text
stringlengths
12
4.76M
timestamp
stringlengths
26
26
url
stringlengths
32
32
DESCRIPTION {#S1a} =========== A 20-year-old man presented with 90% total body surface area third-degree burns from a gasoline fire in his basement. He underwent extensive fascial excisions of his burn wounds, including his neck and upper chest ([Fig 1](#F1){ref-type="fig"}). All wounds were resurfaced with cultured epithelial autograft. The patient\'s tracheostomy tube was decannulated after 1 year; however, his stoma failed to close spontaneously ([Fig 2](#F2){ref-type="fig"}). The patient voiced concerns about the cosmetic deformity, skin irritation, and mucous secretions. QUESTIONS {#S2} ========= **What is the cause and pathophysiology of the condition?What is the morbidity associated with them?What are the management options?How does the surgical treatment differ in the burn patient?** DISCUSSION {#S1} ========== The patient has a persistent tracheocutaneous fistula (TCF) which is a well-recognized complication of long-term tracheostomies. Removal of the tracheostomy tube usually results in rapid narrowing of the stoma, followed by spontaneous closure of the overlying skin; however, the tract may be more prone to fistula formation depending on the duration of cannulation. Longer periods of cannulation predispose the tract to epithelialization, reducing the ability to close. Kulber and Passy[@B1] reported that fistulae do not form when the cannulation period is less than 16 weeks; however, the likelihood increases to 70% when the cannulation period exceeds 16 weeks. The morbidity of persistent TCFs has both functional and cosmetic aspects. A TCF can cause difficulty in phonation and swallowing, skin irritation, intolerance to submersion due to aspiration risk, and ineffective clearance of secretions. In addition, unsightly deformities can lead to self-stigmatization.[@B2]^,^[@B3] The best method of management of TCFs is prevention. The need for tracheostomy must be continuously evaluated, and they should be removed expeditiously when no longer needed. However, burned patients may require long-term tracheostomies because of the multitude of surgical procedures and intensive care. Other management options include curettage and application of silver nitrate. In addition, electrocautery of the epithelial tract has been used to remove granulation tissue and its bioburden while promoting healthy tissue for wound contracture and ultimate healing. Several successful surgical techniques have been described including primary closure, fistulectomy with primary closure, and fistulectomy with closure by secondary intention. Bishop et al[@B4] described a 2-layer closure without fistulectomy composed of sternohyoid muscle flaps and a transverse skin closure. The important principle of his repair was to provide separation of the 2 suture lines (skin and trachea) by intervening muscle. A 3-layer closure was described by Schroeder et al,[@B3] in which the skin edges and fistula tract were excised down to but not into the trachea while leaving a distal 4-mm cuff of the fistula contiguous with the trachea. The cuff, being the first layer, was closed transversely to provide an airtight seal. A drain was subsequently placed anterior to this layer to prevent development of subcutaneous emphysema and pneumomediastinum. Sequentially, the strap muscles and skin were closed, completing the repair. A similar technique was described earlier in the literature by Haynes et al[@B2]; however, instead of a fusiform excision of the skin, a circumferential excision of only the tract was performed and without drain placement. The absence of a drain had no effect on the complication rate. The fundamental principle of a TCF repair in a burned patient is skin preservation which adds a degree of complexity. In the patient described, a tracheostomy tube remained for more than a year prior to decannulation. The difficulty in closing a persistent stoma in a burned patient is due to the lack of mobility of surrounding tissues from extensive scarring in addition to the lack of subcutaneous tissue that occurs with fascial excision. Moreover, cultured epithelial autograft skin is fragile making dissection of the muscle and skin all the more challenging. Bilateral, curvilinear incisions were performed on each side of the stoma allowing us to preserve the skin, dissect, and mobilize the sternohyoid muscles medially ([Figs 3](#F3){ref-type="fig"} and [4](#F4){ref-type="fig"}). Because of the significant existing scar tissue, deeper layers of the scar were not closed as in the techniques of Haynes et al and Schroeder et al in order to prevent iatrogenic tracheal stenosis. The sternohyoid muscles were sutured in the midline to occlude the stoma ([Fig 5](#F5){ref-type="fig"}), and the skin was closed transversely in interrupted fashion to provide a 2-layer closure ([Fig 6](#F6){ref-type="fig"}). The patient\'s fistula has remained closed. ![Fascial excision of neck.](eplasty14ic01_fig1){#F1} ![Midline neck defect following tracheostomy decannulation after one year.](eplasty14ic01_fig2){#F2} ![Bilateral linear incisions.](eplasty14ic01_fig3){#F3} ![Dissection of sternohyoid muscles.](eplasty14ic01_fig4){#F4} ![Medial advancement of sternohyoid muscles.](eplasty14ic01_fig5){#F5} ![Skin closure.](eplasty14ic01_fig6){#F6}
2024-04-21T01:27:17.760571
https://example.com/article/1695
Pages Saturday, September 10, 2011 I have developed a simple DLL, to facilitate code development in Excel. Without this component it would be necessary to write some extra code in Excel to develop our examples. As I have mentioned before, I am trying to avoid focusing too much on code (but we will need quite a bit) and focus more on getting results -this is really what matters. The DLL is available through SourceForge (click here to download) and the installation follows a standard Windows installation routine. I will make the source code of this DLL available through GitHub, for those who prefer to see what is under the hood. Once it is installed, it is quite simple to activate for use in VBA (MS-Office macro language). You will, in VBA screen, click on Tools > References and select OAS Integration Module as in the image below. This will allow you to reference the OAS API by simply creating an object. An example of this follows, using VBA;
2024-02-08T01:27:17.760571
https://example.com/article/6332
# -*- mode: snippet -*- # name: match n { Ok(x), Err(y) } # key: match? # uuid: match? # -- match ${1:x} { Ok(${2:var}) => $3, Err(${4:error}) => $5 }
2024-02-14T01:27:17.760571
https://example.com/article/6343
Q: Extracting existing and non existing values from 2 columns using pandas I am new to pandas and I am trying to get a list of values that exists in both columns, values that exist in column A, values that only exist in column B. My .csv file looks like this: A B AAA ZZZ BBB BBB CCC EEE DDD FFF EEE AAA DDD GGG HHH JJJ Columns have a different length and my outcome would be 3 lists or one csv that I would ouput having 3 columns, one for items existing in both columns, one for items existing in only A column and one for items existing in only B column. IN BOTH IN COLUMN A IN COLUMN B AAA CCC ZZZ BBB GGG FFF DDD JJJ HHH EEE (empty one) I have tried using .isin() module but it returns true of false rather than the actual list. existing_in_both = df_column_a.isin(df_column_b) And I do not know how I should try to extract values that only exist in either column A or B. Thank you for your suggestions. My actual .csv has the following: id clickout_id timestamp click_id click_type 1 123abc 2019-11-25 c51c56d1 1 1 123dce 2019-11-25 c51c5fs1 12 and other file is looking like this: timestamp id gid type 2019-11-25 1 c51c56d1 2 2019-11-25 1 c51c5fs1 2 And I am trying to compare click_id from first file and gid from the second file. When I print out using your answer I get the header names as answers rather than the values from the columns. A: Use sets with intersection and difference, then for new DataFrame are used Series, because different lengths of outputs: a = set(df.A) b = set(df.B) df = pd.DataFrame({'IN BOTH': pd.Series(list(a & b)), 'IN COLUMN A': pd.Series(list(a - b)), 'IN COLUMN B': pd.Series(list(b - a))}) print (df) IN BOTH IN COLUMN A IN COLUMN B 0 DDD CCC FFF 1 BBB GGG ZZZ 2 AAA JJJ HHH 3 NaN NaN 4 EEE NaN NaN Or use numpy.intersect1d with numpy.setdiff1d: df = pd.DataFrame({'IN BOTH': pd.Series(np.intersect1d(df.A, df.B)), 'IN COLUMN A': pd.Series(np.setdiff1d(df.A, df.B)), 'IN COLUMN B': pd.Series(np.setdiff1d(df.B, df.A))}) print (df) IN BOTH IN COLUMN A IN COLUMN B 0 CCC FFF 1 AAA GGG HHH 2 BBB JJJ ZZZ 3 DDD NaN NaN 4 EEE NaN NaN
2024-02-28T01:27:17.760571
https://example.com/article/9156
Q: Hibernate: Duplicate entries in reference table with unique primary key I have two tables Employee and Project Table Employee emp_id(PK- assigned) | emp_name | prj_id(FK prj_id of Project table) Table Project prj_id(PK- auto generated) | prj_name I am using many to one relationship between Employee and Project PROBLEM: When I run the below code: Project pro = new Project(); emp.setProject(pro); saveDetails(emp); public void saveEmployeeDetails( final Employee emp) { try { this.hibernateTemplate.saveOrUpdate( emp); } catch (Exception exception) { logger.info( "Unable to save details", exception ); } } It is updating Table Employee and Project but where in Project it is creating new entry for the same proj_name which is already present. It is updating Table Employee's data and. Since there is auto generated primary key for Employee and also i am creating new object for Project every time it is saving the new object. How to avoid duplicate entry ,I am very new to hibernate .I have very less knowledge on it. find the hbm files <class name="Employee" table="employee"> <comment>store details of a project</comment> <id name="employeeId" type="string"> <column length="45" name="emp_id" /> <generator class="assigned" /> </id> <many-to-one cascade="save-update" class="Project" fetch="select" lazy="false" name="project"> <column name="prj_id" not-null="true" /> </many-to-one> <class name="Project" table="project"> <id name="projectId" type="int"> <column name="prj_id" /> <generator class="identity" /> </id> <property generated="never" lazy="false" name="projectName" type="java.lang.String"> <column name="prj_name" /> </property> </class> A: Project pro = new Project(); pro.setPrj_Id(existingId); emp.setProject(pro);
2024-01-29T01:27:17.760571
https://example.com/article/7772
Spinopelvic Compensatory Mechanisms for Reduced Hip Motion (ROM) in the Setting of Hip Osteoarthritis. Retrospective review from a single institution. To investigate the effect of hip osteoarthritis (OA) on spinopelvic compensatory mechanisms as a result of reduced hip range of motion (ROM) between sitting and standing. Hip OA results in reduced hip ROM and contracture, causing pain during postural changes. Hip flexion contracture is known to reduce the ability to compensate for spinal deformity while standing; however, the effects of postural spinal alignment change between sitting and standing is not well understood. Sit-stand radiographs of patients without prior spinal fusion or hip prosthesis were evaluated. Hip OA was graded by Kellgren-Lawrence grades and divided into low-grade (LOA; grade 0-2) and severe (SOA; grade 3 or 4) groups. Radiographic parameters evaluated were pelvic incidence (PI), pelvic tilt (PT), lumbar lordosis (LL), PI-LL, thoracic kyphosis (TK), SVA, T1-pelvic angle (TPA), T10-L2, proximal femoral shaft angle (PFSA), and hip flexion (PT change-PFSA change). Changes in sit-stand parameters were compared between LOA and SOA groups. 548 patients were included (LOA = 311; SOA = 237). After propensity score matching for age, body mass index, and PI, 183 LOA and 183 SOA patients were analyzed. Standing analysis demonstrated that SOA had higher SVA (31.1 vs. 21.7), lower TK (-36.2 vs. -41.1), and larger PFSA (9.1 vs. 7.4) (all p < .05). Sitting analysis demonstrated that SOA had higher PT (29.7 vs. 23.3), higher PI-LL (21.6 vs. 12.4), less LL (31.7 vs. 41.6), less TK (-33.2 vs. -38.6), and greater TPA (27.9 vs. 22.5) (all p < .05). SOA had less hip ROM from standing to sitting versus LOA (71.5 vs. 81.6) (p < .05). Therefore, SOA had more change in PT (15.2 vs. 7.3), PI-LL (20.6 vs. 13.7), LL (-21.4 vs. -13.1), and T10-L2 (-4.9 vs. -1.1) (all p < .001), allowing the femurs to change position despite reduced hip ROM. SOA had greater TPA reduction (15.1 vs. 9.6) and less PFSA change (86.7 vs. 88.8) compared with LOA (both p < .001). Spinopelvic compensatory mechanisms are adapted for reduced hip joint motion associated with hip OA in standing and sitting. Level III.
2024-04-14T01:27:17.760571
https://example.com/article/7601
The Barcelona striker Lionel Messi has launched an outspoken attack on the "anti-football" tactics employed by Rangers during the scoreless Champions League draw at Ibrox on Tuesday. Messi, along with his fellow strikers Thierry Henry and Ronaldinho, endured a frustrating night in Glasgow against Walter Smith's team, although the former Arsenal player did not criticise Rangers for their approach to the game. "We had possession and weren't in any danger but we caused a lot of danger for Rangers," Henry said. "At the end of the day we got the point." Barça's inadequacies in failing to make the most of their opportunities were strikingly apparent. But the Argentinian Messi claimed: "It's incredible. Rangers didn't want to play football. Right from the start they went for anti-football and I'm left with a bitter taste in the mouth at not having been able to win the match because we had a decent number of chances. All we lacked was the finish. "It's a real pain playing against teams like that and it's very hard too. It'll be different at the Camp Nou." Despite Henry's apparent satisfaction with a point, Messi dismissed any suggestion that he and his team-mates were as satisfied as their hosts to settle for a draw in the closing stages, which keeps Barça and Rangers level at the top of Group E with seven points ahead of their second meeting on November 7. "We were tired and they weren't interested in trying to win so it was inevitable that the pace would drop," Messi added. Charlie Adam, the Rangers midfielder, made no apologies for his team's style. "We were playing against world-class players," Adam said. "And, no disrespect to any other side but that was perhaps the best team any of us will play against in our entire careers. For us to get a point was an unbelievable achievement and made it a night to savour. We battled away, and showed the attitude needed to get us a really good point. "Sometimes you just need to hold your hands up and say you're playing a great side and you just won't see a lot of the ball. It was a massive compliment for us that by the end, they seemed happy with a point as well." Sasa Papac, who was entrusted with the job of marking Messi, added: "I thought I was doing well to keep him [Messi] quiet and then the next minute I have Carles Puyol flying down the wing as well. We are really satisfied to have taken a point and now I believe we have a good chance to go through."
2024-05-28T01:27:17.760571
https://example.com/article/2075
Zonder de geblesseerde Donyell Malen is PSV er niet in geslaagd om te winnen van LASK Linz: 0-0. De Eindhovenaren lieten vele kansen liggen en troffen onder meer twee keer de lat. Malen, die de wedstrijd met een pijnlijke enkel vanaf de tribune bekeek, zag zijn ploeggenoten sterk beginnen aan het groepsduel in de Europa League. Na nog geen minuut spelen omspeelde Steven Bergwijn keeper Alexander Schlager en week daarbij iets te ver naar buiten. Bergwijn legde terug op Pablo Rosario, die Schlager op zijn weg vond. De sluitpost had even later een antwoord op een inzet van Cody Gakpo en had geluk dat Daniel Schwaab uit een hoekschop op de lat kopte.
2023-12-25T01:27:17.760571
https://example.com/article/9478
Who becomes chronic? Chronic social disablement is caused by three types of factor: impairment, e.g. slowness in schizophrenia; social disadvantage, e.g. lack of opportunity to develop social or vocational skills; and an underconfidence or unduly low self-esteem which is reactive to impairment and disadvantage. The last of these factors is particularly evident in 'institutionalism', a condition in which the individual comes to acquire a contentment with institutional life and wishes to lead no other. Many long-stay patients in large mental hospitals used to be 'well-institutionalized' but it became recognized that retraining and rehabilitation could lead to successful resettlement outside hospital. For a time these striking successes suggested to some theorists that abolishing the hospitals would abolish disablement as well but it is now quite clear that this is not the case. Chronic impairments still occur and create a continuing need for sheltered environments. The frequency and type of problems still arising are discussed in the light of recent surveys in England. One small group requires highly-staffed accommodation, others need less supervised day and residential settings; all need long-term care. It is emphasized that some people living at home with relatives also have chronic mental disabilities as have a high proportion of the destitute. Such problems are less frequent than formerly but they still require detailed medical and social attention.
2023-08-14T01:27:17.760571
https://example.com/article/1641
Delhi HC stays CBI court's order on Jharkhand coal scam ANI | Updated: Jan 02, 2018 17:11 IST New Delhi [India], Jan 2 (ANI): The Delhi High Court on Tuesday stayed the Special Central Bureau of Investigation (CBI) court's order which awarded a three-year jail term to former Jharkhand chief minister Madhu Koda in a coal scam case. The court has also stayed the fine imposed on Koda until the next date of hearing. Koda was convicted in the case of illegal allocation of a coal block in Jharkhand to a Kolkata-based firm. The Special CBI court in Delhi had, on December 16, 2017, sentenced Koda to three years of imprisonment, along with his close aide, Vijay Joshi, former Coal Secretary HC Gupta and Jharkhand's then chief secretary AK Basu. The court also imposed a fine of Rs 25 lakh each on Koda and Joshi, while a fine of Rs 1 lakh was slapped each on Gupta and Basu. Private company Vini Iron and Steel Udyog Ltd (VISUL) was also found guilty of criminal conspiracy and cheating under the Prevention of Corruption Act and was slapped with a fine of Rs 50 lakh. The allocation of the Rajhara North coal block is one of the instances of alleged inefficient allocation of coal blocks during 2004 to 2009. The coal scam hit headlines in 2012 after a Central Government audit revealed that the country had notionally lost upto Rs 1.86 lakh crore due to the inefficient allocation of coal blocks. (ANI)
2024-07-28T01:27:17.760571
https://example.com/article/4895
Utenos pramogų arena Pramogų arena formerly known as Vilnius Ice Palace is an arena in Vilnius, Lithuania. The Arena was built in 2002. There is a skating rink (sports, fine, speed, individual and mass skating possible), a cafe with 2 halls (50 seats in the first floor, 150 seats in the second floor; up to 200 guests during the buffet). Hockey or curling can be played in the arena. The arena holds about 2.5 thousand spectators during hockey competitions, concerts, or, if the stage is set at the end of the arena, 4 thousand spectators. World-class star concerts take place in this arena. External links Official website Category:Indoor arenas in Lithuania Category:Sports venues in Vilnius Category:Indoor ice hockey venues in Lithuania
2023-11-11T01:27:17.760571
https://example.com/article/7008
The Emperor's New School: Rabbit Face: Watch the Full Episode Now Rabbit Face Date: 01/27/06Season 1, Episode 1 Full Episode: Kuzco faces his first threat of losing his position as Emperor when he struggles in P.E. and his teacher threatens to flunk him if he can't win a race with Kronk. However, Principal Amzy (who is really Yzma) tells Kronk to turn Kuzco into a turtle so he has no chance of beating Kronk, but instead, Kronk gives Kuzco the wrong potion and he ends up as a rabbit.
2023-10-11T01:27:17.760571
https://example.com/article/1898
Measuring reproducibility of dose response data for the Pig-a assay using covariate benchmark dose analysis. The reproducibility of the in vivo Pig-a gene mutation test system was assessed across 13 different Japanese laboratories. In each laboratory rats were exposed to the same dosing regimen of N-nitroso-N-ethylurea (ENU), and red blood cells (RBCs) and reticulocytes (RETs) were collected for mutant phenotypic analysis using flow cytometry. Mutant frequency dose response data were analysed using the PROAST benchmark dose (BMD) statistical package. Laboratory was used as a covariate during the analysis to allow all dose responses to be analysed at the same time, with conserved shape parameters. This approach has recently been shown to increase the precision of the BMD analysis, as well as providing a measure of equipotency. This measure of equipotency was used here to demonstrate a reasonable level of interlaboratory reproducibility. Increased reproducibility could have been achieved by increasing the number of cells scored, as this would reduce the number of zero values within the mutant frequency data. Overall, the interlaboratory trial was successful, and these findings support the transferability of the in vivo Pig-a gene mutation assay.
2024-05-19T01:27:17.760571
https://example.com/article/3362
Sorry, this site requires JavaScript. Your browser either does not support JavaScript or scripting is turned off in your preferences. From Linda, Child's Age 15 - 06/01/08 - IP#: 72.190.47.xxx Click here to reply Hello my name is Linda and my daughter Brittany is 15 years old. I am very concerned about her. About a month ago i started to notice she wasn't wearing any of her old clothes she used to and when i asked why she just said she didn't like them anymore. And everytime i told her i wanted her to go weigh herself she said she was fine and she had been watching her weight so i let things go for a couple of weeks. Last week i decided to take her to the doctor. About a year ago she weighed 364 which is already massive and i found out she had gained 68 lbs and now weighed in at 432. i was very disturbed when i heard she had gained so much weight over the course of a year. Me and my husband have tried putting her on diets and exercise programs but she is too big to really exercise much and she says she eats because she likes being "fat" and gaining weight and having a huge stomach.I dont understand this at all and i really need someones help to get my daughter to change her mind and want to lose weight. Please someone help me do something. It would be greatly appreciated. Thank you Reply from Linda, Child's Age 18 - 02/04/14 - IP#: 198.50.134.xxxHave you considered weight loss surgery for your daughter? My 18 year old daughter is going to have lap band surgery next to give her a fighting chance to live a longer life. My poor baby is bed bound, weighs nearly 600 pounds and has all the obesity related diseases. My baby and I decided to do the surgery because her doctor told us that she is at the point of dying at any moment. At first no one wanted to operate on her because she has a high risk of dying on the operating table due to her health but luckily we found a doctor in California who agreed to operate on her. My brave baby girl has agreed to the surgery even with the chance of dying. I know she will fight through this surgery because it's her only chance to live. I would hate to wake up one day and find her dead in the bed because her heart gave out from the excess stress. I wish I could take her place instead. Reply from Karren, Child's Age 2 - 06/17/08 - IP#: 195.93.21.xxxTalk to her about the dangers of been overweight. As for the exercise get her to start slowly with a short walk somewere. Reply from John, Child's Age 17 - 06/10/08 - IP#: 65.2.190.xxxMy son is the same, you should have your daughter chat with him, his e-mail is brollyistheman12@aol.com. Reply from Elle, Child's Age 12 - 06/02/08 - IP#: 212.30.5.xxxhello, i very much doubt she likes being fat and is probalby deeply hurting inside. the best thing i think you could do is to take her to the doctors and have her suggest an eating plan. purge the whole house of junk so food can be monitored. she may hate it at first but when she starts losing significant amounts of weight she will thank you. i suggest also taking her to a therapist as one option or trying to get her to be more open as she may suffer from binge eating disorder which is a fairly common eating disorder which needs to be treated like any other psycological problem. good luck keep us updated on her progress we will help as best we can
2023-09-22T01:27:17.760571
https://example.com/article/8586
// Copyright 2018 The Cockroach Authors. // // Use of this software is governed by the Business Source License // included in the file licenses/BSL.txt. // // As of the Change Date specified in that file, in accordance with // the Business Source License, use of this software will be governed // by the Apache License, Version 2.0, included in the file // licenses/APL.txt. package foo
2024-04-10T01:27:17.760571
https://example.com/article/6179
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** using System; using System.Collections.Generic; using System.Collections.Immutable; using System.Threading.Tasks; using Pulumi.Serialization; namespace Pulumi.Aws.S3.Outputs { [OutputType] public sealed class InventoryFilter { /// <summary> /// The prefix that an object must have to be included in the inventory results. /// </summary> public readonly string? Prefix; [OutputConstructor] private InventoryFilter(string? prefix) { Prefix = prefix; } } }
2023-10-31T01:27:17.760571
https://example.com/article/9424
1. Field of the Invention The present invention relates generally to an improved data processing system and more specifically to a computer implemented method, an apparatus, and a computer program product for managing package dependencies for an application installation. 2. Description of the Related Art Today, software dependencies, usually required during installation, are typically manually entered into data files. For example, an offering originally known as the Red Hat® Package Manager, available from Red Hat Inc., and abbreviated simply hereafter as RPM or as rpm is a package management system that stores software dependency information in data files. Reference to RPM now infers use of a software package file format and software packaged in accordance with the RPM format. Although the RPM package manager was intended primarily for Linux™ distributions, the file format of the package manager has become the package format of the Linux base. Although originally developed by Red Hat for Red Hat Linux, RPM is now typically used by many other Linux distributions. The package manager has also been ported to operating systems other than Linux, such as Novell® NetWare®, available from Novell Inc., and AIX®, available from IBM®. In the Linux based system, the package manager “package.spec” file contains a “REQUIRES” field in which the software package creators enter the package dependency information. However, this methodology tends to be error prone. For example, errors occur because needed packages can easily be left out of the list, or files that are not truly required can be added to the list when not needed or used. Typically, if the package author is unclear about file and package dependencies, the author will choose to be conservative and include a questionable package or file. An additional problem related to current package dependency tools is that the tools typically do not take into account the portion of the package actually used. For example, a component known as the “tpm-trousers” rpm in Linux today can be built with a configuration option specifying no graphical user interface, or “gui=none.” However, the package dependency tools fail to accommodate this option as a configuration alternative. With this support in mind, a novice user following the stated package dependencies would load or update the extremely sizable “X11/motif/etc” packages, including the associated sizable font files. These packages may in turn require yet further package installations. As a consequence, a “waterfall” of potentially useless package dependencies, that may affect the existing applications, can typically be triggered in this form of packaging environment. The end result may not be what was originally expected, or the result may be unpredictable and situation-dependent.
2024-01-26T01:27:17.760571
https://example.com/article/8773
package com.labo.kaji.relativepopupwindow; import android.app.Application; import android.test.ApplicationTestCase; /** * <a href="http://d.android.com/tools/testing/testing_android.html">Testing Fundamentals</a> */ public class ApplicationTest extends ApplicationTestCase<Application> { public ApplicationTest() { super(Application.class); } }
2024-05-07T01:27:17.760571
https://example.com/article/9082
[Microbial spectrum of respiratory tract in patients with different pulmonary diseases]. To study microbial spectrum of respiratory tract in patients with pulmonary diseases. Culture of sputum/bronchial lavage fluid (S/BLF) and bronchoalveolar lavage fluid obtained from 36 HIV-negative patients with infiltrative pulmonary tuberculosis (IT), 18 patients with community-acquired pneumonia (CAP), 18 patients with lung cancer (LC) was performed on 5% blood agar using method of serial dilutions. Following concentrations of microorganisms were considered as diagnostic: 10(6) CFU/ml--in sputum, 10(4) CFU/ml--in bronchial lavage fluid, 10(3) CFU/ ml--in bronchoalveolar lavage fluid. Nonspecific microflora in S/BLF was isolated 94.4% of patients (34--IT, 17--CAP, and 17-LC), and in bronchoalveolar lavage fluid - in 69.4%, 61.1%, and 77.8% of patients respectively. Nonspecific microflora was presented as both monoculture and microbial associations. In group of patients with IT, the most frequent were associations of bacteria from Nesseriaceae family and streptococci, streptococci and staphylococci, streptococci and fungi from Candida genus. In group of patients with CAP, monocultures of microorganisms were detected rarely, whereas, in contrast, microbial associations were detected more frequently. In patients with LC, monocultures of microorganisms were isolated from S/ BLF in 2 cases and from broncoalveolar lavage fluid--in 9 cases; associations were detected in overwhelming majority of patients, more frequently--combination of streptococci and Neisseria, streptococci and yeast-like fungi. In patients with IT and CAP, Streptococcus pneumoniae was the most frequently detected microorganism, whereas non-fermenting bacteria predominated in lavage fluid. Diagnostic titers from bronchoalveolar lavage fluid in patients with CAP were detected only for Acinetobacter calcoaceticus, Citrobacterfreundii, and Escherichia coli. S.pneumoniae and Staphylococcus spp. were most frequently isolated from S/BLF in patients with LC, whereas in broncoalveolar lavage fluid of such patients S. pneumoniae, Pseudomonas aeruginosa, and non-fermenting bacteria were detected in titers exceeding diagnostic threshold. Species composition of nonspecific microflora during IT, CAP, and LC was virtually the same; microorganisms were detected in equal proportions.
2024-06-12T01:27:17.760571
https://example.com/article/5529
--- abstract: 'We use a cluster algorithm to study the critical behavior of strongly coupled lattice QCD in the chiral limit. We show that the finite temperature chiral phase transition belongs to the $O(2)$ universality class as expected. When we compute the finite size effects of the chiral susceptibility in the low temperature phase close to the transition, we find clear evidence for chiral singularities predicted by chiral perturbation theory (ChPT). On the other hand it is difficult to reconcile the quark mass dependence of various quantities near the chiral limit with ChPT.' address: 'Department of Physics, Duke University, Durham NC 27708-0305' author: - 'Shailesh Chandrasekharan [^1]' title: Chiral and Critical Behavior in Strong Coupling QCD --- INTRODUCTION ============ One of the important challenges in lattice QCD is to compute quantities that are dominated by the physics of light quarks. Although there has been substantial effort in extracting such quantities from the lattice results by matching the data with ChPT, it is unclear if the current range of masses used in the calculations are in the range where ChPT is valid [@Ber02]. Recently, efforts have been directed in two directions: a) Improving actions that reduce lattice artifacts. b) Improving ChPT that take these artifacts into account. However, we think that it is also equally important to find improved algorithms to approach the chiral limit. Over the last decade a new class of cluster algorithms have emerged for solving a variety of lattice field theories [@Eve03]. These algorithms help in beating critical slowing down very efficiently. Recently, it was shown that the strong coupling limit of lattice gauge theories with staggered fermions can be solved using these new algorithms [@Cha03]. For the first time, this allows us to study the physics of massless quarks on large lattices from first principles. In this article we present results from our study of the chiral and critical behavior near the chiral phase transition in strongly coupled lattice QCD with staggered fermions. We use $U(3)$ gauge fields instead of $SU(3)$ in order to avoid technical complications in the algorithm. Further details of our study can be found in [@Cha03a]. MODEL AND OBSERVABLES ===================== The model we study can be specified by the Euclidean action, $$\begin{aligned} \label{fact} - \sum_{x,\mu} \frac{\eta_{x,\mu}}{2}\Big[\bar\psi_x U_{x,\mu} \psi_{x+\hat{\mu}} - \bar\psi_{x+\hat{\mu}} U^\dagger_{x,\mu} \psi_x\Big] \nonumber \\ - m \sum_x \bar\psi_x\psi_x,\end{aligned}$$ where $m$ is the staggered quark mass, $U_{x,\mu}$ are $U(3)$ link variables and $\psi,\bar\psi$ are Grassmann variables representing the staggered quark fields. We choose the staggered fermion phase factors $\eta_{x,\mu}$ to have the property that $\eta_{x,\mu}^2 = 1, \mu=1,2,3$ (spatial directions) and $\eta_{x,4}^2 = T$ (temporal direction), where the real parameter $T$ acts like a temperature. By working on asymmetric lattices with $L_t << L$ and allowing $T$ to vary continuously, one can study the finite temperature phase transition in strong coupling QCD [@Boy92]. The model described by the partition function $Z(T,m)$, constructed from the above action in the usual way, is known to have an exact $O(2)$ chiral symmetry when $m=0$. This symmetry is broken at low temperatures but gets restored at high temperatures due to a finite temperature chiral phase transition. In order to study the chiral physics near this transition we focus on the chiral condensate, $$\langle\phi\rangle = \frac{1}{L^3} \frac{1}{Z}\frac{\partial}{\partial m} Z(T,m),$$ the chiral susceptibility, $$\chi = \frac{1}{L^3} \frac{1}{Z}\frac{\partial^2}{\partial m^2} Z(T,m),$$ and the helicity modulus, $$Y_m = \frac{1}{L^3}\Bigg\langle \Big\{ \sum_{\mu=1}^3\ \ [\sum_x J_{x,\mu}]^2\Big\} \Bigg\rangle,$$ where $J_{x,\mu} = \sigma_x (b_{x,\mu} - N/8)$, with $\sigma_x = 1$ on even sites and $\sigma_x = -1$ on odd sites. When $m=0$ the current $J_{x,\mu}$ is the conserved current associated with the $O(2)$ chiral symmetry. Further, as discussed in [@Has90], it can be shown that $F^2 = \lim_{L\rightarrow \infty} Y_m(m=0)$, where $F$ is related to the pion decay constant. We also measure the Goldstone pion mass $M_\pi$. UNIVERSAL PREDICTIONS ===================== The predictions of ChPT for $O(N)$ models have been discussed in [@Has90]. In particular the finite size scaling formula for $\chi$ at $m=0$ is given by $$\chi = \frac{1}{N}\Sigma^2 L^3\Big[ 1 + \beta_1 (N-1) \frac{1}{F^2 L} + \frac{a}{L^2} +...\Big], \label{chptchi}$$ where $N=2$ in our case, $\beta_1=0.226...$, $\Sigma=\lim_{m\rightarrow 0}\lim_{L\rightarrow \infty} \langle\phi\rangle$, and $a$ is a constant dependent on other low energy constants. The quark mass dependence of $\langle\phi\rangle,\chi$ and $Y_m$ are given by $$\begin{aligned} \label{ccm} {{\langle\phi\rangle}}&=& \Sigma\Big[1 + \alpha_1 \sqrt{m} + \alpha_2 m + ...\Big], \\ \label{ym} Y_m &=& F^2[1 + \alpha_3 \sqrt{m} + \alpha_4 m + ...\Big], \\ M_\pi^2 &=& \frac{\Sigma m}{F^2} [1 + \alpha_5 \sqrt{m} + \alpha_6 m + ...\Big]. \label{chptmass}\end{aligned}$$ For $N=2$ one further finds that $\alpha_3 = 0$ [@Has90]. One of the consequences of chiral symmetry can be described by the relation $$\frac{{{\langle\phi\rangle}}m}{M_\pi^2 F_m^2} = 1 + {\cal O}({m}), \label{gorr}$$ which is the Gellmann-Oaks-Renner relation. If the chiral phase transition is second order then close to the critical temperature $T_c$ we have $$\begin{aligned} \label{sigma} \Sigma(T) &=& A (T_c - T)^\beta, \ T < T_c , \\ \lim_{L\rightarrow \infty} \langle\phi\rangle &=& B m^{1/\delta},\ T = T_c, \label{crit}\end{aligned}$$ The $O(2)$ universality predicts predicts $\beta=0.3485(2)$, $\delta=4.780(2)$ [@Cam01]. RESULTS ======= We have done extensive calculations on various lattice sizes in the range $8 \leq L \leq 192$ with $L_t=4$. In order to understand the critical behavior we have measured $\chi$ for $m=0$ at different values of $T$ between $7.3$ and $7.5$. On the other hand we focused on a single temperature in the broken phase ($T=7.42$) and computed ${{\langle\phi\rangle}},Y_m$ and $M_\pi$ for masses in the range $0 \leq m \leq 0.01$. In figure \[fig1\] we plot our results for $\chi$ as a function of $L$ at $m=0$ and $T=7.42$. The data fits well to the ChPT prediction (eq.(\[chptchi\])) with $\Sigma = 1.079(2)$, $F = 0.181(4)$ and $a=114(4)$ with a $\chi^2$/d.o.f of 0.73. The value of $F$ obtained from this fit is in excellent agreement with $F=0.181(1)$ obtained through a direct evaluation of $Y_m$ at $m=0$ at large volumes. This can be seen from the plot shown in the inset of figure \[fig1\]. ![Plot of $\chi$ vs. $L$ and $Y_m$ vs. $L$ (inset) at $T=7.42$ and $m=0$.[]{data-label="fig1"}](fig1.eps){width="16pc"} ![Plots of ${{\langle\phi\rangle}}$ (upper-left) $Y_m$ (upper-right), $M_\pi$ (lower-left), extrapolated to $L=\infty$, as a function of the quark mass. Check of the Gellmann-Oaks-Renner relation (bottom-right).[]{data-label="fig2"}](fig2.eps){width="17pc"} Given this excellent agreement with ChPT at $m=0$ we have also looked for the quark mass dependence of ${{\langle\phi\rangle}}$, $Y_m$ and $M_\pi$. These quantities were computed for various volumes until their values did not change for two different volumes. This “infinite” volume data is plotted on figure \[fig2\]. When the data is fit to the prediction from ChPT (eqs. (\[ccm\]),(\[ym\]) and (\[chptmass\])), with $\Sigma$ and $F$ fixed to $1.079$ and $0.181$ (see above), we find that $\alpha_1=17.9(2)$, $\alpha_2 = -64(3)$, $\alpha_3=20(1)$, $\alpha_4=301(36)$, $\alpha_5 = -8.14(10)$ and $\alpha_6 = 38(2)$. The $\chi^2$/d.o.f of all the fits are close to one. Although these fits appear to be good, the results are not consistent with ChPT. In particular ChPT predicts $\alpha_3 = 0$ [@Has90]. In spite of this disagreement, the bottom right plot of figure \[fig2\] shows that our results satisfy the the Gellmann-Oaks-Renner relation (eq.((\[gorr\])). The only plausible explanation we can imagine for the disagreement, is that most of the masses used in the fit are perhaps too heavy for ChPT to be valid. This is because the cutoff in ChPT is proportional to $F^2$ (we are effectively in three dimensions), which is quite small in our case. Indeed the coefficients $\alpha_i$ are also uncomfortably large for the same reason. We are currently studying another temperatures deeper inside the broken phase where $F^2$ is larger. ![ Plots of $\Sigma$ vs. $T$ and ${{\langle\phi\rangle}}$ vs. $m$ at $T=T_c$ (inset).[]{data-label="fig3"}](fig3.eps){width="17pc"} Finally a careful analysis of the finite size effects of $\chi$ at various temperatures reveals that $T_c=7.47739(3)$. We also find that the data for $\Sigma$ and ${{\langle\phi\rangle}}$ fits well to the form predicted by eqs. (\[sigma\]) and (\[crit\]). We find $\beta=0.348(2)$, $A=2.92(2)$ with a $\chi^2/$d.o.f of 0.53 for the fit to eq. (\[sigma\]) and $\delta=4.97(10)$, $B=5.9(1)$ with a $\chi^2/$d.o.f of 0.34 for the fit to eq. (\[crit\]). The results and the fits are shown in figure \[fig3\]. [99]{} C. Bernard et. al., Nucl. Phys. B. (Proc. Suppl.) 119, 170 (2003). H.G. Evertz, Adv. Phys. 52, 1 (2003). S. Chandrasekharan and D. Adams, Nucl. Phys. B662, 220 (2003). S. Chandrasekharan and F.-J. Jiang, hep-lat/0309025. G. Boyd, et. al., Nucl. Phys. B376, 199 (1992). P. Hasenfratz and H. Leutwyler, Nucl. Phys. B343, 241 (1990). M. Campostrini, et.al., Phys. Rev. B63, 214503 (2001). [^1]: This work was done in collaboration with F.-J. Jiang and was supported by the grants \#DE-FG-96ER40945 and \#DE-FG02-03ER41241 from the Department of Energy.
2023-11-19T01:27:17.760571
https://example.com/article/1535
British authorities have identified the suspected suicide bomber responsible for a deadly bombing inside Manchester Arena as Salman Abedi, the Associated Press reported, citing U.S. officials. According to BBC, 22-year-old Abedi was born was born in Manchester and his family is of Libyan origin. He was a student at Salford University, the school confirmed to BBC. Monday night's explosion was triggered during the final moments of an Ariana Grande concert at the venue, which was packed with hordes of the American pop star's young fans. The blast left at least 22 people dead and scores more injured. Among the confirmed victims were 8-year-old Saffie-Rose Roussos and 18-year-old Runshaw College student Georgina Callander. On Tuesday, the Islamic State claimed responsibility for the deadly attack. May 23, 2017 5:35 p.m.: This story has been updated.
