id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_05_local_5_shard_00000035_processed.jsonl/4823
|
Time (musical)
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Show logo
Music Jeff Daniels
Lyrics Dave Clark and David Soames
Book Dave Clark and David Soames
Productions 1986 West End
Time is a musical with a book and lyrics by Dave Clark and David Soames, music by Jeff Daniels, and additional songs by David Pomeranz.[1]
Derived from the 1970s musical The Time Lord by Soames and Daniels, it focuses on contemporary rock musician Chris Wilder, who has been transported with his backup singers and band from a concert to the High Court of the Universe in the Andromeda Galaxy. In light of mankind's strides in space exploration, The Time Lord Melchisedic (loosely based on the title character in the BBC science fiction series Doctor Who) has decided the time has come to examine Earth's people to determine what role they will play in the quest for universal peace, and Wilder and his band are called upon to defend their planet.[2]
The heavily-amplified multi-media event relied heavily on special effects, including a huge projected floating head named Akash (billed by the show's producers as a hologram) that served as a narrator throughout the show. The interior of the Dominion Theatre was gutted and reconstructed to accommodate the massive steel set with hydraulic lift designed by John Napier.[2]
The West End production, directed and choreographed by Larry Fuller (assisted by Arlene Phillips), had a world premiere on April 9, 1986, at the Dominion Theatre in London, England, where it ran for two years. Cliff Richard starred as Wilder,[2] Jodie Brooke Wilson as Louise, Jeff Shankley as Melchisedic, and Dilys Watling as one of the tribunal judges, with a pre-filmed Laurence Olivier as Akash.[3] David Cassidy replaced Richard later in the run, closing with Grease producer David Ian. Stephanie Lawrence was also a replacement in the Time musical and played opposite Cassidy.
• The Rock Star, Chris Wilder - David Cassidy (Cliff Richard original cast)
• Louise - Stephanie Lawrence
• Babs - Dawn Hope
• Carol Ann- Maria Ventura
• The Rock Group - Cavin Cornwall, Neil Gow-Hunter, Simon Shelton, Ian Stewart
• Akash, The Ultimate Word in Truth - Laurence Olivier
• Judge Morgua - Dilys Watling
• Judge Trigon - John North
• Judge Lagus - David Timson
• Lord Melchisedic, The Time Lord - Jeff Shankley
• Lord Melchisedic's Retinue - Gary Co-Burn, Neil Gow-Hunter, Kazimir Kolesnik, Alan Meggs, Dave Trevors, Simon Shelton, Simon Marlow
• Captain Ebony - Clinton Derricks-Carroll
• Captain Ebony's Retinue - Kim Rosato, Stacey Haynes, Sandra Easby, Annabel Haydn, Ian Stewart, Cavin Cornwall
Cast recording by Various artists
Released 1986 (1986)
Label EMI (UK)
Capitol (US)
Producer Dave Clark
Singles from Time
1. "Because"
Released: November 1985 (1985-11) (UK)
2. "Time Will Teach Us All"
Released: May 6, 1986 (1986-05-06) (UK)
June 30, 1986 (1986-06-30) (US)
A concept album was released in the United States by Capitol Records and EMI for the rest of the world (UK Catalogue Number UK:AMPM 1 (EQ 5003)) (now out-of-print). In addition to Richard and Olivier, it featured Freddie Mercury, Julian Lennon, Murray Head, Dionne Warwick, Leo Sayer, Ashford & Simpson, John Christie, John Helms, Mike Moran, and Paul Miles-Kingston.[4] Olivier's spoken "Theme From 'Time'" was released as a single in some countries and was a surprise hit on the Australian charts, reaching #27.[5]
The soundtrack has never been released on CD.
As of May 8, 2012, the soundtrack to Time - The Musical, both Acts I and Acts II, is now available on iTunes (along with the 13 single releases.) It has been restored and remastered by Adam Vanryne and produced by Dave Clark and has been released to commemorate the musical's 25th anniversary. The iTunes digital version also features a 20-page color booklet. The iTunes release contains new edits and several alternate mixes that were not on the original release (vinyl or compact-cassette.)
Song list[edit]
Act I
• Born to Rock 'n Roll
• Time Talkin'
• Time
• Music of the Spheres
• Law of the Universe
• The Time Lord Theme
• The Charge
• One Human Family
• What On Earth (moved to here from second song of Act II at cast change in 1987)
• I Know, I Know
• Your Brother in Soul
• Case for the Prosecution
• Starmaker
• Time Will Teach Us All
• I Object
• In My Defence
Act II
• Within My World (added to opening of Act II at cast change in 1987)
• Because I Love You
• Move the Judge
• What on Earth (removed from Act II in 1987)
• She's So Beautiful
• If You Only Knew
• We're the UFO
• The Theme from Time
• Harmony
• The Return
• Time (Reprise)
• It's in Everyone of Us
"If present trends go on, John Napier and his team will doubtless one day find themselves re-creating the entire state of Iowa for a rock musical about the Little Red Hen, or reconstructing the Alps for one about Heidi; but until then Time can claim it has provided the most sensational contrast between mountainous spectacle and molehill content the musical theatergoer has seen."[2]
"It's like a science-fiction Sunday-school lesson. London critics had a field day sneering at its greeting-card philosophy and 1960s flower-power platitudes. But children, the young at heart, tourists with little English and any lover of sheer spectacle will be enraptured."[6]
"But its actual genius is the man who invented its gravity-defying, sense- bombarding scenic effects, the modern theater's most astounding designer. His name is John Napier."[7]
"The worst of it, though, are the philosophical speeches from The Time Lord who sounds like Captain Highliner after transcendental meditation. If vinyl ever deserved to be melted..."[4]
1. ^ Encyclopedia of Popular Music (4 ed.) (2006) Oxford University Press ISBN 978-0-19531-373-4 doi:10.1093/acref/9780195313734.001.0001
2. ^ a b c d "Stage View; In London, Green Lasers and Red Smoke" (4 May 1986) New York Times p. A.5
3. ^ "Olivier Takes Stage, But Not Really" (10 Apr 1986) Chicago Tribune
4. ^ a b Evelyn Erskine (23 Jan 1987) "Rock", The Ottawa Citizen p. D5
5. ^ "Dave Clark has the 'Time' for new career" (1 Aug 1986) Chicago Sun - Times p. 10
6. ^ "High-Tech Effects Star in London Show" (10 May 1986) Philadelphia Inquirer
7. ^ "Set Designer Real Star of Musical" (29 May 1986) Chicago Tribune
External links[edit]
|
global_05_local_5_shard_00000035_processed.jsonl/4825
|
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Translations of
English: consciousness,
mind, life force,
Pali: viññāṇa
Sanskrit: vijñāna
Burmese: ဝိညာဉ်
(IPA: [wḭ ɲɪ̀ɴ])
Chinese: 識(T) / 识(S)
Japanese: 識 (shiki)
Korean: 식 (shik)
Sinhala: විඥ්ඥාන
Tibetan: རྣམ་པར་ཤེས་པ་
Thai: วิญญาณ
Vietnamese: 識 (thức)
Glossary of Buddhism
Vijñāna (Sanskrit) or viññāa (Pāli[1] is translated as "consciousness," "life force," "mind,"[2] or "discernment."[3]
In the Pāli Canon's Sutta Pitaka's first four nikāyas, viññāa is one of three overlapping Pali terms used to refer to the mind, the others being manas and citta. Each is used in the generic and non-technical sense of "mind" in general, but the three are sometimes used in sequence to refer to one's mental processes as a whole.[4] Their primary uses are, however, distinct.[5]
This section considers the Buddhist concept primarily in terms of Early Buddhism's Pali literature as well as in the literature of other Buddhist schools.
Pali literature[edit]
Throughout Pali literature, viññāa[1] can be found as one of a handful of synonyms for the mental force that animates the otherwise inert material body.[6] In a number of Pali texts though, the term has a more nuanced and context-specific (or "technical") meaning. In particular, in the Pali Canon's "Discourse Basket" (Suttapitaka), viññāa (generally translated as "consciousness") is discussed in at least three related but different contexts:
(1) as a derivative of the sense bases (āyatana), part of the experientially exhaustive "All" (sabba);
(2) as one of the five aggregates (khandha) of clinging (upadana) at the root of suffering (dukkha); and,
(3) as one of the twelve causes (nidana) of "Dependent Origination" (paticcasamuppāda) which provides a template for Buddhist notions of kamma, rebirth and release.[2]
In the Pali Canon's Abhidhamma and in post-canonical Pali commentaries, consciousness (viññāa) is further analyzed into 89 different states which are categorized in accordance with their kammic results.
Figure 1: The Pali Canon's Six Sextets:
sense bases
<–> "external"
nose, tongue, body & mind.
2. The six external sense bases are visible forms,
sound, odor, flavors, touch & mental objects.
3. Sense-specific consciousness arises dependent
on an internal & an external sense base.
4. Contact is the meeting of an internal sense
base, external sense base & consciousness.
5. Feeling is dependent on contact.
6. Craving is dependent on feeling.
Source: MN 148 (Thanissaro, 1998) diagram details
Figure 2:
The Five Aggregates (pañca khandha)
according to the Pali Canon.
form (rūpa)
4 elements
mental factors (cetasika)
Source: MN 109 (Thanissaro, 2001) | diagram details
Sense-base derivative[edit]
In Buddhism, the six sense bases (Pali: saḷāyatana; Skt.: ṣaḍāyatana) refer to the five physical sense organs (cf. receptive field) (belonging to the eye, ear, nose, tongue, body), the mind (referred to as the sixth sense base) and their associated objects (visual forms, sounds, odors, flavors, touch and mental objects). Based on the six sense bases, a number of mental factors arise including six "types" or "classes" of consciousness (viññāa-kāyā). More specifically, according to this analysis, the six types of consciousness are eye-consciousness (that is, consciousness based on the eye), ear-consciousness, nose-consciousness, tongue-consciousness, body-consciousness and mind-consciousness.[7]
In this context, for instance, when an ear's receptive field (the proximal stimulus, more commonly known by Buddhists as a sense base, or sense organ) and sound (the distal stimulus, or sense object) are present, the associated (ear-related consciousness) arises. The arising of these three elements (dhātu) – e.g. ear, sound and ear-consciousness – lead to the percept, known as "contact" and in turn causes a pleasant or unpleasant or neutral "feeling" to arise. It is from such a feeling that "craving" arises. (See Fig. 1.)
In a discourse entitled, "The All" (Sabba Sutta, SN 35.23), the Buddha states that there is no "all" outside of the six pairs of sense bases (that is, six internal and six external sense bases).[8] The "To Be Abandoned Discourse" (Pahanaya Sutta, SN 35.24) further expands the All to include first five aforementioned sextets (internal sense bases, external sense bases, consciousness, contact and feeling).[9][10] In the famed "Fire Sermon" (Ādittapariyāya Sutta, SN 35.28) the Buddha declares that "the All is aflame" with passion, aversion, delusion and suffering (dukkha); to obtain release from this suffering, one should become disenchanted with the All.[11]
Hence, in this context, viññāa includes the following characteristics:
• viññāa arises as a result of the material sense bases (āyatana)[12]
• there are six types of consciousness, each unique to one of the internal sense organs
• consciousness (viññāa) is separate (and arises) from mind (mano)
• here, consciousness cognizes or is aware of its specific sense base (including the mind and mind objects)
• viññāa is a prerequisite for the arising of craving (ta)
• hence, for the vanquishing of suffering (dukkha), one should neither identify with nor attach to viññāa
The aggregates[edit]
In Buddhism, consciousness (viññāa) is one of the five classically defined experiential "aggregates" (Pali: khandha; Skt.: skandha). As illustrated (Fig. 2), the four other aggregates are material "form" (rupa), "feeling" or "sensation" (vedana), "perception" (sanna), and "volitional formations" or "fabrications" (sankhara).
In SN 22.79, the Buddha distinguishes consciousness in the following manner:
This type of awareness appears to be more refined and introspective than that associated with the aggregate of perception (saññā) which the Buddha describes in the same discourse as follows:
Similarly, in the traditionally venerated 5th-century CE commentary, the Visuddhimagga, there is an extended analogy about a child, an adult villager and an expert "money-changer" seeing a heap of coins; in this analogy, the child's experience is likened to perception, the villager's experience to consciousness, and the money-changer's experience to true understanding (paňňā).[15] Thus, in this context, "consciousness" denotes more than the irreducible subjective experience of sense data suggested in the discourses of "the All" (see prior section); here, "consciousness" additionally entails a depth of awareness reflecting a degree of memory and recognition.
All of the aggregates are to be seen as empty of self-nature; that is, they arise dependent on causes (hetu) and conditions (paticca). In this scheme, the cause for the arising of consciousness (viññāa) is the arising of one of the other aggregates (physical or mental); and, the arising of consciousness in turn gives rise to one or more of the mental (nāma) aggregates. In this way, the chain of causation identified in the aggregate (khandha) model overlaps the chain of conditioning in the Dependent Origination (paticcasamuppāda) model, described more fully below.[16]
Dependent origination[edit]
Consciousness (viññāa) is the third of the traditionally enumerated Twelve Causes (nidāna) of Dependent Origination (Pali: paṭiccasamuppāda; Skt.: pratītyasamutpāda).[17] Within the context of Dependent Origination, different canonical discourses represent different aspects of consciousness.[18] The following aspects are traditionally highlighted:
• consciousness is conditioned by mental fabrications (saṅkhāra);
• consciousness and the mind-body (nāmarūpa) are interdependent; and,
• consciousness acts as a "life force" by which there is a continuity across rebirths.
Mental-fabrication conditioning and kamma[edit]
Numerous discourses state:
"From fabrications [saṅkhāra] as a requisite condition comes consciousness [viññāa]."[19]
In three discourses in the Samyutta Nikaya, the Buddha highlights three particular manifestations of saṅkhāra as particularly creating a "basis for the maintenance of consciousness" (ārammaṇaṃ ... viññāṇassa ṭhitiyā) that could lead to future existence,[20] to the perpetuation of bodily and mental processes,[21] and to craving[22] and its resultant suffering. As stated in the common text below (in English and Pali), these three manifestations are intending, planning and enactments of latent tendencies ("obsessing")[23]
The 12 Nidānas:
Name & Form
Six Sense Bases
Old Age & Death
... [W]hat one intends, and what one plans, and whatever one has a tendency towards:
this becomes a basis for the maintenance of consciousness.
When there is a basis there is a support for the establishing of consciousness.[24]
Yañca ... ceteti, yañca pakappeti, yañca anuseti,
ārammaṇametaṃ hoti viññāṇassa ṭhitiyā.
Ārammaṇe sati patiṭṭhā viññāṇassa hoti.[25]
Thus, for instance, in the "Intention Discourse" (Cetanā Sutta, SN 12.38), the Buddha more fully elaborates:
Bhikkhus, what one intends, and what one plans, and whatever one has a tendency towards: this becomes a basis for the maintenance of consciousness. When there is a basis there is a support for the establishing of consciousness. When consciousness is established and has come to growth, there is the production of future renewed existence. When there is the production of future renewed existence, future birth, aging-and-death, sorrow, lamentation, pain, displeasure, and despair come to be. Such is the origin of this whole mass of suffering.[26]
The language of the post-canonical Samyutta Nikaya commentary and subcommentary further affirm that this text is discussing the means by which "kammic consciousness" "yield[s] fruit in one's mental continuum."[27] In other words, certain intentional or obsessive acts on one's part inherently establish in present consciousness a basis for future consciousness's existence; in this way, the future existence is conditioned by certain aspects of the initial intention, including its wholesome and unwholesome qualities.
Conversely, in the "Attached Discourse" (Upaya Sutta, SN 22.53), it states that if passion for the five aggregates (forms and mental processes) are abandoned then:
Mind-body interdependency[edit]
Numerous discourses state:
"From consciousness [viññāa] as a requisite condition comes name-&-form [nāmarūpa]."[19]
In addition, a few discourses state that, simultaneously, the converse is true:
"Consciousness comes from name-and-form as its requisite condition."[29][30]
In the "Sheaves of Reeds Discourse" (Nalakalapiyo Sutta, SN 12.67), Ven. Sariputta uses this famous analogy to explain the interdependency of consciousness and name-&-form:
"It is as if two sheaves of reeds were to stand leaning against one another. In the same way, from name-&-form as a requisite condition comes consciousness, from consciousness as a requisite condition comes name-&-form....
"If one were to pull away one of those sheaves of reeds, the other would fall; if one were to pull away the other, the first one would fall. In the same way, from the cessation of name-&-form comes the cessation of consciousness, from the cessation of consciousness comes the cessation of name-&-form...."[31]
"Life force" aspect and rebirth[edit]
As described above in the discussion of mental fabrications' conditioning of consciousness, past intentional actions establish a kammic seed within consciousness that expresses itself in the future. Through consciousness's "life force" aspect, these future expressions are not only within a single lifespan but propel kammic impulses (kammavega) across samsaric rebirths.
In the "Serene Faith Discourse" (Sampasadaniya Sutta, DN 28), Ven. Sariputta references not a singular conscious entity but a "stream of consciousness" (viññāa-sota) that spans multiple lives:
"... [U]nsurpassed is the Blessed Lord's way of teaching Dhamma in regard to the attainment of vision.... Here, some ascetic or Brahmin, by means of ardour, endeavour, application, vigilence and due attention, reaches such a level of concentration that he ... comes to know the unbroken stream of human consciousness as established both in this world and in the next...."[32]
The "Great Causes Discourse" (Mahanidana Sutta, DN 15), in a dialogue between the Buddha and the Ven. Ananda, describes "consciousness" (viññāa) in a way that underlines its "life force" aspect:[2]
"'From consciousness as a requisite condition comes name-and-form.' Thus it has been said. And this is the way to understand how from consciousness as a requisite condition comes name-and-form. If consciousness were not to descend into the mother's womb, would name-and-form take shape in the womb?"
"No, lord."
"If, after descending into the womb, consciousness were to depart, would name-and-form be produced for this world?"
"No, lord."
"If the consciousness of the young boy or girl were to be cut off, would name-and-form ripen, grow, and reach maturity?"
"No, lord."
"Thus this is a cause, this is a reason, this is an origination, this is a requisite condition for name-and-form, i.e., consciousness."[33]
Discourses such as this appear[according to whom?] to describe a consciousness that is an animating phenomenon capable of spanning lives thus giving rise to rebirth.
An Anguttara Nikaya discourse provides a memorable metaphor to describe the interplay of kamma, consciousness, craving and rebirth:
[Ananda:] "One speaks, Lord, of 'becoming, becoming'. How does becoming tak[e] place?"
[Buddha:] "... Ānanda, kamma is the field, consciousness the seed and craving the moisture for consciousness of beings hindered by ignorance and fettered by craving to become established in [one of the "three worlds"]. Thus, there is re-becoming in the future."[34]
Abhidhammic analysis[edit]
The Patthana, part of the Theravadin Abhidharma, analyzes the different states of consciousness and their functions. The Theravāda school method is to study every state of consciousness. Using this method, some states of consciousness are identified as positive, some negative and some neutral. This analysis is based on the principle of karma, the main point in understanding the different consciousness. All together according to the Abhidhamma, there are 89 kinds of consciousness, 54 are of the "sense sphere" (related to the five physical senses as well as craving for sensual pleasure), 15 of the "fine-material sphere" (related to the meditative absorptions based on material objects), 12 of the "immaterial sphere" (related to the immaterial meditative absorptions), and eight are supramundane (related to the realization of Nibbāna).[35]
More specifically, a viññāa is a single moment of conceptual consciousness and normal mental activity is considered to consist of a continual succession of viññāas.
Viññāa has two components: the awareness itself, and the object of that awareness (which might be a perception, a feeling etc.). Thus, in this way, these viññāas are not considered as ultimate (underived) phenomena as they are based on mental factors (cetasika). For example, jhānic (meditative) states are described as based on the five ultimate mental factors of applied thought (vitakka), sustained thought (vicara), rapture (piti), serenity (sukha) and one-pointedness (ekaggatā).[citation needed]
Overlapping Pali terms for mind[edit]
The citta is called "luminous" in A.I.8-10.[37]
Across Buddhist schools[edit]
While most Buddhist schools identify six modes of consciousness, one for each sense base, some Buddhist schools have identified additional modes.[38]
Six vijñānas[edit]
As described above, in reference to the "All" (sabba), the Sutta Pitaka identifies six vijñānas related to the six sense bases:
1. Eye consciousness
2. Ear consciousness
3. Nose consciousness
4. Tongue consciousness
5. Body consciousness
6. Mind consciousness describe the consciousness of "ideas" - Buddhism describes not five but six perceptions.
Eight vijñānas[edit]
Main article: Eight Consciousnesses
The Yogacara / Cittamatra school consider two more consciousnesses.
1. a consciousness called klistamanas, which gathers the hindrances, the poisons, the karmic formations.
2. the ālāyavijñāna is the consciousness "basis of everything" and has been translated as "store consciousness".[39] Every consciousness is based on this one. It is the phenomenon which explains the rebirth.
According to Walpola Rahula, the "store consciousness" of Yogacara thought exists in the early texts as well, as the "citta."[40]
The amalavijñāna (阿摩羅識) is considered by some Yogācāra schools as a ninth consciousness, the pure state associated with nirvāna. Alternatively, amalavijñāna may be considered the pure aspect of ālāyavijñāna.
Some buddhists also suggest hrdaya (Heart) consciousnesses (一切一心識), or an eleven consciousnesses theory or an infinity consciousness (無量識).[41][42]
Contemporary usages[edit]
Viññāna is used in Thai Buddhism to refer specifically to one's consciousness or life-force after it has left the body at the moment of death. Thais differentiate between winyaan and "jid-jai" (จิตใจ), which is the consciousness while it is still connected to a living body. Even though the jid-jai leaves the body while you dream at night and can also externalize during advanced meditation practice, it is still connected to the body.[citation needed]
Sri Ramakrishna defines vijñāna as
"He alone who, after reaching the Nitya, the Absolute, can dwell in the Līlā, the :Relative, and again climb from the Līlā to the Nitya, has ripe knowledge and :devotion. Sages like Narada cherished love of God after attaining the Knowledge of :Brahman. This is called vijnāna." Also: "What is vijnana? It is to know God distinctly by realizing His existence through an intuitive experience and to speak to Him intimately."[43]
Based on ancient texts, V.S.Apte (1890, rev. 1957-59) provides the following definition for vijñānam (विज्ञानम्):
1. Knowledge, wisdom, intelligence, understanding; यज्जीव्यते क्षणमपि प्रथितं मनुष्यैर्विज्ञानशौर्यविभवार्यगुणैः समेतम् । तन्नाम जीवितमिह ... Panchatantra (Pt.) 1.24;5.3; विज्ञानमयः कोशः 'the sheath of intelligence' (the first of the five sheaths of the soul).
2. Discrimination, discernment.
3. Skill, proficiency; प्रयोगविज्ञानम् - Shringara Tilaka (Ś.) 1.2.
4. Worldly or profane knowledge, knowledge derived from worldly experience (opp. ज्ञान which is 'knowledge of Brahma or Supreme Spirit'); ज्ञानं ते$हं सविज्ञानमिदं वक्ष्याम्यशेषत - Bhagavad Gita (Bg.) 7.2;3.41;6.8; (the whole of the 7th Adhyāya of Bg. explains ज्ञान and विज्ञान).
5. Business, employment.
6. Music.
7. Knowledge of the fourteen lores.
8. The organ of knowledge; पञ्चविज्ञानचेतने (शरीरे) - Mahabharata (Mb.) 12.187. 12.
9. Knowledge beyond the cognisance of the senses (अतीन्द्रियविषय)[44]
In addition, Monier Williams (1899; rev. 2008) provides the following definition:
1. to distinguish, discern, observe, investigate, recognize ascertain, know, understand - Rig Veda (RV.), etc., etc. (with na and inf.: 'to know not how to');
2. to have right knowledge - Katha Upanishad (KaṭhUp.)
3. to become wise or learned - Mn. iv, 20;
4. to hear or learn from (gen.) - Chandogya Upanishad (ChUp.); Mahabharata (MBh.);
5. to recognize in (loc.) - Panchatantra (Pañcat.);
6. to look upon or regard or consider as (two acc.), Mn.; MBh., etc.; Kāv., etc.;
7. to explain, declare - BhP.[45]
See also[edit]
2. ^ a b c See, for instance, Rhys Davids & Stede (1921-25), p. 618, entry for "Viññāa," retrieved on 2007-06-17 from the University of Chicago's "Digital Dictionaries of South Asia". University of Chicago
3. ^ See, for instance, Apte (1957-59), p. 1434, entry for "vijñānam," retrieved from "U. Chicago" at ; and, Monier-Williams (rev. 2008), p. 961, entry for "Vi-jñāna," retrieved from "U. Cologne" at .
4. ^ Sue Hamilton, Identity and Experience. LUZAC Oriental, 1996, pages 105-106.
5. ^ Bodhi, Bhikkhu (trans.) (2000b). The Connected Discourses of the Buddha: A Translation of the Samyutta Nikaya. (Part IV is "The Book of the Six Sense Bases (Salayatanavagga)".) Boston: Wisdom Publications. ISBN 0-86171-331-1., pp. 769-70, n. 154. For more information, see the section, "Overlapping Pali terms for mind," below.
6. ^ Rhys Davids & Stede (1921-25), entry for "Viññāa," states:
"In what may be a very old Sutta S ii.95 [viññāa] is given as a synonym of citta (q. v.) and mano (q. v.), in opposition to kāya used to mean body. This simpler unecclesiastical, unscholastic popular meaning is met with in other suttas. E. g. the body (kāya) is when animated called sa-viññāaka [with consciousness]...."
Bodhi (2000b), pp. 769-70, n. 154, also mentions this generalized use of viññāa in the Abhidhamma Pitaka and commentaries (cf. "Overlapping Pali terms for mind" section below).
7. ^ See, for instance, MN 148 (Thanissaro, 1998). In this framework, the Pali word translated as "consciousness" is viññāa and the word translated as "mind" is mano. Thus, the faculty of awareness of the mind (the base of, e.g., abstractions sythesized from physical sensory experience) is referred to as mano-viññāa ("mind-consciousness").
8. ^ Bodhi (2000b), p. 1140; and, Thanissaro (2001c). According to Bodhi (2000b), p. 1399, n. 7, the Pali commentary regarding the Sabba Sutta states: "...[I]f one passes over the twelve sense bases, one cannot point out any real phenomenon." Also see Rhys Davids & Stede (1921-25), p. 680, "Sabba" entry where sabbaŋ is defined as "the (whole) world of sense-experience." References to the "All" (sabba) can be found in a number of subsequent discourses including SN 35.24, 35.25, 35.26, 35.27 and 35.29.
9. ^ Bodhi (2000b), p. 1140; and, Thanissaro (2001b). These five sextets are implicitly referenced as the bases for clinging (upādāna) and fetters in other discourses such as "Advice to Anāthapiṇḍika Discourse" (Anāthapiṇḍikavāda Sutta MN 143; Ñāamoli & Bodhi, 2001, pp. 1109-13) and the "Great Discourse on the Sixfold Base" (Mahāsaāyatanika Sutta MN 149; Ñāamoli & Bodhi, 2001, pp. 1137-39).
10. ^ In the "Six Sextets" discourse (Chachakka Sutta, MN 148), a further expansion can be seen where the "six sextets" (cha-chakka) include the five aforementioned sextets plus feeling-dependent craving (ta). (For MN 148, see Ñāamoli & Bodhi (2001), pp. 1129-36; and, Thanissaro (1998).)
11. ^ Thanissaro (1993).
12. ^ This, for instance, can be juxtaposed with an Idealist epistemology where the material world arises from consciousness (Bodhi, 2006).
13. ^ Khajjaniya Sutta ("Chewed Up," SN 22.29) (Thanissaro, 2001a).
