text stringlengths 16 69.9k |
|---|
* Doing rebalance add node, remove node, failover, failover and add back. The last relalance failed when doing remove a node and failover another node at the same time. Then rebalance.
* Rebalance failed with error "sync_shutdown_many_i_am_trapping_exits" |
Subscribe to this blog
Get Sinister by E-mail
Life...don't talk to me about life...
Did you know that David Lynch almost directed Return of the Jedi? That would have been an odd film...Ewoks played by creepy looking little people and talking backwards, Darth Vader controlling the Death Star from inside of some weird soundproof velvet-draped room with a microphone hanging down from the middle of it, or something, the main characters changing randomly into other people, etc. I don't think that would have worked...
Me? Oh, I'm just livin' la vida loca. Got a 2nd job today - what with gas prices and such going the way they are, it'll be nice to have the extra income. |
Symmetry properties of two-dimensional anisotropic photonic crystals.
A theoretical study of two-dimensional photonic crystals made of anisotropic material is presented. Detailed computation principles including a treatment of the TE and TM polarizations are given for a photonic crystal made of either uniaxially or biaxially anisotropic materials. These two polarizations can be decoupled as long as any one of the principal axes of the anisotropic material is perpendicular to the periodic plane of the photonic crystal. The symmetry loss due to the anisotropy of the material and the variation of the Brillouin zones relative to the tensor orientations are also analyzed. Furthermore, the symmetry properties of the two-dimensional photonic band structure are studied, and the resulting effect on the photonic bandgap and the dispersion properties of photonic crystal are analyzed as a function of the orientation of the anisotropic material. |
Q:
Is there any reason to use an encrypted value for the plain text signing key?
I am creating an API and I am thinking of using an encrypted value of some random password as the value to store for the plain text representation of my signing key. Is this just a vain attempt to make things look secure or is there any benefit to this?
edit
it's a private signing key for a JWT. Something I would be storing in a properties file or elsewhere. The API provides functionality for posting data to the server. I am specifically asking if using an arbitrarily generated bcrypt hash provides any benefit to use as the plain text value of my signing key.
A:
Taking your replies to comments into account, I'll try to provide an answer here.
For clarification, OP has a webservice handing out signed JSON Web Tokens and is worried about the security of his/her private key on the server. OP asked, whether encoding it is any good, answer to that is no. Encodings do not provide any security, as they are reversible without a key. If an attacker gains access to your encoded private key, there is nothing preventing him from decoding it.
Furthermore, OP asked, whether bcrypt is a secure way of storing the private key. Answer is also no. bcrypt is not an encoding or encryption function, but a cryptographic hash function. It takes an input and generates a secure salted cryptographic hash, which allows the server to compare it to other inputs and decide, whether both input are the same (i.e. matching a user's password while logging in, without having to store the password in plain text).
Hashing your private key renders it unusable, as it cannot be recovered and the hash cannot be used to sign or decrypt any messages.
Maybe you can store your private key in a file, only readable by the web server user (i.e. www-data, when using apache) or use other. However, if your cannot even trust your own server to this extend, maybe that's the point to start considering more security measures. Eventually you have to trust something.
Edit: OP indicated, that only the server is interested in the JWT itself, rendering signature verification by the user obsolete. In this case, the server can either generate a keypair just for itself, which seems like an overkill, if the signing and verifying server is always the same machine.
Considering that having one secret is sufficient for OP, HMAC or a similar key-based hash function might be a better choice here. The server has a secret key, which is used to create a hash of the JWT and verify it upon receiving the token from a user. Tampering is prevented by this technique.
An asymmetric approach might be better, if there is a single server/(micro-)service creating those tokens and other endpoints require the JWT signatures to be verified. An advantage is, that the "Token Factory" can be an even better protected machine/service, while regular endpoints only need the corresponding public key, thus not comprimising the keypair, if hacked.
|
Q:
JDBC and MySQL: Do changes in the underlying database are known to the java program?
Suppose that, after I establish a connection of my java application with my underlying MySQL database, and then open MySQL workbench and update some rows in a table, and then retrieve the fields of that table in the java client, will those changes synchronize with the java program. In other words, will those changes appear in the results of queries I carry out in the java program?
In general, after establishing a connection between a java application and a MySQL database, are the updates, deletions, alterations etc. carried out in the database by using the MySQL DBMS (and not the java program) visible to the program?
A:
Only if you run your query again.
Specifically, if you run something like this:
ResultSet resultSet = myStatement.executeQuery("select * from some_table");
and then you update the database (either from the command line / database client), then no. you will need to run your query again to see the changes you made.
|
I'm sorry...but a world without socialization is impossible unless we isolate ourselves from every single human being. A radical feminist utopia would socialize people as well..just in different ways. But as adults we all have free will in the sense that everything we choose is ultimately our conscious decision which may admittedly be influenced by outside factors like culture or genetics. The fact is, we live in a society where (theoretically), everyone is free to live how they want.
That shit’s very theoretical if you step out of your little privilege-bubble and take a look at the third world. There is no such thing as free will in capitalist, colonialist, racist, ableist, patriarchy. Sure, I can choose to not eat meat or not shave my legs which goes against my socialization, but there’s still a hundred other things I still do and am still subjected to because of it.
Also, socialization isn’t necessarily BAD. Gender isn’t bad BECAUSE it’s a social construct, it’s bad because it’s a social construct that OPPRESSES WOMEN. Language and computers are social constructs, you don’t see me hating on that.
- Pi |
Rifles, shotguns, and other firearms should be periodically cleaned and maintained to ensure accuracy and proper operation. Firearms may be supported for cleaning and maintenance by shop vises or other firearm supports that are typically mounted to a table or bench. These devices, however, are not well suited for use while hunting, engaging in target practice, or traveling. To address this problem, several conventional containers for carrying firearm cleaning supplies have been adapted to also support a firearm. For example, one conventional container includes a rigid plastic housing, a lid connected to the housing with hinges, and two forks removably attached to the housing for supporting a firearm. The housing has an opening at the top and an interior cavity with receptacles sized to each receive a fork.
One drawback of conventional containers for carrying firearm cleaning supplies is that it is difficult to retrieve supplies from the housing when a firearm is placed on the forks. For example, in some containers supplies are stored under the forks and the forks must be removed to access the supplies. Moreover, the position of the firearm close to the opening of the housing also inhibits access to supplies in the cavity. Another drawback of conventional containers is that the containers are bulky devices, long and high. As a result, the containers are expensive to ship because shipping rates are based in part on the volume of the package. In addition, because the containers are made of a rigid plastic material, the containers often crack during transit. Accordingly, there exists a need to improve conventional containers for carrying firearm cleaning supplies. |
× Terms of Use
We at Klifftechnologies.com, express our heartiest welcome to our visitors. Klifftechnologies Provides access and use of its website as www.klifftechnologies.com(Site), subjects to your agreement to the following “Terms of Use”. Services provided on and by our website are strictly subjects to the terms of the company. So, please read these Terms and carefully before accessing or using the site. By accessing or using the site, you agree to be complying with these terms.Copyrights
All site designs, texts, graphics, logos, icons and images thereof are exclusive property of Klifftechnologies or its licensors and are protected by International copyright laws. Users do not have any right to reused in any way, without taking prior written permission from Klifftechnologies.
Trademarks
The trademarks including designs, logos, service marks displayed on the site are registered and unregistered trademarks of Klifftechnologies and its licensors. You agree that you will not refer or publish any information to Klifftechnologies in any other public media including websites, press releases, etc. for advertising or promotional purposes. Use of any trademark without written consent will be a violation of Klifftechnologies trademark and other intellectual property rights.
Third Party Website links
This site may provide links to other web sites or you may be connected through other linked web sites. These links are provided are for your convenience to gain further information. Access them at your own risk and we are not responsible for the content of the linked sites. These links do not signify that we endorsed the sites. |
defmodule TypeClass.Utility.Module do
@moduledoc "Naming convention helpers to help follow TypeClass conventions"
@type ast :: tuple()
@doc ~S"""
Generate the module name for the protocol portion of the class.
Does not nest `Protocol`s.
## Examples
iex> to_protocol MyClass.Awesome
MyClass.Awesome.Protocol
iex> to_protocol MyClass.Awesome.Protocol
MyClass.Awesome.Protocol
"""
@spec to_protocol(module()) :: module()
def to_protocol(base_module), do: to_submodule(base_module, "Protocol")
@doc ~S"""
Generate the module name for the protocol portion of the class.
Does not nest `Protocol`s.
## Examples
iex> to_property MyClass.Awesome
MyClass.Awesome.Property
iex> to_property MyClass.Awesome.Property
MyClass.Awesome.roperty
"""
@spec to_property(module()) :: module()
def to_property(base_module), do: to_submodule(base_module, "Property")
@doc ~S"""
Generate a submodule name. If the module already ends in the
requested submodule, it will return the module name unchanged.
## Examples
iex> MyModule.Awesome |> to_submodule(Submodule)
MyModule.Awesome.Submodule
iex> MyModule.Awesome |> to_submodule("Submodule")
MyModule.Awesome.Submodule
iex> MyModule.Awesome.Submodule |> to_submodule(Submodule)
MyModule.Awesome.Submodule
"""
@spec to_submodule(module(), String.t() | module()) :: module()
def to_submodule(base_module, child_name) when is_bitstring(child_name) do
base_module
|> Module.split()
|> List.last()
|> case do
^child_name -> base_module
_ -> Module.concat([base_module, child_name])
end
end
def to_submodule(base_module, child_module) do
to_submodule(base_module, Module.split(child_module))
end
def get_functions(module) do
module.__info__(:functions)
|> Enum.into(%{})
|> Map.drop([
:__protocol__,
:impl_for,
:impl_for!,
:__builtin__,
:__derive__,
:__ensure_defimpl__,
:__functions_spec__,
:__impl__,
:__spec__?,
:assert_impl!,
:assert_protocol!,
:consolidate,
:consolidated?,
:extract_impls,
:extract_protocols
])
end
end
|
Science can cure disease and make things adorable at the same time!
A recent study by the University of Rochester Medical Center has found that the same chemical used to color blue M&Ms and blue Gatorade can also be used to heal spine injuries. The chemical, Brilliant Blue G (BGG) blocks P2X7, known as the “Death Receptor.” This stops the signal that tells motor neurons to undergo apoptosis (cell death). When rats with spinal cord injuries were injected with BGG, they were able to walk again with a limp.
How awesome is that?
And BGG has the added benefit of making rats extra adorable. They go from this:To this:Want. Now. |
[Transfusion in elderly: Take account frailty].
The conjunction of the demographic aging and the increase in the frequency of anemia with the advancing age, mean that the number of globular concentrates delivered each year increases with a consequent heavy pressure on blood collection. The etiologies of anemia in the elderly are often multifactorial and their investigation is an indispensable step and prior to any treatment. Transfusion thresholds, particularly in the elderly, are gradually evolving and a so-called restrictive strategy is now favored. Immediate and delayed complications of transfusion are more frequent in the elderly due to vulnerability factors associated with frailty and the risk of multiple transfusions. The screening of complications related to transfusion of RBCs is essential and makes it possible to avoid their recurrence. The impact of transfusion on the quality of life of elderly patients is not obvious and is a controversial issue. In addition, transfusion of red blood cells (RBCs) is accompanied by an increase in health expenditure and an increase in morbidity and mortality, whose risks can be reduced through alternatives to transfusion. Longitudinal studies, including elderly subjects, would allow a better understanding of the issues involved in the transfusion of RBCs in this population. |
using System;
using System.IO;
using System.IO.Abstractions;
using System.IO.Compression;
using System.Linq;
using System.Net;
using System.Net.Http;
using System.Threading.Tasks;
using Kudu.Contracts.Tracing;
using Kudu.Core;
using Kudu.Core.Infrastructure;
using Kudu.Services.Infrastructure;
namespace Kudu.Services.Zip
{
// Extending VfsControllerBase is a slight abuse since this has nothing to do with vfs. But there is a lot
// of good reusable logic in there. We could consider extracting a more basic base class from it.
public class ZipController : VfsControllerBase
{
public ZipController(ITracer tracer, IEnvironment environment)
: base(tracer, environment, environment.RootPath)
{
}
protected override Task<HttpResponseMessage> CreateDirectoryGetResponse(DirectoryInfoBase info, string localFilePath)
{
HttpResponseMessage response = Request.CreateResponse();
// GetQueryNameValuePairs returns an IEnumerable<KeyValuePair<string, string>>
// KeyValuePair is a value type.
var fileName = Request.GetQueryNameValuePairs().FirstOrDefault(p => p.Key.Equals("fileName", StringComparison.OrdinalIgnoreCase)).Value;
fileName = fileName ?? Path.GetFileName(Path.GetDirectoryName(localFilePath)) + ".zip";
response.Content = ZipStreamContent.Create(fileName, Tracer, zip =>
{
foreach (FileSystemInfoBase fileSysInfo in info.GetFileSystemInfos())
{
var directoryInfo = fileSysInfo as DirectoryInfoBase;
if (directoryInfo != null)
{
zip.AddDirectory(directoryInfo, Tracer, fileSysInfo.Name);
}
else
{
// Add it at the root of the zip
zip.AddFile(fileSysInfo.FullName, Tracer, String.Empty);
}
}
});
return Task.FromResult(response);
}
protected override Task<HttpResponseMessage> CreateItemGetResponse(FileSystemInfoBase info, string localFilePath)
{
// We don't support getting a file from the zip controller
// Conceivably, it could be a zip file containing just the one file, but that's rarely interesting
HttpResponseMessage notFoundResponse = Request.CreateResponse(HttpStatusCode.NotFound);
return Task.FromResult(notFoundResponse);
}
protected override async Task<HttpResponseMessage> CreateDirectoryPutResponse(DirectoryInfoBase info, string localFilePath)
{
using (var stream = await Request.Content.ReadAsStreamAsync())
{
// The unzipping is done over the existing folder, without first removing existing files.
