text stringlengths 1 1.04M | language stringclasses 25 values |
|---|---|
Lieutenant Governor Vinai Kumar Saxena approached the Delhi High Court Thursday seeking an interim injunction restraining the AAP and its members from publishing, commenting, or issuing any information through tweets, articles, and interviews or in any other manner to the public with respect to allegations of corruption and money laundering against him.
The application listed before Justice Amit Bansal wherein the counsel appearing for the L-G submitted that allegations are “defamatory and malicious”, and these comments and statements by defendants are vilification of a constitutional authority. The counsel submitted that the tweets and press conferences held by AAP members with references to the L-G have been widely reported.
The counsel appearing for one of the defendants submitted that the plaintiff is a public functionary and “must be open to criticism and be thick-skinned”. The counsel for one of the other defendants submitted that as a political party, it is their duty to bring these issues to public notice, and the L-G is not above the law, and his conduct is important. The counsel for the defendants stated that there are certain justifications regarding the statements made opposing the plea for the interim injunction, stating that whether there is any truth to them will be decided later in the trial.
The L-G filed a defamation suit against the AAP and its members — Atishi, Durgesh Pathak, Saurabh Bharadwaj, Jasmine Shah and Sanjay Singh, alleging that the defendants have “launched a series of scathing and belligerent personal attacks against him by employing certain epithets to refer to the plaintiff including expletives such as chor and dalal” while alleging that he has “indulged in corruption and money laundering to the tune of Rs 1,400 crore during demonetisation while holding the post of Chairman of Khadi and Village Industries Commission”. The L-G claims that the defendants have “sensationalised the issue by circulating hashtags like ‘L-G Saxena ko giraftar karo’ and ‘L-G Saxena chor hai’ which indicates a pre-planned conspiracy, maligning the goodwill and reputation of the plaintiff”.
He also alleges that the party and its members have used mainstream news media to carry out vindictive attacks, and have shared tweets and videos in the form of interviews and press conferences on social media.
The application states that a legal notice, dated September 5, was sent to the defendants to “stop disseminating and spreading such false allegations” by the plaintiff, however, no response was received. The application seeks the court to direct the party to take down all “defamatory and unwarranted allegations” against him. The counsel for the plaintiff stated that he is a constitutional authority and cannot come out in public to defend himself.
After hearing both parties, the court reserved the orders in the application for the interim injunction. | english |
As India started another World Test Championship cycle, against West Indies in Dominica, it marked the beginning of a transition process as the team blooded in youngsters like Yashasvi Jaiswal and Ishan Kishan, who made their Test debut in the series opener on Wednesday.
The last time India went through a similar phase was nearly a decade ago when the likes of Sachin Tendulkar, Virender Sehwag, Gautam Gambhir, and Zaheer Khan retired.
The man at the helm of things back then was Sandeep Patil, who served as the chairman of selectors from 2012-16. The former India cricketer spoke to The Hindu and gave insight into how it was done and the challenges of leaving out the seniors.
“We are happy we took some bold decisions which were not liked or appreciated then. But during our tenure of four years, no board member interfered. That’s how we could take a decision looking at the future of Indian cricket. We were happy about what happened (in terms of performances) in the last four or five years,” said Patil, who was in Tirunelveli as the chief guest for the TNPL final.
“Same thing is happening now, and the selectors must be thinking along the same lines. Rahul (Dravid) is the coach and is very experienced. He must be thinking about it and hoping things will be ok,” he added.
One of the challenges of dealing with transition is whether to start the process gradually or start with a clean slate now that there is a clear WTC cycle. | english |
Not alone for mighty empire, stretching far over land and sea,
Not alone for bounteous harvests, lift we up our hearts to Thee.
Standing in the living present, memory and hope between,
Lord, we would with deep thanksgiving, praise Thee more for things unseen.
Not for battleships and fortress, not for conquests of the sword,
But for conquests of the spirit give we thanks to Thee, O Lord;
For the priceless gift of freedom, for the home, the church, the school,
For the open door to manhood, in a land the people rule.
For the armies of the faithful, souls that passed and left no name;
For the glory that illumines patriot lives of deathless fame.
For our prophets and apostles, loyal to the living Word,
For all heroes of the spirit, give we thanks to Thee, O Lord.
God of justice, save the people from the clash of race and creed,
From the strife of class and faction, make our nation free indeed;
Keep her faith in simple manhood strong as when her life began,
Till it find its full fruition in the brotherhood of man!
Terima kasih untuk bantuannya. Link sudah kami terima. Kami akan memprosesnya terlebih dahulu.
| english |
On the eve of the crucial Janata Dal (United) meeting here to decide on the party continuing in the National Democratic Alliance, Bihar Chief Minister and JD(U) leader Nitish Kumar on Friday made cryptic remarks about the fate of the alliance with the Bharatiya Janata Party.
“I am not giving any final statement. But the situation is very difficult. We have to decide what must be done in this tough situation,” he told reporters at Patna airport on his return from a tour of Katihar district.
The JD(U) is upset over the BJP’s decision to make Gujarat Chief Minister Narendra Modi the head of the party’s election campaign committee as a prelude to making him the prime ministerial candidate. This, the JD(U) believes, will strain its secular credentials and alienate the minorities.
The Chief Minister took a dig at the BJP by citing a couplet, which said: “They pray for my life, but offer a remedy for death. A lesson from adversity. ” By death, he seems to refer to Narendra Modi, whose candidature he has strongly opposed.
The ruling alliance is heading to a breaking point with an announcement expected over the weekend. JD(U) president Sharad Yadav is coming here on Saturday and meeting party leaders and MLAs, JD(U) leader Bashishtha Narayan Singh told The Hindu .
Asked about the JD(U)’s position in the event of a split, Mr. Narayan said the party had 118 MLAs. Four independent MLAs had pledged their support to the JD(U), thus helping it achieve the magic figure of 122 in the 243-member Assembly.
Hardening its stand against the JD(U), the BJP on Friday asked its Bihar ministers to stop work and come to Patna by June 17, accusing its ally of resorting to horse-trading.
“All the BJP ministers have been told to be in Patna on June 17. Another point of contention is that the JD(U) is contacting our MLAs for support. This is highly objectionable. This coalition has been running for several years, but the JD(U)’s attempts… are condemnable. This does not augur well for democracy. These are attempts to betray the mandate given by the people of Bihar,” Mr. Pandey told reporters on the sidelines of a meeting of the party’s core committee at the residence of Deputy Chief Minister Sushil Kumar Modi.
Informed sources say Mr. Modi himself has stopped working since Thursday, and the BJP leaders have been conducting a series of meetings at his residence.
“The ministers are finding it difficult to work in the current situation created by the JD(U) [after Gujarat Chief Minister Narendra Modi was made the BJP’s campaign head],” Mr. Pandey said.
Referring to MLA Dilip Verma’s charge that the JD(U) asked him for his support, he said some MLAs had informed the party of the overtures from the JD(U).
However, JD(U) State president Bashishtha Narayan Singh denied the allegations, saying the party had the numbers to form a government on its own in the event of a split between the allies.
Mr. Pandey also accused the JD(U) of playing politics over BJP national president Rajnath Singh’s programme scheduled in Patna for June 23.
The Education Department, he said, denied permission for a party programme planned on the Milan School ground, though it was used for Chief Minister Nitish Kumar’s Adhikar rally.
Putting the ball in the JD(U)’s court, Mr. Pandey said: “It is up to the JD(U) to decide. We are waiting for their … decision on the alliance. The statements of their leaders are inappropriate. ” He urged JD(U) leaders to clarify what prompted them to start issuing statements about snapping ties after June 10.
“Till June 9, their leaders, spokespersons and office-bearers said [Mr. ] Narendra Modi’s elevation was an internal matter. We had taken only a limited decision. Then what really happened on June 10 that the JD(U) started speaking about breaking the ties? They must clarify, or the people of Bihar will feel that the JD(U) has betrayed their mandate,” he said. | english |
<gh_stars>1-10
package data
import (
"encoding/json"
"fmt"
"github.com/pkg/errors"
"github.com/viant/gtly"
"strings"
)
//Reference represents data view reference
type Reference struct {
Name string
Cardinality string //One, or Many
DataView string
On []*ColumnMatch
_view *View
_alias string
_refIndex gtly.Index
_index gtly.Index
}
//View returns association view
func (r *Reference) View() *View {
return r._view
}
//Index returns index
func (r *Reference) Index() gtly.Index {
return r._index
}
//RefIndex returns ref index
func (r *Reference) RefIndex() gtly.Index {
return r._refIndex
}
//Alias returns alias
func (r *Reference) Alias() string {
return r._alias
}
//RefColumns returns reference match columns
func (r *Reference) RefColumns() []string {
var result = make([]string, 0)
for _, on := range r.On {
result = append(result, on.RefColumn)
}
return result
}
//Columns returns owner match columns
func (r *Reference) Columns() []string {
var result = make([]string, 0)
for _, on := range r.On {
result = append(result, on.Column)
}
return result
}
//Criteria reference criteria
func (r *Reference) Criteria(alias string) string {
var result = make([]string, 0)
for _, on := range r.On {
result = append(result, fmt.Sprintf("%v.%v = %v.%v", r._alias, on.Column, alias, on.RefColumn))
}
return strings.Join(result, " AND ")
}
//Validate checks if reference is valid
func (r Reference) Validate() error {
if r.Name == "" {
info, _ := json.Marshal(r)
return errors.Errorf("reference 'name' was empty for %s", info)
}
if err := ValidateCardinality(r.Cardinality); err != nil {
return errors.Wrapf(err, "invalid reference: %v", r.Name)
}
if r.DataView == "" {
return errors.Errorf("reference 'dataView' was empty for %v", r.Name)
}
if len(r.On) == 0 {
return errors.Errorf("reference 'on' criteria was empty for %v", r.Name)
}
return nil
}
//ColumnMatch represents a column match
type ColumnMatch struct {
Column string
RefColumn string
}
| go |
function sumTwoSmallestNums(arr) {
const reducer = (accumulator, currentValue) => accumulator + currentValue;
const sortedArray = arr.sort((a, b) => a - b);
const removedNegatives = sortedArray.filter((x) => x > 0).slice(0, 2);
return removedNegatives.reduce(reducer);
}
| javascript |
The Argentine team was just 90 minutes away from failing to qualify for the World Cup since 1970 but then the little magician took matters in his own hands and saved Argentina from embarrassment by scoring a hat-trick and ensured Argentina made it to Russia.
The qualifying campaign saw a very lethargic Argentine side as in the 18 matches they managed to win only 7 games, drawing 7 and losing 4. In the process La Albiceleste scored just 19 goals and conceded 16.
Argentina has one of the world's best attacking line up with the likes of Messi, Higuain, Aguero, Di Maria, Dybala and Icardi. All these players have been a vital part of their respective clubs and it comes as a surprise that such a talented attacking front could only manage to score 19 goals in 18 matches.
Since Jorge Sampaoli took over Argentina in May 2017, he hasn't been able to establish a definite formation and this has cost Argentina greatly as the entire squad lacks chemistry with one another.
In the past 2 years Argentina's dependency on Messi has been visible as the last time a player other than Messi scored in a competitive match was in November 2016 against Colombia.
After heartbreaks in 3 consecutive finals it might be the last chance for La Pulga to win silverware with the national side.
At the moment it doesn't look like Argentina would be able to go for glory with the likes of Brazil, France, Germany and Spain entering the tournament as favourites. However, if Argentina are able to effectively utilize their attacking prowess anything can happen.
Dybala and Messi are both star players for their respective clubs and it's time they step up for their country at football's greatest stage.
In the past it has been clear that Messi and Dybala struggle to play together, but if the gaffer is able to make a formation that allows both Messi and Dybala to play together effectively, it'll be a great boost to the Argentine side, as these 2 players can be clinical in deciding the outcome of games.
One such formation which allows both Messi and Dybala to play together is the 4-2-3-1 wide formation. In this formation Messi will have to drop back to the midfield while Dybala takes up his natural role as a center attacking midfielder.
Messi will have the task to control the midfield from the right while Di Maria will be present at the LM position. In such a scenario Messi will be expected to make runs and deliver crosses into the box for Dybala and Higuain.
In this case Messi will be out of his traditional RW attacking position and it will be important for the attacking duo of Juventus to convert the chances created by Messi.
After establishing a formation that includes both Messi and Dybala, the next big task for Sampaoli will be to effectively rotate the squad in order to keep all players fresh in the month long tournament.
Argentina are expected to finish at the top of their group, and for the knockout stages Argentina needs to prepare for each and every situation.
Sampaoli needs a go-to man except Messi for the days when the Barcelona star is not at the top of his game. The attacking options available to Sampaoli have to be used wisely in order to get favorable results.
The attackers must link with each other well to create dominating attacking periods throughout the match.
Argentina will be entering this tournament after losing 3 consecutive finals, and it is safe to say that they will have a certain degree of psychological pressure to win the world cup this time.
It is important that the players and coaching staff turn this pressure into a positive form of motivation. The players must play their natural game by keeping in mind the team's objectives.
They must forget everything that went wrong in the past and only focus on what they can do right in this World Cup.
It is not always necessary that the team that plays well for 90 minutes ends up winning. The match between Celtic and Barcelona at Celtic park in the 2012-13 champions league season is an apt example of that.
Argentina needs to make sure that they have effective attacking periods in games that are not going their way, and are able to make most of the chances that they create in these periods to ensure a favorable result.
In short Argentina need to make sure that even if they are being dominated for 80 minutes in a game, the outcome of that game is decided through the 10 minutes that did go their way.
Argentina's path to glory is not going to be an easy one, and it is important that the players take it one game at at time rather than looking at the big picture all at once. | english |
<reponame>billp72/netcreative1
{
"title": "Home",
"content": "intro.md",
"background": "../images/splater.jpg",
"gallery": [
{
"title": "Brand",
"copy": "To build a brand you need trust.",
"image": "../images/gallery/brand.png",
"linkA": "",
"linkB": "/brand"
},
{
"title": "Content",
"copy": "Defacto web standard CMS.",
"image": "../images/gallery/wordpress.png",
"linkA": "https://wpengine.com/platform/",
"linkB": ""
},
{
"title": "Technology",
"copy": "Build the most responsive, non-native apps around.",
"image": "../images/gallery/react.png",
"linkA": "",
"linkB": ""
},
{
"title": "<NAME>",
"copy": "Made an existing site more mobile-friendly.",
"image": "../images/gallery/squirrelpimp.jpg",
"linkA": "",
"linkB": "/ipadmaster"
},
{
"title": "Gold Parent Coaching",
"copy": "We added key content and site features, boosting traffic roughly 10%.",
"image": "../images/gallery/goldparent.jpg",
"linkA": "",
"linkB": "/goldparent"
},
{
"title": "Earie Pharmaceutical",
"copy": "After going from a basic HTML website to a modern Wordpress, Google showed an increase in traffic of 20%",
"image": "../images/gallery/earie.jpg",
"linkA": "",
"linkB": "/aerie"
},
{
"title": "Writing Solutions",
"copy": "Designed site in exchange for translation services",
"image": "../images/gallery/writingsolutions.jpg",
"linkA": "",
"linkB": "/writingsolutions"
}],
"blog": "Feed",
"entries": [
{
"title": "Gatsby",
"date": "January 12 2020",
"image": "../images/blogthumbs/gatsby.png",
"linkB": "/gatsby"
}]
}
| json |
Alabama men’s basketball coach Nate Oats said Tuesday he talked to Pro Football Hall of Famer Ray Lewis about the situation involving former player Darius Miles.
Miles and another man were arrested on capital murder charges Sunday. Investigators wrote in a court document that Miles admitted to providing the handgun immediately before the shooting. Another man is accused of firing the gun and killing a 23-year-old woman near the University of Alabama’s campus.
Oats talked about the ordeal before the Crimson Tide’s 78-66 victory over Vanderbilt.
"His daughter went to Alabama a year-and-a-half ago," he told the Crimson Tide Sports Network. "He went through a similar situation in Atlanta. He played in the NFL. He told me what he thought guys needed to hear. "
He elaborated on it after the game.
"I just thought he’s been through, you know, a tragic situation," Oats said, via AL. com. "One of the more mentally tough athletes in my time. His daughter went to Alabama, so I was able to get his number. I talked to him. He didn’t talk to the team or anything. But he kind of talked to me. He’s a man of faith as well. Just kind of told me to share a little word with him, pray with him. That’s what they need right now. His daughter went to school here a year-and-a-half ago, so she’s pretty shook up by the whole situation, too. "
Lewis and two others were indicted on murder charges following a Super Bowl XXXIV party in Atlanta on Jan. 31, 2000. One of the men alleged Lewis had blood stains on his white suit but the outfit was never found. The former Baltimore Ravens superstar would negotiate a plea agreement in which the murder charges against him were dropped in exchange for testimony against the two other men charged.
Lewis received a misdemeanor charge of obstruction of justice and was sentenced to 12 months probation.
Lewis' son also had a sexual assault charge dropped in 2016.
Miles was dismissed from the team after the murder charge came down. Michael Davis was also charged in the fatal shooting.
Oats said he’s talked with the team about the situation and hoped the players would be able to re-focus after a tumultuous few days.
The Associated Press contributed to this report. | english |
<!DOCTYPE html>
<html>
<head>
<title>GraphingCalc</title>
<div class="header">
<p>GraphingCalc</p>
</div>
<style>
html{
text-align: center;
}
button{
border-radius: 50px;
}
.header{
color: navy;
font-family: Tiempos Text;
font-size: 50px;
font-weight: bold;
}
img{
width: 550px;
height: 500px;
}
</style>
</head>
<body>
{% block content %}
{% if subject == "single" %}
<div>
f(x) = {{ function }}<br>
f '(x) = {{ first_deriv }}<br>
f ''(x) = {{ second_deriv }}<br>
f '''(x) = {{ third_deriv }}<br>
Integral of {{ function }} : {{ integ_sol }}<br>
</div>
<br>
<div>
<!-- Graph of the math function -->
<img src="{{url_for('static', filename=img_file)}}" alt="Graph of function">
</div>
{% else %}
<div>
f(x,y) = {{ function }}<br>
f<sub>x</sub>(x,y) = {{ partial_X }}<br>
f<sub>y</sub>(x,y) = {{ partial_Y }}<br>
f<sub>xx</sub>(x,y) = {{ partial_XX }}<br>
f<sub>xy</sub>(x,y) = {{ partial_XY }}<br>
f<sub>yy</sub>(x,y) = {{ partial_YY }}<br>
Double integral of {{ function }} : {{ integ_sol }}<br>
</div>
<br>
<div>
<!-- Graph of math function -->
<img src="{{url_for('static', filename=img_file)}}" alt="Graph of function">
</div>
{% endif %}
{% endblock content %}
<div>
<form action="/">
<button value="Back">Back</button>
</form>
</div>
</body>
</html>
| html |
I'll do my #tljr of it shortly, but here are some other people you should read also:
Anyone who claims "people don't care about privacy" is wrong and they are lying to you. Tell them to fuck off.
"Most Australians [say] if they have to receive any ads, they’d prefer that they are targeted to them (48%)."
Compare and contrast the 48% who would prefer targeted ads with "55% are uncomfortable with a business creating profiles about consumers based on data collected about them."
It does rather hinge on who you consider "suspect" and what "public safety" means.
"More than 4 in 5 Australians (84%) consider supplying information to an organisation for a specific purpose and the organisation using it for another purpose to be misuse."
"Seventy-nine percent of Australians consider an organisation inferring information about them (for example, sexual orientation, mental health, political views) based on what they do online to be misuse."
"Almost a quarter (23%) of Australians rate their levels of knowledge about privacy as excellent or very good, whereas 40% rate their knowledge as fair to poor."
"The majority of Australians (58%) don’t understand what businesses do with the information they collect about them."
"Two-thirds (64%) of Australians are unaware that they can request access to their personal information from businesses and government agencies."
"Since 2007 [… t]rust in Federal Government departments is down 14%, with a steady decline in trust over the past 13 years."
"The vast majority (83%) of Australians would like the government to do more to protect the privacy of their data."
Australians think young kids, teenagers, the elderly, and those with an intellectual disability should have additional privacy protections compared to everyone else.
"There is a strong belief (84% agree) that Australians have a right to know if a decision affecting them is made using AI technology."
This is true now. If a dog decides to bite someone, their human handler/owner is held responsible.
Computers are less intelligent than even the stupidest labrador and aren't as cute.
Computers are less intelligent than even the stupidest labrador and aren't as cute.
"While parents are concerned about their children’s data privacy, the majority (62%) feel that they are in control of their child/children’s data privacy and only 12% don’t think they have control."
But "75% of Australians think Covid-19 doesn't excuse business or government from meeting their usual obligations under privacy laws."
Well yeah. There are privacy-preserving ways to do most things, if you want to. But you have to want to try.
Well yeah. There are privacy-preserving ways to do most things, if you want to. But you have to want to try.
| english |
By:
Naushad Ali was on born Christmas Day, 1919. He wanted to make a musician of himself which is why he shifted base to Mumbai (the known as Bombay) on the '30s. By the start of the next decade, he was one top music directors in the Hindi movie business. One of the biggest descriptions of his music was that it was the only music that held roots in Hindustani Music that Bollywood had at that time and has had so far. He used the basics of Hindustani Music to compose his music.
His inspiration started with the orchestra accompaniment given to silent films. Before moving to Bombay, he studied under Ustad Ghurbat Ali, Ustad Yusuf Ali and Ustad Babban Saheb. When he decided that it was time to give his dreams a chance, he was working repairing harmoniums. At the time he did small time composing for amateur plays. His forst offiascial movie that he composed music for was Prem Nagar in 1940. Recognition though came in 1942 when he did Sharda. His real push up the ladder came with Rattan in 1944. Songs from the movie Ankhiyaan Milake and Sawan ke Badalon the charts ablaze. Followed were Shahjehan and Ghadi in 1946, Dard and Elaan in 1947, Anoki Ada in 1948 and Dillagi, Dulari and Andaaz in 1949. They were all hits.
The first he brought to Film music were sound mixing, the separate recording of voice and music tracks and the using of the flute, clarinet, sitar, mandolin and accordion in Film music. He showed that he could go western too (Jadoo in 1951). Another first that he bought to the music of the Hindi Film Industry was the merging or adaptation of Hindustani Ragas to Film music giving it the Hindustani touch. He was so passionate of Hindustani Music that to keep the habit up of involving it in film music he set up an Academy to teach it. His films that have scored big on its music have also scored big on the screen like Mother India, Mughal-E-Azam, Baiju Bawra. His last film done was TajMahal- A Eternal Love Story. He had a "songwriting partnership" with Shakeel Badayuni who wrote lyrics to most of all his music. He was a great source of encouragement to the upcoming singers of his time some of them being Asha Bhonsle, Lata Mangeshkar and Tuntun aka Uma Devi Khatri. He gave her her first break into movie acting. But one of the greatest partnerships that he had formed was with Mohammed Rafi. After their first collaboration in Hindustan ke hum hain in Pehla Aap, he was mesmerised with his voice and was his first preference (and most of the time his only preference) for a voice for the songs that he composed for films.
His all time favourite hits were Mughal-E-Azam, Baiju Bawra, Ganga Jamuna among the many. He had composed music for only 66 films in his 62 years as a music composer in Bollywood to which he says "In my 62 years in the film industry, I composed music for 66 films. These days, you come across people who have done the music 200 films in two years. What I'm saying is that, we used to agonise over every tune and phrase in music, spend sleepless nights over a song, and work on it until it was perfected. And I am still looking for perfection". | english |
FC Barcelona came back from the international break strong to beat Rayo Vallecano 5-2 at the Camp Nou last night. Neymar scored four goals in an entertaining game which saw Barcelona move to second in the league behind Real Madrid, who also won their game against Levante. The game between Celta Vigo and Villarreal will decide how the league table will look after this weekend’s fixtures.Barcelona started the game strong but missed a couple of easy chances before Javi Guerra scored one for Rayo from a corner kick. Barcelona pulled back two in quick succession though, winning two penalties with Neymar scoring both of them. The Catalans struggled in the second half initially but regained their composure when Neymar scored two more quick goals followed by one from Luis Suarez. Jozabed Sanchez got a consolation goal for Rayo late in the game. Here are the major talking points from the game.
According to Neymar himself, this was his best game so far in a Barcelona jersey. He gave an absolutely thrilling man of the match performance, scoring four goals and assisting another to take Barcelona to victory in the absence of Lionel Messi.
After going down against Rayo, Neymar won two penalties and scored both of them comfortably to secure the lead for Barca. Later in the second half, when things were seemingly starting to go wrong, he brought back life into the game scoring another brace in quick succession. Just a few minutes later, he assisted Luis Suarez for the team’s fifth goal, completing a good night’s work. With this super hat-trick, Neymar is now the top La Liga goal scorer with eight goals.
Suarez had a great game too, assisting Neymar twice and scoring one himself. While he was offside on certain occasions and did miss a couple of chances, he more than made up for it with his performance over the course of the game. If Neymar and Suarez keep performing like this, Barcelona should not have any major problems till Messi and Andres Iniesta are back.
While Barcelona’s attack was on fire, the defence was in shambles. For the first time in many weeks, Barcelona had their full defensive lineup available for selection and Luis Enrique chose to start Jordi Alba, Gerard Pique, Jeremy Mathieu and Dani Alves – none of whom had a great game.
The scoreline might say differently, but the team made many defensive blunders, only to be saved by Claudio Bravo between the posts. If Bravo hadn’t been on top form, the story might have been different.
Pique and Mathieu’s bad form continued as they found themselves in awkward positions and failed to clear the ball on many occasions. Alves was not his usual sharp self and was struggling going forward. Alba was one defender that had been performing exceptionally well this season and even he had a bad game by his standards, losing the ball frequently.
Conceding two goals that shouldn’t have been, the defence certainly needs to improve if they are to stand a chance against the big teams and defend the league title. Maybe Luis Enrique should give Marc Bartra and Thomas Vermaelen a few chances?
With the growing list of injuries, Barcelona’s youngsters have had a few games now to prove their worth. And given these past few games, it is safe to say that they have failed to do so. With Messi and Rafinha absent, Munir El Haddadi and Sandro Ramirez have had quite a lot of playing time between the two.
While Munir has shown some moments of promise, Sandro has pretty much failed to impress. Same was the case last night when Sandro failed to control the ball properly and was poor with his finishing. He missed a very easy chance that could have been an goal had it been any of the other Barcelona forwards.
Gerard Gumbau and Douglas Pereira came on late when Barcelona were already winning comfortably. While they both didn't have much time on the field, they both made some mistakes here and there which should have been avoided. These youngsters need to step up their game if they want to stay in the team when January comes around.
#4 Sergi Roberto - a star in the making?
Apart from Suarez, Neymar and Bravo, the one player that stood out was Sergi Roberto. The player that has just been phenomenal this season had another exceptional game. Having played flawlessly both at right back and in the midfield this season, he hasn’t failed to impress.
Last night was another game in which he kept the midfield ticking, helping equally in defence and attack. He was a threat while attacking on many instances and even helped to win the ball back when Rayo launched attacks of their own.
Not given many chances during the last season, he is finally showing his potential this time around. Once dubbed as the future Xavi, he might actually turn out to be. Filling up for Iniesta can never be an easy task for anyone, but he has managed this with relative ease.
After Neymar, he was arguably the best Barcelona player on the field last night. If he keeps up with these performances, he is guaranteed a place in the Barcelona squad for years to come.
Barcelona have always been known for their possession game and quick accurate passing, at least for the past many years. This hasn’t been the case so far this season and certainly wasn’t the case last night.
Losing the ball in the defensive and midfield areas too easily, the team had a lesser passing accuracy than their opponents. Yes, you read it right – Barcelona outplayed by Rayo Vallecano in terms of passing accuracy. This again comes down to the defenders not being able to hold on to the ball and giving it away way too easily. Luckily, Rayo couldn’t do much with the huge share of ball possession they had.
While missing out on the likes of Messi and Iniesta is certainly one of the major reasons for this happening, this doesn’t change the fact that the rest of the team needs to step up. Barcelona have a relatively easy set of fixtures for a while going forward, but they cannot afford to lose any more points given the current situation.
| english |
<reponame>joshisa/stratos
package interfaces
import (
"github.com/labstack/echo"
)
type EndpointPlugin interface {
Info(apiEndpoint string, skipSSLValidation bool) (CNSIRecord, interface{}, error)
GetType() string
Register(echoContext echo.Context) error
Connect(echoContext echo.Context, cnsiRecord CNSIRecord, userId string) (*TokenRecord, bool, error)
Validate(userGUID string, cnsiRecord CNSIRecord, tokenRecord TokenRecord) error
UpdateMetadata(info *Info, userGUID string, echoContext echo.Context)
}
type RoutePlugin interface {
AddSessionGroupRoutes(echoContext *echo.Group)
AddAdminGroupRoutes(echoContext *echo.Group)
}
type EndpointAction int
const (
EndpointRegisterAction EndpointAction = iota
EndpointUnregisterAction
)
| go |
#![allow(non_snake_case)]
extern crate Molten;
#[macro_use]
extern crate pretty_assertions;
#[allow(unused_imports)]
use std::io::{Read, Write};
use std::path::Path;
use std::fs::File;
use std::fmt::Display;
// To add a test case:
// 1) Create reference target toml file in /reproduction.
// 2) Add a matching test_case macro invocation to the list below.
/// Defines a test case for the `reproduction` test module. This macro takes
/// two arguments:
///
/// 1. `$path`: A relative path from the Cargo package's root directory to the TOML file
/// that should be parsed, and
/// 2. `$test_name`: An identifier that will be used as the test's name. Internally, it
/// becomes the name of the test function.
macro_rules! test_case {
($path:expr; $test_name:ident) => {
#[test]
fn $test_name() {
reproduce($path);
}
};
}
test_case!("tests/reproduction/full.toml"; Full);
test_case!("tests/reproduction/integers.toml"; Integers);
test_case!("tests/reproduction/floats.toml"; Floats);
test_case!("tests/reproduction/bools.toml"; Bools);
test_case!("tests/reproduction/arrays.toml"; Arrays);
test_case!("tests/reproduction/comments.toml"; Comments);
test_case!("tests/reproduction/inline_tables.toml"; Inline_Tables);
test_case!("tests/reproduction/strings.toml"; Strings);
test_case!("tests/reproduction/tables.toml"; Tables);
test_case!("tests/reproduction/AoTs.toml"; AoTs);
test_case!("tests/reproduction/empty.toml"; Empty);
test_case!("tests/reproduction/whitespace.toml"; Whitespace);
test_case!("tests/reproduction/AoT_simple.toml"; AoT_Simple);
test_case!("tests/reproduction/quoted_keys.toml"; Quoted_Keys);
test_case!("tests/reproduction/kv_sep.toml"; Kv_Separators);
/// This tests the parser's correctness by parsing each of the
/// above files and attempting to reproduce them from the parsed structure.
/// Any difference between original and reproduction is a bug.
fn reproduce<P: AsRef<Path> + Display>(path: P) {
let mut input = String::new();
let mut f = File::open(&path).expect(&format!("Error opening: {}", path));
f.read_to_string(&mut input).expect("Error reading file:");
let mut parser = Molten::parser::Parser::new(&input);
let res = parser.parse().unwrap();
// Knobs for debugging
// let mut f = File::create("tests/reproduction/res.txt").unwrap();
// println!("{:#?}", res);
// let _ = f.write(format!("{:#?}", res).as_bytes()).unwrap();
assert_eq!(input, res.as_string());
}
| rust |
<filename>redux-demo/package-lock.json
{
"name": "redux-demo",
"version": "1.0.0",
"lockfileVersion": 1,
"requires": true,
"dependencies": {
"axios": {
"version": "0.19.0",
"resolved": "https://registry.npmjs.org/axios/-/axios-0.19.0.tgz",
"integrity": "<KEY>
"requires": {
"follow-redirects": "1.5.10",
"is-buffer": "2.0.3"
}
},
"debug": {
"version": "3.1.0",
"resolved": "https://registry.npmjs.org/debug/-/debug-3.1.0.tgz",
"integrity": "<KEY>
"requires": {
"ms": "2.0.0"
}
},
"deep-diff": {
"version": "0.3.8",
"resolved": "https://registry.npmjs.org/deep-diff/-/deep-diff-0.3.8.tgz",
"integrity": "sha1-wB3mPvsO7JeYgB1Ax+Da4ltYLIQ="
},
"follow-redirects": {
"version": "1.5.10",
"resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.5.10.tgz",
"integrity": "sha512-0V5l4Cizzvqt5D44aTXbFZz+FtyXV1vrDN6qrelxtfYQKW0KO0W2T/hkE8xvGa/540LkZlkaUjO4ailYTFtHVQ==",
"requires": {
"debug": "3.1.0"
}
},
"is-buffer": {
"version": "2.0.3",
"resolved": "https://registry.npmjs.org/is-buffer/-/is-buffer-2.0.3.tgz",
"integrity": "<KEY>
},
"js-tokens": {
"version": "4.0.0",
"resolved": "https://registry.npmjs.org/js-tokens/-/js-tokens-4.0.0.tgz",
"integrity": "<KEY>
},
"loose-envify": {
"version": "1.4.0",
"resolved": "https://registry.npmjs.org/loose-envify/-/loose-envify-1.4.0.tgz",
"integrity": "<KEY>
"requires": {
"js-tokens": "4.0.0"
}
},
"ms": {
"version": "2.0.0",
"resolved": "https://registry.npmjs.org/ms/-/ms-2.0.0.tgz",
"integrity": "sha1-VgiurfwAvmwpAd9fmGF4jeDVl8g="
},
"redux": {
"version": "4.0.4",
"resolved": "https://registry.npmjs.org/redux/-/redux-4.0.4.tgz",
"integrity": "<KEY>
"requires": {
"loose-envify": "1.4.0",
"symbol-observable": "1.2.0"
}
},
"redux-logger": {
"version": "3.0.6",
"resolved": "https://registry.npmjs.org/redux-logger/-/redux-logger-3.0.6.tgz",
"integrity": "sha1-91VZZvMJjzyIYExEnPC69XeCdL8=",
"requires": {
"deep-diff": "0.3.8"
}
},
"redux-thunk": {
"version": "2.3.0",
"resolved": "https://registry.npmjs.org/redux-thunk/-/redux-thunk-2.3.0.tgz",
"integrity": "<KEY>
},
"symbol-observable": {
"version": "1.2.0",
"resolved": "https://registry.npmjs.org/symbol-observable/-/symbol-observable-1.2.0.tgz",
"integrity": "<KEY>
}
}
}
| json |
We initiate coverage on Saregama with a BUY rating and a DCFbased Dec’23 TP of INR 450 (implied FY25E PER of 34x). Saregama is presently the second-largest music label in India and is expected to further consolidate its position driven by sharp increase in its share of new content investments. During FY18-FY22, it delivered above-industry growth of c. 26% in its music licensing business by leveraging its large catalogue and re-popularising retro content that offset the lack of investments in new content for nearly 2 decades (2000-2020). However, from a sustainable growth perspective, it is imperative that the company invests in new music content as ‘c. 70% of the total music consumed in a year is <18 months old’. We, therefore, believe if Saregama successfully executes its new content acquisition strategy, its music licensing business can easily deliver ~23% CAGR over FY22-25E (~1. 5x industry growth). Further upside can come from faster-than-expected adoption of Audio OTT streaming platforms (~200mn users as of CY21), sharp rise in % share of paid subscriber base (~1. 5% as of CY21) and tuck-in acquisitions (similar to acquisition of Mango Music in Jan’22). Growing share of the very high-margin music licensing business in the revenue mix, scale benefits, and divestiture of the loss-making publication business should ensure that margins remain at 26-29% in the near term. Given the multi-year annuity nature of the flagship music licensing business and expectations of broadly stable operating cash flows, we value Saregama using 15-year DCF assuming a WACC of 12% and Tg of 5%. Key risks include 1) Irrational rise in competitive intensity driving new content cost, 2) Substantial increase in investments towards Carvaan/TV & Films businesses, and 3) Industry consolidation (Zee Music and Sony Music).
OTT streaming platforms driving growth for music industry:
New music content investments should lead to above-industry growth:
The management believes this is an opportune time to invest in new music content given the strong industry tailwinds. Therefore, after a relative lull towards new content investments of almost 2 decades, it raised INR 7. 5bn (~USD 100mn) in Nov’21 to step up investments (organic as well as inorganic). Given that Saregama delivered ~26% CAGR over FY18-FY22 despite lack of investments, we believe the music licensing business can easily deliver ~23% CAGR over FY22-25E (1. 5x industry growth) if the management successfully executes its new content acquisition strategy.
Technology investments and decentralised approach give an edge:
Small specialised teams extensively use data analytics and predictive models for new content purchase decision making. The company also claims to heavily use data analytics to market the content. Such tactics make Saregama more agile leading to superior performance vis-à-vis the industry.
We expect strong 18% PAT CAGR over FY22-25E, recent correction in valuations offers a good entry point:
We forecast strong 22% revenue CAGR for Saregama translating into ~21%/18% EBIT and PAT CAGR over FY22-25E. We expect Saregama to consolidate its No. 2 position amongst music labels in India as we expect 1) independent producers to prefer large, established non-integrated music labels and 2) limited competition for the company in regional music. We initiate with a BUY and a TP of INR 450 (implied FY25E PER of 34x) | english |
# -*- coding: utf-8 -*-
# rmdir.test.py
# Для удаления папки используется функция rmdir(),
# в которую передается путь к удаляемой папке:
import os
# путь относительно текущего скрипта
os.rmdir("hello")
# абсолютный путь
os.rmdir("c://somedir/hello")
| python |
<reponame>lnds/Ogu
use anyhow::Result;
use crate::lexer::tokens::Lexeme;
use crate::parser::{consume_symbol, raise_parser_error, Parser};
#[derive(Debug, Clone)]
pub(crate) enum Exposing<'a> {
All,
List(Vec<&'a str>),
}
impl<'a> Exposing<'a> {
pub(crate) fn parse(parser: &'a Parser<'a>, pos: usize) -> Result<(Option<Self>, usize)> {
if parser.peek(pos, Lexeme::Exposing) {
Exposing::exposing(parser, pos + 1)
} else {
Ok((None, pos))
}
}
fn exposing(parser: &'a Parser<'a>, pos: usize) -> Result<(Option<Exposing<'a>>, usize)> {
let pos = consume_symbol(parser, pos, Lexeme::LeftParen)?;
let (expo, pos) = if parser.peek(pos, Lexeme::DotDot) {
(Exposing::All, pos + 1)
} else {
Exposing::exposing_ids(parser, pos)?
};
if !parser.peek(pos, Lexeme::RightParen) {
return raise_parser_error("expecting ')' in exposing clause", parser, pos, false);
}
Ok((Some(expo), pos + 1))
}
fn exposing_ids(parser: &'a Parser<'a>, pos: usize) -> Result<(Exposing<'a>, usize)> {
let mut ids = vec![];
let mut pos = pos;
loop {
match parser.get_token(pos) {
Some(Lexeme::Id(s)) => {
ids.push(s);
pos += 1;
}
Some(Lexeme::TypeId(s)) => {
ids.push(s);
pos += 1;
}
_ => {
return raise_parser_error(
"expecting identifier in list of exposing",
parser,
pos,
true,
);
}
};
if !parser.peek(pos, Lexeme::Comma) {
break;
} else {
pos += 1;
}
}
Ok((Exposing::List(ids), pos))
}
}
| rust |
<gh_stars>1-10
.wpcf7c-elm-step2 {}
.wpcf7c-elm-step3 {}
.wpcf7 .ajax-loader{}
.wpcf7c-hide {display: none;}
.wpcf7c-force-hide {display: none !important;}
.wpcf7c-conf {background-color: #999999; color: black; border: 1px solid #333333;} | css |
const httpStatus = require('http-status');
const { Plan } = require('../models');
const ApiError = require('../utils/ApiError');
/**
* Create a plan
* @param {Object} planBody
* @returns {Promise<Plan>}
*/
const createPlan = async (planBody) => {
if (await Plan.existsInAccount(planBody.price, planBody.account)) {
throw new ApiError(httpStatus.BAD_REQUEST, 'Plan already exists');
}
return Plan.create(planBody);
};
const getPlanById = async (planId) => {
return Plan.findById(planId);
};
const getPlans = async (accountId) => {
return Plan.find({ account: accountId }).populate('account', 'users');
};
module.exports = {
createPlan,
getPlanById,
getPlans,
};
| javascript |
Going into The Arizona Republic I came in with a master's degree and years of experience as a Native journalist. I started as a fellow and worked my way to a reporter. When asked to start the Indigenous Affairs beat, no raise was offered but I had to be a breaking news editor.
I was a breaking news editor for a year at the same time I was building the Indigenous Affairs beat. The only raise I saw was when Gannett gave companywide raises. So please explain to me why someone with a master's and a decade of experience is still earning about 40k?
| english |
<gh_stars>0
{
"name": "curl",
"moduleType": [
"amd",
"node"
],
"main": "./src/curl.js",
"version": "0.8.12",
"description": "curl.js is small, fast, extensible module loader that handles AMD, CommonJS Modules/1.1, CSS, HTML/text, and legacy scripts.",
"ignore": [
"bin",
"docs",
"test"
],
"homepage": "https://github.com/cujojs/curl",
"_release": "0.8.12",
"_resolution": {
"type": "version",
"tag": "0.8.12",
"commit": "<PASSWORD>"
},
"_source": "git://github.com/cujojs/curl.git",
"_target": "~0.8.12",
"_originalSource": "curl"
} | json |
<reponame>zcwfeng/AndroidSourceStudyStudio
package com.zcwfeng.sourcestudy.androidsourcestudystudio.utils;
import android.content.Context;
import android.content.SharedPreferences;
import android.preference.PreferenceManager;
import android.text.TextUtils;
import com.google.gson.Gson;
import com.zcwfeng.sourcestudy.androidsourcestudystudio.db.City;
import com.zcwfeng.sourcestudy.androidsourcestudystudio.db.County;
import com.zcwfeng.sourcestudy.androidsourcestudystudio.db.Province;
import com.zcwfeng.sourcestudy.androidsourcestudystudio.db.WeatherDB;
import com.zcwfeng.sourcestudy.androidsourcestudystudio.db.model.Weather;
import com.zcwfeng.sourcestudy.androidsourcestudystudio.db.model.Weatherinfo;
import java.text.SimpleDateFormat;
import java.util.Date;
import java.util.Locale;
public class Utility {
/**
* 处理服务端返回的省级json数据
*/
public synchronized static boolean handleProvicesResponse(
WeatherDB weatherDB, String response) {
if (!TextUtils.isEmpty(response)) {
String[] allProvices = response.split(",");
if (allProvices != null && allProvices.length > 0) {
for (String p : allProvices) {
String[] array = p.split("\\|");
Province province = new Province();
province.setProvince_code(array[0]);
province.setProvince_name(array[1]);
weatherDB.saveProvice(province);
}
return true;
}
}
return false;
}
/**
* 处理服务端返回的市级json数据
*/
public synchronized static boolean handleCitiesResponse(
WeatherDB weatherDB, String response, Province province) {
if (!TextUtils.isEmpty(response)) {
String[] allCities = response.split(",");
if (allCities != null && allCities.length > 0) {
for (String c : allCities) {
String[] array = c.split("\\|");
City city = new City();
city.setCity_code(array[0]);
city.setCity_name(array[1]);
city.setProvince(province);
weatherDB.saveCity(city);
}
return true;
}
}
return false;
}
/**
* 处理服务端返回的县级json数据
*/
public synchronized static boolean handleCountiesResponse(
WeatherDB weatherDB, String response, City city) {
if (!TextUtils.isEmpty(response)) {
String[] allCounties = response.split(",");
if (allCounties != null && allCounties.length > 0) {
for (String c : allCounties) {
String[] array = c.split("\\|");
County county = new County();
county.setCounty_code(array[0]);
county.setCounty_name(array[1]);
county.setCity(city);
weatherDB.saveCounty(county);
}
return true;
}
}
return false;
}
/**
* 使用Gson解析服务器返回的JSON数据,并将解析的数据存储到本地
*/
public static void handleWeatherResponse(Context context, String response) {
try {
LogUtil.i("UTILITY", "----------------->" + response.toString());
Gson gson = new Gson();
Weather weather = gson.fromJson(response, Weather.class);
LogUtil.i("UTILITY", "----------------->" + weather.toString());
Weatherinfo info = weather.getWeatherinfo();
LogUtil.i("UTILITY", "----------------->" + info.toString());
saveWeatherInfo(context, info);
} catch (Exception e) {
// TODO: handle exception
}
}
/**
* 将服务器返回的天气信息存储到共享参数中
*/
public static void saveWeatherInfo(Context context, Weatherinfo info) {
SimpleDateFormat sdf = new SimpleDateFormat("yyyy年M月d日", Locale.CHINA);
SharedPreferences.Editor editor = PreferenceManager
.getDefaultSharedPreferences(context).edit();
editor.putBoolean("city_selected", true);
editor.putString("city_name", info.getCity());
editor.putString("weather_code", info.getCityid());
editor.putString("temp1", info.getTemp1());
editor.putString("temp2", info.getTemp2());
editor.putString("weather_desp", info.getWeather());
editor.putString("publish_time", info.getPtime());
LogUtil.i("UTILITY", "----------------->" + sdf.format(new Date()));
editor.putString("current_date", sdf.format(new Date()));
editor.commit();
}
} | java |
I want to feature those weird songs which became popular due to internet, youtube just as Kolaveri Di or Amplifier or Bhojpuri song 'ischool ke tem pe aana gori dam pe!'... Help me with such other viral songs (non-bollywood) that I can talk about tomorrow in my show...the non-mainstream songs that you would have come across through internet.
| english |
<gh_stars>1-10
export * from './CurrentCustomMessage';
| typescript |
There is a long list of fun and exciting aspects of Fortnite Chapter 3, but a list just as long also exists for things not working how they should in the game.