14. ^ Khajjaniya Sutta ("Chewed Up," SN 22.29) (Thanissaro, 2001a). Regarding SN 22.79's typifying perception (saññā) through visual colors and consciousness (viññāa) through assorted tastes, Bodhi (2000b, p. 1072, n. 114) mentions that the Samyutta Nikaya's subcommentary states that perception grasps appearances and shapes while consciousness "can grasp particular distinctions in an object even when there is no appearance and shape."
15. ^ Buddhaghosa (1999), pp. 435-6)
16. ^ This overlap is particularly pronounced in the Mahanidana Sutta (DN 15) where consciousness (viññāa) is a condition of name-and-body (nāmarūpa) and vice-versa (see, e.g., Thanissaro, 1997a).
17. ^ Not all canonical texts identify twelve causes in Dependent Origination's causal chain. For instance, the Mahanidana Sutta (DN 15) (Thanissaro, 1997a) identifies only nine causes (omitting the six sense bases, formations and ignorance) and the initial text of the Nalakalapiyo Sutta (SN 12.67) (Thanissaro, 2000) twice identifies ten causes (omitting formations and ignorance) although its final enumeration includes the twelve traditional factors.
18. ^ For instance, similar to the sensory-specific description of consciousness found in discussing "the All" (above), the "Analysis of Dependent Origination Discourse" (Paticcasamuppada-vibhanga Sutta, SN 12.2) describes viññāa ("consciousness") in the following manner:
19. ^ a b For instance, see the Paticcasamuppada-vibhanga Sutta (SN 12.2) (Thanissaro, 1997b). Square-bracketed Pali terms were added. Also see various other discourses in the Samyutta Nikaya's chapter 12.
20. ^ punabbhavābhinibbatti ("for again becoming reborn"), mentioned in "Volition (1) Discourse" (Bodhi, 2000b, p. 576)
21. ^ nāmarūpassa avakkanti ("for entry of name-and-form"), mentioned in "Volition (2) Discourse" (Bodhi, 2000b, pp. 576-77).
22. ^ Nati (literally, "bending" or "inclination"), which the Samyutta Nikaya commentary states is synonymous with "craving, called 'inclination' in the sense of inclining ... towards pleasant forms, etc.," mentioned in "Volition (3) Discourse" and its end notes (Bodhi, 2000b, pp. 577, 761 n. 116).
23. ^ ca ceteti ca pakappeti ca anuseti: Rhys Davids & Stede (1921–25) translate this as "to intend, to start to perform, to carry out" (pp. 268–69, entry for "Cinteti & ceteti" (retrieved 2007-11-21 at; Bodhi (2000b) translates this as "intends ... plans ... has a tendency towards" (pp. 576–77); and, Thanissaro (1995) translates it as "intends ... arranges ... obsesses about." Thanissaro (1995), n. 1, further elaborates:
"The seven obsessions are: the obsession of sensual passion, the obsession of resistance, the obsession of views, the obsession of uncertainty, the obsession of conceit, the obsession of passion for becoming, and the obsession of ignorance. See AN 7.12."
24. ^ "Volition (1) Discourse," "Volition (2) Discourse" and "Volition (3) Discourse" (Bodhi, 2000b, pp. 576-77).
25. ^ Cetanāsuttaṃ, Dutiya-cetanāsuttaṃ and Tatiya-cetanāsuttaṃ (La Trobe University, n.d., Samyutta Nikaya, book 2, BJT pp. 102, 104. La Trobe University, Australia retrieved 2007-11-21
26. ^ Bodhi (2000b), p. 576. Also see Thanissaro (1995).
27. ^ Bodhi (2000b), pp. 757-9 n. 112.
28. ^ Thanissaro (1997c). Parenthetical phrase "(the monk)" is in the original translation. Also see Bodhi (2000b), pp. 890-91. Note that "unbound" is Thanissaro's translation of "nibbāna" (Pali; Sanskrit: nirvana); thus, Bodhi (2000b), p. 891, provides the alternate translation of "Being unagitated, he personally attains Nibbāna."
29. ^ See, for instance, DN 15 (Thanissaro, 1997a), and SN 12.67 (Thanissaro, 2000).
30. ^ As indicated in the immediately preceding section, "fabrications" (also known as "formations" or "mental formations" or "volitional formations") — as opposed to "name-&-form" (or "mind-body" or "mentality-materiality," etc.) — are more often identified as the requisite conditions for consciousness. These two different statements are not however contradictory insomuch that, as indicated by the Five Aggregates model, name-&-form includes mental fabrications (see the "Five Aggregates" diagram above).
31. ^ Thanissaro (2000).
32. ^ Walshe (1995), pp. 419-20, para. 7. In an end note on p. 606, n. 865, Walshe states that viññāa-sota is "a rare expression which seems to equate with bhavanga, the (mainly) commentarial term for the 'life-continuum' (Ñāamoli)." The error of attributing to the Buddha a teaching that consciousness across life spans is a singular entity is the mistake made by a bhikkhu named Sati who is publicly upbraided for this misconstrual by the Buddha in the "Greater Discourse on the Destruction of Craving" (Mahatanhasankhya Sutta, MN 38; trans. Ñāamoli & Bodhi, 2001, pp. 349-61). Note that the phrase "steam of consciousness" here refers to successive, interdependent conscious states as opposed to Western psychology's use of "stream of consciousness" to refer to successive, interdependent conscious thoughts.
33. ^ Thanissaro (1997a).
34. ^ AN 3.76 (Nyanaponika & Bodhi, 1999, p. 69.)
35. ^ Bodhi (2000a), pp. 28-31.
36. ^ Bodhi (2000b), pp. 769-70, n. 154.
38. ^ 心識論與唯識說的發展
39. ^ Nhat Hanh (2001), pp. 1 ff.
41. ^ zh:s:佛學大辭典/九識
42. ^ 识-法相词典- 佛教百科 佛教百科
43. ^ Swami Nikhilananda (1985), The Gospel of Sri Ramakrishna (Ramakrishna-Vivekananda Center), p. 523 & 1225.
44. ^ See Apte (1957-59), p. 1434. Retrieved 1 Feb. 2011 from "U. Chicago" at .
45. ^ Monier Williams (1899; rev. 2008), p. 961. Retrieved 1 Feb. 2011 from U.Cologne at .
• Apte, Viman Shivaram (1957–59). The practical Sanskrit-English dictionary. Poona: Prasad Prakashan. A general on-line search engine for this dictionary is available at "U. Chicago" at
• Bodhi, Bhikkhu (2006 Sept. 5). MN 148: Chachakka Sutta – The Six Sets of Six (Pt. 1). Retrieved 2008-02-29 from "Bodhi Monastery".[1]
• La Trobe University (n.d.), "Pali Canon Online Database," online search engine of Sri Lanka Tripitaka Project's (SLTP) Pali Canon.[2]
• Monier-Williams, Monier (1899; rev. 2008). A Sanskrit-English Dictionary. Oxford: Clarendon Press. A general on-line search engine for this dictionary is available from "U. Cologne" at
• Nhat Hanh, Thich (2001). Transformation at the Base: Fifty Verses on the Nature of Consciousness. Berkeley, CA: Parallax Press. ISBN 1-888375-14-0.
• Nikhilananda, Swami (1985), The Gospel of Sri Ramakrishna (Ramakrishna-Vivekananda Center)
• Nyanaponika Thera & Bhikkhu Bodhi (trans.) (1999). Numerical Discourses of the Buddha: An anthology of Suttas from the Aṅguttara Nikāya. Walnut Creek, CA: AltaMira Press. ISBN 0-7425-0405-0.
• Rhys Davids, T.W. & William Stede (eds.) (1921-5). The Pali Text Society’s Pali–English Dictionary. Chipstead: Pali Text Society. A general on-line search engine for the PED is available at the University of Chicago.[3]
• Thanissaro Bhikkhu (trans.) (1993). Adittapariyaya Sutta: The Fire Sermon (SN 35.28). Retrieved 2007-11-22 from "Access to Insight".[4]
• Thanissaro Bhikkhu (trans.) (1995). Cetana Sutta: Intention (SN 12.38). Retrieved 2007-11-02 from "Access to Insight".[5]
• Thanissaro Bhikkhu (trans.) (1997a). Maha-nidana Sutta: The Great Causes Discourse (DN 15). Retrieved 2007-11-02 from "Access to Insight".[6]
• Thanissaro Bhikkhu (trans.) (1997b). Paticca-samuppada-vibhanga Sutta: Analysis of Dependent Co-arising (SN 12.2). Retrieved 2007-11-02 from "Access to Insight".[7]
• Thanissaro Bhikkhu (trans.) (1997c). Upaya Sutta: Attached (SN 22.53). Retrieved 2007-11-20 from "Access to Insight".[8]
• Thanissaro Bhikkhu (trans.) (1998). Chachakka Sutta: The Six Sextets (MN 148). Retrieved 2007-06-17 from "Access to Insight".[9]
• Thanissaro Bhikkhu (trans.) (2000). Nalakalapiyo Sutta: Sheaves of Reeds (SN 12.67). Retrieved 2007-11-02 from "Access to Insight".[10]
• Thanissaro Bhikkhu (trans.) (2001a). Khajjaniya Sutta: Chewed Up (SN 22.79). Retrieved 2007-06-17 from "Access to Insight".[11]
• Thanissaro Bhikkhu (trans.) (2001b). Pahanaya Sutta: To Be Abandoned (SN 35.24). Retrieved 2007-06-17 from "Access to Insight".[12]
• Thanissaro Bhikkhu (trans.) (2001c). Sabba Sutta: The All (SN 35.23). Retrieved 2007-06-17 from "Access to Insight".[13]
• Walshe, Maurice (trans.) (1995). The Long Discourses of the Buddha: A Translation of the Dīgha Nikāya. Boston: Wisdom Publications. ISBN 0-86171-103-3.
External links[edit]
Preceded by
Twelve Nidānas
Succeeded by
|
global_05_local_5_shard_00000035_processed.jsonl/4826
|
Hypertrophy of breast
From Wikipedia, the free encyclopedia
(Redirected from Virginal breast hypertrophy)
Jump to: navigation, search
In 1670, the physician Durston drew this illustration of first recorded case of non-gravid gigantomastia; the woman died of the condition.
The first recorded case of gigantomastia, diagnosed in a 23- or 24-year-old woman, circa 1670.
Classification and external resources
ICD-10 N62
ICD-9 611.1
DiseasesDB 1628
Hypertrophy of the breast (macromastia and gigantomastia) is a rare medical condition of the breast connective tissues. The indication is a breast weight that exceeds approximately 3% of the total body weight.[1] There are varying definitions of what is considered to be excessive breast tissue, that is the expected breast tissue plus extraordinary breast tissue, ranging from as little as 0.6 kilograms (1.3 lb) up to 2.5 kilograms (5.5 lb) with most physicians defining macromastia as excessive tissue of over 1.5 kilograms (3.3 lb). Some resources distinguish between macromastia, where excessive tissue is less than 2.5 kg, and gigantomastia, where excessive tissue is more than 2.5 kg.[2] The enlargement can cause muscular discomfort and over-stretching of the skin envelope, which can lead in some cases to ulceration.[3] Hypertrophy of the breast tissues might be caused by increased histologic sensitivity to the female hormones prolactin, estrogen, and progesterone; or an abnormally elevated hormone(s) level in the blood, or both.[4] Breast hypertrophy is a benign progressive enlargement, which can occur in both breasts (bilateral) or only in one breast (unilateral). It was first scientifically described in 1648.[5]
General condition[edit]
Hypertrophy of the breast can affect the breasts equally, but usually affects one breast more than the other, thereby causing asymmetry, when one breast is larger than the other. The condition can also individually affect the nipples and areola instead of or in addition to the entire breast. The effect can produce a minor size variation to an extremely large breast asymmetry. Breast hypertrophy is classified in one of five ways: as either pubertal (virginal hypertrophy), gestational (gravid macromastia), in adult women without any obvious cause, associated with penicillamine therapy, and associated with extreme obesity.[3] The underlying cause of the rapidly growing breast connective tissue, resulting in gigantic proportions, is thought to be a heightened sensitivity to female hormones prolactin, estrogen and progesterone.
Virginal breast hypertrophy[edit]
When gigantomastia occurs in young women during puberty, the medical condition is known as juvenile macromastia or juvenile gigantomastia and sometimes as virginal breast hypertrophy or virginal mammary hypertrophy. Along with the excessive breast size, other symptoms include red, itchy lesions and pain in the breasts. A diagnosis is made when an adolescent's breasts grow rapidly and achieve great weight usually soon after her first menstrual period. Some doctors suggest that the rapid breast development occurs before the onset of menstruation.[6]
Some women with virginal breast hypertrophy experience breast growth at a steady rate for several years, after which the breasts rapidly develop exceeding normal growth. Some adolescent females experience minimal or negligible breast growth until their breasts suddenly grow very rapidly in a short period of time. This may cause considerable physical discomfort. Women suffering VBH often experience an excessive growth of their nipples as well. In severe cases of VBH, hypertrophy of the clitoris occurs.[citation needed]
At the onset of puberty, some females who have experienced little or no breast development can suddenly reach three or more cup sizes within a few days.[7]
Gestational hypertrophy[edit]
This same effect can also occur at the onset of pregnancy or between the 16th to 20th week of gestation. When the swelling in the connective tissue occurs after birth, it can negatively impact long term milk supply.[7] The swelling increases with each subsequent pregnancy.
The extremely rapid growth of the breasts can result in intense heat. The woman's breasts can generate extraordinary discomfort, turning feverish, red, itchy, and even causing the skin to peel. The swelling can suppress the milk supply, pinching off the milk ducts, and leading to mastitis.[7]
Medical treatment[edit]
Medical treatment has not proven consistently effective. Medical regimens have included tamoxifen,[8] progesterone, bromocriptine, the gonadotropin-releasing hormone agonist leuprolide, and testosterone. Gestational macromastia has been treated with breast reduction drugs alone without surgery.[9] Surgical therapy includes reduction mammaplasty and mastectomy.[10] However, breast reduction is not clinically indicated unless at least 1.8 kg (4 lb) of tissue per breast needs to be removed.[11] In the majority of cases of macromastia, surgery is medically unnecessary, depending on body height. Topical treatment includes regimens of ice to cool the breasts.[7]
When hypertrophy occurs in adolescence, noninvasive treatments, including pharmaceutical treatment, hormone therapy, and steroid use are not usually recommended due to known and unknown side effects. Once a girl's breast growth rate has stabilized, breast reduction may be an appropriate choice. In some instances after aggressive or surgical treatment, the breast may continue to grow or re-grow, a complete mastectomy may be recommended as a last resort.
Pregnancy is recognized as the second most common reason for hypertrophy. When secondary to pregnancy, it may resolve itself without treatment after the pregnancy ends.[12]
Medical insurance coverage[edit]
Insurance companies in USA typically require the physician to provide evidence that a woman's large breasts cause headaches or back and neck pain before they will pay for reduction mammoplasty. Insurance companies also mandate a woman who is overweight, which is often the case with gigantomastia, to first lose a certain amount of weight. They also commonly require the patient to try alternative treatments like physical therapy for a year or more.[13] A plastic surgeon in Seattle, Dr. Phil Haeck, told a reporter that most of his breast reduction patients pay their own way. "I’ve had people finance it; I’ve had people get second mortgages, take out home equity loans."[13]
Reported instances[edit]
A painting by Lam Qua of Lu-shi, age 42, on April 17, 1848, prior to breast reduction surgery.
Gigantomastia occurs in 1 out of every 28,000 to 100,000 pregnancies.[14] It can also affect men, although very rarely. One early case study dates to 1670. The patient died four months after the onset of enlargement. One breast removed after the woman's death weighed 29 kg (64 lb).[15]
On April 17, 1848, a 42-year-old woman named Lu-shi was treated for hypertrophy in a Chinese hospital. She was treated by a missionary physician. On December 24, 1849, the left breast, measuring 67 cm (26.5 in) in circumference, and weighing 2.7 kg (6 lb), was removed in a procedure lasting three and a half minutes. The right breast was removed one month later. It measured 61 cm (24 in) in circumference and weighed 2.5 kg (5.5 lb).[16]
One of the most severe cases of macromastia reported in the world medical literature was from Ilorin in Nigeria. In 2007, Dr Ganiyu Adebisi Rahman and his colleagues reported the case of a 26-year-old woman who presented with massive swelling of her breasts and bilateral axillary swellings, both of six years duration. Dr Rahman led a team of surgeons in Ilorin to perform a total bilateral excision of the hypertrophied axillary breasts and bilateral breast amputation with composite nipple-areola complex graft of the normal position of the breasts. The total weight of the breast tissues removed was 44.8 kg[17]
In the October 2002 Journal of Reproductive Medicine, Dr. N. Agarwal with three other doctors from the All India Institute of Medical Sciences in New Delhi reported on a 24-year-old woman who was pregnant with her second child. During her 19th week of pregnancy, she experienced a "massive bilateral breast enlargement." She was treated for six months after her child was born before her breasts were reduced to their normal size.[14]
In 2005, a woman reported that her breasts grew at puberty from nothing to a C cup in one month. When she became pregnant for the first time, her breasts increased two cup sizes in a few days. Immediately after her first birth, her breasts grew three cup sizes. After her second child was born, her breasts increased six cup sizes. After her third childbirth, they grew 10 cup sizes, and after her fourth child was born, they grew nine cup sizes. In this instance, the swelling abated about 10 days after childbirth, but her bra cup size remained E to a G for the next year. About one year postpartum, her breasts rapidly atrophied to AA cup size.[7]
Another extreme case was observed in 2008 in Maria Vittoria Hospital in Turin, Italy, where the amount removed from both breasts was 17.2 kg (38 lb. The growth occurred during puberty making it a case of juvenile gigantomastia, but the patient did not seek treatment until the age of 29.[18] Another extreme case was observed on August 28, 2003, when a 24-year-old woman was admitted to the Clinical Center Skopje in Macedonia with gigantomastia of pregnancy and the amount later removed from both breasts was 15 kg (33 lb) in total.[19][20] A second case in Macedonia was reported when the breasts of a 30-year-old woman from a remote mountain village in eastern Macedonia suddenly grew to more than 30 kilograms (66 lb) total.[20]
As the disorder becomes more widely known, media reports have increased. French Canadian Isabelle Lanthier appeared on Montel Williams' talk show where she told how her chest grew from 86 cm (34 in) to 133 cm (52.5 in) in five months during her pregnancy. At their largest, one breast weighed 6.8 kg (15 lb) and the other 5.4 kg (12 lb). Her husband custom-made a special bra to support her breasts. In 2007, a Chilean TV station covered the story of 32-year-old Jasna Galleguillos from Antofagasta, who experienced ongoing back pain, making everyday tasks very difficult to perform. She underwent breast reduction surgery to relieve her pain. Surgeons removed 4.25 kilograms (9.4 lb) from one breast and 3.33 kilograms (7.3 lb) from the other breast.[21]
On October 29, 2009, the Philippine television network GMA News and Public Affairs, producers of Wish Ko Lang (Just My Wish) hosted by Vicky Morales, profiled the story of Pilma Cabrijas, a 30-year-old woman afflicted by gigantomastia. The woman was told by a folk healer that her condition may have been caused by a curse. The measured bust circumference without appropriate bra support was 160 cm (63 in). The weight of her breasts was not reported in detail, but seemed to weigh "as much as two children." She had breast reduction surgery performed, but her breasts regrew. The producers of Wish Ko Lang paid for additional surgery.[22]
Nude model Norma Stitz is exploiting this condition and is officially named as being the person with the largest natural breasts by the Guinness Book of Records with breasts weighing 16 kg (35 lb) each.[23]
Virginal breast hypertrophy[edit]
In 1993, the Japanese journal Surgery Today reported on the case of a 12-year-old girl. Only 152 centimetres (60 in) tall and weighing 43 kilograms (95 lb), her breasts began to develop at age 11 before the onset of menstruation. Over the next eight months, both breasts grew abnormally large, and physicians treating her found that her physiological development was normal except for her breasts. The weight produced by their symmetrical and massive enlargement resulted in marked curvature of the spine. Lab tests of her blood for hormones and biochemical substances showed normal values, though tests revealed that it might have been cause by hypersensitivity to estrogen. She underwent a bilateral reduction mammoplasty. Surgeons removed 2 kilograms (4.4 lb) of tissue from her right breast and 1.9 kilograms (4.2 lb) from her left breast. She was administered tamoxifen afterward to suppress breast regrowth.[24]
A more severe case of virginal breast hypertrophy of an 11-year-old girl was reported in 2008. The breasts had begun to grow rapidly at puberty and had reached the point of causing physical impairment and respiratory compromise after one year. The skin was intact without any ulcerations. Blood chemistry and endocrine investigation was normal. A bilateral reduction mammaplasty with free nipple grafts was performed. 6 kg of the right breast and 6.5 kg of the left breast removed, resulting in a removal of 12.5 kg of tissue in all (24% of the total body weight).[25]
Social considerations[edit]
Extremely large breasts, also known as macromastia[26] or gigantomastia, are a source of considerable attention. Some women try to hide or mask their breasts with special clothing, including minimizing bras. Women with this condition may be subject to psychological problems due to unwanted attention and/or harassment. Depression is common among sufferers.
In the case of a 12-year-old Japanese girl reported in 1993, her "massively enlarged" breasts caused her "intense psychological problems, incapacitating her in school activities and social relations."[24] Actress Soleil Moon Frye, who starred as a child in the sitcom Punky Brewster, reported in an interview with People magazine that boys taunted her, calling her "Hey, Punky Boobster!" It affected her professional and social life negatively. "People started to think of me as a bimbo," she said in the interview. "I couldn't sit up straight without people looking at me like I was a prostitute," Frye said.[27]
Finding large bra sizes and styles that fit is challenging. Also, larger bras are more costly, challenging to find, and unflattering to the wearer. Ill-fitting bras with narrow straps can cause chronic irritation, redness, and indentations in the shoulders. Skin rashes under the breasts are common, particularly during warm weather. Heavy breasts may cause headaches, neck pain, upper and lower back pain, and numbness or tingling in the fingers.
Many definitions of macromastia and gigantomastia are based on the term of "excessive breast tissue", and are therefore somewhat arbitrary, as excessive tissue can often be regarded only from an aesthetic viewpoint and not from a medical one. Breasts of human females developed only under the aesthetic selection, as can be deducted by comparison to the breasts of other related primates. The size of the breasts is not related to their functionality, and therefore almost all human breast tissue is excessive from a functional viewpoint. In other words, the line between "just big breasts" and a medical condition is an individual one, as long as there are no ulcerations or other disease-related observations present. This is also the reason many health insurance companies refuse to pay for reduction surgeries when there are only psychological but no strong physical impairments. The current definitions are dependent on society and surgeons' perception of normal and beautiful breast size and may be subject to change in the future.
1. ^ Dafydd, H.; Roehl, K.R.; Phillips, L.G.; Dancey, A.; Peart, F.; Shokrollahi, K. (2011). "Redefining gigantomastia". Journal of Plastic, Reconstructive & Aesthetic Surgery 64 (2): 160–3. doi:10.1016/j.bjps.2010.04.043. PMID 20965141.
2. ^ To Wo Chiu (2011). Stone's Plastic Surgery Facts and Figures (3rd ed.). Cambridge University Press. p. 188.
3. ^ a b Note: the criterium of >600g is used with the term "macromastia" in this source: Sharma, K; Nigam, S; Khurana, N; Chaturvedi, KU (2004). "Unilateral gestational macromastia--a rare disorder". The Malaysian journal of pathology 26 (2): 125–8. PMID 16329566.
4. ^ Ohlsén, L.; Ericsson, O.; Beausang-Linder, M. (1996). "Rapid, massive and unphysiological breast enlargement". European Journal of Plastic Surgery 19 (6). doi:10.1007/BF00180324.
5. ^ Palmuth, T (1648). "Observations medicuarum centinae tres posthumae". Cent II (Obs 89). Braunschweig.
6. ^ "Puberty Stages of Development". Ask the Expert FAQs. OBGYN.net. Retrieved 2006-11-21.
7. ^ a b c d e Casciola, Cheri (June–July 2005). "Gigantomastia". Leaven (Chandler, Arizona) 41 (3): 62–63. Retrieved October 26, 2009.
8. ^ Baker, Stephen B.; Burkey, Brooke A.; Thornton, Paul; Larossa, Don (2001). "Juvenile Gigantomastia: Presentation of Four Cases and Review of the Literature". Annals of Plastic Surgery 46 (5): 517–25; discussion 525–6. doi:10.1097/00000637-200105000-00011. PMID 11352426.
9. ^ Ezem, B. U.; Osuagwu, C. C.; Opara, K. A. (2011). "Gestational gigantomastia with complete resolution in a Nigerian woman". Case Reports 2011: bcr0120102632. doi:10.1136/bcr.01.2010.2632. PMC 3062818. PMID 22707463.
10. ^ Bloom, Sara A.; Nahabedian, Maurice Y. (2008). "Gestational Macromastia: A Medical and Surgical Challenge". The Breast Journal 14 (5): 492–5. doi:10.1111/j.1524-4741.2008.00628.x. PMID 18657144.
11. ^ Kulkarni, Dhananjay; Beechey-Newman, N.; Hamed, H.; Fentiman, I.S. (2006). "Gigantomastia: A problem of local recurrence". The Breast 15 (1): 100–2. doi:10.1016/j.breast.2005.03.002. PMID 16005231.
12. ^ Swelstad, Matthew R.; Swelstad, Brad B.; Rao, Venkat K.; Gutowski, Karol A. (2006). "Management of Gestational Gigantomastia". Plastic and Reconstructive Surgery 118 (4): 840–8. doi:10.1097/01.prs.0000232364.40958.47. PMID 16980844.
13. ^ a b "Too Much of a Good Thing?". Seattle Woman Magazine. Retrieved 2013-03-14.
14. ^ a b Juan, Ph.D., Stephen (January 13, 2007). "Is it true that a woman's breasts can grow enormously overnight?". The Register U.K. Retrieved 2011-08-16.
15. ^ Durston, W.; Darston, W. (1669). "An Extract of a Letter Written to the Publisher from Plymouth Novem. 2. 1669. By William Durston Dr. Of Physick; Concerning the Death of the Bigg-Breasted Woman (Discoursed of in Numb. 52.) Together with what Was thereupon Observed in Her Body". Philosophical Transactions of the Royal Society 4 (45–56): 1068. doi:10.1098/rstl.1669.0048.
16. ^ Qua, Lam (April 17, 1848). "Peter Parker Collection". Medical Historical Library, Cushing/Whitney Medical Library. Retrieved 21 March 2010.
17. ^ Rahman, GA; Adigunt, IA; Yusuf, IF; Bamigbade, DP (2007). "Macromastia and bilateralaxillary breast hypertrophy: A case report". West African journal of medicine 26 (3): 250–2. PMID 18399346.
18. ^ Borsetti, G.; Merlino, G.; Bergamin, F.; Cerato, C.; Boltri, M.; Borsetti, M. (2009). "A 38 kg skin-reducing bilateral mastectomy: A unique case". Journal of Plastic, Reconstructive & Aesthetic Surgery 62: 133. doi:10.1016/j.bjps.2008.03.067.
19. ^ Antevski, Borce; Jovkovski, Oliver; Filipovski, Vanja; Banev, Saso (2010). "Extreme gigantomastia in pregnancy: Case report—my experience with two cases in last 5 years". Archives of Gynecology and Obstetrics 284 (3): 575–8. doi:10.1007/s00404-010-1714-8. PMID 20978777.
20. ^ a b "Macedonia faces 'giant' breast problem". Archived from the original on August 3, 2012.
21. ^ "Jasna Galleguillos" (in Spanish). TVN. 2007. Retrieved 22 March 2010.
22. ^ "Pilma's heavy burden". October 29, 2009. Retrieved 22 March 2010.
