text stringlengths 16 69.9k |
|---|
In a conventional wireless local area network (WLAN), an access point (AP) is a station that transmits and receives data (sometimes referred to as a transceiver). A conventional AP connects users to other users within the network and also can serve as the point of interconnection between the WLAN and a fixed wire network. Each AP can serve multiple users within a defined network area. As users move beyond the range of one AP, they can be automatically handed over to the next one. A small WLAN may only require a single AP. Conventionally, the number of APs required increases as a function of the number of network users and the physical size of the network.
APs are typically shipped with a default configuration to allow connection of wireless clients, but most require an elaborate and confusing manual configuration procedure to set up a new AP or new client (e.g., a wireless card, embedded wireless local area network on motherboard (WLAM), etc.). with security features enabled. For example, the following instructions describe how to manually configure a particular wireless connection.
A user opens a client configuration program for a wireless client. A new wireless network configuration can be generated or a default configuration edited. To connect to an AP, the AP is activated. The user must enter a network name or Secure Set ID (SSID) name for the network. Alternately, the user can scan for an available network. To specify a name, the user looks for a network name or SSID option in the configuration utility. The user must ensure that their network card's name or SSID setting is identical to the network name or SSID assigned to the AP. The user enables a security selection, for example enabling wired equivalent privacy (WEP) encryption and enters one or more keys. The keys on the user device and AP must be identical and the same key type (encryption level and hexadecimal or ASCI format) must be used on every device. The user then saves the configuration and attempts to connect the user device to the AP. |
AUTOMATION CONVEYOR
Automation conveyor
Whether you are conveying individual products, full cases, or pallets, we can recommend the appropriate equipment, technology, and material flow layout. … A truly automated conveyor system often needs one or several pieces of ancillary conveyor systems equipment to make it just right for your exact needs
There are many types of material handling technologies out there, but no matter what automation system you install, there will more than likely be conveyor to support the efforts. Do your due diligence or consult with an industry expert to ensure you’re choosing the right conveyor type for your application. By selecting the right conveyors, you’ll ensure your entire manufacturing or distribution facility runs at peak performance. |
In image-guided operations, it is necessary to provide objects such as bones or medical instruments with marker devices. A marker device consists for example of one or more reflective spheres which can be detected by sensors. The position of the marker device and therefore the position of the object can be determined from the position of the spheres with respect to each other.
One commercially available device for fastening a marker device to a bone consists of a screw, a clamping device, an adjusting screw and a sleeve which comprises a mounting for the marker device. When attaching the device, the screw is initially screwed into the bone, and the sleeve together with the adjusting screw and the clamping device is then fitted onto the screw. The clamping device is then fixed relative to the screw, and the sleeve is pressed against the bone in the desired alignment by means of the adjusting screw and thus fixed.
One of the disadvantages of this fastening device is that attaching it to the bone requires a large number of steps working on the patient and thus increases the length of time which the patient has to spend in the operating theatre. |
Story highlights Dulse, a red algae, grows quickly, is packed with nutrients but most importantly, tastes like bacon
Chefs and researchers are looking into ways to incorporate this tasty superfood into recipes
(CNN) Food lovers might no longer have to choose between tastiness and healthiness.
As will be familiar to anyone miserably chewing through leaf after leaf of kale in a beleaguered attempt to shed a few pounds, it's hard to banish thoughts of cheeseburgers, pizza or -- many a dieter's Achilles' heel -- bacon.
But some of those cravings, at least, might soon be banished, if researchers at Oregon State University are correct.
Chris Langdon, a researcher at OSU's Hatfield Marine Science Center, has along with colleagues created and patented a new strain of dulse, a red seaweed which boasts amazing nutritional benefits.
It also, and perhaps more importantly, tastes like bacon, according to its creators.
Read More |
TV Guide caught up with Peter Fonda, who plays Mephistopheles in writer/director Mark Steven Johnson’s Ghost Rider opposite Nicolas Cage. He talked about the film and here’s a clip:
TVGuide.com: Did you go back and look at the comic to inform how you should play the Mephisto character?
Fonda: I had read a few of them before, but I thought regardless of what the guy who wrote the comics had designed here, it was up to me to put it on the screen. As it was, they let me play totally against part. Let me tell you, nobody has played the Devil quite like I do. Oh, man, I loved it. It was really cool.
Hit the link above for the full article in which he also mentions the Hell Cycle and says more about his character. |
She said she came to the decision after realizing she best belongs "in a single school, where I can use my talents as an educator to really help shape students and teachers" although some said privately her departure is indicative of a school system that too often discourages qualified educators by swamping them with bureaucratic paperwork.
The Department of Education plans to appoint an interim-acting superintendent who'll work alongside her through the fall semester, but SILive readers -- some of them school parents and teachers -- told us she'll be a tough act to follow.
"Anyone who worked for or with Ms. Jenkins is one lucky person. Any child who attends or attended, a school run by her, is even luckier," declared Crossfitmom. "She is a caring, intelligent person who only has the students' best interests in mind."
"I can not express how profoundly sad I am to hear of Ms. Jenkins leaving the students of Staten Island. She was a breath of fresh air that was sorely needed in this area. She raised the bar for both students and teachers," offered foundingparent.
Teacher and reader CGWoww who worked with Ms. Jenkins, called her a "caring administrator who knew the staff and students inside out and treated us with a respect that only a few principals I have seen show."
"Amazing boss, amazing person," added Teachkidsnyc, who said her decision to leave "speaks to her dedication to students."
"Students, parents and staff of any school that gets Ms. Jenkins as a principal should consider themselves very lucky; I respect any administrator who feels their true place is among students in a small, familiar setting," wrote lisakleo.
"The new superintendent has big shoes to fill," opined teacher and SILive reader class1004. "Ms. Jenkins was a pleasure to have in our schools. She had the utmost respect for teachers and the work we do. . .Our loss, their gain." |
Cosplaying: How Should I Feel?
As a person who’s actually tentatively planning a cosplay this year for LFCC – and as a person in the atheist community who’s been honestly fucking apalled by how stupid the whole “sex discrimination regulation” things have been at TAM! and such – then I feel like this has to be said:
“Cosplay is NOT Consent aims to educate the community by using the experiences of cosplayers, and convention staff to help put an end to unwanted harassment of convention attendees. We will work with convention owners to help bring comfort and safety back to fan events all around the world. “
I’ve sworn off conventions of any kind. There is already so much being done to bring comfort and safety to select privileged groups, that they have become uncomfortable and unsafe for people not in the explicitly protected privileged groups. That dude getting fired over a G rated “Dongle” joke at Pycon really was just the last straw. Getting more attention than you want really is very secondary to loosing the ability to feed your family.
While I do agree that the pycon business was a travesty, and that no-one should’ve been fired for it, complaints of “reverse sexism” when a mechanism overreacts shouldn’t be an argument against conventions. Or regulations protecting convention goers.
Also, the idea that women are privileged in fields where they are in the minority – a mostly silent minority at that – seems bizarre.
Conventions are so unsafe and uncomfortable for me, that I refuse to go. Are conventions so uncomfortable for Cosplay that people are refusing to go, even not in costumes? People that intentionally do stuff to draw attention to themselves are getting more attention than they want is a very minor problem. Making the con’s more friendly to women in costumes makes them less friendly to men (This does not need to be the case, but it IS the case). What you are in effect asking for is to make con’s less safe for men, many of whom are already avoid the cons as unsafe places. This is how it ties in the the actual post.
It is sexism, not reverse sexism, it’s sexism. The saying “reverse sexism” minimizes and trivializes the victims of this sexism while at the same time implying a definitional direction to sexism that shouldn’t be there. This definitional direction is the biggest problem I have with modern “Feminism” and Women’s Rights. It irks me every time I see it.
That women are privileged in any setting under any circumstances would seem bizarre. “Privilege” has become short hand for “White male privilege” and women are not men, and not necessarily white. Actually applying the concept of “Privilege” to women is a bit hard to wrap your mind around in any circumstance. I’m glad that you are at least trying in a constructive way.
I don’t see how making a convention less threatening to women makes it any more threatening to men. In fact, such regulations work exactly as well for the harassment of male cosplayers: the link actually has a video detailing one male cosplayer’s experience of harassment, and why it was not OK. And I also don’t see how the harassment of convention goers at conventions is a minor problem, unless you think that by dressing that way, they deserve unwanted attentions.
I absolutely agree with your point about “reverse sexism” being sexism: hence the inverted commas. I only used the term because I thought you were suggesting such. I disagree with the suggestion that modern feminism is misandrist or only interested in women, though: that’s never been my understanding or perception of fellow feminists, most of whom have to battle against the “man-hater” image.
All of that said, I’m very sorry you feel so unsafe and uncomfortable at conventions. That sucks 😦
As I said, Making cons more comfortable for one group does not need to make it less comfortable for others. The problem is that this is how it’s actually being implemented and enforced. The harassment policies are becoming more and more about feelings, not actions. I’m not a mind reader. When the policy is “made to feel”, not prohibited actions, I need to know how my actions will make you feel before hand. I’m not a mind reader. The policy revisions and actions have been to make “made to feel” more inclusive and fuzzy. Now that the possible penalties for not being a good enough mind reader have progressed past “ejected from con” to loosing the ability to put food on the table. This is a very hostile environment. Policy revisions that would help both Cosplay and other attendees would be better worded, more clear, definitions of what is and more importantly what is not harassment.
So, this leads me to a very real question for you. What is the greatest level of “Harassment” to which the proper reply is “Suck it up buttercup”. What level of harassment complaints is just being whiny?
No one “Deserves” unwanted attention. This is reality though. Unwanted attention is a reality that must be dealt with. People that intentionally bring attention to themselves raise the bar for when unwanted attention actually becomes problematic. To say the girl in the string bikini with pink hair and talking really loud wants the same amount of attention that the girl in the hoodie is seeking is just silly. The girl putting herself on display wants more attention, and this will include more unwanted attention. This is not ideal, but it is reality.
it isn’t difficult, you are allowed to talk to them as a person, you can compliment their costume all you want. Just don’t make comments about their body, touch them, invade their space or take a photo without permission.
There is also the problem of creators designing costumes for their female characters and then shaming women for actually dressing up as those characters, which makes no sense. Cosplay is fun and attention is not the same as unwanted attention. It is fun to look at all the cool costumes. It’s not fun to have your body critiqued or groped by strangers even if the critic thinks what they say is a compliment.
So rather than “you look hot in that costume” go for “that costume is amazing”. Easy. |
Alkyl halides are versatile alkylating agents in organic chemistry. Methyl halides are particularly popular as alkylating agents. Representative of the methyl halides is methyl iodide, which in a pure state is a clear liquid that over time becomes brown as a result of decomposition to form various iodine-containing species. Methyl iodide is often stabilized through the addition of a solid metal such as mercury or copper to the storage vessel. As alkyl halides including methyl iodide are susceptible to actinic degradation and free radical decomposition, alkyl halide storage is often problematic. Nonetheless, aged alkyl halides are readily restored to usable form through a distillation process.
The handling of isotopically enriched alkyl halides is made all the more difficult by radioisotope emissions creating free radicals that speed the chemical decomposition of the alkyl halide. Distillation to purify usable alkyl halides from a decomposing isotopically enriched alkyl halide is both technically challenging to perform and highly wasteful of radioisotopes.
Owing to the complexities of handling radioisotopes, isotopically labeled reagents tend to be small molecules that can be synthesized and used quickly. [Methyl-3H]methyl iodide is a common methylating reagent used in the synthesis of methyl-labeled radiochemicals. Unfortunately, the rapid degradation of tritiated methyl iodide and other isotope-enriched alkyl halides means that these reagents must be used rapidly after synthesis. The requirement of rapid usage of isotopically labeled alkyl halides entails a scheduled batch production of the reagent followed by numerous reagent consumptive reactions being performed thereafter. The net result is that labeling reactions cannot be efficiently performed but instead are tied to the schedule of alkyl halide production. Additionally, an excess of isotopically enriched alkyl halide is necessarily produced to preclude the possibility of performing a second batch production to account for any shortfall. The resulting excess production of isotopically enriched alkyl halide is wasteful of materials and increases the waste disposal volume. Thus, there exists a need for an isotopically enriched alkylating reagent that has a longer shelf life than the corresponding alkyl halide without loss of specific isotope activity. |
The present invention relates generally to window wipers used to clean vehicle windows and more particularly to wiper blades used in window wipers.