// Hence it's more of a PATCH than a PUT. We should consider supporting both with the right semantic.
// Though a true PUT at the root would be scary as it would wipe all existing files!
var zipArchive = new ZipArchive(stream, ZipArchiveMode.Read);
zipArchive.Extract(localFilePath, Tracer);
}
return Request.CreateResponse(HttpStatusCode.OK);
}
protected override Task<HttpResponseMessage> CreateItemPutResponse(FileSystemInfoBase info, string localFilePath, bool itemExists)
{
// We don't support putting an individual file using the zip controller
HttpResponseMessage notFoundResponse = Request.CreateResponse(HttpStatusCode.NotFound);
return Task.FromResult(notFoundResponse);
}
}
}
|
Digital graphic design, image editing, audio editing, and video editing applications (hereafter collectively referred to as media content editing applications or media-editing applications) provide graphical designers, media artists, and other users with the necessary tools to create a variety of media content. Examples of such applications include Final Cut Pro® and iMovie®, both sold by Apple Inc. These applications give users the ability to edit, combine, transition, overlay, and piece together different media content in a variety of manners to create a resulting media project. The resulting media project specifies a particular sequenced composition of any number of text, audio, image, and/or video content elements that is used to create a media presentation.
Typically, a user previews portions of a media presentation while creating the presentation in order to see if the media content of the media presentation would be presented as the user desires. However, some portions of the media presentation require a lot of processing capability for a media-editing application to playback in real-time for previewing.
When the required processing capability exceeds that of a system on which the media-editing application is executed, the media-editing application must playback the portions of the presentation in low quality or the application may not playback the portions in real-time. In such cases, the media-editing application pre-processes the portions of the media presentation so that they can be played back in real-time when the user desires to preview them.
By pre-processing, the media-editing application pre-generates playable media output data (e.g., processed composite image frames or audio samples) so that the application uses the pre-generated media output data instead of generating the data at the time the corresponding portions of the media presentation is being previewed. Such pre-generation of playable media output data by processing the portions of the media presentation for real-time playback is termed “rendering.” |
Formic acid and acetic acid induce a programmed cell death in pathogenic Candida species.
Cutaneous fungal infections are common and widespread. Antifungal agents used for the treatment of these infections often have undesirable side effects. Furthermore, increased resistance of the microorganisms to the antifungal drugs becomes the growing problem. Accordingly, the search for natural antifungal compounds continues to receive attention. Apoptosis is highly regulated programmed cell death. During yeast cell apoptosis, amino acids and peptides are released and can stimulate regeneration of human epithelium cells. Thus, detection of chemical compounds inducing apoptosis in yeast and nontoxic for humans is of great medical relevance. The aim of this study was to detect chemical compound inducing apoptosis in pathogenic Candida species with the lowest toxicity to the mammalian cells. Five chemical compounds--acetic acid, sodium bicarbonate, potassium carbonate, lithium acetate, and formic acid--were tested for evaluation of antifungal activity on C. albicans, C. guilliermondii, and C. lusitaniae. The results showed that acetic acid and formic acid at the lowest concentrations induced yeast cells death. Apoptosis analysis revealed that cells death was accompanied by activation of caspase. Minimal inhibitory concentrations of potassium carbonate and sodium bicarbonate induced Candida cells necrosis. Toxicity test with mammalian cell cultures showed that formic acid has the lowest effect on the growth of Jurkat and NIH 3T3 cells. In conclusion, our results show that a low concentration of formic acid induces apoptosis-like programmed cell death in the Candida yeast and has a minimal effect on the survivability of mammalian cells, suggesting potential applications in the treatment of these infections. |
[Linking anonymous databases for national and international multicenter epidemiological studies: a cryptographic algorithm].
Compiling individual records which come from different sources remains very important for multicenter epidemiological studies, but at the same time European directives or other national legislation concerning nominal data processing have to be respected. These legal aspects can be satisfied by implementing mechanisms that allow anonymization of patient data (such as hashing techniques). Moreover, for security reasons, official recommendations suggest using different cryptographic keys in combination with a cryptographic hash function for each study. Unfortunately, such an anonymization procedure is in contradiction with the common requirement in public health and biomedical research as it becomes almost impossible to link records from separate data collections where the same entity is not referenced in the same way. Solving this paradox by using methodology based on the combination of hashing and enciphering techniques is the main aim of this article. The method relies on one of the best known hashing functions (the secure hash algorithm) to ensure the anonymity of personal information while providing greater resistance to dictionary attacks, combined with encryption techniques. The originality of the method relies on the way the combination of hashing and enciphering techniques is performed: like in asymmetric encryption, two keys are used but the private key depends on the patient's identity. The combination of hashing and enciphering techniques provides a great improvement in the overall security of the proposed scheme. This methodology makes the stored data available for use in the field of public health for the benefit of patients, while respecting legal security requirements. |
Protective autoimmunity functions by intracranial immunosurveillance to support the mind: The missing link between health and disease.
Circulating immune cells support hippocampal neurogenesis, spatial memory, expression of brain-derived neurotrophic factor, and resilience to stress. Nevertheless, considering the immune privileged status of the central nervous system (CNS), such cells were assumed to be excluded from the healthy brain. It is evident, however, that the CNS is continuously surveyed by leukocytes, though their function is still a mystery. Coupling this routine leukocyte trafficking with the function attributed to circulating T cells in brain plasticity led us to propose here that CNS immunosurveillance is an integral part of the functioning brain. Anatomical restriction of selected self-recognizing leukocytes to the brain's borders and fluids (cerebrospinal fluid) not only supports the brain's activity, but also controls the potential aggressiveness of such cells. Accordingly, the brain's 'privilege' is its acquisition of a private peripheral immunological niche under its own control, which supports brain function. Immune malfunction may comprise a missing link between a healthy and diseased mind. |
package app.custom.binder.direct;
import java.lang.reflect.InvocationHandler;
import java.lang.reflect.Method;
public class DirectMyIncovationHandler implements InvocationHandler {
public static volatile boolean captured= false;
@Override
public Object invoke(Object obj, Method method, Object[] args)
throws Throwable {
System.out.println("Captured!");
captured= true;
Object result = method.invoke(obj, args);
return result;
}
}
|
using JadeFramework.Dapper;
using JadeFramework.Dapper.SqlGenerator;
using MsSystem.Weixin.IRepository;
using MsSystem.Weixin.Model;
using System;
using System.Data;
using System.Threading.Tasks;
namespace MsSystem.Weixin.Repository
{
public class WxSecKillRepository : DapperRepository<WxSecKill>, IWxSecKillRepository
{
public WxSecKillRepository(IDbConnection connection, SqlGeneratorConfig config) : base(connection, config)
{
}
}
}
|
## Ao Translated Documentation
- [Deutsch - German](https://github.com/klaussinani/ao/blob/master/docs/i18n/readme.GER.md) by [@christophostrzinski](https://github.com/christophostrzinski) and [@0xflotus](https://github.com/0xflotus)
- [Русский - Russian](https://github.com/klaussinani/ao/blob/master/docs/i18n/readme.RUS.md) by [@yalexaner](https://github.com/yalexaner)
## Contributing
Visit the [contributing guidelines](https://github.com/klaussinani/ao/blob/master/contributing.md#translating-documentation) to learn more on how to get involved in the translating process.
## Thanks
Tons of thank you to the amazing people that help out with the creation and maintenance of the translations! Your contributions make Ao available to everyone around the world!
|
lv:
activerecord:
attributes:
user:
current_password: Tagadējā parole
email: Epasts
password: Parole
password_confirmation: Apstiprināt paroli
remember_me: Atcerēties mani
models:
user: Lietotājs
devise:
confirmations:
new:
resend_confirmation_instructions: Atkārtoti atsūtīt instrukcijas apstiprinājumu
mailer:
confirmation_instructions:
action: Apstiprināt kontu
greeting: Sveicināti, %{recipient}!
instruction: 'Jūs varat apstiprināt, Jūsu konta epastu caur saiti zemāk:'
reset_password_instructions:
action: Veikt paroles maiņu
greeting: Sveicināti, %{recipient}!
instruction: Kāds ir nosūtijis pieprasijumu, Jūsu paroles maiņai, to var veikt caur saiti zemāk.
instruction_2: Ja Jūs neveicāt šo pieprasījumu, lūdzu ignorējiet šo ziņu.
instruction_3: Jūsu parole netiks mainīta, kamēr Jūs neapstiprināsiet saiti augstāk un neizveidosiet jaunu.
unlock_instructions:
action: Atbloķēt kontu
greeting: Sveicināti, %{recipient}!
instruction: 'Nospiežiet uz saites zemāk, lai atbloķētu kontu:'
message: Jūsu konts tika bloķēts vairāku kļūdainu datu ievadīšanas rezultātā.
passwords:
edit:
change_my_password: Mainīt paroli
change_your_password: Paroles maiņa
confirm_new_password: Apstiprināt jauno paroli
new_password: Jauna parole
new:
forgot_your_password: Aizmirsāt paroli?
send_me_reset_password_instructions: Atsūtīt paroles maiņas instrukciju
registrations:
edit:
are_you_sure: Vai Jūs esat pārliecināts/-ta?
cancel_my_account: Atcelt kontu
currently_waiting_confirmation_for_email: 'Pašlaik gaida apstiprinājumu epastam: %{email}'
leave_blank_if_you_don_t_want_to_change_it: atstājiet tukšu šo lauku, ja nevēlaties veikt izmaiņas
title: Rediģēt %{resource}
unhappy: Neapmierināts
update: Izmainīt
we_need_your_current_password_to_confirm_your_changes: mums ir nepieciešama Jūsu tagadējā parole, lai veiktu izmaiņas
new:
sign_up: Reģistrēties
sessions:
new:
sign_in: Pievienoties
shared:
links:
back: Atpakaļ
didn_t_receive_confirmation_instructions: Nesaņēmāt apstiprināšanas instrukciju?
didn_t_receive_unlock_instructions: Nesaņēmāt atbloķēšanas instrukciju?
forgot_your_password: Aizmirsāt paroli?
sign_in: Pievienoties
sign_in_with_provider: Pievienoties ar %{provider}
sign_up: Reģistrēties
unlocks:
new:
resend_unlock_instructions: Atkārtoti atsūtīt atbloķēšanas instrukciju
|
You're so ridiculous good at this.
Also, in case someone has somehow not mentioned it yet: Chrono Trigger / Pony crossover image. It's been done before but I wouldn't really trust it to anyone besides you. |
import Foundation
// MARK: - HTMLDiv
//
class HTMLDiv: ParagraphProperty {
override public func encode(with aCoder: NSCoder) {
super.encode(with: aCoder)
}
override public init(with representation: HTMLRepresentation? = nil) {
super.init(with: representation)
}
required public init?(coder aDecoder: NSCoder){
super.init(coder: aDecoder)
}
static func ==(lhs: HTMLDiv, rhs: HTMLDiv) -> Bool {
return lhs === rhs
}
}
|
(ns pallet.actions.direct.exec-script
"Script execution. Script generation occurs with the correct script context."
(:require
[pallet.action :refer [implement-action]]
[pallet.actions :refer [exec exec-script*]]))
(implement-action exec :direct
{:action-type :script :location :target}
[session
{:keys [language interpreter version] :or {language :bash} :as options}
script]
[[options script] session])
(implement-action exec-script* :direct
{:action-type :script :location :target}
[session script]
[[{:language :bash} script] session])
|
Beautiful and practical, the Kingston Dining Collection by
Gloster is built using the finest teak rich in oil and finely grained. Premium all-weather cushions ensure lasting comfort. Over time, the smoothly sanded teak will adopt a silvery patina.Built-in butterfly leaves ...
Change Country???FOOTER_COUNTRY_SELECTOR_ENABLED??????FOOTER_GO_TO_US_ENABLED???go to U.S. site |
Deadpool has been through a lot recently, and he needs to relax. Sounds like it's time for a good, old fashioned, simple merc job. Yes sir, Deadpool in the Middle East...should be nice and uncomplicated, right? Right? No, wrong! And when Deadpool clashes with Russian super-agent Omega Red, this time it's personal! Well, for one of them. Sort of. We'll explain. But how does Deadpool's latest misadventure, and one final fan-favorite flashback tale, lead to the most shocking event of all?
