text stringlengths 16 69.9k |
|---|
Q:
PHP returns the wrong value of a radio button
I have a problem with a radio button which has two values, "po" and "jo", but PHP always returns the value "on". How can I fix this?
This is code in the .html file:
<label for="fangspotted">A e keni pare qenin tim Fang?</label>
Po <input id="fangspotted" name="fangspotted" type="radio" values="po"/>
Jo <input id="fangspotted" name="fangspotted" type="radio" values="jo"/><br/>
and this is in the .php file:
$fang_spotted = $_POST['fangspotted'];
A:
The html attrib should be value not values
So:
<label for="fangspotted">A e keni pare qenin tim Fang?</label>
Po <input id="fangspotted" name="fangspotted" type="radio" value="po"/>
Jo <input id="fangspotted" name="fangspotted" type="radio" value="jo"/><br/>
|
Metal-Free Visible-Light-Induced Construction of Difluoro-Containing Dibenzazepines.
A metal-free photocatalytic protocol for efficient construction of difluoro-containing dibenzazepines is developed. The transformation is redox-neutral and environmentally benign, has a wide range of substrate scope, proceeds at room temperature under irradiation of visible light, and furnishes dibenzazepine derivatives in mild to excellent yield. |
Q:
Should a directive talk to a controller in Angular JS?
I have been watching the videos by John Linquist and in one video he gives this as an example:
var app = angular.module('twitterApp', [])
app.controller("AppCtrl", function ($scope) {
$scope.loadMoreTweets = function () {
alert("Loading tweets!");
}
}
app.directive("enter", function() {
return function (scope, element, attrs) {
element.bind("mouseenter", function () {
scope.LoadMoreTweets();
})
}
}
One thing I am wondering about is should the directive in this example talk back to the controller or would it be a better programming practice to create a service and then have the directive talk to a service? I guess I am still not sure if it is common practices for directives to talk to controllers in this way.
U tube video
A:
How I would have done it
<span enter="loadMoreTweets()">Something</span>
JS
app.controller('AppController', function ($scope) {
$scope.loadMoreTweets = function () {
console.log("Loading tweets!");
}
})
app.directive("enter", function() {
return {
link: function (scope, element, attrs) {
element.bind("mouseenter", function () {
scope.$apply(attrs.enter)
})
}
}
});
Demo: Plunker
Another way to achieve the same
app.directive("enter", function() {
return {
scope: {
callback: '&enter'
},
link: function (scope, element, attrs) {
element.bind("mouseenter", function () {
scope.$apply('callback()')
})
}
}
});
Demo: Plunker
A:
Is it common practice?
Yes that is common practice, directives frequently need to access the $scope for variables, and to call methods (like LoadMoreTweets).
Even in the official docs they have examples like..
scope.$watch(...)
...fom inside a directive (where the controller might be making changes to the watched variable).
It is entirely appropriate for a directive to communicate with a controller in this way.
You can even inject a controller itself (not just the scope) into the link method of a directive. Looks at the "Linking function" section of http://docs.angularjs.org/guide/directive.
"The controller is shared among all the directives, which allows the directives to use the controllers as a communication channel."
But could I use a service?
Sure you could. The question is why? If you are working with a single page (that displays tweets for example) and the controller already has a $scope.tweets variable and $scope.loadMoreTweets method, you are overcomplicating things if you try to stick a service in there where it's not needed.
On the other hand services are perfect for application wide data, like user profile. If your directive needed to access the currently logged in user, then it makes a lot of sense to do that via service.
From the docs:
Angular services are singletons that carry out specific tasks common to web apps, such as the $http service that provides low level access to the browser's XMLHttpRequest object.
If you have a application-wide task that is best suited for a singleton, by all means use a service. If you just need to access/modify the $scope from a directive, just talk directly to the controller, or trigger an event that the controller can respond to.
|
Operational research methodology in the general medical rounds.
Operations Research (OR), also called Operational Research in the United Kingdom (UK), uses various computational tools for solutions to complex problems within a system. It deals with challenges in planning, scheduling, forecasting, process analysis and decision analysis. It also addresses individual components of the system. The methodology used for decisions based upon stochastic (random) processes can also be adapted for the common general medical ward round. Operational Research techniques add speed, efficiency, quality and consistency to the documentation in the case notes, and reduces the time taken for ward rounds. There is obvious benefit to the individual patient. It also acts as a learning tool which can be audited, and lends itself to research questions. |
Jesuit Father Rick Curry runs the Academy for Veterans at Georgetown University for those retuning from Iraq and Afghanistan. The program aims to assist veterans who have been disabled in combat in rebuilding their lives and responding to their needs. The program also includes emotional rehabilitation through performing arts.
Fr. Curry recently spoke to Vatican Radio about the unique experience of working with the disabled veterans. You can listen to Curry’s interview here |
Desired
As it turns out this item is temporarily sold out. Click [Notify me when available] and we’ll let you know as soon as it's back again!
Three women loved him. Two betrayed him. One fulfilled his destiny. Desired tells the story of the legendary strongman through the eyes of the three most important women in his life. The fiercely loving Jewish mother who nags him toward greatnes |
Q:
Webalizer to track advertisement impressions
I have few ads rotating on my site and I'd like to track impressions in the webalizer. They are just static files either images or flash. I'm running apache on Fedora.
I have examined the webalizer configuration file and I know that images are hidden by default. And I need an advice on what is the best way to track impressions to those files.
Has anyone done this before?
Thanks for your help!
A:
ended up using awstats instead of webalizer, it was easier to configure
|
Injectable drugs ranibizumab (Lucentis) and bevacizumab (Avastin) help prevent nursing home admissions among those with age-related wet macular degeneration, according to findings in JAMA Ophthalmology. |
An electric vehicle includes an electric traction motor. The motor produces a motor torque from electrical energy of a traction battery of the vehicle. The motor provides the motor torque to the drivetrain of the vehicle to propel the vehicle.
The motor torque produced by the motor may include an oscillating motor torque component in addition to a desired motor torque component. The desired motor torque component is the motor torque to be produced by the motor for vehicle propulsion. The oscillating motor torque component is known as torque ripple. Torque ripple provided to the drivetrain may have an impact in the form of noise and vibration. Thus, it is desirable to reduce the presence of torque ripple.
Techniques to reduce torque ripple include designing the motor so as to minimize the production of torque ripple. Such minimization efforts generally raise motor costs and reduce power density and efficiency. Another technique includes pre-calibration. However, this technique does not take into account variability due to manufacturing as the pre-calibration is done for a small representative sample of motors as opposed to motors installed in particular vehicles. Additionally, due to the complex behavior of torque ripple, even an extensive pre-calibration routine is unable to accurately and consistently reduce torque ripple in varied operating conditions. |
Q:
Why do scratches look radial around a reflected light source?
If you look carefully at your phone screen at a reflected light source - say, a round ceiling light - you might see scratches on your phone around the light being lit up. But curiously they are all going around the light; that is, in axial direction from the reflected source... no matter what angle you view it from or where the light source's reflection is on the phone screen.
I suspect this has something to do with the diffuse reflection of these scratches but I can't understand why axial scratches would be better lit than radial scratches.
A:
I assume you mean "tangential" instead of "axial" scratches. I made a few drawings as a visual aid. I know they are not exact and maybe crooked, but idealize them.
Okay, so first we've got the setup without scratches, should be simple enough. The top part represents the setup viewed from the side with $+y$ pointing towards us. The bottom part represents the setup viewed from the top with $+z$ pointing towards us.
Second, we've got the setup with scratch that appears radial with respect to the reflection. The scratch is very exaggerated, appearing as a carving with a semi-elliptical profile. For us to see light in the scratch there must be a light source inbetween the red lines, but there is not.
Third, we've got a scratch that would appear tangential with respect to the reflection (actually parallel to the tangent, because it is a bit to the side. I dont' know a term for this).
I've added a third point of view for this one. In this new point of view the coordinate that is pointing towards us is $+x$ such as the the observer (the eye) is "behind" the source. Again the scratch is exaggerated, with the same profile like the previous one. This time there is a portion of the arc of the ellipse that comes close to what orientation a reflective plane at that position would need to have to reflect the light from the source to the observer. In other words if there was a mirror, where the purple line is, in the point of view, given to the right, it would reflect the light from the source to the observer. A portion of the arc of the ellipse is close enough to simulate the mirror, so it reflects the light. The light beams that get reflected by the scratch I've colored in red. The strip of the scratch that is doing the reflecting I've colored in pink. In the additional point of view the the before being reflected by the scratch are the outer red ones. The middle red one is actually the already reflected beams, but they appear to coincide in my drawing.
|
On GPS: Tracing pandemics back to their source
Dr. Peter Daszak, whose research helped identify the origins of the SARS outbreak, joins Fareed to discuss the science of finding the source of viruses. |
Articulators or correlators for use with casts of a dental model to develop dental prostheses or denture elements have been used for a number of years. These articulators range from a very simple device affording only fixed pivotal movement between a pair of casts to highly sophisticated and mechanically complex devices which are capable of simulating the full range of occlusal and masticatory registration unique to any patient. The relatively simple devices are generally inadequate to provide sufficiently accurately registered prosthetic restoration and, thus, may require the patient to make many visits with a dentist to obtain adjustments thereof. On the other hand, the very complex devices are time consuming to operate and require extensive training to use properly. In either situation, the costs to the patient are substantial.
Many conventional articulators include anchors in the dental casts that fix the angle of attachment of the articulator. If the casts are not made perfectly level to one another, then the articulator does not move the casts properly.
Moreover, many of the prior art articulators do not permit disengagement of the casts from registration with one another without extensive realignment upon reengagement. Thus, a technician may have to perform work while the casts are mounted on the articulator. It is difficult to work with speed and accuracy when the articulator is mounted to the casts.
Therefore, there has been a need for a simple disposable dental articulator for mounting and adjustably holding casts of a dental model that simulates all of the mandible motions.
It is further desirable that the articulator easily attaches to dental casts at any angle to make up for casts not being level.
It is further desirable that the articulator permits rapid disassembly and reassembly without the need of realignment to effect proper registration between the casts. |
The repair of extracranial carotid artery aneurysms.
Aneurysm of the internal carotid artery was repaired in three instances by a combination of gas endarterectomy and aneurysmorrhaphy. No shunt was used during cross clamping. The occlusion was uncomplicated. Both patients (in one the procedure was bilateral) have been well for two years. Because of its simplicity and effectiveness, the method is recommended. |
The Song of Wandering Aengus
I went out to the hazel wood,
Because a fire was in my head,
And cut and peeled a hazel wand,
And hooked a berry to a thread;
And when white moths were on the wing,
And moth-like stars were flickering out,
I dropped the berry in a stream
And caught a little silver trout.
When I had laid it on the floor
I went to blow the fire aflame,
But something rustled on the floor,
And some one called me by my name:
It had become a glimmering girl
With apple blossom in her hair
Who called me by my name and ran
And faded through the brightening air.
Though I am old with wandering
Through hollow lands and hilly lands,
I will find out where she has gone,
And kiss her lips and take her hands;
And walk among long dappled grass,
And pluck till time and times are done
The silver apples of the moon,
The golden apples of the sun. |
In the process of “rejecting” the @PublicProtector, those who do must remember the @ConCourtSA judgment who said, “The Public Protector would arguably have no dignity and be ineffective if her directives could be ignored willy-nilly”. No one is above the Law! |
Wednesday, April 15th, Running Start had another greatly successful Path to Politics lunch at the offices of Winston & Strawn, LLP. The subject was networking, and I’m so glad that I went. I picked up some new skills I hadn’t necessarily thought of before, met some great young women, and was wholly impressed by the conversation and passion of the women around me.
You know, there is a lot more that goes into successful networking than you might think. You’ve got to make an impression, hopefully positive, on the people you meet. You should try hard – and if you’re anything like me this may be the most challenging aspect of networking – to remember names and associations. Juggle the glass of wine you might be toting or the small plate, and for Heaven’s sake, please chew with your mouth closed!
Running Start did a great job of reminding me of some of the most fundamental points of networking. For instance, I’m great at the conversation, and I’m pretty good at remembering to jump in with my name before someone has to say “and you are?” But I almost always just say, “Hi, I’m Rachael.” Now how memorable am I if you don’t know my last name? It’s important to remember to always say your first and last name while making a good impression with a solid handshake and eye contact.
