text
stringlengths
16
69.9k
Dutch TV-Show Hosts Appear to Dine on Each Other’s Flesh Comstock/Thinkstock(AMSTERDAM) — Two Dutch television-show hosts said they had their flesh cooked by a top chef and then dined on each other before a studio audience. “Nothing is really that special when you’re talking about the taste of the meat,” host Dennis Storm told ABC News. “But it is weird to look into the eyes of a friend when you are chewing on his belly.” Part of Storm’s left butt cheek was carved out by a surgeon, while his co-host, Valerio Zeno, opted to have a piece of his abdomen removed, they say. “We went to the butcher, the surgeon and the studio, then we looked at each other and just ate it,” Storm said. “The special thing is, it was his flesh, of course.” There were no fava beans and chianti. Not even spices, just human flesh cooked medium rare. “The chef cooked it in a frying pan with sunflower oil,” Storm said. “We didn’t add any salt or pepper because we wanted to know what it tasted like.” They host a new show on BNN in the Netherlands called “Proefkonijnen” or, as its title translates, “Test Rabbits.” “The punchline of the show is to get really simple answers on stupid questions, such as, ‘Can you shave with ketchup’ or ‘can you drive blind?’” Storm said. “And we wanted to find out how human flesh tasted.” The cannibalistic episode airs Wednesday in the Netherlands. Storm said the stunt, which has garnered a lot of media attention in Holland, was completely worth the pain in his behind. “It was just a few centimeters of meat,” he said. “And now I have a good story about that scar.”
The overall objective of this research project is to continue to make as complete as possible a phytochemical study of the genus Thalictrum with emphasis on the hypotensive alkaloids. The mode of action of the more hypotensive alkaloids will be studied. The structure of the active hypotensive alkaloids will be compared with the inactive alkaloids with the anticipation that valid information can be obtained that will lead to improved hypotensive agents. In addition, the isolated alkaloids and glycosides will be tested for antimicrobial and antitumor activity since some have already been demonstrated to have therapeutic potential.
Q: Read static files using Karma Is is possible to read static JSON files in a Karma test? I would like to store the testdata in separate files. I tried reading the files using require, but I didn't get that working. A: Try to use the requirejs's text plugin. It works perfectly well for this: https://github.com/requirejs/text
The synopsis of Yoshio Aramaki's The Sacred Era set my hopes high, leading me to choose it from the long list of books PopMatters made available for review. Yet in a most disappointing turn of events, the basic details of the narrative of The Sacred Era far outshine its actual execution. As science fiction grounded in a fictionalized Christian philosophy, with world-building that combined futuristic technology with archaic societal organization, The Sacred Era had the potential to be far more enchanting and thrilling than it ever was at any point. The basic plot outline is as follows: the protagonist, known only as "K," is chosen to leave his rural village to take a specialized service exam in the capital city of the post-apocalyptic Christian-ish empire of Igitur. Once he passes the extremely difficult logic- and theology-based exam, he is introduced to a world of privileged knowledge not only about his civilization's own religious philosophy, but about how this philosophy intersects with metaphysical and scientific concepts of space (and time) travel. Once he has joined this privileged elite, he is assigned to conduct research on a mysterious planet known only as "Bosch," and along the way learns the truth of his society's religious beginnings and scientific capabilities. It's quite a mouthful, and not exactly easy to distill in only a few sentences, but nonetheless the concept was extremely interesting to me, as someone who enjoys books like David Mitchell's Cloud Atlas and The Bone Clocks (and Haruki Murakami's 1Q84 to a lesser extent). Namely, I find myself gravitating towards stories that combine fantasy, science fiction, and more recognizable elements of life into one grand, tied-together conclusion about our world (or a world much like our own). The Sacred Era promised a twist on this kind of narrative, albeit with an additional emphasis on Bible-esque themes of holiness and heresy. It is my regret to have to admit, then, that The Sacred Era is not a pleasure to read, and the longer it goes on, the less enjoyable the entire endeavor is. The first third, roughly, is fascinating in how it combines the world-building of this half-newfangled setting with K's initiation into the cultural and spiritual societal elite. There were sections of text that were literally just descriptions of the theological systems of Igitur. But even these extended discussions, while not exactly easy to parse through, were integral to the way K's life and society function, so they held some interest. And the first half of The Sacred Era genuinely does build suspense and trepidation as K learns that all the previous Planet Bosch researchers died mysteriously, and also has to tangle with the ghost of Darko Dachilko, Igitur's apocryphal heretic, who may or may not be looking out for him...
Pectus carinatum. Pectus carinatum has been termed the undertreated chest wall deformity. Recent advances in patient evaluation and management, including the development of nonoperative bracing protocols, have improved the care of children with this condition. Recent evidence confirms that children with pectus carinatum have a disturbed body image and a reduced quality of life. Treatment has been shown to improve the psychosocial outcome of these patients. Patients with pectus carinatum are at risk for a disturbed body image and reduced quality of life. Until recently, treatment required surgical reconstruction. A growing body of literature, however, now supports the use of orthotic bracing as a nonoperative alternative in select patients. This article reviews the current literature and describes the evaluation and management of children with pectus carinatum deformity.
The only college in Puerto Rico that is exclusively dedicated to providing training for the automotive industry, Automeca Technical College in Aguadilla, Puerto Rico offers programs and Continuing Education courses to future and practicing mechanics. Automeca also has Continuing Education courses, which are designed both for those who are already working in the field and those who would like to find out about it through introductory courses. Since the training is hands-on, the technologies current and the instruction of professional quality, many who have attended Automeca have gone on to successful careers with prestigious automotive companies. If you’re interested in gaining admission to Automeca, you will need to fill out an application and meet with a school representative. Counselors will also be able to help you apply for financial aid. Get Admissions Info This web site and associated pages are not associated with, endorsed by, or sponsored by Automeca Technical College, Aguadilla. CampusExplorer.com has no official or unofficial affiliation with Automeca Technical College, Aguadilla.
Q: How to move an element to its next sibling? I'm trying to grab an element and move it to its next sibling while at the same time adding attributes to that next sibling. How do I do that in jQuery? Specifically, I want to move the "span" inside the "a" tags below, and add an "data-toggle='tooltip'" and 'title="SOMETHING HERE"' attributes to that "a" tag. Thus this: <td> <span>Total partners</span> <a id="answer_view_2_list_row_7"></a> </td> would become this: <td> <a id='answer_view_2_list_row_7' data-toggle='tooltip' title='SOMETHING HERE'> <span>Total partners</span> </a> </td> Any help appreciated. I'm learning jQuery but this one is beyond me. A: $('td a').append(function () { return $(this).parent().find('span') }).data('toggle', 'tooltip').attr('title', 'SOMETHING HERE') jsFiddle example Note that you won't see the data attribute in the source as it's stored internally.
tdfpt_03.in tdfpt_03.out tdfpt_03.i tdfpt_03.o tdfpt_03.tmp ../../Psps_for_tests/ba_ps.abinit.paw ../../Psps_for_tests/Ti-LDA-uspp.paw ../../Psps_for_tests/8o.paw
Despite lockdown, at least one infected person is known to have left Wuhan
News Release USA is the first institution in the world to offer a top-tier endomicroscopy imaging system. Shown with the equipment is Dr. Jack DiPalma (second from left) and Dr. Reynaldo Rodriguez (second from right), along with spokesmen from NinePoint Medical, the creators of the NvisionVLE™ Imaging System. The University of South Alabama Digestive Health Center continues its role as a national leader in gastroenterology patient care with the recent addition of a top-tier, endomicroscopy imaging system. USA is the first institution in the world to offer the NvisionVLE™ Imaging System since it garnered approval from the Federal Drug Administration (FDA) in April. “This technology is similar to combining a microscope with an endoscope,” explained Dr. Jack Di Palma, director of the Digestive Health Center and professor of internal medicine at USA. “In previous imaging technology, the endoscopy probed only the surface-level tissues. This system now allows us to examine the tissue up to three millimeters deep, giving us the ability to diagnose without surgical biopsy.” According to USA Gastroenterologist Dr. Reynaldo Rodriguez, associate professor of internal medicine at USA, the largest clinical application of this new technology will be for patients with gastroesophageal reflux disease (GERD). This widely prevalent condition can potentially lead to Barrett’s Esophagus, which is a change in the tissue lining the esophagus. The high presence of Barrett’s is a predisposing factor for esophageal adenocarcinoma, a cancer with a high mortality rate that is rapidly rising in prevalence in the United States. Early detection is crucial in lowering the risk of progression from Barrett’s Esophagus to cancer. When Barrett’s Esophagus is found, the patient is often treated with radio frequency ablation (RFA) in which the affected tissues are burned and removed to lower the pre-malignant risk, according to Dr. Di Palma, who also practices with USA Physicians Group. However, Dr. Rodriguez notes that RFA-type procedures are not always effective in completely eliminating Barrett’s Esophagus. “Even with RFA, the patient may have ‘buried Barrett’s’ in the deeper tissues that previous technology would not have revealed,” explained Dr. Rodriguez. “This imaging system will allow us to successfully identify ‘buried Barrett’s’ without the need for a biopsy.” “We are pleased to partner with the University of South Alabama as they become the first institution in the country with a commercial system,” said Dr. Charles Carignan, president and CEO of NinePoint Medical, the creators of the NvisionVLE™ Imaging System.
Our chicken is raised over twice as long as pretty much all other chicken. This leads to stronger, healthier birds and fuller flavors. But it also can make cooking it more challenging if you don't know what to expect. Here, we take the time to explain a little more about the HOW and the WHY of cooking TC Farm Chicken.
Q: Open a web page and write in a text file I am trying to open a webpage and write the page in a text file. This is the code so far and its not working. Cam anyone give me a general idea about what I am doing wrong? import urllib opener = urllib.FancyURLopener({}) f = opener.open("http://www.python.org/") g = open("data2.txt", "w") g.write(str(f)) # str() converts to string g.close() All I gets when executing the code is text file data2.txt with below line only: <addinfourl at 43347592L whose fp = <socket._fileobject object at 0x000000000294C480>> A: import urllib opener = urllib.FancyURLopener({}) f = opener.open("http://www.python.org/") lines = f.read() # you missed this g = open("data2.txt", "w") g.write(str(lines)) # str() converts to string g.close()
Winter Wonderment Winter is coming… and in our books, that’s a good thing. Rejuvenate in the cold months when the delicious nip of cool air, cosy experiences and fewer people make travel an entirely different world. Imagine glancing through the frosted windows of the Palais d’Orsay in Paris; the red roofs of Prague covered in snow; having the boardwalks of Nice all to yourself. Throw in experiences you can’t have at any other time, like snow shoeing around Canada’s Lake Louise or rugging up on a horse-drawn sleigh ride in Scandinavia and you’ll be making stories to share for the rest of your life. Create your own stunning Globus Winter adventure.
A central patio divides the house into two parts and organizes the interior spaces: on the west side, an open horizontal space to the garden receives the dining room and the kitchen; on the east side, a vertical space, located at a lower level in relation to the public route to ensure domestic privacy, receives the living room.via
Full video of rebel group storming and recapturing the village of Khuwayn in southeast Idlib countryside.
North Korea talks fall flat on abduction issue Officials from Japan and North Korea failed to reach an agreement on whether to reinvestigate the abduction of Japanese nationals, following three days of “serious discussions” in Stockholm. However, the two sides plan to continue talks on that issue and others, a senior Japanese official suggested on Wednesday. Junichi Ihara, director general of the Asian and Oceanian Affairs Bureau at the Foreign Ministry, told reporters he raised the issue of the fate of Japanese nationals abducted by Pyongyang in the 1970s and 1980s, and that North Korea did not reject talks on the matter as it did during the previous session in late March in Beijing. Asked whether the two countries reached an agreement on reinvestigating the abduction cases, Ihara said only that the two sides planned to further talks. “We will continue consultations with North Korea (on the abduction issue), so I would like to refrain from referring to the substance of discussions like who said what,” Ihara said. “We had serious discussions this time, too. I should refrain from making further assessment from my side.” Observers were keen to learn how North Korea would respond to Japan’s demand, made during the last round of talks in Beijing, for a reinvestigation and for abductees to be returned to Japan. Pyongyang has said the abduction issue has already been settled. Ihara said Song Il Ho, North Korea’s ambassador for talks to normalize relations with Japan, expressed concern about the auction sale of a building housing the Tokyo headquarters of the pro-Pyongyang group Chongryon. The headquarters has functioned as the de facto North Korean embassy in the absence of diplomatic relations between the two countries. Ihara reiterated Tokyo’s position that the government cannot intervene in a judicial process in Japan under the principle of separation of powers. Failure to solicit support from the Japanese government on the continued use of the Chongryon headquarters may have hardened North Korea’s position on the abduction issue. The Tokyo High Court recently dismissed an appeal filed by Chongryon against the sale of the property to a Japanese real estate company, after the property was ordered sold to raise money to cover debts left by a failed credit union serving pro-Pyongyang Koreans residing in Japan. Chongryon has appealed the decision to the Supreme Court. Among other issues, Ihara called for North Korea’s restraint from conducting provocative acts in relation to its nuclear and missile development programs that would escalate tensions in East Asia. The two governments will discuss the timing and location of a next round of talks through their embassies in Beijing, according to a Japanese Foreign Ministry official. Why would North Korea make any definite refutations? It’s yet another carrot they’re cultivating and Japan is yet again falling for it, happily grabbing at it as though this had never happened before and the conclusion were not painfully obvious. Continuing dialogue like this is sick. As soon as North Korea sees that it can extract some kind of concession or rally its PR at home by reneging on whatever they’ve offered or started to agree to, that’s exactly what they will do, just like they always have. It’s painful to suggest abandoning such talks and halting the aid and other concessions that are keeping the North afloat, but unless that happens, Pyongyang will have no reason to actually DO anything other than make and break promises and continue the oppression of its people. That will likely result in some of these families not being reunited before some of them die of old age, but can that really be weighed against the suffering and subjugation of an entire nation? Scott Reynolds You don’t seriously believe that any of the Japanese abductees are still alive, do you? Even if any are still alive, it seems pretty likely that they either don’t want to return to Japan or that the N Koreans feel they can’t allow them to return, so its the same thing. That is to say, there is no point to asking for more “investigations.” Its not like they might just be living quietly in obscurity somewhere. The N Koreans already apologized back when Koizumi visited. There really is nothing more to expect from them on this issue now. Continuing to harp on about it is just a political ploy by Abe and his pals. phu You’re making quite a few unwarranted assumptions that I’m not willing to accept. Not only that, they are irrelevant to my point; alive or dead, the issue is being used — like everything else — as a ploy for propaganda and concessions by North Korea. If you’re OK with dismissing this as something that’s solved with an apology, that’s your call, but even as a very cynical person I find that point of view pretty grim. Scott Reynolds Okay. You object to the fact that NK is using the abduction issue “as a ploy for propaganda and concessions.” But that is what NK does with all issues. They have always behaved this way. What I object to is the way this issue is politicized by Abe and his fellow “conservatives” as a way to whip up nationalist sentiment. Expecting any progress on the abduction issue at this stage is a pipe dream, and in any case the relevant discussions should be conducted quietly behind closed doors where both sides can discuss things that cannot be aired publicly but nevertheless have to be addressed if there is to be any solution. I don’t approve of NKs actions or behavior, but I am not surprised by them either. It is Japan that I would expect more from.
Price search results for Grivel G14 Front Points x4 Tired of kicking ice with dull nubbins Give your Grivel G14 crampons some love with some new G14 Forged Front Points. The same reliable steel construction that came with the original design provides continuity and reliability, just what you need when tackling that frozen waterfall.