23. ^ "Blog Archive » World’s Biggest Boobs (Guinness Book Record Holder)". Pophangover. 2009-05-16. Retrieved 2013-03-14.
24. ^ a b Morimoto, Tadaoki; Komaki, Kansei; Mori, Toshiaki; Sasa, Mitsunori; Miki, Hitoshi; Inoue, Hiroyuki; Monden, Yasumasa; Nakanishi, Hideki (1993). "Juvenile gigantomastia: Report of a case". Surgery Today 23 (3): 260–4. doi:10.1007/BF00309238. PMID 8467179.
25. ^ Fiumara, Linda; Gault, David T.; Nel, Mark R.; Lucas, Dominique N.; Courtauld, Elizabeth (2009). "Massive bilateral breast reduction in an 11-year-old girl: 24% ablation of body weight". Journal of Plastic, Reconstructive & Aesthetic Surgery 62 (8): e263. doi:10.1016/j.bjps.2007.10.053.
26. ^ "ProBoards - Free Forums & Free Message Boards". Macromastia.proboards.com. Retrieved 2013-03-14.
27. ^ Rosen, Marjorie (April 26, 1993). "Now I Can Be Free". Vol. 39, No. 16. People Magazine. Retrieved 2009-09-12.
External links[edit]
|
global_05_local_5_shard_00000035_processed.jsonl/4827
|
Waldo–Hancock Bridge
From Wikipedia, the free encyclopedia
(Redirected from Waldo-Hancock Bridge)
Jump to: navigation, search
Waldo–Hancock Bridge
Waldo-Hancock Bridge, Bucksport, ME 1931-2006.jpg
Waldo–Hancock Bridge in 2001
44°33′38″N 68°48′07″W / 44.560692°N 68.801966°W / 44.560692; -68.801966
Waldo–Hancock Bridge
Location US 1, Verona, Maine
Area 4 acres (1.6 ha)
Built 1931
Architect Robinson & Steinman
Architectural style Other, Suspension
Governing body State
NRHP Reference # 85001267[1]
Significant dates
Added to NRHP June 20, 1985
Removed from NRHP December 18, 2013[2]
Carries US 1
Crosses Penobscot River
Locale Bucksport, Maine, (Hancock County, Maine)
Official name Waldo–Hancock Bridge
Maintained by Maine Department of Transportation
ID number (Bridge No. 2973)
Design Suspension bridge
Total length 2,040 ft (621.8 m)
Width 20 ft (6.1 m) roadway with
Two 3 12 ft (1.1 m) sidewalks
Height 72 m
Longest span 800 ft (243.8 m)
Clearance below 135 ft (41.1 m)
Construction begin 1929
Construction end 1931
Opened November 16, 1931
Closed December 30, 2006 (Demolished 2013)
Toll 1931–1953
The Waldo–Hancock Bridge was the first long-span suspension bridge erected in Maine, as well as the first permanent bridge across the Penobscot River below Bangor. The name comes from connecting Waldo and Hancock counties. The bridge was retired in 2006, when the new Penobscot Narrows Bridge was opened just a few yards away, and it was demolished in 2013.
The bridge was 2,040 feet (621.8 m) long with a clear center span of 800 feet (243.8 m) between towers. It had two 350-foot (106.7 m) side spans and carries a 20-foot (6.1 m) wide roadway with two 3 12-foot (1.1 m) sidewalks. It used stiffening trusses that are 9 feet (2.7 m) deep. Each of the main suspender cables were 9 58 inches (24.4 cm) in diameter, and consisted of 37 strands of 37 wires. The deck was 135 feet (41.1 m) above water level to allow passage of large ships. The total cost of the span was less than $850,000 in 1931 dollars (about $12 million in 2010 dollars), significantly under its allocated budget.
David B. Steinman, of Robinson and Steinman, was the designer. The bridge was fabricated by American Bridge Company (superstructure) and Merritt-Chapman & Scott (substructure).
Dedication plaque, 1931
Technologically, the Waldo–Hancock Bridge represented a number of firsts. It was one of the first two bridges in the U.S. (along with the St. Johns Bridge in Portland, Oregon, completed in June, 1931) to employ Robinson and Steinman’s prestressed twisted wire strand cables, which were first used on the 1929 Grand Mère Suspension Bridge over the Saint-Maurice River in Quebec. The prefabrication and prestressing of the cables decreased the number of field adjustments required, saving considerable time, effort, and money. As an additional experiment in efficiency, the Waldo–Hancock cables were marked prior to construction, ensuring proper setting. This method had never been used before and proved successful in this instance. These innovations, invented and pioneered by Steinman, were a significant step forward for builders of suspension bridges.
The Waldo–Hancock was also the first bridge to make use of the Vierendeel truss in its two towers, giving it an effect that Steinman called “artistic, emphasizing horizontal and vertical lines.” This attractive and effective truss design was later used in a number of important bridges, including the Triborough Bridge and Golden Gate Bridge.[3]
The Waldo–Hancock Bridge was noted at the time for its economy of design and construction. It cost far less than had been appropriated by the State Highway Commission, which enabled the construction of a second bridge between Verona Island and Bucksport. When opened in 1931 the bridge collected tolls used to retire the bonds issued to finance its construction. All tolls were lifted twenty-two years later on October 31, 1953, however, when those original construction bonds were paid off.
Rehabilitation, replacement and abandonment[edit]
As the bridge approached its seventieth anniversary with the end of the century, a series of routine safety inspections made by the Maine Department of Transportation revealed that over those seven decades the structure's two main suspension cables and the many vertical bridge deck stringers had become seriously corroded thereby deteriorating their ability to support the deck, roadway and the traffic that crossed it. These engineering studies made it clear that the bridge required immediate major rehabilitation and eventual replacement.[4]
The closed Waldo-Hancock Bridge in 2007 still showing its temporarily repaired cables.
Work was undertaken to rehabilitate the bridge starting in 2000[5] by Cianbro and Piasecki Steel Construction Corp. with cable work by Williamsport Wirerope Works Inc, by focusing on strengthening the cables. The two cables were done separately, one a time. Piasecki Steel Construction Corp., Castleton, N.Y., rehabilitated the north cable in 2002. At this point the bridge was discovered to be beyond permanent repair and would have to be abandoned and replaced by a new structure to be built adjacent to the aging bridge.[6] Work then shifted to temporary strengthening. For the south cable, MDOT in August 2003 hired Pittsfield, Maine-based Cianbro Corp. under a $4-million emergency contract.
The rehabilitation used a single wire thickness (2-inch (5.1 cm) diameter galvanized helical 91-wire strands.) to facilitate fabricating and installing the cables more quickly. New concrete anchorages with up to 30-foot (9.1 m) long anchor rods were built by Cianbro. Crews installed continuous runs of strands on new saddles bolted and welded on new base plates atop cable bents and the main towers. Workers placed two groups of four strands 12 feet (3.7 m) above each main cable to allow for pulls. Each strand weighs 4 tons (3.6 metric tons). A rope pull was walked across, connected to a 78-inch (2.2 cm) pull cable, then winched back across and connected to the strand, which was fed through a tensioner holding back about 15,000 pounds (7,000 kg) to smooth the pull.
“We hooked and rehooked one strand per day on average,” says Archie J. Wheaton, Cianbro project superintendent. “The strands were connected to anchor rods; then we set the sag.” The new auxiliary cables are connected to existing double suspender cables by 1 18 inches (2.9 cm) steel rods, then tensioned with 30-ton (27.2 metric ton) jacks, bringing the new cables about 3 feet (1 m) from the main cables.[7]
A new construction, the Penobscot Narrows Bridge, was built alongside the older one.[8] The new bridge was opened to traffic on December 30, 2006, at which point the Waldo–Hancock Bridge was ceremoniously closed. Barricades were erected at both ends, closing the bridge to both cars and pedestrians.
The Maine Department of Transportation announced on February 14, 2012 that the Bridge would be demolished starting that summer and be completed by the fall. The schedule was designed to accommodate the needs of two endangered species, the Peregrine falcon and the Shortnose sturgeon. Barges would be placed in the Penobscot River onto which sections of the bridge would be lowered. The concrete piers in the River would be all that remained, and MDOT worked with the United States Coast Guard to design lights for them once the Bridge was removed to aid ships in the River.[9] Later, MaineDOT announced that the low bid of $5.35 million by S&R Corp. of Lowell, Massachusetts was accepted.[10]
Demolition eventually was delayed until November 20, 2012 with the removal of the bridge's flag poles and was completed in June, 2013.[11]
The Waldo-Hancock and Penobscot Narrows Bridges as viewed from the Penobscot Narrows Bridge Observatory in July, 2007, and July, 2013 after the Waldo-Hancock Bridge had been demolished.
Further reading[edit]
The following sources referenced in the HAER documentation[12] may be of value:
• Jackson, Donald C. (1988). Great American Bridges and Dams: A National Trust Guide. Great American Places Series. Washington, DC: The Preservation Press. ISBN 0891331298.
• Jakkula, Arne A. (1 July 1941). "A History of Suspension Bridges in Bibliographical Form". Bulletin of the Agricultural and Mechanical College of Texas. 4th 12 (7): 327.
• Plowden, David (1974; reprint, 1984). Bridges: The Spans of North America. New York: W. W. Norton & Company. ISBN 0393019365. Check date values in: |date= (help)
2. ^ NRHP actions list, December 27, 2013
3. ^ Larson Farnham, Katherine (1999). "Waldo–Hancock Bridge" (PDF). Historic American Engineering Record. Library of Congress. p. 1. Retrieved May 1, 2006.
4. ^ "History". Waldo–Hancock Bridge Replacement Project. Maine Department of transportation. Retrieved May 1, 2006.
5. ^ "Waldo–Hancock Bridge". Structurae. Retrieved May 1, 2006.
6. ^ "Waldo–Hancock Suspension Bridge". Bridgemeister.com. Retrieved May 1, 2006.
7. ^ Angelo, William J. (2003). "Maine Cables Get Extra Support in Rare Procedure". ENR.com Engineering News Record. Retrieved May 1, 2006.
8. ^ This image is a spectacular overhead view of the roadway advancing on the new bridge from the Maine DOT site
9. ^ Miller, Kevin (2012). "Demolition of 86-year-old Penobscot River bridge to begin this fall". Bangor Daily News. Retrieved February 14, 2012.
10. ^ Moretto, Mario (2012). "State receives low bid of $5.35 million for demolition of Waldo–Hancock Bridge, to start in October". Bangor Daily News. Retrieved August 12, 2012.
11. ^ MaineDOT. "Waldo–Hancock Bridge Removal". Retrieved 3 February 2013.
12. ^ Larson Farnham, Katherine (1999). "Waldo–Hancock Bridge" (PDF). Historic American Engineering Record. Library of Congress. p. 3. Retrieved May 1, 2006.
External links[edit]
|
global_05_local_5_shard_00000035_processed.jsonl/4828
|
Weightless (All Time Low song)
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Single by All Time Low
from the album Nothing Personal
Released March 24, 2009 (2009-03-24)
Format Single
Recorded 2009
Genre Pop punk, Pop rock
Length 3:18
Label Hopeless
Writer(s) Alex Gaskarth
All Time Low singles chronology
"Poppin' Champagne"
"Weightless" is a song by American pop punk band All Time Low and the first and lead single from their third studio album Nothing Personal (2009). The single was released through Hopeless Records as a digital download on April 7, 2009, and was released in the UK on August 3, 2009.[1] The song is also available to download on the music video games Rock Band and Guitar Hero 5. It became the first song by the band to receive radio airplay, exposing the band to a new audience, and helping it peak at No. 104 on the Billboard Hot 100. The song has become a live staple, and is considered to be one of their signature songs along with "Dear Maria, Count Me In". In 2014 the song was certified Gold by the RIAA.[2]
Lead vocalist Alex Gaskarth stated in an interview with MTVu that "The whole mentality of the song is like, you feel like you're stuck in this like, negative space and you just want to get out. Summer's rolling up and uh, everybody's finishing up with school and everybody's getting like the exam beatdown".[citation needed]
In the Nothing Personal album trailer, Jack Barakat said that the song is about not wanting to grow up and just wanting to be a kid.[citation needed]
Music video[edit]
The music video for "Weightless" commenced filming on May 20, directed by Matthew Stawski.[3] Fans were invited to go on the set and be a part of the music video. It debuted on MTV, MTV2, mtvU and HITS the day before the album's release, on July 6, 2009.[4][5] The video opens with Alex Gaskarth being spoken to by some groupies backstage, with text representing his inner monologue, saying things over the girls such as "Only wants your money", "Obsessed", and "Get a restraining order on her." The video continues in this manner with the camera tracking through the venue; situations include Gaskarth backstage being pampered by crew members while text says that lead singers are spoiled, and also for people such as the merch seller, the roadies and crew, and various crowd members (including one who thinks "I'd rather be watching Fall Out Boy.") The video also features cameo appearances by Pete Wentz, bassist of Fall Out Boy, and Mark Hoppus, bassist and vocalist of Blink-182 with a joke that Wentz tweets to Hoppus via mobile that All Time Low rips off Fall Out Boy. Hoppus then despairingly thinks to himself that both All Time Low and Fall Out Boy rip off Blink-182. The video ends with the slogan Nothing Personal, which is not only a reference to the album, but is also the theme of the video.[3]
Chart positions[edit]
1. ^ "All Time Low Confirm UK Release Details for 'Nothing Personal'". Rocklouder. Retrieved July 2, 2009.
2. ^ http://www.altpress.com/news/entry/all_time_lows_weightless_officially_certified_gold
3. ^ a b "New Video: All Time Low, ‘Weightless’". MTV Buzzworthy Blog. Retrieved July 7, 2009.
4. ^ "All Time Low streaming Nothing Personal on MTV.com". Alternative Punk. Retrieved July 2, 2009.
5. ^ "MTV.Com to Premiere All Time Low's New Album, Nothing Personal". Altsounds. Retrieved July 2, 2009.
6. ^ "Chart Log UK: A – Azzido Da Bass". zobbel.de. Tobias Zywietz. Retrieved September 15, 2013.
7. ^ "All Time Low Album & Song Chart History" Billboard Bubbling Under Hot 100 for All Time Low. Retrieved November 20, 2014.
8. ^ "American album certifications – All Time Low – Weightless". Recording Industry Association of America. If necessary, click Advanced, then click Format, then select Album, then click SEARCH
External links[edit]
|
global_05_local_5_shard_00000035_processed.jsonl/4829
|
Zhao Tao
From Wikipedia, the free encyclopedia
Jump to: navigation, search
For the Chinese male swimmer, see Zhao Tao (swimmer).
This is a Chinese name; the family name is Zhao.
Zhao Tao
Io sono Li (5).jpg
Chinese name 赵涛 (simplified)
Pinyin Zhào Tāo (Mandarin)
Jyutping Jèung Maahn Yuhk (Cantonese)
Born (1977-01-28) 28 January 1977 (age 38)
Taiyuan, China
Occupation Actress,Producer
Years active 1999-Present
Spouse(s) Jia Zhangke (2012-Present)
Zhao Tao (born 28 January 1977) is a famous Chinese actress. She works in China and Europe, has over 10 films to her credit since starting her career in 1999 and is the muse of director Jia Zhangke. Zhao first came into international prominence through close collaboration with Chinese director Jia Zhangke and is credited with helping to bring Chinese cinema to Europe, especially Italy. As Shun Li in Shun Li and the Poet, her best starring role to date, she became the first Asian actress to win a prize at David di Donatello.
In 2011 she starred in the Italian movie Shun Li and the Poet by Andrea Segre, the movie was screened in the Venice Days section of the 68th Venice International Film Festival.[2] Zhao won the David di Donatello Award, the Italian Oscar, for Best Actress for her bilingual role.
Personal life[edit]
On January 7, 2012 she married director Jia Zhangke.
Complete Filmography[edit]
Year English Title Chinese Title Role Notes
2000 Platform 站台 Yin Ruijuan Ensemble
2002 Unknown Pleasures 任逍遥 Qiao Qiao Lead
2004 The World 世界 Tao Lead
2006 Still Life 三峡好人 Shen Hong Lead
2007 Our Ten Years Women 德石年 - Lead
2008 24 City 二十四城记 Su Na Ensemble
2008 Dada's Dance Dada - Ensemble
2008 Cry Me a River 河上的愛情 Zhou Qi Lead
2009 Remembrance 念石 - Lead
2010 Ten Thousand Waves - Blue Goddess Ensemble
2011 Shun Li and the Poet - Shun Li Lead
2013 A Touch of Sin 天注定 Xiao Yu Ensemble
TBA Mountains May Depart 山河故人
1. ^ "Constant Muse: Jia Zhangke's leading lady Zhao Tao". China Film Journal. 24 March 2008. Retrieved 1 May 2008.
2. ^ "5 September". La Biennale di venezia. Retrieved 4 September 2011.
External links[edit]
|
global_05_local_5_shard_00000035_processed.jsonl/4830
|
Zoltán Füredi
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Zoltán Füredi (Budapest, Hungary, 21 May 1954) is a Hungarian mathematician, working in combinatorics, mainly in discrete geometry and extremal combinatorics. He was a student of Gyula O. H. Katona. He is a corresponding member of the Hungarian Academy of Sciences (2004). He is a research professor of the Rényi Mathematical Institute of the Hungarian Academy of Sciences, and a professor at the University of Illinois Urbana-Champaign (UIUC).
Füredi received his Candidate of Sciences degree in mathematics in 1981 from the Hungarian Academy of Sciences.[1]
Some results[edit]
• In infinitely many cases he determined the maximum number of edges in a graph with no C4.
• With Paul Erdős he proved that for some c>1, there are cd points in d-dimensional space such that all triangles formed from those points are acute.
• With Imre Bárány he proved that no polynomial time algorithm determines the volume of convex bodies in dimension d within a multiplicative error dd.
• He proved that there are at most O(n\log n) unit distances in a convex n-gon.[2]
• In a paper written with coauthors he solved the Hungarian lottery problem.[3]
• With I. Palásti he found the best known lower bounds on the orchard-planting problem of finding sets of points with many 3-point lines.[4]
1. ^ Zoltán Füredi at the Mathematics Genealogy Project
2. ^ Z. Füredi (1990). "The maximum number of unit distances in a convex n-gon". Journal of Combinatorial Theory 55 (2): 316–320. doi:10.1016/0097-3165(90)90074-7.
3. ^ Z. Füredi, G. J. Székely, and Z. Zubor (1996). "On the lottery problem". Journal of Combinatorial Designs (Wiley) 4 (1): 5–10. doi:10.1002/(sici)1520-6610(1996)4:1<5::aid-jcd2>3.3.co;2-w. [1] Reprint
4. ^ Füredi, Z.; Palásti, I. (1984), "Arrangements of lines with a large number of triangles", Proceedings of the American Mathematical Society 92 (4): 561–566, doi:10.2307/2045427 .
External links[edit]
|
global_05_local_5_shard_00000035_processed.jsonl/4833
|
IUCN threat status:
Least Concern (LC)
Read full entry
Chukar partridge
For other uses of Chukar, see Chukar (disambiguation).
Illustration from Hume and Marshall's Game birds of India, Burma and Ceylon
The chukar is a rotund 32–35 cm (13–14 in) long partridge, with a light brown back, grey breast, and buff belly. The shades vary across the various populations. The face is white with a black gorget. It has rufous-streaked flanks, red legs and coral red bill. Sexes are similar, the female slightly smaller in size and lacking the spur.[2] The tail has 14 feathers, the third primary is the longest while the first is level with the fifth and sixth primaries.[3]
It is very similar to the rock partridge (Alectoris graeca) with which it has been lumped in the past[4] but is browner on the back and has a yellowish tinge to the foreneck. The sharply defined gorget distinguishes this species from the red-legged partridge which has the black collar breaking into dark streaks near the breast. Their song is a noisy chuck-chuck-chukar-chukar from which the name is derived.[5] The Barbary partridge (Alectoris barbara) has a reddish brown rather than black collar with a grey throat and face with a chestnut crown.[6]
Other common names of this bird include chukker (chuker or chukor), Indian chukar and keklik.
Distribution and habitat[edit]
This partridge has its native range in Asia, including Israel, Lebanon, Turkey, Iran, Afghanistan, Pakistan and India, along the inner ranges of the Western Himalayas to Nepal. Further west in southeastern Europe it is replaced by the red-legged partridge, Alectoris rufa. It barely ranges into Africa on the Sinai Peninsula. The habitat in the native range is rocky open hillsides with grass or scattered scrub or cultivation. In Israel and Jordan it is found at low altitudes, starting at 400 m (1,300 ft) below sea level in the Dead Sea area, whereas in the more eastern areas it is mainly found at an altitude of 2,000 to 4,000 m (6,600 to 13,100 ft) except in Pakistan, where it occurs at 600 m (2,000 ft).[2][7] They are not found in areas of high humidity or rainfall.[8]
It has been introduced widely as a game bird, and feral populations have become established in the United States Rocky Mountains, Great Basin, high desert areas of California, Canada, Chile, Argentina, New Zealand and Hawaii.[9] Initial introductions into the US were from the nominate populations collected from Afghanistan and Nepal.[10] It has also been introduced to New South Wales in Australia but breeding populations have not persisted and are probably extinct.[11] A small population exists on Robben Island in South Africa since it was introduced there in 1964.[12]
Systematics and taxonomy[edit]
The chukar partridge is part of a confusing group of "red-legged partridges". Several plumage variations within the widespread distribution of the chukar partridge have been described and designated as subspecies. In the past the chukar group was included with the rock partridge (also known as the Greek partridge). The species from Turkey and farther east was subsequently separated from A. graeca of Greece and Bulgaria and western Europe.[13][14]
There are fourteen recognized subspecies:
Population and status[edit]
Chukar partridge in the Antelope Island State Park, Utah, US
British sportsmen in India considered the chukar as good sport although they were not considered to be particularly good in flavour. Their fast flight and ability to fly some distance after being shot made recovery of the birds difficult without retriever dogs.[17] During cold winters, when the higher areas are covered in snow, people in Kashmir have been known to use a technique to tire the birds out to catch them.[18]
Behaviour and ecology[edit]
Chukar partridge at Weltvogelpark Walsrode (Walsrode Bird Park, Germany)
Alectoris chukar falkiMHNT
In the non-breeding season, chukar partridge are found in small coveys of 10 or more (up to 50) birds. In summer, chukars form pairs to breed. During this time, the cocks are very pugnacious calling and fighting.[7][8][19][20] During winter they descend into the valleys and feed in fields. They call frequently during the day and especially in the mornings and evenings. The call is loud and includes loud repeated "Chuck" notes and sometimes duetting "Chuker" notes. Several calls varying with context have been noted.[21] The commonest call is a "rallying call" which when played back elicits a response from birds and has been used in surveys, although the method is not very reliable.[22][23] When disturbed, it prefers to run rather than fly, but if necessary it flies a short distance often down a slope on rounded wings, calling immediately after alighting.[2][17][24] In Utah, birds were found to forage in an area of about 2.6 km2 (1.0 sq mi). and travel up to 4.8 km (3.0 mi) to obtain water during the dry season. The home range was found to be even smaller in Idaho.[25][26][27]
The breeding season is summer. Males perform tidbitting displays, a form of courtship feeding where the male pecks at food and a female may visit to peck in response. The males may chase females with head lowered, wing lowered and neck fluffed. The male may also performs a high step stiff walk while making a special call. The female may then crouch in acceptance and the male mounts to copulate, while grasping the nape of the female. Males are monogamous.[14] The nest is a scantily lined ground scrape, though occasionally a compact pad is created with a depression in the center. Generally, the nests are sheltered by ferns and small bushes, or placed in a dip or rocky hillside under an overhanging rock. About 7 to 14 eggs are laid.[8][20][28] The eggs hatch in about 23–25 days. In captivity they can lay an egg each day during the breeding season if eggs are collected daily.[29] Chicks join their parents in foraging and will soon join the chicks of other members of the covey.[6]
Chukar will take a wide variety of seeds and some insects as food. It also ingests grit.[24] In Kashmir, the seeds of a species of Eragrostis was particularly dominant in their diet[30] while those in the US favoured Bromus tectorum.[6] Birds feeding on succulent vegetation make up for their water needs but visit open water in summer.[31]
Chukar roost on rocky slopes or under shrubs. In winter, birds in the US selected protected niches or caves. A group may roost in a tight circle with their heads pointed outwards to conserve heat and keep a look out for predators.[6]
Chukar are sometimes preyed on by golden eagles.[32]
Birds in captivity can die from mycoplasma infection and outbreaks of other diseases such as Erysipelas.[33][34][35]
In culture[edit]
The chukar is the National bird of Iraq[36] and of Pakistan, where its name is derived from chakor in Sanskrit. Literary mentions of it in the northern areas of the Indian subcontinent date back to the Rig Veda (c. 1700 BC).[37] In North Indian and Pakistani culture, as well as in Indian mythology, the chukar sometimes symbolizes intense, and often unrequited, love.[38][39] It is said to be in love with the moon and to gaze at it constantly.[40] Because of their pugnacious behaviour during the breeding season they are kept in some areas as fighting birds.[8][19]
1. ^ BirdLife International (2012). "Alectoris chukar". IUCN Red List of Threatened Species. Version 2013.2. International Union for Conservation of Nature. Retrieved 26 November 2013.
2. ^ a b c Rasmussen PC and Anderton JC (2005). Birds of South Asia: The Ripley Guide. Volume 2. Smithsonian Institution & Lynx Edicions. p. 120.
3. ^ Blanford WT (1898). Fauna of British India. Birds. Volume 4. Taylor and Francis, London. pp. 131–132.
4. ^ Watson GE (1962). "Three sibling species of Alectoris Partridge". Ibis 104 (3): 353–367. doi:10.1111/j.1474-919X.1962.tb08663.x.
5. ^ Baker ECS (1928). Fauna of British India. Birds. Volume 5 (2 ed.). Taylor and Francis, London. pp. 402–405.
6. ^ a b c d Johnsgard PA (1973). Grouse and Quails of North America. University of Nebraska, Lincoln. pp. 489–501.
7. ^ a b Whistler, Hugh (1949). Popular Handbook of Indian Birds. Edition 4. Gurney and Jackson, London. pp. 428–430.
8. ^ a b c d Stuart Baker EC (1922). "The game birds of India, Burma and Ceylon, part 31". J. Bombay Nat. Hist. Soc. 28 (2): 306–312.
10. ^ Pyle RL and Pyle P (2009). The Birds of the Hawaiian Islands: Occurrence, History, Distribution, and Status. B.P. Bishop Museum, Honolulu, HI, U.S.A.
11. ^ Christidis L and Boles WE (2008). Systematics and Taxonomy of Australian Birds. CSIRO. p. 60. ISBN 0-643-06511-3.
12. ^ Alectoris chukar (Chukar partridge). Biodiversityexplorer.org. Retrieved 2011-11-28.
13. ^ Hartert E (1925). "A new form of Chukar Partridge Alectoris graeca kleini subsp.nov.". Novitates Zoologicae 32: 137.
14. ^ a b Christensen GC (1970). The Chukar Partridge. Biological Bulletin No. 4. Nevada Department of Wildlife.
15. ^ Barilani, Marina; Ariane Bernard-Laurent; Nadia Mucci; Cristiano Tabarroni; Salit Kark; Jose Antonio Perez Garrido; Ettore Randi (2007). "Hybridisation with introduced chukars (Alectoris chukar) threatens the gene pool integrity of native rock (A. graeca) and red-legged (A. rufa) partridge populations". Biological Conservation 137: 57–69. doi:10.1016/j.biocon.2007.01.014.
16. ^ Duarte J and Vargas JM (2004). "Field inbreeding of released farm-reared Red-legged Partridges (Alectoris rufa) with wild ones". Game and Wildlife Science 21 (1): 55–61.