Glitches and bugs galore have come out of Fortnite Chapter 3 Season 1. Toilets have been killing players, Spider-Man's Mythic item has sucked players into the ground, and now Sniper Rifles aren't doing any damage.
YouTuber HJDoogan shared a video on his channel showcasing just how ineffective Sniper Rifles are in Fortnite at the moment. He shows several examples of him firing or even being fired upon with no damage being dealt.
The video sees HJDoogan sharing multiple examples of the Sniper Rifle in Fortnite Chapter 3 Season 1 not working as it is intended to. A Sniper Rifle shot to the head, and sometimes the body, should be enough to eliminate a player.
It is clearly a bug or a glitch of some sort that deals with the bullet collision in Fortnite. This is a huge problem because the Sniper Rifle is one of the most popular weapons in the game.
There are instances of the Sniper Rifle working as it should, but several instances in the video show hits connecting the YouTuber or enemy players that don't provide any damage output. Some of the shots connect with invisible forces in front of players.
One replay HJDoogan goes through shows the Sniper shot hitting his Fortnite opponent right in the leg, but instead of hurting the other player, it simply goes right through it.
Another bit in the video shows a player shooting him right in the shoulder with the Sniper. The bullet erupts on impact as it should, but HJDoogan is able to brush it off with no worries at all.
The final replay that the YouTuber investigates shows a Fortnite player riding on a zipline. One Sniper shot lands on their head, but the bullet impacts a foot in front of their face. It happens again near their midsection.
The issue could be a client-to-server connection bug that doesn't register the Sniper Rifle bullet in the correct spot. Either way, Fortnite is dealing with a collision error or a server error.
Note: The article solely reflects the writer's views. | english |
{
"name": "resultscrawler",
"private": true,
"version": "0.0.1",
"description": "UQAM results crawler",
"repository": "https://github.com/janicduplessis/resultscrawler",
"license": "MIT",
"devDependencies": {
"karma": "~0.10",
"protractor": "^1.1.1",
"http-server": "^0.6.1",
"bower": "^1.3.1",
"shelljs": "^0.2.6",
"karma-junit-reporter": "^0.2.2"
}
}
| json |
<filename>package.json
{
"name": "grav-sass-theme",
"version": "0.1.0",
"description": "The **Grav SASS Theme** Theme is for [Grav CMS](http://github.com/getgrav/grav). This README.md file should be modified to describe the features, installation, configuration, and general usage of this theme.",
"main": "index.js",
"scripts": {
"test": "echo \"Error: no test specified\" && exit 1"
},
"author": "",
"license": "ISC",
"devDependencies": {
"browser-sync": "^2.18.2",
"gulp": "^3.9.1",
"gulp-autoprefixer": "^3.1.1",
"gulp-clean": "^0.3.2",
"gulp-clean-css": "^2.0.13",
"gulp-imagemin": "^3.1.1",
"gulp-sass": "^2.3.2",
"gulp-svgmin": "^1.2.3",
"gulp-uglify": "^2.0.0",
"gulp-watch": "^4.3.11"
}
}
| json |
<gh_stars>0
# Name : <NAME>
# Student ID: 1001551132
# Date : 12/06/2020
import sys
class Data:
def __init__(self, state_type, reward):
self.state_type = state_type
self.reward = reward
self.utility = 0
self.policy = ""
def __repr__(self):
return "state_type : % s, reward: % s, utility: % s, policy: % s\n" % (self.state_type, self.reward, self.utility, self.policy)
def __str__(self):
return "state_type : % s, reward: % s, utility: % s, policy: % s\n" % (self.state_type, self.reward, self.utility, self.policy)
def process_environment(environment_file, non_terminal_reward):
file = open(environment_file, "r")
data = []
for line in file:
intermediate = []
for state in line.rstrip().split(","):
if state == ".":
intermediate.append(Data("non-terminal", non_terminal_reward))
elif state == "1.0" or state == "-1.0":
intermediate.append(Data("terminal", float(state)))
else:
intermediate.append(Data("blocked", -sys.maxsize))
data.append(intermediate)
return data
def value_iteration(environment_file, non_terminal_reward, gamma, K):
data = process_environment(environment_file, non_terminal_reward)
U_dash = []
for i in range(len(data)):
intermediate = []
for j in range(len(data[0])):
intermediate.append(0)
U_dash.append(intermediate)
for n in range(K):
# U = copy of U'
for i in range(len(U_dash)):
for j in range(len(U_dash[0])):
data[i][j].utility = U_dash[i][j]
# For each state S
for i in range(len(data)):
for j in range(len(data[0])):
if data[i][j].state_type == "blocked":
continue
U_dash[i][j] = data[i][j].reward
if data[i][j].state_type == "terminal":
continue
max_val = -sys.maxsize
# Up
temp = 0
# 0.8 Case
if i-1 >=0 and data[i-1][j].state_type != "blocked":
temp += (0.8 * data[i-1][j].utility)
else:
temp += (0.8 * data[i][j].utility)
# 0.2 Case
if j-1 >=0 and data[i][j-1].state_type != "blocked":
temp += (0.1 * data[i][j-1].utility)
else:
temp += (0.1 * data[i][j].utility)
if j+1 <=len(data[0])-1 and data[i][j+1].state_type != "blocked":
temp += (0.1 * data[i][j+1].utility)
else:
temp += (0.1 * data[i][j].utility)
if temp > max_val:
max_val = temp
# Down
temp = 0
# 0.8 Case
if i+1 <=len(data)-1 and data[i+1][j].state_type != "blocked":
temp += (0.8 * data[i+1][j].utility)
else:
temp += (0.8 * data[i][j].utility)
# 0.2 Case
if j-1 >=0 and data[i][j-1].state_type != "blocked":
temp += (0.1 * data[i][j-1].utility)
else:
temp += (0.1 * data[i][j].utility)
if j+1 <=len(data[0])-1 and data[i][j+1].state_type != "blocked":
temp += (0.1 * data[i][j+1].utility)
else:
temp += (0.1 * data[i][j].utility)
if temp > max_val:
max_val = temp
# Left
temp = 0
# 0.8 Case
if j-1 >=0 and data[i][j-1].state_type != "blocked":
temp += (0.8 * data[i][j-1].utility)
else:
temp += (0.8 * data[i][j].utility)
# 0.2 Case
if i-1 >=0 and data[i-1][j].state_type != "blocked":
temp += (0.1 * data[i-1][j].utility)
else:
temp += (0.1 * data[i][j].utility)
if i+1 <=len(data)-1 and data[i+1][j].state_type != "blocked":
temp += (0.1 * data[i+1][j].utility)
else:
temp += (0.1 * data[i][j].utility)
if temp > max_val:
max_val = temp
# Right
temp = 0
# 0.8 Case
if j+1 <=len(data[0])-1 and data[i][j+1].state_type != "blocked":
temp += (0.8 * data[i][j+1].utility)
else:
temp += (0.8 * data[i][j].utility)
# 0.2 Case
if i-1 >=0 and data[i-1][j].state_type != "blocked":
temp += (0.1 * data[i-1][j].utility)
else:
temp += (0.1 * data[i][j].utility)
if i+1 <=len(data)-1 and data[i+1][j].state_type != "blocked":
temp += (0.1 * data[i+1][j].utility)
else:
temp += (0.1 * data[i][j].utility)
if temp > max_val:
max_val = temp
U_dash[i][j] += (gamma * max_val)
print("utilities:")
for i in range(len(data)):
for j in range(len(data[0])):
print("{:6.3f}".format(data[i][j].utility), end= " ")
print()
print()
print("policy:")
for i in range(len(data)):
for j in range(len(data[0])):
if data[i][j].state_type == "terminal":
data[i][j].policy = "o"
elif data[i][j].state_type == "blocked":
data[i][j].policy = "x"
else:
max_val = -sys.maxsize
max_policy = ""
# Up
temp = 0
# 0.8 Case
if i-1 >=0 and data[i-1][j].state_type != "blocked":
temp += (0.8 * data[i-1][j].utility)
else:
temp += (0.8 * data[i][j].utility)
# 0.2 Case
if j-1 >=0 and data[i][j-1].state_type != "blocked":
temp += (0.1 * data[i][j-1].utility)
else:
temp += (0.1 * data[i][j].utility)
if j+1 <=len(data[0])-1 and data[i][j+1].state_type != "blocked":
temp += (0.1 * data[i][j+1].utility)
else:
temp += (0.1 * data[i][j].utility)
if temp > max_val:
max_val = temp
max_policy = "^"
# Down
temp = 0
# 0.8 Case
if i+1 <=len(data)-1 and data[i+1][j].state_type != "blocked":
temp += (0.8 * data[i+1][j].utility)
else:
temp += (0.8 * data[i][j].utility)
# 0.2 Case
if j-1 >=0 and data[i][j-1].state_type != "blocked":
temp += (0.1 * data[i][j-1].utility)
else:
temp += (0.1 * data[i][j].utility)
if j+1 <=len(data[0])-1 and data[i][j+1].state_type != "blocked":
temp += (0.1 * data[i][j+1].utility)
else:
temp += (0.1 * data[i][j].utility)
if temp > max_val:
max_val = temp
max_policy = "v"
# Left
temp = 0
# 0.8 Case
if j-1 >=0 and data[i][j-1].state_type != "blocked":
temp += (0.8 * data[i][j-1].utility)
else:
temp += (0.8 * data[i][j].utility)
# 0.2 Case
if i-1 >=0 and data[i-1][j].state_type != "blocked":
temp += (0.1 * data[i-1][j].utility)
else:
temp += (0.1 * data[i][j].utility)
if i+1 <=len(data)-1 and data[i+1][j].state_type != "blocked":
temp += (0.1 * data[i+1][j].utility)
else:
temp += (0.1 * data[i][j].utility)
if temp > max_val:
max_val = temp
max_policy = "<"
# Right
temp = 0
# 0.8 Case
if j+1 <=len(data[0])-1 and data[i][j+1].state_type != "blocked":
temp += (0.8 * data[i][j+1].utility)
else:
temp += (0.8 * data[i][j].utility)
# 0.2 Case
if i-1 >=0 and data[i-1][j].state_type != "blocked":
temp += (0.1 * data[i-1][j].utility)
else:
temp += (0.1 * data[i][j].utility)
if i+1 <=len(data)-1 and data[i+1][j].state_type != "blocked":
temp += (0.1 * data[i+1][j].utility)
else:
temp += (0.1 * data[i][j].utility)
if temp > max_val:
max_val = temp
max_policy = ">"
data[i][j].policy = max_policy
print("{:6s}".format(data[i][j].policy), end=" ")
print()
if __name__ == "__main__":
value_iteration(sys.argv[1], float(sys.argv[2]), float(sys.argv[3]), int(sys.argv[4])) | python |
The team’s performance in this season has been commendable with both the drivers faring well, earning 44 points, 7 ahead of their rival McLaren. The Monaco GP saw both the drivers in the top ten positions, which is something to cheer for Force India.
Unlike the Circuit de Monaco, Gilles Villeneuve circuit provides good opportunity for overtaking and Team Force India will try to make the best out of it .
Adrain Sutil , fresh from a fifth position at Monaco is hoping for a change of fortune at Montreal. History has not favoured Sutil in Gilles Villeneuve. Sutil fought back brilliantly at Monaco when his front wing got damaged in the first lap of the race. He made best use of the safety car situation and ended up in fifth place, his best place so far in this season. Sutil, with the right race strategy, can be a driver to look out for Force India this weekend.
Paul di Resta has been consistent for Force India in this season, nearly missing a podium position at the Bahrain GP. His performance has been applauded by everyone. Paul believes that the straight line speed plays a major part in the Canadian GP and is confident of a better show in the 100th race for Force India.
The tyre strategy comes into play due to higher tyre wear and degradation in the Gilles Villeneuve circuit . The Supersoft and Medium tyres being available for the race, teams with best tyre strategy will surely have the upper hand at Montreal.
Going into the race, Mercedes are having the upper hand with four consecutive pole positions and one podium finish. Based on record, McLaren can be a dark horse as they had won the race 13 times at Montreal, Lewis Hamilton being a part of it three times (2007, 2010, 2012). Ferrari had also won it 13 times but not in the recent past. They will be determined to turn the tables around this time. Also, one has to take into the dominance of the Red Bulls. So, a stiff competition can be expected among the four teams.
With Force India more determined in grabbing the podium position, we can expect a fascinating race this weekend.
| english |
<filename>src/types/responses.types.ts
import {
AccountStatus,
BitsoBook,
BitsoChart,
BitsoCurrency,
BitsoCurrencyType,
BitsoSide,
CellphoneStatus,
CountryCode,
DocumentStatus,
EmailStatus,
FundingStatus,
LedgerOperation,
MethodFee,
WithdrawalStatus,
} from './common.types'
// Available Books
interface MakerTaker {
maker: string
taker: string
}
interface StructureFee extends MakerTaker {
volume: string
}
interface Fees {
flatRate: MakerTaker
structure: StructureFee[]
}
export interface BitsoAvailableBook {
book: BitsoBook
minimumPrice: string
maximumPrice: string
minimumAmount: string
maximumAmount: string
minimumValue: string
maximumValue: string
tickSize: string
defaultChart: BitsoChart
fees: Fees
}
// Ticker
export interface BitsoTicker {
book: BitsoBook
volume: string
high: string
last: string
low: string
vwap: string
ask: string
bid: string
createdAt: string
}
// Order Book
interface OpenOrders {
book: BitsoBook
price: string
amount: string
}
export interface BitsoOrderBook {
asks: OpenOrders[]
bids: OpenOrders[]
updatedAt: string
sequence: string
}
// Trades
export interface BitsoTrade {
book: BitsoBook
createdAt: string
amount: string
makerSide: BitsoSide
price: string
tid: number
}
// Account
export interface BitsoAccount {
clientId: string
firstName: string
lastName: string
status: AccountStatus
dailyLimit: string
monthlyLimit: string
dailyRemaining: string
monthlyRemaining: string
cashDepositAllowance: string
cellphoneNumber: CellphoneStatus
cellphoneNumberStored: string
email: EmailStatus
emailStored: string
officialId: DocumentStatus
proofOfResidency: DocumentStatus
signedContract: DocumentStatus
originOfFunds: DocumentStatus
verificationLevel: number
referralCode: string
countryOfReidence: string // TODO: MX
gravatarImg: string
accountCreationDate: string
preferredCurrency: string // TODO: mxn Currency?
enabledTwoFactorMethods: string[] // TODO: totp define
taxPayerType: string // TODO: person
bornInResidence: string
}
// Mobile Phone Number
export interface BitsoMobilePhoneNumber {
phone: string
}
// Balance
interface BitsoBalance {
currency: BitsoCurrency
total: string
locked: string
available: string
pendingDeposit: string
pendingWithdrawal: string
}
export interface BitsoAccountBalance {
balances: BitsoBalance[]
}
// Customer Fees
interface OrderBookFee {
book: BitsoBook
feePercent: string
feeDecimal: string
takerFeePercent: string
takerFeeDecimal: string
makerFeePercent: string
makerFeeDecimal: string
volumeCurrency: BitsoCurrency
currentVolume: string
nextVolume: string
nextMakerFeePercent: string
nextTakerFeePercent: string
nextFee: string
nextTakerFee: string
}
interface DepositFee {
currency: BitsoCurrency
method: MethodFee
fee: string
isFixed: boolean
}
export interface BitsoCustomerFee {
fees: OrderBookFee[]
depositFees: DepositFee[]
withdrawalFees: {
[key in BitsoCurrency]: string
}
}
// Ledger
// TODO: define details
export type BitsoLedger =
| BitsoLedgerTrade
| BitsoLedgerFee
| BitsoLedgerFunding
| BitsoLedgerWithdrawal
| BitsoLedgerQuotedOrder
interface BalanceUpdate {
currency: BitsoCurrency
amount: string
}
interface BaseLedger {
eid: string
operation: LedgerOperation
createdAt: string
balanceUpdates: BalanceUpdate[]
}
export interface BitsoLedgerTrade extends BaseLedger {
operation: 'trade'
details: {
oid: string
tid: string
}
}
export interface BitsoLedgerFee extends BaseLedger {
operation: 'fee'
details: {
tid: string
oid: string
}
}
export interface BitsoLedgerQuotedOrder extends BaseLedger {
operation: 'quoted_order'
details: {
oid: string
qid: string
}
}
export interface BitsoLedgerFunding extends BaseLedger {
operation: 'funding'
details: {
method: string
methodName: string
asset: BitsoCurrency
protocol: string
network: string
integration: string
fid: string
}
}
export interface BitsoLedgerWithdrawal extends BaseLedger {
operation: 'withdrawal'
details: {
method: string
methodName: string
asset: BitsoCurrency
protocol: string
network: string
integration: string
wid: string
}
}
// Withdrawal
export type BitsoWithdrawal = PendingWithdrawal | CompleteWithdrawal
interface BaseWithdrawal {
wid: string
status: WithdrawalStatus
createdAt: string
currency: BitsoCurrency
method: string
methodName: string
amount: string
}
interface PendingWithdrawal extends BaseWithdrawal {
status: 'pending'
details: {
withdrawalAddres: string
txHash: string
}
}
interface CompleteWithdrawal extends BaseWithdrawal {
status: 'complete'
asset: BitsoCurrency
network: string
protocol: string
integration: string
senderName: string
details: {
clientWithdrawalId: string
beneficiaryName: string
beneficiaryClabe: string
beneficiaryBankCode: string
cep: any
claveDeRastreo: string
concepto: string
}
}
// Funding
export type BitsoFunding = PendingFunding | CompleteFunding
interface BaseFunding {
fid: string
status: FundingStatus
createdAt: string
currency: BitsoCurrency
method: string
amount: string
}
interface PendingFunding extends BaseFunding {
status: 'pending'
details: {
txHash: string
}
}
interface CompleteFunding extends BaseFunding {
status: 'complete'
methodName: string
asset: BitsoCurrency
network: string
protocol: string
integration: string
details: {
senderName: string
senderClabe: string
senderBank: string
clave: string
claveRastreo: string
numericReference: string
concepto: string
}
}
// Order Trade
export interface BitsoOrderTrade {
book: BitsoBook
createdAt: string
minor: string
major: string
feesAmount?: string
feesCurrency?: BitsoCurrency
minorCurrency: BitsoCurrency
majorCurrency: BitsoCurrency
oid: string
tid?: number
price: string
originId?: string
side: BitsoSide
makerSide: BitsoSide
}
// User Trade
export interface BitsoUserTrade {
book: BitsoBook
createdAt: string
minor: string
major: string
feesAmount?: string
feesCurrency?: BitsoCurrency
minorCurrency: BitsoCurrency
majorCurrency: BitsoCurrency
oid: string
tid: number
price: string
originId?: string
side: BitsoSide
makerSide: BitsoSide
}
// Open Order
export interface BitsoOpenOrder {
book: BitsoBook
originalAmount: string
unfilledAmount: string
originalValue: string
createdAt: string
updatedAt: string
price: string
oid: string
originId: string
side: BitsoSide
status: string
type: string
}
// Lookup Order
export interface BitsoLookupOrder {
book: BitsoBook
originalAmount: string
unfilledAmount: string
originalValue: string
createdAt: string
updatedAt: string
price: string
oid: string
side: BitsoSide
status: string
type: string
}
// Funding destination
export interface BitsoFundingDestination {
accountIdentifierName: string
accountIdentifier: string
}
// Bank Code
export interface BitsoBankCode {
code: string
name: string
}
// Ohlc Charting
export interface BitsoOhlcItem {
bucketStartTime: number
firstRate: string
firstTradeTime: number
lastRate: string
lastTradeTime: number
maxRate: string
minRate: string
tradeCount: number
volume: string
vwap: string
}
// Settings
export interface BitsoSettings {
account: {
cryptoKnowledge: unknown
fiatEnabledCurrencies: BitsoCurrency[]
language: string
lastShownLedgerEntry: unknown
preferredCurrency: BitsoCurrency
usageType: string
usersLookup: boolean
}
flags: {
riskWarningCryptoAccepted: boolean
riskWarningTradingAccepted: boolean
stopLimitWarningAccepted: boolean
stopLossWarningAccepted: boolean
userIntentionBuyer: boolean
userIntentionHolder: boolean
userIntentionSender: boolean
userIntentionTrader: boolean
}
modals: {
showLoginModalIntentionsCryptoKnwl: boolean
}
notifications: {
bitsoTransfer: boolean
bitsoTransferFailed: boolean
completeOrder: boolean
fundingComplete: boolean
fundingFailed: boolean
fundingRequest: boolean
marketing: boolean
partialOrder: boolean
referral: boolean
withdrawalComplete: boolean
withdrawalFailed: boolean
withdrawalRequest: boolean
}
}
// Country
interface Country {
en: string
es: string
pt: string
iso3: string
phone: string
restrictedCountry?: boolean
defaultCurrency?: string
}
export interface Countries {
countries: Record<CountryCode, Country>
}
// Bitso currencies
interface CurrencyMetadata {
code: BitsoCurrency
fullName: string
color: string
precision: number
type: BitsoCurrencyType
}
export interface BitsoCurrencies {
currencies: {
allowedAsPreferred: BitsoCurrency[]
supported: BitsoCurrency[]
metadata: CurrencyMetadata[]
}
}
// Available Currency Conversions
type BitsoAvailableCurrencyPrivate = CurrencyMetadata & { availableBalance: string }
interface BitsoAvailableConversion {
currency: BitsoCurrency
allowedConversions: BitsoCurrency[]
}
export interface BitsoAvailableCurrencyConversionsPublic {
availableCurrencyConversions: {
availableConversions: BitsoAvailableConversion[]
currencies: CurrencyMetadata[]
}
}
export interface BitsoAvailableCurrencyConversionsPrivate {
availableCurrencyConversions: {
availableConversions: BitsoAvailableConversion[]
currencies: BitsoAvailableCurrencyPrivate[]
}
}
// Chart Trade
export interface BitsoTradeChartItem {
date: string
dated: string
value: string
volume: string
open: string
low: string
high: string
close: string
vwap: string
}
// Place Order
export interface BitsoOrderPlaced {
oid: string
}
| typescript |
{"month": "5", "num": 899, "link": "", "year": "2011", "news": "", "safe_title": "Number Line", "transcript": "{{Title text: The Wikipedia page \"List of Numbers\" opens with \"This list is incomplete; you can help by expanding it.\"}}\n\n(( number line ranging from -1 to 10 ))\n\n(( arrow pointing left, towards negative numbers )) Negative \"imitator\" numbers (do not use)\n\n(( line right before the number one )) 0.99... (acutally 0.0000000372 less than 1)\n\n(( line at the golden ratio )) \u00c3\u008f\u00c2\u0095 - Parthenon; sunflowers; golden ratio; wait, come back, I have facts!\n\n(( line at a region between two and 2.2 )) forbidden region\n\n(( line at Euler's number )) e\n\n(( line a bit before 3 )) 2.9299372 (e and \u00c3\u008f\u00c2\u0080 pi, observed)\n\n(( line at \u00c3\u008f\u00c2\u0080 )) \u00c3\u008f\u00c2\u0080\n\n(( line at 3.5 with a ribbon as the numeral )) Grid - accepted as canon by orthodox mathematicians \n\n(( line a bit after 4 )) site of battle of 4.108\n\n(( blob between 4.5 and 6.5 labeled unexplored ))\n\n(( line at seven )) Number indicating a factoid is made up (\"every 7 years...\", \"science says there are 7...\", etc)\n\n(( line at eight )) Largest even prime\n\n(( line at 8.75 )) If you encounter a number higher than this, you're not doing real math\n\n", "alt": "The Wikipedia page \"List of Numbers\" opens with \"This list is incomplete; you can help by expanding it.\"", "img": "https://imgs.xkcd.com/comics/number_line.png", "title": "Number Line", "day": "16"} | json |
<gh_stars>10-100
import { Contract } from '../ethereum'
const { abi } = require('./artifacts/MortgageHelper.json')
/** MortgageCreator contract class */
export class MortgageHelper extends Contract {
constructor(address: string) {
super(address, abi)
}
getContractName() {
return 'MortgageHelper'
}
}
| typescript |
import React, { useState } from 'react';
import { Switch, Route, Redirect } from 'react-router-dom';
import { makeStyles } from '@material-ui/core';
import SideBar from '../components/SideBar';
import Ideas from './Ideas';
import IdeaForm from './IdeaForm';
import ApplicationBar from '../components/ApplicationBar';
const DRAWER_WIDTH = 240;
const useStyles = makeStyles((theme) => ({
root: {
display: 'flex',
},
content: {
flexGrow: 1,
padding: theme.spacing(3),
transition: theme.transitions.create('margin', {
easing: theme.transitions.easing.sharp,
duration: theme.transitions.duration.leavingScreen,
}),
marginLeft: -DRAWER_WIDTH,
},
contentShift: {
transition: theme.transitions.create('margin', {
easing: theme.transitions.easing.easeOut,
duration: theme.transitions.duration.enteringScreen,
}),
marginLeft: 0,
},
header: {
display: 'flex',
alignItems: 'center',
padding: theme.spacing(0, 1),
// necessary for content to be below app bar
...theme.mixins.toolbar,
justifyContent: 'flex-end',
},
}));
function Layout(props) {
const classes = useStyles();
const [drawerOpen, setDrawerOpen] = useState(true);
function handleDrawerOpen() {
setDrawerOpen(true);
}
function handleDrawerClose() {
setDrawerOpen(false)
}
return (
<div className={classes.root}>
<ApplicationBar shift={handleDrawerOpen} shifted={drawerOpen} />
<SideBar open={drawerOpen} closeDrawer={handleDrawerClose} width={DRAWER_WIDTH} />
<main className={[classes.content, drawerOpen ? classes.contentShift : null].join(' ')}>
<div className={classes.header}></div>
<Switch>
<Route path="/ideas/add" exact component={IdeaForm} />
<Route path="/ideas" component={Ideas} />
<Redirect from="/" to="/ideas" exact />
</Switch>
</main>
</div>
)
};
export default Layout;
export { DRAWER_WIDTH }; | javascript |
What is the Tabasco sauce?
Tabasco Sauce is one of several types of popular spicy seasonings that are produced in the United States. To create this product, producers mash a large number of freshly picked Tabasco peppers and put them in oak barrels with salt for a period of about three years. This mixture is then purified from seeds and skin, and natural puree with vinegar and spices is mixed for 30 days before bottling.
Tabasco sauce has become popular due to its use as a condiment for a wide variety of products, particularly for fried foods. Especially it is in harmony with products such as fish and French fries. Tabasco sauce can also be used in many other culinary products, including fried or smoked. This seasoning is available in many parts of the world, but is most intensively used in the United States.
As already mentioned above, Tabasco sauce is an acute additive, prepared from a special kind of pepper. Other key ingredients in this spicy product are vinegar and salt. Before the sauce is bottled and sold, the product is aged.
The Tabasco sauce was invented by Edmund Michelli in 1868. The inventor distributed his seasoning to family members and friends using empty cologne bottles as containers. Subsequently, when the sauce was first released on commercial grounds, it was packed in the same non-typical products for the containers that were purchased from a glass company located in New Orleans. The organization that produces and sells Tabasco sauce, still belongs to the descendants of Michelli.
Many people consider this burning product their favorite seasoning. In some families, this sauce appears on the dinner table as often as standard ketchup and mustard. Speaking about the capacities in which Tabasco sauce is packed today, we can say that they have very modest dimensions, so they can easily fit in both the backpack of a tourist and in a purse. For this reason, your favorite seasoning can be used to improve the taste of food when you are on a business trip or in a restaurant where the menu does not presume the presence of this product.
Cooks claim that there are several types of products for which Tabasco sauce is essential. Its composition is such that the most preferable are stew, hamburgers, burrito, fajitas, eggs, fried chicken, chicken wings and sandwiches with fish, but this list is not limited at all. There are some culinary recipes that require in the process of cooking a certain amount of sauce among the ingredients, as well as recipes that require it as a seasoning to the finished dish.
In addition to the original recipe (red color), there are currently a number of other types of sauce distributed by the same company. So, on sale you can find a variety with the content of the jalapeno pepper, as well as a kind that includes pepper with garlic. Rare sauces, combining a sweet and burning taste, as well as a super-sharp one, are more rare. | english |
<reponame>jborean93/PSIntegrity<filename>Docs/Set-IntegrityLabel.md
# Set-IntegrityLabel
Sets the integrity label, policy and flags on an object.
## Syntax
```
Set-IntegrityLabel
-Path <String>
-Label <PSIntegrity.MandatoryLabel>
[-Flags <System.Security.AccessControl.AceFlags>]
[-AccessMask <PSIntegrity.MandatoryLabelMask>]
[<CommonParameters>]
Set-IntegrityLabel
-InputObject <PSIntegrity.BaseObjectLabel>
-Label <PSIntegrity.MandatoryLabel>
[-Flags <System.Security.AccessControl.AceFlags>]
[-AccessMask <PSIntegrity.MandatoryLabelMask>]
[<CommonParameters>]
```
## Parameters
* `Path`: The path to the file to set the integrity label on. This is mutually exclusive to `InputObject`.
* `InputObject`: The PSIntegrity.BaseObjectLabel object to set the integrity label on. This is mutually exclusive to `Path`.
* `Label`: The label to set on the object.
## Optional Parameters
* `Flags`: The AceFlags to set on the label.
* `AccessMask`: The access mask or policy to set on the label.
## Input
* `<PSIntegrity.BaseObjectLabel>`: The object can be passed as a pipeline input of the `InputObject` parameter
## Output
No object is outputted unless `-PassThru` is specified then
* `<PSIntegrity.BaseObjectLabel>`: A object that implements `BaseObjectLabel`
## Examples
```ps
# Set a High integrity label to a file
Set-IntegrityLabel -Path C:\Users\test\file.txt -Label High
# Set a High integrity label to Low and get the label object back
$label = Set-IntegrityLabel -Path C:\Users\test\file.txt -Label Low -PassThru
# Remove an integrity label using InputObject
Set-IntegrityLabel -InputObject $label -Label None
# Set no write/read/execute policy for the label
$label | Set-IntegrityLabel -Label High -AccessMask NoWriteUp, NoReadUp, NoExecuteUp
# Ensure the label is inherited to all child folders and files
Set-IntegrityLabel -Path C:\application -Label Low -Flags ContainerInherit, ObjectInherit
``` | markdown |
<reponame>davidreeder/Python-MOSToolkit
#!/usr/bin/env python
""" -o-
rtcmixOSCServer.py
Demonstrate simple "drum machine" interaction model by playing
RTcmix sounds from a single score via incoming OSC messages.
ASSUME CMIX executable is accessible to subprocess.Popen() and os.system().
ASSUME Running with a CMIX score enabled with Minc struct OSCData.
See cmixHelper.sco.
"""
version = "0.1" #RELEASE
#----------------------------------- -o-
# Modules.
import MOSLog
log = MOSLog.MOSLog(logTime=True, logDate=False)
import MOSZ as z
#import MOSDump as dump
import MOSOSC
import MOSRTcmix
#----------------------------------- -o-
# OSC path handlers.
# -o-
def handlerOSCMessagesForCMIX(*eventArgs):
"""
Send OSC message to CMIX score enabled with Minc struct OSCData.
"""
_, _, oscPath, oscArgs, _ = server.parseEventArgs(eventArgs)
MOSRTcmix.playScoreWithOSCData( oscPath, oscArgs,
cmdlineArgs.cmixScore, cmdlineArgs.cmixOSCInputListName,
#runInForeground=True #DEBUG
)
# -o-
def handlerDestroyServer(*eventArgs):
server.parseEventArgs(eventArgs)
server.destroyServer()
#----------------------------------- -o-
# Main.
cmdlineArgs = None
if "__main__" == __name__:
cmdlineArgs = z.parseCommandlineArguments( [
{ "option_strings" : "--cmixScore",
"default" : "oscDrumMachineDemo.sco",
"help" : "CMIX score enabled with Minc struct OSCData.",
},
{ "option_strings" : "--cmixOSCInputListName",
"default" : "oscDataObjectsFromPython",
"help" : "Name of global variable, prepended to cmixScore, that defines OSC input.",
},
{ "option_strings" : "--hostname",
"default" : "127.0.0.1",
"help" : "Hostname or IP upon which to listen.",
},
{ "option_strings" : "--port",
"default" : 50001,
"type" : int,
"help" : "Port upon which to listen.",
},
] )
#
# Create and configure server.
#
server = MOSOSC.MOSOSC()
#server.enablePathLogging = False
server.createServer(cmdlineArgs.hostname, cmdlineArgs.port)
# OSC paths defined by OSC client and CMIX score.
# See groovySequenceControl.py and oscDemo.sco.
#
server.addPathHandler("/lowSequence", handlerOSCMessagesForCMIX)
server.addPathHandler("/highSequence", handlerOSCMessagesForCMIX)
server.addPathHandler("/boom", handlerOSCMessagesForCMIX)
server.addPathHandler("/kapow", handlerOSCMessagesForCMIX)
server.addPathHandler("/clearDiskMemory", handlerOSCMessagesForCMIX)
server.addPathHandler("/quit", handlerDestroyServer)
#
# Start and stop server.
#
server.startServer()
#ENDMAIN
| python |
.container {
font-size: medium;
padding: 5px;
width: 100%;
cursor: text;
-webkit-transition: background-color 250ms;
-moz-transition: background-color 250ms;
-ms-transition: background-color 250ms;
-o-transition: background-color 250ms;
transition: background-color 250ms;
}
.container:hover {
background-color: rgba(0, 0, 0, 0.1);
}
.link a,
.link a:visited,
.link a:active {
color: #108ee9;
}
.link::after {
content: ' / ';
}
.link:last-child::after {
content: unset;
}
.input {
width: 100%;
line-height: 1;
font-size: 12pt;
border-radius: 5px;
border: 1px solid #ccc;
padding: 2px;
}
.input:focus,
.input:focus-within {
outline-width: 3px;
outline-offset: -3px;
outline-color: rgba(0, 103, 244, 0.25);
}
| css |
<properties
pageTitle="Essayez d’Azure RemoteApp sur votre appareil en 3 minutes ou moins | Microsoft Azure"
description="Testez Azure RemoteApp fonctionnalité sans installer le service."
services="remoteapp"
documentationCenter=""
authors="lizap"
manager="mbaldwin" />
<tags
ms.service="remoteapp"
ms.workload="compute"
ms.tgt_pltfrm="na"
ms.devlang="na"
ms.topic="hero-article"
ms.date="08/15/2016"
ms.author="mbaldwin" />
# <a name="try-azure-remoteapp-on-your-device-in-3-minutes-or-less"></a>Essayez d’Azure RemoteApp sur votre appareil en 3 minutes ou moins
> [AZURE.IMPORTANT]
> RemoteApp Azure a été interrompu. Lire l' [annonce](https://go.microsoft.com/fwlink/?linkid=821148) pour plus d’informations.
Vous voulez voir Azure RemoteApp sur votre appareil ? Vous pouvez accéder à notre déploiement démo 10 minutes, tant que vous possédez un compte Microsoft. Nous avons Office et quelques autres applications disponibles. Il s’agit d’un excellent moyen pour tester le lecteur de l’expérience utilisateur pour Azure RemoteApp en moins de 3 minutes.
Vous souhaitez ?
1. Accédez à [http://remoteapp.azure.com](http://remoteapp.azure.com).
2. Dans le coin supérieur droit, cliquez sur **Installer le Client** .
3. Le système automatiquement détecte votre appareil et accédez alors au client pour votre appareil. Installer le client.
4. Revenir en arrière [http://remoteapp.azure.com](http://remoteapp.azure.com) et vous connecter avec votre compte Microsoft.
Vous pouvez désormais accéder applications qui s’exécutent en temps réel sur Azure RemoteApp.
Votre avis est également importante. À la fin de chaque session, vous verrez une boîte de dialogue pour vos commentaires. Si vous avez une minute, dites-nous vos idées et dites-nous si vous souhaitez que Microsoft vous contacter pour plus d’informations.
>[AZURE.NOTE] Car il s’agit d’un environnement contrôlé pour une utilisation démo, nous n'avons pas activé accès internet externe à partir des applications démo publié. Pour cette raison, les services, tels que OneDrive ne sont pas accessibles. En outre, le partage du Presse-papiers (copier-coller) et la redirection de USB et de l’imprimante sont désactivés.
| markdown |
/* hide the contents view here */
.content-page ul.content-list .row {
visibility: visible;
}
/* ends here */
.content-list-wrapper > .wrapper {
padding: 20px;
}
.content-list-wrapper > .wrapper ul.content-list .row {
margin-bottom: 20px;
}
.content-list-wrapper > .wrapper ul.content-list .row .row-header {
color: rgb(255, 255, 255);
padding: 10px;
border-bottom: none;
}
.content-list-wrapper > .wrapper ul.content-list .row.quiz-panel .row-header .header-title {
width: 90px;
}
.content-list-wrapper > .wrapper ul.content-list .row.quiz-panel .wrapper > div.button-container {
width: 100%;
margin-left: -90px;
}
.content-list-wrapper > .wrapper ul.content-list .row.quiz-panel .wrapper > div.button-container .wrapper {
margin-left: 90px;
margin-top: 3px;
margin-right: 5px;
}
.content-list-wrapper > .wrapper ul.content-list .row .other-apps a {
padding: 5px;
}
.content-list-wrapper > .wrapper ul.content-list .row.only-title .row-header .other-apps a {
padding: 0px;
cursor: default;
}
.content-list-wrapper > .wrapper ul.content-list .row.quiz-panel .row-header .other-apps {
margin-left: 10px;
max-width: 160px;
}
.content-list-wrapper > .wrapper ul.content-list .row ul {
padding: 0px 20px 20px 20px;
min-height: 269px;
}
.content-list-wrapper > .wrapper ul.content-list .row ul li {
margin-right: 20px;
margin-top: 20px;
display: inline-block;
vertical-align: middle;
}
.content-list-wrapper > .wrapper ul.content-list .row ul li:last-child {
margin-right: 0px;
}
.content-list-wrapper > .wrapper ul.content-list .row ul li a {
color: rgb(255, 255, 255)
}
.content-list-wrapper > .wrapper ul.content-list .row ul li .img-container {
width: 180px;
height: 180px;
padding: 10px;
}
.content-list-wrapper > .wrapper ul.content-list .row ul li img {
width: inherit;
height: inherit;
border-radius: 5px;
}
.content-list-wrapper > .wrapper ul.content-list .row ul li .subject-name {
margin: 0px;
max-width: 202px;
max-height: 26px;
line-height: 29px;
color: #000000;
}
.upload-container {
position: relative;
overflow: hidden;
height: 34px;
}
.upload-container > .upload-input {
position: absolute;
top: 0;
left: 0;
right: 0;
bottom: 0;
z-index: 1;
opacity: 0;
}
.upload-container > .upload-button {
position: absolute;
top: 0;
left: 0;
z-index: 0;
margin: 0;
}
.item {
position: relative;
}
.item > .delete-quiz {
position: absolute;
top: 0;
right: 0;
font-size: 1.3em;
border: 0;
color: red;
background-color: #fff;
cursor: pointer;
}
.item > .delete-quiz:hover {
font-size: 1.4em;
}
.item > a > .download-quiz {
background-color: #2A88D4;
cursor: pointer;
box-shadow: none;
border-radius: 2px;
border: none;
color:white;
box-shadow: 1px 1px 1px #585858;
}
.item > a > .download-quiz:active {
box-shadow: none;
background-color: #2A88D4;
}
.app-modal {
padding: 10px;
display: -webkit-box;
display: -webkit-flex;
display: -ms-flexbox;
display: flex;
-webkit-box-orient: horizontal;
-webkit-box-direction: normal;
-webkit-flex-direction: row;
-ms-flex-direction: row;
flex-direction: row;
}
.app-modal > .launcher {
border: none;
padding: 10px;
border-radius: 5px;
background-color: #fff;
cursor: pointer;
flex: 0 0 250px;
}
.app-modal > .launcher:hover {
background-color: #ccc;
}
.app-modal > .launcher > img {
border-radius: 5px;
margin-bottom: 10px;
}
.app-modal > .launcher > span {
font-size: 1.2em;
}
.app-modal .description {
padding: 10px;
}
.app-modal .description p {
margin-top: 0;
}
.app-modal .manual-list li {
list-style-type: disc;
margin-left: 20px;
}
.materials {
display: flex;
justify-content: space-between;
}
.materials .audio, .materials .manuals {
width: 50%;
}
.materials .audio .audio-button {
width: 50px;
height: 50px;
border: none;
cursor: pointer;
padding: 10px;
border-radius: 5px;
background-color: #fff;
}
.materials .audio .audio-button:hover {
background-color: #ccc;
}
| css |
<filename>app/src/main/java/android/ua/testapp/DateParser.java
package android.ua.testapp;
import java.text.SimpleDateFormat;
import java.util.Date;
public class DateParser {
// parse unixtimestamp to formated string
public static String unixToFormatedString(String format, long timestamp) throws Exception {
Date date = new Date(timestamp * 1000);
SimpleDateFormat simpleDateFormat = new SimpleDateFormat(format);
//simpleDateFormat.setTimeZone(TimeZone.getTimeZone("GMT+2"));
return simpleDateFormat.format(date);
}
}
| java |
The Anime community in India is ever growing. They enjoy watching anime films and shows. But due to lack of any available streaming services or Theaters playing which increases the illegal methods of obtaining such media. We all want to be patriots and stop this by legally watching the films. I understand that most Indian audience have different taste but we must be open and accept other different ideals and opinions.
Get this petition to censor board's attention as I want to join a screening and so do people who appreciate art. I hope people who are in international film distribution understand this concern.
| english |
<filename>lib/handlers.js
const R = require('ramda');
const State = require('./suite-state');
const { parsePath, unifiedDiff, title } = require('./formatter');
const status = require('./test-statuses');
/** @returns {Promise<{section:string, title:string, comment:string, pass:boolean}[]>} */
const bindHandlersTo = runner =>
new Promise(resolve => {
const noop = () => {};
const state = new State();
const testPass = test => {
state.addResult({
path: parsePath(test),
section: test.parent.fullTitle(),
title: test.title,
status_id: status.Passed,
comment: `duration: ${test.duration}ms`
});
console.log('ok %d %s', state.count(), title(test));
};
const testFail = (test, err) => {
const diff = (err.actual && err.expected)
? unifiedDiff(err)
: 'diff not available!';
state.addResult({
section: test.parent.fullTitle(),
path: parsePath(test),
title: test.title,
status_id: status.Failed,
comment: `duration: ${test.duration}ms\n\nstack:\n${
err.stack
}\n\ndiff:\n${diff}`
});
console.log('not ok %d %s', state.count(), title(test));
if (err.stack) {
console.log(err.stack.replace(/^/gm, ' '));
}
};
const testPending = test => {
state.addResult({
section: test.parent.fullTitle(),
path: parsePath(test),
title: test.title,
status_id: status.Skipped,
comment: 'test skipped'
});
};
const suiteEnd = () => resolve(state.getResults());
const mappings = [
{ evt: 'start', handler: noop },
{ evt: 'end', handler: suiteEnd },
{ evt: 'pass', handler: testPass },
{ evt: 'fail', handler: testFail },
{ evt: 'test end', handler: noop },
{ evt: 'pending', handler: testPending }
];
R.forEach(({ evt, handler }) => runner.on(evt, handler), mappings);
});
module.exports = bindHandlersTo;
| javascript |
WandaVision’s finale, titled ‘The Series Finale’ appropriately enough, has evoked mixed reactions. Though it does not have a lot of surprise cameos and even large-scale CGI battles, it does a great job in wrapping up the character arc of Wanda and delivers an emotionally satisfying ending.
All in all, WandaVision was a fresh, weird, funny, emotional and an entertaining TV series (we are assuming it is a miniseries for now). It also allowed its two major characters to flesh out, something that was denied them before. However, WandaVision is not only a solid superhero TV show, it will also change the Marvel Cinematic Universe. Here’s how.