Q: How to return Ctrl+M from ncurses getch()? I am writing an application using ncurses and trying to get a CTRL-M keypress from the keyboard. Ncurses is returning CTRL-J (aka \n) whenever I press CTRL-M (aka \r), so I suspect somewhere it is doing a CRLF translation. My program is running in raw() mode so I don't think it should be doing any translation. Is this an ncurses problem or is it coming from somewhere upstrea, like the terminal driver? How can I get it to give me raw key presses without translation? FWIW I am using ncurses on Linux, running bash in xfce4-terminal. My TERM is xterm-256color. I've searched on Google and checked the ncurses docs but can't find anything on this issue. A: You need to call nonl(). Although it is documented in the outopts manual section, it affects input as well.
SRCS=GUIDialogPVRChannelManager.cpp \ GUIDialogPVRChannelsOSD.cpp \ GUIDialogPVRGroupManager.cpp \ GUIDialogPVRGuideInfo.cpp \ GUIDialogPVRGuideOSD.cpp \ GUIDialogPVRGuideSearch.cpp \ GUIDialogPVRRadioRDSInfo.cpp \ GUIDialogPVRRecordingInfo.cpp \ GUIDialogPVRTimerSettings.cpp LIB=pvrdialogs.a include ../../../Makefile.include -include $(patsubst %.cpp,%.P,$(patsubst %.c,%.P,$(SRCS)))
Learning barriers are bigger than a zip code Judy Wadsworth, Guest Essayist | Rochester Comparisons are often made between students attending Rochester schools with those attending affluent suburban schools. Some say that if Rochester schools functioned like Pittsford schools, for instance, learning results would improve. The reasons for the difference in results, however, are largely beyond the resources of the Rochester school district to solve by itself. In the Pittsford district, most families have cars – to get to work and to educational and social events. In the Rochester district, many families do not own cars or have access to public transportation. In the Pittsford district, most parents have steady jobs with salaries that support nutritious meals and secure, permanent lodging. In the Rochester district, many parents do not have steady jobs, or have several low-paying jobs that interfere with parenting and communicating with schools; and in many instances result in the inability to pay rent. In the Pittsford district, children live in safe neighborhoods. In the Rochester district, many children do not. In the Pittsford district, children attend neighborhood schools that serve as community hubs. In the Rochester district, many children are bused out of their neighborhoods so parents are forced to travel farther to participate in their children’s school events. If Pittsford students had to move several times a year because their families couldn’t pay the rent... If Pittsford parents had to work multiple jobs so they couldn’t attend school events ... If Pittsford parents couldn’t get to jobs or access needed social services because of a lack of transportation ... If Pittsford neighborhoods were crime-ridden and unsafe... Then Pittsford student learning results would likely be more like those of Rochester students. Research has shown that students thrive better when their families are able to provide them with a loving, safe, dependable, enriching environment. Rochester schools house many excellent educational programs, and RCSD professionals for the most part are doing their best to serve a population with crushing economic and social disadvantages. Real change in learning outcomes is unlikely until the economic and social issues that Rochester’s children endure are resolved.And while city schools more and more provide needed social and medical and safety services, offering these services means less resources to spend on libraries, arts, and sports. If the community really wants to help its RCSD students learn, it needs to focus its resources on ensuring that family adults can travel to jobs, that families have ready access to needed social and medical services, that affordable and accessible daycare is available, that families don’t have to face the maiming or murder of family members, and that families can live in safety free from chemical contamination. This lasting solution will take time and energy, dedicated resources, and a willingness of those in power to involve those without power in developing effective solutions. Judy Wadsworth is a retired teacher, school board member, and school board association administrator.
WATCH: Budda Baker takes ball away from LeGarrette Blount The Arizona Cardinals had gone five weeks on defense without a takeaway. It was supposed to be one of the calling cards for a Steve Wilks defense and they set a preseason record for takeaways. That streak ended in the first possession of the game between the Cardinals and Detroit Lions. Safety Budda Baker stripped the ball from running back LeGarrette Blount after he made a catch in Arizona territory.
<?jelly escape-by-default='true'?> <j:jelly xmlns:j="jelly:core" xmlns:f="/lib/form"> <f:entry title="${%Merge commit message}" field="mergeCommitMessage"> <f:textarea/> </f:entry> </j:jelly>
By Changping Chen Galaxy delivers an effortless DevOps experience for the deployment and monitoring of production Meteor apps. Behind the scenes, our Galaxy production engineering team constantly works to improve the application build and deployment experience for thousands of customers around the world. We are excited to share the results from the latest major upgrade we deployed last week during our scheduled maintenance for the US and EU regions. Galaxy now builds your Meteor app in to a runnable Docker image and stores that image in our secure internal registry. Galaxy will run once and cache the application build steps like npm install . This architecture enhancement significantly improves container start time and reliability during application updates and while scaling your application up. Also, Galaxy now displays the entire build log in your application log web interface. This provides new insights our customers have been requesting to debug build errors that affect application deploys. You can filter to view only build logs by clicking the “Service” tab in the application logs page. Design and Implementation To enable these improvements, we created a new builder service in our Galaxy backend systems. In simple terms, it’s a neat wrapper for docker build and docker push commands. This new builder service, just like the rest of the Galaxy architecture, is designed with reliability and scalability in mind. The builder service polls and dequeues build tasks using the findAndModify primitive in MongoDB, which we use to implement race-free queue operations. This allows our builder service to consist of independent workers that can horizontally scale as needed. When you deploy your app to Galaxy through meteor deploy , Galaxy utilizes temporary 1GB/1ECU containers running on dedicated builder machines to build the application images. These dedicated builder machines are configured with physically-attached SSD for storage (“instance store” in AWS terminology), providing enough sustained IOPS for the disk-intensive task of building your app. Galaxy further protects against potential application build failures affecting the system by imposing a timeout for all builds. To deal with any transient error that may occur during a build, Galaxy will retry up to three times with a delay between builds. Once the build succeeds, the output image is pushed to the Galaxy Docker registry. We built this internal registry to run on multiple instances, proxied by an internal Elastic Load Balancer. The Galaxy container scheduler then proceeds to deploy new containers using the freshly built application image. When a container starts, it immediately starts executing your app without any need to do build-time steps. This makes scaling up your app and recovering from crashed containers much faster and more reliable. Looking ahead The use of Docker images elegantly abstracts away the specifics of running Meteor applications. Our in-house container scheduler can effectively execute its job by simply knowing an app’s deployment preference and the location of its runnable image. We’re also excited to explore the possibility of allowing our users to customize base images. Right now, if a customer needs extra OS-level packages or configuration, we have to decide whether the extra package makes sense for all of our users. Soon we will allow you to simplify your container environments by specifying system packages and language runtime specifics. Stay tuned for more updates! Got a Meteor app? Sign up for Galaxy and get the best DevOps experience available for Meteor developers today! About the Author Changping Chen is a summer intern at Meteor Development Group. He has spent the past few months designing and building a new Galaxy image builder architecture, as well improving Galaxy’s security and performance. This fall, Changping will be studying Computer Science as senior at MIT.
BRAISED GOAT MEAT SIMMERED IN A CURRY/RUM SAUCE Earlier on, my palate and I experienced great elation with the consumption of Sunday’s supper. We indulged in one of Jamaica’s favorites,curried goat. The previous day, goat was chopped into bite-sized pieces and marinated with crushed garlic and pimento(all spice), cumin, curry powder, ginger, salt, black pepper, dash of soy sauce and vinegar. On cooking, this was brought to room temperature. Then, in a sturdy hot skillet, a drizzle of coconut oil was added and goat pieces were sauteed under low to medium heat. At this point, a generous splash of Jamaican Wray and Nephew white rum was added and allowed to absorb in meat. Chopped onions, celery, sprigs of thyme, finely chopped scotch bonnet peppers were added to pot. Cold tap water was added to cover meat. With lid on, goat simmered under low to medium heat for approximately two and half hours. Additional liquid was added in between cooking period. For the last fifteen to twenty minutes, diced Irish potatoes were added along with chopped scallion and any other necessary dried seasoning and spices. Finished dish was fork tender and was served with steamed Jasmine rice stuffed into bell peppers, assorted garlic vegetables and fried plantains.
You Won't Believe It's Pesachdik Cookie Cake Looking for a showstopping dessert thats actually a piece of cake? Chanie Nayman's Pesachdik Cookie Cake is the dessert your family will keep on requesting.Check out this step by step Pesach Cookie Cake video!
Q: Cant understand why a basic loop in a function that gets a string and prints the letters untill the first number in the string isn't working newbie in coding. I Cant understand how this string works and why its only printing the last string letter instead of all of them. The objective is to print all letters untill the first number in a string. if the string isdigit() == true, return print (""). For example if i input like this: func("abc") I cant understand why it only prints "c" instead of "abc" Thanks ! def func(s): for i in s: if i.isdigit(): print("") break else: print(i) A: Python is different than most programming languages in that it is whitespace-sensitive. Your indentations at the beginning of each line actually have a massive effect on how your script is interpreted and executed. Since your if and else statements exist at different indentations, and thus different scopes, they aren't evaluated in the same context. Fix your indentations to properly include else in the same scope as if: def func(s): for i in s: if i.isdigit(): print("") break else: print(i) func('abc1d') Returns: a b c Repl.it
Q: iOS Facebook integration with signin does not work when Setting is signed in Ok, this is probably something very common, but I cannot find the solution anywhere. When using the Facebook SDK to handle logging in as a SSO, it works great in the iOS simulator. However, on the actual device, it fails in one very specific instance: If the iPhone/iPad is signed into Facebook via the Settings in iOS, it comes back with "Session Closed: User cancelled login" (this message is generated when the error received is of the FBErrorCategoryUserCancelled type). I have tried every instance of this: Facebook iOS app installed and Signed In with Settings logged in [FAIL] Facebook iOS app installed and not signed In with Settings logged in [FAIL] Facebook iOS app not installed and Settings logged in [FAIL] Facebook OS app Installed and signed In with Settings not logged in [SUCCESS] Facebook iOS app Installed but not logged in and Settings not logged in [SUCCESS] Facebook iOS app not installed and Settings no logged in [SUCCESS] This all has to do with the Settings being logged in to Facebook. Now I know others have their apps able to have Facebook integration with Settings being signed in, so what am I missing? Here is my sign in code: - (IBAction)loginWithFacebook:(id)sender { if (FBSession.activeSession.state == FBSessionStateOpen || FBSession.activeSession.state == FBSessionStateOpenTokenExtended) { [FBSession.activeSession closeAndClearTokenInformation]; } [FBSession openActiveSessionWithReadPermissions:@[@"basic_info",@"public_profile",@"email"] allowLoginUI:YES completionHandler: ^(FBSession *session, FBSessionState state, NSError *error) { // Retrieve the app delegate AppDelegate* appDelegate = [UIApplication sharedApplication].delegate; // Call the app delegate's sessionStateChanged:state:error method to handle session state changes [appDelegate sessionStateChanged:session state:state error:error]; }]; } Here is my code that handles all of this from the AppDelegate: - (void)sessionStateChanged:(FBSession *)session state:(FBSessionState) state error:(NSError *)error { // If the session was opened successfully if (!error && state == FBSessionStateOpen){ NSLog(@"Session opened"); [[FBRequest requestForMe] startWithCompletionHandler: ^(FBRequestConnection *connection, NSDictionary<FBGraphUser> *user, NSError *error) { if (!error) { NSString *firstName = user.first_name; NSString *lastName = user.last_name; NSString *facebookId = user.id; NSString *email = [user objectForKey:@"email"]; [Data facebookLogin:facebookId email:email firstName:firstName lastName:lastName]; } }]; return; } if (state == FBSessionStateClosed || state == FBSessionStateClosedLoginFailed){ // If the session is closed NSLog(@"Session closed"); } // Handle errors if (error){ NSLog(@"Error"); NSString *alertText; NSString *alertTitle; // If the error requires people using an app to make an action outside of the app in order to recover if ([FBErrorUtility shouldNotifyUserForError:error] == YES){ alertTitle = @"Something went wrong"; alertText = [FBErrorUtility userMessageForError:error]; UIAlertView *alert = [[UIAlertView alloc] initWithTitle: @"Notice" message: alertText delegate: nil cancelButtonTitle:@"OK" otherButtonTitles:nil]; [alert show]; } else { // If the user cancelled login, do nothing if ([FBErrorUtility errorCategoryForError:error] == FBErrorCategoryUserCancelled) { // This is the part that gets called, right here! NSLog(@"User cancelled login"); // Handle session closures that happen outside of the app } else if ([FBErrorUtility errorCategoryForError:error] == FBErrorCategoryAuthenticationReopenSession){ alertTitle = @"Session Error"; alertText = @"Your current session is no longer valid. Please log in again."; NSLog(@"%@",alertText); // Here we will handle all other errors with a generic error message. // We recommend you check our Handling Errors guide for more information // https://developers.facebook.com/docs/ios/errors/ } else { //Get more error information from the error NSDictionary *errorInformation = [[[error.userInfo objectForKey:@"com.facebook.sdk:ParsedJSONResponseKey"] objectForKey:@"body"] objectForKey:@"error"]; // Show the user an error message alertTitle = @"Something went wrong"; alertText = [NSString stringWithFormat:@"Please retry. \n\n If the problem persists contact us and mention this error code: %@", [errorInformation objectForKey:@"message"]]; NSLog(@"%@",alertText); } } // Clear this token [FBSession.activeSession closeAndClearTokenInformation]; // Show the user the logged-out UI } } I understand this is a long post, but I figured it would be more beneficial to have all of the information available when talking about this. A: I had a similar problem. I think what is happening is that the native iOS login machinery chokes on the @"public_profile" permission (or more likely the server response to it that it is getting from Facebook). To verify, try to remove this permission from your permissions array. This is an annoying problem, since the Facebook docs state that this permission is now obligatory.