17. ^ a b Hume AO and Marshall CHT (1880). The Game birds of India, Burmah and Ceylon. Self published. pp. 33–43.
18. ^ Ludlow, Frank (1934). "Catching of Chikor [Alectoris graeca chukar (Gray)] in Kashmir". J. Bombay Nat. Hist. Soc. 37 (1): 222.
19. ^ a b Finn, Frank (1915). Indian Sporting Birds. Francis Edwards, London. pp. 236–237.
20. ^ a b Ali S and Ripley SD (1980). Handbook of the birds of India and Pakistan. Volume 2 (2 ed.). Oxford University Press. pp. 17–20. ISBN 0-19-562063-1.
21. ^ Stokes, Allen W (1961). "Voice and Social Behavior of the Chukar Partridge". The Condor 63 (2): 111–127. doi:10.2307/1365525. JSTOR 1365525.
22. ^ Williams HW and Stokes AW (1965). "Factors Affecting the Incidence of Rally Calling in the Chukar Partridge". The Condor 67 (1): 31–43. doi:10.2307/1365378. JSTOR 1365378.
23. ^ Bohl, Wayne H. (1956). "Experiments in Locating Wild Chukar Partridges by Use of Recorded Calls". The Journal of Wildlife Management 20 (1): 83–85. doi:10.2307/3797253. JSTOR 3797253.
24. ^ a b Oates EW (1898). A manual of the Game birds of India. Part 1. A J Combridge, Bombay. pp. 179–183.
25. ^ Walter, Hanspeter (2002). "Natural history and ecology of the Chukar (Alectoris chukar) in the northern Great Basin". Great Basin Birds 5 (1): 28–37.
26. ^ Bump G (1951). "The chukor partridge (Alectoris graeca) in the middle east with observations on its adaptability to conditions in the southwestern United States. Preliminary Species Account Number 1". US Fish and Wildlife Service.
27. ^ Phelps JE (1955). The adaptability of the Turkish Chukar partridge (Alectoris graeca Meisner) in central Utah. Unpublished MS Thesis, Utah State Agricultural College, Logan, Utah, USA.
28. ^ Hume AO (1890). The nests and eggs of Indian Birds. Volume 3 (2 ed.). R H Porter, London. pp. 431–433.
29. ^ Woodard AE (1982). "Raising Chukar Partridges". Cooperative Extension Division of Agricultural Sciences, University of California. Leaflet 21321e.
30. ^ Oakleaf RJ and Robertson JH (1971). "Fall Food Items Utilized by Chukars in Kashmir, India". The Journal of Wildlife Management 35 (2): 395–397. doi:10.2307/3799623. JSTOR 3799623.
31. ^ Degen AA, Pinshow B and Shaw PJ (1984). "Must desert Chukars (Alectoris chukar sinaica) drink water? Water influx and body mass changes in respose to dietary water content". The Auk 101 (1): 47–52.
32. ^ Ticehurst CB (1927). "The Birds of British Baluchistan. Part 3". J. Bombay Nat. Hist. Soc. 32 (1): 64–97.
33. ^ Lateef M, Rauf U and Sajid MA (2006). "Outbreak of respiratory syndrome in Chukar Partridge (Alectoris chukar)". J. Anim. Pl. Sci. 16 (1–2).
34. ^ Pettit JR, Gough AW and Truscott RB (1976). "Erysipelothrix rhusiopathiae infection in Chukar Partridge (Alectoris graeca)". Journal of Wildlife Diseases 12 (2): 254–245. doi:10.7589/0090-3558-12.2.254. PMID 933318.
35. ^ Dubey JP, Goodwin AM, Ruff MD, Shen SK, Kwok OCH, Wizlkins GL and Thulliez P (1995). "Experimental toxoplasmosis in chukar partridges (Alectoris graeca)". Avian Pathology 24 (1): 95–107. doi:10.1080/03079459508419051. PMID 18645768.
36. ^ Iraq Culture, Map, Flag, Tourist Places. sphereinfo.com
37. ^ Ram Bir Singh Kushwah and Vijay Kumar (2001-01-01). Economics of Protected Areas and Its Effect on Biodiversity. APH Publishing, 2001. ISBN 9788176482097. In the Rig Veda the references of some Himalayan species of partridges includes black partridge, chakor partridge, snow partridge and the common hill partridge
38. ^ Temple, Richard Carnac (1884). The legends of the Panjâb. Volume 2. Education Society's Press, Bombay. p. 257.
39. ^ Journal of the Asiatic Society of Bengal v. 55. Asiatic Society of Bengal. 1881. When I beheld thy face mournful, lady, I wandered restlessly o'er the world, Thy face is like the moon, and my heart like the chakor
40. ^ Balfour, Edward (1871). Cyclopædia of India and of eastern and southern Asia, commercial, industrial and scientific: products of the mineral, vegetable and animal kingdoms, useful arts and manufactures. Scottish & Adelphi Presses. The birds are said by the natives to be enamoured of the moon and, at full moon, to eat fire
Source: Wikipedia
|
global_05_local_5_shard_00000035_processed.jsonl/4848
|
A 16-episode anime that ran during the TV show Wonderful. Around 3-4 minutes each, and full of non sequitur and occasionally gastric humor. 10 year old catgirl DiGi Charat (Dejiko (no relation)) from the planet of the same name (she's a princess, mind), 5 year old catgirl Petit Charat (Puchiko), and 8 year old, floating, upside-down blob with arms Gema arrive via spaceship in Akihabara, where Dejiko plans to become a pop idol and actress. Once they realized they couldn't live in the spaceship (no good place to hide it), they work at Gamers, a trading card and video game shop frequented by finger-people (their faces were on what would be the fingernail) and occasional human-shaped customers.
There's not much plot to the show - Dejiko fights with her rival in idolatry (and co-worker) Rabi~en~Rose (Usada Hikaru - her nickname is the Japanese spelling of "la vie en rose"), loses and finds her tail, has a fanclub of two otaku types she calls "bukimi" (Takeshi and Yoshimi are their names, and the kanji of their names together can be read as "bukimi," which means spooky), shoots beams from her eyes, has an imposter that steals food and farts, insults and laughs at most everything, and other equally random events. The three main characters also have their own dialects - Dejiko adds a "nyo" (meow) at the end of every sentence, Puchiko adds a "nyu," and Gema adds "gema-gema" (usually in place of words like "desu" or it's counterparts "desu wa," "de gozaru," "da," etc). It's considered fairly offensive, rewriting the language to suit their styles.
The show isn't drawn in typical anime style outside of the main characters. It looks (and flows) more like Radiohead's Paranoid Android video than traditional anime, which only adds to the strangeness. One of the recurring characters, an odd teddy bear in a flying box, reminds me of Ziggy Stardust-era David Bowie, only after getting beat up. The animation was done by Studio Madhouse (also did Trigun and Card Captor Sakura) and this seems to be a strange direction for them.
DiGi Charat was originally created by then-doujinshi artist and OL Koge Donbo and commisioned by Broccoli as a set of trading cards to be given out at their Gamers chain of trading card/game/anime/character goods shops, then Dejiko and crew became the mascots for their main branch, Gamers Akihabara. Dejiko was soon featured in a Gamers TV commercial in animated form, singing her "Welcome to my House" song. From there, it became popular enough to get it's own show. Once the show ended, the characters became pop idols of sorts, releasing their own CDs, which was kicked off with the CD release of the anime's opening song "Only One, No. 1" (by Okui Masami), and later performing live concerts. Broccoli also has several "Kobeya" CD-ROMs (email clients not unlike Sony's wonderful/despicable PostPet software).
The whole DiGi Charat concept is little more than amazing marketing. The characters are endearing and cute, but are a very small part of the whole. DiGi is everywhere in the anime industry right now - selling goods at Comiket, holding autograph sessions at Tokyo Game Show (the seiyuu, at least), popping up in the Aquarian Age trading card game (and at several sanctioned competitions), garage kits, posters, shitajiki, software, cameos in other shows, commercials, concerts, drama CDs, tons of fan art, fan zines, fan websites, doujinshi, window stickers, pencil cases, cell phone covers and straps, cosplay outfits, lifesize cutouts, action figures, paper dolls, UFO catcher dolls, ceramic dolls, on vending machines and billboards, and so on. There are even DiGi Charat bandages and "DiGi Charat Candy 2000." And of course the limited edition "Di Gi Charat Brandy" and "Di Gi Charat Mineral Water," both referenced in the anime and later made real. The characters are slowly becoming the mascots of the whole industry, ready to take Hoshino Ruri's place as the visual definition of "now anime." She's even gaining a foothold in the US anime industry, since Broccoli partnered with the LA-based Omochabox.com, who dubbed the "Welcome to my House" song to English and has been airing local TV spots for their new Broccolified name, AnimeGamers.com.
Most of the marketing popularity of this is because of Broccoli - they decided that, since most people already associate Dejiko and friends with Gamers Akiba, it wouldn't hurt to let other companies and fans use the imagery to promote themselves as well. They've made it relatively easy and cheap to use the DiGi copyright on most anything, and they encourage fans to keep making garage kits and fanzines and most anything that's not too adult.
The anime was continued with the "DiGi Charat Summer Special 2000," a TV special of 4 half-hour episodes which introduced a couple new characters, including Dejiko's arch-nemesis Piyocola Analogue III (AKA Piyoko). Then a Christmas special, then a Spring special, and a theatrical movie in 2002 called "Digi Charat: Hoshi no Tabi" (Trip to the Planet), with still more to come. Dejiko & crew have also branched out into the video game market with "Di Gi Charat Fantasy," an "alternate world" exploring Koge Donbo's original concepts, and the recursive marketing genius of "Deji-Communication," a simulation for the GBA where the player gets to manage Gamers, stocking and selling loads of Di Gi merchandise (Di Gi pens, Di Gi t-shirts, Party Night CDs, and other real Di Gi merchanise).
Charat is pronounced "carrot" or "kyarat," as in "Pia Carrot." And the name comes from "digi chara," or digital character. Also, the names "DiGi Charat" and "Di Gi Charat" are interchangable by Broccoli's standards (they've used both at different times, though seem to be settling on "Di Gi Charat" of late).
• Hitoshi Doi's huge anime info site (www.tcp.com/doi)
• Broccoli home page (www.broccoli.co.jp)
• TBS home page (www.tbs.co.jp)
Episode guide. WARNING: Contains spoilers-nyo!
Also note I'm basing all quotes, and storyline, and everything on the sub, since my Japanese is about as good as my Klingon. Umm.. Qapla'!!
Episode 01 - Dejiko Arrives-nyo!
Di Gi Charat (Dejiko-nyo), Petit Charat (Puchiko-nyu) and Gema-gema arrive at earth. They land in Akihabara. Dejiko wants to become a greatMura actress, but soon finds she cannot afford accommodation. As if by magic, a shopkeeper appears. He offers them a room above his store (Gamers) if they'll work for him. At the end, they are taunted by a laughing ghost. TO BE CONTINUED...
• Rabi~en~Rose: Whaaat? And it's just getting interesting! Boo!
Episode 02 - Please call me Rabi~en~Rose!
The laughing ghost vanishes. On an errand for the manager, they encounter the ghost again, who turns out to be Rabi~en~Rose. Rabi~en~Rose turns out to be called Usada. Usada turns out to be working at the same store as Dejiko. Fun. This episode also introduces the Fans of Dejiko.
• Rabi~en~Rose: It's me! I'm the great rival who will blow Dejiko away!
• Dejiko: I was hit by a car, fell into the river, and almost got eaten by a big fish-nyo!
• Manager: I was worried that Dejiko-chan would get hit by a car, fall into the river, and almost get eaten by a big fish.
• Chubby Fan: It's ok. I wash my hair every day.
Episode 03 - A Scary Store?
Minagawa Takurou is introduced. He's scared of the store in general and Dejiko's eye-beam in particular. Reassured by Rabi~en~Rose, he buys some Tetsu-Ashi Johnny trading cards. Umm, that's about it. Sometimes it's really difficult to write these guides.
• Random mooks: That was great window shopping! Plenty of window shopping.. window shopping is great! (all burnt by eye beam)
• Minagawa: She's a shopkeeper too? Then for a normal person like me it might be too much to enter this scary store?!
• Dejiko: There's some kind of curse on it-nyo.
Rabi~en~Rose: Hopefully you won't have any misfortune.
Puchiko: Come again.
Episode 04 - What the Hell is That?
Dejiko, Puchiko and Gema go on a picnic. Although Dejiko wants to climb a big pointy mountain, Puchiko is too tired and Gema convinces her not to. While they are eating, Rabi~en~Rose flies by with helicopter ears and blows dust on their picnic. Shortly after a mysterious teddy-bear-esque thing appears. This episode contains, in my opinion, one of the best scenes ever - Dejiko turns to escape the teddy, and faces another one. There is silence for a few seconds, then Dejiko turns back and says in a small, puppydog voice 'What the hell is it?'.
Just watch it, yeah? Anyway, they get back to Gamers, and the teddy's there. Seems to be some sort of advertising prop. Oh well!
• Gema: For some reason, I want to eat meat-gema. Muscle, muscle.
• Rabi~en~Rose: Might as well eat the onigiri covered with dust. There might also be animal crap mixed in, you know.
• Dejiko: It has salt in it, so it'll be sterilised. It's okay-nyo.
Episode 05 - Mr Long-Hair
The episode opens on a stranger with long hair talking about words. It cuts to a scene in the store, then Mr Long-Hair (Kimura Takurou - Murataku) comes in and talks about words some more, making high-larious puns in Japanese based on -nyo, -nyu and -gema. And that's about it. This is a good show. No, really.
• Chubby Fan: I'm a little chubby.. do you like chubby guys?
• Murataku: Words are beautiful. Words are the means by which people tell history to their descendants. Therefore, words have to be beautiful. However.. what is 'nyo'?
• Murataku: Such a cute child.. This child brings me happiness.
• Murataku: Do I? Do I have to tell such a cute child to fix a strange speaking habit?
• Dejiko: Puchiko is not for sale-nyo!
Episode 06 - Eerie Boo!
Dejiko and Rabi~en~Rose have a mop-fight. LAter, the manager sends Dejiko to the Something Store to buy "something". As she goes there, her tail falls off, and is found by the Fans of Dejiko, who fight over it and fall into a hole, to the Hell Store. The Devil offers them anything for Dejiko's tail, but they bring it back to her. They finally get named - the short chubby one is Takeshi, and the tall, greasy-haired one is Yoshimi. Together, they are.. bukimi.
• Dejiko: You'll get scolded by the manager for breaking the mop-nyo! Better start crying-nyo!
• Dejiko: Let's buy "something" from that "Something-store"-nyo!
• Fans of Dejiko: Ueee! We fell into the hole!
• Puchiko: You don't have a tail-nyu.
Dejiko: Aah! Really? What shall I do?
Puchiko: Puchiko still has a tail-nyu.
Episode 07 - Gema-Gema Psshhuu
Dejiko-chan wants to draw a naughty doujinshi. Gema tells her off and so she kicks him into the river. She is scolded by Minagawa and Murataku. Suddenly, an inflated Gema rises from the water and chases Dejiko through the streets. Just as he is about to exact revenge, he goes to take a piss and shrinks to normal size. Dejiko shoots him with her eye-beam. Told you this show was zany.
• Gema: RubRub. I might develop static electricity-gema!
• Dejiko: No, no! This lukewarm yellow thing is pressing against me!
• Rabi-en-Rose: Let's not worry about where and how much Gema pissed, ok? ^^
Episode 08 - My Beam Won't Come Out-nyu.
Puchiko is trying to shoot her eye beam, but it doesn't seem to be working. Murataku comes along and tells her it won't work until she is angry, and the situation is right. Puchiko watches Dejiko and Gema arguing, and marvels at Dejiko's anger. That night, she promises to practice getting angry, but Dejiko and Gema's nocturnal shiftings speed the process somewhat, and she blasts Gema. Hooray!
• Gema: You shot me with your eye-beam last night, didn't you-gema!
Dejiko: Gema, you crushed me with the TV-nyo! And I was eating watake in the flowerbed!
Episode 09 - It Became Romantic
Minagawa has a stomach ache, brought about by eating bad food. He is helped by a mystery girl who gives him medicine. They talk for a while, then mystery girl runs off. Minagawa finds a dice bracelet belonging to her, and mystery girl is revealed to be none other than Rabi~en~Rose. The plot thickens. Rabi~en~Rose reveals a sordid tale of her past and her parents constructive abandonment.
• Minagawa: I really shouldn't just pick up food off the ground and eat it.
• Mystery Girl: You shouldn't just pick up food off the ground and eat it.
Minagawa: I know, but the bota-mochi looked so good..
• Minagawa: She saved me from diarrhoea and I didn't even say thanks.
• Rabi~en~Rose's parents: Daddy and Mummy will go to America, and Hikaru, you'll be left in Japan. And you'll enjoy a great poverty-stricken life, then debut as an idol!
Episode 10 - Fake Dejiko Appears! So catch it in a fucking Pokéball already.
Dejiko is accused of doing all manner of very bad things, such as stealing Minagawa's melon bread and farting in Murataku's face. Since she has no alibi, this is apparently enough for everyone to denounce her as the villain. She attempts to convince them all by giving them candy, but then.. the FAKE DEJIKO APPEARS and steals the candy. The moral of the story? "The real Dejiko is me-nyo!"
• Dejiko: No-nyo! No-nyo! Dejiko doesn't do such bad things-nyo!
• Murataku: Wh-what's happening? I am suddenly thinking of something nasty.
• Murataku: That's what happened, Puchiko-chan.
Puchiko: You soiled your pants-nyu.
Episode 11 - Steamy, Hot Rice!
This episode is more or less Dejiko's dream sequence. It consists of random images with Dejiko's commentary, interspersed with steamy, hot rice. Looks delicious. At the end, Dejiko gets up to clean the store all on her own, allowing Puchiko to sleep on. Such are the tales that made society great.
• Dejiko: Steamy, hot rice-nyo..
• Dejiko: A strange bug is crying-nyo..
• Dejiko: Steamy, hot rice-nyo..
• Dejiko: The cats seem to be fighting-nyo.. the guy next door is farting-nyo..
• Dejiko: Steamy, hot rice-nyo..
• Dejiko: Steamy, hot rice-nyo..
Episode 12 - Monster! Another Appears!
As the title may imply, a monster shows up and ravages Akihabara. Rabi~en~Rose tries to defeat it but is defeated herself, so Dejiko and Puchiko throw rubbish at the beastie. An alien shows up, but Dejiko doesn't have time for it. The monster staggers under the trash assault, but Dejiko's eye-beam just bounces off it. Then the teddy thing from Episode 4 flies in and eats the monster. Then the alien buys a Dejiko doll. Th-th-th-that's all, folks!
• Dejiko: I wonder if a monster will show up-nyo?
• Rabi~en~Rose: I, Rabi~en~Rose, just found out that it was stupid to ask you for help!
• Scene changes:
Part 1: Monster Attack!
Part 2: Alien Invasion Too!
Part 3: The Great Battle!
Part 4: Alien Visit to the Store!
Episode 13 - Possessed By a Spirit-nyo!
Puchiko won't get out of her futon. The reason for this is not because she's tired or lazy, but because she's been possessed by a clam spirit. Minagawa is called to perform an exorcism on Dejiko. It works, and the spirit is exorcised. However, Puchiko is then possessed by a snail spirit, and Minagawa cannot exorcise her since he can only do clams. Stay in school, kids.
• Dejiko-clam: I am a clam. I like clean water. If it's miced a little with sea water, I am very happy. I am a clam. I am also in miso soup-mi.
• Gema: She's possessed by a clam spirit-gema. It's definitely because yesterday she just ate the broth of clam miso soup and threw the rest away. It's the curse of a spirit for being wasteful-gema.
• Rabi~en~Rose: Rabi~en~Dominica Kick!!
Puchiko: Special move in Virtua Fighter-nyu.
Episode 14 - The Hooligan Stopped Coming
A hooligan comes to Gamers. He causes some trouble, but not much (see Quotes below). He asks for rice, which Gamers doesn't stock, obviously. The Fans of Dejiko give him an onigiri and a beef sausage. He goes on a light after meal rampage and fuck it, nothing of any importance really happens. Yeah.
• Hooligan: Today I feel like going on a rampage. Don't worry, it's okay, it's okay. Even if I go on a rampage, I won't destroy things or anything like that. If I do such a thing, it'll be troublesome, and I'll probably get punished.
• Dejiko: I didn't know-nyo.. when the rampage began and ended..
• Rabi~en~Rose: He went back.
Gema: He showed us so many things-gema.
Puchiko: He didn't do anything-nyu.
ALL: She's right!
Episode 15 - SPECIAL EDITION! - "Party Night"
This is a karaoke episode. The cast dance along to a song and the words go up on screen. Lots of fun is to be had singing along. The lyrics can easily be found by searching for 'Party Night' on animelyrics.com, or the anime lyric search engine of your choice.
Episode 16 - Usada's Big Explosion
The last episode, set at Christmas. Dejiko makes a cake for Rabi~en~Rose - a cake of DOOM! Ahem. Well, a cake that's set to explode. She gives it to Rabi~en~Rose, but feels guilty. When Rabi~en~Rose returns to the shop, still bearing the cake, she tries to tell her, but at that point Puchiko's eye-beam comes out. And ignites the cake.
• Mooks: CAKE! CAKE!
• Dejiko: Leyt's make-nyo! Let's make-nyo! Christmas-nyo! Cover it with cream-nyo!
• Dejiko: Is this what they call 'pangs of conscience'-nyo?
• Rabi~en~Rose: (singing) Jinglebells.. Jinglebells.. Jinglebells.. Jinglebells.. Jinglebells..
• Puchiko: It came out-nyu.
Summaries are my own work. Quotes from DiGi Charat fansub, Digi Anime
'DiGi Charat' and all related characters are copyright Broccoli. I own precisely 0% of them.
CST Approved
Log in or registerto write something here or to contact authors.
|
global_05_local_5_shard_00000035_processed.jsonl/4870
|
Go Down
Topic: Adafruit motor shield - Sparkfun stepper wiring? (Read 1 time) previous topic - next topic
I'm using the Adafruit motor shield and the Sparkfun stepper. I'm trying to wire the motor up correctly. Can anyone tell me the correct wiring? See attached.
So long as you make sure one winding goes to one channel and the other to the other channel it will be fine. You can use a multimeter to check which motor wires are connected by a winding.
It the motor goes the wrong way simply reverse one of the two windings.
Thanks for the reply. I got it wired right in the end. However the speed is rubbish - nothing above 20rpm. I think it's power related even though i'm feeding it the 12v it says it needs.
With stepper motors to hold steps at speed you have to accelerate and decelerate the stepping frequency to allow the mass of the motor to keep up - if you were just going from stationary to 20rpm instantly that would explain its failure to manage any faster.
If you feed steps from standstill at a high rate the rotor won't be able to make the first step before the next pulse arrives owing to inertia.
I would expect something more like 200rpm to be readily achievable with an accelerating step rate. I think IIRC there's an AccelStepper library?
Thanks for the tip.
I'm still not getting any kind of speed out of the motor. Here's the code i'm now using:
Code: [Select]
#include <AccelStepper.h>
#include <AFMotor.h>
AF_Stepper motor1(200, 1);
void forwardstep1() {
motor1.onestep(FORWARD, DOUBLE);
void backwardstep1() {
motor1.onestep(BACKWARD, DOUBLE);
AccelStepper stepper1(forwardstep1, backwardstep1);
void setup()
void loop()
if (stepper1.distanceToGo() == 0)
It's a version of one of the examples. It's the only one that would work with a bit of tweaking. The result i get is as follows. It speeds up to about 20rpm then wiggles back and forth - then it obviously reached it's distance and does the same in the other direction.
Any other tip? With the code i'm using what would the expected results be?
May 03, 2011, 08:34 pm Last Edit: May 04, 2011, 02:39 pm by PogCarr Reason: 1
Just a suggestion, but try setting your setMaxSpeed(700); setSpeed(700); and most importantly setAcceleration(1000). An accellof 15 is soooo slow and I am sure you never really get to speed before you reach your final position!
Also, make sure you are using the latest AccelStepper library as I have found some significant changes in the different version.
Finally, it is common and recommended to drive a stepper motor system with 4 to 6 times the rated voltage of the coils. I believe this has to do with the pulsed nature of the driving circuitry (good description of all matters Stepper Motor related at http://www.geckodrive.com/ark-2/support.html ), but in any case, if the coils are rated 12V try driving it with as high a voltage as the Motor Shield will take, I think 36VDC.
Go Up
Please enter a valid email to subscribe
Confirm your email address
We need to confirm your email address.
Thank you for subscribing!
via Egeo 16
Torino, 10131
|
global_05_local_5_shard_00000035_processed.jsonl/4882
|
hello is there any way to get the selected cell's content inside a datagrid. In a windows form appl, i used the following method but it was for datagridview. Can it be done with a datagrid in wpf? if not is there any/better alternative to datagrid in wpf? please help
private void dataGridView3_CellContentClick(object sender, DataGridViewCellEventArgs e)
string val2 = dataGridView3.Rows[e.RowIndex].Cells[0].Value.ToString();
|
global_05_local_5_shard_00000035_processed.jsonl/4883
|
CAD Software VC++ Visualization Source Code Kit and CAD OCX Control
E-XD++ Suite is the leading C++ CAD library for building image-based CAD GUIs.
Rich, custom CAD GUIs for demanding applications
High-performance 2D graphics
Powerful GUI builder
Shorter development time
Reduced maintenance costs
Customizable business graphic objects, charts and diagrams.
support multiple layers drawing.
support import autocad's DXF file.
support measure distance between a list of points.
support measure area.
support draw circle or ellipse with two or three points.
supports drawing multiple kind of dimension shapes.
Printing and preview.
Export with jpeg or bitmap file.
Most important, it is written with 100% VC++/MFC and ships it's full source codes.
High-performance graphic objects, robust, versatile graphic objects
Display thousands of vector and raster graphic objects
Animate objects (display moving aircraft in air traffic control applications)
Modify objects (display equipment status in real time)
High-performance display and refresh (ideal tool for map displays)
This example shows how to use E-XD++ in CAD component application, including drawing from center, MM_HIMETRIC projecting mode, black background editing and customized printing, vertexes auto-capturing, intersections, etc, as shown below:
U_CanCode CAD ActiveX Control
For Visual Basic, C#, Delphi or other languages developers, U_CanCode had prepared a CAD OCX Control, it's U_CanCode CAD ActiveX Control. It has the following features:
1. Can be called with any C#.NET, Java, Delphi or VB languages.
2. Can be used by web.
3. It is based on U_CanCode leading CAD solution, all the features of U_CanCode CAD Solution can be called with this CAD ActiveX Control.
4. It supports DXF loading, layer, and many kind of advance CAD features.
5. All the features can be full customized.
6. The source codes of this cad control can be purchased with E-XD++ Enterprise Suite.
7. With our consulting service, we can help you do any modify with this cad ocx control to meet your own specify requires.
8. With all the other features of U_CanCode Draw Control.
Views: 157
Size: 101.7 KBName: cad_software_sm1.jpg
Views: 98
Size: 92.8 KB
Download and Try U_CanCode CAD Control Purchase U_CanCode CAD Control
|
global_05_local_5_shard_00000035_processed.jsonl/4885
|
2007 Mac Mini now flying
Discussion in 'Mac mini' started by harrma, Jul 16, 2011.
1. macrumors newbie
My 1.83GHz, Intel Core Duo, 1GB ram Mac Mini from 2007 was starting to feel very sluggish. Lion coming out and requiring 2GB ram meant something had to be done! I thought it might be useful to share my experiences of doing this. I don't do this sort of thing often or for the sake of it but I just want to be economical and not wasteful and get the best out of what I have. I also will only tinker with out of warranty stuff where if I totally screw it up I won't cry but chalk it up to experience.
