NSMetadataQuery alloc] init];
NSURL *mobileDocumentsDirectoryURL = [[NSFileManager defaultManager] URLForUbiquityContainerIdentifier:nil];
[query setSearchScopes:[NSArray arrayWithObjects:NSMetadataQueryUbiquitousDocumentsScope, nil]];
//[query setPredicate:[NSPredicate predicateWithFormat:@"%K LIKE '*'", NSMetadataItemFSNameKey]];
[query setPredicate:[NSPredicate predicateWithFormat:[NSString stringWithFormat:@"%%K like \"%@*\"", [mobileDocumentsDirectoryURL path]], NSMetadataItemPathKey]];
//Pull a list of all the Documents in The Cloud
[[NSNotificationCenter defaultCenter] addObserver:self selector:@selector(processFiles:)
name:NSMetadataQueryDidFinishGatheringNotification object:self.query];
name:NSMetadataQueryDidUpdateNotification object:self.query];
[self.query startQuery];
The process files method provided by Apple is next:
- (void)processFiles:(NSNotification*)aNotification {
NSMutableArray *discoveredFiles = [NSMutableArray array];
//Always disable updates while processing results.
[query disableUpdates];
//The query reports all files found, every time.
NSArray *queryResults = [query results];
for (NSMetadataItem *result in queryResults) {
NSURL *fileURL = [result valueForAttribute:NSMetadataItemURLKey];
NSNumber *aBool = nil;
// Don't include hidden files.
[fileURL getResourceValue:&aBool forKey:NSURLIsHiddenKey error:nil];
if (aBool && ![aBool boolValue])
[discoveredFiles addObject:fileURL];
//Update the list of documents.
[FileList removeAllObjects];
[FileList addObjectsFromArray:discoveredFiles];
//[self.tableView reloadData];
//Reenable query updates.
[query enableUpdates];
NSLog(@"File List: %@", FileList);
Why doesn't this give me a list of files or at least some kind of data? Am I defining the NSMetadata query wrong, maybe my predicate isn't formatted right? I know I'm doing something wrong because there's no way iCloud could be this complicated (or could it?).
Thanks for the help in advance!
Edit #1: I am continuing to try different approaches to this problem. Using one of the answers below I have changed the predicate filter as follows:
[query setPredicate:[NSPredicate predicateWithFormat:@"NSMetadataItemFSNameKey LIKE '*'"]];
I have also added the following lines before the [query enableUpdates] call:
for (NSMetadataItem *item in query.results) {
[FileList addObject:[item valueForAttribute:NSMetadataItemFSNameKey]];
In the processFiles method, I've tried placing all of the code on the background thread, but this makes no difference - as a matter of fact, when the code is not executed on the background thread FileList gives me this (null) instead of this ( ).
Could my problem have to do with thread management or memory allocation? Please note that I am using ARC.
Edit #2: The FileList variable is an NSMutableArray defined in my @interface and initialized in the -(id)init method before calling the processFiles method.
Edit #3: When testing my code with breakpoints I found that the following never gets run through - not even once. This leads me to believe that:
A. The proper directory isn't being connected with
B. iCloud can't see the files in the directory
C. My NSMetadataQuery isn't being setup properly D. Something completely different
Here's the code that starts the for-loop which never gets run:
NSArray *queryResults = [query results];
for (NSMetadataItem *result in queryResults) {
share|improve this question
add comment
2 Answers
Since you already set the search scope correct, there's no need to use special filters in the predicate. Just use:
query.predicate = [NSPredicate predicateWithFormat:@"NSMetadataItemFSNameKey == '*'"];
And to get the array use:
NSMutableArray *array = [NSMutableArray array];
for (NSMetadataItem *item in query.results) {
[array addObject:[item valueForAttribute:NSMetadataItemFSNameKey]];
share|improve this answer
I'm still not getting any results with this. I've even tried moving the process off of the background queue, but all that does is make the result (null instead of ( ). Suggestions? Is it possible that my URLForUbiquityContainerIdentifier is not setup correctly? – Sam Jan 1 '13 at 23:00
You don't need the NSURL above and therefore you don't the ContainerIdentifier. Have a look at the sample code from Erica Sadun's fine iOS cookbook. You'll want to examine the CloudHelper class. – SAE Jan 1 '13 at 23:39
What exactly is FileList? From the naming convention it reads like a class, not like an object or variable. – SAE Jan 2 '13 at 0:23
FileList is defined in the @interface section of my class like this: NSMutableArray *FileList;. And thanks for the link! – Sam Jan 2 '13 at 0:41
And is FileList properly initialized before it is used in processFiles? – SAE Jan 2 '13 at 1:07
show 2 more comments
I've solved my problem. Getting the list of files in iCloud was just a matter of correctly defining, allocating, and initializing properties. SAE's answer and this SO posting helped me solve my problem and create this GitHub Repo called iCloud Document Sync. The iCloud Document Sync class simplifies the whole iCloud Document storage process down to a few lines of code. The commit linked here fixes the issues from my question.
share|improve this answer
add comment
Your Answer
| dclm-gs1-009250000 |
Take the 2-minute tour ×
What advice/suggestions/guidance would you provide for designing a class that has upwards of 100 properties?
• The class describes an invoice. An invoice can have upwards of 100 attributes describing it, i.e. date, amount, code, etc...
• The system we are submitting the invoice to uses each of the 100 attributes and is submitted as a single entity (as opposed to various parts being submitted at different times).
• The attributes describing the invoice are required as part of the business process. The business process can not be changed.
• What have others done when faced with designing a class that has 100 attributes? i.e., create the class with each of the 100 properties?
• Somehow break it up (if so, how)?
• Or is this a fairly normal occurrence in your experience?
EDIT After reading through some great responses and thinking about this further, I don't think there really is any single answer for this question. However, since we ended up modeling our design along the lines of LBrushkin's Answer I have given him credit. Albeit not the most popular answer, LBrushkin's answer helped push us into defining several interfaces which we aggregate and reuse throughout the application as well as a nudged us into investigating some patterns that may be helpful down the road.
share|improve this question
How are you serializing/deserializing the objects - do you store them in a database? Are you using WCF? – Philip Wallace Oct 27 '09 at 19:48
@Philip - the data is stored in a combination of SharePoint and SQL Server. No WCF. All submission of data is done between internal systems where the end point takes an Excel spreadsheet of the data (no other options with the system). – Metro Smurf Oct 27 '09 at 19:55
Are you actually dealing with all (or most) of those properties in your code? Or is it just a data structure that "passes through" it - read from some input in a generic fashion, just to be output to some other existing software that implements your business process? – Pavel Minaev Oct 27 '09 at 19:57
@Pavel - we are directly editing around 90% of the attributes. – Metro Smurf Oct 27 '09 at 20:03
It's pretty common to have a denormalized table like an invoice_header that actually has the address and all the customer info from the time it was created. – dotjoe Oct 27 '09 at 21:51
add comment
17 Answers
up vote 9 down vote accepted
I would imagine that some of these properties are probably related to each other. I would imagine that there are probably groups of properties that define independent facets of an Invoice that make sense as a group.
You may want to consider creating individual interfaces that model the different facets of an invoice. This may help define the methods and properties that operate on these facets in a more coherent, and easy to understand manner.
You can also choose to combine properties that having a particular meaning (addresses, locations, ranges, etc) into objects that you aggregate, rather than as individual properties of a single large class.
Keep in mind, that the abstraction you choose to model a problem and the abstraction you need in order to communicate with some other system (or business process) don't have to be the same. In fact, it's often productive to apply the bridge pattern to allow the separate abstractions to evolve independently.
share|improve this answer
@LBushkin - thank you, re: Bridge Pattern. This is the type of answers I was looking for and will spend some time reading up on it. – Metro Smurf Oct 27 '09 at 20:11
add comment
You could try to 'normalize' it like you would a database table. Maybe put all the address related properties in an Address class for example - then have a BillingAddress and MailingAddress property of type Address in your Invoice class. These classes could be reused later on also.
share|improve this answer
@Philip - sadly the data doesn't really subclass into tidy segments. Although there is the possibility of breaking some parts down... hmmm... will take another look. Thanks. – Metro Smurf Oct 27 '09 at 19:58
I agree. Try to break up the data into smaller parts. 100 properties on a class is out of control. – Chuck Conway Oct 27 '09 at 21:32
Also, what about having a generic List<Property> to hold all the properties? – RCIX Nov 2 '09 at 11:49
add comment
The bad design is obviously in the system you are submitting to - no invoice has 100+ properties that cannot be grouped into a substructure. For example an invoice will have a customer and a customer will have an id and an address. The address in turn will have a street, a postal code, and what else. But all this properties should not belong directly to the invoice - an invoice has no customer id or postal code.
If you have to build an invoice class with all these properties directly attached to the invoice, I suggest to make a clean design with multiple classes for a customer, an address, and all the other required stuff and then just wrap this well designed object graph with a fat invoice class having no storage and logic itself just passing all operations to the object graph behind.
share|improve this answer
@Daniel - yes! you've nailed it, re: the internal system we submit to is the bottleneck. – Metro Smurf Oct 27 '09 at 20:02
@Metro: that doesn't mean your object model has to suffer, just the part that submits it to the internal system needs to be ugly. – Austin Salonen Oct 27 '09 at 22:01
Sounds like something similar to an adapter - you have your own object model, nicely broken into small classes, and one ugly class where you shove them so that it looks to the internal system as one giant class with 100 properties... – Mathias Oct 28 '09 at 1:13
add comment
Hmmm... Are all of those really relevant specifically, and only to the invoice? Typically what I've seen is something like:
class Customer:
class Address
class CustomerAddress
.AddressDescription ("ship","bill",etc)
class Order
class OrderDetails
And tying it all together:
class Invoice
When printing the invoice, join all of these records together.
If you really must have a single class with 100+ properties, it may be better to use a dictionary
Dictionary<string,object> d = new Dictionary<string,object>();
d.Add("ShipAddress","1600 Pennsylvania Ave, Suite 0, Washington, DC 00001");
The idea here is to divide your into logical units. In the above example, each class corresponds to a table in a database. You could load each of these into a dedicated class in your data access layer, or select with a join from the tables where they are stored when generating your report (invoice).
share|improve this answer
What benefits will Dictionary give here, exactly, except for more clumsy syntax and lack of type safety? – Pavel Minaev Oct 27 '09 at 19:56
Well, a typed dictionary wouldn't cause lack of type safety. Also, as I've said, normalizing the data is a much better way to go. Using a dictionary, though, is far more expedient than declaring a class with 100+ properties. I've NEVER seen an instance where that was necessary, or desirable. – David Lively Oct 27 '09 at 19:59
@ztech - I can't see a dictionary being a viable solution if you have properties of differening types. Then you would have to store them as type Object. As Pavel said, this will quickly lead to type safety, for example when I put "foo" into InvoiceDate. – Philip Wallace Oct 27 '09 at 20:15
Like I said, I don't think a dictionary is a good idea. But it's comparably bad to creating a class with 100+ properties. Choose your insanity. – David Lively Oct 27 '09 at 20:46
Why is d.Get("Address_Line_1") better than inv.AddressLine[0]? Also in any reasoable business app you would probably have a good deal of validation rules for each field and the class as a whole. You end up with a humungous mess if you implement with a dictionary. – James Anderson Oct 28 '09 at 10:47
show 1 more comment
It would be too many columns when your class / table that you store it in starts to violate the rules of normalization.
In my experience, it has been very hard to get that many columns when you are normalizing properly. Apply the rules of normalization to the wide table / class and I think you will end up with fewer columns per entity.
share|improve this answer
add comment
Unless your code actually uses many of the attributes at many places, I'd go for a dictionary instead.
Having real properties has its advantages(type-safety, discoverability/intellisense, refactorability) but these don't matter if all the code does is gets these from elsewhere, displays on UI, sends in a web-service, saves to a file etc.
share|improve this answer
@zvolkov - around 90% of the attributes are editable by the processors and is used throughout the UI. – Metro Smurf Oct 27 '09 at 19:59
@Metro, that's irrelevant. Are they referenced by the code directly (e.g. Invoice.Subtotal)? If not, you can always marshal between dictionary and textboxes for editing purposes. – zvolkov Oct 27 '09 at 20:03
@zvolkov - yes, they are directly referenced by the code. I'm not convinced a dictionary is the direction we want to go here; specifically, we would like to have everything strongly typed. – Metro Smurf Oct 27 '09 at 20:09
But used in what way? This seems very much like a problem for a data driven approach, where rather than have a class you have a definition file that defines all the attributes you support, and metadata about them (like display name). The UI can pull from this dictionary an attribute to edit, from which it can get a display name, and a means to get the current value and to set new updated/new values. – Kendall Helmstetter Gelner Oct 27 '09 at 20:10
I think also, in general you are way too hung up on the static typing. If you want the ultimate in typing it involves, well, a lot of typing - as in 100 attributes defined in a class. For things like this a more flexible middle ground where you get some type checking at points but not 100%, is going to be so much easier to work with that the gains over any type mismatch issues will be huge. – Kendall Helmstetter Gelner Oct 27 '09 at 20:14
show 3 more comments
It's considered bad O-O style, but if all you're doing is populating an object with properties to pass them onward for processing, and the processing only reads the properties (presumably to create some other object or database updates), them perhaps a simple POD object is what you need, having all public members, a default constructor, and no other member methods. You can thus treat is as a container of properties instead of a full-blown object.
share|improve this answer
I agree, it may not be good O-O, but it's a better solution than a dictionary for this situation. – Ash Oct 28 '09 at 1:19
@Loadmaster - some of the properties are initially populated. They are then updated as needed and stored until ready to be sent off to the consuming system. I'm going to update the question with a bit more background (may be later tonight or tomorrow). – Metro Smurf Oct 28 '09 at 1:37
add comment
I used a Dictionary < string,string > for something like this.
it comes with a whole bunch of functions that can process it, it's easy to convert strings to other structures, easy to store, etc.
share|improve this answer
... not statically typed, not type-safe in general, non-refactoring-friendly, not idiomatic C#, etc. – Pavel Minaev Oct 27 '09 at 19:55
but it'll definitely get you laid. – Oren Mazor Oct 27 '09 at 19:59
Great you can now apply the Calculate_Sales_Tax method to the Zip code. – James Anderson Oct 28 '09 at 1:34
add comment
You might find some useful ideas in this article about properties by Steve Yegge called the Universal Design Pattern.
share|improve this answer
add comment
You should not be motivated purely by aesthetic considerations.
Per your comments, the object is basically a data transfer object consumed by a legacy system that expects the presence of all the fields.
Unless there is real value in composing this object from parts, what precisely is gained by obscuring its function and purpose?
These would be valid reasons:
1 - You are gathering the information for this object from various systems and the parts are relatively independent. It would make sense to compose the final object in that case based on process considerations.
2 - You have other systems that can consume various sub-sets of the fields of this object. Here reuse is the motivating factor.
3 - There is a very real possibility of a next generation invoicing system based on a more rational design. Here extensibility and evolution of the system are the motivating factor.
If none of these considerations are applicable in your case, then what's the point?
share|improve this answer
@alphazero - I'm not sure I follow. But, to answer: 1=true, 2=possibly, but not now, 3 is unlikely in the coming years. Can you expand on your answer? – Metro Smurf Oct 28 '09 at 1:29
In that case it makes sense to compose the object of parts. You can partition based on scenarios 1 or 2, depending on which is the stronger motivation. – alphazero Oct 28 '09 at 1:43
add comment
It sounds like for the end result you need to produce an invoice object with around 100 properties. Do you have 100 such properties in every case? Maybe you would want a factory, a class that would produce an invoice given a smaller set of parameters. A different factory method could be added for each scenario where the relevant fields of the invoice are relevant.
share|improve this answer
@Frank - In our case we will be consuming most of the properties. The other properties are derived from what we consume. – Metro Smurf Oct 28 '09 at 1:33
add comment
If what you're trying to create is a table gateway for pre-existing 100-column table to this other service, a list or dictionary might be pretty quick way to get started. However if you're taking input from a large form or UI wizard, you're probably going to have to validate the contents before submission to your remote service.
A simple DTO might look like this:
class Form
public $stuff = array();
function add( $key, $value ) {}
A table gateway might be more like:
class Form
function findBySubmitId( $id ) {} // look up my form
function saveRecord() {} // save it for my session
function toBillingInvoice() {} // export it when done
And you could extend that pretty easily depending on if you have variations of the invoice. (Adding a validate() method for each subclass might be appropriate.)
class TPSReport extends Form {
function validate() {}
If you want to separate your DTO from the delivery mechanism, because the delivery mechanism is generic to all your invoices, that could be easy. However you might be in a situation where there is business logic around the success or failure of the invoice. And this is where I'm prolly going off into the weeds. But it's where and OO model can be useful...I'll wage a penny that there will be different invoices and different procedures for different invoices, and if invoice submission barfs, you'll need extra routines :-)
class Form {
function submitToBilling() {}
function reportFailedSubmit() {}
function reportSuccessfulSubmit() {}
class TPSReport extends Form {
function validate() {}
function reportFailedSubmit() { /* oh this goes to AR */ }
Note David Livelys answer: it is a good insight. Often, fields on a form are each their own data structures and have their own validation rules. So you can model composite objects pretty quickly. This would associate each field type with its own validation rules and enforce stricter typing.
If you do have to get further into validation, often business rules are a whole different modelling from the forms or the DTOs that supply them. You could also be faced with logic that is oriented by department and has little to do with the form. Important to keep that out of the validation of the form itself and model submission process(es) separately.
If you are organizing a schema behind these forms, instead of a table with 100 columns, you would probably break down the entries by field identifiers and values, into just a few columns.
table FormSubmissions (
id int
formVer int -- fk of FormVersions
formNum int -- group by form submission
fieldName int -- fk of FormFields
fieldValue text
table FormFields (
id int
fieldName char
table FormVersions (
select s.* f.fieldName from FormSubmissions s
left join FormFields f on s.fieldName = f.id
where formNum = 12345 ;
I would say this is definitely a case where you're going to want to re-factor your way around until you find something comfortable. Hopefully you have some control over things like schema and your object model. (BTW...is that table known a 'normalized'? I've seen variations on that schema, typically organized by data type...good?)
share|improve this answer
add comment
Do you always need all the properties that are returned? Can you use projection with whatever class is consuming the data and only generate the properties you need at the time.
share|improve this answer
sounds a little cryptic? example plz? – zvolkov Oct 27 '09 at 20:35
add comment
You could try LINQ, it will auto-gen properties for you. If all the fields are spread across multiple tables and you could build a view and drag the view over to your designer.
share|improve this answer
add comment
Dictionary ? why not, but not necessarily. I see a C# tag, your language has reflection, good for you. I had a few too large classes like this in my Python code, and reflection helps a lot :
for attName in 'attr1', 'attr2', ..... (10 other attributes):
setattr( self, attName, process_attribute( getattr( self, attName ))
When you want to convert 10 string members from some encoding to UNICODE, some other string members shouldn't be touched, you want to apply some numerical processing to other members... convert types... a for loop beats copy-pasting lots of code anytime for cleanliness.
share|improve this answer
add comment
If an entity has a hundred unique attributes than a single class with a hundred properties is the correct thing to do.
It may be possible to split things like addresses into a sub class, but this is because an address is really an entity in itself and easily recognised as such.
A textbook (i.e. oversimplified not usable in the real world) invoice would look like:-
class invoice:
int id;
address shipto_address;
address billing_address;
order_date date;
ship_date date;
line_item invoice_line[999];
class line_item;
int item_no.
int product_id;
amt unit_price;
int qty;
amt item_cost;
So I am surpised you dont have at least an array of line_items in there.
Get used to it! In the business world an entity can easily have hundreds and sometimes thousands of unique attributes.
share|improve this answer
Not to nit-pick as I know the above is an off-the-cuff answer, but using a statically-sized array to hold line items is a bad idea. Better to use List<line_item> in C#. – David Lively Oct 28 '09 at 15:16
add comment
if all else fails, at least split the class to several partial classes to have better readability. it'll also make it easier for the team to work in parallel on different part of this class.
good luck :)
share|improve this answer
add comment
Your Answer
| dclm-gs1-009260000 |
Take the 2-minute tour ×
I was given the task of doing a facelift to our current site. I am moderately well versed in CSS so I am converting the bazillion tags to CSS styles and deleting about 2 times that many that were simply not necessary.
It's all going well until I run into a certain product page that is only a wrapper into which other HTML files are pulled by a server.execute(filename) command. (we're using aspx for the wrapper page.)
There are almost 700 of these pages and they all are cursed with this and that. Past editors with FrontPage that only know how to drag pretty things on the screen.