Window wipers used to clean vehicle windows tend to have difficulty adequately cleaning the windows under certain driving conditions. For example, in cold weather driving conditions, a hinge area of a wiper blade may fill with water and freeze. This ice prevents the hinge from properly allowing the wiping lip to flip at the reversal point in the wiper motion. This prevented flipping may cause the blade to chatter as it moves across the window, limiting the blade's ability to clear water and snow from the window.
In an attempt to address this concern, some have made the wiper blade entirely out of silicone or hydrophobic rubber, or have coated the entire wiper blade in these materials. However, silicone and other of the hydrophobic materials used have other drawbacks that make them less desirable when used to make the wiper blade. |
Our Partners
Our Partners
Goverment Collaboration
At OR Movement we’re committed to working for the State of Israel and with the State of Israel. We pride ourselves in keeping an ongoing and strong relationship with the Israeli Government, and are grateful for the ministries which work hand-in-hand with us, putting a working focus on building Israel’s future in the Negev and Galilee. The following ministries keep a committed and ongoing partnership in related factions of our work:
Ministry of Construction and Housing
The Prime Minister’s Office
Ministry for the Development of the Negev and Galilee
Ministry of Finance
Ministry of Economy
Ministry of Transport
Ministry of Defense
Israel Lands Authority
Strategic Partners
Our strategic partners come together from around the world to help us achieve our vision for a strong and independent Negev and Galilee. These partners help us with programs, infrastructure, projects, and general funding to keep the movement alive and growing – and for that, we are eternally grateful.
Greater Miami Jewish Federation
ICA Foundation in Israel
Iranian American Jewish Federation of New York
Jack Chester Foundation
Jewish Community Foundation of Los Angeles
Jewish Federation of Greater Houston
Jewish Federation of Broward County
Jewish Federation of Metropolitan Chicago
Jewish National Fund – Australia
Jewish National Fund – U.K.
Jewish National Fund – U.S.A.
June Baumgardner Foundation
Legacy Heritage Fund
Mack-Ness Fund of the JCF of Greater MetroWest New Jersey
Maggie Foundation
Pratt Foundation
Rene and Susanne Braginsky Foundation
Robert Russel Memorial Foundation
Donors
We would like to thank the following generous donors who have helped us turn our dream for the Negev and Galilee into reality. The following is not an exhaustive list of all donors, but rather a glimpse at some of our longtime partners and contributors who have shared our vision, put their faith in us, and lent their continual support to our organization. |
Q:
Rendezvous in inter process communication?
I have two processes communicating through a send() and a receive().
If both are blocking, I know this is what is known as extended rendezvous, if the sender is non-blocking then it's called limited rendezvous.
But what happens when both send() and receive() are non-blocking? Is this another kind of rendezvous?
A:
It doesn't make sense if both are non-blocking. The way rendezvous might happen in that case, is when both make the calls at exactly the same time.
|
Onikira - Demon Killer
Onikira: Demon Killer is a 2D side scrolling beat ‘em up set in a fantasy feudal Japan where the player takes on the role of a samurai fighting to prevent the forces of the Japanese underworld from breaking through into the world of the living.
Get instant access and start playing; get involved with this game as it develops.
NOTICE: Activation key must be used on a valid Steam account, requires internet connection.
ABOUT THE GAME
Onikira: Demon Killer is a 2D side scrolling beat ‘em up set in a fantasy feudal Japan where the player takes on the role of a samurai fighting to prevent the forces of the Japanese underworld from breaking through into the world of the living.
Onikira: Demon Killer takes the deep fighting mechanics of some of the most amazing 3D beat ‘em ups, like Ninja Gaiden or Bayonetta, and merges them with classic 2D platformer mechanics in a way that has never been done before. For example, launch an enemy into the air, wall jump to position yourself above them, then Katana Slam them into the ground. Switch to the Naginata and use the Naginata Lift and air dash moves to stay in the air and off crumbling platforms, while pulling enemies up to you to be dispatched in mid-air. Whip out your grappling hook to grapple between platforms, across chasms or fiery pits, all the while fending off enemies.
Every level is crammed full of environmental aids to help the player in combat encounters. Slice the support pillars off a building and watch it crush your enemies as it collapses, or use your moves to fling enemies into spikes, pits, or the path of moving deadly objects. Be careful though, as dropping a building on your own head is known to cause sadness! |
In between there's plenty of fun to be had, you'll be canoeing on the Barrington River, abseiling the Buccans Buccans overlooking Gloucester and taking a mountain bike for a spin on the purpose-built riverside trails.
At the end of each day, take a quick dip in the rapids at The Steps or relax by the fire in the tipi chill-out zone. Evening entertainment includes eco spotlighting, star gazing and campfire games. Awesome!
Our eco-camp offers you a journey with a purpose and a place for personal growth. Other lifelong skills achieved are teamwork, self-reliance, determination and cooperation.
all meals while on program, all transfers while on program and all equipment for paddling, mountain biking and abseiling;
campfire games, star gazing night
NB. Does not include arrival/departure transport to/from Gloucester. Gloucester is located on the main northern train line Sydney-Brisbane and is serviced by daily XPT train services from Central via Hornsby, Gosford and Broadmeadow. |
Peripelvic cysts simulating hydronephrosis.
Peripelvic cysts can have a sonographic appearance that is similar to hydronephrosis. Two cases are described where the initial sonogram suggested the diagnosis of pelvicalyceal obstruction, and on subsequent intravenous urography the correct diagnosis of peripelvic cysts was made. |
Nicole Kidman is only a little bit embarrassed about her unexpected clapping at the Oscars this year.
The actress inspired countless memes after an audience shot caught her clapping with her fingers oddly far apart during the ceremony. Now, the Lion actress is poking fun at her viral moment on The Ellen DeGeneres Show, after host Ellen DeGeneres played a looping clip of the clapping technique that has been likened to a seal.
“I do not clap like that, that is a weird lens,” Kidman said amid laughs as she asked the comedian to stop showing the clip.
But DeGeneres instead pressed her on the subject. “How can you make any noise like that?” the host joked. “You’re not even really clapping!”
Kidman then explained it all has a funny tie-in to a classic story. “Because, it’s the Cinderella thing, you borrow these expensive jewels and I’m like, ‘You must not damage these diamonds!’ ” she joked. “And they went back beautifully intact, not a scratch on them.”
The Oscar winner also showed off her normal clapping skills on the show, telling the audience she’s “worked on it.”
Kidman, who will next appear onscreen in The Beguiled alongside Kirsten Dunst and Colin Farrell, also opened up to DeGeneres about her intense fight scenes in her hit HBO show Big Little Lies. The actress admitted that she and costar Alexander Skarsgard attempted to make the scenes as real as possible, with Skarsgard grabbing her and leaving marks behind.
“I threw myself into it, to the point where I would come home at night with, you know, bruises and really sore,” she said. “Alexander would not mean to do this, and I would never tell him that he was hurting me. I wanted him to commit to the scene.” |
Telecommunications systems, cable television systems and data communication networks use optical networks to rapidly convey large amounts of information between remote points. In an optical network, information is conveyed in the form of optical signals through optical fibers. Optical fibers comprise thin strands of glass capable of communicating the signals over long distances with very low loss. An optical network may be configured to combine modulated signals at various wavelengths or optical frequencies (also known as “channels”) into a single optical fiber. Each disparate channel may include optically encoded information to be communicated throughout the optical network. Such combining of various channels into a single fiber is known as wavelength-division multiplexing (WDM). Each optical wavelength (or carrier) may carry multiple sub-carriers using frequency-division multiplexing (FDM).
Orthogonal frequency-division multiplexing (OFDM) is a FDM scheme in which a plurality of closely-spaced orthogonal sub-carriers is used to carry data. The data is divided into several parallel data channels, one for each sub-carrier. OFDM modulation may be implemented using inverse discrete Fourier transformation (IDFT) and an optical modulator instead of using multiple modulators and oscillators for subcarriers as is the case in traditional FDM. The demodulation is also achieved using discrete Fourier transformation (DFT) instead of using multiple filters and oscillators for subcarriers. The separation of subcarrier channels is the integer multiple of the inverse observation period for a symbol to assure orthogonality.
An optical signal comprised of disparate subcarriers may experience optical dispersion (and in particular, chromatic dispersion). Because of dispersion, sub-carriers of differing frequencies may propagate with different speeds in an optical fiber. Optical subcarriers have phase noise due to finite linewidth of the laser providing a source of electromagnetic energy for a fiber. Such laser phase noise combined with dispersion, if not compensated, may lead to non-orthogonality between sub-channels, thus degrading the OFDM signal. Phase noise is the frequency domain representation of rapid, short-term, random fluctuations in the phase of a waveform. Signal degradation due to laser phase noise combined with chromatic dispersion may be significant, especially when optical OFDM signals are created using a distributed feedback (DFB) laser. |
I would recommend you not to change entire code if it is not that necessary,because many code is dependent on jQuery library and some functions also deprecate and not support in latest versions. You may use multiple jQuery files on same page.
In this case the problem wasn't the incompatibilty between the jquery verisons, it was the incorrect order of loading javascript and jquery files and calling of functions.
I solved the problem, your answers helped me. Thanks for help! |
Parathyroid hormone-related peptide: expression in fetal and neonatal development.
Hypercalcaemia frequently complicates the clinical management of cancer. Many factors have been implicated in the pathogenesis of this humoral hypercalcaemia of malignancy, the most recent candidate being parathyroid hormone-related peptide (PTHrP). Until now, this peptide has been detected only in some normal and transformed adult tissues. In recent years, it has become apparent that tumours are capable of expressing and secreting factors previously elaborated only during fetal life. Many of these factors act to stimulate the growth of both tumour and fetal cells in an autocrine manner. The data presented here demonstrate that PTHrP is expressed in the human and rat fetus throughout gestation. Immunocytochemistry reveals a gestationally related, changing pattern of expression which is paralleled by changes in mRNA transcription. These data support the hypothesis that PTHrP may function as a fetal growth factor. |
Providing a reliable and secure method, apparatus and/or system for collecting and counting votes is paramount to a democratic system of government. One method requires a voter to cast their votes by entering their selections into a machine that generates a paper record or ballot, which is then collected and later counted. While the collection of paper ballots is fairly reliable and secure, it does have its problems.
In contemporary voting systems, problems are encountered relating to the accuracy of the ballot. In particular, the generated ballot may not precisely reflect the voter's selections. Also, the voter is not given an opportunity to review the paper ballot generated by the machine, prior to it being deposited in a ballot box. Thus, the voter must trust that the machine will properly record his or her vote.
Also, ballots are traditionally made of paper or some similar material. However, the transfer of such material from the voting machine into the ballot box encounters other problems. Generally, voting machines rely on gravity to “drop” the ballot into the ballot box. Alternatively, a paper handling system inside the voting machine pushes the ballot into the ballot box. Either way, such systems are unreliable since the ballot is prone to getting jammed as it is pushed or otherwise externally forced into the ballot box.
Further, the ballot box itself becomes a security risk if someone can tamper with the contents. In particular, the integrity of the ballot box contents becomes compromised when an unauthorized person is able to either remove ballots from or insert ballots into a ballot box after it is separated from the voting machine. Ballot boxes include simple mechanical covers or doors that close an aperture used for inserting ballots. Such covers or doors can often be opened by poll workers or other non-authorized personnel, thus compromising the integrity of the ballots therein.
There is therefore a need for an efficient, reliable and secure method, apparatus or system for collecting and counting votes, which overcomes the shortcomings found in the prior art as set forth above. Such a method, apparatus or system preferably allows a voter to review their generated ballot before it is deposited within the ballot box. Also, a more reliable method, apparatus or system of depositing ballots within the ballot box should be provided. Preferably, such a method, apparatus or system is capable of keeping the ballot box secure, even after it is separated from the voting machine. |
Toyota: Oh geez, here we go! Let's do this. As far as problematic characters, I think it's okay if it's done correctly. RPDR/Snatch game is a pop culture microcosm, and so meta, and already such a critique of many of society's issues, so I like when a queen can dig into something in the world of the media and make it humorous. For the the first round of Trannika Rex, Nico, and Lucy Stoole's Crash Landing, I impersonated Kim Davis. She's a shit human and hurt a lot of people, but I got to turn that into something funny and turn the tables.
