text
stringlengths 16
69.9k
|
|---|
Thoracic myelocystomeningocele in a neurologically intact infant.
To report an uncommon and a rare case of a high congenital spinal anomaly with an unusual presentation. This is a case presentation with relevant radiological and operative findings. This lesion is a differential diagnosis of cystic congenital spinal mass lesions. This case is an example of a high congenital spinal lesion with very minimal or negligible neurological deficits, with no other congenital malformations.
|
Q:
Need to get application folder
I need to get my application directory and add a file name to that path. So I used it this way.
String kofaxTextFilePath = Path.GetDirectoryName(Assembly.GetAssembly(typeof(File)).CodeBase) + "\\KofaxBatchHistory.txt"
So it will give a path like this.
“file:\\C:\\Documents and Settings\\MyApplication\\ KofaxBatchHistory.txt”
But I need to get only
C:\\Documents and Settings\\MyApplication\\ KofaxBatchHistory.txt
With out doing any thing to this string is there any method to get it directly?
A:
string myDir = System.Reflection.Assembly.GetExecutingAssembly().Location;
myDir = System.IO.Path.GetDirectoryName(myDir);
String kofaxTextFilePath = System.IO.Path.Combine(myDir, "KofaxBatchHistory.txt");
|
@ With the exception of Link standby, none of the below texts are used
gTest_MissedTurn:: @ 827E8CE
.string "Missed turn$"
gText_LinkStandby4:: @ 827E8DA
.string "Link standby!$"
gText_WinnerIsPlayersMonCongrats:: @ 827E8E8
.string "The winner is {STR_VAR_1}'s {STR_VAR_2}!\n"
.string "Congratulations!$"
gText_WinnerIsPlayersMon:: @ 827E910
.string "The winner is {STR_VAR_1}'s {STR_VAR_2}!{PAUSE_UNTIL_PRESS}$"
gText_PrimaryJudgingNumX:: @ 827E929
.string "Primary judging: No. {STR_VAR_1}{PAUSE_UNTIL_PRESS}$"
gText_SecondaryJudgingNumX:: @ 827E943
.string "Secondary judging: No. {STR_VAR_1}{PAUSE_UNTIL_PRESS}$"
gText_SetEventNumX:: @ 827E95F
.string "Set event: No. {STR_VAR_1}{PAUSE_UNTIL_PRESS}$"
gText_MoveUsedMostOften:: @ 827E973
.string "The move used most often:\n"
.string "{STR_VAR_1}{PAUSE_UNTIL_PRESS}$"
gText_MostImpressiveMon:: @ 827E992
.string "The most impressive POKéMON:\n"
.string "{STR_VAR_1}'s {STR_VAR_2}{PAUSE_UNTIL_PRESS}$"
gText_SetEventNumX2:: @ 827E9B9
.string "Set event: No. {STR_VAR_1}{PAUSE_UNTIL_PRESS}$"
gText_LinkTVProgramWillNotBeMadeTrainerLost:: @ 827E9CD
.string "A link TV program will not be made\n"
.string "because the TRAINER lost.{PAUSE_UNTIL_PRESS}$"
|
Over the past twenty years, computer technology has evolved very rapidly. One aspect of this evolution has been a progressively growing demand for increased storage capacity in memory devices. In order to provide high storage density at a reasonable cost, one of the most enduring techniques has been to provide a rotatable hard disk that includes a layer of magnetic material, and a read/write head which is supported for movement adjacent the disk.
In arrangements of this type, if the head is exposed to airborne dust, smoke, vapors or other contaminants, these contaminants can progressively build up on the head. Eventually, the buildup becomes sufficient to interfere with the interaction between the head and disk, thereby increasing the error rate until the device will not operate. In order to avoid this problem, most hard disk drives have the disk and head disposed within a sealed enclosure, so that the head and disk are not exposed to any airborne contaminants that may happen to be present externally of the enclosure.
This approach works well where the entire hard disk drive is permanently installed in a computer. In another type of system, however, a hard disk is provided in a removable cartridge, and it is desirable that the cartridge not include the read/write head. In this regard, there are advantages to placing a head stack assembly (HSA) and its support structure within the drive which receives the cartridge, rather than in the cartridge. For example, a typical user will have several removable cartridges for each drive. Thus, in terms of overall system cost, it is cheaper to provide a single head stack assembly and support in the drive, rather than to provide several separate head stack assemblies which are each disposed in a respective one of the many cartridges used with that drive. However, this presents problems in regard to keeping the head clean.
More specifically, in order to permit the head from the drive to access the disk within the cartridge, the cartridge is not provided with a sealed enclosure of the type discussed above. Instead, the cartridge is provided with an opening through which the head of the drive can be inserted into the cartridge. In some cases, a movable shutter is provided to obstruct the opening when the cartridge is not in the drive, but the shutter is open when the cartridge is in the drive. Thus, in either configuration, when the cartridge is in the drive, the opening gives not only the head but also ambient air access to the disk and head. Consequently, any dust, smoke, vapor or other contaminant carried by the ambient air can get inside the cartridge enclosure, and the operational surface of the head can quickly develop a buildup of contaminants.
The effect of this buildup can be ameliorated to some extent by keeping the storage density of the hard disk in the removable cartridge at a relatively low level, in comparison to the levels used for hard disks located within sealed enclosures. However, as mentioned above, the commercial marketplace is exhibiting a strong and progressively increasing demand for high-density storage in a removable cartridge.
A further consideration is that existing high-density read/write heads typically have an operational surface with recesses therein. While it is not too difficult to clean the outermost portions of the operational surface of such a head, it is more difficult to clean other portions of the surface which are within the shallow recesses. As contamination collects in the recesses, it can significantly degrade system operation.
|
I propose to engage in several activities, all designed to illuminate the etiology of neoplastic disease. I will supervise case-control studies in test of specific etiologic hypotheses suited to that method. The first will be of pancreas cancer in relation to diet and atopic disease, and of aggressive (metastatic or invasive through the myometrium) endometrial cancer in relation to exogenous estrogen use. I will continue to develop a registry of twins with cancer and perform co-twin studies of breast cancer, colon and other GI cancer, malignant melanoma, and other neoplasms. I will perform follow up on unaffected twins in relation to their stated exposures, and utilize population-based twin registries in California and Sweden for various adjunct studies. I will begin a cohort study in high risk individuals designed to elevate the determinants and implications of acquired benign pigmented lesions. I will continue to use cancer and registry information for descriptive studies, including estimation of the observed and expected rates of conjugal site-specific cancer, of the incidence among those residing near geographic foci of contamination with toxic wastes, and of disease-specific concordance in twins and the implications for interpretation of familiality and heritability. Finally, I will design a program to facilitate laboratory investigations making use of material from twins in the registry; such a program could provide a unique integration of high quality epidemiologic study design and "state of the art" lab techniques.
|
Q:
uniq in underscore.js is not working
Kindly check this fiddle, uniq() function has no effect. Tried separating the function but still unable to work it out. The JSON was flattened first then I used uniq.
A:
From the Underscore.js documentation:
Uniq
Produces a duplicate-free version of the array, using === to test object equality. If you know in advance that the array is sorted, passing true for isSorted will run a much faster algorithm. If you want to compute unique items based on a transformation, pass an iteratee function.
So you can try and use a function to transform the object into a comparable value. For example:
var res = _.chain(data)
.flatten()
.uniq(function(v){ return v.mycount + v.mytype })
.value();
|
The role of Müller glia and microglia in glaucoma.
Cells of Müller glia and microglia react to neuronal injury in glaucoma. The change to a reactive phenotype initiates signaling cascades that may serve a neuroprotective role, but may also proceed to promote damaging effects on retinal neurons. Both effects appear to occur most likely in parallel in glaucoma, but the underlying mechanisms and signaling pathways that specifically promote protective versus destructive roles of reactive glial cells are mostly unclear. More research is needed to understand the homeostatic signaling network in which retinal glia cells are embedded to maintain or restore neuronal function after injury.
|
Income Inequality May Be Here to Stay
The gap between the Haves and the Have-Nots is growing larger almost every day. Workers are giving more and more but getting less and less in return. But this story is about much more than one group making more money than the other – it is about the system being rigged to the point that we have US citizens dying every single day because they can’t afford the basic necessities that the rest of us take for granted.
|
Crystalline Structure, Synthesis, Properties and Applications of Potassium Hexatitanate: A Review.
Potassium hexatitanate (PHT) with chemical formula K2Ti6O13 has a tunnel structure formed by TiO2 octahedra sharing edges or corners and with the potassium atoms located in the tunnels. This material has attracted great interest in the areas of photocatalysis, reinforcement of materials, biomaterials, etc. This work summarizes a large number of studies about methods to prepare PHT since particle size can be modified from millimeter to nanometric scale according to the applied method. Likewise, the synthesis method has influenced the material properties as band-gap and the final mechanical performance of composites when the reinforcement is PHT. The knowing of synthesis, properties and applications of PHT is worthwhile for the design of new materials and for the development of new applications taking advantage of their inherent properties.
|
Q:
TextField, Labels and ComboBox INSIDE Drop Down Pane in Java Swing
Java Swing: I recently started learning Swing and I want to add several labels, one button, and three combo box INSIDE A Drop Down Pane! When the user clicks the drop down pane, you can see labels, textfields and comboboxes which will contain the values and when the users clicks drop down pane again, then all the textfields, labels etc are hidden. Is it possible and if yes then could you please help me out (code would be very much appreciated). If you did not understand the design then please visit emirates.com and click on 'Book a Flight'! I'll be trying to implement that type of design
A:
If you want a multi-row data display object, and you want multiple interactable components on the row, don't use the wrong tool, a JComboBox, for this. Use a better tool: a JTable.
|
stichomancy
Stichomancy (literally, divination from lines) is the practice of seeking answers to the great metaphysical questions, as well as trying to gain insight into the meaning of existence and reality, by reading random passages from a book such as the Bible or the I Ching.
|
[Content of selected prostanoids in the rabbit myocardium as effected by izadrin].
The content of stable metabolites of prostacyclin and thromboxane A2 in the rabbit myocardium in normal conditions and after single izadrin injection (comparison of survived and dead animals) has been comparatively analyzed. It has been shown that in all the cases izadrin injection induces the synthesis of these prostaglandins. But the cases with lethal outcome are characterized by predominance of the thromboxane-synthetase activity. The revealed peculiarities of prostaglandins synthesis in myocardium need experimental check on the isolated heart.
|
The aim of the project is to use epidermal cell cultures as a primary screen for evaluation of biological activity of new synthetic vitamin A analogs, as well as for further elucidation of the mechanism of action of vitamin A.
|
Bartender Wisdom: 'More Than Just a Drink'
We've referred to bartending in the past as a paint-by-numbers game. You can fill those numbers with any color you like and it will always make a picture. Sometimes it will be gorgeous, sometimes it won't. But it'll always work.
Listening to what someone wants and giving them what they want means more in New York. People like that.
We work in a tequila bar, but a bulk of our drinks aren't necessarily tequila-based. Some people recall a bad college memory. I have some of my own.
I know which way Kyle is going to move if I need to get around him, to hold still while he reaches. It's almost like a dance for us.
If I look over and I see a group of girls flirting, responding really well to him, I think, Way to go, Kyle. He made their night. That's great.
When we go to a bar, we want more than just a drink. We can make a drink at home. A lot of our bar patrons can pour a vodka soda at home, and a lot of them can make their own Manhattan exactly how they want it. You go out to the bar because you want the whole experience.
Most of our family thinks we jumped off the deep end. Our parents don't drink. The last thing our parents drank was a Harvey Wallbanger. Or whatever they had back then.
I always had this haunted feeling when I was working in the corporate world. I wanted to do something creative. You don't get creative in finance. You get in trouble, usually.
Bartending is not an industry that is susceptible to economic times. Maybe people will spend less on what they're going to drink, but they're still going to drink.
The world of alcohol brightens as many souls as it darkens. But I think it brightens more so.
A Part of Hearst Digital Media
Esquire participates in various affiliate marketing programs, which means we may get paid commissions on editorially chosen products purchased through our links to retailer sites.
|
As world leaders honored Paris‘ dead and wounded at the G20 conference at the seaside Turkish resort of Antalya, one place was noticeably empty.