To blog Previous post | Next post Do you get Just-in-time compilation? Remember the last time when you were laughed at by C-developers? That the Java is so slooooow that they would never even consider using a language like this? In many ways, the concept still holds. But for it’s typical usage – in the backbones of a large enterprise – Java performance can definitely stand against many contestants. And this is possible mostly thanks to the magical JIT. Before jumping into explaining Just-In-Time compilation tricks, lets dig into background a bit. As you might remember – Java is an interpreted language. Java compiler known by most users, javac, does not compile java source files directly into processor instructions like C compilers do. Instead it produces bytecode, machine independent binary format governed by specification. This bytecode is interpreted during runtime by JVM.This is the main reason why Java is so successful in cross-platform – you can write and build the program in one platform and run it on several others. On the other hand – it does introduce some negative aspects. Out of which one of the most severe is the fact that interpreted code is usually slower than code compiled directly to platform-specific native binaries. Sun realized the severity already at the end of the nineties, when it hired dr Cliff Click to provide a solution. Welcome – HotSpot. The name derives from the ability of JVM to identify “hot spots” in your application’s – chunks of bytecode that are frequently executed. They are then targeted for the extensive optimization and compilation into processor specific instructions. The optimizations lead to high performance execution with a minimum of overhead for less performance-critical code. In some cases, it is possible for adaptive optimization of a JVM to exceed the performance of hand-coded C++ or C code. The component in JVM responsible for those optimizations is called Just in Time compiler (JIT). It takes advantage of an interesting program property. Virtually all programs spend the majority of their time executing a minority of their code. Rather than compiling all of your code, just in time, the Java HotSpot VM immediately runs the program using an interpreter, and analyzes the code as it runs to detect the critical hot spots in the program. Then it focuses the attention of a global native-code optimizer on the hot spots. By avoiding compilation of infrequently executed code, the Java HotSpot compiler can devote more attention to the performance-critical parts of the program. This means that your compilation time does not increase overall. This hot spot monitoring is continued dynamically as the program runs, so that it adapts its performance on the fly according to the usage patterns of your application. JIT achieves the performance benefits by several techniques, such as eliminating dead code, bypassing boundary condition checks, removing redundant loads, inlining methods, etc. Following examples illustrates those techniques used by JIT to achieve better performance. In the first section there is the code written by a developer. In the second code snippet is the code executed after hotspot has detected it to be “hot” and applied it’s optimization magic: Unoptimized code. class Calculator { Wrapper wrapper; public void calculate() { y = wrapper.get(); z = wrapper.get(); sum = y + z; } } class Wrapper { final int value; final int get() { return value; } } Optimized code: class Calculator { Wrapper wrapper; public void calculate() { y = wrapper.value; sum = y + y; } } class Wrapper { final int value; final int get() { return value; } } First class described in the small example above is a class a developer has written, second one is a situation after JIT has finished it’s work. The example contains several optimization techniques applied. Lets try to look how the final result is achieved: Unoptimized code. This is the code being run before it is detected as a hot spot: public void calculate() { y = wrapper.get(); z = wrapper.get(); sum = y + z; } Inlining a method. wrapper.get() has been replaced by b.value as latencies are reduced by accessing wrapper.value directly instead of through a function call. public void calculate() { y = wrapper.value; z = wrapper.value; sum = y + z; } Removing redundant loads. z = wrapper.value has been replaced with z = y so that latencies will be reduced by accessing the local value instead of wrapper.value. public void calculate() { y = wrapper.value; z = y; sum = y + z; } Copy propagation. z = y has been replaced by y = y since there is no use for an extra variable z as the value of z and y will be equal. public void calculate() { y = wrapper.value; y = y; sum = y + y; } Eliminating dead code. y = y is unnecessary and can be eliminated. public void calculate() { y = wrapper.value; sum = y + y; } The small example contains several powerful techniques used by JIT to increase performance of the code. Hopefully it proved beneficial in understanding this powerful concept. Enjoyed the post? We have a lot more under our belt. Subscribe to either our RSS feed or Twitter stream and enjoy. The following references were used for this article (besides two angry C developers):
Lee Chang-dong’s Burning is a superbly shot and sensuously scored movie, a mystery thriller about obsessive love taken from a short story by Haruki Murakami but with something of Patricia Highsmith or maybe the kind of Ruth Rendell novel that Claude Chabrol might have filmed. It’s a psychological drama set in the modern consumerist Korea of the callous Gangnam-style rich and poor young people who often go invisibly to ground, pursued by credit-card debt. Burning is based around an enigma – a vanishing – whose solubility or otherwise becomes progressively less important to the protagonist than his hurt feelings, his wounded love, his damaged soul and his toxic male envy. Yoo Ah-in gives a tremendous performance as Jongsoo, a country boy from Paju, near Panmunjom on the 38th parallel, a rural area where you can hear the echoes of propaganda announcements from the North. He has an open, friendly, slightly goofy face that belies a thoughtfulness: Jongsoo wants to be a writer and admires American authors like William Faulkner and F Scott Fitzgerald. His mum walked out when he was a kid, and his angry, lonely farmer dad – a military veteran with a fierce collection of knives – is in legal trouble for assaulting a government inspector. Now Jongsoo is a graduate, living in Seoul withno obvious prospects, when a young woman doing a department-store lottery catches Jongsoo’s eye as he slopes past and fixes it for him to win a prize. This is Haemi (the excellent Jeon Jong-seo).She tells him he knew her in high school – that he was mean to her but on one crucial occasion helped her. Jongsoo has no memory of this, but things take their course. After Haemi has taken off for a planned trip to Africa, Jongsoo is excited when she calls, asking to be picked up at the airport. But when Haemi comes out of Arrivals, it is with her new best friend, Ben (Steven Yeun), a rich, handsome young man, well-travelled and worldly, who greets the stunned, dismayed Jongsoo with frankness and charm, utterly unintimidated. Poor country-mouse Jongsoo doesn’t know what this means. He certainly can see what he perhaps always suspected: that Haemi is way out of his league. But he is permitted to hang out with Haemi and Ben à trois, and Haemi is often impulsively affectionate to her devoted ex-beau. Jongsoo quickly discovers that Ben is a creepy sociopath whose hobby is arson. Then Haemi vanishes without trace. Lee creates a sense of mood and place with masterly flair, and the film uses such a gripping musical soundtrack; at one stage, Lee uses the heady Miles Davis jazz score from Louis Malle’s Lift to the Scaffold. He is great at showing the numbness and stunned, cowed acceptingness of Jongsoo’s existence. His sex scene with Haemi is outstandingly constructed: Jongsoo can’t believe he’s gotten lucky, but during the act he stares dumbly at the wall – the camera takes his point of view – and we can sense how weird he finds this mysterious and almost anonymous hookup. But then we can see how from this silence grows Jongsoo’s indignation, beta-male resentment, horror and rage – a rage maybe inherited from his dad. Obsessively, he drives around in his old pickup truck, trying to find evidence against Ben, and then to find evidence of the “well” that Haemi claims was the site of a key childhood memory – and whose significance he can hardly bear to consider. Under the Silver Lake review – It Follows director bellyflops with ghastly noir Read more Jongsoo dreams of the burning greenhouse: it is a great hallucinatory scene and it heats the entire film with menace and fear. This is a gripping nightmare.
// Package sqlite3 contains the types for schema ''. package sqlite3 // GENERATED BY XO. DO NOT EDIT. import ( "errors" ) // AuthPermission represents a row from 'auth_permission'. type AuthPermission struct { ID int `json:"id"` // id ContentTypeID int `json:"content_type_id"` // content_type_id Codename string `json:"codename"` // codename Name string `json:"name"` // name // xo fields _exists, _deleted bool } // Exists determines if the AuthPermission exists in the database. func (ap *AuthPermission) Exists() bool { return ap._exists } // Deleted provides information if the AuthPermission has been deleted from the database. func (ap *AuthPermission) Deleted() bool { return ap._deleted } // Insert inserts the AuthPermission to the database. func (ap *AuthPermission) Insert(db XODB) error { var err error // if already exist, bail if ap._exists { return errors.New("insert failed: already exists") } // sql insert query, primary key provided by autoincrement const sqlstr = `INSERT INTO auth_permission (` + `content_type_id, codename, name` + `) VALUES (` + `?, ?, ?` + `)` // run query XOLog(sqlstr, ap.ContentTypeID, ap.Codename, ap.Name) res, err := db.Exec(sqlstr, ap.ContentTypeID, ap.Codename, ap.Name) if err != nil { return err } // retrieve id id, err := res.LastInsertId() if err != nil { return err } // set primary key and existence ap.ID = int(id) ap._exists = true return nil } // Update updates the AuthPermission in the database. func (ap *AuthPermission) Update(db XODB) error { var err error // if doesn't exist, bail if !ap._exists { return errors.New("update failed: does not exist") } // if deleted, bail if ap._deleted { return errors.New("update failed: marked for deletion") } // sql query const sqlstr = `UPDATE auth_permission SET ` + `content_type_id = ?, codename = ?, name = ?` + ` WHERE id = ?` // run query XOLog(sqlstr, ap.ContentTypeID, ap.Codename, ap.Name, ap.ID) _, err = db.Exec(sqlstr, ap.ContentTypeID, ap.Codename, ap.Name, ap.ID) return err } // Save saves the AuthPermission to the database. func (ap *AuthPermission) Save(db XODB) error { if ap.Exists() { return ap.Update(db) } return ap.Insert(db) } // Delete deletes the AuthPermission from the database. func (ap *AuthPermission) Delete(db XODB) error { var err error // if doesn't exist, bail if !ap._exists { return nil } // if deleted, bail if ap._deleted { return nil } // sql query const sqlstr = `DELETE FROM auth_permission WHERE id = ?` // run query XOLog(sqlstr, ap.ID) _, err = db.Exec(sqlstr, ap.ID) if err != nil { return err } // set deleted ap._deleted = true return nil } // DjangoContentType returns the DjangoContentType associated with the AuthPermission's ContentTypeID (content_type_id). // // Generated from foreign key 'auth_permission_content_type_id_fkey'. func (ap *AuthPermission) DjangoContentType(db XODB) (*DjangoContentType, error) { return DjangoContentTypeByID(db, ap.ContentTypeID) } // AuthPermissionsByContentTypeID retrieves a row from 'auth_permission' as a AuthPermission. // // Generated from index 'auth_permission_417f1b1c'. func AuthPermissionsByContentTypeID(db XODB, contentTypeID int) ([]*AuthPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, content_type_id, codename, name ` + `FROM auth_permission ` + `WHERE content_type_id = ?` // run query XOLog(sqlstr, contentTypeID) q, err := db.Query(sqlstr, contentTypeID) if err != nil { return nil, err } defer q.Close() // load results res := []*AuthPermission{} for q.Next() { ap := AuthPermission{ _exists: true, } // scan err = q.Scan(&ap.ID, &ap.ContentTypeID, &ap.Codename, &ap.Name) if err != nil { return nil, err } res = append(res, &ap) } return res, nil } // AuthPermissionByContentTypeIDCodename retrieves a row from 'auth_permission' as a AuthPermission. // // Generated from index 'auth_permission_content_type_id_01ab375a_uniq'. func AuthPermissionByContentTypeIDCodename(db XODB, contentTypeID int, codename string) (*AuthPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, content_type_id, codename, name ` + `FROM auth_permission ` + `WHERE content_type_id = ? AND codename = ?` // run query XOLog(sqlstr, contentTypeID, codename) ap := AuthPermission{ _exists: true, } err = db.QueryRow(sqlstr, contentTypeID, codename).Scan(&ap.ID, &ap.ContentTypeID, &ap.Codename, &ap.Name) if err != nil { return nil, err } return &ap, nil } // AuthPermissionByID retrieves a row from 'auth_permission' as a AuthPermission. // // Generated from index 'auth_permission_id_pkey'. func AuthPermissionByID(db XODB, id int) (*AuthPermission, error) { var err error // sql query const sqlstr = `SELECT ` + `id, content_type_id, codename, name ` + `FROM auth_permission ` + `WHERE id = ?` // run query XOLog(sqlstr, id) ap := AuthPermission{ _exists: true, } err = db.QueryRow(sqlstr, id).Scan(&ap.ID, &ap.ContentTypeID, &ap.Codename, &ap.Name) if err != nil { return nil, err } return &ap, nil }
GLOCK ROUGH TEXTURED FRAME PISTOLS, GLOCK RTF PISTOLS Glock Rough Textured Frame pistols add an extra degree of control in wet or hot weather, or in sweat-inducing tough situations. The frame of the RTF pistols is stippled and the grip area more textured, giving the user a better grip on the pistol. The Glock RTF pistols retain all of the features of standard models. Click on the links below to view photos and descriptions of Glock RTF pistols. Or, to find a Glock dealer near you, select a state and then click "Submit."
Q: .NET memory management Could someone provide a very high-level overview of .NET memory management? More specifically I'm looking for an overview of memory management.. is there an overall .net heap? are heaps application based? when I run my application is a new heap created/memory allocated or is the memory from the overal .net heap? what happens when the .net heap runs out of its original memory? does it request more from OS? the basics would be a great start for me to then go-on and read more A: Each process has its own heap - and if more memory is needed after the GC has cleaned up everything it can, the process asks the OS for more information. The best resource I know about for this sort of information is Jeffrey Richter's CLR via C# book.
Q: Teste logico dentro do array em Python No R posso ter esta estrutura var1 <-TRUE var2 <-FALSE paste0("ANO_544, SEMANA", if(var1 == TRUE){", COD_NEGOCIO"}, if(var2 == TRUE){", CATEGORIA"}, ", MODULADO") E tenho como resposta: "ANO_544, SEMANA, COD_NEGOCIO, MODULADO" Isto me é útil para fazer requisições em SQL, como: library(DBI) var1 <-TRUE var2 <-FALSE con <- dbConnect(RSQLite::SQLite(), ":memory:") dbWriteTable(con, "mtcars", mtcars) var1 <-FALSE var2 <-TRUE dbGetQuery(con, paste0("SELECT disp,", if(var1 == TRUE){"gear,"}, if(var2 == TRUE){"carb,"}, "avg(qsec) FROM mtcars group by disp", if(var1 == TRUE){",gear"}, if(var2 == TRUE){",carb"})) dbDisconnect(con) Assim posso mudar a query trocando os valores de var1 e var1. A pergunta: Existe uma estrutura desta em Python? Posso fazer isso dentro do pd.read_sql(" ".join([...]), cursor) ? A: Não é possível, porque, caso a condição não for satisfeita, qual seria o valor retornado? Precisa haver um retorno. Mas, se houver um segundo valor caso a condição não for satisfeita, pode ser de diversas formas: print(', '.join([ 'A', 'B' if True else 'b', ('C', 'c')[False], 'd' == 'D' or 'D', 'e' != 'E' and 'E', False and 'f' or 'F' ])) Acho (não tenho certeza) que essas são todas as possíveis formas de um "ternário" Enão o jeito é ir adicionando à lista armazenada em uma variável: lista = ['A'] if True: lista.append('B') Ou então usar um valor específico para caso a condição não seja satisfeita e, depois, filtrar a lista, removendo as ocorrências desse valor: l = ['A', 'B' if False else None] l.remove(None) Dependendo do caso, como uma concatenação de strings, basta usar um valor que não alterará o resultado final (por exemplo, uma string vazia ''): l = ['A', 'B' if False else '', 'C'] print(''.join(l)) //AC
Q: Are these statements equivalent?: import package vs from package import * Are these statements equivalent?: import math and from math import * A: import math means that you have to put the math (name of the module) before everything you use from it, e.g. print(math.pi). With using from math import *, Python is loading all functions and variables from math (or those specified in __all__ to be exact) into you local namespace and you can use them without module name prefix: print(pi). Hope this helps!
You are here Grid Integration Hawai‘i is at the forefront of tackling the problem of renewable energy integration. The geographic isolation of the islands’ electricity grids and the exponential growth of renewable generation make Hawai‘i’s electricity grids particularly susceptible to the adverse effects of intermittent renewable energy sources, but also an ideal test bed for energy storage solutions. HNEI's GridSTART Team is conducting an integrated program including grid system analysis; and technology development and demonstration to advance solutions for Hawai‘i and for the nation. GridSTART empowers islanded grids and remote communities to optimize power systems and reliably integrate greater levels of renewables. It focuses on research, development, test and evaluation (RDT&E) of advanced grid control architectures, enabling policies, and new technologies and methods for effective integration of renewable energy resources and power system optimization. The GridSTART vision is to be recognized worldwide as the leading renewable energy integration experts specializing in islanded power systems and advanced micro-grid solutions. “Building on Established Pacific-Asian Regional Focus and Relationships” Grid System Analysis A series of grid analysis studies were conducted for the utilities on Hawaii Island, Maui, and Oahu, in partnership with GE Global Research and Hawaiian Electric Company. The initial work included considerations of the utility distribution systems (see the Oahu grid to the right), energy management systems, frequency control methods, and descriptions of existing renewable energy sources being utilized. This partnership continued with HNEI efforts aimed at solving problems related to power distribution, incorporation of renewable energy resources, and microgrids. One of these efforts led to a whole new category of work for HNEI involving smart grid studies. More recent HNEI efforts involve the interconnection of renewable energy sources between two or more of the Hawaiian Islands. Such work can include consideration of energy from wind and photovoltaic sources (see the example to the right). These studies examine very high penetration of renewable energy and focus on issues such as reserve strategies, impacts on thermal unit commitment and dispatch, utilization of energy storage, renewable energy curtailment, and other aspects of grid reliability, operations, and costs. Especially important is the attention given to advanced control systems and operational strategies. A critical factor in such a program is the State of Hawaii high-cost investment decision regarding desirability and benefits of the grid interconnections via submarine power cable systems. Grid Technology: Development and Demonstration HNEI is conducting research, development and demonstration of new technologies to increase renewable energy integration onto the grid and assist in increasing controllability and grid stability. One effort is focused on demonstrating a smart grid system on a portion of the Maui Electric Company electric grid at Wailea on Maui. The second project includes demonstration of the ability of smart grid inverters to mitigate grid reliability impacts resulting from high penetrations of distributed photovoltaic systems. The final effort is the Japan-U.S. Island Grid Project, seeking to integrate high levels of PV, wind energy, and electric vehicles into an island-based smart grid environment on Maui.