With the unprecedented success Marvel Studios has witnessed on the big screen, with Avengers: Endgame, the pinnacle of the franchise, taking home nearly USD 3 billion, the makers feel they can be more audacious in terms of storytelling and structure.
This is why we have WandaVision and so many other shows in development. After the success of WandaVision, Kevin Feige and his team will be further emboldened to take more risks. Projects that could not have seen the light of day just a couple of years ago are now will be greenlit.
Comics have almost unlimited potential, and we can expect to see some really weird stuff to arrive on the big screen — stuff that will make Thor: Ragnarok and Guardians of the Galaxy feel routine in comparison.
Within the MCU itself, WandaVision has opened a lot of doors. We know Chaos Magic is a thing, and Scarlet Witch is stronger than Sorcerer Supreme (Doctor Strange), or at least that is what Agatha Harkness believed. This not only sets up Doctor Strange and the Multiverse of Madness, but also promises an even bigger role for Wanda in the Avengers. Perhaps she will lead the New Avengers?
Also, does MCU have a multiverse now? We know now Disney, owner of Marvel Studios, has X-Men and Fantastic Four properties in its possession and it is only a matter of time before we see them rubbing shoulders with the Avengers. Evan Peters appeared as Pietro Maximoff in WandaVision, though it was revealed that he was mind-controlled by Agatha. But Peters did play another version of the character, Peter Maximoff, in the X-Men franchise. That has to mean something and cannot just be a wry nod.
Spider-Man: No Way Home will certainly feature the multiverse as Spidey villains from earlier movies are going to make an appearance in the threequel.
The post-credit scene had Wanda’s Scarlet Witch astral form going through Darkhold, the Book of the Damned, and we hear her twins crying out. Are they in some other universe?
Anyway, there is ‘multiverse’ in the very title of the second Doctor Strange movie. We will likely see Doctor Strange in conflict with Scarlet Witch. | english |
<filename>app/accounts/forms.py
from .models import Account
from django import forms
from django.core.exceptions import ValidationError
class CustomUserCreationForm(forms.ModelForm):
first_name = forms.CharField(label='Enter First Name', min_length=4, max_length=150)
last_name = forms.CharField(label='Enter Last Name', min_length=4, max_length=150)
preferred_name = forms.CharField(label='Enter Preferred Name', min_length=4, max_length=150)
email = forms.EmailField(label='Enter email')
password = forms.CharField(label='Enter password', widget=forms.PasswordInput)
password2 = forms.CharField(label='Confirm password', widget=forms.PasswordInput)
class Meta:
model = Account
fields = [
'first_name',
'last_name',
'preferred_name',
'email',
'password']
def save(self, commit=True):
# Save the provided password in hashed format
user = super(CustomUserCreationForm, self).save(commit=False)
user.set_password(self.cleaned_data["password"])
if commit:
user.save()
return user
def clean_email(self):
email = self.cleaned_data['email'].lower()
r = Account.objects.filter(email=email)
if r.count():
raise ValidationError("Email already exists")
return email
def clean_password2(self):
password = self.cleaned_data.get('password')
password2 = self.cleaned_data.get('password2')
if password and password2 and password != password2:
raise ValidationError("Password don't match")
return password2
| python |
<gh_stars>1-10
// Packages
import React, { useState, useEffect } from 'react'
import { withTheme } from 'styled-components'
import { rgba, darken } from 'polished'
import ReactSelect, {
Props as ReactSelectProps,
StylesConfig,
OptionTypeBase,
components
} from 'react-select'
interface SelectProps extends Omit<ReactSelectProps, 'onChange'> {
icon?: React.ReactElement
borderless?: boolean
onChange?(event: { target: { name: string; value: OptionTypeBase } }): void
theme: {
border: Record<string, string>
colors: Record<string, string>
spaces: Record<string, string>
transition: Record<string, string>
font: Record<string, string>
}
}
function Select(
props: React.PropsWithChildren<SelectProps>
): React.ReactElement {
const {
name,
icon,
options,
borderless,
onChange,
theme,
...restProps
} = props
const [bodyElement, setBodyElement] = useState(undefined)
useEffect(() => {
setBodyElement(document.body)
}, [])
const inputStyles = {
color: theme.colors.gray,
'&:focus, &:active': {
boxShadow: `0 0 0 2px ${rgba(theme.colors.muted, 1)}`
}
}
const styles: StylesConfig = {
container: (styles) => ({
...styles,
width: '100%',
fontSize: theme.font.sizes.small,
color: theme.colors.gray
}),
control: (styles) => ({
...styles,
border: 0,
flexWrap: 'nowrap',
borderRadius: theme.border.radius,
padding: theme.spaces.xxsmall,
boxShadow: borderless ?? `0 0 0 1px ${rgba(theme.colors.muted, 1)}`,
'&:hover': {
boxShadow: `0 0 0 2px ${rgba(theme.colors.gray, 0.3)}`
},
'&:focus, &:active': {
boxShadow: `0 0 0 2px ${rgba(theme.colors.gray, 0.3)}`
}
}),
dropdownIndicator: (styles) => ({
...styles,
padding: theme.spaces.tiny,
color: theme.colors.gray,
'&:hover': {
color: darken(0.2, theme.colors.gray)
}
}),
indicatorSeparator: () => ({ display: 'none' }),
valueContainer: (styles) => ({
...styles,
paddingLeft: theme.spaces.xsmall,
color: theme.colors.gray,
'&:hover': {
color: darken(0.2, theme.colors.gray)
}
}),
placeholder: (styles) => ({
...styles,
marginLeft: theme.spaces.xsmall,
marginRight: theme.spaces.xsmall,
inputStyles
}),
input: (styles) => ({
...styles,
inputStyles
}),
singleValue: (styles) => ({
...styles,
marginLeft: theme.spaces.xsmall,
marginRight: theme.spaces.xsmall
}),
option: (styles, state) => ({
...styles,
fontSize: theme.font.sizes.small,
background: 'transparent',
cursor: 'pointer',
color: state.isSelected ? theme.colors.secondary : theme.colors.primary,
fontWeight: state.isSelected ? 'bolder' : 'normal',
transition: theme.transition.ease,
'&:hover': {
color: theme.colors.secondary,
fontWeight: 'bolder'
}
}),
menu: (styles) => ({ ...styles, zIndex: 9999 }),
menuPortal: (styles) => ({ ...styles, zIndex: 9999 })
}
const ValueContainer = ({ children, ...props }) => {
return (
components.ValueContainer && (
<components.ValueContainer {...props}>
{Boolean(children) &&
Boolean(icon) &&
React.cloneElement(icon, {
style: { position: 'absolute', left: 6 }
})}
{children}
</components.ValueContainer>
)
)
}
return (
<ReactSelect
name={name}
inputId={name}
options={options}
isSearchable={false}
components={{ ValueContainer }}
menuPortalTarget={bodyElement}
onChange={(option: OptionTypeBase) => {
onChange && onChange({ target: { name, value: option } })
}}
styles={styles}
{...restProps}
/>
)
}
export default withTheme(Select)
| typescript |
Explore the delicacies of Thanksgiving recipes straight from celebs' kitchens and enjoy an unforgettable celebration with your family this year. Read on to check out some amazing recipes!
As Thanksgiving approaches, the essence of the holiday beckons, transcending the glitz of celebrity lifestyles. Amidst the familial warmth and traditions, renowned figures like Alicia Keys and Zooey Deschanel generously share glimpses of their Thanksgiving tables. Alicia's innovative turkey-in-a-bag method and Zooey's famed pecan pie illuminate the down-to-earth aspects of these stars. Beyond the spotlight, these culinary creations bridge the gap between fame and relatability, offering a taste of comfort and connection in a world that cherishes the familiar. This Thanksgiving, the spotlight isn't just on the celebrities; it's on the enduring spirit of gratitude and tradition that unites us all. In a world where the familiar is cherished, below are some of the culinary creations from top celebs that will offer a taste of comfort and connection.
Indulge in the warmth of Kourtney Kardashian's Golden Harvest Cornbread Delight— a delectable blend of cornmeal, almond milk, and a touch of buttermilk, baked to perfection in a coconut oil-greased skillet.
1. Begin by preheating your oven to 425°F (218°C).
2. In a mixing bowl, blend together cornmeal, flour, salt, sugar, baking powder, and baking soda.
3. Gradually incorporate almond milk, buttermilk, beaten eggs, and melted butter, whisking until a smooth batter forms.
4. Grease a 9-inch cast iron skillet or casserole dish with coconut oil.
5. Pour the prepared batter into the skillet, ensuring an even distribution.
6. Bake in the preheated oven for approximately 25 minutes or until a toothpick inserted into the center comes out clean.
7. This delightful cornbread recipe serves 6-8, offering a golden, moist treat with a perfect balance of flavors.
Discover the symphony of flavors with Alicia Keys' Turkey in a Bag—a culinary masterpiece that harmonizes succulent roast turkey with a medley of aromatic herbs, sealed in a bag for a melody of tenderness and taste that's bound to be a holiday hit.
1. Begin by preheating your oven to 350°F (177°C).
2. Ensure the turkey is neck and giblet-free.
3. Rinse the turkey thoroughly with cold water, then rub it with vinegar and pat it dry with paper towels.
4. Massage the turkey's skin with garlic cloves, followed by a generous coating of butter.
5. Create a spice mix in a bowl using garlic powder, paprika, salt, pepper, and basil. Rub half of this mix under the skin, on the breast and back. Tuck rosemary sprigs and bay leaves under the skin.
6. Stuff the turkey cavity with chopped apples, onions, and bay leaves.
7. Prevent the oven bag from bursting by rubbing its inside with flour.
8. Add a portion of the remaining chopped onions and apples to the oven bag, reserving some outside for garnish.
9. Place the prepared turkey, breast side up, into the oven bag on top of onions and apples. Cut slits into the bag for steam release, then tie it closed.
10. Roast in the oven for 2–3 hours, ensuring the turkey reaches an internal temperature of 180°F (82°C).
11. Carefully cut open the top of the bag, removing the turkey. Discard the vegetables, place the turkey on a serving dish, and let it rest for 20 minutes. Garnish with the roasted apples and onions before serving. This delightful recipe serves 8 with a perfect blend of flavors and tenderness.
Dive into the luscious world of Gwyneth Paltrow's Vibrant Cranberry Symphony—a tantalizing chutney that weaves together the zing of cranberries with a medley of spices, creating a harmonious burst of flavors.
1. In a saucepan, bring a delightful fusion of sugar and water to a gentle boil.
2. Introduce the remaining ingredients to the bubbling concoction, then reduce the heat to low, allowing the symphony of flavors to simmer for approximately ten minutes until a tantalizing thickness is achieved.
3. Let the chutney gracefully cool before presenting it to the eager palates of your guests. This exquisite creation serves 12, offering a perfect balance of sweetness and spice to elevate any culinary ensemble.
Indulge in the luxurious allure of Oprah's Jewel-Tinted Elixir: The Pomegranate Glamour Martini. This enticing blend of pomegranate juice, citrus-infused vodka, and Cointreau, shaken and served in chilled glasses, delivers a sophisticated libation perfect for toasting special moments.
1. In a shaker, combine 1 1/2 cups of pomegranate juice, 2 oz of absolute citrus-infused vodka, and 1 oz of Cointreau liqueur.
2. Add 1 cup of ice to the shaker.
3. Shake the ingredients thoroughly.
4. Pour the mixture into chilled martini glasses.
5. Optionally, add a splash of sparkling water and a squeeze of lemon to each glass.
6. Garnish the glasses with pomegranate fruit.
7. This delightful Pomegranate Glamour Martini recipe serves 2, offering a refreshing and vibrant cocktail experience.
| english |
<filename>resources/js/src/store/post/dist/modulePostListActions.dev.js
"use strict";
Object.defineProperty(exports, "__esModule", {
value: true
});
exports["default"] = void 0;
var _axios = _interopRequireDefault(require("../../plugins/axios.js"));
function _interopRequireDefault(obj) { return obj && obj.__esModule ? obj : { "default": obj }; }
/*=========================================================================================
File Name: moduleCalendarActions.js
Description: Calendar Module Actions
----------------------------------------------------------------------------------------
Item Name: Vuexy - Vuejs, HTML & Laravel Admin Dashboard Template
Author: Pixinvent
Author URL: https://www.dijitalreklam.org
==========================================================================================*/
var _default = {
addItem: function addItem(_ref, data) {
var commit = _ref.commit;
return new Promise(function (resolve, reject) {
_axios["default"].post('/api/post', {
title: data.title,
description: data.description,
category_id: data.category,
content: data.content,
seo_title: data.seo_title,
seo_description: data.seo_description,
status: data.status,
options: data.options,
image: data.image,
type: data.type
}).then(function (response) {
if (data.type === 'page') commit('ADD_PAGE', Object.assign(data, {
id: response.data.id,
title: data.title,
url: data.title,
description: data.description,
category_id: data.category,
content: data.content,
seo_title: data.seo_title,
seo_description: data.seo_description,
image: data.image,
type: data.type,
status: data.status
}));
if (data.type === 'post') commit('ADD_ITEM', Object.assign(data, {
id: response.data.id,
title: data.title,
url: data.title,
description: data.description,
category_id: data.category,
content: data.content,
seo_title: data.seo_title,
seo_description: data.seo_description,
image: data.image,
video: data.video,
type: data.type,
status: data.status
}));
if (data.type === 'product') commit('ADD_PRODUCT', Object.assign(data, {
id: response.data.id,
title: data.title,
url: data.title,
description: data.description,
category_id: data.category,
options: data.options,
content: data.content,
seo_title: data.seo_title,
seo_description: data.seo_description,
image: data.image,
type: data.type,
status: data.status
}));
resolve(response);
})["catch"](function (error) {
reject(error);
});
});
},
addCategory: function addCategory(_ref2, data) {
var commit = _ref2.commit;
return new Promise(function (resolve, reject) {
_axios["default"].post('/api/addCategory', data).then(function (response) {
commit('ADD_CATEGORY', Object.assign(data, {
id: response.data.id,
title: data.title,
url: data.title,
seo_title: data.seo_title,
seo_description: data.seo_description
}));
resolve(response);
})["catch"](function (error) {
reject(error);
});
});
},
fetchItems: function fetchItems(_ref3) {
var commit = _ref3.commit;
return new Promise(function (resolve, reject) {
_axios["default"].get('/api/post').then(function (response) {
//console.log('POST ACTION - POSTS:',response.data.posts)
response.data.posts.forEach(function (element) {
var page = response.data.posts.filter(function (element) {
return element.type === 'page';
});
var post = response.data.posts.filter(function (element) {
return element.type === 'post';
});
var service = response.data.posts.filter(function (element) {
return element.type === 'service';
});
var product = response.data.posts.filter(function (element) {
return element.type === 'product';
});
var certificate = response.data.posts.filter(function (element) {
return element.type === 'certificate';
}); // console.log('PRODUCT ACTION - POSTS:',product)
commit('SET_PAGES', page);
commit('SET_ITEM', post);
commit('SET_SERVICES', service);
commit('SET_PRODUCTS', product);
commit('SET_CERTIFICATE', certificate);
});
commit('SET_CATEGORIES', response.data.categories);
resolve(response);
})["catch"](function (error) {
reject(error);
});
});
},
updateItem: function updateItem(_ref4, data) {
var commit = _ref4.commit;
return new Promise(function (resolve, reject) {
//console.log('payload',data)
_axios["default"].patch("/api/post/".concat(data.id), data).then(function (response) {
if (data.type === 'post') commit('UPDATE_ITEM', data);
if (data.type === 'page') commit('UPDATE_PAGE', data);
if (data.type === 'category') commit('UPDATE_CATEGORY', data);
if (data.type === 'certificate') commit('UPDATE_CERTIFICATE', data);
if (data.type === 'service') commit('UPDATE_SERVICES', data);
resolve(response);
})["catch"](function (error) {
reject(error);
});
});
},
removeItem: function removeItem(_ref5, itemId) {
var commit = _ref5.commit;
return new Promise(function (resolve, reject) {
_axios["default"]["delete"]("/api/post/".concat(itemId)).then(function (response) {
commit('REMOVE_ITEM', itemId);
resolve(response);
})["catch"](function (error) {
reject(error);
});
});
},
removeCategory: function removeCategory(_ref6, itemId) {
var commit = _ref6.commit;
return new Promise(function (resolve, reject) {
_axios["default"].post('/api/removeCategory', {
id: itemId
}).then(function (response) {
commit('REMOVE_CATEGORY', itemId);
resolve(response);
})["catch"](function (error) {
reject(error);
});
});
},
//Custom
fetchMyCases: function fetchMyCases(_ref7) {
var commit = _ref7.commit;
return new Promise(function (resolve, reject) {
_axios["default"].get('/api/cases/my-cases').then(function (response) {
// console.log('POST ACTION - POSTS:',response.data.posts)
response.data.posts.forEach(function (element) {
// const page = response.data.posts.filter(element => element.type === 'page');
// const post = response.data.posts.filter(element => element.type === 'post');
// const product = response.data.posts.filter(element => element.type === 'product');
// const certificate = response.data.posts.filter(element => element.type === 'certificate'):
var service = response.data.posts.filter(function (element) {
return element.type === 'service';
});
commit('SET_MyServices', service);
});
resolve(response);
})["catch"](function (error) {
reject(error);
});
});
},
fetchMyContracts: function fetchMyContracts(_ref8) {
var commit = _ref8.commit;
return new Promise(function (resolve, reject) {
_axios["default"].get('/api/contract').then(function (response) {
// console.log('POST ACTION - CONTRACTS:',response.data)
commit('SET_CONTRACTS', response.data);
resolve(response);
})["catch"](function (error) {
reject(error);
});
});
},
createContract: function createContract(_ref9, data) {
var commit = _ref9.commit;
return new Promise(function (resolve, reject) {
_axios["default"].post('/api/contract', data).then(function (response) {
commit('ADD_CONTRACT', Object.assign(data, {
id: response.data.id,
post_id: data.post_id,
from: data.id
}));
resolve(response);
})["catch"](function (error) {
reject(error);
});
});
},
updateContract: function updateContract(_ref10, data) {
var commit = _ref10.commit;
return new Promise(function (resolve, reject) {
//console.log('payload',data)
_axios["default"].patch("/api/contract/".concat(data.id), data).then(function (response) {
commit('UPDATE_CONTRACTS', data);
resolve(response);
})["catch"](function (error) {
reject(error);
});
});
},
fetchCountries: function fetchCountries(_ref11) {
var commit = _ref11.commit;
return new Promise(function (resolve, reject) {
_axios["default"].get('/geo').then(function (response) {
// console.log('POST ACTION - POSTS:',response.data)
commit('SET_COUNTRIES', response.data);
resolve(response);
})["catch"](function (error) {
reject(error);
});
});
},
fetchCities: function fetchCities(_ref12, data) {
var commit = _ref12.commit;
return new Promise(function (resolve, reject) {
//console.log('payload',data)
_axios["default"].get("/geo/".concat(data)).then(function (response) {
commit('SET_CITIES', response.data);
resolve(response);
})["catch"](function (error) {
reject(error);
});
});
}
};
exports["default"] = _default;
| javascript |
<gh_stars>0
import React, { Component, useState } from 'react';
import {
View,
Text,
FlatList,
TouchableOpacity,
StyleSheet,
ActivityIndicator,
Alert,
AsyncStorage,
ScrollView,
TextInput,
} from 'react-native';
import SearchableDropdown from 'react-native-searchable-dropdown';
import { SearchBar, ListItem } from 'react-native-elements';
import { useIsFocused } from '@react-navigation/native';
import { useNavigation } from '@react-navigation/native';
import { DataTable } from 'react-native-paper';
var count = 0;
function AddToOrders({ item }) {
return (
<View style={{ alignSelf: 'center', zIndex: 100, elevation: 100 }}>
<Text>Agregar a la orden</Text>
<TextInput value={item.description} editable={false} />
<TextInput value={item.unit_price} />
<TextInput placeholder={'Detalles '} />
<TextInput placeholder={'Cantidad '} />
</View>
);
}
function AddProducts() {
const navigation = useNavigation();
navigation.navigate('AddProductsToOrder');
}
export default function Screen({ route, navigation }) {
const isFocused = useIsFocused();
if (isFocused) {
return <SeleccionProducto navigation={navigation}/>;
} else {
return <View />;
}
}
export class SeleccionProducto extends Component {
constructor(props) {
super(props);
this.state = {
serverData: [],
arrayholder: [],
search: '',
isLoading: false,
text: '',
editing: false,
refreshing: false,
error: false,
showItems: true,
orden: [],
};
this.orden = [];
this.navigation = this.props.navigation;
}
render() {
return this.state.isLoading ? (
<View style={{ flex: 1, justifyContent: 'center', alignItems: 'center' }}>
<ActivityIndicator size={'large'} />
</View>
) : (
<View style={styles.container}>
<View
style={{
flex: 1,
flexDirection: 'row',
padding: 5,
justifyContent: 'center',
alignItems: 'center',
}}>
<TouchableOpacity
style={{
paddingVertical: 10,
paddingHorizontal: 10,
backgroundColor: 'red',
marginHorizontal: 10,
borderRadius: 10,
}}
onPress={() => {
this.setState({ orden: [] });
}}>
<Text style={{ color: '#fff' }}>Eliminar orden</Text>
</TouchableOpacity>
<TouchableOpacity
style={{
paddingVertical: 10,
paddingHorizontal: 30,
backgroundColor: 'blue',
marginHorizontal: 10,
borderRadius: 10,
}}
onPress={()=>{alert(this.navigation)}}>
<Text style={{ color: '#fff' }}>Agregar productos</Text>
</TouchableOpacity>
</View>
<View style={{ flex: 6 }}>
<Text
style={{
fontSize: 20,
fontWeight: 'bold',
paddingVertical: 20,
paddingHorizontal: 10,
}}>
Esta venta
</Text>
<DataTable>
<DataTable.Header>
<DataTable.Title>Nombre</DataTable.Title>
<DataTable.Title numeric>Cantidad</DataTable.Title>
<DataTable.Title numeric>Precio</DataTable.Title>
</DataTable.Header>
<ScrollView style={{ maxHeight: 250 }}>
{this.state.orden.map(item => {
return <Product item={item} modal={'orden'} />;
})}
</ScrollView>
</DataTable>
</View>
<View
style={{
flex: 1,
flexDirection: 'row',
padding: 5,
justifyContent: 'center',
alignItems: 'center',
}}>
<TouchableOpacity
style={{
padding: 15,
backgroundColor: 'red',
marginHorizontal: 10,
borderRadius: 10,
}}>
<Text style={{ color: '#fff' }}>cancelar</Text>
</TouchableOpacity>
<TouchableOpacity
style={{
padding: 15,
backgroundColor: 'green',
marginHorizontal: 10,
borderRadius: 10,
}}>
<Text style={{ color: '#fff' }}>Cobrar</Text>
</TouchableOpacity>
</View>
</View>
);
}
}
function Product({ item, modal }) {
if (modal == 'orden') {
return (
<DataTable.Row>
<DataTable.Cell>
<Text style={{ fontSize: 10 }}>{item.description}</Text>
</DataTable.Cell>
<DataTable.Cell numeric>{item.stock}</DataTable.Cell>
<DataTable.Cell numeric>{item.unit_price}</DataTable.Cell>
</DataTable.Row>
);
} else {
return (
<TouchableOpacity style={styles.product}>
<Text style={styles.productDesc}>{item.description}</Text>
<Text style={styles.productDetail}>{'Cantidad: ' + item.stock}</Text>
<Text style={styles.productDetail}>{'Costo: ' + item.cost}</Text>
</TouchableOpacity>
);
}
}
var styles = StyleSheet.create({
container: {
flex: 1,
backgroundColor: '#fff',
},
product: {
alignSelf: 'center',
width: '90%',
borderWidth: 0,
marginVertical: 5,
paddingHorizontal: 10,
paddingVertical: 5,
elevation: 5,
backgroundColor: '#FFF',
shadowColor: 'black',
shadowOffset: { width: 0, height: 2 },
shadowOpacity: 0.3,
shadowRadius: 5,
},
productDesc: {
color: '#6435A6',
fontWeight: 'bold',
fontFamily: 'centuri-gothic',
fontSize: 16,
},
productDetail: {
color: '#B885FF',
fontSize: 12,
},
});
| javascript |
<reponame>bcvsolutions/CzechIdMng
package eu.bcvsolutions.idm.acc.sync;
import java.util.List;
import java.util.UUID;
import java.util.stream.Collectors;
import javax.persistence.EntityManager;
import javax.persistence.Query;
import org.junit.After;
import org.junit.Assert;
import org.junit.Before;
import org.junit.FixMethodOrder;
import org.junit.Test;
import org.junit.runners.MethodSorters;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.context.ApplicationContext;
import org.springframework.data.domain.Page;
import org.springframework.transaction.annotation.Transactional;
import eu.bcvsolutions.idm.InitApplicationData;
import eu.bcvsolutions.idm.acc.TestHelper;
import eu.bcvsolutions.idm.acc.domain.OperationResultType;
import eu.bcvsolutions.idm.acc.domain.ReconciliationMissingAccountActionType;
import eu.bcvsolutions.idm.acc.domain.SynchronizationActionType;
import eu.bcvsolutions.idm.acc.domain.SynchronizationLinkedActionType;
import eu.bcvsolutions.idm.acc.domain.SynchronizationMissingEntityActionType;
import eu.bcvsolutions.idm.acc.domain.SynchronizationUnlinkedActionType;
import eu.bcvsolutions.idm.acc.domain.SystemEntityType;
import eu.bcvsolutions.idm.acc.domain.SystemOperationType;
import eu.bcvsolutions.idm.acc.dto.AbstractSysSyncConfigDto;
import eu.bcvsolutions.idm.acc.dto.SysRoleSystemAttributeDto;
import eu.bcvsolutions.idm.acc.dto.SysRoleSystemDto;
import eu.bcvsolutions.idm.acc.dto.SysSchemaAttributeDto;
import eu.bcvsolutions.idm.acc.dto.SysSchemaObjectClassDto;
import eu.bcvsolutions.idm.acc.dto.SysSyncActionLogDto;
import eu.bcvsolutions.idm.acc.dto.SysSyncItemLogDto;
import eu.bcvsolutions.idm.acc.dto.SysSyncLogDto;
import eu.bcvsolutions.idm.acc.dto.SysSyncRoleConfigDto;
import eu.bcvsolutions.idm.acc.dto.SysSystemAttributeMappingDto;
import eu.bcvsolutions.idm.acc.dto.SysSystemDto;
import eu.bcvsolutions.idm.acc.dto.SysSystemMappingDto;
import eu.bcvsolutions.idm.acc.dto.filter.SysRoleSystemAttributeFilter;
import eu.bcvsolutions.idm.acc.dto.filter.SysRoleSystemFilter;
import eu.bcvsolutions.idm.acc.dto.filter.SysSchemaAttributeFilter;
import eu.bcvsolutions.idm.acc.dto.filter.SysSyncActionLogFilter;
import eu.bcvsolutions.idm.acc.dto.filter.SysSyncConfigFilter;
import eu.bcvsolutions.idm.acc.dto.filter.SysSyncItemLogFilter;
import eu.bcvsolutions.idm.acc.dto.filter.SysSyncLogFilter;
import eu.bcvsolutions.idm.acc.dto.filter.SysSystemAttributeMappingFilter;
import eu.bcvsolutions.idm.acc.dto.filter.SysSystemMappingFilter;
import eu.bcvsolutions.idm.acc.entity.TestRoleResource;
import eu.bcvsolutions.idm.acc.service.api.SysRoleSystemAttributeService;
import eu.bcvsolutions.idm.acc.service.api.SysRoleSystemService;
import eu.bcvsolutions.idm.acc.service.api.SysSchemaAttributeService;
import eu.bcvsolutions.idm.acc.service.api.SysSyncActionLogService;
import eu.bcvsolutions.idm.acc.service.api.SysSyncConfigService;
import eu.bcvsolutions.idm.acc.service.api.SysSyncItemLogService;
import eu.bcvsolutions.idm.acc.service.api.SysSyncLogService;
import eu.bcvsolutions.idm.acc.service.api.SysSystemAttributeMappingService;
import eu.bcvsolutions.idm.acc.service.api.SysSystemMappingService;
import eu.bcvsolutions.idm.acc.service.api.SysSystemService;
import eu.bcvsolutions.idm.core.api.dto.IdmIdentityDto;
import eu.bcvsolutions.idm.core.api.dto.IdmIdentityRoleDto;
import eu.bcvsolutions.idm.core.api.dto.IdmRoleCatalogueDto;
import eu.bcvsolutions.idm.core.api.dto.IdmRoleCatalogueRoleDto;
import eu.bcvsolutions.idm.core.api.dto.IdmRoleDto;
import eu.bcvsolutions.idm.core.api.dto.filter.IdmIdentityRoleFilter;
import eu.bcvsolutions.idm.core.api.dto.filter.IdmRoleCatalogueFilter;
import eu.bcvsolutions.idm.core.api.dto.filter.IdmRoleFilter;
import eu.bcvsolutions.idm.core.api.service.ConfigurationService;
import eu.bcvsolutions.idm.core.api.service.IdmIdentityRoleService;
import eu.bcvsolutions.idm.core.api.service.IdmRoleCatalogueRoleService;
import eu.bcvsolutions.idm.core.api.service.IdmRoleCatalogueService;
import eu.bcvsolutions.idm.core.api.service.IdmRoleService;
import eu.bcvsolutions.idm.core.eav.api.domain.PersistentType;
import eu.bcvsolutions.idm.core.eav.api.dto.IdmFormAttributeDto;
import eu.bcvsolutions.idm.core.eav.api.dto.IdmFormValueDto;
import eu.bcvsolutions.idm.core.eav.api.dto.filter.IdmFormAttributeFilter;
import eu.bcvsolutions.idm.core.eav.api.service.FormService;
import eu.bcvsolutions.idm.core.eav.api.service.IdmFormAttributeService;
import eu.bcvsolutions.idm.core.model.entity.IdmIdentity;
import eu.bcvsolutions.idm.test.api.AbstractIntegrationTest;
/**
*
* @author <NAME>
*
*/
@FixMethodOrder(MethodSorters.NAME_ASCENDING)
public class RoleWorkflowAdSyncTest extends AbstractIntegrationTest{
private static final String ROLE_NAME = "nameOfRole";
private static final String SYNC_CONFIG_NAME = "syncConfigNameContract";
private static final String ATTRIBUTE_NAME = "__NAME__";
private static final String ATTRIBUTE_DN = "EAV_ATTRIBUTE";
private static final String ATTRIBUTE_MEMBER = "MEMBER";
private static final String ATTRIBUTE_DN_VALUE = "CN=" + ROLE_NAME + ",OU=Office,OU=Prague,DC=bcvsolutions,DC=eu";
private static final String CATALOGUE_CODE_FIRST = "Office";
private static final String CATALOGUE_CODE_SECOND = "Prague";
private static final String SYSTEM_NAME = "TestSystem" + System.currentTimeMillis();
private final String wfExampleKey = "syncRoleLdap";
private static final String CATALOG_FOLDER = "TestCatalog" + System.currentTimeMillis();
@Autowired
private TestHelper helper;
@Autowired
private SysSystemService systemService;
@Autowired
private SysSystemMappingService systemMappingService;
@Autowired
private SysSystemAttributeMappingService schemaAttributeMappingService;
@Autowired
private SysSchemaAttributeService schemaAttributeService;
@Autowired
private SysSyncConfigService syncConfigService;
@Autowired
private SysSyncLogService syncLogService;
@Autowired
private SysSyncItemLogService syncItemLogService;
@Autowired
private SysSyncActionLogService syncActionLogService;
@Autowired
private EntityManager entityManager;
@Autowired
private ApplicationContext applicationContext;
@Autowired
private IdmRoleService roleService;
@Autowired
private FormService formService;
@Autowired
private IdmRoleCatalogueService roleCatalogueService;
@Autowired
private ConfigurationService configurationService;
@Autowired
private SysRoleSystemAttributeService roleSystemAttributeService;
@Autowired
private SysRoleSystemService roleSystemService;
@Autowired
private IdmRoleCatalogueRoleService roleCatalogueRoleService;
@Autowired
private IdmIdentityRoleService identityRoleService;
@Autowired
private IdmFormAttributeService formAttributeService;
@Before
public void init() {
loginAsAdmin(InitApplicationData.ADMIN_USERNAME);
configurationService.setValue("idm.pub.acc.syncRole.system.mapping.attributeRoleIdentificator", ATTRIBUTE_DN);
}
@After
public void logout() {
if (roleService.getByCode(ROLE_NAME) != null) {
roleService.delete(roleService.getByCode(ROLE_NAME));
}
if (systemService.getByCode(SYSTEM_NAME) != null) {
systemService.delete(systemService.getByCode(SYSTEM_NAME));
}
configurationService.deleteValue("idm.pub.acc.syncRole.system.mapping.attributeRoleIdentificator");
super.logout();
}
@Test
public void n5_testSyncWithWfSituationMissingEntity() {
SysSystemDto system = initData();
IdmRoleFilter roleFilter = new IdmRoleFilter();
roleFilter.setText(ROLE_NAME);
List<IdmRoleDto> roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(0, roles.size());
Assert.assertNotNull(system);
SysSyncRoleConfigDto config = doCreateSyncConfig(system);
config.setLinkedActionWfKey(wfExampleKey);
config.setMissingAccountActionWfKey(wfExampleKey);
config.setMissingEntityActionWfKey(wfExampleKey);
config.setUnlinkedActionWfKey(wfExampleKey);
config = (SysSyncRoleConfigDto) syncConfigService.save(config);
// Start sync
helper.startSynchronization(config);
SysSyncLogDto log = checkSyncLog(config, SynchronizationActionType.MISSING_ENTITY, 1,
OperationResultType.WF);
Assert.assertFalse(log.isRunning());
Assert.assertFalse(log.isContainsError());
roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(1, roles.size());
IdmRoleDto role = roles.get(0);
List<IdmFormValueDto> dnValues = formService.getValues(role, ATTRIBUTE_DN);
Assert.assertEquals(1, dnValues.size());
Assert.assertEquals(ATTRIBUTE_DN_VALUE, dnValues.get(0).getValue());
IdmRoleCatalogueDto catalogueFirst = getCatalogueByCode(CATALOGUE_CODE_FIRST);
IdmRoleCatalogueDto catalogueSecond = getCatalogueByCode(CATALOGUE_CODE_SECOND);
Assert.assertNotNull(catalogueFirst);
Assert.assertNotNull(catalogueSecond);
// Delete log
syncLogService.delete(log);
}
@Test
public void n5_testSyncWithWfSituationLinked() {
createRolesInSystem();
final String newDN = "CN=" + ROLE_NAME + ",OU=Flat,OU=Pardubice,DC=bcvsolutions,DC=eu";
this.getBean().initIdentityData(ROLE_NAME, newDN);
IdmRoleFilter roleFilter = new IdmRoleFilter();
roleFilter.setText(ROLE_NAME);
List<IdmRoleDto> roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(1, roles.size());
SysSystemDto systemDto = systemService.getByCode(SYSTEM_NAME);
Assert.assertNotNull(systemDto);
SysSyncConfigFilter filter = new SysSyncConfigFilter();
filter.setSystemId(systemDto.getId());
List<AbstractSysSyncConfigDto> syncConfig = syncConfigService.find(filter, null).getContent();
Assert.assertEquals(1, syncConfig.size());
// Start sync
helper.startSynchronization(syncConfig.get(0));
SysSyncLogDto log = checkSyncLog(syncConfig.get(0), SynchronizationActionType.LINKED, 1,
OperationResultType.WF);
Assert.assertFalse(log.isRunning());
Assert.assertFalse(log.isContainsError());
roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(1, roles.size());
IdmRoleDto role = roles.get(0);
List<IdmFormValueDto> dnValues = formService.getValues(role, ATTRIBUTE_DN);
Assert.assertEquals(1, dnValues.size());
Assert.assertEquals(newDN, dnValues.get(0).getValue());
IdmRoleCatalogueDto catalogueFirst = getCatalogueByCode("Flat");
IdmRoleCatalogueDto catalogueSecond = getCatalogueByCode("Pardubice");
Assert.assertNotNull(catalogueFirst);
Assert.assertNotNull(catalogueSecond);
// Delete log
syncLogService.delete(log);
}
@Test
public void n5_testSyncWithWfSituationUnlinked() {
SysSystemDto system = initData();
IdmRoleFilter roleFilter = new IdmRoleFilter();
roleFilter.setText(ROLE_NAME);
List<IdmRoleDto> roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(0, roles.size());
IdmRoleDto role = new IdmRoleDto();
role.setCode(ROLE_NAME);
roleService.save(role);
Assert.assertNotNull(system);
SysSyncRoleConfigDto config = doCreateSyncConfig(system);
config.setLinkedActionWfKey(wfExampleKey);
config.setMissingAccountActionWfKey(wfExampleKey);
config.setMissingEntityActionWfKey(wfExampleKey);
config.setUnlinkedActionWfKey(wfExampleKey);
config = (SysSyncRoleConfigDto) syncConfigService.save(config);
// Start sync
helper.startSynchronization(config);
SysSyncLogDto log = checkSyncLog(config, SynchronizationActionType.UNLINKED, 1,
OperationResultType.WF);
Assert.assertFalse(log.isRunning());
Assert.assertFalse(log.isContainsError());
roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(1, roles.size());
role = roles.get(0);
List<IdmFormValueDto> dnValues = formService.getValues(role, ATTRIBUTE_DN);
Assert.assertEquals(1, dnValues.size());
Assert.assertEquals(ATTRIBUTE_DN_VALUE, dnValues.get(0).getValue());
IdmRoleCatalogueDto catalogueFirst = getCatalogueByCode(CATALOGUE_CODE_FIRST);
IdmRoleCatalogueDto catalogueSecond = getCatalogueByCode(CATALOGUE_CODE_SECOND);
Assert.assertNotNull(catalogueFirst);
Assert.assertNotNull(catalogueSecond);
// Delete log
syncLogService.delete(log);
}
@Test
public void n5_testSyncWithWfSituationMissingAccount() {
createRolesInSystem();
this.getBean().deleteAllResourceData();
IdmRoleFilter roleFilter = new IdmRoleFilter();
roleFilter.setText(ROLE_NAME);
List<IdmRoleDto> roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(1, roles.size());
SysSystemDto systemDto = systemService.getByCode(SYSTEM_NAME);
Assert.assertNotNull(systemDto);
SysSyncConfigFilter filter = new SysSyncConfigFilter();
filter.setSystemId(systemDto.getId());
List<AbstractSysSyncConfigDto> syncConfig = syncConfigService.find(filter, null).getContent();
Assert.assertEquals(1, syncConfig.size());
// Start sync
helper.startSynchronization(syncConfig.get(0));
SysSyncLogDto log = checkSyncLog(syncConfig.get(0), SynchronizationActionType.MISSING_ACCOUNT, 1,
OperationResultType.WF);
Assert.assertFalse(log.isRunning());
Assert.assertFalse(log.isContainsError());
roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(0, roles.size());
// Delete log
syncLogService.delete(log);
}
@Test
public void n1_testSyncWithWfSituationMissingEntityDoNotCreateCatalog() {
configurationService.setBooleanValue("idm.pub.acc.syncRole.roleCatalog.ResolveCatalog", false);
SysSystemDto system = initData();
IdmRoleFilter roleFilter = new IdmRoleFilter();
roleFilter.setText(ROLE_NAME);
List<IdmRoleDto> roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(0, roles.size());
Assert.assertNotNull(system);
SysSyncRoleConfigDto config = doCreateSyncConfig(system);
config.setLinkedActionWfKey(wfExampleKey);
config.setMissingAccountActionWfKey(wfExampleKey);
config.setMissingEntityActionWfKey(wfExampleKey);
config.setUnlinkedActionWfKey(wfExampleKey);
config = (SysSyncRoleConfigDto) syncConfigService.save(config);
// Start sync
helper.startSynchronization(config);
SysSyncLogDto log = checkSyncLog(config, SynchronizationActionType.MISSING_ENTITY, 1,
OperationResultType.WF);
Assert.assertFalse(log.isRunning());
Assert.assertFalse(log.isContainsError());
roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(1, roles.size());
IdmRoleDto role = roles.get(0);
List<IdmFormValueDto> dnValues = formService.getValues(role, ATTRIBUTE_DN);
Assert.assertEquals(1, dnValues.size());
Assert.assertEquals(ATTRIBUTE_DN_VALUE, dnValues.get(0).getValue());
IdmRoleCatalogueDto catalogueFirst = getCatalogueByCode(CATALOGUE_CODE_FIRST);
IdmRoleCatalogueDto catalogueSecond = getCatalogueByCode(CATALOGUE_CODE_SECOND);
Assert.assertNull(catalogueFirst);
Assert.assertNull(catalogueSecond);
// Delete log
syncLogService.delete(log);
configurationService.setBooleanValue("idm.pub.acc.syncRole.roleCatalog.ResolveCatalog", true);
}
@Test
public void n8_testSyncWithWfSituationMissingEntityOneFolderCatalog() {
configurationService.setValue("idm.pub.acc.syncRole.roles.allToOneCatalog", CATALOG_FOLDER);
SysSystemDto system = initData();
IdmRoleFilter roleFilter = new IdmRoleFilter();
roleFilter.setText(ROLE_NAME);
List<IdmRoleDto> roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(0, roles.size());
Assert.assertNotNull(system);
SysSyncRoleConfigDto config = doCreateSyncConfig(system);
config.setLinkedActionWfKey(wfExampleKey);
config.setMissingAccountActionWfKey(wfExampleKey);
config.setMissingEntityActionWfKey(wfExampleKey);
config.setUnlinkedActionWfKey(wfExampleKey);
config = (SysSyncRoleConfigDto) syncConfigService.save(config);
// Start sync
helper.startSynchronization(config);
SysSyncLogDto log = checkSyncLog(config, SynchronizationActionType.MISSING_ENTITY, 1,
OperationResultType.WF);
Assert.assertFalse(log.isRunning());
Assert.assertFalse(log.isContainsError());
roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(1, roles.size());
IdmRoleDto role = roles.get(0);
List<IdmFormValueDto> dnValues = formService.getValues(role, ATTRIBUTE_DN);
Assert.assertEquals(1, dnValues.size());
Assert.assertEquals(ATTRIBUTE_DN_VALUE, dnValues.get(0).getValue());
IdmRoleCatalogueDto catalogueFirst = getCatalogueByCode(CATALOG_FOLDER);
Assert.assertNotNull(catalogueFirst);
Assert.assertFalse(!isRoleInCatalogue(role.getId(), CATALOG_FOLDER));
// Delete log
syncLogService.delete(log);
}
@Test
public void n9_testSyncWithWfSituationMissingEntityAddResource() {
String USER_SYSTEM_NAME = "TestName001";
String overridedAttributeName = "EAV_ATTRIBUTE";
configurationService.setValue("idm.pub.acc.syncRole.provisioningOfIdentities.system.code", USER_SYSTEM_NAME);
configurationService.setValue("idm.pub.acc.syncRole.system.mapping.attributeMemberOf", helper.getSchemaColumnName(overridedAttributeName));
SysSystemDto userSystem = initData(USER_SYSTEM_NAME, true);
SysSystemDto system = initData();
IdmRoleFilter roleFilter = new IdmRoleFilter();
roleFilter.setText(ROLE_NAME);
List<IdmRoleDto> roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(0, roles.size());
Assert.assertNotNull(system);
SysSyncRoleConfigDto config = doCreateSyncConfig(system);
config.setLinkedActionWfKey(wfExampleKey);
config.setMissingAccountActionWfKey(wfExampleKey);
config.setMissingEntityActionWfKey(wfExampleKey);
config.setUnlinkedActionWfKey(wfExampleKey);
config = (SysSyncRoleConfigDto) syncConfigService.save(config);
// Start sync
helper.startSynchronization(config);
SysSyncLogDto log = checkSyncLog(config, SynchronizationActionType.MISSING_ENTITY, 1,
OperationResultType.WF);
Assert.assertFalse(log.isRunning());
Assert.assertFalse(log.isContainsError());
roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(1, roles.size());
IdmRoleDto role = roles.get(0);
List<IdmFormValueDto> dnValues = formService.getValues(role, ATTRIBUTE_DN);
Assert.assertEquals(1, dnValues.size());
Assert.assertEquals(ATTRIBUTE_DN_VALUE, dnValues.get(0).getValue());
// resource existing
SysRoleSystemAttributeDto systemAttribute = getSystemAttribute(userSystem.getId(), overridedAttributeName, role.getId());