Chad: Right! I saw that! That was at the peak of her fifteen minutes of infamy!
Toyota: Mine too! Thorgy as Michael didn't skirt around any of his issues, but he also showed that this person was a human being, and a very talented, but damaged, one.
Chad: I mean, I really liked the performance, but I could see how someone would have a problem with him making light of what may have been sexual abuse.
Toyota: That's very true. There's always a question with artists--can you appreciate the art but despise the artist, or are they inseparable?
Chad: I hope people like my art despite me being a terrible human being.
Toyota: Let's face it, most celebs/artists have a facet about them that should not be glorified
Chad: So very, very true. Some of them even host reality shows about drag queens.
Toyota: Bloooooop. Are we going there?
Chad: If you have some thoughts you'd like to share on Ru's recent interviews and such, I'm happy to hear them!
Toyota: In all of my years of school, and also as a teacher, I don't feel knowledgeable enough to speak on this, but I am going to anyway, because I'm an American, and that's what we do. A few quotes from an interview with RuPaul and a follow-up tweet have incited quite a bit of controversy in our community.
Chad: About the inclusion of cis-women and trans performers into the Drag Race?
Toyota: Yeah, they're kind of different issues, but also kind of the same. Ru said that drag mocks gender, and trans people take gender very seriously, so while the general public thinks they're similar, they're opposites. Not the exact quote, but that's the gist.
Chad: Right, I think that's a fair summary of that particular point.
Toyota: And with that statement, he widened this already present "us vs. them" gap between gay men and trans women. It's driving a wedge between people and further boxing and labeling and other-ing, which are all things that the queer community doesn't need more of.
Chad: Right, well said.
Toyota: One side of the argument is that he's entitled to his experience and opinion, and we can't fault him for feeling the way he feels.
Chad: True. It's his show, he can cast whomever he wants.
Toyota: But as pretty much the biggest icon of our community, he's got a platform and a megaphone, so he should use that to help as many people as possible. It's not just about casting. It's this idea that all trans people take identity so seriously and "drag queens" don't. It's obviously not that cut and dry. It was just a small answer in a much longer interview, but the way he just easily dismissed the issue was painful. I know tons of queens who still take their gender and masculinity very seriously and only do drag as a job.
Chad: Right, and trans performers who have a lot of fun with gender norms! |
Tell us today
What is Tenancy Fraud?
There are different types of housing fraud. Here are some of the most common ones:
Unlawful Subletting
Where a tenant lets out their council or housing association home without the knowledge or permission of their landlord. They often continue to pay the rent for the property directly to their landlord, but charge the person they are subletting to a much higher rate. It is unlawful and unfair to sublet and to profit from a property which could be given to someone legally entitled to occupy it.
OBTAINING HOUSING BY DECEPTION
Where a person gets a council or housing association home by giving false information in their application, for example not telling the landlord they are renting another council or housing association property or giving false information about who lives with them.
Wrongly claimed succession section
Where a tenant dies and someone, who is not entitled to, tries to take over or succeed the tenancy. For example, they might say they lived with the tenant before they died, when in fact they were living elsewhere.
Key Selling
Where a tenant is paid to pass on their keys in return for a one-off payment to someone who then takes over the tenancy illegally.
Why is it important to tackle tenancy fraud?
There isn’t enough social housing to meet the needs of people who genuinely need it. We have to make the best use of the housing that is available ensuing that it is occupied by those who are legally entitled to do so. People waiting for social housing will have to wait even longer if homes continue to be occupied by people who have no right to be there. |
Firemen and other personnel try to contain a leak from the truck which reportedly turned up to deliver gas at the kitchen area of the Knutsford Court Hotel on Chelsea Avenue yesterday. - Jermaine Barnaby
A propane gas leak from a truck outside the delivery area of the Knutsford Court Hotel in St Andrew, yesterday, prompted firefighters from the York Park Fire Station to respond immediately in order to contain the leak.
The STAR understands that sometime yesterday afternoon, a Gas Pro truck was delivering propane cooking gas to the hotel when, while negotiating a turn, it went over a hump resulting in the rupturing of a hose.
This caused propane to leak into the area. Propane is the gas used for cooking among other purposes.
prevent ignition
"Limited amount of propane gas was in the pressure hose. It is leaking from the truck currently, so we're trying our very best to plug the area to prevent the gas from leaking out. We're also using water to cool the area to prevent ignition and we're plugging the hose," a representative from the York Park Fire Station said yesterday.
Traffic and the movement of pedestrians along the busy thoroughfare were curtailed as the area was cordoned off.
Later, a senior representative from the hotel said the matter had been rectified and that no one had been injured in the incident.
She said the driver of the truck was new and had ventured where he should not have been. She also added that the driver had not started his delivery when the incident occurred. |
Q:
Loss function that penalizes bigger errors
I'm building a machine learning model that realizes sales predictions based on a set of features, but for this specific problem it would not be important to have a spot-on prediction.
The problem is that with the MSE loss function I'm getting some predictions that get spot-on predictions on part of the validation data, and gets a somewhat high error on other points.
So, I was thinking if there is a established function that would help the algorithm prioritize models without grotesque errors.
Thanks in advance.
A:
Often MSE actually penalizes the largest errors too much - being very wrong on a few outliers may be OK if the model is usually more or less right.
Since this is sales prediction, don't you have a loss function? i.e. the cost to the business of an error? On the face of things this is more likely to be the absolute error rather than the squared error.
It might be time to think about your descriptors. No loss function can make a good model if the input data is not predictive of the output.
|
Q:
Continue execution in console after running jar
I have a jar that executes endlessly because i create a thread and the i join() the edt with this thread.
If i run this jar with double click on lets say windows a javaw process is created that runs forever and i can continue working which is what i want.
Now if i try to run the jar from cmd with java -jar myJar.jar the execution halts right there.
What i want is to continue cmd execution after running the jar.
*Note:*I currently trying to do this in linux console which i access with putty.So please consider this in your answer
Thank you
A:
java -jar myJar.jar &
The & puts the command into the background and allows you to do other things from the shell prompt.
This is very basic UNIX/Linux shell stuff. I suggest that you find / read an online tutorial or a book on the shell you are using (e.g. bash). It will make your life a lot easier. Or if you are a masochist, read man bash.
I currently trying to do this in linux console which i access with putty.
Use of putty is actually not relevant.
A:
Try this
java -jar myJar.jar&
It means that the process gets launched and runs in the background. If you want to get it back, type fg. To push it back in the background, press CTRL+Z (this pauses its execution and gives you back your shell prompt) and then run bg to resume it in the background.
|
Template.registerHelper('selected', function(key, value) {
return key == value ? 'selected' : '';
});
Template.registerHelper('isUpdateable', function(userId, role) {
var loggedInUserId = Meteor.userId();
return ((userId == loggedInUserId || (role === 'moderator' && (!Roles.userIsInRole( loggedInUserId, ['admin'], 'CB')))) ? true : false);
});
Template.userById.helpers({
getUser:function(){
var userId = FlowRouter.getParam('userId');
if (Roles.userIsInRole(userId, ['admin'], 'CB')) {
return ;
} else {
return Meteor.users.find({_id:userId});
}
},
userRoles: function(){
const roles = Meteor.users.findOne({_id: FlowRouter.getParam('userId') }).roles;
const roleGroup = 'CB';
return roles[roleGroup] ;
},
});
Template.userById.events({
"change #authorization": function(event, template){
var currentAuthorization = template.find('#authorization').value;
const roleGroup = 'CB';
var pastAuthorization = this.roles[roleGroup].pop();
var userId = this._id;
var username = this.username;
Meteor.call("updateRoles",this._id,this.username,currentAuthorization,pastAuthorization, roleGroup, function(error, result) {
if (result) {
swal("Done!", "Updated "+ username +"'s access right ", "success")
}else{
swal("Oops something went wrong!", error + "\n Try again", "error");
}
});
},
});
|
Q:
not getting data in my datatable
I am a newbie to json and datatables.
I am getting my data in alert(data);.
My datatable gets initialized, but its not displaying any records in my datatable.
Am I missing something here?
$(function() {
$('#Search').click(function() {
$.ajax({
url: "{{url_for('search')}}",
data: $('form').serialize(),
type: 'POST',
success: function(data) {
alert(data);
assignToEventsColumns(data);
},
error: function(error) {
console.log(error);
}
});
function assignToEventsColumns(data){
$('#example').dataTable({
data: data,
columns: [
{ title: "Name" }
]
});
A:
The type of data is a string, when it should be an object or an array of objects.
Try this to parse it.
$('#example').dataTable({
data: JSON.parse(data),
columns: [
{ title: "Name" }
]
});
|
On this page
Vaping
Vaping is the act of inhaling and exhaling an aerosol produced by a vaping product, such as an electronic cigarette. Vaping doesn’t require burning like cigarette smoking. The device heats a liquid into a vapour, which then turns into aerosol. This vapour is often flavoured and can contain nicotine.
Vaping devices are usually battery-powered. They may come with removable parts. Vaping products have many names, including:
mods
vapes
sub-ohms
vape pens
e-hookahs
tank systems
electronic cigarettes / e-cigarettes
electronic nicotine delivery systems (ENDS)
They may also be known by various brand names.
Vaping devices
Most vaping devices consist of a:
battery
mouthpiece
heating element
chamber, such as a tank or reservoir to contain a liquid solution
Most vaping devices use electrical power from a battery to heat a liquid solution. The heat causes the solution to become vaporized. The vapour then condenses into an aerosol, which is breathed in by the user through the mouthpiece.
Vaping devices are available in many shapes and sizes. Some are small and look like USB drives or pens, while others are much larger.
There are two kinds of vaping devices:
open, which means they can be refilled
closed, which means either the whole product, or the part that holds the vaping substances, can’t be refilled
Vaping liquids and substances
Most vaping substances available for sale:
are flavoured
contain nicotine
are liquids, but some are offered as: wax herbs
In vaping liquids, nicotine and/or flavouring compounds are dissolved in a liquid mixture. This mixture is typically propylene glycol and/or glycerol (vegetable glycerin).
In the vaping substances that contain nicotine, the level of nicotine can vary widely. Some mixtures have:
very low levels of nicotine
more nicotine than in a typical tobacco cigarette
Flavouring compounds consist of chemicals and blends of chemicals used to make different flavours.
Contents of vaping vapour
Vaping products produce an aerosol that may contain dozens of chemicals. The ingredients typically found in vaping liquids are also found in the aerosol. They include: |
electroscope
Definition
Electronics
An instrument which detects electric charges by means of electrostatic forces. In a gold-leaf electroscope, for instance, two gold leaves are suspended side by side from a conducting rod which is held by an insulated support, and placed in a groundedenclosure, such as a glass jar. When a charge is applied to a plate to which the rod is connected, the leaves separate due to their mutual repulsion. |
Atlantic coastal plain upland longleaf pine woodland
The Atlantic coastal plain upland longleaf pine woodland is plant community found on the southern Atlantic coastal plain, in the states of southern Virginia, North Carolina, South Carolina, Georgia and northeastern Florida.
These woodlands are dominated by longleaf pine (Pinus palustris) and occur on uplands and on the higher parts of upland-wetland mosaics. They are subject to frequent fires. Soils are well- to excessively drained. Scrub oaks such as turkey oak (Quercus laevis) and bluejack oak (Quercus incana) are often in the understory. The herbaceous layer is dominated by grasses, particularly wiregrass: (Aristida stricta) in the north and (Aristida beyrichiana) in the south. These woodlands may once have been the most widespread plant community within their range.
References
See also
Florida longleaf pine sandhill
Category:Plant communities of Florida
Category:Plant communities of Georgia (U.S. state)
Category:Plant communities of North Carolina
Category:Plant communities of South Carolina
Category:Plant communities of Virginia |
Q:
Issues with DNS target and routing
I've got myself a domain, I've set up the CNAME to point to the DNS target provided by HEROKU. But when I follow the url lewismorgans.uk I am being routed to a page saying "There is nothing here yet, build something amazing".