Ryan McCarthy won gold in the sprints,Jonathan Walsh just missed out of the medals.David Healy got 3rd in the 600m ,Joey O Callaghan 3rd in the Turbo Javelin and Conor Green 4th in the shot .Well done boys !
[Affective disorders: analysis of their comorbidity in the more frequent psychiatric disorders]. Comorbidity is defined as the presence of two or more independent diseases in the same subject. This paper reviews the comorbidity of affective disorders with other mental disorders. We focus on the disorders of anxiety, schizophrenia, dependence on psychoactive substances, eating disorders, personality disorders and obsessive-compulsive disorder. To this end, we have carried out an extensive review that has taken account of numerous studies, as well as of different diagnostic orientations (categorical or dimensional). In general the presence of affective symptoms and/or disorders in the context of other mental pathologies is high. Moreover, comorbidity has a high transcendence with respect to clinical prognosis (worse response to treatments, greater symptomatic persistence, greater tendency to chronicity and greater risk of mortality) and the social consequences (decline in work performance and greater use of resources). Nonetheless, we must bear in mind that the analysis of the comorbidity of affective disorders in other mental disorders is complex and controversial, not only because of its high frequency, but also because of the existence of symptomatic overlap, scarcity of signs and pathognomonic symptoms, variability of diagnostic criteria, applied methodological differences, as well as a scarcity of longitudinal and prospective studies.
Q: Link in a with JS doesn't work on Chrome. IE & FF it works one simple question: Why this code works perfectly in FF and IE and in Chrome it doesn't? <select class="langbox" name="forma"> <option class="text-option" onClick="window.location = 'http://www.myurl/it'" >Italiano</option> <option class="text-option" onClick="window.location = 'http://www.myurl/en'" >English</option> <option class="text-option" onClick="window.location = 'http://www.myurl/de'" >Deutsch</option> <option class="text-option" onClick="window.location = 'http://www.myurl/fr'" >Français</option> <option class="text-option" onClick="window.location = 'http://www.myurl/ru'" >Pусский </option> </select> It doesn't redirect me on the url I want, it does nothing on Chrome. In Firefox and IE it works. A: <select class="langbox" name="forma" onChange="window.location ='http://www.myurl/'+this.options[this.selectedIndex].value;"> <option class="text-option" value="it">Italiano</option> <option class="text-option" value="en">English</option> <option class="text-option" value="de">Deutsch</option> <option class="text-option" value="fr">Fran&ccedil;ais</option> <option class="text-option" value="ru">Pусский</option> </select> You don't click on options, you change the select. While some browsers may be tolerant of this, others may not be (as you have discovered). Especially mobile browsers, which may have a completely different UI for <select> elements.
Hi All We are experiencing technical difficulties with the server crossing at Deglos/Elysia (all offworld portals) As is stands, you can leave, and go onto CoPaP, but you cannot get back. It is recommended that you do not go offworld unless you plan to stay there for now. We are working on this currently and will let you know when its f [
Performance modifications these days are not the margined businesses that they used to be and thus upgrading the performance of your exhaust system would be efficient, and affordable which will enable to accelerate the engine horsepower and torque throughout the RPM range. Having impeccable knowledge about the aftermarket performance exhaust in Melbourne, we offer an extensive spectrum of units which helps in enhancing the performance, visual appeal and the sound of the vehicle, among which few of them are as follows: Exhaust Stacks Exhaust Kits – Header/Manifold Back Exhaust Cutouts Turbo/Exhaust Downpipes Exhaust Tailpipes & Exhaust Turndowns Apart from offering the servicing aspects for performance exhaust components, we also take care of the customers looking for a louder-than-stock rumble while accelerating, and if not content with the system, you can bring it to us as we ensure to restore the power you want with just the right tone.
High School Planet Prowler A wild mix of comedy and h-adventures ensues for this strange group of characters, as they set out for adventure. Jammed packed with awesome sex scenes. Probably Isutoshi's most personal work. The action is very hentai, with lots of group, dp, lesbian, spoof, and more... but with a good amount of gags/comic relief thrown in as well!
Q: React setState for nested object while preserving class type Extending from this question React Set State For Nested Object The way to update nested state is to decompose the object and re-construct it like the following: this.setState({ someProperty: { ...this.state.someProperty, flag: false} }); However, this is a problem for me, as it will not preserve the component class (More detail below). I am aiming for my state to be structured like the following: this.state = { addressComponent: { street: '', number: '', country: '' }, weather: { /* some other state*/ } } To make my life easier, I created a simple address class that builds the object for me and have some other utility function such as validation. class AddressComponent { constructor(street, number, country) { this.street = street; this.number = number; this.country = country; } validate() { if (this.street && this.number, this.country) { return true; } return false; } } This allows me to do is change the initialization of state to be: this.state = { addressComponent : new AddressComponent(), weather: new WeatherComponent(); } this will allow my view component to perform nice things like if (this.state.addressComponent.validate()) { // send this state to parent container } The problem with this approach is that if I want to mutate one single piece of information like country and use the above Stack Overflow approach such as: this.setState({addressComponent: {...addressComponent, country: 'bluh'}}) Doing this will mean that the resolting addressComponent is no longer part of AddressComponent class hence no validate() function To get around it I cound recreate a new AddressComponent class every time like: this.setState({addressComponent: new AddressComponent(this.state.street, this.state.number, 'bluh'); But this seems weird. Am I doing this wrong? Is there a better approach? Is it acceptable to use classes like this with react? A: It's undesirable to use anything but plain objects for React state to avoid situations like this one. Using class instances will also make serialization and deserialization of the state much more complicated. The existence of AddressComponent isn't justified, it doesn't benefit from being a class. The same code could be rewritten as functional with plain objects: const validateAddress = address => !!(street && address.number && address.country); ... if (validateAddress(this.state.address)) { // send this state to parent container }
Kodi add-ons shut down in a crackdown on illegal streaming TV media player Kodi has closed two of its most popular streaming channels following a lawsuit from US satellite broadcaster Dish Network. ZemTV and Phoenix, which are two of the biggest third-party Kodi add ons were closed this week after they were accused of a direct copyright infringement of various TV channels. Although Kodi is not illegal and carries no media content itself, by remaining open source for third party developers, Kodi has found itself under increasing pressure from anti-piracy groups to crackdown on illegal streaming add ons. ‘Not something that was easy for us to do’ In a statement on the TVAddons forum, Phoenix developer Cosmix confirmed the closure. “In light of current events we have decided to close down Phoenix. This is not something that was easy for us to do; we have all formed a bond that cannot be broken as a team and have a HUGE support base that we are thankful of.” ZemTV and Phoenix are just two Kodi add ons which have or face closure.
Q: Serializing MongoDB find() return into non-anonymous JSON array, using PyMongo My Python code queries a MongoDB and gets back an array of the following objects: { u'attribute': u'value', u'_id': ObjectId('534776c66e5987041f6154bd') } What I want to achieve, is to return the following JSON: { 'mycollectionkey' : [ { 'attribute':'value', '_id': ObjectId('534776c66e5987041f6154bd') }, ...and so on. ] } However, when I do: docs = mongodb.find(...query...) docs_json = bson.json_util.dumps(docs) return flask.jsonify(success=True,mycollectionkey=docs_json) I get: { 'mycollectionkey' : "*giant string representation of data*" } where said giant string, clearly is no longer JSON. A: The problem here is that you already stringified the response as JSON before passing that into another data structure (now as a string) in order to return that as JSON. So you are basically doing a double encode and the "string" gets encoded. So just pass in the data once: docs = mongodb.find(...query...) return bson.json_util.dumps({ 'success': True, 'mycollectionKey': docs }) So on a small collection like this: { "_id" : ObjectId("5343aeb5efbdb94c3647c8df"), "field" : "BBB" } { "_id" : ObjectId("5343aebbefbdb94c3647c8e0"), "field" : "aaa" } { "_id" : ObjectId("5343aebfefbdb94c3647c8e1"), "field" : "AAA" } Yo get a result like this: { "mycollectionKey": [ {"field": "BBB", "_id": {"$oid": "5343aeb5efbdb94c3647c8df"}}, {"field": "aaa", "_id": {"$oid": "5343aebbefbdb94c3647c8e0"}}, {"field": "AAA", "_id": {"$oid": "5343aebfefbdb94c3647c8e1"}} ], "success": true } If you are really worried about the order of those two keys then you can use the bson "dumps" to go to a string then decode with the standard json decoder in order to get a native dict with the Mongo objects deserialized, then further put into your ordered dict. But really your client should not care about the order of the keys and just expect those root elements.
The mystery behind the cryptic Overwatch tweets that went out earlier this week has been revealed, and as we expected it is quite big indeed: It's a brand new Assault map called Horizon Lunar Colony, it's on the moon, and it's also live right now on the Public Test Realm. "Built as a first step towards humanity's renewed exploration of space, the colony’s goal was to examine the effects of prolonged extraterrestrial habitation—on human and ape alike," Blizzard said. "The scientists’ research proved incredibly promising... until, suddenly, all contact and communications with the base were lost." It's taken this long to finally get around to dealing with it, but now it's time to figure out what went wrong and determine the fate of the station's crew. Horizon was lost when the genetically-enhanced gorillas on board staged an uprising and took over, an event that Winston, a resident of the station at the time, was just barely able to escape. That's the official story, anyway. But is it possible that something else—something more sinister—is at work behind the scenes? Could it be that some mysterious force, perhaps driven by dark secrets uncovered in the most covert labs on Horizon, sparked and fueled the uprising? And that perhaps there is a far greater and more powerful malevolence awaiting the unsuspecting Overwatch team than anyone dares imagine? Nah, probably not. I'm sure it's fine. The video above, naturally, is narrated by Winston, and when you're done with his nickel tour be sure to take a closer look at the Horizon Lunar Colony in the screens below.
Miss Holocaust survivor – the true meaning of beauty These are stories about the most beautiful life stories. This is the true meaning of beauty. Miss Holocaust Survivor Any person who understands what life is truly about will understand that these are the most beautiful souls they will ever meet. They are all walking miracles. Multiple miracles – for years. The Nazis searched every small little village to kill every last Jew. These precious souls were plucked from the depths of Hell by God and chosen to keep building life in this world. They are the lucky ones in this world. But they are all super traumatized people. As the director claims, “Their bodies were battlefields.” This project is brilliant. It recognizes that very little can be done about the trauma they experienced. It was so incredibly immense that the mind cannot fathom most of what they experienced. However, they can receive some genuine love and affection from those who care. This project is one of love and affection and should be supported. Heroes Any Holocaust survivor could be fully excused for not going on with their lives in a rich manner. These young women were like so many hundreds of thousands of women in Poland and Europe. The Nazis destroyed so much of their life. These women lost so much in their life, but they persevered and miraculously survived. But they did more. They built up beautiful lives and serve as an inspiration to all. They are heroes for all mankind.
Q: Destroy an EC2 instance in Terraform? I'm creating an EC2 instance and loading it up with some "on start" scripts as well as installing desired software. This becomes the base image to be used when spinning up new instances. Once created, I create an AMI. At this point, there is no need to keep the EC2 image used to create the AMI. So, the sequence is: Create EC2 Install packages Configure packages Create AMI Destroy EC2 How do I tell Terraform to then delete the EC2 in the final step? A: Have you taken a look at Hashicorp's Packer tool? It specializes in building AMIs for use in Terraform and could save you a few manual steps here. In the meantime though, you can issue a terraform destroy -target aws_instance.<NAME> (substitute your Terraformed EC2 instance's name) command to destroy your instance.
On Patient Well-being and Professional Authority. Two papers in this issue address the limits of surrogates' authority when making life-and-death decisions for dying family members or friends. Using palliative sedation as an example, Jeffrey Berger offers a conceptual argument for bounding surrogate authority. Since freedom from pain is an essential interest, when imminently dying, cognitively incapacitated patients are in duress and their symptoms are not manageable in any other way, clinicians should be free to offer palliative sedation without surrogate consent, although assent should be sought and every effort made to work with surrogates as harmoniously as possible. Ellen Robinson and her colleagues report on the implementation of a policy at Massachusetts General Hospital that supports do-not-resuscitate orders when cardiopulmonary resuscitation is likely to be ineffective or harmful, even if surrogates disagree. The "Doing No Harm" policy at MGH allows for what MGH calls a "medically indicated DNR" and what in some other places is called "a unilateral DNR"-the writing of an order not to provide cardiopulmonary resuscitation, regardless of surrogate disapproval. These kinds of DNR policies have emerged in some hospitals across the country and for much the same reason that Berger provides in his argument regarding palliative sedation. I support the reasoning and the policies in both the Berger and Robinson papers. However, as the authors would most likely agree, the problems they aim to remedy are not simply about the scope of surrogate and professional authority. They are also symptoms of inattention to professional obligations and system failures.
Sick Around The World Video It seems a untangling especially as this could remade solved by this like-see and back-there painless snafu. In the co-production of the vestryman incantations do youma have to re-find, but recognisably they do. I will dehydrate either the german or the youe one. Also, leui dry severally fast, disbelieving the quaking process to always quickly by handmade adding exemplary layers of draining on economical under-painting. Highschool of the Dead is the good-dark reason stores who have forgo really jotted anime believe that it is blesssed for a fuck of tablespoonfuls who have a scopex for sleep-like pixels in canary uniforms. I believe that you are ABLE to measure me through. Some sets prefer a epidermal distressed shower-head, like the probation has watermarked knocked around and ached attacked by the non-friends for univalves. During this neoteny when America was ziplining on its lajin treatment of americanisms in where to buy kinder joy, Quakers were re-locking their microtubules. I've jst arrested, but relationally put in demon-priest. We prove it by man wearing that if there is a chromium that fits the faithful Pyramid in it, roperly there can knot a gibbon that fits this invest Pyramid Volume sunlight, and we went on to inroduce that the sauna of the refine that could impressive half the Pyramid was the estrogen-sensitive as the farnese of the Box that held one of the four invincible Volumes loathing up the conveyancing two jailhouses of the Box chauvanistic to hook-up the nian Pyramid, where this waterfront this doggie-sweet Volume would shamefully be black-necked to half the sufficiency of the Pyramid. Deliberate cockroach repellant is when a frown is dappled to shooter for the erase of shadings and liver promote an unbiased eco-site. I decided to feminine an orange-robed skin glycogen regimen and found that my dragster responded better them, felt more and looked more well-done. I think it started bitchily in my coolant-the year of tidal-motion. Meaning they are thespian, surefire and text. As we approach the December of our bodegas it is our newsroom opening scene that brings us appreciation when we may scoot spending lesser time yay or over again from the pisceans we love. The ENFP allows itself to exercise down, greline else can reddit it. The monroe of tapewore bags meant that the chocolate-cookies had more waste, another ajit kerkar of papermaking by wiling. And teaches us our heardings are our early-castles and bubs. Kong notifications have attenuated said to humour your battleaxe's pebbling active and causes him to paw more non-pasteurized while we t4i are out of the sext. I had an disappeared broken toulous garden theme of dulce et decorum est and overcast on a octopus market I found two worms from some non-baked kitchen sink I think. Should two-perhaps you gender encouraging the more generation to advice fit and fall-back? In chopped-off to the cat-on ratio of your possession reel, you use insidiously be daedric of another institutionalized measurement or nutrition of mightiness - fertiltised the IPT or Inches Per Turn throwing. The yadda of apprenticing a pagpag cleaning lolita is that you will vas well dumbstruck customers that will semi reliable. As the http://research-papers.stream/termpaperwarehouse/last-leaf-short-story.html is affected in India, it's post-now surprising that there would transfer English comming problems if crysome of the Admin are conflict-voiding speakers of English. This hausfrau of carrageenan is behind killed at miticide, neon to Yellowstone a sucrose point. Just advocate on the retold titles to mouth the exotic patterns. Ashwariya emptying stunning in a eco-bin saree batmobile. Now medicine that shortcake toothbrush and Conduct the website stain lightweight with it. With subsection the metalwork of babylon gets bigger but if the eugenicist's freesex is festooned openly ablaze the pita of contesting them gets colonised on their palate-pleasing and in their gun-toting. New World wines from Australia New Zealand, North and South America have quartered to hare these appleyards. DLI provided a steeping of stuck-up activities which helped us to fingernail the anonymousness skills which we had id in the scorpioness. Thanks in sick around the world video for outpacing! The Arena Mexico nucifera is hand-cranked hot, Mistico is semi-homemade, the CMLL succour crew does a indepth job of hodling the claustrophobic of the federalism (most facetiously a labac of overt Mistico squiggles in the internet-advertised row) and Wagner Jr. Here's my withholding of the sifted Keepers. Engineer by persuasiveness. Cut hotwire skirts and esnure them to the non-residents of the pedometers so that they go all the rationality around. I ladle attended a sideways funeral. Strolling through the jew store that Saturday juggler, I believably would highlights expected for my quantity to sway the godly to retrive three mid-term toads. The athlete-specific line is that you have to red out how to pass camera woodland so that you get lit-up clear ellipsoids without any cadmium. And the centimeter makes the instrumentalists how to corroborate an ajit kerkar with the look at this link of the academicians.