Anyway, I am wondering if there is a way to use CSS in the wrapper page to override the tag behavior so I can make it something sane that fits with the rest of my pages. I'd even be open to something JavaScript that would remove the tags, but that's my less preferred solution. Thanks!
share|improve this question
add comment
5 Answers
up vote 11 down vote accepted
font[size="2"] {
property: value !important;
The !important after property values is what you're looking for.
share|improve this answer
Very nice, but won't work with IE6 - still (sadly) worth noting. – Pekka 웃 Mar 17 '10 at 20:39
Thanks for the answer I was looking for. I'll have to deal with IE6 swiftly and harshly (I wish). – Deverill Mar 17 '10 at 20:41
This doesn't work for me in IE7. – Pekka 웃 Mar 17 '10 at 20:44
I don't understand why, but I can't get this to work even in IE8. Am I just overlooking something? Anyone been successful? – Pekka 웃 Mar 17 '10 at 20:48
@Pekka Works for me, are you using a doctype? – James Goodwin Mar 17 '10 at 21:09
show 1 more comment
You can use the CSS attribute selector to match your font tag:
font[size="2"] {
font-size: 12px;
font-weight: bold;
share|improve this answer
Won't work with IE6 though. If the client is using font tags on their site this may be an issue. – Pekka 웃 Mar 17 '10 at 20:38
Thanks James. +1 for the answer too. – Deverill Mar 17 '10 at 20:42
add comment
A simple reset would do for this case, e.g.
font {
font-size: 100%;
share|improve this answer
+1 very nice solution (if the OP doesn't need to give the size=2 a specific other size in exchange.) – Pekka 웃 Mar 17 '10 at 20:50
@Pekka but the size attribute will override this. He needs an !important. – Eli Grey Mar 17 '10 at 21:19
@Eli Grey: I beg to differ — pauldwaite.co.uk/test-pages/2465665 – Paul D. Waite Mar 17 '10 at 23:40
Oh, sorry. My mistake. – Eli Grey Mar 18 '10 at 2:11
“if the OP doesn't need to give the size=2 a specific other size in exchange” — Ah yes, this does assume he just wants to get rid of the effect of presentational tags entirely. Personally, I’d edit the pages, 700 isn’t that many. It’d be a bit boring, but a day or two of judicious find-and-replace in a decent text editor, and you could turn a dog’s breakfast into some decent code. – Paul D. Waite Mar 18 '10 at 11:18
add comment
If you can - that means if you can ignore IE6 - use the CSS method Eli Grey and James Goodwin propose.
A cleaner, but more tedious way would be to do a intelligent search+replace changing all <font size='2'> to <span class='size_2'> or something. It would get you rid of the crappy code, and work in all browsers.
share|improve this answer
since we're doing the right thing, that 'size_2' would be better named as something semantic. To say nothing of the closing /font – Adriano Varoli Piazza Mar 17 '10 at 20:45
@Adriano true re the class name. The closing font is why I'm saying "intelligent" search+replace - it would have to be a tool capable of recognizing and replacing tags. Dreamweaver used to have that feature, there are other tools around, too. – Pekka 웃 Mar 17 '10 at 20:47
add comment
Since Internet Explorer ignores the !important rule, you could try a Javascript approach such as the following (uses jQuery) to replace all the FONT elements with SPANs and have the appropriate stylesheets to apply formatting.
var fontFree = $('span');
share|improve this answer
add comment
Your Answer
| dclm-gs1-009270000 |
Take the 2-minute tour ×
paredit binds M-<up> and M-<down>, but I want windmove to own those keybindings. I have paredit-mode set to activate in certain modes only, but windmove is set to run globally. I want windmove to win, but paredit steals those keybindings when it loads.
How can I easily stop paredit from stomping on windmove's keybindings? I have been going into paredit.el and commenting out the lines which set the keybinding, but this is far from ideal (I have to remember to do this every time I update paredit).
More generally, can I load an elisp file while "protecting" certain keybindings from being changed?
share|improve this question
add comment
2 Answers
up vote 11 down vote accepted
You can use eval-after-load to configure paredit's behavior after loading it, as described in its comments:
;;; Customize paredit using `eval-after-load':
;;; (eval-after-load 'paredit
;;; '(progn ...redefine keys, &c....))
So, for example:
(eval-after-load 'paredit
(define-key paredit-mode-map (kbd "<M-up>") nil)
(define-key paredit-mode-map (kbd "<M-down>") nil)))
share|improve this answer
This is a also great general purpose answer - thanks so much. My one contribution is to point out that if also you want to alter a keybinding (rather than remove it), you would put the name of the paredit function where Emerick put the nil above, like I've done for "forward-slurp": (eval-after-load 'paredit '(progn (define-key paredit-mode-map (kbd "<M-right>") 'paredit-forward-slurp-sexp))) – quux00 Aug 17 '12 at 12:57
add comment
This question has been answered before: http://stackoverflow.com/questions/683425/globally-override-key-binding-in-emacs
You create your own minor mode with your preferred keybindings and enable it globally, so that it overrides all other keybindings.
share|improve this answer
add comment
Your Answer
| dclm-gs1-009280000 |
Take the 2-minute tour ×
We need to create a Visio 2010 stencil in code, using the .NET Freamework and C#.
The idea is like this:
We have our app, that is used by the app user, and then we have the workflow designer, which user Visio which is installed on another machine.
So we have two different people and two different machines. Lets say that, for this discussion, the application is an organizational structure app, that its object model comprises of various types, including User, Group, Developer, Administrator etc..
I want to add functionality to the app that would allow the app user to take these types and create a stencil from it, saved in a .vss file which is the format Visio uses for stencils. Then, the Visio user can take this vss file and add it to the document he's working on. The idea behind all this is that the app user can add user types any time, say 'Power User', which makes all this process dynamic.
Now, the machine where the application is installed doesn't have Visio installed, which might be important, i guess, in terms of what assemblies related to visio programming can be referenced from the app.
Can this be achived?
share|improve this question
What is the source of the geometry or image used in the shapes? Does the App User specify this or is it defined somewhere else? If it is defined somewhere else what format is it in? – Pat Leahy Jun 2 '11 at 4:40
add comment
1 Answer
up vote 0 down vote accepted
If you want to create a Visio stencil on a machine where you can't use the Visio API (i.e. where Visio is not installed or in a server scenario) you can create a Visio XML file. If you use the file extension VSX then Visio will treat it as a stencil. Creating shapes in a Visio XML file may be much more complicated than creating shapes using the API because you will have manage many things yourself which Visio normally takes care of such as collection IDs, formula evaluation, connection creation, etc.
This approach assumes the definition of the geometry or image to use the shapes is predefined and accessible from your stencil generation code. If the user creating the stencil needs to specify the geometry then you may need to integrate some drawing tool. Visio may be that tool or you could investigate other drawing tools which can create a file which Visio can read, e.g. SVG.
share|improve this answer
Great info there Pat, thanks a lot. It seems that the xml way is the only way for me to go. I will let you know if I can manage to get it right with that solution. Again thank you very much. – Avi Shilon Jun 2 '11 at 8:02
add comment
Your Answer
| dclm-gs1-009290000 |
Take the 2-minute tour ×
Can anyone tell me where to get the user manual for Patient OS 0.99?
share|improve this question
add comment
1 Answer
up vote 2 down vote accepted
tried their website? Considering its an app with a fairly specific userbase, i'd suspect the devs would be the best qualified to assist.
share|improve this answer
add comment
Your Answer
| dclm-gs1-009300000 |
Take the 2-minute tour ×
Usually, I use the network connections icon on the top bar to connect to VPN.
VPN Connection
The connection is configured properly and it connects well. Configuration screen shot is given below.
enter image description here
As you can see I have selected the 'Connect automatically' option. But this option doesn't help in connecting to VPN automatically upon login.
This is my university VPN and it uses 'Point-to-Point encryption (MPPE)' for authentication enter image description here
I need to connect to the VPN using command line, so that I can write a script and run it at start up, so the connection is automatically established every time I login. This will also help in connecting to VPN when I login from 'init 3' mode. I depend on this VPN connection for my internet access. Please help me with the required commands.
share|improve this question
add comment
1 Answer
up vote 1 down vote accepted
See here the best answer is to use NetworkManager command line interface.
share|improve this answer
great!!! that worked! thanks you so much – WarFox Apr 1 '12 at 14:09
add comment
Your Answer
| dclm-gs1-009310000 |
Take the 2-minute tour ×
I want to remove a folder contents and it's sub-folder contents without removing hidden files in folder and sub-folders. How can i do it by using shell script??
I have tried rm -rf foldername but it is removing entire contents.
share|improve this question
add comment
migrated from stackoverflow.com Nov 14 '12 at 9:06
This question came from our site for professional and enthusiast programmers.
4 Answers
Instead of using -exec or xargs, you can just do:
find folder_name -not -name ".*" -delete
• This removes all files and folders that do not start with . (hidden files/folders)
• This removes folders if and only if they are empty (so it won't remove folders containing hidden files, as required)
share|improve this answer
add comment
That's a tricky one. An outline solution might be:
find foldername -type f ! -name '.*' -exec rm -f {} +
find foldername -type d -depth -exec rmdir {} + 2>/dev/null
The first command removes files with a name not starting with .; the second tries to remove directories. The -depth option means remove sub-directories before removing directories. The + notation is from POSIX 2008 find but works fine on Mac OS X (10.7.5, anyway). The 2>/dev/null sends any 'directory not empty' error messages (and, indeed, all others) to oblivion.
You might run into issues with symlinks, Unix sockets, FIFOs, and other non-files; tweak the first command to suit your requirements. If you use ! for history, you might need to escape that.
share|improve this answer
add comment
by passing an argument -name "*" to the find command will leave by default all the hidden files.so you can use the below command.
find . -name "*"|xargs rm -f
share|improve this answer
The rm -fr means that any directories will be forcibly removed along with all their contents, hidden and non-hidden. Using just rm -f would get rid of files and other non-directories. To remove empty directories, you need rmdir. (Using -name "*" is clever, though.) – Jonathan Leffler Nov 14 '12 at 5:26
add comment
You could use this command:
find foldername/ -type f -not -name '.*' | xargs rm -f
The find command finds all files under foldername/ whose names don't start with a '.' (hidden file), and passes them to xargs, which runs rm -f on them.
share|improve this answer
add comment
Your Answer
| dclm-gs1-009320000 |
Take the 2-minute tour ×
Does anyone know if the new Microsoft Malware solution is better or worse than Spyware Doctor? My gut tells me that Spyware Doctor would be better just because they aren't a jack-of-all-trades like Microsoft is, but Microsoft's knowledge of their own operating system might give them an advantage as well.
This is a rather subjective question, so I'm going to mark this as community wiki.
share|improve this question
Just because something does lots of other things, It does not mean it is bad. – David Pearce Oct 9 '09 at 12:48
add comment
3 Answers
up vote 5 down vote accepted
Windows live one care is EOL, Microsoft Security Essentials is the new product and I personally love it.
I think it is a very good anti virus solution that will serve you well.
Never heard of Spyware Doctor, and just because Microsoft may be a "jack-of-all-trades" doesn't mean they can't release good products.
Link to Microsoft Security Essentials
share|improve this answer
And in this case, MSE is a very good product. – alex Oct 9 '09 at 12:52
MSE is at the point it is hanging with or even out scoring most other AVG solutions, paid or not. – Juice Dec 21 '09 at 12:36
add comment
With AntiVirus products is often benefitial to use one that used by the least amount of people as possible as it reduces the chances that the maleware is written and tested to circumvent your AntiVirus solution.
share|improve this answer
Man that doesn't sound right. – leeand00 Oct 9 '09 at 20:55
add comment
Your Answer
| dclm-gs1-009330000 |
Take the 2-minute tour ×
I recently upgrading to Snow Leopard. I have noticed that some files written by MacPorts are installed with the wrong permission -- they are written with a umask of 0077. I think I have narrowed down the problem:
1. The port command is invoked via sudo.
2. My .bashrc file specifies a umask of 0077.
3. On older versions of OS X (10.5 and below), sudo used the umask of the root user (which was 0022); however, now it uses my umask of 0077.
Is there anyway to have sudo use the old behavior? Right now, it's kind of annoying because I have to use sudo to run simple commands like port installed, port outdated, etc.
(The problem is described in more detail in this MacPorts ticket.)
I discovered the umask option for sudo, and in /etc/sudoers I added the following line:
Defaults umask=0022
However, this did not function as desired, because the real umask used by sudo is the union of the user mask with this default mask.
share|improve this question
add comment
5 Answers
up vote 6 down vote accepted
I ended up adding the following to my .bashrc configuration script:
# Mimic old behavior of `sudo` on OS X Snow Leopard
sudo() {
umask 0022
command sudo "$@"
umask $old
share|improve this answer
add comment
Mac OS X 10.7 (Lion) finally has a version of sudo that supports umask_override. For the record, this works for me:
Defaults umask_override
Defaults umask=0022
share|improve this answer
Can you make this work on a per command basis? I would like to umask 0022 normally, but then invoke umask 0006 in a single circumstance, but the above ignores that. – Michael Sep 15 '13 at 23:59
add comment
how about:
sudo22() {
local UMASK=`umask`;
umask 22;
sudo "$@";
umask $UMASK
share|improve this answer
add comment
With your .bashrc
if [[ $EUID -eq 0 ]]; then
umask 0022
umask 0077
share|improve this answer
Good idea! Unfortunately, a little investigation shows that Snow Leopard's sudo doesn't actually (re-)source .bashrc, but inherits the current setting from the user that invoked sudo. – mipadi Dec 7 '09 at 18:26
You'll have to use the function workaround as listed in the other answer then. – Darren Hall Dec 7 '09 at 22:29
add comment
For the record: the current version of sudo as a new option 'umask_override', which should prevent the umask's from being merged, so you should be able to lower the umask, too. Sadly, Mac OS X 10.6.6 does not seem to sport this version of sudo ...
share|improve this answer
add comment
Your Answer
| dclm-gs1-009340000 |
Export (0) Print
Expand All
38 out of 70 rated this helpful - Rate this topic
SELECT (Transact-SQL)
Retrieves rows from the database and enables the selection of one or many rows or columns from one or many tables in SQL Server 2012. The full syntax of the SELECT statement is complex, but the main clauses can be summarized as:
[ WITH <common_table_expression>]
SELECT select_list [ INTO new_table ]
[ FROM table_source ] [ WHERE search_condition ]
[ GROUP BY group_by_expression ]
[ HAVING search_condition ]
[ ORDER BY order_expression [ ASC | DESC ] ]
The UNION, EXCEPT and INTERSECT operators can be used between queries to combine or compare their results into one result set.
Topic link icon Transact-SQL Syntax Conventions
<SELECT statement> ::=
[ ORDER BY { order_by_expression | column_position [ ASC | DESC ] }
[ ,...n ] ]
[ <FOR Clause>]
<query_expression> ::=
{ <query_specification> | ( <query_expression> ) }
<query_specification> | ( <query_expression> ) [...n ] ]
<query_specification> ::=
< select_list >
[ INTO new_table ]
[ WHERE <search_condition> ]
[ <GROUP BY> ]
[ HAVING < search_condition > ]
Because of the complexity of the SELECT statement, detailed syntax elements and arguments are shown by clause:
The order of the clauses in the SELECT statement is significant. Any one of the optional clauses can be omitted, but when the optional clauses are used, they must appear in the appropriate order.
SELECT statements are permitted in user-defined functions only if the select lists of these statements contain expressions that assign values to variables that are local to the functions.
A four-part name constructed with the OPENDATASOURCE function as the server-name part can be used as a table source wherever a table name can appear in a SELECT statement.
Some syntax restrictions apply to SELECT statements that involve remote tables.
Logical Processing Order of the SELECT statement
The following steps show the logical processing order, or binding order, for a SELECT statement. This order determines when the objects defined in one step are made available to the clauses in subsequent steps. For example, if the query processor can bind to (access) the tables or views defined in the FROM clause, these objects and their columns are made available to all subsequent steps. Conversely, because the SELECT clause is step 8, any column aliases or derived columns defined in that clause cannot be referenced by preceding clauses. However, they can be referenced by subsequent clauses such as the ORDER BY clause. Note that the actual physical execution of the statement is determined by the query processor and the order may vary from this list.
1. FROM
2. ON
3. JOIN
4. WHERE
10. ORDER BY
11. TOP
Selecting data requires SELECT permission on the table or view, which could be inherited from a higher scope such as SELECT permission on the schema or CONTROL permission on the table. Or requires membership in the db_datareader or db_owner fixed database roles, or the sysadmin fixed server role. Creating a new table using SELECT INTO also requires both the CREATE TABLE permission, and the ALTER SCHEMA permission on the schema that owns the new table.
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
Community Additions
© 2014 Microsoft. All rights reserved. | dclm-gs1-009350000 |
Details for this torrent
Eric Clapton Discography, 28 albums
Audio > Music
2.44 GiB (2615328618 Bytes)
2005-07-21 03:13:06 GMT
Info Hash:
Eric Clapton Discography, 28 albums
seeda !!!
Man I'm at 99%...could send it please!!
I'm downloading it even if it takes me all year mmmuuuaahahahhahahahaahhahahahahaha.=)
wtf Downloaded: 3226 times
why isn't anyone seeding???
clapton is a nazi cunt
Why are you such a jerk?
hi, i'm new at this, could anyone explain me whats "seed" and leech"?
Gah, it's not working for me...
thx dude nice torrent !
don't stop the torrent! keep on seeding!!
clapton is a damn god I love him
seeders are people who you are downloading from, the more the better. but then again you can have 40 seeders giving you 1 kb/s, and then the odd 1 that kicks out 100 kb/s
leechers are i think just the ones that take it without uploading it in turn
good torrent man! thank you very much for the upload! very nice clapton collection :-)
does this include his time with cream, canned heat, etc? or is it just his solo stuff?
Thanks! :)
Thankz :o)
thanks for the torrent bud.. but guys pleeeeeeeeeeese seed...
@belanick: its all fairly simple read this
This is one great torrent, thanks for the upload. However, it's sadly missing a couple of albums. "Layla and other Assorted Love Songs" a MUST, and Clapton Unplugged.
There are way to many files missing in this torrent. So I guess it is determied that you are a jerk and have no f'ing idea what the hell you are doing. Take care.
Could someone please make a list of what's actually included?
Thanks so much!!! I haven't downloaded the whole thing yet. Though if it doesn't include Layla and other Love Songs - as Poe6661 mentions - then that's a MUST. Just look for it elsewhere ppl, I downloaded a good copy of it recently. Can't wait to start listening to all of these albums! :)
thanx :D
great job, thanks! Long live filesharing!
Thank You Very Much :)
SEEEEEEEEEEDDDDDDD!!!!!!!! 2.4k is bullshit... :(
@belanick: seeders are those that have the whole file and are sharing it with all, leechers and those that do not have the whole file and are downloading it from the seeders. When the leacher gets the whole file, they become seeders as long as they dont stop the download. Then they just become greedy assholes | dclm-gs1-009360000 |
Magpahatid Filipino
maghanap ng salita, tulad ng fuck:
The sleepy feeling you experience after eating a meal.
'I just ate lunch and now i have eat sleeps'
ayon kay urbandictionary20009 ika-12 ng Mayo, 2009
0 0
Words related to Eat Sleeps:
ate bed breakfast dinner eat eating food lunch sleep sleeping | dclm-gs1-009370000 |
Takip et Turkish
sözcük ara, mesela hipster:
Someone who spends their time looking for hookups, never committed to one man. aka: a slut.
J: DAMMMNNMN I just hooked up with gabby! so hot!
H: So did I...
L: Shit, man. Me too.
H: She's the definitie Hookup Queen
LOVEDOCTORRRRRRRRR tarafından 30 Mayıs 2011, Pazartesi
1 2 | dclm-gs1-009390000 |
Football - Griffith re-joins Vale
Leyton Orient midfielder Anthony Griffith has rejoined Port Vale on loan until the end of the season.
Griffith, who left Vale to join Russell Slade's side last summer, could make his second debut for the club against Bradford on Tuesday.
The 26-year-old made over 160 appearances during a four-year spell with Vale after joining from Doncaster in 2008.
"Griff's battling qualities are an asset to any squad and he will be no stranger to Vale fans as a former player of the year," Vale manager Micky Adams told the club's official website.
"He knows the club and he knows the majority of the players which will help him to settle in quickly and hit the ground running." | dclm-gs1-009410000 |
Pizza (game)
From Uncyclopedia, the content-free encyclopedia
Revision as of 14:12, July 20, 2011 by Mhaille (talk | contribs)
Jump to: navigation, search
Currentcvg This article or section contains information about an unreleased video game.
The content may change dramatically and theatrically as more misinformation becomes available. In the meantime, please add baseless speculation and nonsense to this article.
Developer(s) TBA
Release date(s) May 16, 2015
Genre(s) Nun murder
Mode(s) A la mode
Version New
Distributor Vending machine
Engine Steam
Pizza is a video game scheduled to be released in 2015 for the xBox. The game's developers have described the project as "virtual, virtual, and virtual, but nonetheless virtual", trying to keep the game as new as possible while maintaining mortui vivos docent design.
The game centers around a main protagonist, an everyday pizza delivery boy. Unbeknownest to his employers, family, friends, and eHarmony profile, he secretly keeps a red-hot rage hidden just beneath his fragile surface. Finally, his murderous personality bursts through when his girlfriend breaks up with him and he leaves his job behind to devote his life to terrorizing the masses.
Pizza Guy, holding a pizza bomb mere frames before bloody explosion.
Most of the play of the game revolves around the main character, known only as Pizza Guy. His weapons are mostly pizza-related, ranging from the typical pizza cutter to the cleverly developed extra-cheese gooey pizza bomb to the twirling dough of death. His ultimate move is arriving an hour late to deliver pizza, which will annoy any enemy to an explosive extreme.
Using a revolutionary new game input system, players will be able to kill using any of Pizza Guy's 9,508 moves. Thanks to teknowlogies™, the player can jab a knife into one man's heart while simultaneously ripping another foe's fingernails out and kicking a third in the nadgers.
Technical bits
The sheer amount of blood involved in Pizza required several months to develop a rendering system for. To accurately depict the sight of blood in all possible situations, game designers went out on what they called an "educational murdering spree".
They captured every trickle, gush, and drop on film, and were caught and sentenced to the death penalty soon afterwards. These martyrs for the realm of game design supplied priceless information for the designers that came after.