In an act that could be charitably described as a breach of decorum—or seen as an unforgivable slight to those who perished in Friday’s terror attacks, President Obama arrived late to the conference room for Monday’s session.
A video posted to Youtube shows the seat beside Turkish President Recep Tayyip Erdogan, reserved for the American president, was empty as Erdogan called the group to observe a moment of silence.
In the video, the placard to the right of the Turkish leader was clearly labeled “United States” in front of a very empty chair. German Chancellor Angela Merkel was shown looking over her shoulder, as if to see where the missing Obama might be.
As the group rose, the U.S. president could be seen walking to his seat from the right as the other leaders stood in silence. Later in the video, Obama was shown standing next to Erdogan, behind his chair.
Despite being late to the session, later in the day Obama tried to spin the most heinous loss of civilian life in Paris since Hitler as a mere “setback” in the war against the Islamic State.
Watch the video of Obama strolling in late, below.
|
Q:
Is it possible to find event fire chain in java?
I wanted to know do events have a priority in being fired or they are fired in the order they were registered?
For example I have a table and has two events on it,SelectionChanged and MouseClick,which one fires first if I click on a row?
A:
See the class EventQueue. This class has all what you need, including the origin event (mouse or key event) for your selection event.
|
the kiss of death
I will called them " Godzuto " (I just sayyyyyyyyyyyying (~ ̄▽ ̄)~ )I ship them since I first saw he gave her(n˘v˘•)¬ and ship them hard when I read this Fanfiction The Hokmuto will pissed off if he's sees this moment (Γಠ‿ಠ)Γ
|
Gelatin is a protein material produced by hydrolysis of collagen from animal bones and connective tissues. Gelatin has served as an encapsulating material, a coating for pills, an emulsifying agent, a coating for photographic materials, a bacterial culture medium, a component of printers' rollers and hectograph plates, an ingredient of popular desserts, and for many other widely varied uses.
One common use for gelatin is in the manufacture of soft gel capsules for the delivery of active ingredients. Although gelatin is generally strong and tough, its extensibility and flexibility are generally low. In addition, since gelatin is derived from animal sources, there are often inconsistencies in product quality from batch to batch. The physical and chemical properties of gelatin are a function of the source of the collagen, method of manufacturing, conditions during extraction and concentration, thermal history, pH and the chemical nature of impurities and additives. Moreover, during storage, gelatin often undergoes a crosslinking reaction which in turn changes the dissolution character and the drug bio-availability characteristics. This shortens the useful life of the gelatin. Thus, mechanical failures of gelatin soft gel capsules are often encountered. Additionally, the use of animal derived materials, such as gelatin, has come under regulatory review due to concerns regarding the transmission of animal based illness.
Accordingly, new materials are desired which can function as replacements for gelatin, particularly gelatin based films useful for manufacturing soft gel capsules and the like.
|
Separation and identification of acylated leuprorelin inside PLGA microspheres.
Studies have shown that the N-terminus and lysine side residue of peptides are prone to acylation in poly(d,l-lactide-co-glycolide) (PLGA) microspheres. Peptides such as leuprorelin lack a free N-terminus or lysine and only contain serine, arginine, and tyrosine as nucleophilic residues. The purpose of this study was to detect potential acylation impurities and determine their corresponding acylation sites in commercial leuprorelin-loaded PLGA microspheres. Commercial samples from three vendors were selected as targets for our study. The high-performance liquid chromatography (HPLC) conditions of the European Pharmacopoeia were used to separate and collect impurities. HPLC-tandem mass spectrometry (HPLC-MS/MS) was applied to confirm both the structure and acylation sites of the impurities. Our study demonstrated that impurities originating from both degradation of microspheres and synthesis of leuprorelin were well separated and identified using these HPLC conditions. HPLC-MS/MS analysis of acylated leuprorelin showed that diglycoyl, lactoyl-glycoyl, dilactoyl, and monolactoyl groups were conjugated to serine in leuprorelin-loaded PLGA microspheres. This is the first report showing serine to be the acylation site in peptide-loaded PLGA microspheres. Separation and identification of acylated leuprorelin derivatives will assist in minimising acylation and guiding the development of quality control for commercial leuprorelin-loaded PLGA microspheres.
|
Over at the Washington Post‘sPostPartisan blog, Jonathan Bernstein discusses the rising influence of the “Ron Paul crowd” on Republican state party platforms. Bernstein cites a derisive piece from Ed Kilgore on a draft platform being considered by the Iowa Republican Party:
A new policy paper from my colleague Michael Tanner analyzes the growth in the American welfare state and concludes that “throwing money at the problem has neither reduced poverty nor made the poor self-sufficient.” Michael makes an important point that—in my experience—most journalists don’t seem to appreciate:
My new piece at ForeignPolicy.com on Ron Paul and the Republican Party focuses on the strong support that Paul draws from young people, with some additional speculation about where those young people will end up, if and when Paul steps back from his very public role.
|
Q:
insert edittext between two other edittexts with inflater
I am totally new to android and programming, and you have helped me a ton so far. I have hit another roadblock,however. (sure there are many more to come)
I am adding edittexts dynamically with the layoutinflator to a vertical linearlayout.
When i select an edittext in the middle and hit the button to inflate another edittext, I need to know how to insert the new edittext directly below the one that is selected, pushing the rest down, instead of adding it after the last one added.
Thanks in advance for your valuable time,
Chris
A:
LinearLayout has an addView(View view, int index) method which you can use to put new view into it at specific position.
|
Jon Stewart Says BYU’s Brandon Davies Doesn’t Exist
In segment called “Tales Of Principled Behavior” TV host Jon Stewart commented on Bringham Young University’s decision to suspend one of their best players Brandon Davies. After the college hoopster confessed to having consensual premarital sex with his girlfriend, the notoriously strict institution kicked Davies out of school for violating the campus honor code. While Stewart praised the school for sticking to their guns he couldn’t help but have some fun at their expense.
“BYU suspended one of their best players right before the NCAA tournament because he had consensual sex with his girlfriend,” Stewart explained. “You know what they call a Division I athlete that limits his sex to either just his girlfriend, or, just to consent? A fictional character.”
|
I used to work with old guys, now, I am one.
Pages
Black & White and Monochrome
Well, the day Bernie feared finally came. Not only was it embarrassing, but, really, did the event have to happen on a day the temperature was below freezing? Lucille asked Bernie if he was happy to see her or was he taking those blue pills again?
|
Work-related musculoskeletal injury and suicide: opportunities for intervention and therapeutic jurisprudence.
This article presents evidence for the existence of a common trajectory from work-related musculoskeletal injury to suicide. Specifically, it is argued that the pathway from injury to suicide is typically mediated by three critical events: unsuccessful return to work; the development of chronic pain or disability; and suicidal ideation in the context of chronic pain. The moderating influence of systemic factors is also examined, along with opportunities for intervention at the individual and systemic levels, the latter arising from a therapeutic jurisprudence perspective.
|
Q:
Why opensource database like Postgresql and Mysql don't have encrypted stored proc?
Why opensource database like Postgresql and Mysql don't have encrypted stored proc?
Is it because of their innate open source philosophy?
What are the compelling reasons to encrypt the stored procs?
A:
While I'm sure encrypted stored procs are a simple matter of programming in PostgreSQL at least (MySQL and stored procs do not have a long history together), with PgSQL's custom languages support, I don't see why this would be useful. They would need to be decrypted at some point to execute them so anyone who administers the database/database server would be able to, with sufficient skill, be able to get the unencrypted sp. The DBA can already see all the data, all the relationships, seemingly making obfuscating the SP code pointless.
A:
if this is a really cool feature (I have never used it, nor needed it), I suggest you register a new feature request in the repected mailing lists.
Postgresql:
http://www.postgresql.org/community/lists/
MySQL:
http://lists.mysql.com/
A:
Properly because nobody has had a need for it.
|
Search form
Shannon Portillo
Shannon Portillo, Ph.D. is an Assistant Professor and Undergraduate Program Coordinator at the University of Kansas School of Public Affairs and Administration. Dr. Portillo takes an interdisciplinary approach to her work pulling on organizational theories rooted in Public Administration and Law and Society to explore how rules and policies are carried out within public organizations. To date she has done work in a broad array of organizations including problem-solving courts, probation, restorative justice programs, administrative hearings, policing, higher education and city management. Using a variety of methods, she collects empirical data to assess how social, cultural and legal factors influence the day-to-day operations in these organizations. Teaching and research interests include social equity, social justice, organizational theory, and legal mobilization. Her work has appeared in Law & Policy, Administration & Society, Law & Social Inquiry, Journal of Public Administration Research & Theory and Public Administration Review.
|
Fashion's Night Out
FASHION'S Night Out is one of the industry's biggest nights, with cities around the world simultaneously celebrating all things fashion - so needless to say London's finest were out in force. Bond Street - Old and New - became a catwalk, packed to bursting point with stylish shoppers sporting their very best so they could impress our Street Chic snapper.
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
gallery-expand
Hardeep Chohan, PR
"I'm wearing a Nom De Mode top and skirt with a Dior bag."
Dvora
Hardeep Chohan, PR
"I'm wearing Alaia shoes."
Dvora
Verity Curtis, fashion blogger
Beauty Chic - "My make-up is a mix of Becca and Chanel."
Dvora
Verity Curtis, fashion blogger
"My top is by Giambattista Valli and I'm wearing it with an American Apparel top underneath and an Erdem skirt. My shoes are by Charlotte Olympia and my bag is by Proenza Schouler."
Dvora
Jessica Hannan, marketing editor
"I'm wearing a vintage dress with a bag from Topshop and shoes by Aldo."
"I am wearing a Kitson sweater, a Zara skirt, and I am carrying a Celine bag. My jewellery is from my own brand LeiVanKash."
Dvora
Leila Kashanipour, jeweller
"My boots are by Laurence Dacade."
Dvora
Lily Silverton, editor
"I'm wearing a New Era hat borrowed from my little brother, a yellow Topshop sweater and silver top, and a shirt I borrowed from my Grandma. My skirt is vintage, my shoes are by Pierre Hardy, the ribbon is from Miriam Elia and I am carrying a Chloe bag."
Dvora
Naomi Lake, make-up artist
"I am wearing a Staple for the Cool Kids dress and bag, and Topshop shoes. My jewellery is a mixture of Topshop and One Vintage, and my make-up is all MAC."
|
Q:
cl-who: using a variable in with-html-output-to-string
All the examples I've seen so far for cl-who work like this:
(with-html-output-to-string (s)
(:HTML (:HEAD (:TITLE "hello")) (:BODY (:DIV "world"))))
Which works fine.
However, I wanted to use with-html-output-to-string with a variable, instead of a hardcoded html tree; if *p* has (:HTML (:HEAD (:TITLE "hello")) (:BODY (:DIV "world"))) and I do this
(with-html-output-to-string (s)
*p*)
I get "" as a result.
I guess that as with-html-output-to-string is a macro, it's last argument is never evaluated.
Is there any way I can get around this?
A:
Use cl-who:str; check the examples at http://weitz.de/cl-who/#example.
If you do:
(with-html-output-to-string (s)
(str *p*))
you'll get the expected output.
|
Q:
Designs and practices to guard against erroneous null entries from database
One part of my program fetches data from many tables and columns in my database for processing. Some of the columns might be null, but in the current processing context that is an error.
This should "theoretically" not happen, so if it does it points to bad data or a bug in the code. The errors have different severities, depending which field is null; i.e. for some fields the processing should be stopped and somebody notified, for others the processing should be allowed to continue and just notify somebody.
Are there any good architecture or design principles to handle the rare but possible null entries?
The solutions should be possible to implement with Java but I didn't use the tag because I think the problem is somewhat language-agnostic.
Some thoughts that I had myself:
Using NOT NULL
Easiest would be to use a NOT NULL constraint in the database.
But what if the original inserting of the data is more important that this later processing step? So in case the insert would put a null into the table (either because of bugs or maybe even some valid reason), I wouldn't want the insert to fail. Let's say that many more parts of the program depend on the inserted data, but not on this particular column. So I would rather risk the error in the current processing step instead of the insert step. That's why I don't want to use a NOT NULL constraint.