I've not experienced this before on HEROKU, was looking for some advice?
Thanks.
A:
Question resolved by @ceejayoz.
Must include "www." in the host name on HEROKU.
|
Latest News
Why Get a Professional to Demolish Your Swimming Pool
There are good reasons why a swimming pool is demolished or removed. First, there will come a time that the swimming pool will reach the end of its useful life. With old swimming pools, all sorts of problems crop up, including water leakage and tile cracking. At some point, the owner will have to decide whether to demolish or replace the swimming pool.
Second, a swimming pool is not simple to maintain. Regular repair and maintenance costs money. If a swimming pool is no longer being used as often as it used to, the homeowner may decide to just demolish the pool rather than spend on maintenance for something that is no longer being used.
The cost of demolishing a swimming pool is generally determined by the type of pool (above ground versus in-ground pool), the pool size and method of pool removal. There are two methods of swimming pool demolition: complete demolition and removal, and partial demolition and removal.
Complete Demolition and Removal
This method involves the complete removal of all the concrete and other materials, such as pipes and decking, from the swimming pool and the yard. The hole is filled with dirt and then compacted to bring the area back to its pre-pool state. This technique is ideal for a homeowner who has future plans to build on the area where the pool used to be. The cost will include the removal and hauling of the pool materials, as well as the amount of fill dirt.
Partial Demolition and Removal
This technique involves the demolition of the top few feet of the swimming pool and placing the soil in the bottom of the pool. The old concrete is not removed and is covered up with fill dirt. There are two types of partial demolition. In top layer swimming pool demolition, the top tiled layer of a pool’s wall is removed.
The holes dug into the pool’s floor and the entire swimming pool are filled in with dirt and compacted. Two-foot demolition involves the demolition and removal of the top two feet of the pool’s wall. The holes punched into the pool’s floor are filled in with dirt and gravel.
Whatever method is employed, earth excavation will be involved. It is best to employ the services of a professional earthmoving company to carry out the excavation aspect of the swimming pool demolition. A professional will meet with ou to discuss the process of removing your pool. All the excavation and removal work will be carried out by a reputable professional in accordance with environmental regulations. Lastly, a professional will have the required equipment to get the job done. Find out more information about swimming pool demolition services here. |
you are not quite the bane of my existence although equally consuming. we know that this is problematic because i am so extradorinarly good at feeling bad. you should ravage me in return. make me so unable to close my eyes in ecstasy that i have to stare at you and laugh and shake uncontrolably until i am in so much bearable pain and too sensitive to take it anymore that you again clutch my hand until it is so warm that it has melted to mine and i cant tell whose is whose that it feels as if they have literally melted together. sometimes this makes me nervous because my imagination shows them literally melted together. |
// ------------------------------------------------------------
// Copyright (c) Microsoft Corporation.
// Licensed under the MIT License.
// ------------------------------------------------------------
package v1alpha1
import (
"github.com/dapr/dapr/pkg/apis/subscriptions"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/apimachinery/pkg/runtime"
"k8s.io/apimachinery/pkg/runtime/schema"
)
// SchemeGroupVersion is group version used to register these objects
var SchemeGroupVersion = schema.GroupVersion{Group: subscriptions.GroupName, Version: "v1alpha1"}
// Kind takes an unqualified kind and returns back a Group qualified GroupKind
func Kind(kind string) schema.GroupKind {
return SchemeGroupVersion.WithKind(kind).GroupKind()
}
// Resource takes an unqualified resource and returns a Group qualified GroupResource
func Resource(resource string) schema.GroupResource {
return SchemeGroupVersion.WithResource(resource).GroupResource()
}
var (
SchemeBuilder = runtime.NewSchemeBuilder(addKnownTypes)
AddToScheme = SchemeBuilder.AddToScheme
)
// Adds the list of known types to Scheme.
func addKnownTypes(scheme *runtime.Scheme) error {
scheme.AddKnownTypes(
SchemeGroupVersion,
&Subscription{},
&SubscriptionList{},
)
scheme.AddKnownTypes(SchemeGroupVersion)
metav1.AddToGroupVersion(scheme, SchemeGroupVersion)
return nil
}
|
With the election cycle coming to an end, Americans are now eager to begin on a new path forward for the country. The Work of Hope, a new book written by Rich Harwood, renowned civic engagement expert and president of The Harwood Institute for Public Innovation, looks at a post-election society and discusses what it will take for our country to come together and start on a new trajectory.
Rich wrote the book as a result of his travels throughout the country, speaking to individuals and organizations in a variety of communities around their hopes and aspirations for public life and politics. What he found is that fixing politics or even the economy won’t fix what is broken in the country. His other findings include:
The endless acrimony, division and noise of our politics and public life make people feel like they live in the Tower of Babel.
An endless push for instant gratification now drives our daily behaviors and our unwillingness to make the investments we need.
We must get back to basics – to ignite more compassion, openness, humility and concern for the common good in daily life.
Americans must kick-start a new trajectory for the country through actions that start small and locally – where we can rebuild trust, relationships and confidence.
The central task is to restore belief in ourselves and one another that we can get things done, together. |
Application of the forensic Luminol for blood in infection control.
Transmission of hepatitis C virus occurs frequently in haemodialysis units. A possible route of transmission is indirectly via the hospital environment although this has never been recorded. We investigated the haemodialysis unit in Deventer Hospital, Deventer, The Netherlands, with the forensic Luminol test. With this test, invisible traces of blood can be visualised based on the principle of biochemiluminescence. We demonstrated extensive contamination of the environment with traces of blood. The aim of this article is to introduce this method to infection control professionals, so it can be used to monitor cleaning and disinfection procedures, and alert healthcare workers to the possibility of contamination of the hospital environment with blood. |
Digitising death: Can Griefbots help us manage bereavement?
Griefbots, as they are called, are an almost perfect simulation of a departed loved one, which imitates the tone of voice, the gestures, idiosyncrasies, and even laughter will be ready to interact with the bereaved whenever they reach out.
Related News
Griefbots have become possible because most of the details of a personality can be accessed today from smartphone data and the uncountable apps that we use to record our lives. (Illustration: Vishnu PP)
The Black Mirror episode of Be Right Back does give you the heebie-jeebies when a woman’s dead husband returns to her as a simulated android in a box that she orders. Yet, if simulated chatbots are helping customers past initial hurdles in sales, teaching students, reaching out to patients in medical organisations, then why can’t a simulated version of a loved one comfort us with the familiar gestures and discussions that we were used to when they were alive?
Advertising
Griefbots, as they are called, have made their appearance. An almost perfect simulation of a departed loved one, which imitates the tone of voice, the gestures, idiosyncrasies, and even laughter will be ready to interact with the bereaved whenever they reach out.
Watch: Japanese humanoid robots
Griefbots have become possible because most of the details of a personality can be accessed today from smartphone data and the uncountable apps that we use to record our lives.
Muhammad Aurangzeb Ahmad, principal data scientist at KenSci, has conversations with a simulation of his father, who passed away a few years ago with the help of a chat-style program that he created. Reflecting on his experiences, Ahmad has written two books, How the Dearly Departed Could Come Back to Life — Digitally and After Death: Big Data and the Promise of Resurrection by Proxy.
Advertising
Ahmad agreed to answer a few questions regarding the issue, which while being sensitive, could well become a part of our future generations. His motive to start the project, he says, was personal.
“The project is, of course, very personal to me, but I think, at the end of the day, it is less about me and more about how I want my children to connect with their past, specifically with their grandfather, whom they can never meet in this life,” he says.
Latest Videos
Is it real?
One of the often argued point here is, ‘It won’t be the real thing’. Most people, when told about the idea of virtual simulated interaction with deceased loved ones, argue that it can never be the same thing. Ahmad says that outside of the realm of science fiction, no one is actually claiming that a simulation of a deceased person would have the fidelity and experience as the real thing.
“What we are hoping to create with these technologies is to get as closer to the experience of simulated interaction as possible, while acknowledging that there may always be some limitations. That said, in certain contexts it may actually be possible to create simulations that are very close to the real deal; although creating a perfect replica may be impossible, at least with the given current technology,” he says.
What the tech?
The technologies and the methods that Ahmad is using continues to evolve as he upgrades the simulation. He says that he started off with some techniques from NLP (Natural Language Processing) using Markov Models and then moved on to other generative models in NLP rooted in deep learning.
Hossein Rahnama, of Ryerson University and the MIT Media Lab, is also working on chatbots made from personal data. His AI programme builds a simulation from the digital history that a person leaves behind in digital social media networking, such as emails, texts, tweets, and even snaps.
Inserting these into artificial neural networks, which resemble model brains that have the ability to comprehend language patterns and process new information, he enables the digital being of the person to continue living even after the physical being is gone. Since the neural network possesses the ability to “think” for itself, the digital being keeps evolving. Hence, an augmented-eternity bot would learn and evolve by keeping itself updated regarding current events, developing new opinions.
What Ahmad has created is an online text-based interaction. Will the next step be android based physical bots, whom we can see and touch? If so, how soon is that likely to happen? If at all.
More Explained
Ahmad explains, “I am taking an iterative approach to create simulations. Currently, I am looking at voice synthesis, which has proven to be a challenge. The eventual goal of this project would be to integrate Augmented Reality (AR) or Virtual Reality (VR) into the system.”
What about ethics?
However, this is an invention that begs the question of ethics. So far, what we have learnt of death is that it is the cessation of a being, the time for that ultimate rest, and the time for loved ones to move on. While most cultures advise that the ultimate step in dealing with grief is to move on, it can be argued that the use of simulated memories could hinder that process from completing.
Ahmad argues that while moving on is a part of dealing with grief, not everyone has closure when it comes to dealing with death. “Technologies like these can help people get a sense of closure when there is none,” he says.
So, if this practice became commercialised, the kind of ethical arguments we would have to take care of seem complicated. Ahmad says that not only are there multiple ethical conundrums with respect to proliferation of such technologies, but also, there are risks.
The ability to customise simulations gives us a chance of preserving aspects of our loved ones as we like them, or even creating aspects, and adding to their personality. Aspects we do not like can be expunged from the simulations, and we can end up creating unrealistic portrayals of the deceased.
“In the real world, we have to live with the positive and the negative aspects of people’s personalities, but if we can edit out the negative aspects, then we lose fidelity. In the commercial sector, there would be great temptation to edit and curate the personalities of the deceased. There is also the problem that we risk turning aspects of human personality into a commodity,” he explains.
Every culture has their own way of remembering their dead, whether it’s through a photograph with a garland hung around it or a tombstone built in the honour of the person. Simulating the dead to remember them could be seen as a new culture born of the digital generation. However, at the same time, we must tread with caution into this world where technology and psychology amalgamate.
Advertising
Navanwita Bora Sachdev is a freelance contributor and a senior writer for The Tech Panda |
Quote of the day
“I just could not bring myself to tell an entire group of our community they were less important, less worthy or less deserving of the rights and responsibilities of marriage than anyone else, simply because of their sexual orientation.” |
using Coypu.Actions;
namespace Coypu.Tests.When_making_browser_interactions_robust
{
public class CountTriesAction : BrowserAction
{
public CountTriesAction(Options options) : base(null, options)
{
}
public int Tries { get; private set; }
public override void Act()
{
Tries++;
}
}
} |
White House: We're fine with term 'Obamacare'
David Jackson | USA TODAY
The White House says there is no ban on the term "Obamacare."
Republicans and other critics note that President Obama and aides have tended recently to use the new law's formal name -- the Affordable Care Act -- amid criticism of the website and other aspects of the new health care law
But the shorthand term, "Obamacare," can still be heard at the White House, aides said.
"I know I'm fine with calling it 'Obamacare.'" said press secretary Jay Carney. "The president's fine with it."
Carney added: "We're focused on making sure that the 'care' part is delivered to the Americans who want it. And whether it's the Affordable Care Act or Obamacare or anything else, what matters to the president is that the benefits available to every American who gets covered, either through the exchanges or has coverage already, are delivered." |
Remote controlled, self-propelled toy vehicles such as cars or trucks have been in use for years. In many designs, a control module having a joy stick or other steering device is coupled to a circuit that includes an RF transmitter capable of producing control signals in response to input from the steering device. These signals are transmitted to an RF receiver in the vehicle coupled to a circuit that controls movement of the wheels of the vehicle and the motor that propels it. More sophisticated designs have modules with controls for braking, acceleration and other functions of the vehicle.