Deadpool has been through a lot recently, and he needs to relax. Sounds like it's time for a good, old fashioned, simple merc job. Yes sir, Deadpool in the Middle East...should be nice and uncomplicated, right? Right? No, wrong! And when Deadpool clashes with Russian super-agent Omega Red, this time it's personal! Well, for one of them. Sort of. We'll explain. But how does Deadpool's latest misadventure, and one final fan-favorite flashback tale, lead to the most shocking event of all? |
Effect of temperature on biofilm formation by Antarctic marine bacteria in a microfluidic device.
Polar biofilms have become an increasingly popular biological issue because new materials and phenotypes have been discovered in microorganisms in the polar region. Various environmental factors affect the functionality and adaptation of microorganisms. Because the polar region represents an extremely cold environment, polar microorganisms have a functionality different from that of normal microorganisms. Thus, determining the effective temperature for the development of polar biofilms is crucial. Here, we present a simple, novel one-pot assay for analysis of the effect of temperature on formation of Antarctic bacterial biofilm using a microfluidic system where continuous temperature gradients are generated. We find that a specific range of temperature is required for the growth of biofilms. Thus, this microfluidic approach provides precise information regarding the effective temperature for polar biofilm development with a new high-throughput screening format. |
Competition on productivity gradients -- what do we expect?
Many experimental studies have quantified how the effects of competition vary with habitat productivity, with the results often interpreted in terms of the ideas of Grime and Tilman. Unfortunately, these ideas are not relevant to many experiments, and so we develop an appropriate resource competition model and use this to explore the effects of habitat productivity on the intensity of competition. Several mechanisms influencing the productivity-competition intensity relationship are identified, and these mechanisms explored using two classic data sets. In both cases, there is good agreement between the model predictions and empirical patterns. Quantification of the mechanisms identified by the models will allow the development of a simple predictive theory linking measures of the intensity of competition with ecosystem-level properties. |
The location and characteristics of sympathetic preganglionic neurones in the lower thoracic spinal cord of dog and cat.
The retrograde transport of horseradish peroxidase from a white ramus communicans has been used to define the precise segmental location of sympathetic preganglionic cell bodies in the spinal cord of the cat and dog. All labelled cells were found ipsilaterally and were confined to the spinal cord segment from which the ramus originated. Most lay in the intermediolateral cell column and the immediately adjacent white matter, though others were scattered in more medial areas of the grey matter. We suggest that the observed distribution of sympathetic preganglionic neurones, the orientation of their processes and the paths taken by their axons are a direct result of cell migration during the embryological development of the spinal cord. |
Q:
Get Data and Map to Controls from Combobox Selected Value C#
I am trying to get required data into controls when i select specific Student Name from a combobox. i am using SelectedValueChanged event for this and the valuemember for that combobox in order to populate it with required data.
StudentsNamesComboBox.DisplayMember = "StudentName";
StudentsNamesComboBox.ValueMember = "SectionId";
here the studentnameCombobox has a different value from the parameter value required to get specific record from database using storedprocedure.
cmd.Parameters.AddWithValue("@AdmissionNumber", Convert.ToInt16(StudentsNamesComboBox.SelectedValue));
the problem i am facing is that i can't get the required parameter value (@AdmissionNumber) from the selected name in the studentNamesCombox.
any idea how to get the required parameter value without changing the studentNamesCombox valuemember? any other way around? because changing vlauemember will affect the whole functionality.
Regards
A:
When you are populating StudentName combobox, why don't you set the ValueMember of that combobox to "AdmissionNumber".
You do not need SectionI of the student in that combobox. SectionId is already available in the other combobox. In StudentName combobox all the items have same sectionId. Correct me if my assumption is wrong.
This way ComboBox.SelectedValue will give the value associated with the selected item which in your case will be "AdmissionNumber".
To get the name of the selected student you need to use ComboBox.SelectedItem.Text. That will give the Selected StudentName in your case.
|
--concrete ExtraTha of ExtraThaAbs = CatTha **
-- open ResTha, Coordination, Prelude in {
--
-- lin
-- GenNP np = {s = \\_ => np.s ! Gen} ;
-- ComplBareVS v s = insertObj (\\_ => s.s) (predV v) ;
--
-- StrandRelSlash rp slash = {
-- s = \\t,a,p,_ => rp.s ! RC Acc ++ slash.s ! t ! a ! p ! ODir ++ slash.c2 ;
-- c = Acc
-- } ;
-- EmptyRelSlash rp slash = {
-- s = \\t,a,p,_ => slash.s ! t ! a ! p ! ODir ++ slash.c2 ;
-- c = Acc
-- } ;
--
-- StrandQuestSlash ip slash =
-- {s = \\t,a,b,q =>
-- (mkQuestion (ss (ip.s ! Acc)) slash).s ! t ! a ! b ! q ++ slash.c2
-- };
--
-- lincat
-- VPI = {s : VPIForm => Agr => Str} ;
-- [VPI] = {s1,s2 : VPIForm => Agr => Str} ;
--
-- lin
-- BaseVPI = twoTable2 VPIForm Agr ;
-- ConsVPI = consrTable2 VPIForm Agr comma ;
--
-- MkVPI vp = {
-- s = \\v,a => vp.ad ++ vp.inf ++ vp.s2 ! a
-- } ;
-- ConjVPI = conjunctTable2 VPIForm Agr ;
-- ComplVPIVV vv vpi =
-- insertObj (\\a => (if_then_Str vv.isAux [] "to") ++ vpi.s ! VPIInf ! a) (predVV vv) ;
--
-- UncNegCl t a cl = {s = t.s ++ a.s ++ cl.s ! t.t ! a.a ! neg ! ODir} ;
-- UncNegQCl t a cl = {s = \\q => t.s ++ a.s ++ cl.s ! t.t ! a.a ! neg !q} ;
-- UncNegRCl t a cl = {
-- s = \\r => t.s ++ a.s ++ cl.s ! t.t ! a.a ! neg ! r ;
-- c = cl.c
-- } ;
-- UncNegImpSg imp = {s = imp.s ! neg ! ImpF Sg False} ;
-- UncNegImpPl imp = {s = imp.s ! neg ! ImpF Pl False} ;
--
-- CompoundCN a b = {s = \\n,c => a.s ! Sg ! Nom ++ b.s ! n ! c} ;
--
--
-- oper
-- neg = CNeg False ;
--
--}
|
Q:
Is there a query to see all the references in a SQL Server table?
I want a simple way to find all the Foreign Keys of my table.
For example having a table Customers, I want to find the tables with a relationship to this table, I use to find relationships using the Diagram but it is too slow.
Desired result = Customers_Accounts, Customers_Cities, Customers_Properites, etc
A:
Yes just select your table and press ALT + F1, at the bottom of the result set you will see all the references
|
Carly Orijinal Adaptör
İŞLETİM SİSTEMİNİZİ SEÇİN…
Avantajlarınız
With the Original Adapters we specifically had in mind to make your car connection perfect. We offer you the right packages for your car and its build year. You can send the adapter back in case you don’t like it and you get a lifetime warranty, so you’ll never have to worry about anything.
Since we know best about our adapters, we can help you and identify the problems, when something goes wrong. This makes it much easier for you to use the app, because we will be able to give you faster and better answers. |
"It's something that I've seen in different communities," Chichak said. "A lot of people are interested as to where this came from and why we're having it."
She described these breakfasts as an interesting way to promote an inclusive community and bring people of all faiths and denominations together.
"I'm hoping the community will understand and embrace it," Chichak said.
The breakfast included bacon, eggs, fruit and coffee. It was followed by remarks from the mayors and prayers. No Name Worthy then performed several songs to close the event.
"This prayer breakfast, it's not for us," Rennie said at the event. "It's a chance for us to thank all of you."
He emphasized the importance of working together, citing the high amount of inter-municipal co-operation between the County and Town.
"By working together, we can do so much more," Rennie said.
All excess funds were donated to Lornes Blanket, a faith-based organization that provides housing and support for homeless men. Chichak noted the breakfast had a good turnout and would likely become an annual event. |
Generally described, computing devices can be used to exchange information via a network. Mobile computing devices may utilize a wireless network provided by a service provider to facilitate the exchange of information in accordance with one or more wireless communication protocols. Wireless network service providers may offer network access to users (or potential users) of wireless telecommunications services in the form of service plans, which may include subscription plans, “pay as you go” plans, or other access plans.
Providers of wireless telecommunications services may thus make a number of service plans available, and users of wireless telecommunications services may select an offered service plan to obtain access to the provider's wireless network. |
Neymar y Rakitic no se han ejercitado este lunes a las órdenes de Luis Enrique. Ambos futbolistas han realizado trabajo de fisioterapia tras acabar 'tocados' en el Levante-Barça.
El delantero brasileño fue sustituido por problemas en su tobillo y ha llegado a Barcelona con molestias. Por su parte, Ivan Rakitic acabó el partido con una contusión en el pie izquierdo.
El club ha informado del parte médico de los dos futbolistas señalando que "la evolución de estas molestias y contusión, respectivamente, marcarán sus disponibilidad para los próximos entrenamientos".
VERMAELEN SIGUE SIN EL ALTA
Por su parte, en la sesión de este lunes Vermaelen ha seguido trabajando con sus compañeros aunque sin recibir todavía el alta médica. Quien no ha compartido el entrenamiento con el resto del grupo ha sido Rafinha que ha realizado trabajo específico junto a Jordi Masip.
Luis Enrique ha programado una sesión de recuperación con sus futbolistas disponibles entre los que han estado Sandro, Munir y Sergi Samper. |
Public safety answering points (PSAP) are increasingly using sophisticated geo-coordinate-based maps to pinpoint and display the location of the originator of an emergency call and to guide emergency response units to the location. Currently, such map data is limited to fixed telephones (i.e., wireline) but in the near future must include geo-coordinates of wireless (also known as cellular) telephones making emergency calls. Several problems must be solved before such pinpoint accuracy of both wireline and wireless maps are universally available.
First of all, companies that create maps for large areas or even the entire country generate most maps to include geo-coordinates. These maps are carefully surveyed and the geo-coordinates carefully documented. However, such maps may include local inaccuracies and cannot keep up with the ever-changing landscape of a local community.
Secondly, a PSAP serves one or more jurisdictions for several services (i.e., police, fire, animal control, etc.). These local PSAP's are not concerned with the majority of the commercially available maps; they are only concerned with their particular jurisdiction. Occasionally, however, a PSAP may be called upon to cover for a non-local jurisdiction.
Thus, the economies of purchasing accurate, up to date for every possible jurisdiction quickly becomes overwhelming for small and/or rural jurisdictions.
Therefore a problem in the art is that there is currently no economical accurate map data universally available. |
Q:
Check file is processed through all routes of camel using aggregator
I have a camel application where, I am reading files from FTP source.
Then the file goes through multiple routes, like one route goes to cassandra for storage, one route process the data and push pivoted data to Kafka topic etc
I want to mark the file processed when it goes through all routes and reaches till the end. This way I can build a processing completed log based on file name.
One way, That I can think of is to implement aggregator, where each route will send completion notification in exchange header and then based on the completion criteria logic in aggregator, I will mark that file as processed.
How will I write such aggregator in java?
A:
You could try using multicast.
from("direct:start")
.multicast()
.to("direct:a","direct:b")
.end()
// Won't run until the sub routes are complete
.process(new MarkFileAsCompletedProcessor())
.log("Finished multicast");
from("direct:a")
.log("Processing a")
.to("mock:endOfA");
from("direct:b")
.log("Processing b")
.to("mock:endOfB");
|
Ashes, Ashes
From page one, the chase is on and many will die. Unnecessarily. - Forensic psychiatrist, Ms Barrett Conyors knew that if Richard Glash werent manacled to his chair, he would kill her. He had likely imagined every detail of her murder and then obsessively sketched the scene hundreds of times. At forty-two Richard, whod spent all but four and a half years of his life locked away . . . had few interests, other than drawing and killing. |
#ifndef __ItemBoxLayer__
#define __ItemBoxLayer__
#include "ItemBox.h"
USING_NS_CC;
using namespace std;
class ItemBoxLayer:public Node
{
public:
static ItemBoxLayer* create();
void setLimitRow(int limitRow);
void setLimitColumn(int limitColumn);
void setItemCount(int itemCount);
void setViewSizeAndItemSize(Size viewSize,Size itemSize);
bool isEnableEvent();
void enableEvent(bool enableEvent);
void setIsCanScroll(bool isCanScroll);
void setScrollType(int scrollType);
void setKeepSelectEffect(bool enable);
void cancelSelectEffect();
ItemBox* getItemBoxByPosition(int position);
ItemBox* getItemBoxByItemId(int itemId);
void addEventListener(std::function<void(int,ItemBox*)> selectItemCallback);
protected:
virtual void setParent(Node* parent);
virtual bool init();
ItemBoxLayer();
virtual ~ItemBoxLayer();
enum class ItemBoxLayerState
{
WAITING,
TRACKING_TOUCH,
MOVE_TOUCH,
};
ItemBox* getItemForTouch(Touch *touch);
std::function<void(int,ItemBox*)> _selectItemCallback;
bool _keepSelectEffect;
int _limitRow;
int _limitColumn;
Size _viewSize;
Size _itemSize;
int _minColumn;
int _minRow;
int _maxColumn;
int _maxRow;
int _itemCount;
Map<int,ItemBox*> _itemBoxsMap;
bool _isCanScroll;
int _scrollType;
bool _isSrolling;
float _minYposition;
float _maxYposition;
float _minXposition;
float _maxXposition;
Rect touchRect;
bool _enableLock;
bool _enableEvent;
ItemBox* _selectedItem;
ItemBoxLayerState _itemBoxLayerState;
};
#endif /* defined(__ItemBoxLayer__) */ |
# Read about factories at https://github.com/thoughtbot/factory_girl
FactoryGirl.define do
factory :logo do
image { fixture_file_upload(Rails.root.join('spec', 'fixtures', 'logo.png')) }
end
end
|
package org.tests.model.onetoone.album;
import io.ebean.Model;
import io.ebean.annotation.SoftDelete;
import io.ebean.annotation.WhenCreated;
import io.ebean.annotation.WhenModified;
import org.joda.time.DateTime;
import javax.persistence.Id;
import javax.persistence.MappedSuperclass;
@MappedSuperclass
public abstract class BaseModel extends Model {
@Id
protected Long id;
@SoftDelete
protected boolean deleted;
@WhenCreated
protected DateTime createdAt;
@WhenModified
protected DateTime lastUpdate;
protected BaseModel() {
super(null);
}
public Long getId() {
return this.id;
}
public DateTime getCreatedAt() {
return this.createdAt;
}
public DateTime getLastUpdate() {
return this.lastUpdate;
}
/**
* Check if this entry is soft deleted.