I get so much out of teaching moments like this luncheon, and I know that it is this characteristic that is one of the things that drew me to Running Start in the first place. The programs are all geared towards educating young women on politics, the world, and professional skills.
I don’t get to make it to Path to Politics lunches very often. I wish I could make it to more but I’m often chained to my desk through lunchtime. If you make it to these meetings with any regularity and want to write a little something about them here, let me know. We can always use new voices on our blog! |
I’ve written articles attacking the theory and practice of vaccination from a variety of angles. But the whole issue also needs to be approached from the perspective of logic.
Unfortunately, generations of people have been shut out of learning logic in school. They don’t know what it is. Therefore, vaccine advocates have been able to peddle their basic theory without much challenge.
It’s time to put an end to that free ride.
First of all, I need to point out a massive contradiction. When a person receives a vaccine, it’s said that his body produces antibodies against a particular germ and this is a good thing. Vaccination thus prepares the body for the day when that germ will really make its attack, at which point the immune system (including antibodies) will mount a successful defense. |
SPICE welcomes back Dr. HyoJung Jang
We are thrilled to welcome Dr. HyoJung Jang back to the SPICE team! Jang holds a Ph.D. in Educational Theory and Policy as well as in Comparative and International Education from Penn State University, and an M.A. in East Asian Studies from Stanford University. She has returned to SPICE as an instructor for the Sejong Korean Scholars Program, an intensive online course on Korea for high school students across the United States.
“It’s so wonderful to be back at SPICE, where my passion for education issues was sparked,” reflects Jang. “And it’s always inspiring to work with our young Sejong Scholars. Their sharp, inquisitive minds and sincere interest in Korea make me feel optimistic about the future of U.S.–Korean relations.” |
Profiling cellular myristoylation and palmitoylation using ω-alkynyl fatty acids.
Methods to detect and characterize cellular protein myristoylation and palmitoylation are invaluable in cell biology, immunology, and virology. Recently, we developed ω-alkynyl fatty acid probes for monitoring myristoylation and palmitoylation of cellular proteins. This article describes a biochemical procedure for metabolic labeling of cells with ω-alkynyl fatty acids and click chemistry. |
The Map class
(No version information available, might only be in Git)
Introduction
A Map is a sequential collection of key-value pairs, almost identical to an
array used in a similar context. Keys can be any type, but must be unique.
Values are replaced if added to the map using the same key. |
The ecology of the free living stages of Nematodirus filicollis.
The development and survival of the eggs of Nematodirus filicollis placed on grass plots over a period of a year were studied. Development took place at every season although it was more rapid in the warmer months. Yields of larvae were highest from eggs placed outside during February, March and April. Larvae persisted for two to two and a half years after eggs were placed on the pastures. The extraordinary persistence of the eggs and larvae of N filicollis makes control of the parasite difficult. |
Q:
data members as pointers
let's say I have the next class which include many data memebers:
Class A
{
public:
.
.
.
private:
string a1;
string a2;
vector<string> vec1;
.
.
.
.
}
and let's say I have a recursive function called foo() with many local variables of type A:
void foo()
{
A a_1;
A a_2;
A a_3;
.
.
.
A a_n;
}
as you can see in the class definition, today, the data members of A are real objects and not pointers.
I know that all those data members are stored on the stack, the stack has a limited size (in my case 512MB) and I was wandering, will it be better to replace the data members with pointers which will point to data on the heap?
Thank you.
A:
I would say that the rule of thumb is "don't complicate your life by using pointers if you don't need to".
In C++, there are references, that are (in my humble opinion) easier to use and understand. Regarding methods in a class, it's often necessary to pass objects by reference so that you avoid destroying objects you will need; but as far as variables go, I don't think it's very common that you need to use pointers. :)
|
Think of all the crimes this will stop! What a joke. Why say “All AR Types” then have a list of examples including non-AR platform rifles? Like a Beretta CX-Storm as an AR type?????? Hi-Point Carbine too. Hi-Point will be proud to be included in the AR bracket lol. I guess it should be expected coming from a hypocritical person like Diane Feinstein. |
Dave Nalle is better known for designing roleplaying games like the groundbreaking Ysgarth RPG, but during the 1970s and 1980s he designed a number of small budget but interesting board games and then in the 1990s he designed the much higher budget collectible card game Quest for the Grail. He primarily makes his living as a font designer at (see http://www.fontcraft.com ) and many of his fonts are featured on popular boardgames from other designers. He has designed several technical fonts specifically for game design. Rumor is that he has new games in development from a new company Hanged Man Games (http://www.hangedmangames.com ). |
Q:
GDB console can't show the result of printf
I'm using gdb in RedHat to debug C++ code. To better debug my code, I added printf("XXX").
However, after the execution of printf("XXX"), the gdb console didn't show XXX.
Other parts of my code works fine.
A:
It's likely that your output is line-buffered, and because you didn't end the print with a newline, the output hasn't been flushed. Two easy fixes:
printf("XXX"); fflush(stdout);
printf("XXX\n");
Also, take care if you're mixing C-style FILE* i/o with C++-style streams.
|
Q:
What SDK should I use? c++
I have this program in mind that I would like to attempt and create in c++. I am not sure what SDK I should use, Here is the idea:
Basically like Facebooks status' or twitter but strictly for your desktop. Window like AIM or MSN would allow you to view your friends and their current status, allow you to comment on it, etc. When someone changes their status, all of their friends get a little notification on the bottom right of their screen saying what their friends current status is. There would obviously be much more that sets it apart, but this is the basic idea that I'm starting from.
A:
If you plan to release it as OpenSource, the Qt GUI Framework is very much worth considering (you can buy a commercial license too). It is crossplatform (Linux/Win/Mac) - eg. Google Maps desktop app uses it.
It will give you networking support, HTML/XML rendering if necessary, SQL and much more.
As for communication protocols, go with Greg's suggestion.
|
Differential effects of simvastatin on membrane organization and dynamics in varying phases.
Simvastatin belongs to the statin family of cholesterol lowering drugs which act as competitive inhibitors of HMG-CoA reductase, the rate-determining enzyme in cholesterol biosynthesis pathway. Simvastatin is a semi-synthetic, highly lipophilic statin, and has several side effects. Since HMG-CoA reductase is localized in the endoplasmic reticulum, orally administered simvastatin needs to cross the cellular plasma membrane to be able to act on HMG-CoA reductase. With an overall goal of exploring the interaction of simvastatin with membranes, we examined the effect of simvastatin on the organization and dynamics in membranes of varying phase, in a depth-dependent manner. For this, we employed DPH and TMA-DPH, which represent fluorescent membrane probes localized at two different locations (depths) in the membrane. Analysis of fluorescence anisotropy and lifetime data of these depth-specific probes in membranes of varying phase (gel/fluid/liquid-ordered) showed that the maximum membrane disordering was observed in gel phase, while moderate effects were observed in liquid-ordered phase, with no significant change in membrane order in fluid phase membranes. We conclude that simvastatin induces change in membrane order in a depth-dependent and phase-specific manner. These results provide novel insight in the membrane interaction of simvastatin and could be crucial for understanding its pharmacological effect. |
Fler idéer
Omg so cute I took this photo in october
Hahaha used app to My cat.
Love Frank underwood from house of cards huge fan of the series would even vote him for president. He suck badass he isnt pussy our trying let his feeling controll him he hide his feelings and is always diplomatic and rational just lile me. Overemtional people can be annyoing to be around everyone is emotional they just make huge deal of it like they should be treaed diffrent than everyone els. I hate negative people as well if you want to be rich succésful you gonna work hard for it.
Curator shin chan The moment your crush live you back you be like matso @crayonshinchan #cute |
Enterprise desktop management is one of the most challenging tasks for Information Technology (IT) departments of large organizations today. A typical IT department needs to manage, protect, and distribute software updates and modifications, upgrade operating systems and applications, as well as be able to back up and restore the user's data and settings on demand. One issue for IT departments is the complexity of managing a large number of different desktop instances that may exist on the computers of enterprise users. The sheer number of user computers to manage; the proliferation of operating system (OS) images and applications; and the complex set of operations, such as deployment, provisioning, patching, upgrading, installing and managing applications, compliance testing, troubleshooting and re-imaging; all make IT responsibilities a very challenging task. To compound these difficulties, today's enterprises are often dispersed over multiple geographic locations and the use of Local Area Networks (LANs) connected over one or more Wide Area Networks (WANs) with variable bandwidths and latencies is a serious barrier to providing efficient desktop management without sacrificing end user experience.
Virtual Desktop Infrastructure (VDI) can provide some aid to IT departments by virtualizing the desktops of individual end users. In a conventional VDI environment, each user in an enterprise is provisioned a virtual desktop and is allowed to access their virtual desktop over a remote network connection, such as a WAN connection. The virtual desktops are typically hosted on servers that reside in a data center of the enterprise (or a third party service provider), and each host server may execute multiple virtual desktops. Users can utilize a client device to remotely log into their individual virtual desktop and all of the application execution takes place on the remote host server which is linked to the local client device over a network using a remote display protocol, such as remote desktop protocol (RDP), PC-over-IP protocol (PCoIP), virtual network computing (VNC) protocol, or the like. Using the remote desktop protocol, the user can interact with applications of the virtual desktop, which are running on the remote host server, with only the display, keyboard, and mouse information communicated with the local client device. A common implementation of this approach is to host multiple desktop operating system instances on a server hardware platform running a hypervisor.
VDI provides a more centralized and efficient client environment that is easier to manage by enterprise IT administrators, who are able to respond more quickly to the changing needs of the user and the business. However, many issues with desktop management still persist in the VDI environment. For example, the IT department often needs to distribute updates or install new software to all desktops in the enterprise as part of an upgrade or migration process. It is usually desirable to perform such distribution of updates while the users are using their desktops so as not to disrupt normal business operations. If such a distribution were to be performed in a conventional VDI model, all of such updates would need to be distributed and installed on each and every virtual desktop. However, because each server in a data center typically hosts many different virtual desktops that share the physical resources of the server, such distributions/installations are likely to overwhelm a server's physical resources and degrade the overall user experience. A more efficient approach is desirable for distributing updates within a VDI environment of an enterprise. |
Q:
Installation vs Gem - Paperclip and ImageMagick
I am trying to install Paperclip on my Rails Project but it seems I need ImageMagick installed too too.
I thought first ImageMagick was a gem to install but it is actually a piece of software.
My question is :
Why not a gem ?
And as it is a piece of software, will I get into trouble finding an hosting service that has ImageMagick installed too on their servers?
A:
ImageMagick is a command line utility for modifying images. Paperclip uses it for resizing/thumbnailing image uploads. If your hosting service gives you SSH access, you should be able to install it on your server(s).
|
Occurrence of organic microcontaminants in the wastewater treatment process. A mini review.
A wastewater treatment plant may receive various types of wastewater namely, urban, industrial, agricultural, washout from the streets, wet or/and dry atmospheric deposition. As such, scientists have detected in wastewaters all major categories of pollutants like persistent organic pollutants (POPs), polycyclic aromatic hydrocarbons (PAHs) and pesticides, but also substances that are widely used as pharmaceuticals and cosmetics, classified as "PPCPs" (pharmaceuticals and personal care products). Finally, the latest categories of compounds to be looked upon in these types of matrices are illicit drugs (drugs of abuse, like cocaine, etc.) and doping substances. This review article summarises major categories of organic microcontaminants that have been detected in wastewaters and studies their fate during the wastewater treatment process. Occurrence of these compounds in the influents and effluents are reported, as well as percents of removal, mass balances and phase distributions. |
Lismore - Black
Add this shirt to your wardrobe if you want to truly shine. RG adds a hint of Lurex to this fancy jacquard motif on Italian fabric with an unusual hand. A cloud embroidery inside the cuffs and damsel in distress motif at the yoke. Wear it for evening events. |
An important problem in epilepsy is the evaluation of the clinical effectiveness of anticonvulsant drugs and the comparison of their effects on the mechanisms underlying the establishment of epileptogenic foci. Changes in local neuronal oxidative metabolism will be measured in animals during the progressive initation and establishment of primary and secondary epileptogenic foci by simultaneous extracellular recording of action potential activity and pO2 with the same microelectrode. Spike train analysis including means frequency of firing, burst analysis, and formulation of interspike interval and pO2 histograms will be conducted to quantify neuronal responses in normal cortex and in primary and secondary epileptic foci. Effects of various anticonvulsant agents including diphenylhydantoin, uridine, and taurine will be tested on neuronal action potential activity and metabolism at various stages of mirror focus development. Mathematical models will be used in conjunction with experimental analysis to investigate the temporal behavior of several metabolic processes during epileptic seizures. The models will utilize experimental data to examine in vivo feedback loops for flow and metabolic rate changes. Experimentally forced upsets will be simulated and results compared in order to back-out metabolic rate and determine transfer functions between action potential firing patterns and local oxygen tension in brain tissue. Pulse testing and correlation analysis data reduction schemes will be applied to implement on-line real-time systems analysis. |
Since the 1980s several different forms of privatisation had been introduced into
the South African educational system by the De Lange Commission. Since the 1990s
a raft of neoliberal policies has been implemented under ... |
module a { header "a.h" }
module b { header "b.h" }
module c { header "c.h" }
|
German Shepherd with other dogs
Karen said: "Yes"
Nancy said: "Yes"
Those introduced when brought home as a puppy are great. As mine matured, introducing new dogs was monitored and done slowly.