2024-07-30T01:27:17.760571
https://example.com/article/9698
At a panel on cyber security at Georgetown University, the National Security Agency (NSA) director made statements that suggested the NSA has been working on some kind of “media leaks legislation.” The legislation would obviously be in response to the disclosures from former NSA contractor Edward Snowden, but, until now, there has been no public indication that any anti-leaks legislation would be proposed in response to what Snowden disclosed. Spencer Ackerman, a journalist for The Guardian, reported that NSA chief Gen. Keith Alexander said during the event, “Recently, what came out with the justices in the United Kingdom …they looked at what happened on [David] Miranda and other things, and they said it’s interesting: journalists have no standing when it comes to national security issues. They don’t know how to weigh the fact of what they’re giving out and saying, is it in the nation’s interest to divulge this.” It was his first public comments endorsing the British security services decision to have journalist Glenn Greenwald’s partner, Miranda, detained under a terrorism law in the country. The security services detained him to get their hands on Snowden documents he was believed to be carrying. Alexander said: “My personal opinion: these leaks have caused grave, significant and irreversible damage to our nation and to our allies. It will take us years to recover.” He argued, according to the New York Times, that the nation had not been able to pass legislation to protect against cyber attacks on Wall Street or other “civilian targets” because of Snowden. “We’ve got to handle media leaks first,” Alexander additionally declared. “I think we are going to make headway over the next few weeks on media leaks. I am an optimist. I think if we make the right steps on the media leaks legislation, then cyber legislation will be a lot easier.” Two individuals who specifically track developments such as leaks legislation had no idea what Alexander was talking about when he mentioned the legislation. Ackerman reported, “Angela Canterbury, the policy director for the Project on Government Oversight, a watchdog group, said she was unaware of any such bill. Neither was Steve Aftergood, an intelligence policy analyst at the Federation of American Scientists,” who posts regularly at Secrecy News. Whatever Alexander has been working on behind the scenes likely has been developed with the support of Sen. Dianne Feinstein and Rep. Mike Rogers, who have been some of the most vocal critics of the disclosures (as well as the most fervent defenders of the NSA in the aftermath of the leaks). In 2012, the Senate Select Committee on Intelligence, which Feinstein chairs, approved anti-leaks measures as part of an intelligence authorization bill. The measures were being considered as a response to leaks that had occurred on cyber warfare against Iran, President Barack Obama’s “kill list,” and a CIA underwear bomb plot sting operation in Yemen. The measures would have required: that Congress be notified when “authorized public disclosures of national intelligence” are made; that “authorized disclosures” of “classified information” be recorded; that procedures for conducting “administrative investigations of unauthorized disclosures” be revamped by the Office of the Director of National Intelligence (DNI) ; that the DNI assess the possibility of expanding procedures for detecting and preventing “unauthorized disclosures” to other Executive Branch personnel; that certain people be prohibited from serving as consultants or having contracts with media organizations; that only a limited number of individuals in intelligence agencies be permitted to speak with members of the media and that responsibilities intelligence community employees have to protect “classified information” be made more clear. The anti-leaks proposals also called for disciplinary measures against people who violated “classified information” by making “unauthorized disclosures.” This would have included: letters of reprimand, placing notice of violations in personnel files and informing congressional oversight committees of such notices, revoking security clearances, prohibiting employees from obtaining new security clearances and firing employees. Additionally, a provision would also have made it possible for an employee to lose his or her federal pension benefits if they were responsible for an “unauthorized disclosure.” There was much condemnation of the proposals. A letter to the Senate signed by civil liberties, open government and watchdog groups argued the policy would not “protect” the “nation’s legitimate secrets” but would instead open the door to “abuse” and chill “critical disclosures of wrongdoing.” It described how the measure on surrendering pension benefits was an “extreme approach” to security that “would imperil the few existing safe channels for those in the intelligence community who seek to expose waste, fraud, abuse, and illegality. Conscientious employees or former employees considering reporting wrongdoing to Congress and agency Inspectors General, for example, would risk losing their pensions without adequate due process.” Multiple newspapers published editorials criticizing the proposals and urging caution in the midst of all the leaks hysteria in Washington, DC. Senator Ron Wyden objected to the anti-leaks proposals and put a hold on the intelligence authorization bill. All but one of the anti-leaks proposals were removed. The provision requiring notification of “authorized” disclosures was left in the bill. On the Senate floor, Wyden stated after the anti-leaks proposals were removed: …I’m all for Congress recognizing that leaks are a serious problem, and for doing things to show the men and women of the US intelligence community the seriousness of this issue is recognized here in this body. But it is important for Congress to remember that not everything that is done in the name of stopping leaks is necessarily wise policy. In particular, I think Congress should be extremely skeptical of any anti-leak legislation that threaten to encroach upon the freedom of the press, or that would reduce access to information that the public has a right to know… Significantly, Wyden also declared: Congress, too, would be much less effective in its oversight if members did not have access to informed press accounts on foreign policy and national security topics. And while many members of Congress don’t like to admit it, members often rely on the press to inform them about problems that congressional overseers have not discovered on their own. I have been on the Senate Intelligence Committee for twelve years now, and I can recall numerous specific instances where I found out about serious government wrongdoing – such as the NSA’s warrantless wiretapping program, or the CIA’s coercive interrogation program – only as a result of disclosures by the press. This is the case now. For those who were not leading intelligence committees and were not committed to protecting surveillance programs or shielding them from scrutiny, much of what has been disclosed consisted of information congressmen or senators did not know the government was doing. They can now make informed decisions about whether to support current programs or policies and can also decide whether to support proposed reform legislation to curtail NSA surveillance powers because of Snowden’s leaks. It is, of course, unknown what this legislation being secretly developed intends to do in order to address “media leaks,” but it is reasonable to predict that it will bear a stark similarity to “remedies” approved by the Senate intelligence committee in 2012, which Wyden played a role in blocking from passage. * Alexander has expressed interest in some kind of action to stop the publishing of information from the leaks. He declared in an interview posted by the Pentagon: I think it’s wrong that newspaper reporters have all these documents, the 50,000—whatever they have and are selling them and giving them out as if these—you know it just doesn’t make sense. We ought to come up with a way of stopping it. I don’t know how to do that. That’s more of the courts and the policymakers but, from my perspective, it’s wrong to allow this to go on. In the wider US intelligence community, DNI James Clapper, stated during a Senate intelligence committee hearing on “worldwide threats,” “Snowden claims that he’s won and that his mission is accomplished. If that is so, I call on him and his accomplices to facilitate the return of the remaining stolen documents that have not yet been exposed, to prevent even more damage to US security.” NSA Inspector General George Ellard, the person who Snowden was supposed and go to with his concerns about NSA surveillance, said at a Georgetown Law Center event, that Snowden had been “manic in his thievery. His disclosures were “open-ended, as his agents decide daily which documents to disclose.” The “agents” he was referring to were the journalists, who had been covering the documents—people like Greenwald, Laura Poitras, Barton Gellman and others at the Guardian, New York Times, ProPublica and First Look, who have seen copies of the documents for news stories that have been published. Constantly, US intelligence officials, including Alexander, have accused the media of “sensationalizing” leaks, rarely ever producing any specific examples to prove that what has been widely reported about the NSA has been inaccurate. The agency has struggled to overcome news coverage, where it is suggested that they are responsible for unchecked surveillance on citizens not just in America but all over the world. The agency has tried having a friendly person in the news media shoot an infomercial for them that aired as a “60 Minutes” episode. It has tried developing talking points and sending letters out to employees, which suggest they will weather the storm. It even advised employees to take advantage of Thanksgiving dinner gatherings to explain to family and friends what it considered to be the truth. But none of that has effectively disrupted a now eight-month debate that has greatly affected Americans’ attitudes toward government surveillance and spurred the development of a market for privacy tools. One of the few moves Alexander has left before he leaves his position as director is to convince leaders in Congress to take up “media leaks legislation” so that the next NSA director does not have to struggle with another Edward Snowden. Such legislation may enjoy some success because President Barack Obama has fiercely opposed leaks and gone so far as to prosecute a record number of people under the Espionage Act, which in the process has created a chilling effect for journalists. However, the same groups and voices that spoke out in 2012 will speak out again and condemn the legislation if it appears it will have profound implications for press freedom. And criticism will be particularly loud if it does more than target federal government employees and goes a step further by targeting members of the press in some manner. The chancellery is unhappy about the report in the New York Times. Merkel by no means meant to express that Putin behaved irrational. In fact she told Obama that Putin has a different perspective about the Crimea [than Obama has]. So we have our own USA military Coup by another corrupt General. Are these Four Star Cowards also going to occupy Afghanistan for another twelve years? Karzai wants to kick them out because the American Generals are bloodthirsty murderers. To Karzai, the war was not waged with his country’s interests in mind. “Afghans died in a war that’s not ours,’ he said in the interview, his first in two years with a U.S. newspaper… In Karzai’s mind, al-Qaeda is “more a myth than a reality” and the majority of the United States’ prisoners here were innocent. He’s certain that the war was “for the U.S. security and for the Western interest.”… As he escorted two Washington Post journalists out of his office Saturday evening, he said: “To the American people, give them my best wishes and my gratitude. To the U.S. government, give them my anger, my extreme anger.’’ The goddamned people running this country are as un-American as has ever walked this earth. These assholes don’t know or give a shit what America stands (stood?) for, only that America is the team that they’re on. If we were going to have a new round of charges of un-American activities, most every elected pol, federal judge, and commissioned officer above the rank of Lt. Col would be the first place to start. Maybe we need a new McCarthy. This just isn’t the same America I grew up in, no matter how many try and tell me “it’s always been this way.” Maybe underneath it has, but it’s wide open for all to see now, and I’m not sure that underneath it was ever this damn un-American either. Yet if you dare utter the word “fascism” you’re ridiculed for being a whacko. I would bet anyone that back in the day, most German citizens didn’t consider their country to be fascist either, until it was waaayyyy past the time when anything could be done about it. I bet they would be much like the majority here, not believing it, dismissing it out of hand, and labeling anyone who dared to suggest such a thing in THEIR country was out of his/her mind. Folks, the way it works is there is no public announcement where the government and media just one day says “Okay, we’re fascist now.” A country just moves there bits at a time, and like the boiling frog, it’s citizens mostly don’t even realize they’ve crossed the line despite crossing it some time back. And this wave of fascism is world wide. Go ahead and dismiss such language folks, but talk to me in 50 years and let’s see how our grandchildren’s children view the situation. If they’re able, they’ll ask some tough questions of us, about why we didn’t stop it. Lastly, Wyden, sir, as a veteran, you are two faced prick. Why don’t you even live in the state you represent? Doesn’t want to disclose the drone legislation he recently rammed thru. Now Oregon has drone testing sites and subsidies for drone facilities in the new future. Can’t be head of the Spending committee, oops, I mean Ways and Means, for nuttin’. And what he said was really scary and should frighten the shap out of a lot left on the fence, because the fence has been torn down, then driven over and then burned. The bubble(s) both NSA and CIA now exist within have become and are unmoored and adrift from the main thrust(s) of U.S.Constitution and it is plain to see since 1950 a long line of USians up on Capitol Hill and those who get to dress up in archaic black robes at SCOTUS and the 11 USians who did occupy the Oval Office as POTUS in the White House and the #12 USian who currently holds the Oval Office as POTUS took up and have taken up a convoluted legal / political / moral / ethical concept of what USA and USG should be doing with and thru agencies such as NSA and CIA. Pity it is with all the supposedly highly trained, schooled and mentored USian lawyers and legal scribes to be found across USA here in early 21st century so few seem capable of doing what is right and doing what now clearly needs to be done — mounting relentless opposition to and confronting, contesting and taking to conviction a whole bunch of USians in WashingtonDC who plainly have wandered far away and from what U.S.Constitution says #1 and appear to be taken up with being liars, snoops, thugs, killers and fascists and unbound militarists #2. Perhaps were Wall St. to monetize and sell stock options and set up bonus plan pay outs for defending,abiding with and maintaining the U.S.Constitution we USians would then be seeing better outcomes. As it is there is no big money in doing the U.S.Constitution — money talks big in 2014 USA. See Citizens United. See how WashingtonDC is for sale and 99% USians get sold out. Which USians are going to and go to jail these days? Not many USian politicians nor big money Wall St. gamers / USian capitalists. C.Manning? In jail. John Kiriakou? In jail. E.Snowden? Being openly attacked and so very likely facing a certain jail sentence if not something more deadly if captured by USG. Imagine that. Post 1950 sanity challenged USG / WH/ Capitol Hill / NSA / CIA quest for empire, conquest, militarism and open ended covert/overt national security / secrecy and imperial political and militarized treachery / death dealing being done in USians name will need to be slowed and stopped. Barack Obama,Diane Feinstein and Mike Rodgers and the likes of Keith Alexander and James Clapper plain to see here in 2014 are not going to slow or stop what NSA / CIA want to do and be doing / not doing as KG is on point above in showing and telling. The shamelessness now being so openly displayed describes so much of what has gone deeply wrong. From Obama and Feinstein and Rodgers to Alexander and Clapper and then going back to 1950. hiiii my best friend’s mom got paid $14955 the previous week. she makes money on the internet and bought a $359800 condo. All she did was get fortunate and work up the guide exposed on this web page ————–zunojob.com
2023-09-05T01:27:17.760571
https://example.com/article/5837
Wednesday, June 29, 2011 Despite being diagnosed with terminal cancer two years ago, Terry Schwartz of Lincoln continues to build schools in Latin American and African countries through Maranatha Volunteers International. According to his nominator, Steve Wiley: "Terry said, ‘If I only have a short while to live, I'm going to live it doing what I love.'" And so he does. Schwartz's efforts, primarily as a construction superintendent for Maranatha, produce positive changes for the people who benefit from the schools and churches that are built. But those efforts also produce positive changes in the volunteers that Schwartz takes on Maranatha trips. The volunteer crew members sometimes include troubled youths who undergo a life-changing experience from seeing their work through Maranatha produce positive results for others. "For me, it's more about changing the lives of the volunteers than it is leaving things better in the communities we work in," says Schwartz. "It's just something that's important to my wife Dina and I. If not for our family here in Lincoln, we'd probably stay over there." It's not as though Schwartz, 57, needs more things to do. When he is in Lincoln, he works as vice president of the Racquet Club, which is owned by his father, Marlyn. The family also has a partnership in the Old Cheney Center and owns Old Cheney Plaza and other properties nearby, so Terry manages approximately 50 business tenants. He owned and operated Schwartz Construction until nine years ago, when his father asked him to work with him. "I told him I like doing mission trips, and I'd work for him if he didn't make me feel guilty for taking trips," Schwartz says. "He had no idea what he was agreeing to!" Last year, Terry and Dina spent a month in India and five and one-half months in Africa. In the past five years, they have gone on five to six Maranatha mission trips every year. "I've been gearing my life around it," Schwartz says. Each year, some of those trips involve leading a group of 40 inner-city youths from large metropolitan areas. Most would be in jail if they weren't signed up for the trip as a community service project, Schwartz says. "When we start the trip, these kids have unbelievable gang attitudes and carry knives, have bad vices and freely admit they will work harder to get out of work than work," he says. "But the trips are a life-changing experience for many of them." A former prostitute turned her life around after going on a mission trip and is studying to be a physician, Schwartz says. A former gang member is now a corpsman in the U.S. Navy. Another young man was failing at a military academy and in trouble for drug-related crimes before volunteering to serve on a mission trip led by Schwartz. "He came with us, and in two years he went to the top of his class at the academy," Schwartz says. "He said the trip was the turning point in his life. It's fun to be a part of that kind of life-changing experience for those kids." Not all of the trips are with inner-city youth in trouble with the law. Earlier this year, Schwartz led a group of 30 "really good kids" from Nebraska and Kansas to Choluteca, Honduras. "It was pretty cool that 30 Kansas and Nebraska kids built three buildings in five days," Schwartz says. The group was the third of eight from Maranatha scheduled to help construct a nine-building K-12 school complex. Schwartz has been volunteering for mission trips through many organizations, including Maranatha, since 1969, when he joined his father on a mission to Mexico. The prospects of continuing such mission trips seemed dim on May 22, 2009, when Schwartz was diagnosed with prostate cancer that had spread to bones. "From there it goes to the liver and lungs," he says. "On the Gleason scale of one to nine, I was a nine. There is no 10. That means you're dead." Dr. Misop Han, a urologist at Johns Hopkins Medical Center in Baltimore, excised the prostate in surgery but told Schwartz that even after surgery, statistics indicate he would still have less than a 1 percent chance of living longer than 90 days. "He told me he had never excised a prostate as tumor-ridden as mine," Schwartz says. "It's amazing to me that I'm still here after having all this stuff. There's no doubt in my mind that prayer is the reason I'm still here. Not just my own prayers, but other people's too. God has given me some additional time." Schwartz says that when he is on a mission trip, he feels productive enough that he can forget about his health issues. "God has plans for every one of us," he says. "I feel that doing these trips is part of God's plan in my life. Even when I don't feel like going or I don't feel like we can afford to go, when Maranatha calls us, we're going to go. I really enjoy the change it makes in our lives as well as the lives of the people we help and the volunteers." Maranatha volunteers have completed projects in Lincoln as well, Schwartz notes. The People's City Mission, nonprofit Christian Heritage and building renovations at Union College are examples. After Hurricane Katrina, Schwartz joined a group that spent six weeks in Louisiana rebuilding a school. "Maranatha has a lot of work in the U.S. for people who don't like to travel outside of the states," he says. When he travels, Schwartz, an avid photographer, enjoys shooting photos and sharing them with the local residents. "In Zambia, I gave over 800 people photos of themselves," he says. "Not one of them had ever had a photo taken before. Those people have absolutely no material possessions, but they're such happy people." On such mission trips to Africa, Schwartz brings along fellow photography enthusiast Dick Dirkson, host of the Maranatha Mission Stories TV program on 3ABN Christian TV and the Hope Channel. "We spend a week after the construction shooting photos on Safari," Schwartz says. Schwartz's parents, Marlyn and Sharon, and brother, Bruce, often join Terry and Dina on mission trips as well. Schwartz notes that Maranatha mission trips are open to everyone, and he has had volunteer helpers from under age 10 to over 90. No skills are necessary. "We train people and make sure they have fun so they'll keep coming back," he says.
2024-01-12T01:27:17.760571
https://example.com/article/4372
/* * Copyright (c) 2008, 2018, Oracle and/or its affiliates. All rights reserved. * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License, version 2.0, * as published by the Free Software Foundation. * * This program is also distributed with certain software (including * but not limited to OpenSSL) that is licensed under separate terms, as * designated in a particular file or component or in included license * documentation. The authors of MySQL hereby grant you an additional * permission to link the program and your derivative works with the * separately licensed software that they have included with MySQL. * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See * the GNU General Public License, version 2.0, for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software Foundation, Inc., * 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA */ #ifndef _STUB_MFORMS_H_ #define _STUB_MFORMS_H_ #include "stub_base.h" namespace wb { struct WBOptions; }; namespace mforms { namespace stub { void init(wb::WBOptions *options); void check(); }; }; #endif
2024-04-28T01:27:17.760571
https://example.com/article/2485
Q: Fatal error: Redefinition of parameter $request I have a strange error here. I am building a REST API with Slim framework. $app->post('/createuser', function(Request $request, Response $request){ if(!haveEmptyParameters(array('email', 'password', 'name', 'school'), $response)){ $request_data = $request->getParseBody(); $email = $request_data['email']; $password = $request_data['password']; $name = $request_data['name']; $school = $request_data['school']; ... The Error: Fatal error: Redefinition of parameter $request in /Applications/XAMPP/xamppfiles/htdocs/RestAPIwithSLIM/public/index.php on line 17 I DO NOT know which paramater is missing on this post function. Any thoughts? A: You have defined two parameters with the same name, ideally you'd change the second parameter to $response. $app->post('/createuser', function(Request $request, Response $response) {
2024-02-06T01:27:17.760571
https://example.com/article/5898
Q: Does a Background in Mathematics Make One a Better Philosopher? I was a Philosophy major as an undergrad and became obsessed with the beauty of rigorous argumentation. There I didn't take a single class listed under the Mathematics department and was almost exclusively interested in Ethics. Now, two years later, I have quit my job to pursue a Masters Degree in Pure Mathematics (after much self-study and a semester of expensive post-baccalaureate work). While I find the subject (and more importantly the process) of Mathematics absolutely beautiful, I feel that my true love will always be for Philosophy. Still, I feel that studying math has made me a much better critical thinker, and I am tempted to argue that studying Mathematics has made me a better Philosopher as well (although I haven't had time to really test this claim). In particular, the study of Mathematics has taught me mental strategies to (i) grasp concepts which aren't as easily intuitive as those in philosophy, (ii) to be even more concise in my argumentation, and (iii) to feel comfortable introducing suitable notation on my own to simplify my thoughts and get me to the heart of problems. Do people have experience with (or know of others who have the experience with) studying Mathematics and finding that it contributed positively towards their ability to do philosophy (above and beyond the opportunity cost of actually studying more philosophy)? Are there any examples of modern professional philosophers who have non-trivial backgrounds in Mathematics? Would obtaining a Masters in Pure Mathematics improve one's chances of being admitted to Philosophy grad school? A: I feel it's pretty obvious that doing math gives you experience with deduction systems. The question as posted could be translated into "has need to do more practical work an influence on doing philosophy". Moreover, the need to do some practical work in some specific fields will be the reason for many to get into philosphy in the first place. If one is involved with the deconstruction of certain structures, may it be economics or universal algebra, one might easily find oneself tapping on questions in the realm of philosophy. Regarding the second question, Saul Kripke or Hilary Putnam comes to mind. And also many linguists or AI people also have one foot in mathematics and one in philosophy. Douglas Hofstadter, to name a known one. A: As a computer science student with a mathematics minor, I must agree with @RexKerr. Math is truly the only language in which one can fully understand the observable laws of the universe. It is a language whose symbols are written by humans, but whose meaning potentially carries the weight of universal law. A philosopher who wishes to legitimately comment on the nature of the universe should first have a full understanding of how the observed universe operates. As for mathematician/philosophers I would recommend Douglas Hofstadter. His book Goedel, Escher, Bach is one of the greatest books I've ever read. (Also try I Am A Strange Loop)
2024-02-14T01:27:17.760571
https://example.com/article/3714
/** Interface for the isapistream class * @file isapistream.h * @author Christian Aberger * Copyright (C) 2001 WebWare (http://www.webware.at) */ #ifndef _ISAPISTREAM_H_1DCECA02_E2F0_11d4_83AA_00A0CCD4FF57 #define _ISAPISTREAM_H_1DCECA02_E2F0_11d4_83AA_00A0CCD4FF57 #include <httpext.h> #include <iostream> /** a streambuf wrapper for the ISAPI-Extension control block. */ class isapistreambuf : public std::streambuf { public: /** constructor */ isapistreambuf(EXTENSION_CONTROL_BLOCK *pECB); /** destructor */ ~isapistreambuf(); EXTENSION_CONTROL_BLOCK *ECB(); protected: virtual int sync(); ///< flush contents to isapi virtual int overflow(int ch); ///< flush contents and write ch virtual int underflow(); int showmanyc() {return _cbTotalBytes - _cbRead;} protected: EXTENSION_CONTROL_BLOCK *_pECB; ///< see ISAPI documentation for details char _obuf[1024]; ///< output buffer char *_ibuf; ///< input buffer unsigned int _ibuflen; ///< length of input buffer. unsigned int _cbTotalBytes; ///< total input bytes in the request. unsigned int _cbRead; ///< total bytes read from ECB already. }; /** ISAPI input/output stream. It can be used anywhere like cout is used, the output goes to the client browser. */ class isapistream : public std::iostream { public: typedef std::iostream super; /** constructor. @param pECB the extension control block received as a parameter of HttpExtensionProc */ isapistream(EXTENSION_CONTROL_BLOCK *pECB) : super(&_buf), _buf(pECB) {} /** destructor */ virtual ~isapistream(); EXTENSION_CONTROL_BLOCK *ECB(); ///< @return the EXTENSION_CONTROL_BLOCK wrapped by this protected: isapistreambuf _buf; private: isapistream(isapistream&); ///< not implemented. isapistream& operator=(const isapistream&); ///< not implemented. }; #endif //_ISAPISTREAM_H_1DCECA02_E2F0_11d4_83AA_00A0CCD4FF57
2024-02-20T01:27:17.760571
https://example.com/article/1730
// Copyright (c) 2010, Nikolaus Augsten. All rights reserved. // This software is released under the 2-clause BSD license. /** * */ package approxlib.distance; /** * A class for edit operations, including ins/del/ren/ins_subtree/del_subtree * @author Xuchen Yao * */ public class Edit { public enum TYPE { NONE { public String toString() { return "";}}, INS { public String toString() { return "ins";}}, // for insertion, there are three cases: // 1. insert a whole subtree, a subtree must contain more than one node // 2. insert a leaf, which has no children. leaf is a modifier to its parent, // so it's relative not 'as important' as inserting a 'parent' node. // 3. insert a node which doesn't fall into case 1/2 (neither is a leaf nor incurs a subtree) // for deletion it's the same INS_LEAF { public String toString() { return "insLeaf";}}, DEL { public String toString() {return "del";}}, DEL_LEAF { public String toString() {return "delLeaf";}}, // renaming only happens when lemmas match, so we define it as // either renaming only POS, only Rel, or both REN_REL { public String toString() {return "renRel";}}, REN_POS { public String toString() {return "renPos";}}, REN_POS_REL { public String toString() {return "renPosRel";}}, INS_SUBTREE { public String toString() {return "insSubtree";}}, DEL_SUBTREE { public String toString() {return "delSubtree";}} }; int[] args; TYPE type; public Edit(TYPE type, int... args) { this.type = type; this.args = args; } public TYPE getType() { return this.type;} public int[] getArgs() { return this.args;} public void setArgs(int... args) { this.args = args;} public String toString() { if (this.type == TYPE.NONE) return ""; StringBuilder sb = new StringBuilder(); sb.append(this.type.toString()); sb.append("("); sb.append(args[0]); for (int i=1;i<args.length;i++) { sb.append(","+args[i]); } sb.append(")"); return sb.toString(); } }
2024-03-14T01:27:17.760571
https://example.com/article/3367
Original form for Shotokan's Hangestsu...? I have just watched Sensei Lemus (of Oneminutebunkai fame on youtube) perform Sokon "Bushi" Matsumura's version of Seisan.... and I noticed it's remarkable resemblance to Hangestsu. I am aware that Seisan was the original source of Hangestsu but most other version's I have seen do not so closely match Hangestsu or Wado's Seisan form (both of which clearly have a common ancestor). Is it possible that Matsumura's version was the original scource for Hangestsu, especially given that Matsamura was Itosu's teacher? Ultimately I am interested in the comparison from a bunkai interpretation point of view ... and just plain historical curiosity... I am hoping some more knowledgable members of the forum, might be able to enlighten me.. My training is in Shorin-ryu Matsumura, from Hohan Soken to Fusei Kise. This Seisan video is nearly exactly the way we have Seisan from O'Sensei Soken, with some very minor stylistic differences. I don't know that we can definitively say this was Matsumura's Seisan, but that has always been the teaching in our system. And yes, we are also taught that Hangetsu is directly adapted from this version of Seisan. However, I am not at all an expert on Shotokan, so take that for what it's worth. first of all there are several versions of Kata all by the name of Seisan, Seishan, Seshan and whatever else possible transcription there is. Several of them found their way independently on to the small island of Okinawa. A form with the kanji 十三 (13) was mentioned in the 1867 martial arts programm that was part of an event for the display of ryūkyūan culture for the coronation of the last king of Ryūkyū going by the name of Shō Tai (尚泰). This kata was performed by a man named Aragaki. Then there is a version of Seisan in Gōjū-Ryū and Uechi-Ryū. According to Nakazato J. his teacher Kyan C. learned a Kata named Seisan from Matsumura. Sakagami R. taught a Kata named Matsumura no Seisan. The Kyan line Seisan and the Sakagami Seisan are similar so it is absolutely possible that Matsumura is one possible line of transmition. Asato A. a main student of Matsumura also mentioned Seisan in a three part article published in 1914 as a Kata that is suited for building up and strengthening the body and as very effective in regards to self defense. So he at least knew the Kata so well to give his appreciation for it. So Funakoshi either learned it directly from Matsumura or what is more likely in my eyes from his main teacher Asato. Itosu never taught or at least didn't taught that Kata often. Nakasone G. and Mabuni K. in their book Karate-Dō Nyūmon published in 1938 didn't show Seisan in their Kata list as a Kata of Itosus. Itosu was the karate teacher for the first middle school in Shuri. A former student also listed the Kata that he learned there. Seisan was not among them. So it is unlikely that Funakoshi learned this Kata from Itosu. Many of the differences in performance of Seisan are simply down to timing and the individuals interpretation and preference where Bunkai is concerned. When viewing Shuri or Naha - Te versions of the form you can easily see this. The same can be said when we include Aragaki Seisan, an excellent version. One thing that is fairly consistent is the Embusen. So far as Bunkai is concerned the opening sequence , in my opinion, considers close quarter grappling, grabbing etc. There are many variations in the different versions of techniques that follow the opening sequence before we turn into a sequence that considers trapping, sticking, intercepting and redirecting energy. I personally view the rest of the form as options to utilise once either of the first two sequence entries have been utilised. One thing to bear in mind is that although this is described as both the Kyan version and the Matsumura version of seisan, it is entirely possible that it was passed down via either of them without involvement from the other. Matsumura had many students other than Kyan (Motobu Choyu, Tawata Shinju, Azato Anko etc) and Kyan had many teachers apart from Matsumura (Pechin Maeda, Matsumora Kosaku, Oyadomari Kokan etc) with the relationships between successive generations of both their students crossing and merging in many places. As a kata that predates both Kyan and Matsumura there were pretty likely to be a number of other versions of seisan known and practiced on Okinawa at that time too (e.g. Aragaki seisan mentioned above). For example, the version of seisan I practice is very similar indeed to this and came from Toma Shian, ostensibly going back through Uehara Seikichi to Choyu Motobu and then Matsumura. However, Toma Shian also trained with another Toma called Toma Seiki who was part of both the direct lineage from Matsumura via Uehara and Tawata Shinju and from Kyan via Shimabukuro Tatsuo. All of the links in these chains almost doubtlessly trained with and learned from many other practitioners with links to other lineages as well, and took on their various influences to different degrees. Azato and Funakoshi would have been in a very similar web of connections. From a technical point of view it seems to me that the Shotokan Hangetsu is indeed an abbreviated relative of this version but with a lot of influence from the various Naha family versions, especially in the use of sanchin dachi (extended like all shotokan stances though) and tension during the first section. I think the core element of the Shuri siesan is entering the opponent's stance in order to strike while controlling the opponent's defence directly. Most karate is aimed at fairly close quarter combat, but I think that this kata takes things a step closer than karate's usual boxing range. In this range the striker lacks the space to see and block attacks and must rely on controlling the opponent to land blows. This is distinct from grappling in that for the non competitive fighter the aim is always to avoid getting tied up in a one on one struggle and so striking is the preferred way to victory over something involved like a choke. The opening of the kata I think is intended to be applied at angles, inserting the lead foot against that of the opponent (which is explicit in the Yong Chun White Crane form 13 treasures; a strong contender for progenitor of at least the naha versions) . I think that Funakoshi saw that the naha-te Sanchin dachi offered an extra dimension in using the lead leg as it penetrates the opponent's stance, to apply an extra degree of control against the opponent and created the Hangetsu dachi as a result. If you look at any of Funakoshi's original kata, the Matsumura Seito are for the most part the closest match to his versions that you'll find because GF was a student of Azato first and foremost and Azato was a student of Matsumura. As a point of study, this Ryuei ryu version of Seisan is the best contender I've seen for a "missing link" between the Sanchin dachi'd Goju try/Uechi ryu versions and the front stance pattern used in the Shorin schools. SEISAN - Ryuei Ryu:
2024-05-15T01:27:17.760571
https://example.com/article/8295
[Hypertrophy of the salivary glands in bulimia]. We report a case of bulimia nervosa with bilateral swelling of the parotid and submandibular glands. It was the only symptom of the behavioral disorder. Sjögren's disease was excluded histologically. In our case, the parotomegaly as a symptom of sialadenosis was found at the same time as the eating disorder. MRI or ultrasound are important diagnostic tools to confirm the diagnosis.
2024-05-05T01:27:17.760571
https://example.com/article/8104
Breaking News: Two arrested in connection with area thefts, burglaries BREAKING NEWS A 47-year-old male and 44-year-old female were arrested Thursday, Aug. 1, in Butte after a search yielded evidence in the burglaries of the Stockman Bar in Sheridan and Stonefly Inn & Outfitters in Twin Bridges. Chris Tenny, Madison County Deputy Sheriff, followed up on tips from the public that led him to Butte. The Butte-Silver Bow Law Enforcement Department, FBI and Montana Parole and Probation assisted him. Evidence of the suspects’ involvement in other Madison County cases was found too. Madison County Undersheriff Roger Thompson said some property was recovered. “It was definitely a case the public contributed greatly on,” Thompson said. “We appreciate that. We are grateful to work with a public who provide tips we can follow up on and lead to successful cases.” More than $5,000 worth of methamphetamine was seized during the search. The two suspects remain in custody in Butte on drug charges, and will be charged in Madison County sometime next week. Thompson said the involvement of drugs may lead the investigation into other areas of Montana and into surrounding states. Deputy Tenny said that this arrest sheds light on the fact that meth is still an issue in Montana, including Madison County. “We had some cases last year which involved meth,” Tenny said. “Like past burglaries in Madison County and across the state, meth is a driving factor. It’s still out there.” Names of the suspects will be released sometime next week. The Madison County Sheriff’s Office and other agencies continue to work on these burglaries and other cases to uncover more information. Madisonian Photo Gallery We want to connect Recent Comments Basketball season previewDarlene Tussing, 7 Aster Lane; Sheridan MT 59749; 406.860.6121:"Dear Editor, This letter is in response to the letter from Ken Holbrock that was published in the January 27th issue of the Madisonian that…" Opinions and letters to the editorAaron Davis:"In response to Kens letter about cyclist and taxes. I just want to remind Ken that Montana law give cyclist the same rights to use…"
2024-04-14T01:27:17.760571
https://example.com/article/7805
NL West Now Commenting On: Tight hip isn't expected to keep Alburquerque out Email Print Alburquerque's scoreless relief 0:50 4/21/13: Al Alburquerque keeps the game tied at 3 with two dominant innings of shutout relief, fanning five and allowing no hits By Jason Beck / MLB.com | DETROIT -- Reliever Al Alburquerque said Thursday morning his hip, which tightened up on him during the seventh inning Wednesday night, feels fine now and he should be able to pitch once he loosens it up. Manager Jim Leyland wasn't sure about Alburquerque's status, but gave him the day off in Thursday's 8-3 loss to the Royals. Alburquerque was nearly finished with his second inning, having retired the first two batters in the seventh, when Leyland and head athletic trainer Kevin Rand noticed something amiss. "He got a knot in his hip," Leyland said Wednesday night. "Fortunately it was nothing with his arm, but he kind of felt it on a pitch in the flexor area and then it grabbed him. I was real suspicious when I saw him throwing to the last batter." Alburquerque said he was fine and continued to pitch, but left following his second straight two-out walk, as Leyland opted for Joaquin Benoit against the Royals' Mike Moustakas. Alburquerque has recorded at least five outs and 20 pitches in each of his last three outings, but has shown no ill effects of the increased workload. He has had at least two days of rest between each of those outings. His 26 pitches on Wednesday were a season high. "I don't expect it to be anything," Leyland said of the injury. "It's not the arm, and certainly that's a good sign." Jason Beck is a reporter for MLB.com. Read Beck's Blog and follow him on Twitter @beckjason. This story was not subject to the approval of Major League Baseball or its clubs.
2024-02-01T01:27:17.760571
https://example.com/article/4851
First test tube baby mother Lesley Brown dies Published duration 20 June 2012 image caption Louise Brown celebrated her 30th birthday in 2008 with her mum Lesley, son Cameron and IVF pioneer Prof Robert Edwards The woman who gave birth to the world's first test tube baby has died. Lesley Brown, 64, who lived in Whitchurch, Bristol, made history in July 1978 when her daughter Louise was born at Oldham General Hospital. Mrs Brown had been trying for a baby with her husband John for nine years before she became the first woman to give birth following IVF treatment. She died at the Bristol Royal Infirmary on 6 June with her family by her side, it has been announced. She successfully conceived following pioneering treatment by Patrick Steptoe and Robert Edwards. She leaves behind daughters Louise and Natalie, who were both born following IVF treatment, her stepdaughter Sharon and five grandchildren. image caption Mrs Brown successfully conceived following pioneering treatment Her husband died five years ago. A private funeral service was held in Bristol on Wednesday morning. Louise Brown said: "Mum was a very quiet and private person who ended up in the world spotlight because she wanted a family so much. "We are all missing her terribly." Dr Steptoe and Prof Edwards set up the Bourn Hall Clinic in Cambridge two years after Louise Brown's birth. It is now a leading centre for IVF treatment. Speaking on behalf of Mr Edwards and the team at the clinic, chief executive Mike Macamee said: "Lesley was a devoted mum and grandmother and through her bravery and determination many millions of women have been given the chance to become mothers. "She was a lovely, gentle lady and we will all remember her with deep affection." Speaking in 2008, Mrs Brown said she had been so desperate to have a baby that she was willing to put up with anything to give birth. At the time, she said: "I'm just so grateful that I'm a mum at all because without IVF I never would have been and I wouldn't have my grandchildren." Her blocked fallopian tubes meant getting pregnant naturally was impossible. In 1976, she heard about new research and was referred to Dr Steptoe, after which she agreed to the experimental procedure. Although other women had been implanted with fertilised eggs, Mrs Brown was the first to achieve a pregnancy which went beyond a few weeks. The attention around the pregnancy brought with it concerns for her baby's safety. Mr Edwards said in an interview in 2008: "We were concerned that she would lose the baby, the foetus, because the press were chasing Mrs Brown all over Bristol where she lived. "So, secretly Patrick Steptoe hid the mother in his car and drove her to his mother's house in Lincoln - the press didn't know where she was." Mrs Brown recounted that once she was in Oldham hospital reporters tried a variety of methods to sneak into her room from a bomb hoax to posing as cleaners.
2024-03-07T01:27:17.760571
https://example.com/article/6426
Normal renal sonogram identifies renal colic patients at low risk for urologic intervention: a prospective cohort study. Determining which patients with ureterolithiasis are likely to require urologic intervention is a common challenge in the emergency department (ED). The objective was to determine if normal renal sonogram could identify low-risk renal colic patients, who were defined as not requiring urologic intervention within 90 days of their initial ED visit and can be managed conservatively. This was a prospective cohort study involving adult patients presenting to the EDs of a tertiary care centre with suspected renal colic over a 20-month period. Renal ultrasonography (US) was performed in the diagnostic imaging department by trained ultrasonographers, and the results were categorized into four mutually exclusive groups: normal, suggestive of ureterolithiasis, visualized ureteric stone, or findings unrelated to urolithiasis. Electronic medical records were reviewed to determine if patients received urologic intervention within 90 days of their ED visit. Of 610 patients enrolled, 341 (55.9%) had US for suspected renal colic. Of those, 105 (30.8%) were classified as normal; none of these patients underwent urologic intervention within 90 days of their ED visit. Ninety (26.4%) US results were classified as suggestive, and nine (10%) patients received urologic intervention. A total of 139 (40.8%) US results were classified as visualized ureteric stone, and 34 (24.5%) patients had urologic intervention. Seven (2.1%) US results were classified as findings unrelated to urolithiasis, and none of these patients required urologic intervention. The rate of urologic intervention was significantly lower in those with normal US results (p<0.001) than in those with abnormal findings. A normal renal sonogram predicts a low likelihood for urologic intervention within 90 days for adult ED patients with suspected renal colic.
2023-12-14T01:27:17.760571
https://example.com/article/2389
Join theACE Network Alec Loorz: Live from Copenhagen Day 4 Wow, I feel so inspired while writing this. The highlight of my day was a speech by Al Gore calling upon the world leaders to take real action for the youth of this and every generation. He began and ended with a standing ovation from the crowd. And right after a joke about a farmer in a car crash saying “I feel fine,” he noted a group of people who aren’t formally represented and don’t have an official voice in this process. And that is the generations who follow us. There is no way the negotiators will create a binding treaty in the next 3 days. But they can make some sort of agreement that will be a good starting place. But we can’t wait till another year to get to that binding agreement. It’s already too late. So, Mr Gore offered a solution to this problem. He proposed the next meeting be in July of next year, rather than November, or December, like was planned in Mexico City. When he said this, there was an audible “hm” from all the negotiators who were there, some of them right next to me. It was part, “How dare you?” but it was mostly, “wow... that might work.” He also proposed the US should vote on the climate bill on April 22, 2010. The 40th anniversary of earth day. To help make this happen, I am planning a million kid march for April 2010. We are calling it the iMatter March: One Million Kids Stand Up for Their Planet. It will be part physical march on Washington and other cities throughout the US, and part virtual march, using an iPhone app that should be ready in early march. Everyone from parents with babies to school children to teens to college students will be peacefully reminding our leaders that it’s not about money or power, it’s about the survival of their grandchildren and generations to follow. Mr Gore passionately asked the question, “Who are we?” And talked about how if these negotiations stall like they have been so far, that the reasons will be forgotten in the very short future. If they let it stall and the unthinkable happens here in Copenhagen, these leaders are going to have to watch their children grow up knowing they did nothing for them. And their grandchildren would look back at the Copenhagen conference and ask them, “Why didn’t you act?” “Why did you let this process fall into paralysis?” “Don’t you care about us?” “Didn’t you realize we were at stake?” Then the room went quiet and he said, “I don’t believe that is who we are.” These leaders have to power to make the right decisions, and can, instead, be thanked by their children and grandchildren for making the right choices and creating an agreement that ensures the survival of future generations. I can only dream and hope for the lives of every member of this generation that our leaders will listen to him. We can’t afford to wait for even one more year. We need them to be bold, be brave, and do what’s right for their grandchildren and their planet. And not necessarily what benefits their pocketbooks.