*/
public boolean isDeleted() {
return this.deleted;
}
}
|
Emblem Interiors design and manufacture fine window dressings and soft furnishings. Made to order - any size, any style, any fabric!
Set in the beautiful Quantock Hills in Somerset Emblem Interior...
more → |
In recent years, developments in communication systems and computer technology have enabled communication between computers over vast distances utilising communications networks. Employing electronic mail, it is possible for a user of a personal computer (or any other type of computer) with access to a modem or other network communications interface, to communicate with any number of users of remote computers e.g., via the internet. Distance is no barrier. Further, in small or large companies electronic mail networks are often used to connect user terminals to enable communication in-house between users.
The possibility of communication with any number of users having access to electronic mail opens up vast information gathering potential.
To obtain and process such large amounts of information, however, presents a number of problems. Using electronic mail for a user of a computer may ask a question or questions of a relatively large number of remote users, by addressing mail including a question or questions to those users.
The task of processing responses to the question or questions becomes extremely difficult. Where a large number of users provide responses, the task can be almost impossible. This difficultly will be aggravated where a large number of questions are asked. The amount of information to process can be staggering and the user who asked the questions may be faced with the onerous task of sorting through a large amount of mail, item by item, to extract and collate the information he requires. Where a large amount of information is required from a large number of people, it is impractical for one person to deal with.
Consider the example of opinion polls, whether for marketing, political or other purposes. Presently, large numbers of field operators are required to gather numerous responses from members of the public. Once those responses have been gathered, hundreds and even thousands of man-hours are required to process the responses to extract the required information and present it in a form which allows for analysis. Thousands of questionaries may need processing, each with many Questions and responses. It should also be noted that the time taken to gather and process the responses can mean that the information finally revealed from the opinion poll has lost it's relevance or at least become less relevant. Consider a political opinion poll, where peoples opinions may be varying from day to day, significantly enough to affect the election result. An opinion poll which takes two or three days to process will be out of date and irrelevant by the time the results are available for publication.
There are really two major problems with presently available "surveying". Firstly, there is the problem of how does a person ask the questions of all the people he wishes to ask the questions of, without expending many man hours or employing a number of people as field operators? This problem is somewhat alleviated by the existence of systems such as electronic mail, which enable a person to select a number of people to send a single document to. There is the problem here, however, that no convenient means exists of asking a series of complex, linked questions. For example, a persons answer to a particular question may determine whether or not a subsequent question is relevant to that person. If the person is asked whether they are taking leave from employment that year to go on holiday, and answer no, there is no point in asking them where they are going on holiday. Electronic mail communication systems do not deal with that problem.
Even though electronic mail may be used to somewhat alleviate the problem of getting a question to a number of people, such systems do nothing to alleviate the problems associated with processing the answers. There is no alternative but for the person asking the question to sort through return mail item by item to, first of all, identify which mail is in response to his questions, and, then, to collate and process the responses to enable a meaningful analysis.
These problems are not limited to large surveys, such as political opinion polls. Even quite small surveys can present problems of time management. For example, imagine if a director of a company with fifty or so employees wishes to plan staff leave for the year. He has to ask all his employees when they would like to take leave. He may also wish to know where they want to go. He can do this by sending out a memo and awaiting the results, or perhaps even sending out a memo on intra office computer mail and awaiting the results. He still has to process all the results. Processing results, analysing them and planning the leave even of only fifty people can be quite time consuming, particularly for a person with many other responsibilities who does not really have the time to spend on such a task. Further, the managing director may wish to ask many different types of questions of his staff on a on-going day-to-day basis. His only option for processing the responses is to do it himself, item by item, or, if he has not got time (as is usually the case) to employ somebody to do it. |
The exchange bias phenomenon in uncompensated interfaces: theory and Monte Carlo simulations.
We performed Monte Carlo simulations of a bilayer system composed of two thin films, one ferromagnetic (FM) and the other antiferromagnetic (AFM). Two lattice structures for the films were considered: simple cubic and body centered cubic (bcc). We imposed an uncompensated interfacial spin structure in both lattice structures; in particular we emulated an FeF2-FM system in the case of the bcc lattice. Our analysis focused on the incidence of the interfacial strength interactions between the films, J(eb), and the effect of thermal fluctuations on the bias field, H(EB). We first performed Monte Carlo simulations on a microscopic model based on classical Heisenberg spin variables. To analyze the simulation results we also introduced a simplified model that assumes coherent rotation of spins located on the same layer parallel to the interface. We found that, depending on the AFM film anisotropy to exchange ratio, the bias field is controlled either by the intrinsic pinning of a domain wall parallel to the interface or by the stability of the first AFM layer (quasi-domain wall) near the interface. |
Community acquired respiratory viral infections after lung transplantation: clinical features and long-term consequences.
Community acquired respiratory viruses (CARVs) are increasingly recognized as serious threats to lung transplant recipients. While CARVs such as respiratory syncytial virus, parainfluenza, influenza, and adenovirus usually cause self-limited illnesses in immunocompetent subjects, infections in the transplant recipient can be dramatic. As transplant recipients live longer and diagnostic methods improve, the burden of CARVs will undoubtedly increase. Because of limited therapeutic options, some patients may succumb to CARV infections, while many survivors develop chronic allograft dysfunction. Recognition of this latter phenomenon has implicated CARVs in the pathogenesis of bronchiolitis obliterans. |
RAID levels
A RAID level is any of the possible configurations of a RAID disk array. RAID stands for redundant array of independent disks (or, formerly, redundant array of inexpensive disks).
RAID levels may refer to:
Standard RAID levels, all the RAID configurations defined in the Common RAID Disk Drive Format standard, which is maintained by the Storage Networking Industry Association
Nested RAID levels, RAID configurations that incorporate features of two or more standard RAID levels
Non-standard RAID levels, variants of standard or nested RAID levels. Non-standard RAID levels deviate from the standard configurations defined by the Storage Networking Industry Association (SNIA).
See also
Non-RAID drive architectures
Category:RAID |
<h1>Show <%= schema.human_singular %></h1>
<%%= if @live_action in [:edit] do %>
<%%= live_modal @socket, <%= inspect context.web_module %>.<%= inspect Module.concat(schema.web_namespace, schema.alias) %>Live.FormComponent,
id: @<%= schema.singular %>.id,
title: @page_title,
action: @live_action,
<%= schema.singular %>: @<%= schema.singular %>,
return_to: Routes.<%= schema.route_helper %>_show_path(@socket, :show, @<%= schema.singular %>) %>
<%% end %>
<ul>
<%= for {k, _} <- schema.attrs do %>
<li>
<strong><%= Phoenix.Naming.humanize(Atom.to_string(k)) %>:</strong>
<%%= @<%= schema.singular %>.<%= k %> %>
</li>
<% end %>
</ul>
<span><%%= live_patch "Edit", to: Routes.<%= schema.route_helper %>_show_path(@socket, :edit, @<%= schema.singular %>), class: "button" %></span>
<span><%%= live_redirect "Back", to: Routes.<%= schema.route_helper %>_index_path(@socket, :index) %></span>
|
While Facebook’s “unfollow” option ensures that most of us don’t have to listen to assholes make tasteless jokes about the dead, public figures—like Robin Williams’ daughter Zelda, who was thrust into the role after her father’s tragic suicide Monday—don’t always have that option. Williams (who was, in fact, named after the Nintendo game and co-starred with her dad in an ad for Ocarina Of Time 3D)posted this lovely tribute to her father on Twitter and Instagram Monday night:
But since the anonymity of the Internet allows shitty people to evolve into their shittiest form like a bunch of sociopathic Pokemon, Williams’ account was almost immediately inundated with hateful comments and horrific pictures, reportedly including graphic Photoshopped renditions of her father’s dead body. After initially asking supporters to push back against the trolls by reporting them, Williams decided last night to withdraw from social media entirely. Williams says she’ll be away for a while: “I will be leaving this account for a bit while I heal and decide if I’ll be deleting it or not,” she said on Instagram, adding:
“In this difficult time, please try to be respectful of the accounts of myself, my family and my friends. Mining our accounts for photos of dad, or judging me on the number of them is cruel and unnecessary…I shared him with a world where everyone was taking their photo with him, but I was lucky enough to spend time with him without cameras too.” |
A509 road (Northern Ireland)
The A509 is a road in Northern Ireland. It travels through County Fermanagh and continues to Cavan and Dublin in the Republic of Ireland as the N3.
The road is a single-carriageway primary route, and forms part of a road corridor from Dublin to Ballyshannon via the N3 route in the Republic of Ireland and the A4 and A46 routes in Northern Ireland.
Route
The A509 commences at a roundabout with the A4 on the outskirts of Enniskillen and follows a south-easterly path parallel to Upper Lough Erne. The road passes through the villages of Bellaneleck and Mackin, and Derrylin and Teemore at the foot of Slieve Rushen. The road then skirts past the village of Aghalane, and crosses the Senator George Mitchell Peace Bridge to link with the N3 onwards to Belturbet, Cavan, Navan and Dublin.
Category:Roads in Northern Ireland
Category:Roads in County Fermanagh |
Q:
Literal Control inline edit
i would like to edit text and save it, but inline, this is, the text is uploaded to a literal control in the server, but now i would like to edit the text inline.
User Control - ASP.NET
...
+ "<td>" + status + "</td>"
...
load.Controls.Add(new LiteralControl(_str));
_str is a string with the literal control;
status is the string wich as the data from the database.
my idea is to click in the numbers and edit. how can i do it?
A:
You could render the status as a disabled borderless textbox (input="text"). Meaning that it would seem as plain text to the user. When the user clicks on it, you would change the textbox style to make it visible (with borders) and editable (focusable, enabled). The saving process of that information could be made when the user leaves the textbox (onblur event), making an AJAX request to the server or just when the user clicks on a save button (assuming it could exist).
|
JUST WATCHED
Tillerson: President Trump speaks for himself
MUST WATCH
Tillerson: President Trump speaks for himself
Secretary of State Rex Tillerson told Chris Wallace, on Fox News Sunday, that President Donald Trump "speaks for himself" when asked whether the President's response to the violence in Charlottesville, Virginia, raised questions about Trump's values.
Tillerson: President Trump speaks for himself
Secretary of State Rex Tillerson told Chris Wallace, on Fox News Sunday, that President Donald Trump "speaks for himself" when asked whether the President's response to the violence in Charlottesville, Virginia, raised questions about Trump's values. |
Dedifferentiated gastrointestinal stromal tumor: Recent advances.
Gastrointestinal stromal tumors (GISTs) are the most common mesenchymal lesions of the gastrointestinal tract. A small minority of GISTs exhibit morphologic and phenotypic changes and differentiate into an unusual phenotype through the process of dedifferentiation. Dedifferentiation can occur either de novo or after prolonged treatment with imatinib, a selective tyrosine kinase inhibitor. GISTs can present with various morphologies including rhabdomyosarcoma, angiosarcoma, or undifferentiated pleomorphic sarcoma. The unusual histologic and immunohistochemical characteristics of these tumors can be diagnostically challenging. Therefore, it is essential that the pathologists recognize GISTs with unusual morphology and be aware of the dedifferentiation process. This review aims to provide an overview of the morphologic and molecular features of dedifferentiated GISTs. Additionally, we discuss diagnostic dilemmas and recent immunohistochemical markers that are useful in distinguishing dedifferentiated GISTs from other gastrointestinal tumors. |
Partnership Interest
Gifts of partnership interests can provide a donor with a valuable income tax charitable deduction. The most common partnership gifts include those involving real estate, oil, and gas properties. Under special circumstances, a partnership interest may also be used to fund a Charitable Lead Trust. |
Lipids and their derivatives: by-products used as essential building blocks for modern drug delivery systems.