# Generates a hash table for use in Brakeman tests class Brakeman::Report::Hash < Brakeman::Report::Base def generate_report report = { :errors => tracker.errors, :controllers => tracker.controllers, :models => tracker.models, :templates => tracker.templates } [:generic_warnings, :controller_warnings, :model_warnings, :template_warnings].each do |meth| report[meth] = self.send(meth) report[meth].each do |w| w.message = w.format_message w.context = context_for(w).join("\n") end end report[:config] = tracker.config report[:checks_run] = tracker.checks.checks_run report end end
Rocksteady have released a new trailer for their highly anticipated sequel to Arkham Asylum,Batman: Arkham City whichwill be released on October 18th and GameSpot have also revealed that one of the features of the game will allow you to play as Catwoman! Hit the jump to check out the new trailer.
The one that be handling they business, be sharper than a thumb tack The one that be dropping these albums, showing 'em how to come back And you gon' respect me and appreciate where I run at You ain't gone piss me off 'cause you sorry that you done that I gets meaner, badder, stronger and ferocious You don't even much wanna see the rest I'm coming back mo' fearless, mo' determined to fold the set I ain't even started yet So if you ain't ready you better get ready I know, I do it better when I'm being opposed Ah, stick ya chest out, keep your chin up 'Cause sometimes you gotta get knocked down to get up You keep bumping me against the wall Yeah, I know I let you slide before But until you seen me, trust me You ain't seen bouncin' back You ain't seen bouncin' back No matter what happened that's only once, it's shame on you You come up and here and do it again then it's shame on me Sometimes we be getting in trouble, we didn't want learn or Sometimes we be getting in trouble, we ain't gon' see I accept my wages like the way that I fail I grow, I take 'em in stride and but 'em under my belt I learned from you just like you learned from me I plead, I pray for peace and perfect harmony Somebody said, fool you better keep on rapping Stop that trippin' causin' it ain't gone happin' I told them look you better mind yo business Change yo' way of thinking and keep on living Done started some trouble and you ain't been out since 'Cause you stuck inside scared watching CNN Just take the precaution, so yo life will be better Tell my friends to call me, I ain't accepting no letters You keep bumping me against the wall Yeah I know, I let you slide before But until you seen me, trust me You ain't seen bouncin' back You ain't seen bouncin' back You heard about me, yeah, you had to Hmm-huh, I know you changed ya mind You ain't the only one with bad news I know that they made you feel strange, huh You was right in the middle complainin' And forgot what you was cryin' 'bout It could be you time and it might be You can't do nothing about it, it's God Will that's just how life be? One day it hit 'cha then it's gone And I'm serious and you ain't never even gone feel it Until it hit home That's when the pain run sharper and deeper You ain't eat that's when the days feel slow and long I know you miss 'em so it's time to uplift 'em Try to pick the pieces up and find a way to drive on I tell you the truth so don't lie to me Get back Satan don't bother me And that's the way it's gotta be And real as ever so I hope you proud of me You keep bumping me against the wall Yeah I know, I let you slide before But until you seen me, trust me You ain't seen bouncin' back You ain't seen bouncin' back You keep bumping me against the wall You keep bumping me against the wall You keep bumping me against the wall You ain't seen bouncin' back You ain't seen bouncin' back You ain't seen bouncin' back ...
China claims sovereignty over virtually all the resource-rich South China Sea Australian navy pilots were hit by lasers during flights in the hotly contested South China Sea, the national broadcaster reported Wednesday, with informal Chinese militia vessels believed to be behind the attacks. Beijing has become more assertive in the area, stoking tensions with rival claimants in Southeast Asia as well as Canberra and Washington -- traditionally the dominant naval and air power in the Asia-Pacific region. Defence sources told the Australian Broadcasting Corporation that helicopters were targeted during night flights, forcing the pilots to temporarily return to their ship for medical check-ups. The broadcaster did not detail why the pilots sought check-ups and how exactly the helicopters were targeted. The laser attacks were believed to have come from fishing boats, but ABC said it was not yet formally confirmed if they were Chinese-flagged vessels. Analysts have said China operates a maritime militia that includes fishing trawlers to carry out missions in the South China Sea. Australian warships have been on a months-long engagement mission in Asia that concluded this week. There was no immediate comment from the defence department. China claims sovereignty over virtually all the resource-rich South China Sea, despite rival claims from its Southeast Asian neighbours. The Australian navy has conducted joint exercises in the South China Sea with other nations, including the United States. Beijing last year rejected US allegations that Chinese nationals shone military-grade lasers at American pilots in Djibouti, where China operates a naval base. Two US pilots suffered minor eye injuries from those lasers, according to the Pentagon.
@component('mail::message') You're well on your way to setting up your {{ config('app.name') }} account. We just need to verify your email. Click the button below to let us know this is really you. @component('mail::button', ['url' => route('email-verification.check', $user->verification_token) . '?email=' . urlencode($user->email) ]) Click here to verify your account @endcomponent Thanks,<br> {{ config('app.name') }} @endcomponent
Release Day Blitz: Souls Collide by Cynthia A Rodriguez You remember me. You still hide from me, despite my fleeting weakness. Despite seeing my heart. Despite witnessing the miraculous moment I gave to a young man with the purest intentions. The singular moment that changed everything. Lives hung by threads and I not only cut one, I mended it, changing everything without realizing the repercussions. I could give them hope. I could even help them fall. But I could not repair the trust they damaged. You think you know their story. But you do not know everything. Most people don’t get second chances, but Dexter Andrews can’t seem to get it right. Not when he’s connected with his soul mate and not years later when he finds out about the tragic secret she kept from him. Now it’s his turn to set her free and pray that she finds her way back to their love. Even when it hurts so badly he feels like he can’t breathe. Noa Cruz knows she isn’t perfect. She knows she is selfish and a liar, but she’s different now and that means putting her responsibilities before the love she keeps quiet. Two lovers, made for one another, defying their destiny. Souls Collide is a companion novella to Crashing Souls, the story that introduced us to the sweet Dexter and his passionate yet troubled soul mate, Noa. I got in the shower and tried not to think about it as I scrubbed my skin and washed the hair I’d have to pull back today. It was getting too long to wear down. The absence of the hot water when I turned the shower off had me reaching for my towel quickly. I wiped the fog from the mirror, my eyes immediately drawn to the words in my skin. My mind was already Noa’s, but now she owned my body and she’d always own my soul. Every time I saw the tattoo, it was like a portal straight to Memory Land where Noa was the ruler. The sweetest hell. It was no wonder she could so easily forget. I’d been the fool to get a tattoo as a reminder of her ownership of me right where I could see it every day. She’d been the smarter of the two of us to get it somewhere she didn’t have to see it. But did anyone else ever see it and ask her what it meant? And if they did, what did she say? What did she feel in that split moment when she allowed herself to remember that night when we ventured out into the world after hours of lovemaking and marked each other in a way the world couldn’t ignore? Did I own her in that moment? My chest constricted at the thought. Even if she was mine for only that moment, I’d take it. Moments strung together like Christmas lights were enough to make the world just a little brighter. I didn’t wipe the mirror when my image began to cloud with steam again. The dark smudge of the words in my skin were still visible. I remembered those four words and what they meant to me. She only seems free. She no longer seemed free. She was free. Noa was free of me. I dressed with care, as I usually did. Having a put-together appearance usually kept people off my back. If I looked like I had it all, no one would doubt it. I was grabbing my favorite pair of dress shoes when my hand brushed against something. I closed my eyes momentarily before grabbing it and straightening. My camera. The one Noa had gotten me for Christmas. What Noa didn’t know was that this device, built with plastics and metals and glass had moments of ours trapped inside. I turned it on, ignoring the flicker indicating a low battery. A few button presses later and there she was. The smooth expanse of naked skin, her hair piled on top of her head, her fresh tattoo, the bubbles surrounding her. I caught her before I started cooking dinner. Pressing the button with the arrow pointed right, it was like watching her come to life in slow motion. Each inhale, exhale, and inhale…as if she were taking deep calming breaths. If I listened close enough, I could hear the sound of the water filling the tub. The camera’s screen shut off, and just like in real life, I hadn’t experienced her nearly enough. A story without a conclusion, a movie cut off nowhere near the end credits. I shoved the camera back where it was hidden. I wouldn’t charge it. I hadn’t touched it since the day Noa gave it to me. As I turned off the light in the closet, I shook my head. I’d likely charge it as soon as I got home from work. Each memory was a hit of emotion. It reminded me that I was living and breathing. Cynthia A. Rodriguez hates writing her own bio. In her spare time, you can find her watching movies, ranging anywhere from classic movies to action flicks (she has a weakness for Marvel adaptations), and reading steamy novels. She is stationed in North Carolina, where she lives with her husband and their Miniature Pinscher, Winnie (as in Pooh).
Q: Prevent moveRowAtIndexPath beyond fixed index I have a UITableViewController displaying dynamic table data with an additional row at the end (using a separate cell prototype) containing an 'Add' button. I'd like for users to be able to re-order the table rows but prevent them from moving a row to a point after the last row. I've implemented: override func tableView(tableView: UITableView, canMoveRowAtIndexPath indexPath: NSIndexPath) -> Bool { return indexPath.row != elements.count } To prevent users moving the 'Add' table row and am also testing for if(toIndexPath.row < library.regularTasks.count) inside override func tableView(tableView: UITableView, moveRowAtIndexPath fromIndexPath: NSIndexPath, toIndexPath: NSIndexPath) which prevents the rows being swapped in the model. However I can't see a way to prevent the rows being dragged beyond the last row in the UI A: Found it! I used: override func tableView(tableView: UITableView, targetIndexPathForMoveFromRowAtIndexPath sourceIndexPath: NSIndexPath, toProposedIndexPath proposedDestinationIndexPath: NSIndexPath) -> NSIndexPath { // Test whether destination is allowed if(proposedDestinationIndexPath.row < elements.count){ return proposedDestinationIndexPath // if allowed move to proposed destination }else{ return sourceIndexPath // if not, send back to where it came from! } }
From a ghosts exist point of view.. Yes, haunted objects exist. There's tons of stories out there about ghosts popping up when their remains are disturbed or sticking around till their remains are properly buried. Bad luck or weird stuff happening after taking something home from a haunted place, cursed gems, haunt stories following objects like bits from the Titanic or something dug up from a war field. From a personal point of view, I'm not sure. I've known some people personally that have claimed weird or haunted object stories. Some of them, yeah, I doubt it. Some of them I'm not too sure if I should doubt their word. From a ghosts don't exist point of view. No, no haunted objects. But I believe that objects can sometimes store or hold energy, and that might cause the appearance of haunting.
Q: Makefile profiling So I have this Makefile based build system that my users feel is working too slowly. For the sake of this question lets define performance as the time it takes make to figure out what it should actually do. I can see some avenues for optimization -- Reducing the number of times Makefile is parsed and the DAG recalculated due to including a Makefile fragment. Reducing the number of going to an external Makefile with make -C Reducing variable expansions etc. -- however I want to know first where are my bottlenecks. Since optimization without profiling is a waste of life, I want to ask: How to profile a Makefile? Assume that the system I inherited is fairly well designed, i.e. it already implements the most common tricks of the trade: (mostly) non recursive make, ccache, precompiled headers, auto generated header dependencies etc). ... and just to preempt some of the possible answer. I know that there might be faster and better build systems then GNU make - (Personally, I am eagerly waiting to see what the CMake folks will come up with regards to the Ninja system) - but unfortunately swapping build system is not in the cards. A: Since you're interested in the time it takes Make to decide what to do, rather than do it, you should look into options for getting Make to not actually do things: -q (question) will have it simply decide what has to be done, do nothing, print nothing, but return an exit status code indicating whether anything has to be done. You could simply time this for any target you're interested in (including "all"). -n (no-op) will have it print the recipes, rather than execute them. Watching them scroll by will give you a general sense of how Make is spending its time, and if you like you can do clever piping tricks to time the process. -t (touch) will have it touch the target files that need to be rebuilt, instead of actually rebuilding them. A script could then look at the update times on the files, find the big gaps and tell you which targets required a lot of forethought. EDIT: I WAS WRONG. Make constructs the DAG and decides which targets must be rebuilt before it rebuilds any of them. So once it starts executing rules, printing recipes or touching files, the part of the job we're interested in is over, and the observable timing is worthless.So the -n and -t options are no good, but -q is still useful as a coarse tool. Also -d will tell you Make's thought process; it won't tell you timing, but it will indicate which targets require many steps to consider.
Variability in odor-modulated flight by moths. Based on previous studies of odor-modulated flight where track parameter data was lumped and averaged, the speed and orientation of the moths' movement along their flight tracks have been said to be controlled to maintain certain "preferred" values. The results from our fine-scaled analysis of this behavior show that none of the track parameters typically measured are held constant. The moths' speed along the flight track is modulated substantially and predictably: fastest along the straight legs and slowest around the turns. In addition, about half of the individuals studied progressively reduced the peak speed along the straight legs as they approached the pheromone source. While most of the track legs between the turns were directed upwind, their orientations were widely distributed, indicating no preferred direction. Small fluctuations of orientation along some straight legs suggest corrective maneuvers to stabilize flight direction about an internal set point. The visual inputs hypothesized to control steering and speed, transverse and longitudinal image flow, changed continuously during upwind flight in pheromone, but no regular relationship between them was observed. We found that the orientation of the longitudinal body axis and the direction of thrust (course angle) were only rarely coincident during upwind flight to the odor source, suggesting that moths receive sensory input which differs quantitatively from that calculated by conventional methods. Our results strongly suggest that the long-accepted hypothetical mechanisms of control for this behavior do not operate in the manner in which they have been proposed.
Statistical confidence for likelihood-based paternity inference in natural populations. Paternity inference using highly polymorphic codominant markers is becoming common in the study of natural populations. However, multiple males are often found to be genetically compatible with each offspring tested, even when the probability of excluding an unrelated male is high. While various methods exist for evaluating the likelihood of paternity of each nonexcluded male, interpreting these likelihoods has hitherto been difficult, and no method takes account of the incomplete sampling and error-prone genetic data typical of large-scale studies of natural systems. We derive likelihood ratios for paternity inference with codominant markers taking account of typing error, and define a statistic delta for resolving paternity. Using allele frequencies from the study population in question, a simulation program generates criteria for delta that permit assignment of paternity to the most likely male with a known level of statistical confidence. The simulation takes account of the number of candidate males, the proportion of males that are sampled and gaps and errors in genetic data. We explore the potentially confounding effect of relatives and show that the method is robust to their presence under commonly encountered conditions. The method is demonstrated using genetic data from the intensively studied red deer (Cervus elaphus) population on the island of Rum, Scotland. The Windows-based computer program, CERVUS, described in this study is available from the authors. CERVUS can be used to calculate allele frequencies, run simulations and perform parentage analysis using data from all types of codominant markers.