I concluded that apart from the obvious ram upgrade, a move to an SSD would be enough to make a significant difference. I figure the graphics, cpu and so on good enough for my needs as the machine is hooked up to a plasma in the living room so typically does surfing and playing music / movies. I discarded a processor upgrade on cost grounds and had no need to upgrade the DVD drive and only a G router so no point in upgrading the wireless to N either.
I did a lot of research but in the end only two websites - everymac for checking specs and ifixit for instructions were needed. Everymac was great because they indicated 4GB ram would be possible where the general advice (including the Crucial analyser tool) was telling me 2GB. Some sites even say you install 4GB and you'll be able to address 3GB. I bought from Crucial partly for convenience but partly because their SSD looked on paper to be very fast, albeit so quick the Mini may not get the full benefit. They delivered in just 22 hours for free. Choosing an SSD is simple, you just buy a 2.5" SATA drive and you'd be hard pushed to go wrong. I went for a 64GB one to replace the 80GB HDD.
Overall I would say the actual upgrade is not too difficult. I won't repeat the instructions (ifixit) but would say that getting the case open and shut is the hardest bit and that the case is not as flush now as it was beforehand though no one would notice. You have to take care with the cables and be quite methodical. I was cautious and did the ram, fired her up to check all was well and then did the SSD and a fresh OS install. Next time I would do both at the same time.
With the ram upgraded it was starting to feel a lot better. It was useful to do it in two stages to get a feel for how it was coming along. However, with the SSD in, it flies. It actually feels like the most responsive computer I have ever used! My theory that a dual core 1.83 processor is good enough and not the bottleneck seems to have been proved. No one says the A5 is too slow and that is a dual core at more like 1GHz, accepting it's not a straight comparison.
So for £140 / $225, considerably less than I would have spent on the difference between and a new one and what I could get on eBay for my current one, I have the best computer I have ever used.
Now it's time to set up that fat NAS for the music and photos and so on and plan upgrading the rest of my machines to SSD!!
2. macrumors 65816
Is your CPU a Core Duo or a Core 2 Duo? If it's just a Core Duo, you won't be able to install Lion.
It's good to see that the SSD has made an improvement in the performance of your machine. However, keep in mind that the Crucial SSD you have is largely dependent on TRIM support to keep the performance at a high level (which OS X doesn't support for 3rd party SSDs). Given that you are not pushing the Mini too hard, you likely won't run into this problem for quite a while, but in case the SSD ever starts feeling sluggish, it may be worth it to do a full erase to try and freshen it up. If you have a Windows PC, I think Crucial makes a program that makes this cleanup process a little more thorough.
3. macrumors newbie
thanks, yes it is a Core 2 Duo so should be good for Lion. I guess I will find out within the next week or so! Agree about the risk around TRIM so will see how it goes. Obviously it would be good to see Lion getting TRIM support for all SSD's....
4. macrumors 6502a
I had a Core Duo 1.83 like you had, and I don't think there are any sub-2Ghz Core *2* Duos.
Does it explicitly have the number *2* in the "About This Mac.." system profiler? Or just "Core Duo"?
And glad the SSD is working out for now, but picking an SSD - esp. for OS X - is far a more indepth task that "just picking one" because there is the aspect of no TRIM support and some SSD brands are more reliable than others.
The best SSD's out there - for both Windows and OS X - are Intel 510 and 320 SSDs and OWC SSD's, as they don't require trim and they're reliability eclipses other brands IIRC.
Honestly, I'd return your SSD and get either an Intel or OWC one, just to be safe.
And because I'd bet my $2,000 drum kit that Lion will *NOT* be getting TRIM support for all SSD's. This is a smart move that Apple's making because there are data loss issues and other relaibility issues with certain SSD's so Apple is just supporting the ones that are gauranteed most stable and reliable.
5. macrumors newbie
It definitely is a "2" and they do exist!
I'm not convinced on the TRIM / Intel / OWC argument. These are relatively new devices and support is evolving all the time. I have seen 'enablers' posted which will open up TRIM to non Apple SSD's and many people are using Crucial ones with OSX. I've also read plenty of bad things about the Intel's and OCZ's and particularly the latter, have a bewildering range of disks out there on the market with different qualities to them.
I think anyone installing an SSD in an old Mac is clearly doing something experimental and this is just my media centre. If it slows down or dies I'll tinker some more but in the meantime I'll enjoy it...
6. macrumors 603
the c2d 1.83Ghz mac mini exists and is the weakest mini worthwhile to own. it will use eye tv and play and record 720p
7. macrumors newbie
Update Mac Mini 2,1
Thanks for your post. I was planning to do the same with my Mac Mini 2,1 to make it faster and use it for design, etc. I would like to know how to migrate the data from the current HDD to the new SSD HDD, how do I have to copy everything (including the OS) to make it run and work when I put the new drive?
I'm running an Intel Core 2 Duo, 2.0GHz, 1GB RAM (2x512), which supports up to 4GB RAM, but only 3 are addressable, so is it better to buy 3GB instead of 4, isn't it?
I've seen this: http://eshop.macsales.com/item/Other World Computing/53IM2DDR3GBK/
And if I buy this kit (http://eshop.macsales.com/item/Other World Computing/YSSDMP120/) will I be able to use the old HDD into this case and use it as an external usb drive?
I would like to install Lion on it, hope it will works fine (and fast!).
Many thanks for your help!
8. macrumors P6
It's better to buy 4Gb instea of 3Gb. You'll get an extra 0.3Gb of ram and it'll be dual channel instead of single channel.
9. macrumors member
Not really, as some aren't all that reliable. Anyway, grats on your upgrade.
10. macrumors 6502a
'sup guys (gals)?
I'm looking to get a Mac Mini and on the :apple: site they list it as having improved graphics 2x and a whole lot of other stuff. When did they upgrade the new Mac Minis?
I use to have and in fact it's still running (AFAIK) the 2007-8 Mac Minis before they went to the unibody design. Anyhoo, I'm looking to get a new one to run as a file server and need something small yet powerful enough to multitask (remote admin stuff) as well as push out media files the least of which being 1080p content.
Looking at the base configuration which is $599 as I am on a strict budget.
Question is, are the components serviceable? I heard everything from the memory to the GPU has been soldered onto the logic board now.
Appreciate any comments.
11. macrumors newbie
I've already done the memory upgrade to 4GB (3GB usable) to my 1.83 GHz C2D mini. Now I'm thinking of adding a Crucial M4 SSD as well. I thought I'd go with the M4 as I've been told that you can update the firmware using a Mac.
12. paulrbeers, Apr 19, 2012
Last edited: Apr 19, 2012
macrumors 68040
There's this link at the top of the page called "buyers guide" that tells you when a product was last updated and whether to buy....
Might be helpful in determining whether there has been a refresh or not recently eh?
As for your question about whether the base mini is enough, you say the LEAST of which is 1080P, what kind of video files are you pushing? There aren't a lot of 2160P monitors/televisions, or did you mean the MAX is 1080P?
Edit: Or do you mean "Not the least of which" is 1080P which would be the correct phrase....
13. macrumors member
I have a 1.83 Intel Core 2 Duo mini that has a 320GB hard drive with a 2TB external HD, and maxed out 3GB RAM and running Lion... I have it hooked up to my 60 inch Sharp LED tv, and it plays 1080p video with very minimal lag. Every once in a blue moon if I am downloading something on that machine and watching a 1080p video it will lag just a VERY tiny bit. It is almost unnoticed.
To combat this problem I am thinking about pulling the OWC 120GB SSD drive I have in my mid-2010 macbook and using it in the mini. It was AMAZING how it improved the performance of my macbook, even though it really didn't need the upgrade.... It is maxed out with 8 gigs of RAM and a 500GB hard drive . Hope this helps ya out ;)
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4886
|
albook 12" upgrade question
Discussion in 'Macintosh Computers' started by unregbaron, Mar 4, 2003.
1. macrumors regular
is it possible to upgrade a 12" albook to a superdrive if you start off with the combi drive?
2. macrumors regular
On Apple's website, you can chose it as a BTO options, but I don't think once you get it that you will be able to upgrade it (or at least easily). The PowerBooks are so compact that they are not meant for upgrading anything except RAM. That is with most laptops, though. The HD is sometimes upgradable, but not slot-loading optical drives.
3. macrumors 6502a
I assume you mean an upgrade after you actually have bought a 12" with a combo drive. Since it is possible to get a 12" with a superdrive, a superdrive could be installed later; however, this would be difficult. Since the superdrive in the powerbooks is specially designed to fit in a notebook, it is not something you can just go and buy anywhere. You would first have to find an apple authorized reseller who could order you the powerbook superdrive from apple, and then you would have to have it installed or install it yourself. So while it is possible, it is not very practical and if you foresee yourself needed a superdrive go ahead and buy a powerbook with a superdrive. If you have already bought one, see if you can return it or buy an external drive.
4. macrumors regular
I must say, although they were bulkier, I preferred the PowerBook G3's design where you could have two removable drives, a drive and a battery, or two batteries. Although not as asthetically pleasing, it at least gave you expandability. I think that you could even put a HD in those slots.
Maybe they could have at least incorperated it into a low-end PB or high-end iBook. Their choice, though.
5. macrumors 6502a
I too prefer some aspects of the powerbook g3's. I still have my wallstreet powerbook which i use on a daily basis with os x installed. It is heavy but when i compare it to my olf 5300 and some others that people I know have had it does not feel quite so heavy. They have two hot swappable bays in which you can put batteries, a dvd drive, a cd drive, a zip drive, an extra removable hard drive, and several other things. The lack of hot swappable bays is one of the few major things that I do not like about the new powerbooks, but with decreased size and weight some things must be sacrificed.
6. macrumors regular
thanks for all those replies - asked on behalf of a friend whose office just took delivery of a few 12"ers.
- - she mentioned how impressive the speakers are...
7. macrumors newbie
Even slot loading drives are upgradable, with time. MCE technologies in California offers slot loading drive upgrades. It is still too soon for your unit. Honestly your better getting an external unit for dvd burning it will be faster and more effecient. Optical drives will be a thing of the past in the future. good luck.
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4887
|
Anyone with a Decal / Sticker on their MPB?
Discussion in 'Picture Gallery' started by TJunkers, Jan 13, 2009.
1. macrumors 6502a
Can anyone here post a picture of a sticker, etch or decal on their Unibody MBP?
2. macrumors 601
I have one on my Aluminum MacBook
Attached Files:
3. macrumors 68000
I do like. What kind of sticker is that?
I have a big sticker on mine...its called an invisible shield.
Attached Files:
4. macrumors 68030
looks nice! How much time did you spend on it to get it looking right? I bought invisibleShield for the iPhone and messed it up.
5. macrumors newbie
where did you buy it? is it removable?
6. macrumors 604
invisibleshield.com, yes
7. macrumors 65816
Just one:
Attached Files:
8. macrumors 601
Its a tribal decal. I got it because it looks like a snake (somewhat) and I'm born in the year of the snake.
Here's the link. Its a vinyl sticker, its not removable.
9. macrumors 68000
All in all with the top, bottom, sides, and palm rest pieces...maybe 45 minutes. Then another 24 hours for it to dry. I had one on my last iPhone and I agree, it was a royal pain in the ass to install.
10. macrumors 68030
I ordered one more of these so I'd be ready when I got my new 'pooter:
(that's on my old powerbook)
11. macrumors 6502a
I have this on my MBP. The fit is not exact though. I had a green on on my old MBP that was perfect. I'm not sure if this blue one wasn't cut right or the logo changed slightly with the new unibody MBP's.
Anyway, thinking about getting something else but haven't found a die cut I like yet.
Attached Files:
12. macrumors 68020
I just took off the back cover and changed the color of the apple that way. I had to send in my MBP for a logic board replacement and nothing was said..although i took out the colored paper (forgot what the paper is called) out and put the stock white back...
13. macrumors G3
i'm tempted to get one for my BB storm but am nervous i'd mess up my phone
14. macrumors 6502a
Gaa! Why would you desecrate a Mac so???
15. macrumors 68040
Yes, I liked the stickers on my old PC laptop from work so much that I peeled them off and stuck them on my new MBP.
No I didn't. That's crazy talk. I googled for pictures of the stickers and used that.
Attached Files:
16. macrumors 6502a
You're a braver soul than me. I bought those films you can put inside the lid but chickened out on my old MBP. I don't even think it's possible on the new MBP.
on the old one, I started to pry the lid off, it seemed really difficult and I decided it wasn't worth scratching or breaking it. That's when I went with the one I have now.
17. macrumors 6502a
Id never put anything on my MBP, i didnt spend $2k just to vandalize it. I change the stuff on the inside if i want to customize it.
18. macrumors 65816
haha you'll freak if you saw the guy that drew on his entire macbook air's top cover with a sharpie. He was giving it a "tattoo" he said. :p
19. macrumors regular
Clearly you don't know the meaning of the word vandalize. For the record it means to destroy maliciously.
These people are decorating their MacBook / MacBook Pro's. The decoration may not suit you - it dosen't suit me - but it certainly isn't vandalism, rather free expression.
20. macrumors 68000
Meh I'd go ahead and get one for it. Just take your time on the install.
It's not so much vandalization as it is personalization to set a MacBook Pro off from one like yours, per se.
21. macrumors 601
Yep. I know many people who have the same macbook as me. It gets confusing when we all put it in a row.
22. macrumors 6502a
I don't think it's vandalizing at all. I think subtle designs are pretty cool on macs. Personally, I'd never put anything on it I knew I couldn't easily remove at some point in time.
I also get a kick out of the macs out there that have some type of graphic on the Apple logo on the lid. I think it makes the mac stand out from the others just a little.
The guy who did the Sharpie...insane!!
23. macrumors 68020
haha, i was more sketched installing the RAM than the transparency paper, which i think that is what the paper is called you use to change the colour. It is actually quite easy to do. I have a yellow, and orange and a green waiting to be used...just cant decide :)
I see people at my art school that have soo many stickers, their Macs' look like a surfboard:)
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4888
|
AT&T and Apple Tightening Policies to Reduce iPhone Unlocking - the answers!!!
Discussion in 'Macworld San Francisco 2008' started by russ973, Jun 10, 2008.
1. macrumors newbie
That thread was too long so I'm starting a new one. With the REAL answers.
1. "The phone is not subsidized" - Yes it is. Just because it's not a rebate doesn't mean it's not.
2. "Why can't I buy it without activating it?" - Because then you'd have an 8gig iPod Touch for $199. Apple sells those for $299. Since AT&T is subsidizing each iPhone, THEY would lose money on it and make ZERO from you.
3. "You can't buy it online." - True, for now. I'm sure they'll set it up where you can later. Just like other cell phones you buy online that come to you activated (or semi-activate).
4. "I want to use it on another carrier." - Why? 3g and visual voicemail won't work.
5. "How is AT&T going to get their money back" - rumors are that rates for unlimited data will go up $10/mo. So that's another $240 for 2 years. Very few people won't but this if they buy an iPhone.
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4889
|
Best DVD Conversion program/setting
Discussion in 'Apple TV and Home Theater' started by mynewromantica, Aug 3, 2009.
1. macrumors regular
I am working on putting together a new home theater, and I want to put all my DVD's on my network storage so my Apple TV can get to them. But I want it to be the absolute best picture and sound I can squeeze out of it. So I was wondering what program and what settings I should use for the best I can get.
I will also be getting a Blu-Ray drive for my computer so if anyone can recommend a good Blu-Ray ripper that would be great too.
2. macrumors 68020
Handbrake for DVDs on AppleTV setting.
There is a VERY long thread bout Bluray to ATV, please search before posting.
3. macrumors newbie
I use Apple TV Convert on Windoze. It's a tool I made myself by taking the latest SVN version of HandBrake and "improve" (this is subjective, 'tweak' for my usage and add some functionality like a built-in tagger) upon a winning concept.
I'm not sure if the HandBrake team would allow me to publish this though, I have to admit that I still have to read the GPL license, please don't sue me in the meantime :cool:
But if I hadn't made this I would be using plain vanilla HandBrake for sure, you really can't go wrong with it!
4. macrumors 604
Cave Man
Are spammers hitting us in pairs now? :rolleyes:
5. macrumors 68020
6. macrumors newbie
Thanks, so I am, should I want to ;-)
@Cave Man: spamming or answering a question? What's your problem man... I'm just proud of the work I did on adding stuff to an already great program. If you don't like that, it's fine with me, but what's your problem with people promoting HandBrake? I'd be glad to hear from you which tool you prefer above it and why...
7. macrumors 604
Cave Man
You're right, and I apologize. I should have more carefully read your post. It's a common tactic for one "newbie" to post such a question as the OP did, only to have another "newbie" post an answer to a Windows-based app that costs $100 and does exactly everything that HB does.
8. macrumors 68020
... and what pray tell did you do with the advanced options tab ?
9. macrumors newbie
It's shown when you want, and hidden when you don't ;-) Just like the Query Editor in the original HB releases.
But the three biggest differences are the built-in tagger, the option to get a mail notification after each queue-item is done and a feature I dubbed "Auto-Throttling". It was actually requested by someone on the HB forums and I -unlike the HB devs- liked this idea a lot. What it does is run in "Idle" prio when the user is active at his machine (this way I can encode slowly while playing BF2 for instance) and jumps to "Above Normal" when the user is not behind his machine.
But ok, enough about this tool, I didn't come here to promote it or anything, just wanted to explain a bit more what I did to "improve" (in my humble opinion) the original app. As an important note: it uses the latest SVN handbrakeCLI.exe so the actual encodes are the same as with HandBrake, just the tool is much more convenient for my particular purpose (converting for Apple TV, obviously).
BTW 121443 lines of code is impressive man, thanks for your hard work on HB :)
Now I will shut up about this unless specifically asked :)
@Cave Man: No problem, maybe my reply came across a bit harsh btw, I can assure you it wasn't meant as such. Oh and apologies accepted, of course :)
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4890
|
Carmack: Working With Apple Is a Rollercoaster Ride
Discussion in 'MacBytes.com News Discussion' started by MacBytes, Nov 9, 2009.
1. macrumors bot
2. macrumors 6502a
So what? Go back to playing with your moon rockets, nerd.
3. macrumors G3
i love the classic doom's and quakes.... and where is my is my os x version for them? carmack needs to get a grip with business.
4. macrumors 601
Who's the biggest gaming blowhard Carmack or Gabe Newell? I think it's a toss up.
5. macrumors 68000
In 5 seconds, I located a link where you can download a port of Quake for OS X:
And here's a port of the Doom engine for OS X:
It's really not Carmack who needs to "get a grip with business". IMHO, it's Apple who needs to get a grip with the fact that gaming is JUST as legitimate a purpose for owning and using a computer as anything else someone might do with one!
I think Carmack is absolutely right, in his interview, where he suggests people "at the top" at Apple really don't think much of gaming, and probably aren't real happy that it became necessary to push iPhones and iPod touches as gaming platforms to keep their sales moving along briskly.
Gaming has always been the biggest driver of improved performance in portable devices and home computers. If "computer gaming" never really caught on, do you think 3D graphics technology would be anywhere as capable or inexpensive as it is today? No way! You'd have cards with about half the performance of the typical ATI or nVidia offering, selling for $3,500 +, only to people doing 3D CAD design or doing 3D animation work for TV or movies!
For as forward-thinking as company as Apples usually is, I think they're really missing the boat on the "big picture" for the future of gaming. They're supposedly all involved with movie production, but they don't seem to realize that movies and computer games are quickly intersecting. Top selling games are outperforming the sales in theaters for blockbuster movie releases, and with games like Uncharted 2, they have story-lines and character development that exceed some movies! I can easily see where we'll reach a crossroads, where someone considers buying/playing a new game to be equivalent to seeing a new movie. Only difference will be deciding if you'd rather be entertained passively (movie), or interact with the story (game).
6. macrumors 6502a
Very well said.
7. macrumors 68020
Calling Carmack a "blowhard" is a profoundly ignorant thing to say. He just states plain facts in a level-headed way, unlike Gabe "give me a million dollars" Newell.
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4891
|
Casting problem from a pointer
Discussion in 'Mac Programming' started by CocoaBean, Mar 29, 2009.
1. macrumors newbie
I seem to struggle quite a lot when it comes to casting and I was creating a lottery application which generates 6 random numbers then displays the results in a textfield (label).
I get the following warning, 'assignment makes pointer from integer without a cast'.
I'm a bit stumped as what to do and how and where to make the appropriate cast.
The code is below:
#import <Cocoa/Cocoa.h>
@interface AppController : NSObject {
IBOutlet NSButton *btnGetNumbers;
IBOutlet NSButton *btnClear;
IBOutlet NSTextField *txtNumbers;
#import "AppController.h"
@implementation AppController
NSNumber *number1 = [[NSNumber alloc] init];
NSNumber *number2 = [[NSNumber alloc] init];
NSNumber *number3 = [[NSNumber alloc] init];
NSNumber *number4 = [[NSNumber alloc] init];
NSNumber *number5 = [[NSNumber alloc] init];
NSNumber *number6 = [[NSNumber alloc] init];
number1 = random() % 49 + 1; //error below each line
number2 = random() % 49 + 1; //
number3 = random() % 49 + 1; //
number4 = random() % 49 + 1; //
number5 = random() % 49 + 1; //
number6 = random() % 49 + 1; //
NSString *string = [NSString stringWithFormat:@"Your numbers are: %i, %i, %i, %i, %i, %i", number1, number2, number3, number4, number5, number6];
[txtNumbers setStringValue:string];
[number1 release];
[number2 release];
[number3 release];
[number4 release];
[number5 release];
[number6 release];
[super dealloc];
[txtNumbers setStringValue:@""];
Also, is this code the correct way to go about this task?
2. macrumors 68040
From the random manpage:
So random returns a primitive, namely, a long int. % acts on primitives, + acts on primitives. a long is not an NSNumber (or NSNumber *, more specifically). NSNumber does have a method -initWithLong: as well as +numberWithLong:. These will initialize an alloc'd NSNumber or return an NSNumber * with the long value, respectively. You should be able to wrap your equation in these and get what you want.
3. macrumors newbie
Thnaks Lee, I'll give it a go :)
4. macrumors G5
Can you explain why on earth you feel the necessity to create six objects of type NSNumber?
5. macrumors newbie
No, I can't explain as I'm still learning and I'm not sure myself.
Can you please tell me why that code is wrong and say what I should have done instead?
Thanks :)
edit: The program is supposed to display 6 random numbers in the range 1 to 49. Is there a simpler way of writing the code? Also, I'm not sure about the equation: random() % 49 + 1; (there was similar code in a cocoa book to get numbers in the range 1 to 100, so I modified it to get 1 to 49, although not quite understanding it).
6. macrumors regular
Use an array of six long ints and a for loop to generate the numbers.
Or, if you wanted to be more Cocoa-like, you could use an NSArray with six NSNumber objects, but this involves more overhead.
random() returns a random number between 0 and 2,147,483,647. % is the modulus (remainder after division) operator, it reduces the output of random() to a value between 0 and 48. Then it's just a simple matter of adding 1, and you have a random number between 1 and 49.
7. macrumors newbie
Thanks, I'll see if I can do that - thanks for the explanation too :)
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4892
|
Convince me. ..
Discussion in 'Apple TV and Home Theater' started by Jefferyd32, Jul 28, 2012.
1. macrumors regular
To keep my DVDs. I just packed them all in boxes in preparation to move. About 300 in all. 98% are ripped and stored for use on ATV. I am trying to figure out if I will actually ever take them out again. I have a select few Blu-rays, but most are duplicates. Even my wife says, why keep the discs, we can use the ATV.
2. macrumors demi-god
If you only keep them on a drive, I'd keep a backup of that drive. I keep my DVDs after ripping, to loan to friends and family, and as an additional backup.
Also, you may have better success in attracting responses to your thread, and you'll make your thread easier to find for those browsing the forum for the same answers, if you change your thread title to something more descriptive. To do so, click the "Edit" button on your original post, then click "Go Advanced" and you will see where to edit the thread title.
3. macrumors G5
I keep only brand new 3D and Blu-Ray originals, and classic box sets..The rest I gave to a buddy. I am now debating getting rid of my CD's too..they are all in my itunes library, and I buy almost all my music from there now too. My CD collection runs to 5 racks 15 shelves per rack, and I just never play them now. MY vinyl is a different story though...Hanging on to that.
I also have 2 large boxes full of Windows games...Classics, boxed sets etc, that I've been trying to sell...It all just takes up space!
4. macrumors 601
How about this?
H.264 will not be THE codec forever. There will come a time when you may want to re-rip them all to whatever replaces H.264. It's called H.265 or HEVC and boasts keeping about the same quality in file sizes about half as large as H.264. The target date for ratification is early 2013. Here's more detail: http://en.wikipedia.org/wiki/High_Efficiency_Video_Coding
If you are a quality maximization type of guy, you don't want to waste a generation of quality by doing such a re-rip from those H.264 files. Instead, you'll want to go back to the master copy.
5. macrumors regular
Half the file size same quality will probably do it. I have them on a 3TB drive with a backup as well, but even it is getting full. Re-ripping certainly would be a pain and time I don't really want to spend again, but it might be worth it.
6. macrumors G5
It is...Rip in top quality...HDD's are cheap, and you can always add storage. I have mine stored on my Pegasus R4 and might consider buying an R8 later this year as my movie collection expands.
Attached Files:
7. macrumors demi-god
count me in on the pessimistic side of life. even if you bought now all DVD/CD you never know what happen to copyright law in the future. ok to rip them on a disk (or NAS in my case) for easy access but I would keep them as evidence that you "own" the copies (not getting into the discussion that we don't own it anyway).
Externally stored to reduce space at home is fine; but keeping.
Old stuff I know fore sure I don't want anymore: sell it, throw it away.
8. macrumors regular
I just realized for most of my music I have a copy on my hard drive, on my Time Machine backup, and online within iCloud, Google and Amazon. :eek:
I think at a certain point I'm going to let my physical media go and reclaim all the physical space those boxes take up.
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4894
|
Does anyone know what time the iOS 7 beta will be released today?
Discussion in 'iOS 7' started by Am3r1ca16, Jun 10, 2013.
1. macrumors 6502a
I'm speechless by the way iOS 7 looks. Does anyone know when the iOS 7 betas will be available today?
2. macrumors 6502a
within 15 minutes. keep refreshing.
3. macrumors member
It wasn't mentioned in the presentation. I would just keep an eye on the homepage here and I'm sure Twitter will blow up when it's released.
4. macrumors 65816
Soon, hopefully. They generally don't take long. The developer site currently isn't loading.
5. macrumors 6502a
same hear
6. macrumors 6502
7. macrumors 6502a
At 16:28:44 CST...lol really u need the exact time?
8. macrumors regular
9. macrumors 6502
Still down for right now...
10. macrumors 6502a
Is that the new OSX Mavericks you're using!?
11. macrumors regular
The updated safari you have looks amazing
12. macrumors 6502
Funny... Used a server in our datacenter to load the page. Can't get it to load on any other connection.
13. macrumors member
It's reported up!
14. macrumors 6502
Downloading now
15. macrumors regular
Yeah.. downloading.. go to member center and you will able to bypass that down screen.
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4895
|
Drive Ownership Settings Not Being Remembered in 10.82
Discussion in 'OS X Mountain Lion (10.8)' started by MRomine, Mar 12, 2013.
1. macrumors newbie
In Photoshop 6 I want to change my drive Ownership settings for scratch disk purposes and even though I set the lock setting in the 'Get Info' window after checking the 'Ignore Ownership' box it resets itself upon every boot. Is this a bug in the OS or should I be doing something else to lock this setting?
Attached Files:
2. macrumors newbie
It appears that the new 10.83 update that was released last night has fixed the problem.
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4897
|
Help? Rentals have no audio...
Discussion in 'Apple TV and Home Theater' started by agentphish, Oct 3, 2010.