Lipids, one of the major natural products, usually have high biocompatibility and low toxicity. Due to their proper physicochemical properties, they are the most commonly used materials for building modern drug delivery systems, especially nanocarriers. However, to impart new functions or to satisfy special requirements, the lipids can be modified or synthesized. Using lipids or lipid derivatives, various lipid-based drug or gene delivery systems have been developed and show potential in pre-clinical and clinical applications. In this article, the most commonly used lipids are discussed in terms of their properties and functions as drug carrier components, their chemical modifications, the formulation or composition of lipid-based nanocarriers, and their biomedical applications. This article provides a critical view and possible future directions of lipid-based drug delivery strategies. |
<===> input.scss
$zzz: zzz;
[#{$zzz}=foo] { a: b; }
<===> output.css
[zzz=foo] {
a: b;
}
|
<section>
<section>
<title>Properties</title>
<table>
<thead>
<tr>
<td>Name</td>
<td>Default with <literal>war</literal> plugin <overrides>Default with <literal>java</literal> plugin</overrides></td>
</tr>
</thead>
<tr>
<td>extension</td>
<td><literal>war</literal></td>
</tr>
<tr>
<td>classpath</td>
<td><literal>project.sourceSets.main.runtimeClasspath - project.configurations.providedRuntime</literal></td>
</tr>
<tr>
<td>webXml</td>
<td><literal>null</literal></td>
</tr>
<tr>
<td>source</td>
<td><literal>[project.webAppDir]</literal></td>
</tr>
</table>
</section>
<section>
<title>Methods</title>
<table>
<thead>
<tr>
<td>Name</td>
</tr>
</thead>
<tr>
<td>webInf</td>
</tr>
<tr>
<td>classpath</td>
</tr>
</table>
</section>
</section>
|
Computer-aided decisions for prospective hysterectomy screening.
This article discusses the design of a computerized decision support system for prospective hysterectomies. The system is aimed at helping physicians make better decisions by providing a standardized reference. This is expected to help reduce some unrequired operations and, hence, costs. In addition to final treatment plans, the system also helps in intermediate decisions. The system differs from other decision support systems in that it utilizes explicit statistical analysis and rules for its decisions. Interval estimates for probabilities, an easy to interpret and intuitively appealing scheme, is used to handle uncertainty. |
-By Warner Todd Huston
Lincoln Chafee was the bane of conservative talk radio when he was the RINO Senator from Rhode Island. Now that he is a newly minted "independent" and has become the Governor of the Ocean State, Chafee is in a position to take his revenge on the medium. And boy has this petty man used his power to do just that by banning his state employees from talking to talk radio.
Chafee has revealed some pretty warped logic to sustain his ban on talk radio, too. Through his spokesman, Chaffe said that he won't go on talk radio because the medium is "ratings-driven, for-profit programming," and that he doesn't want his employees going on for the same reason.
Spokesman Michael Trainor... said the policy emanates from a belief that talk radio is essentially "ratings-driven, for-profit programming," and "we don't think it is appropriate to use taxpayer resources" in the form of state employee work time to "support for-profit, ratings-driven programming."
One has to wonder which news media out there isn't "for profit" and essentially for "ratings" -- at the very least through sales if nothing else?
This is nothing but a move toward revenge. When Chafee was in the Senate he didn't like the free political speech exercised by talk radio and now that he's governor he's making a move to starve the medium of something to talk about.
But all he'll really end up doing is setting up a situation where his government will be both out of touch with the people on one hand and open to debilitating leaks on the other. He'll also choke off an avenue for his own officials to get their own side of the story out to the public before the rumor mill is whipped up into a frenzy.
So, not only is Chafee revealing his pettiness, he's potentially damaging his own administration.
Smooth move, Linc.
(Note: Correction to change New Hampshire to Rhode Island. I had just written a story about NH and had the Granite State on my mind and absent mindedly said that Gov. Chafee was from New Hampshire. He is, indeed, from Rhode Island. My apologies.) |
Clazz.declarePackage ("J.shapesurface");
Clazz.load (["J.shapesurface.MolecularOrbital"], "J.shapesurface.NBO", null, function () {
c$ = Clazz.declareType (J.shapesurface, "NBO", J.shapesurface.MolecularOrbital);
Clazz.defineMethod (c$, "initShape",
function () {
Clazz.superCall (this, J.shapesurface.NBO, "initShape", []);
this.myType = "nbo";
this.setPropI ("thisID", "nbo", null);
});
});
|
Visceral signals reach visual cortex during slow wave sleep: study in monkeys.
Propagation of signals from the gastro-intestinal system towards the occipital cortex within sleep-wake cycle was investigated in three monkeys used in the study of sleep impairment in a chronic MPTP model of parkinsonism. The monkeys differed in motor abilities and sleep structure. e animal (M1) was non-motor disabled and had no sleep alterations. The other two monkeys were severely motor affected, but one (M2) had normal sleep cycles; meanwhile, the other (M3) had no complete sleep cycles. To evaluate the level of sleep and to record cortical evoked responses screw electrodes were implanted over the occipital cortex. Two hours before overnight recordings, two hook electrodes were injected intraperitoneally (under light Ketanest anesthesia) and anchored in gut. Using these electrodes, electric stimulation was applied during slow wave sleep, and in wakefulness. Cortical evoked responses to intraperitoneal stimulation were found indeed during sleep in experiments with M1 and M2. These results show that also in primates with normal sleep pattern visceral information is transferred to the cerebral cortex during slow wave sleep. |
Health
Isn't positive thinking supposed to be a wonderful thing? It's a positive thing, right? So why does the term make me bristle? Somehow positive thinking evokes for me some hyper-cheerful type with a teeth-baring smile, strained cheeks, a painful handshake, and a strong propensity for sweet denial. Makes me want my old cynical self back.
But I won't have her. I traded in my not only cynical but also depressive, dark, miserable, underachieving self almost a decade ago when years of often halfhearted searching (amazingly) brought me to a new way to look at my thoughts ... which led me to a new way of thinking ... which led me to see the world and people and myself in much friendlier terms. For the record, though this article isn't about that, the powerful form of self-inquiry I discovered and, more important, applied and keep applying, was The Work of Byron Katie. You can learn all about it by visiting www.thework.com or by reading Loving What Is.
Here's one of the most pivotal things I ever heard Byron Katie explain: anytime that you believe anyone or anything outside of you can keep you from your well-being, you're a victim. Gulp. I recognized myself instantly as a habitual victim constantly pointing outward (to insane politicians, greedy corporate types, bigoted neighbors, loved ones who didn't understand me, family whose needs drained me, the economy, not enough time) that made it impossible for me to be peaceful, content, and creative. In bumper sticker terms, I was more into "If you're not outraged, you're not paying attention" than "Live the life you love" or "I'd rather be here now." With a new awareness of victim mentality, I made it my business to catch myself in any victim talk or thought and to speak or think again.
"You saved my life. The Free Clinic really saved my life." Ithaca Health Alliance (IHA) Clinic Coordinator, Valarie FitzRandolph, hears thanks and praises like this often. This time it was from a patient who'd been living with unmonitored high blood pressure and no health insurance. He came to see a doctor at no charge and left with a prescription for an inexpensive blood pressure medication.
Full of excitement, another patient told us her blood pressure has gone down and her mood has improved since using herbal medicine. She loved her free appointments with and botanical remedies from 7Song, Herbalist and Director of Holistic Medicine at Ithaca Free Clinic. She reports that she felt like a new person, thankful and hopeful. Still moving through financial and health struggles, she continues to use the Clinic's medical care, counseling, and financial advocacy. She is grateful for the integrated approach to health care. These services are made possible largely by local financial and volunteer support.
Support the Ithaca Health Alliance at GreenStar's Cash Registers
Would you like to be part of this vital force in local health care? Together, as Health Allies, we can sustain the Health Alliance in this effort to equalize access to health care for uninsured and underinsured community members.
The first of November will mark the start of our "Give Thanks for Health Care" register fundraiser at GreenStar. Please ask your cashier to add a donation to your everyday and holiday purchases. If you have access to affordable care, you can help make it possible for those who don't. If you can't afford care, you can still help support services for others and use them yourself as well. All money raised will help ensure that these services continue for our neighbors in Tompkins County and beyond. As one Health Ally says, "It's great to know that these resources are available — just in case."
Are you noticing drafts in your home? Wondering whether your heating system is safe or efficient? Are you looking for ways to save on your energy costs? With winter coming on fast, Tompkins Community Action wants to help keep your home warm. Every day, TCAction hears from homeowners, landlords and renters looking for information about our energy efficiency programs. With so many energy efficiency loans, rebates, grants and tax incentives available, it can be hard to fi... |
The PFF Summit provides an unparalleled opportunity to meet with physicians, researchers, patients, caregivers, industry representatives, and members of the international PF community—all in one setting. We look forward to seeing you there! |
The present invention relates to playground equipment, and in particular, to a playground swing allowing for a pair of riders to swing together while facing each other.
It has been increasingly desired to incorporate and enhance attunement play between individuals in playground equipment. Attunement play facilitates the nonverbal connection between people through play, such as between a caregiver and child. When the caregiver and child are aware and responsive to one another, the pair are engaged in a way in which verbal communication is not necessary and the right side of their brains, responsible for processing emotions and face recognition, are attuned. The nonverbal attunement is important for the child to feel loved and secure and associate the caregiver with dependability, affecting the child's relationships with caregivers and with others throughout life.
Not only does attunement play have the benefits of building and maintaining the emotional development of children but attunement play has the additional benefits of caregiver-child relationship bonding. In addition, less accidents and improved supervision may occur when the caregiver is engaged with the child during play.
Typical playground swings allow for swinging by a child while a caregiver pushes the child on the swing from behind the child. Although this type of playground swing allows the child and caregiver to interact, the child and caregiver are unable to interact nonverbally through eye contact, facial clues, or body language. |
Q:
Will a PXIe card fit in a PCIe slot?
I cannot figure out for the life of me if a National Instruments PXIe card (such as this) will fit and work correctly in a standard PCIe slot. Their website is not helpful at all in answering this question. It seems to be hinted at that a chasis (like this) is required to operate any PXIe cards but I can't tell if it's just something extra they want to sell you.
A:
That card will not work in a PCIe slot. You will need to purchase a PXI chassis. It probably is them just wanting to sell you something (by using a proprietary connector), but not something you can get out of.
|
// Copyright (c) DotSpatial Team. All rights reserved.
// Licensed under the MIT license. See License.txt file in the project root for full license information.
using System;
namespace DotSpatial.Data
{
/// <summary>
/// FeatureEventArgs
/// </summary>
public class FeatureEventArgs : EventArgs
{
#region Constructors
/// <summary>
/// Initializes a new instance of the <see cref="FeatureEventArgs"/> class.
/// </summary>
/// <param name="inFeature">The feature of the event.</param>
public FeatureEventArgs(IFeature inFeature)
{
Feature = inFeature;
}
#endregion
#region Properties
/// <summary>
/// Gets or sets the feature being referenced by this event.
/// </summary>
public IFeature Feature { get; protected set; }
#endregion
}
} |
Comedy & Commentary Podcast – posted Wednesdays
Pyra makes a decision about the future of the show: she’ll change the direction and format of this show to be more of a reflection of her changing priorities and direction in life. This week’s in-between episode is a wrapping up of the old version of the show and a preview of the new, in which Pyra talks about stand up comedy and her other projects and her new old obsessions.
She then talks about mini-retreats, new priorities and practises, and gives side notes on why you probably don’t want to search for “Tibetan sky burial” on YouTube (with a side note on the side note about the relationship between the Chinese Communist Party, gawking tourists, and pissed off monks), when karma’s kinda funny, and weird anxiety about rising tides. |
Department of Medicine, University of California, San Francisco, San Francisco, CAHoward Hughes Medical Institute, University of California, San Francisco, San Francisco, CASandler Asthma Basic Research Center, University of California, San Francisco, San Francisco, CA |
In a fresh show of barbarism it is capable of enacting, the Islamic State group released a video that purportedly contains visuals of its prisoners -- clad in orange jumpsuits -- being hung upside down from meat hooks in what looks like a factory, and then being slaughtered -- killed and cut open -- like sheep and goats.
What is even more shocking is the similarities between the manner in which these prisoners were killed and how sheep and goats are sacrificed on Eid al-Adha, the holy festival Muslims celebrate all over the world. That the video was released on this occasion is being seen as no coincidence.
The video, titled "The Making of Illusion," shows people purportedly from the Der Ezzor province of Syria, a stronghold of the Islamic State group, which is also known as Islamic State of Iraq and Syria (Isis) or Islamic State of Iraq and the Levant (Isil).
All the men are shown dressed in orange jumpsuits, a common trait among people in videos who Isis says are its prisoners. Many of them are blindfolded, and their hands tied behind them. The video depicts them in what could be either a factory or a prison, while some are saying it could also be an abattoir or a slaughterhouse.
The video initially names many -- if not all -- of the "prisoners" who go on to be killed. It then shows the Syrians being hung upside down from meat hooks, their hands restrained behind them with zip-ties. At one point, two of them are also shown being carried like goats on two arms by an Isis member.
Their throats are then slit -- much like how goats and sheep are cut in the halal way so their meat is deemed safe for eating by Muslims. Their "execution" happens because Isis suspects them to be spies. |
Electronic gaming machines (“EGMs”) are often situated in a casino or other gaming establishment which houses many EGMs at a single site. For example, multiple video poker terminals may be provided in a single location.