Barb said: "Yes"
Socialize them when they're young
Wenfy said: "Yes"
The one she grew up with mostly, she likes other ones that are playful. I don't know how she would do with an aggressive one.
Dana said: "Yes"
Socialize them with other dogs early and keep it up. Go to the dog park, doggie day care. This will help expend their energy. I also check with new people we see when on walks, asking if their dog is good with meeting new dogs. Then carefully introduce them. If there is obvious tension, don't but if they seem to be interested, let them greet each other. We have lots of dogs in our neighborhood we greet and even walk with now.
Joyce said: "Yes"
I took my dog to Obediance classes.
ashli said: "No"
make them be around other animals when they are pups
linda said: "Yes"
not really.
elaine said: "Yes"
dont avoid others dogs when out should it bark or get aggressive be firm and make sure she/he realises that the dog was not a threat and that she/he had misbehaved
Naomi said: "No"
My German Shepherd does not like small dogs? I rescued her from being a continual breeding dog and she refuses to let small dogs share the same space with her. She will attack them. I'm constantly keeping an eye on Dakota - my Shepherd around the smaller dogs. If anyone has any great advice to help Dakota around smaller dogs, please advise me!
Myrle said: "Yes"
Socialize them early and allow them to play with other dogs.
Deb said: "Yes"
Socialize early and a lot
Cheryl said: "Yes"
Early socialization
Lin said: "Yes"
Socializing is important with all breeds.
Liz said: "Yes"
socialise from young with as many different dogs as possible
Linda said: "No"
I only let my dog play in a controlled environment like doggie daycare. Dog parks are not a great idea for a German Shepherd not every dog is well behaved and neither are the humans. Your German Shepherd has a very good memory and will pick up bad behavior s fast. |
Q:
Change the working drive java processbuilder
My setup is as follows:
C: contains operating system and final release of programs
Z: contains code I am working on
I am using Netbeans, which is installed on C:\Program Files (x86)
My project folders are in Z:
I am trying to debug a project which needs to run a process where the file for the process directory is "C:\TaxiPIM"
I have tried:
ProcessBuilder pb = new ProcessBuilder("java", "-jar", "Pim_Update_Client.jar");
pb.directory(new File("/TaxiPIM"));
and:
ProcessBuilder pb = new ProcessBuilder("java", "-jar", "Pim_Update_Client.jar");
pb.directory(new File("c:/TaxiPIM"));
and ended up google-e-eyed with results explaining how to change the directory...
But I need to change the drive as well as the directory.
Thanks for reading - feedback is most appreciated!
A:
Edit: ProcessBuilders directory(File) method returns a new ProcessBuilder so try pb=pb.directory(new File("...)
crude way would be to export the command to a batchfikle in the same dir as your project and putting the change drive code into the batch file, too and then run the batch file from your code.
Example that changes from a directory on C to a directory on D; (i have my NetBeans installation and the project-directory on the C-Drive)
ProcessBuilder pb = new ProcessBuilder("cmd.exe","/c","start","cmd");
pb=pb.directory(new File("D:\\src"));
pb.start();
|
clear high heels
DressWe is a perfect online website which involves a wide range of clear high heels and other accessories for many occasions. If you are a fashion leader, then dresswe is your best friend which provides all new trend design for you to stand out the the crowd. You will find delicate design with cheap price accessories in our store. All clear high heels will be made according to the customer's need. We are trying our best to provide safest and fastest service for you. Dresswe.com are making every effort to meet its customers' needs. So we welcome any suggestion from our customer, we hope you can buy all clear high heels you desire. Enjoy your shopping here. |
Q:
Understanding resignFirstResponder with UITextField
I'm trying to get rid of the keyboard when the user touch outside my UITextField, by using this method:
- (void) touchesBegan:(NSSet *)touches withEvent:(UIEvent *)event {
[mainTextController resignFirstResponder];
[super touchesBegan:touches withEvent:event];
}
However, this seems to call a method that is called after pressing the return button on the keyboard, but I just want the keyboard to vanish, not to press return for me.
How can I accomplish that?
Thanks!
EDIT: tGilani's answer is the most straight-forward way, works like a charm, without changing to UIControl. But I guess jonkroll's answer also works.
A:
try
[self.view endEditing:YES];
Update:
Take a boolean value and set it to false in init method. In your textFieldShouldReturn delegate method method, execute the code if it is false, skip otherwise
- (BOOL) textFieldShouldReturn:(UITextField*)textField
{
if (!boolean)
{
// YOur code logic here
}
boolean = false;
}
in your method where you call the endEditing method, set boolean to true.
boolean = YES;
[self.view endEditing:YES];
A:
Here's how I've handled this before. First create a method on your view controller that will dismiss the keyboard by resigning first responder status on your text field:
- (IBAction)dismissKeyboard:(id)sender
{
[mainTextController resignFirstResponder];
}
Next, in your storyboard scene for your ViewController (or nib, if you are not using storyboards) change the class of your ViewController's view property from UIView to UIControl. The view property is effectively the background behind your other UI elements. The class type needs to be changed because UIView cannot respond to touch events, but UIControl (which is a direct subclass of UIView) can respond to them.
Finally, in your ViewController's viewDidLoad: method, tell your view controller to execute your dismissKeyboard method when the view receives a UIControlEventTouchDown event.
- (void)viewDidLoad
{
[super viewDidLoad];
UIControl *viewControl = (UIControl*)self.view;
[viewControl addTarget:self action:@selector(dismissKeyboard:) forControlEvents:UIControlEventTouchDown];
}
EDIT:
Part of your concern seems to be that textFieldDidEndEditing: is called when the keyboard is dismissed. That is unavoidable, it will always be called whenever a text field loses focus (i.e. first responder status). It sounds like your problem is that you have put code to perform when the user clicks the return button in textFieldDidEndEditing:. If you do not want that code to run when the user touches outside of the text field, that is not the proper place to put it.
Instead, I would put that code in a separate method:
- (IBAction)textFieldReturn:(id)sender
{
if ([mainTextController isFirstResponder]) {
[mainTextController resignFirstResponder];
// put code to run after return key pressed here...
}
}
}
and then call that method via Target-Action when your text field sends the control event UIControlEventEditingDidEndOnExit.
[mainTextController addTarget:self action:@selector(textFieldReturn:) forControlEvents:UIControlEventEditingDidEndOnExit];
Note that UIControlEventEditingDidEndOnExit is different than UIControlEventEditingDidEnd. The former is called when editing ends by the user touching outside the control, the latter is called when editing ends by the user pressing the return key.
|
Azure Quickstart Templates
Deploy Azure resources through the Azure Resource Manager with community contributed templates to get more done. Deploy, learn, fork and contribute back.
What is Azure Resource Manager
Azure Resource Manager allows you to provision your applications using a declarative template. In a single template, you can deploy multiple services along with their dependencies. You use the same template to repeatedly deploy your application during every stage of the application lifecycle. |
from .base import Service, ServiceMeta, SimpleServer
from .profiler import Profiler
from .tcp import TCPServer
from .tls import TLSServer
from .tracer import MemoryTracer
from .udp import UDPServer
__all__ = (
"MemoryTracer",
"Profiler",
"Service",
"ServiceMeta",
"SimpleServer",
"TCPServer",
"TLSServer",
"UDPServer",
)
|
Q:
How to show image using php?
I am just starting to use html, php, and mysql. I've successfully logged into my database using php, and formed a query. I now want to go a step further and show a picture instead of just strings or numbers.
The variable 'result' will be returning a string that has a url to an image i want to display on this webpage. How would I do this?
<html>
<head>
<title>My First Question</title>
</head>
<body>
<?php
$dbhost = 'someURL.com';
$dbname = 'user';
$dbuser = 'user';
$dbpass = 'password';
$mysql_handle = mysql_connect($dbhost, $dbuser, $dbpass)
or die("Error Connecting To Database Server");
mysql_select_db($dbname, $mysql_handle)
or die("Error selecting database: $dbname");
echo 'Successfully connected to database!';
$first = 'bobbie';
$query = sprintf("SELECT image FROM Player
p WHERE name='%s'", mysql_real_escape_string($first));
$result = mysql_query($query);
mysql_close($mysql_handle);
?>
</body>
</html>
A:
Inside PHP, This will turn your SQL response into a usable variable.
$result = mysql_fetch_assoc(mysql_query($query));
Outside of your PHP tags, Echo the URL from the table into the SRC of an IMG element.
<img src="<?= $result['url_column_name'] ?>"/>
This will create a new IMG element with the source being the URL that you have fetched from your SQL query.
Short tags are also a way of echoing PHP variables in HTML.
<?= $var1, $var2 ?>
is the equivalent of using
<?php echo $var; echo $var2; ?>
A:
This is a simple case of echoing the relevant HTML. You'll also have to fetch the results after you execute the query -
$result = mysql_query($query);
$data = mysql_fetch_assoc($result);
echo '<img src="'.$data['image'].'" />;
For added security, a good practice would be to escape any possible unwanted HTML content in your images path - htmlspecialchars($data['image']).
It should also be noted here that you are using a very old deprecated method to access your database. You might want to think about updating your code to use more modern PDO methods.
|
Hookup turns into date... then he disappears?
Hooked up with a guy from Tinder, but it soon turned out he was interested in more than just sex -- after the hookup, he asked me out to lunch! We ended up having lunch at my place a week later. There, he kept asking questions about my life (my college, my job, my family), so it was very obvious he was interested in me. We didn't even hook up that day. A week later, we met up again, this time for a movie night at my house. We snuggled in my bed with the movie on and fell asleep, and he left the next morning. Again, no hooking up.
After these two last meetups, it seemed quite obvious he was legitimately into me -- until his texts and calls started slowing down. It's been two weeks since I last saw him, and he hasn't at all tried to see me. The last time we arranged to get together, he canceled the meetup, saying he had gotten too busy. He hasn't tried to get together since.
What gives? It can't be one of those "I finally had sex with her so now I can ditch her" things, since our very first interaction was sex and he met up with me twice afterwards without trying to have sex with me. Did he simply lose interest? If so, what could his reasons be? I know, I can just ask him by calling or texting him, but I don't want to seem too needy or desperate. Plus, I want your opinions.
P. S. This guy is ridiculously attractive -- like he could be a Calvin Klein model. Lol. I'm sure women are constantly flinging themselves at him. Maybe he simply found someone else. Still want to hear your thoughts though.