Manipulation of a number of controls on a module requires a degree of skill and manual dexterity that younger children may not possess. Further, the more sophisticated the vehicle system the more expensive. Many parents are unwilling to entrust a younger child with a plaything that is relatively expensive and may be readily easily damaged. |
The secret menu item is a novel way to order your burger: Tomato Wrap Style. It's similar to getting any burger protein style, but instead of lettuce serving as your buns, tomato slices are used instead. The result is what can only be described as the juiciest, messiest burger experience possible. |
Protein inhibitors of calcium salt crystal growth in saliva, bile and pancreatic juice.
The control of the formation of crystals in biological fluids is one of the most exciting field of research involving both organic and biochemical areas. Many organisms have evolved mechanisms which minimize or avoid the effects of nucleation and crystal growth formation. One of the most important mechanism is the interaction of specific proteins, called inhibitors, with crystals which alters their habits and leads to their elimination. This article, focused on saliva, pancreatic juice and bile, reviews our present knowledge on the structure-function relationships existing between these proteins and their ability to inhibit the growth of different calcium salt crystals. |
Q:
Why does Flycheck complain "mapcar called for effect" when my function returns the result of mapcar by design?
Since installing Flycheck I've been bombarded with complaints about the elisp functions I've used reliably for years. This is the first one I can't understand. Here my function is designed to return the result of mapcar, not to produce side effects. The suggested replacement of mapc won't do what I need, though dolist could with a bit more effort.
Here's the code:
(defun synclient-get-touchpad-config ()
"Return the touchpad config as a list of strings."
(mapcar (lambda (s)
(string-join (split-string s)))
(seq-drop-while (lambda (s)
(not (string-prefix-p " " s)))
(process-lines "synclient" "-l")))
(current-buffer))
The exact error message is:
‘mapcar’ called for effect; use ‘mapc’ or ‘dolist’ instead (emacs-lisp)
What exactly is flycheck expecting me to do here?
A:
It's mainly just a warning - really a suggestion.
It's pointing out that if you don't care to produce a new list from the original one, where the returned list's elements are the results of applying the function argument to the original list's elements, then you might as well just use dolist or mapc instead of mapcar.
In this case, your mapcar is, yes, returning a list of the function results. But your function synclient-get-touchpad-config doesn't do anything with that returned list. Your function instead returns the current buffer. According to your function, you didn't need to use mapcar - you made no use of its returned list. You could have just used mapc.
Using those functions is likely to be more performant. And they make clear to a human reader of your program that the results of applying the function to the list elements are unimportant (not used).
Besides being mainly a suggestion, it might sometimes let you know that you forgot to use the results of applying the function, if that was, in fact, your intention.
|
Familial hypoparathyroidism with candidiasis and mental retardation.
Five new cases of the syndrome of hypoparathyroidism, candidiasis, and mental retardation are described and the importance of the dental findings in contributing toward a definite diagnosis is stressed. The close consanguineous relationship of the parents, first cousins in all of these cases, makes imperative the consideration of the concept that the syndrome is a congenital defect, transmitted by a recessive gene. |
The goal when ray tracing any game is to enhance existing technology by taking an effect or feature a step beyond what was previously possible, bringing us closer to digitally replicating reality to heighten immersion and realism. For Modern Warfare, we partnered with Activision and Infinity Ward to ray trace the game's shadows, rendering additional lifelike shadows, and adding an extra level of refinement to further improve fidelity for gamers with ray tracing-capable GPUs.
Specifically, ray tracing casts new shadows and enhances shadows cast by Point Lights (light bulbs and other man-made lights) and Spot Lights (flashlights, searchlights, and other game elements that cast a cone of light) in the single-player campaign and all core multiplayer modes.
Without ray tracing, traditional shadowmaps are utilized, which can't properly account for complex game elements, and lack shadows for many smaller game elements and details. For instance, in this scene, foliage is correctly shadowed, the shadows of soldiers combine into one smooth shadow instead of unnaturally overlapping with hard shadows, and extra shadows add depth and detail to bricks, fences, and other objects in the alley. Immersion, realism and graphical fidelity are all heightened, and everything appears as you would expect to see in real-life, as is our intent when applying ray tracing to any title. |
Somerton railway station (disambiguation)
Somerton railway station may refer to:
Somerton station, on the SEPTA West Trenton Line in Philadelphia, Pennsylvania, United States
Somerton railway station, Melbourne, Australia, now replaced by Roxburgh Park
Somerton railway station, a former station in Somerset, England
Fritwell & Somerton railway station, a former station in Oxfordshire, England |
<resources>
<string name="app_name">RapidFloatingActionButton</string>
<string name="hello_world">Hello world!</string>
<string name="action_settings">Settings</string>
<!-- 用于通过唯一的identificationCode获取 -->
<string name="rfab_identification_code_fragment_a">RFAB_IDENTIFICATION_CODE_FRAGMENT_A</string>
<string name="rfab_identification_code_fragment_b">RFAB_IDENTIFICATION_CODE_FRAGMENT_B</string>
<string name="rfab_identification_code_fragment_c">RFAB_IDENTIFICATION_CODE_FRAGMENT_C</string>
</resources>
|
Menu
Shop
About Caren
Our entire line has been formulated by our world renowned cosmeceutical chemist. Each product contains antioxidants, aloe vera and glycerine to provide ultimate hydration enhancing your skin’s appearance with a radiant and youthful glow. |
The Best Crepe Makers
You don’t have to travel to France to enjoy a delicious crepe—these crepe makers make it easy to make the thin, tasty pancakes at home. (Delaney Van on Unsplash/)There are few things as romantic a...
Perfect Your Breath with These Mints
Both sweet and refreshing, mints make for a great post-meal treat. (Pexels/)Mints come in a wide range of flavors and all shapes and sizes. Some have calories. Some do not. Whatever your flavor and st... |
I hear a lot of people saying they're sleepier since the change from Daylight Savings Time to Standard Time. Changing clocks is a lot more invasive on circadian rhythms than most people realize. It can affect health too. It takes the body somewhere around a month to adjust to the loss or gain of an hour--more for children, elderly, those with unusual schedules or already sick peopleFall Back Daylight Savings Time Change Makes Us More Tired |
Q:
All rows and total of the rows showing same values in power BI
I am trying to show "Some Column Name" against "Total Amount" in Power BI.
I am expecting the following results:
But instead it's showing me the following results:
The current data type is "fixed decimal number" I tried changing it to "Decimal number" or "Whole Number" but it did not work.
Any suggestions?
A:
The reason why you have a single repeating value is because you did not create a relationship in powerbi model. If for example you have two tables Sales and Staff and you want to sum all staffs sales.
if no relationship created between table in power BI
The output will look like this
However when a relationship is created between the tables
The output will be correct
|
Renin-angiotensin system and atherothrombotic disease: from genes to treatment.
The renin-angiotensin system plays a central role in the pathogenesis of cardiovascular disease. At the molecular and cellular levels, angiotensin II, the main effector peptide of the system, stimulates key components of atherosclerosis. Trials in animals and humans indicate that blocking renin-angiotensin system pathways decreases atherosclerotic plaque progression and ischemic events. This review provides a broad overview of the entire role of the renin-angiotensin system in atherothrombotic disease, ranging from molecular pathways to human genetics to the latest clinical trials. |
Meditative Work: Dream Boy’s Weekly Visit
The man in my dreams seems most fond of visiting me on Saturday mornings when I’m meditating. He shows up at other times, too, but most frequently, he picks a Saturday morning. His Higher Self seems to connect with me most at that time, but it could be because I’m less stressed and rushed on a weekend morning.
This time, as with the last few times, he’s been much happier and very focused on his career. Rather than being at work, he was in my home in this meditation, but so were a lot of people. He’d brought them with him, but not in an intentional way. They seemed to be people he socializes with and therefore “around” him subconsciously.
It was a short visit, he said, because he had to be back in “class” early the next day. He was learning something new, some new focus in his career efforts, so that it was almost like going back to school. We didn’t get much of a chance to talk, but he also mentioned that it’s been so long since he was promiscuous in his younger days that he’s been kicked out of the club.
Half of what he said to me was obscured, almost en- coded, so others there wouldn’t understand. One person in particular, who kept arranging things to keep us separated. A woman I’ve not thought about in a while, a woman who was a mutual acquaintance, one we both considered domineering, one who frequently told me hurtful lies about him.
So why is she back in the mix? She’s somehow in con- tact or knows something of him again that’s gotten her so stirred up. Her feelings toward me haven’t changed. Neither has the proprietary nature of her feelings for him.
These dreams and meditations have been so interesting to me over the past year and more. For so many months, there was the constant movement—the car dreams—where we were both on a journey together and sharing our insights. Early on, he did most of the driving. Later it was me, and if he did drive, I was navigating. There were times throughout the winter and early spring when I saw him in prison and sent angels to rescue him.
These meditative moments started out shy, barely touching, then moving to more progressive emotional and physical moments, culminating and then stopping altogether in late May, the last one being a vivid meditation when I arrived in Daytona for the RT convention.
He was always so busy, with so many people pulling at him. I would give him space to think and someone else would immediately fill the gap I’d given him as a gift. We could barely have a moment alone in a dream because others would interfere or ensnare or interrupt or attempt to destroy. Some people were intent on us not making a connection, even in these meditations.
By June, he was silent and distant in my meditations. Shut off. Alone. No one was trying to interfere then. All those who had, by then had smugly gone on their way. He’d show up in my world, often where I was seeking nourishment, and watch from the periphery, unable to speak to me but so seeming to want to. So full of grief and despair and heaviness, and yet walling himself off from me. He was lost then, but I gave him maps and helped him pack. So painfully alone and distraught, and then the one time when I touched his shoulder and he dissolved into sobs but wouldn’t tell me why.
By September, things were lightening up. Something new in his job. Some new happiness. Very busy, yes, and very focused, but wanting to share his good news with me.
Things are better now. Lighter. More social and less isolated. With music. With learning and preparing for the future again, at last.
And yet, this person from the past is right back in the mix, refusing to leave us alone to talk and working her subtle inferences. I have to wonder what she knows about him now after so long that would have her step- ping in to try to seize control. |
# Description:
# stb package.
package(default_visibility = ["//visibility:private"])
licenses(["notice"])
cc_library(
name = "stb_image",
srcs = [":stb_image_impl"],
hdrs = ["stb_image.h"],
copts = select({
"@//xrtl/tools/target_platform:windows": [],
"//conditions:default": [
"-Wno-unused-function",
],
}),
includes = ["."],
visibility = ["//visibility:public"],
)
genrule(
name = "stb_image_impl",
outs = ["stb_image.cc"],
cmd = "\n".join([
"cat <<'EOF' > $@",
"#define STB_IMAGE_IMPLEMENTATION",
"#include \"stb_image.h\"",
"EOF",
]),
)
cc_library(
name = "stb_image_write",
srcs = [":stb_image_write_impl"],
hdrs = ["stb_image_write.h"],
includes = ["."],
visibility = ["//visibility:public"],
)
genrule(
name = "stb_image_write_impl",
outs = ["stb_image_write.cc"],
cmd = "\n".join([
"cat <<'EOF' > $@",
"#define STB_IMAGE_WRITE_IMPLEMENTATION",
"#include \"stb_image_write.h\"",
"EOF",
]),
)
cc_library(
name = "stb_rect_pack",
srcs = [":stb_rect_pack_impl"],
hdrs = ["stb_rect_pack.h"],
includes = ["."],
visibility = ["//visibility:public"],
)
genrule(
name = "stb_rect_pack_impl",
outs = ["stb_rect_pack.cc"],
cmd = "\n".join([
"cat <<'EOF' > $@",
"#define STB_RECT_PACK_IMPLEMENTATION",
"#include \"stb_rect_pack.h\"",
"EOF",
]),
)
cc_library(
name = "stb_textedit",
srcs = [":stb_textedit_impl"],
hdrs = ["stb_textedit.h"],
includes = ["."],
visibility = ["//visibility:public"],
deps = [":stb_textedit_hdrs"],
)
cc_library(
name = "stb_textedit_hdrs",
hdrs = ["stb_textedit.h"],
includes = ["."],
visibility = ["//visibility:public"],
)
genrule(
name = "stb_textedit_impl",
outs = ["stb_textedit.cc"],
cmd = "\n".join([
"cat <<'EOF' > $@",
"#define STB_TRUETYPE_IMPLEMENTATION",
"#include \"stb_textedit.h\"",
"EOF",
]),
)
cc_library(
name = "stb_truetype",
srcs = [":stb_truetype_impl"],
hdrs = ["stb_truetype.h"],
includes = ["."],
visibility = ["//visibility:public"],
deps = [
":stb_rect_pack",
],
)
genrule(
name = "stb_truetype_impl",
outs = ["stb_truetype.cc"],
cmd = "\n".join([
"cat <<'EOF' > $@",
"#include \"stb_rect_pack.h\"",
"#define STB_TRUETYPE_IMPLEMENTATION",
"#include \"stb_truetype.h\"",
"EOF",
]),
)
|
Seattle, WA - Car thief gets a little confused about what gear he's in. |
Q:
Ruby, Map, Object attributes
I have an object that looks like the below:
class Report
attr_accessor :weekly_stats, :report_times
def initialize
@weekly_stats = Hash.new {|h, k| h[k]={}}
@report_times = Hash.new {|h, k| h[k]={}}
values = []
end
end
I want to loop through the weekly_stats and report_times and upcase each key and assign it its value.