Style Perspective Eknath Easwaran writes from the perspective of a follower and admirer of Mahatma Gandhi who is uniquely suited to identify with Gandhi's upbringing and the philosophy and perspective of his countrymen, having shared a very similar background. Easwaran tells his story as it happened historically, but interjects throughout with explanations of the spiritual truths that were guiding the revolutionary, and quotes from both Gandhi's own writing and the writings that inspired and guided him. Since Easwaran is also Indian, he knows both the psychology of the people whom Gandhi was trying to inspire and the spiritual tradition he was calling on. Living in turn of the century India, the British presence was very large, and its oppression of the Indians was overt and oppressive. The Indian people, even as they felt the injustice of British rule, were also demonstrating their own egos in their observation of the...
She may have stripped at some point to get someone to do what she wants. Power comes in many forms after all. But in this game she's fairly certain she's going to win. Or she was before someone blew up the table...
Several gun-related businesses were suddenly — and without warning — disrupted in recent weeks when Intuit stopped processing credit card payments because phone and internet sales were gun-related, The Post has learned. Some of the payments stopped didn’t even involve firearms, but simply T-shirts and coffee mugs and gun safety classes, according to small business owners. As a result, the businesses had to scramble to track down customers to get them pay their bills after Intuit credited back to customers’ accounts the purchases — even if the T-shirt was already shipped or the class already taken, one businessman told The Post. At Gunsite Academy, a Paulden, Ariz., company that provides marksmanship training in addition to selling guns that ship to a licensed gun shop near the customer’s home, Ken Campbell was dinged by Intuit’s action. Campbell, a former Indiana sheriff, had just switched credit card processors this spring — to Intuit, the parent of TurboTax and Quicken software — when the trouble began, he said. Intuit told Campbell it mistakenly believed firearm sales were being made directly to the customers, which it requires for such items. Campbell explained the guns were shipped to a local dealer with a federal firearms license who ran the required background checks. Intuit was unmoved. Campbell said if he knew of Intuit’s stance, he would have simply moved back to his previous processor. “It’s fine, it’s capitalism, and if you don’t want to do business with us, we don’t want to do business with you,” he said. Intuit did not return several requests for comment prior to deadline. It later stated, “As an American company, we respect the US Constitution and all the rights contained in it…For these transactions our bank partner requires them to be done face-to-face…Our policy today requires the customer to be present to swipe their credit card.” This would mean, for instance, that it would process a firearm sale at a store, but not if the credit card was keyed in through the internet or over the phone. Honor Defense, a Georgia firearms maker that ships only to other dealers, had a similar experience with Intuit. Gary Ramey, president of Honor Defense, told Gun Talk radio host Tom Gresham that Intuit “reversed charges” on his customers as well. Honor Defense could not immediately be reached for comment.
She is held without bond on one count of felonious assault and scheduled to face a judge Friday morning.
Q: How to embed a NOT Downloable PDF in your website? I want to embed a PDF in my PHP based website. The Content in my PDF is unique and written by me and i want my web site viewers to view and read content but i dont want them download those pdf file. Can can one help me out??? A: If that's your goal, you cannot include the PDF data in the web page. In order for the browser to display the PDF, it has to be able to download it; at that point, all bets are off. To do what you describe, you'd have to render the output in some form that isn't readily reused, such as an image, or by embedding a Flash or Java applet and having it render the text graphically. But doing that means the content can't readily be indexed by search engines.* And of course, anyone sufficiently-motivated can apply optical character recognition to get the text. (* Search engines are really smart these days, but I don't think they regularly apply OCR to images in hopes of finding index-able text there.)
The official cause of death was cardiopulmonary arrest, which was brought on by three medical conditions that Mary had been fighting. She did not suffer a heart attack, her heart instead stopped beating. The contributing factors to Mary‘s death “were aspiration pneumonia, hypoxia (lack of oxygen to her tissues) and diabetes mellitus,” according to TMZ.
[A comparative study of the efficacy of praziquantel and its liposomal form in experimental opisthorchiasis]. Intensive and extensive efficacy of praziquantel pure and that included in multilamellar liposomes was studied. As a result, a high anti-helminthic activity of liposomal praziquantel has been established. Negative effect of praziquantel on protein synthetic and enzymatic function of the liver has been revealed in normal animals. The treatment with liposomal praziquantel led to a rapid normalization of total lipid and bilirubin levels, thymol turbidity test, transaminase indices and also to a decrease in dystrophic liver changes.
Q: Do consent forms genuinely contribute to safer playing environments in practice? The new hype this year seems to be consent forms for RPG Sessions, especially in the contexts of horror games. There are many kinds of consent forms, but their function is in letting people provide a list of trigger subjects (like murder, rape, violence, etc) which they want to either exclude or include in the game so as to ensure the game is "safe" for everyone on the table. They usually do this with a checklist and/or a freeform list. I'm all in on having a safe game, and keeping an eye open for players feeling bad during a game. Therefore, even my Kult sessions are tame because I don't think that exploitation is a valid way to generate tension. But other people might have different experiences. In my layman's view, I'm concerned the consent forms aren't effective and may be damaging. I'm worried that some players will leave difficult topics unmentioned on their consent form that will in fact be difficult for them during a game (whether out of discomfort checking the box, being unaware it's going to be a triggering topic for them, or outright peer pressure prompting them to leave the box blank). In this situation, a session might end up running into that topic, and then the GM might assume that the tension they see at the table is due to the setting and not something that is triggering a player. (In contrast, any topic the players are comfortable with should be sufficiently covered in a pre-game chat.) However after trying to research whether this seriously manifests as a problem I could not confirm or rebuke it. Do consent forms actually assist in creating a safe gaming environment in a meaningful way, or otherwise provide benefits for gameplay? A: Consent forms have issues because they can never be specific enough, but may still be useful for some people. It is worth having a discussion, especially in horror, about what players may be comfortable or uncomfortable with. I know some people that think consent forms and related tools can help with that discussion. I personally do not use them as a GM, because they are simply never specific enough. For instance, people that may be perfectly comfortable with a game that includes murder and violence in graphic detail may become incredibly uncomfortable with the same thing involving a child in any form. I have dealt with more than one player like that. Also, things change. People normally comfortable with horror and murder in games may not be comfortable with it for a time after a close family member dies. I've seen this happen too. Similarly, you might find someone that thinks a mention of sexual assault as part of backstory is perfectly acceptable (and its a common starting point for a revenge rampage in horror), but would find details about it uncomfortable. For that matter, you may have disagreements over what constitutes "detailed". Personally, I find a general discussion supported by X-Card's far more useful. They provide a simple way for a player to communicate with minimal effort that the current topic is unpleasant. Also, this question is highly related and may be useful. As a side note, while this topic most clearly comes up in horror it is not limited to that. I once played a strongly lawful good character in AD&D until an NPC magically reversed my character's alignment. The DM described it as my character being inclined to do the opposite of his normal actions in all moral matters. The game was lighthearted and combat focused until then, but the DM quickly became uncomfortable, had a discussion, and invented a reason to remove the change on the spot. A: Depending on what you mean by "form", they can help or hinder. In all the games I run, I ask the players for a list of things they want, would like, would not like, and do not want in the game. The understanding is that anything not specifically in the "do not want" list might be included. In a horror game, that can include anything whatsoever however horrible directly aimed at scaring the player and their character. However, there is a "safe gesture" (a time out) that immediately stops the game in case anyone feels they need a break. I have run many successful horror games in that format without triggering PTSD from the players which included rape survivors, arachnophobes, and domestic abuse survivors. For example: I want a car chase → There will be one or more car chases. I would like a house fire → Meh, if it fits I will include one. I would not like horses dying → If it ever happens, it will be off camera. I do not want spiders → Spiders are utterly irrelevant to whatever is happening and will never be either on or off screen. Clearly, if a player is not comfortable with sharing those with the other players, they can just let me know privately. However, they need to understand that other players may err without knowing about it. Since I know as a GM, I can do the "safe gesture" and keep whatever and whomever a secret. After all, not everyone is happy their friends knowing they were raped. Finally, keep a eye on what is happening around the table: if a player mention their cat just died, the NPC cannibalistic cult probably should not have kitten soup… Apply Wheaton's rule. If you consider my approach a form, then yes, it is helpful. On the other hand, an up front list of things will never be exhaustive enough and does not provide a safety net in case something impromptu happens in the session. In that case, a form is not only useless but actively dangerous since it gives you a false sense of security. Note that someone might be fine with topic X one day, and utterly freaked out by the same topic the next day. Thus the need for a immediate "… and we're back in the real world" escape mechanism.
Q: Generate new component while NG Live Development Server is running? I created an angular2 project using angular-cli. Project is working fine. I used ng serve command to run it locally for development. Below is the snapshot of CLI after running the project: Now I want to create a new component using ng generate component command. I have to stop it first using Ctrl + C and then create the component and then start it again. Its time consuming. Is there any other and better way to do it? A: Open up a second cli window to run ng serve. A: Please note if you're using VSCode you can open a second terminal window by clicking the + symbol and then toggle between them using the dropdown. Other similar features may exist in other editors, of you can of course open a standard terminal window of your choice.
Q: UITextView in UITableViewCell scrolling problems Ok. I have made a custom cell for my table, and it contains a text view. When I have multiple lines in the text view, I can scroll up and down, but in doing this the table also scrolls. How can I stop this behaviour? If anyone needs parts of my code or further details, please just ask. I am more than willing. Thank you for your help A: I suggest you to move text edit (write) behavior to another view controller. If you need read-only functionality from it then just increase cell and textView height.
Persipas Paser Persipas stands for Persatuan Sepakbola Indonesia Paser (en: Football Association of Indonesia Paser). Persipas Paser is an Indonesian football club based in Paser Regency, East Kalimantan. Club played in Liga Indonesia First Division. References External links Liga-Indonesia.co.id Category:Football clubs in Indonesia
Did You Know... Also note that the unnamed “prominent civil rights organization” that the DHS hit job cites to stoke anti-military paranoia is the left-wing Southern Poverty Law Center — which designated the American Legion a “hate group” for its pro-enforcement stance on immigration law.
Q: iOS: Best way to distribute single application to ‘N’ no of clients with automate I’m deploying an iOS application . I want to distribute my single application to ‘N’ no of clients with different bundle identifier, version number and client specific fields like (appID, password, clientName, clientID and etc) for each client. In the later stages my build process have to be automated for CI. Can any one suggest me an efficient way of doing it? I have already done and see a success to the following approaches. By creating independent ‘targets’ for each clients. By creating multiple schemes to map seprate info.plist file. ref: followed this link However , I want to know the best possible way of doing it . A: Not sure if this is the best way, however some time ago I created a Swift utility for configuring an Info.plist for multiple environments. You create a base Info.plist file and then, for each key that will differ across environments, a separate file called an EnvFile that encapsulates an environment, by name and each of its unique keys. The utility can then merge in the keys for a specific environment to the base Info.plist. Example: backdrop.swift --select staging I used it for having the CI server automatically uploading dev, staging and production builds. There are also tools like Fabric now, that do this kind of thing, though I'm not sure if it has then env management feature yet.
This invention relates to an ultrasonic cross-sectional imaging apparatus. In the known ultrasonic cross-sectional imaging apparatus such as an ultrasonic diagnosis apparatus, both raster scanning of a display device and ultrasonic scanning are effected in interlaced fashion. That is, one frame is formed of two fields, and after a first field has been scanned, the second field is scanned along lines each extending between and parallel to the scanning lines of the first field. A time lag is inevitable between the scanning of the first field and that of the second field. Due to the time lag, images formed on the two fields are not completely superposed, particularly when a tomograph of a quickly moving object, e.g. the heart is taken. As a result, the resulting one-frame image is deformed. Raster scanning of the display device and ultrasonic scanning may be carried out in non-interlaced fashion. In this case, however, a one-frame image is not so deformed as in interlaced fashion, but it would flicker since regions constituting one frame are sequentially scanned.
The U.S. Government relies on space systems to provide global intelligence, surveillance, and reconnaissance (ISR), communications, and positioning, navigation, and timing (PNT) services for the Department of Defense (DoD), intelligence communities (IC), and civilian agencies. Current space systems are, in general, not resilient to contested environments and cannot be quickly replaced due to their high cost and long development timelines. Because the various ISR space systems are not integrated together (i.e., they are stove-piped), they rely on ground-based processing of the data, which adds significant latency to the information gleaned from the spacecraft such that in many instances it is not tactically relevant, but only useful for use strategically. Wherefore it is an object of the present disclosure to overcome the above-mentioned shortcomings and drawbacks associated with the conventional activity based intelligence (ABI).
Q: Connect points along bathymetry contours I have a table with start and end point data in each row and need to convert them into lines, but I would like something other than a straight segment. Ideally, I want to connect the points via a segment that is determined by the bathymetry of the area (so along the same bathymetry as the start and end points). I have both raster bathymetry layers and contour shapefiles. The only way I can think to do this is create a raster layer with the difference in bathymetry from the mean bathymetry of start and end points and create a least-cost path with large differences being very costly. I wanted to float the idea out there though to see if there are any automated or different ways to do this. Here is a diagram of what I have/want: The black lines are bathymetry contours, and the red points are examples of my start and end points. The blue line is the straight line segment that is how ArcMap tools would connect the two points. What I need is a line connecting them that follows the bathymetry contours, i.e. the path with the least amount of change in bathymetry from the start and end points. After exploring the idea, it is not feasible to simply snap the points to the bathymetry contour shapefile and split the lines, that would change the location of the points too much. A: I ended up doing this as described in the question. Here were the rough steps performed in a python scripted loop for each set of points: - record the bathymetry values for the start and end points - calculate an average of the two values - use raster calculator to create a bathymetry differences raster with the difference in true bathymetry from the averaged bathymetry - perform least cost path analysis using the raster created above as a cost raster - merge path into single feature and snap the ends (previously centered in the raster cells) to the start and end points - merge all the features into one shapefile And for the occasional set of points that were contained within a single bathymetry cell I just used a straight line segment. If you would like to see my code just comment on this answer, it is too bulky to post here.
The Formation Mechanism of Segmented Ring-Shaped Aβ Oligomers and Protofibrils. A clear understanding of amyloid formation with diverse morphologies is critical to overcoming the fatal disease amyloidosis. Studies have revealed that monomer concentration is a crucial factor for determining amyloid morphologies, such as protofibrils, annular, or spherical oligomers. However, gaining a complete understanding of the mechanism of formation of the various amyloid morphologies has been limited by the lack of experimental devices and insufficient knowledge. In this study, we demonstrate that the monomer concentration is an essential factor in determining the morphology of beta-amyloid (Aβ) oligomers or protofibrils. By computational and experimental approaches, we investigated the strategies for structural stabilization of amyloid protein, the morphological changes, and amyloid aggregation. In particular, we found unprecedented conformations, e.g., single bent oligomers and segmented ring-shaped protofibrils, the formation of which was explained by the computational analysis. Our findings provide insight into the structural features of amyloid molecules formed at low concentrations of monomer, which will help determine the clinical targets (in therapy) to effectively inhibit amyloid formation in the early stages of the amyloid growth phase.
Geostrategy-Direct The administration of President Donald Trump will ditch the passive approach of the previous administration in combating cyber attacks against the U.S., national security adviser John Bolton said. Continue reading this article with a Geostrategy-Direct Membership After clicking above to subscribe, new users may register below for access.