Most Helpful Guy
Ya, you got played. So you work the girl go out etc etc, finally get to fuck. DONEso you call, text blal blah once and done maybe a second time.. if you give off the CLINGY vibe its over. He didn't lose interest its the same level of interests he had from beginning |
import { BrowserModule } from '@angular/platform-browser';
import { NgModule } from '@angular/core';
import { AppComponent } from './app.component';
import {
DocspaCoreModule,
MarkdownModule,
MarkdownElementsModule,
RuntimeContentModule,
DocsifyPluginsModule
} from '@swimlane/docspa-core';
import { DocspaStackblitzModule } from '@swimlane/docspa-stackblitz';
import { config } from '../docspa.config';
import { DemoModule } from 'src/docs/demos/demo.module';
import { NgxGraphModule } from '@swimlane/ngx-graph';
import { NgxChartsModule } from '@swimlane/ngx-charts';
import { preset } from '@swimlane/docspa-remark-preset';
import { LoggerModule, NgxLoggerLevel } from 'ngx-logger';
import { environment } from 'src/environments/environment';
import { AppRoutingModule } from './app-routing.module';
@NgModule({
declarations: [AppComponent],
imports: [
BrowserModule,
DocspaCoreModule.forRoot(config, environment),
DemoModule,
MarkdownModule.forRoot(preset),
MarkdownElementsModule.forRoot(),
LoggerModule.forRoot({ level: NgxLoggerLevel.WARN }),
RuntimeContentModule.forRoot({
imports: [NgxGraphModule, NgxChartsModule, DemoModule]
}),
DocsifyPluginsModule,
DocspaStackblitzModule,
AppRoutingModule
],
bootstrap: [AppComponent]
})
export class AppModule {}
|
Q:
Windows: Remote Display Back in Powershell a la X11?
If I have two Linux boxes, A and B, I can SSH from A to B with X11 forwarding enabled. This allows me to use graphical applications on B and have the display rendered on Machine A.
Is there a way to achieve the same effect in Windows when I'm in a Powershell session? Or do I have to use the graphical console on Machine A and use it to connect to Machine B?
A:
No, the Windows GUI is not build like X11 so that method doesn't exist through PowerShell. The Microsoft ecosystem has a few other ways of doing this, look for app-v as well as some vendor options. This is not a direct analog of X11 forwarding, it's something else entirely.
Without AppV or similar your best bet really is to RDP into the remote system and run the GUI there.
|
package com.nirima.jenkins.plugins.docker.builder;
import com.github.dockerjava.api.exception.ConflictException;
import com.github.dockerjava.api.exception.DockerException;
import com.github.dockerjava.api.exception.NotFoundException;
import com.nirima.jenkins.plugins.docker.action.DockerLaunchAction;
import hudson.Extension;
import hudson.Launcher;
import hudson.model.Run;
import hudson.model.TaskListener;
import org.kohsuke.stapler.DataBoundConstructor;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import java.io.PrintStream;
/**
* Stop all containers that ???
*
* @author magnayn
*/
public class DockerBuilderControlOptionStopAll extends DockerBuilderControlOption {
private static final Logger LOG = LoggerFactory.getLogger(DockerBuilderControlOptionStopAll.class);
public final boolean remove;
@DataBoundConstructor
public DockerBuilderControlOptionStopAll(boolean remove) {
this.remove = remove;
}
@Override
public void execute(Run<?, ?> build, Launcher launcher, TaskListener listener)
throws DockerException {
final PrintStream llog = listener.getLogger();
LOG.info("Stopping all containers");
llog.println("Stopping all containers");
for (DockerLaunchAction.Item containerItem : getLaunchAction(build).getRunning()) {
final String containerId = containerItem.id;
LOG.info("Stopping container {}", containerId);
llog.println("Stopping container " + containerId);
containerItem.client.stopContainerCmd(containerId).exec();
if (remove) {
LOG.info("Removing container {}", containerId);
llog.println("Removing container " + containerId);
try {
containerItem.client.removeContainerCmd(containerId).exec();
} catch (NotFoundException e) {
llog.println("Container '" + containerId + "' already gone.");
} catch (ConflictException e) {
llog.println("Container '" + containerId + "' removal already in progress.");
}
}
}
}
@Extension
public static final class DescriptorImpl extends DockerBuilderControlOptionDescriptor {
@Override
public String getDisplayName() {
return "Stop All Containers";
}
}
}
|
"Then I won't even bother questioning you. The city is on maximum lockdown and evacuation." She turned to address the others. "Take Arianna and leave. Take the last boat and the gate will close behind you. The citizens will be teleported to the other branches."
Gustav simply stood there. "Surely you don't intend to leave your husband in his current condition?"
Joshua was trying to get to his feet, but lacked the strength to do so. After a while he gave up and began drawing symbols with his own blood.
Daniel turned to face the voice. It came from a rather large wolf. He knew this wolf, but of all the wolves he knew, he was unable to recall this one's name. The wolf stared at him with malicious intent.
_________________
Spoiler:
"Where should I go?What should I do?I don't understand what you want from me"Hoobastank ~ Out of Control
Gustav started to speak, but stopped when he noticed Katra's battleaxe begin to glow. Grey energy began to pour from it and Gustav watched as it began to move. He knew that it was Joshua's Reaper energy, diluted by Daniel's human blood, and according to his calculations it would be attracted to the person closest to death in the surrounding area, granting them the powers of a Reaper. However, rather than moving to Gustav, who was bleeding all over the floor, the energy head straight for Daniel. It enveloped his body like a mist and when it cleared the body was gone.
_________________
Spoiler:
"Where should I go?What should I do?I don't understand what you want from me"Hoobastank ~ Out of Control
"Is that so? I hardly think it would be appropriate to say-" Gustav was cut off as a sharp metal blade entered his back, severing the spine. He spat out blood as it began to fill his mouth.
As figure in a familiar black cloak stood behind him, holding Soul's Bane in one hand. "You talk too much," the Reaper spoke. "Why don't you just die already." The life left Gustav's eyes as he fell to the floor.
_________________
Spoiler:
"Where should I go?What should I do?I don't understand what you want from me"Hoobastank ~ Out of Control |
were received to when a final printed and
casted model was ready to ship.
Dr. Abdulrauf and his team used the
3D printed models to plan surgical procedures and then actually rehearse them
using the same types of instruments and
equipment they would be using on the
live patient. The initial results from these
early trials have been very promising.
“I’ve done a lot of aneurysm opera-tions in my career and I can confidentlysay that having the 3D printed modelhere has a very positive impact on theprocedure results,” Dr. Abdulrauf stated.“The model has helped to identify andovercome surgical challenges, like opti-mum access to the aneurysm or the depthand angle of the approach, before surgerybegins.”The trails also provided valuableinformation that will help make the nextgeneration of surgical models even moreuseful. For example, Dr. Abdulrauf toldMedical Device Technology that theworking feels of the printed materialscame close to that of actual tissue, buttheir surface texture did not provide accu-rate haptic feedback through the surgicalinstruments. He said that that one of thegoals of the next phase of developmentwill be to work on materials with morerealistic textures.
Now that these preliminary experiments have yielded positive results, the
next move is to measure the success of
3D printed models through a pair of blind
studies that Dr. Abdulrauf has proposed.
In the first study, resident neurosurgeons
will be asked to perform a procedure on a
cadaver. Half of the residents will prepare
for the surgery using a 3D printed model
of the cadaver’s while the other half will
prepare for the surgery in the conventional manner. The performance of the
two groups will be compared in a blind
study by a team of assessors who will
not know which group received the 3D
printed model. Success will be measured
by the duration of the procedure, absence
of errors, and how well the surgical teams
are able to keep the circumference of the
surgery as small as possible and minimize
disturbances to adjacent healthy tissue.
A second study will compare the out-comes of two groups of patients receivingsimilar operations and a similar standardof care. The only difference will be thatthe neurosurgeons in one group will re-ceive a 3D printed model of their brain topractice on prior to surgery. Both groupswill be assessed on the basis of patientrecovery time and overall patient comfortpost-surgery. Once the studies are funded,Dr. Abdulrauf hopes to gain deeper, morequantified insights into the how 3D print-ing can positively impact the outcome ofsurgical procedures. MDT |
GreatGuys – LAST MEN
I haven’t died yet, I’m still enduring
You can step on me but I’ll get up again
The only thing I have are my fists
I put in my all, countdown
As time passes (I used to get nervous)
I used to sway (round and round)
But I still the light faintly, I’ll survive till the end
I’ll go to you, I’ll be your last
I’ll appear before you breathtakingly
You’re the reason I need to be stronger
So I can’t stop
Because of you, wait for me, I won’t take too long
Stay with me, I’ll protect you
I’ll be your light, I never stop with you
Every day, I won’t stop, I’m different
I grew out of jealousy and envy, my future is still bright
My attitude hasn’t changed, I’ll show you twice as much
No one cam compare me with anyone else, another level
They tortured me over and over
But I ran till my body broken down
I see the end, I can see you
I’ll survive till the end
I’ll go to you, I’ll be your last
I’ll appear before you breathtakingly
You’re the reason I need to be stronger
So I can’t stop
Because of you, wait for me, I won’t take too long
Stay with me, I’ll protect you
I’ll be your light, I never stop with you
No more cry for me no more pain for me
Hold my hand again
I’ll live again, I’ll live for you
I never let u leave me
I’ll be your last
I’ll be your last
I’ll appear before you breathtakingly
You’re the reason I need to be stronger
So I can’t stop
Because of you, wait for me, I won’t take too long
Stay with me, I’ll protect you
I’ll be your light, I never stop with you
Stay with me |
Q:
Laravel equivalent of ->fetch?
I am working on a website that uses PHP and SQL to connect to the database, I'm trying to replace all the SQL with Laravel Query Builder commands.
I am running into a problem with the following code:
public function queryUsers()
{
$db = $this->getMysql();
$stmt = $db->query("SELECT * FROM users");
while ($row = $stmt->fetch()) {
$this->addedUsers[$row['user_id']] = $row["slack_handle"];
$this->addedUserNames[$row['user_id']] = $row["name"];
}
}
I can easily connect to the database using Laravel, however I am not sure how to continue after the code shown below:
public function queryUsers()
{
$stmt = DB::table('users')->get();
}
TLDR:
In PHP/PDO Fetch fetches the next row from a result set, I'm curious if Laravel has an easy way to do the same.
A:
public function queryUsers()
{
$users = DB::table('users')->get();
// $users is array of Std Object.
foreach($users as $key => $user) {
$data['user_id'] = $user->id;
// $user->name, $user->address
}
}
|
Crate Training – Protect Your Home and Your Pup
PUPPY PROOFING YOUR HOME BEGINS with controlling your pup’s environment by actively supervising him—or by restricting him to a safe place where he can’t be hurt and can’t do any damage to your home.
How to Begin Crate Training
Put your puppy in the crate in a room in which there are often people. This way,
your puppy will not feel abandoned.
After your puppy has eaten, has had some playtime and exercise and has had a chance to eliminate, it’s time for a little nap or some alone time to play with his
favourite toys. This is your best opportunity to begin crate training.
Give your puppy a chew toy and treats. Start with short periods in the crate with the door open. Then, try closing the door for longer periods.
If your puppy cries, wait for a quiet moment. Then, open the door and give
him a treat. This way, you reward the quiet behaviour, not the whining.
If you try to keep your puppy in a crate overnight, place the crate in a place where you can hear him. If your puppy cries for hours and you don’t respond, he will feel that no one is going to help him. Instead, you want him to learn that the crate is a safe place where good things happen. You can place the crate in your bedroom or set up a
sleeping bag next to the crate for the first couple nights so that your puppy can see
and smell you.
Remember that puppies can’t hold their bladders for very long. Your puppy may
need to be let out to eliminate at night for the first few weeks. |
| Member - {Blog Details}.
blog details: In the event that you are searching for a genuine enterprise permit yourself the joy of eating Indian Food. A considerable lot of us are anxious and frightful to attempt this fascinating delightful and bright sustenance since we feel it might be excessively zesty. Remember that all Indian sustenance is not zesty and most eateries will set up the nourishment to your loving, controlling the warmth. Try not to deny yourself this brilliant food. Indian restaurant Croydon | Croydon hills |
--! qt:dataset:src1
--! qt:dataset:src
set hive.mapred.mode=nonstrict;
set hive.auto.convert.join = true;
explain
SELECT sum(hash(a.key, a.value, b.key, b.value1, b.value2))
FROM
(
SELECT src1.key as key, count(src1.value) AS value FROM src src1 group by src1.key
) a
FULL OUTER JOIN
(
SELECT src2.key as key, count(distinct(src2.value)) AS value1,
count(distinct(src2.key)) AS value2
FROM src1 src2 group by src2.key
) b
ON (a.key = b.key);
SELECT sum(hash(a.key, a.value, b.key, b.value1, b.value2))
FROM
(
SELECT src1.key as key, count(src1.value) AS value FROM src src1 group by src1.key
) a
FULL OUTER JOIN
(
SELECT src2.key as key, count(distinct(src2.value)) AS value1,
count(distinct(src2.key)) AS value2
FROM src1 src2 group by src2.key
) b
ON (a.key = b.key);
|
# download-github-repo
Download and extract a GitHub repository from node.