2023-08-01T01:27:17.760571
https://example.com/article/3951
Herring catch blamed for sluggish cod fishery Tuesday Jul 29, 2008 at 12:01 AMJul 29, 2008 at 4:11 PM The catching of river herring has been prohibited in Massachusetts since 2006 and will remain so until next year. But Cape Cod Commercial Hook Fishermen’s Association believes the decline and the slow recovery of cod stocks could be linked to the harvest of sea herring by mid-water trawlers. Rich Eldred The catching of river herring has been prohibited in Massachusetts since 2006 and will remain so until next year. But Cape Cod Commercial Hook Fishermen’s Association believes the decline and the slow recovery of cod stocks could be linked to the harvest of sea herring by mid-water trawlers. The herring fishery was the subject of Wellfleet Bay Wildlife Sanctuary’s summer lecture series last week. “One hundred thousand metric tons are caught out at sea,” Lara Slifka, research program coordinator for the Hook Fishermen’s Association, told the audience. “Currently they are not overfished, but a lot of fishermen say those boats are catching too much herring. There is a concern that cod and tuna numbers are down, and that this is a possible cause.” Sea herring eggs coat the sea floor – at depths of 50 to 150 feet – and are devoured as juveniles by flounder, cod, haddock and hake. A range of fish, mammals and birds eat the adults. “We’ve determined the stock is not overfished and overfishing is not occurring,” Bill Overholtz, the head of the Pelagic Resource group at National Marine Fisheries Service in Woods Hole, said in a phone interview. “So that means the biomass is high and rate of removal is in an acceptable range.” To be more precise, Overholtz said the estimated biomass of sea herring in the Gulf of Maine was 1 million metric tons, and last year’s harvest was 85,000 tons. A metric ton is 2,200 pounds. The Fisheries Service estimates the biomass is 65 percent above sustainable levels. “Even though it’s the biggest fishery in New England, a relatively small component is removed, probably 5 percent to 10 percent of the stock,” Overholtz noted. Some of the herring is canned in sardine form, some is frozen, a lot is used for bait and some is processed into fertilizer. On Georges Bank the fishery began with foreign ships in 1961 and peaked in 1968 when 373,600 metric tons were taken. The harvest declined to 43,000 metric tons by 1976. Restrictions were put in. “Starting in the mid-1980s they started to recover, and by the mid- to late-’90s both components (near shore and offshore) had fully recovered,” Overholtz said. A new fisheries management plan was adopted in 1994, and mid-water trawling began on Georges Bank that year with a peak harvest of 35,000 metric tons in 2001. “Mid-water trawling started in Ireland then moved to Alaska, and a lot of these boats are from Alaska,” Slifka said. “They’re mostly owned by American companies. There is a lot of money behind these boats. The commercial industry has a lot of power.” After the collapse, the focus of the fishery shifted inshore and in 2001, 133,000 tons of herring were harvested in the Gulf of Maine, from Cape Cod to Nova Scotia. “Historically the fishery has always been inshore,” Overholtz said. “Herring is a low-price, high-volume fishery, and it’s even more inshore now with the price of fuel. The catch out there (Georges Bank) has been low having to do with travel time, the price of fuel and the probability of finding fish. This is summer feeding season for herring, and they are spread out over a large area of Georges Bank. So it’s harder to find them.” But it’s not so much the amount of sea herring caught by the trawlers that worries Slifka, it’s the bycatch of other fish, especially river herring. “They (fishery officials) look at how much is landed. Not how much is caught and how much is discarded,” she said. Sea herring are also caught in weirs, where unwanted bycatch can be tossed back over the nets, or in purse seines. “Using purse seines and weirs, fish can be discarded alive. With trawlers they can’t,” Slifka said as she showcased a slide of dead hake floating beside a trawler. River herring may be mixed in with the sea herring. “Bluebacks and alewives are river herring,” Slifka explained. “They live in the ocean and migrate inshore to spawn. They (herring) all look similar. The only way to identify them is by touching the underside of the belly or by using a trained eye. River herring spend 80 percent of their lives offshore and they overlap when they’re out at sea. River herring are also being imperiled by this fishery.” The herring travel together in large schools and can be swept up in the trawler’s nets. “Midwater trawlers use nets that are 100 to 150 feet long, and are very non-selective,” Slifka said. “They basically catch everything in their path. Fish are being pumped on board at a rapid rate.” There are observers on the boats to record the catch and bycatch, but Slifka said they are only on 1 percent to 5 percent of trawlers compared to 30 percent of smaller vessels. “Right now we don’t have any complete record to say this is what they are catching,” she said. “Just as they are pumped onto the boat, they are pumped off into trucks and they don’t have a lot of people on shore watching. So we need to work on managing and knowing what is going on on these vessels.” Skip King, who works as a media relations counsel for the Sustainable Fisheries Coalition, which represents much of the midwater trawler fleet, noted that budget cuts have slashed the number of observers. “The MWT boats are required to notify regulatory bodies in advance of every trip and take an observer if one is sent,” he said in an e-mail. “They must call in prior to landing and notify authorities of the time and place of offload, so the fish can be observed at that time. So you know, several years ago as much as 20 percent of all trips were observed. That changed when federal observer funding was slashed – but the rates of bycatch haven't significantly changed.” He also noted the nets have a larger mesh near the mouth, which is designed to let non-target fish, such as cod, escape. Herring, swimming in schools, tend to stay toward the center of the funnel but even many of them escape. Only the tail end of the net can hold fish. Overholtz also said it is possible to distinguish river herring from sea herring, even as they fly past. “It is hard for the general public,” Overholtz conceded. “But our observers are trained to recognize the differences between the different species of fish. There are certain field characters to look for. We just went on a cruise this month conducted by the National Marine Fisheries Service, aboard the research vessel Bigelow, and observed sea herring and river herring streaming by on a conveyor belt and we identified all of them.” He doesn’t think the trawlers are capturing too many river herring. “All indications are the bycatch of river herring by all gear types, and there are three of them, is relatively low,” Overholtz said. “A report will be coming out soon by the Atlantic States Marine Fisheries Council and they will try to estimate what the take of river herring is.” “Bycatch happens on a regular basis,” King agreed. “I don’t care whether it’s commercial or recreational but as a percentage of the catch, it’s really small. There is pretty extensive data that shows that.” Slifka wants more observers and scales at the docks. “We are working with the federal government to get better observer coverage,” she said. A new herring management plan is being drawn up and Overholtz said it would factor in the role of herring as food for cod and other species. “It’s not right on the cusp of our approach but it’s in there,” he promised. “A number of issues will be addressed one way or another.”
2024-06-16T01:27:17.760571
https://example.com/article/5134
The San Francisco 49ers’ Chris Culliver reminded anyone paying attention to this week’s Super Bowl festivities that ideas have weight and can sometimes sting, like a giant bumble bee with an axe to grind. During a radio interview Culliver was asked about gay football players in the NFL. His response: “I don’t do the gay guys man. I don’t do that. No, we don’t got no gay people on the team, they gotta get up out of here if they do. Can’t be with that sweet stuff. Nah…can’t be … in the locker room man. Nah.” On their own, the words are mild, inoffensive. No epithets or insults are uttered. But cobbled together and spoken, his words are like concrete blocks looking for toes to fall on. Kudos to Culliver. Seriously. He has an opinion — however unenlightened it may be — he voiced it and now his teammates, his colleagues, bosses and sponsors know where he stands. Too often in our own lives we work with, listen to, take orders from, pray alongside of, cater to and tolerate for the sake of professional or personal harmony people whose feelings about race and sexual identity — two of the biggest taboo topics in our society — we don’t know. In other words, we’re left guessing. That Culliver has expressed, however clumsily, his apparent homophobia leaves no room for doubt. Thanks, Chris.Critics might blast Culliver for setting a bad example to kids. That’s a narrow strait to navigate. Would and do parents feel the same way about a doctor who shares the sentiment about gays in the workplace? Or principals about gays in the classroom? Is someone who shares those same feelings because of religious or personal beliefs any less a role model than a macho professional athlete? Or are we offended because Culliver had the nerve to say out loud what so many (too many?) people think? Those who expect professional athletes to be role models for their children may want to consider the example of another futbol player. Jozy Altidore plays in Holland. By looking at him you can’t tell if he is gay or not gay. But you do see he is black. An unfortunate scourge to plague European futbol is racism and on occasion it surfaces during league and international matches. In a recent game a small pocket of the opposing team’s fans shouted racist names and made sounds like monkeys every time Altidore touched the ball. The referee wanted to end the game. He consulted Jozy. “You know what, it’s only going to make them stronger if we back down,” Altidore said. He went on to tell Sports Illustrated: “I didn’t want to empower them. Empowering them would have been walking off and saying, ‘OK, you got the best of me, I’m done.’ I wanted to show them they couldn’t hurt me, in a sense.” We can’t control what people think but we can control how we respond. Sometimes you just have to swat that bee away, shrug and move on.
2024-01-24T01:27:17.760571
https://example.com/article/5460
TRIP Data Featured in French IR Journal French may be the language of diplomacy, but within academic circles, the French international relations (IR) field is often perceived as uniquely insular. Using data from the Teaching, Research and International Policy (TRIP) project based at the College of William & Mary, two French researchers have systematically explored this national isolation for the first time. Their results, published in the Revue Francaise de Science Politique, are now available in English translation. Jérémie Cornut, a post-doctoral fellow at McGill University, and Dario Battistella, Professor of Political Science at Science Po – Bordeaux , argue in “Is French IR Emerging?” that French IR scholars “are hesitating between a desire to differentiate themselves ... and a desire to integrate with the global discipline.” The article uses data from the 2011 TRIP Faculty Survey, which was distributed to more than 7,000 international relations scholars worldwide and nearly 300 in France. Cornut, who previously studied in France, notes that the TRIP survey provides an opportunity to understand why his academic experiences in the two countries have differed so dramatically. Among their findings, Cornut and Battistella show that while French IR scholars are unlikely to join international academic organizations, they turn to American journals and academics as important sources of scholastic thought. Conversely, the world appears to give little recognition to French IR. Neither of the two major French IR journals make the list of most influential journals, nor does a French university appear on the list of best doctoral programs. The authors argue that this inattention is driven in part by the lack of English-language publications by French authors, the paucity of French scholars in the major IR research institutes around the world, and a greater emphasis on qualitative studies than the global norm. They further contend that although institutional barriers in French academia have played a role, French IR scholars also are to blame for their isolation. Battistella believes that self-reflection is critical for French IR to engage with the international community. “It is the only means to convince a significant part of [scholars] to get out of the prevailing self-sufficiency [that] the majority of them are so proud of,” Battistella said. Cornut remarked that the TRIP survey not only provides value through the data it collects on more than 20 countries, but also, “It is another aspect of [a] global discipline that is progressively beginning to appear.” The next edition of the survey, for which Cornut and Battistella will once again serve as local country partners, will be issued this year. While Battistella is pessimistic about the development of the field, Cornut notes that younger scholars have exhibited greater willingness to engage with the international IR community than their older peers. “French IR will still have a strong empirical, sociological tendency, but most IR scholars will have learned, or accepted, that you have to publish in English if you want to be read,” Cornut said.
2023-09-13T01:27:17.760571
https://example.com/article/3248
// <copyright file="IExceptionAnalyzer.cs" company="Automate The Planet Ltd."> // Copyright 2018 Automate The Planet Ltd. // Licensed under the Apache License, Version 2.0 (the "License"); // You may not use this file except in compliance with the License. // You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. // </copyright> // <author>Anton Angelov</author> // <site>http://automatetheplanet.com/</site> namespace HybridTestFramework.UITests.Core.Utilities.ExceptionsAnalysis.ChainOfResponsibility { public interface IExceptionAnalyzer { void AddNewHandler<TNewHandler>() where TNewHandler : Handler, new(); void RemoveLastHandler(); Handler MainApplicationHandler { get; set; } } }
2024-03-13T01:27:17.760571
https://example.com/article/8501
There is one large but overlooked issue amid the various signs of trouble for the GOP with the 2018 midterms right around the corner: The number of Republican women in Congress who are retiring, and the disproportionately few Republican women running for Congress. Moderate Republican women, it seems, are struggling to find a path forward in a male-dominated and aging party that has embraced President Donald Trump — a man who frequently makes sexist comments and has been accused of sexual misconduct and assault by multiple women — as its standard bearer. According to the Center for American Women in Politics, the number of Democratic women running for House seats this year increased 146 percent over 2016, while the number of Republican women running for the House increased just 35 percent. A party that does not diversify cannot survive. Get the think newsletter. This site is protected by recaptcha The widely-expected Democratic wave in the midterms means that momentum is on the side of those Democratic candidates at a time that many liberal women are leading the charge against Trump and the Republican party making their voices heard. With so many liberal women running for political office in an election that may strongly favor their party, the disparity of women's representation in the two political parties is only going to become more apparent to voters. A big factor here is that Republican women clearly have a hard time running in the age of Trump: They will be, in particular, expected to not just take a stand on his presidency but on his misogynistic behavior and comments toward women which could put them at a disadvantage. Either they'll be seen as out of step in the #MeToo era if they dismiss his actions, or they'll set themselves up for scrutiny from Trump and his various acolytes who view any criticism as fundamentally disloyal. But a Republican Party that remakes itself in the image of Donald Trump is unrecognizable and has lost its compass. Most importantly, I fear the precedent that is being set when Republicans defend Trump and excuse his degrading comments toward women — something I have yet to forget. Moderate Republican women, it seems, are struggling to find a path forward in a male-dominated and aging party that has embraced President Donald Trump. And, what's worse is that the defenses and excuses seem to work: A poll released last Wednesday by the Pew Research Center shows a very partisan divide on sexual harassment. A full 62 percent of Democrats believe men getting away with sexual harassment or assault is a major problem, but only 33 percent of Republicans feel the same. Just as telling, is that 60 percent of Democrats think it is a major issue that women aren’t believed when they report harassment and assault, compared to only 28 percent of Republicans. Before that, in November 2017, Quinnipiac University published a poll that showed sexual harassment isn’t a deal breaker among Republican voters when it comes to President Trump. Shockingly, 63 percent of Republican voters said Trump shouldn’t be impeached even if it was proven that he had sexually harassed women. Clearly, there is a problem when so many Republicans don't take sexual harassment seriously, and it's thus no coincidence that the party has had a hard time when it comes to messaging to women and attracting women to the party in the age of Trump. Republicans worked hard to close the gender gap and to attract young people to its open tent during and after the 2012 election, but they may have destroyed all the progress they made by supporting Trump. The views of Republicans on sexual harassment have the potential to limit female candidates from running for political office, from becoming chiefs of staff or from obtaining senior roles. Moreover, with Republicans in majority in Washington and in many statehouses across the country, the views of Republicans on sexual harassment have the potential to limit female candidates from running for political office, from becoming chiefs of staff or from obtaining senior roles in a male-dominated party and field. For instance, the same Pew poll shows that 64 percent of Republicans say it is harder for men to interact with women in the wake of the #MeToo movement, compared to 42 percent of Democrats. And, of course, Republicans have traditionally been resistant toward recognizing inequality in the workplace: Many of them in the current Congress refused to bring the Paycheck Fairness Act to the floor for a vote and voted against the 2009 Lilly Ledbetter Fair Pay Act, both of which will continue to hurt them with female voters. The Republican Party needs to become more forward-thinking and inclusive of women, or it will continue to have trouble connecting with female voters and recruiting female candidates. And a party that does not diversify cannot survive; young women in particular, will continue to leave the party in droves if it continues to not represent them. Ashley Pratte is a political commentator and communications strategist who previously served as director of media relations and public affairs at the American Legislative Exchange Council (ALEC) and the director of media relations and consultant for Better For America. She currently serves on the Board of Republican Women for Progress.
2024-04-13T01:27:17.760571
https://example.com/article/9370
Q: Defining a new location for syslinux configuration files when setting up PXELinux I am working on a mock up of a PXE server for the place I work. I am trying to put the image files and configuration file in places that keep things a little more organized. Even though my dhcpd.confspecifies the configuration options needed to tell PXELinux where to look for config files it still does not find said files. Here is what my /etc/dhcp/dhcpd.conf looks like, this is where I imagine the issue is. option space PXE; option PXE.mtftp-ip code 1 = ip-address; option PXE.mtftp-cport code 2 = unsigned integer 16; option PXE.mtftp-sport code 3 = unsigned integer 16; option PXE.mtftp-tmout code 4 = unsigned integer 8; option PXE.mtftp-delay code 5 = unsigned integer 8; option arch code 93 = unsigned integer 16; option space pxelinux; option pxelinux.magic code 208 = string; option pxelinux.configfile code 209 = text; option pxelinux.pathprefix code 210 = text; option pxelinux.reboottime code 211 = unsigned integer 32; ddns-update-style none; option domain-name "lab.solignis.com"; option domain-name-servers ns01.lab.solignis.com; default-lease-time 600; max-lease-time 7200; authoritative; log-facility local7; subnet 192.168.147.0 netmask 255.255.255.0 { range 192.168.147.100 192.168.147.254; option subnet-mask 255.255.255.0; option routers 192.168.147.2; option broadcast-address 192.168.147.255; default-lease-time 600; max-lease-time 7200; class "pxeclients" { match if substring (option vendor-class-identifier, 0, 9) = "PXEClient"; next-server 192.168.147.10; if option arch = 00:00 { option pxelinux.configfile "common.cfg"; option pxelinux.pathprefix "/configs/"; filename "/pxelinux/images/BIOS/pxelinux.0"; } elsif option arch = 00:06 { #option pathprefix "/configs/"; #option configfile "/EFIx64/default"; filename "/images/EFIx64/syslinux.efi"; } elsif option arch = 00:07 { #option pathprefix "/configs/"; #option configfile "/EFIx64/default"; filename "/images/EFIx64/syslinux.efi"; } elsif option arch = 00:09 { #option pathprefix "/configs/"; #option configfile "/EFIx64/default"; filename "/images/EFIia32/syslinux.efi"; } } } Parts of the config were compiled from various parts of documentation, the parts that are commented out are old pieces that I have not fixed yet disregard those. For now I just want to get standard BIOS working (arch = 00:00). Here is what my file structure looks like for my tftpboot directory. server01@server01:/var/lib/tftpboot$ tree . └── pxelinux ├── configs │   └── common.cfg └── images ├── BIOS │   ├── ldlinux.c32 │   └── pxelinux.0 ├── EFIia32 │   └── syslinux.efi └── EFIx64 └── syslinux.efi 6 directories, 5 files I was pretty sure I have it setup right for pxelinux but it does not see the config file so something is not configured right. Can anyone provide an idea of what I misconfigured? I have been banging my head on this all day. A: Note that the configfile is relative to the pathprefix: if option arch = 00:00 { option pxelinux.configfile "common.cfg"; option pxelinux.pathprefix "/pxelinux/configs/"; filename "/pxelinux/images/BIOS/pxelinux.0"; this will look for a config file called /pxelinux/configs/common.cfg on the TFTP server. if this fails just get a Wireshark traffic capture and see the TFTP file requests and where they are pointing to.
2023-12-26T01:27:17.760571
https://example.com/article/2286
about us KAUFMAN - "Or cramming in sex, or car chases, or guns. Or characters learning profound life lessons. Or characters growing or characters changing or characters learning to like each other or characters overcoming obstacles to succeed in the end. Y'know ? Movie shit." Kaufman is sweating like crazy now. Valerie is quiet for a moment - from "Adaptation". We are all about CINEMA. That movie shit. NOTHING is sacred. NOBODY is spared. Because we talk about films, dammit. Not your sex life. Films, fests, unsung, indies, undiscovered - all that and some fun. If you have dope on anything related to cinema or you would like to share something, do write to us at moifightclub@gmail.com. Follow Blog via Email Enter your email address to follow this blog and receive notifications of new posts by email. DISCLAIMER The views, opinions, reviews, articles, or positions, expressed by the authors and those providing comments are theirs alone, and do not necessarily reflect the views, opinions, positions or strategies of ANY OF THE EMPLOYERS, FRIENDS, RELATIVES, PR agencies, Production houses, Media group and such third parties associated with the authors. The latter make no representations as to accuracy, completeness, currentness, suitability, or validity of any information on this site and will not be liable for any errors, omissions, or delays in this information or any losses, injuries, or damages arising from its display or use. In short, if you have an issue with us or any post we've written, write to us at moifightclub@gmail.com Q and Umesh Kulkarni – two daring film-making voices from two different corners of the country, and whose films we always look forward to. And this time both of them seem to be trying something new which they haven’t done before. Q’s film is called Ludo and Umesh’s film is Highway Ek Selfir Aarpaar. Q has directed the film with Nikon. LUDO Trailer : Official Synopsis : Four desperate teenagers. A night of sexy mayhem. The big city. Or so the plan goes, until a series of misadventures later, Babai, Pele, Ria and Payal end up in a locked shopping mall in the dead of the night. Alone at last… until an old couple appears out of nowhere with a piece of folded leather and a glass container with two dice made of bone. A game. Simple, but deadly. They call it Ludo. A game defiled by a young couple centuries ago. An unbreakable curse, a living board, eons of bloodbath spanning the subcontinent. A game that has reached this city. Not just monsters, but prisoners of fate. Immortal lovers existing under a curse that will not die. They live within the game. Blood must spill. Bone must shatter. Beware the rattle of the Ludo dice. Like in the last few years, Rajeev Masand has done a series of roundtable discussions this year too. And the one which has the best panel and which interests us the most is the directors roundtable. This one had Vishal Bhardwaj (Haider), Rajat Kapoor (Ankhon Dekhi), Vikas Bahl (Queen), Imtiaz Ali (Highway), RajKumar Hirani (PK) and Abhishek Varman (2 States). Continuing with our Year-End series, Rewind 2014, in this post our music blogger Rohwit picks up the best sounds of the year – the songs that he loved and we played in loop. In no particular order, this post includes both films and non-films music/talent/songs/album. (More from our Rewind 2014 series : Musical Gems We Discovered This Year is here, Kaali Zubaan’s bollywood wrap is here, 18 Film Fanatics on 18 Films That Stayed With Them is here, Best of 2014 – Script of Queen is here, Script of Ankhon Dekhi is here) Jagave saari raina (Dedh Ishqiya) – Much has been written about this underwhelming album from Gulzar-Vishal collaboration. However, Hamri ataria and Jagave saari raina were beautiful exceptions. No, the antraa of ‘Na bolu main to’ weren’t as good as the mukhda, so I won’t include that song here. Even before the videos were released, we knew this would be the song that would capitalize on Mrs. Nene’s grace and her dancing prowess. To hear Pt. Birju Maharaj just sweetened everything that much more. Did I miss mentioning about how charming was Rekha Bhardwaj in the song? Well, you knew that already didn’t you? Fandry bird theme (Fandry) – No words should endeavor to convey what this cute little piece did to us. Give it a try here. In fact the love theme here is equally good. The use of Oudh and Cello lent a solid, raw feel to the sound and two thumbs up for that! Aloknanda Dasgupta ji, take a bow! Indian Ocean – If you have been living under a rock, then perhaps you might not have noticed the release of ‘Tandanu’ by Indian Ocean which will go down as one of the best albums by the group ever! From what could be easily termed as one of the most important films of the year, Katiyabaaz, we got the track ‘Kanpoora’, a must hear if you haven’t heard it already! (and what a delightful video!) Sooha saha (Highway) – Bollywood is running from darkness towards even more darkness when it comes to giving us songs which mothers can sing to their little ones. ARRahman took cognizance of this problem and gave us this tender piece from Highway. While Alia was rightfully showered a lot of credit for this song, we mustn’t forget AR Rahman’s ‘mixing and tuning’ and a solid Zeb who made this song what it is. Heera from this album comes a close second because it’s a delicacy of sorts when Kabir and Rahman are credited in the same song. Here is Sooha Saha…much of the song’s impact was experienced thanks to a superlative Randeep Hooda. The World would be unfair if it doesn’t acknowledge Randeep this year for Highway. Suno na sang e marmar (Youngistaan) – Now that the well deserved nomination to Oscar has been sent, it would be criminal not to mention the blockbuster Youngistaan to the list. When Jackkkkie decided to diss Mayawati’s hardwork involving sang-e-mar-mar with a song, it gave us this hummable track. Frankly, I thought it took a lot of guts to film the song right where a lot of public money was wasted on sang-e-mar-mar (wink wink). The song was perhaps too good for the film and when Jeet Ganguly and Arijit recreated the magic for the Hindi version, they added some grandeur to the sound. Here is the Bengali version and here is the Hindi version. My favorite is the Bengali version of course! Title song (Revolver Rani) – the film might have fallen flat on its face but the title track of the film was a riot thanks to the word ‘bhasad’ and Usha Uthup! Do give it a try. Had the film done well, it would have played in a the loop on ‘popular’ charts, just the way they played vomit inducing Kicks and what not! And trust me, it is much more fun than all the garbage music of 100 crore commodities. Watch this video. Sketches of Darjeeling (Bipul Chettri) – I came across this album when it was released in the month of July, 2014 but didn’t hear it because I was quite occupied with my day job. Then one of the many ‘anonymous’ people who share music with me sent me one track from this album, and I punched myself for about 40 minutes continuously for having sat on the album for so long! Do hear my favorite track from the album titled – Ode to my father here, and then buy the album. The track is free flowing and you will hear the free flowing water as well. Is the track in Hindi? No. Does it matter? No!! So do pick it up! Ding dong (Finding Fanny) – I couldn’t make sense of fusing this Goa film with a Punjabi title song and a messy song at that, still this one oozed out a lot of love, and we love it for that! Cliched as it might sound to some of us, but the song painted a picture of an adorable Uncle ‘Pedro’, who is liked by everyone, singing this song near a beach, on just another day in Goa. Loved Mathias for this one! Haider (Album) – It won’t be right to pinpoint a song that was good because this album was the best from 2014. The only underwhelming part was the song by Arijit. I still feel that song was composed FVBV (For Vishal, By Vishal), and Arijit came in as an afterthought. This album is the reason we wait for Vishal and Gulzar to get together more often. All songs are here. Imagine the ‘Aao na’ opening bit and now count your goose pimples. Also, while we are on the subject…here is the Roohdaar theme from Haider. Oopar oopar renn de – Tanishk and Baba Vayu gave us a laid back anthem this year and I can openly declare with no hesitation that this was the best non-filmi song by a new band I came across in 2014. Hear the song once and tell me if you aren’t of the same opinion. I do hope they put the song on sale soon and that they don’t fizzle out after setting the bar this *high*! Mikey Mccleary – We all love everything Mikey does. Why else can you explain people sticking to networks which don’t work? May be because their ads are oh-so-musical and cute! It was no surprise that the album Mikey came out with was instantly likeable. If you haven’t heard the album yet, do hear it once! Our favorite – The world is our playground (Sung by Mikey) and Just a little crush (Sung by Shalmali). That said, Mikey’s song in Sonali cable wasn’t bad either. The entire album is available here. Like this: Today morning, we were discussing reviews versus blogs. It started with a personal and candid post (Dad, We’re In Nebraska) by Rahul Desai. If you have seen Nebraska, do read it. It’s a strange feeling when you can identify your life with a film. And sometimes, it’s liberating in more ways than one. Today evening, we received another personal piece by @kuhukuro. This one is about Highway. An honest, brave, and candid open letter to the filmmaker whose film had an impact on her as it mirrors her life. Do read. Dear Imtiaz, I am not a film critic, nor can I boast of being very cinema-savvy. But I have been insane enough to source my philosophies from cinematic moments. Films have been thriving territories for epiphanies. Highway comes at a point in my life when I am delving in the art of being ruthlessly honest to my feelings, of asserting myself, and of exploring a newer version of myself. This one is a film that resonates with me for various reasons. For starters, I was also sexually abused as a child, and the perpetrator was a close relative. I could relate to the lingering and stealthy effect of the trauma depicted on screen. I also disclosed this fact to my family after entering adulthood. The film’s portrayal of the family’s reaction mirrored my situation. Watching Veera intrepidly telling it like it is and being unapologetically ‘herself’ in the last scene was heart-wrenching yet therapeutic for me. I have not allowed myself that outburst though. Not yet. Last year, my father succumbed to his mental illness and committed suicide. I know what you mean when you say that Bhaati’s death was the ultimate liberation for Veera. My dad’s death had a similar effect on me. I faced one of my worst fears. Nothing really terrifies me anymore. It incidentally also happened to be the year when I confronted the reality of my troubled marriage. Two trips that followed set me free in many ways. The salt pan scene in the film set against the ‘Tu Kuja’ soundtrack echoed my sense of self-inquiry. After watching this film, I was even more convinced that a journey from which you don’t completely return was exactly what I needed. Unlikely confidants, unlikely confidences, and accidental yet gratifying connections were a part of my journey as well. The journey in ‘Highway’ unfolds like a map of tragedies that exist in us, unfurls. It was a catharsis to observe the metaphorical ride from fragility to strength to nerve. I was nodding my head vigorously in agreement while watching the moments on screen where the lines between terror and wonder blurred for Veera. I noticed that Veera climbed many rocks in the film – big and small. I am assuming it metaphorically indicated overcoming obstacles and the joy of small victories. Many people couldn’t fathom Veera’s behavior – laughing interspersed with crying, and then questioning herself aloud like she was having an out-of-body experience. According to my reading, her emotional reactions were a part of the process of shedding the repressed parts of herself, and, embarking on the confusing yet exhilarating expedition of letting her real feelings come to the fore. Liberation is a strange and an idiosyncratic process. The silent scenes in the film aptly mirrored the way a meditative stillness seizes our inner world, when we travel. Then you stumble upon moments that break you before they make you. They unshackle. They teach you to trust your gut. It is important for life to whirl you around and turn your world upside down oftentimes. Memory is not something that fades in my case. It looms large and I crouch in its towering shadow. This time I have decided to soar higher than this menacing force. Patakha Gudi has egged me on to unleash that spirit, which was hitherto tucked away and silenced. I have just begun the task of developing my own vocabulary to express who I am. Thanks to Highway, I am propelling myself further in the direction of dismantling norms that don’t serve me. Before I sound like a gushing obsessive fanatic, I should wrap it up. Your film will be a part of the trajectory that is turning me into a functional, healthy, and a fulfilled woman. Thank-you Imtiaz, Thank-you Highway. I know I will get there soon. Along the way, I will live like I mean it. Like this: As far as the reactions go, Imtiaz Ali’s new film ‘Highway’ is more or less on the same track like his last film Rockstar – completely divided between lovers and haters. And like last time, Ali was quite open and candid to discuss the strength and every weakness of the film, and took it all head on. We love and respect those filmmakers who are open to such dialogues. So thanks a lot, Imtiaz Ali. Whatever film you make, hope you remain like this. We also hope more bollywood filmmakers will be open to such Q and As. Who really wants to read about the film pre-release, which is still quite the norm in the country. And post-release, they just vanish. The film got over by 12:15 or so, and then the discussion went on till 2:30 am, and then it went on for some more time outside the theatre. It was great fun. Hope you guys enjoy the videos as much as we enjoyed the live session. Some questions might not be audible, so do use your headphones or speakers. Thanks to PVR Andheri and Shiladitya Bora for helping us out with all the logistical support. Editor’s Note: Imtiaz Ali’s much-awaited film ‘Highway’ released last Friday, and, over the course of just a few days, has achieved the unique feat of inviting equal amounts of love and hate. What’s even more remarkable is the vehemence with which both ‘lovers‘ and ‘haters‘ have expressed their views about the film. Barring the sedate review or two, sharp words have flown between between the two ‘camps’, especially if you’ve followed the buzz on Twitter. Or perhaps you’ve read the gloriously funny Neruda-take on the film. With this Highway it seems, there’s been no middle-road. However, as the fires die down, it’s time to pause and reflect on this undoubtedly fascinating film that’s made some fans of Ali despair at his latest turn; some fans exult in his new achievement; and converted some Ali-sceptics into fans. For now, here’s Shivam Sharma taking stock of the film and taking you on a journey he greatly enjoyed. Also, if you have seen the feature, click here to watch Imtiaz’s original telefilm which inspired the feature and was also titled Highway. And do participate in an interesting poll in that post. (The following piece contains spoilers. It also contains personal whims, fancies, two languages and if the point gets lost in between somewhere then भूल-चूक, लेनी-देनी माफ़ कीजियेगा.) १५ साल पहले इम्तियाज़ अली ने ज़ी टीवी के शो “रिश्ते” के लिए एक एपिसोड बनाया था उसके बाद उन्होंने काफी कुछ बनाया, हासिल किया और काफी हद तक बॉलीवुड में एक secure, genre-specific director बन गए. Especially after ‘Rockstar’, his biggest hit, his career graph has gone steadily upwards. ‘रॉकस्टार’ जैसी बड़ी hit देने के बाद, he had the option of going even bigger financially. Knowing how the industry works, giving a big hit generally works wonders — Nolan had a carte blanche to give his whims free rein after ‘The Dark Knight’; and so he made ‘Inception’. But the decision of not going bigger in terms of cast, budget and stars, and instead making a movie based on a story he wrote 15 years ago (or more) with a modest budget, stripped of most ‘Bollywood’ elements and with a not-so-bankable cast, tells us more about the director that Imtiaz is and the path he is on. ‘हाईवे’ की journey सिर्फ वीरा और महाबीर की नहीं है. ये इम्तियाज़ की भी उतनी ही “Finding oneself” वाली journey है. Back to his roots. १५ साल पहले वाली. Highway may not be Imtiaz’s best work but it’s definitely his most honest. Of all his films, this has the most scenes without crutches — minimal background music; long, apparently aimless scenes interspersed with silence as if they were unplanned; and scenes that are ‘real’, that feel raw: Veera laughing/crying without any reason sitting on a boulder by a freshwater stream; Mahabeer’s breakdown. Rough edges काफी visible हैं and some scenes seem unfinished in a sense. काफी clear है कि इम्तियाज़ खुद कुछ नया ढूंढ रहे हैं यहाँ. He relies more on his instincts and the power of raw scenes and narrative here than anything else — and he fumbles along the way quite often too. His warts are quite visible here and the screenplay isn’t entirely convincing. However, he has tried to get out of his comfort zone i.e. a strong soundtrack, typical funny side characters, likeable leads etc. The part which juts out like a sore thumb — and that I personally hated the most — was the end segment, the final 15 minutes where he tried to define everything, make sense of the proceedings and tie all the loose ends. It all felt forced and unreal. That part was the most Bollywood-like of the whole movie and I wish he had ended the film 10 minutes earlier and not necessarily provided a forced closure. (The Lunchbox followed it so beautifully. Ritesh Batra knew where to stop. पर it’s ok, कोई बात नहीं.) The movie soars with the terrain it slowly travels — almost metaphorically. The part where Veera and Mahabeer lose themselves in the mountains, without a care in the world, is the most enchanting. These scenes soar higher than all others. सूफ़ियत कह लें या कुछ और, उस हिस्से में फ़िल्म एक अलग space में पहुँच जाती है. Imtiaz makes a great decision here to cut back on the spoken word and just let the ambient sounds and the scenery do the talking. This part is probably one of the purest cinematic experiences that I have had at a theatre ever. “एक गोली में आदमी ख़तम हो जाता है न?” “दो आदमी.” What looks like a simple ‘Stockholm Syndrome’ story gradually becomes much more as we go farther up the mountains and Imtiaz lets the story take its course beautifully towards the latter half (with the help of some great cinematography by Anil Mehta). There are many scenes without much dialogue here. These silent scenes help — they make you think; at that point, it all becomes subjective. You interpret what you want to, you become a part of the journey and maybe that’s what it all comes down to eventually. You find stuff about yourself. The two leads shine as does the supporting cast. Alia is brilliant in most parts, despite overdoing a few things here and there. But what a revelation she is! Randeep Hooda is restrained throughout and gradually takes over when Mahabeer finally breaks down. He is one of the best actors we currently have and this performance strengthens that position. AR Rahman’s music and background score take a backseat here and honestly he does not have that much to do. It’s just not that kind of movie maybe. ‘Patakha Guddi’ and ‘Maahi Ve’ are soulful; Sooha Saha is a lovely track as well. However, I really missed Mohit Chauhan’s vocals. The visuals reminded me a lot of especially this song of his. Highway tries and succeds and fails and then succeeds again. It has some glorious highs and some not-quite-there moments but कुल मिला कर its highs spectacularly overshadow the lows and the movie now and again transcends into a रूहानी space which is well worth the journey — a rarity in Hindi cinema. But I have always been a mountain person all my life so do excuse me for being a bit biased. चलिए फिर, I’ll see Highway again and try to find out more. अपने बारे में. UPDATE (22-02-2014) : Highway has finally released. As Imtiaz mentioned earlier, it’s a retelling of one of his earlier telefilm which was also titled Highway. If you have seen the feature and not seen the telefilm, scroll down and do watch it now. And do participate in our poll. If you HATE spoilers and have not seen the feature yet, DON’T watch the telefilm or read the synopsis. DON’T SCROLL DOWN ANY FURTHER. EARLIER POST (18-12-2013) Has Imtiaz Ali rehashed his own Highway? Watch it and decide for yourself. This ‘Highway’ was part of Rishtey series on small screen. It stars Aditya Srivastava, Kartika Rane and Manish Chaudhari. And here’s the official synopsis of this highway – (SPOILER ALERT) Vinay and Veera are going to be married in a week. They meet stealthily as they are forbidden to meet before the wedding. They go for a drive on the highway, but unfortunately, some thugs kidnap Veera. Vijay, the head of the gang, regularly supplies girls to brothels and Veera is his latest catch. He plans to sell Veera but the plan is put on hold as he learns that her fiance’s father is a police commissioner. Veera tries her best to escape, but is unsuccessful. Somehow, Vijay and Veera begin to get emotionally involved with each other. Veera and Vijay spend time together escaping to another place. Veera confides to him that she was raped as a child. She tells him that she feels very safe when he is around because he would not let any harm befall her. Having a change of heart, Vijay asks her to escape and return to her home. Will Veera go back to Vinay or choose to stay with Vijay? Imtiaz did mention about this Rishtey episode in few interviews. But after looking at the trailer and this episode, it looks more or less the same. Let’s wait till the film releases to see how much has been changed.
2024-01-12T01:27:17.760571
https://example.com/article/7850
"Rockets Over Alaska" Amazon eBook Poker Flat Research Range prepares rocket for launch Staff and scientists at Poker Flat Research Range are busy preparing for the opening of the 2013 launch window that will allow one NASA sounding rocket to take MILENA 2013 flight and arc through an active aurora display over northern Alaska. The launch window is scheduled to span Feb. 2 to 17, 2013. The rocket experiment is named VISIONS, short for “VISualizing Ion Outflow via Neutral atom imaging during a Substorm.” Douglas Rowland, of the Space Weather Laboratory at NASA Goddard Space Flight Center, is the principal investigator for VISIONS, a mission that will determine how the aurora heats and slingshots oxygen out of the upper atmosphere. The flow of oxygen from Earth’s upper atmosphere is known as the auroral wind. While this wind is not very dense, its flow away from the planet impacts the space environment, such as the behavior of the Van Allen radiation belt. “We know that this wind is strongest when the aurora is active, but we don’t yet know how much oxygen gets lifted out of our atmosphere, how long it takes, at what altitude the wind blows strongest or what parts of the aurora are most efficient at driving it,” Rowland said. To answer these questions, the VISIONS rocket will fly through the region where auroral wind is generated, up to 500 miles altitude. The sounding rocket consists of four specialized instruments riding in the payload of a four-stage Talos-Terrier-Oriole-Nihka sounding rocket. Along the rocket’s short flight, a Miniaturized Low-energy Energetic Neutral Atom imager, known as MILENA, will serve as a camera, mapping out the auroral wind detecting oxygen atoms as they accelerate out of the upper atmosphere. The fully assembled rocket is longer than a school bus, with the massive payload scaling 17 feet alone. Rowland has served as co-investigator on two previous rocket projects launched from Poker Flat Research Range in the last decade. The range is located 30 miles north of Fairbanks on the Steese Highway. Poker Flat Research Range is the only university-owned sounding rocket launching facility in the world. NASA personnel and scientists from across the nation have launched scientific sounding rockets from the facility since the late 1960s.
2024-02-27T01:27:17.760571
https://example.com/article/4655
licking9Volts has asked for the wisdom of the Perl Monks concerning the following question: Hi all, I'm fairly new to Perl, and lately I've been converting my old awk scripts to Perl by using a2p. I'm running version 5.004_04 on Irix. (I know there's a newer version but our admins are tied down by corporate red tape when it comes to installing software). Anyway, I noticed that it always inserts these three lines in the generated Perl code: I'm puzzled by the $[ variable. I read in Programming Perl that it's set to 1: "...to make Perl behave more like awk...when evaluating the index and substr functions". I don't mind using 0 as the array base so I started tinkering around with this variable just to see what would happen. Well, nothing happened when I changed it. Shouldn't it have some effect on arrays like this?: "perldoc perlvar" command will say about such funny variables in detail, but in short why you did not noticed any distinctions when changing array bound base -- you did not relied on that in your script! Namely, you filled entire array with values, and after that you may be output that array out entirely, without specifying any bound at all. You'll see a diffenrence when you'll do some implicit indexing, such as $in_data[0] or somesuch. Beleive me or not, I got different results when set $[ to 1, 7 and 0 running your piece of code. (slightly modified, but you did not provided exact code to execute. and I'll show you my logs if needed.) About usage of "$_" variable -- beware, your "while(<FILE>)" - this loop corrupts "$_", and "local $_;" statement somewhere before that loop will be a good idea, just to preserve its value. Sins of Perl Revisited will get you an idea what I mean. Here's an excelent explanation about power plant... well, read on, this certainly worth it!