Right now I have this:
report.weekly_stats.map do |attribute_name, value|
report.values <<
{
:name => attribute_name.upcase,
:content => value ||= "Not Currently Available"
}
end
report.report_times.map do |attribute_name, value|
report.values <<
{
:name => attribute_name.upcase,
:content => format_date(value)
}
end
report.values
Is there a way I could map both the weekly stats and report times in one loop?
Thanks
A:
(@report_times.keys + @weekly_stats.keys).map do |attribute_name|
{
:name => attribute_name.upcase,
:content => @report_times[attribute_name] ? format_date(@report_times[attribute_name]) : @weekly_stats[attribute_name] || "Not Currently Available"
}
end
|
Child Dedication
The act of presenting or 'dedicating' young children to God is one way in which Christian parents acknowledge their babies and children as gifts from God - unique and beautiful masterpieces, created for a purpose and made in His image.
Child Dedication services are held every three months at Life City Church. For more information visit the information desk after any of our weekend services, or register your interest using the form on this page. |
"Besides his athletic ability and just being able to take on double teams and free everybody else up, he's got swag, he's a presence. People are going to look out for him and when they're looking out for him, they're not looking out for other people. Just his whole demeanor and what it brings to the defense, we're going to be tough to run against, pass against and we're going to have a whole attitude to us." |
rob.sh: musings on life and network architecture.
The concept of having no central entity control currency seems attractive to a lot of people. However, trust in some decentralised entity means trusting the way that they operate their business - how they’re able to audit their code, and write bug-free software. The only thing I know about software is that it isn’t ever bug-free. To reduce MTBF, you implement things multiple times, in disjoint environments.
That said, the latest hack on a cryptocurrency/smart wallet I saw, made me wonder about their testing. |
[Immunocytochemical localization of hyaluronidase in the spermatozoa of domestic mammals].
Smears of washed spermatozoa are treated by an indirect immunocytochemical technique. The first antiserum used is prepared in rabbits against ovine (or bovine) hyaluronidase. A sheep antiserum against rabbit globulin, labeled with fluorescerine or peroxidase, is used at the second reagent. Hyaluronidase is localized in the anterior segment of the sperm acrosomes of ram, bull and other species. The specificity of the immunocytochemical staining is checked by appropriate controls. Anti-hyaluronidase serum adsorbed with the antigen, or normal serum, is used as the first reagent. The spermatozoa are also treated with the labeled antiserum only. |
Q:
Multiply statements run at one time in postgresql
In postgresql, if multiply SQL statements are executed at one time (In pgadmin, select all these statements and click "execute" button, like this picture),
the server will wait until the last statement is done before the previous statements to take effect.
When these statements are being executed, if I run SELECT * FROM tablename1 then the "relation not exist" error will occur.
Are there any ways for the statements to take effect once they are executed.
Note: Every CREATE statement needs very short time if it is executed by itself. The SELECT statement needs a long time.
A:
I assume, that when you select a bunch of statements in pgadmin and hit “Execute”, they all run in a single transaction. This means, that the results of the transaction will not be visible to the other concurrent sessions till it commits (or not visible at all if transaction fails).
Try adding explicit COMMIT; after each CREATE TABLE or after the last one.
You may also want to read about transaction isolation.
|
Influence of doxorubicin on fluconazole susceptibility and efflux pump gene expression of Candida dubliniensis.
The effect of doxorubicin (DOX) on the fluconazole (FLU) susceptibility of C. dubliniensis was investigated. Isolates were exposed to DOX and FLU in a chequerboard assay and resistance gene expressions were analysed after DOX exposure. The susceptibility of the yeast to FLU was decreased in the presence of DOX in the chequerboard assay with FIC indices suggesting an antagonistic effect. Gene expression analyses showed an overexpression of CdCDR2. Hence, DOX was found to have an impact on resistance mechanisms in C. dubliniensis isolates. |
A few weeks ago, former New York City Mayor Rudy Giuliani (R) made the unfortunate decision to attack President Obama’s patriotism, insisting that the president doesn’t love America or Americans. The Republican activist, somehow convinced himself he could make the ensuing controversy better by saying more dumb things, and proceeded to make matters much worse
Giuliani has kept a slightly lower profile since, though the New York Daily News reports today that the former mayor is back, launching a new salvo against the president he holds in contempt.
Obama is ignoring “enormous amounts of crime” committed by African-Americans, Giuliani said Thursday. And he said President Obama is to blame for the brawl inside a McDonald’s in Brooklyn as well as the shooting of two cops in Ferguson because of the anti-police “tone” coming from the White House. […] Host John Gambling asked for Giuliani’s take on the vicious McDonald’s fight, the recent police shootings in Ferguson and NYPD Commissioner Bill Bratton getting booed Thursday at a City Council hearing by protesters. “It all starts at the top. It’s the tone that’s set by the president,” Giuliani said.
I’ll confess that this might be the first time I’ve heard anyone, anywhere, blame any president for a brawl at a fast food restaurant.
Giuliani did add, however, in all seriousness, “I hate to mention it because of what happened afterwards, but (he should be saying) the kinds of stuff Bill Cosby used to say.”
Hmm.
It’s hard to know where to start, exactly, but let’s go ahead and note that Bill Cosby has been accused of sexually assaulting dozens of women . Holding him out as a model in any comparison is probably a bad idea.
sustained If Giuliani’s point is that we should overlook Cosby’s alleged crimes and focus on what the comedian has said about race and society, Jon Chait reminds us that President Obama “does, in fact, make Cosby-like remarks pretty often. Indeed, Obama has done this enough to receive criticism from his admirers.”
It would seem Giuliani is once again chastising Obama for failing to say things the president has already said multiple times.
Chait added , “So, what is the best explanation for Giuliani’s strange fantasy that Obama has presided over some explosion of black crime caused by him failing to say things he has in fact said repeatedly? Combined with Giuliani’s accusations that Obama does not love America (despite all Obama’s eloquent speeches to the contrary), because Obama allegedly ‘wasn’t brought up the way you were brought up and I was brought up through love of this country’ – what innocent explanation can be formulated for his string of delusions? What do you call holding Barack Obama responsible for every crime committed by a black person, anywhere?”
When Giuliani went after Obama last month, he prefaced his comments this way: “I know this is a horrible thing to say, but…” Today, urging Obama to be more like Cosby, Giuliani said, “I hate to mention it … but” as if there’s a part of him that realizes that he should bite his tongue and not continue. |
Mitochondrial Ca²⁺ uptake induces cyclic AMP generation in the matrix and modulates organelle ATP levels.
While the role of mitochondrial Ca²⁺ homeostasis in cell pathophysiology is widely accepted, the possibility that cAMP regulates mitochondrial functions has only recently received experimental support. The site of cAMP production, its targets, and its functions in the organelles remain uncertain. Using a variety of genetic/pharmacological tools, we here demonstrate that the mitochondrial inner membrane is impermeable to cytosolic cAMP, while an autonomous cAMP signaling toolkit is expressed in the matrix. We demonstrate that rises in matrix Ca²⁺ powerfully stimulate cAMP increases within mitochondria and that matrix cAMP levels regulate their ATP synthesizing efficiency. In cardiomyocyte cultures, mitochondrial cAMP can be increased by treatments that augment the frequency and amplitude of Ca²⁺ oscillations within the cytosol and organelles, revealing that mitochondria can integrate an oscillatory Ca²⁺ signal to increase cAMP in their matrix. The present data reveal the existence, within mitochondria, of a hitherto unknown crosstalk between Ca²⁺ and cAMP. |
386_OBJECTS= \
$(_OBJ_DIR)\i386\techtv1.obj
PASS0_386_OBJECTS=
IA64_OBJECTS= \
$(_OBJ_DIR)\ia64\techtv1.obj
PASS0_IA64_OBJECTS=
AMD64_OBJECTS= \
$(_OBJ_DIR)\amd64\techtv1.obj
PASS0_AMD64_OBJECTS=
|
Dissociative identity disorder and schizophrenia: differential diagnosis and theoretical issues.
Schizophrenia and dissociative identity disorder (DID) are typically thought of as unrelated syndromes--a genetically based psychotic disorder versus a trauma-based dissociative disorder--and are categorized as such by the DSM-IV. However, substantial data exist to document the elevated occurrence of psychotic symptoms in DID; awareness of these features is necessary to prevent diagnostic confusion. Recent research has also pointed out that schizophrenia and DID overlap not only in psychotic symptoms but also in terms of traumatic antecedents, leading to a number of suggestions for revision of our clinical, theoretical, and nosologic understanding of the relationship between these two disorders. |
The Approach to Occult Gastrointestinal Bleed.
Occult gastrointestinal bleeding is not visible and may present with a positive fecal occult blood test or iron deficiency anemia. Obscure bleeding can be overt or occult, with no source identified despite an appropriate diagnostic workup. A stepwise approach to this evaluation after negative upper and lower endoscopy has been shown to be cost effective. This includes repeat endoscopies if warranted, followed by video capsule endoscopy (VCE) if no obstruction is present. If the VCE is positive then specific endoscopic intervention may be possible. If negative, patients may undergo either repeat testing or watchful waiting with iron supplements. |
package listeners
import (
"net"
"net/http"
)
// Wrapped defaultConnListener that generates the wrapped defaultConn
type defaultConnListener struct {
net.Listener
}
func NewDefaultListener(l net.Listener) net.Listener {
return &defaultConnListener{l}
}
func (l *defaultConnListener) Accept() (c net.Conn, err error) {
conn, err := l.Listener.Accept()
if err != nil {
return nil, err
}
return &defaultConn{
WrapConnEmbeddable: nil,
Conn: conn,
}, err
}
// Wrapped IdleTimingConn that supports OnState
type defaultConn struct {
WrapConnEmbeddable
net.Conn
}
func (c *defaultConn) OnState(s http.ConnState) {}
func (c *defaultConn) ControlMessage(msgType string, data interface{}) {}
|
[{
"description": "Give an equivalent CFG grammar in Chomsky Normal Form with no unit productions, lambda productions, or useless productions.",
"type": "description",
"testCases": [{
"No_Lambda": true
},
{
"No_Unit": true
},
{
"No_Useless": true
},
{
"CNF": true
}
],
"grammar": [{
"left": "S",
"right": "A|C"
},
{
"left": "A",
"right": "aA|a|B"
},
{
"left": "B",
"right": "bB|b"
},
{
"left": "C",
"right": "cC|c|B"
}
]
}] |
What do "interpersonally sensitive" supervisors do and how do supervisees experience a relational approach to supervision?