## Installation
$ npm install download-github-repo
## API
### download(repo, destination, callback)
Download GitHub `repo` (eg. `ianstormtaylor/router`) to a `destination` folder and `callback`. Defaults to the `master` branch, but you can specify a branch or tag as a URL fragment like `ianstormtaylor/router#my-branch`.
## License
MIT |
Machines such as industrial robots are provided with sensors for measuring force or torque that is applied during work.
Such a sensor may prevent a machine failure or a safety accident, and promptly recognizes an unexpected accident to enable a quick response.
A sensor configured to perform the above-described function includes, for example, a differential transformer sensor that uses the difference between magnetizations of a tense direction or compression direction when stress is applied to a ferromagnetic material, a phase difference detection sensor that detects a torsional angle caused by a torque load, and a sensor using a strain gauge.
The sensor using a strain gauge has a problem in that a relatively accurate strain measurement is enabled only when a point at which deformation such as a tension or compression has occurred due to force or torque is found and the strain gauge is attached to the correct point.
In this case, a solution that can improve inconvenience in measuring a strain and also enhance accuracy of the measurement value is needed |
Getty Images
When the Steelers played the Seahawks in Super Bowl XL, perhaps you heard that Pittsburgh running back Jerome Bettis was from Detroit.
But the story he tells now about his growing up are a bit grittier than the heartwarming homecoming stories he was telling then.
In an interview with syndicated sports talk host Graham Bensinger, Bettis admitted selling crack and shooting at people when he was growing up in the Motor City.
Bettis was asked about selling crack with his brother, and admitted it was considered a financial necessity.
“The mind-set was, ‘We’re in the hood. Mom and Dad, they’re working their butts off. There’s no money around. We need to make some money.'” he said, via James Jahnke of the Detroit Free Press. “So we said, ‘You know what? Let’s give it a shot.’ And it was one of those moments that you regret, but at the moment, that was the only thing that was really available to us.”
That career path obviously comes with a certain set of dangers, and the legendary running back was asked if he ever shot at anyone.
“Yeah. That was part of growing up in our environment, in our neighborhood. That wasn’t out of the realm of normal,” he said. “When you go back, it’s nothing that I ever wanted to glorify, because I know in retrospect that it was awful. Here you are in a position to take someone’s life, and that’s never a good thing. And so as I look back on it now, I always see the wrongs that are in it and never want to bring light to it in that respect: that it was a good thing. It was the worst thing that I could’ve ever done. It was a bad decision, but it was the decision that I made and that I lived with at that moment.”
Bettis has clearly overcome the mistakes of his youth, as he heads into the Hall of Fame after a brilliant career. But as impressive as anything he did running the ball was the fact he could escape that setting, overcome the challenges and become the kind of man he is today. |
Particle-based modeling of heterogeneous chemical kinetics including mass transfer.
Connecting the macroscopic world of continuous fields to the microscopic world of discrete molecular events is important for understanding several phenomena occurring at physical boundaries of systems. An important example is heterogeneous catalysis, where reactions take place at active surfaces, but the effective reaction rates are determined by transport limitations in the bulk fluid and reaction limitations on the catalyst surface. In this work we study the macro-micro connection in a model heterogeneous catalytic reactor by means of stochastic rotation dynamics. The model is able to resolve the convective and diffusive interplay between participating species, while including adsorption, desorption, and reaction processes on the catalytic surface. Here we apply the simulation methodology to a simple straight microchannel with a catalytic strip. Dimensionless Damkohler numbers are used to comment on the spatial concentration profiles of reactants and products near the catalyst strip and in the bulk. We end the discussion with an outlook on more complicated geometries and increasingly complex reactions. |
Q:
send a sms without any gateway using jsp/servlet
I want to build an Web-application using jsp/servlets where we will be able to send sms to recipient,lwt me know,wheather could it be possible without using gateway/gsm modem or I must have to use that.I don't want to use 3rd party's sms appliation.
A:
You'll need a 3rd parties gateway into top level aggregators for this or get a gateway into them yourself (can have expensive setup fee's). (I work in this field).
|
-Kanrabat- wrote: The only reason to buy this TLK Optimus is to not already own the normal release. Because appart the weapons, the differences are negligible.
Negligible?There are many, many more paint apps on the exclusive, especially in the arms and legs. Plus he has chest flames and a slightly better (but still too blue) looking head. Overall it's far and a way a better looking figure.I'm thinking of getting it, but I also feel like a better version could come as a Platinum edition later, but would require me to buy other figures I don't want.Emerje |
A rural Estonia town whose name literally means “cannabis” has voted to adopt a marijuana leaf as its official logo, a local official said Thursday.
Located in southern Estonia, Kanepi’s highly unusual name is rooted in a traditional cottage industry that sprang up around the processing of hemp into oil and fabric centuries ago.
Hemp is a type of cannabis used for industrial purposes with little or no psychoactive effect.
“Today the cannabis leaf is seen primarily as a recreational drug, but in fact, hemp-type cannabis has been used in practical ways for years and it has hundreds of uses,” Kanepi council member Andrus Seeme told AFP, adding that he saw “nothing wrong” with the town’s new logo.
– Read the entire article at The Telegraph. |
Q:
Can Bayesian Optimization be used in lieu of LP, QP, or MIP?
Is it possible to use Bayesian Optimization as a generic solver for traditional constrained optimization problems like LP, QP, MIP, etc...or it is it limited in scope to Hyperparameter search and auto-ML problems?
A:
I believe that the OP is referring to the optimization algorithm that builds a Gaussian Process (GP) surrogate model to a black box function and then optimizes the surrogate model. This approach has been extended from unconstrained optimization to include constrained problems as well.
Bayesian Optimization has the advantage that it can be used on an arbitrary function $f(x)$ that can only be computed in black-box fashion. It has the disadvantage that it fails to make any use of known structure in the objective function or constraints.
You can certainly apply this kind of Bayesian Optimization to a more highly structured problem, but chances are that specialized algorithms will perform better than Bayesian Optimization for your problems because these specialized algorithms can take advantage of the structure of the problem.
|
WASHINGTON, D.C. - US President Barack Obama has said that Americans are facing competition from India and China and exuded confidence that young Americans can match or exceed anything that they do. “You guys are all coming up in an age where you’re not going to be able to compete with people across town for good jobs—you’re going to be competing with the rest of the world.
Young people in India and China, they’re all interested in trying to figure out how they get a foothold in this world economy,” Mr. Obama said while addressing students in Maryland on Monday. “That’s who you’re competing against. Now, I’m confident you can match or exceed anything they do, but we don’t do it by just resting on what we’ve done before. We’ve got to out-work and out-innovate and out-hustle everybody else. We’ve got to think about new ways of doing things,” said the U.S. President. Mr. Obama said he wants to make sure every student in America has a chance to get that moment.“You’re also going to be leading this country. That’s the chance that this country gave to me and Michelle. And that’s the chance I want for every single one of you,” he said. “From preschool for every four-year-old in America, to higher education for everybody who wants to go, every young person deserves a fair shot. I’m going to keep on doing everything I can to make sure you get that shot and to keep America a place where you can make it if you try,” he said. Mr. Obama announced to launch a new competition, backed by erica’s Depts of Education and Labor, to start redesigning some high schools. |
Q:
Iterate over fields in typesafe config file
In my Scala application I have a configuration like this:
datasets {
dataset1 = "path1"
dataset2 = "path2"
dataset3 = "path3"
}
Ho do I iterate over all the datasets to get a map [dataset, path]?
A:
You can call entrySet() after getting config with getConfig()
import scala.collection.JavaConversions._
val config = ConfigFactory.load()
val datasets = config.getConfig("datasets")
val configMap = datasets.entrySet().toList.map(
entry => (entry.getKey, entry.getValue)
).toMap
You will end up with a Map[String, ConfigValue].
|
Many conventional vehicles include rear defroster assemblies that are used to clear (e.g., defog and/or de-ice) the rear window of the vehicle. Many such defroster assemblies are electrically operated and utilize heating elements that extend across the rear window. For various reasons, the heating elements may become damaged and inoperable such that they are no longer effective in clearing the rear window. Accordingly, rear defroster assemblies are desired having improved resistance to damage. |
La Masia de l'Academia Sánchez Casal
The restaurant La Masia belongs to the Sánchez- Casal Academy . Since this is a more of total department that the Academy provides . Different objectives and services occupy the restaurant , the food concern for athletes in both academic and athletic training , is one of the main , an area where nutrition and health food are the standard .
The Masia restaurant has other services that the club offers its different customer segments, bar snack menu and restaurant pool and terraces to their members. The noble restaurant customers can access without being members, offering him their daily menus, as well as the sporadic actions marked by temporality (Calçots, Ferias de Abril, Christmas menus , barbecues, Pota Brava del Prat...) . The catering department Sanchez Casal Academy also has a number of open spaces and bucolic ideal for holding events both private and enterprise, being managed directly by the department and putting under any other service that the customer can need club ( tennis , paddle tennis -team -building- MICE - restoration ..) . |
Cristiano Ronaldo missed the award ceremony at the Globe de Oro event at Lisbon, Portugal, and had to be represented by his two sisters, Katia and Elma Aveiro. However, apparently he attended the gala after party, at the Urban Beach nightclub. He was se... |
Q:
Django: Using custom AUTH system, why is the User model always still needed?
I'm developing an SAAS and having the hardest time wrapping my brain around why I need to use "User" for anything other than myself. I don't know why but it makes me queezy to think that I, as the developer/admin of the entire software, with full Django Admin access (like the Eye of Sauron), have the same type of User object as an "Account" holder's "UserProfile" has. Please help me understand why this is necessary.
Example:
class Account(models.Model): # represents copporate customer
admin = models.ForeignKey(User)
# other fields ...
class UserProfile(models.Model):
user = models.ForeignKey(User)
account = models.ForeignKey(Account)
It feels like I'm mingling the builtin Admin functionality with my account holders' users' functionality. Is this just for purposes of reusing elements like request.user, etc.?
A:
Well, reuse of code and functionality might be a happy side-effect, but fundamentally I don't think this is broken.
A User represents someone using your website. At the base level it doesn't matter who that person is or what features or functionality they need - just that they make requests and can be identified in some way.
Further functionality can be added in different layers, either through built in components like Groups or Permissions, or through something else you build on top yourself as you are doing in your example.
|
Halogen-enriched fragment libraries as chemical probes for harnessing halogen bonding in fragment-based lead discovery.
Halogen bonding has recently experienced a renaissance, gaining increased recognition as a useful molecular interaction in the life sciences. Halogen bonds are favorable, fairly directional interactions between an electropositive region on the halogen (the σ-hole) and a number of different nucleophilic interaction partners. Some aspects of halogen bonding are not yet understood well enough to take full advantage of its potential in drug discovery. We describe and present the concept of halogen-enriched fragment libraries. These libraries consist of unique chemical probes, facilitating the identification of favorable halogen bonds by sharing the advantages of classical fragment-based screening. Besides providing insights into the nature and applicability of halogen bonding, halogen-enriched fragment libraries provide smart starting points for hit-to-lead evolution. |
The PRIDE Study is conducted by doctors and research scientists at Stanford University and the University of California, San Francisco. Health questionnaires are designed with expert guidance from national advisors before they are shared for community input from PRIDEnet , a national network of individuals and organizations that engage LGBTQ+ people in health research. Learn more about our team .
How is my information kept safe?
As doctors and researchers, we understand that information about your life is personal. Like our patients’ health information, it is our top priority to keep the information you share private and secure. All communications between you and the study are encrypted, and our data centers are physically and digitally secured.
All studies are reviewed by the Human Research Protection Program (HRPP) at Stanford University. In addition, we have obtained a Certificate of Confidentiality (CoC) from the National Institutes of Health that prohibits disclosure of identifiable, sensitive research information to anyone not connected to the research.