Naively depending on NullPointerException
I could just use the data as if I expect it to be always there (and that should really be the case), and catch resulting NPEs at an appropriate level (e.g. so that the processing of the current entry stops but not the whole processing progress). This is the "fail fast" principle and I often prefer it. If it is a bug at least I get a logged NPE.
But then I lose the ability to differentiate between various kinds of missing data. E.g. for some missing data I could leave it out, but for others the processing should be stopped and an admin notified.
Checking for null before each access and throwing custom exceptions
Custom exceptions would let me decide the correct action based on the exception, so this seems like the way to go.
But what if I forget to check it somewhere? Also I then clutter my code with null checks which are never or rarely expected (and so definitely not part of the business logic flow).
If I choose to go this way, what patterns are best suited for the approach?
Any thoughts and comments on my approaches are welcomed. Also better solutions of any kind (patterns, principles, better architecture of my code or models etc.).
Edit:
There is another constraint, in that i am using an ORM to do the mapping from DB to persistence object, so doing null checks on that level would not work (as the same objects are used in parts where the null does not do any harm). I added this because the answers provided so far both mentioned this option.
A:
I would put the null checks in your mapping code, where you build your object from the result set. That puts the checking in one place, and won't allow your code to get halfway through processing a record before hitting an error. Depending on how your application flow works, you might want to perform the mapping of all the results as a pre-processing step instead of mapping and processing each record one at a time.
If you're using an ORM then you'll have to perform all your null checks before processing each record. I'd recommend a recordIsValid(recordData)-type method, that way you can (again) keep all the null-checking and other validation logic in one place. I definitely wouldn't intermingle the null checks with the rest of your processing logic.
A:
It sounds like inserting a null is an error but you are afraid to enforce this error on insertion because you don't want to lose data. However, if a field shouldn't be null but is, you are losing data. Therefore the best solution is to ensure that null fields are not erroneously getting saved in the first place.
To this end, enforce that the data is correct in the one authoritative, permanent repository for that data, the database. Do so by adding not null constraints. Then your code might fail but these failures immediately notify you of bugs, allowing you to correct issues that are already causing you to lose data. Now that you are easily able to identify bugs, test your code and test it twice. You'll be able to correct bugs leading to data loss and in the process, greatly simplify downstream processing of the data because you won't need to worry about nulls.
A:
In regard to this sentence in the question:
This should "theoretically" not happen, so if it does it points to bad data or a bug in the code.
I have always appreciated this quote (courtesy of this article):
I find it amusing when novice programmers believe their main job is preventing programs from crashing. I imagine this spectacular failure argument wouldn't be so appealing to such a programmer. More experienced programmers realize that correct code is great, code that crashes could use improvement, but incorrect code that doesn't crash is a horrible nightmare.
Basically: it sounds like you are endorsing Postel's Law, "be conservative in what you send, be liberal in what you accept". While great in theory, in practice this "robustness principle" leads to software that is not robust, at least in the long term -- and sometimes in the short term as well. (Compare Eric Allman's paper The Robustness Principle Reconsidered, which is a very thorough treatment of the subject, albeit mostly focused on network protocol use cases.)
If you have programs that are incorrectly inserting data into your database, those programs are broken and need to be fixed. Papering over the problem only allows it to continue to get worse; this is the software engineering equivalent of enabling an addict to continue their addiction.
Pragmatically speaking, though, sometimes you do need to enable "broken" behavior to continue, at least temporarily, especially as part of a seamless transition from a lax, broken state to a strict, correct state. In that case, you want to find a way to allow the incorrect insertions to succeed, but still allow the "canonical" data store to always be in a correct state. There are various ways to do this:
Use a database trigger to convert malformed inserts into correct inserts, e.g. by replacing missing/null values with defaults
Have the incorrect programs insert into a separate database table that is allowed to be "incorrect", and have a separate scheduled process or other mechanism that moves corrected data from that table into the canonical data store
Use query-side filtering (e.g. a view) to ensure that the data retrieved from the database is always in a correct state, even if the data at rest is not
One way to sidestep all of these issues is to insert an API layer that you control between programs that issue writes and the actual database.
It sounds like part of your problem is that you don't even know all the places that are generating incorrect writes -- or that there are simply too many of them for you to update. That's a scary state to be in, but it should never have been allowed to arise in the first place.
As soon as you get more than a handful of systems that are allowed to modify data in a canonical production data store you are going to be in trouble: there is no way to centrally maintain anything about that database. Better would be to allow as few processes as possible to issue writes, and use those as "gatekeepers" that can preprocess the data before inserting as necessary. The exact mechanism for this really depends on your specific architecture.
|
Many services offered to users via the Internet, such as email services, provide a web interface (“webclient”) that allows users to interact with a server using a web browser. User connectivity to such servers is facilitated by one or more web servers (typically Hypertext Transfer Protocol (HTTP) servers) that retrieve data in response to user web page requests and host web applications. Mail servers and web servers are typically located in a data center or some other facility remote from the user. Redundancy is usually built into such systems, with redundant servers providing service in the event of a failure of a primary server and redundant communications links connected to the Internet to provide service in the event of a failure of one or more communications links.
When a user attempts to access an email system using a webclient, the webclient connects to a web email application hosted by an HTTP server and sets up a communications session with the HTTP server. Upon initiating such a session, some form of authentication is normally required by the HTTP server. This may take the form of a username and password combination, access key, token, or some other form of user identity verification. Upon authenticating the user, the HTTP server may provide access to the user's email account and information on the mail server via the web email application hosted by the HTTP server. If there is a failure of the HTTP server hosting the web email application being used by the webclient, or if the connection between the HTTP server and the webclient fails, the webclient is likely to be directed to a backup HTTP server hosting another web email application. When this happens, the user may have to provide authentication information again because the user's authentication information has not been received by, or stored at, the backup HTTP server.
|
The structure of acnistin B and the immunosuppressive effects of acnistins A, B, and E.
The structure of the new withanolide:acnistin B, isolated from Dunalia solanacea, has been established by NMR experiments and the immunosuppressive effects of acnistins A, B and E on human lymphocytes have been measured.
|
What is Spirituality?How does it figure in success?
What is Spirituality?
Listen, success arises as much from spiritual abilities as from intellectual means, yet too often we shy away. We think that a spiritual person will go on and on about God, or their religion, or their church. We think that they will repeat the dogma that we were exposed to early in life. Frankly, too many of us have had enough of that already!
So again, What is Spirituality? Why is the issue of spirituality important to success?
If we want to have the benefits of being successful, (you know, the nice house, the new car, the holidays, the reputation and so on), well, how does that tie in with what everyone tells us that the "good" people do?
Don't good people give their time and money to charitable activities?
When good people get money, don't they give it to the poor people?
Doesn't that make them poor too?
Isn't it good to be poor? Isn't that what we're told when we're small? I mean...
...won't us poor folk eventually inherit the earth or something?
Now, I don't mind admitting, I wasn't sure about inheriting the earth, but an advance payment wouldn't have gone amiss!
What is Spirituality?
Let's build up from basics. Here's how it goes:
Spirit
...What is Spirituality?...picture courtesy PDP
If we want to define "Spirit", there are two essential aspects:
Spirit is incorporeal; It is body-less, floating about, free of any physical encumbrance. (Think of a ghost that wanders through walls etc.)
Spirit is the "essence" of a thing;It is the defining elements, the core of a thing, the identifying aspects, the real, often unchanging centre of a thing. So we talk about a child being a "happy" spirit, or a neighbour being a "kindly" spirit.
Spiritual
If we talk about someone being spiritual, what we are saying is that they are operating or acting from their spirit, from their core. They are acting from their own "truth" of who they are.
We understand that at some level they recognise and have an awareness of their own "truth". A large part of that "truth" is that their "essence" defines a great deal of who they are, what they do, and how they live their life. And, from that perspective, they are able to have some awareness of the "truth" (or true nature, or essence) of other people, and other existences.
...we exist inseparably with those things...picture courtesy PDP
In other words, we start to see ourselves as one life that cannot exist separately from other lives.
We have an individual existence and we have a joint existence.
And those two existences cannot exist independently.
I cannot exist without interacting with other existences - not necessarily people, a dog has an existence, a tree has an existence, a rock has an existence. If we deepen our understanding of the spirit of those things then we also deepen our understanding of ourselves, because we exist inseparably with those things.
"Yes, but isn't 'spirit' something to do with God? Or religion? Or something like that?" I hear you ask.
The answer is both yes, and no!
Some people believe in a deity or deities that created the universe and everything in it, including humankind. In exploring the nature of this 'god', (and I use the term generically, and singular implying plural as required) common themes emerged.God is:
creative
omnipotent (all-powerful)
omnipresent (present everywhere)
all-knowing
and significantly, always the same, never-changing, constant in essence.
In short, 'god', has essence and an existence that can only be incorporeal - body-less. 'God' has to be 'spirit' to accommodate a 'god-nature'!
If someone acted in accordance with the predominant, widely accepted, conventional ideas of what constituted 'god', i.e. what a religion proclaimed 'god' to be, that person's spirit was likened to the 'god-spirit'. They were, 'spiritual'.
Spirituality
So, at last, What is Spirituality?
Spirituality is the actual act of acting from the core, from their own awareness of who they really are.
It may help to point out that answering "What is Spirituality?" is the process of acting from the core, whilst "Spiritual" is the nature of acting from the core.
Spirituality is concerned with "what" the act is; spiritual is concerned with "how" the acting from the core is done.
So how does Spirituality figure in success?
Having tackled "What is Spirituality?", we need to explore its benefits, especially in relation to how it can make our lives better.
Spirituality gives us other perspectives on life. And sometimes, other perspectives can help us.
So far through the Success Foundations section of this site, we've looked at our lives from:
a physical perspective,
an intellectual perspective and
an emotional perspective.
By and large, those perspectives look at life from the point of view of the individual. The individual assessing their own physical existence, their own intellect and rational mind, and their own emotions.
A spiritual perspective however sees an individual life as being inseparable from all other existences.
A spiritual perspective lets us share that common existence, and allows us to see our individual life from the perspective of those around us in a deep and meaningful way.
We can assess what our boss, our partner, our parents, our children, our neighbours, our dog, our garden, our car, could determine about the essence of our being by observing the way we talk, the way we act, the way we express ourselves.
In being able to see ourselves from those perspectives, we open ourselves to a feedback mechanism that allows us to adjust the way we present ourselves to the world.
If we return to our idea of a creative, omnipotent, omnipresent, all-knowing and constant 'god', we can also conjecture a look at our life from the perspective of 'god', and in so doing, move our spirit closer to that god-ideal. In essence (no pun intended), spirituality moves us closer to being more 'god'-like! It moves us toward being creative, omnipotent, omnipresent, all-knowing and constant.
That's not such a bad thing!
Here's the clever incidental bit about understanding "What is Spirituality?"
It is in developing those different ways of "seeing" how others see us - our spirit - that we start to discover, develop and understand things like:
our core beliefs
other people's belief systems
values
our thought processes
hunches
co-incidences
synchronicity
intuition
symbolic meanings
psychic phenomena
lucid dreaming
precognitive dreaming
mind reading
remote viewing
faith healing
holistic healing
Of course, the list is not complete. Exploring spirituality is an ongoing voyage of discovery. Much of what you'll learn along the way will help in understanding and reaching success. But, in the final analysis, your spiritual nature - your "spirituality" - is unique to you, that voyage of discovery is unique to you.
That means, that you are the only person who can really answer "What is Spirituality?
|
[Malignant bowel obstruction].
Malignant bowel obstruction (MBO) is a frequent complication in patients with a progressive malignant disorder and represents a major interdisciplinary challenge in palliative care. Gastroenterology plays a pivotal role in the management of MBO. After appropriate diagnostic work-up, it is important to define treatment goals with the patient and his/her relatives, which should focus on symptom relief. Therapeutically, surgical, endoscopic and medical options are available. These will be introduced based on case reports. In the international literature MBO is being more and more considered as a distinct entity. The aim of the present review is to communicate MBO as such in the German medical literature.
|
Trains can't dodge, and neither can our planet
|
Molecular evidence for pap-G specific adhesion of Escherichia coli to human renal cells.