2024-02-03T01:27:17.760571
https://example.com/article/1714
It is still a beautiful panorama, the place is gorgeous and makes you want to go, very nice presentation, really beautiful, as much for the view as for the colors that highlighted this beautiful shot, thank you Francis
2023-12-28T01:27:17.760571
https://example.com/article/1989
Q: Адаптивные табы с изогнутым краем, наезжающие друг на друга Добрый вечер. Необходимо сделать резиновые вкладки-табы, как на картинке. В какую сторону копать? A: Вот например, можете копать в сторону before/after, border-radius: $(function() { $("#tabs").on("click", ".tab", function() { var tabs = $("#tabs .tab"), cont = $("#tabs .tab-cont"); tabs.removeClass("active"); cont.removeClass("active"); $(this).addClass("active"); cont.eq($(this).index()).addClass("active"); return false; }); }); *, *:before, *:after { box-sizing: border-box; } html, body { color: white; margin: 0; padding: 0; } .tabs { position: relative; background: red; } .tabs:before, .tabs:after { content: ''; display: table; } .tabs:after { clear: both; } .tab { position: relative; float: left; width: 25%; background: red; padding: 10px; border-top-right-radius: 25px 50%; border-bottom-left-radius: 25px 50%; } .tabs .tab:first-child { border-bottom-left-radius: 0 } .tab.active { background: blue; } .tab.active:before { content: ''; position: absolute; width: 25px; height: 50%; background: blue; top: 0; left: -25px; } .tab.active:after { content: ''; position: absolute; width: 25px; height: 100%; border-top-right-radius: 25px 50%; background: red; top: 0; left: -25px; } .tab.active .tab-helper{ display:block; position: absolute; width: 25px; height: 50%; background: blue; bottom: 0; right: -25px; } .tab.active .tab-helper:after { content: ''; position: absolute; width: 25px; height: 100%; border-bottom-left-radius: 25px 50%; background: red; bottom: 0; right: -25px; } .content { background: blue; height: 200px; } .tab-cont { display: none; padding: 15px 10px; } .tab-cont.active { display: block; } <script src="https://ajax.googleapis.com/ajax/libs/jquery/2.1.1/jquery.min.js"></script> <div id="tabs"> <div class="tabs"> <div class="tab active"><i class=tab-helper></i>Вкладка №1</div> <div class="tab"><i class=tab-helper></i>Вкладка №2</div> <div class="tab"><i class=tab-helper></i>Вкладка №3</div> <div class="tab"><i class=tab-helper></i>Вкладка №4</div> </div> <div class="content"> <div class="tab-cont active"> Контент №1 </div> <div class="tab-cont"> Контент №2 </div> <div class="tab-cont"> Контент №3 </div> <div class="tab-cont"> Контент №4 </div> </div> </div>
2024-07-08T01:27:17.760571
https://example.com/article/2629
I’m down in Albuquerque, New Mexico visiting the set of Mark Neveldine and Brian Taylor’s untitled Gerard Butler sci-fi action film (which is going under the codename: Game). Lakeshore Entertainment producer David Rubin was able to reveal to me a few new details about the upcoming Crank sequel. If you don’t want to know any spoilers, stop right now and proceed no further. The big question everyone wants answered is how does Jason Statham’s character survive for a sequel to be made. When I asked Brian this question at Comic Con he started telling me about this cool video he found on You Tube where a skydiver fell to earth unable to open his parachute. The real life video footage was shot from a helmet camera. The interesting thing about this video was the guy got up on his two feet and began walking immediately after the fall, working on pure adrenaline. Brian wouldn’t tell me how Chev Chelios survives, but would only remark about this viral video with a grin. Producer David Rubin recalled shooting the last scene in Crank, how “we all laughed because ‘there would never be a sequel to this movie.'” He went on to say that that “the way they’ve answered it is really exciting and fun. It’s really funny and really clever.” Recently Hollywood Reporter did a story about Statham returning for the sequel titled Crank 2: High Voltage, and even gave away a few plot details: “Chev faces a Chinese mobster who has stolen his nearly indestructible heart and replaced it with a battery-powered artificial ticker that requires regular jolts of electricity to keep working.” When asked about the “robotic heart,” Rubin laughed and stated “It’s funny. I saw that published, and I just kind of chuckled. I don’t know if you would call it robotic. That was a real stretch.” So who knows what gimmick might be used . Rubin promises that we’ll be entertained by their answer. “The guys are just so unique and their vision is just so specific to them that if you are excited about their vision than you’ll love the way they solve and answer that question.” I also asked about rumors that other characters who died in the first film, making a return for the sequel. Rubin responded: “You never know with those guys. Are they really alive or are they not? And are they those people or are they related to them?” As for new actors to join the mix, Rubin stated that “We have a lot of ideas right now about Crank 2 and a lot of really exciting stuff that the fans are really going to dig, and it’s just about a process of fantastic idea elimination. Just like this movie, the guys like to start with a lot of ideas and they’re constantly exploring them and taking them to their fullest potential and then seeing which ones are going to live.” The screenplay has been finished for a while now, but Mark and Brian are still constantly incorporating new ideas. “The great thing with Neveldine-Taylor is the smallest idea they might have some times that we think is not really that prominent, sometimes can sometimes blossom into this huge thing,” Rubin said. “And with ‘Crank 2’, those guys are making a lot of notes and the ideas are still percolating. The script is great but it’s interesting because there’s Neveldine-Taylor as a writing team and there’s Neveldine-Taylor the directing team and the transformation happens when we’re actually in our office prepping the movie and when… they become the directors of the movie, the ideas just transform and have a life of their own.” Crank 2 will begin preparation early next year, only nine days after Game wraps principal photography. Production will begin in April 2008, hopefully in Los Angeles.
2023-11-14T01:27:17.760571
https://example.com/article/4027
Archive I have been out of my non-tech blogosphere for quite some time as my current job is taking a lot out of me. Still, I manage to keep my Twitter account updated which, for me, is like my tiny version of this blog. With all of the changes that happened to me in the past year, there is more than a story worth telling. I received an email a few days ago about SQL Server Expert Kevin Kline (blog / Twitter) tagging me, prompting me to write my version of “Three Things That Got Me Here.” Well, here it is. Much of who and where I am now is a by-product of my faith (I took this from Kevin Kline …it is so not original) which I got introduced to as an 8-year-old. Having grown up almost inside a church and almost being mistaken as a pastor’s kid has advantages but what really got me kicking was my friendship with my “then” youth pastor who shed light to what I now consider my favourite Bible verse. That has radically changed my life journey from being his assistant on campus ministries to planting churches and eventually being where I am now. And though we’re literally thousands of miles apart (Philippines and Canada are on different sides of the globe), the spiritual bond keeps us close. So, on with the story… Tagged as nuisance One thing that I have learned as a parent is that kids pick things up really quick so it is very important to really be careful about what we say or do in front of our or other kids. At 4 years old, I heard a colleague of my mom commented about me saying, “you better be prepared to have bail money ‘coz this kid’s gonna be in and out of jail when he grows up.” That sunk in deep. Right there and then I told myself to never let any negative thing, comment or thought define who I am. The fact is – “it’s not who we are, it’s who God is.” Every time I hear a negative comment made towards me, I use that as a fuel to ignite a passion to counteract what they have just said and accomplish what they thought I couldn’t. There are countless of instances where that has been challeneged – from being turned down by IBM, Microsoft and then-Andersen-Consulting-turned-Accenture because my university transcript was not good enough for them, to hearing a manager commenting on my professional goals and asking another colleague if I can really achieve them. Each one of them became an inspiration to achieve more, strive harder and look beyond what they see. It takes looking through your mind’s eye to achieve greater heights and go past our limitations to see what we are destined to be – and eventually achieve it. Looking back, I was thankful for that remark made when I was a kid and the numerous times I was rejected, ridiculed, underestimated and forgotten. It takes a different perspective to take all of them. Besides, I would never be able to enjoy playing the piano (although I’ve been known as bassplayer) if I wasn’t told that I couldn’t play any rough sport. To see is to believe…but to experience is even betterI was born and raised in the city (Manila happens to be the Philippine’s capital and, I just found out recently, that I went to the same university in Manila as the SQL Ninja Dona Santos did) and any city kid knew better. We were not a well-off family but my mom made sure that we went to private school and have our basic needs met (let me just say I was a “deprived” city kid). So, while my brothers enjoyed vacation in the city, as a 5-year-old, I opted to spend mine in the farm – helping my grandparents till the soil, sell tomatoes on a hot, humid, summer afternoon, take the carabao for a dip in the river and do stuff that a typical city kid wouldn’t even imagine doing on his vacation. My mom thought that I was just enjoying my vacation but, the reality is, I was opening my eyes to what hard work really means and what the lives of people we don’t see everyday really are about. It’s ironic because it was when I have learned to properly use the spoon and fork (who would eat with their bare hands after coming back from the farm with hands all filthy?). It made me appreciate the amount of work that the farmers do in order to produce food from the ground, the happiness they enjoy despite not having a large LCD TV with an XBox console in the living room (some of them don’t even have shoes on their feet nor clean water to drink) and what Dr. Stephen Covey made known as the “Law of the Farm.” When I was in my sophomore year in high school, I wanted to do summer jobs. But it is against the law to hire somebody who is way below 18. And, so I went thru some of my mom’s contacts to have me work for a large air conditioner manufacturing plant, doing assemblies of blower fans. And while I can be considered as an illegal worker due to my age, we never did go thru the process of defining liability from the employer’s perspective since they are a close relative. Still, the risk of getting pinned down by a lathe machine or bruised by a metal part getting assembled is there. I worked from 7AM until midnight from Monday to Friday and never had to go home without a bruise or a clean shirt (and did I mention not wearing any protective gear at all?). Throughout that experience, I have seen the hardships of the common laborer who work so hard just to pay off their debt and how most of them work away from their homes, living in shanties just so they can earn a decent wage to send back to their families. It’s also an early course in what I termed “selfish capitalism” where stakeholders enjoy the fruits of their laborers’ hard work while ignoring the plea of the commons (I guess this is a totally separate blog post altogether). It has taught me to always treat people fairly, even beyond what they expect. Which is why every time I engage in a project where I needed to hire people, I always make sure that I treat them well as long as I can. And while I ended up taking a mechanical engineering degree in the university because of the exposure to that job, I never did get a chance to be one. But the lessons learned from those experiences were well worth it that they still make good stories to tell my kids or whenever appropriate when I speak at conferences. Risk…Believe…Trust I was a risk taker even as a kid, as the previous stories have already highlighted. I guess most people aren’t as tolerant to risks as I am. As I grew up, it played a major role in shaping both my professional and personal life. And while I have learned about calculated risks and how taking risks need to be a process requiring a lot of analysis, I still believe that the difference between good leaders and great leaders is their intuition, as Dr. John C. Maxwell highlighted in his book The 21 Irrefutable Laws of Leadership. I took risks even when its was totally illogical. And, again, people will laugh, scorn or ridicule you because it doesn’t make sense to them. But I felt that I needed to do them one way or another. One of those risks was starting my own company. My parents didn’t like the idea because they were both employed and have been in formal employment all their lives. I never had any employment experience aside from that summer job I took when I was in high school. I thought it was the only thing to do since nobody wanted to hire me after graduation (see first story). And so I did. I did consulting work for government institutions and small businesses – ranging from fixing computers, managing their network and messaging infrastructure to building their portal. While it wasn’t an easy job, it helped me learn more about businesses and how the “employment” mindset has been keeping people from taking risks. During these times, I hated computer programming. I remember asking my best friend to write my programming project in Pascal because I couldn’t write a single line of code. I have had to take the programming course twice in order to graduate, an implicit way of saying I failed the course the first time I took it. But, then, a customer was referred to me asking me to write a simple inventory/point-of-sale application for their business. I declined the request as I told them explicitly that I don’t write programs. They insist that they want me to write the application for them because they trust me and that they are willing to pay any reasonable amount as long as I personally write it for them. I took that as both a challenge and a sign of utmost trust (Business Lesson: If your customers are betting their stakes on you, it is your responsibility to deliver no matter what). I did everything I can to start learning how to write code, learning Visual Basic 4 with Data Access Object, spending about 12-16 hours a day on BBS and chatrooms asking questions about how things work and how to create an application. It’s actually my first exposure to the power of the community and that I promised myself to return the favor by being actively engaged in the community, giving back what I have been given. The experience provided me with lessons both in customer relationship and technical competence. What I felt about writing computer programs has totally changed and I ended writing even more applications from smart clients to web applications on the Microsoft platform. And while I am no longer a developer (I quit having the fear of losing more hair should I continue), the skills I have learned from being one has helped be become a better IT professional. Had I not taken that risk, who knows if I have ever been to where I am now. And while others may say “find what you love to do and do it” in order to be successful, I found myself “loving what I do and doing it with excellence.” Public speaking is not for everybody and I guess that includes me – well, almost a decade ago. I still get people laughing every time I tell them that I am a bit shy and introvert especially when they’ve seen me do presentations in conferences and seminars (my former classmates at the MBA program proved I was somehow right). I’m a big fan of my brother who has a knack for getting along with people and speaking in front of a crowd. But I knew I had a passion for teaching, even though my personality wasn’t really aligned with it. And, so I started applying for a teaching job in a local institution well known for their technical expertise. One advise I have received in the process from a very good friend was that “teaching doesn’t even put food in your table.” And while that proved to be a fact, it was a risk I was willing to take with my family, barely making both ends meet in the process. I am just happy to know that my wife was willing to take that risk with me. The teaching experience became my platform to improve my delivery skills, interacting with people and learning the difference between the average and the excellent teacher. And that had paved the way for me to have the opportunity to earn my MCT certification that eventually landed me job offer to move to Singapore from the Philippines. That is a whole different risk in itself. Having to stop school, leave the second company that my business partners and I started, with no friends and family to be with and move to Singapore in 2005 was no small feat. I remember another friend who told me how crazy I was to accept the job offer that was about to make just more than half of what she was making back in 2000, not to mention the cost of living in Singapore with 2 toddlers and being the only one working in the family. I just felt peace in my heart when I have finally decided to go, ignoring all the risks that were before me and simply learning truly what the word “trust” means. Looking back, I was just happy to shun all the fear within me and took all those risks, realizing that the only way to see a miracle is by simply taking risks (while Jesus had to feed the five thousand with five loaves of bread and two fishes, we have US$200 in the pocket with two adults and two toddlers and no place to go in Singapore). Besides, of the twelve disciples that Jesus had, only Peter had the experience of walking on water. It’s been a year and 2 months since we moved here in Canada and that move is yet another showcase of how risk taking got me to where I am now. We are still taking risks and probably until we see our kids take their own risks and grow with the experience. But in all of these risk taking and believing lie the secret to where I am now – it is in trusting that “the people who know their God shall be strong and carry out great exploits.” Special thanks to Kevin Kline for prompting me to write this post. I guess it’s about time to write individual blog posts about my Twitter updates P.S. I still would like to emphasize that I am by no means a preacher nor a pastor as some would like to say. But there is something about the things around us that declare the goodness of our Creator in their own unique ways that one can’t simply ignore
2023-11-01T01:27:17.760571
https://example.com/article/5973
Comparing the diagnostic validity of an abbreviated and standard MMPI. The diagnostic efficacy of the MMPI-168 and standard MMPI was compared with a sample of psychiatric inpatients. Using traditional psychiatric measures and projective testing as a basis for the criterion diagnoses, no significant differences were found between the two MMPI forms. Rationale for the methodology employed was discussed.
2024-07-19T01:27:17.760571
https://example.com/article/2832
[package] name = "app" version = "1.0.0" authors = ["The Teaclave Authors"] edition = '2018' [dependencies] sgx_types = { git = "https://github.com/apache/teaclave-sgx-sdk.git" } sgx_urts = { git = "https://github.com/apache/teaclave-sgx-sdk.git" } [patch.'https://github.com/apache/teaclave-sgx-sdk.git'] sgx_types = { path = "../../../sgx_types" } sgx_urts = { path = "../../../sgx_urts" }
2024-05-11T01:27:17.760571
https://example.com/article/7419
This invention relates to rotary preset tuners, and more particularly to improvements of such tuners wherein a desired one of a plurality of memory slugs is selected by the rotating operation of a tuning member capable of being rotated in any direction and the reciprocating movement of a sliding member connected to variable condenser elements. The sliding member is resiliently abutted against the selected memory slug to provide the tuning operation. Prior art rotary preset tuners have been constructed such that when a tuning member is rotated to provide a tuning operation, the memory slugs slide and move on a guide cam face of a sliding plate or a sliding member to provide resilient abutting against a subsequent memory slug. Due to such construction, undesirable force necessarily acts upon the sliding plate, resulting in either a stress or a strain on the sliding plate itself and a guide portion of the sliding plate. When such prior art tuners are installed in a vehicle such as an automobile, this stress or strain may be released by the external vibration of the vehicle. As a result, the sliding plate will be slightly displaced with respect to the memory slugs against which the sliding plate is resiliently abutted and thus a fluctuation of tuning frequency is generated. For example, a displacement of the sliding plate by 0.01 mm will cause a fluctuation of frequency. If the fluctuation of this frequency is 3 KHz or more, the tuner will no longer be useable. Further, when the above described sliding movement of the memory slugs is repeated for long period of time, the resiliently abutted surfaces between the memory slugs and the sliding plate will wear out and the preset position of the memory slugs may change to cause a fluctuation of frequency.
2023-08-31T01:27:17.760571
https://example.com/article/1582
SET GLOBAL group_replication_group_name= "8a84f357-aaa4-10df-85ab-c70aa9429562"; include/assert.inc [The value of channel name should be group_replication_applier] include/assert.inc [The value of member_id should be empty before starting group replication] include/assert.inc [The value of member_host should be empty before starting group replication] include/assert.inc [The value of member_port should be NULL before starting group replication] include/assert.inc [The value of member_state should be offline before starting group replication] include/start_and_bootstrap_group_replication.inc include/assert.inc [The value of channel name should be group_replication_applier] include/assert.inc [The value of member_id should be equal to server uuid after starting group replication] include/assert.inc [The value of member_host should not be empty after starting group replication] include/assert.inc [The value of member_port should not be NULL after starting group replication] include/assert.inc [The value of member_state should be online after starting group replication] include/stop_group_replication.inc include/assert.inc [The value of channel name should be group_replication_applier] include/assert.inc [The value of member_state should be offline after stoping group replication] # restart include/assert.inc [The value of member_state should be offline after restarting server]
2024-06-05T01:27:17.760571
https://example.com/article/8201
We’re Back! After eight months of inactivity – we’re back on the web! Due to the chaos of starting my first term in the legislature, I inadvertently let our registration for www.barnesformissouri.com slip. Just a few weeks after the deadline, I went to re-purchase the name and discovered a cyber-squatter had claimed it. Well, we waited, and waited, and waited. And the name came up for sale not too long ago – and, chagrined, we purchased the name back. So now we’re back in business. It is my intention to use this site to communicate my thoughts on action pending before the Missouri House of Representatives. We’ll try to post frequent updates so the good people of western Cole County are better informed of the happenings at the state capitol. As always, please do not hesitate to contact me with ideas or suggestions to make our state a better place to live, work, and raise a family.
2023-10-20T01:27:17.760571
https://example.com/article/8332
Products So Much More Than Just a Power Strip! The Energy Bars available for our Apex systems are much more than a glorified power strip. In fact, this component of your aquarium controller equipment is far more important than most people realize – and not all systems are created equal! It is obvious that this component is key to controlling things on your aquarium, but what is not so apparent is how it is critical to preventing catastrophe in your aquarium. LED dimming has never been easier Every day it seems there is yet another LED light fixture released. Each one with its own method for control and dimming. With this module, you can outfit your Apex System with the ability to control many different brands of LED lights…from those that use the common 0-10V interface to the more complex like those that use a serial port connection such as the Aqua Illuminations Sol and Acan Lighting fixtures Our Apex System is the best-value aquarium controller on the market today. Dollar for dollar you will not find a higher-quality controller that gives you more features, is easier to use, or has a larger and more active user base than the Apex. If you haven’t done so already, please read our Why Apex? page to get a high level view of why the Apex is so important to your aquarium. Showing 1 - 4 of 4 Special Offers We are constantly adding new specials to our site. Be sure to check back often!
2024-04-17T01:27:17.760571
https://example.com/article/3265
Q: How do I reference a "subset" or cells in an Excel Named Range? I have a named range in Excel (that was created do to making a Web Query in Excel)... how do I get the sum of just the "Amount" column? Example: This works: =SUM(MyRange) The problem is, that sums EVERY numeric looking field (so "Amount" and "UserID" are BOTH being included in the SUM function). What I need is this: =SUM(MyRange["Amount"]) ... but I can't seem to find how to do something like that. Thoughts? A: You could use the offset() function if you know where the Amount column is relative to the named range. A: Try this: The DSUM formula (Database SUM): =DSUM(MyRange,"Amount",MyRange) Basically, it's just summing the 'Amount' field in the database 'MyRange'. Bill
2024-02-01T01:27:17.760571
https://example.com/article/8222
Operation Bull Run Operation Bull Run was a 48-hour-long military operation during the occupation of Iraq that began on 24 June 2007 in Al Dura'iya. A joint operation between the US Army's 1st Battalion, 15th Infantry of the 3rd Heavy Brigade and the Iraqi National Police and Iraqi Army, the operation netted four to seven captured insurgents and two killed. Launched from Forward Operating Base Hammer, it formed part of Operation Marne Torch, clearing insurgent sanctuaries to the southeast of Baghdad, and in addition to the insurgents killed and captured, it liberated three separate caches of artillery rounds, mortars, firearms and ammunition, along with propaganda and cell phones. On 27 June 2007, following the conclusion of the operation the previous day, the Official News Website for Operation Iraqi Freedom released a news bulletin on Operation Bull Run. Notes External links Operation Bull Run disrupts insurgent operations press release by Operation Iraqi Freedom Official News Site. Operation Bull Run from Global Security Category:Military operations of the Iraq War in 2007 Category:Military operations of the Iraq War involving the United States Category:Military operations of the Iraq War involving Iraq Category:Iraqi insurgency (2003–2011)
2024-02-16T01:27:17.760571
https://example.com/article/7970
Studies toward an ideal fluorescence method to measure palladium in functionalized organic molecules: effects of sodium borohydride, temperature, phosphine ligand, and phosphate ions on kinetics. Residual metals in fine chemicals are currently detected by using inductively coupled plasma mass spectrometry, which requires expensive instrumentation and does not have high-throughput capabilities. Although fluorescent probes can be amenable to high-throughput analyses of metals, the utility of such analyses is limited due to the lack of generality. Herein, we report a significant improvement (≈19-fold) to our previously reported catalysis-based fluorescent probe for palladium. Specifically, we found that slightly elevated temperature dramatically improved the generality of the method and that the deallylation reaction of the nonfluorescent compound 1 was accelerated by phosphate ions in aqueous media. This method was capable of detecting 0.2 ppb palladium. We demonstrated reasonably accurate palladium detection in various active pharmaceutical ingredients and highly functionalized organic compounds.
2023-11-28T01:27:17.760571
https://example.com/article/7481
package schema1 import ( "fmt" "errors" "github.com/docker/distribution" "github.com/docker/distribution/context" "github.com/docker/distribution/digest" "github.com/docker/distribution/manifest" "github.com/docker/libtrust" ) // referenceManifestBuilder is a type for constructing manifests from schema1 // dependencies. type referenceManifestBuilder struct { Manifest pk libtrust.PrivateKey } // NewReferenceManifestBuilder is used to build new manifests for the current // schema version using schema1 dependencies. func NewReferenceManifestBuilder(pk libtrust.PrivateKey, name, tag, architecture string) distribution.ManifestBuilder { return &referenceManifestBuilder{ Manifest: Manifest{ Versioned: manifest.Versioned{ SchemaVersion: 1, }, Name: name, Tag: tag, Architecture: architecture, }, pk: pk, } } func (mb *referenceManifestBuilder) Build(ctx context.Context) (distribution.Manifest, error) { m := mb.Manifest if len(m.FSLayers) == 0 { return nil, errors.New("cannot build manifest with zero layers or history") } m.FSLayers = make([]FSLayer, len(mb.Manifest.FSLayers)) m.History = make([]History, len(mb.Manifest.History)) copy(m.FSLayers, mb.Manifest.FSLayers) copy(m.History, mb.Manifest.History) return Sign(&m, mb.pk) } // AppendReference adds a reference to the current ManifestBuilder func (mb *referenceManifestBuilder) AppendReference(d distribution.Describable) error { r, ok := d.(Reference) if !ok { return fmt.Errorf("Unable to add non-reference type to v1 builder") } // Entries need to be prepended mb.Manifest.FSLayers = append([]FSLayer{{BlobSum: r.Digest}}, mb.Manifest.FSLayers...) mb.Manifest.History = append([]History{r.History}, mb.Manifest.History...) return nil } // References returns the current references added to this builder func (mb *referenceManifestBuilder) References() []distribution.Descriptor { refs := make([]distribution.Descriptor, len(mb.Manifest.FSLayers)) for i := range mb.Manifest.FSLayers { layerDigest := mb.Manifest.FSLayers[i].BlobSum history := mb.Manifest.History[i] ref := Reference{layerDigest, 0, history} refs[i] = ref.Descriptor() } return refs } // Reference describes a manifest v2, schema version 1 dependency. // An FSLayer associated with a history entry. type Reference struct { Digest digest.Digest Size int64 // if we know it, set it for the descriptor. History History } // Descriptor describes a reference func (r Reference) Descriptor() distribution.Descriptor { return distribution.Descriptor{ MediaType: MediaTypeManifestLayer, Digest: r.Digest, Size: r.Size, } }
2023-09-13T01:27:17.760571
https://example.com/article/8085
Living in Switzerland A few days ago we went to Maienfeld to hike near the area that Johanna Spyri used as a setting for her 1881 novel, Heidi. Since I moved to Switzerland I been reminded of Heidi weekly because at work there is a weekly social event whose start gets announced with a broadcast of Heidi’s theme to the whole office. So when I saw that there was a hiking area named after her I talked to Loes and she agreed to go. On Sunday we escaped the intense rain that was falling over most of Switzerland. This time we tried a new national route, stage 2 of Alpenpanorama Trail, as it passes through the smallest canton of Switzerland, Appenzell. The name means “cell (state) of the abbot (of St. Gallen)” and religion had indeed a strong influence in its history: the canton is divided into two parts, the Protestant one and the Catholic one, and the capital. Yesterday we almost hiked from Staffelegg to Hauenstein and we almost saw its five passes. Instead, due to an unjustifiably confidence in my prep skills combined with me field testing a new hiking app, we took the wrong turn after getting off the bus and went in the opposite direction. I recently read about the power of visualizations so for this hike I prepared: I visualized where the sun would be during most of the hike, where we would begin and end. Today’s adventure started in Einsiedeln, in the canton of Schwyz. This time we decided to one stage of the Via Jacobi which is part of “El Camino de Santiago”. The first part of the hike ran through a wide valley outside of Einsiedeln. The weather looked challenging but the forecast promised no rain over the following hours and we are trusting people. View right outside of Eisiedeln. We saw various small Christian chapels and altars along the way as well as a fancy-looking convent for Benedictine nuns. Yesterday we decided to go hiking. We are thinking about eventually walking long trails like the Via Alpina, the Appalachian Trial and the Pacific Crest Trail but we need to start somewhere closer to what we can do today so we decided to start with Route 84 stage 4 which is a comfortable 16km hike near Lake Zürich. We started the hike in Richterswil, a short train ride away from home. At around the time we visited Konstanz we also went south, to Bellinzona, literally “war zone”. The city is known for its three castles (UNESCO World Heritage) and is located in the valley of the Ticino River. As you can guess by its name it’s recorded history is mostly battles. At several points in the past it has been independent and it also has belonged to Italy, France and Switzerland. When you see the surrounding valley it’s easy to understand how strategically important it must have been as a safe pass through the Alps. We recently made a day trip to nearby Konstanz, right on the border with Germany. The city is a well-known shopping destination for Swiss people because of low prices and easy access but the city has more than that. Inhabited since the Stone Age, in the 1400s the town-state asked the Old Swiss Confederacy to become a member but they were weary of large members and they voted against it. It’s also the home of the Council of Constance, where the Church fixed a pesky situation with three people claiming to be the Pope. A few weeks ago I went with my team on a company offsite hiking trip to Ebenalp, the northernmost summit of the Alps. I loved the hike so much that as soon as the capricious weather allowed it I went back, this time with Loes and with my camera. After a two hours train ride we reached the entrance at the bottom of the valley. From there we could have taken a cable car up but we all know it’s the journey, not the destination, even when the destination is covered in a thick layer of clouds and you see people coming back with rain coats. A few weeks ago we visited Schaffhausen, a Swiss canton capital near the German border. Our first stop were the Rheinfall waterfalls, just a couple of train stops away from Schaffhausen. The falls sounded like airplane turbines and the narrow trails leading from the castle on top to the observatory points were packed. Despite all this it was easy to let nature captivate you and keep staring at its sheer power. After a bit over two years in the US we have decided to move back to Europe. We feel very grateful for having had the option to live in that fantastic country for so long and we will miss all the friends we made or met again there. The area of Zurich, our new home, looked like this when we moved earlier this year: View of Lake Zürich from atop Üetliberg.
2023-10-15T01:27:17.760571
https://example.com/article/4362
Outlet Details Recent Articles scottishgrocer.co.uk — 90 years in the bag SCOTTISH Grocer is 90 – and what a difference nine decades make. It might be hard to imagine such a life now, but when the first issue of what was then called The Scottish Grocer and Provision Trader went to press on 10 February, 1928 there were no screens, there was no software, the pocket calculator was a pipe dream and the first barcodes were still decades off. scottishgrocer.co.uk — Bear’s big break CHILDREN’S snacking brand Bear Nibbles has launched its first-ever campaign on mainstream TV, bringing the on-pack character of Bear into the real world. The £3m campaign, which includes two individual TV adverts, one targeting adults and the other aimed at children, is part of a wider programme of activity that also comprises VOD, digital, in-store and on-pack. scottishgrocer.co.uk — An intense experience MONDELEZ International’s fastest-growing biscuit brand, Mikado, is bringing a new flavour to the market with the launch of Mikado Dark Intense. The new product combines the Mikado biscuit with melted cocoa, layered with intense 70% dark chocolate and sprinkled with a hint of salt. Katie Dade, Mikado brand manager, said:“Mikado is a versatile snack that is ideal for on-the-go, and this latest product will help bring a delectable moment during the afternoon slump.” scottishgrocer.co.uk — Booker heads to the fore WHOLESALER Booker has added almost 900 new forecourt outlets to its customer base with two new partnerships. It has agreed to supply 370 chilled and ambient products to 370 MRH forecourts across the UK and, through a second deal, will service more than 500 Shell stores. Chief executive of MRH Karen Dickens said: “We are delighted to have agreed this partnership with Booker. scottishgrocer.co.uk — Cathedral City backs TV quiz CHEESE brand Cathedral City has returned to TV screens, sponsoring new ITV quiz show, Britain’s Brightest Family. The sponsorship, valued at £1.5m, launched on 10 January and runs for 15 weeks supporting episodes of ITV1’s new family-focussed knock-out quiz hosted by The Chase Governess, Anne Hegerty. Cathedral City idents pose fun, quiz-style questions as various family members engage in a series of cheese-eating scenarios. scottishgrocer.co.uk — New dairy in demand DEMAND for new and innovative dairy products among Scottish consumers is growing rapidly, according to Graham’s The Family Dairy. Marketing director Carol Graham said this high demand means shoppers expect a wide variety of dairy products, including milk, to be readily available in c-stores. She said: “As we continue to listen to feedback, we are learning more and more that customers are indeed interested in natural, organic products with a focus on provenance. scottishgrocer.co.uk — MFG has big plans INDEPENDENT forecourt operator Motor Fuel Group has started 2018 with a spring in its step after snapping up 14 stations from forecourt operator Golden Cross Group Limited. Following the acquisition, Motor Fuel Group now has a forecourt estate of 439 company stations operating under the BP, Shell, Texaco and Jet fuel brands, as well as a Murco-branded dealer network covering 190 stations throughout Scotland, England and Wales. scottishgrocer.co.uk — Reach for the Skyr GRAHAM’S the Family Dairy has launched a new range of Skyr in five flavours. A cultured dairy product native to Iceland, Skyr is made from skimmed milk and has nutritional properties similar to Greek yoghurt. MD Robert Graham said: “We’re glad to be launching the first Skyr produced in Scotland. With our new listings, we plan to expand our reach throughout the UK in the coming months and I’m excited to hear feedback from our customers.” scottishgrocer.co.uk — Discounters plan ahead THERE were only seven applications to build new supermarkets in Scotland last year according to construction analyst Barbour ABI. All of them were in the central belt and none of them were from any of the big four operators. Instead, four of the applications were from Lidl and three were from Aldi. And the discounters dominated applications throughout the UK in 2017 with 128 applications between them compared to only 20 from the big four. Selecting a term Phrases (e.g. "cloud computing") — use quotes to keep the terms together Twitter handles (e.g. @username) — returns those who have mentioned or replied to given user Names (e.g. "David Pogue") Hashtags (e.g. #sxsw, #london2012) Bio details (e.g. vegan, Olympics, father) Advanced terms Muck Rack's Advanced Search allows for many boolean operators. AND Find results that mention multiple specified terms, use AND or +. For example, ensure each result contains both Elon Musk and Mark Zuckerberg by searching Musk AND Zuckerberg or Musk + Zuckerberg. OR Use the operators OR or , to broaden your search when you'd like either of multiple terms to appear in results. (This is the default behavior of our search when no operators are used). For example, results will contain either cake or cookie by searching cake OR cookie or cake,cookie NOT Use NOT or - to subtract results from your search. For example, searching Disney will yield results about the Walt Disney Company as well as Walt Disney World Resort. To exclude mentions of Disney World, search for Disney -World or Disney NOT World. Phrases When using one of these operators with a phrase, enclose it in quotation marks. For example, you can find results about smartphones excluding Apple's iPhone 4S by searching smartphone -"iPhone 4s". Exact case matching or punctuation If you're searching for a brand name or keyword that relies on specific punctuation marks or capitalization, you can find results that match your exact query by adding matchcase: before the keyword you're searching for, like matchcase:E*TRADE . Combining operators Use parentheses to separate multiple boolean phrases. For example, to find journalists talking about having fun in Disney World or Disneyland, search for ("disney world" OR disneyland) AND fun. Asterisk An asterisk can be used to search for any variation of a root word truncated by the asterisk. For example, searching for admin* will return results for administrator, administration, administer, administered, etc. Near A near operator is an AND operator where you can control the distance between the words. You can vary the distance the near operation uses by adding a forward slash and number (between 0-99) such as strawberries NEAR/10 "whipped cream", which means the strawberries must exist within 10 words of "whipped cream".
2024-01-20T01:27:17.760571
https://example.com/article/8803
Contemporary Culture Since colonial days, when New Zealand looked to Britain for cultural leadership, it has matured into a self-confident nation. New Zealand is proud of its diverse population; while the majority of Kiwis are of British descent – often referred to as ‘Pakeha’ – many originate from the Pacific Islands or Asia. The largest non-European group is the Maori population. New Zealand’s blend of cultures results in a vibrant national identity; at its heart, it is about innovation, independence and celebrating diversity. Indigenous Maori culture is a strong element of cultural identity for all New Zealanders, Pakeha included. You only need to watch the haka being performed by the All Blacks before a Rugby game to see how proud Kiwis are of their shared heritage! New Zealand’s Pacific location also lends a distinctive flavour to life in New Zealand; Auckland is informally regarded as the capital of the Pacific and colourful island culture is clearly evident at the Otara Markets, where you can buy tapa cloth and Cook Island donuts, and in events like the Pasifika Festival. And no trip to New Zealand is complete without experiencing the country’s unique, quirky Kiwiana.
2024-06-06T01:27:17.760571
https://example.com/article/9322
1. Field of the Invention The invention relates to capacitor arrays and, in particular, to a capacitor array layout technique which improves capacitor matching. 2. Description of the Related Art A successive approximation analog-to-digital (A/D) converter uses a binary weighted capacitor array. For a binary search algorithm, the ideal size of these capacitors obeys the following ratios. The smallest capacitor has a single unit capacitance, the capacitance of the next one is two units, four units, eight units and up to 2n−1, wherein n is the bit resolution of the A/D converter. This requires a capacitance of 1024 units for a 10-bit A/D with the largest capacitor having 512 units. To improve matching, capacitor array layout requires special attention. The capacitor array needs to be laid out so as to avoid process variations. FIG. 1 shows a conventional capacitor array layout. The capacitor array is laid out as a set of concentric capacitors with increasing radii based on the size of the capacitor. Good matching can be achieved since the symmetrical layout reduces the systematic mismatch by canceling the first order degradation. However, the routing of the inner capacitors induces significant parasitic capacitance. Since the parasitic capacitance associated with each binary-weighted capacitor is not in a binary-weighted relation, matching between the capacitors is thus degraded. In many applications of binary-weighted capacitor array such as capacitor digital to analog converter (C-ADC), top plates of every capacitor are commonly connected, as shown in FIG. 2. If the parasitic capacitances induced by the routings associated with nodes MSB, MSB−1, . . . , LSB+1, and LSB are not in a binary-weighted relation, integral nonlinearity (INL) and differential nonlinearity (DNL) of a transfer curve of the digital to analog converter could be significant and may have a great impact on high resolution applications.
2024-04-11T01:27:17.760571
https://example.com/article/6096
Iranians awoke on Monday morning to a 30 percent increase in the price of bread – the most tangible consequence of an economy suspended between the twin pressures of falling oil prices and continuing international sanctions stemming from the Tehran regime’s failure to properly account for its nuclear program. As a result, Iran’s currency, the rial, has declined dramatically in value. Currency traders reported on Monday that the rial fell by 7.25 percent against the US dollar, after last week’s failure to reach a final deal with international powers over Iran’s nuclear ambitions ended the regime’s hopes for an immediate lifting of sanctions. In a sign that the regime is concerned by the large numbers of Iranians who spent the weekend trading their rials for foreign currency, Iran’s Economy Minister Ali Tayyebnia rushed to offer assurances of normality. “There has been no fundamental change in the foreign exchange and the investment markets. We expect to create a stable situation in currency and investment markets,” Tayyebnia said, emphasizing that “people should not exhibit frenzied behavior.” Related coverage Bahrain King Says Accord With Israel Not Directed Against Any Country Bahrain's move to establish ties with Israel was not directed against any entity or power but aimed to bring about a comprehensive... According to Reuters, the weakening rial and the fall in oil prices “could create problems for President Hassan Rouhani,” whom the agency describes as “a pragmatist elected last year on a promise of winning relief from the crippling sanctions by patching up relations with the West.” The most immediate trigger for this latest bout of bad economic fortune to hit Iran was the decision last week by OPEC, the international petroleum cartel which supplies around 40 percent of the world’s oil, not to reduce its collective output to stem falling prices. OPEC’s move has damaged three of its members with faltering economies – Iran, Venezuela and Nigeria – as well as observer member Russia, and the continuing decline in the oil price will impact these countries primarily. By contrast, Gulf Arab states like Saudi Arabia, Qatar and the UAE are better positioned to weather oil prices at $60 per barrel or lower. Iran’s revenue forecasts are based on the assumption that a barrel of oil costs $100, while its break-even point is estimated at $136 per barrel. A growing chorus inside Iran is blaming rival Saudi Arabia and its allies for the price fall. In October, government spokesman Mohammad Baqer Nobakht accused “some so-called Islamic countries in the region” of “serving the interests of America and (other) arrogant powers in trying to squeeze the Islamic Republic.” “They (the West) have forced our oil production from 4 million bpd to 1 million bpd, and this recent fall of oil prices is their latest gimmick,” Nobakht was quoted as saying by the Mehr News Agency. In a recent briefing for the Washington Institute for Near East Policy, analyst Simon Henderson noted that “Saudi Arabia’s policies are a key factor shaping prices. Apart from its huge oil wealth — nearly a quarter of proven global reserves — the kingdom is also the leader of OPEC, the cartel of mainly Middle Eastern oil producers who leverage their collective market influence to achieve the best price. Riyadh’s reaction to the latest price shifts will therefore have numerous implications at home and abroad.” Saudi Arabia “has no desire to ease economic pain on Iran,” Henderson said. The Saudis greatly fear the prospect of an Iran armed with nuclear weapons, while western negotiators are anxious that an Iranian bomb will encourage nuclear proliferation across the region, beginning with the Saudis.
2024-06-20T01:27:17.760571
https://example.com/article/2598
North Korea again defies world with missile test It was Pyongyang’s 50th known launch of a ballistic projectile since leader Kim Jong-un took power at the end of 2011, despite the North being barred from such technology by the United Nations Security Council (UNSC). “North Korea fired an unidentified missile from a site in the vicinity of Pukchang in Pyeongannam-do in the northeastern direction at around 5:30 a.m today,” Seoul’s Joint Chiefs of Staff (JCS) said in a statement carried by local news agency Yonhap. The JCS viewed the launch as a failure because the missile exploded a few minutes after being fired. The North’s previous test nearly two weeks ago was also botched. The American Pacific Command confirmed the missile did not leave North Korean territory and was not seen as a threat to the United States. Seoul and Washington are investigating what kind of projectile was involved, with Pyongyang openly pushing to expand its nuclear weapon capabilities. As the launch took place hours after a special UNSC meeting to discuss the North, U.S. President Donald Trump swiftly criticized the reclusive state. “North Korea disrespected the wishes of China & its highly respected President when it launched, though unsuccessfully, a missile today. Bad!" Trump posted on Twitter.
2023-10-09T01:27:17.760571
https://example.com/article/3440
C3PO #1 Answers THE FORCE AWAKENS’ Biggest Question C3PO #1 Answers THE FORCE AWAKENS’ Biggest Question …how DID C3PO get that red left arm? We certainly find out, in C3PO – THE PHANTOM LIMB! I’ll admit, I approached this comic with some hesitance. You… you have to understand… I’m as bigger Star Wars fan than most people can tolerate… but I didn’t think for one second I’d ever read a thirty-page comic about C3PO… …let alone really enjoy it for fifteen minutes. Let’s jump right in. The story begins with an escape pod crash landing on a strange planet. Six droids walk out of the wreckage and begin a dangerous journey… There’s C3PO, of course, protocol droid of the Rebellion-turned-Republic-turned-Resistance. He’s joined by VL44, a maintenance droid, PZ99, a Jakku-veteran security droid, CO34, a construction droid, and 2MED2, a classic Hoth-style medical droid. There is also Omri, a First Order protocol droid revealed to be their prisoner– and harboring the secret location of a captured Admiral Ackbar. Nevertheless, the group bands together to survive this brave new world in order to activate a distress beacon in a crashed First Order TIE Fighter. It’s their only hope of every being rescued, let alone discovered by a friendly and familiar presence. Omri and Threepio, two loftier-thinking protocol droids than their fellow automatons, engage in a civil and philosophical discussion about the significance of their memories. Who were they before they were now? What loyalty could they ever have to a master, a person that controls their actions and dictates what they can remember on a whim? The debate endures, but the group does not. They fall one by one. Giant spiders. Giant insects. Giant shark thing. Each droid, in their own way sacrificing themselves so the others could go on. And in case you wanted to skip ahead and find out… C3PO ends up losing his arm to a swamp monster to a giant shark thing. It’s a thing that’s at least half-shark, half-octopus, and half rosebush or whatever passes for all three in The Galaxy. Pretty dramatic, don’t you think? And as much action as Threepio has probably seen since he was shot into pieces on Cloud City. As they travel, we’re hit with a bit of a bomb, that despite the major memory wipe he recieved at the end of Revenge of the Sith, C3PO has vague “phantom” memories of his past adventures, something that doesn’t distress too him much but mortifies Omri. Soon, only the two of them are left, as they finally cross a desert to the crashed TIE Fighter. And just when you thought this planet’s ecological disasters had put them through enough, it starts to rain. Acid rain. They find a brief reprieve in the shade of the TIE’s wing panels, until Omri, moved by C3PO’s perseverance and selfless concern for those around him, makes the ultimate sacrifice. He marches into the downpour, a sure enough death sentence even for an armor-plated droid, and activates the distress beacon. C3PO is rescued by a crew of rebels in a landing craft, led by none other than Poe Dameron. But Threepio survives. With a souvenir too, no less– the red-paint-primed arm of Omri to replace that which he lost. C3PO gets his own comic and dodges danger at every turn. He seems to be made to suffer… it’s his lot in life. But you won’t suffer reading this, I guarantee it!