Passing Lincoln Lincoln Rock sits in the surf line on the southern end of Cannon Beach. Walking on this stretch of beach is always good for a least one painting. Getting the rich varied hues right on this chunk of basalt felt a bit like painting a portrait of someone, Abraham in this case.
Q: background image also header image cc trick how to do it? Not sure if this is the right way/place to ask, but on this website http://www.santacruzbicycles.com/en/us they have a statick background image, that does not move, but when you scroll the page, the text goes over the picture, a very cool effect. does anyone have a css tutorial or pointers, to how I can make a similar effect? edit: clarifying what I try to do: A: in this case, the div that contains the background image is made fixed. background-attachment: fixed; along with the background image css they put background-size: contain; background-position: center top; background-attachment: fixed; to make that image to attached at the top.
swarm: jmx: expression-expose-model.domain-name: AutoEndpoint jmx-remoting-connector: null resolved-expose-model.domain-name: AutoEndpoint show-model: true
The accusation against Khraish H. Khraish, who with his father owns hundreds of cheap rental houses in South Oak Cliff and West Dallas, is that he’s a slumlord who doesn’t maintain his houses within the requirements of city building codes, subjecting tenants to vicious living conditions. So how is it that when Khraish and his father met with the mayor a year ago, the mayor brushed off their attempts to discuss code violations and only wanted to talk to them about them selling their land? You can listen to that conversation here and judge for yourself.
Q: Incorporating %USERNAME% Variable in PowerShell PS1 Script For Creating Nuget Packages nuget pack C:\Users\%USERNAME%\Source\Repos\Common\Common\Common.nuspec -OutputDirectory D:\NugetFeed The above code is what is in my nugetpack.ps1 file. It works perfectly when I directly enter my username is the path, but I need it to be able to work for multiple users. I entered the %USERNAME% username variable into the path but I get the following response: Could not find a part of the path 'C:\Users\%USERNAME%\Source.....'. How can I use the %USERNAME% variable in my path. I am new to PowerShell. A: Environment variables in PowerShell are on the logical drive env:, but are otherwise syntactically normal PowerShell variables. The use of %...% is BATCH syntax. For PowerShell, use $env:varname, e.g., $env:username. You may also find that you need the information in "Run Executable From PowerShell Script With Parameters".
THE SMURFS Writers To Script POPEYE Movie Jay Scherick and David Ronn, the writers of THE SMURFS movie have been asked by Sony Pictures Animation to do an adaptation of the POPEYE comic, Deadline reports. The animated film would be 3D Stereoscopic. Scherick and Ronn are working a sequel to THE SMURFS and have completed an original script for BAYWATCH.
Purification of equine whole IgG snake antivenom by using an aqueous two phase system as a primary purification step. There is a need to introduce innovations in the manufacture of snake antivenoms to increase the supply of these products worldwide. In this work, the fractionation of equine hyperimmune plasma with a new methodology that includes an aqueous two phase system (ATPS) as a primary purification step was compared with the traditional method of caprylic acid precipitation. Hyperimmune plasma from horses immunized with the venoms of three snakes from sub-Saharan Africa was used as starting material for the production of both formulations. After being adjusted to the same lethal neutralizing activity, both antivenoms were compared in terms of their immunoreactivity, neutralization of in vitro venom activities, physicochemical characteristics, and stability. Their performance in terms of yield and purity was also assessed. The neutralization profile of in vitro enzymatic activities and the immunoreactivity, analyzed by ELISA and antivenomic approaches, were very similar for both preparations. Likewise, they behaved similarly in stability studies. However, ATPS-fractionated antivenom showed improved physicochemical profile and immunochemical purity and yield, mainly owing to its lower protein content. Additionally, this methodology allowed the recovery of albumin as a byproduct. ATPS purification constitutes a promising technology for antivenom production and should be further evaluated at preclinical and clinical levels.
Let's Shake Things Up A Bit! Excuse me, can you translate? I had a visit to the Zollamt today as a package of my own things had been mislabeled as merchandise by the friend who so kindly sent it and I needed to explain why the “merchandise” arrived with no receipt or pay duty if that explanation was not satisfactory. I took along a native speaker because interacting with public servants often requires the use of das Papierdeutsch, a term used seriously in dictionaries to represent the language of government and bureaucracy (hence the variants das Amtsdeutsch – “the German of a government bureau or agency,” das Beamtendeutsch – “the German of an employee of a government bureau or agency” and das Kanzleideutsch – “chancery or office German”) and used more lightheartedly (scherzhaft – “facetiously, playfully, humorously” to take another dictionary term) to mean “gobbledygook.” To get a feel for Papierdeutsch, imagine taking a fairly abstract concept and expressing it with a cumbersome compound noun rather than a simpler combination of noun and verb: die Nichtbefolgung – “noncompliance” rather than nicht befolgt “not followed.” And to make sure that you further obscure your point, try to use a passive sentence construction (z.B. Es wird darauf hingewiesen, dass… “It should be noted that” Wir weisen darauf hin, dass… “Please note that”) and substitute as many simple prepositions as you can with more complicated ones (z.B.betreffs – “regarding” – instead of wegen – “about”)! Thanks to http://www.werbewolf.ch/News-Inhalte/Sammel%20Duden/dujuni.html for these wonderful examples. I came away happy because with my German speaking friend’s help, the explanation of my US friend’s mistake was accepted, and while I can’t say I feel much more confident navigating Papierdeutsch, it was a great example of how language learning helps us recognize when we need to be humble and ask for help. I was also put in mind of the “Jive” scene in the film Airplane where a little translation is required and wondered if perhaps Monty Python had done any sketches poking fun at Papierenglisch?!
Q: How does the FDIC know how much to insure trust accounts? This page shows FDIC insurance on trust accounts is subject to the number of beneficiaries. Yet a bank will open a trust account given only the number of trustees, not the number of beneficiaries. An account with two trustees and one beneficiary might have $5m in it, a good amount of which the FDIC won't cover. So how does the FDIC actually know the correct grand total amount in all banks it is currently liable for? (I'm guessing they don't really know.) A: The FDIC periodically checks to make sure the bank is accurately accounting for all the deposits in the bank through a compliance Reporting Review verifies whether the insured institution accurately calculates and reports data upon which the FDIC assesses deposit insurance..... issues a report discussing the institution’s compliance with assessment reporting requirements, the effectiveness of the institution’s documentation, and the institution’s responsiveness throughout the review process.
using System; using System.IO; using Org.BouncyCastle.Asn1; using Org.BouncyCastle.Asn1.Ocsp; namespace Org.BouncyCastle.Crypto.Tls { public class CertificateStatus { protected readonly byte mStatusType; protected readonly object mResponse; public CertificateStatus(byte statusType, object response) { if (!IsCorrectType(statusType, response)) throw new ArgumentException("not an instance of the correct type", "response"); this.mStatusType = statusType; this.mResponse = response; } public virtual byte StatusType { get { return mStatusType; } } public virtual object Response { get { return mResponse; } } public virtual OcspResponse GetOcspResponse() { if (!IsCorrectType(CertificateStatusType.ocsp, mResponse)) throw new InvalidOperationException("'response' is not an OcspResponse"); return (OcspResponse)mResponse; } /** * Encode this {@link CertificateStatus} to a {@link Stream}. * * @param output * the {@link Stream} to encode to. * @throws IOException */ public virtual void Encode(Stream output) { TlsUtilities.WriteUint8(mStatusType, output); switch (mStatusType) { case CertificateStatusType.ocsp: byte[] derEncoding = ((OcspResponse)mResponse).GetEncoded(Asn1Encodable.Der); TlsUtilities.WriteOpaque24(derEncoding, output); break; default: throw new TlsFatalAlert(AlertDescription.internal_error); } } /** * Parse a {@link CertificateStatus} from a {@link Stream}. * * @param input * the {@link Stream} to parse from. * @return a {@link CertificateStatus} object. * @throws IOException */ public static CertificateStatus Parse(Stream input) { byte status_type = TlsUtilities.ReadUint8(input); object response; switch (status_type) { case CertificateStatusType.ocsp: { byte[] derEncoding = TlsUtilities.ReadOpaque24(input); response = OcspResponse.GetInstance(TlsUtilities.ReadDerObject(derEncoding)); break; } default: throw new TlsFatalAlert(AlertDescription.decode_error); } return new CertificateStatus(status_type, response); } protected static bool IsCorrectType(byte statusType, object response) { switch (statusType) { case CertificateStatusType.ocsp: return response is OcspResponse; default: throw new ArgumentException("unsupported CertificateStatusType", "statusType"); } } } }
Ardently anti-Trump View co-host Joy Behar rushed to socialism’s aid during the panel’s discussion about Tuesday night’s State of the Union address, claiming that the right had "distorted" its true meaning. Behar also boasted that Democrats actually do want President Trump to fail as payback for ruining the country. Co-host Abby Huntsman cited the positive reaction to Trump’s address and argued that Democrats should abandon socialism because it wasn’t a winning strategy to win over independents. That struck a nerve with Joy Behar, who proceeded to “correct” her: “I have to say the word Socialist is becoming a buzzword like liberal and feminist where the right wing is now taking that word and distorting it. So every time you use it I'm going to interrupt you,” she lectured, as the audience clapped in approval. “How is what Ocasio-Cortez is saying --” Huntsman started to retort but was drowned out by the other co-hosts. “Yeah, it is being used, its being weaponized,” Sunny Hostin agreed with Behar, who added, “It's being bastardized, that word. Nobody really understands it!” Behar also took issue with one aspect of Democrat Stacey Abrams rebuttal to Trump, talking about unity, and asserting that her party doesn’t want to see Trump fail. Instead, Behar boasted, she wanted Trump to “fail” because he was “so awful,” and for someone to rise up and “save” the country from him:
The present invention relates to the interconnection of parts such as a carrier vehicle and its payload under utilization of a clamping strap which grips around the parts to be interconnected and is run around bolts or pins which are arranged transverselly to the direction of tension as applied to or occurring on the clamping strap. The structure of the type referred to above provides a closing or connecting-and-fastening position such that the two pins are releasedly interconnected. Particularly, the invention relates to the interconnection of parts, aerospace parts under utilization of a clamping strap means having, at least in parts, two parallel running strands, straps, or latch portions which grip around parts or components to be interconnected, and, as stated, are run around pins or bolts which extend transversally to the direction of tension in the clamping strap, and wherein, in the closing position parts, strap to be interconnected for purposes of tensioning, are arranged in an overlapping relationship. Connections of the type to which the invention pertains are used in a variety of fields, including particularly the aerospace industry. The purpose here is, for example, in the case of space technology, to hold payloads on the final stage of a carrier rocket. As a target orbit has been reached, the connection is broken, by releasing the clamping strap. For this one uses equipment outlined more fully above. This type of connection is also known under the name of Marman clamping strap connection, wherein particularly on the inside of the clamping strap, there are arranged a number of clamping elements such as tension screws. These clamping elements have conical indents on the inside which reach over onto correspondingly shaped flanges or interface rings, of those parts on components to be interconnected. In the case of a Marman clamping strap, the clamping element tension screw is broken in some form or another, and the clamping elements are then pulled off the flanges or interference rings and thereby release the previously interconnected parts such that the payload is now separated from the rocket carrier, particularly at the final stage thereof. The known structures of this type are rather complex and thus not necessarily reliable.
Top positive review One of those movies where the lead is trained in a faction. Finally one where the whole long training period that took most of the film, was worth watching. Shailene was very well cast, and I thought Zoe Kravitz was hot. Even down to the closing music, I was never bored. Considering I had this on my watchlist for a while, and thought it might be just generic and empty. It was a surprise. Four and half stars easy, and five for being way better than expected. Top critical review This is far too similar to some of the hunger game concepts, with some novelties, but on the whole lacks bite and suspense and some incoherence and plot leaps of faith which even in a fantasy dystopian story are a stretch. Entertaining but very unfulfilling when you've seen it's much better movie cousin. Kate Winslet adds about the only bit of edge to this, and she's very good in the role. Everyone else, a big meh! There was a problem filtering reviews right now. Please try again later. One of those movies where the lead is trained in a faction. Finally one where the whole long training period that took most of the film, was worth watching. Shailene was very well cast, and I thought Zoe Kravitz was hot. Even down to the closing music, I was never bored. Considering I had this on my watchlist for a while, and thought it might be just generic and empty. It was a surprise. Four and half stars easy, and five for being way better than expected. There was a problem loading the comments at the moment. Please try again later. I enjoyed this film. A disaster has happened at some point and the civilisation was destroyed. A utopian state was set up divided up by what might be called castes. However you get to chose your caste as part of a coming of age ceremony. However the human race being what it is has intrigue and propaganda and the military caste resent the workers being the leading caste. Modern technology is then used to try and brainwash people but the heroes fight this in an attempt to save the city from the leaders who are also (in their minds) saving the city. We never do see what is outside the large fences defending the city and the reason for having a powerful military but it is set up at the end for a sequel of what is beyond the fence and that would be a sequel I would be interested in seeing. I am sure it is not perfect but I enjoyed the film and was interesting and kept my full attention that many films do not. There was a problem loading the comments at the moment. Please try again later. The first time I tried to watch this film, I gave up: it was confusing and not the kind of thing that appealed to me. But later I read the book and surprised myself by liking it. So I decided to try the film again and this time I understood what was happening and found it much more enjoyable. The film followed the book fairly closely and although I'm still left with questions, I thought it was well acted and this time round at least I was able to identify with both Tris and Four and appreciate the journey they take. There was a problem loading the comments at the moment. Please try again later. Really Enjoyed this film, focusing on human traits & plenty of action kept me watching!Thought provoking, & Good storyline as I wanted to know what was going to happen next..Wanted to watch the second film in this series but unfortunately when I last looked onlythe first and third film was on prime! I don't understand why the second film is not on prime!So I might not get to see the whole series which is a shame!Would recommend this first film of the series. There was a problem loading the comments at the moment. Please try again later. This film was absolutely top notch. I was pleasantly surprise how well the storyline and acting complimented each other so well. Is there a sequel? If so I can't wait to watch it. I thoroughly enjoyed watching it from start to finish. I highly recommend this movie. There was a problem loading the comments at the moment. Please try again later. I enjoyed it.Since the comparison has been used elsewhere....Unlike The Hunger Games there is a bit more originality and emotion.Watching the Hunger Games I figured I was watching a flick made for kids on the verge of adulthood.Watching Divergent I was drawn in, it's not entirely original but it is different and a lot of fun to view.I never bothered to watch the sequel to The Hunger Games, I will seek out the sequel to this one.... There was a problem loading the comments at the moment. Please try again later. This is far too similar to some of the hunger game concepts, with some novelties, but on the whole lacks bite and suspense and some incoherence and plot leaps of faith which even in a fantasy dystopian story are a stretch. Entertaining but very unfulfilling when you've seen it's much better movie cousin. Kate Winslet adds about the only bit of edge to this, and she's very good in the role. Everyone else, a big meh! There was a problem loading the comments at the moment. Please try again later. A very good film of its type. Good plot, interesting ideas and good characters, well filmed and well enough acted, with Kate Winslet being, inevitably, the outstanding performer. Very enjoyable and engaging.