Electronic gaming machines in such environments often connect to one or more hosts in order to provide a game. Some EGMs may act as client devices by displaying game data that is generated by the host. The EGM may communicate with the host through a network and various configuration settings may be configured and applied to such communications.
In some instances, many EGMs are deployed at a common location. For example, a game floor of a casino or other gaming establishment may include numerous EGMs. Initializing the various configuration settings that are used for the communications between the EGM and the host may be a time-consuming task and tools and systems for assisting in initializing such settings may be helpful.
Similar reference numerals are used in different figures to denote similar components. |
Help
Effortlessly shape and add definition to lips with our Art-Ki-Tekt Lip Sculptor. On one end is a long-wearing, highly pigmented lip color. With shades that range from naughty nude's too vivid colors, these liners are perfect for any look and can be worn alone or as a base for any lip color.
For the illusion of fuller lips, line over the natural lip line and define using a deeper shade to contour. |
/**
* Used in the {@link Ext.tab.Bar} component. This shouldn't be used directly, instead use
* {@link Ext.tab.Bar} or {@link Ext.tab.Panel}.
* @private
*/
Ext.define('Ext.tab.Tab', {
extend: 'Ext.Button',
xtype: 'tab',
alternateClassName: 'Ext.Tab',
// @private
isTab: true,
config: {
/**
* @cfg baseCls
* @inheritdoc
*/
baseCls: Ext.baseCSSPrefix + 'tab',
/**
* @cfg {String} pressedCls
* The CSS class to be applied to a Tab when it is pressed.
* Providing your own CSS for this class enables you to customize the pressed state.
* @accessor
*/
pressedCls: Ext.baseCSSPrefix + 'tab-pressed',
/**
* @cfg {String} activeCls
* The CSS class to be applied to a Tab when it is active.
* Providing your own CSS for this class enables you to customize the active state.
* @accessor
*/
activeCls: Ext.baseCSSPrefix + 'tab-active',
/**
* @cfg {Boolean} active
* Set this to `true` to have the tab be active by default.
* @accessor
*/
active: false,
/**
* @cfg {String} title
* The title of the card that this tab is bound to.
* @accessor
*/
title: ' '
},
updateIconCls : function(newCls, oldCls) {
this.callParent([newCls, oldCls]);
if (oldCls) {
this.removeCls('x-tab-icon');
}
if (newCls) {
this.addCls('x-tab-icon');
}
},
/**
* @event activate
* Fires when a tab is activated
* @param {Ext.tab.Tab} this
*/
/**
* @event deactivate
* Fires when a tab is deactivated
* @param {Ext.tab.Tab} this
*/
updateTitle: function(title) {
this.setText(title);
},
updateActive: function(active, oldActive) {
var activeCls = this.getActiveCls();
if (active && !oldActive) {
this.element.addCls(activeCls);
this.fireEvent('activate', this);
} else if (oldActive) {
this.element.removeCls(activeCls);
this.fireEvent('deactivate', this);
}
}
}, function() {
this.override({
activate: function() {
this.setActive(true);
},
deactivate: function() {
this.setActive(false);
}
});
});
|
Raw Deserts Workshop Archive
Would you like to learn how to make delicious, unbaked, healthy and quick deserts? Would you like to discover how to prepare healthy deserts for your kids, relatives & friends or even to sell them by yourself in your shop? Do you have sweet tooth, but feeling guilty every time you eat traditional cake, chocolate |
Color-vision mechanisms of the extrafoveal retina.
Wavelength discrimination, spectral sensitivity as well as color-matching performance were measured at the fovea and at different eccentricities in the peripheral retina. The results show that the underlying mechanisms of color vision in the normal peripheral retina are different from those of the classic forms of congenital color blindness. On the other hand, a close correspondence was found between color-vision characteristics obtained in the extrafoveal retina and in patients with acquired color-vision defects due to diseases of the optic nerve, suggesting that the loss of color discrimination with eccentricity and during progression of these diseases has a common underlying basis. |
After a lengthy, carefully reasoned argument about why “pathological narcissist” Donald Trump must be removed from the White House, conservative lawyer George Conway tweeted urgently later Thursday: “This is insane. Trump’s gotta go.”
Trump also told reporters Thursday that China should investigate Biden.
Conway’s “insane” label for what has been transpiring with Trump followed a treatise Thursday in The Atlantic that Trump is unfit for office because he’s an extreme “narcissist” who puts himself ahead of the nation.
“You don’t need to be a mental health professional to see something’s seriously off with Trump,” Conway wrote. And it’s only getting worse under the stress of a stumbling economy and an impeachment investigation, he warned.
“No president in recent memory — and likely no president ever — has prompted more discussion about his mental stability and connection with reality,” Conway wrote. He recounted several troubling reports since Trump took office, including former White House chief of staff John Kelly allegedly calling Trump “unhinged” and an anonymous White House official writing of the president’s “instability” in The New York Times.
The president is “volatile and erratic” — and “incapable of consistently telling the truth,” George Conway wrote. He quoted Times columnist Megan McArdle: “This is not normal. And I don’t mean that as in, ‘Trump is violating the shibboleths of the Washington establishment.’ I mean that as in, ‘This is not normal for a functioning adult.’”
A president should act as a “fiduciary” of the nation, who pursues the “’public interest in good faith republican fashion rather than pursuing his self-interest,’” Conway noted, quoting from a recent Harvard Review article.
But Trump acts instead like an extreme — if not “pathological” — narcissist who is convinced he is an exceptional human being and an expert on everything, despite evidence to the contrary, lacks empathy, and craves being the constant focus of admiration, Conway argued. The “fundamental life goal” of an extreme narcissist “is to promote the greatness of the self, for all to see,” psychologist Dan McAdams has written in The Atlantic, Conway noted.
“Simply put, Trump’s ingrained and extreme behavioral characteristics make it impossible for him to carry out the duties of the presidency in the way the Constitution requires,” Conway argued.
“It would take entire books to catalog all of Trump’s behavioral abnormalities and try to explain them .... But when you line up what the Framers expected of a president with all that we know about Donald Trump, his unfitness becomes obvious,” Conway wrote.
“To act as a fiduciary requires you to put someone else’s interests above your own, and Trump’s personality makes it impossible for him to do that,” Conway concluded.
“For Trump, Trump always comes first. He places his interests over everyone else’s — including those of the nation whose laws he swore to faithfully execute. That’s not consistent with the duties of the president.”
The answer to the Trump problem, Conway concluded, is impeachment.
“If Congress does its job and presents the evidence, those who are in denial” about Trump “won’t be able to ignore the problem any longer,” he explained. “Not only because of the evidence itself, but because Donald Trump will respond in pathological ways — and in doing so, he’ll prove the points against him in ways almost no one will be able to ignore.”
Read Conway’s piece in The Atlantic here. |
The Grayshott-born actor, who most recently starred in Kingsman: The Golden Circle, made a formal application for dual citizenship back in May. Firth has been a vocal critic of Brexit in the past year, calling it “a disaster of unexpected proportions”.
While his agent did not confirm that Brexit had been the major factor behind Firth’s application, the representative did state that the actor’s resolve to apply for Italian citizenship had been a family decision. Firth’s wife, the film producer Livia Giuggioli, is Italian, while their two children were both born in Rome.
“Colin applied for dual citizenship in order to have the same passports as his wife and children,” his agent said in a statement.
Sharethrough (Mobile)
Speaking previously about the decision to apply for dual citizenship, Firth alluded to Brexit by referencing “the uncertainty around”.
“We never really thought much about our different passports.
“But now, with some of the uncertainty around, we thought it sensible that we should all get the same.”
The Italian interior ministry have confirmed that Firth now has dual citizenship, announcing: “The very famous actor, who won an Oscar for the film The King’s Speech, is married to a citizen from our country and has often declared his love for our land.” |
Ultrafast Barrierless Photoisomerization and Strong Ultraviolet Absorption of Photoproducts in Plant Sunscreens.
Sunscreens are aimed at protecting skin from solar ultraviolet (UV) irradiation. By utilizing femtosecond transient absorption spectroscopy and time-dependent density functional theory, we explain nature's selection of sinapoyl malate rather than sinapic acid as the plant sunscreen molecule. In physiological pH conditions, the two molecules are deprotonated, and their excited ππ* states are found to relax to the ground states in a few tens of picoseconds via a barrierless trans-cis photoisomerization. After the cis-photoproduct is formed, the efficacy of sinapic acid is greatly reduced. In contrast, the efficacy of sinapoyl malate is affected only slightly because the cis-product still absorbs UV light strongly. In addition, protonated sinapic acid is found to be a good potential sunscreen molecule. |
Inheritance patterns of phenolics in F1, F2, and back-cross hybrids of willows: implications for herbivore responses to hybrid plants.
The aim of this study was to determine the inheritance pattern of phenolic secondary compounds in pure and hybrid willows and its consequences for plant resistance to leaf-feeding insects. F1, F2, and back-cross hybrids along with pure species were produced by hand pollination of pure, naturally-growing Salix caprea (L., Salicaceae) and S. repens (L.) plants. Leaf concentrations of condensed tannins and seven different phenolic glucosides were determined by using butanol-HCI and HPLC analyses. Insect herbivore leaf damage was measured on the same leaves as used for chemical analyses. We found hybrids to be approximately intermediate between the parental species: S. caprea with high levels of condensed tannins and no phenolic glucosides. and S. repens with low levels of condensed tannins and high levels of phenolic glucosides. We also found a negative correlation between concentrations of condensed tannins and phenolic glucosides, suggesting a trade-off in production of these two substances. F2 hybrids and the hybrid back-crossed to S. caprea were significantly more damaged by insect herbivores than the parental species and the F1 hybrid, indicating reduced resistance and possibly a selective disadvantage for these hybrid categories. |
Dana
I’ve watched several videos and I just wanted to share my personal opinion. I have similar coloring as you. I think that you may be a Bright Spring instead of a Winter. Bright Spring looks much more cool than the rest of the spring family. The colors are bright and look cooler with just a touch of warmth. Although you can wear black, I feel that charcoal would more flattering than black. I also think that a watermelon red shade of lipstick would be more in harmony with your skin. MAC lustering or speak louder are both great for Bright Springs. I understand if you completely disagree, however, you could swatch these colors just for fun and see what you think. |
Q:
What is the meaning of "casket grey" in this sentence?
I read a sentence in a chapter named "Discovering Tut: the saga continues":
Dark bellied clouds had scudded across the desert sky all day and now
were veiling the stars in casket grey.
Casket means a chest or any rectangular box.
But I'm not able to figure out the context in which it has been used.
A:
Compare the expressions "sky blue", "lily white", "blood red".
A colour that follows a noun, particularly a noun that indicates a material (or at least visible) object, indicates that it is the colour of that object.
|
Do your customers get frustrated by waiting in long lines? Are you overwhelmed by complaints as a result of long lines? Want to increase your revenue while increasing customer satisfaction? Unfortunately congestion, long queues and long waiting times have become part of our lives but now with Queue Mobile customers are free from standing in line. Queue Mobile’s innovative technology combines the power and affordability of the internet and speed of SMS Queuing System messaging to create a virtual waiting line. |
[Uretero-acetabular fistula: report of a case].
We present a case report of uretero-acetabular fistula in a female complicating orthopaedic surgery of congenital coxal difformity. An ileal pedicle graft was used to replace the terminal ureter. The difficulty of such complication is to choose the best the rapeutic strategy between surgical and non surgical techniques. We review here the various urological armamentarium to affront such a rare and multifactorial complication. |
package autotest.afe;
class SiteClassFactory extends ClassFactory {
}
|
The convergence of advancements in television and digital technology has resulted in an increase in the popularity and functionality of digital television (“DTVs”). Increased functionality has provided for audio and video presentation that may be superior to that for analog television as well as increased support services such as picture in picture, voice over internet protocol (“VoIP”), speaker phone, caller identification, video phone applications and the like. However, such increases in functionality have resulted in an increase in complexity that may exacerbate monitoring, troubleshooting and/or controlling the DTV with ease.
Further, in conventional DTV systems and methods of operating DTV systems, troubleshooting is typically performed only after a deviation and corresponding failure event have occurred. However, after such occurrences, consumers may be saddled with significant repair and/or replacement costs. Conventional DTV systems and methods disadvantageously fail to provide preventative maintenance to reduce the likelihood of deviations and failure events.
Further, conventional DTV systems and methods typically provide only information about the general area in which a DTV may need troubleshooting, calibration and/or configuration. However, due to the complexity of the DTV, providing information about only a general area in which the DTV may need service may be inadequate and may lead to unnecessarily high troubleshooting costs. Finally, conventional systems and methods provide no mechanisms for automated, internal monitoring, troubleshooting and/or controlling the DTV. |
using System;
using System.Collections.ObjectModel;
using System.ComponentModel;
using System.IO;
using System.Linq;
using System.Runtime.CompilerServices;
using System.Text.RegularExpressions;
using System.Xml.Linq;
using JetBrains.Annotations;
namespace Malware.MDKServices
{
/// <summary>
/// Provides information about a given project and its script.
/// </summary>
public partial class MDKProjectProperties : INotifyPropertyChanged
{
/// <summary>
/// Loads script information from the given project file.