2023-12-08T01:27:17.760571
https://example.com/article/7121
/* * Broadcom Proprietary and Confidential. Copyright 2016 Broadcom * All Rights Reserved. * * This is UNPUBLISHED PROPRIETARY SOURCE CODE of Broadcom Corporation; * the contents of this file may not be disclosed to third parties, copied * or duplicated in any form, in whole or in part, without the prior * written permission of Broadcom Corporation. */ #pragma once #ifdef __cplusplus extern "C" { #endif #include <stdint.h> #include "wiced_result.h" /** * @file wiced_codec_if.h * * The following code describes a generic codec interface so that any codec can be * "plugged into" the system. * This would cover both the encoders and decoders. * */ /****************************************************** * Forward Declarations ******************************************************/ struct wiced_codec_data_transfer_cb; typedef struct wiced_codec_data_transfer_cb wiced_codec_data_transfer_api_t; /****************************************************** * Macros ******************************************************/ /****************************************************** * Constants ******************************************************/ /****************************************************** * Enumerations ******************************************************/ /** * Codec Ids * NOTE: Add new codec definitions to this list. */ typedef enum { WICED_CODEC_SBC = 0, //!< SBC WICED_CODEC_MAX//!< CODEC_MAX } wiced_codec_type_t; /** * Number of channels. If more, then add to this list,preferably after DUAL_CHANNEL. */ typedef enum { WICED_CODEC_CHANNEL_MONO = 0, //!< MONO WICED_CODEC_CHANNEL_STEREO, //!< STEREO WICED_CODEC_CHANNEL_JOINT_STEREO,//!< JOINT_STEREO WICED_CODEC_CHANNEL_DUAL_CHANNEL,//!< DUAL_CHANNEL WICED_CODEC_CHANNEL_MAX_CHANNELS //!< MAX_CHANNELS } wiced_codec_channels_t; typedef enum { WICED_CODEC_SAMPLING_FREQUENCY_32K = 0, WICED_CODEC_SAMPLING_FREQUENCY_44K, WICED_CODEC_SAMPLING_FREQUENCY_48K, WICED_CODEC_SAMPLING_FREQUENCY_92K, WICED_MAX_SAMPLING_FREQ } wiced_codec_sampling_frequency_t; /****************************************************** * Type Definitions ******************************************************/ // TODO: remove codec_status, replace by result_t typedef wiced_result_t wiced_codec_status_t ; /** * NOTE * * The decoder/encoder in the following api list take no arguments. * The flow is as follows. * * 1. Initialize using the init function, pass in a struct with pointers to functions that can allocate * memory for output data. * 2. Get the capabilities of the codec using the get capabilities function implementation. * 3. Use the decode function for decoding data. * 3.1 Use the codec_alloc_output_buffer_cb to allocate data for the output. This depends on * the user of the API, as per platform programming requirements. * 3.2 The decoder implementation must read in data (from for example, a queue) in the implementation * of codec_read_encoded_data_cb by the api user. API user will not directly pass data to the decoder. * 3.3 The decoder implementation writes decoded data (for example, to a queue) in the implementation * of codec_write_decoded_data_cb. There is no direct retrieval of pcm data from the interface. */ /** * @typedef codec_if_api_init * @brief Initialize the codec with mandatory memory management and data arguments. If the memory management * parameter is not provided then the codec implementation will not fit into the rest of the platform structure. * The memory management functions must fetch the raw/encoded data, allocate memory for the output as per platform * specifications and provide the data to a location using the mechanism provided by the memory management function. * This allows for maximum flexibility for the application developer. * * @param [in] data transfer methods that need to be passed to the codec for platform/app specific memory management. * @param [in] data Any data that a particular codec implementation might require. The interpretation of the data * must be provided by the codec parameter file (wiced_codec_xxx_params.h) and must be shared between the codec * implementation and the application. * @return wiced_codec_status_t 0 if success */ typedef wiced_codec_status_t (*codec_if_api_init)(wiced_codec_data_transfer_api_t* data_transfer_methods, void* data); /** * @typedef codec_if_api_close * @brief De-initialize the code. * * @return wiced_codec_status_t 0 if success. */ typedef wiced_codec_status_t (*codec_if_api_close)(void); /** * @typedef codec_if_api_get_capabilities * @brief Get the configurations supported by the implementation of the codec. The exact form of the * parameters must be provided in a global wiced_codec_xx_params.h file, and used in the application as well as * the codec implementation.For example, look at the default platform provided file wiced_codec_sbc_params.h. * * @param [out] codec_capabilities All the capabilities supported by the codec. This is codec-dependent; the * interpretation of this is as per the param file mentioned in the description above. * @param [out, optional] codec_preferred_params The codec parameters that indicate the preferred configuration of the codec. This * is still a subset of the codec capabilities. Note that the interpretation of this struct is as per comment for * codec_capabilities. This can be set to NULL if the user does not need the preferred subset of capabilities to be used. */ typedef void (*codec_if_api_get_capabilities)(void* codec_capabilities, void* codec_preferred_params); /** * @typedef codec_if_api_setconfig * @brief Set the desired configuration of the codec.The exact form of the parameters must be provided * in a global wiced_codec_xx_params.h file, and used in the application as well as the codec implementation. * For example, look at the default platform provided file wiced_codec_sbc_params.h. * @param [in] config The desired codec configuration. This is codec-dependent; the * interpretation of this is as per the param file mentioned in the description above. * @return wiced_codec_status_t 0 if SUCCESS */ typedef wiced_codec_status_t (*codec_if_api_set_configuration)(void* config); /** * @typedef codec_if_api_encode * @brief Encode the given data in pcm (length pcm_len). Make sure that codec_init with * the data transfer methods structure has been called before using this function. The encode function * must use the data transfer methods to read the raw data, allocate space for the output and transfer the * data to a system-specified location. * The encoder implementation shall use the callbacks codec_alloc_output_buffer_cb, codec_read_encoded_data_cb * and codec_write_decoded_data_cb respectively to allocate memory for the output buffer, reading pcm * data into the codec and writing the encoded data. * @return wiced_codec_status_t 0 if successful. */ typedef wiced_codec_status_t (*codec_if_api_encode)(void); /** * @typedef codec_if_api_decode * @brief Decode the data in src. Make sure that codec_init with * the memory management structure has been called before using this function. * The decode function must use the data transfer methods to read the encoded data, allocate space for the * output and transfer the pcm data to a system-specified location. * * The decoder implementation shall use the callbacks codec_alloc_output_buffer_cb, codec_read_encoded_data_cb * and codec_write_decoded_data_cb respectively to allocate memory for the output buffer, reading encoded * data into the codec and writing the decoded data. * @return wiced_codec_status_t 0 if successful. */ typedef wiced_codec_status_t (*codec_if_api_decode)(void); /** * @typedef codec_alloc_output_buffer * @brief Allocate the memory for the output buffer. This pointer points to a function provided by the system (not the codec). * The codec calls this function to allocate memory for the output. * The decoder needs this function callback, provided by the user of the decoder, to be able to * allocate memory for the output. * * @param [in] buffer The buffer for the output. * @param [in] length The buffer length requested by the decoder for output. * @return unsigned length of the space allocated. */ typedef unsigned short (*codec_alloc_output_buffer_cb)(int16_t** buffer, uint16_t length); /** * @typedef codec_read_encoded_data * @brief Get the encoded data from the system memory location.Make sure that codec_init with * the memory management structure has been called before using this function. * Note that the memory management functions will also fetch the raw data for the decoder. * Either bytes_count or the available number of bytes less than bytes_count must be * copied into data. * This callback will be used by the decoder to read the encoded data using the mechanism * decided by the user of the decoder. The implementation of the callback must be provided by * the user of the codec interface. * * @param [in] data The encoded data * @param [in] nBytes The number of bytes copies * @return unsigned short length of data read in bytes */ typedef unsigned short (*codec_read_encoded_data_cb)(uint8_t* data, uint16_t bytes_count); /** * @typedef codec_write_decoded_data * @brief Write the decoded data to a system memory location. The number of samples to be written * is provided as the second argument. To get the bytes, multiply this by the size in bits of * a left/right sample. * This callback will be used by the decoder to put the decoded pcm samples in a location decided * by the API user. The implementation of the callback is provided by the API user. * * @param length The length of the data in number of pcm samples. * @return unsigned short 1 if SUCCESS, 0 for FAILURE */ typedef unsigned short (*codec_write_decoded_data_cb)(int16_t* data, uint16_t pcm_samples_count); /** * @typedef codec_if_get_decoded_output_size * @brief For cbr codecs, get the number of bytes that would be needed for a single decoded pcm block. * @return int32_t Number of bytes that are required for a single block of PCM decoded data. */ typedef int32_t (*codec_if_get_decoded_output_size)(void); /****************************************************** * Structures ******************************************************/ struct wiced_codec_data_transfer_cb { /** * @fn alloc_output_buffer_fp * @brief alloc_buffer_fp is the playback system's output buffer allocation method. This function * must be typically provided by the underlying technology. For example, BT/A2DP will * provide its own alloc_buffer_fp, while Airplay would have its own. This <br>must</br> be * provided when <codec_if_instance>->init() is invoked. */ codec_alloc_output_buffer_cb alloc_output_buffer_fp; /** * @fn read_encoded_data_fp * @brief read_encoded_data_fp is used to read in encoded data from the input queue. As in alloc_buffer_fp, * this function <br>must</br> be provided by the underlying playback system as an argument to * <codec_if_instance> -> init(). Note that the method name is from the viewpoint of the codec; * the codec would need this function to read data from the system using the codec. */ codec_read_encoded_data_cb read_encoded_data_fp; /** * @fn write_decoded_data_fp * @brief write_decoded_data_fp is used to write decoded data back to the playback system. As in alloc_buffer_fp, * this function <br>must</br> be provided by the underlying playback system in <codec_if_instance> -> init(). */ codec_write_decoded_data_cb write_decoded_data_fp; } ; /** * codec_interface_t: each supported codec must provide this interface. * */ typedef struct codec_interface { /** * @brief The major version of the interface. */ int version_major; /** * @brief The minor version of the interface. */ int version_minor; /** * @brief Indicates whether the interface implementation has been configured or not. */ int configured; /** * @brief Indicates the codec type. Should be filled by the codec. */ wiced_codec_type_t type; /** * @fn init * Initialize the codec with the required parameters. */ codec_if_api_init init; /** * @close * De-initialize the codec. */ codec_if_api_close close; /** * @fn getconfig * getconfig is an [in,out] function. It takes an argument void* and fills * it up with the supported codec information element in A2DP format. * This data will be sent to the SRC over AVDTP. */ codec_if_api_get_capabilities get_capabilities; /** * @fn setconfig * setconfig takes the config requested by the SRC and uses the settings * in the codec. */ codec_if_api_set_configuration set_configuration; /** * @fn encode * encode will encode the given audio samples and provide an encoded frame. */ codec_if_api_encode encode; /** * @fn decode * decode will convert an encoded audio frame and provide PCM samples. */ codec_if_api_decode decode; /** * @fn get_decoded_output_size * This returns the size of the array with decoded pcm samples from the decoder in bytes. * This is required when the size of the output is required and the decoder cannot just * yet be started after configuring the codec. */ codec_if_get_decoded_output_size get_decoded_output_size; } wiced_codec_interface_t; typedef struct codec_interface* wiced_codec_handle_t; /****************************************************** * Codec Factory Function Declarations ******************************************************/ /** * @fn wiced_codec_interface_init * @brief Initialize the codec interface from the API user. The api user can specify the codecs supported/visible to the * codec interface. If this function is not called or a null pointer provided, then the default table is used. * @param codec_table The table of codecs. */ void wiced_codec_interface_init(wiced_codec_handle_t* codec_table); /** * @fn get_supported_codecs * @brief Get an array of codec ids supported on the platform. * * Implemented by API user if a different way of handling this is needed. * Look for an implementation of this function in wiced_codec_if.c. * * @param [in,out] codec_type_array The pointer to an array of size CODEC_MAX. This must be pre- * allocated by the caller of this function. * @param [out] size The number of entries in the codec_type_array. * @return wiced_codec_status_t 0 if successful */ wiced_codec_status_t wiced_get_supported_codecs(uint8_t* codec_type_array, int16_t* size); /** * @fn wiced_set_current_codec_type * @brief Register the codec selection with the framework. * * The chosen codec needs to be registered with the framework. If registered, * then the API user can retrieve the current codec's interface using the * wiced_get_selected_codec method. Note that registration merely implies that * the framework is notified of the intended usage of one of the codecs that is * already supported by it. * * @param codec The codec that the user wants to register with the framework for * immediate use. */ void wiced_register_selected_codec(wiced_codec_type_t codec); /** * @fn wiced_get_registered_codec * @brief Get the codec that is currently in use and has been registered * * The codec in use should have been registered with the framework through the * wiced_set_current_codec_type api. * @return codec_interface_t* Pointer to the currently selected codec's interface. */ wiced_codec_interface_t* wiced_get_registered_codec(void); /** * @fn wiced_get_codec_by_type * @brief Get the interface object for a given codec by specifying the codec type. * * @param type The codec type from the enum list in this file. * @return codec_interface_t* Pointer to the codec of type codec_type_t if supported * NULL if not supported. */ wiced_codec_interface_t* wiced_get_codec_by_type(wiced_codec_type_t type); #ifdef __cplusplus } #endif
2023-11-13T01:27:17.760571
https://example.com/article/6818
Errors of oscillometric blood pressure measurement as predicted by simulation. To study factors affecting the accuracy of oscillometric measurement. By means of a computer-based simulator, a variety of arterial pressure pulses of different shapes and amplitudes were composed as an input signal of the model, whereas cuff volume oscillations were obtained as an output signal. The shape of the artery-cuff pressure/volume relationship was modified. Thereafter, oscillation envelopes were drawn and an estimation of systolic and diastolic pressures was performed by implementing fixed characteristic ratios. The mean arterial pressure was estimated using the maximum oscillation criterion. Altogether, 32 combinations of four affecting factors were studied. For the studied range of affecting factors, the induced errors in systolic pressure, diastolic pressure, and mean arterial pressures were 15, 14, and 27 mmHg, respectively. Systolic readings moved toward underestimation and diastolic readings moved toward overestimation if pulse pressure increased. Arterial stiffening induced systematic overestimation of the systolic pressure and overestimation or underestimation of the diastolic pressure compared with a normal artery, with errors depending on the interaction of the symmetry and steepness indices of the artery-cuff pressure/volume curve. Errors of mean arterial pressure were proportional to pulse pressure, showing overestimation if stiffness increased and/or arterial pressure pulses became steeper. Oscillometric readings of systolic and diastolic pressures are strongly influenced by pulse pressure and the shape of the artery-cuff pressure/volume curve, whereas those of the mean arterial pressure are affected by pulse pressure and both the shape of the artery-cuff pressure/volume curve and the shape of the arterial pulse.
2024-05-20T01:27:17.760571
https://example.com/article/9713
“Coming Apart” by Charles Murray In Coming Apart, Charles Murray tackles the widening inequality and distrust between the classes in our society. Murray argues that the growth in inequality is driven by higher wages assigned to high intelligence and the focus of his book is on the growing cultural chasm between what he calls the “cognitive elite” and the new lower class. Murray refers to two fictional communities to describe the widening divide, “Fishtown” (where the new lower class live) and “Belmont” (where the upper middle class live). The book also focuses exclusively on white Americans. Murray focuses on this to focus the analysis exclusively on class and not on race. The World of 1960 The book begins with a trip back in time to 1960. In 1960, there were rich people, but the their lives weren’t very different from other classes. Their houses were bigger, but a slightly higher square footage didn’t make them mansions. Their cars were nicer, but were largely similar to the sedans that everyone else drove and everyone owned American cars. Aside from occasionally going out to a fancy dinner, the meals that they ate were largely the same as everyone else. Americans all watched the same tv shows, read the same newspapers and lived roughly the same lifestyle. There was a cohesive American culture. There wasn’t much disconnect between the views of elites and everyone else. This kept the elites largely in touch with the nation as a whole. Today Today the residents of Belmont live a life that would be foreign to the lower classes in the country. They watch different tv shows, their news comes from different sources, they eat healthier, they exercise more, they don’t smoke, they go to expensive schools, they spend radically more money on childcare, they marry more, they divorce less, etc. Murray attributes this divide to the country becoming a cognitive meritocracy. The popularization of standardized testing (like the SAT) in the 1950s and 1960s was designed to identify and propel smart kids to dramatic heights. To reward intelligence and ability instead of class. This effort succeeded succeeded and kids that would have probably stayed in their home towns their entire lives were now able to go to elite universities and earn six figure incomes. It also occurred at a moment when the economy changed in a way where cognitive abilities were rewarded more richly than ever before. They then married other smart people. Intelligence is hereditary, so their kids were usually smart as well. They then had the income to prepare these kids for standardized tests and elite universities. The cycle then repeats. Meanwhile, the cultural and material dispersion that occured since the 1960s creates more choices than ever before for those with high incomes. This allows those high earners to create an entirely different life than those afforded to other classes. While a high earner in the 1960s lived in a large house, they lived in a house that would be familiar to most Americans and they shared most of the same cultural tastes. This is no longer the case. Murray claims that the elites and the upper middle class are living in a “bubble”. In fact, he created a test to determine if you indeed live in a bubble. You can take the test here. Culture Murray believes that the differences in culture are accelerating the gap between the classes. The upper middle class is still defined by “traditional” marriage that rarely ends in divorce. They marry, they stay married, children are typically born during marriage and the parents stay together. They highly value education and push their children to focus on this area. This helps keep their wealth intact and sets their children up for similar success. In 1960, social institutions were strong in Fishtown. There were community institutions that held neighborhoods together (churches, men’s organizations, etc.). Marriages remained intact. When marriages were unable to discipline and help children, neighbors and members of the community frequently stepped in. As these institutions collapsed since the 1960s, there has been a corresponding increase in various problems. Marriage and two-parent child rearing are on the decline in Fishtown. Marriage is down, divorce is up. Noteworthy is the decline of men in Fishtown. They are no longer the primary breadwinners. Without marriage and without work, many of these men men are rudderless and losing their sense of purpose. Women in Fishtown are thus more likely to be employed and taking the primary head-of-household role. Men in Fishtown show steadily increasing rates of unemployment and lower incomes. Many would attribute this to globalization and a decline in working class jobs, but Murray points out that the decline was occurring when the economy was booming in the 1990s. With this decline in work, there has been a sharp rise in disability benefits in recent decades, despite less manual labor intensive jobs and advancing medical technology. The decline appears to be largely cultural. Herein we get into a chicken or the egg argument. Are men in decline because of a lack of economic opportunity, or has the character of the men in Fishtown fundamentally changed? Murray addresses this issue by talking about the economic climate of the 1990s, in which jobs were plentiful, but were frequently difficult to fill. He also takes word of mouth anecdotes from business owners who talk about the difficulty they have in finding diligent workers. Meanwhile, all of these trends are widening the cultural and economic divide between Fishtown and Belmont. Conclusions The book was written in 2012, but I think that it foreshadows the 2016 election. The Bernie Sanders insurgency on the Left and the rise of Donald Trump on the right took those living in the “bubble” completely by surprise. There was a deep dissatisfaction with the “elites” that drove the election. After reading this book, I think much of it is fueled by this wide class divide that Murray describes. Murray’s description of the bubble also explains why it took everyone living in the bubble completely by surprise. Murray offers prescriptions for the shrinking the divide and all of them are difficult because they involve a fundamental change in culture. The government can certainly pursue programs to alleviate the economic causes of inequality, but I don’t really understand how we can collectively change the course of a culture. I actually think the re-integration of the culture may happen on its own and hopefully with a more 21st century style. I certainly wouldn’t want to return to the social mores of 1950s America. The 1950s wasn’t all malt shakes, Marilyn Monroe, Elvis and hula-hoops. There was severe racial segregation, marriage was a prison for many women and equal rights were certainly not enjoyed by all. When it comes to divorce, it is a tricky issue. Murray contends that divorce hurts children and this is true when you look at the numbers. What’s difficult to measure statistically is how harmful parents staying in bad and unhappy marriages is to children. A major reason divorce skyrocketed in the 1960s and 1970s is because women finally had the freedom to get out of bad marriages, when in previous eras they remained trapped with emotionally abusive (or even physically abusive) men. Would we be better off returning to the era of the 1950s, when people married when they were 18-21 and barely knew each other and stayed in marriages that made them unhappy? I don’t think so. Bottom line, whatever new institutions we develop to address these issues, I certainly hope we don’t return to the marriage culture of the 1950s. One of the worst ways to predict our cultural future is to take present trends and extrapolate them into the future. The U.S. has been through cultural divides in the past and overcome them. The Civil War was certainly more serious than today’s Budweiser/Dom-Perignon class divide. The post-World War II and pre-JFK assassination era of American history was an unparalleled era of social cohesiveness. Despite the divisions of the Civil War, Gilded Age and roaring 1920s, the pendulum eventually swung to social cohesiveness and I think the same will happen again naturally. The irony is that when it happens, I suspect we will find it soul-deadening just like the youth of the 1950s and 1960s did! Investing This is an investing blog, so I have to tie this back into that critical question that touches our souls: how do we make money off of this? 🙂 When reading about the bubble, I constantly thought that most people on Wall Street are living in a bubble and the bubble affects their judgment. If upper middle class people in suburbia are in a bubble, then wealthy financial professionals in Manhattan certainly are. Living in the bubble likely affects the values that they assign to stocks. Two companies come to mind when I think of the bubble. One is Tesla. People with money are flocking to Tesla. However, at $83k per car, Tesla is so far out of reach for most Americans that they might as well be sold on Venus. Among the rich, Tesla is the epitome of cool. Elon Musk is cool. Electric cars, space tourism and hyperloops are cool. The problem is that cool is kryptonite to investors. A notable exception is Google’s 2004 IPO. Google was cool and it worked out. That doesn’t usually happen. You can ask anyone who bought a dot com stock in 1999, or even a legitimate tech company like Cisco back then. Tesla is barely making a profit and their market cap now exceeds General Motors! Interestingly, at the height of the tech mania, Cisco’s market cap exceeded General Electric’s. GM has 22 times the annual revenues of Tesla. The valuation makes no sense. It looks to me like the Murray’s cultural bubble is creating financial bubbles. Another example is Shake Shack. Shake Shack is all the rage in Manhattan. They introduced one by me (I live in suburbia) and I tried it out. The meal was basically a double cheeseburger from Wendy’s and a frosty, but double the cost in a cool looking building. Except I thought Wendy’s was better. This is the cultural divide at work. In Manhattan, a Wendy’s burger and a frosty is a foreign concept. For the rest of the country, we drive by it every day. Shake Shack currently trades at 67 times earnings and 2.84 times revenue. If you’re removed from the bubble, it’s probably easier to spot absurdities in the market than it is for your typical Wall Streeter. In that sense, stepping outside of the bubble can likely help you recognize opportunities in today’s markets.
2023-12-21T01:27:17.760571
https://example.com/article/8283
Geary Road Bikeway Survey This is a short survey to get your input on the types of bike improvements you might like to see on Geary Road as part of its reconstruction project. The Cities of Walnut Creek and Pleasant Hill are considering options to provide a better bikeway on this street and want to hear from people who ride the street, or would ride it, if it were improved. Thanks for your input. * 1.What is your connection with Geary Road? Check all that apply I live within a few blocks of Geary Road I work within a few blocks of Geary Road I commute to work or school on Geary Road I often run errands to places along Geary Road I ride up into the hills on Geary Road Otra (especifique) * 2.How often do you bike on this street? Daily More than once a week A few times a month Once a month or less Never If Never, is it because you ride on an adjacent street? Which one? * 3.What are some of the things you like about riding on Geary Road? Check all that apply Traffic speeds are low There are fewer cars There is plenty of space for me to ride on Geary Road There are many great destinations on Geary Road It's a direct route for me to take Otra (especifique) * 4.What are some of the things you do not like about riding on Geary Road? Check all that apply Traffic speeds are high There is a lot of traffic There are no bike lanes Poor pavement condition Geary Road does not connect to other destinations that I go to Otra (especifique) This image is a bike box. It helps bicyclists make a left turn at signalized intersections and helps discourage motorists from making a right turn across the path of bicyclists going straight thru an intersection. * 5.Would you like to see this type of bike box installed at the intersection of Geary Road and Buena Vista/Putnam Blvd or Geary Road and Pleasant Hill Road? Yes No I don't have an opinion on this design option This is an example of the use of high-visibility green paint, which can be used in bike lanes, particularly where drivers are allowed to cross the bike lane in order to make a turn. * 6.Would you like to see high-visibility green paint used as part of the Geary Blvd project? Yes No I don't have an opinion on this design option This is a buffered bike lane. It includes a 2 foot striped area between the bike lane and the travel lane, to provide separation between a bicyclist and traffic. It is useful on streets with higher speeds. * 7.Would you like to see the bike lanes on Geary Road have a buffered stripe between the bike lane and the traffic lane? Yes No I don't have an opinion on this design option This is a queue box, which helps bicyclists make a two-stage left turn, first across to the far side of the intersection, then stop and turn 90 degrees, and then when the light changes to green for the cross street, to exit the intersection to the left. The queue box gives a bicyclist a noticeable place to position themselves while waiting for the light to change. * 8.Would you like to see a queue box installed at any challenging intersections along Geary Blvd? Yes No I don't have an option on this design option * 9.Do you have any other comments or ideas for improving Geary Road for bicycling?
2024-02-03T01:27:17.760571
https://example.com/article/1592
An effort to centralize guidance and resources for students at The University of Texas at Arlington seeking entry into law school may come to fruition soon. The Pre-Law and Legal Studies Center will help more than 200 students annually with their educational track, preparation for the Law School Admission Test (LSAT) and eventual application to law school. Dr. Elisabeth Cawthon, an Associate Professor of History and one of several UT Arlington faculty members involved with the project, said the Center would benefit those students pursuing a “pre-law” undergraduate education as well as those students who wish to include other aspects of law in their career paths. “It’s not about sending everyone to law school,” Cawthon said. “It’s about helping students explore the different aspects and career opportunities within law. It is helping students to connect with the resources that will enable them to decide on their future.” The idea for the Pre-Law Center was born out of student need and faculty concern. Cawthon said only a handful of faculty in only a few departments across campus are able to advise their students on the preparation for law school. The Center, officials say, would provide students with a “one-stop shop” as they consider alternatives for graduate programs in the field of law. Dr. Rebecca Deen, Associate Professor and Chair of the Department of Political Science, has mentored several students as to where they should apply, reminding them that the academic challenges they mastered at UT Arlington has prepared them for success in some of the nation’s more prestigious law schools. A pre-law center would arm students with all the information they need to make the right choice, she said. Fundraising has begun on the $2 million endowment needed to open the center. Director of Development Myke Holt said organizers are encouraged by lead gifts from two Texas attorneys, both UT Arlington alumni. Their gifts, as well as funds from Maverick Match (an innovative university program that matches major gifts), total $400,000 and is a step toward realizing a long-standing dream. “The goal of the center is to provide support in academic advising, assistance with law school applications, student LSAT prep courses and mock trial experience,” Holt said. “The money we raise will help our students by giving them needed guidance and support.” The Center will also save students and faculty time. With the current state of disparate faculty advisors, students may miss out on preparation opportunities or get conflicting information. By having a dedicated program, Cawthon said, students will reap maximum benefits and focus. “[As faculty] we can look at the classes students have taken and the grades they get and make assessments,” Cawthon said. “It’s not just career counseling, but advising students from the perspective of knowing what faculty members require, what skills courses require, and how that will translate into law school.” Plans are also underway to create local relationships with the University through the Pre-Law Center. Cawthon said a number of North Texas law firms have expressed interest in utilizing UT Arlington students as interns. Also, officials at Texas Wesleyan University’s School of Law have offered to partner with faculty members to guide students appropriately. “We want [the Center] to provide experiences for students in our undergrad programs that will make them competitive for the law school of their choice,” said Deen. “The idea is to compliment the existing services our faculty provide, as well as offer new opportunities through partnership with our donors and alumni.”
2024-06-01T01:27:17.760571
https://example.com/article/5161
This archived news story is available only for your personal, non-commercial use. Information in the story may be outdated or superseded by additional information. Reading or replaying the story in its archived form does not constitute a republication of the story. SALT LAKE CITY — It cost $13,000 to seismically reinforce Catherine Lilly's 112-year-old home, but she didn't pay a penny of the cost. Salt Lake City footed the bill through its Fix the Bricks program, an effort to provide financial assistance to homeowners of the most vulnerable and potentially dangerous buildings if a major earthquake struck the Wasatch Front — an event that recent statistics project has a 43 percent chance of happening in the next 50 years. Lilly's brick home in Salt Lake City's East Central neighborhood was built in 1904 and was considered an "unreinforced masonry structure," which are buildings made out of block or brick and built before 1975. Earthquake experts consider unreinforced masonry buildings to be especially susceptible to complete collapse in the event of an earthquake. They estimate there are 144,000 such buildings in Salt Lake County, with 30,000 in Salt Lake City alone. Projections estimate that a 7.0 earthquake could kill as many as 2,500, with 90 percent of those crushed by unreinforced buildings. But when Lilly called the city earlier this spring, her home's earthquake susceptibility wasn't on her mind. She was only seeking some low-interest loan options to help pay for a new roof. So when city officials told her they were seeking a "beta" home to pilot their Fix the Bricks program and would pay for all of the reinforcements, Lilly was thrilled. "It was pretty amazing," Lilly said. "I could have never afforded it on my own." Though she knows the improvements may not completely save her home in a major earthquake, Lilly said her home's upgrades — a chimney brace and bolts securing the roof to the walls — could save her life, as well as her 15-year-old son, Robert. "It may not completely save the house, but if it buys us enough time to get out and save our lives, that's all I'd want," she said. "That's worth a lot." Now Salt Lake City is looking to do more. Fix the Bricks began under former Mayor Ralph Becker as an education effort to urge unreinforced masonry homeowners to make the investment. But Thursday, city and state emergency management officials announced the effort will now be more than an education campaign, since Salt Lake City has been awarded $500,000 in federal grant money to help offset seismic upgrade costs for at-risk homeowners. Cory Lyman, Emergency Management Program director for Salt Lake City, speaks with Catherine Lilly at her home in Salt Lake City on Thursday, Nov. 3, 2016. Lilly used the city's Fix the Bricks program to stabilize the chimney on her 1904 house. The program provides financial assistance for retrofitting homes that are most vulnerable in a major earthquake. (Photo: Laura Seitz, Deseret News) "Safety is priority No. 1 in Salt Lake City," said Mayor Jackie Biskupski at a news conference outside the Salt Lake City-County building. "Today, we are encouraging homeowners to join us in making their own homes and families as safe as possible." Last year, Salt Lake City had $50,000 set aside to help kickstart the program, which began with three projects, including Lilly's home. Now, with the additional grant money available, city officials are aiming to help retrofit 50 to 60 more homes in the current budget year. The catch: as part of the federal grant, homeowners will be asked to foot 25 percent of the cost. Cory Lyman, director of Salt Lake City Emergency Management, said home seismic upgrades typically cost between $7,000 and $12,000, depending on the size and floor plan of the home. He acknowledged 25 percent of the cost is still expensive, but he added the city is also exploring conversations with the private sector to help low-income residents even more with the cost. "It certainly is a reasonable risk we should take appropriate steps to address," he said. "We're just trying to make sure people get a real leg up." Audrey Pierce, Fix the Bricks program manager, urged Salt Lake homeowners living in unreinforced masonry buildings to apply for the program at BeReadySLC.com. The city will be accepting applications for the current budget year through December. For next year, applications will open again in the spring. Pierce said the grant is expected to grow, so the city aims to help retrofit 200 to 300 homes next year. "Ultimately, what we're trying to accomplish here is build resiliency in our community," said Bob Carey, operations chief for the Utah Division of Emergency Management. "Ninety-two percent of all unreinforced masonry buildings are single-family dwellings, so this is a big problem, and Fix the Bricks is the first step." × Photos
2023-09-23T01:27:17.760571
https://example.com/article/9161
Q: Are there any flights that fly east both from origin to destination and from destination to origin? Flying east is faster so I expect that if the destination are on opposite points or closer, that the flights between them always be to the east. For example Los Angeles to Delhi. I see the fly is over the north pole. Wouldn't it be faster to always go east? http://www.gcmap.com/mapui?P=lax-del&DU=mi A: FlightAware suggests there are no non-stop flights from LA to Delhi. Was certainly going to point out that we're pretty limited on ultra long-haul flights still, and it'd take a very special flight setup to make your scenario. You'd need both: Two locations about 180° longitude apart so that the distance going east vs. the distance going west is insignificant for both legs enough so the jet stream gains flying east pay off. Two places at just the right latitudes. They need to be at latitudes far enough south (in the NH) that it's not much shorter to just fly the great circle through the North Pole [or near if not 180° apart]. Here is a graph showing the ratio of the distances of the path crossing the Pole vs the distance of the constant-latitude path, for places 180° longitude apart [derivation in comments]... which shows it's 50% longer to fly around the 60° latitude circle than to fly over the Pole). However, the further equatorward (south in the NH) you go, the less benefit you'd get from the jet stream as upper wind speeds are typically much slower further south, and you'd spend less of your flight time in the jet stream. (Here's a current jet stream map). Keep in mind that the jet stream is only going to add 100-200 mph in general. So that's only like 1/3 of the cruising speed of a large jet. Of course the benefits will show up in both in fuel usage (and the additional weight benefits of carrying less fuel) and in travel time (people like quicker flights, and you can run more flights in a year and/or pay crew less). So despite being a longer distance, if it cut enough time/energy it might just be worth it. And, well go figure, it turns out you weren't far off at all! Because there actually is a direct flight from San Francisco to Delhi. And it looks like they do exactly as you suggested! (Click images for larger versions) These are Air India flights 173 and 174. The official flight does make a jaunt from Delhi to Bengaluru and back once it completes the SFO-DEL leg. But you could indeed go around the world from Delhi to San Francisco to Delhi without any other stops... in looks like around 36 hours. Pretty cool!