In two investigations, we identified explicitly relational supervision strategies and examined whether use of these strategies was associated with perceptions of the supervisory alliance and evaluations of the supervisor. First, ratings by nine supervision researchers identified five clearly relational in-session strategies (focus on countertransference, exploration of feelings, attend to parallel process, focus on the therapeutic process, focus on the supervisory alliance) in the Critical Events model of supervision. Based on these expert ratings, we created and assessed the Relational Behavior Scale (RBS). Analyses with two samples of supervisees at all levels of training supported the measure's reliability and factorial validity. The RBS's validity was further indicated by its unique association with the "interpersonally sensitive" style of supervision. In both studies, supervisees perceived more frequent use of relational behavior on the part of psychoanalytic/psychodynamic/humanistic supervisors than cognitive-behavioral supervisors. Moreover, as hypothesized, supervisors' use of relational behavior in a specific session mediated the association between trainees' alliance perceptions and evaluations of their supervisors in that session. The identification of specific in-session supervision behaviors that explain one way in which a strong alliance contributes to trainees' positive experiences of their supervisors has implications for supervision theory, research, and practice. |
Watch Something Borrowed: Rachel is a lawyer. When she was in law school she fell for another student, Dex, who comes from an affluent family, but she was too shy to say anything. When Dex meets her best friend Darcy, who sometimes treats her like dirt, Darcy makes a move on Dex and gets him. Eventually, they get engaged and Darcy asks Rachel to be her Maid of Honor. However, Rachel still has feelings for Dex and still can't say anything. Darcy throws her a birthday party and Dex is there. When she and Dex are alone she blurts out that she had a thing for him in college which surprised him, and after drinking a little they spend the night together. They try to forget the whole thing and agree that it means... |
« Back
Lyon President Aulas on Nabil Fékir: “There has been no contact with Liverpool.”
Speaking on SFR Sport, Lyon President Jean-Michel Aulas was asked about Nabil Fékir’s future.
“There has been no contact with Liverpool or any other club so we haven’t discussed the future. I know that Nabil, now that we have qualified for the Champions’ League, would really like to stay, so we will discuss things calmly. He has magnificently won the right to go to Russia with France, which gives him an even higher standing. For the moment, nothing is done. You will have to be very, very rich to sign Nabil Fékir this year.” |
Hand held beverage holders known in the art allow a user to hold a beverage in a holder which can be held in one hand. However, such beverage holders restrict the user's use of that hand holding the beverage holder. The beverage holders are one dimensional. They hold only the beverage. As a result, they prevent a user from easily making a phone call on the user's mobile phone or access the applications on the user's mobile phone in the spare hand while holding the beverage holder in the other hand. The user of a conventional hand held beverage holder must put down his or her beverage to free their other hand for making a phone call or accessing the applications on the mobile phone. It is an object of the present invention to address these shortcomings in the art. |
Q:
Tests not executed with casperJS
I have two tests files in the same folder : test_a.js and test_b.js.
When I run casperjs test folder, only test_a.js is executed.
Both tests are built this way :
var casper = require('casper').create();
casper.test.begin('Test description', n, function(test) {
casper.start(SERVER).then(function() {
// Some basic tests
});
casper.run(function(){
test.done();
this.exit();
});
});
Would you guys know why ? (tests are very basic, so I don't include them for readability. If you wish to see them, please let me know :) )
A:
Well, I found the solution on this post. I just had to take away the
var casper = require('casper').create();
and put the this.exit() in only one file.
|
Embarrassing Moments at Work: How to Recover
What about office romance?
Discretion also works if you date a coworker, but sometimes it’s impossible to keep such interactions private.
For example, Gigi’s coworkers at a Seattle ad agency knew all about her relationship with a fellow employee because it was a very social office. After their breakup, they continued to hang out with the group.
“As long as you’re not working for that person, and it’s not interfering with work, it’s nobody’s business,” Pachter says.
Prepare for wardrobe malfunctions
Perhaps nothing can be as mortifying as getting a stain on your shirt just before a big meeting, or realizing your zipper was down when you bumped into the big boss in the hallway.
Krystn, a fundraiser for a nonprofit organization in Philadelphia, still remembers the start of her first job for the wrong reason. The fabric on her “professional” blouse didn’t breathe and she was nervous — a bad combination when being introduced to colleagues.
“I had huge sweat stains, and was trying to shake people’s hands without moving my arms—and they could see,” she recalls.
To avoid these types of scenarios, keep a spare jacket, stain remover, and sewing kit on hand if you can.
Otherwise, you have the choice of acting like the problem’s not there—or acknowledging the elephant on your shirt by making a joke.
“If you can have a good line, it will usually break the ice and then people can ignore it,” Pachter says.
One the flip side, if you notice a colleague has one too many buttons undone or an unzipped fly, say something.
“You have to be upfront and discreetly say the fly is undone,” Pachter says. “If you can save someone embarrassment, please do.” |
Heating and cooling devices in cooking systems, such as boilers in coffee machines, coils in hot plates, compressors in icemakers, etc., use significant amounts of energy to heat or cool a product, such as food or drink. However, the amount of power available to the heating/cooling devices often exceeds the amount of power used by the device, or even the amount of power that the device can safely use. In addition, the heating/cooling devices often use power in bursts such that the power used by the cooking changes substantially over time. For example, a boiler uses a significant amount of energy to heat a liquid from room temperature to a brewing temperature. However, prior to heating the liquid, the boiler uses little to no energy, and once the brewing temperature is reached, the boiler uses significantly less energy to maintain the temperature. As such, power that is allocated to the cooking systems is left unused. |
' TEST_MODE : COMPILE_ONLY_FAIL
type UDT
i as integer
declare operator []( index as integer )
end type
operator UDT.[]( index as integer )
end operator
|
You need to have the Flash Player installed and a browser with JavaScript support. |
Non-invasive ventilation in COPD exacerbation: how and why.
|
Assignment
Book cover design for "Capitalism in the Web of Life: Ecology and the Accumulation of Capital" by Jason W. Moore.
Summary of the book:Finance. Climate. Food. Work. How are the crises of the twenty-first century connected? In Capitalism in the Web of Life, Jason W. Moore argues that the sources of today’s global turbulence have a common cause: capitalism as a way of organizing nature, including human nature. Drawing on environmentalist, feminist, and Marxist thought, Moore offers a groundbreaking new synthesis: capitalism as a “world-ecology” of wealth, power, and nature. Capitalism’s greatest strength—and the source of its problems—is its capacity to create Cheap Natures: labor, food, energy, and raw materials. That capacity is now in question. Rethinking capitalism through the pulsing and renewing dialectic of humanity-in-nature, Moore takes readers on a journey from the rise of capitalism to the modern mosaic of crisis. Capitalism in the Web of Life shows how the critique of capitalism-in-nature—rather than capitalism and nature—is key to understanding our predicament, and to pursuing the politics of liberation in the century ahead.
Approach
This piece is inspired by the concept of accumulation in the subtitle (Ecology and the Accumulation of Capital). We used a material that would let us play with lots of tiny things coming together – minuscule glass beads – to create a visual metaphor for both capital and the ecosystem. The image was made by building a physical setup involving swarms of these glass beads and printed typography, which we photographed. In the final cover, a photograph of thousands of small dots or bubbles accumulating around typography is an abstract metaphor for capitalism, nature, and the human population. |
Letter from Roger Casement to Gertrude and Elizabeth Bannister stating he cannot visit Falcarragh, that he is writing two articles for the 'Anglo-Saxon Press', and that Agnes Newman has lost her savings to the "Selfridge Business", |
An evaluation of a global vitamin and mineral nutrition surveillance system.
Evaluation of public health surveillance systems is essential to ensure that problems of public health importance are monitored efficiently and effectively. The WHO's Vitamin and Mineral Nutrition Information System (VMNIS) was evaluated from the perspective of public health surveillance and informatics. Steps included: engaging the stakeholders of the evaluation; describing the surveillance system; focusing the evaluation design; gathering credible evidence regarding system performance; justifying and stating conclusions and recommendations, and sharing lessons learned from the evaluation. Following this assessment, WHO has begun major efforts to upgrade and expand the VMNIS and now the database is more flexible and efficient. The database evaluation summarized in this paper provides a good example of how public health evaluation frameworks can lead to improved surveillance and enhanced information systems, thus making progress toward the ultimate goal of improving public health. |
For the longest time, nothing at all was known about him, and he was only listed in encyclopedias by his - incorrect - last name, Bickerson. He was in fact the business partner of Lloyd Moxley, owner of the Nationals, who apparently made his friend a favor by managing his ball team for a day. |
Haloalkaline Bioconversions for Methane Production from Microalgae Grown on Sunlight.
Microalgal biomass can be converted to biofuels to replace nonsustainable fossil fuels, but the widespread use of microalgal biofuels remains hampered by the high energetic and monetary costs related to carbon dioxide supply and downstream processing. Growing microalgae in mixed culture biofilms reduces energy demands for mixing, maintaining axenic conditions, and biomass concentration. Furthermore, maintaining a high pH improves carbon dioxide absorption rates and inorganic carbon solubility, thus overcoming the carbon limitation and increasing the volumetric productivity of the microalgal biomass. Digesting the microalgal biomass anaerobically at high pH results in biogas that is enriched in methane, while the dissolved carbon dioxide is recycled to the phototrophic reactor. All of the required haloalkaline conversions are known in nature. |
namespace UltimaXNA.Ultima.Player
{
class SpellData
{
}
}
|
This invention relates to an apparatus which is associated with a card, a roller card unit, a cleaner or a similar textile fiber processing machine and serves for advancing the fiber lap to the fiber processing machine. A fiber tuft feeding device, such as a feed chute is associated with the fiber processing machine and is arranged upstream thereof, as viewed in the feed direction of the fiber material. The apparatus includes a feed roller which advances the fiber material to a processing roller at the input of the fiber processing machine. With the feed roller there cooperates a counterelement such as a feed table or a counterroller.
According to a known arrangement, between the lower end of the feed chute and the feed roller of the fiber processing machine, such as a carding machine, a transfer element, such as a transfer tray, is arranged for the fiber lap. The transfer element deflects the fiber lap from a vertical orientation (as it leaves the feed chute) into an approximately horizontal position. This change of orientation alters the inner construction of the fiber lap. Further, deflecting, guiding and compressing elements are present which adversely affect the uniformity of the fiber lap. |
The jing and ras1 pathways are functionally related during CNS midline and tracheal development.
The Drosophila jing gene encodes a zinc finger protein required for the differentiation and survival of embryonic CNS midline and tracheal cells. We show that there is a functional relationship between jing and the Egfr pathway in the developing CNS midline and trachea. jing function is required for Egfr pathway gene expression and MAPK activity in both the CNS midline and trachea. jing over-expression effects phenocopy those of the Egfr pathway and require Egfr pathway function. Activation of the Egfr pathway in loss-of-function jing mutants partially rescues midline cell loss. Egfr pathway genes and jing show dominant genetic interactions in the trachea and CNS midline. Together, these results show that jing regulates signal transduction in developing midline and tracheal cells. |
Q:
How to add in a windows form project some columns and header without using databases?
How can I make in a c# windows application , columns and header?
Like this one:
And yes , I would like to dynamically add rows .
How can I do that?
A:
You can use DataTable with DataGridView:
DataTable table = new DataTable();
table.Columns.Add("Name", typeof(string));
table.Rows.Add("Johnnie");
// I assume that you've already created dataGridView (in your form)
dataGridView.DataSource = table;
|
Electroconvulsive therapy resolves cortical inhibition and manneristic omissions in a chronic catatonic patient.
We investigated a patient with severe catatonic schizophrenia (manneristic catatonia according to Karl Leonhard) treated with electroconvulsive therapy (ECT) after pharmacological approaches did not result in any clinical improvement. Before and after nine ECT sessions a double-pulse transcranial magnetic stimulation (TMS) paradigm was used to measure intracortical inhibition (ICI) which has been shown to be reduced in a significant proportion of patients with schizophrenia. Although the patient showed no remission regarding some psychomotor aspects after ECT, we found an increase in ICI and a remarkable clinical improvement of catatonic omissions which might be due to changes in the GABAergic system. |
Kawasaki Disease: A Condition of Many Guises.
|
Granulocytic sarcoma of the small intestine.