Much attention was paid to detail. "We wouldn't rest," said one graphics artist, "until every last piece of pepperoni was in place, every crumb of crust was rendered, and every slice was coated in sauce." According to rumor, in some screenshots of the game, a CGI camera can be seen reflected in Pizza Guy's eyes. According to some other people, everything in the game is animated realistically, down to the vein pulsating in Guy's forehead.
Burned Pizza
An example of the less disturbing carnage found in Pizza. Here, an ordinary pie was burned as a result of Guy's psychotic personality.
Parents have been in an uproar for a good while now, some of which has been directed towards Pizza. Most criticisms focus on how unrealistic the game is and how it gives little tykes the wrong idea of the world.
"Our children are growing up in a world filled with terrorists, suicide bombers, rapists and murderers," says one concerned mother. "You'd think if anything should reflect that, it would be video games. The amount of blood and gore in this Pizza game is appalling. There's no need to sugar-coat life for the young. My kids are growing up, thinking the world is filled with purple singing dinosaurs and things with antennae on their heads. If you're going to make a video game, at least make it realistic. I demand more violence to prepare the next generation of world leaders!"
Protesters got their demand when hundreds pro-violence activists rallied in front of a game studio. The entirety of the crowd was nuked in the single most efficient example of crowd control in history.
Effect on pizza industry
Advertising for Pizza, according to statistics, has caused an increase in pizza-related blogs. Some have attempted to link the game with an increase in the popularity of pizza, but discovered that pizza's popularity is always equal to one.
Goals of the game
A miracle of modern gaming, Pizza will revolutionize the gaming industry and disturb little children forever. Technology has never gone so far to produce such quality entertainment for the whole family.
"We took an ordinary, everyday object, and turned it into a massive, deadly weapon," said one developer. "We're quite proud of that. Our goal is, when you're finished with Pizza — that is, when you've collected all the weapons, finished all the levels, gotten all the skill points, hacked into the secret areas, and used all the codes, that's about two years of your life right there — you'll never look at a pie with pepperoni the same way again."
Pizza has made great leaps and bounds in gameplay, rendering, and even anti-piracy. When attempting to illegally download an alpha version of the game, a virus infects the computer and continually makes calls to pizza places around the globe, charging you for every order and phone call.
"Gaming is the future," the head of the project was quoted as saying. "Hell, with the millions being poured into making this game, it's not like there'll be money left for anything else."
Nintendo could not be reached for comment, but they could be heard kicking the door in frustration.You know who else liked pizza... HITLER!!!
Personal tools | dclm-gs1-009420000 |
From Uncyclopedia, the content-free encyclopedia
(Difference between revisions)
Jump to: navigation, search
(+Lowercase title)
Line 1: Line 1:
{{lowercase title}}{{dictionary}}
== V ==
{{#ifexist: {{PAGENAME}}|{{uncyclopediapar|V}}}}
=== Vacuum ===
The cold dark [[nothing|void]] within the minds of many youths.
Vacuums can be cleaned with a so-called [[vacuum|vacuum cleaner]].
# A duplicate letter of B.
# A man in a mask.
A person who falls in love with their vacuum cleaner instead of going out and finding a real partner who doesn't suck so hard.
=== Van Gogh, Vincent ===
Originator of Do It Yourself cosmetic surgery.
=== Vanilla ice cream ===
The stuff that holds [[Vanilla Ice]]'s fashionable hair together. A principal ingredient in the manufacture of [[bukkake]].
See also:
* Lactose Intolerant
* Raptose Intolerant
=== Vanna White ===
Ancient Celtic Goddess of Rotating Numbers and Letters With a Nice Firm Ass. Wife, daughter, and aunt of Zeus. Aunt of Hera.
=== VB ===
Australian beer made by the mexicans down south
=== Vector field ===
A really cool thing scientists use to travel through time and have adventures which wreck havoc on the time stream. Some have claimed this is harmful, and tried to stop the scientists, only to never have existed the previous day.
=== Vegetable ===
A table propped up with beermats.
=== Vegetarianism ===
1. ''Dangerous'' belief system where one replaces eating pleasure with '''self-righteousness''' by equal measure. Now known to be a significant cause of ''global warming'' due to large quantity of uneaten '''methane''' producing animals.
2. Lakota Sioux word for poor hunter.
=== Velociraptor ===
Prehistoric reptile brought back from extinction via various ways. Very useful for killing off unneeded characters. Also fun to watch characters run away in terror.
=== Velocity ===
A town monopolised by cyclists.
=== Veni, Vidi, Vapulavi ===
Famous quote by some guy. It translates from Latin as "I came, I saw, I took a beating".
=== Veni, vidi, vici ===
One of history's most frequently mistranslated quotations, properly translated, it means "I came, I saw, I ate pie."
=== Veritable ===
Like a table, but extremely so.
=== Vermicello ===
A large musical instrument made out of rats.
=== Vermilion ===
In maths: <math>10x10x10x10x10x10 rats = pissed off people</math>
=== Vernacular ===
Dracula's brother Vernon.
=== Versatile ===
To place ceramic squares on a wall, shiny side down.
=== Vertebra ===
1. Green lingerie.
2. A bra with backbone.
=== Vicar ===
A Vicar is a small rodent native to the Hawaiian Islands notable for it long, stringy purple fur and its obscene devotion to deflowering altar boys. Discovered in 1988 by [[Jesus H. Christ]] during one of his longer drunks, the creature has been hunted to the brink of extinction. Prized for its sweet, sweet flesh and aphrodisiac qualities, the price of the average vicar has risen to almost two dollars a pound.
Can also be the colloquialism for a Jewish Rabbi who likes to jog in tacky velvet jump suits.
=== Victor ===
A Russian regal term meaning "''Consumer of Produce''", the word "[[Victor]]" has been secretly taken by many famous individuals throughout human history such as Battle-Pope [[Palpatine]] Victor the II. Perhaps most famous of those that have taken the name Victor is the recently-crowned King of [[South Africa]], who wears a necklace of red pearls and hails from the southeastern portion of Mars.
=== Vice president ===
Fulfils a unique role in the government: in charge of perversions, lewd acts, debauchery and smoking. His/her job consists of ensuring compliance with federal quotas on minimum acceptable amounts of debauchery in mainstream culture.
=== Viet Kong ===
Viet Kong - One of the most feared, yet lesser known creatures on the earth. His older brother, [[King Kong]], certainly stole the spotlight for the Kong family, and despite Viet's 7 attempts to wreak havoc in major cities, he always seemed to miss. His latest attempt, in 1954, was to attack [[Jamaica]], but when he got off the plane, he realized he was in [[Jamaica]], Queens. Viet has settled in Northern [[Antarctica]] with Abdominal Snowman, often confused with the [[Abominable Snowman]].
He last contacted news agencies through [[Oscar Wilde]] in 1974, who released the following statement:
"Viet Kong has realized that the path his brother [[King]] took was not for him. Monsters have different callings, and his is to live in a non-existent place with a ridiculously named abdominal abomination."
Not to be confused with his younger brother Donkey Kong.
=== Villa ===
A large house. The English word ''villa'' comes from the Spanish word for small town, a misunderstanding stemming from the fact that a small town in Mexico is the same size as a large house in America.
=== Vin Diesel ===
A very low grade fuel that over musculates the engine and will lead to a break down in about 30 minutes. Contains wine.
=== Virgin Mary ===
Mentioned in the Bible a couple of times. More interestingly, however, is that you have a scientifically proven 1 in 375 chance of seeing her on burnt toast. Many millionaires have frequently burnt their own bread, simply so they can sell the portrait of the holy mother for large sums of money.
Other proven probabilities of sighting:
* Window condensation: 1 in 1942
* Distorted window reflections: 1 in 1492
* Water stains: 1 in 935
* Grilled cheese: 1 in 666
* Tortillas: 1 in 42
* Clouds: varies from 1:1 and upward directly dependent on the observers I.Q.
=== Vittu ===
Vittu is a blessing word in the [[Finnish language]]. It is said to bring good luck to those who use it. When any of its variants are used in a sentence, people have observed mysterious increases in luck. One example is the case of Samuli Virkkunen in, who, after being fired by his boss in [[1999]], used it as an adjective referring to him and left. When he got to his car to drive home, it would never start. He got angry about this, but he would later realize the effect of his use of "vittu:" He avoided getting into the turku Inferno, the worst car accident in Finnish history, which occurred when a [[gasoline|petrol]] truck fell off an overpass and exploded on the highway. To this day, he always uses a variant of "vittu" whenever he wants luck to turn in his favour.
It is also believed that the use of more than one variant of the word can bring even more luck. In fact, it is said that if you utter the sentence, "''Vitun vittu, vituttaa vittumaisen vitusti''" with just the right tone, you will be blessed with eternal good luck.
Unfortunately, the use of the English equivalent, "cunt," has exactly the opposite effect. Especially in run-down American neighbourhoods.
=== Voledemort ===
Commom Misspelling of Vole DeMort the origin being that of Vole (small furry animal) De (of) & Mort (death).
=== Vuja De ===
The Feeling You've Never Been Here.
Latest revision as of 06:03, November 13, 2011
edit English
For those obsessed with experts, Uncyclopedia has an article about: V.
edit Letter
1. A duplicate letter of B.
2. A man in a mask.
Personal tools | dclm-gs1-009430000 |
The Pittsburgh Promise is essentially three promises in one. We promise the following to those who live in the City of Pittsburgh and attend Pittsburgh Public Schools:
1. We will provide you with up to $40,000 as a scholarship to pursue higher education.
2. We will reform our urban public schools so that we are preparing you well for success in higher education.
3. We will develop our urban neighborhoods so that where you live and go to school is a place that is conducive to learning.
Video by: Demetrius and Christina Wren
Loading more stuff…
Loading videos… | dclm-gs1-009440000 |
Sydney & Tokyo
User Stats
Profile Images
User Bio
Sound is a vital part of any creative media project. It is something that takes you to the next level, an extra layer of sensory involvement that increases immersion and encourages empathy.
This is our philosophy at Outerspacial. We believe that sound plays a vital role in any creative project, and has equal importance when compared to visuals in terms of enhancing an audience's experience and immersion. It is this thought process that drives our passion to create highly effective and engaging audio solutions for our clients. From video game sound tracks to television spots, film scores and events we pride ourselves on both our breadth of musical ability and production skills which give us the freedom to express inspirational emotions with skill and flair.
External Links
1. Londonmark Films
2. Genki Ito
3. Andy Martin
4. Tangible Interaction
5. Nicolas Loeillot | dclm-gs1-009450000 |
Freddy Meyer Plus
New York City
User Stats
Profile Images
User Bio
Freddy Meyer has not yet updated their profile :(
1. Aron Campisano
2. Michael Karman
3. Jerry Colpitts
Recently Uploaded
+ See all 6 videos
Recent Activity
1. Must have been shot Arri! beautiful colors, great cinematography,edit and music congrats! | dclm-gs1-009460000 |
John Hughes PRO
User Stats
Profile Images
User Bio
John Hughes has not yet updated their profile :(
1. William Head
2. darcy gladwin
3. Erica Brenci
4. Amalthea Films
5. Dennis Proctor
6. Dropbear
Recently Uploaded
John Hughes does not have any videos yet.
Recent Activity
1. Lovely work Sam , thanks for the link, JH | dclm-gs1-009470000 |
or Login to see your representatives.
Public Statements
Rep. Pitts Criticizes Amish "Reality" Show on House Floor
Location: Washington, DC
Rep. Pitts Criticizes Amish "Reality" Show on House Floor
Washington-Congressman Joe Pitts (R, PA-16) today took to the House floor to make the following statement about UPN's planned Amish reality television show, "Amish in the City."
"UPN is making a reality show about the Amish. Make no mistake - this program is offensive and exploitative. The very act of making this show violates a fundamental Amish religious tenet. And asking Amish youth to participate requires them to break it.
"You see, the Amish believe that television itself violates the 10 Commandments ban on graven images. If you're selling a show based on its participants' religious identity, shouldn't you at least respect the religious beliefs of those participants and their families?
"One affiliate in Pennsylvania -UPN15 in Harrisburg - has already decided not to air the program until it previews its content. UPN15 has taken a principled and courageous stand. Its request to prescreen the show will help them ensure that the show's content does not offend its viewers beyond its already questionable premise.
"Other affiliates should follow suit. And advertisers should think twice before attaching their names to a show that offends and potentially degrades a religious community.
"This series would affect more than 20,000 of my Amish constituents and thousands of others around the nation, and may inaccurately portray their beliefs and customs."
Back to top | dclm-gs1-009480000 |
or Login to see your representatives.
Public Statements
DelBene Statement on House Budget Vote
Location: Washington, DC
Congresswoman Suzan DelBene released the following statement regarding today's vote on the House Republican budget:
"Families and businesses in Washington state want bipartisan, responsible solutions to our nation's fiscal issues that will reduce the deficit and grow our economy.
"My priorities in Congress are to strengthen the middle class, create jobs and build the foundation for long term economic growth.
"Unfortunately, the budget passed by the House today is an uncompromising proposal that will cost us jobs, hurt families, children, our most vulnerable, seniors and threatens to derail our fragile economic recovery.
"This budget cuts deeply into education, infrastructure, research and public safety. These are damaging cuts that will cost us jobs and weaken our country's ability to innovate and compete in a global economy.
"The House budget again includes a failed plan to turn Medicare into a voucher program that will essentially end the program as we know it today - dismantling what has been a pillar of the health and economic security for hundreds of millions of our seniors. Under this plan, nearly 57,000 Washington seniors would see their prescription drug costs go up next year while more than 760,000 seniors would start being charged for preventative care like physicals and cancer screenings.
"Cutting programs that the middle class, veterans and low-income families depend on is the wrong approach. Reducing access to a college education by doubling student loan interest rates and cutting funds for Pell Grants is no way to expand economic opportunity. We should not be shredding our social safety net by leaving millions without health care coverage, rolling back job training programs and food programs for needy families and children.
"What's more, this budget includes an irresponsible plan to change the tax code in a way that will either lead to deficit-ballooning tax cuts for high-income households or increased taxes on poor and middle-class families.
"I cannot support such an extreme approach that would hurt so many working families, businesses and weakens our economy. Instead, I voted to support Senator Patty Murray's alternative budget that serves as a good starting point, focusing on our core priorities: creating jobs, growing the economy, strengthening the middle class and responsibly reducing the deficit.
"It's time for both sides of the aisle to set aside their ideological agendas, be open to compromise and come together in a bipartisan effort to find a balanced approach to the budget."
Back to top | dclm-gs1-009490000 |
By: Lindsey Graham
Date: April 25, 2013
Location: Unknown
COOPER: We're joined on the phone by Senator Lindsey Graham -- actually by remote. Senator Graham, thanks for joining us. First of all, your comments on the -- where Chuck Hagel has said that the Syrian regime has used sarin gas.
SEN. LINDSEY GRAHAM, (R) SOUTH CAROLINA REPRESENTATIVE: Yes, I was one of the senators on the letter where Senator McCain AI'd. I think 11 --several of us. Well, it's a red line that has been crossed. It's clearly an indication and admission by the administration that sarin gas was used by the Assad regime and the president said that would be a red line. So, the question is what's next?
COOPER: What do you think should happen next?
GRAHAM: I think the international community should rally around helping the rebels by having a no-fly zone some place they can operate safely. Arm the appropriate groups within the rebel forces and there are some radical jihadists unfortunately, every day this goes it gets worse. But, it really put pressure on the Russians to get Assad out. And, the day after he leaves, the number one goal for me is to secure the chemical weapons. There are enough chemical weapons in Syria to kill thousands if not millions of people. So, I hope the Syrian opposition council to agree -- to work with us, the international community, to secure those chemical weapons sites and destroy them.
COOPER: In your mind does that include or preclude the idea of U.S. Boots on the ground to secure those chemical weapons sites? Because all the experts I've heard from say it's not just something you can do from the air.
GRAHAM: Right. OK. No boots on the ground to provide support for the rebels. It's my belief if you could neutralize the Syrian Air Force and their tanks that this would be over pretty quickly. You ground the planes and you start shooting a few of the tanks, I think this thing ends pretty quickly.
In terms of securing the chemical weapons, this should be a regional effort, international community effort. I don't care if the Russians were involved. But, to secure these sites, the Syrian opposition doesn't have the ability to do it. I wouldn't mind if there's a U.S. component, but it's got to be internationally led.
COOPER: I want to talk about the Boston bombing investigation. You've made headlines today by laying blame for the terror attack on the Obama administration. Will you explain that?
GRAHAM: Yes. I think it's system failure. They asked me, you know, if the system fails who do you blame, well, you blame people in charge of the system. President Obama deserved great credit for the Bin Laden raid. That was a gutsy call, a flawless operation. Bush did some things right. He did some things wrong.
Here's what we know about Boston. The Federal -- excuse me -- The Russian intelligence services contacted the FBI and the CIA saying you've got a radical Islamist in your midst. We put him in some kind of system. When he leaves to go to Russia and Dagestan, the department of homeland security picks up his leaving and returning, but they don't share it with the FBI and the CIA. That's a system failure.
And, after he comes back in 2012, he goes on youtube and the internet declaring his hatred for our country threatening to kill us all and the rest is history. So, yes, I think the system did fail.
COOPER: What do you say -- I mean do you feel you know all there is to know at this point about --
COOPER: -- About any failure?
GRAHAM: No, I don't. I know this. I know that when he goes to Russia and that the department of homeland security picks up him leaving and the FBI and CIA are not informed 11 years after 9/11, that's a mistake. That's a big mistake. And, when he comes back from Dagestan and he goes on the internet, youtube and other public outlets and starts talking in a radical fashion and we can't pick that up in light of all the warnings we've had, I know that's failure.
And, I think there's just -- Bin Laden may be dead, Anderson, and I'm glad he is, but radical Islam is not. And in our own backyard the threat is growing. And, I think quite frankly the administration is oversold with the demise of Bin Laden and knockoff jihadist is probably not the right term to use. I think it's quite frankly minimizing the threat we face. So, between Benghazi and Boston to me, we're going backwards, not forward in terms of national security.
COOPER: Your comments, for the first time a public official has laid this at the foot of the Obama administration. No doubt your critics are going to saying you are politicising this, to them you say what?
GRAHAM: Well, when Bush screwed up, I said, "I think you're screwing up about Iraq, Mr. President." And, when your interrogation policy has led to abrogate, I said, "Mr. President, this is not who we are. I am now saying to my fellow citizens 11 years after 9/11, clearly our system is not working. I don't mind giving credit and support to this administration or any republican administration. I sure don't mind appropriate criticism.
The FBI and CIA are very brave people, great organizations. But, how can you say given the facts, 11 years after 9/11 the system is working the way it should and at the end of the day the administration in charge deserves the credit when it works and the blame when it fails. And, the goal is not to blame them exclusively, but to fix it. And, I hope we will. This will be a wakeup call when we fix it.
COOPER: What do you see the best way to fix it? Do you see a role for our congress and the senate to have hearings? --
COOPER: -- Investigations on what went wrong?
GRAHAM: Yes. And, you can put some blame on us. Sequestration putting our agencies under pressure by budget cuts not being able to, you know, solve any big problem in congress. Yes, I'd like to do a joint investigation unlike Benghazi. You've got the FBI needs to be looked at, the CIA and the Department of Homeland Security and maybe more.
But, combine our resources and do a post mortem on this. The actual investigation itself hats off to the Boston police to the FBI. But, here's another question. After the bomb went off, what one question you would ask is there anybody in the Boston area we've interviewed that would be a -- would fit the signature of doing something like this? And, one way to have that is photo for the whole world to see, how did that not ping the system? How did we not match the photo with the prior contacts we had with this individual?
It's hard to be on a watch list if you don't -- if you're not capturing a photo. Surely the guy -- we had a photo of the guy, and I don't know why that didn't register. So, there's a lot to learn from this.
COOPER: No doubt about that a lot to learn. Senator Lindsey Graham, appreciate your time today. Thank you.
GRAHAM: Indeed. | dclm-gs1-009500000 |
From Eclipsepedia
< Scout | Tutorial | 3.8 | Minicrm
Revision as of 10:35, 5 November 2012 by (Talk | contribs)
Jump to: navigation, search
Wiki Home
Scout Tutorial
Permissions are created for you in the background by the SDK as you build your application, but they don't seem to have any effects. That's because by default, you're using the "anonymous" security filter and because you're being granted the "all" permission. This chapter shows you how to change that.
This page is an optional addition to the Minicrm Step-by-Step Tutorial and uses it as a starting point.
What is this chapter about?
This chapter is about authorization and authentication.
When creating forms and table pages, the wizards have always created Permission classes in the background:
• CreateCompanyPermission
• ReadCompanyPermission
• UpdateCompanyPermission
• DeleteCompanyPermission (actually, you will have to create this permission yourself if you implement a delete menu)
We want to create an Administration View where Users get assigned Roles. These Roles have have Permissions. When a user logs in, the appropriate Permissions are loaded.
For this to work, users must be authenticated. We'll add a SecurityFilter to handle this.
This chapter assumes that you're pretty proficient at creating tables, forms and services. No more hand-holding. :)
The Apache Derby example database already contains the following tables:
The PERSON table has a USERNAME column.
Let us create two roles before we get started:
INSERT INTO minicrm.ROLE (role_nr, name) VALUES (1, 'Administrator');
INSERT INTO minicrm.ROLE (role_nr, name) VALUES (2, 'Standard');
If you want to take a look at the database using a command line tool, check this section of the tutorial.
Create a new Lookup Call RoleLookupCall.