/// </summary>
/// <param name="projectFileName">The file name of this project</param>
/// <param name="projectName">The display name of this project</param>
/// <param name="echo">Debug message handler.</param>
/// <returns></returns>
public static MDKProjectProperties Load([NotNull] string projectFileName, string projectName = null, Action<string> echo = null)
{
if (string.IsNullOrEmpty(projectFileName))
throw new ArgumentException("Value cannot be null or empty.", nameof(projectFileName));
if (!File.Exists(projectFileName) || Regex.IsMatch(projectFileName, @"\w+://"))
{
echo?.Invoke($"{projectFileName} does not exist, or it's a network file (not supported)");
return new MDKProjectProperties(projectFileName, null, null, null);
}
var fileName = Path.GetFullPath(projectFileName);
var name = projectName ?? Path.GetFileNameWithoutExtension(projectFileName);
var legacyOptionsFileName = Path.GetFullPath(Path.Combine(Path.GetDirectoryName(fileName) ?? ".", @"mdk\mdk.options"));
var mdkOptionsFileName = Path.GetFullPath(Path.Combine(Path.GetDirectoryName(fileName) ?? ".", @"mdk\mdk.options.props"));
var mdkPathsFileName = Path.GetFullPath(Path.Combine(Path.GetDirectoryName(fileName) ?? ".", @"mdk\mdk.paths.props"));
MDKProjectOptions options = null;
MDKProjectPaths paths = null;
if (File.Exists(mdkOptionsFileName)/* && File.Exists(mdkPathsFileName)*/)
{
options = MDKProjectOptions.Load(mdkOptionsFileName);
paths = MDKProjectPaths.Load(mdkPathsFileName);
echo?.Invoke($"{projectName ?? projectFileName} is a valid MDK project.");
return new MDKProjectProperties(projectFileName, name, options, paths);
}
if (File.Exists(legacyOptionsFileName))
{
echo?.Invoke($"{projectName ?? projectFileName} is a legacy MDK project.");
ImportLegacy_1_1(projectFileName, ref options, mdkOptionsFileName, ref paths, mdkPathsFileName);
if (options != null && paths != null)
return new MDKProjectProperties(projectFileName, name, options, paths);
}
echo?.Invoke($"{projectName ?? projectFileName} not an MDK project.");
return new MDKProjectProperties(projectFileName, null, null, null);
}
static partial void ImportLegacy_1_1(string legacyOptionsFileName, ref MDKProjectOptions options, string optionsFileName, ref MDKProjectPaths paths, string pathsFileName);
bool _hasChanges;
MDKProjectProperties(string fileName, string name, MDKProjectOptions options, MDKProjectPaths paths)
{
FileName = fileName;
Name = name;
Options = options;
if (Options != null)
Options.PropertyChanged += OnOptionsPropertyChanged;
Paths = paths;
if (Paths != null)
Paths.PropertyChanged += OnPathsPropertyChanged;
}
/// <inheritdoc />
public event PropertyChangedEventHandler PropertyChanged;
/// <summary>
/// The project paths
/// </summary>
public MDKProjectPaths Paths { get; }
/// <summary>
/// The project options
/// </summary>
public MDKProjectOptions Options { get; }
/// <summary>
/// Gets the name of the project
/// </summary>
public string Name { get; }
/// <summary>
/// Determines whether changes have been made to the options for this project
/// </summary>
public bool HasChanges
{
get => CheckForChanges();
private set
{
if (value == _hasChanges)
return;
_hasChanges = value;
OnPropertyChanged();
}
}
/// <summary>
/// Determines whether this is a valid MDK project
/// </summary>
public bool IsValid => Options?.IsValid ?? false;
/// <summary>
/// Gets the project file name
/// </summary>
public string FileName { get; }
void OnPathsPropertyChanged(object sender, PropertyChangedEventArgs e)
{
HasChanges = CheckForChanges();
}
void OnOptionsPropertyChanged(object sender, PropertyChangedEventArgs e)
{
HasChanges = CheckForChanges();
}
bool CheckForChanges() => Options.HasChanges || Paths.HasChanges;
/// <summary>
/// Commits all changes without saving. <see cref="HasChanges"/> will be false after this. This method is not required when calling <see cref="Save"/>.
/// </summary>
public void Commit()
{
Options.Commit();
Paths.Commit();
HasChanges = CheckForChanges();
}
/// <summary>
/// Saves the options of this project
/// </summary>
/// <remarks>Warning: If the originating project is not saved first, these changes might be overwritten.</remarks>
public void Save()
{
Options.Save();
Paths.Save();
}
/// <summary>
/// Called whenever a trackable property changes
/// </summary>
/// <param name="propertyName"></param>
[NotifyPropertyChangedInvocator]
protected virtual void OnPropertyChanged([CallerMemberName] string propertyName = null)
{
PropertyChanged?.Invoke(this, new PropertyChangedEventArgs(propertyName));
}
/// <inheritdoc />
public override string ToString()
{
return Name;
}
/// <summary>
/// Determines whether the given file path is within one of the ignored folders or files.
/// </summary>
/// <param name="filePath"></param>
/// <returns></returns>
public bool IsIgnoredFilePath(string filePath) => Options.IsIgnoredFilePath(filePath);
/// <summary>
/// Provides information about a given project and its script.
/// </summary>
// ReSharper disable once InconsistentNaming because this is an exception to the rule.
internal sealed class LegacyProjectScriptInfo_1_1
{
/// <summary>
/// Loads script information from the given project file.
/// </summary>
/// <param name="projectFileName">The file name of this project</param>
/// <returns></returns>
public static LegacyProjectScriptInfo_1_1 Load([NotNull] string projectFileName)
{
if (string.IsNullOrEmpty(projectFileName))
throw new ArgumentException("Value cannot be null or empty.", nameof(projectFileName));
var fileName = Path.GetFullPath(projectFileName);
if (!File.Exists(fileName))
return new LegacyProjectScriptInfo_1_1(fileName, false, null, null);
var mdkOptionsFileName = Path.GetFullPath(Path.Combine(Path.GetDirectoryName(fileName) ?? ".", @"mdk\mdk.options"));
if (!File.Exists(mdkOptionsFileName))
return new LegacyProjectScriptInfo_1_1(fileName, false, null, null);
try
{
var document = XDocument.Load(mdkOptionsFileName);
var root = document.Element("mdk");
// Check if this is a template options file
if ((string)root?.Attribute("version") == "$mdkversion$")
return new LegacyProjectScriptInfo_1_1(fileName, false, null, null);
var version = Version.Parse((string)root?.Attribute("version"));
var useManualGameBinPath = ((string)root?.Element("gamebinpath")?.Attribute("enabled") ?? "no").Trim().Equals("yes", StringComparison.CurrentCultureIgnoreCase);
var gameBinPath = (string)root?.Element("gamebinpath");
var installPath = (string)root?.Element("installpath");
var outputPath = (string)root?.Element("outputpath");
var minify = ((string)root?.Element("minify") ?? "no").Trim().Equals("yes", StringComparison.CurrentCultureIgnoreCase);
var trimTypes = ((string)root?.Element("trimtypes") ?? "no").Trim().Equals("yes", StringComparison.CurrentCultureIgnoreCase);
string[] ignoredFolders = null;
string[] ignoredFiles = null;
var ignoreElement = root?.Element("ignore");
if (ignoreElement != null)
{
ignoredFolders = ignoreElement.Elements("folder").Select(e => (string)e).ToArray();
ignoredFiles = ignoreElement.Elements("file").Select(e => (string)e).ToArray();
}
var result = new LegacyProjectScriptInfo_1_1(fileName, true, ignoredFolders, ignoredFiles)
{
Version = version,
UseManualGameBinPath = useManualGameBinPath,
GameBinPath = gameBinPath,
InstallPath = installPath,
OutputPath = outputPath,
Minify = minify,
TrimTypes = trimTypes
};
return result;
}
catch (Exception e)
{
throw new MDKProjectPropertiesException($"An error occurred while attempting to load project information from {fileName}.", e);
}
}
string _gameBinPath;
string _installPath;
string _outputPath;
LegacyProjectScriptInfo_1_1(string fileName, bool isValid, string[] ignoredFolders, string[] ignoredFiles)
{
FileName = fileName;
IsValid = isValid;
if (ignoredFolders != null)
IgnoredFolders = new ReadOnlyCollection<string>(ignoredFolders);
if (ignoredFiles != null)
IgnoredFiles = new ReadOnlyCollection<string>(ignoredFiles);
}
/// <summary>
/// Returns the options version
/// </summary>
public Version Version { get; private set; }
/// <summary>
/// Determines whether this is a valid MDK project
/// </summary>
public bool IsValid { get; }
/// <summary>
/// Gets the project file name
/// </summary>
public string FileName { get; }
/// <summary>
/// Determines whether <see cref="GameBinPath"/> should be used, or the default value
/// </summary>
public bool UseManualGameBinPath { get; private set; }
/// <summary>
/// Determines the path to the game's installed binaries.
/// </summary>
public string GameBinPath
{
get => _gameBinPath;
private set => _gameBinPath = value ?? "";
}
/// <summary>
/// Determines the installation path for the extension.
/// </summary>
public string InstallPath
{
get => _installPath;
private set => _installPath = value ?? "";
}
/// <summary>
/// Determines the output path where the finished deployed script will be stored
/// </summary>
public string OutputPath
{
get => _outputPath;
private set => _outputPath = value ?? "";
}
/// <summary>
/// Determines whether the script generated from this project should be run through the type trimmer which removes unused types
/// </summary>
public bool TrimTypes { get; private set; }
/// <summary>
/// Determines whether the script generated from this project should be run through the minifier
/// </summary>
public bool Minify { get; private set; }
/// <summary>
/// A list of folders which code will not be included in neither analysis nor deployment
/// </summary>
public ReadOnlyCollection<string> IgnoredFolders { get; }
/// <summary>
/// A list of files which code will not be included in neither analysis nor deployment
/// </summary>
public ReadOnlyCollection<string> IgnoredFiles { get; }
}
}
}
|
Q:
Test Driven Development: A good/accepted way to test file system operations?
I am working on a project at the moment that generates a table (among other things) based on the contents of a file-system, and in turn does some meta-data modifications on the things it finds. The question is: how should tests be written around this, or set up? Is there an easy way to mock this out? Or should I setup a "sandbox"?
A:
As you do always in TDD with external resources: you create one or more interfaces to your filesystem operations and "mock them out". You want to test your "table generator" and your meta-data modification code, not the file system operations itself (most probably you are using ready-made library implementations for accessing the file system).
A:
Whats wrong with having a "test" file system?
Create a template folder/directory structure which has enough content to test you operations.
During setup of your unit test copy this initial structure (would recommend you ZIP up the template and unzip into your test area).
Run your tests.
Delete the whole thing during tear down.
The problem with mocking is firstly file systems, OSes and databases which belong to your project do not really qualify as external resources and secondly mocking low level system calls is both time consuming and error prone.
A:
This is the kind of thing you definitely need to integration test, as real-world file systems have all kind of strange behavior (like the way Windows won't allow deleting a file if any process, including the deleter, has it open).
So the TDD approach is to write the integration test first (TDD, strictly speaking, doesn't have distinct concepts of 'unit test' and 'integration test'; they are just tests). Quite likely that will be enough; so job done, stop, go home.
If not, there will be some internal complexity that isn't easy to adequately test by arranging files. In which case, you simply take that complexity out, put it in a class, and write unit tests for that class. Quite likely you will find that that common class is usable in the database, xml file, etc. cases too.
In no case would you take the fundamental core of the code you are writing and 'mock' it out in order to write tests that will pass whether or not the unit under test is wrong.
|
Contents
Nature
Physiology & Life cycle
The Doxy is covered in coarse black hair, and has an additional set of arms and legs. Doxys have shiny beetle-like wings, and a double row of sharp venomous teeth. If bitten, a wizard or witch should take an antidote immediately. Doxys bury their eggs underground, and can lay up to five hundred at once. The eggs generally hatch in two to three weeks.
Distribution
Interaction with humans
Doxys are considered pests. They can infest houses, taking up residence in the draperies. Removing them requires a good supply of Doxycide. Cormac McLaggen was also known for eating a pound of Doxy eggs for a bet, making him unable to try out for the Gryffindor Quidditch Team in his 6th year. |
We're an independent, student-run newsroom.
The Daily Californian covers the city of Berkeley and the campus in unparalleled detail, all while training the future of the journalism industry.
Consider making a donation to support the coverage that shapes the face of Berkeley.
The outsider perspective: the second in a series of conversations with first-generation students on campus
Alicia Gutierrez grew up in San Jose, the daughter of Mexican immigrants. Her mother left school after the third grade, her father after sixth.The Daily Californian spoke to her about her experiences as a first-generation student and an immigrant on campus. This is the second in a series of photo essays on the immigrant experience at UC Berkeley.
The Daily Californian: As a first-generation immigrant, do you feel that you’ve experienced an identity crisis?
Alicia Gutierrez: I did a whole bunch of programs in high schools, helping bridge the gap for minorities. Though they’re trying to empower you, you’re constantly reminded that you’re one of a few, defeating the statistics. Hearing it so often, you start to believe it’s harder for you. Coming here, it’s in your psyche that other people think of you this way. In reality, maybe they don’t even think about that — but to you, it’s ingrained.