2023-12-30T01:27:17.760571
https://example.com/article/5243
Zanthan GardensGarden Design: The Weed Garden, My Garden Wild March 28th, 2008The Weed Garden, My Garden Wild The baby blue eyes took over the back border, smothering everything in their path. I find them beautiful in their own right and let them have their way. At Diana’s yesterday, with Bonnie and Pam, stuffing welcome packets for the Garden Bloggers Spring Fling, I realized how comparatively few garden plants I have in my garden. I decided I’d better set expectations for any Spring Fling visitors who are stopping by before Friday’s dinner at Matt’s El Rancho. (Anyone on the Friday dinner list is invited. Let me know if you need directions.) Noted Austin landscape architect, Ivan Spaller said of me and my garden, “[She] spends her days toiling away in a weed-infested garden…” And so I do. My garden is big and my budget is small. So I rely heavily on weeds to fill in the empty spaces. Visitors are often drawn to the bright fleshy leaves of the false dayflowers, Commelinantia anomala, only to recognize them close up and say in disappointment, “Oh. It’s that.” But I love how fresh and crisp the foliage looks and who can resist a flower with a face like this? I also rely heavily on the false dayflower’s cousin, the spiderwort. It was in full bloom when I first saw this house and, in part, is what made me fall in love with this place. I try to confine it to the mini-woods but it insists on popping up in the meadow, the lawn, and the vegetable garden. The cilantro, which I grow to eat, has taken over the meadow. It bloomed a month before the larkspur this year and makes an excellent filler. I do manage my garden of weeds, edit it. In order to give it some semblance of a garden, I think it’s important to clump like weeds together–a drift of cilantro, or baby blue eyes, or spiderwort. I will pull the lone larkspur out of a clump of Love-in-a-mist. I transplant self-sown plants where I want them rather than where they’ve come up. Imposed order is what differentiates the garden from nature. And yet, in a wild garden one must have a light touch. I was made very happy when two different people asked me if my violas had self-sown (no) because they were not planted in the typical straight lines of bedding out plants. I think I’ve always been guided, unwittingly, by a poem I wrote when I was seventeen–before I ever imagined myself a gardener. I am a garden wild; Growing thriving, Reaching leafy green tentacles In curious search. I am, they say, haphazard, untamed, Existing most improperly in a world full of gardeners. by M Sinclair Stevens 30 Responses to post “The Weed Garden, My Garden Wild” I keep reminding myself lately that gardening isn’t about an end product, having a perfect garden or even (*shudders*) attractive landscaping. For me, anyway, it’s about getting my hands in the dirt, growing some of my own food, and spending some time appreciating small backyard wonders of nature. If that includes weeds, so be it. Well, said. Like you, it’s the process I enjoy, the puttering around. Time is an important element in the garden. In a wild garden, the changes come more rapidly and exuberantly. I like that. — mss You have a lovely garden. So many things to admire. I think the tulips are a sparkling choice against the other plants. I like your plant choices. I have baby blue eyes and larkspur as well. That is a spectacular patch of baby blue eyes you have. Please look at my blog. I would love to hear from you and see what you think. Is your garden in San Francisco? You blog seems to be mostly about England. Are those all your own photos? I’m growing borage this year, too. — mss It’s not like any of them are noxious or invasive. As you are growing them, they are called “wildflowers,” and you can be proud of them. I think they are lovely. They are all a bit invasive or they wouldn’t survive as well as they have. But I don’t consider any of them noxious and that, I think, is what differentiates a tolerable weed from and intolerable one. — mss Looks like a great garden to me. I’ve never seen a false dayflower or cilantro in bloom, so I’m looking forward to seeing everything. My motto is “never trust a gardener who has no weeds”. If only the weather would cooperate. I don’t have any hope that the tulips will still be blooming when you are here. Most of them curled up in Thursday’s heat. I’m watering like crazy to keep everything else from wilting. — mss Your poem suits you, and yet I think you exist quite properly in the little world of Austin garden-blogging gardeners. Don’t change a thing. Your spring pics are lovely. I can’t wait to see the tulips and dayflowers in person (geez, can I possibly make it down in time on Friday?). The way you feel about the false dayflowers is how I feel about commonplace and somewhat invasive spiderwort and inland sea oats. They give so much and require so little. How could I not love them and welcome them? We each have our own style and mine is as wild as my hair. But I love that we are all so different because I come home from a every visit with new inspiration. I’ve gotten seeds for inland sea oats but I haven’t gotten any going. I like those although I’ve been warned that they are very invasive. — mss There is a lawn weed, germander speedwell, that grows in a big clump by my door, with wonderful blue flowers. People don’t recognize it as the weed they mow down and always admire it. It is pretty enough to grace one of my Moo cards. I haven’t tried it in any of my garden beds. I might find out why it’s considered a weed, then. I’ve seen photos of it and I think it’s pretty. Sounds a bit like pink evening primrose which Henry Mitchell said was too invasive for the garden. I think in a small garden in a more temperate climate it would be. It’s tough and spreads fast. But our summer heat keeps it in check so I don’t worry about it in Austin. — mss I like the poem and seeing more of your garden. I wish I could be at Spring Fling to see your garden in its entirety. I love the Baby Blue Eyes – they must be stunning when all in bloom. I wish you could have come to Spring Fling, too. We’ll try to keep the updates coming. The baby blue eyes did really well this year. And to think I started with just a handful of seeds from Val @ Larvalbug about five years ago. — mss I always stop and peer into ‘overgrown’ gardens. Especially ones where you have to duck and weave to walk up the path. They are the houses I wish I could live in. One day, I’d like to move to a bigger house myself, with a bigger garden. But my dream is spoilt when I think what ‘newcomers’ would do to my own densely-packed ‘plot’. They’d probably rip out the weeds, chop down the trees, and lay a lawn. Ohhhhhhhhhhhhhh! Luckily, I live in a very laid-back neighborhood. My yard looks absolutely cultivated next to some of my neighbors’. — mss I think it’s funny that your garden is full of “weeds,” since pretty much everything you’ve pointed out as a weed is something I’ve seen deliberately cultivated and surrounded by neat mulch in Wisconsin gardens. And anyway, I prefer a “wild” garden to rivers of mulch with a few plants scattered throughout. Aside from the paths, in my favorite gardens, you can’t see the ground. Mulch is an important component in making it look neat. I like this massed look at this time of year when the temperatures are still cool. But when the days reach the 90s, I find it crowded and oppressive and am only too happy when the flowers fade and I can rip them all out. — mss I was taught that “a weed is a plant out of place”, but what authority determines a plant’s proper place? I aspire to have that much cilantro one day. Last year was the first time I grew enough that I let it go to seed and I noticed how pretty the flowers were. I’m planning to grow some as a border filler this year. I think that the gardener is the authority who determines a plant’s proper place. In my garden, my rule is law and in your garden, yours is. (Of course there are meddlesome neighbors and municipal authorities to deal with in some places. I feel fortunate not to have a problem with either.) I think this is only my third or fourth year with the cilantro. It is more rampant than dandelions. — mss The freedom (and joy) with which you approach your garden has always been inspiring for me, MSS, especially as a new gardener still figuring out what “kind” of gardener I might be. So keep on! I read somewhere in your blog that you don’t worry too much about matching/coordinating colors of blooms, and that helped me too. I get so excited when things bloom, and I love a mishmash of colors, and while I do think about it some when planting new things, I’m honestly quite pleased with whatever pops up. Thanks for sharing, and see you next weekend. Thanks. Actually I started off wanting to coordinate colors. I kept careful notes on what bloomed when so that I could get ideas of what would make good combinations. And it turned out to be different every year! So I just plant a lot of stuff, let it bloom as it will, and just pull out anything I don’t like. Most of my annuals have a short season (about 8 weeks). So my biggest challenge now is figuring out how to extend that without using up too much water in the heat of summer. — mss I like your garden, MSS – it’s a very special place and like the desk of many a genius, may look messy but is quite organized! But you live in Central Austin, and have a lot more freedom than those of us who live in newer neighborhoods with active HOA’s. I keep hoping people will stop and talk about my flower beds but I mainly get advice on growing lawns. If the flower beds are mentioned it’s to inquire what methods I will use to keep them under control. How wonderful to read that poem and try to imagine that amazing 17-year old girl. Annie at the Transplantable Rose Yes. I’m very lucky to live where I live. I still can’t quite comprehend what life in the restrictive suburbs must be like. I’ve lived in South Austin for almost 30 years and I just think this is what normal life is like. It’s sad to see it being bulldozed. Seems like every day we lose another little cottage. That’s my next post. Stay tuned. — mss I love your spiderwort – it’s one of my favorite wildflowers. And I am so jealous of your cilantro. I keep trying to grow a few little clusters to eat and they just wilt on me because I have too much sun. Your whole gardens looks so full and lush and well blended. The grass is always greener – I so wish I had a garden like yours, with that english garden style–layered with swaths of color and height and texture – it’s beautiful. I can’t wait to see it. Have you tried planting the cilantro in the fall. It really is a cool-weather plant and it doesn’t mind light freezes. I’ll save some seeds for you. — mss And those drifts of baby blue eyes are gorgeous. Your garden is a lovely mixture of soft hues and textures. I enjoyed seeing more of it, and reading your thoughtful poem written back when your ideals were still forming. I’d love the opportunity to see your wild garden, and visit with all the Spring Flingers. Am sad to be missing it, but will enjoy reading about all the fun times. The foliage of the false dayflowers provide some of the earliest spring green. And when they are finished blooming, they are very easy to pull up for the compost pile, unlike some other more tenacious weeds. All of us will try to post about Spring Fling. — mss I garden like you. I’m on solid limestone just north of Waco and I decided (coming from Dallas) that I would work with what I had. I have natives, cultivars, and lots of reseeding annuals. I let the beautiful ones go wild as I love the “mass” look. My poppies (oriental) are prolific on their own as are the larkspur and 4 o’clocks. What stays in my garden is anything that “wows” me. First is fragrance,then color and form. We’re master gardeners and rely on nature to help our paradise. My garden is for ME first and anyone that wants to enjoy it. I’ll take a casual garden anyday over “perfection”. Our gardens and our approach to gardening do sound very much alike. I’m glad to have found another kindred spirit. — mss I love the wildness. This is what I aspire to in my new garden along our driveway. I hadn’t thought of using some of the plants you have, like love-in-a-mist and cilantro. I may have to try them. Thanks for the inspiration. My pleasure. Both are very easy to grow from seed which is one of my criteria. — mss Someone called THIS paradise of yours a weed-infested garden??? I’m infuriated on your behalf, because to me, your place looks like a piece of paradise on earth. But then, mine would probably be called a weed-infested disaster…Kate’s gentle plea for chaos is applicable to gardens OR blogs–we ought to bloom where we’re planted, with whatever brings us joy. So I’m glad you garden as you do and just wish I could visit this year. But maybe next… Not just “someone” but the guy I hired to build a covered, screened patio in the garden. He didn’t remember to attach the roof to the structure and it failed inspection. When I subsequently filed a complaint with the Better Business Bureau that was when he responded with name-calling. (The “weed-infested garden” line was probably the least vicious among his personal attacks.) — mss I think you would like my garden, I already love yours….part of the fun, the joy, is the puttering around. I have tried to explain to folks that I don’t garden for approval or home resale value, but for me…Baby blue eyes is a romper and I am hoping it one day decides to stay a while. Your garden looks lovely to me, and I am still smiling at that false dayflower face. Aficionados would shudder at my next statement, but I think that it looks similar to some of the orchid “faces” I’ve seen! Yes, THAT guy. He was on a local gardening show recently touting his lovely designs. I still love his concepts. If only he had followed through on the execution. — mss Hey, your weeds will be different than mine. I do have spiderwort, and I think of it as a fabulous wildflower. I would love to see your garden before dinner. Could you send directions to my email? Thanks you so much.~~Dee My feelings about spiderwort have changed. Before I was a gardener it was among my favorite wildflowers. Now I find it a bit pesky. I let it go wild in my mini-woods. However, I’m ruthless about pulling it out in the meadow or the lawn. Looking forward to meeting you at Spring Fling. — mss M: As your sister Diva Annie says, you are a prodigy! Your metaphor of yourself at 17 is quite stunning, doubly so beside these pictures of the comparative. Such a pleasure to see your succulent foliage especially, because we are still covered by a crusty foot of snow. No green in sight (except the winter-tired firs). Good luck with your Fling. I’m envious! I wish you could come to Spring Fling. I’d love to meet you and have a nice long talk. No snow here. It’s going to be a muggy 85 today. When it gets this hot, snow sounds refreshing. I bet your a bit tired of it by this time of year. — mss Before I started blogging I had no idea about the many, often very strict, rules gardeners in the USA are up against. Here we have very few rules about gardens and they are sensible ones like not turning your front garden into a rubbish dump, not planting trees too close to your neighbours garden and no high fences around your front garden. Through the years I’ve seen many gardens and the ones that are often my favourites are the ones that have been done on a small budget. They usually are the most creative, inventive, exciting, individual and fun gardens. Yours is no exception, I think it is lovely. I love it that you and your garden make things up as you go and grow along. It’s a partnership between gardener and garden. I am a designer but that doesn’t mean that a garden has to have been *designed* to be a successful/beautiful/ joy bringing one IMO. One can design a garden or let a garden develop organically and it’s clear that you’ve done the latter and with great panache! After reading this post I think that you and I are striving after the same thing in our gardens: ordered chaos. 😉 Love that poem; to the 17 years old you: I hear you roar, free spirit! Many Americans live in newly developed communities where acres are bulldozed and all the houses designed and constructed by one builder. Many of these types of communities have restrictive covenants to keep anything from ruining the homogenized look of the development. Of course, restrictions can be found world-wide. My mother-in-law lives in a small English village in which almost every tree is under a protected tree order (can’t be cut down or pruned). And then there’s England’s anti-social behavior laws which include rules affecting the height of hedges and such. — mss I was facinated by your weed garden. I live on Plum Island a beach community. I am a film producer and have many other interests. I love plants and flowers but have no time to weed my garden. My neighbors think my garden has gone to ruin. So I thought, why not make my weeds into the garden. Put up some decorations, perhaps some rocks. So I wend looking for “weed gardens” and found you. Oh and I am a buddhist and have studied with native Americans all of the US. So I also consider the weeds sacred. Any ideas. To make a space look like a garden, regardless of the plants used, there has to be a strong underlying structure (paths, fences, edging) and the plants should be massed. I find that if I arrange the weeds in drifts, then the yard looks more like a garden and less like an overgrown lot. — mss
2024-03-04T01:27:17.760571
https://example.com/article/1124
Story highlights "Having a good relationship with Russia is a good thing, not a bad thing," Trump tweeted Trump has insisted Russia did not have an impact on the election results (CNN) President-elect Donald Trump is continuing to resist conclusions reached by US intelligence agencies on Russian involvement in the 2016 election, and on Saturday defended his long-held belief that closer ties with Russia would be good for the US. Trump's comments come one day after he received intelligence stating that the Russian government hacked Democratic Party groups and individuals during the election, and that Moscow acted to hurt Hillary Clinton's campaign to benefit Trump. "Having a good relationship with Russia is a good thing, not a bad thing. Only 'stupid' people, or fools, would think that it is bad, We have enough problems around the world without yet another one. When I am President, Russia will respect us far more than they do now and both countries will, perhaps, work together to solve some of the many great and pressing problems and issues of the WORLD!" Trump tweeted. Having a good relationship with Russia is a good thing, not a bad thing. Only "stupid" people, or fools, would think that it is bad! We..... — Donald J. Trump (@realDonaldTrump) January 7, 2017 have enough problems around the world without yet another one. When I am President, Russia will respect us far more than they do now and.... — Donald J. Trump (@realDonaldTrump) January 7, 2017 both countries will, perhaps, work together to solve some of the many great and pressing problems and issues of the WORLD! — Donald J. Trump (@realDonaldTrump) January 7, 2017 The US intelligence community concluded in a report publicly released Friday that Russian President Vladimir Putin ordered an "influence campaign" to harm Clinton's chances of being elected president. The campaign consisted of hacking Democrats, including Clinton campaign chairman John Podesta, before releasing that information via third-party websites, including WikiLeaks. Read More
2024-01-02T01:27:17.760571
https://example.com/article/7970
Speech perception performance as a function of stimulus pulse rate and processing strategy preference for the Cochlear Nucleus CI24RE device: relation to perceptual threshold and loudness comfort profiles. Current cochlear implants can operate at high pulse rates. The effect of increasing pulse rate on speech performance is not yet clear. Habituation to low rates may affect the outcome. This paper presents the results of three subsequent studies using different experimental paradigms, applying the Nucleus CI24RE device, and conducted by ten European implant teams. Pulse rate per channel varied from 500 to 3500 pulses per second with ACE and from 1200 to 3500 pps with CIS strategy. The results showed that the first rate presented had little effect on the finally preferred rate. Lower rates were preferred. The effect of pulse rate on word scores of post-linguistic implantees was small; high rates tended to give lower scores. However, there were no significant differences between the word scores across subjects if collected at the individually preferred pulse rate. High pulse rates were preferred when the post-implantation threshold was low.
2023-10-21T01:27:17.760571
https://example.com/article/7420
Q: C# HTML Font Tag Parsing I need to parse a large amount of text that uses HTML font tags for formatting, For example: <font face="fontname" ...>Some text</font> Specifically, I need to determine which characters would be rendered using each font used in the text. I need to be able to handle stuff like font tags inside another font tag. I need to use C# for this. Is there some sort of C# parser class to make this easier? Or would I have to write it myself? Thanks! A: I have not used it, but I have seen the HTML Agility Pack frequently mentioned for this type of thing.
2024-05-19T01:27:17.760571
https://example.com/article/2537
Quantitative measurement of reactive oxygen species in vivo by utilizing a novel method: chemiluminescence with an internal fluorescence as reference. Reactive oxygen species (ROS) produced by photodynamic therapy (PDT) is recorded in vivo using a chemiluminescence (CL)-based gated optical system. A novel approach is developed to utilize the fluorescence (FL) of the CL probe as an internal fluorescence to calibrate the observed CL on pharmacokinetics of the probe in situ. The results show that during an in vivo PDT session, the intensity of CL decreases significantly and the decaying of CL is governed by fast and slow time components. By comparing the temporal profile of FL to that of the corresponding CL, it is found that the slow component is mainly attributed to the probe pharmacokinetics, whereas the fast component is likely due to rapid oxygen consumption as a result of PDT treatment. With carefully selected criteria, it is possible to minimize the effect of probe pharmacokinetics. This significantly improves the monitoring method for practical applications.
2024-01-22T01:27:17.760571
https://example.com/article/2974
Looking concussion in the eye MIT Technology Review Robin Kazmier Ask three neurologists if someone has a concussion, says Rosina Samadani ’89, SM ’92, and you’ll get four different opinions. A concussion, typically caused by a blow to the head, is an injury that temporarily impairs brain function. But the damage usually doesn’t show up on brain scans—and with no clinical standard, or even an agreed-upon symptom checklist, diagnosis comes down to a judgment call based on hard-to-assess things like how nauseated or drowsy someone feels. Samadani and her sister, Uzma ­Samadani, an associate professor of neurosurgery at the University of Minnesota, want to change that. About seven years ago, Uzma was trying to determine whether severely brain-injured patients were improving, so she developed an eye-tracking device to see if they could follow a moving video on a screen. The practice of assessing eye movement to detect brain injury dates back thousands of years, but it largely died out with the advent of radiology and CT scanning. “As soon as radiology came along and you had these beautiful pictures of the brain,” Uzma says, “people stopped relying so much on looking at physical eye movements.” As she evaluated the data gathered by her device, she realized it was allowing her to detect not only the patients’ tracking ability but also restrictions in their eyes’ range of motion. It dawned on her that these restrictions indicated problems with specific nerve pathways, meaning she had found a way to measure—and possibly locate—brain injury. Eyeball and pupil movement are controlled by three pairs of cranial nerves that emerge from the brain stem and extend forward, one nerve along each side of the brain, to connect with the eye muscles. Pressure on those nerves slows their activity. Since each cranial nerve pair governs different aspects of eye movement, Uzma reasoned, eye-tracking data could reveal which nerves are affected by pressure or damage in the brain, and even point to the site of an injury. For example, if movement is impaired in both eyes but the eyes are coordinated, that likely means the injury is in the brain stem, which would affect both sides of the nerve pair. If only one eye is affected, that suggests the injury is in a section of nerve that has already emerged from the brain stem. Uzma planned to make the technology available free online, but she realized that few facilities would have the resources to properly set it up. So she founded Oculogica in 2013 to sell it in ready-to-use form. She got input on starting the business from Rosina, who’d studied mechanical engineering at MIT, earned a PhD in biomedical engineering from Northwestern University, and had 18 years of experience in the medical-device industry as a health-care consultant and founder of two startups. The sisters had never imagined they would collaborate professionally, but Uzma thought Rosina had the perfect skill set for Oculogica; she hired her as CEO in 2015. The company’s tabletop eye-tracking device, a machine called EyeBox, sends a small video clockwise around the perimeter of a rectangular screen for 220 seconds. (The test videos, which include a Shakira music video, were carefully vetted to meet a list of about a dozen criteria; for example, they can’t have flashing lights.) As a patient watches the video from a stable headrest, a binocular camera separately tracks each eye and gathers about 100,000 data points at high frequency. The data feed into algorithms that calculate nearly 100 different metrics quantifying such things as speed, coordination, and range of motion. Using statistical analysis and machine learning, Uzma identified the metrics most strongly correlated with concussion in clinical studies, and she developed an algorithm based on those metrics to score the severity of a brain injury. A score of 10 or above is Oculogica’s threshold for concussion. (Uzma has seen scores as high as the low 30s; Rosina says she usually scores 1.5 to 2.5 in her normal, healthy state.) EyeBox also detects intracranial swelling, which can be caused by a concussion and other brain conditions. While other medical eye trackers are on the market, those require a baseline and assess only attention—essentially, the patient’s willingness to follow a chosen stimulus, assuming the capacity to do so. EyeBox, which doesn’t require baseline testing, measures the function of the cranial nerves, providing what has been so elusive in brain injury medicine: a physiologic indicator of brain function. This type of objective assessment could lead to a way of classifying brain injuries and tracking recovery. The hope, Rosina says, is that it would “open the floodgates on developing appropriate therapies.” EyeBox is in clinical trials, and Oculogica is working on getting FDA clearance for concussion diagnosis—something no other device currently has. The Department of Defense, the United States Olympic Training Center, and two high schools in Beaver Dam, Wisconsin, are among the organizations that have tested the device. Other EyeBox studies are under way at Boston Children’s Hospital, the Mayo Clinic, and Children’s Hospital of Philadelphia. An operator console shows an EyeBox test in progress. To take the test, a subject watches a video travel around a screen for 220 seconds as EyeBox’s camera tracks her eye movements. As Oculogica awaits the results of those studies, Uzma continues to identify new metrics and refine the device’s algorithms, and the company is developing a more portable version of EyeBox. A smaller version could be used in the field by the military, or possibly even on the sidelines by coaches and trainers. Beaver Dam High School’s head football coach, Steve Kuenzi, says the only approved test now available to coaches requires kids to answer questions on a computer, both before an injury and after. “I’m not a big believer in what it tells you,” Kuenzi says, explaining that you can’t know how much effort a student puts into such a test. Studies also show that baseline tests can be unreliable: athletes can purposely do poorly to increase the odds they’ll be able to keep playing after an injury. When Rosina tested EyeBox on about 100 of Kuenzi’s players, she approached him about retesting several who’d received high scores. First on her list was a player who had been hit hard in practice the night before but passed a traditional concussion assessment. Another was a student who had been injured in a game a few days earlier; most of the others played in “high-collision” positions. “The first kid she mentioned to me, it kind of sold me,” ­Kuenzi says. The fact that a player who had just suffered a major hit had the highest score—above 10—“was pretty telling,” he says. Another student tested low but then got hit in practice that afternoon; when Rosina tested him with EyeBox again at the hospital that night, his score jumped significantly, says his mother, Kelly Braker. He was tested repeatedly over the following months, and Braker was reassured as his score gradually declined. “You’re like, okay, obviously he’s getting better,” she says. By minimizing the guesswork involved in diagnosing concussions, Kuenzi says, that kind of tool can be a big help to coaches trying to protect players and defend a sport increasingly seen as too dangerous. “You’re talking the brain,” he says. “We’re not gonna mess around with that.”
2024-01-27T01:27:17.760571
https://example.com/article/9916
Q: USB Debugging option not available I am currently facing a problem with an Android Tablet, the tablet is working on 2.3.4 and it's a specific tablet (not a usual brand such as Samsung...). Information on the tablet : Filesystem : Release 4.6.4-r171 Kernel : 2.6.35.3-g56a157f It's seems to be a MX 93 (freescale) I want to connect it for debugging. The problem is there is no "Debugging USB" option to check in the Parameters => Application => Developpment. Have you any ideas on how to do it ? Thank you by advance. A: To enable ADB manually you need to configure USB interface and start adbd service on the device. First of all install a terminal emulator application. In the terminal run this command: setprop sys.usb.config adb If you are lucky and adbd service is properly pre-configured on your device it should start enumerating now. If not - try looking for start adbd in the init*usb.rc files in the / folder. The lines before that command should give you an idea what else could be missing.
2023-11-30T01:27:17.760571
https://example.com/article/8366
Access control methods and systems are previously known in which electronic lock devices are installed at doors, gates, etc., so as to provide conditional access to protected environments. A user that seeks access to such a protected environment will use an electronic key device which will communicate with the lock device in question. Based on this communication, the lock device will decide whether or not to allow the user to access the protected environment, for instance by controlling an electro-mechanical lock which is included in or coupled to the lock device. Generally, there are two distinctly different categories of access control systems. In the first category, the key device acts as an intermediate device to allow communication between the lock device and a remote central server. Such communication may take place over existing wide-area data and/or telecommunication networks. The outcome of this communication will determine whether or not the key device—and the user carrying it—shall be granted access to the environment protected by the lock device at any given moment. WO 2006/098690 discloses an access control system of a second category. In WO 2006/098690, the electronic key devices are capable of short-range wireless data communication with the lock devices. Each key device has a key device identifier which is used for the short-range wireless data communication, and the lock device is configured to perform authentication of an appearing key device by detecting the key device identifier of the key device and using the detected key device identifier, together with some other parameters, to determine whether access shall be granted. Each lock device is a stand-alone device with its own internal power source and requires no wiring to its surroundings. When a key device approaches and seeks access, the lock device will communicate with the key device using short-range wireless data communication, but it will typically not need any further communication with other, more remote elements in the system, such as a central server. In order to operate autonomously, the lock device uses local lock access data which is stored within the lock device and defines the key device identifiers of key devices which are allowed to access the protected environment. In one embodiment, the key devices are mobile terminals or other similar types of portable communication devices being equipped with short-range wireless data communication interfaces in the form of Bluetooth® transceivers. Hence, the key device identifier of each key device is the unique Bluetooth® address assigned to the Bluetooth® transceiver in the key device. In an access control system of the above second category, where the lock devices operate autonomously on locally stored lock access data, there will be an issue when it comes to providing the lock access data into the lock devices. Initially, when a new lock device is to be installed at the intended protected environment, the lock device may be programmed with certain initial lock access data, either during the manufacturing procedure, or by service personnel before or during the actual installation. This initial lock access data will then define an arbitrary number of key devices which are authorized to access the protected environment, these key devices being identified in the lock access data by their respective key device identifier (Bluetooth® address). Once installation is completed, the autonomously operating lock device has no other contact with the surroundings, except when an appearing key device seeks access to the environment protected by the lock device. The access control system of WO 2006/098690 is therefore configured to exchange various data between key device and lock device, once the key device has been successfully authorized and a bi-directional Bluetooth® link has been established between the devices. The types of data exchanged include log file and status data recorded by the lock device regarding for instance previous attempts by key devices to access the environment protected, as well as updated lock access data intended to replace or upgrade the existing lock access data in the lock device. Such updated lock access data will have been generated by an administrator at a remote administration server and sent in advance to the key device over one or more existing communication networks such as the Internet and/or a telecommunications network. Upon receipt, the key device will have buffered the updated lock access data, waiting for an opportunity when the user of the key device approaches the lock device in question to forward the updated lock access data to the lock device. In this way, service personnel do not have to visit the premises where the lock device is installed in order to update the lock access data. Instead, updated lock access data may be sent via the key device over existing communication networks, as mentioned above. However, this requires that the key device which visits the lock device is indeed authorized to access the protected environment; otherwise there will be no Bluetooth® link established between the devices and, consequently, no opportunity for the key device to forward the updated lock access data to the lock device. In turn, in order to be considered as authorized by the lock device, the key device identifier of the key device must be included in the current lock access data in the lock device. In other words, the key device must already be known to the lock device. Actually, in real-world implementations, not all key devices are typically allowed to bring updated lock access data to lock devices. Rather, a subset of particularly trusted key devices is designated as ambassadors; only these will be allowed to bring updated lock access data to the lock devices. Ambassador key devices may for instance be possessed and used by managers, security personnel or other trusted users in the access control system. As time passes, any real-world implementation of an access control system will experience needs to add new users/key devices to the system, to change which particular key devices that shall be able to access each particular lock device, to remove users/key devices from the system, etc. These needs will be all the more frequent and complicated, the bigger and more complex the access control system grows. This will be considered in more detail in a later section of this document with reference to FIG. 1. One particularly problematic situation which needs to be handled is when a whole set of key devices, which has hitherto been defined as authorized according to the current lock access data in one or more lock devices, no longer shall be authorized but instead be replaced by a new group of key devices. If none of the key devices in the new group is previously known to a lock device, then that lock device will not be prepared to communicate with any such unknown key device and will therefore not be able to receive the updated lock access data. Another particularly problematic situation is when a new key device is to be added to the list of authorized key devices for a particular lock device, but that lock device is only visited by an ambassador key device at infrequent occasions. This may mean that the new key device's access to the particular lock device is considerably delayed by as much as a week, month or even more. Generally, the invention seeks to find a trade-off between two opposing interests—to allow for a flexible way of distributing sets of updated lock access data to all relevant lock devices, while maintaining security at an acceptable level.
2024-07-04T01:27:17.760571
https://example.com/article/7686
Q: How to reduce code duplication when using pattern matching and Future mappings? I have this code in my one of my controllers: def addPayment(id:String, amount:String) = Action.async(implicit request => User.isBalanceRecordExisting(id).flatMap{ yesOrNo => yesOrNo match{ case true => User.getCurrentPaymentBalance(id).flatMap( balance => User.updatePayment(id, balance + amount.toDouble) ).flatMap( result => User.putBonus(id, amount.toDouble, 1) ).map(result => Redirect(routes.Application.userBonuses())) case false => User.addPayment(id, amount.toDouble).flatMap( result => User.putBonus(id, amount.toDouble, 1) ).map(result => Redirect(routes.Application.userBonuses())) } } ) So the logic is simple: I check if there is a record in DB and if it is not there I add it, if it is there then I update it. After that I repeat completely the same chain of actions in both cases. So I am not happy that in both flows I have duplicated code. Is there a good and concise way to simplify this? All business logic methods there have some Future[T] return type. A: Actually, you don't use result of add/update, but for keeping your logic this: def addPayment(id:String, amount:String) = { def processResult[T](result: T) = User.putBonus(id, amount.toDouble, 1)) .map(result => Redirect(routes.Application.userBonuses())) Action.async(implicit request => User.isBalanceRecordExisting(id) flatMap { case true => User.getCurrentPaymentBalance(id) flatMap { balance => User.updatePayment(id, balance + amount.toDouble) } flatMap processResult case false => User.addPayment(id, amount.toDouble) flatMap processResult } ) } UPDATED
2024-07-07T01:27:17.760571
https://example.com/article/4847
Since 1985, designer Yuki Matsuda has paid homage to American crafts and traditions by choosing the most durable and precious raw materials when crafting his Yuketen boots. For Fall 2012, the Maine Guide Boots are handmade with various accent pieces including camouflage wool, pony hair, cerise leather and full Horween silhouettes. Each fit comes with heel pulls, heavyweight leather laces, and Vibram soles for unsurpassed comfort and durability. The versatile Yuketen Maine Guide Boots can be purchased at Kith NYC and online for between $550-$605 USD.
2023-08-19T01:27:17.760571
https://example.com/article/4830
MACHINE WILL BREW MORE THAN COL ONE PICO BREW YOU MAKE FROM MORNING COFFEE TO ICE COLD SODA, CEO BILL MITCHELL THANKS FOR JOINING US A WEEK SINCE KICK-STARTER LAUNCHED BLOWN PAST FUND-RAISING GOAL. >> GREAT CAMPAIGN ABOUT FIVE DAYS IN WE'VE EXCEEDED THE PACE THAT WE HAD LAST YEAR, ABOUT 1500 BACKERS SO FAR WHICH IS ABOUT WHAT WE HALF WHAT WE FINISHED A ENTIRE CAMPAIGN LAST YEAR ON RECORD-BREAKING. >> CONGRATULATIONS WHAT IS VISION. >> WHAT IS POSSIBLE. >> BEVERAGES YOU SEE WE CAN BREW WITH THIS APPLIANCE. >> SMALLEST, MOST UNIVERSAL APPLIANCE PRODUCED TO GOAL TO BREW ANY DEFRJZ COFFEE TEA. >> YOU NAME IT. >> ALL IN SAME MACHINE YOU BREWED THESE BEERS TELL US WHAT YOU HAVE ON SET. >> INDEED. SO WE'VE GOT THREE TYPES OF BEERS ILLUSTRATEING, STYLED, RED ALE STOUT, IPA OVER 230 BREWERIES AROUND THE WORLD ALL DID YOU HAVE STIFLED BR THIS IS A GOLDEN LOOK, POPULAR IN INDIA WE HAVE A CRY SODA LEMON DRY SODA, WE HAVE A BERRY -- KUMBUCHA, COLD BREW COFFEE YOU CAN BREW THE SPECTRUM OF BEVERAGES ALL DAY. >> CUPS MACHINES A CROWDED SPACE YOU'VE GOT A LOT OF MACHINES OUT THERE WILL DO COFFEE, LIKE KIERIG. >> HOW MUCH SPACE DO YOU WANT TO DEDICATE ON COUNTERTOP. >> TRUE A SINGLE APPLIANCE THIS SMALL CAN BREW EVERYTHING ALL BEVERAGES YOU DRINK WOULDN'T YOU PREFER APPLIANCE LIKE THIS. >> TRUE IF YOU CAN CRAFT THEM WITH UNIQUE CONTROL YOU CAN DIAL EVERY ONE OF THESE TO EXACTLY YOUR SPECIFICATION. >> CAN YOU GET CUPS -- >> YOU CAN GET PREPACKAGED INGREDIENTS, WHERE INGREDIENTS ARE DIFFICULT, GOLDEN FOR INSTANCE MIGHT NOT BE SOMETHING FAMILIAR WITH NOT SOMETHING YOU CAN TO GROCERY STORE AND GET, SO FOR THOSE TYPES OF INGREDIENTS, WE PREPACKAGE THEM FOR YOU SO YOU CAN BUY THEM YOU CAN BRING YOUR OWN COFFEE. >> FANTASTIC, GREAT, THE COST? >> THIS IS RIGHT NOW SUB200
2024-04-16T01:27:17.760571
https://example.com/article/3095
#include <assert.h> #include <bitcoin/chainparams.h> #include <bitcoin/psbt.h> #include <bitcoin/pubkey.h> #include <bitcoin/script.h> #include <bitcoin/signature.h> #include <ccan/cast/cast.h> #include <ccan/ccan/array_size/array_size.h> #include <ccan/ccan/mem/mem.h> #include <ccan/tal/str/str.h> #include <common/amount.h> #include <common/type_to_string.h> #include <common/utils.h> #include <string.h> #include <wally_psbt.h> #include <wally_transaction.h> #include <wire/wire.h> void psbt_destroy(struct wally_psbt *psbt) { wally_psbt_free(psbt); } static struct wally_psbt *init_psbt(const tal_t *ctx, size_t num_inputs, size_t num_outputs) { int wally_err; struct wally_psbt *psbt; tal_wally_start(); if (is_elements(chainparams)) wally_err = wally_psbt_elements_init_alloc(0, num_inputs, num_outputs, 0, &psbt); else wally_err = wally_psbt_init_alloc(0, num_inputs, num_outputs, 0, &psbt); assert(wally_err == WALLY_OK); tal_add_destructor(psbt, psbt_destroy); tal_wally_end(tal_steal(ctx, psbt)); return psbt; } struct wally_psbt *create_psbt(const tal_t *ctx, size_t num_inputs, size_t num_outputs, u32 locktime) { int wally_err; struct wally_tx *wtx; struct wally_psbt *psbt; tal_wally_start(); if (wally_tx_init_alloc(WALLY_TX_VERSION_2, locktime, num_inputs, num_outputs, &wtx) != WALLY_OK) abort(); /* wtx is freed below */ tal_wally_end(NULL); psbt = init_psbt(ctx, num_inputs, num_outputs); tal_wally_start(); wally_err = wally_psbt_set_global_tx(psbt, wtx); assert(wally_err == WALLY_OK); tal_wally_end(psbt); wally_tx_free(wtx); return psbt; } struct wally_psbt *new_psbt(const tal_t *ctx, const struct wally_tx *wtx) { struct wally_psbt *psbt; int wally_err; psbt = init_psbt(ctx, wtx->num_inputs, wtx->num_outputs); tal_wally_start(); /* Set directly: avoids psbt checks for non-NULL scripts/witnesses */ wally_err = wally_tx_clone_alloc(wtx, 0, &psbt->tx); assert(wally_err == WALLY_OK); /* Inputs/outs are pre-allocated above, 'add' them as empty dummies */ psbt->num_inputs = wtx->num_inputs; psbt->num_outputs = wtx->num_outputs; for (size_t i = 0; i < wtx->num_inputs; i++) { /* add these scripts + witnesses to the psbt */ if (wtx->inputs[i].script) { wally_err = wally_psbt_input_set_final_scriptsig(&psbt->inputs[i], wtx->inputs[i].script, wtx->inputs[i].script_len); assert(wally_err == WALLY_OK); } if (wtx->inputs[i].witness) { wally_err = wally_psbt_input_set_final_witness(&psbt->inputs[i], wtx->inputs[i].witness); assert(wally_err == WALLY_OK); } } tal_wally_end(psbt); return psbt; } bool psbt_is_finalized(const struct wally_psbt *psbt) { size_t is_finalized; int wally_err = wally_psbt_is_finalized(psbt, &is_finalized); assert(wally_err == WALLY_OK); return is_finalized ? true : false; } struct wally_psbt_input *psbt_add_input(struct wally_psbt *psbt, struct wally_tx_input *input, size_t insert_at) { const u32 flags = WALLY_PSBT_FLAG_NON_FINAL; /* Skip script/witness */ int wally_err; tal_wally_start(); wally_err = wally_psbt_add_input_at(psbt, insert_at, flags, input); assert(wally_err == WALLY_OK); tal_wally_end(psbt); return &psbt->inputs[insert_at]; } struct wally_psbt_input *psbt_append_input(struct wally_psbt *psbt, const struct bitcoin_txid *txid, u32 outnum, u32 sequence, const u8 *scriptSig, const u8 *input_wscript, const u8 *redeemscript) { struct wally_tx_input *tx_in; size_t input_num = psbt->num_inputs; const u32 flags = WALLY_PSBT_FLAG_NON_FINAL; /* Skip script/witness */ int wally_err; tal_wally_start(); if (chainparams->is_elements) { if (wally_tx_elements_input_init_alloc(txid->shad.sha.u.u8, sizeof(txid->shad.sha.u.u8), outnum, sequence, NULL, 0, NULL, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NULL, 0, NULL, &tx_in) != WALLY_OK) abort(); } else { if (wally_tx_input_init_alloc(txid->shad.sha.u.u8, sizeof(txid->shad.sha.u.u8), outnum, sequence, NULL, 0, NULL, &tx_in) != WALLY_OK) abort(); } wally_err = wally_psbt_add_input_at(psbt, input_num, flags, tx_in); assert(wally_err == WALLY_OK); wally_tx_input_free(tx_in); tal_wally_end(psbt); if (input_wscript) { /* Add the prev output's data into the PSBT struct */ psbt_input_set_witscript(psbt, input_num, input_wscript); } if (redeemscript) { tal_wally_start(); wally_err = wally_psbt_input_set_redeem_script(&psbt->inputs[input_num], redeemscript, tal_bytelen(redeemscript)); assert(wally_err == WALLY_OK); tal_wally_end(psbt); } return &psbt->inputs[input_num]; } void psbt_rm_input(struct wally_psbt *psbt, size_t remove_at) { int wally_err = wally_psbt_remove_input(psbt, remove_at); assert(wally_err == WALLY_OK); } struct wally_psbt_output *psbt_add_output(struct wally_psbt *psbt, struct wally_tx_output *output, size_t insert_at) { int wally_err; tal_wally_start(); wally_err = wally_psbt_add_output_at(psbt, insert_at, 0, output); assert(wally_err == WALLY_OK); tal_wally_end(psbt); return &psbt->outputs[insert_at]; } struct wally_psbt_output *psbt_append_output(struct wally_psbt *psbt, const u8 *script, struct amount_sat amount) { struct wally_psbt_output *out; struct wally_tx_output *tx_out = wally_tx_output(NULL, script, amount); out = psbt_add_output(psbt, tx_out, psbt->tx->num_outputs); wally_tx_output_free(tx_out); return out; } struct wally_psbt_output *psbt_insert_output(struct wally_psbt *psbt, const u8 *script, struct amount_sat amount, size_t insert_at) { struct wally_psbt_output *out; struct wally_tx_output *tx_out = wally_tx_output(NULL, script, amount); out = psbt_add_output(psbt, tx_out, insert_at); wally_tx_output_free(tx_out); return out; } void psbt_rm_output(struct wally_psbt *psbt, size_t remove_at) { int wally_err = wally_psbt_remove_output(psbt, remove_at); assert(wally_err == WALLY_OK); } void psbt_input_add_pubkey(struct wally_psbt *psbt, size_t in, const struct pubkey *pubkey) { int wally_err; u32 empty_path[1] = {0}; unsigned char fingerprint[4]; struct ripemd160 hash; u8 pk_der[PUBKEY_CMPR_LEN]; assert(in < psbt->num_inputs); /* Find the key identifier fingerprint: * the first 32 bits of the identifier, where the identifier * is the hash160 of the ECDSA serialized public key * https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki#key-identifiers * */ pubkey_to_hash160(pubkey, &hash); memcpy(fingerprint, hash.u.u8, sizeof(fingerprint)); /* we serialize the compressed version of the key, wally likes this */ pubkey_to_der(pk_der, pubkey); tal_wally_start(); wally_err = wally_psbt_input_add_keypath_item(&psbt->inputs[in], pk_der, sizeof(pk_der), fingerprint, sizeof(fingerprint), empty_path, ARRAY_SIZE(empty_path)); assert(wally_err == WALLY_OK); tal_wally_end(psbt); } bool psbt_input_set_signature(struct wally_psbt *psbt, size_t in, const struct pubkey *pubkey, const struct bitcoin_signature *sig) { u8 pk_der[PUBKEY_CMPR_LEN]; bool ok; assert(in < psbt->num_inputs); /* we serialize the compressed version of the key, wally likes this */ pubkey_to_der(pk_der, pubkey); tal_wally_start(); wally_psbt_input_set_sighash(&psbt->inputs[in], sig->sighash_type); ok = wally_psbt_input_add_signature(&psbt->inputs[in], pk_der, sizeof(pk_der), sig->s.data, sizeof(sig->s.data)) == WALLY_OK; tal_wally_end(psbt); return ok; } void psbt_input_set_wit_utxo(struct wally_psbt *psbt, size_t in, const u8 *scriptPubkey, struct amount_sat amt) { struct wally_tx_output *tx_out; int wally_err; assert(in < psbt->num_inputs); assert(tal_bytelen(scriptPubkey) > 0); tal_wally_start(); if (is_elements(chainparams)) { u8 value[9]; wally_err = wally_tx_confidential_value_from_satoshi(amt.satoshis, /* Raw: wally API */ value, sizeof(value)); assert(wally_err == WALLY_OK); wally_err = wally_tx_elements_output_init_alloc(scriptPubkey, tal_bytelen(scriptPubkey), chainparams->fee_asset_tag, ELEMENTS_ASSET_LEN, value, sizeof(value), NULL, 0, NULL, 0, NULL, 0, &tx_out); } else wally_err = wally_tx_output_init_alloc(amt.satoshis, /* Raw: type conv */ scriptPubkey, tal_bytelen(scriptPubkey), &tx_out); assert(wally_err == WALLY_OK); wally_err = wally_psbt_input_set_witness_utxo(&psbt->inputs[in], tx_out); wally_tx_output_free(tx_out); assert(wally_err == WALLY_OK); tal_wally_end(psbt); } void psbt_input_set_witscript(struct wally_psbt *psbt, size_t in, const u8 *wscript) { int wally_err; tal_wally_start(); wally_err = wally_psbt_input_set_witness_script(&psbt->inputs[in], wscript, tal_bytelen(wscript)); assert(wally_err == WALLY_OK); tal_wally_end(psbt); } void psbt_elements_input_set_asset(struct wally_psbt *psbt, size_t in, struct amount_asset *asset) { tal_wally_start(); if (asset->value > 0) if (wally_psbt_input_set_value(&psbt->inputs[in], asset->value) != WALLY_OK) abort(); /* PSET expects an asset tag without the prefix */ if (wally_psbt_input_set_asset(&psbt->inputs[in], asset->asset + 1, ELEMENTS_ASSET_LEN - 1) != WALLY_OK) abort(); tal_wally_end(psbt); } void psbt_elements_normalize_fees(struct wally_psbt *psbt) { struct amount_asset asset; size_t fee_output_idx = psbt->num_outputs; if (!is_elements(chainparams)) return; /* Elements requires that every input value is accounted for, * including the fees */ struct amount_sat total_in = AMOUNT_SAT(0), val; for (size_t i = 0; i < psbt->num_inputs; i++) { val = psbt_input_get_amount(psbt, i); if (!amount_sat_add(&total_in, total_in, val)) return; } for (size_t i = 0; i < psbt->num_outputs; i++) { asset = wally_tx_output_get_amount(&psbt->tx->outputs[i]); if (elements_wtx_output_is_fee(psbt->tx, i)) { if (fee_output_idx == psbt->num_outputs) { fee_output_idx = i; continue; } /* We already have at least one fee output, * remove this one */ psbt_rm_output(psbt, i--); continue; } if (!amount_asset_is_main(&asset)) continue; if (!amount_sat_sub(&total_in, total_in, amount_asset_to_sat(&asset))) return; } if (amount_sat_eq(total_in, AMOUNT_SAT(0))) return; /* We need to add a fee output */ if (fee_output_idx == psbt->num_outputs) { psbt_append_output(psbt, NULL, total_in); } else { u64 sats = total_in.satoshis; /* Raw: wally API */ struct wally_tx_output *out = &psbt->tx->outputs[fee_output_idx]; if (wally_tx_confidential_value_from_satoshi( sats, out->value, out->value_len) != WALLY_OK) return; } } bool psbt_has_input(const struct wally_psbt *psbt, const struct bitcoin_txid *txid, u32 outnum) { for (size_t i = 0; i < psbt->num_inputs; i++) { struct bitcoin_txid in_txid; struct wally_tx_input *in = &psbt->tx->inputs[i]; if (outnum != in->index) continue; wally_tx_input_get_txid(in, &in_txid); if (bitcoin_txid_eq(txid, &in_txid)) return true; } return false; } bool psbt_input_set_redeemscript(struct wally_psbt *psbt, size_t in, const u8 *redeemscript) { int wally_err; assert(psbt->num_inputs > in); wally_err = wally_psbt_input_set_redeem_script(&psbt->inputs[in], redeemscript, tal_bytelen(redeemscript)); return wally_err == WALLY_OK; } struct amount_sat psbt_input_get_amount(const struct wally_psbt *psbt, size_t in) { struct amount_sat val; assert(in < psbt->num_inputs); if (psbt->inputs[in].witness_utxo) { struct amount_asset amt_asset = wally_tx_output_get_amount(psbt->inputs[in].witness_utxo); assert(amount_asset_is_main(&amt_asset)); val = amount_asset_to_sat(&amt_asset); } else if (psbt->inputs[in].utxo) { int idx = psbt->tx->inputs[in].index; struct wally_tx *prev_tx = psbt->inputs[in].utxo; val = amount_sat(prev_tx->outputs[idx].satoshi); } else abort(); return val; } struct amount_sat psbt_output_get_amount(const struct wally_psbt *psbt, size_t out) { struct amount_asset asset; assert(out < psbt->num_outputs); asset = wally_tx_output_get_amount(&psbt->tx->outputs[out]); assert(amount_asset_is_main(&asset)); return amount_asset_to_sat(&asset); } static void add(u8 **key, const void *mem, size_t len) { size_t oldlen = tal_count(*key); tal_resize(key, oldlen + len); memcpy(*key + oldlen, memcheck(mem, len), len); } static void add_type(u8 **key, const u8 num) { add(key, &num, 1); } static void add_varint(u8 **key, size_t val) { u8 vt[VARINT_MAX_LEN]; size_t vtlen; vtlen = varint_put(vt, val); add(key, vt, vtlen); } #define LIGHTNING_PROPRIETARY_PREFIX "lightning" u8 *psbt_make_key(const tal_t *ctx, u8 key_subtype, const u8 *key_data) { /** * BIP174: * Type: Proprietary Use Type <tt>PSBT_GLOBAL_PROPRIETARY = 0xFC</tt> ** Key: Variable length identifier prefix, followed * by a subtype, followed by the key data itself. *** <tt>{0xFC}|<prefix>|{subtype}|{key data}</tt> ** Value: Any value data as defined by the proprietary type user. *** <tt><data></tt> */ u8 *key = tal_arr(ctx, u8, 0); add_type(&key, PSBT_PROPRIETARY_TYPE); add_varint(&key, strlen(LIGHTNING_PROPRIETARY_PREFIX)); add(&key, LIGHTNING_PROPRIETARY_PREFIX, strlen(LIGHTNING_PROPRIETARY_PREFIX)); add_type(&key, key_subtype); if (key_data) add(&key, key_data, tal_bytelen(key_data)); return key; } void psbt_input_add_unknown(const tal_t *ctx, struct wally_psbt_input *in, const u8 *key, const void *value, size_t value_len) { tal_wally_start(); if (wally_map_add(&in->unknowns, cast_const(unsigned char *, key), tal_bytelen(key), (unsigned char *) memcheck(value, value_len), value_len) != WALLY_OK) abort(); tal_wally_end(ctx); } void *psbt_get_unknown(const struct wally_map *map, const u8 *key, size_t *val_len) { size_t index; if (wally_map_find(map, key, tal_bytelen(key), &index) != WALLY_OK) return NULL; /* Zero: item not found. */ if (index == 0) return NULL; /* ++: item is at this index minus 1 */ *val_len = map->items[index - 1].value_len; return map->items[index - 1].value; } void *psbt_get_lightning(const struct wally_map *map, const u8 proprietary_type, size_t *val_len) { void *res; u8 *key = psbt_make_key(NULL, proprietary_type, NULL); res = psbt_get_unknown(map, key, val_len); tal_free(key); return res; } void psbt_output_add_unknown(const tal_t *ctx, struct wally_psbt_output *out, const u8 *key, const void *value, size_t value_len) { tal_wally_start(); if (wally_map_add(&out->unknowns, cast_const(unsigned char *, key), tal_bytelen(key), (unsigned char *) memcheck(value, value_len), value_len) != WALLY_OK) abort(); tal_wally_end(ctx); } /* Use the destructor to free the wally_tx */ static void wally_tx_destroy(struct wally_tx *wtx) { wally_tx_free(wtx); } bool psbt_finalize(struct wally_psbt *psbt) { bool ok; tal_wally_start(); /* Wally doesn't know how to finalize P2WSH; this happens with * option_anchor_outputs, and finalizing is trivial. */ /* FIXME: miniscript! miniscript! miniscript! */ for (size_t i = 0; i < psbt->num_inputs; i++) { struct wally_psbt_input *input = &psbt->inputs[i]; struct wally_tx_witness_stack *stack; if (!is_anchor_witness_script(input->witness_script, input->witness_script_len)) continue; if (input->signatures.num_items != 1) continue; /* BOLT #3: * #### `to_remote` Output * * If `option_anchor_outputs` applies to the commitment * transaction, the `to_remote` output is encumbered by a one * block csv lock. * * <remote_pubkey> OP_CHECKSIGVERIFY 1 OP_CHECKSEQUENCEVERIFY * * The output is spent by an input with `nSequence` * field set to `1` and witness: * * <remote_sig> */ wally_tx_witness_stack_init_alloc(2, &stack); wally_tx_witness_stack_add(stack, input->signatures.items[0].value, input->signatures.items[0].value_len); wally_tx_witness_stack_add(stack, input->witness_script, input->witness_script_len); input->final_witness = stack; } ok = (wally_psbt_finalize(psbt) == WALLY_OK); tal_wally_end(psbt); return ok && psbt_is_finalized(psbt); } struct wally_tx *psbt_final_tx(const tal_t *ctx, const struct wally_psbt *psbt) { struct wally_tx *wtx; if (!psbt_is_finalized(psbt)) return NULL; tal_wally_start(); if (wally_psbt_extract(psbt, &wtx) == WALLY_OK) tal_add_destructor(wtx, wally_tx_destroy); else wtx = NULL; tal_wally_end(tal_steal(ctx, wtx)); return wtx; } struct wally_psbt *psbt_from_b64(const tal_t *ctx, const char *b64, size_t b64len) { struct wally_psbt *psbt; char *str = tal_strndup(tmpctx, b64, b64len); tal_wally_start(); if (wally_psbt_from_base64(str, &psbt) == WALLY_OK) tal_add_destructor(psbt, psbt_destroy); else psbt = NULL; tal_wally_end(tal_steal(ctx, psbt)); return psbt; } char *psbt_to_b64(const tal_t *ctx, const struct wally_psbt *psbt) { char *serialized_psbt; int ret; tal_wally_start(); ret = wally_psbt_to_base64(psbt, 0, &serialized_psbt); assert(ret == WALLY_OK); tal_wally_end(tal_steal(ctx, serialized_psbt)); return serialized_psbt; } REGISTER_TYPE_TO_STRING(wally_psbt, psbt_to_b64); const u8 *psbt_get_bytes(const tal_t *ctx, const struct wally_psbt *psbt, size_t *bytes_written) { size_t len = 0; u8 *bytes; if (!psbt) { *bytes_written = 0; return NULL; } wally_psbt_get_length(psbt, 0, &len); bytes = tal_arr(ctx, u8, len); if (wally_psbt_to_bytes(psbt, 0, bytes, len, bytes_written) != WALLY_OK || *bytes_written != len) { /* something went wrong. bad libwally ?? */ abort(); } return bytes; } struct wally_psbt *psbt_from_bytes(const tal_t *ctx, const u8 *bytes, size_t byte_len) { struct wally_psbt *psbt; tal_wally_start(); if (wally_psbt_from_bytes(bytes, byte_len, &psbt) == WALLY_OK) tal_add_destructor(psbt, psbt_destroy); else psbt = NULL; tal_wally_end(tal_steal(ctx, psbt)); return psbt; } void towire_wally_psbt(u8 **pptr, const struct wally_psbt *psbt) { /* Let's include the PSBT bytes */ size_t bytes_written; const u8 *pbt_bytes = psbt_get_bytes(NULL, psbt, &bytes_written); towire_u32(pptr, bytes_written); towire_u8_array(pptr, pbt_bytes, bytes_written); tal_free(pbt_bytes); } struct wally_psbt *fromwire_wally_psbt(const tal_t *ctx, const u8 **cursor, size_t *max) { struct wally_psbt *psbt; u32 psbt_byte_len; const u8 *psbt_buf; psbt_byte_len = fromwire_u32(cursor, max); psbt_buf = fromwire(cursor, max, NULL, psbt_byte_len); if (!psbt_buf || psbt_byte_len == 0) return NULL; psbt = psbt_from_bytes(ctx, psbt_buf, psbt_byte_len); if (!psbt) return fromwire_fail(cursor, max); #if DEVELOPER /* Re-marshall for sanity check! */ u8 *tmpbuf = tal_arr(NULL, u8, psbt_byte_len); size_t written; if (wally_psbt_to_bytes(psbt, 0, tmpbuf, psbt_byte_len, &written) != WALLY_OK) { tal_free(tmpbuf); tal_free(psbt); return fromwire_fail(cursor, max); } tal_free(tmpbuf); #endif return psbt; } /* This only works on a non-final psbt because we're ALL SEGWIT! */ void psbt_txid(const tal_t *ctx, const struct wally_psbt *psbt, struct bitcoin_txid *txid, struct wally_tx **wtx) { struct wally_tx *tx; /* You can *almost* take txid of global tx. But @niftynei thought * about this far more than me and pointed out that P2SH * inputs would not be represented, so here we go. */ tal_wally_start(); wally_tx_clone_alloc(psbt->tx, 0, &tx); for (size_t i = 0; i < tx->num_inputs; i++) { if (psbt->inputs[i].final_scriptsig) { wally_tx_set_input_script(tx, i, psbt->inputs[i].final_scriptsig, psbt->inputs[i].final_scriptsig_len); } else if (psbt->inputs[i].redeem_script) { u8 *script; /* P2SH requires push of the redeemscript, from libwally src */ script = tal_arr(tmpctx, u8, 0); script_push_bytes(&script, psbt->inputs[i].redeem_script, psbt->inputs[i].redeem_script_len); wally_tx_set_input_script(tx, i, script, tal_bytelen(script)); } } tal_wally_end(tal_steal(ctx, tx)); wally_txid(tx, txid); if (wtx) *wtx = tx; else wally_tx_free(tx); }
2024-02-11T01:27:17.760571
https://example.com/article/9476
FROM debian:buster # Application name ARG APP_NAME # Product version ARG VERSION # Link to the product repository ARG VCS_URL # Hash of the commit ARG VCS_REF # Repository branch ARG VCS_BRANCH # Date of the build ARG BUILD_DATE # Include metadata LABEL org.label-schema.schema-version="1.0" \ org.label-schema.vendor="Cossack Labs" \ org.label-schema.url="https://cossacklabs.com" \ org.label-schema.name="Acra CE build image" \ org.label-schema.description="Acra helps you easily secure your databases in distributed, microservice-rich environments" \ org.label-schema.version="$VERSION" \ org.label-schema.vcs-url="$VCS_URL" \ org.label-schema.vcs-ref="$VCS_REF" \ org.label-schema.build-date="$BUILD_DATE" \ com.cossacklabs.vendor.name="Cossack Labs Limited" \ com.cossacklabs.vendor.url="https://www.cossacklabs.com" \ com.cossacklabs.vendor.email="dev@cossacklabs.com" \ com.cossacklabs.product.name="$APP_NAME" \ com.cossacklabs.product.version="$VERSION" \ com.cossacklabs.product.vcs-ref="$VCS_REF" \ com.cossacklabs.product.vcs-branch="$VCS_BRANCH" \ com.cossacklabs.product.component="$APP_NAME" \ com.cossacklabs.docker.container.build-date="$BUILD_DATE" \ com.cossacklabs.docker.container.type="build" SHELL ["/bin/bash", "-c"] # Install dependencies RUN apt-get update && apt-get -y install \ apt-transport-https \ build-essential \ ca-certificates \ curl \ git \ gnupg \ libssl-dev \ openssl \ rsync \ wget WORKDIR /root # Install libthemis RUN set -o pipefail && \ curl -sSL https://pkgs.cossacklabs.com/scripts/libthemis_install.sh | \ bash -s -- --yes # Include scripts RUN mkdir /image.scripts COPY docker/_scripts/acra-build/add_component.sh /image.scripts/ COPY docker/_scripts/acra-build/collect_dependencies.sh /image.scripts/ COPY docker/_scripts/acra-build/install_go.sh /image.scripts/ RUN chmod +x /image.scripts/*.sh # Install Go RUN GO_TARBALL_CLEAN=1 GO_PREFIX_DIR=/usr/local /image.scripts/install_go.sh ENV GOROOT="/usr/local/go" GOPATH="/root/gopath" GO111MODULE="auto" ENV PATH="$PATH:/usr/local/go/bin" # Copy Acra sources ENV PATH_ACRA="/acra" COPY ./ "${PATH_ACRA}/" # Fetch all dependencies and build all binaries in acra RUN cd "${PATH_ACRA}" && go install ./cmd/... # Copy each product and its dependencies to resulting directories RUN for component in authmanager connector keymaker server tools translator webconfig; do \ ADD_COMPONENTS=(); \ if [ "$component" == 'tools' ]; then \ ADD_COMPONENTS+=('addzone' 'authmanager' 'keymaker' 'poisonrecordmaker' 'rollback' 'rotate'); \ else \ ADD_COMPONENTS+=("$component"); \ fi; \ if [ "$component" = 'server' ]; then \ ADD_COMPONENTS+=('poisonrecordmaker' 'rollback'); \ fi; \ if [ "$component" = 'translator' ]; then \ ADD_COMPONENTS+=('poisonrecordmaker'); \ fi; \ for c in ${ADD_COMPONENTS[@]}; do \ /image.scripts/add_component.sh "$c" "$component"; \ done; \ done # Copy static resources for acra-webconfig RUN cp -r "${PATH_ACRA}/cmd/acra-webconfig/static" \ "/container.acra-webconfig/"
2023-12-07T01:27:17.760571
https://example.com/article/5177
Disposal practices for unwanted residential medications in the United States. The occurrence of trace levels of prescription and over-the-counter pharmaceuticals in the environment began to receive concerted attention nearly two decades ago. The public's growing awareness and concern over the presence of these chemicals, especially in drinking water, has served to catalyze considerable discussion and debate regarding the best practices for disposal of unused or unwanted medications. In the United States, the first federal guidance for consumers was issued in 2007. It recommends discarding unused pharmaceuticals to household trash, after taking precautions to mix the pharmaceuticals with an inert substance and conceal the contents from view. Providing the consumer with additional options for conscientious disposal are various community, city, and state collection events, ongoing programs, and government-funded pilot projects. These strategies include the opportunity to mail or bring unused medications to various collection points, such as pharmacies, for eventual destruction. All of these approaches to medication disposal play roles in reducing the introduction of pharmaceuticals to the environment.