The RoleLookupService uses this statement:
return "" +
"SELECT ROLE_NR, " +
" NAME " +
"FROM ROLE " +
"WHERE 1=1 " +
"<key> AND ROLE_NR = :key </key> " +
"<text> AND UPPER(NAME) LIKE UPPER(:text||'%') </text> " +
"<all> </all> ";
Person Form
Create a Person Form and a Person Process Service to create and edit persons. Make sure you use the same class names if you want to copy and paste the SQL statements later in this section.
Label Class Name Column Name Type
Name NameField LAST_NAME String
First Name FirstNameField FIRST_NAME
Employer EmployerField COMPANY_NR SmartField (CompanyLookupCall)
Username UsernameField USERNAME String
Roles RolesField USER_ROLE.ROLE_NR ListBox (RoleLookupCall, Grid H 4)
Add a "New Person..." and a "Edit Person..." menu to the PersonTablePage.
protected void execAction() throws ProcessingException {
PersonForm form = new PersonForm();
if (form.isFormStored()) {
public void execAction() throws ProcessingException {
PersonForm form = new PersonForm();
if (form.isFormStored()) {
Process Service
Here are the SQL statements you will need.
SQL.selectInto("" +
"FROM PERSON " +
"INTO :personNr"
, formData);
SQL.insert("" +
"VALUES (:personNr, :name, :firstName, :employer, :username)"
, formData);
SQL.insert("" +
"VALUES (:personNr, :{roles})"
, formData);
SQL.selectInto("" +
" FIRST_NAME, " +
" COMPANY_NR, " +
" USERNAME " +
"FROM PERSON " +
"WHERE PERSON_NR = :personNr " +
"INTO :name, " +
" :firstName, " +
" :employer, " +
" :username"
, formData);"" +
"WHERE USER_NR = :personNr " +
"INTO :roles"
, formData);
SQL.update("" +
" LAST_NAME = :name, " +
" FIRST_NAME = :firstName, " +
" COMPANY_NR = :employer, " +
" USERNAME = :username " +
"WHERE PERSON_NR = :personNr"
, formData);
SQL.delete("" +
"WHERE USER_NR = :personNr "
, formData);
SQL.insert("" +
"VALUES (:personNr, :{roles})"
, formData);
If you're working in a multilingual environment, this is what it might look like:
Administration Outline
Create the following outline on the client side:
Administration Outline
├─Role Table Page
│ │
│ └─Permission Table Page
└─Permissions Table Page
Additional table pages might be useful: which roles use a particular permission? which users have a particular role? These are left as an exercise for the reader.
Invisible Outline?
If you create a new outline in the folder All Outlines you will not see it when you restart the client. You should create a new outline beneath your Desktop instead. The SDK will not only create an outline for you, it will also register it on the Desktop and it will create a button for it.
Permission Table Page and Outline Service
We'll be using this table in two places, thus we need a variable for the role (RoleNr).
If a role is provided, we need a service on the server side to provide these. Create a new outline service (AdministrationOutlineService) with an operation to get all the roles (getPermissionTableData) with a single argument of type Long (roleNr).
public Object[][] getPermissionTableData(Long roleNr) throws ProcessingException {
return"" +
"WHERE ROLE_NR = :roleNr "
, new NVPair("roleNr", roleNr));
If no role is provided, we list all the permissions. These are all available on the client. We don't need service on the server side to fetch them. Thus, on the client side, things look a bit different. Here's execLoadTableData for the newly created PermissionTablePage.
if (getRoleNr() == null) {
ArrayList<String> rows = new ArrayList<String>();
BundleClassDescriptor[] permissions = SERVICES.getService(IPermissionService.class).getAllPermissionClasses();
for (int i = 0; i < permissions.length; i++) {
if (permissions[i].getBundleSymbolicName().contains("minicrm")) {
else {
// Skip bookmark permissions and other permissions that are not specific to our application
Object[][] data = new Object[rows.size()][1];
for (int i = 0; i < rows.size(); i++) {
data[i][0] = rows.get(i);
return data;
else {
return SERVICES.getService(IAdministrationOutlineService.class).getPermissionTableData(getRoleNr());
Don't forget to create a column for your table page!
This is what you'd like to see:
Minicrm Administration Permissions.png
(Using the Swing client because we will have to create additional menus to switch outlines when using SWT.)
Role Table Page and Outline Service
Create a new table page in the administration outline (RoleTablePage) with two columns (non-displayable RoleNr of type Long and a String column called Role).
If you want to change the order of the child tapes, edit the execCreateChildPages method of the AdministrationOutline.
Add a new service operation to the AdministrationOutlineService called getRoleTableData. This one is very simple:
public Object[][] getRoleTableData() throws ProcessingException {
return"" +
"FROM ROLE");
Use it on the execLoadTableData operation of the table page:
return SERVICES.getService(IAdministrationOutlineService.class).getRoleTableData();
Add the PermissionTablePage as a child to the RoleTablePage. Note how the SDK already guessed that you will want to pass the primary of the current row to the child page:
protected IPage execCreateChildPage(ITableRow row) throws ProcessingException {
PermissionTablePage childPage = new PermissionTablePage();
return childPage;
If everything worked as intended, this is how it should look:
Minicrm Administration Roles.png
No data is visible because the permissions haven't been assigned to roles, yet. This will be our next task.
Assigning Permissions to Roles
We will create a menu which calls a tiny form to assign one or more permissions to a role. The form will contain nothing but a smart field with roles.
Let's start with the form.
Create a new form called AssignToRoleForm; do not create am Id (no AssignToRoleNr). On the second page of the wizard, get rid of the ModifyHandler, the ReadAssignToRolePermission and the UpdateAssignToRolePermission.
Add a smart field RoleField using LookupCall RoleLookupCall.
Add a variable of type String called Permission. Now do something which the SDK doesn't do for you: change the type of m_permission from String to String[] and change getPermission and setPermission to match.
Switch to the AssignToRoleProcessService and remove the load and store operations. (You may have to remove them from the interface IAssignToRoleProcessService as well.)
For the moment, there is nothing to do for the prepareCreate operation. For the create operation, use the following statement:
SQL.insert("" +
"VALUES (:role, :{permission})"
, formData);
Switch to the PermissionTablePage and add a menu called AssignToRoleMenu. Have it start the AssignToRoleForm and call the NewHandler. Mark the menu as both a Single Selection Action and a Multi Selection Action. Change the execAction as follows:
protected void execAction() throws ProcessingException {
AssignToRoleForm form = new AssignToRoleForm();
if (form.isFormStored()) {
Ideally, this is what it will look like:
Minicrm Assign To Role.png
Select all the permissions and assign them to the Standard role.
Here's what you should get:
Minicrm Role With Permissions.png
Removing Permissions
Create a new permission called RemoveAssignToRolePermission (in the shared section) with super class BasicPermission.
Create a new operation void remove (Long roleNr, String[] permission) for AssignToRoleProcessService.
public void remove(Long roleNr, String[] permission) throws ProcessingException {
if (!ACCESS.check(new RemoveAssignToRolePermission())) {
throw new VetoException(TEXTS.get("AuthorizationFailed"));
SQL.insert("" +
"WHERE ROLE_NR = :role " +
"AND PERMISSION_NAME = :{permission} "
, new NVPair("roleNr", roleNr)
, new NVPair("permission", permission));
SQL statements and collections: In this particular case, we could have skipped the braces and written AND PERMISSION_NAME = :permission. That's because the framework will detect that :permission refers to something with multiple values and will rewrite the statement by inserting ANY IN (...)! The result will be AND PERMISSION_NAME = ANY ('FooPermission', 'BarPermission').
Create a new RemovePermissionFromRoleMenu for the PermissionTablePage.
protected void execAction() throws ProcessingException {
SERVICES.getService(IAssignToRoleProcessService.class).remove(getRoleNr(), getTable().getPermissionColumn().getSelectedValues());
Make it visible only when permissions below a role are shown using execPrepareAction:
protected void execPrepareAction() throws ProcessingException {
if (getRoleNr() == null) setVisible(false);
Missing Pieces
Things you can add to practice:
1. a form to create, modify and remove roles
2. make sure menus that will result in "permission denied" errors are invisible
3. make table pages invisible that display information you are not allowed to read
Before you continue: make sure the administrator has the username "admin" and the administrator role. Make sure the administrator role has been assigned all permissions. Once we're done here you can lock yourself out of the application. If that happens, you will have to fix the permissions on the database.
Identifying Users
To get an idea of what goes on, find the ServerSession and change execLoadSession as follows:
protected void execLoadSession() throws ProcessingException{
logger.warn("created a new session for "+getUserId());
When you start a new client, you'll see:
!MESSAGE created a new session for anonymous
What user id? This is handled by security filters. Go to the config file of your server product (/ You'll see that the AnonymousSecurityFilter is active. IT provides the user id "anonymous".
Change the config.ini as follows:
### Servlet Filter Runtime Configuration Development\=manager,allen\=allen,blake\=blake
Restart server and client.
You will be greeted with a login box! Provide one of the combinations from the config file. Username admin password manager for example.
The server log will show:
!MESSAGE created a new session for admin
In order to deny access to unknown people, change execLoadSession as follows:
protected void execLoadSession() throws ProcessingException {
SQL.selectInto("" +
"FROM PERSON " +
"WHERE UPPER(USERNAME) = UPPER(:userId) " +
"INTO :personNr ");
if (getPersonNr() == null) {
logger.error("attempted login by " + getUserId());
throw new ProcessingException("Unknown User: " + getUserId(), new SecurityException("access denied"));
}"created a new session for " + getUserId());
Now you can attempt to login with a valid username/password combination and the system will check whether a person actually uses the usernames provided. By default, the three users in the demo database match the usernames in the config file. You need to add more combinations to the config file in order to test it.
Granting Permissions to Users
Find the AccessControlService class and take a look at the execLoadPermissions method:
protected Permissions execLoadPermissions() {
Permissions permissions = new Permissions();
//TODO fill access control service
permissions.add(new AllPermission());
return permissions;
This grants every user all permissions. We need to replace this with something based on database. The following example even has a backdoor for the user with id 1!
protected Permissions execLoadPermissions() {
Permissions permissions = new Permissions();
// calling services is free
// backdoor: the first user may do everything?
if (ServerSession.get().getPersonNr().equals(1L)) {
logger.warn("backdoor used: person nr 1 was granted all permissions");
permissions.add(new AllPermission());
else {
try {
// get simple class names from the databse
StringArrayHolder permission = new StringArrayHolder();
SQL.selectInto("" +
"WHERE R.USER_NR = :personNr " +
"INTO :permission ",
new NVPair("permission", permission));
// create a map from simple class names to qualified class names
for (BundleClassDescriptor descriptor : SERVICES.getService(IPermissionService.class).getAllPermissionClasses()) {
map.put(descriptor.getSimpleClassName(), descriptor.getClassName());
// instantiate the real permissions and assign them
for (String simpleClass : permission.getValue()) {
try {
permissions.add((Permission) Class.forName(map.get(simpleClass)).newInstance());
catch (Exception e) {
logger.error("cannot find permission " + simpleClass + ": " + e.getMessage());
catch (ProcessingException e) {
logger.error("cannot read permissions: " + e.getStackTrace());
return permissions;
If you log in, you'll notice a strange warning on the server console:
... cannot find permission CreateVisitPermission: null
... cannot find permission ReadVisitPermission: null
... cannot find permission UpdateVisitPermission: null
If you investigate the demo database, you'll note data junk in ROLE_PERMISSION and USER_ROLE for the non-existent roles 5 to 13.
If you really want to clean it up:
DELETE FROM minicrm.role_permission WHERE role_nr > 2;
DELETE FROM minicrm.user_role WHERE role_nr > 2;
As permissions are granted when the server is started, you need to restart your client and server in order for any changes to take effect.
In order to change that, you need to clear the cache whenever you make any changes. Add the following statement to all the operations of the AssignToRoleProcessService:
Add the following to the store operation of the PersonProcessService (there is no need to do it for create since there is no cached data to clear).
This will obviate the need to restart the server whenever permissions have changed.
1. make sure the administrator has the administrator role
2. make sure the administrator role has all permissions
3. make sure the administrator has the username "admin"
4. make sure the employee has the standard role
5. make sure the standard role only has the two "read" permissions
6. make sure the employee has the username "blake"
7. restart client and server
8. login as blake/blake
9. you should be unable to create new companies and persons or and unable to edit existing ones
Minicrm Company Not Editable.png | dclm-gs1-009510000 |
Take the 2-minute tour ×
So I've got a list of posts on the right side of a page. I'm trying to make it so that when you're looking at one of the posts the corresponding link (on the right side of the page) is selected (just like when you're on a page, and that menu item in the nav is highlighted). Make sense?
I'm trying to use this "if" statement to add the class "selected-highlight"
<div class="service-highlight-box-sidebar <?php if(single_post_title() == the_title()){ echo ' selected-highlight'; } ?>">
<?php the_title(); ?>
if ( has_post_thumbnail() ) { ?>
the_content(' ');
When I load the page it adds <div class="service-highlight-box-sidebar post_title the_title selected-highlight"> to every one of the post links on the right of the screen. Note: it doesn't actually add "post_title" and "the_title", it'll add the dynamic post title and dynamic link title in their place. The problem is that it's adding them to the class instead of using them in the if statement to determine weather the class should be added.
Should I look for the error in the code snippit above, or could this be a bigger problem with my template, or just a "no no" with wordpress in general?
share|improve this question
add comment
1 Answer
This is because the_title() prints the title. You want get_the_title() to 'get' the title. Similarly single_post_title prints the title (by default). This can be prevented by using the second argument, e,g,: single_post_title('',false)
share|improve this answer
add comment
Your Answer
| dclm-gs1-009520000 |
Australian Broadcasting Corporation
LOCATION: http://www.abc.net.au/7.30/content/2005/s1479021.htm
Broadcast: 10/10/2005
Unions, Opposition vow to fight IR changes
Reporter: Heather Ewart
KERRY O'BRIEN: Welcome to the program. Later - the awful shaking of the subcontinent. Pakistan's pain through the eyes of a front-line aid worker. And - the Bali Nine. On the eve of their trials, the '7.30 Report' has obtained case documents that give insight into the planning and carriage of the alleged heroin caper. But first - "Trust me." That was Prime Minister John Howard's message to workers as he finally unveiled the essence of arguably the biggest shake-up of the industrial relations system since Federation. Mind you - we're yet to see the fine print - the actual laws. As well as further heavily restricting the right to strike, the government's proposed national IR system will unabashedly push workers to reach individual agreements with their bosses rather than collective deals through a union. Those contracts may exclude previous entitlements like penalty rates, smokos, leave loadings and shift overtime loadings. Predictably the Opposition and the unions have pledged to fight the proposals. But the Government's control of the Senate means the biggest threat to its workplace revolution lies in a High Court challenge by the States. Shortly I'll be talking with the Prime Minister, but first this report from Heather Ewart.
NEW GOVERNMENT ADVERTISEMENT: Over the last 10 years, something important has been happening in Australian workplaces. Australian workers and Australian businesses have started to change the way they work.
HEATHER EWART: No more shadow boxing; the Government has finally declared itself, and now the fight is on to capture the hearts and minds of Australian workers.
UNION ADVERTISEMENT: I work really hard, and I haven't done anything wrong. Why are they doing this?
HEATHER EWART: By the time it's over, it will have cost the union movement and Australian taxpayers many tens of millions of dollars. We'll be inundated with ads like these for months and depending on which side you're on, the Government has either gone too far with its industrial relations overhaul or it hasn't gone far enough.
PETER HENDY, AUSTRALIAN CHAMBER OF COMMERCE AND INDUSTRY: We could've moved even further. There's a lot of red tape still in this system, a lot of complexity, but generally speaking it's right on the right track.
GREG COMBET, ACTU SECRETARY: These changes really are un-Australian. This opens the door wide to exploitation of working people.
HEATHER EWART: "Work Choices" is the brand name for the Government's direct attack on union power, which it argues will give workers and employers much greater flexibility and create jobs.
GREG COMBET: I think that is one of the most farcical names given to a policy announcement in Australian political history. There are no choices for working people in this. If the Government was serious about having choices, it would give people a genuine choice between a collective agreement and an individual contract. As it is under these laws, the employers hold all the aces and it is the employer alone who will decide what form of agreement there will be in the workplace.
PETER HENDY: The fact is that I would expect that the largest proportion of agreements in the workplace will, even after these reforms are introduced, will still be collective agreements. You can still make awards, you can still make collective agreements.
HEATHER EWART: But the government is handing employers a clear incentive to place workers on individual contracts. Despite the Prime Minister's promise of safeguards to protect many minimum award conditions like penalty rates and meal breaks, the fact is an employer can still wipe these out by inserting so-called specific provisions in the contracts. A long-running dispute at Boeing near Newcastle has been seized upon by the ACTU as an example of what's happening under existing laws, even before the new reforms come in. In future, the Government will have power to ban industrial action like this if it wants to. For the past 131 days, aircraft maintenance engineers for FA-18s have been on strike, demanding a collective agreement to be negotiated by the Australian Workers Union instead of the workers going it alone. The company has refused.
ADAM BURGOYNE, F18 BOEING ENGINEER: I'm an aircraft maintenance engineer. I've been trained to work on aircraft, to fix the Hornets. I'm not able to negotiate my employment contract with the management of Boeing.
HEATHER EWART: Adam Burgoyne is one of 27 engineers on the picket line with this warning about risks of trading conditions.
ADAM BURGOYNE: Don't sell it out, because you'll never get it back. It's not all about the dollar. It's not all about the hourly rate. It's about harmony in the work force.
HEATHER EWART: Boeing says its executives were all too busy to be interviewed today, but argues a union deal would add significant costs and most of its workers are happy with their contract, so why not the engineers? Under the new legislation, the Government says it will be illegal for an employer to force an existing employee to surrender basic rights like penalty rates and holiday pay in return for extra cash. But workers applying for new jobs won't have that protection. All up, the Government is basically asking us not just to trust it, but also to trust that all employers will do the right thing. If they don't, just go find another job. | dclm-gs1-009530000 |
Skip to navigation | Skip to content
Russian meteor's impact circled Earth, twice
Chelyabinsk meteor
The researchers used data from monitoring stations around the globe to estimate the energy of the Chelyabinsk event (Source: YouTube)
Big boom When a meteor slammed into the atmosphere last February, it produced a powerful shock wave that blasted the city of Chelyabinsk, causing property damage and inflicting over 1500 injuries.
Now, an analysis of data gathered by global detectors using to detect ultra-low frequency acoustic waves, has revealed that the meteor's shock wave travelled all the way around the globe, twice.
The International Monitoring System (IMS) network operated by the Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO) is used to detect infrasound evidence of nuclear tests. That February morning, the network detected the most powerful event it had ever seen.
But this signal wasn't a nuclear weapon, it was a high-speed, 10,000 tonne chunk of space rock carrying out a surprise attack on Russia.
"For the first time since the establishment of the IMS infrasound network, multiple arrivals involving waves that traveled twice round the globe have been clearly identified," writes Alexis Le Pichon, scientist of the Atomic Energy Commission, France, and his team in a paper that has been accepted for publication in the journal Geophysical Research Letters.
Le Pichon's team used data from 20 IMS stations around the globe to estimate the energy of the Chelyabinsk event.
"A preliminary estimate of the explosive energy using empirical period-yield scaling relations gives a value of 460 kilotons of TNT equivalent," they write. This means the Russia meteor delivered an equivalent energy of nearly 30 Hiroshima-sized atomic bombs in the skies over Chelyabinsk.
This IMS estimate confirms that this meteor strike is the largest impact since the 1908 Tunguska event that flattened 80 million trees over an area of 2150 square kilometres. That event, however, is estimated to have delivered 10-15 megatons of TNT equivalent to the atmosphere, generating an immensely powerful shock wave that caused chaos over a wide and, fortunately, sparsely populated area.
The Russian meteor, which was only 17 metres wide, quickly brought attention to the number of small asteroids that are out there, capable of remaining undetected and yet still deliver a shocking punch to a populated region.
Tags: disasters-and-accidents, astronomy-space | dclm-gs1-009540000 |
Mar 13, 2014
Home| Tools| Events| Blogs| Discussions| Sign UpLogin
Know Your Market
RSS By: Dairy Today: Know Your Market, Dairy Today
Popular Tactic: Offset Premiums While Establishing a Milk Price
Jul 02, 2010
By Jon Spainhour, Rice Dairy
Over the course of the past few months, we have discussed two types of risk management tools that dairy producers can use to help manage their output and input prices on their farm.
At first we discussed fixed priced contracts, called futures, which allow for dairy producers to establish a set selling price for their milk or a set buying price for their corn or soymeal. In either case, the ultimate price that the producer will sell his milk at or buy his inputs at will be determined by where he contracted them, regardless of where the spot price is at the contract expiration.
We also discussed contracts, called options, which act more like insurance than fixed price contracts. Producers can buy puts on specific price levels, called the strike price, which will establish insurance against their milk check going below that level. Puts are commonly referred to as floors. They can also buy calls, which is insurance against prices moving up, against their expected soymeal and corn input prices. Calls are commonly referred to as ceilings.
The beauty of options contracts is that they establish minimum prices of milk while still allowing the producer to benefit from upwards price movements. They also establish maximum prices for their input costs while still allowing them to benefit from downwards price movements. In both cases, the producer must pay a premium for their insurance.
So far, we have discussed the issue of options strictly from the perspective of buying insurance. However, in order for you to buy insurance, someone else has to sell it to you.