Assert.assertNotNull(systemAttribute);
String transformationScript = "\"" + ATTRIBUTE_DN_VALUE + "\"";
Assert.assertEquals(systemAttribute.getTransformToResourceScript(), transformationScript);
// Delete log
syncLogService.delete(log);
configurationService.deleteValue("idm.pub.acc.syncRole.provisioningOfIdentities.system.code");
configurationService.deleteValue("idm.pub.acc.syncRole.system.mapping.attributeMemberOf");
}
@Test
public void n91_testSyncWithWfSituationMissingResolveMember() {
String valueOfMemberAtt = getHelper().createName();
String nameOfEav = "externalIdentifier";
configurationService.setValue("idm.pub.acc.syncRole.identity.eav.externalIdentifier.code", nameOfEav);
configurationService.setValue("idm.pub.acc.syncRole.roles.attributeNameOfMembership", helper.getSchemaColumnName(ATTRIBUTE_MEMBER));
IdmIdentityDto identity = this.getHelper().createIdentity();
IdmFormAttributeDto attribute = helper.createEavAttribute(nameOfEav, IdmIdentity.class, PersistentType.SHORTTEXT);
helper.setEavValue(identity, attribute, IdmIdentity.class, valueOfMemberAtt, PersistentType.SHORTTEXT);
SysSystemDto system = initData();
this.getBean().deleteAllResourceData();
this.getBean().addRoleToResource(ROLE_NAME, ATTRIBUTE_DN, valueOfMemberAtt);
IdmRoleFilter roleFilter = new IdmRoleFilter();
roleFilter.setText(ROLE_NAME);
List<IdmRoleDto> roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(0, roles.size());
IdmIdentityRoleFilter filter = new IdmIdentityRoleFilter();
filter.setIdentityId(identity.getId());
List<IdmIdentityRoleDto> content = identityRoleService.find(filter , null).getContent();
Assert.assertEquals(0, content.size());
Assert.assertNotNull(system);
SysSyncRoleConfigDto config = doCreateSyncConfig(system);
config.setLinkedActionWfKey(wfExampleKey);
config.setMissingAccountActionWfKey(wfExampleKey);
config.setMissingEntityActionWfKey(wfExampleKey);
config.setUnlinkedActionWfKey(wfExampleKey);
config = (SysSyncRoleConfigDto) syncConfigService.save(config);
// Start sync
helper.startSynchronization(config);
SysSyncLogDto log = checkSyncLog(config, SynchronizationActionType.MISSING_ENTITY, 1,
OperationResultType.WF);
Assert.assertFalse(log.isRunning());
Assert.assertFalse(log.isContainsError());
roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(1, roles.size());
content = identityRoleService.find(filter , null).getContent();
Assert.assertEquals(1, content.size());
identityRoleService.delete(content.get(0));
// Delete log
syncLogService.delete(log);
configurationService.deleteValue("idm.pub.acc.syncRole.provisioningOfIdentities.system.code");
configurationService.deleteValue("idm.pub.acc.syncRole.system.mapping.attributeMemberOf");
}
@Test
public void n92_testSyncWithWfSituationLinkedResolveMember() {
createRolesInSystem();
final String newDN = "CN=" + ROLE_NAME + ",OU=Flat,OU=Pardubice,DC=bcvsolutions,DC=eu";
this.getBean().initIdentityData(ROLE_NAME, newDN);
String valueOfMemberAtt = "" + System.currentTimeMillis();
String nameOfEav = "externalIdentifier";
configurationService.setValue("idm.pub.acc.syncRole.identity.eav.externalIdentifier.code", nameOfEav);
configurationService.setValue("idm.pub.acc.syncRole.roles.attributeNameOfMembership", helper.getSchemaColumnName(ATTRIBUTE_MEMBER));
configurationService.setBooleanValue("idm.pub.acc.syncRole.update.resolveMembership", true);
IdmIdentityDto identity = this.getHelper().createIdentity();
IdmFormAttributeFilter attributeFilter = new IdmFormAttributeFilter();
attributeFilter.setCode(nameOfEav);
IdmFormAttributeDto formAttribute = formAttributeService.find(attributeFilter, null).getContent().stream().findFirst().orElse(null);
Assert.assertNotNull(formAttribute);
helper.setEavValue(identity, formAttribute, IdmIdentity.class, valueOfMemberAtt, PersistentType.SHORTTEXT);
this.getBean().deleteAllResourceData();
this.getBean().addRoleToResource(ROLE_NAME, ATTRIBUTE_DN, valueOfMemberAtt);
IdmRoleFilter roleFilter = new IdmRoleFilter();
roleFilter.setText(ROLE_NAME);
List<IdmRoleDto> roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(1, roles.size()); // role is in already synced ind idm
IdmIdentityRoleFilter filter = new IdmIdentityRoleFilter();
filter.setIdentityId(identity.getId());
List<IdmIdentityRoleDto> content = identityRoleService.find(filter , null).getContent();
Assert.assertEquals(0, content.size()); // identity does not have assigned this role
SysSystemDto systemDto = systemService.getByCode(SYSTEM_NAME);
Assert.assertNotNull(systemDto);
SysSyncConfigFilter syncFilter = new SysSyncConfigFilter();
syncFilter.setSystemId(systemDto.getId());
List<AbstractSysSyncConfigDto> syncConfig = syncConfigService.find(syncFilter, null).getContent();
Assert.assertEquals(1, syncConfig.size()); // find synchronization config to start sync
// Start sync
helper.startSynchronization(syncConfig.get(0));
SysSyncLogDto log = checkSyncLog(syncConfig.get(0), SynchronizationActionType.LINKED, 1,
OperationResultType.WF);
Assert.assertFalse(log.isRunning());
Assert.assertFalse(log.isContainsError());
roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(1, roles.size());
content = identityRoleService.find(filter , null).getContent();
Assert.assertEquals(1, content.size());
identityRoleService.delete(content.get(0));
// Delete log
syncLogService.delete(log);
configurationService.deleteValue("idm.pub.acc.syncRole.provisioningOfIdentities.system.code");
configurationService.deleteValue("idm.pub.acc.syncRole.system.mapping.attributeMemberOf");
configurationService.setBooleanValue("idm.pub.acc.syncRole.update.resolveMembership", false);
}
private SysSyncRoleConfigDto doCreateSyncConfig(SysSystemDto system) {
SysSystemMappingFilter mappingFilter = new SysSystemMappingFilter();
mappingFilter.setEntityType(SystemEntityType.ROLE);
mappingFilter.setSystemId(system.getId());
mappingFilter.setOperationType(SystemOperationType.SYNCHRONIZATION);
List<SysSystemMappingDto> mappings = systemMappingService.find(mappingFilter, null).getContent();
Assert.assertEquals(1, mappings.size());
SysSystemMappingDto mapping = mappings.get(0);
SysSystemAttributeMappingFilter attributeMappingFilter = new SysSystemAttributeMappingFilter();
attributeMappingFilter.setSystemMappingId(mapping.getId());
List<SysSystemAttributeMappingDto> attributes = schemaAttributeMappingService.find(attributeMappingFilter, null)
.getContent();
SysSystemAttributeMappingDto uidAttribute = attributes.stream().filter(attribute -> {
return attribute.isUid();
}).findFirst().orElse(null);
// Create default synchronization config
SysSyncRoleConfigDto syncConfigCustom = new SysSyncRoleConfigDto();
syncConfigCustom.setReconciliation(true);
syncConfigCustom.setCustomFilter(false);
syncConfigCustom.setSystemMapping(mapping.getId());
syncConfigCustom.setCorrelationAttribute(uidAttribute.getId());
syncConfigCustom.setName(SYNC_CONFIG_NAME);
syncConfigCustom.setLinkedAction(SynchronizationLinkedActionType.UPDATE_ENTITY);
syncConfigCustom.setUnlinkedAction(SynchronizationUnlinkedActionType.LINK_AND_UPDATE_ENTITY);
syncConfigCustom.setMissingEntityAction(SynchronizationMissingEntityActionType.CREATE_ENTITY);
syncConfigCustom.setMissingAccountAction(ReconciliationMissingAccountActionType.DELETE_ENTITY);
syncConfigCustom = (SysSyncRoleConfigDto) syncConfigService.save(syncConfigCustom);
SysSyncConfigFilter configFilter = new SysSyncConfigFilter();
configFilter.setSystemId(system.getId());
Assert.assertEquals(1, syncConfigService.find(configFilter, null).getTotalElements());
return syncConfigCustom;
}
private SysSyncLogDto checkSyncLog(AbstractSysSyncConfigDto config, SynchronizationActionType actionType, int count,
OperationResultType resultType) {
SysSyncLogFilter logFilter = new SysSyncLogFilter();
logFilter.setSynchronizationConfigId(config.getId());
List<SysSyncLogDto> logs = syncLogService.find(logFilter, null).getContent();
Assert.assertEquals(1, logs.size());
SysSyncLogDto log = logs.get(0);
if (actionType == null) {
return log;
}
SysSyncActionLogFilter actionLogFilter = new SysSyncActionLogFilter();
actionLogFilter.setSynchronizationLogId(log.getId());
List<SysSyncActionLogDto> actions = syncActionLogService.find(actionLogFilter, null).getContent();
SysSyncActionLogDto actionLog = actions.stream().filter(action -> {
return actionType == action.getSyncAction();
}).findFirst().orElse(null);
Assert.assertNotNull(actionLog);
Assert.assertEquals(resultType, actionLog.getOperationResult());
SysSyncItemLogFilter itemLogFilter = new SysSyncItemLogFilter();
itemLogFilter.setSyncActionLogId(actionLog.getId());
List<SysSyncItemLogDto> items = syncItemLogService.find(itemLogFilter, null).getContent();
Assert.assertEquals(count, items.size());
return log;
}
private SysSystemDto initData() {
return initData(SYSTEM_NAME, false);
}
private SysSystemDto initData(String systemName, boolean isProvisioning) {
// create test system
SysSystemDto system = helper.createSystem(TestRoleResource.TABLE_NAME, systemName);
Assert.assertNotNull(system);
// generate schema for system
List<SysSchemaObjectClassDto> objectClasses = systemService.generateSchema(system);
// Create synchronization mapping
SysSystemMappingDto syncSystemMapping = new SysSystemMappingDto();
syncSystemMapping.setName("default_" + System.currentTimeMillis());
syncSystemMapping.setEntityType(SystemEntityType.ROLE);
syncSystemMapping.setOperationType(SystemOperationType.SYNCHRONIZATION);
syncSystemMapping.setObjectClass(objectClasses.get(0).getId());
if (isProvisioning) {
syncSystemMapping.setEntityType(SystemEntityType.IDENTITY);
syncSystemMapping.setOperationType(SystemOperationType.PROVISIONING);
}
final SysSystemMappingDto syncMapping = systemMappingService.save(syncSystemMapping);
createMapping(system, syncMapping);
if (!isProvisioning) {
this.getBean().initIdentityData(ROLE_NAME, ATTRIBUTE_DN_VALUE);
}
return system;
}
private void createMapping(SysSystemDto system, final SysSystemMappingDto entityHandlingResult) {
SysSchemaAttributeFilter schemaAttributeFilter = new SysSchemaAttributeFilter();
schemaAttributeFilter.setSystemId(system.getId());
Page<SysSchemaAttributeDto> schemaAttributesPage = schemaAttributeService.find(schemaAttributeFilter, null);
schemaAttributesPage.forEach(schemaAttr -> {
if (ATTRIBUTE_NAME.equals(schemaAttr.getName())) {
SysSystemAttributeMappingDto attributeMapping = new SysSystemAttributeMappingDto();
attributeMapping.setUid(true);
attributeMapping.setEntityAttribute(true);
attributeMapping.setIdmPropertyName("name");
attributeMapping.setName(schemaAttr.getName());
attributeMapping.setSchemaAttribute(schemaAttr.getId());
attributeMapping.setSystemMapping(entityHandlingResult.getId());
schemaAttributeMappingService.save(attributeMapping);
} else if (ATTRIBUTE_DN.equalsIgnoreCase(schemaAttr.getName())) {
SysSystemAttributeMappingDto attributeMappingTwo = new SysSystemAttributeMappingDto();
attributeMappingTwo.setIdmPropertyName(ATTRIBUTE_DN);
attributeMappingTwo.setEntityAttribute(false);
attributeMappingTwo.setExtendedAttribute(true);
attributeMappingTwo.setName("distinguishedName");
attributeMappingTwo.setSchemaAttribute(schemaAttr.getId());
attributeMappingTwo.setSystemMapping(entityHandlingResult.getId());
schemaAttributeMappingService.save(attributeMappingTwo);
} else if (ATTRIBUTE_MEMBER.equalsIgnoreCase(schemaAttr.getName())) {
SysSystemAttributeMappingDto attributeMappingTwo = new SysSystemAttributeMappingDto();
attributeMappingTwo.setIdmPropertyName(ATTRIBUTE_MEMBER);
attributeMappingTwo.setEntityAttribute(false);
attributeMappingTwo.setExtendedAttribute(true);
attributeMappingTwo.setName(ATTRIBUTE_MEMBER);
attributeMappingTwo.setSchemaAttribute(schemaAttr.getId());
attributeMappingTwo.setSystemMapping(entityHandlingResult.getId());
schemaAttributeMappingService.save(attributeMappingTwo);
}
});
}
@Transactional
public void initIdentityData(String roleName, String eavAttribute) {
deleteAllResourceData();
TestRoleResource resourceUserOne = new TestRoleResource();
resourceUserOne.setName(roleName);
resourceUserOne.setEavAttribute(eavAttribute);
entityManager.persist(resourceUserOne);
}
@Transactional
public void addRoleToResource(String roleName, String eavAttribute, String member) {
TestRoleResource resourceUserOne = new TestRoleResource();
resourceUserOne.setName(roleName);
resourceUserOne.setEavAttribute(eavAttribute);
resourceUserOne.setMember(member);
entityManager.persist(resourceUserOne);
}
@Transactional
public void deleteAllResourceData() {
// Delete all
Query q = entityManager.createNativeQuery("DELETE FROM " + TestRoleResource.TABLE_NAME);
q.executeUpdate();
}
private RoleWorkflowAdSyncTest getBean() {
return applicationContext.getAutowireCapableBeanFactory().createBean(this.getClass());
}
private IdmRoleCatalogueDto getCatalogueByCode(String code) {
IdmRoleCatalogueFilter filter = new IdmRoleCatalogueFilter();
filter.setCode(code);
List<IdmRoleCatalogueDto> result = roleCatalogueService.find(filter, null).getContent();
if (result.size() != 1) {
return null;
}
return result.get(0);
}
private void createRolesInSystem () {
SysSystemDto system = initData();
IdmRoleFilter roleFilter = new IdmRoleFilter();
roleFilter.setText(ROLE_NAME);
List<IdmRoleDto> roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(0, roles.size());
Assert.assertNotNull(system);
SysSyncRoleConfigDto config = doCreateSyncConfig(system);
config.setLinkedActionWfKey(wfExampleKey);
config.setMissingAccountActionWfKey(wfExampleKey);
config.setMissingEntityActionWfKey(wfExampleKey);
config.setUnlinkedActionWfKey(wfExampleKey);
config = (SysSyncRoleConfigDto) syncConfigService.save(config);
// Start sync
helper.startSynchronization(config);
SysSyncLogDto log = checkSyncLog(config, SynchronizationActionType.MISSING_ENTITY, 1,
OperationResultType.WF);
Assert.assertFalse(log.isRunning());
Assert.assertFalse(log.isContainsError());
roles = roleService.find(roleFilter, null).getContent();
Assert.assertEquals(1, roles.size());
IdmRoleDto role = roles.get(0);
List<IdmFormValueDto> dnValues = formService.getValues(role, ATTRIBUTE_DN);
Assert.assertEquals(1, dnValues.size());
Assert.assertEquals(ATTRIBUTE_DN_VALUE, dnValues.get(0).getValue());
IdmRoleCatalogueDto catalogueFirst = getCatalogueByCode(CATALOGUE_CODE_FIRST);
IdmRoleCatalogueDto catalogueSecond = getCatalogueByCode(CATALOGUE_CODE_SECOND);
Assert.assertNotNull(catalogueFirst);
Assert.assertNotNull(catalogueSecond);
// Delete log
syncLogService.delete(log);
}
/**
* Returns existing system attribute or null
*
* @param attr
* @return
*/
private SysRoleSystemAttributeDto getSystemAttribute(UUID roleSystem, String attributeName, UUID roleId) {
SysRoleSystemAttributeFilter filter = new SysRoleSystemAttributeFilter();
filter.setRoleSystemId(getSysRoleSystem(roleSystem, roleId));
List<SysRoleSystemAttributeDto> content = roleSystemAttributeService.find(filter, null).getContent();
for (SysRoleSystemAttributeDto attribute : content) {
if (attribute.getName().equalsIgnoreCase(attributeName)) {
return attribute;
}
}
return null;
}
/**
* Returns existing role's system or returns newly created one.
*
* @param systemId
* @param roleId
* @param objectClassName
* @return
*/
private UUID getSysRoleSystem(UUID systemId, UUID roleId) {
SysRoleSystemFilter filter = new SysRoleSystemFilter();
filter.setRoleId(roleId);
filter.setSystemId(systemId);
List<SysRoleSystemDto> roleSystem = roleSystemService.find(filter, null).getContent();
SysRoleSystemDto attribute = roleSystem.stream().findFirst().orElse(null);
Assert.assertNotNull(attribute);
return attribute.getId();
}
private boolean isRoleInCatalogue(UUID roleId, String inCatalog) {
List<IdmRoleCatalogueRoleDto> allCatalogsByRole = roleCatalogueRoleService.findAllByRole(roleId);
IdmRoleCatalogueDto catalogue = getCatalogueByCode(inCatalog);
List<IdmRoleCatalogueRoleDto> collect = allCatalogsByRole.stream().filter(catInList -> catInList.getRoleCatalogue().equals(catalogue.getId())).collect(Collectors.toList());
return !collect.isEmpty();
}
}
| java |
Punjab recorded only four cases of stubble burning on Monday even as the air quality index (AQI) calculated by the monitoring stations remained between ‘moderate’ to ‘poor’ category.
As per the Punjab Remote Sensing Centre, two farm fires were registered in Mansa while Patiala and Fatehgarh Sahib reported one case each. The total residue fire events recorded in Punjab this kharif season have reached 45,323.
Experts at the remote sensing centre, however, attributed the fall in farm fires on Monday to the overcast conditions.
“Due to the cloudy conditions, thermo-sensors and satellite images could not detect small fire events,” said an expert at a Ludhiana-based facility keeping track of farm fires.
Sangrur, the home district of the chief minister Bhagwant Mann, continues to top the chart with over 5,000 stubble burning incidents. Ferozepur and Bathinda have more than 4,000 cases each. The fire count in six districts, including Patiala, Ludhiana, Barnala and Faridkot, is between 2,000 and 3,000. Five districts, including Fazilka and Mansa, have reported 100-200 farm fires.
Data from the Central Pollution Control Board (CPCB) on Monday placed Ludhiana’s AQI at 206, which falls in ‘poor’ category.
The continuous ambient air quality monitoring stations at other places in the state, including Jalandhar, Bathinda, and Patiala, recorded the AQI as ‘moderate’.
Figures from Mandi Gobindgarh were not available on the CPCB portal.
Agriculture expert and former director of Punjab State Seed Certification Authority Baldev Singh said that the stubble-burning season has entered the final phase as farmers are currently busy sowing wheat. | english |
{"ast":null,"code":"import isArray from './is-array';\nimport isObject from './is-object';\n\nfunction each(elements, func) {\n if (!elements) {\n return;\n }\n\n var rst;\n\n if (isArray(elements)) {\n for (var i = 0, len = elements.length; i < len; i++) {\n rst = func(elements[i], i);\n\n if (rst === false) {\n break;\n }\n }\n } else if (isObject(elements)) {\n for (var k in elements) {\n if (elements.hasOwnProperty(k)) {\n rst = func(elements[k], k);\n\n if (rst === false) {\n break;\n }\n }\n }\n }\n}\n\nexport default each;","map":{"version":3,"sources":["../src/each.ts"],"names":[],"mappings":"AAAA,OAAO,OAAP,MAAoB,YAApB;AACA,OAAO,QAAP,MAAqB,aAArB;;AAEA,SAAS,IAAT,CAAe,QAAf,EAAyC,IAAzC,EAAsE;AACpE,MAAI,CAAC,QAAL,EAAe;AACb;AACD;;AACD,MAAI,GAAJ;;AACA,MAAI,OAAO,CAAC,QAAD,CAAX,EAAuB;AACrB,SAAK,IAAI,CAAC,GAAG,CAAR,EAAW,GAAG,GAAG,QAAQ,CAAC,MAA/B,EAAuC,CAAC,GAAG,GAA3C,EAAgD,CAAC,EAAjD,EAAqD;AACnD,MAAA,GAAG,GAAG,IAAI,CAAC,QAAQ,CAAC,CAAD,CAAT,EAAc,CAAd,CAAV;;AACA,UAAI,GAAG,KAAK,KAAZ,EAAmB;AACjB;AACD;AACF;AACF,GAPD,MAOO,IAAI,QAAQ,CAAC,QAAD,CAAZ,EAAwB;AAC7B,SAAK,IAAM,CAAX,IAAgB,QAAhB,EAA0B;AACxB,UAAI,QAAQ,CAAC,cAAT,CAAwB,CAAxB,CAAJ,EAAgC;AAC9B,QAAA,GAAG,GAAG,IAAI,CAAC,QAAQ,CAAC,CAAD,CAAT,EAAc,CAAd,CAAV;;AACA,YAAI,GAAG,KAAK,KAAZ,EAAmB;AACjB;AACD;AACF;AACF;AACF;AACF;;AAED,eAAe,IAAf","sourceRoot":"","sourcesContent":["import isArray from './is-array';\nimport isObject from './is-object';\nfunction each(elements, func) {\n if (!elements) {\n return;\n }\n var rst;\n if (isArray(elements)) {\n for (var i = 0, len = elements.length; i < len; i++) {\n rst = func(elements[i], i);\n if (rst === false) {\n break;\n }\n }\n }\n else if (isObject(elements)) {\n for (var k in elements) {\n if (elements.hasOwnProperty(k)) {\n rst = func(elements[k], k);\n if (rst === false) {\n break;\n }\n }\n }\n }\n}\nexport default each;\n//# sourceMappingURL=each.js.map"]},"metadata":{},"sourceType":"module"} | json |
From the underworld to narcotics and from Islamic extremism to Hindu radicalism,Madhya Pradeshs Malwa region has of late emerged as the epicentre of activities that contrast its rich historic and literary legacy.
That legacy includes poets such as Kalidas at the time Ujjain was a centre for learning and science,and later visionary kings like Raja Bhoja. Today,the region is known for ideological extremes,with the Students Islamic Movement of India (SIMI) and the Rashtriya Swayamsevak Sangh (RSS) both drawing a large number of their members from here.
The region comprises Indore,Ujjain,Ratlam,Mandsaur,Dewas,Dhar,Jhabua,Shajapur and Neemuch. Pporous state borders makes the region a convenient shelter for criminals fleeing Rajasthan,Gujarat and Maharashtra. Well connected by rail and road,the region has Hindu-dominated and Muslim-dominated pockets. Congress leader K K Mishra says Indores Muslim-dominated localities of Chandannagar,Khajrana and Azadnagar are known shelters for people who are outlaws elsewhere.
Porous boundaries with Maharashtra and Gujarat make smuggling of arms and explosives easy, says former DGP A R Puar,adding the SIMI network grew stronger because of the regions proximity to Mumbai.
Another reason for crime thriving is that Mandsaur is one of the worlds leading opium producers. Though the crop is grown on licensed fields monitored by authorities,the illicit component is too lucrative a market for restrictions to work.
The region,which has seen successive reigns of the Mughals and the Marathas,has always been communally tense. Many say communal tension is part of the regions psyche. Ratlam,Ujjain and Indore often report skirmishes between Hindus and Muslims. These are later followed by the settling of scores.
In the last few years,anti-terror squads from Maharashtra and Rajasthan,and recently the National Investigation Agency,have combed towns and villages in Malwa looking for suspects in acts of Hindu terror. Before that,many SIMI activists had been arrested after the revelation that they not only lived in the region but had been holding training camps for activists from as far as Kerala.
Two years ago,a Haryana Police team arrived in Indore looking for clues to the Samjhauta Express blast. Though the first visits did not yield much,more investigating teams followed from Maharashtra,Rajasthan and Delhi. Trails from terror attacks in Malegaon,Ajmer and Hyderabad too have led to the Malwa region,with arrests made from Indore,Shajapur,Dewas and Mahu,and suspects hunted in various other places.
The RSS network has always been strong in the state,particularly in the region. Dewas,for example,has had RSS shakhas right since Independence. A recent path sanchalan (route march) in the town attracted thousands of volunteers,making it the biggest event in its history.
Since the government changed towards the end of 2003,radical elements within the RSS allegedly started coming together to avenge the death of Hindus in attacks by alleged Islamic terrorists.
Former Chief Minister Digvijaya Singh had banned government employees from attending RSS shakhas but the BJP government later lifted the ban.
BJP leaders like minister Kailash Vijayvargiya have sympathised with activists caught by the Maharashtra ATS in connection with the blasts in Malegaon. Sadhvi Pragya Singh was a regular visitor to a house owned by former BJP minister Laxman Gaud. She was in a photograph along with former BJP president Rajnath Singh and Chief Minister Shivraj Singh Chouhan when they called on Gauds widow Malini.
In the RSSs Dewas route march,several advocates and public prosecutors were part of the procession.
The BJP blames Digvijaya Singh of having gone soft on SIMI when his government was in power. The SIMI,which held training camps during the Congress regime,continued to do so even after the the BJP came to power.
Government pleader Girish Mungi,who heads the RSS unit in Dewas,alleges the SIMI thrived during the Congress regime and absolves the Sangh of promoting extreme views.
Only last week,five SIMI activists were sentenced to five years imprisonment for their activities in Ujjain. In 2009,five RSS workers were sentenced to life imprisonment in connection with the twin murders of a Muslim and his son in Sutarkheda village of Dewas district a day after Sunil Joshi was killed.
Former Congress minister Mahendra Singh Kalukheda explains the growth of extremism: It has nothing to do with terrain but everything to do with ideology. Islamic and Hindu terrorism has each grown as a reaction to the other.
Hindu extremism was a reaction to the fundamentalism of some Muslims in the region, says a former Congress Home Minister,who wished not to be named because his views are at odds with the position of his party.
When Safdar Nagori and 12 other SIMI activists were arrested from a hideout near Indore three years ago,the ruling BJP had blamed the organisations growth on the lenient Congress government. The Congress,in turn,holds the BJP responsible for sheltering and promoting right-wing radicalism.
Independent MLA Paras Dada says people here prefer to look the other way when faced with crime. This lack of spirit explains why the region does not boast any freedom fighter,he says.
Poor policing too has contributed to the regions lawlessness. The Sunil Joshi murder case was reopened only because of the Rajasthan ATSs progress in the Ajmer blast case. In fact,the police in Rajasthan,Mumbai and Delhi have reportedly stopped informing the MP police or taking their help when they arrive to arrest or detain suspects. | english |
/*
* Copyright 2021 The University of Manchester
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package com.acuity.visualisations.rawdatamodel.vo;
import com.acuity.visualisations.rawdatamodel.vo.wrappers.LungFunction;
import org.junit.Test;
import static com.acuity.visualisations.rawdatamodel.util.DateUtils.toDate;
import static org.assertj.core.api.Assertions.assertThat;
public class LungFunctionsTest {
private Subject SUBJECT1 = Subject.builder().subjectId("sid1").subjectCode("E01").datasetId("test")
.baselineDate(toDate("01.08.2015")).firstTreatmentDate(toDate("01.08.2015")).build();
private Subject SUBJECT2 = Subject.builder().subjectId("sid2").subjectCode("E02").datasetId("test")
.baselineDate(toDate("02.08.2015")).firstTreatmentDate(toDate("03.08.2015")).build();
//acuity
private LungFunction lf1 = new LungFunction(LungFunctionRaw.builder().id("1").calcChangeFromBaselineIfNull(true)
.calcDaysSinceFirstDoseIfNull(true).visitDate(toDate("02.08.2015"))
.value(3.19).baselineValue(2.18).measurementNameRaw("FVC (%)").protocolScheduleTimepoint("Pre-Bronchodilator")
.measurementTimePoint(toDate("02.08.2015"))
.build().runPrecalculations(), SUBJECT1);
//detect
private LungFunction lf2 = new LungFunction(LungFunctionRaw.builder().id("4").calcChangeFromBaselineIfNull(true)
.calcDaysSinceFirstDoseIfNull(true).visitDate(toDate("07.08.2015"))
.value(3.19).baselineValue(4.1).measurementNameRaw("FEV1 (L)").protocolScheduleTimepoint("Pre-Bronchodilator")
.measurementTimePoint(toDate("07.08.2015")).build().runPrecalculations(), SUBJECT2);
@Test
public void shouldCalcDaysSinceFirstDoseForLf1() {
Integer daysSinceFirstDose = lf1.getDaysSinceFirstDose();
assertThat(daysSinceFirstDose).isEqualTo(1);
}
@Test
public void shouldCalcDaysSinceFirstDoseForLf2() {
Integer daysSinceFirstDose = lf2.getDaysSinceFirstDose();
assertThat(daysSinceFirstDose).isEqualTo(4);
}
@Test
public void shouldCalcChangeFromBaselineForLf1() {
Double changeFromBaseline = lf1.getChangeFromBaseline();
assertThat(changeFromBaseline).isEqualTo(1.01);
}
@Test
public void shouldntCalcChangeFromBaselineForLf2() {
Double changeFromBaseline = lf2.getChangeFromBaseline();
assertThat(changeFromBaseline).isEqualTo(-0.91);
}
@Test
public void shouldCalcCalcUnitLf1() {
String unit = lf1.getUnit();
assertThat(unit).isEqualTo("%");
}
@Test
public void shouldReturnUnitForLf2() {
String unit = lf2.getUnit();
assertThat(unit).isEqualTo("L");
}
@Test
public void shouldCalcCalcMeasurementNameForLf1() {
String measurementName = lf1.getMeasurementName();
assertThat(measurementName).isEqualTo("FVC");
}
@Test
public void shouldReturnMeasurementNameForForLf2() {
String measurementName = lf2.getMeasurementName();
assertThat(measurementName).isEqualTo("FEV1");
}
}
| java |
{
"version": 2,
"routes": {
"/": {
"initialRevalidateSeconds": false,
"srcRoute": null,
"dataRoute": "/_next/data/zsWqBqLjpgRmswfQomanp/index.json"
},
"fr/todos/terms/c": {
"initialRevalidateSeconds": false,
"srcRoute": "/todos/terms/[section]",
"dataRoute": "/_next/data/zsWqBqLjpgRmswfQomanp/fr/todos/terms/c.json"
},
"/todos/terms/a": {
"initialRevalidateSeconds": false,
"srcRoute": "/todos/terms/[section]",
"dataRoute": "/_next/data/zsWqBqLjpgRmswfQomanp/todos/terms/a.json"
},
"/todos/terms/b": {
"initialRevalidateSeconds": false,
"srcRoute": "/todos/terms/[section]",
"dataRoute": "/_next/data/zsWqBqLjpgRmswfQomanp/todos/terms/b.json"
}
}
} | json |
Ahmedabad: Gujarat Chief Minister Vijay Rupani has tested positive for coronavirus, said a hospital where the CM is admitted after he fainted in a rally.
On Sunday, Rupani, 64, fainted on stage while addressing a rally in Vadodara for the upcoming civic polls in the state, following which he was flown to Ahmedabad and admitted to the U N Mehta Hospital here.
Rupani’s sample was collected on Sunday night and sent for RT-PCR test which has come out positive for coronavirus, said a health bulletin issued by the hospital on Monday.
He has mild symptoms, it added. | english |
<reponame>HoogleyBoogley/TranOS
.windowTopBar {
background-color: #ededed;
height: 25px;
}
.windowTopBarIcon {
padding-left: 10px;
padding-right: 10px;
height: 100%;
background-color: #e74c3c;
float: right;
}
.windowTopBarIconImg {
filter: invert(1);
}
.window {
height: 100vh;
width: calc(100vw - 80px);
background-color: white;
margin-top: 0;
font-family: 'Roboto', sans-serif !important;
z-index: 100;
}
.windowTopBarTitle {
line-height: 25px;
padding-left: 20px;
color: #828282;
}
.windowBody {
padding-left: 20px;
padding-right: 20px;
} | css |
{
"files": {
"main.css": "/static/css/main.f1fce4d3.chunk.css",
"main.js": "/static/js/main.7a42d267.chunk.js",
"main.js.map": "/static/js/main.7a42d267.chunk.js.map",
"runtime-main.js": "/static/js/runtime-main.32f079ab.js",
"runtime-main.js.map": "/static/js/runtime-main.32f079ab.js.map",
"static/js/2.d9c06813.chunk.js": "/static/js/2.d9c06813.chunk.js",
"static/js/2.d9c06813.chunk.js.map": "/static/js/2.d9c06813.chunk.js.map",
"index.html": "/index.html",
"precache-manifest.4dd9750ef1adc75b6d58f871c1d7bd8c.js": "/precache-manifest.4dd9750ef1adc75b6d58f871c1d7bd8c.js",
"service-worker.js": "/service-worker.js",
"static/css/main.f1fce4d3.chunk.css.map": "/static/css/main.f1fce4d3.chunk.css.map",
"static/js/2.d9c06813.chunk.js.LICENSE.txt": "/static/js/2.d9c06813.chunk.js.LICENSE.txt"
},
"entrypoints": [
"static/js/runtime-main.32f079ab.js",
"static/js/2.d9c06813.chunk.js",
"static/css/main.f1fce4d3.chunk.css",
"static/js/main.7a42d267.chunk.js"
]
} | json |
/**
* Created by hungnv on 10/3/2017.
*/
$(document).ready(function () {
initEvents();
initTrigger();
});
function initEvents(){
//$("#auto-completed").focus();
}
function initTrigger(){
var availableTags = [
"ActionScript",
"AppleScript",
"Asp",
"BASIC",
"C",
"C++",
"Clojure",
"COBOL",
"ColdFusion",
"Erlang",
"Fortran",
"Groovy",
"Haskell",
"Java",
"JavaScript",
"Lisp",
"Perl",
"PHP",
"Python",
"Ruby",
"Scala",
"Scheme"
];
//$("#auto-completed").blur();
$("#auto-completed").focus();
$("#auto-completed" ).autocomplete({
source: availableTags,
change: function (event,ui) {
if(ui.item==null){
$("#auto-completed").val('');
}
},
create: function (evt,ui) {
this.cancelBlur=true;
}
});
//$( "#auto-completed" ).autocomplete( "option", { cancelBlur: true } );
//item.cancelBlur=true;
//console.log(item.);
//$("#auto-completed").blur();
//$("#auto-completed").focus();
//$("#auto-completed" ).autocomplete({
// source: function( request, response ) {
// $.ajax( {
// url: "/adminlte/autocompleted",
// dataType: "json",
// data: {
// term: request.term
// },
// success: function( data ) {
// response( data );
// }
// } );
// },
// //minLength: 2,
// select: function( event, ui ) {
// console.log(ui);
// }
//} );
}
| javascript |
mod commands;
pub mod event;
mod input;
mod ui;
use crate::apartment::player::decrease_stats;
use self::commands::should_run_cmd_handler;
use super::states::GameState;
use bevy::prelude::*;
use sysinfo::{System, SystemExt};
pub struct ConsolePlugin;
impl Plugin for ConsolePlugin {
fn build(&self, app: &mut AppBuilder) {
app.add_event::<event::PrintConsoleEvent>()
.add_event::<event::EnteredConsoleCommandEvent>()
.add_system_set(
SystemSet::on_enter(GameState::MainGame)
.with_system(ui::build_ui.system().label("build_terminal"))
.with_system(setup.system()),
)
.add_system_set(
SystemSet::on_enter(GameState::ConsoleOpenedState)
.with_system(ui::open_console.system())
.with_system(input::opening_console_sound.system()),
)
.add_system_set(
SystemSet::on_update(GameState::ConsoleOpenedState)
.with_system(
input::handle_input_keys
.system()
.label("send_console_input"),
)
.with_system(input::update_enter_command.system())
.with_system(ui::update_logs_area.system()),
)
.add_system_set(
SystemSet::on_update(GameState::ConsoleOpenedState)
.with_run_criteria(should_run_cmd_handler.system())
.with_system(commands::commands_handler.system())
.before("send_console_input"),
)
.add_system_set(
SystemSet::on_update(GameState::ConsoleOpenedState)
.with_system(decrease_stats.system()),
)
.add_system_to_stage(CoreStage::PostUpdate, ui::apply_animation.system())
.add_system_set(
SystemSet::on_exit(GameState::ConsoleOpenedState)
.with_system(ui::close_console.system())
.with_system(input::closing_console_sound.system()),
)
.insert_resource(ConsoleData::default())
.insert_resource(ConsoleAnimation {
moving_speed: 15.0,
..Default::default()
})
.init_resource::<System>()
.add_system(event::add_message_events_to_console.system())
.add_system(
input::trigger_open_console
.system()
.after("check_interactables"),
);
}
}
#[derive(Default)]
pub struct ConsoleData {
pub enter_command: String,
pub is_opening: bool,
pub fully_opened: bool,
pub messages: Vec<String>,
}
#[derive(Default)]
pub struct ConsoleAnimation {
pub start_position: Vec2,
pub end_position: Vec2,
pub moving_speed: f64,
pub time_to_move: f64,
pub start_time: f64,
}
fn setup(mut sys: ResMut<System>) {
sys.refresh_all();
}
| rust |
<gh_stars>0
package oresAboveDiamonds.lists;
import net.minecraft.resources.ResourceLocation;
import net.minecraft.tags.TagKey;
import net.minecraft.world.item.Item;
import net.minecraft.world.item.Tier;
import net.minecraft.world.item.crafting.Ingredient;
import net.minecraft.world.level.block.Block;
import net.minecraftforge.common.TierSortingRegistry;
import oresAboveDiamonds.OresAboveDiamonds;
import oresAboveDiamonds.config.OADConfig;
import oresAboveDiamonds.init.ModItems;
import javax.annotation.Nonnull;
import java.util.List;
public enum ToolMaterialList implements Tier
{
//Reference: gobber by kwpugh
AMETHYST(OADConfig.amethyst_attack_damage.get() , OADConfig.amethyst_efficiency.get(), OADConfig.amethyst_durability.get(), 4, OADConfig.amethyst_enchantability.get(), ModItems.AMETHYST.get(), MaterialTags.NEEDS_AMETHYST_TOOL),
BLACK_OPAL(OADConfig.black_opal_attack_damage.get(), OADConfig.black_opal_efficiency.get(), OADConfig.black_opal_durability.get(), 5, OADConfig.black_opal_enchantability.get(), ModItems.BLACK_OPAL.get(), MaterialTags.NEEDS_BLACK_OPAL_TOOL),
NETHERITE_OPAL(OADConfig.netherite_opal_attack_damage.get(), OADConfig.netherite_opal_efficiency.get(), OADConfig.netherite_opal_durability.get(), 5, OADConfig.netherite_opal_enchantability.get(), ModItems.BLACK_OPAL.get(), MaterialTags.NEEDS_NETHERITE_OPAL_TOOL);
public static Tier AMETHYST_TIER;
public static Tier BLACK_OPAL_TIER;
public static Tier NETHERITE_OPAL_TIER;
static {
ResourceLocation diamond = new ResourceLocation("diamond");
ResourceLocation netherite = new ResourceLocation("netherite");
ResourceLocation amethyst = new ResourceLocation(OresAboveDiamonds.MODID, "amethyst");
ResourceLocation black_opal = new ResourceLocation(OresAboveDiamonds.MODID, "black_opal");
ResourceLocation netherite_opal = new ResourceLocation(OresAboveDiamonds.MODID, "netherite_opal");
AMETHYST_TIER = TierSortingRegistry.registerTier(
AMETHYST,
amethyst,
List.of(diamond, netherite), List.of(black_opal));
BLACK_OPAL_TIER = TierSortingRegistry.registerTier(
BLACK_OPAL,
black_opal,
List.of(amethyst), List.of(netherite_opal));
NETHERITE_OPAL_TIER = TierSortingRegistry.registerTier(
NETHERITE_OPAL,
netherite_opal,
List.of(black_opal), List.of());
}
private float attackDamageBonus, efficiency;
private int durability, harvestLevel, enchantability;
private Item repairMaterial;
private TagKey<Block> tag;
private boolean infinite_durability;
private ToolMaterialList(int attackDamage, float efficiency, int durability, int harvestLevel, int enchantability, Item repairMaterial, TagKey<Block> tag)
{
this.attackDamageBonus = attackDamage;
this.efficiency = efficiency;
if(durability <= 0) {
this.durability = Integer.MAX_VALUE;
this.infinite_durability = true;
} else {
this.durability = durability;
this.infinite_durability = false;
}
this.harvestLevel = harvestLevel;
this.enchantability = enchantability;
this.repairMaterial = repairMaterial;
this.tag = tag;
}
@Override
public int getUses()
{
return this.durability;
}
@Override
public float getSpeed()
{
return this.efficiency;
}
@Override
public float getAttackDamageBonus()
{
return this.attackDamageBonus;
}
@Override
public int getLevel()
{
return this.harvestLevel;
}
@Override
public int getEnchantmentValue()
{
return this.enchantability;
}
@Override
public Ingredient getRepairIngredient()
{
return Ingredient.of(this.repairMaterial);
}
@Nonnull
public TagKey<Block> getTag()
{
return this.tag;
}
public boolean isInfinite() {
return this.infinite_durability;
}
}
| java |
<reponame>ofZach/landlinesApp<gh_stars>100-1000
{"id":2149,"line-1":"Nunavut","line-2":"Canada","attribution":"©2014 DigitalGlobe, Landsat","url":"https://www.google.com/maps/@62.614732,-82.842375,13z/data=!3m1!1e3"} | json |
function mod_setting()
{
$.ajax({
url: SITE_URL + 'teacher/index/ajax_modify_setting',
type: 'POST',
data: {
show_explanation: $('[name="show_explanation"]:checked').val()
},
cache: false
})
.always( function( data ) {
$('#setting_modal').modal('hide');
location.reload();
});
}
| javascript |
Becoming a Bee-keeper
I completed my bee-keeping course. But I did not have money to keep my own bees and start work. I continued to teach and with time could collect 5000. With this money, I bought two boxes for keeping bees. Each box costs 2000. With the remaining money, I bought sugar to make the syrup for honeybees, and medicines to clean the beehives.
That was in September. By December, I had so many bees that I had to buy two more boxes. I was still learning about bee-keeping. Many times, the bees would sting me and my hands and face would get swollen. It would pain a lot. How could I complain to anybody? I myself had decided to do this work.
Ö What do people in your area put on the part of the body where the bee has stung?
Ö Draw a picture of a honeybee in your notebook. Colour it and give it a name.
The litchi trees come to flower in February. I put all my four boxes near the litchi orchards. I got 12 kilograms of honey from each box. I sold this honey in the market. This was my first earning from my bees. Now I have 20 boxes.
Ö What will be the total cost of Anita's 20 boxes?
Every day I cycle to my college. My college is in the town, five kilometres away. When I go to college, my mother prepares the syrup for the bees. My father looks after the bees and takes the honey out of the boxes.
Now you also know. a lot about Anita.
लेते हैं
man SPT Para में साथ काते हैं
Anita is known by
everyone in all the villages
nearby. She goes to all
the village meetings and talks about how important it is for everyone to study. sometimes people make fun of her, but Anita knows what she wants
to do. She does exactly what she wants to.
Anita wants to become a wholesaler so that she can help the villagers to get the right price for their honey.
Ŏ Anita and others in her village get 35 for one kilogram of honey. How much does one kilogram of honey cost in your
Ö What are the different colours of honey that you have seen?
Ö Is honey used in your house? For what is it used?
Every beehive has one Queen Bee that lays eggs. There are only a few males in the hive. Most of the bees in the hive are worker-bees. These bees work all day. They make the hive and
For the teacher: Explain the role of wholesaler to children.
also look after the baby bees. They fly around. flowers in search of nectar. They collect nectar from flowers for honey. When one bee finds flowers with nectar, it does a special kind of dance by which the other bees can know where the nectar is. The workerbees are very important for the hive. Without worker-bees there would be neither hive nor any nectar collection. All bees in the hive would go hungry. The male bees have no special role as worker.
Ö Which are some other insects that live together in a group, like honeybees?
Ants live and work together like honeybees. The Queen Ant lays the eggs, the Soldier Ants look after and guard the ants' nest, Worker Ants are always busy looking for food and bringing it to the nest. Termites and wasps also live like this.
Ö Have you seen where ants live?
Ö What kind of eatables attract ants? List them.
Ö Look at a line of ants. What is its colour?
| english |
package org.basex.http.webdav;
import java.io.*;
import java.util.*;
import org.basex.util.*;
import com.bradmcevoy.http.*;
import com.bradmcevoy.http.Request.Method;
/**
* Dummy resource to be returned when no authorization is provided.