To study the interaction between class II G-adhesin of Escherichia coli and human urogenital cells. The adherence of two wild type P-fimbriated E. coli strains, both carrying a class II G-adhesion, and two constructed mutants (one class II G-adhesion knock-out mutant and one class switch mutant in which the papG gene was exchanged with a prsJ96 allele which is a representative of the class III G-adhesin) to human urogenital cells were examined by light microscopy and flow cytometry. The wild type E. coli strains adhered avidly to proximal tubular cells, but the isogenic mutant strains did only adhere in one of the experiments. A soluble receptor analogue inhibited bacterial attachment. These experiments strongly suggest that the papG class II tip adhesin of P-fimbriae is essential in the pathogenesis of human kidney infection.
|
package B with
Abstract_State => (State,
(Atomic_State with External))
is
procedure Read_State (X : out Boolean);
procedure Read_Atomic_State (X : out Boolean);
end B;
|
import effects.basic
import effects.basic1
val b = basic()
val b1 = basic1(b)
b1.m5()
|
The present invention relates to a resonator-type surface-acoustic-wave filter with reduced insertion loss.
The resonator-type surface-acoustic-wave filters (referred to below as resonator-type SAW filters) considered in the present invention have the well-known ladder circuit configuration. The ladder configuration does not require a matching circuit, and has such further advantages as low loss, high attenuation, and narrow bandwidth, but there is a trade-off between loss and attenuation. If the ladder configuration contains only one stage, or a small number of stages, insertion loss is low but attenuation in the stopbands may be inadequate. With a large number of stages, stopband attenuation improves but insertion loss increases, and the filter becomes large in size.
A known solution to this problem couples one or more additional SAW resonators in series with the ladder circuit to improve the stopband attenuation. The present invention addresses this problem in the upper stopband, so the conventional solution would be to provide an additional SAW resonator with frequency characteristics adapted to improve the attenuation in that stopband. This solution is unsatisfactory in the following respects. First, the additional SAW resonator increases the insertion loss to some extent. Second, impedance matching characteristics are worsened, because the resonant frequency of the additional SAW resonator lies above the passband of the filter. (This is because the antiresonant frequency of the additional SAW resonator must be higher than the antiresonant frequency of the SAW resonator or resonators in the series arm of the filter.) Third, the additional SAW resonator increases the size of the filter.
|
FAMILIJNY – SOFT daily face and body care cream – 300ml
Master of day-to-day care
A delicate cream with silk proteins, vitamin E, allantoin and a UVB filter is recommended for the daily care of every skin type, also dry skin and susceptible to drying due to various external factors. It brings good effects; if used after daily hygienic routines, it deeply moisturises the face and body skin, giving it a pleasant and long-lasting feeling of freshness and smoothness.
What else is worth knowing about the FAMILIJNY – SOFT daily face and body care cream?
• It was dermatologically tested
• It gently regulates skin oiling, making it soft and elastic
• It is easy to spread and absorbs quickly owing to the oil in water formula
Master of day-to-day care
A delicate cream with silk proteins, vitamin E, allantoin and a UVB filter is recommended for the daily care of every skin type, also dry skin and susceptible to drying due to various external factors. It brings good effects; if used after daily hygienic routines, it deeply moisturises the face and body skin, giving it a pleasant and long-lasting feeling of freshness and smoothness.
What else is worth knowing about the FAMILIJNY – SOFT daily face and body care cream?
• It was dermatologically tested
• It gently regulates skin oiling, making it soft and elastic
• It is easy to spread and absorbs quickly owing to the oil in water formula
|
A comparison of intergestural patterns in deaf and hearing adult speakers: implications from an acoustic analysis of disyllables.
Coarticulation studies in speech of deaf individuals have so far focused on intrasyllabic patterning of various consonant-vowel sequences. In this study, both inter- and intrasyllabic patterning were examined in disyllables /symbol see text #CVC/ and the effects of phonetic context, speaking rate, and segment type were explored. Systematic observation of F2 and durational measurements in disyllables minimally contrasting in vocalic ([i], [u,][a]) and in consonant ([b], [d]) context, respectively, was made at selected locations in the disyllable, in order to relate inferences about articulatory adjustments with their temporal coordinates. Results indicated that intervocalic coarticulation across hearing and deaf speakers varied as a function of the phonetic composition of disyllables (b_b or d_d). The deaf speakers showed reduced intervocalic coarticulation for bilabial but not for alveolar disyllables compared to the hearing speakers. Furthermore, they showed less marked consonant influences on the schwa and stressed vowel of disyllables compared to the hearing controls. Rate effects were minimal and did not alter the coarticulatory patterns observed across hearing status. The above findings modify the conclusions drawn from previous studies and suggest that the speech of deaf and hearing speakers is guided by different gestural organization.
|
Q:
Is it possible to have non-trainable layer in Keras?
I would like to calculate constant convolution like blurring or resampling and want it never change during training.
Can I initialize convolution kernel to constant and exclude it from training in Keras?
More specifically, I don't want to use this for purposes declared in the doc. I want to implement residual network this way: one branch does normal trainable convolution, while parallel branch does something constant, like averaging.
A:
You should be able to pass a trainable = False argument to your layer definition, or set the layer.trainable = False property after creating your layer. In the latter case you need to compile after the fact. See the FAQ here.
You can then set constant weights for the layer by passing a kernel_initializer = initializer argument. More information on initializers can be found here. If you have a weight matrix already defined somewhere, I think you will need to define a custom initializer that sets the weights to your desired values. The link shows how to define custom initializers at the bottom. Something as simple as the following might work, assuming you have my_constant_weight_matrix defined:
def my_init(shape, dtype=None):
# Note it must take arguments 'shape' and 'dtype'.
return my_constant_weight_matrix
model.add(Conv2D(..., kernel_initializer=my_init)) # replace '...' with your args
That said, I have not verified, and when I did a Google search I saw a lot of bug reports pop up about layer freezing not working correctly. Worth a shot though.
|
[Use of a new double lumen catheter within the scope of intensive care medicine].
A new double-channelled catheter with one main canal lumen and an accessory small lumen and its different ranges of applications are discussed. Reactions of incompatibility and possible changes in efficacy between drugs and infusions can be provided with this new form of a central-vein-catheter.
|
Q:
Porting security from Java/.NET to PHP
This probably a rather naive question given my limited knowledge in the code I've been looking at, but I want to get my head around it before I start diving into writing actual code myself.
I'm writing a common set of tools for PHP and most of my inspiration has come from the .NET framework. The ironic thing is that I have never used the .NET framework, but I do understand C# and can therefore port the concepts I "do" understand from Mono.
But I have run into a bit of a wall, System.Security. As I browse over the API docs, and the Mono security implementations on Github, I quickly feel like none of features could ever be applied to PHP. My current confusion is as follows:
PermissionSet ps1 = new PermissionSet(PermissionState.None);
ps1.AddPermission(new FileDialogPermission(FileDialogPermissionAccess.Open));
Console.WriteLine(ps1.ToXml().ToString());
So here is a basic example. What I want to do in PHP is create an application partially governed by permissions on the "environment" level. That is to say, one machine shouldn't be able to perform certain actions that another might. For instance, machine A, shouldn't be allowed to TCP to machine B.
But when I look at the code in the example, I don't really understand why it makes any difference. My current understanding is that this is not "setting" the permissions, but "checking" them. And the permission itself is predefined somewhere else, I.E. in the machine.
I have looked over Java's implementation of the same feature, and side by side .NET looks a lot more in-depth. I would like to incorporate this concept into my own PHP code, but right now I don't know how I would do it.
Are the permissions entirely arbitary? does .NET "impose" restrictions? or simply provide security diagnostics to the application? If the last one is true, then porting to PHP is not only possible, but may actually be quite useful. However I know that in PHP, the second one is impossible.
Could someone please clear up what the Java and .NET security namespaces do, and give me an idea of how feasible it is to port to other languages.
A:
Every language has a runtime which connects your code with the outside world. In the case of Java and .NET, this runtime includes a security model. E.g. if a Java application wants to open a file, that request has to pass through the runtime. The runtime can then deny that request. Note that this is not implemented on a library level within the language, but on a language implementation level. From within the runtime, you can only check what you are allowed to do, but not grant yourself new permissions.
Therefore, you can't just implement a security model in another language: you security layer would need some way to perform the security-sensitive action, but that same way would be available to any other code in that language, so your security layer could be bypassed. Instead, this security model needs to be in the runtime itself (in the case of PHP, this would be the interpreter in the default implementation).
I have seen one exception: Perl's Safe module can control which opcodes are available to a piece of code being compiled, which can serve as a coarse sandbox. Here, the runtime doesn't itself provide the security model, but the dynamic nature of the runtime is exploited to implement a security model on top of it.
PHP does have a couple of sandboxing mechanisms: E.g. Runkit can restrict the functions that can be called by a sandboxed piece of code. A common sandboxing technique is also to override built-in functions by versions that check permissions, but that only works as long as there is no way to get the original version back. This can be a viable approach when rewriting compiled code to be sandboxed, but rewriting-based security approaches are prone to miss obfuscated calls.
|
Closed chains, chain nets, snow chains, protective tire chains, and other chain systems are not adjustable in terms of length and width (in the case of grid or ladder chains) unless the chain is opened and/or individual chain links are opened in order to remove or add chain links. The same applies for jewelry chains.
Many variants for connecting the last links in a finite chain by way of a special connecting element are also known in the art. Such a connection becomes necessary most frequently when chains break; for example, breaks on snow chains of motor vehicles or on protective tire chains of utility vehicles operating in stone quarries and similar environments. The problem that emerges when two ends of a broken chain must be connected is the fact that, most of the time, no suitable tools are available on site where the break occurred in order to install a regular chain link that was cut open for that purpose and must be welded closed again after having been inserted. Welding on the wheel is generally not possible because this may cause damage to the tire. Any removal of the chain armor from protective chains is extremely complex and creates, moreover, costs associated with the disruption of operations during the disassembly, repair work, and new installation.
Accordingly, repair chain links are already known in the prior art that can be connected to the links of the broken chain right on the vehicle. The repair chain links are often comprised of a ring with an overlapping thread that extends over a certain area in the way of a helical line. Chain links of this type can be inserted directly on the wheel into the outermost-lying chain links and then pressed together with the assistance of a strong pair of pliers. Also known are, furthermore, repair links that feature an (open) C-form; the only way to guide them around the neighboring chain links is with a pair of pliers, and then they must be bent in a backward direction. Reconnecting a broken chain without the use of tools is not possible with any of the known prior art repair links. Moreover, the repair links are usually only a short-term solution because, since they must be bendable after installation, they may not be manufactured of a hardened material. At a later time they must be replaced at a repair shop with other durable links. This requires additional expense.
|
Severe pulmonary hypertension associated with primary Sjögren's syndrome.
Severe pulmonary hypertension is one of the fetal complications in various connective tissue diseases. We report a case of severe pulmonary hypertension associated with primary Sjögren's syndrome. In a lung biopsy specimen, there were findings of intimal and medial hypertrophy with narrowing vessel lumina and plexiform lesions. Moreover, deposits of immunoglobulin M, immunoglobulin A and complement protein C1q were found in the pulmonary arterial walls. Although pulmonary hypertension was refractory to oral prostacyclin, steroid therapy improved the clinical and hemodynamic conditions. In the present case, the immunological etiology may be related to the mechanisms of pulmonary hypertension associated with Sjögren's syndrome.
|
<resources>
<!-- Default screen margins, per the Android Design guidelines. -->
<dimen name="activity_horizontal_margin">16dp</dimen>
<dimen name="activity_vertical_margin">16dp</dimen>
<dimen name="water_button_image_size">80dp</dimen>
</resources>
|
Episode notes
Just in time for Halloween, we have the amazingly talented Alice Waddington (director Paradise Hills) on the program to talk about Logan’s Run. She discusses creating specific fantasy worlds, being inspired by Logan’s Run, and the pleasures of working with Awkwafina. We also get Vulture associate editor, Jordan Crucchiola, on the line to talk about what horror films we should check out this Halloween.
Paradise Hills is in theaters and streaming on November 1st.
And if you haven’t seen Logan’s Run, you simply must!