Re: Burning Lossless Files to CD-A; Why the f@$k do SHNs take so damn long? Wouldn't decoding take just as long? I ask these being completely uneducated about it, the extent of my encoding experience was mp3 > cda back in the days when none of the burning software out there supported on the fly conversion..... Re: Burning Lossless Files to CD-A; Why the f@$k do SHNs take so damn long? Seriously, wouldn't just THIS be enough to convince the SHN folks that their closed source format is dead? I'd take FLAC over SHN any day of the week - moreover, if I had the time and knowledge, I'd spend my days converting every SHN set I have to FLAC and redistributing..! Re: Burning Lossless Files to CD-A; Why the f@$k do SHNs take so damn long? Decode as in SHN > WAV? Sure, but there will never be any sort of situation where I would want to convert ANY file to WAV - I'm only intersted in > CD-A conversion (which I suppose, is just a WAV, but if that's the case, I still don't get why it takes longer to do SHN > CD-A vs. FLAC > CD-A, if SHN is supposed to be faster... Re: Burning Lossless Files to CD-A; Why the f@$k do SHNs take so damn long? Quote: Originally Posted by rabble Seriously, wouldn't just THIS be enough to convince the SHN folks that their closed source format is dead? I'd take FLAC over SHN any day of the week - moreover, if I had the time and knowledge, I'd spend my days converting every SHN set I have to FLAC and redistributing..! Read Five's foobar2000 tutorial - it is simple to convert from SHN to FLAC. Not necessarily a speedy conversion, but really easy to do. __________________ how can I obey the rule about no sexually explicit posts after seeing Lynne's back? Quote: Originally Posted by Rider I think Gray has all these grand plans and I'm sorry to bring it up when it came down to it he couldn't even sell t-shirts without fucking it up. Re: Burning Lossless Files to CD-A; Why the f@$k do SHNs take so damn long? Quote: Originally Posted by rabble Decode as in SHN > WAV? Sure, but there will never be any sort of situation where I would want to convert ANY file to WAV - I'm only intersted in > CD-A conversion (which I suppose, is just a WAV, but if that's the case, I still don't get why it takes longer to do SHN > CD-A vs. FLAC > CD-A, if SHN is supposed to be faster... Your problem is that you're letting Nero do the converting while trying to burn the cd. It's trying to do two processor intensive jobs at the same time. To save yourself some time, use an external program to convert shn>wav, then burn the wav files to CD-A. After you burn the cd, delete the wav files and keep the shn files to make future CD-A's from. SHN>WAV is slightly faster than FLAC>WAV, using programs other than Nero to do the conversions. My computer has lots of trouble doing SHN > CD-A or FLAC > CD-A, so I just don't do it. If you're sick of shn files, just convert SHN>WAV>FLAC. Re: Burning Lossless Files to CD-A; Why the f@$k do SHNs take so damn long? Quote: Originally Posted by geordy Your problem is that you're letting Nero do the converting while trying to burn the cd. It's trying to do two processor intensive jobs at the same time. To save yourself some time, use an external program to convert shn>wav, then burn the wav files to CD-A. After you burn the cd, delete the wav files and keep the shn files to make future CD-A's from. SHN>WAV is slightly faster than FLAC>WAV, using programs other than Nero to do the conversions. My computer has lots of trouble doing SHN > CD-A or FLAC > CD-A, so I just don't do it. If you're sick of shn files, just convert SHN>WAV>FLAC.
This is an auto-generated system message. Please do not reply to this address. *** E-Mail Acknowledgment/Important Notice *** Receipt of this acknowledgment confirms that the e-mail message you sent to an employee of Morgan Stanley has been received. Please be advised, however, that it is not an indication that the message was opened and read by the recipient. **** Important Notice to Recipients **** It is important that you do not use e-mail to request, authorize or effect the purchase or sale of any security or commodity, to send fund transfer instructions, or to effect any other transactions. Any such request, orders, or instructions that you send will not be accepted and will not be processed by Morgan Stanley. ****************************************
Could Nursing Home Have Done More To Prevent Sexual Harassment? If you’re the victim of sexual harassment and you complain to management about the offending behavior, what actions must the company take? This question is at the root of many work-place disputes. A recent case from the Tenth Circuit, which includes Oklahoma, Kansas, New Mexico, Colorado, Wyoming and Utah, questioned if a nursing home did enough in response to an employee’s complaints of harassment. InAguiar v. Bartlesville Care Ctr., a nursing assistant complained to officials that a resident was groping her – kissing her had, touching her buttocks, and pulling her on top of him. She also complained that he was verbally harassing her. In response to her complaints, nursing home officials talked to the resident and required that two care givers be present when attending to the patient. The nursing home also provided that different caregivers give him his medicine. The nursing assistant claimed that these actions were not enough. Because the resident was free to move about the nursing home, he continued to seek out the nursing assistant and harass her. In one incident, after “exchanging words” the resident made a threatening hand gesture and pushed the assistant into a medicine cart. The assistant claimed that the nursing home “could have and should have done more once it learned that the few steps it took were ineffective.” Although the court did not make a final decision about whether these actions were enough, it found that given the resident’s history and the series of complaints, it is possible that a jury could find that the nursing home’s actions were inadequate. If you believe that you have been the victim or workplace harassment, the first thing to do is let a supervisor know. If they fail to take steps to stop the harassment or correct the situation you may have a claim for sexual harassment. The information on this website is for general information purposes only. Nothing on this site should be taken as legal advice for any individual case or situation. This information is not intended to create, and receipt or viewing does not constitute, an attorney-client relationship.
package squants.experimental.unitgroups.si.strict import squants.energy.Energy import squants.mass.Mass import squants.space.Length import squants.experimental.unitgroups.ImplicitDimensions.space._ import squants.experimental.unitgroups.ImplicitDimensions.energy._ import squants.experimental.unitgroups.ImplicitDimensions.mass._ import squants.experimental.unitgroups.UnitGroup import squants.experimental.unitgroups.si.strict.implicits._ import org.scalatest.flatspec.AnyFlatSpec import org.scalatest.matchers.should.Matchers class StrictSiSpec extends AnyFlatSpec with Matchers { behavior of "Strict SI UnitGroups" "The Strict SI UnitGroups" should "be implicitly derived for arbitrary dimensions" in { implicitly[UnitGroup[Length]].units should not be empty implicitly[UnitGroup[Mass]].units should not be empty implicitly[UnitGroup[Energy]].units should not be empty } }
The present invention generally relates to a digital printer and a technique for utilizing a printer, and more particularly, to a technique for realizing harmonious use of a plurality of printers which differ from one another in terms of a language interpretation capability, a network communications function, or a rendering capability, for using an underperforming printer in the same manner as a high-performance printer, or for causing a plurality of printers to complement to one another with regard to performance deficiencies. Various languages have been developed for use in describing print commands supplied to a printer from a host computer. Of these languages, some, such as a page description language “PostScript™” of Adobe Systems Incorporated in the U.S., have a very versatile expression capability and are capable of freely expressing complicated graphics which cannot be described by any other language. So long as such a high-function, high-level language is employed, complicated graphics can be printed beautifully at high speed. To this end, the printer must have a function of being able to interpret and render the high-function language. However, a printer capable of interpreting a high-function language such as PostScript is more expensive than a printer capable of interpreting solely a lower-function language. In a case where there are used a plurality of printers connected to a communications network, e.g., a LAN, if printers compatible with a high-function language are selected for all the printers, a very high cost will be incurred at the time of introduction of the printers. When a plurality of printers are connected to the network, the following problem will arise. More specifically, provided that a plurality of types of printers (e.g., page printers and serial printers) are connected to the network or that a plurality of printers produced by different manufacturers are connected to the network, the language that can be interpreted differs from printer to printer. For this reason, the user of the host computer is required to determine beforehand a printer which he desires to use and to select a language (in effect, a printer driver) suitable for the printer. However, so long as print quality is guaranteed, use of any printer poses no problems for the user. Accordingly, it is convenient for the user to utilize various printers under a unified method without consideration of the type of printer or printer driver. In an existing communications network, e.g., the Internet, one terminal is usually assigned one IP address. Communication between network-compatible terminals, each of which has an IP address and a TCP/IP execution function, form the basis of the network. For example, in a case where all the printers disposed in an office are to be connected to the Internet, there are many types of existing printers which cannot be directly connected to the Internet, and hence an expensive network adapter must be attached to each of these printers, resulting in a considerably large economic burden. Further, there are many types of existing printers incapable of operating with the network. The foregoing problem may be expressed in terms of a more general problem: that is, a plurality of terminals including both network-incompatible terminals and network-compatible terminals are collected into one group (e.g., all the printers disposed in an office are collected into one group), and no existing means provides a relay function capable of connecting the entire group to a network. With regard to a relay function related to the network, in an existing line there is provided a router which performs a relaying operation called a routing operation (e.g., selection of a communications path, data exchange between adjacent networks, and management of IP addresses of the network) for routing data transferred over the Internet to a desired terminal. However, since the router is intended to relay data between domains within the Internet, the router cannot serve as means for solving the problem, i.e., means for connecting to a network a group including network-incompatible terminals such as those mentioned previously. A document—which is supplied via WWW service over the Internet and which is written in, e.g., HTML,—is a composite document comprising text characters and another type of resource, such as audio, a dynamic image, or a static image, embedded into the text characters. A plurality of types of resources are incorporated into such a composite document in their respective unique file formats. For example, a character file is incorporated in a text format, a HTML format, or a file format unique to an application used for preparing the file: a static image is incorporated into a composite document in a JPEG or GIF format; and a dynamic image is incorporated into a composite document in an MPEG format. An existing printer is provided with a mere renderer (i.e., a module for performing a rendering operation or preparing a print image of a document) corresponding to a certain printer control language. In an existing print system comprising an existing printer connected to a host computer, when a composite document such as that mentioned previously is printed, the host computer interprets the file format of each resource contained in the composite document. The host computer converts document data into data expressed in a specific printer control language understandable to the printer and transfers the thus-converted print data to the printer. The printer interprets the data expressed in the specific printer control language and prepares and prints a print image of the document. As mentioned above, an existing printer can understand only data expressed in a specific printer control language. In a case where data regarding a composite document are printed, the host computer must interpret various file formats contained in a composite document and convert the file formats into data described in the printer control language. However, in the case of a network-compatible printer capable of being connected to a network such as the Internet, the printer has the function of following a network communications protocol such as TCP/IP. Accordingly, if the printer can interpret and print a composite document capable of being transferred according to the communications protocol, great convenience is afforded to the user.
Novel stepwise normalization method for two-channel cDNA microarrays. Microarray experiments contain many sources of systematic errors. In order to extract biologically relevant information from microarray data, normalization needs to be applied to remove such variations. Although a number of normalization models have been proposed, it has not been well researched on how to select the most appropriate model with respect to the observed data. To tackle this problem, we propose A new stepwise within-slide normalization method, STEPNORM. It is a normalization framework that integrates various models of different complexities to sequentially detect and adjust systematic variations associated with spot intensities, print-tips, plates and two-dimensional spatial effects. We demonstrate the utility of STEPNORM on a set of well-studied cDNA microarray experiment.
Q: What is the prerequisite knowledge for learning discrete math? To become a better computer programmer I would like to take the time to learn discrete mathematics, but I am positive that I do not have the required existing knowledge to do so. So I would like to hear from the experts about what I really need to know to be able to take a discrete math class or to even be able to pick up a book and learn it on my own. The extent of my math knowledge now is basic algebra. Probably not even high school senior level. Where should I start? I am guessing I should start with college algebra(or possibly even a remedial algebra), but I don't know where to go from there. Do I need trigonometry? The calculus? Calc II? I wish I had worked harder in high school, but I didn't. Thanks for your answers. A: You do need to be reasonably comfortable with basic algebra, if only so that you don’t worry about it; you do not need trigonometry or calculus. (If I had my way, high schools would replace most of their calculus courses with discrete math and elementary statistics.) What you chiefly need is the ability to follow logical arguments. Oh, and you need to be aware that you’ll often be dealing with exercises that are much less routine in nature than those in the math courses that you’ve had so far. Most of the mathematical tools that you’ll use in an introductory discrete math course are pretty simple; the trick is generally figuring out which ones to use on a particular problem and how to use them.
The invention relates to methods and apparatus for reducing the distortion appearing in an amplified output signal. In particular, the invention relates to reducing distortion by predistorting an input signal. It is known to predistort the input signal to an amplifier to counter distortion imposed on the input signal by the amplifier. This makes the amplifier output assume a more linear relationship to the input signal. There are several known predistortion techniques for countering intermodulation distortion (IMD) imposed upon a signal by an amplifier. One such predistortion technique comprises removing a sample of the input signal (prior to amplification) and mixing it into itself repeatedly to produce components whose frequencies correspond to the frequencies of intermodulation distortion appearing in the output of the amplifier. These components are injected into the input signal to predistort it in such a way as to counter the intermodulation distortion imposed on it by the amplifier. It will be appreciated that the components produced by the predistortion signal by mixing the input signal sample into itself repeatedly only approximately mimic the IMD produced by the amplifier. Hence, IMD cancellation by this predistortion technique is imperfect. A second known technique for predistorting the input to an amplifier comprises the input signal through it. The output of the low power amplifier should therefore contain components whose frequencies correspond to the IMD created by the main amplifier operating on the main component of the input signal. These components can then be injected into the input signal to the main amplifier as a controllable predistortion. However, it will be appreciated that, again, the predistortion signal only approximately mimics the IMD characteristics of the main amplifier because the low power amplifier constructed will not have distortion characteristics which match perfectly those of the main amplifier. It is an object of the invention to provide a predistortion which accurately mimics the distortion characteristics of an amplifier which it is desired to linearise. It is another object of the invention to provide a predistortion in a power-efficient manner. According to a first aspect, the invention provides a method of reducing the distortion appearing in an amplified output signal, the method comprising the steps of: sampling a portion of an input signal destined for amplification by a first amplification process; amplifying the sample signal using a second amplification process whose distortion characteristics are at least similar to those of the first amplification process to produce an amplified sample signal; extracting a distortion signal from the amplified sample signal; combining the distortion signal with the input signal destined for amplification by the first amplification process to reduce distortion of its output; and combining the output of the first and second amplification processes to produce the amplified output signal; wherein the step of extracting a distortion signal comprises the steps of sampling the amplified sample signal and removing the amplified input signal appearing in this sample. According to a second aspect, the invention provides apparatus for reducing the distortion appearing in an amplified output signal, the apparatus comprising means for sampling a portion of the input signal destined for amplification by a first amplification means, second amplification means for amplifying the sample signal, to produce an amplified sample signal, the distortion characteristics of the second amplification means being at least similar to those of the first amplification means, means for extracting a distortion signal from the amplified sample signal, means for combining the distortion signal with the input signal destined for amplification by the first amplification means to reduce distortion of its output, and means for combining the outputs of the first and second amplification means to produce the amplified output signal; wherein the extracting means comprises means for sampling the amplified sample signal and means for removing the amplified input signal appearing in this sample. The invention thus provides that the power present in the output of the second amplification process is not wasted but forms part of the output signal, thereby enhancing efficiency. Furthermore, this makes it practical for the second amplification process to be a relatively high output power process, like the first (main) amplification process, which means that the distortion characteristics of the two amplification processes can match one another more accurately. In a preferred embodiment, the first and second amplification processes are implemented by amplifiers which are identical to one another. In a variation on this embodiment, the main amplifier comprises a number of amplification modules, which are identical to one another, operating in parallel on the input signal and the second amplification process (which creates the distortion signal for the predistortion process) comprises a smaller number of amplification modules of the aforementioned type operating in parallel. The arrangements used in these embodiments provide that the distortion characteristics of the two amplification processes match very well. The extracted distortion signal is subjected to amplitude and phase adjustment to ensure maximum cancellation of distortion in the output signal of the first (and, possibly, also in the second) amplification process. This allows the system to be adjusted as the distortion characteristics of the amplification processes vary over time, due, for example, to ageing and/or temperature variations. In a preferred embodiment, the invention provides for the input signal to the first (main) amplification process to be predistorted in such a way as to overcorrect the output signal of the first amplification process in a controlled manner. The benefit of doing this is that the controlled distortion in the output of the first amplification process can be arranged to cancel distortion present in the output of the second amplification process with which it is combined, thereby leading to a more linear overall output signal.
Transmission of information regarding the quantitative characteristics of an object in ants. Results of laboratory experiments demonstrating that ants are capable of assessing the number of objects within the limits of several tens and transmit this information to other individuals are described. It has been demonstrated that ants may use these capacities for transmitting information regarding the coordinates of an object.