*
* @author BaseX Team 2005-16, BSD License
* @author <NAME>
* @author <NAME>
*/
final class WebDAVNotAuthorized implements FolderResource, LockableResource {
/** The only instance of this class. */
static final Resource NOAUTH = new WebDAVNotAuthorized();
/** Constructor. */
private WebDAVNotAuthorized() { }
@Override
public String getRealm() {
return Prop.NAME;
}
@Override
public Date getModifiedDate() {
return null;
}
@Override
public String getUniqueId() {
return null;
}
@Override
public Object authenticate(final String u, final String p) {
return null;
}
@Override
public boolean authorise(final Request request, final Method method, final Auth auth) {
return false;
}
@Override
public String getName() {
return null;
}
@Override
public void sendContent(final OutputStream out, final Range range,
final Map<String, String> params, final String contentType) {
}
@Override
public Long getMaxAgeSeconds(final Auth auth) {
return null;
}
@Override
public String getContentType(final String accepts) {
return null;
}
@Override
public Long getContentLength() {
return null;
}
@Override
public CollectionResource createCollection(final String newName) {
return null;
}
@Override
public Resource child(final String childName) {
return null;
}
@Override
public List<? extends Resource> getChildren() {
return null;
}
@Override
public Resource createNew(final String newName, final InputStream inputStream,
final Long length, final String contentType) {
return null;
}
@Override
public void copyTo(final CollectionResource toCollection, final String name) {
}
@Override
public void delete() {
}
@Override
public void moveTo(final CollectionResource rDest, final String name) {
}
@Override
public Date getCreateDate() {
return null;
}
@Override
public String checkRedirect(final Request request) {
return null;
}
@Override
public LockResult lock(final LockTimeout lockTimeout, final LockInfo lockInfo) {
return null;
}
@Override
public LockResult refreshLock(final String s) {
return null;
}
@Override
public void unlock(final String s) {
}
@Override
public LockToken getCurrentLock() {
return null;
}
}
| java |
The Sri Lankan government has issued orders preventing any person from preaching religious, extremist or radical ideologies that glorify terrorism.
The order also banned any foreigner from preaching any such ideology and few persons involved in it have been deported.
satellite networks. The channel is already banned in several countries including India.
Sri Lankan Prime Minister Ranil Wickremesinghe said that the whole world should unite as one to face terrorism.
Mr Wickremsinghe said his government hoped to cooperate with all countries that oppose terrorism to share intelligence and expertise. | english |
<gh_stars>1-10
[{"id":1,"id_sale":103,"nit_buyer":"<NAME>","name_buyer":"<NAME>","number_of_bill":"Aquí numero de factura de la empresa","number_of_authorization":"Aquí numero de autorización"},{"id":2,"id_sale":104,"nit_buyer":"<NAME>","name_buyer":"<NAME>","nit_company":244598018,"number_of_bill":"Aquí numero de factura de la empresa","number_of_authorization":"Aquí numero de autorización"},{"id":3,"id_sale":105,"nit_buyer":"<NAME>","name_buyer":"<NAME>","nit_company":244598018,"number_of_bill":"Aquí numero de factura de la empresa","number_of_authorization":"Aquí numero de autorización"},{"id":4,"id_sale":1,"nit_buyer":"<NAME>","name_buyer":"<NAME>","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":5,"id_sale":2,"nit_buyer":"244598018","name_buyer":"catolica","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":6,"id_sale":3,"nit_buyer":"244598018","name_buyer":"catolica","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":7,"id_sale":4,"nit_buyer":"3344","name_buyer":"loco","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":8,"id_sale":5,"nit_buyer":"2244","name_buyer":"loco","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":9,"id_sale":1,"nit_buyer":"123213","name_buyer":"vender","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":10,"id_sale":2,"nit_buyer":"444","name_buyer":"gggg","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":11,"id_sale":3,"nit_buyer":"123","name_buyer":"otro","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":12,"id_sale":4,"nit_buyer":"21312","name_buyer":"otro","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":13,"id_sale":5,"nit_buyer":"123132","name_buyer":"OTRO","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":14,"id_sale":6,"nit_buyer":"122","name_buyer":"OTR","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":15,"id_sale":7,"nit_buyer":"45533","name_buyer":"JSDF","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":16,"id_sale":1,"nit_buyer":"123","name_buyer":"otro","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":17,"id_sale":2,"name_buyer":"denys","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"},{"id":18,"id_sale":3,"name_buyer":"catolica","nit_company":244598018,"number_of_bill":"Aquí numero de factura a imprimir","number_of_authorization":"Aquí numero de autorización"}] | json |
The dramatic three-day rescue of a Thai youth soccer team that had been stuck in a flooded cave came to an end Tuesday when the last boy and the team's coach were plucked from the underground cavern -- more than two weeks after they became trapped, Navy officials said.
The Thai Navy SEALS said on Facebook all 12 boys from the team and the team's coach were out of the cave. Four rescuers, a doctor and three Navy SEALS remained inside until coming out of the cave two hours later.
"All 12 Wild Boars and coach have been extracted from the cave. Hooyah! " the post said. The Navy SEALS later wrote: "We are not sure if this is a miracle, a science, or what. All the thirteen Wild Boars are now out of the cave. "
Earlier in the day, local Thai media reports stated the 11th person emerged from the cave after two other people had been rescued. The conditions of all of those who were saved on Tuesday were unclear.
Chiang Rai Gov. Narongsak Osatanakorn said Tuesday's intricate and high-risk operation began just after 10 a. m. and involved 19 divers.
"We did something nobody thought possible," he said during a brief news conference after the rescue was complete.
Cheers and applause were reported in the streets as the final ambulance arrived at a hospital in Chiang Rai city. Payap Maiming, 40, who helped provide food and necessities to rescue workers and journalists, told the Associated Press a "miracle" had happened.
"I'm happy for Thais all over the country, for the people of Mae Sai, and actually just everyone in the world because every news channel has presented this story and this is what we have been waiting for," she said. Mae Sai is the district where the cave is located, in the northern part of Chiang Rai province, near the border with Myanmar.
"It's really a miracle," Payap said. "It's hope and faith that has brought us this success. "
Before the final rescue of the group, there was optimism that the dive team was getting more efficient in their attempts. They successfully extracted the second group of four a full two hours faster than the first, officials said.
"Two days, eight Boars," read an earlier Facebook post by the Thai navy SEALS about the operation at the Tham Luan Nang Non cave that began Sunday, more than two weeks after the Wild Boars soccer team became trapped.
SpaceX and Tesla head Elon Musk, who visited the cave, released photos of the situation on Twitter, and said his high-tech submarine was ready to help if needed.
"Just returned from Cave 3. Mini-sub is ready if needed," Musk tweeted. "It is made of rocket parts & named Wild Boar after kids’ soccer team. Leaving here in case it may be useful in the future. Thailand is so beautiful. "
But despite his offer to help, the Thai rescue chief said it would be of little use for the rescue of the boys, according to Sky News.
"Although his technology is good and sophisticated it’s not practical for this mission,” Narongsak said.
The boy's families were being kept at a distance at a hospital because of fears of infection and the emaciated-looking boys were eating a rice-based porridge because they were still too weak to take regular food, authorities said.
At a news conference on Tuesday morning, officials said the second group of four boys brought out Monday are healthy, and that there are no bats inside the cave so there are no animals that can transit any diseases.
Jesada Chokdumrongsuk, deputy director-general of the Public Health Ministry, said Tuesday that the first four boys rescued, aged 12 to 16, are now able to eat normal food. He added that two of them possibly have a lung infection but all eight are generally "healthy and smiling," and "the kids are footballers so they have high immune systems. "
The second group of four rescued on Monday are aged 12 to 14, and all are in "high spirits," he added.
Doctors are expecting to keep the boys in the hospital for at least 7 days, and said there are no complications with the boy's eyesight despite spending multiple days in the dark.
The parents of the first group of boys rescued on Sunday have visited their children through glass windows, as doctors continue to keep them "isolated" as they ensure they are healthy. The group has been vaccinated and given vitamin B1 and IV drips, according to officials.
Throughout the daring rescue, there was the risk of monsoon rains rising water in the cave endangering the team's dry refuge and making the escape route too treacherous.
The plight of the boys, aged 11-16, and their coach, has riveted Thailand and much of the world -- from the heart-sinking news they were missing to the first flickering video of the huddle of anxious yet smiling boys once they were found by the pair of British divers deep in the sprawling cave.
President Trump congratulated the Thai navy SEALs and their international partners who rescued the team and their coach after more than two weeks of entrapment in a cave.
"On behalf of the United States, congratulations to the Thai Navy SEALs and all on the successful rescue of the 12 boys and their coach from the treacherous cave in Thailand," he wrote on Twitter. "Such a beautiful moment - all freed, great job! "
Writing in elegant Thai script, the boys urged their parents not to worry, adding that they hoped they wouldn't get too much homework after being rescued and couldn't wait to eat their favorite foods again.
Thailand's prime minister said Tuesday that increased security will be introduced at the cave made "world famous" by this week's heroic rescue operation, Sky News reported.
"In future, we have to monitor the entrance and exit to the cave. This cave has become world famous," Prime Minister Prayuth Chan-ocha said. "We have to install more lights inside the cave and put up signs. It's a dangerous cave. "
All preparations of the rescue, including replacing the oxygen cylinders positioned along the route out in the cave, take at least 20 hours, officials said. The safety of the divers, who have meticulously planned the mission, is also paramount. One diver died during preparations for the boys' extraction. | english |
// Return true if the redirect is a root level catch-all
// (e.g., /[[...slug]] or /[...slug])
const isRootCatchAllRedirect = (redirect) =>
redirect.startsWith("/*") ||
(redirect.startsWith("/:") && redirect.includes("/*"));
module.exports = isRootCatchAllRedirect;
| javascript |
The Right of Children to Free and Compulsory Education Act, 2009 provides for:
- The right of children to free and compulsory education till completion of elementary education in a neighborhood school.
- It clarifies that ‘compulsory education’ means obligation of the appropriate government to provide free elementary education and ensure compulsory admission, attendance and completion of elementary education to every child in the six to fourteen age group. ‘Free’ means that no child shall be liable to pay any kind of fee or charges or expenses which may prevent him or her from pursuing and completing elementary education.
- It makes provisions for a non-admitted child to be admitted to an age appropriate class.
- It specifies the duties and responsibilities of appropriate Governments, local authority and parents in providing free and compulsory education, and sharing of financial and other responsibilities between the Central and State Governments.
- It lays down the norms and standards relating inter alia to Pupil Teacher Ratios (PTRs), buildings and infrastructure, school working days, teacher working hours.
- It provides for rational deployment of teachers by ensuring that the specified pupil teacher ratio is maintained for each school, rather than just as an average for the State or District or Block, thus ensuring that there is no urban-rural imbalance in teacher postings. It also provides for prohibition of deployment of teachers for non-educational work, other than decennial census, elections to local authority, state legislatures and parliament, and disaster relief.
- It provides for appointment of appropriately trained teachers, i.e. teachers with the requisite entry and academic qualifications;
- It prohibits (a) physical punishment and mental harassment, (b) screening procedures for admission of children, (c) capitation fees, (d) private tuition by teachers, (e) running of schools without recognition,
- It provides for development of curriculum in consonance with the values enshrined in the Constitution, and which would ensure the all-round development 9 of the child, building on the child’s knowledge, potentiality and talent and making the child free of fear, trauma and anxiety through a system of child friendly and child centered learning.
| english |
#main-title
{
display: flex;
justify-content: center;
padding: 1em 0;
font-size: 60px;
font-size: clamp(60px, 10vw, 100px);
}
.details {
display: flex;
justify-content: center;
width: 90vw;
margin: auto;
margin-bottom: 2em;
}
.order-items {
display: flex;
flex-direction: column;
flex: 0.65;
}
.data-heading {
padding: 0.5em 0;
font-weight: lighter;
font-size: 30px;
}
.data {
padding-bottom: 1em;
}
.border {
border-bottom: 1px solid #e0e0e0;
}
#items {
border-bottom: 1px solid #e0e0e0;
}
.item {
display: flex;
align-items: center;
text-align: center;
padding: 0.5em 0;
border-bottom: 1px solid #e0e0e0;
}
.item-img {
flex: 0.1;
}
.item img
{
width: 5vw;
}
.item-name {
flex: 0.6;
}
.item-rate {
flex: 0.3;
}
.summary {
display: flex;
flex-direction: column;
justify-content: flex-start;
margin-left: 1em;
flex: 0.35;
}
#summary-heading {
text-align: left;
font-weight: lighter;
font-size: 30px;
}
table {
border: 1px solid #e0e0e0;
border-radius: 2px;
padding: 1em;
margin-bottom: 1em;
}
th, td {
padding: 1em 0;
}
.left {
float: left;
width: 50%;
font-size: 18px;
}
.right {
float: right;
width: 50%;
font-size: 18px;
}
button
{
padding: 1em 0;
width: 100%;
}
/* =================================================== MEDIA QUERY =================================================== */
@media only screen and (max-width: 800px) {
.details {
flex-direction: column;
width: 85vw;
}
.order-items {
flex: 1;
min-height: 35vh;
}
.item img
{
width: 10vw;
}
.summary {
margin-top: 1em;
margin-left: 0;
flex: 1;
}
} | css |
1 David ga haga dagabuli mai labelaa ana gau dauwa dogomotolu mana (30,000) ala koia e humalia, 2 gaa lahi digaula gi Baalah i Judah* Baalah i Judea di waahale dono ingoo labelaa go Kiriath-Jearim (1-Samuel 7.1) , e gaamai Tebedebe o di Hagababa a God dela gu hagamodongoohia go di ingoo Yihowah Koia e Aamua, dela dono lohongo i hongo nia ada manu hai ono bakau ala i hongo di uhi Tebedebe deelaa.* Exodus 25.22 3 Digaula gaa kae di maa i di hale o Abinadab dela i hongo dahi gonduu, ga haga uda gi hongo di waga hongo henua hoou. Gei ogo Uzzah mo Ahio, ala go nia dama daane a Abinadab ala e dagi di ala o di waga hongo henua deelaa,* 1-Samuel 7.1-2 4 gei Ahio dela e hana i mua. 5 David mo digau Israel huogodoo e dadaahili mo di gagaalege huoloo, e haga hagaamu Dimaadua gi nadau mee hai daahili ala go nia ‘harp’, ‘lyre’, aip, ‘castanet’ mono ‘cymbal’.
6 Di nadau dau adu gi di gowaa haga madammaa ‘wheat’ go Nacon, nia kau daane aalaa gaa tinga, gei ogo Uzzah ga daahi adu dono lima belee dahi aga Tebedebe o di Hagababa. 7 Di madagoaa hua deelaa, gei Dimaadua gu hagawelewele gi Uzzah, gu daaligi a mee gii made, i mee dela hagalee hagalabagau Tebedebe deelaa. Uzzah la guu made i golo i taalinga Tebedebe o di Hagababa. 8 Deenei laa e haga ingoo di gowaa deenei bolo “Perez-Uzzah”† “Perez-Uzzah” di ingoo deenei dono hadinga i nnelekai Hebrew boloo, “Di hagaduadua o Uzzah” gaa dae mai loo gi dangi nei. David gu hagawelewele huoloo, idimaa, Dimaadua la ne hagaduadua a Uzzah i dono hagawelewele.
12 King David ne longono ia bolo Dimaadua guu hila ang gi Obed-Edom mo digau o dono hale mo ana mee huogodoo mai i Tebedebe o di Hagababa dela i dono baahi. Deenei laa gei mee gaa kae Tebedebe o di Hagababa mai di hale Obed gaa kae gi Jerusalem mo di haga hagaamu. 13 Digau ala e aamo Tebedebe ne haele hua haga ono, gei David bolo digaula gii tuu, ga tigidaumaha dana kau daane mo tamaa kau bedi. 14 David nogo ulu hua di gahu lenge e didi gi dono huaidina, gaa hai ana gaalege giibeni i dana hai dela e mee i dana haga hagaamu Dimaadua. 15 Deenei dana hai mo digau Israel huogodoo di nadau kae Tebedebe o di Hagababa Dimaadua gi Jerusalem, e wwolowwolo tenetene mo di iliili nadau labaa.
16 Di nadau gaamai Tebedebe deelaa gi lodo di waahale deelaa, gei ogo Michal* 1-Samuel 18.27; 2-Samuel 3.13-14 tama ahina a Saul, ga mmada ia i di bontai dulii, ga gidee ia dono lodo go King David dela e gonigoni ge e hobohobo i mua nia hadumada Dimaadua, gei Michal gu de hiihai huoloo gi mee. 17 Digaula ga gaamai Tebedebe deelaa gaa dugu gi dono lohongo i lodo di Hale laa dela ne hagatogomaalia go David bolo e dugu ai. Gei mee gaa dudu ana tigidaumaha gei e hai ana tigidaumaha hagadaubuni ang gi Dimaadua. 18 I muli di hagalawa ana tigidaumaha, gei mee ga hagahumalia nia daangada aalaa i di ingoo Yihowah Koia e Aamua, 19 gaa duwwe nia meegai gi digaula huogodoo. Mee ne wanga dagidahi nia palaawaa, nia goneiga mmoo, mono bagu ‘grape’ gi nia daane mono ahina huogodoo. Gei digaula gaa hula gi nadau hale.
23 Michal, tama ahina a Saul, dana dama ai gaa dae loo gi dono made.
*6.2: Baalah i Judea di waahale dono ingoo labelaa go Kiriath-Jearim (1-Samuel 7.1)
| english |
In this universe, there is only one source of eternal flow of Anand (Bliss) and it is none other than the ‘God Principle’. Hence, as you make efforts to merge with the God Principle, you begin to experience the sweetness of Anand. Making efforts to merge with the God Principle is itself called sadhana. Sadhana bestows one with the strength to endure unhappiness. Besides, it also helps in the development of Divine virtues like faith, sacrifice and courage in a seeker, making his life ideal and complete.
Most people have theoretical knowledge on how to perform sadhana and how to progress to the further stages in sadhana through discourses or reading. Yet, people do not make efforts to persevere with sadhana, because the analysis of the exact changes that take place in an individual after performing sadhana are not mentioned anywhere. This article includes theoretical and analytical knowledge on some components of sadhana, the minimum spiritual level required for obtaining Guru’s grace and its importance.
Pratyahar means preventing the contact of an organ with an object. For example, when the eyes are closed no scene gets connected with the eyes. When the mind is obsessed with sense pleasure, it deviates from the goal of God-realisation. Pratyahar is beneficial for this.
Faith, less ego and acquiring the Guru’s grace are goals of sadhana; the other aspects are tools to achieve these.
An individual with intense yearning for God-realisation does not require a Gurumantra in the sagun (Materialized) form. This very yearning becomes his internal Chaitanya (Divine consciousness) and functions in the present and inspires him to perform sadhana.
Due to His Holiness Dr Athavale’s resolve and the yearning of seekers, Divine Knowledge which was earlier received by Sages, is now being received by seekers. Does this become seeker’s sadhana so as to achieve the next spiritual level ?
Every seeker is allotted seva as per his or her temperament. Spiritual progress takes place equally with any type of seva; for example, if one conducts analysis based on the subtle knowledge with a yearning of 20% and another lady-seeker performs seva in the kitchen with a yearning of 30%, then on that day her sadhana is more than the first seeker.
strength to reduce sanskars (Subconscious impressions)
Moving away from sanskars and defects means reducing them. When the individual reduces his sanskars and defects on the strength of his sadhana, only then in the true sense he gets separated from the ‘self’. Thus, the subconscious mind detaches the individual from the ‘self’.
A. When the individual reduces his sanskars and defects on the strength of his sadhana, he gets detached from the ‘self’ in the true sense. Here, what is the meaning of ‘getting detached from the self’ in the true sense ?
When efforts are made to reduce sanskars and defects with a bhav (Spiritual emotion) that ‘God is getting everything done’, the ego reduces. Else, thinking that ‘it is with my own efforts that my sanskars and defects have reduced’, the ego increases. Here, the false impression that sanskars and defects have reduced is created. However, in reality this does not happen; on the contrary, the threat of ego increasing is more. To speed up reduction of sanskars and defects, necessary efforts should be coupled with bhav for God. If the individual has a bhav that he cannot reduce sanskars and defects on his own without Divine grace, then these will reduce quickly. Efforts made only with individual strength make the individual selfish, but those made with Divine strength make him selfless. | english |
var app = angular.module('js');
app.service('UserSvc', function($http) {
this.create = function(firstName, lastName, userTel, userEmail, userName, pwd) {
return $http.post('/api/user',{
firstName: firstName,
lastName: lastName,
userTel: userTel,
userName: userName,
userEmail: userEmail,
pwd: <PASSWORD>
});
};
this.getLocations = function() {
return $http.get('/api/locations/events');
};
this.getEvents = function() {
return $http.get('/api/events');
};
this.findById = function(id) {
return $http.get('/api/user/' + id);
};
this.search = function(term) {
return $http.get('/api/user/search/' + term);
};
this.deleteRole = function(id, role, areaId, areaName){
return $http.post('/api/user/deleteRole', {
id: id,
role: role,
areaId: areaId,
areaName: areaName
});
};
this.updateRoles = function(id, role, areaId, areaName) {
return $http.post('/api/user/updateRoles', {
id: id,
role: role,
areaId: areaId,
areaName: areaName
});
};
this.updatePassword = function(userName, userToken, newPassword) {
return $http.post('/api/user/updatePwd', {
userName: userName,
userToken: userToken,
password: <PASSWORD>
});
};
this.sendUserTokenMail = function(userName) {
return $http.post('/api/user/requestUserToken', {
userName: userName
});
};
});
| javascript |
<reponame>gricey432/unifinal<gh_stars>1-10
{
"assessment": [
{
"name": "Assignment 1: Feature article (Profile)",
"weight": 20
},
{
"name": "Assignment 2: Feature article ",
"weight": 50
},
{
"name": "Assignment 3: Feature article (Deadline)",
"weight": 30
}
]
} | json |
Typhoon Chanthu killed three people before weakening into a tropical storm on Friday after making landfall in southern China’s Guangdong province.
Winds, which reached 78 miles per hour (126 kilometers per hour) at the storm’s centre, knocked over a wall in Guangdong’s Wuchuan city, killing two people, the official Xinhua News Agency reported.
Heavy flooding swept away a 50—year—old male resident of a local village in Hong Kong late Thursday. Marine police said they found his body in open water on Friday morning.
Chanthu has moved north to Nanning, the capital of the Guangxi region and been downgraded to a tropical storm, the China Meteorological Administration said in a statement on its website.
The storm comes as China grapples with severe flooding that has left more than 701 people dead and 347 missing so far this year, according to the flood prevention agency. The death toll is the highest since 1998, when more than 4,000 people died. Damages are in the tens of billions of dollars.
In Guangdong, floods have killed more than a dozen people and forced the evacuation of tens of thousands, Xinhua has said. Landslides triggered by heavy rains crushed homes and floods have wiped out crops across the province since June.
More torrential rains are expected across China this week, in provinces ranging from Yunnan in the southwest to Jilin in the northeast. | english |
Karate Combat - One World: Elhadji Ndour vs. Adilet Shadykanov - Full Fight!
Karate Combat: One World - Jorge Perez vs Spyros Margaritopoulos - Full Fight!
R U Next?
🏃🏻♀️ Sports (30+)
Edition: | english |
<reponame>Seirite/shidorywebsite
import { Component, OnInit, Inject } from '@angular/core';
import {MatDialogRef, MAT_DIALOG_DATA} from '@angular/material';
import {DialogData} from '../cart/cart.component';
import {ViewDetailProvider} from './view-detail.provider';
import {Address} from 'ngx-google-places-autocomplete/objects/address';
import {ADD_ORDER_MST} from '../../pojos/ADD_ORDER_MST';
import {AuthService} from '../../utility/auth-service';
@Component({
selector: 'app-view-detail',
templateUrl: './view-detail.component.html',
styleUrls: ['./view-detail.component.scss']
})
export class ViewDetailComponent implements OnInit {
restroImage: any;
restroAreaName: any;
restroName: any;
deliveryFee: string;
userOrderStatus: string;
userPaymentAmount: string;
userMenuItem: any[];
couponName: number;
discountAmount: string;
totalPrice: string;
selectAddress: any;
orderId: any;
destination: {lat: number; lng: number;};
deliveryStatusList: any[];
userOTP: any;
origin: {lat: any; lng: any;};
cityName: string;
stateName: string;
countryName: string;
otherCharges: string;
constructor(public dialogRef: MatDialogRef<ViewDetailComponent>, @Inject(MAT_DIALOG_DATA) public data: DialogData, public provider: ViewDetailProvider, public auth: AuthService,) {}
async ngOnInit() {
await this.getUserLocation();
await this.trackOrder();
}
getUserLocation()
{
return this.provider.getUserLocation().then((list: any) =>
{
list.results.forEach((data: Address) =>
{
if (data.types[0] === "country")
{
this.countryName = data.address_components[0].long_name.trim().toUpperCase();
}
if (data.types[0] === "administrative_area_level_1")
{
this.stateName = data.address_components[0].long_name.trim().toUpperCase();
}
if (data.types[0] === "locality" || data.types[0] === "administrative_area_level_2")
{
this.cityName = data.address_components[0].long_name.trim().toUpperCase();
}
})
}).catch(error =>
{
console.log(error);
})
}
async trackOrder()
{
var restroData: any = await this.provider.getRestaurantsData(this.countryName, this.stateName, this.cityName, this.data.RESTAURENT_ID);
this.origin = {
lat: restroData.RESTRO_LOCATION.geopoint.latitude,
lng: restroData.RESTRO_LOCATION.geopoint.longitude
}
this.restroName = restroData.RESTRO_NAME
this.restroAreaName = restroData.RESTRO_AREA_NAME
this.restroImage = restroData.RESTRO_IMAGE
this.provider.getUserOrderList(this.countryName, this.stateName, this.cityName, restroData.RESTRO_LOCATION.geohash.substring(0, 5), this.data.ORDER_ID).subscribe(async (list: ADD_ORDER_MST[]) =>
{
if (list.length != 0)
{
console.log(list[0]);
this.orderId = list[0].ORDER_ID;
this.selectAddress = list[0].SELECT_ADDRESS;
this.totalPrice = list[0].RESTRO_USER_CART_CURRENCY + " " + list[0].RESTRO_USER_CART_TOTAL;
this.couponName = list[0].RESTRO_USER_CART_COUPON_DISCOUNT_NAME;
this.userOTP = list[0].RESTRO_USER_OTP;
this.deliveryStatusList = list[0].ORDER_STATUS_ARRAY.reverse();
this.destination = {
lat: list[0].SELECT_ADDRESS_GEOPOINT_LATITUDE,
lng: list[0].SELECT_ADDRESS_GEOPOINT_LONGITUDE
}
this.userMenuItem = list[0].MENUCART;
this.otherCharges = list[0].RESTRO_USER_CART_CURRENCY + " " + list[0].EXTRACHARGES;
if (list[0].RESTRO_USER_CART_COUPON_DISCOUNT_NAME != 0)
{
var userPaymentAmount = list[0].RESTRO_USER_CART_TOTAL - list[0].RESTRO_USER_CART_COUPON_DISCOUNT_AMOUNT;
var totalPrice = userPaymentAmount + list[0].RESTRO_USER_CART_CHARGES + list[0].EXTRACHARGES;
this.userPaymentAmount = list[0].RESTRO_USER_CART_CURRENCY + " " + totalPrice;
}
else
{
var totalPrice = list[0].RESTRO_USER_CART_TOTAL + list[0].RESTRO_USER_CART_CHARGES + list[0].EXTRACHARGES;
this.userPaymentAmount = list[0].RESTRO_USER_CART_CURRENCY + " " + totalPrice;
}
this.deliveryFee = list[0].RESTRO_USER_CART_CURRENCY + " " + list[0].RESTRO_USER_CART_CHARGES;
this.discountAmount = list[0].RESTRO_USER_CART_CURRENCY + " " + list[0].RESTRO_USER_CART_COUPON_DISCOUNT_AMOUNT;
if (list[0].DELIVERD == true)
{
this.userOrderStatus = "DELIVERD";
}
else
{
if (list[0].HAWKER_STATUS)
{
this.userOrderStatus = list[0].HAWKER_STATUS;
}
else
{
this.userOrderStatus = list[0].ORDER_STATUS;
}
}
if (list[0].HAWKER_STATUS == "TAKEN" && list[0].DELIVERD == false)
{
this.provider.getHawkerLocation(this.countryName, this.stateName, this.cityName, restroData.RESTRO_LOCATION.geohash.substring(0, 5), list[0].HAWKER_KEY).subscribe((hawkerLocationObj: any) =>
{
this.origin = {
lat: hawkerLocationObj[0].HAWKER_LAT,
lng: hawkerLocationObj[0].HAWKER_LANG
}
})
}
}
else
{
this.provider.getRestroUserOrderList(this.auth.getSession().uid, this.data.ORDER_ID).subscribe((list: ADD_ORDER_MST[]) =>
{
this.userMenuItem = list[0].MENUCART;
this.orderId = list[0].ORDER_ID;
this.selectAddress = list[0].SELECT_ADDRESS;
this.totalPrice = list[0].RESTRO_USER_CART_CURRENCY + " " + list[0].RESTRO_USER_CART_TOTAL;
this.couponName = list[0].RESTRO_USER_CART_COUPON_DISCOUNT_NAME;
this.deliveryFee = list[0].RESTRO_USER_CART_CURRENCY + " " + list[0].RESTRO_USER_CART_CHARGES;
this.discountAmount = list[0].RESTRO_USER_CART_CURRENCY + " " + list[0].RESTRO_USER_CART_COUPON_DISCOUNT_AMOUNT;
if (list[0].RESTRO_USER_CART_COUPON_DISCOUNT_NAME != 0)
{
var userPaymentAmount = list[0].RESTRO_USER_CART_TOTAL - list[0].RESTRO_USER_CART_COUPON_DISCOUNT_AMOUNT;
var totalPrice = userPaymentAmount + list[0].RESTRO_USER_CART_CHARGES;
this.userPaymentAmount = list[0].RESTRO_USER_CART_CURRENCY + " " + totalPrice;
}
else
{
var totalPrice = list[0].RESTRO_USER_CART_TOTAL + list[0].RESTRO_USER_CART_CHARGES;
this.userPaymentAmount = list[0].RESTRO_USER_CART_CURRENCY + " " + totalPrice;
}
})
}
})
}
onRightClick($event)
{
// return false;
}
keyboardEvent($event)
{
if ($event.keyCode == 123)
{
return false;
}
else if(($event.ctrlKey && $event.shiftKey && $event.keyCode == 73) || ($event.ctrlKey && $event.shiftKey && $event.keyCode == 74))
{
return false;
}
}
}
| typescript |
India's industrial production growth rose to a five-month high of 7. 1 per cent in November on the back of better showing by manufacturing, according to official data released on Thursday.
The rise in the factory output measured by the Index of Industrial Production (IIP) comes after a contraction of 4. 2 per cent in October. The previous high was recorded in June 2022 at 12. 6 per cent.
As per the IIP data released by the National Statistical Office (NSO), the manufacturing sector's output grew by 6. 1 per cent in November 2022.
TO READ THE FULL STORY, SUBSCRIBE NOW NOW AT JUST RS 249 A MONTH.
What you get on Business Standard Premium?
- Unlock 30+ premium stories daily hand-picked by our editors, across devices on browser and app.
- Pick your 5 favourite companies, get a daily email with all news updates on them.
- Full access to our intuitive epaper - clip, save, share articles from any device; newspaper archives from 2006.
- Preferential invites to Business Standard events.
- Curated newsletters on markets, personal finance, policy & politics, start-ups, technology, and more. | english |
The latest update to Google Camera app, version v4.3, has added a new feature that might bring relief to those who hate to hear the shutter sound when they click pictures. With the version v4.3 update, supported Nexus and Google Pixel users can turn off all the sounds within the search giant's camera app with a simple toggle button.
Users can now mute all sounds within the camera app, including the shutter sound on clicking pictures as well as the countdown beeps for timer, with a new 'Camera sounds' toggle that remains enabled by default, 9To5Google reports. Users can find the newly-added toggle under 'General' tab in settings.
Notably, the new functionality will only be available to recent Nexus devices and Pixel smartphones as Google stopped updating the app for other smartphones back in 2015 itself. The company has reportedly started rolling out the update, and it should be available via Google Play soon. Users can also download the APK file for sideloading in case they do not want to wait for the update to roll out to their region.
Android Police notes that the ability to mute camera sounds may not be available in all regions, as some countries have laws that mandate cameras to make sounds to prevent unauthorised shooting. Google Camera v4.3 also brings a new zoom control bar, and the exposure controls have also been modified.
In December last year, the search giant added a toggle switch for grid lines, and a button for photo modes to its camera app. The update also enabled the app to load faster and switch between photo and video modes more quickly. Nexus 6, Nexus 5X and Nexus 6P users also received a new Auto-HDR+ mode for better quality shots in low-light areas with last year's update.
| english |
Listen to what CM Arvind Kejriwal said regarding NRC & NPR during the special session inside Delhi Assembly:(PS: No Delhi Congress MLA supported this resolution. Wait a minute... Nevermind!)
SC is hearing its Suo Motu case pertaining to the problems & miseries of #MigrantLabourers who are stranded in different parts of the country due to the #lockdownTitled "In Re:
There are multiple ongoing threads that discredit Joe Biden from ever being President AND the FBI seems to have made little action on. I want to detail those threads here,
Justice For Johnny Depp: A Thread #JohnnyDepp #JusticeForJohnnyDepp #MeToo Part One: The Known Injuries"Throughout our relationship, Ms. Heard committed domestic violence against me. She hit, punched, and kicked me.
| english |
Lauren Sanchez, the ex-wife of NFL Hall-of-Famer Tony Gonzalez, and Amazon owner Jeff Bezos' current beau, was in the news recently for supporting her old flame before his debut on Thursday Night Football.
All three, along with Sanchez and Gonzalez's son Nikko, were captured before the game looking happy and snappy. Fun fact that Thursday Night Football rights are currently held by Amazon, so there are many layers to this coming together.
Interestingly, multiple reports claim Bezos is now engaged to Lauren Sanchez, nearly four years after officially divorcing MacKenzie Scott.
She has been in the limelight for quite some time as an entertainment reporter and also for dating Jeff Bezos and Tony Gonzalez. But as much time has elapsed since she was married to the NFL player and is now dating the current billionaire, fans have been asking if she has gone under the knife to maintain her vaunted looks.
There have only been allegations and no confirmations, but many have claimed that both Bezos and her current lover have undertaken plastic surgery to keep the ageing process at bay. Well, instead of ruminating any further, here's a look at Lauren Sanchez over the years.
Above is a photo of Sanchez and then-beau Tony Gonzalez taken twenty years back. Both of them look happy to be with each other and the fact that they have maintained a great relationship despite separation is beautiful to behold.
Both the former Kansas City Chiefs stars and her former wife have focussed on retaining their physical charms even after two decades. While Tony has maintained his physique and advocated for supplements and fitness apps that he has co-founded or partnered with, it seems Lauren herself has lost none of her vivacious beauty.
Seen above is her now with Jeff Bezos and pop singer Ciara at a Hollywood event in 2021. It is clear that the former reporter has taken some steps to maintain her striking good looks. She looks to be glowing more than ever before, but it may just be the case that happiness brings out an inner warmth in both pictures.
Her affair with Jeff Bezos which led to his breakup with his wife MacKenzie Scott, seems to have led to something permanent rather than provoked any guilt on the part of her current lover, whereas she is still lucky to maintain good terms with her former husband and father of her child.
Interestingly, Bezos was reportedly looking for a way into NFL ownership in 2023. With the Washington Commanders up for sale, there was intense speculation about Bezos mounting a bid for the franchise.
The Snyders eventually agreed to sell it to a consortium led by Philadelphia 76ers owner Josh Harris and NBA legend Magic Johnson.
| english |
In a battle of two early NBA MVP candidates, the Denver Nuggets will host the Golden State Warriors at Ball Arena in a nice Western Conference matchup. Despite some incredible outings from their respective superstars, Stephen Curry and Nikola Jokic, neither the Warriors nor the Nuggets have been consistent in the 2020-21 NBA season.
With Curry and Jokic being early candidates for the NBA MVP, let us create a combined starting five and see who joins the two superstars.
Both squads are coming off losses against Eastern Conference teams. The Golden State Warriors took a loss at home against the Indiana Pacers on January 12th, while the Denver Nuggets blew an 18-point lead in a loss to Kevin Durant and the Brooklyn Nets earlier that night.
The Golden State Warriors started the year with a 2-2 record on a four-game road trip against the Brooklyn Nets, Milwaukee Bucks, Chicago Bulls, and Detroit Pistons. Then, the Warriors played seven consecutive games at Chase Center, San Francisco, and went 4-3 with impressive wins over the Portland Trail Blazers and the LA Clippers.
On the other hand, the Denver Nuggets have struggled for consistency. Their start was quite bad but they have had better outings recently. They started the year with a 1-4 record and have won four of their last six games.
Denver has not had promising young talent Michael Porter Jr. in their lineup in the last seven games. Porter is averaging 19.5 points on 57/42/88 shooting splits in the four games he has played this season, but he remains out due to the NBA's Health and Safety protocol.
The game will be interesting, even though both teams will not have key players such as Eric Paschall for the Golden State Warriors and Gary Harris for Denver.
In this article, we will create a combined starting five from the players available for the upcoming game between the Golden State Warriors and the Denver Nuggets.
Without further ado, let us start.
Guard - Stephen Curry (Golden State Warriors)
Even though Stephen Curry is one of the top early candidates for the 2020-21 NBA MVP, his season has had some signs of inconsistency. Still, he is averaging 27.8 points, five rebounds, and six assists per game.
Also Read: What is Stephen Curry’s Net Worth?
The Warriors have a winning record even though their starting lineup has not played many games together, and Curry has been the main reason for that. Curry's shooting has not been at the usual level he has shown in recent years, as his shooting splits are 43/37/93.
Those numbers would be great for every NBA player, but Curry's shooting splits for his career is 48/43/91.
Also Read: How many rings does Stephen Curry have?
Guard - Jamal Murray (Denver Nuggets)
The Denver Nuggets' offense is really guided by a 'point center,' which gives way to consider Canadian Jamal Murray as a combo guard who would be comfortable at the shooting guard position.
Murray has not been at the great level he showed during the 2020 NBA Playoffs, but he is having a good year so far for the Denver Nuggets. He is averaging 19.7 points per game (10 appearances) and his shooting splits are 48/39/76.
Small Forward - Andrew Wiggins (Golden State Warriors)
Andrew Wiggins struggled with his three-point shooting to start the season with the Golden State Warriors. However, he has been shooting the ball efficiently beyond the arc after starting 2-for-10 in the first two games.
In his last nine games, Wiggins averaged 19 points and five rebounds per game. More importantly, he has made 47 percent of his field goals and 43 percent of his 5.7 attempts from the three-point line in that span.
Overall, Wiggins has made 39 percent of his three-pointers this year (5.5 attempts per game), and it would be the highest of his career if the trend continues.
Power Forward - Draymond Green (Golden State Warriors)
Draymond Green missed the first four games of the 2020-21 NBA season due to a foot issue. However, his return to the court has seen the Golden State Warriors improve their level.
His defense and playmaking abilities have been essential in the team winning four of the seven games he has played and beating good teams like the LA Clippers and Portland Trail Blazers.
Green's impact will not jump to the eye on the stat sheet, but he is certainly a great asset for Steve Kerr and the Golden State Warriors.
He is averaging seven assists, five rebounds, and a steal per game in 27 minutes per night. Even though he is averaging just four points per game, Green is a reluctant shooter who is looking to facilitate on offense and lead the defense.
Center - Nikola Jokic (Denver Nuggets)
The clear early candidate for the NBA Most Valuable Player award is Serbian center Nikola Jokic. Despite the Denver Nuggets' current losing record, Jokic's level has been impressive and deserves recognition.
The Serbian player, who is the brain of Denver's offense, is averaging a triple-double in the first weeks of the NBA season. His per-game averages are 24 points, 11 rebounds, and 10.5 assists. Moreover, Jokic averages 1.8 steals per game and is coming off a career-high of seven thefts vs. the Nets. He has made 58 percent of his field goals, 41 percent of his three-pointers, and 82 percent of his free throws.
Jokic is leading the NBA in assists, triple-doubles, player efficiency rating (PER), win shares, box plus/minus, and value over replacement. That sounds like an MVP.
How did Michael Jordan's gambling "habit" taint his image?
| english |
The goal of this study is to demonstrate how the mosaic transgenesis strategy can be used in zebrafish to rapidly and efficiently assess the relative contributions of multiple oncogenes in tumor initiation and progression in vivo.
Comprehensive genomic analysis has uncovered surprisingly large numbers of genetic alterations in various types of cancers. To robustly and efficiently identify oncogenic “drivers” among these tumors and define their complex relationships with concurrent genetic alterations during tumor pathogenesis remains a daunting task. Recently, zebrafish have emerged as an important animal model for studying human diseases, largely because of their ease of maintenance, high fecundity, obvious advantages for in vivo imaging, high conservation of oncogenes and their molecular pathways, susceptibility to tumorigenesis and, most importantly, the availability of transgenic techniques suitable for use in the fish. Transgenic zebrafish models of cancer have been widely used to dissect oncogenic pathways in diverse tumor types. However, developing a stable transgenic fish model is both tedious and time-consuming, and it is even more difficult and more time-consuming to dissect the cooperation of multiple genes in disease pathogenesis using this approach, which requires the generation of multiple transgenic lines with overexpression of the individual genes of interest followed by complicated breeding of these stable transgenic lines. Hence, use of a mosaic transient transgenic approach in zebrafish offers unique advantages for functional genomic analysis in vivo. Briefly, candidate transgenes can be coinjected into one-cell-stage wild-type or transgenic zebrafish embryos and allowed to integrate together into each somatic cell in a mosaic pattern that leads to mixed genotypes in the same primarily injected animal. This permits one to investigate in a faster and less expensive manner whether and how the candidate genes can collaborate with each other to drive tumorigenesis. By transient overexpression of activated ALK in the transgenic fish overexpressing MYCN, we demonstrate here the cooperation of these two oncogenes in the pathogenesis of a pediatric cancer, neuroblastoma that has resisted most forms of contemporary treatment.
Cancers are progressive diseases marked by the accumulation of pathologic mutations, deletions and chromosome gains over time. These genetic abnormalities can affect multiple cellular processes ranging from the cell cycle, cell death, energetic metabolism and assembly of the cytoskeleton to stress responses such as hypoxia. Hence, tumorigenesis reflects the collective actions of multiple genetic aberrations across a spectrum of biological processes. Recent integrative genomic research efforts, including whole genome sequencing, exome sequencing, targeted sequencing, deep sequencing and genome-wide association studies, have identified a growing number of novel genetic alterations in essentially all types of tumors 1-4. In many instances, the genetic lesions occur together in a nonrandom manner 5-8, suggesting their cooperation in disease pathogenesis. Dissecting the oncogenic roles of the large array of aberrantly expressed genes resulting from these genomic lesions is necessary to devise new therapeutic strategies and to understand the responses of tumor cells to these agents, but this has proved to be a daunting task, requiring very robust animal model systems for the conduct of high-throughput functional genomic analysis in vivo.
Although mammals, especially rodents, are favored models in cancer biology, the zebrafish has begun to attract considerable attention. The teleost zebrafish (Dario rerio) has been used as a model organism for development study since the 1960s and was first applied to the study of tumor pathogenesis in 1982 9-11. Ease of maintenance, small body size, and high fecundity make the zebrafish a robust model for large-scale forward genetic screens to identify mutations that confer abnormal and pathological phenotypes 10. The optical transparency of zebrafish embryos is another key feature supporting wider use of this cancer model, as it allows in vivo imaging to be conducted to locate tumor development in real time 9, an application that is relatively difficult in rodents 12. Recent comparative genomics analysis of the zebrafish reference genome (Zv9) revealed 26,206 protein-coding genes, with 71% having human orthologues, of which 82% are correlated with disease-associated genes in the Online Mendelian Inheritance in Man (OMIM) database 13,14. Consequently, the zebrafish has been used to model diverse types of human cancers, including neuroblastoma 8, T-cell acute lymphoblastic leukemia (T-ALL) 15,16, melanoma 17,18, Ewing’s sarcoma 19, rhabdomyosarcoma 20,21, pancreatic carcinoma 22, hepatocellular carcinoma 23 and myeloid malignancies 24,25, and has been selected as a cancer model for xenotransplantation studies 11,26.