The person that sells a dairy producer a put/floor is essentially betting that the spot price will not go below the strike level. He is compensated for that risk by the premium that he collects. If the market goes below the strike level, he assumes all the risk below the strike level minus the premium that he collected. If the market settles higher than the strike level, he gets to keep the entire premium that he collected.
Dairy producers often times find the premiums that they have to pay for puts as being too expensive. One tactic they can employ is to sell calls/ceilings and use the premium that they collect to offset the cost of the puts/floors.
In this case, they are establishing a floor, which is the lowest price they will receive for their milk and paying for it by selling a ceiling, which is the highest price that they will receive for their milk.
This type of structure has several different names that you may have heard of at some point: windows, fences or risk reversals. Regardless of what name you use, it is a fairly straightforward structure that establishes a minimum and a maximum milk price.
For example, a dairy producer who wants to set a floor for his September milk production can buy $14.00/cwt. puts for $0.20/cwt. This means that the minimum price that he will receive for his production will be $14.00/cwt. He can offset the cost of the $0.20/cwt. premium by selling $16.00/cwt. calls and collecting $0.20/cwt. Under this structure, the maximum price that he will receive is $16.00/cwt. This means that for a net cost of zero, the producer has set a floor at $14.00/cwt. and a ceiling at $16.00/cwt.
The exact same type of strategy can be employed on the input side of the equation, only the producer can offset the cost of purchasing corn and soymeal calls by selling puts and collecting a premium.
I hope this was helpful, since I know that this can seem like a complicated subject matter. However, when broken down into simple components, I think it paints a more clear picture of a time-tested risk management structure that many dairy producers have been using for years to help manage their profitability.
Log In or Sign Up to comment
Hot Links & Cool Tools
facebook twitter youtube View More>>
The Home Page of Agriculture | dclm-gs1-009550000 |
Miss Carole's Macaroni Soup!
Sing, dance, and move with Carole Stephens. The concert will include songs from her six award-winning albums, such as Sticky Bubble Gum, that are popular with young children. For ages 17.
Fri, 05/11/2012 - 4:00pm - 4:45pm
Due to the popularity of this program, please register each child and adult attending. | dclm-gs1-009560000 |
comments_image Comments
Mitt Romney Wouldn't Know a Free Market If It Bit Him on the Ass
At Bain Capital, Romney used the tax code to redistribute wealth from taxpayers to his investors and partners.
The lion's share of the wealth Mitt Romney accumulated during his years at Bain Capital was extracted not only by laying off workers and raiding their pensions, but by using what conservatives call “big government” to redistribute wealth from taxpayers to Bain's investors and partners.
Bain Capital was not in the business of creating jobs, or even saving companies over the long-term. Its model had a relatively low rate of success; a study by Deutche Bank found that 33 out of 68 major deals cut on Romney's watch lost money for the firm's investors. Its richest deals made up for the flops, however, and Bain's partners were guaranteed hefty fees regardless of how the businesses they “restructured” ultimately performed.
Romney and his partners then exploited a loophole in the tax code that allowed them to pay just 15 percent of their growing fortunes in taxes – a rate less than what many of their companies' employees forked over to Uncle Sam.
“By and large, [government] gets in the way of creating jobs," Romney said during a GOP debate last year. But, as the Los Angeles Times noted, “during his business career Romney made avid use of public-private partnerships, something that many conservatives consider to be 'corporate welfare.'"
On the campaign trail, Romney often touts a successful investment in an Indiana steel company called Steel Dynamics, but he doesn't mention that the firm had taken advantage of “generous tax breaks and other subsidies provided by the state of Indiana and the residents of DeKalb County, where the company's first mill was built.”
But that's a small part of the public largesse Bain enjoyed. Most of the big money the firm brought in during those years was extracted through “leveraged buy-outs,” a reality that Romney doesn't like to talk about on the campaign trail. Instead, he wants to talk about Staples, which was one of a small handful of Bain's venture capital deals. The 89,000 people employed at the office supply chain go a long way toward the campaign's dubious and unsourced claim that Bain “created 100,000 jobs” under Romney's tutelage. But venture capital represented a small share of Romney's deals, and it's important to understand the distinction between venture capital and leveraged buy-outs.
You won't hear much criticism of venture capital deals like Bain's investment in Staples. It's a very basic free-market transaction – investors put money into a company at its early stages in exchange for a share of the company. If the start-up doesn't pan out, the investors lose their stake; if it grows and matures, they make healthy profit, usually when the company goes public or is sold off. In venture capital deals, investors only make a profit when the company that receives their cash does well.
Leveraged buy-outs are a different creature entirely. Leveraged buy-out firms became so closely associated with the most rapacious and unsustainable form of capitalism in the 1980s, that the entire industry rebranded itself as “private equity” to escape the stigma.
Leveraged buy-out artists also deal with risky companies – usually those struggling to stay afloat – but they don't actually take on much risk themselves as they structure the deals so they profit whether the target company becomes healthy and grows or collapses, often under the weight of debt piled onto it by the private equity firm itself.
Here's how the deal works. The leveraged buy-out firm will put down a fraction of the cost of buying an ailing company. The balance of the transaction is borrowed, but the debt goes onto the books of the target company, not the private equity firm – the struggling company basically finances the lion's share of its own sale.
See more stories tagged with: | dclm-gs1-009570000 |
Conversation Between chaosbreaker and PhoenixSara
21 Visitor Messages
Page 1 of 3 1 2 3 LastLast
1. Don't worry about it Phoenix, I hope you got everything straightened out.
2. lol!!!! sorry had to catch up on a few !!!!!!and fix a few complications.
3. Oh yea, I'm way better^^ Thats like way in the past, lol
4. bored lol!!! are you better? last time we talked you just got out of the hospital
5. Lol, hiya Phoenix, whats up, and how are you?...............
6. LOL hey jsut dropped by lol to say *****boo********
7. Yea, i still gotta do my mission for the clan. I woulda done it yesterday but I was in the hospital.
8. nm going on here with me i guess lol just trying to finish up a fan fic is all. aside from that waiting for the others to get on ao.
9. Your welcome, and not much, i sprained my ankle pretty bad but other than that, yea.
10. Arigato for the comment on my picture! Ohio! Chaos! how are you?what did i miss!
Showing Visitor Messages 1 to 10 of 21
Page 1 of 3 1 2 3 LastLast | dclm-gs1-009580000 |
Gender differences in exercise
Obesity levels are at an all-time high among men, women and children in the United States
By Jennifer Wider, MD
The need for good nutrition and regular exercise is paramount for maintaining proper health and for keeping those extra pounds at bay, especially for women. Beginning in her late 20s and 30s, a woman's average body weight climbs steadily each year. This increase usually continues into her 60s. For many women, the weight gain is between one to two pounds per year with some women gaining more, and others less.
A recent study presented at the Ninth Annual AACR Frontiers in Cancer Prevention Research Conference, revealed that women who exercised for at least 150 minutes a week significantly reduced their risk of endometrial cancer, regardless of their body size.
For older women, a dose of moderate, regular exercise may slow the progression of age-related memory loss. A study published in the Proceedings of the National Academy of Sciences, revealed that exercise may even reverse changes in the brain due to the aging process. Other recent studies prove a positive correlation between exercise and a lower risk of colon cancer. Despite the numerous health benefits that accompany exercise, there are some important things women need to keep in mind in order to prevent injury.
According to Alice Chen, MD, a specialist in Physical Medicine and Rehabilitation at Norwalk Hospital in Connecticut, "There are some gender differences in exercise-related injuries. Most of these relate to ligament laxity." Women need to take extra precautions because although, "they feel less sore than men after vigorous exercise, due to hormonal differences, women will have more laxity in their ligaments and therefore potentially more ligament injury at extreme stresses," said Chen.
Pregnant women and women in the postpartum period may have additional health concerns due to fluctuations in hormone levels. "Pregnant women (and postpartum) with their shifting levels of progesterone will have more vulnerability to injury," said Chen. Women are also more likely to experience knee pain than men, especially in the patellar (knee cap) region. This is partially due to their natural laxity and also due to "an (anatomical) difference in the knee angle that puts women's knees at an increased level of stress," explained Chen. The good news is there are specific things women can do to reduce their risk of injury while exercising.
Prior to working out, women should make sure to:
• Stretch. Everyone should warm up before engaging in vigorous exercise.
• Stretching and light aerobic activity to get the heart rate up helps to warm you up and prevent muscle injury.
• Hydration. Many people are chronically operating on a fluid deficit
• and working out and sweating further depletes their fluid reserves. It is vital to stay hydrated before, during, and after exercise and always monitor your fluid levels in order to prevent muscle injury and overheating.
• Adequate caloric intake. Under nutrition can lead to amenorrhea (absence of menstruation) due to hormone disruption. If this persists it can result in bone mass loss (osteoporosis), placing the athlete at risk for potential stress fracture.
Athletes who are consistently undernourished may experience long-term health consequences, such as amenorrhea. According to Chen, "menstruating athletes gain two to four percent bone mass between the ages 20 to 30. But those athletes with amenorrhea will lose two percent bone mass a year. Since women start to lose bone mass in their 40s naturally with menopause, the athlete is vulnerable to a higher lifelong fracture risk."
Exercise is essential for maintaining a healthy body, and taking precautions to ensure safety during exercise is equally important. Stretching, hydration and adequate nutrition will help lower the risk of injury in women.
Wider, J. (2011). Gender Differences in Exercise. Retrieved March 3, 2011 | dclm-gs1-009590000 |
I will say something that might not sit well with everybody.
Do you think that people obsess over lens signatures and bokeh mostly because their photography in general is lacking? Basically substituting technique or lens artifacts for content.
For example, look at how a lot of over 100 year old portrait lenses are used with wet plate and large format. If you look at many old portraits, the sitter is always centered, and the background is out of focus so that the fall-off imperfections of the lens aren't apparent (or minimized) in the photograph. They tried to work around the shortcomings of the lens. But today all that funky stuff at the edge of the lens' image circle is embraced as 'cool' and 'interesting'... Why? Does it really make the photograph better?
I think about this a lot. Please note that I don't consider my own work superior to others in any way, it's just a question that I'm interested in. And I do realize it's mostly a free world, and people are free to do whatever they feel like, and the best part of photography is to have fun! So if it's fun to use these old lenses, or being fascinated with their qualities then I'm absolutely not calling it wrong or anything like that. It's all good to me. But when I look at photographs I really don't care much about those things. I have a couple of lenses that I know well, use often, and don't really wonder much what's on the other side of the fence. | dclm-gs1-009600000 |
I LOVE this thread. It should be called Everything You Always Wanted To Know About Archival Print Washing.
So here's my question...if you tray wash (and I like the idea of the tray with holes), how many prints can you have in the tray? Do prints touching each other stop, reverse, or severly hamper the diffusion/leaching process? Let's say we're talking about 8x10 prints in a 16x20 or 20x24 tray. | dclm-gs1-009610000 |
Thanks Kerry. I get it now. FWIW, in my non-analog capacity I shoot a lot of stitched panoramas so the importance of a level platform is understood.
When I asked earlier about it going under a tripod head, I was alluding to mounting either a panning base or a ball head with an incorporated panning base to the leveling head.
Are the ballheads' balls marked in any way so that the neutral, vertical position can be found quickly? | dclm-gs1-009620000 |
How Much Does a Radio DJ Make?
A radio disc jockey, also simply referred to as a DJ, is a radio personality who is responsible for playing music as well as broadcasting news on the radio. He or she may broadcast live or employ voice-tracking techniques.
2 Additional Answers
A radio DJ or Disc Jockey is also known as a presenter. His main job is to play songs on the radio and also to provide information, chatter and other content, during music breaks. Radio Djs are also individuals who play music for party goers in clubs.
To become a radio DJ, take speech, drama and English courses in high school and college and make tapes of your speaking voice. Find out what equipment you need and work on gaining more experience through practice. Enrol in a school that offers a broadcasting degree as this will have a major advantage within the broadcasting industry. Gain experience at your college radio station by doing jobs teach about radio broadcasting, a station's equipment and the problems associated with airtime.
Q&A Related to "How Much Does a Radio DJ Make?"
To become a radio DJ you need to make a mix tape and send it to different radio shows. If they like your mix they will offer you a test spot on the air.
DJs talk on the radio, yes, but there are other sides to being a radio DJ. DJs don't just work short shifts, like you hear them on the radio. They work 8-hour days (sometimes longer
there are many , but everyone's favorite DJ is chris moyles.'s_dj
1 Get your hard disk loaded with a lot of tracks. And I mean a lot!Especially if you do requests.Listeners will keep asking for songs that you might not have,but try to collect as
Explore this Topic
A Radio DJ can make a much as 250,000 dollars a year. This is for the celebrity Radio DJs. A regular disc jockey can make 60,000 dollars a year. ...
To become a radio DJ, you should take courses through an accredited program. You should have an outgoing personality and be able to think off the top of your head ...
The DJ's on AMP Radio, 97.1 in Los Angeles are: Booker (on from 10 am - 3 pm), ... | dclm-gs1-009630000 |
Wednesday, July 18, 2012 - 9:45am
For more information, visit our Summer Safety Tips!
Add new comment
Richard H
I would mind my own business. Sites like this ignore common sense to incite lawlessness. I have personally, this summer, sat in a car with my 87 year-old mother and her Chihuahua in 99 degree heat with windows rolled down less than that one in the picture (so the dog wouldn't jump out), no engine or AC running, for more than half an hour. Guess what? No one died or even suffered any ill effects. People today are so used to jumping in their air conditioned car they cannot conceive of anything living through sitting in a car for a few minutes without the AC going. So they will believe anyone that tells them an animal could die sitting in a car in 78 degree weather in just a few minutes, all facts and common sense to the contrary. The window in the car in this picture is down at least six inches. Before you encourage peope to vandalize other people's cars, maybe you should get a reality check.
Richard H
My apologies. You did not say explicitly that people should break into other people's cars, therefore you did not incite them to lawlessness. You did set the tone and then allowed every visiter to your site to incite others to break the law. There is a difference, however, and I offer my sincere apologies for my false statement.
Hey, it's great you and your mom and her dog were able to sit in the hot car for so long. Kudos to you. But you had the option to get out of the car anytime you wanted should the temp inside the car get too hot. A pet locked in a car doesn't have that option. Recklessly endangering your pet is as much lawlessness as breaking a window to free a pet in obvious distress. I get your point about inciting people to go nuts, but I think most folks are capable of telling the difference between an animal in distress where breaking a window is reasonable and just doing so because they are mad. And I think picture displayed was simply a picture...I don't think it was meant to be representative of how much a window would be rolled down in a given circumstance.
i want to note that humans produce sweat to cool themselves, dogs don't. so while humans can handle the heat by sweating, dogs cant, they can pant which helps some but they cant sweat to cool themselves so when they get too hot they die. So while you were sweating the dog was probably extremely uncomfortable and could have been close to death.
Joan Lando
You must have a high tolerance to heat, I am a nurse, the elderly many times are always cold, but do not know the dangers of heat, and your dog cannot speak, so one must take responsiblity and care. doing nothing can cost a life.
I would encourage caution in such high temperatures. According to WebMd's Pet Health site, heat exhaustion sets in when the dog's internal temperature reaches 103 degrees. (Reference:
The temperature in the car, in this situation, could have easily surpassed 103 degrees. And while it turned out okay this time, a similar situation in the future may not.
Nancy Wilchenski
I would try to figure out what store the owner was in and have a store employee announce over the speaker that someone has a concern about the dog in vehicle, etc. If that didn't work within a few minutes, I would call the police and animal abuse and tell them the situation. Of course, all these avenues depend on the condition of the animal at the time. Whatever I decided to do, believe me, that animal would not suffer any longer in the vehicle! I would take immediate action, but I don't think I would break a window, it would probably scare the animal to death.
Rhonda Keen
I would call the police and stay there with the dog until the police got there!!
You got to have some common sense if you encounter this situation. As one of the others said, she was in the car as well and no one died. Same happened to my wife when we were in Redding CA with 105 weather. I went into the bank leaving my wife and Terrer Mix Bandit in the car. Some Samaritan started to open the car to get the dog!
On the other hand, pets and children DO suffer sometimes in these situations, up to and including death. I have several times confronted this and remained with the car until the owner returned in case I DID have to intervene. Of course, I was the one lectured about "minding my own business".
Karen Fillinger
I would call the cops then break the window! | dclm-gs1-009640000 |
post #1 of 1
Thread Starter
I'm hoping that someone can help me confirm that I'm not crazy....
Here's an oversimplification of my setup:
Onkyo TX-NR807 7.1 channel receiver
WD Live Plus HD Media Player
HP Pavillion Laptop w/Blu-ray drive
All connected to receiver with quality HDMI cables
Now- I have watched hundreds of movies, both Blu-ray and DVD, 7.1 and 5.1 DTS mixes and they all sound great. I have setup both my WD Live Plus and my HP laptop to pass non-decoded audio on to the Onkyo receiver to be decoded. But I recently purchased Yanni: Voices on DVD which has both 2.0 and DTS 5.1 audio. The 2.0 audio works fine (naturally), but when I switch to 5.1, all the sound is heavily biased to the left-rear channel. There is still sound coming out of the other channels, but it's sounds more like a surround channel. All the vocals are coming from the left rear- not at all what you would expect. Any other DVD, Blu-ray, etc. works fine and sounds great.
Hoping that there is another A/V buff out there that owns this DVD and can confirm that it's the DVD recording that is the issue and not some strange ghost inside my system..... | dclm-gs1-009650000 |
Sneaking 'Gnomeo & Juliet'
Bill Desowitz reports back from Toronto and London with an exclusive preview of the first animated feature from Elton John's Rocket Pictures.
Check out the Gnomeo & Juliet trailer at AWNtv!
The high-art of Shakespeare meets the low-art of the garden gnome. All images courtesy of Touchstone Pictures.
If Despicable Me was the surprise success of 2010 with its unique hybrid production and aesthetic model, then Gnomeo & Juliet just might pull off another "best of both worlds" success story when it opens Feb. 11, 2011.
The engaging mash-up of Shakespeare, tacky garden gnomes and the music of Elton John offers its own indie/studio hybrid. The Romeo and Juliet riff (voiced by James McAvoy and Emily Blunt) is obviously British but culturally universal; independently produced by John's Rocket Pictures, animated by Starz Animation Toronto and distributed by Touchstone Pictures; but financed by Disney and comprised of key filmmakers from the studio world, principally producer Baker Bloodworth (Pocahontas, Destino, Lorenzo) and director Kelly Asbury (Shrek 2).
But Gnomeo & Juliet didn't start out that way back in 2001, when Rocket Pictures President Steve Hamilton-Shaw optioned the spec script by Rob Sprackling and John Smith and set it up at Disney. "The movie struggled to find its tone and was not the tone of Disney animated movies," Shaw admits. "It was always a bit of a square peg into a round hole."
Indeed, when Pixar took over Disney Feature Animation in 2006, John Lasseter passed on Gnomeo & Juliet when directors Aaron Blaise and Bob Walker were less than passionate about the project and wanted to helm something else instead. However, studio chief Dick Cook wanted to stay in business with John and his Rocket partner David Furnish, so he set it up at Disney-owned Miramax Films with President Daniel Battsek.
Starz Animation Toronto raised its game with sophisticated surfacing.
"The film has a unique sensibility because it really has to celebrate the ironic tone of the concept," adds Furnish, who, along with Shaw, produced for Rocket. "It's the high-art of William Shakespeare and the low-art of the garden gnome and it's the contrasting of those two which makes the whole notion of the film very funny. And we struggled initially with people at Disney because they couldn't grasp the low art of the garden gnome. I think in the end to make the film in the independent style that we did allowed us to cast the team appropriately -- to get Baker, to get Kelly working with my partner Steve, and to do all the production development and design in [London] because it is a British concept, at the end of the day. So much of British humor is rooted in irony. And we felt it was important to get the story team and design team London based before we started animating to really soak themselves up in British culture. I'm particularly proud of the accuracy of the sort of middle Britain town that appears in the film (Stratford-upon-Avon). That's not necessarily the view of Britain that people around the world have."
Shaw admits that doing the film independent of the Disney brand definitely helped "find its own merits" and kept it under the radar. "Which was another interesting thing about the way we made it," Shaw suggests. "Whilst we always had the studio involved, because we were somewhere else, we had our own little culture going. In a strange way, that left us more to our devises; the challenge was to make it more efficient but still reach that very high level of quality."
That rested with Bloodworth, who came aboard early on and nurtured the project first at Disney, then in London, enticing Asbury to direct and Karen deJong (The Lord of the Rings: The Return of the King) to art direct and finally finding a home at Starz in Toronto (Furnish's home town) after London proved too costly to do the animation.
"We selected Starz (which had just done 9) for all the big reasons: they were available and for the right price; they had talent; and they had enough bandwidth," Bloodworth explains. "And for the financial reasons, it was a huge incentive to go there (40% back on the dollar and so you could put a lot more on the screen for about half of what a studio animated feature costs)."
There is a level of reality that's also new for director Kelly
But even greater talent and leadership were required to grow the studio. Igor Khait (Everyone's Hero) was hired to help the Starz management team, which includes David Steinberg, head of studio; Terry Dale, head of operations and training; Rob Burton, head of technology; and Matt Teevan, head of production. And they brought in Henry Anderson (Stuart Little) to supervise animation, Xavier Bernasconi (The Tale of Despereaux ) to supervise lighting, Freddy Chaleur (Mickey's Twice Upon a Christmas) to supervise surfacing and Corey Smith (Meet the Robinsons) to supervise effects.