1. macrumors 65816
Anyone got any clues for me here. I'm connected via HDMI of course, and have been streaming tons of content from netflix and my shared library in my home with no trouble whatsoever.
I go to test a rental by choosing one of the free rental TV Show pilot episodes, an there is no sound whatsoever. I try another one, same thing. Video loads right up no problem, smooth as silk, but no sound.
Anyone have any ideas?
2. macrumors 6502a
Do you have something going on with 5.1 audio causing problems? Much of the HD content on the iTunes store has a secondary 5.1 audio track, which will be used by default depending on your ATV settings. If you are not connected directly to an HDTV via HDMI, but are plugged into a reciever that doesn't support 5.1, you might not get any sound.
Just a guess.
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4898
|
iPod Touch Firmware 1.1.2 Released: Add Calendar Events
Discussion in 'MacRumors.com News Discussion' started by MacRumors, Nov 8, 2007.
1. macrumors bot
Early reports indicate that the new iPod Touch update provides "Add Event" functionality to the iPod Touch, confirming an email exchange from Steve Jobs who promised that edit and add calendar events would be coming in a future software update. The lack of calendar editing had been described as a "bug" by Jobs.
While the iPod Touch 1.1.2 and iPhone 1.1.2 updates are likely very similar, there may be device specific issues. Please keep comments on topic in their respective threads.
Article Link
2. macrumors 6502a
Yay, sounds like a great addition for those with the iPod Touch. I'm not sure why it wasn't included in the first place, but oh well, all's well that ends well.
3. macrumors member
Now how about a To Do application for the iPhone, Apple! It's been more than 4 months since launch, and I still can't sync my To Dos.
My crap, $50 Sony Ericsson phone can do it, why not the iPhone?
4. macrumors 603
Awesome. Very happy now!
Now where is my email and googlemaps ;)
5. macrumors 6502a
hmmm...there is no reason for me to update my jailbroken touch bc I have the add/edit feature already and much more!
6. macrumors 6502a
No news to most, jailbreakers have had the calender add button for weeks
7. sanmarcos, Nov 8, 2007
Last edited: Sep 21, 2014
macrumors newbie
8. macrumors 6502a
Is someone leaking these links? Where are they coming from?
9. macrumors newbie
That's great!
Any news about 802.1x support?
10. macrumors demi-god
No support for iPhone, I assume the same is for the touch.
11. macrumors 6502a
DAMNITT!! That would be worth getting rid of the jailbreak!
12. macrumors 68040
Is it coming today?
Do you think Apple is releasing firmware?
Attached Files:
13. macrumors 6502a
I'm looking at getting a touch, but whats with taking out maps and mail? you can look at mail right from the browser i'm sure, but can you look at google maps from the browser?
14. macrumors newbie
first of many updates
15. macrumors member
Link for iPhone firmware?
For some reason my Leopard MBP can't find the iPhone update. Anyone have a link?
Thanks in advance
Whadda you know, it's under the iPhone announcement :)
16. macrumors 6502
biggest question mark would be whether this update would make iJailbreak nonfunctional.
for whatever reason iJailbreak 0.30 version skipped on adding calendar events.
17. macrumors member
Um, yes?
Besides, with Jailbreak on a touch the process is completely reversible plus you can add the maps and mail apps natively with ease.
18. macrumors regular
19. macrumors 6502a
i just thought that google maps was flash based 4 a sec, and if i'm right flash doesn't work on the touch? I was just wondering what the big deal was:p i probably wouldn't go through the trouble of jailbreaking just to get mail and maps.:rolleyes:
20. macrumors regular
It is totally worth it if only for mail.
21. macrumors member
22. macrumors regular
Well, short of a forced conversion, No way are most jailbroken iPods going back into the slammer.
1. we already HAVE ability to add calendar
2. still no email for touch says steve jobs - I've become too attached to let mail go!
3. um, 3rd party apps? aparently streaming radio (which I have yet to try) and ability to download podcasts without iTunes?
Quite frankly, the update doesn't interest me. Apple should have repaired the TIFF exploit because it's a vulnerability in the device. Obviously they have not done so, otherwise it would be impossible to jailbreak the old way, so why bother getting the upgrade? If my iPod is going to have the flaw one way or another, I might as well have all the sweet third party apps plus the iPhone apps.
Hope my iPod doesn't auto-update although it really shouldn't
23. macrumors 68040
How do I use the file to update my touch?
24. macrumors member
hey by the way there already is a way to fix the TIFF exploit from the installer.app
25. macrumors newbie
If you're running Windows, just "shift + click" on the update button in iTunes and open the update file from there.
If I remember correctly, on a MAC it is "option + click".
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4899
|
iWeb '08 to '09 upgrade
Discussion in 'Web Design and Development' started by emanymton1221, Jun 5, 2009.
1. macrumors newbie
So I purchased the new Macbook in December, and now I am learning that if I had purchased it a mere month later, I would be eligible for an upgrade of only $10 to iLife '09, which includes iWeb '09. All I really want is iWeb '09. Any help/suggestions so I don't have to spend $80 on the newer iLife '09?
Thanks :)
2. macrumors 601
You could look for a used copy of iLife 09, that's about the only option you have (besides buying it brand new). Sorry.
3. macrumors 68020
Sorry, iLife's apps are all integrated -- you can't have one working without the other. You'll probably find iLife '09 a little cheaper at other retailers besides Apple. And if you're a student, you can get it cheaper anyway... as low as $39.
4. alp
macrumors newbie
Where can you get it that cheap as a student? I have only seen it for $71.
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4900
|
MacBook Pro froze for the 2nd time!!!
Discussion in 'OS X Mountain Lion (10.8)' started by macuser1232, Sep 18, 2012.
1. macrumors 6502a
Hey guys my Early 2011 MacBook Pro i5 with 8gb of ram froze for the second time. I have no idea what is causing it but I do know is that these two freezes have only happened since I installed Mountain Lion. I was able to take a snapshot of my console when the froze began and the picture just continues in the console for a while. I've heard of other people having this problem(on apple communities) but no answers. Please Help!
Attached Files:
2. macrumors 6502
Did you upgrade the RAM yourself?
3. macrumors 603
4. macrumors 6502a
Yes I did.
5. macrumors 6502a
I ran memtest and didn't get any errors.
6. macrumors P6
Run the Apple Hardware Test
7. macrumors 6502a
I tried holding down "d" for the hardware test and it didn't not work. Then I tried holding option and "d" and I got a window called Internet Recovery. I tried entering in my network's name and password and it didn't work. I tried three times until it froze and I had to shut down my Mac.
8. macrumors 6502a
It turns out I can't do the hardware test because it may be a disk that I threw away. But, even if I didn't get any disks with my computer, holding they D key doesn't do anything and when I hold down Option + D I get the Internet Recovery window and it doesn't except my network name and password. So does anyone no about this freeze im getting and how to fix it?
9. macrumors 6502a
Mountain Lion 10.8.2 update! Hopefully this fixes the freezing issue!
10. macrumors 6502
i have been experiencing the same freeze issue as you since 10.8.0.
i upgraded the ram and hdd myself.
i know its the same freeze issue because me and many others have posted the same logs as you detailing the exact same information.
i have rarely experienced it since 10.8.1 though.
i doubt 10.8.2 fixes it, but i hope atleast it makes it occur even more rarely.
11. macrumors 6502a
Yes I got it after I installed Mountain Lion. I've only had it happen twice though and the second time was a while after the first. So what model Mac do you have?
12. macrumors 6502
late 2011 MBP 15inch base model.
13. macrumors 6502a
I have the early 2011 13 inch base model.
14. macrumors member
Same here guys. Using MBP 13" (Late 2011) bought in June 2012 with Lion 10.7.3. Upgraded to 10.7.4 and everything was smooth & perfect.
Since the time I have upgraded to ML 10.8 > 10.8.1 > 10.8.2; have experienced freeze thrice with nothing moving except the mouse.
15. r0k
macrumors 68040
Cross my fingers and knock on wood, I've only had one freeze, documented in the 10.8.2 experiences thread.
So you don't have to dig through such a long thread for all the details, I'll mention here that I'm running 10.8.2 on a late 2011 15.4 in hires antiglare MBP with 16 GB of Centon RAM.
16. macrumors member
All The Best!
Ok, what's your best way out of a freeze? Power Button?
17. macrumors 6502
been having freezes since mountain lion upgrade tested ram all checks ok , its a early 2009 macbook
18. macrumors 601
Mr. Retrofire
Update the Adobe Flash Player plugin to the latest version (or disable the plugin in your web browser) and disable the automatic graphics card switching (via System Preferences or via gfxCardStatus). Older versions of the Flash Player (and probably older versions of Google Chrome and other apps) are incompatible with the automatic graphics card switching.
19. macrumors 6502a
Yeah, I think it may be the graphics card.
Would I need this for my Intel HD Graphics 3000 512 MB graphics?
20. r0k
macrumors 68040
I don't get them very often. To me a freeze occurs when I'm ready for my Mac to do something and it is not. If I can pick restart I do. If I get tired of waiting, I hold the power button. It was a lot faster with the hybrid SSD in my Macbook. I could come back from a reboot in under 20 seconds. Even at 7200 RPM, my MBP can take over 30 seconds to reboot. One of these days, I'll either put in an SSD or I'll put in a hybrid SSD so I get my fast boot times back.
21. macrumors 601
Mr. Retrofire
Only if you have two GPUs in your Mac (integrated (Intel HD X000) and discrete (AMD/NVIDIA)).
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4901
|
Movie picture in menu
Discussion in 'iPod' started by marcre, Apr 20, 2009.
1. macrumors regular
I have a quick question I'm hoping I can get some help with.
I just started putting some of my movies into iTunes and then I go to Amazon to get the movie photo for artwork. The problem is that it looks bad because it has the white border around it. I've attached a picture of this to show what I mean. Is there anyway to fix this?
Attached Files:
2. macrumors 68030
Open the image in an image editor, select the area you want visible, and crop it.
Copy, paste into the artwork pane, and voila!
3. macrumors member
4. macrumors regular
wow, I'm an idiot. Thanks for the reply. I could have sworn the picture I got was border-less and I checked again, it wasn't. Well, that takes care of that.
Lol, thanks again.
5. macrumors 6502a
Try getting cover art from a different source than Amazon. I just google image search. That way you get a choice of art.
6. macrumors regular
thanks, that seems like a better idea. Amazon works well for music for me, but I'm not completely happy with the movies and how it looks n iTunes.
7. macrumors 6502a
8. macrumors regular
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4902
|
Parallels confirms Leopard support
Discussion in 'MacBytes.com News Discussion' started by MacBytes, Oct 29, 2007.
1. macrumors bot
2. Moderator
Staff Member
I haven't had any problems with Parallels 3 with Leopard, it works exactly the same as it did with Tiger :)
3. macrumors 65816
I had to re-install it, but that's it.
4. macrumors newbie
I get the error about the mount timeout but then once I stop the WinXP VM, I can't start any apps in Leopard. Say I try to open Terminal or Quicktime; the icons just bounce from the dock but never open and I can't even force quit them. I end up having to hard boot every time I run parallels. I'm running 3.0 with build 5160. I also did a regular upgrade to Leopard. I will try a reinstall or wait for the next build, but in the meantime wondered if anyone else had a similar experience.
Attached Files:
5. macrumors 6502
for me the 5160 installer hangs which works fine on tiger
6. macrumors member
Have to say, it works great for me. Even putting different windows in different spaces under coherence.
I'm presently using parallels in fullscreen mode in one of the spaces.
I find that fullscreen runs near native, and allot faster than coherence, and with spaces the windows screen is accessable at the flick of a switch
7. macrumors 603
I've been using VMWare with Leopard for awhile now with no problems. They just released a new beta that's even better. We use Parallels at work, and I can't stand it. To each his own I guess though.
8. macrumors newbie
I installed the 5540 beta and upgraded MacFUSE and all is working fine now.
9. macrumors newbie
I had to re-install it, but that's it.
10. macrumors member
King Crimson
11. macrumors newbie
I have had exactly the same problems. I only had 512mb applied (2gb available), and have scaled that down to 256mb, also reduced video ram and scaled down everything generally. I think it's helped - but clearly there are issues which need to be resolved!
12. macrumors G3
Works perfectly fine for me.
No problems at all - even video chat on MSN Messenger works fine.
13. macrumors Penryn
I'm running great in Build 5540.
14. macrumors 68000
Yep. i get the same thing. There's a support page on Parallels webpage that says to turn off the disk sharing .
15. macrumors 68000
I put in a request for beta builds but never heard anything. How'd you get in?
16. macrumors Penryn
Google :rolleyes:
17. macrumors 68000
Interesting, that wasn't there last time I went to check beta builds. As I said I applied for the beta program but never heard back.
18. macrumors Penryn
Beta build news always hits the news sites. The page to download it isn't hidden anywhere for the public beta.
19. macrumors 68000
20. macrumors Penryn
21. macrumors demi-god
I ran Parallels 3 fine with Tiger and now that I switched to Leopard, and i just tried to start parallels 3 it said I needed to reboot or restart my computer and it locked up everything. I did that, and parallels did not load. So I did it again and again it locked my my computer and asked me to hard reset. It is a a looping of some soft. What caused this?
Do I need to reinstall my parallels 3 too?
22. macrumors Penryn
You might strongly consider reinstalling Parallels.
23. macrumors G3
Go to 'Documents' and find the folder 'Parallels'. Copy whatever is inside that to somewhere.
Now reinstall Parallels. Place that folder back into my Documents as before, and all your Windows settings, data etc will be back.
24. macrumors demi-god
I took your advice and removed Parallels, then reinstalled and it now works ok. Thanks for the advice.
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4903
|
Powerbook Kanga Wanted
Discussion in 'Marketplace Archive 1 (Posts count)' started by patli, Nov 17, 2004.
1. macrumors newbie
Desperately want to buy an Powerbook Kanga. (3500) G3
Based in UK.
Good cash plus an Imaculate 10GB iPod, Remote, Leather Case Earphones.
All boxed.
Email me at [email protected]
2. macrumors member
powerbook duo
I have a powerbook duo dock if you are interested.
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4904
|
Still haven't received replacement box
Discussion in 'iPod' started by AndrewR23, Nov 27, 2011.
1. macrumors 68020
Anyone know why? Apple has no idea why?
Its been 17 business days since I got accepted for the return.
2. macrumors regular
They ran out of boxes. Everyone wants to get them replaced.
3. macrumors 6502
Same here....the confirmation email states boxes should arrive in 2 days. Guess its time to call Apple? Usually recalls are seamless...
4. macrumors 65816
Called today... They did run out of boxes. Hahaha.
Apple - #1 company in the world. More cash than the US. Runs out of boxes :p
5. macrumors member
Thats crazy that they'd run out of boxes so quick, back on topic I haven't received my box either and I applied for a replacement on day one.
6. macrumors newbie
Same here, it's been 15 days since I've registered mines to be replaced. They are lagging on the boxes.
7. macrumors 6502a
Im in England, been about 2 weeks and a jiffy bag just came through the door with instructions to call ups but it has a royal mail stamp on it. :roll eyes:
8. macrumors newbie
Exactly 1 month from today I requested a box, 2 phone calls to Apple later...no box...
9. macrumors 6502a
I sent mine in over two weeks ago but they still fail to claim that they have actually received it.
10. macrumors member
Apple gave me the option to take the ipods to UPS and allow them to box it.
(I called them)
I did and mine were sent and charged to Apple's UPS account.
They cancelled the shipping boxes but they still arrived.
I have had one "Product replacement pending" since Nov. 19th.
Just FYI.
11. macrumors 68030
So funny that Apple is making such a big deal about how the Nano is shipped and why they prefer we use their shipping materials. Yet I would bet most of us had used our Nano's during activities like jogging or biking, so I think the Nano can handle being shipped without "special" packing procedures besides some bubble wrap and a shipping envelope.
12. macrumors 6502a
Update on mine : Just checked status that said they have received it and returned it yesterday (17/12/11).
13. macrumors member
I've been stuck at Service Requested (step 1) since Nov 16th.
14. macrumors 65816
My status has been saying "Empty box shipped" for a while but I've yet to receive anything. I realise there's a shortage and stuff but is anyone experiencing the same thing?
Finding it difficult getting through to Apple to talk to a human being so not going to waste anymore time or cost in 0844 charges.
15. macrumors regular
I initiated the replacement request on November 15th, and just received the replacement packaging a few days ago. It wasn't a box at all; it was a yellow padded envelope with a UPS shipping label and a ziploc-type bag inside.
16. macrumors member
I requested service on November 12, got a box maybe a week later and sent it in a week after that. They received my ipod on December 1. "Product Replacement Pending" ever since then....
17. macrumors newbie
How long does it take after Apple receives my Nano for the repair status to change to "Diagnosis Pending"?
18. macrumors 68030
So Apple is actually replacing these with refurbished 1st Gen Nano's? Isn't it more expensive for Apple to refurbish the 1st Gen Nano, instead of just giving us a current Nano?
An 8GB Nano costs less than the 1st Gen 4GB Nano did. Apple would save money and we would get more storage and better features.
19. macrumors newbie
Never mind. My status just went to step 3 "Product replacement pending" so all is well.
20. macrumors regular
Look on the homepage of this site. You'll clearly see that 6 gen Nano's are being delivered, and there are posts in this very forum about it.
21. Resist, Dec 20, 2011
Last edited: Dec 20, 2011
macrumors 68030
22. macrumors regular
I talked to a gentleman from Apple on the phone and he said they will either ship out silver or black. So far people are getting silver. He said they likely won't send any other color because black and silver are good for both sexes. He didn't explicitly say that it wouldn't be good for both sexes, but he was definitely implying it.
23. macrumors 6502
Give it some time, I'm sure it will come soon.
24. macrumors 68030
I didn't think the 6th Generation Nano came in black.
25. macrumors 68040
My box took 4 weeks to come. Once the received it back it took the 2 weeks to ship.
My should be here Mon/Tue
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4905
|
Table View with pattern-from-image background color "smears"
Discussion in 'Mac Programming' started by Starfox, Feb 14, 2012.
1. macrumors regular
I have a table view that I set the background color of to a pattern image. Whenever I grab the edge of the window and size it up smears are left in the direction of the resize, like dirty rects not being re-drawn properly. It doesn't happen when I turn off copy-on-scroll for the enclosing scroll view but I'd hate to lose performance to that since my table view is view-based and the views aren't very cheap. Any ideas as to how I can fix that?
2. macrumors 68000
The dirty, ugly way to handle this might be with a delegate to the window. The delegate can receive a message that live resize is starting: switch off copiesOnScroll; later, the delegate will receive the complementary message that resize is ending, at which point you can turn it back on. See if that works.
3. macrumors regular
That sounds extremely hackish - did no one consider that people might use patterns as a background? Do I really have to fight against Cocoa to get this working?
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4906
|
WTB: Working iPod 1G or 2G
Discussion in 'Marketplace Archive 1 (Posts count)' started by simX, Jul 13, 2004.
1. macrumors 6502a
My iPod 5 GB (1G) recently died on me, and so I'm looking to buy a 1st gen or 2nd gen iPod. I'd actually prefer a 1st gen iPod with the real scroll wheel (i.e.: not the touch wheel). Hard drive size is of no importance -- 5 GB, 10 GB, 20 GB. If you do have a 3rd gen iPod you want to sell, I'd also be willing to look into buying it. I won't need any of the accessories or the box -- just a working iPod, although they would be nice to have.
Reply to this e-mail, or send an e-mail to [email protected] .
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/4921
|
View Single Post
Old 01-31-2013, 11:01 AM #518
shauner111's Avatar
Join Date: Mar 2011
Posts: 12,208
Default Re: Anne Hathaway as Selina Kyle/Catwoman XXXIV
I prefer her with long hair but that picture above (now that her short hair is growing in a bit, so its not tooo short) is the definition of "short hair Selina".
If we can get a spin-off for Catwoman, i would actually rather that short hair look.
shauner111 is offline Reply With Quote
|
global_05_local_5_shard_00000035_processed.jsonl/4931
|
Click to expand
User avatar #1 - salts (03/26/2013) [-]
basically a 40-80k piece of paper that may or may not return its investment..
#3 to #1 - anonymous (03/27/2013) [-]
Some schools are trying to start a program that would allow you to return your degree for tuition reimbursement.
#6 to #3 - elgringogordo **User deleted account** has deleted their comment [-]
Friends (0)
|
global_05_local_5_shard_00000035_processed.jsonl/4935
|
A TV Show About the Vice President Is the Stupidest Idea Ever
ABC is developing a TV series about a fictional Vice President and his staff. Why? Isn't that like making a show about the team that loses the World Series or a biopic about Eric Roberts without Julia? [Image via Getty]
|
global_05_local_5_shard_00000035_processed.jsonl/4939
|
Original post by Neetzan Zimmerman on Gawker
Guillermo Del Toro's Simpsons Couch Gag Is Horrifyingly Brilliant
To introduce this year's Treehouse of Horror special, The Simpsons teamed up with a man who knows a thing or two about the genre: Dark fantasy master Guillermo del Toro.
"We talked about doing it around the movies I have done, but I felt I'd rather mix those images with the creatures and monsters of film, which have influenced me enormously," said del Toro, director of such screen gems as Pan's Labyrinth, Hellboy, and, most recently, Pacific Rim. "So, I said, 'Why don't we do a really long riff on the title sequence, rather than just a couch gag?'"
And that's exactly what they did: Nearly three full minutes of every horror/fantasy pop culture reference you can think of, including a particularly excellent nod to The Simpsons' recently departed sister show, Futurama.
"I ended up cramming in about 1/50th of what I wanted," said del Toro, who hinted that an even longer version could be out there.
Treehouse of Horror XXIV airs this Sunday on Fox, and is set to feature vignettes based on Dr. Seuss stories and a tribute to the pre-Code cult classic Freaks.
[video via Fox]
19 Reply
|
global_05_local_5_shard_00000035_processed.jsonl/4946
|
Motorola Q Launched, But You Can't Have It
The Motorola Q, named after the affable yet superintelligently dangerous villain on Star Trek: The Force Is With You, will appear on store shelves in 6-9 months reminding us that, like the common house shrew and the human female, electronics have a lengthy gestation period.
The Q, which is known in some circles as the Blackberry-killer, won't be killing any Blackberries until Q1 2006. In the intervening months it will train with the famous swordsmith Hattori Hanzo in preparation for its massive showdown with the Blackberry in a sprawling, 4-star hotel in California.
What else? Not much. It's a skinny QWERTY phone running Windows Mobile and it quit clearly has quite a few hooks in at old Exchange Server Place so it can send and receive email like a champ. Other than that, I'm holding my breath until the RAZR 2007 comes out. It will be so thin that it will be just a piece of aluminum foil folded over once.
The Thinnest, Lightest, Coolest QWERTY on the Planet [Daves iPaq]
Moto Q []
Press Release [Motorola]
Motorola Q Announced (pictures) [BargainPDA]
|
global_05_local_5_shard_00000035_processed.jsonl/4949
|
Scientists Nearing Creation of Sound Cloak, Breaking Laws of Physics
While some work toward an invisibility cloak, University of Illinois professor Nicholas Fang is taking steps to create a similar material, only for sound, that could, for example, make ships invisible to SONAR. To successfully do this, of course, requires we break the laws of physics. But, you know, whatever.
I'll let the experts explain:
Fang, a mechanical science professor at the University of Illinois at Urbana-Champaign, is using an array (pictured above) of specially shaped, water-filled cavities in a piece of aluminum, which supposedly work together to refract the sound by resonating in a particular way. It's all sort of unclear, and nobody has yet figured out how to get around that whole wavelength issue, but this could be the start of even crazier stealth technology, which is always fun to see—or not see. Get it? Because it's stealth. [Technology Review]
|
global_05_local_5_shard_00000035_processed.jsonl/4950
|
New Proton Size Breaks Laws of Physics
A new measurement of the proton particle shows that it is 0.00000000000003 millimetres smaller than previously thought. It may seem irrelevant, but physicists are freaking out. I hope this doesn't mean we are going to cease to exist anytime soon.
Since the size of the proton is used in quantum electrodynamics, it means that a lot of formulas may be fundamentally wrong. This may also affect other fields. For example, the way astronomers calculate the chemical elements of galaxies and gas clouds using spectroscopy.
And while this may not seem relevant to you and me, scientists are taking it a lot more seriously. Talking to Nature, University of Basel physicist Ingo Sick said that "it's a very serious discrepancy," pointing that "there is really something seriously wrong someplace." Jeff Flowers, a scientist with the National Physical Laboratory in the United Kingdom, said that this "is a significant shakeup and could mean a complete rethink of quantum electrodynamics, potentially opening the door to a new theory."
Previously, boffins believed a proton's radius was 0.8768 femtometers, 0.03 femtometers from the latest measurement. The new finding was made after a ten-year experiment by the Max-Planck Institute of Quantum Optics in Garching, Germany. Great. Not only the Germans rely on octopi to lose the World Cup, but they also may screw quantum mechanics for everyone.
On the positive side, now I know why my cardboard time machine doesn't work. [Nature and National Geographic]
|
global_05_local_5_shard_00000035_processed.jsonl/4951
|
The purpose of the student web pages is to help you get the most out of Diplomacy in a Globalizing World, to suggest ways to integrate the text with lectures, and to test and deepen your knowledge. Each chapter section in the student resources is arranged in the following order:
1. Glossary exercises
Every field has its own vocabulary to aid in analysis, discussion, and understanding. A strong understanding of terms is the foundation of learning. This section asks you to define the key concepts and terms for each chapter.
2. Take–home messages
The ability to summarize what you have read is crucial to understanding and learning. This section asks you to summarize the main arguments of each chapter. Arguments must be based on logic and facts. How well did the chapter's author(s) make the argument? This section also asks you to critique the chapter's arguments, including each argument's logic and factual basis. Can you think of cases or facts that contradict the chapter's theses? Is there a contending school of thought that offers a different interpretation of the information provided in the chapter? Finally, what you learn from this book should not be learned in isolation. This section asks that you consider the implications of each chapter's conclusions for contemporary diplomacy.
3. Answering the book's "big" questions
These exercises can build on take-home messages and are designed to help you answer the book's big questions: (1) How is diplomacy changing? (2) Why is it changing? and (3) With what implications for future theories and practices? They also supplement the introductions provided at the beginning of the book's four parts and help underscore the themes that connect the book's chapters. These exercises can guide some topics for term papers.
4. Quizzes
Having summarized, critiqued, and considered the implications of each chapter's arguments, this section provides specific questions to help clarify your understanding of the chapter, as well as test your knowledge and your ability to communicate what you have learned. Some of these questions are suitable for students who are mixing and matching chapters, while others are suitable for students who are in a course that is progressing sequentially through the book.
5. Web-links
Recommending a website is a dangerous endeavor, given the short life-expectancy of some sites. Our authors, however, have found certain sites that appear to have stood the test of time and survived by providing in-depth, useful information. This section provides questions to help you as you navigate the websites and suggests areas of importance related to the subjects of the textbook.
6. Case studies
Some chapters relate to narrative case studies, which can aid in the understanding of key concepts and theories of a given chapter. The case studies can also serve as a starting point for a term paper on a related topic and can demonstrate how researchers define research questions, select cases, analyze information, and apply models to test their validity.
7. Counterfactual reasoning exercises
Creative thinking is crucial to the advancement of science, in general, and the social sciences, in particular. One method of creative thinking is the use of counterfactuals, which are often presented as "what if…then" exercises in reasoning (but there are various ways to introduce a counterfactual and you should be alert to them). A counterfactual question asks not what has happened but what could, would, or might happen under differing conditions. For example: If sovereignty today was based on religious principles, as it was in 2000 B.C., then how would that condition impact contemporary diplomatic practice? Another example is: How might Middle East diplomacy have evolved had Saddam Hussein been killed in an air attack during the First Gulf War in 1991? This section provides an example of a counterfactual for each chapter and then asks you to devise another counterfactual from the chapter and discuss your answer. Be creative and think about the many various implications of the change you suggest as your counterfactual.