With April Wolfe, Alice Waddington, and Jordan Crucchiola.
You can let us know what you think of Switchblade Sisters on Twitter or Facebook.
Or email us at switchbladesisters@maximumfun.org.
Produced by Casey O’Brien and Laura Swisher for MaximumFun.org.
|
Related stories
Pixar has recently updated its software suite. The new Pixar film, "Brave," was made with it. Because of that, it's a more expensive film than the ones before it, which, Catmull says, have each cost less than the first Pixar release, "Toy Story."
"It was a massive effort. We didn't have to do it." In fact, he says, "most companies that try to upgrade their software fail. But you need to do stuff that is just out there. It gets your head to a different place."
Pixar President Ed Catmull
Rafe Needleman/CNET
Obviously not a proponent of complacency, he adds, "If you get settled, the goal is to get the process right. And the process subverts your more radical nature."
He tells the audience that most films in Hollywood have to do well in the "elevator test," a concept familiar to entrepreneurs. Films, he said, have to do well in the elevator pitch to get funded. But, he says, "If we pass the elevator test, we don't want to make the movie."
What's next for Pixar? Catmull doesn't know. He hopes for "new kinds of looks. I don't know what they are."
He refers back to technology as an artistic stimulus: "Much of the technological push is to allow new imagery into the screen, to stimulate the imaginative process. Integration of technology into a story enriches both."
|
12A/13A: There seems to be some sort of a mix-up. While VERSATILE for 'endowed with many skills' might work, it definitely works as an answer for 'flexible relatives being flexible' (anag of relatives, def = versatile).
21A: again, should be { ... chief OF advisors ...}
7D: I think it works, with 'rise' as a noun. Although, not particularly fond of a reverse clue, where the fodder isn't explicitly given.
Great points all, Mohsin! I really like the analogy for explaining why E=pot doesn't work. And great work spotting the fact that the clue for 12a actually works to give the answer for 13a - my guess is that the setter wanted to replace the clue for 13a and ended up replacing the clue for 12a instead, which has left D?A?O?I? without a proper clue!
Sadly, the mix-ups draw attention away from what *are* very good clues: e.g., 4a, 9a, 16a, 25a, and (the seemingly sadistic!) 20d!
|
A plating shop typically generates a waste stream that includes nickel, chromium, copper, zinc, cyanide, and other ions. Current technology for treating a waste stream from a plating shop generally involves separating the waste stream into alkaline, acid, chromate and cyanide waste streams. The cyanide stream is made strongly alkaline and is treated with a hypochlorite (bleach) to totally destroy the cyanide. The chromate containing stream is treated with metabisulfite or sulfur dioxide in order to reduce the hexavalent chromium to the trivalent state. Then all streams are combined and made strongly alkaline. This forces all the heavy metals to precipitate as oxides and hydroxides. Usually a flocculant is added to encourage full precipitation.
At this point the precipitates can be filtered out of the combined waste stream. Then the stream is neutralized with an acid. The treatment system is complex, including many tanks; feed loops, under automatic control, for introducing reagents to these tanks; impellers or equivalent devices for adequate mixing of reagents with the waste streams; and at least one filter press for separating the water from the precipitated metals. Not infrequently, the whole system is under computer control. Plating wastes treated in this manner typically meet requirements for discharge into water courses and sanitary sewers. The sludges generated are generally trucked to a sanitary landfill.
It can be readily appreciated that the system described above is large, costly, and requires massive quantities of chemicals for its operation. Further it is not readily amenable to treatment of acid mine waste and clean up of hazardous waste sites. The types of systems suitable for treating acid mine wastes, for recovering metals, and for removing heavy metals from the soil at hazardous waste sites vary considerably from the typical plating waste treatment system described above. Such systems are typically designed for each specific application and so no generalized design can be given.
Development of a treatment system which can remove heavy metals and other harmful contaminants from plating waste streams, acid mine wastes and hazardous waste sites or recover valuable metals in a simple and economical manner represents a great improvement in the field of waste treatment and satisfies a long felt need of the waste treatment industry.
|
^E:\PYTHON\MNIST_TEST\ADABOOST\SIGN\SIGN\X64\RELEASE\SIGN.OBJ
E:\PYTHON\MNIST_TEST\ADABOOST\SIGN\X64\RELEASE\SIGN.DLL
E:\PYTHON\MNIST_TEST\ADABOOST\SIGN\X64\RELEASE\SIGN.PDB
|
[Plethysmography in venous pathology].
The plethysmography is an easy and precise and therefore interesting non invasive investigation technique in search for deep venous obstructions. It is giving a well defined picture of the venous function and offers the possibility to differentiate most of the cases with a post-thrombotic syndrome from primary varicosis and to make the follow-up of the surgical treatment of venous anomalies.
|
Q:
PHP how to get list of all defined variable?
How to get the list of defined variables and its values. eg define('DS', DIRECTORY_SEPARATOR);
How can I list all of them at the end of page to check all of them working as expected. Instead of printing all of them one by one.
I've tried get_defined_vars() But I'm getting all Super Global variables like below.
Array
(
[GLOBALS] => Array
(
[GLOBALS] => Array
*RECURSION*
[_POST] => Array
(
)
[_GET] => Array
(
)
[_COOKIE] => Array
(
[PHPSESSID] => tkv7odk47idt4r2ob7389tkr81
[CAKEPHP] => cep9tbooimh5kbhn8jovmaqgi1
)
[_FILES] => Array
(
)
[_SERVER] => Array
But I want only those which I've mentioned using the define() statement.
Is there any way of getting it.
A:
You can get this by using get_defined_constants
$constarray = get_defined_constants(true);
foreach($constarray['user'] as $key => $val)
eval(sprintf('$_CONSTANTS[\'%s\'] = \'%s\';', addslashes($key), addslashes($val)));
|
Q:
How to send data to a php script page during jQuery load and accept the data
I have a php function that builds a list of items for me. Im not sure but i read that you cant call a php function explicitly though jQuery/js.
So i saw that you can still call php pages like this:
$("#name").click(function(){
$("#div").load("script.php");
});
If i can call a php page like that, is there also a way to send it a URL when that page is loaded like this?
$("#name").click(function(){
$("#div").load("script.php", 'http://gdata.youtube.com/feeds/');
});
also another problem comes up that how do i make the script accept that string through from jQuery?
normally when you call a function you pass parameter with the call like so:
<?php makeList( 'http://gdata.youtube.com/feeds/' ); ?>
//on the function-side
<?php
function makeList( $feedURL )
{
//...stuff that uses $feedURL...
}
?>
Since i will make the function a script that runs upon being called how would i pass it a parameter?
I have no idea if this is possible or not and i would understand if this creates tons of security issues which makes it not acceptable.
A:
You have the $.get and $.post methods in jQuery.
$.post('script.php', { url: 'http://gdata.youtube.com/feeds/' }, function(data) {
//data will hold the output of your script.php
});
The url is posted to your PHP script and you can access it through $_POST['url'].
|
You put hour upon grueling hour into this, that much is clear; however, this is absolutely not my "kind" of mindfuck. In fact, I was deeply disturbed by the imagery and immediately google searched fluffy puppies to ease the pain and horror that your evil film radiates. If i could, I would holy sword of justice your film and obliterate or purify it. Likely, I will never have the chance to do such, so instead I will leave you with these words:
"Unexpressed emotions will never die. They are buried alive and will come forth later in uglier ways"
-Sigmund Freud
also
"Our greatest pretenses are built up not to hide the evil and the ugly in us, but our emptiness. The hardest thing to hide is something that is not there."
-Eric Hoffer
lastly
"The world needs anger. The world often continues to allow evil because it isn't angry enough."
-Bede Jarrett
|
Q:
FireBase - angularfire setting object key as variable
I am using firebase(angularfire) in my angularjs app to store and process my message system but can't seem to figure out how to replicate the example data from the firebase docs
// room members are easily accessible (or restricted)
// we also store these by room ID
"members": {
// we'll talk about indices like this below
"one": {
"mchen": true,
"hmadi": true
}
}
Here the members.one contains the user name as a key and I am trying to do this for my data as well but can't seem to figure out a solution.
The members portion of my firebase data is like so:
members { one: { } }
I have two variables set in the $scope.
user_name = kep; //person chatting with name
sender_name = pek; //current user name
So I want to use the set function to insert data into members.one or in this case members.user_name + ':' + sender_name but where I am having trouble is how to actually insert the data without creating a parent object.
ref.child('members').child(user_name + ':' + sender_name).set({
user_name: true, sender_name: true
});
The problem arises when I try to pass user_name and sender_name into the set() function below is the result it gets.
members { "kep:pek": { user_name: true, sender_name: true }}
where as I want it to be:
members { "kep:pek": { kep: true, pek: true }}
If I put user_name and sender_name into an object and then run the set() function with the object passed it will create the following structure which is not what I am looking for:
members { "kep:pek": { newObject: { kep: true, pek: true }}}
A:
Firebase team member here.
The Firebase Database is a just a JSON document.
So let's say you want to structure your data this way:
{
"members" : {
"kep:pek" : {
"kep" : true,
"pek" : true
}
}
}
A custom key is created by using the .child() method, or by creating a key in the JavaScript Object.
JSBin Demo
var rootRef = new Firebase('<my-firebase-app>');
var membersRef = rootRef.child('members');
var user_name = 'kep';
var sender_name = 'pek';
// child object to store custom keys
var objectToSave = {};
// set keys in [] syntax
objectToSave[user_name] = true;
objectToSave[sender_name] = true;
// use .child() with a formatted string to save the object
membersRef.child(user_name + ':' + sender_name).set(objectToSave);
|
Explore Merriam-Webster
Origin and Etymology of gall
Middle English galle, going back to Old English gealla, galla, going back to Germanic *gallōn-, galla- (whence Old High German & Old Saxon galla, Old Norse gall), going back to Indo-European *ǵholh3-n- (whence, without the suffix, Greek cholḗ "bile, bitter hatred," chólos "bitter hatred, wrath," Avestan zāra- "bile"), a derivative of *ǵhelh3- "green, yellow" — more at 1yellow
Note:The sense "boldness," first attested in the U.S. in the second half of the 19th century, is perhaps of independent origin.
gall
Definition of gall
Origin and Etymology of gall
Middle English galle "sore on the skin, stain, evil, barren or wet spot in a field (in names)," probably in part going back to Anglian Old English *galla (West Saxon gealla) "sore on the skin of a horse," in part borrowed from Middle Low German galle "swelling in a joint, blastodisc, barren place," both nouns going back to Germanic *gallan- (whence also Old Norse galli "fault, flaw"), perhaps going back to an Indo-European base *ǵholH-, whence, from the derivative *ǵholH-r-, Norwegian galder "windgall," Old Irish galar "disease, pain," Welsh galar "mourning, grief"
Examples of gall in a Sentence
It galls me that such a small group of people can have so much power.
move that rope so the sharp edge of the hull doesn't gall it
Origin and Etymology of gall
Middle English gallen, in part derivative of galle2gall, in part borrowed from Middle French galer "to scratch, rub, mount an attack on," derivative of gale "gallnut, callus," borrowed from Latin galla4gall
Origin and Etymology of gall
Note:Latin galla cannot be akin to 2gall if the latter does in fact descend from Indo-European *ǵholH-, and in any case the basic meaning of galla appears to be "excrescence" rather than "sore, blight."
|
Billy Hutchinson Slams McGrory Over ‘Winky’ Rea Subpoena
The following is a statement issued by the progressive Unionist Party today.
‘McGrory sabotages efforts to ‘deal with the past’ PUP Leader Cllr Billy Hutchinson slams the DPP for his political witch hunt of Winston Rea.
PUP leader Billy Hutchinson
The Progressive Unionist Party utterly condemns attempts by the DPP Barra McGrory to raid the Boston College history archive in a malicious and flagrantly political fishing expedition against Winston Churchill Rea.
Mr Rea, who as a representative of the PUP, made a very significant and widely acknowledged contribution to the peace process; from ceasefires to decommissioning and the political architecture which facilitated them in between.