Learn more about the study’s data security. |
PA/GETTY Jeremy Corbyn believes Britain should be a republic without the Queen
FREE now and never miss the top Royal stories again. SUBSCRIBE Invalid email Sign up fornow and never miss the top Royal stories again. We will use your email address only for sending you newsletters. Please see our Privacy Notice for details of your data protection rights.
The left wing leader, who once voted to abolish the monarchy, has indicated he may refuse to become a member of the Privy Council, the Queen’s formal body of advisers. However, unless he swallows his pride, Corbyn will not be “privy” to state secrets or issues of national security in times of emergency. David Cameron could even order that another member of the Labour party take his place at such key meetings. Declarations of war and peace treaties are signed “on the orders of the Privy Council” thanks to ancient rules first established by William the Conqueror to link inherited monarchy with elected government. The Privy Council, which requires MP members to swear a second oath of allegiance to the Queen, is also involved in making amendments to European treaties.
Meetings of the National Security Council and Cobra, the Government’s crisis response committee could also be off limits for Corbyn if he refuses to join. And it might prevent him from taking part in Prime Minister’s Questions from the despatch box, relegating him to the backbenches for his weekly showdown with David Cameron. “By not taking Privy Council he may as well wave the white flag,” admitted a senior Labour source. “If you aren’t willing to attend meetings of the highest importance then you’ve got no business leading the party and vying to be the country’s Prime Minister.”
Constitutional expert David Rogers, who explores the subject in his new book, “By Royal Appointment: Tales from the Privy Council”, said: “The official Leader of Her Majesty’s Loyal Opposition has always been sworn to the Privy Council. |
using System.IO;
namespace Optimizer
{
internal static class Required
{
internal readonly static string CoreFolder = CleanHelper.ProgramData + "\\Optimizer\\";
internal readonly static string ReadyMadeMenusFolder = CleanHelper.ProgramData + "\\Optimizer\\ReadyMadeMenus\\";
internal readonly static string ScriptsFolder = CleanHelper.ProgramData + "\\Optimizer\\Required\\";
internal readonly static string ExtractedIconsFolder = CleanHelper.ProgramData + "\\Optimizer\\ExtractedIcons\\";
internal readonly static string FavIconsFolder = CleanHelper.ProgramData + "\\Optimizer\\FavIcons\\";
internal static void Deploy()
{
if (!Directory.Exists(CoreFolder))
{
Directory.CreateDirectory(CoreFolder);
}
if (!Directory.Exists(ReadyMadeMenusFolder))
{
Directory.CreateDirectory(ReadyMadeMenusFolder);
}
if (!Directory.Exists(ScriptsFolder))
{
Directory.CreateDirectory(ScriptsFolder);
}
if (!Directory.Exists(ExtractedIconsFolder))
{
Directory.CreateDirectory(ExtractedIconsFolder);
}
if (!Directory.Exists(FavIconsFolder))
{
Directory.CreateDirectory(FavIconsFolder);
}
try
{
File.WriteAllText(ReadyMadeMenusFolder + "DesktopShortcuts.reg", Properties.Resources.DesktopShortcuts);
}
catch { }
try
{
File.WriteAllText(ReadyMadeMenusFolder + "SystemShortcuts.reg", Properties.Resources.SystemShortcuts);
}
catch { }
try
{
File.WriteAllText(ReadyMadeMenusFolder + "PowerMenu.reg", Properties.Resources.PowerMenu);
}
catch { }
try
{
File.WriteAllText(ReadyMadeMenusFolder + "SystemTools.reg", Properties.Resources.SystemTools);
}
catch { }
try
{
File.WriteAllText(ReadyMadeMenusFolder + "WindowsApps.reg", Properties.Resources.WindowsApps);
}
catch { }
try
{
File.WriteAllText(ScriptsFolder + "DisableOfficeTelemetryTasks.bat", Properties.Resources.DisableOfficeTelemetryTasks);
}
catch { }
try
{
File.WriteAllText(ScriptsFolder + "DisableOfficeTelemetryTasks.reg", Properties.Resources.DisableOfficeTelemetry);
}
catch { }
try
{
File.WriteAllText(ScriptsFolder + "EnableOfficeTelemetryTasks.bat", Properties.Resources.EnableOfficeTelemetryTasks);
}
catch { }
try
{
File.WriteAllText(ScriptsFolder + "EnableOfficeTelemetryTasks.reg", Properties.Resources.EnableOfficeTelemetry);
}
catch { }
try
{
File.WriteAllText(ScriptsFolder + "DisableTelemetryTasks.bat", Properties.Resources.DisableTelemetryTasks);
}
catch { }
try
{
File.WriteAllText(ScriptsFolder + "EnableTelemetryTasks.bat", Properties.Resources.EnableTelemetryTasks);
}
catch { }
try
{
File.WriteAllText(ScriptsFolder + "DisableXboxTasks.bat", Properties.Resources.DisableXboxTasks);
}
catch { }
try
{
File.WriteAllText(ScriptsFolder + "EnableXboxTasks.bat", Properties.Resources.EnableXboxTasks);
}
catch { }
try
{
File.WriteAllBytes(ScriptsFolder + "OneDrive_Uninstaller.cmd", Properties.Resources.OneDrive_Uninstaller);
}
catch { }
try
{
File.WriteAllText(ReadyMadeMenusFolder + "InstallTakeOwnership.reg", Properties.Resources.InstallTakeOwnership);
}
catch { }
try
{
File.WriteAllText(ReadyMadeMenusFolder + "RemoveTakeOwnership.reg", Properties.Resources.RemoveTakeOwnership);
}
catch { }
}
internal static void Clean()
{
CleanHelper.EmptyFolder(CoreFolder);
}
}
}
|
Spectral resolution enhancement of acousto-optic tunable filter by double-filtering.
The development of the large angular aperture noncollinear acousto-optic tunable filter (AOTF) is based on the parallel tangents momentum-matching condition. In this letter, we have introduced a special double-filtering method that leads to an enhancement of the spectral resolution. And the birefringence together with the rotatory property of the interaction material has been considered to ensure the accuracy of designing an AOTF. The principle and availability of double-filtering are discussed in detail. It is confirmed that double-filtering method is effective to enhance the spectral resolution on the condition of keeping the quality of imaging, which is significant in practical applications of imaging AOTF. |
Home Opplis
list
When your appliances fail or become outdated, you may be thinking that it’s time to spruce up that kitchen with new cabinetry and some new countertops and flooring. There are many types of home improvement jobs people attempt to do for many reasons. Before you pull out that tape measure, though, take a few minutes to read these tips.
Improving your home’s energy efficiency is a type of home improvement that could deliver significant returns in both the short and long term. Possible improvements to consider are: installing solar panels on your roof, cavity wall insulation, loft insulation and replacing any single-glazed windows with double-glazed or even triple-glazed windows.
Replacing the hardware in your home such as doorknobs, hinges, pulls, light fixtures, etc, can transform a home from one era to another. It is a quick and easy way to make your home look newer and more updated just by … |
Recent Articles
Most Popular
Most Recent
Volunteers may now check out a kit, (containing environmentally safe solvent, scrapers, rags, masks, and goggles) to remove graffiti and stickers from the backs of street signs, dumpsters, newspaper boxes, metal and wood utility poles throughout Portland |
Phorever People (feat. Jhelisa)
- text
Keep generating joy making
Keep dreaming on, Phorever People
still doing it right!
We are Phorever People and we don't have to look too far to find ourselves
Phorever People can it be?
We are Phorever People and we can see tomorrow in each other's eyes
Phorever People can it be?
Phorever People behold you stand tall,
you won't fall, because you give it your all
with a magical aura of wisdom and will we'll progress in the future and never stand still
Knowing and seeing that we're going thru change
Discovery of light, starting to arrange
In the Mind with the help of bisualisation
Plan for the future civilisation
Making a decision, and knowing it's right
Discovery of truth in the vision of light
Phorever People you will always be
A step forward in life for positivity
So keep on believing, and keep on going,
Keep on trying and keep on sowing
The seed that is good - you know that we know
Yo - oh here we go!
We are Phorever People and we don't have to look too far to find ourselves
Phorever People can it be?
We are Phorever People and we can see tomorrow in each other's eyes
Phorever People can it be?
Phorever People for now and for then
You say "For When?" and I say it's Phorever, my friend
Because the Future is Now, and Phorever is Here
Within Visions of Truth, Imagination is Clear
So go forth with Experimentation
Technology for the Future Generation
Add knowing insight and Mystical Might
Phorever People still doing it right!
We are here and now among You
We are here and now among You (still doing it right!)
We are here and now among You
Add knowing insight and mystical might
Phorever People still doing it right!
We are Phorever People and we don't have to look too far to find ourselves
Phorever People can it be?
We are Phorever People and we can see tomorrow in each other's eyes
Phorever People can it be?
Phorever People can it be? oyoyouuu
Keep generating, joy making
Keep dreaming on, Phorever People
Keep generating joy making
Keep dreaming on, Phorever People
still doing it right!
still doing it right!
We are Phorever People and we don't have to look too far to find ourselves
Phorever People can it be?
We are Phorever People and we can see tomorrow in each other's eyes
Phorever People can it be? |
This relates to integrated circuits with memory and, more particularly, to volatile memory elements.
Integrated circuits often contain volatile memory elements. A volatile memory element retains data only so long as the integrated circuit is powered. In the event of power loss, the data in the volatile memory element is lost. Although nonvolatile memory elements such as memory elements based on electrically-erasable programmable read-only memory technology are not subject to data loss in this way, it is often not desirable or possible to fabricate nonvolatile memory elements as part of a given integrated circuit.
As a result, volatile memory elements are often used. For example, static random-access memory (SRAM) chips contain SRAM cells, which are a type of volatile memory element. In programmable logic device integrated circuits, SRAM cells may serve as configuration random access memory (CRAM) cells. Programmable logic devices are a type of integrated circuit that can be programmed by a user to implement a desired custom logic function. CRAM cells are used to store configuration data supplied by the user. Once loaded, CRAM cells supply control signals to transistors to configure the transistors to implement the desired logic function.
Volatile memory elements such as SRAM and CRAM cells are typically based on cross-coupled inverters (latches). In each memory element, the cross-coupled inverters are connected to an address transistor that is turned on when data is being read from or written into the memory element. When no data is being read from or written into the memory element, the address transistor is turned off to isolate the memory element.
As semiconductor technology scales towards smaller sizes, lower power supply voltages may be used to power integrated circuits. Lower power supply voltages and smaller devices may lead to decreased read and write margins for volatile memory elements. This can pose challenges for reliable device operation. |
Jax is a type of dog that is a boss. His charm and good looks are next to none. He is the ultimate player in the female dog pool. Height and weight mean nothing in hid sexual endeavors. Even a elephant would succumb to his advances. |
Pocket watches are typically constructed with their internal working mechanisms or movements secured within a protective exterior casing to protect its internal components. The front surface of the casing is often fitted with a crystal, lens or other transparent material to allow for viewing of the watch's hands or digital display, as the case may be. Pocket watches also typically include a hinged and closable cover to protect their lenses or faces. Such covers are often held closed by a closing spring or latch mounted in the watch case. When open, the covers are usually maintained in an open position by means of a spring mounted along, or within, the hinge mechanism attaching the cover to the watch casing.
Many pocket watches share common watch movements that are manufactured by various suppliers and then purchased by watch manufacturers for use in individually styled watches. In some more expensive watches specific movements may be designed and manufactured for individual applications. In either case, a movement holder is often used to stabilize the watch movement and hold it securely within the exterior casing. The function of typical movement holders is to maintain the watch movement in its desired position, thereby preventing it from sliding or moving around within the case.
A problem that has been addressed by pocket watch manufacturers for a considerable length of time is the construction of a watch that is water and dust resistant. Water or dust that seeps into the watch casing can cause damage to the movement, thereby shortening the useful life span of the watch. Where the watch movement is electronic, water or dust coming into contact with critical electronic components can result in an immediate failure.