A stable transgenic approach in zebrafish is commonly used to study the effect of gain-of-function of genes in normal development or disease pathogenesis 27,28. To develop such a model (Figure 1A), one injects a DNA construct containing the gene of interest driven by a tissue-specific promoter into one-cell wild-type embryos. Three to four months after injection, when the injected embryos reach sexual maturity, they are outcrossed with wild-type fish to screen for the ones showing integration of the DNA construct in their germline, which licenses them as founder fish. Many factors, such as the copy number and integration site of the transgene, affect expression of the transgene in stable transgenic lines. Thus, to develop a transgenic tumor model, multiple stable transgenic lines overexpressing a single oncogene have to be generated first and screened for the line expressing the transgene at a level that might lead to tumor induction. However, if overexpression of a candidate oncogene is toxic to germ cells, it is difficult to generate a stable transgenic line by directly overexpressing the transgene 29. Hence, this approach can be time-consuming, with a high risk of failure to generate a suitable cancer model.
Here, we illustrate an alternative strategy based on mosaic transient transgenesis (Figure 1B) that provides unique advantages over traditional stable transgenesis for functional genomic study in vivo. In this approach, one or more transgene constructs are injected into the one-cell stage of transgenic or wild-type embryos. The injected DNA constructs containing transgenes are then mosaically and randomly integrated into the primary injected fish, resulting in mixed genotypes within multiple cell populations in individual fish 30. Moreover, coinjection of multiple DNA constructs in one-cell embryos leads to co-integration into the same cell at random sites, allowing one to trace the cells with expression of transgenes and explore the interactions of different genes during disease pathogenesis in the mosaic animals 31. As proof of principle, we transiently overexpressed mutationally activated ALK (F1174L) with mCherry reporter gene in the peripheral sympathetic nervous system (PSNS) under control of the dopamine beta hydroxylase (dβh) promoter in wild-type fish and transgenic fish overexpressing MYCN. ALK, which encodes a receptor tyrosine kinase, is the most frequently mutated gene in high-risk neuroblastoma 5-7,32,33. ALK (F1174L), as one of the most frequent and potent somatic activating mutations, is over-represented in MYCN-amplified high-risk neuroblastoma patients and synergizes with MYCN overexpression to accelerate neuroblastoma tumorigenesis in both stable transgenic mice and transgenic zebrafish models 8,34,35. By mosaic transient overexpression of ALK (F1174L) with mCherry in the MYCN transgenic fish, we recapitulated the acceleration of tumor onset observed in the stable transgenic fish overexpressing both ALK (F1174L) and MYCN, suggesting that the mosaic transgenesis strategy can be used to rapidly and efficiently assess the relative contributions of multiple oncogenes in tumor initiation in vivo.
Subscription Required. Please recommend JoVE to your librarian.
NOTE: All zebrafish studies and maintenance of the animals were done in accord with Mayo Clinic Institute IACUC-approved protocol # A41213.
- Amplify a 5.2-kb dopamine beta hydroxylase (dβh) promoter region8 using the CH211-270H11 BAC clone (from BACPAC resources center (BPRC)) as a DNA template. Use a PCR system appropriate for long and accurate PCR amplification of long DNA templates and the following cycle programs for PCR: 94 °C for 2 min, 10 cycles of (94 °C, 15 sec, 50 °C, 30 sec, 68 °C, 8 min), followed by 30 cycles of (94 °C, 15 sec, 53 °C, 30 sec, 68 °C, 8 min), 68 °C, 4 min (forward primer 5’-GGGGACAACTTTGTATAGAAAAGTTGGCGTACTCCCCCTTTTTAGG-3’ and reverse primer 5’- GGGGACTGCTTTTTTGTACAAACTTGTGTTGCTTTGTCGTCTTTTGA-3’).
- Create the dβh-pDONRP4-P1R entry clone 8 using commercial recombinant cloning system such as multisite gateway. Mix 1 μl of purified dβh PCR product (172 ng/μl), 1 μl (150 ng/μl) pDONRP4-P1R donor vector (together with other gateway vectors are generous gifts from Dr. Chi-Bin Chien, Univ. of Utah), 4 μl of TE buffer (pH 8.0) with 2 µl of BP clonase enzyme mix, incubate for 1 hr at 25 °C and then transform to One Shot TOP10 competent E. coli according to the manufacturer's protocol.
- Generate the dβh:EGFP-MYCN transgenic construct 8 using recombinant cloning system mentioned in step 1.2. Mix 1 μl of each entry clone (150 ng/μl ) including a 5.2-kb dβh promoter (dβh-pDONR P4-P1R construct), EGFP lacking a stop codon (pME-EGFP construct), and human MYCN cDNA (a generous gift from Dr. Hogarty at the Children’s Hospital of Pennsylvania, MYCN-pDONRP2R-P3 construct), 1 μl (150 ng/μl ) of the modified destination vector containing I-SceI recognition sites (a generous gift from Dr. C. Grabher, Karlsruhe Institute of Technology, Karlsruhe, Germany), 4 μl of TE buffer (pH 8.0) with 2 µl of LR Clonase enzyme mix, incubate for 1 hr at 25 °C and then transform to chemically competent E. coli such as One shot top 10 and follow the manufacturer's protocol.
- Make mitf:mitf transgenic construct 8 by digesting the PNP-mitf vector (a generous gift from Dr. D. Raible, Univ. of Washington) with NotI and SalI restriction enzymes for 2 h at RT, and by subcloning the released 2.65-kb DNA fragment that contains the mitf promoter and the coding sequence of the zebrafish mitf gene into the NotI and MluI sites of a modified pBluescript vector containing flanking I-SceI recognition sites (a generous gift from Dr. Hui Feng, Boston University), using T4 DNA ligase according to the manufacturer’s protocol.
NOTE: To increase the efficiency of generating stable MYCN-expressing lines, dβh:EGFP-MYCN and the mitf:mitf DNA constructs are coinjected into one-cell stage nacre embryos. Nacre designates a type of mutant fish lacking a neural crest-derived melanophore during development 36. Thus, the appearance of pigment cells in the injected embryos suggests the integration of mitf:mitf DNA constructs into the genome. It has been demonstrated that two or three coinjected DNA constructs can be cointegrated into the fish genome 31. Thus, pigmentation caused by mitf expression can serve as a marker for the integration of the dβh:EGFP-MYCN transgene and for easier identification of MYCN stable transgenic line.
- Mix the dβh:EGFP-MYCN and mitf:mitf DNA constructs at a 3:1 ratio in a total volume of a 15 μl reaction with 1 μl of I-SceI enzyme and 0.75 μl of buffer. Ensure that the total amount of DNA in the reaction does not exceed 750 ng.
- Carry out the I-SceI digestion at RT for 4 hr or O/N. On the second day, the I-SceI-digested DNAs are ready for microinjection or can be stored at -20 °C for injection in the future. Store the I-SceI enzyme at -80 °C in small aliquots to maintain its enzyme efficiency.
- Subclone the human ALKF1174L and wild-type ALK gene from the PCDNA3 vector (a generous gift from Dr. George at Dana-Farber Cancer Institute) 7 into EcoRI and NotI sites of a pENTRY1A vector (a generous gift from Dr. C. Grabher, Karlsruhe Institute of Technology, Karlsruhe, Germany) using T4 DNA ligase according to the manufacturer’s protocol.
- Generate the dβh:ALKF1174L or dβh:ALKWT transgenic constructs using the recombinant system as mentioned in Protocol 1.2. Briefly, combine three entry clones, dβh-pDONRP4-P1R, ALKF1174L-pENTRY1A (or ALKWT-pENTRY1A) and p3E-polyA, into the modified destination vector containing I-SceI recognition sites (a generous gift from Dr. C. Grabher, Karlsruhe Institute of Technology, Karlsruhe, Germany), using LR Clonase enzyme Mix, according to manufacturer's protocol.
- Mix the dβh: ALKF1174L (or dβh:ALKWT) and dβh:mCherry DNA constructs at a 3:1 ratio and linearize them with I-SceI enzyme as described in PROTOCOL 1.5-1.6.
- Use glass micropipettes with 1.0 mm diameter for all injections 37. Break off the tip of the glass micropipettes with a razor blade before injection. Calibrate the injection volume by injecting H2O into a drop of mineral oil. Measure the diameter of the resulting droplets and adjust the microinjector (pressure or duration of pressure pulse) to ensure that the injection volume is less than 10% of the total cell volume of one cell-stage embryos.
- Add an additional 0.5 μl of fresh I-SceI enzyme (5 unit/μl) in 5 μl of injection solution containing DNA constructs right before the injection to increase the efficiency of transgenesis 38. Inject 50-80 pg of linearized DNA constructs into the cytoplasm of one-cell stage embryos. To ensure the success of injection, mix the sample with 0.25% phenol red for visualization. If cells turn red after injection, it indicates the microinjection is successful. To ensure a high success rate for generating transgenic fish, we typically inject as many as 500 embryos.
- To generate transgenic fish stably expressing MYCN, coinject the linearized dβh:EGFP-MYCN and mitf:mitf DNA constructs (at a 3:1 ratio) into embryos of the pigmentation mutant nacre zebrafish at the one-cell stage. The expression of Mitf serves as a reporter for the integration of transgenic constructs in the fish genome.
- For mosaic overexpression of ALK in the wild-type or MYCN transgenic embryos, co-inject the linearized dβh:ALK F1174L (or dβh:ALKWT) with dβh:mCherry DNA constructs (at a 3:1 ratio) into the one-cell embryos resulting from breeding of F1 heterozygous Tg(dβh:EGFP-MYCN) transgenic fish with wild-type AB fish. Thus, half of offspring are transgenic for MCYN and half are wild-type.
- To increase the efficiency of identification of stable MYCN-expressing lines, anesthetize primarily injected nacre embryos with tricaine (0.02%) at days 3-5 of postfertilization and screen for pigmentation. Transfer the embryos with pigmentation to a new petri dish with fresh egg water and raise them to sexual maturity for further screening for the founder fish, which carry the dβh:EGFP-MYCN transgene in the germ cells.
- To identify the founder with germline transmission of EGFP-MYCN, outcross pigmented F0 adult fish with wild-type AB fish and screen for EGFP-positive embryos at 1-2 days post fertilization for further genotyping. Place a single EGFP-positive F1 embryo into a PCR tube and remove all liquid. Add 50 μl of gDNA extraction buffer which contains 12.5 μl of 4x lysis buffer, 35 μl H2O and 2.5 μl proteinase K (10 mg/ml) to single embryo. Incubate the reaction for 2-3 hr at 55 °C, followed by 10 min of incubation at 98ºC to inactivate proteinase K. To make 50 ml of 4x lysis buffer, add 500 μl of 1M Tris (pH 8.4), 2.5 ml of 1M KCl to 47 ml of H2O. NOTE: After F0 MYCN stable transgenic fish are bred with wild-type AB fish, all of the offspring are pigmented. Thus, pigmentation cannot serve as marker for the identification of MYCN-positive fish. While in the MYCN transgenic fish, the EGFP-MYCN fusion protein is expressed in the PSNS, including the sympathetic neurons of the superior cervical ganglia and sequential segmental ganglion of the sympathetic chain and the non-PSNS dopaminergic neurons, such as the medulla oblongata and cranial ganglia 8. Thus, the expression of EGFP can serve as a marker for identification of the MYCN stable transgenic embryos.
- Use 2 μl of gDNA extracted from the pigmented F1 embryo as template, primers MYCN-test F1: 5’-CTG CTT GAG AAC GAG CTG TG-3’; MYCN-R3: 5’-AGG CAT CGT TTG AGG ATC AG-3’, and the following program with the GC-RICH PCR System: 1 cycle of 95 °C for 3 min, 25 cycles of 95 °C for 30 sec, 58 °C for 30 sec, and 72 °C for 3 min. We typically genotype 14-16 pigmented embryos from a single mating to confirm the presence of integrated MYCN transgene in the pigmented embryos, more than 6 founder fish overexpressing mitf and MYCN were identified by this method.
- Raise up the remainder of the EGFP-positive F1 embryos. Fin clip and genotype them at 2-3 month of age using the above protocol to further confirm the integration of MYCN transgene into the fish. Breed F1 MYCN stable transgenic fish with wild-type AB fish. Co-inject the linearized dβh:ALK F1174L (or dβh:ALKWT) with dβh:mCherry DNA constructs into the one-cell embryos as described in PROTOCOL 2.4.
- Sort the MYCN-expressing embryos in the experiment described in PROTOCOL 2.4 using a stereoscopic fluorescence microscope and screen the primarily injected embryos at days 1-3 of postfertilization for the expression of EGFP-MYCN in the PSNS. Then, during days 2-5 of postfertilization, anesthetize the embryos with tricaine (0.02%) and sort those MYCN-positive or negative embryos again based on the expression of mCherry in the PSNS using a stereoscopic fluorescence microscope. The expression of mCherry serves as a marker for the coexpression of ALK in tissues of the mosaic primary injected animals.
NOTE: ~600 offspring resulting from the breeding of MYCN stable transgenic fish with wild-type fish were injected per group with the linearized DNA constructs, including dβh:ALK F1174L and dβh:mCherry, dβh:ALKWT and dβh:mCherry, or dβh:mCherry alone, respectively. Mosaic expression of mCherry can be observed in 70-90% of the primarily injected fish. One-half to one-third of the injected fish survived through the larvae stage for tumor watch.
- Raise all of the mCherry+MYCN+ and mCherry+MYCN- embryos according to the standard protocols from the zebrafish book 39 and monitor tumor onset beginning at 5 weeks postfertilization.
- Monitor mCherry-positive primarily injected fish every 2 weeks starting at 5 weeks postfertilization for evidence of tumor onset.
- Anesthetize fish with tricaine (0.02%) and screen for the presence of mCherry- and EGFP-expressing tumors in the PSNS under the Nikon SMZ-1500 stereoscopic fluorescence microscope equipped with a digital sight DS-U1 camera.
- To confirm whether the tumors are expressing the ALK transgene, isolate the mCherry- and EGFP-positive masses for ALK genotyping PCR.
- Using PCR, amplify genomic DNA extracted from developed tumors with the following primers: ALK P7: 5’-AGG CCA GGT GTC CGG AAT GC-3’ and ALK P18: 5’-TGT CTT CAG GCT GAT GTT GC-3’ and the following PCR reaction: 1 cycle of 94 °C for 5 min, 30 cycles of (94 °C for 30 sec, 55 °C for 30 sec, and 72 °C for 60 sec). Then, sequence the PCR product with ALK P7 primer to further confirm the existence of mutant or wild-type ALK in the mCherry-positive tumors.
Subscription Required. Please recommend JoVE to your librarian.
To investigate whether overexpression of mutationally activated ALKF1174L or wild-type ALK could collaborate with MYCN in neuroblastoma induction, we overexpressed either activated human ALK or wild-type human ALK under control of the dβh promoter in the PSNS of transgenic fish overexpressing MYCN. Either of the following constructs, dβh-ALKF1174L or dβh-ALKWT, were coinjected with dβh-mCherry into one-cell wild-type or MYCN transgenic embryos (Figure 2A) 8. The expression of mCherry served as a marker for the coexpression of ALK in tissues of the mosaic primary injected animals. All of the expected genotypes were represented in the injected fish: (1) MYCN-expressing fish with mosaic coexpression of activated ALKF1174L and mCherry, designated MYCN;mosaic ALKmut; (2) MYCN-expressing fish with mosaic coexpression of wild-type ALK and mCherry, designated MYCN;mosaic ALKWT; (3) MYCN-expressing fish with mosaic expression of mCherry, designated MYCN;mosaic mCherry; (4) wild-type fish with mosaic coexpression of activated ALKF1174L and mCherry, designated WT;mosaic ALKmut; and (5) wild-type fish with mosaic coexpression of wild-type ALK and mCherry, designated WT;mosaic ALKWT. A tumor watch was then performed every 2 weeks from 5 weeks postfertilization (wpf) on a total of 492 injected animals.
Eight GFP+/mCherry+ tumors arose in the interrenal gland, the human adrenal gland equivalent, by 9 wpf in the MYCN-expressing fish coinjected with dβh-ALKF1174L and dβh-mCherry (Figures 2B and 3). These tumors were histologically, immunohistochemically, and ultrastructurally comparable to human neuroblastoma (data can be found in reference 8). By contrast, no tumors were observed by 9 weeks of age in the MYCN-expressing fish coinjected with dβh-ALKWT and dβh-mCherry (Figures 2C and 3, p = 0.002) or injected with dβh-mCherry alone (Figures 2D and 3, p = 0.007). Tumors arose in both the MYCN;mosaic ALKWT and MYCN;mosaic mCherry fish with the same rate of induction after 12 weeks of age. In addition, neuroblastomas were not detected in any wild-type fish coinjected with either the wild-type ALK and mCherry or ALKF1174L and mCherry transgenes during the 15 weeks of monitoring. Taken together, these findings show that mosaic overexpression of mutationally activated ALK accelerates MYCN-induced tumor onset, regardless of the integration site in individual mosaic animals, and that overexpression of wild-type ALK at the levels driven by the dβh promoter does not appear to collaborate with MYCN overexpression to induce neuroblastoma in this model system.
Figure 1: Schematic outline of conventional stable and mosaic transient zebrafish transgenic strategies in the study of the Cooperative Contributions of Candidate Oncogenes to Tumorigenesis. (A) Stable transgenic strategy. Linearized transgenic DNA construct containing candidate oncogene is injected into one-cell stage wild-type or nacre mutant zebrafish embryos where the transgene can be integrated into the fish genome at random genomic loci. Integration of transgene into the germ cells is required for the generation of stable transgenic line. Primarily injected embryos take 3 to 4 months to reach sexual maturity (F0 generation of fish), which will be outcrossed with wild-type or nacre mutant fish to screen for the founder fish with the transgene germline transmission. The resultant offspring of founder fish, termed the F1 generation, carry the heterozygous alleles of the transgene in their genome. To assess the collaborative effects of two candidate oncogenes, such as gene “a” and gene “b”, in tumorigenesis, we bred the F1 progeny of two stable transgenic lines overexpressing these transgenes, with only a quarter of offspring carrying the compound transgenes. Because of the relatively low efficiency of generating stable transgenic lines, this approach is not feasible for high-throughput functional genomic analyses. (B) Mosaic transient transgenic strategy. Similar to the stable transgenesis, linearized transgenic DNA constructs containing candidate genes can be injected into one-cell stage wild-type embryos. Because the transgene does not have to be integrated into the genome of germ cells, much time and effort can be saved in the process of identifying founder fish. Alternatively, if the transgenic fish line overexpressing one of the candidate oncogenes is available (in our case, MYCN transgenic fish were developed), linearized transgenic DNA constructs containing other candidate genes can be injected into one-cell stage transgenic embryos to study their cooperation in tumorigenesis. Up to three transgene constructs can be coinjected and coexpressed in the primarily injected fish 31; thus, the interaction of candidate oncogenes in tumorigenesis can be assessed in the primarily injected fish. Please click here to view a larger version of this figure.
Figure 2: Mosaic Expression of Activated ALK Accelerates the Onset of MYCN-induced Neuroblastoma 8. Modified figure with permission from Elsevier (reference 3466510609819). (A) Approach for constructing mosaic transgenesis. (B-F) 2-day-old larvae of primarily injected embryos. Lateral views of stable EGFP expression in the dopaminergic neurons, including cranial ganglia (CG, arrowheads) in merged fluorescence-brightfield images (upper panels). Lateral views of mosaic mCherry expression (lower panels) in the cranial ganglia (CG, arrowheads), medulla oblongata (MO, arrows). Some ectopic mCherry expression is observed in the non-PSNS and non-dopaminergic neurons. (G-K) 7-week-old primarily injected fish. (B, G) MYCN-expressing fish coinjected with dβh-ALKF1174L and dβh-mCherry constructs (MYCN;mosaic ALKmut). EGFP- and mCherry-positive tumors arose at 7 weeks (white empty arrows in G). (C, H) MYCN-expressing fish coinjected with dβh-ALKWT and dβh-mCherry constructs (MYCN;mosaic ALKWT). (D, I) MYCN-expressing fish injected with dβh-mCherry construct alone (MYCN; mosaic mCherry). (E, J) Wild-type (WT) fish coinjected with dβh-ALKF1174L and dβh-mCherry constructs (WT; mosaic ALKmut). (F, K) Wild-type (WT) fish coinjected with dβh-ALKWT and dβh-mCherry constructs (WT;mosaic ALKWT). Neuroblastomas were not observed in the MYCN-expressing fish coinjected with dβh-ALKWT and dβh-mCherry or dβh-mCherry alone at 7 wpf, or in any of the siblings that did not inherit the MYCN transgene and were injected with either the ALKWT gene or the ALKF1174L gene. Scale bars, 100 μm in B-F and 1 mm in G-K. A Nikon SMZ-1500 stereoscopic fluorescence microscope equipped with a digital sight DS-U1 camera and a Leica MZ10F stereoscopic fluorescence microscope equipped with a Leica DFC 345FX digital camera were used to capture the fluorescent images.The acquired images were processed and compiled with Adobe Photoshop and Illustrator CS3 (Adobe) software. Please click here to view a larger version of this figure.
Figure 3: Onset of Neuroblastoma in MYCN Transgenic Fish or Wild-type (WT) Fish as Mosaics Coinjected with the DNA Constructs. Reprinted with permission from Elsevier (reference 3466510609819). dβh-ALKF1174L and dβh-mCherry (mosaic ALKmut); dβh-ALKWT and dβh-mCherry (mosaic ALKWT); or dβh-mCherry (mosaic mCherry) alone 8. The difference between tumor onset by 9 wpf in the MYCN-expressing fish coinjected with dβh-ALKF1174L and dβh-mCherry (MYCN;mosaic ALKmut) and that in the MYCN line coinjected with dβh-ALKWT and dβh-mCherry (MYCN;mosaic ALKWT) or dβh-mCherry alone (MYCN; mosaic mCherry) is significant at p = 0.002 and p = 0.007, respectively, by two-tailed Fisher’s exact test.
Subscription Required. Please recommend JoVE to your librarian.
In this representative study, we used transient coinjection and coexpression of activated ALK with the mCherry reporter gene in MYCN-expressing transgenic fish to show that these genes cooperate to markedly accelerate the onset of neuroblastoma, consistent with our previous finding in compound stable transgenic fish coexpressing both activated ALK and MYCN 8. This mosaic transgenic approach possesses several distinct advantages over the conventional method. Most important, it enables rapid examination of the effects of coexpressing candidate oncogenes in primarily injected animals (F0 generation) without the requirement for stable transgenic animals, such as eliminating the excessive time and labor typically involved in the breeding and identification of ALK-expressing stable transgenic fish. We also examined the effect of overexpression of wild-type ALK, with or without MYCN overexpression, on tumor initiation. The results show that transient overexpression of wild-type ALK in our fish model is not sufficient to initiate neuroblastoma tumorigenesis, regardless of the status of the MYCN oncogene. It would be interesting to test in the future whether transient coexpression of both activated ALK and MYCN in wild-type fish could induce earlier onset of tumorigenesis in the primarily injected fish. This study would more faithfully mimic the actual disease context, in which somatic alterations of both genes co-occur in a subset of high-risk neuroblastoma patients 5.
An important design element of the mosaic transient transgenic strategy is the inclusion of a reporter gene for coinjection with any candidate oncogenes of interest, which aids in screening for animals with successful integration of transgenes among the primarily injected zebrafish embryos and to monitor the positive fish for tumor onset and progression. To increase the efficiency of transgenesis, we have applied the I-SceI meganuclease-mediated transgenic approach, which significantly increases the uniform promoter-dependent expression of transgenes from 26% of the primarily injected embryos without meganuclease to 76% of injected embryos with meganuclease 38. Although use of the I-SceI meganuclease-mediated transgenic approach has improved the efficiency of transgenesis remarkably, the percentage of injected embryos positively for the transgenes still remains well below 100%. Thus, the expression of a coinjected reporter gene can serve as a marker to identify injected embryos with successful integration of candidate transgenes before further monitoring the fish for the onset of tumors. In contrast, a Tol2 transposon-mediated transgenic approach has become a popular genetic tool in model vertebrates and has been successfully used for transgenesis, insertional mutagenesis, gene trapping, and enhancer trapping 40,41. Coinjection of Tol2 transposons with transposase mRNA into fertilized embryos can facilitate early integration events that increases the efficiency of chromosomal integration and potentiates successful germline transmission of the transgene42. However, due to the “cut-and-paste” mechanism of DNA transposition, a single copy of transgene is integrated into the chromosome per insertion locus42. Thus, coinjected candidate genes are most likely integrated individually into the fish genome at different sites, which could lead to the expression of candidate genes in different cells and a more complicated transient and mosaic expression pattern of coinjected genes in the primarily injected fish.
Overall, the current study supports the future use of mosaic transgenesis as a rapid means to evaluate the collaborative, perhaps synergistic, relationships among multiple oncogenes in a high-throughput manner, a challenge that is difficult to meet with other animal models, including rodents. Thus far, this strategy has also been successfully applied in transgenic zebrafish to identify genes that suppress the activated RAS-induced initiation of rhabdomyosarcoma 31 and modify the radiation sensitivity of MYC-induced T-cell acute lymphoblastic leukemia 31. Furthermore, Langenau et al, 15 have demonstrated that combining the coinjection approach with a heat-shock-inducible transgenic approach can induce transgene expression by heat shock in the primarily injected fish, which would be very useful in exploring the cooperative roles of oncogenes in tumor progression, as it permits gene expression to be turned on after the primary tumor is established. Very recently, Langenau and colleagues developed the first immunocompromised zebrafish model by targeting rag2 gene with engineered zinc-finger nucleases 43. Loss of function of rag2 permitted robust and long-term engraftment of multiple tissues and cancer cells 43, an advantage that could be useful in transplanting the heterogeneous cancer cells that overexpress candidate transgenes and assessing the effect of mosaic transgene expression on self-renewal capacity, therapeutic responses and the growth rate of these cancer cells.
Finally, mosaic transgenesis offers another unique advantage over stable transgenesis. In stable transgenic animals, the transgenes are integrated into the genome of every single cell in the body and are heritable from generation to generation 27. However, many cancers arise from genetic alterations in somatic cells instead of inherited mutations in germ cells 44. Thus, the mosaic pattern of transgene integration in the primary injected fish and the mixed genotypes within cell populations of individual mosaic transgenic fish would better recapitulate the somatic defects found in patients and would avoid the artificial positional effect caused by a single insertion site in a stable transgenic line. On the other hand, the mosaicism and small population of cells overexpressing the transgenes in the primarily injected fish makes mechanistic study more difficult.
In summary, the mosaic transgenic strategy provides a robust tool for rapid and effective assessment of the cooperative contribution of oncogenes to tumor initiation and spread. This advance is expected to generate seminal information on the interplay among candidate oncogenes, which is urgently needed for further productive investigation of oncogenic mechanisms and pathways and for developing effective targeted therapy. Increasing the efficiency of cointegration of more than three coinjected DNA constructs would open the opportunity for examination of the complex relationships among concurrently expressed multigene combinations in various types of cancers. Challenges for the future will be to modify the mosaic transgenic strategy to accommodate any genomic or epigenetic alteration that could play a role in the neoplastic process, rather than limit its use to mutations that change only protein-coding or to genes are overexpressed, gained or amplified. Recently, improved genome editing techniques, such as transcription activator-like effector nucleases (TALENS) 45 and clustered regularly interspaced short palindromic repeats (CRISPR)/CRISPR-associated (Cas) systems 46, have become widely used to more rapidly and efficiently modify endogenous genes in various types of cells and organisms 46. Such techniques would allow us to perform targeted, highly efficient modifications of genome sequence and gene expression in the zebrafish model system and to better understand the mechanism(s) underlying the role of genomic or epigenetic alterations in tumor pathogenesis. These, in turn, are likely to spur the development of novel molecular therapeutics for a range of cancers.
Subscription Required. Please recommend JoVE to your librarian.
The authors declare that they have no competing financial interests.
We appreciate Dr. Jeong-Soo Lee for sharing the Tg(dbh:EGFP-MYCN) transgenic fish with us in our study. This work was supported by a grant 1K99CA178189-01 from the National Cancer Institute, a fellowship from the Pablove Foundation and the Friends for Life, and young investigator awards from the Alex's Lemonade Stand Foundation and the CureSearch for Children's Cancer Foundation.
- Tenesa, A., Dunlop, M. G. New insights into the aetiology of colorectal cancer from genome-wide association studies. Nat Rev Genet. 10 (6), 353-358 (2009).
- Maher, B. Exome sequencing takes centre stage in cancer profiling. Nature. 459 (7244), 146-147 (2009).
- Meyerson, M., Gabriel, S., Getz, G. Advances in understanding cancer genomes through second-generation sequencing. Nat Rev Genet. 11 (10), 685-696 (2010).
- Chung, C. C., Chanock, S. J. Current status of genome-wide association studies in cancer. Hum Genet. 130 (1), 59-78 (2011).
- Mosse, Y. P., et al. Identification of ALK as a major familial neuroblastoma predisposition gene. Nature. 455 (7215), 930-935 (2008).
- Janoueix-Lerosey, I., et al. Somatic and germline activating mutations of the ALK kinase receptor in neuroblastoma. Nature. 455 (7215), 967-970 (2008).
- George, R. E., et al. Activating mutations in ALK provide a therapeutic target in neuroblastoma. Nature. 455 (7215), 975-978 (2008).
- Zhu, S., et al. Activated ALK Collaborates with MYCN in Neuroblastoma Pathogenesis. Cancer Cell. 21 (3), 362-373 (2012).
- White, R., Rose, K., Zon, L. Zebrafish cancer: the state of the art and the path forward. Nat Rev Cancer. 13 (9), 624-636 (2013).
- Amatruda, J. F., Patton, E. E. Genetic models of cancer in zebrafish. Int Rev Cell Mol Biol. 271, 1-34 (2008).
- Konantz, M., et al. Zebrafish xenografts as a tool for in vivo studies on human cancer. Ann N Y Acad Sci. 1266, 124-137 (2012).
- Ellenbroek, S. I., van Rheenen, J. Imaging hallmarks of cancer in living mice. Nat Rev Cancer. 14 (6), 406-418 (2014).
- Kettleborough, R. N., et al. A systematic genome-wide analysis of zebrafish protein-coding gene function. Nature. 496 (7446), 494-497 (2013).
- Howe, K., et al. The zebrafish reference genome sequence and its relationship to the human genome. Nature. 496 (7446), 498-503 (2013).
- Langenau, D. M., et al. Myc-induced T cell leukemia in transgenic zebrafish. Science. 299 (5608), 887-890 (2003).
- Feng, H., et al. T-lymphoblastic lymphoma cells express high levels of BCL2, S1P1, and ICAM1, leading to a blockade of tumor cell intravasation. Cancer Cell. 18 (4), 353-366 (2010).
- Patton, E. E., et al. BRAF mutations are sufficient to promote nevi formation and cooperate with p53 in the genesis of melanoma. Current biology : CB. 15 (3), 249-254 (2005).
- Santoriello, C., Anelli, V., Alghisi, E., Mione, M. Highly penetrant melanoma in a zebrafish model is independent of ErbB3b signaling. Pigment Cell Melanoma Res. 25 (2), 287-289 (2012).
- Leacock, S. W., et al. A zebrafish transgenic model of Ewing's sarcoma reveals conserved mediators of EWS-FLI1 tumorigenesis. Dis Model Mech. 5 (1), 95-106 (2012).
- Le, X., et al. Heat shock-inducible Cre/Lox approaches to induce diverse types of tumors and hyperplasia in transgenic zebrafish. Proceedings of the National Academy of Sciences of the United States of America. 104 (22), 9410-9415 (2007).
- Langenau, D. M., et al. Effects of RAS on the genesis of embryonal rhabdomyosarcoma. Genes & development. 21 (11), 1382-1395 (2007).
- Park, S. W., et al. Oncogenic KRAS induces progenitor cell expansion and malignant transformation in zebrafish exocrine pancreas. Gastroenterology. 134 (7), 2080-2090 (2008).
- Zheng, W., et al. Xmrk, kras and myc transgenic zebrafish liver cancer models share molecular signatures with subsets of human hepatocellular carcinoma. PLoS One. 9 (3), e91179 (2014).
- Forrester, A. M., et al. NUP98-HOXA9-transgenic zebrafish develop a myeloproliferative neoplasm and provide new insight into mechanisms of myeloid leukaemogenesis. British journal of haematology. 155 (2), 167-181 (2011).
- Alghisi, E., et al. Targeting oncogene expression to endothelial cells induces proliferation of the myelo-erythroid lineage by repressing the Notch pathway. Leukemia. 27 (11), 2229-2241 (2013).
- Veinotte, C. J., Dellaire, G., Berman, J. N. Hooking the big one: the potential of zebrafish xenotransplantation to reform cancer drug screening in the genomic era. Dis Model Mech. 7 (7), 745-754 (2014).
- Patton, E. E., Zon, L. I. The art and design of genetic screens: zebrafish. Nat Rev Genet. 2 (12), 956-966 (2001).
- Lieschke, G. J., Currie, P. D. Animal models of human disease: zebrafish swim into view. Nat Rev Genet. 8 (5), 353-367 (2007).
- Igoucheva, O., Alexeev, V., Yoon, K. Differential cellular responses to exogenous DNA in mammalian cells and its effect on oligonucleotide-directed gene modification. Gene Ther. 13 (3), 266-275 (2006).
- Koster, R. W., Fraser, S. E. Tracing transgene expression in living zebrafish embryos. Dev Biol. 233 (2), 329-346 (2001).
- Langenau, D. M., et al. Co-injection strategies to modify radiation sensitivity and tumor initiation in transgenic Zebrafish. Oncogene. 27 (30), 4242-4248 (2008).
- Chen, Y., et al. Oncogenic mutations of ALK kinase in neuroblastoma. Nature. 455 (7215), 971-974 (2008).
- Pugh, T. J., et al. The genetic landscape of high-risk neuroblastoma. Nature genetics. , (2013).
- Berry, T., et al. The ALK(F1174L) mutation potentiates the oncogenic activity of MYCN in neuroblastoma. Cancer Cell. 22 (1), 117-130 (2012).
- Heukamp, L. C., et al. Targeted expression of mutated ALK induces neuroblastoma in transgenic mice. Sci Transl Med. 4 (141), 141ra191 (2012).
- Lister, J. A., Robertson, C. P., Lepage, T., Johnson, S. L., Raible, D. W. nacre encodes a zebrafish microphthalmia-related protein that regulates neural-crest-derived pigment cell fate. Development. 126 (17), 3757-3767 (1999).
- Rosen, J. N., Sweeney, M. F., Mably, J. D. Microinjection of zebrafish embryos to analyze gene function. J Vis Exp. (25), (2009).
- Thermes, V., et al. I-SceI meganuclease mediates highly efficient transgenesis in fish. Mech Dev. 118 (1-2), 91-98 (2002).
- Kimmel, C. B., Ballard, W. W., Kimmel, S. R., Ullmann, B., Schilling, T. F. Stages of embryonic development of the zebrafish. Dev Dyn. 203 (3), 253-310 (1995).
- Urasaki, A., Asakawa, K., Kawakami, K. Efficient transposition of the Tol2 transposable element from a single-copy donor in zebrafish. Proc Natl Acad Sci U S A. 105 (50), 19827-19832 (2008).
- Caneparo, L., Pantazis, P., Dempsey, W., Fraser, S. E. Intercellular bridges in vertebrate gastrulation. PLoS One. 6 (5), e20230 (2011).
- Ivics, Z., Izsvak, Z. The expanding universe of transposon technologies for gene and cell engineering. Mob DNA. 1 (1), 25 (2010).
- Tang, Q., et al. Optimized cell transplantation using adult rag2 mutant zebrafish. Nat Methods. 11 (8), 821-824 (2014).
- Watson, I. R., Takahashi, K., Futreal, P. A., Chin, L. Emerging patterns of somatic mutations in cancer. Nat Rev Genet. 14 (10), 703-718 (2013).
- Sander, J. D., et al. Targeted gene disruption in somatic zebrafish cells using engineered TALENs. Nat Biotechnol. 29 (8), 697-698 (2011).
- Sander, J. D., Joung, J. K. CRISPR-Cas systems for editing, regulating and targeting genomes. Nat Biotechnol. 32 (4), 347-355 (2014).
| english |
<gh_stars>1-10
from notification.models import Notice
def notification(request):
if request.user.is_authenticated():
return {'notice_unseen_count': Notice.objects.unseen_count_for(request.user),}
else:
return {}
| python |
<!doctype html>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />
<title><NAME> - High Flyer Academy</title>
<link rel="stylesheet" href="styles.css" type="text/css" />
<link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css" integrity="<KEY>" crossorigin="anonymous">
<link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap-theme.min.css" integrity="<KEY>" crossorigin="anonymous">
<link rel="stylesheet" href="https://maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css">
<!-- <script src="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/bootstrap.min.js" integrity="<KEY>" crossorigin="anonymous"></script> -->
<meta name="viewport" content="width=device-width, minimum-scale=1.0, maximum-scale=1.0" />
</head>
<body>
<script>
// Materialize - Initializers
$(document).ready(function(){
$('.scrollfunc').scrollspy();
// Initialize collapse button
);
});
</script>
<section id="body" class="width">
<aside id="sidebar" class="column-left">
<header>
<h1><a href="#">Lauren Loerch</a></h1>
<h2> I am an athlete and I train athletes. </h2>
</header>
<nav id="mainnav">
<ul>
<li><a href="#about">About</a></li>
<li><a href="#news"> News </a></li>
<li><a href="#current">Current</a></li>
<li><a href="#experience">Experience</a></li>
<li><a href="#contact">Contact</a></li>
</ul>
</nav>
</aside>
<section id="content" class="column-right">
<article>
<section id="intro" class="section full-height scrollfunc">
<div class = "overlay"> </div>
<div class = "container">
<h2>Little do you know, <span class="golden"> the ball </span><br> was <span class="underline"> already behind me </span> in this play</h2>
</div>
</section>
</article>
<article>
<section id="about" class="section scrollfunc">
<h3 class="medalist">About</h3>
<div class="container flow-text">
<blockquote>
<h2> I believe it is my purpose to inspire and positively impact athletes through performance enhancement training and volleyball skill development. </h2>
</blockquote>
<p> Though the HFA reaches athletes of all ages, skill and fitness level, every single life is cared for on an individual level. Your goals are important and I will help you achieve them through the creatively and professionally designed programs that not only challenge your brain and body, but keep your body healthy to be able to pursue even the highest of aspirations. </p>
<p> The time is now to pursue your goals. Let me help you conquer your dreams. </p>
<p> Also I almost won NCAA too u lil shit.</p>
<p><strong>Current Focus</strong>: <a aria-label="Go to Volleyball tournament website" href="https://www.google.com/"> AVP Championship </a> || <a aria-label="Go to Volleyball camp website" href="https://www.google.com/"> Volleyball Camp </a> || <a aria-label="Go to CG website" href="https://campgladiator.com/">Camp Gladiator</a></p>
</div>
</article>
<article class="expanded">
<section id="news" class="section scrollfunc">
<h3 class="medalist">News</h3>
<div class="container">
<!-- <div class="row">
--> <div class="card">
<div class="card-content">
<p><span class="card-title"><h4> <a href="http://google.com" class="berkeleyblue-text founderrock-hoverline">Summer Small Group Training</a> </h4></span></p>
<p>Coming soon</p>
<ul>
<li>
This summer I am pleased to announce that I will be having weekly opportunities for volleyball skill development as well as speed/jump training classes.
These class times/days can be determined by you and for you by giving me your input! Please click here to be taken to the Google Survey link.
Thank you very much and I will be releasing the sign up information by April! :)
</li>
</ul>
</div>
</div>
<div class="card">
<div class="card-content">
<p><span class="card-title"><h4> <a href="http://google.com" class="berkeleyblue-text hoverline"> Camp Gladiator Total Transformation/Boot Camp </a> </h4></span></p>
<p>April / May 2018</p>
<ul>
<li>
Ugh Idk
</li>
</ul>
</div>
</div>
</section>
</article>
<article>
<section id="current" class="section scrollfunc">
<h3 class="medalist">Current</h3>
<div class="container">
<div class="row">
<div class="col-md-4">
<div class="card">
<div class="card-image waves-effect waves-block waves-light"> <a> <img alt="HFA picture" src="static/img/hfa-small.png" class="activator"> <a></div>
<div class="card-content"><span class="card-title activator berkeleyblue-text hoverline">High Flyer Academy<i class="mdi-navigation-more-vert right"></i></span>
<p>Basically jump very high</p>
</div>
<div class="card-reveal"><span class="card-title medalist-text hoverline"> About <i class="mdi-navigation-close right"></i></span>
<ul>
<li><strong> Teach you how to jump, flying not included though. </strong></li>
<li><strong> If you whine you keep on dropping but no jumping. </strong> </li>
<li><strong> Do we get to play volleyball though at some point? </strong> </li>
</ul>
<div class="card-action"><a aria-label="Visit Code Island website" href="https://blogspire.herokuapp.com/" target="_blank" data-position="top" data-tooltip="View Online" class="btn-floating btn-large waves-effect waves-light brown tooltipped"><i class="fa fa-external-link"></i></a><a aria-label="Visit the GitHub repo for Code Island project" href="https://github.com/andrewborstein/blogspire" target="_blank" data-position="top" data-tooltip="View Source" class="btn-floating btn-large waves-effect waves-light brown tooltipped"><i class="fa fa-github"></i></a></div>
</div>
</div>
</div>
<div class="col-md-4">
<div class="card">
<div class="card-image waves-effect waves-block waves-light"> <a> <img alt="HFA picture" src="static/img/avp-logo.jpg" class="activator"> <a></div>
<div class="card-content"><span class="card-title activator teal-text hoverline">AVP Volleyball<i class="mdi-navigation-more-vert right"></i></span>
<p> USAOlympic.LaurenLoerch</p>
</div>
<div class="card-reveal"><span class="card-title brown-text"> About <i class="mdi-navigation-close right"></i></span>
<ul>
<li><strong> If you don't make it to the Olympic team one day I will start making you pay for this. Deal? Deal. </strong></li>
</ul>
<div class="card-action"><a aria-label="Visit Code Island website" href="https://blogspire.herokuapp.com/" target="_blank" data-position="top" data-tooltip="View Online" class="btn-floating btn-large waves-effect waves-light brown tooltipped"><i class="fa fa-external-link"></i></a><a aria-label="Visit the GitHub repo for Code Island project" href="https://github.com/andrewborstein/blogspire" target="_blank" data-position="top" data-tooltip="View Source" class="btn-floating btn-large waves-effect waves-light brown tooltipped"><i class="fa fa-github"></i></a></div>
</div>
</div>
</div>
<div class="col-md-4">
<div class="card">
<div class="card-image waves-effect waves-block waves-light"> <a> <img alt="HFA picture" src="static/img/Camp-Gladiator-2.jpg" class="activator"> <a></div>
<div class="card-content"><span class="card-title activator teal-text hoverline">Camp Gladiator<i class="mdi-navigation-more-vert right"></i></span>
<p>Ehh Idk</p>
</div>
<div class="card-reveal"><span class="card-title brown-text"> ACHIEVEMENTS <i class="mdi-navigation-close right"></i></span>
<ul>
<li><strong> MET ALEX. </strong></li>
<li><strong> GET BOTHERED BY ALEX WHEN SLEEPY AS SHIT. </strong> </li>
<li><strong> I STILL THINK "MET ALEX" WAS THE BEST POINT. </strong> </li>
</ul>
<div class="card-action"><a aria-label="Visit Code Island website" href="https://blogspire.herokuapp.com/" target="_blank" data-position="top" data-tooltip="View Online" class="btn-floating btn-large waves-effect waves-light brown tooltipped"><i class="fa fa-external-link"></i></a><a aria-label="Visit the GitHub repo for Code Island project" href="https://github.com/andrewborstein/blogspire" target="_blank" data-position="top" data-tooltip="View Source" class="btn-floating btn-large waves-effect waves-light brown tooltipped"><i class="fa fa-github"></i></a></div>
</div>
</div>
</div>
</div>
</section>
</article>
<article>
<section id="experience" class="section scrollfunc">
<h3 class="medalist">Experience</h3>
<div class="container">
<div class="card">
<div class="card-content">
<div class="row">
<div class="col-md-4"><a target="_blank"><img alt="HFA logo" src="static/img/HFA-logo.png" class="responsive-img center-block"></a></div>
<div class="col-md-8"><p><span class="card-title"> <h4> <a class="berkeleyblue-text founderrock-hoverline">Professional Experience</a> </h4> </span></p> </div>
</div>
<p><em class="grey-text"> Professional Athlete/Certified Coach </em></p>
<ul>
<li> 8.5 years of volleyball coaching experience </li>
<li> PES-NASM Certified </li>
<li> 5 years of strength and conditioning coaching experience </li>
<li> Owner of the High Flyer Academy </li>
<li> Performance Specialist at D1 Sports Training and Therapy (2015-2016) </li>
<li> Assistant Strength and Conditioning Coach at Abilene Christian University (2014) </li>
</ul>
</div>
<div class="card-action"><span> Some time in the past - Present | Austin, TX </span></div>
</div>
<div class="card">
<div class="card-content">
<div class="row">
<div class="col-md-1"> <a target="_blank"> <img alt="CalBears Volleyball logo" src="static/img/cal-volleyball.jpg" class="responsive-img center-block"></a></div>
<div class="col-md-1"> <a target="_blank"> <img alt="NMSU Volleyball logo" src="static/img/cal-volleyball.jpg" class="responsive-img center-block"></a></div>
<div class="col-md-1"> <a target="_blank"> <img alt="High school Volleyball logo" src="static/img/cal-volleyball.jpg" class="responsive-img center-block"></a></div>
<div class="col-md-1"> <a target="_blank"> <img alt="Club Volleyball logo" src="static/img/cal-volleyball.jpg" class="responsive-img center-block"></a></div>
<div class="col-md-8"> <p><span class="card-title"> <h4> <a target="_blank" class="berkeleyblue-text founderrock-hoverline"> University/High School Experience </a> </h4></span> </p>
</div>
</div>
<p><em class="grey-text"> Full time student athlete </em></p>
<ul>
<li> Earned a full D1 volleyball scholarship from the University of California-Berkeley (2010-2012) </li>
<li> Transferred to and graduated from New Mexico State University (2012-2014) </li>
</ul>
<h6>Accomplishments</h6>
<ul>
<li> Accolades at University of California-Berkeley: Pac 10 Champion, National Champion Runner-Up </li>
<li> Accolades at NMSU: 2 time WAC Champion, Second team all -conference </li>
<li> #23 most recruited player in the nation </li>
<li> 3rd place at Texas 5A State Championship </li>
<li> Offensive and team MVP </li>
<li> TGCA All State Team </li>
<li> TSWA All-State Second team </li>
<li> 16-5A District first team </li>
<li> All-Central Texas First Team </li>
<li> Academic All State </li>
</ul>
</div>
<div class="card-action"><span>Some time in the past - Sometime in the more recent past | Las Cruces, NM/ Berkeley, CA/ Austin, TX </span></div>
</div>
</div>
</section>
</article>
<article class="expanded">
<section id="contact" class="section scrollfunc">
<h3 class="medalist">Contact</h3>
<div class="container">
<p><a aria-label="Email HFA" href="mailto:<EMAIL>" data-position="top" data-tooltip="Email Coach Lauren"><i class="fa fa-envelope"></i><a alt="" href="mailto:<EMAIL>" class="founderrock-hoverline"><EMAIL></a></a></p>
<p><a aria-label="Call us!" target="_blank" data-position="top" data-tooltip="Call us" ><i class="fa fa-phone"></i><a alt="" class="founderrock-hoverline"> (512) 789-2669 </a></a></p>
</div>
</section>
</article>
</section>
<footer class="clear">
<p>© 2018 LaurenLoerch. </p>
</footer>
</section>
<div class="clear"></div>
</section>
</body>
</html>
| html |
With schools set to reopen from January 1 in Karnataka, Primary and Secondary Education Minister S Suresh Kumar on Wednesday visited a few institutions here and reviewed their prepardness to conduct classes adhering to COVID-19 guidelines.