8. Guide to further readings
While the book provides extensive readings in the References section on the topics covered, creative thinking and problem solving require you to go beyond the prescribed texts in order to answer thorny questions about the world of diplomacy. Many of these questions — such as who exactly does diplomacy? who do diplomats represent? and what are the diplomat's ethical boundaries? — remain contested in today's globalizing conditions. Thus, the book's authors have provided a short list of important readings that go beyond their chapter's main arguments and evidence. These readings have been selected for their quality, standing in the field, and richness in terms of allowing you to read more to help begin to answer your own research questions for substantive papers and, eventually, theses and dissertations.
Website Terms and Conditions and Privacy Policy
Please send comments or suggestions about this Website to
|
global_05_local_5_shard_00000035_processed.jsonl/4956
|
Jump to content
» «
• This topic is locked This topic is locked
No replies to this topic
• PatrickW
GTA Juggernaut
• The Connection
• Joined: 07 Jan 2004
• Netherlands
• Best Script 2013 [DYOM]
Best Script 2012 [DYOM]
Posted 08 March 2009 - 11:15 AM Edited by PatrickW, 29 March 2009 - 08:11 PM.
Q: What are the limitation of the number of items in DYOM?
• 50 Objectives
• 100 Actors
• 100 Objects
• 20 Cars
• 20 Pickups
Q: My game crashes, what do I have to do?
Take a look at this topic.
Q: Do others that want to play my mission also need DYOM?
Yes. Everyone that wants to design or play DYOM missions, needs the modification.
Q: Where should I upload my missions to share them with other people?
Use the dedicated DYOM upload site. You can upload a single mission of multiple mission bundled in a ZIP or RAR file. You will be able to add a short description of your mission and can supply a screenshot that will be displayed alongside.
Q: How can I edit a mission after I uploaded it to the upload site?
After you upload a mission, you will be suplied a EDIT-link that you can use to edit your mission later. You will need to provide the correct password to be able to edit a mission.
If you forgot or lost the edit-link, you can construct it again, by taking the URL of the mission-page and substitute "show" with "edit".
Q: I get an error when I try to upload a missionfile or screenshot to the upload site?
Screenshots must be jpg, png or gif with a maximum filesize fo 400kB.
Missionfiles must be DYOMx.dat or a zip file with a maximum filesize of 400kB.
Q: How can an actor drive a car?
This is still an unsupported feature. It will probably be in version 5.
Q: I can't see more then 16 spheres?
This is a limit of SA, so there are only 16 spheres visible at the same time. But you can see it when you play the mission!
1 user(s) are reading this topic
0 members, 1 guests, 0 anonymous users
|
global_05_local_5_shard_00000035_processed.jsonl/4958
|
A compound data type for efficiency. An 'Account' stores
- an 'AccountName',
- all 'Posting's in the account, excluding subaccounts
- a 'MixedAmount' representing the account balance, including subaccounts.
module Ledger.Account
import Ledger.Utils
import Ledger.Types
import Ledger.Amount
instance Show Account where
show (Account a ts b) = printf "Account %s with %d txns and %s balance" a (length ts) (showMixedAmount b)
instance Eq Account where
(==) (Account n1 t1 b1) (Account n2 t2 b2) = n1 == n2 && t1 == t2 && b1 == b2
nullacct = Account "" [] nullmixedamt
|
global_05_local_5_shard_00000035_processed.jsonl/4964
|
View Single Post
01-09-2013, 11:09 PM
Registered User
Join Date: Jul 2006
Posts: 829
vCash: 500
Connolly had a monster of a game tonight against Rochester that only starts with the stat line (1G, 1A, 7 SOG). If tonight was a final audition, have to imagine he earned high marks.
nhljohnson is offline Reply With Quote
|
global_05_local_5_shard_00000035_processed.jsonl/4975
|
You are here
Braised Beef With Vegetables
Flavors.of.Asia's picture
Soy sauce 2 Tablespoon
Grated ginger root 2 Teaspoon
Five spice powder 1⁄2 Teaspoon (Homemade)
Garlic 1 Clove (5 gm), minced
Beef round steak 1 Pound, cut into 3/4 inch pieces
Cooking oil 2 Tablespoon
Instant beef bouillon granules 4 Teaspoon
Bias sliced carrots 1 Cup (16 tbs)
Canned bamboo shoots 8 Ounce, drained and halved lengthwise (1 Can)
Frozen pea pods 6 Ounce, thawed (1 Package)
Cornstarch 3 Tablespoon
In small bowl soak lily buds in enough hot water to cover for 30 minutes; drain.
Slice each lily bud into 1 -inch lengths; discard tough stem ends.
For marinade combine soy sauce, gingerroot, five spice powder, and garlic; add to beef.
Using your hands, mix the seasonings thoroughly into meat.
Marinate the meat for 15 minutes at room temperature.
In large skillet cook meat in hot oil till browned.
Drain excess fat.
Combine bouillon granules and 2 cups hot water; stir to dissolve granules.
Add the bouillon, lily buds, and carrots to beef.
Bring to boiling; reduce heat.
Simmer, covered, 35 to 40 minutes or till meat is tender.
Add bamboo shoots and pea pods.
Simmer 2 minutes more or till beef and vegetables are tender.
Slowly blend 3 tablespoons cold water into cornstarch; stir into hot mixture.
Cook and stir till thickened and bubbly.
Recipe Summary
Rate It
Your rating: None
Average: 4.4 (17 votes)
Braised Beef With Vegetables Recipe
|
global_05_local_5_shard_00000035_processed.jsonl/4981
|
Internet Shakespeare Editions
Facsimiles of this work
Author: William Shakespeare
Editor: Hardy M. Cook
Peer Reviewed
Venus and Adonis (Quarto 1, 1592-3)
It shall be sparing, and too full of ryot,
Teaching decrepit age to tread the measures,
The staring ruffian shall it keepe in quiet,
1150Pluck down the rich, in rich the poore with treasures,
It shall be raging mad, and sillie milde,
Make the yoong old, the old become a childe.
It shall suspect where is no cause of feare,
It shall not feare where it should most mistrust,
1155It shall be mercifull, and too seueare,
And most deceiuing, when it seemes most iust,
Peruerse it shall be, where it showes most toward,
Put feare to valour, courage to the coward.
It shall be cause of warre, and dire euents,
1160And set dissention twixt the sonne, and sire,
Subiect, and seruill to all discontents:
As drie combustious matter is to fire,
Sith in his prime, death doth my loue destroy,
They that loue best, their loues shall not enioy.
1165By this the boy that by her side laie kild,
VVas melted like a vapour from her sight,
And in his blood that on the ground laie spild,
A purple floure sproong vp, checkred with white,
Resembling well his pale cheekes, and the blood,
1170VVhich in round drops, vpō their whitenesse stood.
|
global_05_local_5_shard_00000035_processed.jsonl/4985
|
Log In
E-mail or User ID
Keep me signed in
Recover Password
Create an Account
I ran across this excellent slide show:
IT Management Slideshow: 10 Reasons Your Team Hates You is an excellent one that provides very concisely, all you need to know about managing your team!
The cite these ten reasons as the main ones, your team may hate you:
1. You don't prioritize
2. You treat them like employees
3. You don't fight for them
4. You don't model balance
5. You never relax
6. You micromanage
7. You're a suckup
8. You treat them like mushrooms - keep in the dark, feed manure
9. You don't get your hands dirty
10. You're indecisive
There are a few of my own pointers that could be additionally helpful:
a. You are not clear in your expectations
b. You are not clear in conveying your expectations
c. You are not impartial
d. You don't hand out kudos as much as brickbats
... and there could be more.
Management books talk in endless jargon about all these, in terms of oganizing, staffing, and controlling (there's a rich one!). But the real management secrets are like these, that most learn through painful experience (some may never do!).
Read 2 comments
Notice how many of the 10 points have some form of negation to them,e.g. "You don't..." structure. If one tries to invert the negation, the results become more muddy to my mind:
You leave things in a chaotic state
You let them fight for themselves among the sharks and wolves
You model imbalance and extremes
You are constantly stressed and ready to blow
You delegate too much
You defer choices as long as possible
While I can see these being bad, the proper balance of the extremes is a noteworthy point left out, sadly. Some of these remind me of various self-help books. Those books that promise to show the secret of life and how to make everything appear golden with little effort and challenge.
Ever read, "How to Win Friends and Influence People," by Dale Carnegie? It is an interesting book about human relationships, that while written over 70 years ago still has lots of useful ideas that I wish were taught in schools.
The truly sad thing about this and other lists is that they are oriented toward 'proper supervison' rather than leadership and mentorship. While not all staff members are self-starters or innovative thinkers, many are not that way because they are expected to follow a specific line of thought and action. For years, the IBM workforce was expected to wear a blue suit in plain tones. The FBI had a similar requirements. Thought was not encouraged and every manager was expected to keep his or (occasionally) er 'thumb' on everything.
Look at the list as a leader or mentor. These items are not requirements, they are opportunities to understand how leadership can strengthen a team, grant it respect, and still provide provide a scope to activity that prevents the workplace from becoming a playground.
Leave a Comment
Connect to this blog to be notified of new entries.
You are not logged in.
Sign In to post unmoderated comments.
Join the community to create your free profile today.
Archive Category: Manage Projects
Keyword Tags: Management Secrets of Team Management
Receive the latest blog posts:
Share Your Perspective
You Might Also Like
How does your team manage stress?
One of the interesting things about working... read more
Do you like working on a team?
Teams are all the rage today. Team coding... read more
|
global_05_local_5_shard_00000035_processed.jsonl/4990
|
IT Answers » Outlook Profile File Tue, 02 Jun 2015 22:11:32 +0000 en-US hourly 1 problems with .prf file Mon, 26 Jan 2009 21:06:02 +0000 I run a SMS scrpt that includes a .prf file which imports the exchange settings for the user so they do not have to enter any information themselves. This works on all computers execpt one. That one PC just prompts me for my credentials. I imported the prf from the command prompt and still nothing. Anyone know how i can manully force it to use this prf?
]]> 0
|
global_05_local_5_shard_00000035_processed.jsonl/4997
|
Watch A 3D Nanoprinter Create The Smallest Car In the Universe
I'm a big fan of small cars, and, like many small-car aficionados, I'm frankly tired of not having a car that can be mostly obscured by a grain of sand. Thankfully, that problem has been solved by researchers at the Vienna Institute of Technology, who have used a new 3D printing method to produce a racecar about 285 µm (micrometers or microns) long. That's the thickness of a human hair.
The 3D printing method uses a liquid resin, hardened by a laser beam guided with movable mirrors. The system is remarkably fast, able to deposit and fuse 100 layers of 200 lines of polymer per layer in under four minutes.
Even more amazing is the resolution: doing this level of detail at the nanoscale level means larger objects can have a truly remarkable intricacy. I've used other types of 3D printing for projects, and have been able to see the individual layers, like aliased pixels, on the final product; this is well beyond "retina display" levels for physical objects.
Now I just need to see if I can get an implant so all my blood and sperm cells have sweet rides to tool around my body in.
|
global_05_local_5_shard_00000035_processed.jsonl/5001
|
Back before KERS, DRS, paddle shifters and onboard computers, Formula One racing cars were basically just huge engines that happened to have wheels and transmissions attached for the sake of convenience. Could two drivers from the modern era even handle them?
Current Mercedes F1 drivers Lewis Hamilton and Nico Rosberg got a taste of what Grand Prix racing was like in the mid-20th century recently when they did a parade lap in two storied Silver Arrow racing cars. Hamilton is in a W154 from the late 1930s, and Rosberg is in a W196 from the 1950s, the same kind of car that recently fetched a record $30 million at auction.
Now, for safety reasons and to preserve these cars' mechanical integrity, they never go flat out. But they do get a sample of what things were like for drivers decades ago. Hamilton says his car has a finicky gearbox (What, you can't drive stick? Just kidding, that doesn't look easy), but both seem impressed by the cars' power, if not their safety features.
Click the YouTube link to see a transcript of their conversation. It's a fun read. And here's the lap from another angle:
|
global_05_local_5_shard_00000035_processed.jsonl/5002
|
TY - JOUR T1 - Knockout science: Chubby mice provide new insights into obesity AU - Stephenson J Y1 - 1999/10/27 N1 - 10.1001/jama.282.16.1507 JO - JAMA SP - 1507 EP - 1508 VL - 282 IS - 16 N2 - In the new study, a team of researchers from the National Institutes of Health, Bethesda, Md, Eleanor Roosevelt Institute, Denver, and the Oklahoma Medical Research Foundation, Oklahoma City, created the mice using genetic techniques that enable the investigators to incapacitate, or "knock out," a specific gene. In this instance, the KO'd gene of interest encodes pro-opiomelanocortin (POMC), a complex molecule largely produced in the brain and skin. SN - 0098-7484 M3 - doi: 10.1001/jama.282.16.1507 UR - http://dx.doi.org/10.1001/jama.282.16.1507 ER -
|
global_05_local_5_shard_00000035_processed.jsonl/5006
|
Last week, the New York Times ran "Room for Debate" feature centered on CVS' recent decision to stop selling tobacco products. The question posed was fairly innocuous: "What Unhealthy Products Should CVS Stop Selling?" Three of the four responses were about products that have been proven to pose actual health risks to humans: carcinogenic cosmetic products, soda and energy drinks. The fourth, bafflingly, relied on studies that had been debunked by the Times itself in order to argue against the sale of Plan B over the counter and ella by prescription.
In this column, titled "Dangers of Emergency Contraception" (blergh), executive director of the American Association of Pro-Life Obstetricians and Gynecologists Donna J. Harrison argues that "aside from being ineffective, over-the-counter access to emergency contraceptive is harmful to women's health." How is it harmful, exactly? Um, well, having fast and convenient access to emergency contraceptives "isolates the most at-risk women (teenagers and those in unstable relationships) from getting the medical care they need to diagnose sexually transmitted diseases." Keeping them from preventing pregnancy won't diagnose their STDs either, but no matter! Teens! She also claims that "these drugs have been tested for safety only in women 18 to 45, and under conditions where these women use the drug only once in the cycle" and makes the wild assertion that "in certain situations, emergency contraception may act by blocking a newly conceived embryo from implanting, rather than by preventing fertilization."
At RH Reality Check, Jodi Jacobson eviscerates her argument:
A large body of evidence not only underscores the safety and the efficacy of Plan B (from age 11 and up), but fully supports making it available over the counter; ella, which still requires a prescription, is also safe. The New York Times reported on this safety data several times, including in this piece from June 2013. The same month, those points were reiterated on the Times' own editorial page. It seems whomever at the Times invited Harrison to recycle old, discredited, and dangerous arguments failed to read the paper itself.
Jacobson also notes that "the claim that EC acts as an abortifacient has now been completely debunked by scientific evidence." The FDA has found that Plan B "will not stop a pregnancy when a woman is already pregnant and there is no medical evidence the product will harm a developing fetus" — something the Times reported on in 2012, in an article titled "Abortion Qualms on Morning-After Pill May Be Unfounded." Whoops!!!
In a column printed today, New York Times public editor Margaret Sullivan examines the Times' decision to print these misleading and baseless ramblings. She quotes Sarah Baird, an NYC-based M.D. who argues that Dr. Harrison's statements about Plan B and ella "are not only false, they are intentionally so... Availability of these safe medications in stores such as CVS should be a public health priority." Conversely, she quotes a lengthy defense from Susan Ellingwood, the Opinion editor who oversees "Room for Debate." In defense of Dr. Harrison, Ellingwood argues that her piece was merely "acknowledging uncertainty," which is the ethical thing to do. (If that were really the case, though, wouldn't a better title be something like "Safety of Emergency Contraception Debatable" or "Emergency Contraception Might Be Harmful To Women"?)
In the end, Sullivan concludes that Harrison's contribution contained "questionable statements on [a] sensitive and important subject" and, furthermore, that these questionable statements appear to "have the Times' imprimatur." It would be fine to run Dr. Harrison's view — which, as Sullivan points out, "runs counter to scientific consensus" — if the debate were about the safety of emergency contraception. It wasn't, though. It was about whether a chain pharmacy has the right to stop stocking products that are known to be dangerous to human health. Lumping Plan B and ella in with soda and energy drinks and carcinogenic cosmetic products doesn't "acknowledge uncertainty." It invites comparison.
Image via Getty.
|
global_05_local_5_shard_00000035_processed.jsonl/5017
|
Comprehensive Analysis of Affymetrix Exon Arrays Using BioConductor
Comprehensive Analysis of Affymetrix Exon Arrays Using BioConductor
• Michał J Okoniewski,
• Crispin J Miller
Why BioConductor?
BioConductor [1] is a collection of open source software packages designed to support the analysis of biological data. BioConductor is written using the programming language R, which itself provides access to a wide range of tools for statistical analysis, data presentation, and visualization. BioConductor has more than 200 packages representing not only analytical tools but also data and annotation. It has a highly active international developers' community. For those unfamiliar with R and BioConductor, numerous books and tutorials exist (see, for example, [24]), and there are also very active e-mail mailing lists for both.
Why Exon Arrays?
Recent studies have shown that alternative splicing is prevalent—approximately 74% of all human multi-exon genes are predicted to be alternatively spliced (see Box 1 for an overview of the terminology), corresponding to about 50% of all human genes [5,6]. Alternative splicing participates in many pathways and processes; a detailed understanding of the cell must therefore include knowledge of the roles played by alternatively spliced genes and their products. Disruptions to the machinery of alternative splicing have also been implicated in many diseases, including neuropathological conditions such as Alzheimer disease, cystic fibrosis, those involving growth and developmental defects, and many human cancers [7,8]. A detailed understanding of disease and disease progression must therefore also involve an appreciation of the effects of changes in a cell's splicing behaviour.
Box 1. Alternative Splicing Terminology
A gene is a region of the genome that is transcribed into RNA. A transcribed RNA molecule is referred to as a transcript. The RNA produced by genes that encode protein sequences is called messenger RNA or mRNA. In eukaryotes, genes can contain exons and introns. The introns are removed from the initial transcribed RNA (or pre-RNA) by splicing. Splicing can also be used to remove exons. By selectively retaining different sets of exons within the spliced transcript, cells can produce multiple isoforms from a single gene, and, if subsequently translated, multiple proteins. This process is known as alternative splicing.
From Genes to Exons.
Until recently, most microarrays considered transcription at the level of individual genes. They were, for the majority of genes, unable to distinguish between different isoforms, and, depending on the location of their probes, there was also the potential to miss certain transcripts entirely. Some groups have designed arrays to investigate genes by using many probes placed along their length in order to interrogate each exon separately. However, the number of features required to do this systematically, for the entire human genome, was prohibitively large.
Advances in array technology have made it possible to design chips with increasingly smaller feature sizes. Affymetrix Exon arrays, for example, use more than 6.5 million features: the previous generation of Gene-level arrays had approximately 600,000. By removing the MM probes and reducing the number of probes within a probeset from 11 to 4, the total probeset count has been increased to ~1.4 million, allowing probesets to be systematically placed along the full length of each gene (see Box 2 for an overview of the terminology; for more details on the design of the Affymetrix platform see the “Learning Center” on Affymetrix' Web site [9] or one of the many review articles (e.g., [10])). The aim has been to comprehensively target every known and predicted exon in the human genome (Figure 1).
Box 2. Design of Affymetrix Arrays
Affymetrix expression arrays use a set of features (often referred to as “spots”) designed to recognize each molecule of interest. Each feature consists of millions of identical single-stranded 25-mer nucleotide probes, each designed to hybridize to a specific transcript. On a gene-level array, such as the HGU133plus2 chip [30], each of these Perfect Match (PM) features is accompanied by an adjacent Mis-Match (MM) feature in which the middle residue is changed. Hybridization conditions are designed to maximise binding to the PM features while minimizing binding to the MM ones. Each MM feature can therefore be used to provide a measure of probe specific background for its PM partner. Multiple PM/MM pairs are used for each transcript. On most gene-level arrays, 11 PM/MM pairs are used per transcript, and the complete set of 22 features is referred to as a probeset.
Figure 1. Differences in Array Design
On standard 3′IVT, arrays such as the HGU133plus2 chip, each gene is typically targeted by a single probeset placed at the 3′ end of the transcript. These probesets consist of 11 Perfect Match spots and 11 paired Mis-Match spots in which the middle residue has been changed. Exon arrays have probesets placed against each exon along the length of the gene. Exon array probesets have no paired Mis-Match spots and four probes per probeset.
An important point to appreciate, particularly as feature densities increase and arrays cover more and more of the transcribed genome, is that microarrays do not actually measure gene expression at all. Rather, they measure the abundance of RNA fragments in solution; gene expression is then subsequently inferred from the data.
How Reliable Are the Data?
Exon arrays are very different from the previous generation of (3′IVT) arrays, such as the HGU133plus2 chip. Many changes have been made, including the removal of the MM probes, a reduction in the number of PM probes in each probeset from 11 to 4, changes in array design, and changes to the protocols used for RNA preparation. Given the large number of changes, it is important to assess the performance of the arrays. In [11] and [12] (available at [9]), this was done by comparing them to HGU133plus2 arrays, themselves extensively validated. Exon arrays were found to produce data of similar quality to that from the earlier arrays. A more detailed discussion of the differences between exon and 3′IVT arrays, including approaches to Quality Control, can be found in Text S1.
A General Workflow for Exon Array Analysis
The community has converged on a relatively standard set of approaches for analysing existing 3′IVT arrays (Figure 2).
Figure 2. Exon Arrays Can Be Analysed Using Standard Approaches Developed for 3′IVT Arrays
A standard pipeline for array processing involves 1. normalizing the arrays, 2. generating expression summaries, 3. filtering on correlation, fold-change, and/or statistical significance to select interesting probesets, 4. mapping those probesets to their target transcripts by annotation, and 5. visualization and downstream analysis.
A similar approach can be applied to exon array data. In particular, the same algorithms for analysing 3′IVT arrays can be used for Exon chips up until step 3. Novel strategies must be employed in the last two steps because of the need for more complex annotation to deal with the richness of the data produced by the arrays.
Pre-Processing Exon Array Data
Step 1: Normalization.
Biological and technical variations inject enough variability into the system for it to be inappropriate to directly compare raw data for each individual sample without first pre-processing (or “normalizing”) the data in order to bring them together. Many techniques exist, most working on the assumption that on average, the majority of data points between samples are unchanged. Thus, a straightforward procedure might simply scale each array to the same mean intensity, perhaps after removing outliers. A more invasive approach might also require each array to have the same standard deviation, or to have the same-shaped distributions. Normalization can be performed on the raw feature/spot levels, or on the probeset data after expression summary. Most recent algorithms perform normalization first, and the same techniques that were applied to 3′IVT arrays are applicable to exon arrays (see the supplement worked examples, Text S2).
Step 2: Expression summary.
Expression summary is the process by which the values for each individual probe in a probeset are summarised to generate a single value for that probeset. Again, many techniques exist, but all perform some kind of weighted average, possibly with background correction.
Observations about the relative utility of MM probes led to the design of RMA [13]. Importantly, RMA doesn't use MM probes, making it directly applicable to exon arrays.
After normalization (by default, quantile), the data are fitted to a global model of expression and probe affinities. For each probeset, PMij = ei + aj + εij, where e is a chip effect and a represents the probe affinity for the jth probe on the ith array.
The model is based on the hypothesis that the intensity measured for a perfect match spot is dependent on three things: the amount of material available to bind to the spot (the chip effect, e), the “stickiness” of the probe (the probe affinity, a), and a measurement error (ε). RMA works by estimating, for each probeset, values for the probe and chip effects that would result in the pattern of PM values observed in the data. This process of “model fitting” is performed using an algorithm called median polish, a fast numeric technique for estimating model parameters.
PLIER, proposed by Affymetrix [14], is a similar algorithm to RMA. It also fits a global model, but starts from a slightly different set of assumptions. In theory, PLIER can use MM probes; its behaviour without MM is qualitatively similar to RMA. PLIER offers some additional parameters that may be used to tune the model.
An alternative, model-based approach designed specifically for exon array summarization was proposed recently in [15].
Step 2½: Filtering to remove poorly performing probesets—Detection calls.
While expression summary algorithms generate an estimated value for the abundance of transcript in solution, they do not provide a measure of how reliable that figure is. Exon arrays, which do not have paired MM probesets (and cannot use the approach of [16]), have a separate pool of 25,000 background probes designed not to match exactly to the transcriptome. A detection above background (DABG) score can be calculated for each probeset by matching PM probes to members of the background pool with the same GC content and measuring the relative distance between the two [17]. In [11], DABG calls were found to be useful in removing poor performing probesets prior to analysis.
Step 3: Identifying significant probesets and dealing with multiple testing.
Statistical tests (e.g., a t-test) are used to assess how likely changes in differential expression are to have occurred by chance. With a single test, a p-score of, say, 0.05, might be acceptable; there is a 5% chance of chasing shadows. Microarrays present a challenge, because they perform thousands (or in the case of exon arrays ~1.4 million) tests in parallel. At standard thresholds, many probesets will be identified by chance (approximately 5% of the array: ~70,000). Multiple testing correction aims to address this by choosing more stringent thresholds in order to reduce the false positive rate. This must be balanced against the incorrect rejection of real results—i.e., the false negative rate.
A popular strategy is to try to find a threshold such that the set of probesets that pass the test is expected to contain a specified number of false positives—i.e., the false discovery rate (FDR). FDR is appealing not least because it is easy to interpret and provides a useful measure of the reliability of the dataset in question.
Exon arrays present further challenges, because of the size of the datasets and because the non-independence between probesets makes it difficult to accurately compute the FDR [18]. That said, current techniques can still be applied to exon array data, and do yield sizable numbers of differentially expressed probesets.
Mapping to Annotation
A number of strategies have been developed that re-annotate array data by in silico searches against the genome and/or transcriptome. A popular approach is to identify transcripts (or genes) targeted by multiple probesets. These are then combined to produce larger consensus probesets [19,20]. One advantage of this approach is that it reduces the total number of probesets involved in the analysis, and thus has a positive effect on the multiple testing issues discussed above.
Care must, however, be taken when applying these approaches to exon arrays, because the amount of evidence supporting each probeset is varying, and some probesets have been placed on the array with much less confidence than others. Strategies that aim to define new probesets using annotation must deal with these. Another issue is that model-based algorithms such as PLIER and RMA make the assumption that all probes within a probeset target the same thing. When alternate splicing is involved (particularly given the potential for novel and/or overlapping transcripts), this assumption may not hold.
An alternate strategy is to use the standard probeset definitions provided by the manufacturer, and to apply annotation to the data only after the “interesting” probesets have been selected. This is the approach taken here. Annotation can also, in some circumstances, be used successfully to pre-filter the data before statistical analysis by, for example, removing all probesets except those that match known exons in the Ensembl genome database. Again, this can have a beneficial effect on the FDR.
X:MAP, a Database of Exon Array Annotation
X:MAP is a database of exon array annotations built by performing an in silico search between exon array probes and the entire genome. These data are stored in a relational database and associated with a copy of Ensembl [21]. X:MAP has a Web-based genome browser (based on Google Maps) that allows the relationship between probesets, the genome, and gene structure to be browsed [22], and an associated BioConductor package, exonmap, which communicates with X:MAP and provides access to its data from within R. The design and implementation of the database is described in more detail in [23].
Exonmap supports mappings backward and forward between potential probe hits, probesets, exons, transcripts, and genes. The database allows these comparisons to be performed for Ensembl genes, ESTs, and Genscan predictions.