To inhibit the ingress of water and dust into the interior of a watch casing, others have developed a variety of different seals and sealing mechanisms used in association with the back of the casing. A rubberized or other synthetic seal may be placed upon the back such that when the back is fastened to the casing water and dust are prevented from entering into the interior of the watch. However, such seals suffer from a number of inherent limitations that can severely limit their effectiveness, particularly when the back of the watch is removed for purposes of cleaning or servicing, or to replace a battery in the case of an electrically powered watch. Often the seal on the back may be damaged or destroyed when servicing the movement. In other instances, if the back is not replaced in a precise manner upon the casing of the watch the seal may not fully engage the casing and a complete water tight and dust proof seal will not be achieved. In addition, such seals rarely provide any assistance in preventing water or debris from entering the watch casing through either the opening or closing spring used in association with a closable cover that may be used to protect the watch's crystal. |
Product Summary
Precision spindle bearings are single row angular contact ball bearingscomprising solid inner and outer rings and ball and cage assemblies with solid window cages. They cannot be dismantled. The bearings are available in both open and sealed versions. Yet, they have restricted tolerances. They are particularly suitable for where requires very high guidance accuracy and speed capacity, especially for slewing part of the main spindle of machine tool.
Meanwhile, Precision spindle bearings own the characteristics of super high-speed, high-precision, high efficiency, micro-precision bearings manufacturing process with the inner circle is efficient grinding tool, but also other sectors within the round holes of the grinding machine parts bound election.
Furthermore, with performance analysis, reasonable structure, excellent technical performance, Precision spindle bearings are particularly suitable for supporting high axial forces. They are directly interchangeable with spindle bearings of series B719 and B70 and offer even more precise machining results and higher cutting performance for the application. So they should be used wherever operating conditions call for superior accuracy, very high speed, quiet operation (low noise and vibration). |
Q:
Compare string to regex in rspec?
I was doing
expect(@link.url_address == 'abc').to be_true
but url_address might have other text after abc so I am trying
expect(@link.url_address =~ 'abc').to be_true
but I am getting
Failure/Error: expect(@link.url_address =~ /abc/).to be_true
expected to respond to `true?`
I also tried
expect(@link.url_address).to =~ /abc/
but I get
Failure/Error: expect(@link.url_address).to =~ /abc/
ArgumentError:
The expect syntax does not support operator matchers, so you must pass a matcher to `#to`.
A:
Try this:
expect(@link.url_address).to match(/abc/)
Source: https://github.com/rspec/rspec-expectations#regular-expressions
|
Enterprises generate and store increasingly vast amounts of data. For security and protection against data loss, techniques may be used to store these vast amounts of data in secondary or backup storage devices. A backup storage device may be implemented using a storage array such as Redundant Array of Independent Disks (RAID), a data storage virtualization technology that combines multiple physical disk drive components into a single logical unit for the purposes of data redundancy, performance improvement, or both. A disk in a RAID may be referred to as a member. Typically, the member disks are low cost disks. Different RAID levels may be used. The backup storage may be considered as local storage. Recently, there is a trend to use object-based storage due to its ability to scale and store large amounts data. |
LUCENA CITY—Communist Party of the Philippines founding chair Jose Maria Sison on Friday said that President Rodrigo Duterte’s threat to kill him if peace talks failed was a way of expressing endearment.
“Duterte has repeated so many times the threat to kill me that sometimes I surmise that the expression ‘kill’ has actually become a term of endearment, as in some American comedies,” Sison said in a statement.
ADVERTISEMENT
On Thursday, Mr. Duterte threatened to kill Sison, his former professor, if the government’s proposed peace talks with the communists failed.
The President again invited Sison to come home and gave him two months to discuss peace with the government.
However, if the revival of the peace talks failed again, Mr. Duterte said he would personally escort Sison to the airport but would tell him not to return to the country again because he would kill him.
No word war
“I will really tell him: ‘Son of a b****, don’t you ever come back here again. I will really kill you,’” Mr. Duterte said.
The President also blamed Sison for the death of soldiers and policemen during the more than four decades of communist insurgency in the country.
But Sison, who is based in The Netherlands, avoided another word war with Mr. Duterte.
“I will not reply to Duterte in any vitriolic manner, unless he actually wrecks the work already done by the negotiating panels to prepare for the resumption of formal peace talks,” said Sison, who also serves as chief political consultant of the National Democratic Front of the Philippines. —DELFIN T. MALLARI JR.
ADVERTISEMENT
Read Next
EDITORS' PICK
MOST READ |
Q:
Set value in a jqgrid cell based on the value of another jqgrid cell
I've got a coulmn STATUS in my jqgrid.
If the status is Active I want another cell in the same row to be green.
If the status is Not Active I want the cell to be red.
How can this be done?
As of now I've created a custom formatter on the "image" row:
formatter: function () { return "<img src='../images/red.png'/>" }
A:
There are different ways how you can implement it in jqGrid:
the usage of cellattr to set class or style of the cell (see here or here)
the usage of custom formatter (see here)
the usage of setCell (see here)
the usage of beforeProcessing method to modify the data returned from the server. In the way you can implement any calculated column. The value of the column could be HTML fragment if required.
I would recommend you to use cellattr or beforeProcessing approach or combination of both. You can consider to use background images instead of <img>. The most advantage of the cellattr approach is that you can place additional information like color inside of the cell having another data formatted with the corresponding formatter. So you can continue to use 'number' or 'date' formaters and have in the same cell some color effects.
The CSS possibilities are very powerful. As an example I can reference the answer which demonstrate how to implement nice gradient effects.
In any way I recommend you to read the answer which discuss advantages and disadvantages of setting different styles and classes on the cell.
|
[whimsical music playing]
Hey, gods. It's Devi Vishwakumar,
your favorite Hindu girl
in the San Fernando Valley.
What's a-poppin'?
It's the first day of school,
and I thought we should have a check in.
I think we can all agree
that last year sucked
for a number of reasons.
So I thought of a few ways
you guys can make it up to me.
One: I'd like to be invited to a party
with alcohol and hard drugs.
I'm not gonna do them.
I'd just like the opportunity to say:
"No cocaine for me, thanks. I'm good."
Two: I'd love for my arm hair to thin out.
I know it's an Indian thing,
but my forearms look like
the frigging floor of a barber shop.
And lastly, most importantly,
I'd really, really like a boyfriend,
but not some nerd from one of AP classes.
Like a guy from a sports team.
He can be dumb. I don't care.
I just want him to be a stone-cold hottie,
who could rock me all night long.
Thanks for considering. I love you guys.
|
Q:
Disable active button in jQuery
I have a navigation bar and I've been able to fix its behaviour as I like with this jQuery code:
$(document).bind('mobileinit', function () {
$.mobile.activeBtnClass = 'unused';
});
But this way I disable ALL the buttons in my webapp...
I'd like to aim it to a specific set of buttons.
How can I achieve that?
I'd do:
$(document).bind('mobileinit', function () {
$(".myclass").activeBtnClass = 'unused';
});
or
$(document).bind('mobileinit', function () {
$(".myclass").mobile.activeBtnClass = 'unused';
});
But this won't work...
What is wrong?
A:
Your suggestion was interesting, roXon, but since I wanted to let the user understand where he was while using my webapp.
Fortunately jQuery guys thought about this kind of issue and I have been able to solve the problem very easily adding class="ui-btn-active ui-state-persist" so my button.
Thanks anyway!
|
Diagnosis and management of posttransplant lymphoproliferative disorder in solid-organ transplant recipients.
The Epstein-Barr virus (EBV) has a pivotal pathophysiologic role in the development of most lymphoproliferative disorders that occur after solid-organ transplantation. The term "EBV-associated posttransplant lymphoproliferative disorder" (PTLD) includes all clinical syndromes of EBV-associated lymphoproliferation, ranging from uncomplicated posttransplant infectious mononucleosis to true malignancies that contain clonal chromosomal abnormalities. PTLDs are historically associated with a high mortality rate in patients who have a monoclonal form of the disorder. Recently described approaches to pathology, diagnosis, treatment, and preventive strategies of PTLD, however, have the potential to improve outcome. |
The call came in for “possible stabbing victim,” but it was in an elderly retirement community. Weird. Don’t see that every day, especially at two o’clock in the morning.
As we arrived at the scene, there were a couple of police cars with their lights on, in different areas of the road, looking for addresses with their spotlights. It was really dark out. As we pulled up, we parked the ambulance next to the curb, shut off our lights and got out. I asked my partner, “Did they give us an apartment number?” The retirement community had multiple apartment buildings surrounding a central outdoor grass space with trees. My partner asked on the radio, if we had anything further on the location. As I was listening for the response, I heard a yell come from the middle of the grassy area. It sounded like a deep, throaty, eery yell, kind of like Linda Blair’s demonic voice from the Exorcist. I yelled to the cops that I thought the guy was in the middle of the park, and started walking toward the yelling with my flashlight, scanning the park.
One of the cops caught up to me. I asked him what information they had on it. He said they had a report of someone breaking the glass entry door on one of the buildings, and then banging on doors in the building. “You should see the blood in the hallway. It’s smeared all the way down the hallway on the walls, like kids’ fingerpaints.”
We finally found where the yelling was coming from.
In the middle of the park, lying in the grass, was a young male with no shirt on, covered in tattoos and blood. He was lying on his back in the grass, the grass oily and dark with blood, a lot of blood. The man was yelling in the gravelly demonic voice, incomprehensibly. We walked up to him and leaned down to ask him what was going on. Someone’s flashlight glinted off of a metal object and I saw the knife, lying in the grass, inches from his hand.
I stepped on the man’s wrist, and kicked the knife away with my other foot, yelling to the officer to grab it. My partner grabbed the other wrist. I said to the guy, “I’m with the paramedics, man. What happened?” He lifted his head up from the ground. He was pale, and I could tell he had lost a lot of blood. He was covered in it and so were his jeans. It looked like most of it was coming from his groin area. With his head up, he opened his eyes wide and yelled something nonsensical. I told him we were here to help him and needed to know what happened.
I asked him again, “What happened, man?” He said, “The Devil has been talking to me for three days. He told me to kill myself.” I asked, “You did this to yourself?” He picked his head up again and yelled, wide-eyed, “I told you, motherfu*%er, demons are in my apartment! They have been talking to me.” I asked him what he did to himself and he told me he “…buried the knife in my groin on both sides,” which, it turned out, described his injuries accurately. Knowing we would be starting IV’s on the guy, my partner and I each put a tourniquet on the arm closest to us to try to get his veins to pop up enough for us to see. This guy was bleeding to death and we needed to keep his blood pressure up and stop the bleeding. I threw a roll of gauze to one of the cops, who had latex gloves on, and asked him to put pressure on the side that was bleeding the most. |
module.exports = function(GeoCity) {
};
|
BlizzCon brought a whole lot of news for the latest addition to Blizzard's line-up, Overwatch. We learned a release date, a price (meaning we also learned it won't be free to play), saw a new map and three new heroes, and much more about the story and universe. I sat down with Game Director Jeff Kaplan and Creative Director Chris Metzen to discuss how the beta's been going so far, why they went with this payment model, what future content might look like, and much more. Watch the video above to see our full conversation. |
Child and Youth Care Counsellors - Relief
HULL SERVICES – POSITION OPENINGS
CHILD AND YOUTH CARE COUNSELLORS - Relief
We are currently hiring Relief Child and Youth Care Counsellors for our Therapeutic Campus-Based Care programs. Bring your talent and passion to a community-first organization at the forefront of children’s mental health. Collaborate with diverse, talented colleagues and leaders who support your success. Help transform children and families to get the most from their lives. Sharpen your skills through industry-leading training and development, as you build an extraordinary career.
Hull Services is a Registered Charitable organization that provides an integrated continuum of services including specialized therapy, counselling and education for children, youth and families who experience emotional and psychological disorders, behavioural problems, learning disabilities, mental illness, developmental delay, neglect, abuse and family breakdown. We continuously grow to meet the needs of our changing and diverse society and have become an employer of choice in our field. At Hull we view our employees as our strength and are committed to professional growth, competitive compensation, a comprehensive benefits plan and a supportive team environment.
Reporting to the Program Coordinator, the Child and Youth Care Counsellor is a member of the interdisciplinary team which assesses, plans, implements and evaluates the treatment program(s) for a given person served. The Counsellor participates fully in all facets of program life with the persons served (instrumental, clinical, developmental), and is responsible for their daily care, treatment, nurturance, supervision, health and discipline. The role is extensive and includes counselling, teaching and training, as well as recording and reporting.