Party Leader Cllr Billy Hutchinson slammed the effort, “This malicious abuse of process before the courts is just another in the long history of ‘balancing’ exercises where Loyalists have been singled out, not on merit but for the optics of appearing independent to a political audience. Internment, collective punishment, shoot to kill, historic investigations, the past is replete with instances where Loyalists have suffered punitive measures for the sake of appearance rather than requirement.
After the arrests of high profile Republicans relating to the Jean McConville investigation, Barra McGrory has abused his authority in an effort to appear, rather than to be, balanced. A previous subpoena request listed Winston Rea and a Republican in the very same circumstances. When that subpoena failed due to lack of evidence, the Republican’s name mysteriously disappeared and the token Loyalist required for public consumption remained. Unfortunately that Loyalist happened to be Winston Rea.”
He continued, “The distinct lack of evidence in this case is the starkest indication that the judicial process is being used in an exercise of political window dressing. Winston Rea’s rights under the ECHR are being subjected to the unfettered will of the DPP as he continues his overtly political agenda. We need not look to far back to be reminded of a mass supergrass show trial or the ‘On the Runs’ debacle. Perhaps if Winston Rea had been a Republican, he would have received a letter of comfort rather than an international subpoena.
Barra McGrory, North’s DPP
Had this material been deposited in a UK University, lack of evidence would have quashed the case long before it reached the eyes of a judge. International legal cooperation has allowed Winston Rea’s Human Rights to be subject to the whims of this DPP by virtue of legal loophole.
I would further caution that Barra McGrory’s efforts will lay waste to any hope of ‘dealing with the past.’ The Stormont House Agreement called for an oral history archive and an information recovery process. Both were to be underpinned by strict confidentiality, yet here the DPP seeks to run roughshod over a similar attempt to understand the past and the confidentiality that gave birth to it.
After this evidently politically motivated witch-hunt against Winston Rea, who is likely to engage in the structures envisaged by that Agreement? The understandable mood within Loyalism suggests no-one. But then that outcome was obvious to the DPP in his duty to consider the public interest. Thus, the deeper question arises – who does this serve?”
Cllr Hutchinson concluded, “With the DUP content to get their Stormont budget passed, is dealing with the past to be left to Sinn Fein’s revisionists and any other version of history suppressed by their stacked process? These questions are central to the success of any search for truth or recovery of information; the cabal of the First Minister, Deputy First Minister and DPP need to think long and hard about the implications of their answers.”
|
Q:
correct syntax for using Dispatcher to switch to UI thread
What is the difference between
Dispatcher.CurrentDispatcher.Invoke(somemethod);
and
Application.Current.Dispatcher.Invoke(somemethod);
When I use the first one the execution of somemethod is way faster than the second one.I used stopwatch and measured elapsed milliseconds.I use this method to update some UI controls based on some data coming from external thread.
A:
Dispatcher.CurrentDispatcher will get you dispatcher associated with current thread on which you are invoking this method.
Whereas Application.Current.Dispatcher will get you dispatcher associated with UI thread (assuming you App is launched from UI thread).
In essence if you are invoking delegate from background thread and try to update UI component from it say
textBlock.Text = "Test";
First approach will fail because it will invoke delegate on background thread dispatcher and UI components can only be modified from UI thread.
Second approach will work because it will delegate task on UI thread.
When I use the first one the execution of somemethod is way faster
than the second one.I used stopwatch and measured elapsed
milliseconds.I use this method to update some UI controls based on
some data coming from external thread.
If first approach worked for you then there is no need to use Dispatcher at all because that means you are already on UI thread.
And you need to post sample data for your observation of timings so it can be validated.
|
Blade Runner: The Final Cut had a screening last night at the Jules Verne Adventure Film Festival, and Warner Bros. decided to host the after-party at the famous Bradbury Building in downtown Los Angeles. io9 was there, snapping photos and gawking. If you've seen the film, then you know it's the rat-infested condemned shithole where J.F. Sebastian lived. Let's party! Check out our huge gallery of pictures after the jump.
|
The enzymes responsible for repairing DNA damage also function in several biologically significant pathways such as DNA replication, genetic recombination, and mutation fixation; and are thus directly implicated in the oncogenic process. Not only is little known about the repair of ionizing radiation-induced damages in DNA, but the chemical nature of these damages remains to be elucidated. The proposed research would be undertaken in an effort to define the molecular mechanisms involved in the repair to X-ray-induced damages in DNA using T4 bacteriophage and its Escherichia coli host as model systems. To this end, the DNA synthetic patterns of the recombinational repair deficient T4 x and y mutants have been examined, and the existence of aberrant DNA replicative intermediates established. An attempt will be made to isolate the products of the x and y genes by a complementation assay. Further, the E. coli X-ray endonuclease will be purified, and its properties delineated. Lastly, irradiated phage DNA will be repaired in vitro by purified enzymes of known specificities, and assayed for biological activity by transformation or transfection.
|
Q:
Scala. Split line regex returns unexpected empty String
Please see the example below. I create a multiline String and then try to split it. It works fine except the first line. By default split method doesn't return delimiters. So, I wonder what is so special about the beginning of the line that it returns "". And how to update the regex to avoid it.
scala> val Shakespear =
| """
| |To be,
| | or not
| |to be:
| """.stripMargin
Shakespear: String =
"
To be,
or not
to be:
"
scala> Shakespear.split("""[\s]+""")
res3: Array[String] = Array("", To, be,, or, not, to, be:)
Thanks.
A:
Instead of updating regex, how about trim the white spaces at both ends, and then split:
Shakespear.trim.split("\\s+")
// res22: Array[String] = Array(To, be,, or, not, to, be:)
As for why you have an empty string, you have a new line character at the beginning of the string which is also captured by \\s, and splitting on it gives you an empty string since there is nothing in front of the delimiter.
Here is the raw representation of your string (escape borrowed from here):
def escape(raw: String): String = {
import scala.reflect.runtime.universe._
Literal(Constant(raw)).toString
}
escape(Shakespear)
// res24: String = "\nTo be,\n or not\nto be:\n "
If you don't want to split on new line character, use " " instead:
Shakespear.split(" ")
//res26: Array[String] =
//Array("
//To", "be,
//", or, not
//to, "be:
//")
|
import React from 'react';
import PropTypes from 'prop-types';
import { NavLink } from 'react-router-dom';
function ProfileSubNavItems({ routes, isLOA3, isInMVI, clickHandler = null }) {
// Filter out the routes the user cannot access due to not being in MVI/MPI or
// not having a high enough LOA
const filteredRoutes = routes.filter(route => {
let eligibleRoute = true;
if (route.requiresLOA3 && !isLOA3) {
eligibleRoute = false;
}
if (route.requiresMVI && !isInMVI) {
eligibleRoute = false;
}
return eligibleRoute;
});
return (
<ul>
{filteredRoutes.map(route => {
return (
<li key={route.path}>
<NavLink
activeClassName="is-active"
exact
to={route.path}
onClick={clickHandler}
>
{route.name}
</NavLink>
</li>
);
})}
</ul>
);
}
ProfileSubNavItems.propTypes = {
isInMVI: PropTypes.bool.isRequired,
isLOA3: PropTypes.bool.isRequired,
routes: PropTypes.arrayOf(
PropTypes.shape({
path: PropTypes.string.isRequired,
name: PropTypes.string.isRequired,
}),
).isRequired,
// Optional handler to fire when a nav item is clicked
clickHandler: PropTypes.func,
};
export default ProfileSubNavItems;
|
What are the causes of Prebycusis?
Sensorineural hearing loss is caused by disorders of the inner ear or auditory nerve. Presbycusis is usually a sensorineural hearing disorder. It is most commonly caused by gradual changes in the inner ear. The cumulative effects of repeated exposure to daily traffic sounds or construction work, noisy offices, equipment that produces noise, and loud music can cause sensorineural hearing loss. Sensorineural hearing loss is most often due to a loss of hair cells (sensory receptors in the inner ear). This can occur as a result of hereditary factors as well as aging, various health conditions, and side effects of some medicines (aspirin and certain antibiotics).
larger image
Presbycusis may be caused by changes in the blood supply to the ear because of heart disease, high blood pressure, vascular (pertaining to blood vessels) conditions caused by diabetes, or other circulatory problems. The loss may be mild, moderate, or severe.
Sometimes presbycusis is a conductive hearing disorder, meaning the loss of sound sensitivity is caused by abnormalities of the outer ear and/or middle ear. Such abnormalities may include reduced function of the tympanic membrane (the eardrum) or reduced function of the three tiny bones in the middle ear that carry sound waves from the tympanic membraine to the inner ear.
This website uses cookie or similar technologies, to enhance your browsing experience and provide personalised recommendations. By continuing to use our website, you agree to our Privacy Policy and Cookie Policy.
OK
|
import { createStore } from "redux";
import rootReducer from "../reducers/index";
// Configure store with reducers and create
const store = createStore(rootReducer);
export default store;
|
President Donald Trump has accidentally appeared on stage alongside a doctored image of the US presidential seal which seemed to mock his love of golf and the controversy over Russian links.
The version that appeared behind Mr Trump during a speech had the eagle at the centre of the seal carrying a number of golf clubs rather than arrows.
The eagle also had two heads rather than one, bearing a resemblance to Russia's coat of arms, which features the heads of two birds turned away from each other.
The image formed part of the backdrop as Mr Trump took to the stage for a speech to the conservative student group Turning Point USA on Tuesday.
CNN reported that an audiovisual aide for the group had been fired after the blunder, with a source telling the broadcaster that there was “zero malicious intent”.
It was claimed that one of the group’s team had searched on Google for a version of the presidential seal to use for the video display and had accidentally selected the wrong image.
|
Peskov: Putin and Erdogan are working to restore trust
The leaders of Russia and Turkey, Vladimir Putin and Recep Tayyip Erdogan, have done a lot of work to restore mutual trust and are successfully collaborating. This was stated by Putin’s press secretary, Dmitry Peskov, in an interview for the program “News on Saturday.”
“President Putin sufficiently trusts President Erdogan,” Peskov remarked. He added that the leaders of the two countries “are discussing the most sensitive topics related to the situation in the region and bilateral relations.”
Peskov went on: “I think that, of course, this mutual trust could be destroyed very easily and very quickly. Restoring trust takes time but without a doubt the two countries’ presidents have come a long way in this regard.”
From August to October this year, Putin and Erdogan met three times at various events. In addition, the two leaders have held a large number of telephone negotiations.
|
Localized choroidal thickness variation and pigment epithelial detachment in dome-shaped macula with subretinal fluid.
The objective of this report is to demonstrate that individuals with dome-shaped macula can develop persistent subretinal fluid due to abrupt changes in the thickness of the choroid, making it unlikely to be reported. Additionally, these patients often have pigment epithelial detachments, suggestive of possible choroidal neo-vascularization. These two qualities can often lead to persistent subretinal fluid that is refractory to treatment.
|
Q:
How to add or hide prop based on condition in Vue.js?
I have a header component where I have some props.
<Header
:next="gonext"
:isSuccess
...
/>
method: {
isTshirt(){
return this.productType ==='t-shirt'
}
}
How can I check if the above isTshirt condition is true then remove :next prop and it's value completely otherwise use that prop?
A:
You can create a conditional statement inside next prop
:next="(isTshirt()) ? gonext : undefined"
or you can put the conditional statement above in a computed property.
|
Evaluation of the in-vivo activity and toxicity of amarogentin, an antileishmanial agent, in both liposomal and niosomal forms.
The antileishmanial property of amarogentin, a secoiridoid glycoside isolated from the Indian medicinal plant Swertia chirata, was examined in a hamster model of experimental leishmaniasis. The therapeutic efficacy of amarogentin was evaluated in free and two different vesicular forms, liposomes and niosomes. The amarogentin in both liposomal and niosomal forms was found to be a more active leishmanicidal agent than the free amarogentin; and the niosomal form was found to be more efficacious than the liposomal form at the same membrane microviscosity level. Toxicity studies involving blood pathology, histological staining of tissues and specific enzyme levels related to normal liver function showed no toxicity. Hence, amarogentin incorporated in liposomes or niosomes may have clinical application in the treatment of leishmaniasis.
|
package docker
const (
// DockerEndpoint is the name of the docker endpoint in a stored context
DockerEndpoint = "docker"
)
|
Our Partners
WFCM“As an expression of God’s love and an opportunity to share the Gospel of Jesus Christ, Western Fairfax Christian Ministries (WFCM) provides life-essential support to those needing our assistance.”