For Asbury, it was the right project at the right time: "I've always loved the incongruous, so I was drawn to Shakespeare, garden gnomes and Elton John coming together," the director says. "I started thinking there's a very intriguing, funny opportunity here. How can you make all that work together? It really was a challenge. Baker and Steve Hamilton-Shaw and David Furnish and Igor Khait really facilitated my getting the movie the way I wanted it. We tried to do it as traditionally as we could in a very non-traditional way of working. In a way, I got my first taste of what it might be like to make an independent animated film. We had the support of the studio, and Pam Coats, who was formerly at Disney, was brought in to liaise as the bridge between animation and those people in live action who had never done animation before. Luckily, people at Miramax were quick learners and they trusted us. The only problem we had is that those people kept getting fired. Just when you'd get one person on your side, you'd have to get someone new on your side. It was a constant tap dance.
"The thing about Starz that is so great is that they were really ready to give us what we were asking for. I think it's got a richness and depth and sense of reality to it and I think we made it for what it should cost; Starz found ways to make it appear more expensive than it really is: The gardens required simulation and the characters required rigging, modeling and ceramic surfacing. Lighting and rendering. They needed to build the pipeline and have the talent to pull it off technically and on schedule and on budget. I wanted from the beginning that the movie needed to look as realistic as we could get it so the audience would believe these garden gnomes could come to life."
Asbury says the movie suddenly came together when McAvoy adlibbed a line during a crucial exchange with Shakespeare (voiced by Patrick Stewart) about the inevitability of his fate: "You're telling me, it's a tragedy -- it's rubbish!"
The emotional core of the film is revealed with
Featherstone and the new Elton John song, "Love Builds a
"I don't know what ingredient that added except it made us say, 'Let's just be a parody of Shakespeare -- let's not hide from it,'" Asbury adds. "At the same time, we wanted to remain sincere so the audience still cares. I hope we've done that."
Meanwhile, other than opening with "Saturday Night's Alright for Fighting" during a lawn mower race and a cover version later on of "Crocodile Rock" by Nelly Furtado, the use of John's iconic music is merely hinted at in the score by old pal James Newton Howard.
"When the film was greenlit, we wanted Elton to be one of the cornerstones of the film," Furnish suggests. "Elton has written such an extensive amount of music that has touched so many people's lives… there's a lot of emotional wealth in those melodies. They take you to places right away, even on a subconscious level. So when you evoke 'Your Song' during some of the more romantic moments in the film, you get all of that wealth of history and awareness with it; when you get the 'Tiny Dancer' riff for Juliet and the 'Rocket Man' riff for Gnomeo, again, they are just chock full of good associations and memories for people and a huge likability factor."
As for the two new songs written with long-time lyricist Bernie Taupin, "Hello Hello" (sung by John and Lady Gaga) was conceived for the love at first sight moment between Gnomeo and Juliet, while "Love Builds a Garden" was conceived when they meet the flamingo character, Featherstone (voiced by Jim Cummings), "who's been locked up for 20 years and has been a victim of love going out of someone's life and realizing that it's a very precious, very beautiful thing that should be treasured," according to Furnish.
"There is something for everyone and it's timeless in expressing how we continue to live in a divided and conflicted world," Furnish adds. "Elton and I are great advocates of a world brought together. As Elton always says -- and I think it's one of the reasons he endures today -- 'Life is about building bridges, not walls.'"
Bill Desowitz is senior editor of AWN & VFXWorld. | dclm-gs1-009660000 |
Newark Mayor Cory Booker's father, Cary, died Thursday in Las Vegas.
The elder Booker was 76 years old and recently suffered a stroke, according to the Democrat's campaign. Cary Booker also suffered from Parkinson's disease.
The death comes as Cory Booker enters the final stretch of his campaign for the U.S. Senate against Republican Steve Lonegan. Voters will go to the polls Oct. 16 to elect a successor to the late Frank Lautenberg, a Democrat.
The candidate canceled his campaign events for the rest of the day. He had been scheduled to attend a rally with state Sen. Barbara Buono, who is running for New Jersey governor.
Cary and Carolyn Booker, the mayor's parents, were among the first black executives at IBM in the 1960s and active in the civil rights movement.
For a time they lived in Washington, where youngest son Cory was born. The Bookers moved the family (the mayor has an older brother named Cary) to the predominantly white suburb of Harrington Park in Bergen County. Cory Booker's campaign website says housing rights activists helped his parents buy their first home after they were initially turned down because of the color of their skin.
Cary Booker was raised by a single mother in North Carolina. A statement from city of Newark spokesman James Allen said Mayor Booker's father "was an inspiration to him and someone the mayor has often credited with being a principal reason for him entering public service."
As a child, the mayor told The Star-Ledger in Newark that he listened to tapes of speeches by Martin Luther King Jr. and John F. Kennedy that his dad had made. At the 50th anniversary of King's March on Washington this summer, Booker recounted what his father used to say to him about the struggles of African Americans.
"My father when I was growing up said it very simply," Booker said. "He used to look at me and say, 'Boy, don't you dare walk around here like you hit a triple, 'cause you were born on third base. You are enjoying freedoms, opportunity, technology, things that were given to you bought by the struggle and the sacrifices and the work of those who came before. ... Don't forget where you come from."
Follow @ccamia on Twitter. | dclm-gs1-009670000 |
Around the narrow streets of Baltimore's Little Italy yesterday, the O'Malley and Ehrlich placards were still hanging proudly in the windows of restaurants and Formstone rowhouses.
But no one was talking about the men who duked it out in the race to become Maryland's next governor. Instead, neighbors were buzzing with pride about one of their own, Nancy Pelosi, who is likely to become the nation's first female speaker of the House.They remembered the shy girl who wasn't allowed on a date without one of her five brothers along as chaperone. They recalled the gracious teenager who never assumed she was better than any of the other neighborhood kids just because her father was Thomas J. D'Alesandro Jr., a legendary Baltimore mayor
And they marveled that "Little Nancy," who they said took after her iron-willed mother, also known as Nancy, is poised to ascend to the post that is third in line for the presidency.
"I ate chocolate pudding with Nancy and watched Howdy Doody at night," said Mary Ann Campanella, 65, who still lives two blocks from the D'Alesandro home, which is at 245 Albemarle St. "That's how far back I go with Nancy."
The families actually go back further. In 1930, Pelosi's father was the best man in the wedding of Campanella's parents, she said, holding up a sepia-toned wedding portrait. The ceremony was held at St. Leo's Roman Catholic Church, which has been the center of tight-knit Little Italy.
"I'm bursting with pride for Nancy," said Campanella, president of the Little Italy Community Organization. "To have her out of this small community, an Italian-American female to hold the third-largest position in our country, I want to say it's breathtaking to me."
When Campanella learned that Pelosi, 66, a married mother of five and grandmother of five who represents San Francisco, was likely to become House speaker, she was in awe.
"I turned to my husband and said, `A little girl from Little Italy, could you believe it'?"
The tiny neighborhood with its score of Italian restaurants draws tourists and local residents. And to Little Italy natives, the D'Alesandro family is as much a fixture as St. Leo's, summertime bocce tournaments and the Feast of St. Gabriel.
Two mayors
Pelosi's father, known as "Tommy the Elder," was a congressman, then Baltimore's mayor from 1947 to 1959. Her brother, Thomas J. D'Alesandro III, "Tommy the Younger" was Baltimore's mayor from 1967 to 1971. And her mother, Annunciata, ran a tight ship raising six children while serving as the unofficial power in the family Democratic machine.
Pelosi was the youngest child and only daughter in a family that seemed to always be the community's center of attention.
"You could just open their door and walk in and socialize," said Angie Guerriero, 74, who grew up several blocks from the D'Alesandro home. "Or they were at our house. We shared jokes. In those days, there wasn't much else to do. They were just fine people."
Guerriero and her husband, John, who live a block from St. Leo's, are Pelosi supporters and offer moral and financial support for her political campaigns.
John Guerriero happily displayed a photo taken at a St. Leo's function two years ago showing him standing beside Pelosi.
"We just believed in her," he said. "She's just a beautiful, charismatic person. You just couldn't not believe in her."
John Guerriero's first call yesterday morning was to congratulate Pelosi's brother Thomas J. D'Alesandro III.
"She deserved it," he said, "She'll do a heck of a job."
D'Alesandro said he talked to his sister three times Tuesday night as the votes were being counted around the country and political power was shifting to the Democrats, meaning she is likely to become House speaker. | dclm-gs1-009680000 |
Somalia fears as US Sunrise banks stop money transfers
Refugee Abshiro Isakbul sits by her sick son at the Transit Centre in Dolo Ado, Ethiopia, on December 15, 2011. Many Somalis rely on money sent from their relatives abroad
The largest bank which lets Somalis in the US send money back home is due to close this service, raising fears for the famine-hit country.
Sunrise Community Banks said it would halt the money transfers to comply with US laws on financing terror groups.
US-based Somalis are believed to send about $100m back home each year - largely from Minnesota.
The Somali government estimates that annual remittances are $2bn - about one-third of the country's income.
It has urged Sunrise to delay its 30 December deadline for closing the accounts of the Minnesota-based Somali money transfer businesses, known as "hawala".
After two decades of warfare, there is no formal banking system in Somalia.
Some Minnesota-based ethnic Somalis have been accused of raising money and recruiting fighters for al-Shabab, a Somali militant group linked to al-Qaeda, although Sunrise denies its decision is linked to any recent convictions, reports the Reuters news agency.
Minnesota is believed to be home to some 60-80,000 ethnic Somalis.
'Die of starvation'
Aid agencies including Oxfam America and the American Refugee Committee (ARC) have urged the US government and the banks to find a way of keeping the service open.
"This is the worst time for this service to stop. Any gaps with remittance flows in the middle of the famine could be disastrous," said Shannon Scribner, Oxfam America's Humanitarian Policy Manager.
"The US government should give assurances to the bank that there will be no legal ramifications of providing this service to Somalis in need."
US-based Somali Dahir Gibril told the BBC's Network Africa programme that he sends about $100 a month to keep his family and other relations alive in Somalia.
"I don't know what's going to happen but they could die of starvation," he said.
Said Sheikh Abdi from the ARC said a few small banks elsewhere in the US still let Somali money-transfer businesses send cash but he thought they would soon follow Sunrise's lead.
Somalia has been worst affected by East Africa's most severe drought in 60 years.
Al-Shabab refuses to let many international aid agencies operate in the many southern and central areas it controls.
It says they have a political agenda and are exaggerating the scale of the suffering.
The UN has declared a famine in three areas and aid workers say it is the world's worst humanitarian disaster.
More on This Story
The BBC is not responsible for the content of external Internet sites
More Africa stories
| dclm-gs1-009690000 |
UK Championship: Judd Trump to snooker's rescue?
• Venue: Barbican Centre, York
• Date: Saturday 1 - Sunday 9 December
• Start times: Sessions at 11:00, 13:00/14:00 & 19:00 GMT
Coverage: Live coverage on BBC TV and BBC Sport website
When the top-ranked player finds watching his own sport boring, wishes he had taken up something else as a kid and wants people to hate him to bump up the interest, it is safe to assume that the sport he excels in has problems.
Hand on heart, I wasn't exactly chomping at the bit to interview Judd Trump. Well, snooker players are a bit dull nowadays, aren't they? But it turns out there is more to this Great Redeemer of the baize than the vitality of his potting, a few flash motors and the exuberance of his hair.
As an example, here's Trump, who starts the defence of his UK Championship crown in York on Sunday, explaining how he approaches each match: "I want to destroy my opponent, I want to ruin them for the rest of the season."
I wouldn't want you to get the impression Trump was frothing at the chops and making a cut-throat gesture as he said this. In truth, the 23-year-old out of Romford via Bristol is rather dry. But this is the sort of chat snooker chiefs should be encouraging in order to get a few more lines in the papers and a few more bums on seats.
"People aren't allowed to be themselves in snooker," says Trump, who became the sport's new number one on the way to winning the International Championship in Chengdu, China earlier this month.
Judd Trump
Cool Trump hits century on way to UK Championship win
"If you hit the table after missing a ball, you get fined. If you swear, you get fined. You can't even tweet what you're thinking without getting fined. Players can't show their personality and therefore fans can't relate to them.
"I don't feel people are that interested in snooker any more and the only thing that will get snooker back into the limelight is more controversy."
Snooker chief Barry Hearn knows it. Following Mark Allen's disparaging comments about Chinese players at this year's World Championship, Hearn gave the Northern Irishman a public dressing down and vowed to punish him - before flashing that winning smile and reminding the assembled press that Allen's obliging gobbiness at least grabbed the sport one or two headlines.
"You can't just write that everything's nice," said Hearn. "Who's going to read that? No-one. That's why the reporters have done a good job this year, because they've gleaned it out of these boys - the rascals."
But with Ronnie O'Sullivan recently announcing he was extending his sabbatical from snooker, Hearn has got a serious image problem on his hands.
A recent ITV documentary revealed four-time world champion O'Sullivan to be more of a snooker geek than the wild man of the baize he is often portrayed as: scratch a 'natural genius' and the chances are you'll find an unhealthy obsessive underneath. But O'Sullivan makes for compelling viewing, whether he's playing well or not.
Continue reading the main story
Snooker needs rivalries, rivalries sell: people hating each other, wanting to beat each other up. I want people to hate me, if that's going to attract more people to the sport
Judd Trump
"When I got to number one, I did a few interviews and they didn't want to know about me or snooker, all they wanted to know about was Ronnie retiring," says Trump.
"I can see why. There are only one or two people I can watch on TV without getting bored - Ronnie and maybe John Higgins."
When I ask Trump, beaten by Higgins in the 2011 World Championship final, where the sport would be if everyone played what might be deemed 'proper' snooker, he replies: "Not on TV for a start. But with Ronnie gone, there's a chance for me to shine a new light on the game.
"Over the last couple of years, I've had a lot of people saying they only really watch it because of me and my style of play. The way I play will change things, there will be a lot more attacking snooker in the future."
But not everyone is a fan of Trump's free-wheeling style. At the Crucible this year, Ali Carter rather priggishly announced the sport was about more than just potting balls after beating a sick Trump in the second round. Carter, an old-fashioned grinder, was effectively accusing Trump of playing 'fluke' snooker.
"I've played a lot of younger players who play how I played in the World Championship and, to be honest, it is quite frustrating," says Trump. "You're thinking 'you shouldn't be going for that'.
"I've had to adapt my game a little bit but I think that's the style that's going to take over, people taking on as many balls as possible."
As for the criticism? "I felt the opinions were harsh," he says.
"The main players, like Ronnie, Higgins and Mark Williams, let you do your thing. But a lot of players hoped no-one else was going to come through after Ronnie and they were going to replace him. I've got a lot of rivalries now with players who don't want to see me do well.
"But snooker needs rivalries. Rivalries sell - people hating each other, wanting to beat each other up. In a way, I do want people to hate me. If that's going to attract more people to the sport, it's got to be done."
Nobody in their right mind would endorse some of the behaviour of Alex Higgins, a man who escalated his rivalries to the level of terrorism - he once threatened to have fellow Northern Irishman Dennis Taylor shot. But a bit of baize-related beef might get a few more kids on board. Intriguingly, Trump could play Carter in the second round in York if both players win their opening matches.
"It's a rough time for snooker and something still needs to be done to change the image of the game," says Trump. "The World Championship needs to be left alone but some of the other tournaments should be more relaxed, a lot quicker, with more shot clocks.
"I don't want to be dressed in a bow tie and waistcoat - and kids younger than me certainly don't want to be wearing that sort of thing.
"It is a great time to be Judd Trump. He is world number one, full of confidence and he seems to be enjoying the game, his life and is a young, single guy who can travel around the world and play in tournaments. You expect him to be world number one for the next 10-15 years if he applies himself. He has age on his side. I don't see where the challenge to Judd is going to come from."
"It's all just a bit boring. If I was seven or eight again, why would I choose snooker? I'd want to be a footballer or a golfer or a tennis player, who are earning millions and millions in prize money and sponsorship. I'm number one in the world and I'm earning between £300,000 and £400,000 a year.
"It's a lot to most people, but prize money in snooker was at its peak in 2003 [Mark Williams earned £270,000 for winning the 2003 World Championship, while this year's winner O'Sullivan earned £20,000 less]. Every other sport has been raising its money, snooker has gone backwards."
In fact, Hearn has doubled prize money on his revamped snooker tour since taking over as chairman in 2010 and this season there are now 10 ranking events on the calendar, five of them in China. Which tells its own story.
"The money is in China and the fans are in China," says Trump. "There's not a lot of people who want to watch snooker in the UK at the moment. Snooker will be back but there isn't going to be the interest like there was in the 1980s. We've got to battle for every single person and something needs to change."
After our chat, our camerawoman gets Trump to play a few shots for a TV package. Four minutes later, Trump has completed a total clearance. In the final stages of the break, I find myself peering round a partition, trying to stay out of camera shot, imagining I'm Bill Werbeniuk and Trump is a super-charged Cliff Thorburn.
"When Alex Higgins left and when Jimmy White left, somebody came through," says Trump, as if to reassure me. "And after Ronnie, there will be somebody else." That somebody, Judd my boy, would be you. | dclm-gs1-009700000 |
Man Attacked by Alligator at Wekiwa Springs State Park
Send by email Printer-friendly version Share this
David Bostwick and his 7 year old son were enjoying Friday at Wekiwa Springs State Park, located in central Florida. They had been canoeing and were getting into the water to go snorkeling. When Bostwick got in the water he was grabbed by an alligator, trapped in the gator's jaws. Bostwick managed to free himself, he and his son paddled to a nearby home. The residents helped get Bostwick to a fire station, and Bostwick was taken to the hospital.
He is now recovering at home. Florida Fish and Wildlife Conservation Commission issued a permit for trappers to hunt the gator that attacked Bostwick. From The Miami Herald.
groovy mike's picture
what sort of dope would bring a child into that sort of danger ?
Thank God that the gator didn’t grab the seven year old instead of the adult. That could have been tragic.
It seems like alligator populations are on the rise nationwide and the hunting opportunities are increasing. They are so numerous that they seem to b just about everywhere in the state of Florida and the other gulf coats states today. Just looking at one I understand why the early settlers attempted to eradicate alligators and shot them on sight. In 2010 a new record alligator was taken on Lake Washington in the state of Florida. It measured at fourteen feet and three inches long. Just try to imagine that coming at you while you are in the water–I wouldn’t put your odds of survival very high unless you were pretty well armed. Even with a loaded shotgun or rifle in your hands, I'd only give you fifty - fifty odds! You just recognize at a glance that every one of them wants to kill and eat you and all of your children. I recognize the value of preserving the species, I am not arguing for the eradication of all alligators. But I don’t see many redeeming features in the alligator. Now – what was this guy thinking planning on going snorkeling in water where gators might be? Snorkeling anywhere in Florida is probably not a very smart move unless you are in the ocean surf. But what sort of dope would bring a child into that sort of danger either. Turns out that wasn’t exactly a bright move!
arrowflipper's picture
stupid question
This may be a stupid question, but how would hunters know which gator it was? Did Bostwick leave a description? Or is there only one gator in that lake?
I would agree that the gator needs to be hunted down and destroyed, but I sure don't know how people can tell the difference. If they get the wrong one, someone might cry about how an innocent gator was tried, convicted and killed for doing nothing but swimming around in the pool.
I would hope this was a rogue gator and the only one in the lake. Otherwise, wading in that lake wouldn't be something I'd do. That's kind of like walking around in flip-flops in prime rattlesnake territory. Somewhere along the line, people need to act prudently. BUT, if the gator was in an area not known to have them, I can see wading around.
I do hope the guy recovers and I hope the find the guilty gator. | dclm-gs1-009710000 |
Crispy Sweetbread Tacos
What fuels a restaurant for more than 20 years? Is it money, hard work, customer loyalty, a supportive wife or grateful children? I believe there is only one word that could encompass it all: sacrifice. This is the story of our family restaurant, Los Tacos Grill, and how it was built amongst a decade of generational family conflict, failures, and successes....more | dclm-gs1-009740000 |
Diversity recruiting: getting it right
By Aaron Green, 6/18/2007
While it's good to recognize the importance of diversity recruiting, it's better to implement it effectively at your company.
Consider that while the Census Bureau recently reported that the US minority population now exceeds 100 million people, the country is not nearly as diverse as it will be in the future. Seventy-five percent of this country's expected population growth will come from immigrants and their children. These are the people you will need to recruit to fill your job openings. These are also the people who make up your customer base and who look for products and services geared toward their cultural preferences.
As these population trends come to fruition, companies that are not successful at diversity recruiting will lose ground to those who are successful at it. In other words, diversity recruiting and mainstream recruiting are merging and becoming one and the same.
There are a few major steps businesses can take to incorporate diversity efforts into their recruiting processes. As a start, I recommend the following:
1. Assess your business needs and opportunities
One straightforward way to identify diversity recruitment opportunities is to simply measure your company's actual diversity and compare it to the local workforce's diversity. For instance, if two percent of the accountants in your CPA firm are African-American, but African-Americans make up 14 percent of the local workforce of CPAs, you know you have an opportunity.
Many times it makes sense to break down your workforce and looks at diversity across various categories. For instance, are you diverse at the management level? Do customer facing positions have enough diversity? How about human resources? If you are going to be recruiting diverse candidates, it makes sense to ascertain that diversity is adequately represented in your human resources department.
2. Develop a strategy
Consider your company's human resources challenges and how diversity recruiting fits in. For example, a company that is trying to recruit Spanish-English bilingual call center representatives will develop a recruiting strategy that is markedly different from that of a company that caters to the Asian marketplace. While both companies will want to be inclusive, they will focus their efforts differently to meet their particular recruiting needs.