Duties and Responsibilities Include:
Communicate rules and behavioural limits to the person served and follow through on appropriate behavioural consequences
Select and make appropriate use of behavioural interventions and strategies
Identify and act on goal-related teaching opportunities
Use routines and activities to give persons' served security, to enable them to relate to others in socially acceptable ways, help the person served to understand the need for routines and procedures.
Use systematic plans of instruction, appropriate teaching methods and approaches to transfer information and skills to the persons served
Act as an avenue of recourse or grievance for the person served and represent his/her interests.
Monitor and work directly with the person served in all aspects of his/her life, i.e., liaison with parents, community groups
Supervise, organize and implement daily living activities and see these as opportunities for educational and therapeutic interventions
Plan and carry out individual and group activities of a recreational nature
Provide a meaningful and responsible role model, as well as direct teaching in areas of grooming, hygiene, dress, nutrition and social manners. Attend to the physical safety, esteem and developmental needs of the person served
Improve the quality of life for the persons served through attending to the physical environment.
In dealing with persons served, parents/guardians, co-workers, other professionals and the public, demonstrate appropriate conduct in terms of behaviour, appearance, and presentation and conform to Agency expectations with regard to confidentiality
Attend to team membership responsibilities in terms of participation, communication, positive attitude
Model socially acceptable values, i.e., integrity, fairness, respect
Carry out advocacy responsibilities with regard to the person served and the Agency
Promote and safeguard persons' served rights, interests and treatment by interceding on their behalf
Participate in Professional Development Activities
Skills and Qualifications:
Degree or diploma in human services or social sciences, or currently enrolled in a program
High personal competence in the formation and maintenance of caring, therapeutic relationships
Interest, commitment, consistent, and a high level of personal maturity and responsibility |
Q:
Set default content_type for Flask test client
Is there a way to set the default content_type value for the test client in Flask?
For example, if I have the following test:
import unittest
class MyTestCase(unittest.TestCase):
def setUp(self):
from my_flask_project import app
self.client = app.test_client()
def test_request_one(self):
self.client.post(
data='{}'
content_type='application/json'
)
def test_request_two(self):
self.client.post(
data='{}'
content_type='application/json'
)
All of my test cases are going to set content_type='application/json'. I would like to set application/json as the default content type for requests but I couldn't find any documentation on how to do this.
Something like this would be ideal:
def setUp(self):
from my_flask_project import app
self.client = app.test_client(
default_content_type='application/json'
)
A:
For most headers, you can pass an environ_base dict to set other headers. However, the test client will always set the Content-Type header to the value passed in, overriding the base. There's also environ_overrides, which can override that override, but that means you can't set the header to anything else, which is probably not what you want.
Create a custom TestClient class that sets a default content type if one is not passed. Assign that class to your Flask app test_client_class and it will use it when creating test clients.
from flask.testing import FlaskClient
class CustomClient(FlaskClient):
def open(self, *args, **kwargs):
kwargs.setdefault('content_type', 'application/json')
return super().open(*args, **kwargs)
app.test_client_class = CustomClient
You can use this technique for any arg, not just content_type, including environ_base.
|
Q:
Outlook Rendering Cursive Font in Sender
This is a new one for me. I'm seeing a cursive font in the Sender line of an email in Outlook web. I'm seeing it in slightly different cursive fonts between browsers (I've checked Chrome, FF, and Safari), but they're pretty close. The really strange thing to me is that the cursive font is also rendering in the DOM tree in DevTools.
The Computed Styles tab is showing a rendered font of Cambria Math, but that doesn't jive with what I'm seeing.
Here are a couple of screenshots of what I'm seeing in Chrome:
Inbox view:
DevTools View:
Does anyone have some insight into how this is accomplished?
A:
A clue is in what you're seeing in the DOM tree in your dev tools, I would say; notice that the text in that DOM node is itself in cursive. That's not what the DOM shows if this was a font applied to plain text. Rather than Credit One [...] in the DOM node with the CSS saying some cursive font is being used, we see [...]. It's literally straight up cursive text.
This isn't strictly speaking "a font", it's characters from a part of Unicode where the formal definition of the glyph is a cursive Latin character (in this specific case, the Mathematical Alphanumeric Symbols block, U+1D4D0 through U+1D503)
|
The present invention relates generally to disc drives. More particularly, the present invention relates to a low cost voice coil motor for use in a disc drive.
Disc drives are used extensively for data storage in various applications. A typical disc drive includes discs on which data is written and heads to read data from and to write data to the discs. The heads are supported by an actuator assembly which allows the heads to be positioned at the desired locations relative to the data tracks on the discs.
Rotational movement of the actuator assembly is generally enabled by a voice coil motor. The voice coil motor is basically made up of a magnet fixed relative to the disc drive housing and a voice coil fixed relative to the actuator assembly. By providing an electric current through the voice coil, a force is exerted on the voice coil, causing the actuator assembly to rotate about a pivot. Pole plates are provided to maximize the magnetic field in the vicinity of the voice coil so as to improve the performance of the voice coil motor.
One important consideration in the production of disc drives is the need to reduce particulate contamination within the disc drive. Particulate contamination in a disc drive must be kept low in order to prevent physical damage to the heads as well as to the discs. Disc drives are required to operate with increasing precision, following the increase in the data densities. Not only are the heads being placed in increasing proximity to the disc surface, the number of data tracks per inch on the discs is also increasing significantly. This increased precision means that particulate contamination in the disc drive must be closely controlled, as the damage caused by contaminants is becoming correspondingly serious. For example, particulate buildup between the head and the disc can cause degradation in the readback signal, head crashes and damage to the disc surface.
The various components must therefore be designed with care so as to avoid the use of materials likely to contribute to particulate contamination. Pole plates are one potential source of particulate contamination, as they are known to outgas when they reach high temperatures. For this reason, pole plates are often coated with a nickel plating, using nickel with high potassium, to prevent the pole plates from outgassing and contaminating the interior environment of the disc drive. Although nickel plating is effective in reducing outgassing, it is a relatively expensive process.
A further potential source of contaminants is the adhesive typically used to mount the magnet to the pole plate. While adhesives are effective in rigidly securing the magnet to the pole plate, they are also prone to outgassing when subjected to the heat typically generated within a disc drive during operation.
What the prior art has been lacking is an easily assembled, low cost voice coil motor which is resistant to outgassing.
The present invention relates to a voice coil motor for a disc drive suitable for low cost production. In accordance with one embodiment of the invention, the voice coil motor includes an overmold encapsulating a voice coil motor assembly including a magnet and a pole. The overmold prevents outgassing by the pole and magnet.
These and other features and benefits will become apparent upon a review of the attached figures and the accompanying description. |
Weathering the storm: persevering through a difficult time.
Parse's human becoming theory of nursing and research methodology were used to uncover the structure of the lived experience of persevering through a difficult time for eight women with ovarian cancer. Three core concepts surfaced: deliberately persisting, significant engagements, and shifting life patterns. Through conceptual integration these emerged as powering valuing in the connecting-separating of originating. Deliberately persisting, an active forging onward, was supported in the perseverance literature. The concept significant engagements, a variety of encounters uniquely important to an individual, was further clarified. Shifting life patterns, the changing ways of living as the difficult time emerged, was not addressed in the perseverance literature and represents new knowledge to the discipline of nursing. |
Applications of nylon membrane arrays to gene expression analysis.
Gene expression analyses by hybridization of probes derived from mRNA to cDNA targets arrayed on a nylon membranes have been performed with increasing frequency and success over the last decade. While the initial costs of generating arrays are moderately high, they are now available commercially as complete packages which include the membranes and associated image analysis software for acquisition and processing of the data. Arrays can be used to generate information concerning the expression of mRNA from cells treated with various agents or from different tissues, e.g. comparing diseased with normal controls. To date, many groups, including immunologists, have used this technology to examine gene expression within their area of biological interest. The main characteristic of these systems is the large amount of data generated, since the expression of many thousands of genes are measured in parallel. The main practical issues are sensitivity of detection, reproducibility, comparability with other systems (e.g. Northern blots) and processing of data. Some of the significant applications of nylon array technology to date are reviewed in this chapter, and with these issues in mind, we include a discussion of our own experiences in this area. |
// +build darwin freebsd
package termutil
import "syscall"
const ioctlReadTermios = syscall.TIOCGETA
const ioctlWriteTermios = syscall.TIOCSETA
|
Health promotion for end-stage renal disease patients.
Health promotion is the desired objective of dialysis treatment. Achieving the highest level of functioning not only improves the life of the patient but rewards the staff through the positive feedback that improvement produces. The facility is rewarded by a stable population producing a more secure stream of income. The therapeutic environment is improved through better communication, positive attitudes, and more active participation of patients in their care. When maximum health is the focus of care, activities to achieve health are part of routine clinical contact, not additional effort requiring more staff. Fundamental to achieving health is adequate dialysis, control of anemia, good nutrition, and attention to comorbid conditions. The "Five Es" Life Options model of rehabilitation is a pattern for pursuing health and life enhancement. Encouragement is the positive attitude and expectations for each patient. Evaluation is individualized planning and periodic assessment of progress. Education prepares the patient for participation and responsibility. Exercise (on dialysis and off) improves physical capacity and well being. Employment is sought for those of working age and capability. A number of facilities have shown the effectiveness and benefits of these practices. In addition, using health status/quality of life measures to obtain patient-reported assessment of condition allows objective scoring. Comparisons and compilations can be made to evaluate the effect of interventions or illness on status. This can be accomplished for groups or individuals to document the effect of health promotion. |
Q:
MSSQL connection string - Windows Authentication using another set of credentials
It doesn't seem possible to craft a connection string so that you can open a connection to a mssql server using another user's windows credentials. It appears you are limited to specifying either a sql server account, or specifying no creds at all which passes along the current set being used on the domain.
What workarounds are effective ways to circumvent this restriction?
A bit of background:
The company I'm deploying at would like to set up windows credentials for each application accessing the shared databases. This works well for daemon-like background tasks, but it seems a bit complicated for desktop applications.
I've been asked to NOT pass the users creds to the database, but instead pass a set of windows creds reserved for the application itself... not sql server credentials, but an account on the domain for the application.
I've been contemplating using Runas to launch the application (written in Python) using this application windows account.
Perhaps someone out there can suggest a better way?
A:
You could set up a domain group (active directory) for the application, then assign specific domain users to be in that group. The I suppose you could grant privileges to the database for that group.
This would allow specific permissions to be controlled for the group.
Just a suggestion, I hope it helps. Good luck!
|
DUBLIN City Council is to consider planning regulations to allow log cabins to be built in the gardens of home.
People Before Profit councillor John Lyons is to bring a motion before September's meeting of the planning and property development strategic policy committee (SPC) of the council to discuss amending planning laws to allow cabins to be built as a way of tackling the housing crisis.
At the moment any structure above 25sq m needs planning permission and the council can order a cabin to be removed if it is built without proper permission.
The housing crisis has forced people into building log cabins as a means of saving for a home of their own he said, and he wants planning laws to be reviewed to reflect this practise.
"A reasonable response to that by some people has been to construct log cabins in the back garden of their parent's homes or their friend's homes as a way of somewhat temporarily stepping out of the rather overheated private rental market so as to be able to save up some money for a deposit for a home for their families," he told Newstalk Breakfast.
The crisis should not be used to introduce bad planning laws he said but he added his proposal is "sensible" and "modest" and deserves to be debated.
Issues such as how long the cabins could be in place for and planning considerations such as access and fire safety all need to be teased out also he added.
Restrictions such as how long the cabin could be in place for should also form part of the discussion Mr Lyons said, adding that five years would be a "fair time frame".
Online Editors |
using UnityEngine;
using System.Collections;
using UnityEngine.UI;
/// <summary>
/// This is used in the Editor Splash to properly inform the developer about the chat AppId requirement.
/// </summary>
[ExecuteInEditMode]
public class ChatAppIdCheckerUI : MonoBehaviour
{
public Text Description;
public void Update()
{
if (string.IsNullOrEmpty(PhotonNetwork.PhotonServerSettings.ChatAppID))
{
Description.text = "<Color=Red>WARNING:</Color>\nTo run this demo, please set the Chat AppId in the PhotonServerSettings file.";
}
else
{
Description.text = string.Empty;
}
}
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.