FACETS
FACETS opens doors by helping parents, their children, and individuals who suffer the effects of poverty in Fairfax County.
Church World Service
Church World Service is people reaching out to neighbors in need near and far–not with a hand out, but a hand up. So, if you’re looking to help build a better world—a world where there’s enough for all—you’ve come to the right place! CWS is working with partners in the U.S. and around the world to build interfaith and intercultural coalitions to eradicate hunger and poverty and promote peace and justice. Together, we’re supporting sustainable grassroots development, disaster relief, and refugee assistance.
|
Custom Home Design
Begin the journey with us to design and build the home of your dreams. Contact us today for more information on yournew custom dream home!
Whether we are building on your lot or on one of our lots, when Sublime Homes, builds your custom home you’re assured of high quality materials, precise workmanship, and the best value for your new home. We offer a professional approach to home construction that allows you, to work hand in hand with a talented and experienced designer and builder. Let's get started today.
FOR MORE INFORMATION ONDESIGNING AND BUILDING A CUSTOM HOMEREGISTER BELOW
|
Walking Around
Yesterday, this quote showed up in my inbox.I read in a book that a man named Christ went about doing good. It is very disconcerting to me that I am so easily satisfied with just going about. (Toyohiko Kagawa)
It gave me pause.
How do I walk through my day?
What am I content with?
Do I intentionally and consciously think about doing good?
I like to think I do, but in reality probably not.
Most days I am satisfied with just going about.
I would like to change that.
|
Pepperoni
This super chill dog is looking for a second chance. We hear he gets along great with others and is very affectionate with his people (he loves to give gentle kisses). He hasn’t yet been cat tested so we suggest a feline-free home. This guy would basically fit in anywhere because of how calm and relaxed he is – he’s still getting used to car rides but we’re sure that’ll come with practice. As he never got proper training in his former life, he will need a bit of house-breaking but again, this guy is worth the time and effort.
If you’re looking for a waddling snuggle bug, then Peppe is your man. Apply to adopt him by filling out an application!
|
Mobile devices such as cellular phones typically include a bottom connector that is used for both data programming and battery charging. Some connectors also include a cover for the connector or port to prevent water or dust intrusion and to otherwise protect the connector or port from the environment. Such connectors also include a mechanical attachment scheme that can include latches or hooks that can eventually fail over time.
|
######################################################################
# Cloud Routes Web Application
# -------------------------------------------------------------------
# SaltStack Generic Modules - Forms Class
######################################################################
from wtforms import TextField, SelectField
from wtforms.validators import DataRequired, URL
from ..base import BaseReactForm
class ReactForm(BaseReactForm):
''' Class that creates a Saltstack Reaction form for the dashboard '''
title = "SaltStack: Call Module"
description = """
<P>
This reaction provides a method for using Salt-API to trigger a defined modules execution. This integration relies on the <a href="https://github.com/saltstack-formulas/salt-api-reactor-formula" target="_blank">Salt-API Reactor Formula</a> or a similar reactor and salt-api configuration to be in place. This reaction simply sends a webhook to the defined SaltStack API server.
</P><P>
SaltStack reactions open up many possible remediations, by integrating Runbook with SaltStack nearly any infrastructure task can be performed as a result of the integration.
</P>
"""
placeholders = BaseReactForm.placeholders
placeholders.update({
'secretkey' : "OneTwoThree_VerySecret",
'tgt' : "webserver*nyc3*.example.com",
'module' : "state.sls",
'args' : 'nginx',
})
descriptions=BaseReactForm.descriptions
matcher_choices = [
("glob", "Hostname Glob"),
("pcre", "Hostname PCRE"),
("list", "List"),
("grain", "Grains"),
("grain_pcre", "Grains PCRE"),
("pillar", "Pillar"),
("nodegroup", "NodeGroup"),
("ipcidr", "IP Address/CIDR"),
("compound", "Compound")
]
url = TextField(
"URL",
description=descriptions['url'],
validators=[URL(message='URL must be in an appropriate format')])
secretkey = TextField(
"Secret Key",
description=descriptions['saltstack']['secretkey'],
validators=[DataRequired(message='Secret Key is a required field')])
tgt = TextField(
"Target",
description=descriptions['saltstack']['tgt'],
validators=[DataRequired(message='Target is a required field')])
matcher = SelectField(
"Matcher",
description=descriptions['saltstack']['matcher'],
choices=matcher_choices,
validators=[DataRequired(message='Matcher is a required field')])
module = TextField(
"Module",
description="Define the Salt Module to call",
validators=[DataRequired(message='Module is a required field')])
args = TextField("Arguments", description="Provide arguments to the module being called")
call_on = SelectField(
"Call On",
description=descriptions['callon'],
choices=[('false', 'False Monitors'), ('true', 'True Monitors')],
validators=[DataRequired(message='Call On is a required field')])
if __name__ == '__main__':
pass
|
//
// Copyright (C) Microsoft Corporation
// All rights reserved.
//
#include "pch.h"
#pragma hdrstop
namespace Platform
{
CPPCLI_FUNC SizeT::SizeT(void* pv)
{
_value = pv;
}
CPPCLI_FUNC SizeT::SizeT(int32 n)
{
_value = (void*)n;
}
}
|
Q:
" had been about everything and done almost every where"
What does this sentence mean in text below:
" there was a girl. She wandered all over the country hitching rides and shacking up until she'd been just about everything and done almost everywhere".
A:
This is an inversion of the normal phrase "done just about everything and been almost everywhere". This inversion is done for emphasis.
In a similar vein, one of my former colleagues used to say, "The early worm catches the bird."
The "normal" sequence will make a point but not catch anyone's attention. Bu the "inverted" sequence will raise eyebrows. When people get over their surprise, they'll remember the underlying point better (the one to which these phrases refer.)
|
Q:
Would you prefer to use String\NSString or Array/NSArray and etc in swift
Would you prefer to use String\NSString or Array/NSArray and etc in swift
or what depends on to choose?
A:
String and Array are supercharged enhanced versions of NSString NSArray. String has better UTF support, Array uses generics and more. NSString and NSArray should be used only when necessary, such as when using objective-c code from swift or accessing iOS/MacOS APIs
However each pair is interchangeable and (almost) automatically bridged when needed, so you can pass an Array where a NSArray is required, and vice versa. Same applies to strings.
|
Q:
Creating a background color "ping" using only CSS3
I want to create a simple "ping" feature when an event happens on a div. For example, if the user clicks a div, I want the div to quickly change background color and then slowly transition back to the original color. I would like to do this purely with CSS3 if possible.
A:
You can use a trick with the transition property, and the pseudo class :active that will be triggered on click.
On the :active pseudo, set the transition to 0s, so it will instantly change the color. Then, when it is not triggered anymore the default transition: 1s /*or whatever speed*/ will slowly get it back to its original color.
div {
width: 100px;
height: 100px;
background: silver;
transition: 1s;
}
div:active {
background: yellow;
transition: 0s;
}
http://jsfiddle.net/1vgef44t/
|
Dressed active particles in spherical crystals.
We investigate the dynamics of an active particle in two-dimensional spherical crystals, which provide an ideal environment to illustrate the interplay between active particles and crystallographic defects. A moving active particle is observed to be surrounded by localized topological defects, becoming a dressed active particle. Such a physical picture characterizes both the lattice distortion around the moving particle and the healing of the distorted lattice in its trajectory. We find that the dynamical behaviors of an active particle in both random and ballistic motions uniformly conform to this featured scenario, whether the particle is initially a defect or not. We further observe that the defect pattern around a dressed ballistic active particle randomly oscillates between two well-defined wing-like defect motifs regardless of its speed. The established physical picture of dressed active particles in this work partially deciphers the complexity of the intriguing nonequilibrium behaviors in active crystals, and opens the promising possibility of introducing the activity to engineer defects, which has strong connections with the design of materials.
|
The purpose of this protocol is to examine the toxicity and immunomodulatory activity of the combination of granulocyte-macrophage colony-stimulating factor (GM-CSF) and tumor necrosis factor (TNF) in patients with advanced cancer. The combination of GM-CSF and TNF stimulate the maturation of dendritic cells from CD34+ bone marrow progenitor cells. TNF has a two-fold function in the maturation of dendritic cells, it up-regulates the expression of the GM-CSF receptor on bone marrow progenitors and prevents their maturation into granulocytes. Dendritic cells are the most potent antigen presenting cells of the immune system. They function as initiators in organ transplant rejection, major histocompatibility restricted T cell responses and in the formation of antibodies dependent on T cells. Dendritic cells are found in small numbers in many tissues and in the peripheral blood. This study will examine the activity of TNF and GM-CSF to stimulate the maturation and function of dendritic cells. Bone marrow will be examined for the presence of dendritic colony forming units before therapy and following each course of therapy. The number of dendritic cells in peripheral blood mononuclear preparations will be examined before and during therapy. Finally, the number of S100+ and CD1A+ cells in skin biopsy specimens will be quantitated. Langerhans cells, a type of dendritic cell, is positive for these markers. The major goal of this protocol is to determine whether the combination of GM-CSF and TNF cause maturation of dendritic cells and increases their number in the blood bone marrow and skin and to determine whether this increase produces tumor regressions.
|
Scary Robot Is Subway Halloween Hero
He wouldn’t take the tinfoil-clad
bucket off his head, so we don’t know who this hero is who got off
the F train last night at Bergen Street. But we caught a glimpse of
him as he got fairly mangled in the subway turnstile exit, and so
if you see a bald-ish English-ish man with a ton of brutal
costume-related cuts on his hands today, buy him lunch, for he is a
hero of Halloween.
I’m not sure I can even explain why this was the funniest thing
I’ve ever seen. It didn’t help that the woman with him kept saying
“YOU’RE SUCH A SCARY ROBOT” and he would just say “GRRRRRR.”
|
DW12983
I feel you have the real problem wrong on this. Rather than the Army's lack of action, to me it's a case of this country as a whole being oversensitive to the fear of being called racist, bigot, profiler etc. What do you think would have happened to one of his superiors if they called him out as a fanatic? I would bet there would be Muslim protests. His superior would be chastised, threatened, probably disciplined and possibly discharged all in the name of tolerance. The problem is not the Military, it's a society that has become scared of it's own shadow.
|
PowerVu
PowerVu is a conditional access system for digital television developed by Scientific Atlanta. It is used for professional broadcasting, notably by Retevision, Bloomberg Television, Discovery Channel, AFRTS, ABS-CBN, GMA Network, and American Forces Network. It is also used by cable companies to prevent viewing by unauthorized viewers and non-cable subscribers.
PowerVu has decoders that decode signals from certain satellites for cable distribution services. These decoders can also be used just like the FTA (Free-To-Air) satellite receivers if properly configured.
References
Category:Broadcast engineering
Category:Digital television
Category:Conditional-access television broadcasting
|
Integrated development environments (IDEs) provide a common platform and design tools for modern software development. While software is often the most time-consuming and highest risk aspect of electronic program development, it also holds the greatest potential to enhance a design for multiple target applications. Such design tools allow designers to efficiently develop code where graphical user interfaces (GUI) automate and simplify configuration of complex programming projects. These tools also enable designers to create source code by enhancing code readability and simplifying code writing. For instance, source code editor features may include syntax coloring, auto-indenting and shortcut menus that link stored procedure calls to their definitions, declarations and usages even when these references reside in separate files. Other aspects of the tools include simulation resources to allow designers to develop and debug applications.
One area of software development that is performed on IDEs includes mapping class objects to relational objects, referred to as O/R mapping, and is the latest advancement in modern day programming technologies. It improves productivity of programmers by many degrees while providing flexibility to adapt to changing business needs. While O/R technology itself provides many benefits to programmers, enabling O/R classes to be created and set up correctly is not an easy task for normal development nor is it well supported in current programming tools. Without providing adequate tools support, programmers trying to adopt the technology may be forced to write their respective code manually.