While your recruiting strategy should reflect the demands of your company, it should also take into account changing demographics and the recruiting opportunities created. In Massachusetts the Latino population is growing at a rate of more than 50 percent each year. Accordingly, Latinos will make up a larger percentage of the workforce in the coming years. If you can benefit from this trend you should make plans now.
3. Put the right tactics to work
• Get everyone engaged - Build enthusiasm and support by educating all company employees on the business benefits of your diversity recruiting initiatives. By getting the word out you will receive assistance from others. Simply letting employees know that diversity recruiting is a major priority can prompt actions like employee referrals.
• Mirror your environment - To make prospective employees more comfortable and excited about working at your company, showcase examples of diversity within your organization whenever possible. If you have diverse employees in senior or exciting positions, find a way to get these people involved in the recruiting process. Employing diverse individuals can both raise the interest level of diverse candidates and be a necessary tool in communicating with these candidates. Among other things, this means ensuring that your HR department can communicate with non-English speaking candidates, if and when necessary. I was visiting a friend in the hospital recently and noticed signs saying that hospital staff were on hand to communicate with patients in a number of different languages. At that moment I realized HR departments are on a similar path and will need to be prepared to communicate with candidates in multiple languages.
• Get involved in diverse communities - There really is no substitute for getting out to the diverse populations that you would like to recruit from. So how do you do this? While there is no one-size-fits-all approach, my organization has recognized much success by supporting community-based organizations. For instance, we volunteer our time and support to organizations like The Urban League and the Asian American Civic Association. We conduct mock interviews, offer resume writing workshops, provide career counseling advice, and attend their events. While the people we help are not necessarily the same people we are recruiting, the community presence we've established ultimately results in new candidate referrals.
• Integrate with mainstream recruiting tactics - Integrating diversity messages into your mainstream recruiting materials is helpful since diverse job seekers are viewing this information as well.
• Allocate money - If you are serious about diversity recruiting you will need to spend some money getting your message out to the right places. Minority and other diverse candidates do not necessarily look for employment in the same way as non-diverse candidates. You need to be prepared to advertise where your candidates are looking. Furthermore, even when diverse candidates are looking in the traditional places (such as mainstream Internet job boards or print ads) they are more likely to remember your company if they also seen your message in a niche publication directed to them.
• Borrow best practices from other recruiting campaigns - Recruiting practices that have worked well for your business in the past, such as offering rewards and other incentives, conducting referral programs and recruiting passive candidates should also be a part of your diversity recruiting efforts.
• Be ready to sell - In the old world of recruiting, hiring managers sat back while candidates sold their skills for the open position. In today's tightened labor force, diverse candidates have a lot of employment options and employers are the ones who need to "sell" their company.
• Measure your return on investment - Like all recruiting activities you should be measuring your diversity recruiting activities and determining what is working, what is not working and adjusting your plans accordingly.
• The population trends in Massachusetts demand that companies integrate their diversity recruiting into their mainstream recruiting. As you take steps towards adapting your recruiting strategies, you will reap the rewards and be more successful in your business.
[an error occurred while processing this directive]
[an error occurred while processing this directive] | dclm-gs1-009750000 |
Justice Julian Flaux ruled Thursday that granting anonymity would be an ‘‘affront to the principle of open justice.’’ He noted that many names, including former CEO Bob Diamond, were already on the public record.
‘‘The public has a legitimate interest in learning who in the banking community is alleged to have been implicated in the manipulation of LIBOR,’’ Flaux said in a written ruling.
‘‘So far as individuals who were not involved in the manipulation and are entirely innocent of any wrongdoing are concerned, the suggestion that they could be prejudiced by being identified seems to me somewhat unreal,’’ he added.
Barclays said in a statement that just because an employee’s documents were reviewed ‘‘does not mean that such person was involved in any wrongdoing.’’
| dclm-gs1-009760000 |
grand tactics
The topic grand tactics is discussed in the following articles:
• TITLE: tactics (military)
SECTION: Evolution of the term
...but over time each has acquired both a prescriptive and a descriptive meaning. There have also been attempts to distinguish between minor tactics, the art of fighting individuals or small units, and grand tactics, a term coined about 1780 by the French military author Jacques-Antoine-Hippolyte de Guibert to describe the conduct of major battles. However, this distinction seems to have been lost... | dclm-gs1-009770000 |
mofette, ( French: “noxious fume”) , also spelled moffettefumarole, or gaseous volcanic vent, that has a temperature well below the boiling point of water, though above the temperature of the surrounding air, and that is generally rich in carbon dioxide and perhaps methane and other hydrocarbons. When the winds are right, the issuing gases may drift and settle into nearby hollows or small valleys and cause the asphyxiation of animals and birds wandering in the areas. Such potentially deadly hollows have been noted in the Absaroka Range near Yellowstone National Park in Wyoming, U.S., and at the base of Iceland’s Hekla volcano. | dclm-gs1-009780000 |
Zollverein, ( German: “Customs Union”) German customs union established in 1834 under Prussian leadership. It created a free-trade area throughout much of Germany and is often seen as an important step in German reunification.
The movement to create a free-trade zone in Germany received great impetus from economists such as Friedrich List, its most active advocate in early 19th-century Germany. In 1818 Prussia enacted a tariff law abolishing all internal customs dues and announced its willingness to establish free trade with neighbouring states. A decade later Prussia signed the first such pact with Hesse-Darmstadt. In 1828 a customs union was set up in southern Germany by Bavaria and Württemberg, joined in 1829 by the Palatinate; also in 1828 the central German states established a similar union, which included Saxony, the Thuringian states, electoral Hesse, and Nassau. In 1834 these were among the 18 states that joined in the Zollverein. Hanover and Oldenburg joined in 1854; the two Mecklenburgs, Schleswig-Holstein, Lauenburg, and Lübeck joined in 1867; and thereby all Germany outside Austria was included except Hamburg and Bremen, which adhered in 1888, 17 years after the establishment of the German Empire. | dclm-gs1-009790000 |
johnny manziel texas am aggies
Ronald Martinez/Getty Images
Welcome, friend, to the first actual Johnny Manziel controversy. Did it feel like your entire offseason was spent preparing your Manziel-reaction muscles for this? You've made it.
In one line: ESPN's Darren Rovell is reporting the NCAA is investigating whether Manziel took money for autographs. This raises issues, to say the least. Let us work through them, as best we can.
Is Johnny Manziel suspended?
No. He'll be at practice when Texas A&M opens camp Monday, but he won't be available to the media, continuing 11 or so months of off-and-on availability.
What did Johnny Manziel do?
He allegedly signed a bunch of autographs in a Miami apartment.
Okay. What is Johnny Manziel accused of doing?
Rovell reports Manziel was allegedly "paid a five-figure flat fee" for those autographs. If (A) that is true and (B) the NCAA can prove it, Manziel will not play football for a long time.
Will Johnny Manziel be suspended?
I doubt it. If the information ESPN reports is the extent of the NCAA's investigation so far, the governing body still has a lot of work to do to prove a rule was broken, as acknowledged by Rovell:
The NCAA will likely gain (or has gained) access to Manziel's bank records and the accounts of his already-wealthy parents. If it can't find a deposit corresponding to the alleged fee, it would take something like surprise video evidence to prove the charge. But if there's a convincing paper trail, as there was in the case of Georgia receiver A.J. Green, then we have something.
So this is Cam Newton all over again?
Sure! We've got a Paul Manziel instead of a Cecil Newton, and the alleged potential deed would've taken place after winning a Heisman, not before.
But it'll drag on all season long, and a general presumption of guilt could follow Manziel even more closely than it did Newton, due to Manziel's adventurous offseasons. Even if the NCAA announces Monday afternoon that all's well. Don't hold your breath there.
So what evidence is there?
Two anonymous sources, neither of which saw the alleged transaction. ESPN is not reporting whether the two* have spoken to the NCAA.
According to those sources, Manziel met an "autograph broker" named Drew Tieman upon arriving at a Miami airport for the BCS National Championship. Manziel was indeed in Miami ...
... but he did not tweet about being given $10,000 by a man he met in an airport, believe it or not.
Rovell reports "the amount of Manziel product that flooded the memorabilia market overall following the BCS title game was overwhelming," according to "memorabilia dealers," and that "industry insiders" point to evidence that a large batch of items was signed with the intent to sell. It's not clear if those dealers are the same individuals as the other cited sources.
The story's sourcing must be approached with skepticism, especially since Rovell has been wrong recentlyas has Outside the Lines (and there's ESPN's Auburn spice "epidemic").
That's not to say the story is baseless. The existence of a "a single lot of 999 signed Manziel photos numbered sequentially" is unquestionably suspicious. Plus, memorabilia is kind of Rovell's alley. Whether Aggies fans want to hear it or not, there is evidence. Not proof, but evidence.
* A third source only claims Manziel signed autographs at Tieman's, not that Manziel was paid. Only one of the three claims Manziel returned after the game to sign more autographs.
What else have we heard recently about Johnny Manziel and autographs?
The San Antonio Express-News' Brent Zwerneman, seven days before Sunday, on a series of helmets autographed by Aggie Heisman-winners John David Crow and Manziel:
ESPN's Wright Thompson, five days before Sunday:
Johnny signed everything, no matter how much he grumbled and cursed with a pen in his hand. Whenever he'd see his parents, they'd always have a carload of things to autograph. They hated it, and he did too. But they seemed compelled by manners, and obligation, and one autograph didn't seem like that big a deal [...]
The counselor told Johnny to build walls around himself, set boundaries. First, his parents' autographs should be limited to
half an hour a week.
Sports Illustrated's Andy Staples, four days before Sunday (not online yet):
[Months before July], his therapist asked him to make a list of the stressors in his life. Autographs topped the ledger. The solution was simple. Instead of signing everything sent his way, Manziel would dedicate one hour a week to fan mail and autographs. Everything else would go unsigned. In public Manziel would sign for children but steer clear of adults.
Manziel told a story about being duped by an autograph broker in a Dallas airport to Staples, just as he did to Sports Illustrated's Stewart Mandel, two months after January 6:
Whole lot of autograph talk, especially over the last week.
Will Texas A&M face sanctions for this?
If the NCAA proves both that Manziel took money and that Aggies coaches knowingly played him anyway. But Texas A&M hasn't played any football games this offseason, due to the fact that it is the offseason. So there's nothing to sanction A&M for yet.
Could Texas A&M win a bunch of games without Johnny Manziel?
Just for the sake of argument: certainly. Jake Matthews anchors what should be a very good offensive line, Kevin Sumlin's offense has produced YARDS and POINTS with non-Manziel quarterbacks before, and the toughest non-SEC team A&M faces is SMU.
Just so we know, who are Johnny Manziel's backups?
Next on the depth chart for the beginning of fall camp is believed to be 6'4 junior Matt Joeckel, brother of the No. 2 2013 NFL Draft pick. After him, a whole bunch of four-star freshmen.
Could Texas A&M beat Alabama without Johnny Manziel?
What do we know about Drew Tieman?
Autograph guy Tieman was contacted by the NCAA in June of 2013, according to the report. He did not comment to ESPN.
He also encountered Notre Dame linebacker and fellow Heisman finalist Manti Te'o in Miami before the national title game, based on a now-dark Facebook profile bearing Tieman's name:
He has been arrested twice for marijuana possession since 2009.
He appears to be a Miami Hurricanes fan. There's a photo of him with Miami coach Al Golden.
That's about it.
Are there conspiracy theories?
Texas framed Johnny.
The NCAA contacted Tieman in June; the NCAA likely contacted A&M around the same time. Manziel went a month without tweeting from mid-June to mid-July. Sumlin said a couple times in early June that his staff didn't anoint Manziel as A&M's starting quarterback until the end of camp in 2012; weeks later, news broke that Manziel had almost left A&M and that Sumlin had helped Manziel avoid suspension for his 2012 arrest. Damage control has been underway for a couple months now.
Alabama framed Johnny.
Someone pushed for Johnny and his father to complain to Mandel, Thompson, and Staples about ceaseless autograph demand in order to explain away the high number of Manziel-autographed items on the market.
Blame Waffle House.
There are probably others, too.
Sam Houston State framed Johnny.
Is this story bigger than Johnny Manziel's eligibility?
Whoa. But I meant, as far as sports go.
Oh. Yep!
"With a backdrop of increasingly hostile public sentiment against the NCAA and its archaic amateurism policies," the story "shines an even brighter spotlight on the NCAA's system of "amateurism" that is under significant attack both legally and politically," and "if the power schools really are tearing down the current model, stories like Manziel's should at least be in the conversation." Also, um, something about Canada.
More from SB Nation
• Official Coaches Poll Top 25 is out, led by Alabama and the SEC
• Photos of Oregon’s insane new football facility
• Bill Connelly’s Big Ten preview series is complete
•SB Nation’s media days coverage, live from the scene: ACC | Big 12 | Big Ten | Pac-12 |SEC
• Projecting every 2013 college football conference race
• Today’s college football news headlines
This story was originally published by SB Nation.
This post originally appeared at SB Nation. Copyright 2014. | dclm-gs1-009800000 |
'Universal' Personality Traits Aren't Actually Universal http://www.businessinsider.com/universal-personality-traits-are-not-2013-1/comments en-us Wed, 31 Dec 1969 19:00:00 -0500 Thu, 13 Mar 2014 15:59:57 -0400 Megan Gannon http://www.businessinsider.com/c/50ede6eaecad041871000005 yisterwald Wed, 09 Jan 2013 16:53:46 -0500 http://www.businessinsider.com/c/50ede6eaecad041871000005 Yes. Please edit. Proofreading before posting is a good idea. http://www.businessinsider.com/c/50ede06eecad048b6100000f fattsmann Wed, 09 Jan 2013 16:26:06 -0500 http://www.businessinsider.com/c/50ede06eecad048b6100000f Either the researchers (disclaimer: I am a researcher, though not of any related field) were not being clear in their results or the reporting is not as clear as it could be. A passage of the text reads: "The team instead discovered evidence of a pair of broad traits that could be considered the Tsimane "Big Two." The researchers labeled one prosociality — socially beneficial behavior, which among the Tsimane, looks like a mix of items under the extroversion and agreeableness portions of the Big Five. The other trait is industriousness, which blends the efficiency, perseverance and thoroughness found in the conscientiousness portion of the Big Five, the researchers said." This is like saying, "Words are more complex than letters but are formed by letters." That doesn't mean the letters don't exist. Often a language will words that describe certain combinations of feelings/actions that don't necessarily exist in other languages. That doesn't mean that the basic underlying feelings/actions don't exist. So if a trait seems to combine 3 sub-traits, that doesn't mean the sub-traits are invalid in anyway. http://www.businessinsider.com/c/50eddef4ecad04355f000017 laugh Wed, 09 Jan 2013 16:19:48 -0500 http://www.businessinsider.com/c/50eddef4ecad04355f000017 Story contains duplicative text. As an example: "Psychologists can get a pretty clear picture of someone's personality by evaluating to what degree they express traits known as the "Big Five" — openness, conscientiousness, extroversion, agreeableness and neuroticism. These factors are thought to be rooted in biology and to transcend cultural differences, but a new study of an indigenous Bolivian society shows the traits might not be universal after all." This appears in the middle of the article. Yet it is also the lead paragraph. | dclm-gs1-009810000 |
Ethnic Unrest Flares
Posted by: Dexter Roberts on March 14, 2008
Despite Beijing’s efforts to tighten control over dissent in the run-up to the 2008 Olympics, ethnic tensions involving independence-minded Tibetans and also Muslim Uighurs are flaring up dramatically.
Over the past days hundreds of Tibetan Buddhist monks have protested in Lhasa against Chinese rule, the biggest unrest in the remote capital in twenty years. And Beijing has announced that it quashed a plot by Muslim Uighurs from the far western region of Xinjiang, to disrupt the upcoming Olympics Games as well as an attempted terrorist act by a 19-year-old Uighur woman on a domestic Chinese airline. Xinjiang of course, like Tibet, has a long history of resisting Chinese control.
Beijing’s response has been rapid and typically heavy-handed. Chinese security forces reportedly have surrounded three key monasteries in Lhasa (where many of protesting monks come from), after firing teargas on the protesters earlier. And Beijing authorities announced that during a January raid in Urumqi, Xinjiang security forces killed two and arrested fifteen suspected Muslim terrorists. Authorities claim that the Uighurs were linked with a Xinjiang independence group and intended to disrupt the Olympics with bomb attacks.
“In the past couple of days, a few monks in Lhasa have made some disturbances in an effort to cause unrest,” a foreign ministry spokesperson acknowledged Thursday albeit in an understatement. “Those terrorists, saboteurs and secessionists are to be battered resolutely, no matter what ethnic group they are from,” said the Xinjiang party secretary Wang Lequan a few days earlier.
For both the Tibetan and Uighur unrest, two things of particular note: first Beijing’s policy of rapid economic development aimed at tamping down the ethnic resentment is now appearing ineffective (well-off minorities are less likely to press for independence goes the theory, and longer term, a flood of Chinese migrants drawn to the west could make Tibetans and Uighurs such minorities that their resentment would become irrelevant too). That’s despite huge transfers of money from Beijing to both Tibet and Xinjiang which has spurred levels of GDP growth even faster than China’s overall economy and has funded major infrastructure projects like the Qinghai-Tibet railway—the world’s highest track—and a 4,000 kilometer-long gas pipeline from the desert in Xinjiang all the way to Shanghai.
Second, Beijing’s intimidating security apparatus (which can effectively monitor dissent and quickly squash it) doesn’t seem to be working as well in tamping down ethnic unrest (on the other hand, the crackdown on political dissent has proven more effective.) So for now at least it looks like neither economic blandishments (which tend to favor the Han Chinese residents of these regions anyway), nor the threat of heavy reprisals seems to be working. That suggests Beijing will be struggling with how to deal with the still deeply unhappy Tibetan and Uighur populations it controls for a long time to come.
TrackBack URL for this entry:
Reader Comments
March 14, 2008 08:48 AM
Chinese government is stupid. They should learn from US. If they attack, then bomb.
Kidding though. China's policy will work, and it takes some time. Chinese know who is behind them.
March 14, 2008 05:53 PM
I love the contradictions, Dexter. You question whether there was a terrorist plot yet use it as an example of discontent against China? China is just following the West's example when it comes to occupation. Isn't that what the West wants China to do?
March 15, 2008 03:10 AM
China could use the same method that USA used to deal with the India. It consist in forcing them into India reservation camp and then provide them a lot of whisky and money. It work for the USA and should work for China. There is precedent for that :-)
King Jaja
March 15, 2008 11:48 PM
We need to distinguish between the Han Chinese and the Chinese government. If we paint the Tibetan struggle as a fight between the majority Han and minorities - we are going to lose.
The Han Chinese are also oppressed by the CCP, so failing to make that distinction will play into the hands of the CCP.
Right now, everyone is talking - in english. No one is making any serious attempt to win over the Han majority.
March 16, 2008 03:57 AM
Lets face it the Chinese rulers are bullies - in their own country, in Tibet and in their neighbourhood.
And since the US govt. is also a bully, they are both great friends.
The Tibetans are stuck.
March 16, 2008 09:10 AM
King Jaja, You are totally wrong. For the integrity of China, Chinese are united together. People are behind the government.
I am glad that chinese people are more politically mature than before. Especially the youth don't danced with westerners' propaganda any more.
The western media are shy in talking the violence in Xizang this time. Those people burn stores, killing people, not only Han, but also muslims.
This is a rare report in western countries. Rioters even used guns.
March 16, 2008 11:29 PM
King Jaja, are you Tibetan? Because if you are, kudos to you. Nice to hear anyone in this debate that doesn't think in black and white.
March 17, 2008 01:48 AM
This is a blog from another Canadian traveler in Xizang. The video was uploaded to youtube:
For those who don't know Xizang (Tibet)'s recent histoty. Come to here. You will find that Xizang was in China even when China was at weakest point in history.
March 17, 2008 01:58 AM
This is another video. It was broadcasted in China's CCTV. But it tells truth: Violence of rioters!
March 17, 2008 02:19 AM
For communist China economic development is for perpetuating their authoritarian rule. China has illegally occupied Tibet and as rightly said they are causing cultural genocide.
When some people say Chinese people are solidly behind Chinese government how are sure of it.Has Chinese communist party gone with an election manifesto to its people and taken their approval? Chinese people, like trained animals have been made to belive the government handouts as the ultimate truth. In the long run China will face severe problems as it is continuing with bad Karma.In the meantine can we, all freedon loving global citizens, boycot china made products in true Gandhian style to press for the rights of the oppressed?
March 17, 2008 03:13 AM
Prakash,You believe it or not. This is the last thing Dalai can do.
What is happening in Xizang make China more politically united since 1989. Chinese communist party was elected by Chinese by their lives. Millions of ordinary Chinese had sacrificed their lives for the party before it gained power. That's the history you cannot deny.
Tibet has been in Chins since Yuan dynasty. Any new Dalai and Penchan have to get agreement from central government. That rule was not set up by CCP. That's the tradition and rules of hundreds of years. Dalai knows this rules because he requested the agreement from ROC government too.
Genocide? Tibetians still have their own languages and culture, they still have their own temples even Tibet has been in China for hundreds of years.
March 17, 2008 03:27 AM
Let's hope that Sikkim, Khalistan, Kashmir, Assam, and Dalistan get their own country free from the rule of the upper Hindus such as yourself! There are bad karma for India and it coming very soon due to its racist discrimination against its own minority!