Granulocytic sarcoma is an extramedullary tumor of myeloblasts and/or immature myeloid cells, which can develop at any anatomic site and is often a forerunner to the development of acute myelogenous leukemia. Granulocytic sarcoma of the gastrointestinal tract most frequently involves the small intestine and most often presents with abdominal pain and obstruction. Pathologists must consider granulocytic sarcoma in any mass of unknown origin with a diffusely infiltrating population of tumor cells, as the diagnosis is often initially unrecognized, especially in nonleukemic patients. Multiple ancillary modalities are available to assist pathologists in making the correct diagnosis so that appropriate therapy can be initiated. |
University in sexism row paid female staff less
Only weeks earlier, University College London, pictured, had asked for Sir Tim's resignation over alleged sexist remarksTimes Newspapers Ltd
The university at the centre of the Sir Tim Hunt sexism affair has admitted discriminating against its female staff.
University College London has been castigated by its academics and accused of hypocrisy after underpaying women at its Qatari campus.
The news comes weeks after the university asked for the resignation of Sir Tim, the Nobel prizewinning scientist who was accused of making sexist remarks in a speech.
The director of UCL’s outpost in the Gulf state condemned his institute’s policy of paying far lower housing allowances to married women than to married men as “morally and legally not acceptable” in an internal email released to The Times.
Senior staff were warned of a “major reputational risk for UCL” that could undermine the existence of its…
Want to read more?
Subscribe now and get unlimited digital access on web and our smartphone and tablet apps, free for your first month. |
Q:
using push_back on objects ,c++
I don't understand something about push_back.
When I use push_back on an object , does it copy all its elements using the object's
copy constructor? (what if the object doesn't have copy constructor?)
another question:
vector<Course*> cs;
Course* c = new CScourse(); //CScourse inherits Course
cs.push_back(c);
if I use
delete c;
would it delete what I just pushed into the vector?
A:
Yes every objects are copied in a vector. If the vector has to grow, each element will be copied to the new location. In your case, you are storing pointers to Course so only the pointers get copied, the actual objects remain the same.
If you delete c;, it will indeed delete the object pointed to by c that you pushed in your vector. The vector will still contain a pointer to the object that was c though, this is considered a dangling pointer. You would usually remove it from your vector before deleting it.
|
Q:
Processing results from multiple tables - is there a faster way?
I'm just trying to improve my Database structure in order to avoid getting cloned results
My tables sits it one Database and looks like this:
CREATE TABLE IF NOT EXISTS `Players`(
`ID` INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT UNIQUE,
`UserID` INTEGER NOT NULL UNIQUE,
`SteamID` TEXT NOT NULL UNIQUE,
`Nick` TEXT NOT NULL,
`KlanID` INTEGER NOT NULL,
`Money` INTEGER NOT NULL,
`Kills` INTEGER NOT NULL,
`Deaths` INTEGER NOT NULL,
`Score` INTEGER NOT NULL,
`PayOrNot` INTEGER NOT NULL,
`IsNewOne` INTEGER NOT NULL,
`HUDMode` INTEGER NOT NULL,
`HUDColors` INTEGER NOT NULL,
`HUDPoz1` INTEGER NOT NULL,
`HUDPoz2` INTEGER NOT NULL
);
CREATE TABLE IF NOT EXISTS `Classes` (
`ClassID` INTEGER NOT NULL PRIMARY KEY UNIQUE,
`UserID` INTEGER NOT NULL,
`Level` INTEGER NOT NULL,
`Health` INTEGER NOT NULL,
`Intelligence` INTEGER NOT NULL,
`Stamina` INTEGER NOT NULL,
`Durability` INTEGER NOT NULL
);
CREATE TABLE `Equipment` (
`ID` INTEGER NOT NULL PRIMARY KEY AUTOINCREMENT UNIQUE,
`UserID` INTEGER NOT NULL,
`Name` TEXT NOT NULL,
`Type` INTEGER NOT NULL,
`Time` INTEGER NOT NULL,
`NumberOfUses` INTEGER NOT NULL
);
It is a plugin designed for a Counter Strike server. It introduces some extra functionalities such as choosing own class, receiving equipment which gives extra powers, leveling system etc etc. I need to get almost all of the data stored there. The problem is, the amount of Equipment of each player is not known. Therefore, i have to figure out how to get these informations as optimal as i can.
For now, my query looks like this:
SELECT DISTINCT Players.SteamID,Players.Nick,Players.KlanID,Players.Money,Players.Kills,Players.Deaths,Players.Score,Players.PayOrNot,Players.IsNew,Players.HUDMode,Players.HUDColors,Players.HUDPoz1,Players.HUDPoz2,
Classes.Name,Classes.Level,Classes.Health,Classes.Intelligence,Classes.Stamina,Classes.Durability,
Equipment.Name,Equipment.Type,Equipment.Time,Equipment.NumberOfUses
FROM Players
INNER JOIN Equipment ON Players.UserID = Equipment.UserID
INNER JOIN Classes ON Equipment.UserID = Classes.UserID
WHERE Players.UserID=%d
Here are some sample results
(don't be scared by some of the words out there - I come originally from Poland. The things needed has beed translated and highlighted)
Every time map changes, each player has to receive this data + there might be some new ones throughout the map.
As you can see, there are some field copies due to the INNER JOIN nature. Luckily, I am able to process the results, because i know the number of classes, so i get the Equipment from [row % number_of_classes] rows and Classes from [row < number_of_classes] rows. However, i feel it could be done better. I was thinking about getting results from each query separately, but it would triple the number of queries. Maybe I have to rebuild the whole SQL structure? Or maybe this is the best way to do so?
A:
The output of a single query has the form of a table, i.e., it has a fixed number of columns, and a certain number of rows.
If you want to get your data with a single query, you have no choice but to arrange it so that is has tabular form. When joining, this often results in duplicates.
But there is no reason to use a single query. SQLite has no client/server communication overhead, so many small queries are just as efficient.
|
Q:
run bash command in new shell and stay in new shell after this command executes
I've got a problem. I'm searching for long time for this answer - how can I run command in new bash shell and stay in this NEW shell after this commands executes. So for example:
bash -c "export PS1='> ' && ls"
will make new shell, export PS1, list directories and ... will exit to my current shell. I want to stay in the new one.
A:
You can achieve something similar by abusing the --rcfile option:
bash --rcfile <(echo "export PS1='> ' && ls")
From bash manpage:
--rcfile file
Execute commands from file instead of the system wide initialization file /etc/bash.bashrc and the standard personal initialization file ~/.bashrc if the shell is interactive
|
Sleep and everyday functioning in older adulthood.
As individuals age they report increasing numbers of sleep problems (e.g., increased nighttime wakings) and this poorer sleep quality has been associated with increased risk for various medical conditions; however limited research has focused on the implications of sleep quality on everyday functioning in older adulthood. We compared three methods of sleep data collection (wrist actigraphy, self-report questionnaires, and sleep diary) and evaluated their relationships with three approaches to assessing everyday functioning (direct observation, self-report, and paper-and-pencil-based problem-solving tasks) in cognitively healthy older adults. Consistent with previous research, subjective sleep measures correlated significantly with each other but did not correlate with objective sleep measures. Multiple regression analyses revealed neither objective nor subjective sleep measures predicted everyday functioning. Individual variability in sleep may affect prediction of everyday functioning using a cross-sectional sample. Future research should investigate the combined influence of sleep and cognitive factors on everyday functioning in older adults. |
Septic safe interactions with smart glasses in health care.
In this paper, septic safe methods of interaction with smart glasses, due to the health care environment applications consideration, are presented. The main focus is on capabilities of an optical, proximity-based gesture sensor and eye-tracker input systems. The design of both interfaces is being adapted to the open smart glasses platform that is being developed under the eGlasses project. Preliminary results obtained from the proximity sensor show that the recognition of different static and dynamic hand gestures is promising. The experiments performed for the eye-tracker module shown the possibility of interaction with simple Graphical User Interface provided by the near-to-eye display. Research leads to the conclusion of attractiveness of collaborative interfaces for interaction with smart glasses. |
Integrated modeling and design for realizing a two-wheeled wheelchair for disabled.
Two-wheeled wheelchairs are considered highly nonlinear and complex systems. The systems mimic a double-inverted pendulum scenario and will provide better maneuverability in confined spaces and also to reach higher level of height for pick and place tasks. The challenge resides in modeling and control of the two-wheeled wheelchair to perform comparably to a normal four-wheeled wheelchair. Most common modeling techniques have been accomplished by researchers utilizing the basic Newton's Laws of motion and some have used 3D tools to model the system where the models are much more theoretical and quite far from the practical implementation. This article is aimed at closing the gap between the conventional mathematical modeling approaches where the integrated 3D modeling approach with validation on the actual hardware implementation was conducted. To achieve this, both nonlinear and a linearized model in terms of state space model were obtained from the mathematical model of the system for analysis and, thereafter, a 3D virtual prototype of the wheelchair was developed, simulated, and analyzed. This has increased the confidence level for the proposed platform and facilitated the actual hardware implementation of the two-wheeled wheelchair. Results show that the prototype developed and tested has successfully worked within the specific requirements established. |
Q:
How to implement a generic click event for anchors
I have a PHP script that throws out a bunch of buttons (Format in case it is needed):
<a class="ClassInfo" id="id">Name</a>
The file is retrieved dynamically and there can be as many buttons as possible, maybe none, and maybe a million (unlikely though).
I need to use JavaScript for this and can't just redirect the user to another website (mostly because the operation is repeated heavily and gets EXTREMELY tedious.).
Is it possible for me to use some combination of JavaScript + jQuery to detect which button was pressed and do an operation appropriately?
Example of what I am hoping for is this:
User clicks one of the buttons (which has its unique id number).
JavaScript detects which button was clicked (I can't just use fixed code as the number of buttons and the ids can change whenever they feel like it)
JavaScript send out an Ajax request and does some fancy operations (I have this part covered)
Now is it possible for me to detect which button was clicked?
A:
The target property of the event object will tell you which element was clicked on.
document.addEventListener('click', function (e) {
var target = e.target;
if (target.tagName && target.tagName.toLowerCase() == "a") {
alert(target.id);
}
});
See a live demo
A:
For a jQuery solution you can add a click event listener to your element a.ClassInfo:
$('a.ClassInfo').click(function(event) {
alert(this.id);
});
// ES6
$('a.ClassInfo').click(event => alert(this.id));
Or better yet, use event bubbling to your advantage with .on
$(document).on('click', 'a.ClassInfo', function(event) {
alert(this.id);
});
// ES6
$(document).on('click', 'a.ClassInfo', event => alert(this.id));
Event bubbling is very useful if you dynamically generate HTML. It avoids having to bind/rebind event listeners to elements when they're added to or removed from the DOM if you bind to a lower level element (in this case document).
|
macro_rules! generic_numeric_expr_inner {
($tpe: ident, ($($param: ident),*), $op: ident, $fn_name: ident) => {
impl<Rhs, $($param),*> ::std::ops::$op<Rhs> for $tpe<$($param),*> where
$tpe<$($param),*>: $crate::expression::Expression,
<$tpe<$($param),*> as $crate::Expression>::SqlType: $crate::sql_types::SqlType + $crate::sql_types::ops::$op,
<<$tpe<$($param),*> as $crate::Expression>::SqlType as $crate::sql_types::ops::$op>::Rhs: $crate::expression::TypedExpressionType,
Rhs: $crate::expression::AsExpression<
<<$tpe<$($param),*> as $crate::Expression>::SqlType as $crate::sql_types::ops::$op>::Rhs,
>,
{
type Output = $crate::expression::ops::$op<Self, Rhs::Expression>;
fn $fn_name(self, rhs: Rhs) -> Self::Output {
$crate::expression::ops::$op::new(self, rhs.as_expression())
}
}
}
}
macro_rules! generic_numeric_expr {
($tpe: ident, $($param: ident),*) => {
generic_numeric_expr_inner!($tpe, ($($param),*), Add, add);
generic_numeric_expr_inner!($tpe, ($($param),*), Sub, sub);
generic_numeric_expr_inner!($tpe, ($($param),*), Div, div);
generic_numeric_expr_inner!($tpe, ($($param),*), Mul, mul);
}
}
mod numeric;
pub use self::numeric::{Add, Div, Mul, Sub};
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.