2023-09-29T01:27:17.760571
https://example.com/article/9518
Somatoline Man tummy and extensive Belly harms night10 Cubbyhole of 2 cms in the 4 weeks during your sleep 1 only application in the evening Complete treatment for 4 weekssomatoline is very easy to apply Tube of 250 ML SOMATOLINE spray thinness USE & GO: the Treatment Thinness, innovation for the women in a hurry. The spray Use*Go of Somatoline allows a fast application thanks to its diffuser multi-positions. Ultra-fast absorption. Use & Go for a result thinness in the 4 weeks. Spray of 200 ml
2024-01-19T01:27:17.760571
https://example.com/article/6942
Q: How do we know if an antiderivative has a closed form? For all I know, there are integrals which are not possible to solve - an example I was told is$$\int{\frac{\sin (x)}{x}}\,dx.$$ How to identify whether it has a closed form antiderivative or not? Is there a method? A: The only general algorithm is the Risch algorithm. This is, in general, infeasible to apply by hand. Therefore the only way to identify whether an anti-derivative has a symbolic representation expressible in terms of elementary functions is to become familiar with a huge repertoire of tricks, identities, and techniques.
2023-09-08T01:27:17.760571
https://example.com/article/6374
This is definitely one of the best shots in the sport of Hockey that I have ever seen. In this video, the shooter manages to shuffle the puck through his legs, then do a full spin and hit it in backwards with his stick. Enjoy!
2024-05-01T01:27:17.760571
https://example.com/article/2886
Before anyone asks the Spurs to appear en masse on the next episode of "Derek," Ricky Gervais' thoughtful look at retirement home living, let's assess a few benefits of being old and reliable: San Antonio has finished first-first-second in the West over the last three seasons. Plus, the Spurs aren't really all that old; Kawhi Leonard, the team's new No. 3 option, is barely out of his Nickelodeon Jr. stage. Chris Paul + Rivers = NBA Finals? It's certainly possible, but a few things have to happen for the league's onetime lottery-pick franchise to reach the elite level. First, Blake Griffin needs to become a late-game offensive option and DeAndre Jordan must morph into a defensive force. If the Clippers can also improve their three-point shooting, well, see you in June. Hello, anyone there besides Kevin Durant for the next four to six weeks? A team already dealing with separation anxiety after the departure of Kevin Martin now must gird itself for a month or more without Russell Westbrook and his worrisome right knee. Even the spindly wonder known as Durantula may not be enough to keep the Thunder from taking an early-season tumble in the standings. As consolation prizes go, you can do a lot worse than Iguodala. The Warriors couldn't entice Dwight Howard but landed a lockdown perimeter defender who can also help facilitate one of the league's most dynamic offenses. The flip side is that they must replace Jack and Landry, whose toughness and court savvy rival anyone's. As the Lakers learned last season, the euphoria of landing Howard can quickly go from "Yay!" to "Yowzers!" Howard hasn't developed a go-to move around the basket after nine NBA seasons, and it might take a NASA engineer to fix his misadventures at the free-throw line. At least he's lots of fun in the locker room before games. Grit-and-grind is giving way to get-the-shot-off-ASAP under Joerger, an analytics adherent who noted that big men Zach Randolph and Marc Gasol have been more effective scorers in the first 10 seconds of the shot clock while playing together. Mike Conley is fully capable of giving the offense some vroom. Ricky Rubio's knee injury derailed the Timberwolves' playoff hopes in 2012. Last season, it was Kevin Love's hand. If the rest of the roster can get full-body protection from Lloyd's of London, then maybe the team will reach the postseason for the first time since 2004. Martin adds some needed consistent scoring and Brewer can be an occasional revelation off the bench. As best-case scenarios go, the Lakers' won't amount to much. If Kobe Bryant returns intact (and relatively early in the season), Pau Gasol and Kaman combine to give opponents 14 feet of hell, Nick Young plays a shred of defense and Steve Nash, 39, doesn't dissolve into dust before our eyes … the Lakers could make the playoffs! Shaw may discover that head coaching jobs aren't always as fun as they seem from the safety of the No. 2 gig. He'll have to deal with JaVale McGee's unfulfilled potential and Danilo Gallinari's knee injury, which could keep the dynamic small forward out until December. Wait, why did Shaw want this job again? General Manager Neil Olshey is a smart guy, which means he knows his overhaul of the Trail Blazers might take more time to result in a playoff appearance. McCollum's broken foot won't help. On the plus side, Olshey added some quality depth to support the core of LaMarcus Aldridge, Nicolas Batum and Damian Lillard. The Pelicans hope to be all about transformation, from the new nickname to Evans finding a niche to suit his skills to Eric Gordon making it through a full season after playing in only 51 of a possible 148 games since joining the franchise. Holiday gives New Orleans its first upper-echelon point guard since Chris Paul's departure. Strange but true fact: The Mavericks are only two years removed from an NBA title. Sad but true reality: It's probably going to take a lot longer for them to become contenders again. Their latest makeover has left them with a mishmash of parts that aren't going to add up to much in what could be Dirk Nowitzki's final season here. Having been granted a reprieve from moving to Seattle, the Kings cannot escape being once again unfit for NBA competition. Their prospects were dicey even before Landry suffered a torn hip flexor that could sideline him for the season's first four months. There's also the matter of how Malone will coexist with the capricious DeMarcus Cousins. Wait, so the Jazz actually meant to acquire past-their-prime Richard Jefferson and Biedrins and their combined $20 million in salary? If this is what it takes to take a stab at drafting Andrew Wiggins and give youngsters Derrick Favors and Enes Kanter a shot at carrying the team, well, get ready for lots of losses along the way. The Gortat trade leaves Phoenix without four of its top five scorers from last season, signaling a white-flag approach. Okafor's scoring average has dropped in each of the last six seasons and he sat out the entire preseason with a herniated disk in his neck that will sideline him indefinitely.
2024-04-14T01:27:17.760571
https://example.com/article/3472
Assam Black Tea and Its Health Benefits Want to relive the taste of past over a cup of tea? Not a bad idea. Go for the Assam black tea and cherish your moments. Nothing beats the black tea if you are really looking forward to rejuvenate your spirit. Being a popular infusion amongst the consumers, the Assam black tea comes with a bright colour and malty flavour. This particular tea is identified by its long and twisted dark brown shoots. Generally referred to as an Irish breakfast or English breakfast tea, this beverage is named after the world’s leading tea growing region, Assam. You will be very excited to know about its various health benefits as well. Buy Assam tea online to experience what exactly the brew can bring for you. History of Assam Black Tea There is an ancient Chinese proverb saying – “Better to be deprived of food for three days, than the tea for one.” True, it is difficult to live an entire day without a refreshing cup of tea. As per history, tea drinking had its origin in China in the 3rd century AD. This tea is believed to be grown near or at sea level and is widely known for its briskness and strong flavour. Bordering Myanmar and Bangladesh, Assam lies on the sides of the Brahmaputra River. After Southern China, Assam is considered to be the second tea production region across the globe. In fact, these are the only two sections in the world that have native tea plants. Grown in the tropical weather conditions, this tea is popular for its brisk flavoured profile. It dates back to 1823, when Robert Bruce, a Scottish adventurer explored the world’s biggest tea growing region, Assam. It was Robert, who found the camellia assamica increasing in numbers in Assam. It was in 1839 when the Assam Tea Company was established following the production of Assam black tea. Today, tea is highly appreciated across the globe and its caffeine content is preferred for a perfect breakfast feed. Specialities of Assam Black Tea Apart from the rich flavours, ample of health benefits add to the specialities of this infusion. The rich content of minerals, antioxidants and vitamins make tea highly beneficial to prevent illnesses. Improve Mental Health Caffeine is considered as a stimulant and, thus, it helps you to stay concentrated and awake all through out the day. Theanine is an amino acid that leads to mind relaxation and helps you stay alert as well. The presence of this acid makes you less tired. If you want to improve your entire cardiovascular health, make sure you buy Assam tea online today. As it is rich in antioxidants it will both lower your blood pressure and strengthen your blood vessels. If you are suffering from a sluggish digestion do not forget to drink black tea on a routine basis. It helps in faster digestion, thereby, making your body absorb less sugar or fat from food. This will not only lead to potential weight loss, but also reduce your sugar levels. One of the most important health benefits that cannot be missed out is Cancer Prevention. The antioxidants help in boosting the immune system, thereby, preventing the damage in your cells. So, buy Assam black tea online to enjoy a healthy lifestyle.
2024-07-25T01:27:17.760571
https://example.com/article/7602
Photonic crystal geometry for organic solar cells. We report organic solar cells with a photonic crystal nanostructure embossed in the photoactive bulk heterojunction layer, a topography that exhibits a 3-fold enhancement of the absorption in specific regions of the solar spectrum in part through multiple excitation resonances. The photonic crystal geometry is fabricated using a materials-agnostic process called PRINT wherein highly ordered arrays of nanoscale features are readily made in a single processing step over wide areas (approximately 4 cm(2)) that is scalable. We show efficiency improvements of approximately 70% that result not only from greater absorption, but also from electrical enhancements. The methodology is generally applicable to organic solar cells and the experimental findings reported in our manuscript corroborate theoretical expectations.
2023-10-05T01:27:17.760571
https://example.com/article/9083
<!-- ################ DO NOT EDIT THIS FILE. ################# --> <!-- ################ ################# --> <!-- ################ IT IS GENERATED. ################# --> <!-- ################ ################# --> <!-- ################ INSTEAD EDIT THE JAVADOC COMMENTS. ################# --> <!DOCTYPE html> <html> <head> <title>VideoTexture | Viro Developers </title> <meta http-equiv="Content-Type" content="text/html; charset=utf-8" /> <meta name="viewport" content="width=device-width,initial-scale=1.0,minimum-scale=1.0,maximum-scale=1.0,user-scalable=no" /> <meta content="IE=edge" http-equiv="X-UA-Compatible"> <link rel="shortcut icon" type="image/x-icon" href="../../../../favicon.ico" /> <link rel="alternate" href="http://developer.android.com/" hreflang="en" /> <link rel="alternate" href="http://developer.android.com/intl/es/" hreflang="es" /> <link rel="alternate" href="http://developer.android.com/intl/id/" hreflang="id" /> <link rel="alternate" href="http://developer.android.com/intl/ja/" hreflang="ja" /> <link rel="alternate" href="http://developer.android.com/intl/ko/" hreflang="ko" /> <link rel="alternate" href="http://developer.android.com/intl/pt-br/" hreflang="pt-br" /> <link rel="alternate" href="http://developer.android.com/intl/ru/" hreflang="ru" /> <link rel="alternate" href="http://developer.android.com/intl/vi/" hreflang="vi" /> <link rel="alternate" href="http://developer.android.com/intl/zh-cn/" hreflang="zh-cn" /> <link rel="alternate" href="http://developer.android.com/intl/zh-tw/" hreflang="zh-tw" /> <!-- STYLESHEETS --> <link rel="stylesheet" href="https://fonts.googleapis.com/css?family=Roboto+Condensed"> <link rel="stylesheet" href="https://fonts.googleapis.com/css?family=Roboto:light,regular,medium,thin,italic,mediumitalic,bold" title="roboto"> <link href="../../../../assets/css/default.css?v=16" rel="stylesheet" type="text/css"> <!-- JAVASCRIPT --> <script src="http://www.google.com/jsapi" type="text/javascript"></script> <script src="../../../../assets/js/android_3p-bundle.js" type="text/javascript"></script> <script type="text/javascript"> var toRoot = "../../../../"; var metaTags = []; var devsite = false; var useUpdatedTemplates = false; </script> <script src="../../../../assets/js/docs.js?v=17" type="text/javascript"></script> <script> (function(i,s,o,g,r,a,m){i['GoogleAnalyticsObject']=r;i[r]=i[r]||function(){ (i[r].q=i[r].q||[]).push(arguments)},i[r].l=1*new Date();a=s.createElement(o), m=s.getElementsByTagName(o)[0];a.async=1;a.src=g;m.parentNode.insertBefore(a,m) })(window,document,'script','//www.google-analytics.com/analytics.js','ga'); ga('create', 'UA-5831155-1', 'android.com'); ga('create', 'UA-49880327-2', 'android.com', {'name': 'universal'}); // New tracker); ga('send', 'pageview'); ga('universal.send', 'pageview'); // Send page view for new tracker. </script> </head> <body class="gc-documentation develop reference api apilevel-"> <a name="top"></a> <!-- Header --> <div id="header-wrapper"> <div class="dac-header " id="header"> <div class="dac-header-inner"> <a class="dac-nav-toggle" data-dac-toggle-nav href="javascript:;" title="Open navigation"> <span class="dac-nav-hamburger"> </span> </a> <a class="dac-header-logo" href="http://developer.viromedia.com"> <img class="dac-header-logo-image" src="../../../../assets/images/logo_virocore.png" srcset="../../../../assets/images/logo_virocore@2x.png 2x" width="143" height="36" alt="Android" /> </a> <ul class="dac-header-tabs"> <li> <a class="dac-header-tab" href="https://virocore.viromedia.com">Documentation</a> </li> <li> <a class="dac-header-tab-selected" href="https://developer.viromedia.com">Reference</a> </li> <li> <a class="dac-header-tab" href="https://github.com/viromedia/virocore/issues">Issues</a> </li> <li> <a class="dac-header-tab" href="https://viromedia.com/support">Support</a> </li> <li> <a class="dac-header-tab" href="https://viromedia.com/virocore">Viro Home</a> </li> <li> </li> <li> </li> </ul> </div><!-- end header-wrap.wrap --> </div><!-- end header --> </div> <!--end header-wrapper --> <!-- Navigation--> <nav class="dac-nav"> <div class="dac-nav-dimmer" data-dac-toggle-nav></div> <div class="dac-nav-sidebar" data-swap data-dynamic="false" data-transition-speed="300" data-dac-nav> <div data-swap-container> <a class="dac-nav-back-button dac-swap-section dac-up dac-no-anim" data-swap-button href="javascript:;"> <i class="dac-sprite dac-nav-back"></i> </a> <div class="dac-nav-sub dac-swap-section dac-right dac-active" itemscope itemtype="http://schema.org/SiteNavigationElement" > <!-- Fullscreen toggler --> <button data-fullscreen class="dac-nav-fullscreen"> <i class="dac-sprite dac-fullscreen"></i> </button> <script>$('[data-fullscreen]').dacFullscreen();</script> <!-- End: Fullscreen toggler --> <div id="devdoc-nav"> <div id="api-nav-header"> <div id="api-nav-title">Viro APIs</div> </div><!-- end nav header --> <script> var SINCE_DATA = [ ]; buildApiLevelSelector(); </script> <div class="dac-reference-nav" data-reference-tree> <ul class="dac-reference-nav-list" data-reference-namespaces> <li class="selected api apilevel-"> <a href="../../../../reference/com/viro/core/package-summary.html">com.viro.core</a></li> </ul> <ul data-reference-resources> <li><h2>Interfaces</h2> <ul> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/AnimatedTexture.OnLoadComplete.html">AnimatedTexture.OnLoadComplete</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Animation.Listener.html">Animation.Listener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/AnimationTransaction.Listener.html">AnimationTransaction.Listener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARHitTestListener.html">ARHitTestListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARScene.CloudAnchorHostListener.html">ARScene.CloudAnchorHostListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARScene.CloudAnchorResolveListener.html">ARScene.CloudAnchorResolveListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARScene.Listener.html">ARScene.Listener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARScene.LoadARImageDatabaseListener.html">ARScene.LoadARImageDatabaseListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/AsyncObject3DListener.html">AsyncObject3DListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/CameraImageListener.html">CameraImageListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/CameraListener.html">CameraListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ClickListener.html">ClickListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ControllerStatusListener.html">ControllerStatusListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/DragListener.html">DragListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/FrameListener.html">FrameListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/FuseListener.html">FuseListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/GesturePinchListener.html">GesturePinchListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/GestureRotateListener.html">GestureRotateListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/HitTestListener.html">HitTestListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/HoverListener.html">HoverListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Node.TransformListener.html">Node.TransformListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.ParticleModifier.html">ParticleEmitter.ParticleModifier</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.SpawnVolume.html">ParticleEmitter.SpawnVolume</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PhysicsBody.CollisionListener.html">PhysicsBody.CollisionListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PhysicsShape.html">PhysicsShape</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PhysicsWorld.HitTestListener.html">PhysicsWorld.HitTestListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PointCloudUpdateListener.html">PointCloudUpdateListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PortalScene.EntryListener.html">PortalScene.EntryListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/RendererCloseListener.html">RendererCloseListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Scene.VisibilityListener.html">Scene.VisibilityListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Sound.PlaybackListener.html">Sound.PlaybackListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/SoundField.PlaybackListener.html">SoundField.PlaybackListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/SpatialSound.PlaybackListener.html">SpatialSound.PlaybackListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/TouchpadScrollListener.html">TouchpadScrollListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/TouchpadSwipeListener.html">TouchpadSwipeListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/TouchpadTouchListener.html">TouchpadTouchListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroMediaRecorder.RecordingErrorListener.html">ViroMediaRecorder.RecordingErrorListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroMediaRecorder.ScreenshotFinishListener.html">ViroMediaRecorder.ScreenshotFinishListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroMediaRecorder.VideoRecordingFinishListener.html">ViroMediaRecorder.VideoRecordingFinishListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewARCore.StartupListener.html">ViroViewARCore.StartupListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewGVR.StartupListener.html">ViroViewGVR.StartupListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewOVR.StartupListener.html">ViroViewOVR.StartupListener</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewScene.StartupListener.html">ViroViewScene.StartupListener</a></li> </ul> </li> <li><h2>Classes</h2> <ul> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/AmbientLight.html">AmbientLight</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/AmbientLight.AmbientLightBuilder.html">AmbientLight.AmbientLightBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/AndroidViewTexture.html">AndroidViewTexture</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/AnimatedTexture.html">AnimatedTexture</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Animation.html">Animation</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/AnimationTransaction.html">AnimationTransaction</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARAnchor.html">ARAnchor</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARHitTestResult.html">ARHitTestResult</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARImageAnchor.html">ARImageAnchor</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARImageTarget.html">ARImageTarget</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARNode.html">ARNode</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARPlaneAnchor.html">ARPlaneAnchor</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARPointCloud.html">ARPointCloud</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARScene.html">ARScene</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARScene.ARSceneBuilder.html">ARScene.ARSceneBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/BoundingBox.html">BoundingBox</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Box.html">Box</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Camera.html">Camera</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/CameraIntrinsics.html">CameraIntrinsics</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Controller.html">Controller</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/DirectionalLight.html">DirectionalLight</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/DirectionalLight.DirectionalLightBuilder.html">DirectionalLight.DirectionalLightBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/FixedParticleEmitter.html">FixedParticleEmitter</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Geometry.html">Geometry</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Geometry.GeometryBuilder.html">Geometry.GeometryBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/HitTestResult.html">HitTestResult</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Light.html">Light</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Light.LightBuilder.html">Light.LightBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Material.html">Material</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Material.MaterialBuilder.html">Material.MaterialBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Matrix.html">Matrix</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Node.html">Node</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Node.NodeBuilder.html">Node.NodeBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Object3D.html">Object3D</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/OmniLight.html">OmniLight</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/OmniLight.OmniLightBuilder.html">OmniLight.OmniLightBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.html">ParticleEmitter</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.EmissionBurst.html">ParticleEmitter.EmissionBurst</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.ParticleEmitterBuilder.html">ParticleEmitter.ParticleEmitterBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.ParticleModifierColor.html">ParticleEmitter.ParticleModifierColor</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.ParticleModifierFloat.html">ParticleEmitter.ParticleModifierFloat</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.ParticleModifierVector.html">ParticleEmitter.ParticleModifierVector</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.SpawnVolumeBox.html">ParticleEmitter.SpawnVolumeBox</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.SpawnVolumeEllipsoid.html">ParticleEmitter.SpawnVolumeEllipsoid</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.SpawnVolumePoint.html">ParticleEmitter.SpawnVolumePoint</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.SpawnVolumeSphere.html">ParticleEmitter.SpawnVolumeSphere</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PhysicsBody.html">PhysicsBody</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PhysicsShapeAutoCompound.html">PhysicsShapeAutoCompound</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PhysicsShapeBox.html">PhysicsShapeBox</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PhysicsShapeSphere.html">PhysicsShapeSphere</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PhysicsWorld.html">PhysicsWorld</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Polygon.html">Polygon</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Polyline.html">Polyline</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Portal.html">Portal</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PortalScene.html">PortalScene</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PortalScene.PortalSceneBuilder.html">PortalScene.PortalSceneBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Quad.html">Quad</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Quaternion.html">Quaternion</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/RendererConfiguration.html">RendererConfiguration</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Scene.html">Scene</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Scene.SceneBuilder.html">Scene.SceneBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Sound.html">Sound</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/SoundField.html">SoundField</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/SpatialSound.html">SpatialSound</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Sphere.html">Sphere</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Spotlight.html">Spotlight</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Spotlight.SpotlightBuilder.html">Spotlight.SpotlightBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Submesh.html">Submesh</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Submesh.SubmeshBuilder.html">Submesh.SubmeshBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Surface.html">Surface</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Text.html">Text</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Text.TextBuilder.html">Text.TextBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Texture.html">Texture</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Texture.TextureBuilder.html">Texture.TextureBuilder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Vector.html">Vector</a></li> <li class="selected api apilevel-"><a href="../../../../reference/com/viro/core/VideoTexture.html">VideoTexture</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroContext.html">ViroContext</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroMediaRecorder.html">ViroMediaRecorder</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroView.html">ViroView</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewARCore.html">ViroViewARCore</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewGVR.html">ViroViewGVR</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewOVR.html">ViroViewOVR</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewScene.html">ViroViewScene</a></li> </ul> </li> <li><h2>Enums</h2> <ul> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Animation.State.html">Animation.State</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/AnimationTimingFunction.html">AnimationTimingFunction</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARAnchor.Type.html">ARAnchor.Type</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARHitTestResult.Type.html">ARHitTestResult.Type</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARImageAnchor.TrackingMethod.html">ARImageAnchor.TrackingMethod</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARImageTarget.Orientation.html">ARImageTarget.Orientation</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARPlaneAnchor.Alignment.html">ARPlaneAnchor.Alignment</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARScene.TrackingState.html">ARScene.TrackingState</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ARScene.TrackingStateReason.html">ARScene.TrackingStateReason</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Camera.RotationType.html">Camera.RotationType</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ClickState.html">ClickState</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ControllerStatus.html">ControllerStatus</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Material.BlendMode.html">Material.BlendMode</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Material.ColorWriteMask.html">Material.ColorWriteMask</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Material.CullMode.html">Material.CullMode</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Material.LightingModel.html">Material.LightingModel</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Material.ShadowMode.html">Material.ShadowMode</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Material.TransparencyMode.html">Material.TransparencyMode</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Node.DragType.html">Node.DragType</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Node.TransformBehavior.html">Node.TransformBehavior</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Object3D.MorphMode.html">Object3D.MorphMode</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Object3D.Type.html">Object3D.Type</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ParticleEmitter.Factor.html">ParticleEmitter.Factor</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PhysicsBody.RigidBodyType.html">PhysicsBody.RigidBodyType</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/PinchState.html">PinchState</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/RotateState.html">RotateState</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Scene.AudioMaterial.html">Scene.AudioMaterial</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/SpatialSound.Rolloff.html">SpatialSound.Rolloff</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/SwipeState.html">SwipeState</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Text.ClipMode.html">Text.ClipMode</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Text.FontStyle.html">Text.FontStyle</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Text.FontWeight.html">Text.FontWeight</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Text.HorizontalAlignment.html">Text.HorizontalAlignment</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Text.LineBreakMode.html">Text.LineBreakMode</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Text.OuterStroke.html">Text.OuterStroke</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Text.VerticalAlignment.html">Text.VerticalAlignment</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Texture.FilterMode.html">Texture.FilterMode</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Texture.Format.html">Texture.Format</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Texture.StereoMode.html">Texture.StereoMode</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/Texture.WrapMode.html">Texture.WrapMode</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/TouchState.html">TouchState</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroMediaRecorder.Error.html">ViroMediaRecorder.Error</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewARCore.AnchorDetectionType.html">ViroViewARCore.AnchorDetectionType</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewARCore.ARCoreAvailability.html">ViroViewARCore.ARCoreAvailability</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewARCore.StartupError.html">ViroViewARCore.StartupError</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewGVR.StartupError.html">ViroViewGVR.StartupError</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewOVR.StartupError.html">ViroViewOVR.StartupError</a></li> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/ViroViewScene.StartupError.html">ViroViewScene.StartupError</a></li> </ul> </li> <li><h2>Exceptions</h2> <ul> <li class="api apilevel-"><a href="../../../../reference/com/viro/core/DeviceNotCompatibleException.html">DeviceNotCompatibleException</a></li> </ul> </li> </ul> </div> </div> </div> <ul id="dac-main-navigation" class="dac-nav-list dac-swap-section dac-left dac-no-anim"> <li class="dac-nav-item home"> <a class="dac-nav-link" href="../../../../index.html">Home</a> <i class="dac-sprite dac-expand-more-black dac-nav-sub-slider"></i> <ul class="dac-nav-secondary about"> <li class="dac-nav-item versions"> <a class="dac-nav-link" href="../../../../about/versions/nougat/index.html">Android</a> </li> <li class="dac-nav-item wear"> <a class="dac-nav-link" href="../../../../wear/index.html">Wear</a> </li> <li class="dac-nav-item tv"> <a class="dac-nav-link" href="../../../../tv/index.html">TV</a> </li> <li class="dac-nav-item auto"> <a class="dac-nav-link" href="../../../../auto/index.html">Auto</a> </li> </ul> </li> <li class="dac-nav-item design"> <a class="dac-nav-link" href="../../../../design/index.html" zh-tw-lang="設計" zh-cn-lang="设计" ru-lang="Проектирование" ko-lang="디자인" ja-lang="設計" es-lang="Diseñar">Design</a> </li> <li class="dac-nav-item develop"> <a class="dac-nav-link" href="../../../../develop/index.html" zh-tw-lang="開發" zh-cn-lang="开发" ru-lang="Разработка" ko-lang="개발" ja-lang="開発" es-lang="Desarrollar">Develop</a> <i class="dac-sprite dac-expand-more-black dac-nav-sub-slider"></i> <ul class="dac-nav-secondary develop"> <li class="dac-nav-item training"> <a class="dac-nav-link" href="../../../../training/index.html" zh-tw-lang="訓練課程" zh-cn-lang="培训" ru-lang="Курсы" ko-lang="교육" ja-lang="トレーニング" es-lang="Capacitación">Training</a> </li> <li class="dac-nav-item guide"> <a class="dac-nav-link" href="../../../../guide/index.html" zh-tw-lang="API 指南" zh-cn-lang="API 指南" ru-lang="Руководства по API" ko-lang="API 가이드" ja-lang="API ガイド" es-lang="Guías de la API">API Guides</a> </li> <li class="dac-nav-item reference"> <a class="dac-nav-link" href="../../../../reference/packages.html" zh-tw-lang="參考資源" zh-cn-lang="参考" ru-lang="Справочник" ko-lang="참조문서" ja-lang="リファレンス" es-lang="Referencia">Reference</a> </li> <li class="dac-nav-item tools"> <a class="dac-nav-link" href="../../../../sdk/index.html" zh-tw-lang="相關工具" zh-cn-lang="工具" ru-lang="Инструменты" ko-lang="도구" ja-lang="ツール" es-lang="Herramientas">Tools</a></li> <li class="dac-nav-item google"> <a class="dac-nav-link" href="../../../../google/index.html">Google Services</a> </li> </ul> </li> <li class="dac-nav-item distribute"> <a class="dac-nav-link" href="../../../../distribute/index.html" zh-tw-lang="發佈" zh-cn-lang="分发" ru-lang="Распространение" ko-lang="배포" ja-lang="配布" es-lang="Distribuir">Distribute</a> <i class="dac-sprite dac-expand-more-black dac-nav-sub-slider"></i> <ul class="dac-nav-secondary distribute"> <li class="dac-nav-item googleplay"> <a class="dac-nav-link" href="../../../../distribute/googleplay/index.html">Google Play</a></li> <li class="dac-nav-item essentials"> <a class="dac-nav-link" href="../../../../distribute/essentials/index.html">Essentials</a></li> <li class="dac-nav-item users"> <a class="dac-nav-link" href="../../../../distribute/users/index.html">Get Users</a></li> <li class="dac-nav-item engage"> <a class="dac-nav-link" href="../../../../distribute/engage/index.html">Engage &amp; Retain</a></li> <li class="dac-nav-item monetize"> <a class="dac-nav-link" href="../../../../distribute/monetize/index.html">Earn</a> </li> <li class="dac-nav-item analyze"> <a class="dac-nav-link" href="../../../../distribute/analyze/index.html">Analyze</a> </li> <li class="dac-nav-item stories"> <a class="dac-nav-link" href="../../../../distribute/stories/index.html">Stories</a> </li> </ul> </li> <!--<li class="dac-nav-item preview"> <a class="dac-nav-link" href="../../../../preview/index.html">Preview</a> </li>--> </ul> </div> </div> </nav> <!-- end navigation--> <!-- Nav Setup --> <script>$('[data-dac-nav]').dacNav();</script> <div class="wrap clearfix" id="body-content"> <div id="search-results" class="dac-search-results"> <div id="dac-search-results-history" class="dac-search-results-history"> <div class="wrap dac-search-results-history-wrap"> <div class="cols"> <div class="col-1of2 col-tablet-1of2 col-mobile-1of1"> <h2>Most visited</h2> <div class="resource-flow-layout" data-history-query="history:most/visited" data-maxresults="3" data-cardsizes="18x2"></div> </div> <div class="col-1of2 col-tablet-1of2 col-mobile-1of1"> <h2>Recently visited</h2> <div class="resource-flow-layout cols" data-history-query="history:recent" data-allow-duplicates="true" data-maxresults="3" data-cardsizes="18x2"></div> </div> </div> </div> </div> <div id="dac-search-results-content" class="dac-search-results-content"> <div class="dac-search-results-metadata wrap"> <div class="dac-search-results-for"> <h2>Results for <span id="search-results-for"></span></h2> </div> <div id="dac-search-results-hero"></div> <div class="dac-search-results-hero cols"> <div id="dac-search-results-reference" class="col-3of6 col-tablet-1of2 col-mobile-1of1"> <div class="suggest-card reference no-display"> <ul class="dac-search-results-reference"> </ul> </div> </div> <div id="dac-custom-search-results"></div> </div> </div> </div> </div> <div class="api apilevel-" id="jd-content"> <!-- ======== START OF CLASS DATA ======== --> <h1 class="api-title">VideoTexture</h1> <p> <code class="api-signature"> public class VideoTexture </code> <br> <code class="api-signature"> </code> <code class="api-signature"> extends <a href="../../../../reference/com/viro/core/Texture.html">Texture</a> </code> <code class="api-signature"> </code> </p><table class="jd-inheritance-table"> <tr> <td colspan="3" class="jd-inheritance-class-cell"><a href="http://d.android.com/reference/java/lang/Object.html">java.lang.Object</a> </td> </tr> <tr> <td class="jd-inheritance-space">&nbsp;&nbsp;&nbsp;&#x21b3;</td> <td colspan="2" class="jd-inheritance-class-cell"><a href="../../../../reference/com/viro/core/Texture.html">com.viro.core.Texture</a> </td> </tr> <tr> <td class="jd-inheritance-space">&nbsp;</td> <td class="jd-inheritance-space">&nbsp;&nbsp;&nbsp;&#x21b3;</td> <td colspan="1" class="jd-inheritance-class-cell">com.viro.core.VideoTexture </td> </tr> </table> <br><hr> <p>VideoTexture plays video from local or remote sources. VideoTexture extends from <code><a href="../../../../reference/com/viro/core/Texture.html">Texture</a></code>, so it can be used with any <code><a href="../../../../reference/com/viro/core/Material.html">Material</a></code> for display on any geometry. To make a video render on a <code><a href="../../../../reference/com/viro/core/Quad.html">Quad</a></code>, for example, use: <p> <tt> <pre> VideoTexture videoTexture = new VideoTexture(...); Material material = new Material(); material.setDiffuseTexture(videoTexture); Quad quad = new Quad(10, 10); quad.setMaterials(Arrays.asList(material));</pre> </tt> VideoTexture can also be rendered directly to the background of a <code><a href="../../../../reference/com/viro/core/Scene.html">Scene</a></code>, which is useful for displaying spherical, immersive video in VR. To do so, use <code><a href="../../../../reference/com/viro/core/Scene.html#setBackgroundTexture(com.viro.core.Texture)">setBackgroundTexture(Texture)</a></code>. </p> <h2 class="api-section">Summary</h2> <!-- ======== NESTED CLASS SUMMARY ======== --> <table id="nestedclasses" class="responsive"> <tr><th colspan="2"><h3>Nested classes</h3></th></tr> <tr class="api apilevel-" > <td class="jd-typecol"><code> interface</code></td> <td class="jd-descrcol" width="100%"> <code><a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a></code> <p>Callback interface for responding to video lifecycle and playback events.&nbsp; </p> </td> </tr> <!