With schools set to reopen from January 1 in Karnataka, Primary and Secondary Education Minister S Suresh Kumar on Wednesday visited a few institutions here and reviewed their prepardness to conduct classes adhering to COVID-19 guidelines.
The Minister inspected arrangements in classrooms and spoke to the headmasters, principals, lecturers and teachers, instructing them to take precautions to prevent spread of the virus once the classes resume, official sources said.
He also advised the staff to sensitise the students about the significance of passing the SSLC and secondary PU classes with high marks, they said.
The state is gearing for reopen of schools and pre- university (higher secondary) colleges, which have remained shut since March due to COVID-19, after the government on December 19 decided to resume regular classes for Class X and PU-II year (class 12) students from January 1.
It has also planned to hold regular classes for PU-I year from January 15 and to start Vidyagama programme for students of classes six to nine in government schools, taking education to their doorsteps.
Under this programme a teacher will teach a small batch of students at a place convenient for them to assemble and study by abiding by the COVID-19 guidelines.
The government’s decision to reopen schools has been opposed by some quarters, including ruling BJP MLC A H Vishwanath, a former education minister, who said children should not be put to risk in the pandemic time.
However, Kumar has defended the move, saying the issue pertained to the future of the children.
As of Tuesday, the total coronavirus cases in the state has risen to 9,17,571 and active cases stood at 11,861. Seven people who returned from the UK have tested positive for the mutated strain of the virus in the state. | english |
<filename>src/blog/archives/index.md<gh_stars>0
---
template: blog/archives.hbs
--- | markdown |
The experts’ answers to our questions about the future of the metaverse that are reported in this section are somewhat longer than those in the previous section, and they often have a more panoramic perspective.
Sam Adams, artificial general intelligence researcher at Metacognitive Technology, previously a distinguished engineer with IBM, commented, “Cognitive immersion can occur anytime a mind focuses intensely on something to the exclusion of everything else. Musicians experience it, as do athletes, artists, assembly line workers, mothers giving birth, authors and computer programmers. In all cases it requires a focal point as well as the engagement of some number of senses and muscles. The stronger the focus, the broader the engagement of the senses, the lower the latency between muscle twitch and sensory response, the easier it becomes to slip into that state of immersion. As a college student in 1980, I found myself fully immersed in the original adventure game, ‘The Colossal Cave.’ The interface was minimal, the visual and auditory distractions many, but I was entirely oblivious to them as I wandered in the cave and puzzled over the various challenges, ignoring the hunger and exhaustion from lack of sleep for as long as I could. Simply put, it was immersive and addicting.
“With the development of XR technology and content over the next 20 years, I expect this experience of cognitive immersion to be commonly available on demand to anyone with access to the bandwidth and sensor/effector interface equipment. As with the original PC wave, then the desktop/Internet/browser wave and the mobile Internet wave, the XR wave will be driven by device access, bandwidth and content. I fully expect device access to be a non-issue, as XR by 2030 will be delivered to the human senses via ubiquitous wearable devices, probably in eyeglass format. Broadband beyond 5G and low-Earth-orbit satellites like StarLink will provide the low-latency bandwidth required to trigger full immersion of the senses.
“This leaves the content, which will largely be a predictable mix of passive (music and movies) and active (social, gaming, sports) offerings. But the rest of the metaverse ecosystem, the massive cloud computing centers with their daily exabyte data feeds and the trillions of Internet of Things (IoT) devices will usher in a kind of content we have only hinted at in today’s XR experience: David Gelernter’s ‘Mirror Worlds.’ And just as it is nearly impossible to engage in modern life and society without hours of daily Internet interaction today, it will be even more difficult to separate the ‘real world’ from the manifold mirror worlds we will be engaged in and – yes – addicted to.
“Positives include broader life experiences and the development and maintenance of personal relationships, especially with those we will never likely meet ‘in the flesh.’ Remote work and, especially, collaborative remote work will be greatly enhanced.
“Changing the world? It will amplify the existing cross-border unification and hyper-balkanization of society that we have been experiencing with the global mobile internet for the past 10 years. Changing our lives? For the connected, more time away from real life, but this will also create a desire to unplug, at least for retreats and vacations. Look for ‘Faraday Retreats’ that use technology to digitally isolate guests from the ’verse. Extremes will include Faraday communities (anti-digital communes) where people chose to live their lives in ‘the real world,’ without being jacked into the ’verse.
Jamais Cascio, distinguished fellow at the Institute for the Future, responded, “By 2040, the technologies that fall under the ‘metaverse’ umbrella will very likely be in ubiquitous use, even if the term ‘metaverse’ has fallen out of use. Fully-immersive virtual environments distinct from the physical environment will likely be occasional-use tools, as we see today with games. More commonly, we’re likely to be using a kind of everyday mixed-reality system that allows for both the physical and the digital worlds to overlap.
“There are multiple reasons why a full-immersion non-physical environment will be used in a more-limited fashion, but primary among these is the sensory limitation. While visuals and sound may be reproduced at better-than-real clarity, touch, balance, smell/taste and other bodily senses that are outside of sight and hearing do not get the same kind of immersion. (For the sake of this discussion, I’m not talking about direct neural interface – the technology is plausible in this timeframe but has impacts and cautions that go well beyond the ‘metaverse’ conversation.)
“I believe that we’ll confirm that bodily sensation is necessary for a truly immersive experience and that being disconnected from the body for extended periods will lead to both physical and mental health issues. Conversely, mixed (blended, augmented) reality technologies that allow experiencing physical and digital sensory inputs simultaneously will likely be far more widely used. This can even include experiences where all visual and audio input is digital – but working in concert with the real-world environment (such as virtual decoration and imagery for clothing, rooms, faces, etc.).
“Toned-down versions of this technology can be extraordinarily useful for both work and personal enjoyment. We already have narrowly-focused iterations of this technology in use; this 2040 version would be much richer and more environment-aware (e.g., will not require beacons indicating the size of a space, as with current VR technology).
“There are two significant concerns that arise from this kind of technology. The first is more blatant, the second is more subtle but it is ultimately a bigger problem. Mixed reality, by definition, allows for the imposition of digital imagery over physical reality. The potential for abuse is clear, from censorship to non-consenting pornography. The technologies needed to police such abuses are even more complex than trying to block harmful images and text from Facebook, and would likely be similarly ineffective. The more subtle problem would also apply, at least to some degree, to all forms of metaverse technology: enclosure, in the classical economics sense.
“Things that in ‘real’ reality are free to see (architecture, clothing design, street art) can in a metaverse system be paywalled off, such that only people with the right token can see the ‘true’ shape of the building or the full details of the dress. The nightmare iteration of this is that essentially everything has to be paid for to experience – it’s a world where everything is an NFT.
Avi Bar-Zeev, an XR pioneer who played important roles in developing and creating the technology of HoloLens, Google Earth and Second Life and has worked with Microsoft, Google, Apple, Amazon, Disney VR and more, agreed to share several segments of his writing and talks about the metaverse as his contribution to this report.
In a November 2021 talk at Augmented World Expo, Bar-Zeev, predicted:
“AR is going to be bigger than ‘the metaverse,’ not by volume but by ubiquity and user experience. The fact that we will be wearing our AR glasses for potentially 18 hours a day makes it more personal to us. The same interfaces that work for us in the real world will work for us in the virtual world, so we will be applying these same ideas across any reality, across any world. The fact is that we want to interact with stuff that is personal. So, if the metaverse is essentially the next generation of the internet, and XR hardware is essentially the browser and we are the browsers, then AR-like user experiences may be the most common user interface.
In a February 2022 interview with Spatial Reality, Bar-Zeev said:
“Privacy is critical. And the biggest threat to privacy, honestly, is the ad-driven business model. It’s not that the ads by themselves are evil. Ads often are just giving us information or creative expressions, and they’re largely protected by the First Amendment. The problem is the way that our personal information is being used to deliver ads. What I’m arguing for, and other more-prominent people are arguing for, is that we need to regulate the business model, not the expression of the ads themselves.
“When XR has eye tracking and emotional analysis, the computer is going to better understand how we think and feel about everything in our environment. It’s going to know more about how we feel about people in our lives. It’s going to know how we feel about political issues. It’s going to be able to know about our emotional triggers. Whatever our hot-button triggers are, the companies will know how to get us into a much-less-rational state, which is the perfect state for making us susceptible to all sorts of influences. By optimizing the system, driving it for the maximum extraction of ad revenue, we’ve turned people into data mines and no longer truly free-thinking individuals. Ultimately, if we take it to its extreme, we lose our autonomy, we lose our ability to think for ourselves because the systems are pushing our buttons for profit.
And in a column he wrote for uxdesign.cc Bar-Zeev predicted:
“Imagine 10-20 years from now. We’ll each have a pair of contact lenses that can create AR and VR as well as we want (except maybe for touch, taste and smell). By then, the words ‘AR,’ ‘VR’ and ‘meta’ will likely be relegated to academic writing and old-timey company branding in favor of something more hip, now and organic. Open your eyes and you’ll see 3D holograms in the real world perfectly mixed with real objects and people. Close your eyes (or otherwise elide the natural light) and you can be virtually anyplace else. Audio must also mix perfectly. But AR and VR are only two points on a spectrum. If you start with AR and add enough virtual stuff to distract you from reality, you’re effectively in VR.
“On the way to that ubiquity, power imbalances invariably lead to social strife. Without the normal constraints of reality or other ways to defend ourselves, we are more vulnerable to other people’s powers, personalities and agendas. If we increase our individual power beyond prose and memes today toward experiences with effective superpowers, we also turn up the volume on the negative expressions as well. This is not an arms race that anyone can ‘win.’ Even in a virtual world of one, with no multiplayer capability, we have to consider the owners of the space as unseen, god-like entities who may want to influence our thoughts and actions in positive or negative ways. And some will.
“Mark Zuckerberg recently touted a desired feature of his company’s future AR glasses as being able to carry on other conversations while we’re talking to someone in person. Let’s also figure the glasses can secretly bring up the social media profiles, criminal records and posted vacation photos of the people we meet. These particular features are clearly anti-social, even sociopathic, giving the wearer much more power over others. If the goal is adding presence and connection, then being distracted by information and social anxiety about the contents of each other’s AR displays yields the opposite result. However, if the glasses monitor our own individual emotions and let us know when we’re getting too emotional or otherwise less present (e.g., lost in past memories or worries of the future), then they will provide a tool for us to be more present, more grounded and better connected with others around us. Why don’t we ever hear about that as a feature?
Stephen Downes, expert with the Digital Technologies Research Centre of the National Research Council of Canada, said, “Opportunities for fraud and scams will abound. As well, there is the risk of a non-traceable shadow economy developing. It will be hard for people to grasp the idea that something could be both digital and ‘real’ and, despite the reassurances, it will be very hard not to believe that they could simply cease to exist. The danger here is that people will think of very real things – like, say, digital currency debts – as non-real, and suffer harmful consequences. Complicating matters will be the fact that digital objects may also embody artificial intelligence.
“By 2040 (probably much sooner), it will not be possible for most people to distinguish between avatars representing humans and AIs. The proliferation of AIs will enable actors with more resources to simulate a much greater presence online (just as we have seen with social media bots). A lot of these will be laughable (there will be the metaverse equivalent of the Nigerian prince), but there will also be serious cases of impersonation and worse. It is perhaps too early to demand specific legislation, but it is not too early to develop frameworks describing what will be acceptable and unacceptable uses of the metaverse both legally and commercially.
“Having said all that, despite the risks, we will not be able to resist developing, entering and using the metaverse. It will be very difficult to enjoy flat-screen media entertainment after watching an immersive movie or sporting event. Today’s games are not yet more compelling in VR, but as the interface improves play will be much more fluid and natural, making traditional gameplay on a screen with controller or keyboard seem awkward. Just as it’s hard to get up from the television or pull the plug on a video-gaming marathon, it will be difficult to put down the controller. Psychologists will undoubtedly talk about dissociation disorders afflicting people after long VR sessions.
“Having said all that, the metaverse will eventually draw us together. Just as radio and television created the common experience, just as social media created shared memes, we are going to find we share our world more deeply and meaningfully with people (and ideas, and representations) we could not have imagined before plugging in. being closer to each other isn’t always pleasant (as we’ve certainly learned!) but being closer leads to deeper dialogue, greater understanding, and more empathy. No, this is not universal – the divisions in our global society will also be magnified. We will need to ensure that these divisions are not incentivized and monetized, as they are in some social media today, because the experience will be that much more personal, the hurt caused by these divisions is that much greater. More, because digital resources are not scarce in the way that physical resources are scarce, there will be more opportunity for people in less-advantaged positions and societies, providing they can gain access to the network.
“We saw manufacturing develop worldwide with the development of a global supply chain infrastructure. People worldwide can today offer digital services thanks to the global internet. A person does not need to own a factory or a farm to earn wealth in a digital world. This depends, though, on a shared digital infrastructure. If the inhabitants of the metaverse are merely tenants, then most likely they will be excluded from any prosperity the metaverse may create.
“Decentralization is the great promise of the metaverse, especially some of the enabling technologies such as blockchain networks and self-sovereign identity. In a truly decentralized system each of us might enjoy more autonomy to design our own lives and our own worlds. If we are indeed moving toward a world of less regulation and oversight, it will have to be a very different from today’s world. Personal autonomy and self-governance can thrive only in a world where authoritarianism and coercion are difficult, and where people are protected from the ill effects of inequity and exclusion.
The biggest impact will tie to the question: What does it mean to be human?
Chris Labash, associate professor of communication and innovation at Carnegie Mellon University, wrote, “Remember that part in ‘The Matrix’ where Agent Smith and Neo are fighting in the subway and the train is bearing down on them and Smith says, ‘Do you hear that sound, Mr. Anderson? That is the sound of inevitability.’ That’s the metaverse today and the likelihood of it being real, ubiquitous and normalized by 2040. Right now, I have a student research team creating ‘An Investor’s Guide to the Metaverse.’ Right now, I have a student doing an independent study on creating and managing products in the metaverse. Right now, a friend of mine has just launched an NFT Asset Management company. [Here are] my top five [questions about the metaverse], starting with the most important:
5.0 – The most important question about the metaverse is about its fundamental ontological impact on what it means to be ‘human.’ Will it make us more civil? Will it represent an opportunity for ‘augmented humanity?’ What happens when AI-enabled ‘entities’ can be part of the metaverse? Every great leap in technology is inextricably interwoven with fundamental human questions. As we move forward, the questions get harder, the answers more challenging to put into practice.
4.0 – Apropos of the above, what about diversity, equity and inclusion? The metaverse offers a great opportunity for specific groups to establish safe spaces where they can share experiences, desires and dreams and then have the tools to actualize them. It can also, as we’ve already seen, be a dark alleyway where the most horrible elements of our global society do most-horrible things, often with no consequences. It could potentially level the playing field both economically and socially for those sidelined in the physical world. And note that I say ‘physical’ versus ‘real’ world. The metaverse being digital doesn’t make it any less real; in fact, by 2040, it may be considered by many people to be as real or even more real a space than ‘physical’ space. The blurring line between the physical universe and the metaverse is potentially very empowering. I taught on the Second Life platform years ago and it was interesting that people with physical disabilities made their avatars reflect those disabilities, rather than be a ‘perfect’ character.
3.0 – Similarly, will the metaverse drive social participation or social isolation? Both are likely. One potential problem is the possibility of over-participation. In the early days of Nintendo 64, traders on Wall Street were staying home to play ‘GoldenEye’ rather than showing up for work. The metaverse will be even more addictive. The metaverse can also be a safe space for the painfully shy or introverted to interact with others on their own timetable and terms. The obvious minus: right now 37% of 12- to 17-year-olds have been bullied online, 30% more than once, and more than 50% of LGBTQ+ young people have been bullied. The metaverse can exacerbate this and/or help mitigate it.
2.0 – What will be the role of government? When it comes to how real the metaverse will be on a global scale, consider the possibilities. As I write this, Russia’s invasion of Ukraine has intensified, and the show of support for Ukraine is both global and unprecedented. Fast-forward to 2040: If such a conflict took place in the world of an interconnected metaverse, imagine the power of seeing millions of digital people dressed in blue and yellow all gathered in a vast open space in a profound show of support for Ukraine. Now couple that visual support with digital sanctions – economic and otherwise; with the sharing of blockchain-verified real-time information that goes beyond a government’s control, with the sharing of real-time crowdsourced information about Russian troop deployment, supply and logistic issues, with the humanitarian needs of Ukraine and fundraising and other efforts to get help to those in need ... and you begin to see both the power and the possibility of a world where the metaverse has become an elemental part of everyday life, intertwined with physical reality, that allows for immediate action and reaction. We will also see ‘digital alliances’ emerging just as we are seeing in the response to Russia’s invasion: pan-government groups that span finance, media and the social sector that can bring enormous pressure to bear. We will also likely see the rise of ‘digital states.’ If Facebook were a country its population right now would outnumber that of China. The metaverse will be far bigger (and more participative) than Facebook. That’s a lot of power.
1.0 – Finally, one of the most basic questions that people will have is ‘Can I trust it?’ Participation in the metaverse requires trust, trust requires governance, governance requires accountability and accountability requires redress. How, in an entity that belongs to no one, can any of that be achieved and achieved consistently? Will people not just participate but continually participate in the metaverse? One potentially strong attribute is that people will turn to the metaverse for ‘trusted’ communication; misinformation, disinformation and state- or group-sponsored information terrorism could be mitigated by the real-time public verification that a blockchain-powered metaverse allows.
David Weinberger, senior researcher at Harvard’s Berkman Center for Internet and Society, wrote, “Let’s assume that that the metaverse will be like the web in that it does not consist of a single, wholly owned place, but rather is composed of many, many, many linked metaverses. There is reason to think that metaverses are highly likely to become the primary way we participate on the Internet. The Internet has pretty consistently tended toward richer media, so metaverses seem like a ‘natural’ next step.
“This assumes that access to affordable bandwidth and low-cost VR/AR devices will increase, and the like. And that, in turn, will further increase the digital divide. We should therefore be, from the start, designing metaverse protocols that will scale from full-sensory user experiences to accessibility on low-end 2D devices. This should not require add-ons or third-party transformers, any more than viewing a webpage on a huge, high-resolution screen or a mobile device does.
“Let’s make a further optimistic assumption: metaverses are made deeply interoperable in exactly the way that social media platforms are not but webpages are. You can open a website on virtually any device because webpages and web browsers follow protocols. That’s why any proper browser can display any non-broken webpage and even lots of pages that are broken.
“Let’s hope that metaverse interoperability means not only that you can display and interact with a metaverse on any metaverse ‘browser,’ but that metaverses know how to use the information you choose to provide. For example, a metaverse should be able to display your chosen avatar, which you might also use in other metaverses; this would help provide continuity of perceived identity across these spaces. Simply having the same avatar across metaverses – especially if you’re in third-person view so you can see yourself in the metaverse – will give us a sense of digital personhood that we don’t generally have on the web or Internet. It will also enable others to recognize you, enabling a deeper sense of social connection. Being on a thread with a player named ‘Excal143a’ is very different from joining a conversation with a person you recognize because of their pink frog head and by their sense of fashion.
“But your avatar is the least of it. You should be able to carry into each individual metaverse what you want that metaverse to know about you. We’ve long had this dream of each of us controlling what various sites and services can know about us, but perhaps efforts like Tim Berners-Lee’s Solid will start to gain a foothold. There’s every reason to think that metaverses will take on some of the most important properties of games: an emphasis on engagement, a sense of play, sociality and mods.
1) Engagement: Metaverses will compete for our attention by looking great, but also by encouraging exploration and participation. Exploration might manifest itself by leaving much hidden but discoverable. Participation means that we will often be able to build permanent elements in a metaverse, by ourselves or with others. Just look what happens with Minecraft.
2) Play: The web has already eroded the wall between the serious and the playful. That is not only usually a false wall, but it keeps people away from explorations we’d all be better off engaging in. Metaverses will perhaps encourage play the way lots of discussion boards enable or encourage collaborative humor.
3) Sociality: There are more invitations to connect when your avatar almost literally runs into another. Or if that avatar is a creature with a pink frog head who’s carving ellipses in a waterfall. The synchronous and visual nature of metaverses may encourage more social connections, perhaps with more cross-session persistence. I’m sure we’ll also invent new ways to attack and degrade one another.
4) Mods: Game makers have learned that mods – customer-created maps, potions, rules, etc. – not only help them retain their users longer, they deepen the users’ attachment to the game. Metaverses with mods? Yes please!
“This all might well change our ideas about the role of the real. Full-on metaverses will succeed by putting us into a world with other people in which we encounter, discuss and create things that matter. We can say that none of that is ‘real’ (something the philosopher David Chalmers disputes in his recent book ‘Reality+’), but as we spend more and more time going through metaverses on the Internet, it will become ever more clear that what matters to us transcends both the real and the media we’re engaged in.
Melissa Sassi, global head of IBM Hyper Protect Accelerator, wrote in great detail about a number of use cases for extended reality: “There are still significant hurdles to overcome with metaverse applications in real-life scenarios; however, I do expect the technology to continue to evolve and become more refined leading up to 2040.
“I see the rise of the digital twin and personalized ways of bringing AI and ML to life via our digital twins: a new definition of ‘in real life.’ We will continue to rely on technology to help us become more productive, more efficient and able to virtually be in far corners of the world without physically being there. As the digital world continues to intertwine with the physical world, these lines will continue to blur for all of us to the point at which I am not even sure we can say ‘in real life’ anymore. Real life will have become our digital life and vice-versa.
“Use Case #1: Health care – Significant efforts today are put toward treating symptoms as opposed to achieving prevention, and we all recognize the challenges with sharing patient records across doctors and health care networks. Having a digital twin in health care could be incredibly powerful when it comes to predictive modeling and sharing data across health care providers and entities, where the patient is put more in the driver’s seat in regard to preventative care and bringing your own record to medical doctors and other health care representatives responsible for care. One example I have seen inspiring this work is BioTwin, an early stage health tech startup that’s created a virtual replica geared toward detecting and preventing health care ailments before they occur. This is a budding space to watch when it comes to health care innovation, disruption and putting more information in the hands of the people to drive good health care and well-being, which is one of the UN’s Sustainable Development Goals.
“Use Case #2: Education – Having digital twins gives rise to better opportunities for those learning to become health care professionals or medical doctors for practicing in virtual environments. Tiny mistakes and major adverse effects that occur during surgery or other types of medical treatment can be decreased by providing learners with virtually simulated environments and twins to practice with no risk to human life. AR, MR and VR plus the personalization of AI and ML will give other boosts in people’s education journey, for instance in practicing professional development or soft skills, including public speaking, problem solving, critical thinking, teamwork and collaboration, and many other skills of the future. Many ed-tech platforms today focus on certification factors and talking heads; imagine a scenario where people can interact as digital twins in different scenarios to practice real-life skills. According to the World Economic Forum, we are in a workforce crisis, with 87% of companies worldwide expecting skills gaps, as noted by Boston Consulting Group. Employers today say supervisory staff and front-line workers lack future-ready skills. Having a digital twin provides significant opportunities for learning practically and being immersed in the learning journey. Advances can also give rise to the digital-twin educator in K-12, higher education and other settings where teaching can happen in different ways from the past, especially in scenarios where we are learning in digital formats. COVID-19 has taught the education sector that relying on in-person instruction is not always possible, which has given rise to significant increases in e-learning investment within the venture capital community.
“Use Case #3: Digital and entrepreneurial thinking – The same conceptualization can be applied to learning digital skills or entrepreneurial thinking. According to the World Economic Forum, the lack of digital skills among their people cost 14 G20 countries $11.5 trillion in GDP growth. It also reported that by 2030 U.S. talent shortages and a skills gap could cost its economy $8.5 trillion. Learning and development leaders see skilling, upskilling and reskilling as strategic priorities, further demonstrating the need for new business models, technology applications, content and curriculum and practical ways of demonstrating that workers have gained these skills that can be applied in the workplace. Bringing the metaverse into this realm could have significant impacts. The World Economic Forum’s ‘Reskilling Revolution’ program aims to provide 1 billion people with better education, skills and jobs by 2030. There is no reason this cannot happen via augmented reality.
“Use Case #4: Entertainment and gaming – Gaming will continue to evolve as a space with more interactivity and more engagement with the digital world. The metaverse also has applications for concerts where digital-only concerts are also a consideration. With hundreds of millions of users, Epic Games, the creator of Fortnite, and other game developers have significant opportunities for intertwining gaming and entertainment with the metaverse. Epic produced a live virtual show in its Fortnight game starring EDM producer Marshmello. More than 10 million people ‘attended’ the concert. It followed later with a virtual concert starring Travis Scott that drew an audience of 12.3 million people. As of 2021 Fortnite was played by 40% of children between the ages of 10 and 17, according to National Research Group. But the rise of virtual entertainment is not just for children and youth. During the pandemic, the annual adult gathering known as Burning Man went virtual as well. I would say the vote is still out on whether the feeling, sentiment, experience and memories of real-life entertainment can be replicated via metaverse applications. I am not convinced that the metaverse replaces how one feels being on the Playa in Blackrock City, Nevada.
“Use Case #5: Social life – While we already are experiencing and enjoying digital opportunities to ‘see’ others in far corners of the earth through video conferencing and virtual events today, I am 100% certain that these virtual events, even if done in AR/VR/MR, do not replicate the ‘in-real-life’ experience. I recently had an opportunity to go back onto the in-person conference scene after the long stretch of COVID-19-induced isolation, and no virtual event in the last two years could replicate that feeling of talking with real people, in real life, and enjoying what the physical world has to offer. Who knows? Perhaps future innovations in the metaverse space will change my mind, but for now, keep my ‘in real life’ social interaction at the top of the list of things I am after vs. metaverse interactions. I would say the vote is still out on whether the feeling, sentiment, experience and memories of real-life entertainment can be replicated via metaverse applications.
Daniel S. Schiff, a Ph.D. candidate who studies the governance and social and ethical implications of AI at the School of Public Policy at Georgia Tech, said, “The existence of a metaverse renews questions about misinformation, protection of privacy, targeted advertising, disparate treatment of subgroups, coercion, harassment, bullying, labor and sexual exploitation, and more. VR theoretically makes many of these and other social and ethical issues raised by the internet and social media even more stark given the enhanced experience associated with immersive audiovisual content. Harassment and bullying could become more traumatizing, while protecting privacy would be even more essential given increased access to data about an individual’s digital location, emotional state, or behavior. The early experiences of sexual harassment in virtual spaces indeed point to a dire need for proactive governance and regulation, especially to protect vulnerable groups and children. Further issues surround psychological well-being. Indeed, just as digital technologies and social media have altered people’s cognitive patterns, attention spans, systems of reward, and mental health, so too can VR/AR alter and even exploit these phenomena, likely to a greater degree. Careful research and governance will be needed stay ahead of these and other associated harms, especially if they are indeed more stark in phenomenologically enhanced VR settings.
“A further set of questions surrounds notions of identity and interpersonal relations and behavior. In particular, will individuals be likely to substitute alternative digital personas for their real-world personalities, and will such behavior allow for creative expression and development or instead psychological dissonance, harmful artificiality, and social and self-alienation? That is, will increasingly immersive environments allow for more genuine expression of the self and deepening of relationships, or simply for more immersive forms of self and social displacement, deception and so on? Of particular concern is that acts of sexual or physical violence or criminal activity may find a home in the metaverse.
“A further issue in VR/AR ethics associated with modern philosophy surrounds the Nozickian ‘experience machine,’ most prominently portrayed in popular culture through the film ‘The Matrix.’ The cautionary tale here is that individuals who embrace the metaverse may dissociate from society and real-world relationships and obligations, for example, by deprioritizing school work, marriage, job-hunting and child-raising. These kinds of disengagement have been explored in the context of the adoption of television and the internet, with some real indications of social harm.
“Needless to say, to the extent that these risks are realized rather than overblown, they can spell major societal challenges in the form of insufficient educational achievement, fractured labor markets, lack of stable family or community life, structural demographic problems, crime, loneliness, poor health, political instability and additional social and psychological pathologies.
Robert M. Mason, professor emeritus at the University of Washington whose research focuses on the culture and ethics of knowledge management, commented, “By 2040 the metaverse will be a much more refined and truly fully-immersive, well-functioning aspect of daily life for a half billion or more people globally. The global population in 2040 is estimated to be over 9 billion, so this statement posits that about 5.5% of the global population would be affected by a more refined and well-functioning metaverse.
“Without parsing all the nuances or quibbling about definitions, I expect the relevant technologies will continue to improve, with image resolution and improved sensory stimuli enabling increasingly immersive virtual encounters. For those living in 2040, the metaverse can provide an expanding range of physical/social encounters and intense experiences.
“Having lived through a few iterations of technologies that have great potential to enhance our access to knowledge and provide a wider scope of virtual experiences, I have become less enamored with the technologies themselves and more intrigued with questions of 1) how these technologies are assembled into systems and services that provide experiential opportunities for users and 2) who the users are.
“What experiences will be available to users and what will motivate producers to provide these experiences? These three categories will help shape the future metaverse:
- What services are available?
- Who has access to these services?
- What (government) regulations are enacted?
“If we review what producers provided with earlier versions of the ‘virtual’ or Internet-connected world, we arguably could begin with France’s Minitel. Developed and operated by the French administration for telecommunications to increase citizens’ use of the phone service and to lower the cost of printing telephone directories, Minitel provided popular and successful. Although based on a rudimentary text-only terminal (provided free to phone subscribers), Minitel provided a glimpse into the Internet-powered future of connectivity and online services and offers some insight into the tension between regulation and open access for developers (a forerunner of net neutrality).
“With all the beneficial and cost-effective services that Minitel provided, the French government seemed almost embarrassed to report on the high volume and high revenue provided by games and chat rooms, particularly the messageries roses (adult chat rooms). Despite concerns about minors’ access to these sex sites, France PTT decided not to prohibit them, leaving access control to parents. Men were more likely to be users of these sites than women, prompting many of the sites to hire men to impersonate women to maintain high call/chat volume. Consequently, these chat rooms expanded, even to the point of overloading and crashing the Minitel system.
“Observers of today’s Internet and other online services disagree on estimates of the financial impact of gaming and entertainment (including pornography and ‘pink’ interactive services), but all agree that the volume is high and revenues substantially more than $100 billion. Virtual reality and augmented reality (VR and AR) games in 2019 comprised less than 10% of this total but were growing.
“Assuming a Western (U.S.) capitalistic (or even oligarchic) economic environment for the continued evolutionary development of the metaverse, I anticipate that the profit motive, perhaps lightly controlled by government regulation, will shape, if not dictate, the types of services available and the accessibility of these services.
“As I write these notes today, almost 60% of the global population are active Internet users. However, Internet activity is not equally distributed; the World Bank estimates that Internet use ranges from over 90% in most economically advanced countries to less than 10% in countries with emerging economies.
“If history and current services are guides to how services will evolve in the metaverse, I would expect that gaming and entertainment (including pornography and ‘pink’ services) to be early adopters of the technological capabilities associated with the metaverse. Innovative developers are likely to drawn to the wide range of economic and manipulative opportunities in the metaverse, including scams and swindles. The past success of sex-based websites and Internet services would attract developers for metaverse platforms that offer similar services. I expect such services to be a significant, though not necessarily the dominant, driver of developer innovation and user adoption in the emerging metaverse.
“The opportunity for metaverse engagement is likely to continue to be uneven. Absent any government-based services designed to engage all households, the technology accessibility gap will continue to grow and increase the social inequality of metaverse engagement.
Maja Vujovic, owner/director of Compass Communications in Belgrade, Serbia, wrote, “If we take just the two most-discussed activities we’ve experienced en masse during the pandemic of COVID-19 – remote education and remote work – and imagine them within the metaverse, we can readily see that the drawbacks of those unhappy experiences would get resolved in this new and improved setting. Instead of staring at the Muppet-theater-like gallery of passive faces, who cannot do any work while they talk one at a time, individual workers and students could be at their workstations at home, quietly do their work and only occasionally talk to their colleagues’ and their bosses’ avatars on their screens. They could have almost exactly the same experience as they would have on location at a workplace, or in a school setting – for real. And that could easily include the small talk at the water cooler or accidental encounters in the canteen – occasionally priceless opportunities for exchanging ideas and information.
“There is no doubt this would become the beloved option for anyone who would be given a choice to fully participate in an essential collective activity without the discomfort of commuting, polluting, shaving or applying makeup, packing kids’ lunches, etc. But the downsides would be considerable, too. There would be a drop in the foot traffic in urban areas, which would bring a reduction in commerce, casual shopping, impromptu meals and coffee breaks, cab rides, public transportation demand and most likely even tourism.
“Critically, this could considerably increase our loneliness. It could work fine for already established families, which would be able to structure their time better. But it would reduce the opportunities for people to meet, get to know each other, become romantically involved and start families. It would likely help us get in touch and develop relationships with people from other parts of the world with whom we have something in common or with whom we think alike. But this would be at the expense of the everyday contacts with our immediate neighbours, people in our communities, our colleagues, etc. This would lead to more polarization, not less.
“It is very likely that we will use the potential of these technologies to delegate ourselves into situations we would rather avoid, such as a job interview at a distant location, a parent-teacher meeting that conflicts with our work hours and so on. Dating applications will have a field day with this technology, as will teaching, sales and any other sector where presentation is key.
“The change in our daily lives will not be a grand one. We will use these tools the way we use a thesaurus in a word-processing program or a spreadsheet to track our expenses. They will be tools only and we will not be any smarter or kinder than without them. They will save us time and offer more convenience, an additional layer of entertainment, more variety in our day-to-day existence. But we will not mistake them for a distinct layer of reality, nor will we get confused about our identity. If really superb avatars get developed and we get to customize them ourselves (a whole economy would develop around that alone) we will at the most treat those avatars the way we treat pets – as very close beings that we love dearly, but that we can keep in their place most of the time.
“The blockchain and smart contracts will likely have a role of a new paradigm, new phase in technology. On a large scale, we will substitute most of what we use today – social media, interest groups, databases of all sorts (expenses, gift lists, playlists, etc.) as well as any seminal interactions, and we will port them all into the blockchain. We will use blockchain to tackle the biggest problem that the metaverse will exacerbate and turn into our main priority: the question of trust. Blockchain-backed provenance will become the only solid source of truth that we will have to combat misinformation, fake news, identity theft and other transgressions of that kind.
Michael M.J. Fischer, professor of anthropology and science and technology studies at MIT and lecturer in the department of global health and social medicine at Harvard Medical School, said, “As defined here, the metaverse is computer-generated, networked-extended, reality spaces (XR, including VR, AR, MR). All these are already extant, so it is not much of a stretch that these (and perhaps also holograms) will continue to be refined, extended and made interactive by 2040. In addition, it is likely that progress will continue to be made in many fields, such as haptic feedback-enabled prostheses (i.e., biomechanical, neuro-electronic interfaced, cyborg) along the lines of those being developed in Hugh Herr’s lab at MIT.
These will become rich spaces for artistic speculative and material-environment play:
- More-efficient, accessible and user-customizable storage spaces for information (aiding chemical, pharmacological, archival and environmental search and retrieval)
“Among the advantages or new affordances might be more-flexible attitudes in regard to the worlds we live in and make for ourselves, and an expanded ability to live with and switch among various cognitive, affective and aesthetic modalities. No doubt these will also stimulate new forms of math and physics and deeper understandings of biological processes.
“The worries are that these can easily become aids to intensified surveillance societies, concentrated corporate structures and anti-user control (also known as ‘anti-democratic’ in conventional parlance), including anti-privacy and anti-tolerance of diversity, tinkering and eccentricities. The technological developments being rolled out in China in Xingjiang to control and ‘reeducate’ the Uyghurs are the most obvious disturbing red warning lights, especially since much of that technology is Silicon Valley-developed, parts of which are being introduced also in our neoliberal societies under management-speak, techno-optimistic sales tactics [driven by] the needs for capital to develop technologies and sales at the cost of abandoning societal values.
“More attention needs to be given to: 1) social implications of complex systems to social responsibility and social justice concerns; 2) multiple social arrangements that are not normalized into coercive, algorithmic reductiveness driven by efficiency models; and 3) increasingly problematic mental health issues being reported globally as due to a rise in individuals’ feeling isolated and alienated – including increases in suicides.
Nigel M. Cameron, president emeritus of the Center for Policy on Emerging Technologies in Washington, D.C., wrote, “It’s a truism that tech changes tend to be slower than expected but also more fundamental in their impacts. I suspect this case will bear that out. 2040 seems a long way off, though 2004 seems as if it was just yesterday. Much has happened since then, though Second Life proved to be a cul-de-sac, MOOCs [massive open online courses] remained outside the mainstream of education despite the COVID-19 fillip to all things distant, and the allegedly liberating power of technologies and their corporate purveyors are currently held in much more suspicion than they were in 2004 – by governments and people alike.
“I’m anticipating a steady migration online of all manner of economic activity, though the nonce word ‘metaverse’ suggesting a basic recasting does not appeal to me. My book on robots and jobs from five years back already looks pretty dated (we really were on the cusp of self-driving cars, before we weren’t). While the direction of travel of AI development is one-way, that may not be the case for take-up of its possibilities, partly as COVID-19 has potently reminded us of much that is uniquely special about the non-metaverse, partly as cybersecurity issues remain wide open and as advances in cyber-physical systems raise levels of risk to potentially existential heights.
Keynes’ vision of widespread ‘technological unemployment’ is a non-trivial possibility; it was Bill Gates who opined some years back that governments would be pleading with companies to employ people, not machines. Certainly, tax subsystems will adjust – both to preserve employment and of course to capture value added – and it may be social movements will grant ever-more-enhanced value to human interaction and notions of human service. When I spoke at the Champalimaud Foundation’s 10th anniversary conference on The World in 100 Years, I said I hoped when the Foundation celebrates its 110th anniversary our descendants will still wish to fly to Lisbon and party in-person in the Jeronimos Monastery. It may be that the next 18 years will pretty much decide the direction we’ll be taking long after, as we discover whether we can gain real benefit from the metaverse while keeping our focus on a human future.
Jonathan Kolber, author of “A Celebration Society,” wrote, “What most people don’t understand about virtual reality is that a fully immersive VR experience, with zero latency (subjectively), will be functionally equivalent to physical reality for most purposes. While we are far from that experience as of yet, all of the enabling technologies are either entering commercialization or emerging from laboratories. To whatever extent these technologies prove insufficient or limited by comparison to ‘real’ physical reality, the commercial pressures to refine them in the direction of full immersion will be immense and will grow as use cases for VR grow.
“One profound implication of this anticipated development by 2040 is that the demand for all manner of physical objects will drastically diminish. The reason is that, in almost all cases, what people want is the experiences that are enabled by an object rather than the object itself. While unique artworks have cachet, even that can be digitized, as evidenced by NFTs. By way of example, once people can experience idealized living environments which can be customized and modified almost instantly from vast ‘libraries’ of digital components with AI curation, there will be much less pressure for the oft-cited ‘location, location, location’ that seemingly drives real estate prices ever higher. It will likewise become much easier to ‘own’ a set of immersive digital representations of cars than the physical cars, which require expensive maintenance, storage space and are subject to breakdowns and are not easily modifiable. People who spend large parts of every day immersed in virtual worlds may only require basic necessities from the ‘real’ physical environment: modest housing, adequate if bland nutrition and preventive health care. Since the health care can also be provided via the VR environment, in most cases via automated monitoring of vitals and occasional human consultation, there will be little need for most people to physically travel anywhere.
“The reduction in requirements for manufactured physical objects will utterly transform and eventually render obsolete the economy. I therefore expect life on Earth post-2040 to become largely a playground and place of voluntary mutual service, with the best examples of such service lavishly celebrated. In this world, the human inhabitants will have our basic needs met by robots and the AIs that control those robots, with few humans having to ‘work’ as currently understood. (The reasoning behind this statement is extensive, and a primary topic of my book.)
“Nevertheless, I do expect a trickle of people to begin migrating to the first O’Neill-style space world in the late 21st century, due to the unique physical experiences possible there which, to my knowledge, cannot be replicated in VR – and the paradisiacal environments they can create. Once the first has been built – and either the space elevator or SSTO spaceplanes for transport – I expect an exponential increase in spaceworlds, with both habitation and tourism bringing vast numbers of people to them in the 22nd century and beyond.
“As with any transformative technology, fully-immersive VR will have both angelic and demonic uses. The demonic uses could include intrusive surveillance and control at a level that even George Orwell could not imagine, and I expect totalitarian states to embrace this power. Likewise, hackers may be able to take control of a user’s experiences, even to the extent of convincing the user that their VR experience IS reality, tricking them into emptying financial accounts, etc.
Russ White, infrastructure architect and internet pioneer, commented, “Whether the metaverse will play a major role in the lives of a large portion of the world’s population by 2040 largely hinges on social and cultural realities rather than technical ones (although there is a technical component). There are two positive aspects of the ‘metaverse.’ First, it promises, like Web3, a return to the individual-creator origins of the Internet. Second, it promises disruption, which means the current large players may well be dethroned and replaced with a more decentralized group of smaller players. For the dream of the metaverse to come to life, however, we must all live in the same ‘world.’ The metaverse, like social media, requires a network effect. People want to talk to people; for that to happen, we must be on the same platform. Platforms are expensive and complex and rely on the infrastructure of the Internet to reach everyone. The money and technical expertise required to build the platform(s) on which the metaverse must run are in the hands of a small group of people – the same people who have built and control the current neurodigital media landscape.
“The most likely result, then, is that the metaverse turns out to be an even deeper immersion into ‘social media,’ which means a further centralization of our culture, and the increasing power of the technological elite. These trends, however, may have run their course. There may be a backlash against the technological elite forming. We may be currently living through the high tide of an authoritarian moment. It might be that the current globalist regime can hang onto power, but it doesn’t look promising right now. Since the metaverse is a project of this technological elite, so it’s hard to judge its future. It might be that the global economy has reached a sort of tipping point, and we cannot restore the ideas of widespread ownership and decentralized control. The difficulty of building and maintaining these technologies is also a factor.