One purpose driving O/R technologies is the need to interface the relational database world with the models supported in the object oriented programming world. For example, relational database management systems (RDBMS) supporting a relational database pre-dated the popularization of object-oriented programming in the 1990s. Using relational databases to store object-oriented data leads to a semantic gap where programmers would be required to allow their software to function in two different worlds—processing of data would be performed in object-oriented form, but the same data would have to be stored in relational form.
Requiring this constant conversion between two different forms of the same data not only had the effect of stifling performance but also imposed difficulties for programmers as relational or object-oriented forms would impose limitations on each other. For example, relational databases make complicated associations difficult, and they tend to “map” poorly into the object-oriented world since they fail to implement the relational model's user-defined types. This problem is sometimes referred to as the Object-Relational impedance mismatch.
Generally, relational databases use a series of tables representing simple data, where optional or related information is stored in other tables. A single (persistent object) record in the database often spans several of these tables, and requires a join to collect all of the related information back into a single piece of data for processing. This would be the case for an address book example, which would likely include at least a user and address table, but perhaps even a phone number table as well. In the object world, there is a clear sense of “ownership,” where a particular person object owns a particular phone number in the above example. This is not the case in relational databases, where the tables have no understanding how they relate to other tables at a fundamental level. Instead, the user must construct a “query” to gather information together. Queries not only request what information to return but also need to know how the tables involved are related to each other, illustrating the point that tables do not know their relationships when they are residing in the database. Thus, these relationships are typically only known when a query is run to specify the relationships. Relational databases (which attempt to implement the Relational Model), do maintain relationships via constraints but the Structured Query Language (SQL), for example, is generally unaware of these.
When creating Object/Relational (O/R) classes by mapping class objects to database objects, it is important to also set correct associations between related objects so that applications written on top of these objects can easily take advantage of such relationships. Hand coding such relationship is not a trivial task for typical developers. While the O/R technology itself provides many benefits to programmers, manually having O/R classes created and set up correctly is not a straightforward or simple task. With current development tools support, programmers trying to adopt O/R technology are often forced to write code manually which detracts from the utility of such tools.
|
The foramen lacerum--a route of access to the cranial cavity for malignant tumours below the skull base.
Thirteen malignant neoplasms (seven different tumour types) arising in the postnasal space or surrounding soft tissues extended upwards through the skull base into the middle cranial fossa. Gadolinium-enhanced magnetic resonance imaging (GdMRI) clearly revealed the route of the tumour into the cavernous sinus, parasellar region and floor of the middle cranial fossa. Since this extension alters both management and prognosis, GdMRI in the coronal plane is a necessary investigation for persistent and unexplained facial pain in order to demonstrate such lesions of the trigeminal nerve. Differentiation between neoplasms and aggressive inflammatory disease may be difficult.
|
#include "memory.h"
int simplet_retain(simplet_retainable_t *obj) {
obj->refcount++;
return obj->refcount;
}
int simplet_release(simplet_retainable_t *obj) {
obj->refcount--;
return obj->refcount;
}
|
<resources>
<string name="app_name">Music visualization</string>
</resources>
|
Influence of the phenophase on the phenolic profile and antioxidant properties of Dalmatian sage.
This study aimed to research the influence of phenophase on the phenolic profile (phenolic acids, flavonoids and stilbenes) and related antioxidant properties of sage, one of the most characteristic plants of Dalmatian karst. The total phenol and flavonoid contents in sage leaves were determined spectrophotometrically, while the principal phenolics were determined using HPLC-RP-DAD. Antioxidant properties of this well known medicinal plant were determined as free radical scavenging activity (DPPH), ferric reducing/antioxidant power (FRAP) and by Briggs-Rauscher oscillating reaction (BR). The results strongly indicate that Dalmatian sage leaves are rich source of valuable phenolics, mainly phenolic acids, with extremely good antioxidant properties. The presence of resveratrol or its derivatives was confirmed in all extracts. The best results for total phenols and flavonoids, as well as the best antioxidant properties were obtained for May sage, while the highest amounts of catechin monomers and compounds from group of stilbenes were found in February extract.
|
Sal The Stockbroker From Howard Stern Show Smile Makeover
Follow Sal The Stockbroker on his Twitter @salgovernale
"SAL THE STOCKBROKER" IS THE "SPECIAL GUEST HOST" FOR "GIRLS GONE DEAD" MOVIE AFTER-PARTY
AT TOOTSIE'S CABARET MIAMI, MARCH 28TH
Photos From http://thehowardshrine.blogspot.com/
Sal G's Before and After Imaging with SNAP Instant Dental Imaging And Temporary
Sal's Finals
|
Electric rocker switches are known from the prior art. In generally, a rocker switch with a moveable contact part which is loaded pretensioned in the direction of the one switch position and is held in the other switch position via a magnet is shown. Furthermore, a rocker switch that is moveable between two positions has a controllable actuator that is in operative connection with the rocker. A system made from electromagnets having a coil and rotor is used in the known rocker systems. Corresponding space in the housing must be provided for such systems, which impedes miniaturization. It is additionally disadvantageous in the preceding systems that no symmetrical haptics are realized for on and off switching. Meanwhile, the haptics of the switching process are dependent on the friction at the elastic body. Temperature and lubrication strongly influence the switching feeling.
|
<?php
phutil_register_library('arcanist_util', __FILE__);
|
import scala.quoted._
abstract class Test {
type T
val T: Type[T]
val getT: Type[T] = T // need this to avoid getting `null`
given Type[T] = getT
def foo(using QuoteContext): Expr[Any] = {
val r = '{Option.empty[T]} // error: is not stable
{
val t: Test = this
import t.{given _}
println(summon[Type[t.T]].show)
// val r = '{Option.empty[t.T]} // access to value t from wrong staging level
val r2 = '{Option.empty[${t.T}]} // works
}
{
val r1 = '{Option.empty[${T}]} // works
val r2 = '{Option.empty[List[${T}]]} // works
val r3 = '{summon[Type[${T}]]} // error: is not stable
val r4 = '{summon[${T} <:< Any]} // error: is not stable
}
{
val s = '{Option.empty[${T}]} // works
val r = '{identity($s)} // works
val r2 = '{identity(${s: Expr[Option[T]]})} // error // error : is not stable
}
r
}
}
@main def main = ()
|
<?php
namespace MajorGlitches\DeathMountain;
use ALttP\Item;
use ALttP\World;
use TestCase;
/**
* @group MajorGlitches
*/
class EastTest extends TestCase
{
public function setUp(): void
{
parent::setUp();
$this->world = World::factory('standard', ['difficulty' => 'test_rules', 'logic' => 'MajorGlitches']);
$this->addCollected(['RescueZelda']);
$this->collected->setChecksForWorld($this->world->id);
}
public function tearDown(): void
{
parent::tearDown();
unset($this->world);
}
/**
* @param string $location
* @param bool $access
* @param array $items
* @param array $except
*
* @dataProvider accessPool
*/
public function testLocation(string $location, bool $access, array $items, array $except = [])
{
if (count($except)) {
$this->collected = $this->allItemsExcept($except);
}
$this->addCollected($items);
$this->assertEquals($access, $this->world->getLocation($location)
->canAccess($this->collected));
}
public function accessPool()
{
return [
["Spiral Cave", true, []],
["Paradox Cave Lower - Far Left", true, []],
["Paradox Cave Lower - Left", true, []],
["Paradox Cave Lower - Middle", true, []],
["Paradox Cave Lower - Right", true, []],
["Paradox Cave Lower - Far Right", true, []],
["Paradox Cave Upper - Left", true, []],
["Paradox Cave Upper - Right", true, []],
];
}
}
|
Q:
push with git subtree to project root
I am currently working on a github pages project and generate the website to a folder named dist on a branch named dev. I want to push the content of dist to the master branch. Googling around I found github subtree and I could push the dist directory to master using the command:
git subtree push --prefix dist origin master
issue is this pushes the entire directory. So master branch has one directory named dist, containing dist/index.html etc. Instead I would like to push all the content of dist to the master branch. So that the master branch contains index.html and all other content. How can this be done?
A:
It is not easily done (beside doing some git filter-branch magic)
If you have a look at "Configuring a publishing source for GitHub Pages", you should instead generate your site directly in the gh-pages branch.
Or, you can stay in master branch, but generate in a docs/ folder instead of dist.
In both cases, GitHub pages will render that content.
However, for a User Page:
If your site is a User or Organization Page that has a repository named <username>.github.io or <orgname>.github.io, you cannot publish your site's source files from different locations.
User and Organization Pages that have this type of repository name are only published from the master branch.
In that case, reverse your workflow:
develop your site on a dev branch,
generate your site on the master branch
When you are in your dev branch, you can declare the master branch as a submodule (see here for the procedure), which will therefore be visible as a "subfolder" (for example a "dist" subfolder, except that subfolder will actually be your same Git repo, on master)
Generate your site as usual (in dist), go in dist, add, commit and push (that subfolder being a submodule, it will push on its associated branch: master)
Then go back to your project repo folder (parent of dist, currently on the dev branch), add, commit and push (to record the new state of the submodule dist)
|
Promotion
Up in the Air trailer online
There's a new trailer for Up in the Air online and to be honest there's not much more to the trailer other than a few more hints at the rest of the story that the blurb revealed.
There's a glimpse of the relationship that enters the life of the character played by George Clooney, a bit more of the younger talent he has to take under his wing, and of the most interesting part of the story I find, the return home.
The story is about a man who works for a company that flies him around the world to work for other companies downsizing them and in the process he's building up his air miles to a mammoth five million, and at the same time he's met the woman of his dreams, someone that loves the travelling as much as he does.
Just at that high point of his life his company downsizes and his travelling is drastically cut back, and that means he has to return home and spend much more time there.
That's where the interesting part of the Up in the Air trailer for me, seeing this man that has lived his life on the road return to an empty and sanitised apartment that is, on paper, his home and sits down having to reassess his life. Now that's where this story looks to get interesting for me, what about you?
|
A Python Approximate Bayesian Computing (ABC) Population Monte Carlo
(PMC) implementation based on Sequential Monte Carlo (SMC) with Particle
Filtering techniques.
|
After keeping Americans waiting for seven long years, House Republicans on Monday achieved a minor miracle: they released a plan to repeal and replace Obamacare that managed to upset just about everybody besides Paul Ryan, who helped write it, and Donald Trump, who almost certainly does not understand it. Conservative Republicans are attacking the plan’s tax credits, which they worry would create a “new entitlement” program. Moderate Republicans are in a panic over the bill’s drastic cuts to Medicaid, which would leave millions of constituents without a safety net. Doctors, like Democrats, are outraged that after promising legislation to improve the health-care system, Ryan and Trump are moving forward with a plan that would likely cause millions of people to lose their coverage.
On Wednesday, the White House conceded that this was, in fact, precisely the point. Health insurance “is not really the end goal here, is it?” Mick Mulvaney, the director of the White House Office of Management and Budget, asked rhetorically in response to a question on MSNBC’s Morning Joe about how many people would be covered under the new plan. “It‘s one of the conservatives’—one of the Republicans’—complaints about the Affordable Care Act from the very beginning: it was a great way to get insurance and a lousy way to actually be able to go to the doctor.”
Mulvaney continued, arguing that “it will be possible for more people to get better care at the doctor under this plan than it was under Obamacare.” But the first part of his response belied the second: Ryan’s plan to reform the health-care system is not designed to help more people afford insurance coverage, or even to keep coverage levels stable. In fact, just the opposite. Republican lawmakers believe, at an ideological level, that redistribution of wealth is both immoral and harmful to the people it is designed to help. Increasing consumer choice and promoting personal responsibility, not subsidizing coverage, has always been the conservative end goal.
White House press secretary Sean Spicer made much the same point, in similarly coded language, during his daily press briefing. “I can’t overstate this. There is a difference between having a card and having care. Being told you have coverage and not being able to use it, is no good,” Spicer told reporters Wednesday. “When we get the question, ‘How many people are going to be covered?’ that is not the question that should be asked,” he explained. “Having coverage with a high deductible and in some cases not having a plan that allows you to get the coverage that you need or afford it, isn’t real coverage.”
The Republican argument for cutting the Obamacare subsidies, in other words, appears to be that no insurance is better than flawed insurance. Or, more generously, that expanding freedom of choice for higher-income consumers is preferable to preserving coverage for the poor.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.