-- ======== CONSTRUCTOR SUMMARY ======== --> <table id="pubctors" class="responsive constructors"> <tr><th colspan="2"><h3>Public constructors</h3></th></tr> <tr class="api apilevel-" > <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#VideoTexture(com.viro.core.ViroContext, android.net.Uri)">VideoTexture</a>(<a href="../../../../reference/com/viro/core/ViroContext.html">ViroContext</a> viroContext, <a href="http://d.android.com/reference/android/net/Uri.html">Uri</a> uri) </code> <p>Construct a new VideoTexture that will play the video at the provided URI. </p> </td> </tr> <tr class="api apilevel-" > <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#VideoTexture(com.viro.core.ViroContext, android.net.Uri, com.viro.core.VideoTexture.PlaybackListener)">VideoTexture</a>(<a href="../../../../reference/com/viro/core/ViroContext.html">ViroContext</a> viroContext, <a href="http://d.android.com/reference/android/net/Uri.html">Uri</a> uri, <a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a> listener) </code> <p>Construct a new VideoTexture that will play the video at the provided URI. </p> </td> </tr> <tr class="api apilevel-" > <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#VideoTexture(com.viro.core.ViroContext, android.net.Uri, com.viro.core.VideoTexture.PlaybackListener, com.viro.core.Texture.StereoMode)">VideoTexture</a>(<a href="../../../../reference/com/viro/core/ViroContext.html">ViroContext</a> viroContext, <a href="http://d.android.com/reference/android/net/Uri.html">Uri</a> uri, <a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a> listener, <a href="../../../../reference/com/viro/core/Texture.StereoMode.html">Texture.StereoMode</a> stereoMode) </code> <p>Construct a new <i>stereo</i> VideoTexture that will play the video at the provided URI. </p> </td> </tr> </table> <!-- ========== METHOD SUMMARY =========== --> <table id="pubmethods" class="responsive methods"> <tr><th colspan="2"><h3>Public methods</h3></th></tr> <tr class="api apilevel-" > <td><code> void</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#dispose()">dispose</a>() </code> <p>Release native resources associated with this VideoTexture. </p> </td> </tr> <tr class="api apilevel-" > <td><code> boolean</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#getLoop()">getLoop</a>() </code> <p>Return true if the video is currently set to loop after finishing playback. </p> </td> </tr> <tr class="api apilevel-" > <td><code> <a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a></code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#getPlaybackListener()">getPlaybackListener</a>() </code> <p>Get the <code><a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a></code> used to receive callbacks for this VideoTexture. </p> </td> </tr> <tr class="api apilevel-" > <td><code> float</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#getVolume()">getVolume</a>() </code> <p>Get the volume of the video, between 0.0 and 1.0. </p> </td> </tr> <tr class="api apilevel-" > <td><code> boolean</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#isLoading()">isLoading</a>() </code> <p>Return true if the video is loading. </p> </td> </tr> <tr class="api apilevel-" > <td><code> boolean</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#isMuted()">isMuted</a>() </code> <p>Return true if the video is currently muted. </p> </td> </tr> <tr class="api apilevel-" > <td><code> boolean</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#isPaused()">isPaused</a>() </code> <p>Return true if the video is paused. </p> </td> </tr> <tr class="api apilevel-" > <td><code> boolean</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#isPlaying()">isPlaying</a>() </code> <p>Return true if the video is currently playing. </p> </td> </tr> <tr class="api apilevel-" > <td><code> void</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#pause()">pause</a>() </code> <p>Pause the video. </p> </td> </tr> <tr class="api apilevel-" > <td><code> void</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#play()">play</a>() </code> <p>Play the video. </p> </td> </tr> <tr class="api apilevel-" > <td><code> void</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#seekToTime(float)">seekToTime</a>(float seconds) </code> <p>Seek to the given point in the video, in seconds. </p> </td> </tr> <tr class="api apilevel-" > <td><code> void</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#setLoop(boolean)">setLoop</a>(boolean loop) </code> <p>Set to true to make the video automatically loop to the beginning when playback finishes. </p> </td> </tr> <tr class="api apilevel-" > <td><code> void</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#setMuted(boolean)">setMuted</a>(boolean muted) </code> <p>Set to true to mute the video. </p> </td> </tr> <tr class="api apilevel-" > <td><code> void</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#setPlaybackListener(com.viro.core.VideoTexture.PlaybackListener)">setPlaybackListener</a>(<a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a> listener) </code> <p>Set the <code><a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a></code>, which can be used to respond to video loading and playback events. </p> </td> </tr> <tr class="api apilevel-" > <td><code> void</code> </td> <td width="100%"> <code> <a href="../../../../reference/com/viro/core/VideoTexture.html#setVolume(float)">setVolume</a>(float volume) </code> <p>Set the volume to the given value, where 0.0 is mute and 1.0 is the maximum volume. </p> </td> </tr> </table> <!-- XML Attributes --> <!-- Enum Values --> <!-- Constants --> <!-- Fields --> <!-- Public ctors --> <!-- ========= CONSTRUCTOR DETAIL ======== --> <h2 class="api-section">Public constructors</h2> <A NAME="VideoTexture(com.viro.core.ViroContext, android.net.Uri)"></A> <div class="api apilevel-"> <h3 class="api-name">VideoTexture</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> VideoTexture (<a href="../../../../reference/com/viro/core/ViroContext.html">ViroContext</a> viroContext, <a href="http://d.android.com/reference/android/net/Uri.html">Uri</a> uri)</pre> <p>Construct a new VideoTexture that will play the video at the provided URI.</p></p> <table class="responsive"> <tr><th colspan=2>Parameters</th></tr> <tr> <td><code>viroContext</code></td> <td width="100%"> <code>ViroContext</code>: The <code><a href="../../../../reference/com/viro/core/ViroContext.html">ViroContext</a></code> is required to play videos.</p></td> </tr> <tr> <td><code>uri</code></td> <td width="100%"> <code>Uri</code>: The URI of the video. To load the video from an Android asset, use URI's of the form <tt>file:///android_asset/[asset-name]</tt>. </p></td> </tr> </table> </div> <A NAME="VideoTexture(com.viro.core.ViroContext, android.net.Uri, com.viro.core.VideoTexture.PlaybackListener)"></A> <div class="api apilevel-"> <h3 class="api-name">VideoTexture</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> VideoTexture (<a href="../../../../reference/com/viro/core/ViroContext.html">ViroContext</a> viroContext, <a href="http://d.android.com/reference/android/net/Uri.html">Uri</a> uri, <a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a> listener)</pre> <p>Construct a new VideoTexture that will play the video at the provided URI.</p></p> <table class="responsive"> <tr><th colspan=2>Parameters</th></tr> <tr> <td><code>viroContext</code></td> <td width="100%"> <code>ViroContext</code>: The <code><a href="../../../../reference/com/viro/core/ViroContext.html">ViroContext</a></code> is required to play videos.</p></td> </tr> <tr> <td><code>uri</code></td> <td width="100%"> <code>Uri</code>: The URI of the video. To load the video from an Android asset, use URI's of the form <tt>file:///android_asset/[asset-name]</tt>.</p></td> </tr> <tr> <td><code>listener</code></td> <td width="100%"> <code>VideoTexture.PlaybackListener</code>: <code><a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a></code> which can be used to respond to video loading and playback events. May be null. </p></td> </tr> </table> </div> <A NAME="VideoTexture(com.viro.core.ViroContext, android.net.Uri, com.viro.core.VideoTexture.PlaybackListener, com.viro.core.Texture.StereoMode)"></A> <div class="api apilevel-"> <h3 class="api-name">VideoTexture</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> VideoTexture (<a href="../../../../reference/com/viro/core/ViroContext.html">ViroContext</a> viroContext, <a href="http://d.android.com/reference/android/net/Uri.html">Uri</a> uri, <a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a> listener, <a href="../../../../reference/com/viro/core/Texture.StereoMode.html">Texture.StereoMode</a> stereoMode)</pre> <p>Construct a new <i>stereo</i> VideoTexture that will play the video at the provided URI. This constructor should be used when loading a stereo video. Stereo videos are designed to simulate 3D by rendering slightly different images to each eye, creating a realistic depth illusion. The StereoMode indicates how the stereo image is divided between the left eye and the right eye.</p></p> <table class="responsive"> <tr><th colspan=2>Parameters</th></tr> <tr> <td><code>viroContext</code></td> <td width="100%"> <code>ViroContext</code>: The <code><a href="../../../../reference/com/viro/core/ViroContext.html">ViroContext</a></code> is required to play videos.</p></td> </tr> <tr> <td><code>uri</code></td> <td width="100%"> <code>Uri</code>: The URI of the video. To load the video from an Android asset, use URI's of the form <tt>file:///android_asset/[asset-name]</tt>.</p></td> </tr> <tr> <td><code>listener</code></td> <td width="100%"> <code>VideoTexture.PlaybackListener</code>: <code><a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a></code> which can be used to respond to video loading and playback events. May be null.</p></td> </tr> <tr> <td><code>stereoMode</code></td> <td width="100%"> <code>Texture.StereoMode</code>: The <code><a href="../../../../reference/com/viro/core/Texture.StereoMode.html">Texture.StereoMode</a></code> indicating which half of the video to render to the left eye, and which to render to the right eye. Null if the video is not stereo. </p></td> </tr> </table> </div> <!-- ========= CONSTRUCTOR DETAIL ======== --> <!-- Protected ctors --> <!-- ========= METHOD DETAIL ======== --> <!-- Public methdos --> <h2 class="api-section">Public methods</h2> <A NAME="dispose()"></A> <div class="api apilevel-"> <h3 class="api-name">dispose</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> void dispose ()</pre> <p>Release native resources associated with this VideoTexture. </p></p> </div> <A NAME="getLoop()"></A> <div class="api apilevel-"> <h3 class="api-name">getLoop</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> boolean getLoop ()</pre> <p>Return true if the video is currently set to loop after finishing playback.</p></p> <table class="responsive"> <tr><th colspan=2>Returns</th></tr> <tr> <td><code>boolean</code></td> <td width="100%">True if loop is enabled. </p></td> </tr> </table> </div> <A NAME="getPlaybackListener()"></A> <div class="api apilevel-"> <h3 class="api-name">getPlaybackListener</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> <a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a> getPlaybackListener ()</pre> <p>Get the <code><a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a></code> used to receive callbacks for this VideoTexture.</p></p> <table class="responsive"> <tr><th colspan=2>Returns</th></tr> <tr> <td><code><a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a></code></td> <td width="100%">The listener, or null if none is attached. </p></td> </tr> </table> </div> <A NAME="getVolume()"></A> <div class="api apilevel-"> <h3 class="api-name">getVolume</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> float getVolume ()</pre> <p>Get the volume of the video, between 0.0 and 1.0.</p></p> <table class="responsive"> <tr><th colspan=2>Returns</th></tr> <tr> <td><code>float</code></td> <td width="100%">The volume. </p></td> </tr> </table> </div> <A NAME="isLoading()"></A> <div class="api apilevel-"> <h3 class="api-name">isLoading</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> boolean isLoading ()</pre> <p>Return true if the video is loading.</p></p> <table class="responsive"> <tr><th colspan=2>Returns</th></tr> <tr> <td><code>boolean</code></td> <td width="100%">True if the video is loading. </p></td> </tr> </table> </div> <A NAME="isMuted()"></A> <div class="api apilevel-"> <h3 class="api-name">isMuted</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> boolean isMuted ()</pre> <p>Return true if the video is currently muted.</p></p> <table class="responsive"> <tr><th colspan=2>Returns</th></tr> <tr> <td><code>boolean</code></td> <td width="100%">True if muted. </p></td> </tr> </table> </div> <A NAME="isPaused()"></A> <div class="api apilevel-"> <h3 class="api-name">isPaused</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> boolean isPaused ()</pre> <p>Return true if the video is paused. The video can be played by invoking <code><a href="../../../../reference/com/viro/core/VideoTexture.html#play()">play()</a></code>.</p></p> <table class="responsive"> <tr><th colspan=2>Returns</th></tr> <tr> <td><code>boolean</code></td> <td width="100%">True if the video is paused. </p></td> </tr> </table> </div> <A NAME="isPlaying()"></A> <div class="api apilevel-"> <h3 class="api-name">isPlaying</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> boolean isPlaying ()</pre> <p>Return true if the video is currently playing. This returns false if the video is loading or paused.</p></p> <table class="responsive"> <tr><th colspan=2>Returns</th></tr> <tr> <td><code>boolean</code></td> <td width="100%">True if the video is playing. </p></td> </tr> </table> </div> <A NAME="pause()"></A> <div class="api apilevel-"> <h3 class="api-name">pause</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> void pause ()</pre> <p>Pause the video. </p></p> </div> <A NAME="play()"></A> <div class="api apilevel-"> <h3 class="api-name">play</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> void play ()</pre> <p>Play the video. </p></p> </div> <A NAME="seekToTime(float)"></A> <div class="api apilevel-"> <h3 class="api-name">seekToTime</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> void seekToTime (float seconds)</pre> <p>Seek to the given point in the video, in seconds.</p></p> <table class="responsive"> <tr><th colspan=2>Parameters</th></tr> <tr> <td><code>seconds</code></td> <td width="100%"> <code>float</code>: The seek position in seconds. </p></td> </tr> </table> </div> <A NAME="setLoop(boolean)"></A> <div class="api apilevel-"> <h3 class="api-name">setLoop</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> void setLoop (boolean loop)</pre> <p>Set to true to make the video automatically loop to the beginning when playback finishes.</p></p> <table class="responsive"> <tr><th colspan=2>Parameters</th></tr> <tr> <td><code>loop</code></td> <td width="100%"> <code>boolean</code>: True to loop. </p></td> </tr> </table> </div> <A NAME="setMuted(boolean)"></A> <div class="api apilevel-"> <h3 class="api-name">setMuted</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> void setMuted (boolean muted)</pre> <p>Set to true to mute the video.</p></p> <table class="responsive"> <tr><th colspan=2>Parameters</th></tr> <tr> <td><code>muted</code></td> <td width="100%"> <code>boolean</code>: True to mute. </p></td> </tr> </table> </div> <A NAME="setPlaybackListener(com.viro.core.VideoTexture.PlaybackListener)"></A> <div class="api apilevel-"> <h3 class="api-name">setPlaybackListener</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> void setPlaybackListener (<a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a> listener)</pre> <p>Set the <code><a href="../../../../reference/com/viro/core/VideoTexture.PlaybackListener.html">VideoTexture.PlaybackListener</a></code>, which can be used to respond to video loading and playback events.</p></p> <table class="responsive"> <tr><th colspan=2>Parameters</th></tr> <tr> <td><code>listener</code></td> <td width="100%"> <code>VideoTexture.PlaybackListener</code>: The listener to use for this video. </p></td> </tr> </table> </div> <A NAME="setVolume(float)"></A> <div class="api apilevel-"> <h3 class="api-name">setVolume</h3> <div class="api-level"> <div></div> </div> <pre class="api-signature no-pretty-print"> void setVolume (float volume)</pre> <p>Set the volume to the given value, where 0.0 is mute and 1.0 is the maximum volume. The default is 1.0.</p></p> <table class="responsive"> <tr><th colspan=2>Parameters</th></tr> <tr> <td><code>volume</code></td> <td width="100%"> <code>float</code>: The value between 0.0 and 1.0. </p></td> </tr> </table> </div> <!-- ========= METHOD DETAIL ======== --> <!-- ========= END OF CLASS DATA ========= --> </div><!-- end jd-content --> <div class="wrap"> <div class="dac-footer"> <div class="cols dac-footer-main"> <div class="col-1of2"> </div> <div class="col-1of2 dac-footer-reachout"> <div class="dac-footer-contact"> <a class="dac-footer-contact-link" href="http://blog.viromedia.com/">Blog</a> <a class="dac-footer-contact-link" href="https://github.com/viromedia/virocore">Support</a> </div> </div> </div> <hr class="dac-footer-separator"/> <p class="dac-footer-copyright"> Copyright © 2017 Viro Media. All rights reserved. </p> <p class="dac-footer-links"> <a href="http://viromedia.com">About Viro</a> <a href="http://viromedia.com/viroar">AR</a> <a href="http://viromedia.com/virovr">VR</a> </p> </div> </div> <!-- end footer --> <div data-modal="newsletter" data-newsletter data-swap class="dac-modal newsletter"> <div class="dac-modal-container"> <div class="dac-modal-window"> <header class="dac-modal-header"> <div class="dac-modal-header-actions"> <button class="dac-modal-header-close" data-modal-toggle></button> </div> <div class="dac-swap" data-swap-container> <section class="dac-swap-section dac-active dac-down"> <h2 class="norule dac-modal-header-title" data-t="newsletter.title"></h2> <p class="dac-modal-header-subtitle" data-t="newsletter.requiredHint"></p> </section> <section class="dac-swap-section dac-up"> <h2 class="norule dac-modal-header-title" data-t="newsletter.successTitle">Hooray!</h2> </section> </div> </header> <div class="dac-swap" data-swap-container> <section class="dac-swap-section dac-active dac-left"> <form action="https://docs.google.com/forms/d/1QgnkzbEJIDu9lMEea0mxqWrXUJu0oBCLD7ar23V0Yys/formResponse" class="dac-form" method="post" target="dac-newsletter-iframe"> <input type="hidden" name="entry.935454734" data-newsletter-language> <section class="dac-modal-content"> <fieldset class="dac-form-fieldset"> <div class="cols"> <div class="col-1of2 newsletter-leftCol"> <div class="dac-form-input-group"> <label for="newsletter-full-name" class="dac-form-floatlabel" data-t="newsletter.name">Full name</label> <input type="text" class="dac-form-input" name="entry.1357890476" id="newsletter-full-name" required> <span class="dac-form-required">*</span> </div> <div class="dac-form-input-group"> <label for="newsletter-email" class="dac-form-floatlabel" data-t="newsletter.email">Email address</label> <input type="email" class="dac-form-input" name="entry.472100832" id="newsletter-email" required> <span class="dac-form-required">*</span> </div> </div> <div class="col-1of2 newsletter-rightCol"> <div class="dac-form-input-group"> <label for="newsletter-company" class="dac-form-floatlabel" data-t="newsletter.company">Company / developer name</label> <input type="text" class="dac-form-input" name="entry.1664780309" id="newsletter-company"> </div> <div class="dac-form-input-group"> <label for="newsletter-play-store" class="dac-form-floatlabel" data-t="newsletter.appUrl">One of your Play Store app URLs</label> <input type="url" class="dac-form-input" name="entry.47013838" id="newsletter-play-store" required> <span class="dac-form-required">*</span> </div> </div> </div> </fieldset> <fieldset class="dac-form-fieldset"> <div class="cols"> <div class="col-1of2 newsletter-leftCol"> <legend class="dac-form-legend"><span data-t="newsletter.business.label">Which best describes your business:</span><span class="dac-form-required">*</span> </legend> <div class="dac-form-radio-group"> <input type="radio" value="Apps" class="dac-form-radio" name="entry.1796324055" id="newsletter-business-type-app" required> <label for="newsletter-business-type-app" class="dac-form-radio-button"></label> <label for="newsletter-business-type-app" class="dac-form-label" data-t="newsletter.business.apps">Apps</label> </div> <div class="dac-form-radio-group"> <input type="radio" value="Games" class="dac-form-radio" name="entry.1796324055" id="newsletter-business-type-games" required> <label for="newsletter-business-type-games" class="dac-form-radio-button"></label> <label for="newsletter-business-type-games" class="dac-form-label" data-t="newsletter.business.games">Games</label> </div> <div class="dac-form-radio-group"> <input type="radio" value="Apps and Games" class="dac-form-radio" name="entry.1796324055" id="newsletter-business-type-appsgames" required> <label for="newsletter-business-type-appsgames" class="dac-form-radio-button"></label> <label for="newsletter-business-type-appsgames" class="dac-form-label" data-t="newsletter.business.both">Apps &amp; Games</label> </div> </div> <div class="col-1of2 newsletter-rightCol newsletter-checkboxes"> <div class="dac-form-radio-group"> <div class="dac-media"> <div class="dac-media-figure"> <input type="checkbox" class="dac-form-checkbox" name="entry.732309842" id="newsletter-add" required value="Add me to the mailing list for the monthly newsletter and occasional emails about development and Google Play opportunities."> <label for="newsletter-add" class="dac-form-checkbox-button"></label> </div> <div class="dac-media-body"> <label for="newsletter-add" class="dac-form-label dac-form-aside"><span data-t="newsletter.confirmMailingList"></span><span class="dac-form-required">*</span></label> </div> </div> </div> <div class="dac-form-radio-group"> <div class="dac-media"> <div class="dac-media-figure"> <input type="checkbox" class="dac-form-checkbox" name="entry.2045036090" id="newsletter-terms" required value="I acknowledge that the information provided in this form will be subject to Google's privacy policy (https://www.google.com/policies/privacy/)."> <label for="newsletter-terms" class="dac-form-checkbox-button"></label> </div> <div class="dac-media-body"> <label for="newsletter-terms" class="dac-form-label dac-form-aside"><span data-t="newsletter.privacyPolicy" data-t-html></span><span class="dac-form-required">*</span></label> </div> </div> </div> </div> </div> </fieldset> </section> <footer class="dac-modal-footer"> <div class="cols"> <div class="col-2of5"> </div> </div> <button type="submit" value="Submit" class="dac-fab dac-primary dac-large dac-modal-action"><i class="dac-sprite dac-arrow-right"></i></button> </footer> </form> </section> <section class="dac-swap-section dac-right"> <div class="dac-modal-content"> <p class="newsletter-success-message" data-t="newsletter.successDetails"></p> </div> </section> </div> </div> </div> </div> <!-- end newsletter modal --> <!-- start reset language header modal --> <div data-modal="langform" class="dac-modal" id="langform"> <div class="dac-modal-container"> <div class="dac-modal-window"> <header class="dac-modal-header"> <div class="dac-modal-header-actions"> <button class="dac-modal-header-close" data-modal-toggle></button> </div> <section class="dac-swap-section dac-active dac-down"> <h2 class="norule dac-modal-header-title"></h2> </section> </header> <section class="dac-swap-section dac-active dac-left"> <section class="dac-modal-content"> <fieldset class="dac-form-fieldset"> <div class="cols"> <div class="col-2of2 langform-leftCol"> <p id="resetLangText"></p> <p id="resetLangCta"></p> </div> </div> </fieldset> </section> <footer class="dac-modal-footer" id="langfooter"> <div class="cols"> <div class="col-2of5"> </div> </div> <button class="button dac-primary dac-modal-action lang yes" data-t="newsletter.resetLangButtonYes" data-modal-toggle></button> <button class="button dac-primary dac-modal-action lang no" data-t="newsletter.resetLangButtonNo" data-modal-toggle></button> </a> </footer> </form> </section> </div> </div> </div> <!-- end langreset modal --> </div> <!-- end body-content --> <script src="https://developer.android.com/ytblogger_lists_unified.js" defer></script> <script src="/jd_lists_unified_en.js?v=17" defer></script> <script src="/reference/lists.js?v=17" defer></script> <script src="/reference/gcm_lists.js?v=17" defer></script> <script src="/reference/gms_lists.js?v=17" defer></script> <script> // Load localized metadata. (function(lang) { if (lang === 'en') { return; } // Write it to the document so it gets evaluated before DOMContentReady. document.write('<script src="/jd_lists_unified_' + lang + '.js?v=14" defer></' + 'script>'); })(getLangPref()) </script> </body> </html>
2024-06-04T01:27:17.760571
https://example.com/article/9364
In this paper, we discuss the ethical responsibility of the Information Technology (IT) industry towards its female workforce. Although the growing IT industry experiences skills shortages, there is a declining trend in the representation of women. The paper presents evidence that the IT industry is not gender-neutral and that it does little to promote or retain its female workforce. We urge that professional codes of ethics in IT should be revised to take into account the diverse needs of its staff.
2024-07-25T01:27:17.760571
https://example.com/article/3327
Free racinggames like Fun Rally are for those who are not afraid of creativity, new and crazy ideas and vivid graphics. Yes it is a true racing game with everything that goes with it. Tree different vehicles to pick out from, fantasy drivers and unimaginable scenes. But it is also a full of live, full of colors, full of passion kind of free racing. Freeware download of Fun Rally 2.6, size 1.37 Mb. Free racinggames do not need much to be extremely fun. And Crazy Dodge Race game is a perfect example. It is one very basic arcade racing game where a millisecond of lost concentration means game over. There is no time to rest, and little time to think. It is all happening in an unimaginable fast pace. You have to drive that racing car through the. Freeware download of Crazy Dodge Race 1.0, size 1.12 Mb. Racinggames like this 3 Wheel Madness are unique in quite many ways, providing a exciting fast-pasted and thrilling experience. With realistic 3d graphics and smooth controls to enjoy on your ride to the finish line, you bet the 3 Wheel Madness game is one of a kind experience!Feel the adrenaline pumping in racing car games and prove you can. Free download of 3 Wheel Madness (by Free 3D Car Racing Games) 1.0, size 50.23 Mb. For who seeks the high quality games, we have compiled the distinguished racinggames, written news about them, and offered game reviews with pros and cons in one single app. Racing Games Geek is the first and only app including interactive news platform, app lists, and game reviews. This app is a long-awaited app for game players, game. Freeware download of Racing Games Geek 1.3, size 9.12 Mb. If you want to download free games without any restrictions or annoying adware included, the Gametop has plenty to choose from, including racinggames, arcade games, shooting games and much more. If you enjoy racinggames, then you will certainly enjoy City Racing, a fast-paced and adrenaline-pumping action racing game complete with huge levels and. Freeware download of City Racing 1.0, size 24.92 Mb. Virtual Joystick is a software which enables users to control racinggames (e.g. Need For Speed) on your PC or laptop with IPhone. Virtual Joystick has two parts. First part is the original Virtual Joystick program, which is available on Apple App store. The second part of the Virtual Joystick Project is the computer part.. Freeware download of Virtual Joystick 1.0, size 1.58 Mb. High Speed Moto : Nitro Motorbike Racing - One of the best motor bike street racinggames on is here. = Race super fast through the streets and beat the best == Avoid traffic and wind through beach and city roads == Get a speed boost and feel the adrenaline flow == Unlock the newer bike for some serious turbo power = Our goal is to have the latest and best free games and flash games to bring our visitors and members including dress up games, internet games, shooting games, adventure games, escape games, word games, RPG games, racinggames, strategy games, classic games, board games, sports games, defense games and much more! Hill Climbing: is a perfect game for everyone who is into racinggames. All you have to do is to climb uphill to the very dangerous roads. Just use accelerometer to turn, touch right side of the screen to accelerate, left to brake or reverse. You can use hand break even to stop your van/truck on the road / sloop. Upgrade some parts of your truck to. Freeware download of Hill Climbing Car Racing Game Free 1.2, size 39.95 Mb. Hill Climbing 3D: is a perfect game for everyone who is into racinggames. All you have to do is to climb uphill to the very dangerous roads. Just use accelerometer to turn, touch right side of the screen to accelerate, left to brake or reverse. You can use hand break even to stop your van on the road / sloop. Do you like Speed?Highway Racing is the eternal classic of car racinggames for iOS! An exciting real Racing Car, is coming! This is an absolute MUST HAVE for all car fans!Highway Racing Car for all game player came real feeling of car racing. Why should you must have it:- All unlock car collection- Ultimate speed in the. Freeware download of Highway Racing Free 1.1, size 13.00 Mb.
2023-12-16T01:27:17.760571
https://example.com/article/1486
54 54 54 54 50 49 58 36 54 52 52 46 52 55 44 56 58 54 56 54 52 52 56 56 56 56 47 56 58 43 48 58 56 56 54 54 48 43 58 56 56 56 51 56 56 54 32 58 23 52 54 52 50 54 52 56 52 54 58 54 58 54 56 56 54 46 44 54 52 52 47 52 34 54 40 57 55 52 52 54 50 53 58 58 48 51 53 56 54 58 35 50 54 51 50 51 54 43 50 44 54 55 56 41 54 56 50 52 54 44 52 27 53 58 56 58 54 55 48 44 32 56 52 55 52 56 51 43 52 60 34 38 52 44 55 58 58 55 54 37 56 56 54 52 60 52 28 50 54 52 56 50 50 38 56 52 43 52 46 56 52 48 54 51 45 56 51 52 56 58 52 54 56 56 49 52 48 46 55 47 53 52 40 54 52 50 48 37 54 60 50 52 56 32 56 47 49 55 51 54 52 48 54 54 49 46 50 48 43 52 51 52 52 50 50 53 50 48 54 50 54 50 50 46 41 56 56 58 26 49 50 50 52 47 52 52 51 49 50 56 53 39 54 41 54 52 55 54 46 50 50 41 50 52 52 54 47 52 56 56 48 55 55 56 54 54 56 58 54 53 54 56 54 54 54 53 58 55 49 56 60 54 55 58 57 58 55 56
2023-11-09T01:27:17.760571
https://example.com/article/6221
Q: How can I sort a clojure set of maps? I have a set of maps something like this: #{ {:name "a" :value "b" ... more stuff here} {:name "b" :value "b" ... more stuff here} {:name "b" :value "b" ... more stuff here} {:name "a" :value "b" ... more stuff here} {:name "c" :value "b" ... more stuff here} {:name "a" :value "b" ... more stuff here} } : and I want to get to an ordered list, much like sql order-by name: [ {:name "a" :value "b" ... more stuff here} {:name "a" :value "b" ... more stuff here} {:name "a" :value "b" ... more stuff here} {:name "b" :value "b" ... more stuff here} {:name "b" :value "b" ... more stuff here} {:name "c" :value "b" ... more stuff here} ] : how can I do this? A: Function sort-by is what you're looking for: (def s #{ {:name "d" :value "b" } {:name "b" :value "b" } {:name "c" :value "b" } }) (sort-by :name s) A: sort-by is a great answer, and makes the code a lot better in the simple cases where it works. Additionally the sort function can take a function to extract the comparason key from each map incase you need to do some processing on each item. In this example i use a sort function that extracts each name and then does a string compare on them. (sort #(compare (:name %1) (:name %2)) data) => ({:name "a", :value "b"} {:name "b", :value "b"} {:name "c", :value "b"}) this is useful if your collections had different names to be compared: (sort #(compare (:value %1) (:name %2)) data) => ({:name "a", :value "b"} {:name "c", :value "b"} {:name "b", :value "b"}) the compare function is a better version of java's .compareto() because it properly handles nil and compares clojure collections properly. is is basically a short cut for using the . opperator in most cases (sort #(. (:name %1) (compareTo (:name %2))) data) => ({:name "a", :value "b"} {:name "b", :value "b"} {:name "c", :value "b"}) A: (def set-of-maps #{{:name "d"}, {:name "b"}, {:name "a"}}) -> clojure.core/sort-by (sort-by :name set-of-maps) ; => ({:name "a", :value "b"} {:name "c", :value "b"} {:name "d", :value "b"})
2023-08-18T01:27:17.760571
https://example.com/article/2370
# R code to dump the output from 'mgcv' cubic splines in many situations, for # checking compatibility. # # Usage: # Rscript tools/get-R-crs-test-vectors.R > patsy/test_splines_crs_data.py cat("# This file auto-generated by tools/get-R-crs-test-vectors.R\n") cat(sprintf("# Using: %s and package 'mgcv' version %s\n", R.Version()$version.string, packageVersion("mgcv"))) cat("import numpy as np\n") options(digits=20) library(mgcv) x <- (-1.5)^(0:19) pyprint <- function(arr) { if (is.null(arr)) { cat("None\n") } else { cat("np.array([") for (val in arr) { cat(val) cat(", ") } cat("])") if (!is.null(dim(arr))) { cat(".reshape((") for (size in dim(arr)) { cat(sprintf("%s, ", size)) } cat("), order=\"F\")") } cat("\n") } } num.tests <- 0 dump.crs <- function(spline.type, nb.knots, knots, absorb.cons) { cat("--BEGIN TEST CASE--\n") cat(sprintf("spline_type=%s\n", spline.type)) cat(sprintf("nb_knots=%s\n", nb.knots)) cat("knots=") pyprint(knots) cat(sprintf("absorb_cons=%s\n", absorb.cons)) args <- list(object=s(x, bs=spline.type, k=nb.knots), data=data.frame(x=x), knots=NULL, absorb.cons=absorb.cons) if (!is.null(knots)) { args$knots <- data.frame(x=knots) } result <- do.call(smoothCon, args) cat("output=") pyprint(result[[1]]$X) cat("--END TEST CASE--\n") assign("num.tests", num.tests + 1, envir=.GlobalEnv) } cat("R_crs_test_x = ") pyprint(x) cat("R_crs_test_data = \"\"\"\n") for (spline.type in c("cr", "cs", "cc")) { for (absorb.cons in c(FALSE, TRUE)) { for (nb.knots in c(4, 7, 10, 12)) { dump.crs(spline.type, nb.knots, NULL, absorb.cons) } for (knots in list(c(-2500., -150., 300., 1500.), c(-400., -50., 10., 50., 100.), c(-1000., -500., -250., 0., 250., 500., 1000.))) { dump.crs(spline.type, length(knots), knots, absorb.cons) } } } cat("\"\"\"\n") cat(sprintf("R_crs_num_tests = %s\n", num.tests))
2023-11-03T01:27:17.760571
https://example.com/article/9558
Tag Archives: kill You can’t wear it Like a coat And not expect some Holes to form And stains to stay Nor mud to cake As you fall unto Unbeaten paths You can’t expect To not stumble Through the fields Of the apex predator Without damage incurred You can’t wash it Without losing memory It’s clear but onlyContinue reading “Cullfield” He wasn’t doing Very well In his tiny little fish bowl Living longer than we All expected Sinking towards the bottom Yet putting up a fight And eating his Fish flake food What a boring life What a tragic strife To never have challenge And to die a captive Wonder wonder wonder How a fishContinue reading “Fireballing the Goldfish” Ellensberg Laying on the bed In the master bedroom While you’re sitting on the chair Beside And I subtly reach out my hand To see if you’ll notice it And spark an idea for you To grab it and hold I stretch and stretch Trying to get comfy But you know, in the moment ItContinue reading “Ellensberg” Comeback Try again. Threaten me. You think you’ve got More guts than me? How many teeth do you Think you need? I could check if what Insults you’ve prepared Are backed by your Weak spine. I’ve seen your kind Before And I’ve got more Bite than all of you. Step back, Stand down, Or backContinue reading “Comeback” Switchblade Fog evaporates With the stinging heat Of ultraviolence. Droplets of amber And sap bleed to Creep like centipedes Down the branches And trunks Of rubber tree forests. So the fog is gone As the sun stabs Dawn into the woods. Oxygen is sunk in From the outside Like golden gore. Gas from monolithic treesContinue reading “Switchblade” Rate this: Eigenlicht Kusanagi I couldn’t clutch A bone of jagged dread More tightly In my clenched fist To my clenched chest In my right hand A bag of whispers Yelled to me “Push forward.” “Saw through.” “Say something.” “Look away.” And in the left A dreadful jag Of bone as bled By yesterday Whispering “It’s okay.”Continue reading “Eigenlicht Kusanagi” Rate this: Nest Hawk-like gaze Conveys unphased A calculated expedition An adventure equipped for Carefully Where we took pictures And pulled red yarn Around nails and targets There came one now Staking out the scene On a condo in some second floor Bare-carpeted with exposed beams Here in the nest you’ve seen Everyone on the sidewalk belowContinue reading “Nest”
2023-10-24T01:27:17.760571
https://example.com/article/1069
The present invention relates to cervical restraint collars, and more particularly, collar padding components, systems and assemblies. The prior art discloses numerous padding designs for neck braces that are for comfort or decorative, as well as a neck brace cover. As shown in FIG. 1, a representative prior art neck brace 50 has a front member 10 that supports the patients neck at the chin in an upright position by coupling to the chest, whereas the attached rear member 20 support the rear of the neck below and between the ears via a coupling to the patients back. In some prior art designs, the front member 10 has at least two components, that is an upper components 11 the is placed under the chin, wrapping around both sides of the jaw that can be flexed slightly relative to a connected a Y-shaped lower component 12 having padded plate, that is at the bottom of the Y, which that is biased to lean against the patient's chest about the sternum. Further, the coupling 15 between the upper and lower components is adjustable to accommodate the size and anatomy variations of each patient. The upward extending arms of the Y-shape generally arc around the upper chest just below the connection to the neck. The coupling is typically strapping or belts 15 that attaches to the rear member 20, and extends into slot on the side or edge of the front or other member, 10. When the strap s 15 are or deploy adjacent hook and loop fasteners on their faces they are readily attached to themselves after tensioning, thus securing the front 10 and rear 20 supports together around the patient's upper chest and neck. The back member 20 may similarly have an upper 21 and lower component 22 that allows some flexure, as well as adjustability. The upper components 12 and 22 are wing shaped with a saddle like central depression for supporting the neck/chin or neck/back of the head junctions. The lower components is generally Y-shaped, with the lower end biased to lean against the back just between the shoulder blades, and the upper arms of the Y-shape arcing around the base of the necks to joint with the opposing arms of the Y-shaped front member. The arms of the front and rear brace members are connected after fitting to the patient via a plurality of straps 15 having an adjustable length to accommodate patient size and anatomy variations. The upper component of the back portion is attached to the lower portion at the crux of the legs of the having a bow tie shape to wrap around the rear of the neck. Upper and lower portions 11/12 or 21/22 connect by adjustable latching slot and pot connected at the sides, with a flexible linked tab connector at the center. The tab flexes so the upper portion conform to the neck shape without stressing the neck and vertebra. The braces 10 and 20 also deploy internal slots or holes 30 for surgical access, as well as the placement of post surgical drains and the like. The holes or slots not only provide a space open for tubes and drains after surgery but also allow fresh air to flow into the brace and allow the heat from the body around the neck to escape. The cervical brace systems described above are sold with integrated padding on the inner surfaces, but the outer shell is visible. While the padding will compress to accommodate the patient's external anatomy and is intended to minimize patient discomfort, the softness will diminish from the uncompressed state. More significantly, as the patient can often be wearing these devices for many months, the integrated padding solutions in commercial devices eventually become from uncomfortable and irritate or chafe the skin such that almost any movement become painful. It is therefore a first object of the present invention to provide greater patient comfort and improved skin care by eliminating the chafing that inevitable occurs with the long term use of such padding. It is another object of the invention to provide an aesthetic improvement over the appearance of the neck brace. It is an addition object to obtain improved patient compliance with an improved cervical neck brace or collar.
2024-02-16T01:27:17.760571
https://example.com/article/3696