It changes how you see everyone else — like, my allies are the people that are like me and everyone else thinks lower of me because (they’re) hearing these statistics. There’s a culture change.
DC: Do you find yourself accepted at UC Berkeley?
Gutierrez: I feel accepted, but I think it required getting over that psyche, thinking that I’m not worthy of being here or something, that I’m not up to the Berkeley standard because I’m first generation. Getting over that personally and being able to accept others’ help and seeing what other opportunities there are for me helped me realize that I’m on the same level, even though it might take me a little longer to understand the system.
DC: Which culture do you feel more connected to, American or Mexican?
Gutierrez: Now I feel more connected to American culture but as a kid I would feel more connected to Mexican culture. A lot of the divide for me is from going into higher education and (then) going back to the community. People see you on a different level. I remember having a conversation with my grandma one time. I was telling her about something annoying in Mexican politics. And she was like, “That’s not your job to fix, you’re not Mexican.” … It’s little things. My international friend couldn’t believe that I didn’t know what an Arnold Palmer was. But at home, all I ate was Mexican food. That’s what my mom makes.
DC: Has being in this third space affected your identity?
Gutierrez: Not growing up, because the neighborhood I was from was mostly Mexican. … We would go to Mexico every summer. I thought I was sufficiently Mexican, I guess. As I was growing up, it’s been harder, because I’ve been distancing myself more from them to focus on school. My parents couldn’t help me after elementary school. They couldn’t help me with my schoolwork, so I had to learn from others. After graduation I spoke less Spanish. … Coming to university and not having someone to speak Spanish with constantly has caused a language barrier with my parents. I feel like I don’t belong in either world. I’m just kind of in the middle. |
Q:
Convert UTC to browser local time and vice versa dynamically using angularjs(new to angular)
Just wanted a code how a UTC time converted to browser local time and vice versa dynamically without using moment.js needed only pure angular
Tried with Using AngularJS date filter with UTC date but i want dynamic conversion
A:
Here is how you can change the date to local and UTC.
var d = new Date();
document.getElementById("date").innerHTML = d;
document.getElementById("local").innerHTML = d.toLocaleTimeString();
document.getElementById("utc").innerHTML = d.toUTCString();
document.getElementById("fromutc").innerHTML = Date(d.toUTCString());
Date => <span id="date"></span><br>
Local => <span id="local"></span><br>
UTC => <span id="utc"></span><br>
FromUTC => <span id="fromutc"></span><br>
Also find here the reference of all the dateTime functions available in javascript
JavaScript Date Reference
ECMA Date Reference
MDN Date Reference
|
Report: Budenholzer the Favorite in Atlanta
A short blurb at ESPN Insider in a larger overview of the NBA's coaching vacancies identifies Spurs assistant coach as the favorite to replace Larry Drew in Atlanta.
From Chris Broussard ($):
Many league insiders believe Spurs longtime assistant Mike Budenholzer will be Danny Ferry's choice in Atlanta. |
Today we discuss adding semantic metadata to your HTML via Microformats and Microdata.
Discussion Points
What is semantic metadata?
What standards are there?
How could it be used?
How is it actually used?
Why don’t we use it more?
Should I use it on my web pages/apps?
Subscribe!
If you’re not already a subscriber, make sure to add Design vs Dev to your podcast client. You can easily subscribe in either iTunes or Stitcher Radio.
Resources
Follow Up |
@model Heavy.Web.ViewModels.UserRoleViewModel
@{
ViewBag.Title = "添加用户到角色";
}
<h2>@ViewBag.Title</h2>
<form asp-action="AddUserToRole" method="post">
<input type="hidden" name="roleId" value="@Model.RoleId" />
<select class="form-control" style="width: 300px; display: inline;" asp-for="UserId" asp-items="@(new SelectList(Model.Users, "Id", "UserName"))">
<option> -- 请选择一个用户 -- </option>
</select>
<button class="btn btn-primary" type="submit">添加</button>
<a class="btn btn-secondary" asp-action="EditRole" asp-route-id="@Model.RoleId">返回</a>
</form>
|
Djurgården-anfallaren Jowra Movsisian gjorde i helgen debut för sin nya klubb i Stockholmsderbyt mot AIK på Friends Arena. Han hann dock inte vara länge på planen före han fick lämna gräsmattan igen. Anfallaren satte, efter en duell i straffområdet, pannan mot AIK-backen Daniel Sundgrens panna och blev tilldelad rött kort.
I dag meddelade SvFF:s disciplinnämnd att han får ytterligare en matchs avstängning utöver den obligatoriska matchen, som en spelare blir avstängd i vid rött kort.
- Det är det som är beslutet, och bakgrunden är det högst olämpliga uppträdandet som han visade genom att föra fram pannan mot Sundgren, säger Göran Nilsson, vice ordförande i disciplinnämnden.
- Om vi hade bedömt det som en riktig skallning, så hade han kanske inte spelat innan VM-uppehållet, så vi tog hänsyn till att det blir ett ministraff, så är det. Det är en lindrig bedrömning, fortsätter han.
Sundgren berättade efter matchen för Fotbollskanalen att han förstärkte situationen efter att Movsisian förde fram pannan mot honom. Han kommer inte att straffas för det.
- Det finns ingen anmälan mot honom, inte från någon. Det hade var fritt fram för någon att anmäla det, men det har inget gjort. Vi har därmed inte diskuterat det och därmed är ärendet avklarat. Det finns ingen anledning att fundera i dem termerna, säger Nilsson.
Se situationen i spelaren ovan. |
Rodriguez made a shockingly large amount of money at UA, enough that I can't rule out the possibility that his employers are grasping desperately at a pretext. Rodriguez and his lawyers will file a lawsuit if there's any possibility that my first sentence is on the money.
If his firing is Justified, this is still a disaster for UA. With the early Signing Day, this is the exact wrong year to be in this position. It could take them years to dig out of this hole. When Rodriguez and Graham took the jobs in that state in the same offseason I wondered which would succeed because both could not succeed. With the timing of Rodriguez firing and with the shall I say surprising hire of Herm Edwards at Arizona State you can definitely say that both programs reaped terrible results from promising starts.
_________________You want experience running the entire show? You got it. You want someone young and energetic? You got it. You wanted someone with absolutely no ties to Cowen/Dickson? You got it. - TU23
Update: Rodriguez is being offered his full buyout. The university press release just about said that the original claims claims made against him were not substantiated. It appears that there could be a second aggrieved party.
What's interesting here is that Rodriguez was due a lot of money from UA just a few months from now.
_________________You want experience running the entire show? You got it. You want someone young and energetic? You got it. You wanted someone with absolutely no ties to Cowen/Dickson? You got it. - TU23
. With the early Signing Day, this is the exact wrong year to be in this position. It could take them years to dig out of this hole.
aren't most of the kids signed already? is the thought that the NCAA would let them out of the letters and so they would have an empty class? or just that a new coach would come in with no ability to recruit a class because it's basically full? |
People for the Ethical Treatment of Animals (PETA) blasted Sunday’s so-called “horse porn” episode of HBO tech comedy Silicon Valley, calling the practice of horse breeding “arranged rape.”
The third season episode of the popular HBO show, from co-creator Mike Judge, went viral online after characters Richard Hendricks (Thomas Middleditch) and Jack Barker (Stephen Tobolowsky) were distracted during a conversation about their startup company by two horses having graphic sex.
While the so-called “horse porn” scene garnered plenty of laughs and buzz online, PETA was apparently not amused.
In a statement to the Wrap, the radical animal advocacy group said the process of horse breeding “may seem fun,” but in reality, horses are forced to mate against their will in what a spokeswoman for the group called “assembly line breeding for profit.”
“And it’s not as if they are making families — the foals of top Thoroughbreds will often be separated from their mothers very early on and raised by nurse mares and the stallions who are treated as if they are nothing more than money-making genetic pools for the racing industry,”PETA Senior Vice President Lisa Lange said.
“There’s an overpopulation crisis in racing as most horses will not win races, and many are therefore discarded and sent on hideous journeys by truck in all weather to Mexico or Canada to be turned into meat,” Lange added. “This kind of arranged rape is what has been happening since February with last year’s Triple Crown winner American Pharaoh’s first stud season,”Lange added.
Speaking to The Hollywood Reporter about the episode this week, Mike Judge (King of the Hill, Beavis and Butthead) said the so-called “horse porn” scene was inspired by YouTube videos of horse racing.
“That’s where we saw these videos of them having sex and it was just making us laugh. That’s how it started,” Judge said.
Judge told THR that the production found a number of suitable horse stables to shoot the scene, and added the horses required “no coaxing.”
“We had lined up some other opportunities in case that other one didn’t work. But after the first one, we were good,” he laughed. “We just set up those cameras and they went at it.”
Judge also said that representatives from the American Humane Society were present on set and that no animals were harmed while filming the scene.
Watch the scene below [Warning: Graphic Content]:
|
Immunodiffusion: detection of a murine leukemia virus (Rauscher).
Homologous and heterologous antiserums from several species of animals have been prepared against the Rauscher murine leukemia virus. The Ouchterlony technique, adapted to very small quantities, has been used to demonstrate at least two or three antigens in Rauscher virus preparations. Both infected-host materials and tissue-culture fluids were used as antigens. When monkey antiserum was used, one of the Rauscher virus antigens cross-reacted with an antigen in the virus strains isolated by Friend and Moloney, but there was apparently no reaction with the Moloney virus when guinea-pig antiserum was used. |
Q:
How to write content of two files to another file using python
I have a two files with the following contents:
users.txt
Administrator
test_user1
test_user2
test_user3
policies.txt
[a]
[b]
[c]
[d]
I need to copy the contents of these two files to a third one in xls format alternately, like the following:
output.xls
Administrator
[a]
test_user1
[b]
test_user2
[c]
test_user3
[d]
I code this way
with open("output.xls", "w") as f3:
with open("users.txt", "r") as f1:
with open("policies.txt", "r") as f2:
for linea1 in f1:
for linea2 in f2:
f3.write(linea1)
f3.write(linea2)
But the output.xls file comes out this way:
Administrator
[a]
Administrator
[b]
Administrator
[c]
Administrator
[d]
How can I solve?
A:
This sounds like you need zip:
with open("output.xls", "w") as f3:
with open("users.txt", "r") as f1:
with open("policies.txt", "r") as f2:
for linea1,linea2 in zip(f1,f2):
f3.write(linea1)
f3.write(linea2)
You definitely need to write two lines together. One from the first file, one from the second.
|
Ronnie Lee Smith wants to be sheriff of Gallatin County, Kentucky. Which is not that unusual, until you realize that Smith is better known as pot comedian and social media personality Roland A. Duby.
“All activist potheads should run for sheriff like I am,” Smith said Friday.
“I remember having my marijuana taken and thrown in the creek by a friendly policeman who shall remain nameless,” Smith said. “I wasn’t arrested and turned into a criminal for it.”
According to Smith, the laws against marijuana violate the constitutions of the United States and of Kentucky “on numerous levels.”
“These laws have no business being enforced,” Smith said. “If I am elected sheriff of Gallatin County, I will protect the farmers’ rights to grow as much marijuana as they want!”
According to Smith — a libertarian who pledges to stop all bank foreclosures in the county — if he is elected the Sheriff’s Department will accept marijuana as payment of property taxes.
“The value wil be set after I am elected, but the way I see it, we should have marijuana available to the general public,” Smith said. “The Commonwealth of Kentucky already sells marijuana tax stamps. And there is nothing stopping Gallatin County from issuing their own tax stamps!”
“People will come from around the country to sample Gallatin County’s finest marijuana tops,” Smith said. |
Q:
Android Parceling an object with JSONArray member
I'm developing an Android app and I'm in a situation where I need to start a new activity by passing in an object of a Class that I created into a bundle so it can be used in the new activity.
I've researched on how to do this and it seems like for objects the best way is to make them Parcelable. However, the problem is that one of the fields for that object's class is a JSONArray type and it doesn't seem like JSONArray is supported? Or maybe I just haven't looked hard enough or I missed something, but I've been searching for hours and i still couldn't find anything.
To be more specific, I need to parcel the fields of my object with a
writeX();
where the X can such things as ints, strings etc. However, like I just said, one of my fields is a JSONArray type for a specific reason (I do not wish to change this in anyway) and it seems like Parcel doesn't support this?
Thanks
A:
thanks for the reply, but unfortunately this JSONArray contains way too much varying info for this to work (it has integers strings, JSONObjects and even JSONArrays -_-). I have however found a way, and this is to convert the entire JSONArray to a string by using the toString method. This makes it possible to put it into a Bundle. I don't really like doing it this way... but I don't have much time to be thinking on this for too long :P. Thanks anyway
|
{
"language_id": "node",
"path": ".",
"scripts": [
"relative.js"
]
}
|
Residents on the Greek island of Agathonisi say they need help to deal with the large number of refugees arriving there on a daily basis.
It has become one of the main destinations for migrants trying to enter Europe but it is a small island and the influx of people is creating friction with locals.
As new refugees try to register at the police station, they are instructed to pick up litter - or face prison.
Chris Buckler reports. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.