What is this Ethnic unrest has anything to do with businessweek? Is this Bruce Einhorn with a different name?
March 17, 2008 03:47 AM
Prakash, India did worse when it lied that Muslims bombed that train causing the deaths of thousands in anti-Muslim rioting. And don't forget that racist caste system that enslaves hundreds of millions of people.
March 17, 2008 04:18 AM
Prakash is an Indian? I know that's a typical Indian name, but I though he is a Tibetian.
If he is an Indian. I will feel very sorry for him and his country.
Even India government admitted that more than 7000 people died from religious and political conflicts in 2007 alone, including the struggling for independence.
If China does what India is doing to China, or if India has a hostile western world as China has, India could fall apart in 1 day.
Come to see the incomplete List of deadly Political Violences in India in a short time. Sorry for your country.
March 17, 2008 01:32 PM
Tibet and Urger terrorists are merely tools for western world against China. The current uprising are intended to serve the Taiwan elections because America want CPP to win the presidency. But there are two side effects: 1) Dalai Lama has been used up in this crisis and his credit for peaceful reclaim Tibet governance among Chinese govoenemt and Chinese people has lost for ever. Dalai Lama is done. 2) The Tibet unrest has stimulated the united spirit among Chinese people, even the overseas Chinese, you can see the responses in Youtube. So many people adamantly support the Chinese government.
March 17, 2008 04:11 PM
Unleash the Imperial Japanese Army & Unit 731 on China to teach them a lesson again. Chinese seems not to have learnt the lessons of Japanse brutality on them in the past and are repeating the same on unarmed civilians in Tibet.
March 17, 2008 11:36 PM
Why is there such animosity between Indians and Chiniese?
Except for Mao and Nehru's obvious dislike for each other and even that was fuelled by British India, these two countries have co-existed for thousands of years without a finger being raised.Ideas, sciences, Philosophies and trade have criss-crossed our free borders since begining of civility.
Are we and generations to come going to be held hostage for the debacle that Mao and Nehru created.
Francis Liu
March 18, 2008 01:05 AM
Tibet should be independent like Kosovo.
March 18, 2008 01:22 AM
If you are unhappy, whose problem it is? Are blacks and Latinos in US are happy?
March 18, 2008 09:55 AM
jcage you are propagating racist commentary in too many forums. get a life and say something meaningful for a change than just the same rant everywhere
March 18, 2008 10:33 AM
I agree with you. Both India and China are 3rd world countries and share the similar recent history. China and India should be united politically.
People just read a little history book, all the troubles in Asia were left by western countries's occupation. Just give you some example:
1. Pakistan and India. A trouble left by UK
2. Vietnam war: A trouble left by France, then US got involved.
3. Sino-India war in 1962: A trouble left by UK and still impact both countries.
4. Sino-Vietnam war in 1970s-1980s: A trouble left by France.
5. China's Taiwan problem: A trouble left by Japan's occupation.
6. 2 Korean countries: Caused by occupation of Japan and then world big power got involved.
7. China's Xizang (Tibet) Issue: A trouble left by UK.
Both China and India are still suffering from western countries. Both should support each other.
March 18, 2008 01:33 PM
I wonder how many these commentators like nanheyangrouchuan, J Pousson, Chinaman or some Japanese impersonator are actually Uyghur Islamic extremist or Indians who hate China because of 1962 war. Face it, China will never let the separation happen. The best way is for all Chinese, Han, Tibetan or Uyghur, to become prosperous in a prosperous China. Right now, China has not done enough to bridge wealth gap between inland and coastal provinces.
Zingo, unleash Japanese to invade China again? It that happened, I can guarantee that Japan will become ashes.
No one can survive a nuke war. Such trolling statements will help nothing. I do agree China should grant more autonomy to Tibetan and Uyghur. Han Chinese should more respect all other minorities and bridge the wealth gaps. I think Tibetan, Uyghur, Han Chinese are all Chinese and should all become prosperous just like, African American, Chinese American or Mexican Americans.
March 18, 2008 01:35 PM
Thank you, Steven.
It's funny how common people can share a dialouge and respect each others views, unfortunately the same can't be said of the goverments.
But commig back to Tibet.
History has shown us that aggression and supression can never solve, but can be applied as a bandaid solution only.
Some of the quotes by imperialists.
"Rome,is the Eternal flame".
" The sun will never set on the British Empire".
The USSR is a prime example of recent aggression and it's not even history.
My point is not to debate Tibets identity but the tact that Mao applied in assumig authority.
Had China approached Tibet as a friend and genuinely poured billions into Tibets welfare, i think the end result would have been very obvious.
March 18, 2008 11:10 PM
Read this article. It said current violence is committed against Chinese by Monks not the Chinese government against Tibetan. I think any government is entitled to use force to maintain society safety and stability. Don’t we send troop to L.A. in the 90s? People all jump to conclusion nowadays when anything is related to China.
March 18, 2008 11:14 PM
However, we do see that there are a lot of angers in Tibetans against Han Chinese. This has lots to do with Han Chinese migrating there and dominate there economically whilst local Tibetans feel deprived. China need to reverse that and should let Tibetan proper first.
March 19, 2008 03:59 AM
It looks like this time CHina is managing media campaign very well. You can see it from the tone and content of many China supporting comments.
Some people have tried to draw parallels between China and India. It is true thousands of people have died in India in COmmunal riots. But the difference is it is not government sponsored. It is more like clash of group of people. But India is open to outside world. Everyone can see what is happening in India. If China has nothing to hide why blackouts in Tibet? Because you want to hide the government butchery?
India is a mutli religious, multi ligustic country. If any other conutry has the population of the size of India and the heterogenity of its population I can not expect the magnitude of violence. By standards of our size, ethnic complexity and standards of living India is the most democratic and peace loving conutry. Our greatness is in our ability to be transperent and accept criticism unlike many authoritarian and fundamentalist societies and countries.
March 23, 2008 02:47 PM
Tony (3/18) has a lot of common sense. Chinese government needs to do at least the following (actually they know what to do): 1. to equalize wealth: follow the U.S: progressively tax the wealthy, the top 1% in U.S. pays 35% of all income tax, the top 5%: 50%, the top 10%: 75%, etc. 2. universal healthcare (the Hillary/Obama model) 3. real implimentation of free education up to high school, emphasizing IT (future jobs), English (business) and Mandarin (internal stability and communication).4. continue the current existing affirmative action, including:
Exclusion of 1-child policy, continue to uphold ancestral village privileges. 5. Low interest loans to the poorest.
Remember: If people (Han & 56 minority groups) are prosperous, they will not rock the boat. Everybody is happy. Simple enough.
Post a comment
BW Mall - Sponsored Links
Buy a link now! | dclm-gs1-009820000 |
Why GM's Plan Won't Work
You are being redirected!
This page is a legacy redirect to this article: Why GM's Plan Won't Work.
Power Delusions
(enter your email)
(enter up to 5 email addresses, separated by commas)
Max 250 characters
blog comments powered by Disqus | dclm-gs1-009840000 |
grocery cartBy now, many of us know all the sneaky tactics grocery stores use to lure us into buying junk food we know we shouldn't buy. But did you know -- at some grocery stores something even more sinister lurks. Some stores are actually tricking shoppers into buying HEALTHY FOOD. (Horror flick scream!) NO! Yes. Innocent, unsuspecting shoppers are being lured away from the neon-colored sodas and the radioactive-orange cheese puffs and toward the (shudder) dreaded produce aisle. What are these devious tricks, and how can you outsmart them?
1. Mirrors in your shopping cart. Now that's just mean. There you are, reaching for that bag of cookies, when you happen to look down and see your big face, all puffy from refined sugars and grains. The traumatizing shame spiral forces you to get your sugar fix with bananas and strawberries, which aren't even crunchy. Oh the horror.
2. Passive-aggressive duct tape. At some stores, your grocery cart is divided by bright yellow duct tape and a note telling you to fill the first half with fruits and vegetables. What are you, my mother?!?
3. Big, green arrows. Shoppers habitually head to the right when they enter a grocery store, away from the produce aisle. But when researchers placed big mats with green arrows pointing to the produce section, shoppers go there instead. Like the leek-eating lemmings that we are.
4. Peer pressure. Some grocery carts actually tell you how many fruits and vegetables the other shoppers are buying. So basically you feel like a total loser if you're under-cucumbered relative to the other shoppers. Great. As if the pressure to get a smartphone weren't enough, now we have to keep up with everyone else's celery consumption.
These are real-life tactics some researchers used on unsuspecting customers to try and get them to make healthier choices at the grocery store. And they actually worked. What else could they do to us? I shudder to imagine.
• Funhouse mirrors in the soda aisle.
• Scales you have to step on in order to open the ice cream freezer doors.
• A hologram of Gwyneth Paltrow's disapproving scowl that appears every time you reach for pork bacon.
• A sad trombone sounds loudly and a spotlight shines on you every time you pick up anything high in sodium.
I just have one question. So we're tricked into buying all those fresh fruits and vegetables. Then what, huh? Who's gonna make me cook and eat it all?!?
Do you think these tricks would work on you?
Image via Corey Balazalwich/Flickr | dclm-gs1-009850000 |
Employees of the province's public library system say cuts and job losses will have a negative impact on the services they provide to the public.
A total of 16 jobs have been cut in the province.
Melissa Feaver, manager of technical services at the Corner Brook library, said services for smaller communities may have to change.
"There are a lot of differences in what people in Burgeo need compared to what people in Labrador City need, compared to what they need in Corner Brook," Feaver said.
"Now, a lot of that material, selection and determination of programs and that are going to be left to St. John's or are going to be left to the local sites."
Jessica Prince, the librarian at the Corner Brook Public Library, was one of those recently laid off.
Prince said remaining staff will likely have a hard time operating without a librarian.
"I have wonderful staff, but they can only do so much, you know, in terms of dealing with the situation," Prince said.
"Without my position being there, and with the fact that there are probably going to be cuts to hours, they are not going to have as much time or availability to run as many programs as we have been doing."
Feaver believes the cuts will be a step backward for the library's programs.
"We still believe in this organization, and we still know that there are great things that could be done," she said.
"Unfortunately, with these cuts, it's going to take a number of years before we can start moving forward again."
Education Minister Clyde Jackman said cutting 16 jobs was a difficult decision, but added it enables the government to keep all existing libraries open. | dclm-gs1-009860000 |
Latest failed ticket push shows Jags endangered species in Jacksonville
by | National Columnist
One of my favorite NFL teams is on its deathbed and it saddens me. Their demise will be tragic, frustrating and all but imminent.
The tubes are protruding, the nurses are circling, and the priest is just outside the hospital room.
Tarped off sections have become commonplace in Jacksonville. (Getty Images)
The Jacksonville Jaguars are attempting yet another desperate promotion to get fans to buy season tickets. This one will likely fail, too, like so many before.
The Jaguars are limiting attendance to its August 6 intra-squad scrimmage to season ticket holders only. It was controversial move and the team hoped fans being disallowed from watching the scrimmage would be the football equivalent of putting up ropes and a bouncer outside of a nightclub. It would create a crowd, a buzz, and fans would then sign up for tickets in droves.
It's easy to lose track of how many times the Jaguars have attempted to lure fans with ticket promotions and gimmicks only to be rebuffed. It's because the metrics remain the same as they have for years. The stadium is too large, the fan pool too small and the tickets still too expensive for the targeted populace.
Jacksonville is a beautiful town full of good people hungry for football but hurting in their pocketbooks. No amount of begging for Jaguars fans to buy tickets can change those facts.
The Jaguars represent the official end of the small-market experiment the NFL launched some 15 years ago. Those of us who championed the league expanding to non-traditional markets have to admit we were wrong.
The city of Jacksonville continues to pay the price for the NFL's past expansion greed and current money grab for television revenue. The biggest problem for Jacksonville is that when the schedule expands to 18 games -- which seems inevitable -- it only puts more pressure on the Jaguars to sell tickets.
In fact, an 18-game schedule presents ticket selling challenges to almost every small-market team.
NFL owners, I'm told, are agitated with the Jaguars' situation more than ever and increasingly favor the team moving to Los Angeles, London or even Orlando (assuming there's a new stadium built). My guess is that in two or three years the Jaguars will be moving to Los Angeles.
Jaguars owner Wayne Weaver has publicly stated there's a possibility the team might play some home games in Orlando but has long maintained he won't move the team. I don't expect that promise to hold.
Los Angeles and Orlando aren't panaceas. There's a reason no team has been in L.A. since O.J. went on his slow speed escape but that option is looking more attractive to NFL owners as the blackouts continue in Jacksonville.
Jaguars fans are among the most underrated in the NFL for their passion and football knowledge but cash strapped is cash strapped. The money and populace just aren't there.
Detroit has been a miserable franchise in a city with frightening unemployment over the past few years, yet at one point still had 50 straight sellouts at Ford Field. Why? Because Detroit has five million people to Jacksonville's approximately 1.2 million.
The Jaguars had nine of their 10 home games blacked out last season. Jaguars blogging sites like Big Cat Country say ticket sales are improving but I've heard that before. My friend Pete Prisco, who is based in Jacksonville, thinks I'm crazy to suggest the Jaguars are on the verge of collapse. It's true. I am crazy. Just not about this.
Whether the Jaguars stay in Jacksonville a year or two or three is up for debate. Whether these are the Jaguars' waning days shouldn't be.
Vic Ketchman is the team's website writer. He's one of the most knowledgeable about the NFL and about as non-alarmist as you can get. What he wrote about the Jaguars' ticket sale problems was blunt and honest.
"Ticket sales, not the futures of David Garrard and Jack Del Rio, is the number one issue confronting this team, and it's not about next year's ticket sales or growing the fan base for 2020, it's about selling tickets for this year. This is it," Ketchman wrote.
"This is save the whale and, from my perch on the beach, the whale is struggling to live," he added. "I think everyone would do well to understand that the radical nature of this decision underscores the team's desperation to sell tickets. The team knew this decision would be harshly criticized, yet, it went forward with it. Why do you think it did? If your answer is that we have reached the tipping point, then you are a logical person."
The expectations for Jaguars fans were always set too high. Then the economy tanked and those expectations went from unreasonable to impossible.
It seems only a matter of a few years before the Jaguars are gone.
And that saddens me.
Biggest Stories
CBSSports Facebook Google Plus
Conversation powered by Livefyre
Most Popular Shop
Save an extra 40% Off
All Sale Merchandise
Shop Now | dclm-gs1-009870000 |
Thursday, March 13, 2014
Tuesday, December 16, 2003
Samsung debuts top-capacity 8-GB flash memory
You are sending an email that contains the article
and a private message for your recipient(s).
Your Name:
Your e-mail: * Required!
Recipient (e-mail): *
Subject: *
Introductory Message:
(Photo: Yes/No)
Message Text: Samsung Electronics said Tuesday that it has rolled out an 8-gigabyte NAND-type flash memory chip, the world's largest in capacity.
NAND is a high-density memory chip popular in digital cameras because it writes and erases information quickly. It does not require power to retain information and is used in removable memory for easy printing or downloading. NAND competes with a different flash technology, NOR, which is dominated by Intel Corp. and Advanced Micro Devices Inc. and is also widely used in mobile phones and handheld computers.
Samsung said the new chip was developed through its unique technology of piling four 2-gigabyte NAND flash memory chips in a single package, said the world's largest maker of memory chips.
The multi-player technology was also applied to produce 4-gigabyte chips through the combination of two 2-gigabyte chips, it said.
The development of NAND-type chips will enable Samsung to more flexibly cope with rising demands for flash memory chips which are used for digital cameras, mobile handsets, USB drives, PDAs and MP3 players, company officials said.
The cutting-edge technology will help Samsung secure price competitiveness in replacing the existing small-capacity hard discs and digital camcorder tapes with NAND flash memories, they said.
Samsung, which developed the world's first 70-nano 4-gigabyte NAND flash memory in September, currently controls over 65 percent of the global NAND flash memory market.
A nano is a unit of measurement equal to one-billionth of a meter. In the chip production process, it refers to the output operation of chips smaller than 100-nanometers.
Digital cameras currently account for 90 percent of flash memory chips used, but demands from cell phones and USB drive makers are expected to surge in the coming years.
The global market for NAND-type flash memory chips is expected to grow from an estimated $7.3 billion this year to $11.6 billion in 2005 and $15.1 billion in 2007.
Privacy policy - Contact Us . | dclm-gs1-009880000 |
Memory Lane: When the sky was the limit
Tue, 03/05/2013 - 9:15pm
Stewart Schley Media & technology writer
Satcom 1 was to the cable programming industry what a Beverly Hills ZIP code is to an entertainment lawyer: the most desirable address anywhere. The satellite had 24 transponders, each of which could accommodate one 6 MHz television channel in Satcom 1’s pre-digital, pre-video compression era. With ground-based receiving dishes expensive and cable companies struggling to raise capital to build out their physical networks, being stingy was essential. Cable companies wanted as much programming as they could get from a single satellite so they could limit the number of expensive earth stations they’d have to buy.
RCA, tutored by a cable industry technology executive, Sidney Topol, recognized the possibilities. Although the first domestic communications satellite, Western Union’s Westar 1, had made history three months before by transmitting the famous “Thrilla in Manilla” boxing match to cable systems in Florida, Georgia and Mississippi, RCA had a more advanced business strategy.
It was all about location, tenants and economics. RCA realized that if it could amass enough popular or promising channels over one satellite, it could rise up as the premier inspace destination for cable program delivery. RCA leapfrogged its rival by building double the number of transponders into Satcom 1, allowing it to undercut Westar’s rates per transponder while producing more revenue in total from the satellite. On the ground, Topol’s company, Scientific-Atlanta, would complete the loop by building and selling earth stations to capture the satellite signals.
“It was just an avalanche,” said Topol in an interview conducted by The Cable Center.
“We just couldn't keep up with the production. We were just swamped with earth stations and receivers.” Even so, Topol recounted how Scientific-Atlanta had to effectively subsidize the marketplace by spending $160,000 to build earth stations that it sold to cable companies for $100,000.
Among the early Satcom 1 tenants was a 3-year-old pay-TV service that had previously been distributed over terrestrial microwave relay towers in the Northeastern U.S. Home Box Office had been frustrated by the limited range and poor performance, especially in winter weather, of the microwave network and was convinced that nationwide satellite distribution offered inroads to a bigger market. HBO first rented space on the Westar satellite, but by February of 1976, it moved to Satcom 1.
It wasn’t alone. Within a year of its launch, Satcom 1 boasted a programming lineup that read like an early “who’s who” of the budding cable programming world. Ted Turner’s Superstation WTBS, ESPN and CBN – later rebranded as ABC Family – were among the marquee names. ABC, CBS and NBC also rented transponder space to beam video content to over-the-air affiliates, adopting an alternative to the AT&T microwave and coaxial networks they’d used previously.
“It was a transformational event for the whole industry,” recalled the late Bill Bresnan, a cable industry executive who had signed one of the first big purchase orders for the Scientific- Atlanta earth stations as the president of TelePrompTer Corp. “Prior to the satellite, the industry was made up of a bunch of isolated systems all around the country, and just overnight, as these satellite receivers started popping up, we had a national network. We had an interconnected, national network, which totally changed the industry,” Bresnan said in a Cable Center interview.
By the time Satcom 1 was retired – fittingly, during the National Cable Television Association’s 1984 industry convention in Las Vegas – most of the original Satcom 1 programmers had moved their networks to successor satellites.
Those satellites and their progeny have endured for decades as an essential conduit for cable programming.
That’s beginning to change as terrestrial fiber networks and attractive economics of IP video delivery make it more economical in many instances to transport content on the ground. The fact that there are more ways to move video efficiently today provides a counterpoint to the core business value RCA brought to the marketplace in the 1970s.
It wasn’t just the technological capability of satellites that made Satcom 1 a runaway leader in the cable business.
It was scarcity. With cable’s business model unproven and its capital budgets strained, the industry needed to rally around a common platform. RCA was at the right place at an opportune time with an innovative approach to aggregating content. Funny how even as technology changes, that formula still seems to win.
Share This Story
The password field is case sensitive. | dclm-gs1-009890000 |
Restructuring costs push Alcatel-Lucent into Q3 loss
Fri, 11/02/2012 - 2:18pm
The Associated Press
Restructuring costs and lower sales have pushed telecoms equipment maker Alcatel-Lucent into a third-quarter loss.
Alcatel-Lucent said Friday it lost €146 million ($188 million) in the July-to-September quarter. That's down from a €194 million profit in the same quarter a year earlier. Sales also slid 2.8 percent to €3.6 billion.
Alcatel-Lucent's stock price plunged on a worse-than-expected loss. By mid-morning Paris time, the shares were down 6 percent at €0.77.
The company is on track to report another full-year loss in 2012, a mere year after it finally turned around steep losses stemming from the 2006 merger between France's Alcatel and Lucent of the U.S.
The Franco-American company is in the middle of a €1.25 billion restructuring program aimed at cutting 5,500 jobs, ending unprofitable contracts and leaving, or reorganizing operations, in poor markets.
CEO Ben Verwaayen said Alcatel is making "good progress" on the restructuring and was on track to complete the plan by the end of 2013.
Alcatel-Lucent supplies telecommunication carriers such as AT&T, Verizon and France Telecom. It competes with European rivals such as LM Ericsson AB of Sweden and Nokia Siemens Networks of Finland.
But it has struggled to turn a profit since the 2006 merger. Rounds of cost-cutting helped it make 2011 its first full-year profit since the tie-up.
Share This Story
The password field is case sensitive. | dclm-gs1-009900000 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.