“There is an illusion of control by the ‘smartest and brightest’ in our current culture. From the COVID-19 pandemic to building the platforms that run our daily lives, people have largely turned control over to experts – people with specialized training and experience. The failure of these experts, however, to keep their promises in a purely technical way is becoming obvious to large segments of the population. In the technology world, specifically, security and privacy are becoming huge issues. The personal information of hundreds of millions of people is exposed every year. DDoS [distributed denial of service attacks] are on the rise. Cars are being bricked because of mistakes in a radio broadcast. Large providers are experiencing multiday outages. Each time there is a large-scale outage, each time people’s privacy is violated, each time a prediction about the future (on which policy is based) fails, the confidence in ‘the elite’ slips a little.
Glenn Edens, Internet Hall of Fame member and professor of practice at the School of Global Management at Arizona State University, wrote, “The metaverse in prototype form has existed for a while now, first as 3D spaces mapped onto 2D spaces (Second Life, Minecraft, Roblox, myriad blockbuster games, etc.) and now moving to simulations of immersive spaces using 3D projection. Although, at present these 3D spaces are implemented very crudely using head-and-body-position tracking, localized displays (head-mounted stereoscopic such as Oculus, HTC, etc.) or glasses (Google Glass, Microsoft HoloLens, etc.), or room-based projections (Avalon Holographic, Looking Glass, etc.) – it’s all very crude. These implementations all limit the metaverse to specialized viewing spaces and highly constructed experiences, not entirely unlike a home theater system or even a good hi-fidelity stereo system where you have to ‘sit in the right place’ to get the full effect. (Of course, wireless headphones and spatial audio are a solution in the audio-only realm.) Looking at the historically slow progress of this field, we should ask four questions:
- Will the metaverse be portable (i.e., mobile) or relatively stationary?
- Will the metaverse be a separate space in our lives or integrated into it?
- Will the metaverse be pervasive or task-related?
- Will the metaverse experiences really be social, with all the nuances, or will it be a crude simulation, slightly better than online today?
“My bet is by 2040 we’ll be stationary (you’ll have to ‘sit in the right place’), it will be a separate space one intentionally visits, it will be task-related, and it will still be a simulation of true social interaction, only slightly better than Zoom is today, for example. You will ‘go in’ for work or play or health care or socializing and you will ‘come out’ when you are done or need a break.
“The first challenge to implementing the 2040 vision is to create a set of viewing tools that are comfortable and natural to wear, that allow freedom of movement and enhance activities rather than require a dedication to the activities (i.e., if one is passionate about their VR gaming, they are willing to put up with the discomfort and clunkiness of a head-mounted display). This is proving to be a technical challenge, so far.
“The next challenge to implement the 2040 vision is tackling standards, architecture and governance (the three pillars of any platform). Just how will these unfold? The Internet is compelling since no one company owns it – TCP/IP, UDP, DNS, etc. – are standards, along with standard physical equipment created to implement those standards (routers, switches, multiplexors, etc.), that allow billions of devices to interconnect and appear to work together.
“If, when and how will we get to a set of standards, architecture and governance to create a single metaverse is key, or will we have thousands of individual metaverses, or should it be metaversi :-)? Of course, today we all understand the Internet is a geographically fragmented global network with significant local control, however it still appears largely as a global agora.
“Technically, the viewing hardware that will drive the experience is the problem. Let’s be honest, for the average person the user interfaces we have today are horrific. I am certain we will have the software platforms, authoring tools, algorithms, computation resources, storage and communications bandwidth necessary to create viable metaverse experiences. I’d predict that many (if not most) visitors to the metaverse will see the 3D world mapped to a 2D device (Second Life got a lot right, it was just way too early).
“Our current metaverse situation reminds of the early years, long ago, when bulletin boards (remember Fido?), Tymshare, The Well, Prodigy, CompuServe and America Online were individual, unique and competing visions of an online world ultimately subsumed by an improved set of standards, architecture and governance that is now called ‘the Internet.’ The safe bet is that individual economically-driven enterprises offering competing capabilities, experiences and visions of the future will continue to be the structure of the metaverse in 2040.
“The economic and technology forces favor task-driven multiple metaverses, enabled by continuing improvement in software, communications, computing and viewing equipment. These multi-metaverses will be run by many commercial enterprises, non-profits, educational institutions, research labs, government institutions and, hopefully, grass roots activists and citizens. You will decide what you want to do, where you will sit (or stand) and which metaverse to visit. The metaverse will be additive to our present-day online and computing experiences rather than replacing them.
“So, my best-guess answers to the primary questions are:
- Will the metaverse be portable or relatively stationary? Stationary – it will not be as pervasive as mobile devices and the web are today.
- Will the metaverse be pervasive or task-related? Task-related.
- Will the metaverse experiences really be social, with all the nuances, or will it be a simulation of social experiences, slightly better than online today? It will be a simulation, which will fall short of true presence or prana.
“Immersive experiences and environments have benefits: They can be more engaging; they can increase comprehension and communications; they can more effectively share complex information and details; they can compress time and space, reducing the effort of travel; they can improve task efficiencies (such as maintenance of complex equipment); they might improve education and health care outcomes; and they might increase access and diffusion of knowledge and experience. All of these factors should have real economic and societal benefits.
Maggie Jackson, award-winning journalist and author of “Distracted: Reclaiming Our Focus in a World of Lost Attention,” said, “In thinking about the role that the metaverse might play in the future of humanity, we must separate the question of ‘what can we create?’ from the question of how our creations, now and in future, will influence humanity. We must ask, in other words, ‘What do we want from the metaverse?’ This is a caution that tech critics from Langdon Winner to Wendall Berry have wisely offered for decades. The choices we make today in terms of what kind of virtual/digital worlds we create and inhabit are critical. The very survival of humanity is at stake. My concerns are multifold. Despite falling far short of any kind of truly realistic simulation of life itself, the digital world already is taken for ‘real.’ Whether we are dealing with a caregiver robot or allowing ourselves to be transported by VR, humans are very willing to treat almost any digital experience as real. Any further improvements in the realism of the metaverse will make this more so.
“It’s important to keep in mind that however ‘real’ we deem the metaverse to be, it will not constitute the totality of our reality. At least for a long while, the physical, biological, nondigital reality remains and should be cherished. It would be a huge mistake to seek to subsume ‘non-virtual experience’ within ‘meta-experience.’ Nondigital realities are slower, more messy, more demanding, and so offer us exactly the kind of experiences and skills that are needed for deliberation, creativity, contemplation. If we invest ourselves too fully in a metaverse that seems to answer all our needs at the push of a button, that rewards instant gratification, that allows an easy escape from the difficulty of non-virtual life, we are narrowing ourselves in the moment and over time.
“David Gelernter, writing in his 1991 book, ‘Mirror Worlds’:
“Today, investors and tech pundits are excited about the financial returns of this new technology incarnation. But the metaverse – whether as currently envisioned by Facebook/Meta, or as an evolution of mirror worlds – will be more than a branding bonanza, a new-world land grab. As Gelernter wrote years ago, the deeper, much more important value of the metaverse microcosm is how it helps us to understand – and hopefully improve – the world we live in; understand some aspect, or many aspects, of the pieces and parts the mirror world shows us; how they fit together and what that means.
“So, the first thing we need to consider is what a metaverse truly is; then the breadth and depth of the change a metaverse brings to us, our consciousness, our physical world. Indeed, advanced, immersive, 3D, online worlds have the potential to benefit all aspects of society, from education, health care and government to gaming, entertainment and the arts – positively affecting all social and civic life. If – and this if could not loom larger – if we examine, grapple with, come to understand and then regularly monitor the logic of the metaverse and our adapting to (entraining with) that logic.
“In the history of art, the advent of mirrors fundamentally changed painting, as David Hockney and others have described. Why? Because this seemingly benign technological advance led painters to more exactly replicate the world the mirror enabled them to see. In other words, looking in the mirror changed how they saw; and that changed how they thought. Replicating the world, presenting and re-presenting the world, seems to be as fundamental a human enterprise as building cities or making art. The metaverse represents an ultimate expression of that will to replicate.
“Replication changes how we see, and so what we tell ourselves about the world. For millennia humans told stories of how the world was: how it began (Genesis), how it would end (Revelation). And in our private lives, many of us did the best we could with what (little) we knew. Then came the Enlightenment, the rise of science and technology. What emerged, albeit slowly, was objective reality. Prior to the Enlightenment, objective reality was an undiscovered land. We take this for granted, at least in free societies, because we can access so many objective resources, from libraries and schools to government resources like the CDC [Centers for Disease Control and Prevention] or the Census Bureau. We stopped making up the world when we started measuring it. Via replication, the metaverse – mirror worlds – has the potential to be the finest measuring tool humans have ever created because it will be designed to exactly reproduce reality in multiple dimensions.
“Replication is a complete change of perspective. So, first, among a series of new demands such a remarkable technology as the metaverse makes upon our consciousness we must examine and come to understand the logic of the metaverse. The logic of the metaverse is the logic of the mirror, multiplied by the logic of immersion. Since mirror logic entails exaction – the desire to exactly reproduce what the mirror shows – and this exaction is fundamental to seeing the world more accurately, we will see that the product of exaction is facticity, the state of what is really going on. If you see exactly, you are seeing what is – and this leads you to see differently, engendering topsight and greater insight. This is a whole new story.
“As a digital representation of any- and everything in the world, the metaverse will be a camera-ready venue; everything in the physical world will be captured by innumerable cameras – ‘pinpoint electric eyes that can be placed anywhere and everywhere’ – to re-create reality. Our consensus physical reality will be translated into the mirror world. As everything and everyone will be on camera 24/7/365, we all become the Kardashians. Our workplace, our homes, public and private spaces will be reflected back to us in the mirror, creating reflection as broadcast. We will all become as transparent as windows. We will wonder: Have I become a person of interest to some tracking entity, since anyone, anywhere can see me?
“Such concerns will be countered by new mores and privacy boundaries that will naturally emerge. As the metaverse bulldozes boundaries and mirror-reflection becomes our first-line self-awareness, even the new selfie, the presentation of self – and almost anything else – in everyday life will be a presentation to cameras. For a car-manufacturing company or a shipper of goods and services with numerous warehouse and delivery protocols, the mirror world is a game-changing advance of remarkable dimensions. Mirroring enables and enhances many things, such as supply chain management, production efficiency, assembly line accuracy, etc. While at the human level ubiquitous cameras and mirrors create a host of moral, identity and privacy quandaries.
“On a personal level the metaverse not only entails watching, surveillance and the thorny ground of self-presentation and self-obsession; it also embraces self-evaluation, the desire to fit in, to conform, to succeed, to be seen and heard. Considering exaction, there is a curious, recursive logic at play when humans use mirrors: the will to exactly represent, reproduce, capture and re-create changes us; when we use mirrors, our use is not passive. In painting, artists like Vermeer changed how we saw the world using a mirror to capture each detail on canvas. Camera and video capture images that not only spur memory, they become memory; they are the documentation of our lives, our encounters, our loves, our crimes. This is the logic we take with us as we build and enter the metaverse. When we see ourselves in the mirror – in that mirror world – we take our ambitions, insecurities, self-image and (often-breathless) prejudices with us into the mirror. How will we know what this means if the technology itself is the microscope needed to see the effects of the technology?
“We will rewrite laws and create new laws for infractions and crimes committed in the metaverse; we will debate and set new boundaries as the mirror follows us into our lives, our homes, our bedrooms.
“Of course, this presumes that the metaverse documentarians and builders are as scrupulous and accurate as Ken Burns, Doris Kearns Godwin, Walter Isaacson or Jon Meacham. And what will the soundtrack of the metaverse be? Will we hear the voices of Toni Morrison, Alice Walker, Hannah Arendt or Rebecca West? Because the very nature of immersive environments that purport to mirror reality means that the mirror must accurately reflect the reality it purportedly represents. We are currently having trouble sorting information from disinformation, news from propaganda, and we are only a step or two beyond newspapers and magazines. Remember, technologists built Facebook to make it stickier, Instagram to reward scrolling doom. What will happen when technologists build monetizing metaverse environments to make them more inviting, more believable – and then the power structure of the metaverse changes and some entity wants its users to believe untruths and distortions? Who will police this environment? What rules or laws will those digital overseers enforce? What integrities can we assume are guaranteed?
“By branding and promoting the metaverse, Zuckerberg and Meta are hoping to promote the monetizing of the metaverse. Meta wants companies and people, gamers and social media types, to fund development for the metaverse and to use the metaverse as a new venue for business, akin to opening up a splashy new shop in a mall (except malls are now so turn-of-the-century). Monetizing may be a laudable goal. After all, without an economic engine and ongoing support the metaverse would simply be another idea that technologists devised that never got off the ground. But the timing of the metaverse is spookily ironic. As we have despoiled the physical environment of our planet, vanished species and whole biospheres like the Amazon rain forest, polluted our air and oceans, melted our polar ice caps and poisoned our food systems, we build a metaverse which is not only a mirror of the real world, but another world altogether. Is the metaverse an attempt to redo the real world, create an alt world now that we have wrecked the one we inherited? Or can we use it to reinvent the world, see it more clearly, fix what has gone awry and build towards a freer, more equitable, balanced and holistic future?
“Further, when monetizing and market makers get involved, the goals and parameters of experience change. The metaverse will present a look-in-the-mirror challenge to our base assumptions of presence and value. As Kim Stanley Robinson wrote, ‘We can’t think in anything but economic terms, our ethics must be quantified and rated for the effects that our actions have on GDP. This is said to be the only thing people can agree on.’The metaverse will present its logic and value on its own terms. For example, consider how Decentraland, a metaverse venue, ignores the logic of everyday experience in the real world to promote its footprint – not in typical real-world terms, but via NFTs, a newer blockchain valuation with little or no market-value track record. Tokens.com co-founder and CEO Andrew Kiguel described Decentraland on a TV news broadcast as a different kind of NFT, or nonfungible token. NFTs represent a new way of creating and building value.
“Monetizing the metaverse will prioritize where money can be made. This is an obvious conclusion from looking at global industries, like pharmaceuticals and insurance. There is always a balance between serving customers and returning dividends and profits to shareholders. Initially the metaverse will prioritize land (the digital equivalent of a URL in our current website-based environment); entertainment, where existing brands and personalities and expand their reach and profits by finding new users to entertain; and the horde of followers who will see these trends and want to take their brand into the metaverse to present goods and services in a most modern way. That is given. Today, while anyone can buy virtual land on the Decentraland platform, metaversers have to use a form of digital currency called MANNA, which can be purchased only with bitcoin or ethereum cryptocurrency. Then, like going to a physical real estate office, they can go to the site to see what’s for sale. Parcels have been purchased already, but many are available secondhand. The price fluctuates just like real estate in the physical world.
- Who will monetize – and thereby prioritize – the urgency of climate change as the Amazon rainforest hurtles toward abrupt and irreversible devastation, in the face of the breadth of ocean pollution, vanishing biodiversity, expanding drought, receding shorelines, unmanageable storms and the increasing numbers of climate refugees who cross national borders in search of food and a better life?
- Who will monetize a way to combat misinformation and disinformation, fostered by growing communities of nativism and populism?
- Who will monetize factfulness, the Hans Rosling moniker for a fact-based understanding of basic issues like literacy, poverty, women’s and minority rights, wealth of nations, and the advance or decline of democracy?
“In other words, will the metaverse merely become another gold rush that attracts wealthy investors who want to make more money than they already have? Or is there a way to encourage investment while also creating clarity and focus around a fact-based assessment of the real world while looking to resolve large and pressing global issues that face humankind? After all, in a mirror of the world, like a telescope, we should be able to see and do something positive about things and issues we typically miss or ignore with the naked eye.
“The shift of many online activities into the metaverse, more fully immersive digital spaces and digital life will initially take place as a virtual meeting, for example a telehealth consult today. But it won’t stay there. Once we move more of our meetings and activities to the metaverse, this change will be like base conversion, or changing base in mathematics; like moving from designing the world according to biblical dictates to designing the world in ones and zeroes. This is effectively a new order, a new way of ordering things, environments, presence, identity – a reordering of ourselves.
“Fully immersive digital spaces will supplant social media. We need to consider and game-plan for the difference between immersion and online access. This is a different logic, a different way of showing up. If we show up as ourselves, given behaviors we can see today on TikTok and Instagram and Snap, we will not be content to leave ourselves as we are; we will immerse as an enhanced version of ourselves. Our eyebrows may be darker, our muscles and breasts bigger, our skin tone altered to achieve some social goal of inclusion or exclusivity. So, immersion is not like so-called real life, it is more like the teenagers who watch Tourette syndrome victims on TikTok or YouTube and copy or become more like that behavior. We will adapt to metaverse realities by assuming them as our own, which has attendant benefits.
“Consider also that you will spend an hour, or a series of hours, in an environment that is neither where you live nor where you work; it will be the new meta space where you live or work. You will adapt easily to work there because metaverse software will have been tested with people like you and there will be a consensus of amenities to make you comfortable in the digital plane of the workaverse. Yet we are, after all, bodies as the first substrate of our reality. Our sense of the ends of our bodies, our proprioception, will alter significantly as we transition from physical reality to metaverse logic and reality. Thus, the most profound thing I imagine that this shift of online activities into more fully immersive digital spaces will do is confound this proprioception. Where does our physical form end and the world begin? And which body do I want to show up in, anyway? This is not a small consideration. Our bodies and our relationship to our bodies will become more fluid, less rigid.
“As we ‘jack into’ the metaverse to become present there as ourselves, without the encumbrance or enhancements of our physical form, not only our presentation of self in everyday life will change – our sense of self will expand. We will feel we have multiple selves, and psychiatrists and counselors will be called in to help people cope with multiple-self syndrome.
“Wherever we are here will become a transport vehicle to there. We have seen this movie before, as gamers donned their headsets and stayed locked at their stations until they needed nourishment, had bathroom breaks, or even died.
“The metaverse, or mirror worlds, will fundamentally change human society by producing alternatives to commonplace reality. There will likely be multiple alts, multiple realities; we may well number them like dimensions in equations: reality1, reality2[DK1] , etc. Human life has become more multidimensional with various technologies, starting with photography and television. Once the internet arrived, we had another there besides working in an office or a field to which we might go or retreat. But it was still two-dimensional, a screen, a picture of something in the real world. The metaverse, once it is fully developed, for many will effectively have the beats and depth of a real world; for some – especially those with a gripe or discontent with conventional reality – this may be the realer world, or at least a reasonable alternative to houses, streets, stores, and buildings where you live and work. Humans have not had, or lived with, alts for long; we do not have traditions and protocols based on alts. We have not collectively, and barely individually, decided how to behave in alternate realities. Coming to that understanding, and then diving into it, will change human society as few things have before.
“First, our sense of place will undergo a profound transformation. In her book ‘The Power of Place,’ Winifred Gallagher describes how our surroundings shape our thoughts, emotions and actions. Place was once the village, the farm, the town square, the forest or ocean. We took place for granted because it was all we knew; all we could know. The home, the local bar or tavern, the school, the office – these were three-dimensional places, not placeholders; they were our concrete understanding of being somewhere.
“Our devices and screens have already changed our sense of place, of being here and there. Here used to be where I am, and there where you are. Now here and there are blended into digital environments, sites, apps, Zoom calls and Microsoft Teams gatherings. The metaverse will accelerate that perception on steroids. Whatever store you might like will have its metaverse locale, as most brands will. The act of going somewhere to try and buy, to see and shop, will be augmented, and to some degree replaced, by metaverse fun zones and shopping experiences. We will gain in terms of time and convenience; we will lose in terms of physical contact and unprogrammed encounters.
“Second, our sense of space will move from linear – point A to point B, so many miles away – to perceptual, to being ‘jacked in.’ With the metaverse, like wilderness or exotic animal species, place vanishes. With our current devices, it already is being eroded by time. Instantaneous connectivity (Japanese engineers have demonstrated a data transmission rate of 319 Terabits per second (Tb/s) through optical fibers) is a new dimension of time. High-speed connectivity catapults us out of place into the realm of infinite now-ness.
“As of this writing there are 5.232 billion Internet users in the world; 171 billion emails are being sent today; 522 million tweets sent today; 8,227 tweets are sent in 1 second and will be sent today each and every second. Being connected on a variety of devices enables us to ignore – even abandon – place-ness in favor of now-ness. As we do, our awareness of place and our place in it changes. While gaming environments provide alternate locales (we play there in our graphics-fueled imaginations yet there exists here), now-ness neuters place – vaulting us into the limbic realm of connectivity itself. As when gaming enthusiast Chen Rong-yu remained at his gaming console so long he expired, we come to disregard our physical place – even our physicality – to focus intently on being connected and on the experience that connectivity provides. Here is the world circumscribed by the metaverse: what comes here, what fits here, what captures my attention here. There (formerly, place) is now an afterthought, a leftover, the remainder of hours when here has exhausted us.
“Third, with place altered, our sense of time will be compressed and distorted. This new time dimension will blithely appropriate artifacts from (any) place to furnish almost any featureless locale with the appearance of place. In other words, via the metaverse we will experience connectedness – not place – and that connectedness will exist only in time; place becomes thereby an artifact of connectedness. Speed hurtles us into time. This is not conventional time measured in o’clocks. It is the time of perpetual here-ness, endless now-ness. Time in that measure becomes place – re-places place with a ticking nowscape of messages, updates, sounds and swipes.
“Fourth, our presentation of self will undergo profound alternations. As Erving Goffman describes in ‘The Presentation of Self in Everyday Life,’ we cobble together a performance for the people we encounter and interact with daily. In the metaverse, there will be new cues, new traps and feints. We might be less worried about whether our hair is done right and more concerned with whether we bought the right metaverse outfit for the conference or occasion.
“Akin to Tristan Harris’ amplifiganda (the newer version of propaganda that amplifies something to make people believe it), the metaverse will amplify our need to be immersed, to be an insider: in a situation, an environment, a conflict, a celebrity’s house or a metaverse destination. Without this sense of immersion, we will feel we are not present, we don’t fully understand or participate – just as today the internet and video take us inside people’s lives, actions and bodies.
“The metaverse will change the daily lives of the connected particularly via our sense of location. Even today, since there is now anywhere, there is gone, except as a GPS coordinate. There is now here. Pix of some there on Twitter or Facebook are not there. You are never there anymore; you are only here. Even when you travel there, you morph it into here with one hipster post of how cool there is – but no one is there with you. We all join you here.
“Living here changes where we live, and the metaverse will only enhance that change. You see it today as people walk face-in-phone through life. They are not in the grocery store or on the avenue. They are un-placed. They are (soon we all will be?) re-placed. Time, as instant connectivity or metaverse immersion, eats our awareness of place. For most of human history, there was no alternative to place, just as there was no way to instantly connect with millions of others on a digitally networked platform. To be out of place was anathema; our places, both as roles and as physical locations, were fixed, defined by geography, norms and cultural institutions. This highlights how far our present state has removed us from our history: now-ness is blissfully ahistorical.
“The daily lives of the metaversians will become less connected to physical reality. Office buildings, the site of work, will no longer be the sole, or even the principal, place where work gets done. Nor will retail stores and malls be the principal place where goods are shopped, sold and bought. Of course, this happened already with COVID stay-at-home experiences, but the metaverse will accelerate that evolution. Connection used to mean how our social networks and experiences, personal and interpersonal, were tethered; with the advent of the metaverse, connection will simultaneously mean connected to the metaverse land, destinations, and experiences; and at the same time, it will denote diminished intimate, physical connectedness.
“Being connected will mean being immersed. Like the cyborgs in the movie ‘Minority Report,’ we will all be underwater, submerged in the metaverse substrate. This disconnection from physical reality will be at the heart of a contradiction that, hopefully, we will use to our advantage. As climate change accelerates, the metaverse can focus specifically on areas that need immediate attention or where strategies of containment or enhancement need tweaking. But there is little doubt of the irony: As our outside climate deteriorates, our interior digital world – the metaverse – will be expanding and attracting more capital.
“Immersion brings another distortion. Namely assessing the realness of a situation, a person, a feeling. There is little doubt that with advances in technology, the replication of five-sensory reality will enable being in the metaverse to be a construct as real as the so-called real world. Metaversarians will then wonder: Which do I find more real? Where I am in my physical life, or where I am in the metaverse? This will fill psychiatrists’ and other caregivers’ offices with confused and confounded patients, as metaverse syndrome becomes another kind of PTSD.
“A further distortion will be deliberate. Any mirror world can be manipulated to become distorted. The mirror world, the metaverse, can be intentionally manipulated to show disinformation, misinformation, or outright lies as a means of gaining control, cash, or raw power. As Peter Pomerantsev says in his book, ‘This Is Not Propaganda: Adventures in the War Against Reality,’ when information is a weapon every opinion is an act of war. For this reason, and for reasons attendant to this one, the metaverse will require a bill of integrities to ensure that what is presented as real is accurate, unbiased, undistorted, not impinged upon by forces that would seek to use the metaverse for nefarious means.
| english |
Russia said on Wednesday its troops had broken through two fortified lines of Ukrainian defences on the eastern front, as Kyiv described the situation there as difficult and called for faster military aid ahead of a predicted Russian offensive.
The Russian Defence Ministry said the Ukrainians had retreated in the face of Russian attacks in the Luhansk region, although it provided no details and Reuters was not able to independently verify the battlefield report.
“During the offensive … the Ukrainian troops randomly retreated to a distance of up to 3 km (1. 9 miles) from the previously occupied lines," the ministry said on the Telegram messaging app.
“Even the more fortified second line of defence of the enemy could not hold the breakthrough of the Russian military. "
The ministry did not specify in which part of the Luhansk region the offensive took place. Reuters was not able to independently verify the battlefield report.
President Volodymyr Zelenskiy’s office said Ukrainian forces had repelled some Russian attacks in Luhansk but added: “The situation in the region remains difficult. "
Luhansk regional governor Serhiy Haidai said Russia was pouring heavy equipment and mobilised troops into Luhansk but Ukrainian forces were still defending the region.
“The attacks are coming from different directions in waves," Haidai said. He added: “Those who spread the information that allegedly our defence forces have pulled back beyond the line of the administrative border (of Luhansk) – this does not correspond to reality. "
The Kremlin has intensified attacks across a swathe of southern and eastern Ukraine in recent weeks, and a major new offensive has been widely anticipated.
Russia’s main effort has been focused on the town of Bakhmut in Donetsk province adjacent to Luhansk.
The General Staff of the Ukrainian Armed Forces did not mention any significant setbacks in Luhansk in its regular morning update. It said Ukrainian units repelled attacks in the areas of more than 20 settlements, including Bakhmut and Vuhledar – a town 150 km (90 miles) southwest of Bakhmut.
Zelenskiy on Tuesday said Russia was in a hurry to achieve as much as it can with its latest push before Ukraine and its allies gather strength.
“That is why speed is of the essence," he said as NATO defence chiefs met in Brussels for talks that continue on Wednesday. “Speed in everything – adopting decisions, carrying out decisions, shipping supplies, training. Speed saves people’s lives. "
Bakhmut’s capture would give Russia a stepping stone to advance on two bigger cities, Kramatorsk and Sloviansk in Donetsk, giving it momentum after months of setbacks ahead of the Feb, 24 first anniversary of the invasion.
“The battles are literally for every foot of Ukrainian land," Zelenskiy said, describing the conditions on the eastern frontline in his evening address on Tuesday.
Ukrainian military analyst Oleh Zhdanov said in a YouTube video there was fighting “around every single house" in Bakhmut.
Ukraine is using shells faster than the West can make them and says it needs fighter jets and long-range missiles to counter the Russian offensive and recapture lost territory.
The United States and NATO have pledged that Western support will not falter in the face of a looming Russian offensive.
U. S. Defense Secretary Lloyd Austin said on Tuesday he expected Ukraine to launch its own offensive in the spring. He added: “Ukraine has urgent requirements to help it meet this crucial moment in the course of the war. We believe there’ll be a window of opportunity for them to exercise initiative. "
On Jan. 20 a senior U. S. administration official said Washington was advising Ukraine to hold off with a major offensive until the latest supply of U. S. weaponry is in place and training has been provided.
Representatives of the 27 European Union countries meet in Brussels on Wednesday to discuss a new batch of sanctions against Russia, which the head of the bloc’s executive said could amount to 11 billion euros ($11. 8 bln) in lost trade.
German Defence Minister Boris Pistorius said supplying Ukraine with fighter jets would certainly be discussed but that it was not a focus at the moment, and added he was in favour of raising NATO’s military spending target. British Defence Secretary Ben Wallace said Western allies could help Ukraine more quickly by supporting their position on the ground rather than focusing on the provision of jets.
Russia calls the invasion a “special military operation" against security threats, and says NATO shows hostility to Russia daily and is growing more involved in the conflict. Kyiv and its allies call Russia’s actions an unprovoked land grab.
Russia holds swathes of Ukraine’s southern regions of Kherson and Zaporizhzhia, including its nuclear plant, nearly all of Luhansk and over half of Donetsk. Last year, Russia declared it had annexed the four regions in a move condemned by most United Nations members as illegal.
Russia plans to retake the settlements in the northeastern Kharkiv region that it surrendered to Kyiv last year, the head of the Russian-installed administration there said on Wednesday.
A U. S. -backed report published on Tuesday said Russia had held at least 6,000 Ukrainian children – likely many more – in camps in Crimea and Russia whose primary purpose appeared to be political re-education. Russia’s embassy in Washington said Russia accepted children who were forced to flee with their families from the shelling in Ukraine.
Read all the Latest News here(This story has not been edited by News18 staff and is published from a syndicated news agency feed - Reuters) | english |
{
"latest_version": [
"1.0"
],
"meta": {
"description": "This is a demo package",
"homepage": "http://www.python.org/doc/current/ext/building.html"
},
"versions": {}
} | json |
package by.bsuir.web.rest;
import by.bsuir.service.CryptocurrencyService;
import by.bsuir.web.rest.errors.BadRequestAlertException;
import by.bsuir.service.dto.CryptocurrencyDTO;
import io.github.jhipster.web.util.HeaderUtil;
import io.github.jhipster.web.util.ResponseUtil;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.beans.factory.annotation.Value;
import org.springframework.http.ResponseEntity;
import org.springframework.web.bind.annotation.*;
import javax.validation.Valid;
import java.net.URI;
import java.net.URISyntaxException;
import java.util.List;
import java.util.Optional;
import java.util.stream.StreamSupport;
import static org.elasticsearch.index.query.QueryBuilders.*;
/**
* REST controller for managing {@link by.bsuir.domain.Cryptocurrency}.
*/
@RestController
@RequestMapping("/api")
public class CryptocurrencyResource {
private final Logger log = LoggerFactory.getLogger(CryptocurrencyResource.class);
private static final String ENTITY_NAME = "cryptocurrency";
@Value("${jhipster.clientApp.name}")
private String applicationName;
private final CryptocurrencyService cryptocurrencyService;
public CryptocurrencyResource(CryptocurrencyService cryptocurrencyService) {
this.cryptocurrencyService = cryptocurrencyService;
}
/**
* {@code POST /cryptocurrencies} : Create a new cryptocurrency.
*
* @param cryptocurrencyDTO the cryptocurrencyDTO to create.
* @return the {@link ResponseEntity} with status {@code 201 (Created)} and with body the new cryptocurrencyDTO, or with status {@code 400 (Bad Request)} if the cryptocurrency has already an ID.
* @throws URISyntaxException if the Location URI syntax is incorrect.
*/
@PostMapping("/cryptocurrencies")
public ResponseEntity<CryptocurrencyDTO> createCryptocurrency(@Valid @RequestBody CryptocurrencyDTO cryptocurrencyDTO) throws URISyntaxException {
log.debug("REST request to save Cryptocurrency : {}", cryptocurrencyDTO);
if (cryptocurrencyDTO.getId() != null) {
throw new BadRequestAlertException("A new cryptocurrency cannot already have an ID", ENTITY_NAME, "idexists");
}
CryptocurrencyDTO result = cryptocurrencyService.save(cryptocurrencyDTO);
return ResponseEntity.created(new URI("/api/cryptocurrencies/" + result.getId()))
.headers(HeaderUtil.createEntityCreationAlert(applicationName, true, ENTITY_NAME, result.getId().toString()))
.body(result);
}
/**
* {@code PUT /cryptocurrencies} : Updates an existing cryptocurrency.
*
* @param cryptocurrencyDTO the cryptocurrencyDTO to update.
* @return the {@link ResponseEntity} with status {@code 200 (OK)} and with body the updated cryptocurrencyDTO,
* or with status {@code 400 (Bad Request)} if the cryptocurrencyDTO is not valid,
* or with status {@code 500 (Internal Server Error)} if the cryptocurrencyDTO couldn't be updated.
* @throws URISyntaxException if the Location URI syntax is incorrect.
*/
@PutMapping("/cryptocurrencies")
public ResponseEntity<CryptocurrencyDTO> updateCryptocurrency(@Valid @RequestBody CryptocurrencyDTO cryptocurrencyDTO) throws URISyntaxException {
log.debug("REST request to update Cryptocurrency : {}", cryptocurrencyDTO);
if (cryptocurrencyDTO.getId() == null) {
throw new BadRequestAlertException("Invalid id", ENTITY_NAME, "idnull");
}
CryptocurrencyDTO result = cryptocurrencyService.save(cryptocurrencyDTO);
return ResponseEntity.ok()
.headers(HeaderUtil.createEntityUpdateAlert(applicationName, true, ENTITY_NAME, cryptocurrencyDTO.getId().toString()))
.body(result);
}
/**
* {@code GET /cryptocurrencies} : get all the cryptocurrencies.
*
* @return the {@link ResponseEntity} with status {@code 200 (OK)} and the list of cryptocurrencies in body.
*/
@GetMapping("/cryptocurrencies")
public List<CryptocurrencyDTO> getAllCryptocurrencies() {
log.debug("REST request to get all Cryptocurrencies");
return cryptocurrencyService.findAll();
}
/**
* {@code GET /cryptocurrencies/:id} : get the "id" cryptocurrency.
*
* @param id the id of the cryptocurrencyDTO to retrieve.
* @return the {@link ResponseEntity} with status {@code 200 (OK)} and with body the cryptocurrencyDTO, or with status {@code 404 (Not Found)}.
*/
@GetMapping("/cryptocurrencies/{id}")
public ResponseEntity<CryptocurrencyDTO> getCryptocurrency(@PathVariable Long id) {
log.debug("REST request to get Cryptocurrency : {}", id);
Optional<CryptocurrencyDTO> cryptocurrencyDTO = cryptocurrencyService.findOne(id);
return ResponseUtil.wrapOrNotFound(cryptocurrencyDTO);
}
/**
* {@code DELETE /cryptocurrencies/:id} : delete the "id" cryptocurrency.
*
* @param id the id of the cryptocurrencyDTO to delete.
* @return the {@link ResponseEntity} with status {@code 204 (NO_CONTENT)}.
*/
@DeleteMapping("/cryptocurrencies/{id}")
public ResponseEntity<Void> deleteCryptocurrency(@PathVariable Long id) {
log.debug("REST request to delete Cryptocurrency : {}", id);
cryptocurrencyService.delete(id);
return ResponseEntity.noContent().headers(HeaderUtil.createEntityDeletionAlert(applicationName, true, ENTITY_NAME, id.toString())).build();
}
/**
* {@code SEARCH /_search/cryptocurrencies?query=:query} : search for the cryptocurrency corresponding
* to the query.
*
* @param query the query of the cryptocurrency search.
* @return the result of the search.
*/
@GetMapping("/_search/cryptocurrencies")
public List<CryptocurrencyDTO> searchCryptocurrencies(@RequestParam String query) {
log.debug("REST request to search Cryptocurrencies for query {}", query);
return cryptocurrencyService.search(query);
}
}
| java |
An ‘administrator’ of a WhatsApp group in Latur district has been arrested for objectionable content posted on the group.
Police in Chakur tehsil of Latur district in Marathwada arrested the admin and three other members of the WhatsApp group after noticing objectionable content, including video clips posted on the group.
A police officer from Chakur police station told PTI that those arrested — Shivaji Barche, Rajkumar Telange, Amol Somwanshi and Manoj Lavhrale — will be produced before a court.
The four have been arrested and cases under sections 153, 34 and section 67 of IT Act, 2000 have been registered, he said. | english |
The film industry is grieving the loss of legendary director K Viswanath, who passed away on February 2, 2023. The director was well-known for his collaboration with one of India's finest actors, Kamal Haasan.
K Viswanath and Kamal Haasan had a close professional relationship and a mutual admiration for each other's work.
Kamal Haasan expressed his emotional tribute to Viswanath with a hand-written letter that he shared on social media. The two had a productive and impactful working relationship, collaborating on several seminal films in the Telugu film industry. Their films such as "Sagara Sangamam," "Swathi Muthyam," and "Subha Sankalpam" are widely regarded as some of the best films in Indian cinema and continue to be remembered and celebrated by audiences to this day. | english |
{
"name": "voyager-example",
"version": "0.7.1",
"private": true,
"description": "",
"scripts": {
"start": "node basic/index.js",
"compile": "exit 0",
"watch": "exit 0",
"compile:clean": "exit 0",
"test-examples": "rm -rf ../packages/*/node_modules/graphql && ava --concurrency=1 test/*.test.js",
"push-basic": "TAG=\"$npm_package_version\" ./push-script.sh basic",
"push-keycloak": "TAG=\"$npm_package_version\" ./push-script.sh keycloak",
"push-audit_logging": "TAG=\"$npm_package_version\" ./push-script.sh audit_logging",
"push-metrics": "TAG=\"$npm_package_version\" ./push-script.sh metrics",
"push-restapi": "TAG=\"$npm_package_version\" ./push-script.sh restapi"
},
"author": "",
"license": "Apache-2.0",
"dependencies": {
"@aerogear/voyager-audit": "^0.7.1",
"@aerogear/voyager-conflicts": "^0.7.1",
"@aerogear/voyager-keycloak": "^0.7.1",
"@aerogear/voyager-metrics": "^0.7.1",
"@aerogear/voyager-server": "^0.7.1",
"@aerogear/voyager-subscriptions": "^0.7.1",
"@aerogear/voyager-tools": "^0.7.1",
"axios": "^0.19.0",
"express": "^4.17.1",
"graphql": "14.5.8",
"graphql-subscriptions": "1.1.0",
"graphql-tools": "^4.0.6"
},
"devDependencies": {
"@types/graphql": "14.5.0",
"apollo-cache-inmemory": "1.6.3",
"apollo-client": "2.6.4",
"apollo-link": "1.2.13",
"apollo-link-http": "1.5.16",
"apollo-link-ws": "1.0.19",
"apollo-utilities": "1.3.2",
"ava": "^1.0.1",
"graphql-tag": "^2.10.1",
"node-fetch": "^2.6.0",
"subscriptions-transport-ws": "^0.9.16",
"ws": "^7.2.0"
}
}
| json |
<reponame>IcaroM-CdC/NLW-valoriza
import { getCustomRepository } from "typeorm"
import { ComplimentsRepositories, UsersRepositories } from "../repositories/repositories"
interface ComplimentRequest {
tag_id: string
user_sender: string
user_receiver: string
message: string
}
export class CreateComplimentService {
async execute({ tag_id, user_sender, user_receiver, message }: ComplimentRequest){
const complimentRepositories = getCustomRepository(ComplimentsRepositories)
const usersRepositories = getCustomRepository(UsersRepositories)
const userReceiverExists = await usersRepositories.findOne(user_receiver)
if (!userReceiverExists){
throw new Error("Destinatário inválido")
}
if (user_sender === user_receiver){
throw new Error("O emissor não pode ser o mesmo usuário receptor")
}
const compliment = complimentRepositories.create({
tag_id: tag_id,
user_receiver: user_receiver,
user_sender: user_sender,
message: message
})
await complimentRepositories.save(compliment)
return compliment
}
} | typescript |
<gh_stars>1-10
{"word":"junior","definition":"1. Less advanced in age than another; younger. Note: Junior is applied to distinguish the younger of two persons bearing the same name in the same family, and is opposed to senior or elder. Commonly applied to a son who has the same Christian name as his father. 2. Lower in standing or in rank; later in office; as, a junior partner; junior counsel; junior captain. 3. Composed of juniors, whether younger or a lower standing; as, the junior class; of or pertaining to juniors or to a junior class. See Junior, n., 2. 4. Belonging to a younger person, or an earlier time of life. Our first studies and junior endeavors. Sir <NAME>.\n\n1. A younger person. His junior she, by thirty years. Byron. 2. Hence: One of a lower or later standing; specifically, in American colleges, one in the third year of his course, one in the fourth or final year being designated a senior; in some seminaries, one in the first year, in others, one in the second year, of a three years' course."} | json |
The Upper House also passed the National Council for Teacher Education (Amendment) Bill.
The Rajya Sabha on Thursday passed the Right of Children to Free and Compulsory Education (Amendment) Bill, 2019, that does away with the no-detention policy mentioned in the law. The House also passed the National Council for Teacher Education (Amendment) Bill. The Lok Sabha had passed the two bills in July during the Budget Session.
The motion to pass the bill was accepted by voice vote. Union minister for Human Resources Development Prakash Javadekar’s motion to amend the name of the bill to reflect that it was passed in 2019 was also accepted by voice vote.
The existing policy under the Right of Children to Free and Compulsory Education Act, 2009, prohibits schools from detaining students till they complete elementary education. The no-detention policy banned the practice of making under-performing children repeat classes in elementary school to ensure they do not drop out. It was meant to reduce the emphasis on year-end examinations and replace it with a form of evaluation that would track students’ progress through the year.
Now, states can choose to hold a regular examination either at the end of Classes 5 and 8, or both. Students who fail this test will received additional instructions and the opportunity to appear for a re-examination within two months of the declaration of the result. If the students still do not pass the exam, the state government may decide to detain them.
However, if states choose, they can continue the no-detention policy till Class 8. No child can be expelled from school before they complete elementary education, the amendment bill states.
The proposed amendment was introduced in August 2017 and referred to a Standing Committee of the Rajya Sabha. The committee presented its report to both the Houses of Parliament in February, endorsing the amendment bill in the present form it was passed.
| english |
HP isn't just inventive, it's re-inventive. In its history, it has changed course many times — from being a test equipment manufacturer from the 1950s, it dominated the market for scientific and engineering IT in the 1970s, and then became a leading light in enterprise and consumer computing.
Each time, it took its expertise — indeed, dominance — in one area and used it to move into another. Each time, the HP qualities of foresight, inventiveness, impeccable engineering and thorough understanding of the field helped it stay ahead.
In aviation, this is known as keeping in front of the aircraft. You're thinking ahead, beyond the current manoeuvre, and preparing for the situations you're not yet in. The other side of the coin is getting behind the aircraft: you become reactive, trying to understand what's happening and concentrating on getting back into full control. By the time you reach a decision, things have changed and you have to start over. When things are changing fast, that can be fatal.
HP's latest change in strategy, although logical, feels more like lagging than leading. The company is retreating from WebOS: it blames the market failure of its current products on insufficiently attractive hardware, but it doesn't really matter.
The shape of mobile OS has been set, and it doesn't include any Palm legacy. So, yes, it makes sense to stop pouring money into a catch-up race where you're going to have to be as big as Apple, Google or Microsoft to even play. But that's reactive, not inventive, and it doesn't help frame HP's mobile future. Like shutting down a faulty engine, it will help keep you in the air, but it won't get you going any faster.
It's the same with spinning off the PC division. This has been an obvious move ever since IBM did it in 2004, when the falling margins and changing commercial landscape clearly forewarned of a market which would only get harder and less lucrative. HP's Personal Systems Group makes up 30 percent of the company's revenue, but only 15 percent of the earnings: everything else contributes more percentage-wise in earnings than in revenue, so using the company's resources to build on those areas instead of PCs is a very investor-friendly decision.
But 30 percent in revenues is a lot of cashflow, and HP is particularly strong in selling PCs — mostly notebooks — to corporates, which also take its much more profitable printing and server products. Without a strong indication of what and how those revenues will be replaced, and a demonstrably cogent understanding of how HP's relationships with the channel and with its big corporate customers will be affected, this too runs the risk of looking like an obvious decision that should have been made a while ago. It's a late tactical move rather than an early strategic one.
The one clear strategic move HP has made is the Autonomy acquisition. Autonomy has been described as a 'search company', which is true in the way that Airbus is in public transportation.
The Cambridge company's unique technology uses Bayesian probability theory to find patterns in data, something broadly accepted as the single most effective approach to massive sets of real world information — in other words, the bedrock of much corporate IT and many cloud strategies.
In 15 years, Autonomy has used that far-sighted bet to collect more than 20,000 high-value corporate clients, and is showing strong growth and persistent profitability. There are no other companies like it. It's Google in a suit.
For Autonomy to be in the position of owning and profiting from a key technology that matches the major IT trend of the 21st century to date, it has to have foresight, inventiveness, impeccable engineering and excellent understanding — the very qualities that once helped HP stay ahead of the game, and which that company now so badly needs to rediscover.
With Autonomy, HP has a golden opportunity to find the clear air above the turbulence and to regain control of not only its market, but its future.
| english |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.