Filtering is provided to allow probesets to be selected or excluded, based on whether they map to introns, exons, transcripts, or genes. It is also important to consider the hit-specificity of different probes within a probeset, since a substantial proportion (about 6%) of probes match identically to more than one Ensembl exon. Additional functions are provided to filter based on whether probesets contain “Multiply Targeted” probes that match the genome in more than one location. This is important because a small but substantial number of probesets are capable of hybridizing to the genome at multiple locations, and because much of the genome is predicted to be transcribed. Mapping of probesets to the genome is described in more detail in [23].
Exonmap provides some basic functions to load expression data into R (based on the “affy” package). In order to preprocess the array data, it is necessary for the software to know which features on the surface of the array correspond to which probesets. This is generally specified using a “Chip Definition File,” or CDF. Custom CDF data for exon Human, Mouse, and Rat arrays can be found in the “downloads” section of X:MAP [24].
Once data are loaded they can be processed using standard analysis tools, such as limma, or siggenes, in order to identify sets of interesting probesets. A simple utility function pc() is provided to perform pairwise comparisons between two replicate groups and to generate fold-changes and unadjusted p-values. We will use it here for convenience—more sophisticated analyses are of course possible, and generally advisable—however, since the focus here is on the annotation tools, a simple strategy is sufficient to generate an initial probeset list for further analysis.
The data on which this tutorial was generated is part of a comparison between MCF7 and MCF10A cell lines. It can be downloaded from [25].
Hello world.
The simplest route to a list of differentially expressed probesets (the exon array equivalent of “ world”) is as follows:
1 > library(exonmap)
2 > <- read.exon()
3 > <- “exon.pmcdf”
4 > x.rma <- rma(
5 > pc.rma <- pc(x.rma,“group”,c(“a”,”b”))
6 > keep <- (abs(fc(pc.rma)) > 1) & tt(pc.rma)< 1e-4
7 > sigs <- featureNames(x.rma)[keep]
Line 1 simply loads the package.
Line 2 loads the expression data into the ExpressionSet object, and relies on the presence of a file (by default called ‘covdesc') that defines the names of the .cel files to be loaded and their associated experimental parameters. The covdesc file used here is as follows:
When read.exon() loads the data, the additional experimental parameters defined in covdesc are loaded into the ExpressionSet, and can be retrieved by the function pData().
Line 3 takes a little more explanation. The raw array data is stored in a .CEL file, which records, for each of the ~6 million features on the array, the raw unprocessed spot intensity. These must be grouped into probesets, as specified by a Chip Definition File (CDF). Line 3 tells BioConductor which CDF file defines the array layout by setting the name of the .cdf package (“exon.pmcdf”). CDF files can be downloaded from [24].
Line 4 uses RMA to normalize and generate expression summaries for the probesets. To use PLIER, the following code can be substituted:
8 x.pli <- justPlier(, usemm=F, normalize=T, norm.type=”pmonly”, concpenalty=0.08)
The concpenalty parameter can be used to adjust how PLIER deals with probesets that have very different values on a small proportion of the arrays in a project (i.e., outlier probesets). We have found it can be useful to set it to a higher value than the default (0.000001) when processing small numbers of arrays. Otherwise, PLIER can tend to see genuine differences between arrays as noise. This is translated into reduced fold changes for these probesets. PLIER's tuning parameters are described in more detail in [26].
Line 5 uses pc() to calculate fold-changes and t-test p-values for each probeset on the array. Note that it is using the data loaded in from the covdesc file to specify that the comparison should be between samples labelled “a” and “b” in the column “group”.
Line 6 uses the result of the pairwise comparison to find all probesets with an absolute fold-change greater than 1—all data are on a log2 scale, so at least 2-fold differentially expressed—with an unadjusted p-value less than 10−4, and line 7 fishes the names of these probesets out from the object. Clearly, more sophisticated approaches (using, for example false discovery rates to set thresholds) can, and probably should, be substituted here.
Mapping to Annotation
Irrespective of how the probeset list is identified, these must then be mapped to the genome and to gene annotations. The aim of exonmap is to provide methods to answer questions such as these:
1. Which probesets hit exons, introns, transcripts, and/or genes?
2. Which probesets hit between known genes—and do they match ESTs or Genscan predictions?
3. Which genes/transcripts are differentially expressed or alternatively spliced?
The basic approach is to provide a series of functions that allow lists of identifiers to be mapped between the different levels of annotation. First, however, it is necessary to connect to the database:
9 > xmapDatabase(“Human”)
This relies on a configuration file specifying how to connect to the database. Full details are in the package vignette and installation instructions.
10 >[1:5],list.out=TRUE)
[1] “ENSE00000738016”
[1] “ENSE00000737793”
[1] “ENSE00001435048” “ENSE00000737789”
[1] “ENSE00000401699”
Note that probeset ‘2318682' matches to two different exons (a quick search on X:MAP shows that these are from two different transcripts from the same gene—PER3). Other parameters can force the results to be returned as a vector, to be filtered to remove duplicates (see the manual page of [27]—i.e., ? for more details). Similar functions can be used to perform mappings backward and forward between exons and genes (,, transcripts, etc. Functions also exist to get detailed information for exons, transcripts and genes—for example:
11 > transcript.details("ENST00000377541")
transcript_id stable_id seq_region_id name
ENST00000377541 226810 ENST00000377541 226034 1
seq_region_start seq_region_end seq_region_strand
ENST00000377541 7766967 7786605 1
biotype status description external_db_id
ENST00000377541 protein_coding KNOWN NA 2000
db_display_name display_label
ENST00000377541 UniProtKB/TrEMBL Q8TAR6_HUMAN
ENST00000377541 PER3 protein (Period homolog 3) (Drosophila).
Filtering based on probeset location.
At line 7, an initial probeset list was generated. Many of these probesets match outside Ensembl genes, whilst others match inside genes, but outside exons. Filtering functions are provided to select or exclude these probesets from the probeset list, as follows:
12 > sigs.exonic <- select.probewise(sigs, filter="exonic")
Intronic and intergenic probesets can be selected in a similar way, and the analogous function exclude.probewise() allows probesets to be filtered out of a list.
Some probesets contain probes that match the genome at multiple sites. These can be selected or removed as follows:
13 <- select.probewise(sigs, filter="multitarget")
Filtering criteria are based on the number of times each probe within a probeset matches the genome, a gene, or an exon. The aim is to identify those “well-behaving” probesets that consist of probes that match only once to the feature of interest.
Searching for Alternative Splicing—Splicing Index and Splicing ANOVA
Exon arrays enable genome-wide, high-throughput searches for alternative splicing events [28]. There are many intuitive methods of assessing if the gene is alternatively spliced (e.g., the coefficient of variance of the exonic probesets within a gene).
A simple, but effective method, the “splicing index”, was proposed in [29]. Each exonic probeset is normalized by dividing its expression by the gene-level summary value for the entire gene to yield a normalized intensity (NI). The splicing index is then calculated simply as a “fold change” between the two normalized levels:
The method depends on the selection of the gene-level expression summary [14]. In exonmap, the mean (or median) value for all exons is used [19].
14 > si.sig <- splicing.index(x.rma, sig.gene, "group", c("a","b"))
Gene level summaries are calculated, by default, as the median expression of ‘well-behaving' exon probes (where ‘well-behaving' means not multiply-targeted, and hitting an exon with all four probes in the probeset).
Searches for alternative splicing may also be done for experiments with multiple treatments. In this case, in place of a simple index, there is an ANOVA model, tested for each probeset. The null hypothesis is that there is no alternative splicing for the gene, and the NI level for each probeset should therefore not be significantly different across the samples. p-Values are calculated for all the probeset-treatment pairs; alternative splicing events are selected as those with low p-values:
15 #in an experiment with more than two replicate groups
16 > splanv <- splanova(x.rma, my.genes,"group","a",thr=0.05)
17 > fval(splanv)
Downstream Analysis—Visualization Tools
A set of visualization tools is available within exonmap. plot.gene(), for example, will plot the structure of the specified gene, coloured according to the expression data (Figure 3). Minimum, maximum, mean, and median intensity are all possible, as are mean and median fold-changes between sample groups. By default, the gene's average expression is calculated and used to colour the overall gene; transcripts and exons are coloured relative to that. The default colouring is thus very similar in philosophy to the splicing index.
Figure 3. Expression for STARD10, Mapped to Known Isoforms and Coloured According to Fold Change between MCF7 and MCF10A
gene.graph() plots expression data as a line plot, with exons coloured and placed according to location, on the x-axis of the graph. By default, intronic and multiply targeted probesets are not shown; parameters allow this to be changed.
Finally, gene.strip produces a heatmap-style representation for a list of genes. Each rectangle in the plot corresponds to an exon, and is coloured by expression, as before. By default, introns are not drawn; when they are, the x-axis represents actual sequence position, exons are drawn as (by default) black rectangles, and probesets by larger rectangles coloured by gene expression (Figure 4).
Figure 4. 20 Differentially Expressed Genes Selected for High Variance within Their Probesets
Each row corresponds to a gene, each rectangle to an exon. Exons are arranged in sequence order. If an exon is targeted by multiple probesets, these are stacked vertically within that exon. The plot is coloured by fold change between MCF7 and MCF10A (red, up in MCF7; blue, up in MCF10A).
We hope you found this tutorial useful. Further examples and workflows can be found in the package vignettes and in Text S1 and Text S2 including the pursuit of novel exons and transcription from intergenic regions.
Supporting Information
Text S1. Difference between Exon and Previous Generation Affymetrix Arrays
(52 KB PDF)
Text S2. Example Workflow
(93 KB PDF)
We are grateful to the Cancer Research UK Affymetrix service for producing the array data used in this tutorial, to Rob Clarke for the RNA, and to the BioConductor community for their valuable contributions, core libraries, and collaborative, open source, community efforts.
Author Contributions
CJM conceived and designed and performed the experiments, analyzed the data, contributed reagents/materials/analysis/tools, and wrote the paper. MJO performed the experiments, analyzed the data, and contributed reagents/materials/analysis/tools.
3. 3. Venables WN, Ripley BD (2000) S programming. New York: Springer.
4. 4. R-Development-core-team. The R Manuals. Available: Accessed 10 December 2007.
5. 5. Modrek B, Lee C (2002) A genomic view of alternative splicing. Nat Genet 30: 13–19.
7. 7. Venables JP (2006) Unbalanced alternative splicing and its significance in cancer. Bioessays 28: 378–386.
9. 9. Affymetrix. Available: Accessed 10 December 2007.
10. 10. Dalma-Weiszhausz , Warrington J, Tanimoto EY, Miyada CG (2006) The Affymetrix GeneChip platform: An overview. Methods Enzymol 410: 3–28.
11. 11. Okoniewski MJ, Hey Y, Pepper SD, Miller C (2007) High correspondence between Affymetrix exon and standard expression arrays. Biotechniques 42: 181–185.
12. 12. Pepper SD, Hey Y, Newton G, Okoniewski MJ, Miller CJ (2006) A core lab case study: Exon array challenges and opportunities. Affymetrix Core Lab Communication Bulletin 1: 1–4.
14. 14. Affymetrix (2005) Gene signal estimates from exon arrays. Affymetrix Whitepaper. Available:hnical/whitepapers/exon_gene_signal_estimate_whitepaper.pdf+Affymetrix+(2005)+Gene+signal+estimates+from+exon+arrays.+Affymetrix+Whitepaper.&hl=en&ct=clnk&cd=1&gl=us. Accessed 10 December 2007.
15. 15. Kapur K, Xing Y, Ouyang Z, Wong W (2007) Exon array assessment of gene expression. Genome Biology 8: R82.
16. 16. Liu WM, Mei R, Di X, Ryder TB, Hubbell E, et al. (2002) Analysis of high density expression microarrays with signed-rank call algorithms. Bioinformatics 18: 1593–1599.
17. 17. Affymetrix (2005) Exon array background Correction. Affymetrix Whitepaper. Available:cal/whitepapers/exon_background_correction_whitepaper.pdf. Accessed 10 December 2007.
18. 18. Bender R, Lange S (2001) Adjusting for multiple testing—When and how. J Clin Epidemiol 54: 343–349.
20. 20. Lu J, Lee J, Salit M, Cam M (2007) Transcript-based redefinition of grouped oligonucleotide probe sets using AceView: High-resolution annotation for microarrays. BMC Bioinformatics 8: 108.
22. 22. X:MAP. Available: Accessed 10 December 2007.
23. 23. Okoniewski MJ, Yates T, Dibben S, Miller CJ (2007) An annotation infrastructure for the analysis and interpretation of Affymetrix exon array data. Genome Biology 8: R79.
24. 24. CDF metadata packages for exonmap. Available: Accessed 10 December 2007.
25. 25. Paterson Institute for Cancer Research Bioinformatics Group Homepage. Available: Accessed 10 December 2007.
26. 26. Affymetrix (2005) Guide to probe logarithmic intensity error (PLIER) estimation. Affymetrix Whitepaper. Available:cal/technotes/plier_technote.pdf. Accessed 10 December 2007.
27. 27. exonmap in BioConductor. Accessed 10 December 2007.
28. 28. Gardina P, Clark T, Shimada B, Staples M, Yang Q, et al. (2006) Alternative splicing and differential gene expression in colon cancer detected by a whole genome exon array. BMC Genomics 7: 325.
29. 29. Clark T, Schweitzer A, Chen T, Staples M, Lu G, et al. (2007) Discovery of tissue-specific exons using comprehensive human exon microarrays. Genome Biology 8: R64.
30. 30. Affymetrix (2001) Array design for the GeneChip human genome 133 Set. Affymetrix Technote. Available:33_design_technote.pdf. Accessed 10 December 2007.
|
global_05_local_5_shard_00000035_processed.jsonl/5019
|
Neighbors mailbox
Posted: Wednesday, May 16, 2007
Thanks for helping our caregiver conference
Sound off on the important issues at
On behalf of Southeast Senior Services, I would like to thank all the wonderful people who made possible the Southeast Alaska Caregivers Conference, held April 12-14 at the Alaska Native Brotherhood Hall in Juneau. Participants, who represented both paid and family or unpaid caregivers from all over Southeast Alaska, were presented with the latest information and resources on senior issues, toward the goals of supporting family caregivers and helping elders stay in their own homes and communities as long as possible. Thanks to the following sponsors for making the three-day Caregivers Conference such a success: the Community Education and Professional Development office of the University of Alaska Southeast, the National Council on Alcohol and Drug Dependency, Tlingit and Haida Central Council Elders Caregivers Council, Alaska Native Sisterhood Camp 2, and the Alaska Native Brotherhood Camp 2. Special thanks go to the gentlemen of ANB Camp 2 for their technical assistance, good humor and helpfulness.
Marianne Mills
Trending this week:
|
global_05_local_5_shard_00000035_processed.jsonl/5030
|
Mega Man 9 IS Coming To 360, PS3
It is, it isn't, it is, it isn't…sheesh. Yes, it's been confirmed that Mega Man 9 will be making its way to the Xbox 360 and PS3. Despite WiiWare-only claims – from Capcom, the scamps – to the contrary. Above is the closing screen from the game's first trailer, showing the necessary details. Thanks for the confusion! Perhaps as a tonic for your Mega Man dizziness, they've also announced that Mega Man 1 & 2 will be appearing on the North American Virtual Console, and appearing "soon". Full (and excellent) trailer's after the jump.
Click to view
|
global_05_local_5_shard_00000035_processed.jsonl/5044
|
From: Brian Kelly <[email protected]>
Date: Thu, 2 Oct 2003 21:21:21 +0100 (BST)
To: Bob Clary <[email protected]>
Cc: [email protected]
Message-ID: <[email protected]>
Hi Bob
Thanks for the email.
I understand your (and Jim's) rationale. I got the impression at the
WWW 2003 conference that the problem with dodgy XHTML was to be addressed
with XHTML 2.0. Anyway I don't have any disagreements with the logic of
your position.
I guess my current interest is in the deployment of the application/xml
MIME type in a University server environment (typically a mixture of XHTML
and HTML; PHP, etc).
Thinking about it makes me wonder if the advice on format independent
URIs ties in with MIME type mapping.
BTW the reason I'm using XHTML 1.0 is (1) to gain experience of
problems - as I'm now finding; (2) to be able to use XSLT to transform
the resources (e.g. to RSS) and (3) is the most recent W3C recommendation
for HTML and its use is preferred (this is my current understanding).
I get the impression that this (esp. point 3) isn't your's (or Jim's
view). I guess your position is that the best approach is
XHTML+application/xml (or whatever) and if you can't guarantee to provide
the MIME type (for whatever reason) you should stick with HTML 4. If this
is felt to be the best approach, shouldn't there be some advice on the QA
Library covering this? As I pointed out in a previous message the XHTML 1
spec does allow text/html. I think additional caveats about the denages
of this approach are needed.
(My apols if this is going over old ground or slightly out of scope
for this list).
Brian Kelly, UK Web Focus
UKOLN, University of Bath, BATH, England, BA2 7AY
Homepage: http://www.ukoln.ac.uk/ukoln/staff/b.kelly/
Phone: 01225 323943 FAX: 01225 826838
On Thu, 2 Oct 2003, Bob Clary wrote:
> Brian Kelly wrote:
> [snip]
> >
> > Note that an advantage with text/html is that the page will display if the
> > XHTML is invalid. I think it would be difficult to sell the notion of
> > application/xml if an invalid file is not displayed (I appreciate the need
> > for compliance - this comment is about marketing XHTML. One could argue
> > that HTML 4.0 is a more fault tolerant format that XHTML (I wouldn't say
> > that but others may).
> Brian,
> I really must chime in and agree with Jim about this.
> The point that he and I have been trying to make over some period of
> time is that the attitude that serving XHTML as text/html and allowing
> authors to get in the habit of authoring invalid XHTML all the while
> thinking it is ok will end up destroying the promise that is XHTML.
> One of the great advantages to authoring in XML and XHTML (as
> application/xhtml+xml) is that the documents must be well formed at the
> very least. To take the position that the requirement of well formed
> documents is a disadvantage and that any hodgepodge of markup should be
> displayed is antithetical to the entire idea behind XML.
> As Jim stated, I have not heard a good reason to use XHTML when it is
> served as text/html, especially when the content is not subject to a
> strict validation process.
> The reason I brought up the news.com site today was to illustrate the
> Bad Things(tm) that are happening to XHTML because of lack of a
> commitment to what XHTML really is... XML. Why are we recommending XHTML
> over HTML when all we expecting of the author is that they continue to
> author HTML as they always have?
> /bc
Received on Thursday, 2 October 2003 16:21:27 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/5046
|
Re: HTML5 and XML syntax
From: Simon Pieters <[email protected]>
Date: Tue, 29 Jan 2008 12:37:49 +0100
To: [email protected], [email protected]
Message-ID: <[email protected]>
Disclaimer: still not an official WG response.
On Tue, 29 Jan 2008 10:56:05 +0100, <[email protected]> wrote:
> Henri Sivonen skrev:
>>>> or just use the HTML-compatible subset of the XML syntax.
>>> That would work, but why doesn't the HTML5 WD recommend that?
>> Browsers won't parse text/html as XML, so taking the trouble to jump
>> through additional hoops would be a waste of authoring effort.
> That would make it possible (in most cases) to serve the same content as
> both text/html and application/xhtml+xml.
There are benefits and drawbacks with doing this.
* You can feed your own content to your own server side XML tools if your
toolset doesn't feature an HTML parser yet.
* You can embed MathML and/or SVG inline and have it work for existing
browsers and degrade reasonably in HTML-only browsers.
* You can catch a subset of markup errors on your own blog by just
loading it
in your XHTML browser.
* You will discriminate users with XHTML browsers as soon as an error
through your system.
* You're exposed to scripting and CSS differences between HTML and XHTML
would have been the same if you used only text/html.
* If you don't generate the HTML and XHTML versions using HTML and XML
serializers respectively, you're also exposed to parsing differences
such as
<script> being a CDATA element in text/html but not in XML, or that
character entities such as isn't available in XML.
These lists aren't exhaustive, but my point is that for some authors the
benefits outweigh the drawbacks (or some drawbacks don't apply to them),
for others the benefits don't apply but the drawbacks do. So it's not
clear to me why the spec should recommend something that just has
drawbacks for many authors.
Simon Pieters
Opera Software
Received on Tuesday, 29 January 2008 11:38:06 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/5052
|
Re: RDF API thoughts
From: Nathan <[email protected]>
Date: Tue, 11 Jan 2011 15:52:03 +0000
Message-ID: <[email protected]>
To: Ivan Herman <[email protected]>
Ivan Herman wrote:
> On Jan 11, 2011, at 16:10 , Nathan wrote:
>> Hi Toby,
>> Comments in line:
>> Toby Inkster wrote:
>>> Here are some thoughts on the RDF API draft which a recent discussion in
>>> the #swig IRC channel helped my clarify in my head.
>>> The current RDF API draft is really a Notation 3 API in stealth.
>>> The current RDF API draft goes beyond the RDF data model in several
>>> ways. I'm a big fan of the Notation 3 data model - the RDF data model
>>> comes with various restrictions which are seemingly arbitrary. However,
>>> for the RDF API it makes more sense for us to stick with the RDF data
>>> model.
>> The initial draft API was aimed less at N3, and more at an RDF model with the seemingly arbitrary constraints removed.
>> There are essentially four possibly contentious items, listed below with reasons for each
>> 1: The loosening of the Triple interface to include any node in any position
>> - because this is possibly the most arbitrary restriction on the RDF model, primarily imposed because of serialization limitations rather than for model or semantic reasons.
> To be fair, this is not entirely true. There has been long and surprisingly passionate discussion on SWIG about the Literal-as-subject issue that was not bound to syntax
Agreed, not entirely fair, and v much discussed, no doubt a few more
times yet.
>> 2: The inclusion of Graph Literals
>> - because they may very well be included in the next revision of RDF, as per the potential RDF WG draft charter.
> Per proposed charter:
> http://www.w3.org/2010/09/rdf-wg-charter.html#outofscope
> this is explicitly listed as out of scope!
> I am not saying we should not have it in the RDF API (I have not really made up my mind yet) but we should have our facts right... Sorry:-)
Apologies, I was reading the
http://www.w3.org/2010/09/rdf-wg-charter.html#scope section wrt "Support
for Multiple Graphs and Graph Stores" ... "... as quoted graphs, graph
literals" - hence why I mentioned the RDF WG in this context.
>> 3: The removal of the datatype /or/ language constraint on literals
>> - because we may move to a place where PlainLiteral, xsd:string and related are joined in a single datatype (which would mean a literal could/may have both a datatype and a language).
> Well... yes. One might argue that, in the case of rdf:PlainLiteral, the language tag is 'hidden' in the string itself, I agree that it is nicer on the API level if this is handled separately
>> 4: The inclusion of profiles
>> - because they are all ready part of RDFa and may be adopted by RDF and other serializations (again as per the RDF WG draft charter)
> That is correct. The profile mechanism has caught the attention of the RDF community at large and may end up being used. That being said one could argue that the profile mechanism is simply a syntactic sugar and may not have to be present in the triple store!
>> The reason all of these items are in the initial draft of the API, is to ensure that the API is both backwards and forwards compatible, inclusive rather than exclusive - if it's later agreed that exceptions should be thrown in places or some of these interfaces moved out to a note, then at least we know that the API has been designed with these considerations in mind, and that it's compatible without having to immediately start work on a 1.1/2 API and potentially break BC or "hack" them on later.
>>> Why? Firstly, packaging something up and calling it an RDF API when it
>>> goes significantly beyond the RDF API will irritate some people.
>> Well, tbh they can still implement the API and just impose the arbitrary restrictions themselves, many are imposed by serializations anyway - nothing is actually lost other than a "conformance badge".
>>> Secondly, it will make it difficult to implement the RDF API as a layer
>>> on top of existing RDF toolkits.
>> As per above, it can still be implemented, just with some per implementation restrictions, and some scope to grow in to.
>> I'm by no means saying that this is the case, just that it's one of many possible approaches.
>>> Notation 3 support should be stripped out and worked on as an extension
>>> to the RDF API separate document. A Notation 3 API extension is almost
>>> certainly beyond the RDFa Working Group's current charter, but that is
>>> fine as it doesn't stop RDFa Working Group members from working on this
>>> extension outside of RDFa WG time. The Notation 3 API extension should
>>> probably not be Rec track, at least not until some time when Notation 3
>>> itself is.
>>> The only nod towards Notation 3 that the RDF API itself should offer is
>>> to avoid making that extension difficult. In other words, don't add
>>> normative requirements that would preclude a conformant RDF API
>>> implementation from also supporting Notation 3.
>>> In particular I'd like to see the following changes made to the RDF API:
>>> 1. Drop the GraphLiteral interface.
>> Any particular reason why it needs dropped now? we could always factor it in to a different note or remove it should the RDF WG not define RDF literals.
> Another possibility is to avoid the suggestive name. We have fought with this issue when setting up the charter, and the current charter is a bit vague (intentionally so). I can imagine that the final work would lead to two different notions, one more in direction of separate graphs and the others more in direction of, say, quoted graphs. I am not sure what term to use here, though.
Ahh, okay that's what I thought - unsure of terminology etc too, I guess
the distinction is that ones a graph that can be in a triple, the other
is something that contains a graph (if I follow what you're saying
correctly) - regardless, this (or this confusion) is why it's in there
at the moment, spec'd in case it's needed.
Best and cheers for the clarification,
Received on Tuesday, 11 January 2011 15:53:59 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/5054
|
Action 368 - Definition of Service Provider/Data Processor
From: Chris Pedigo <[email protected]>
Date: Wed, 27 Feb 2013 15:35:55 +0000
CC: Peter Swire <[email protected]>
Message-ID: <CEED5B1AC4405240B53E0330753999D3205068EA@mbx023-e1-nj-8.exch023.domain.local>
Hello all, I worked with Vinay Goel to come up with a definition of Service Provider/Data Processor. We also solicited feedback from Justin Brookman and Rigo Wenning. Below is the normative text that we ultimately decided upon. One of the discussions centered around whether service providers or data processors should be allowed to utilize the Permitted Uses. We decided not to include that language, because it would not fly in the EU and because it does not appear to be common practice among service providers in the US. Finally, I am still gathering feedback from my member companies. So, while expect this language will work for publishers, I am reserving the right to come back with tweaks. Looking forward to today's call and the ensuing discussion.
Action 368 - Definition of Service Provider/Data Processor
A Data Processor is any party, in a specific network interaction, that both operates on behalf of another party and meets the following conditions:
- Data that is collected and/or retained is separated by both technical means and organizational process, AND
- Uses and shares data only as directed by that other party, AND
- Enters into a contract with the other party that outlines and mandates these requirements.
A Data Processor is subject to the same restrictions as the other party. If a Data Processor were to violate any of these conditions, it will then be a third party.
Chris Pedigo
VP, Government Affairs
Online Publishers Association
(202) 744-2967
Received on Wednesday, 27 February 2013 15:36:23 UTC
This archive was generated by hypermail 2.3.1 : Wednesday, 7 January 2015 14:41:22 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/5059
|
Re: Pattern 2 variants
From: David Booth <[email protected]>
Date: Mon, 23 Jun 2003 02:13:31 -0400
Message-Id: <>
To: "Amelia A. Lewis" <[email protected]>, [email protected]
(Comments inline below)
At 12:55 PM 6/17/2003 -0400, Amelia A. Lewis wrote:
. . .
>Same-channel communications is easily described, but may not apply well
>outside of connection-oriented protocols such as HTTP. It mandates that
>messages after the first in a pattern must use the same "channel" as the
>first message. This is easily comprehended with respect to HTTP (the
>message must be returned over the open connection), less easy with SMTP
>(is 'same channel' the From: header or the envelope sender?), and quite
>difficult with multicast or store-and-forward technologies (should the
>response go to the same target address as the request? the same
>newsgroup?). It tends to disallow unicast responses to multicast
I think I agree with you here. However, if we talk about "same channel
communication" we'll need to be much clearer about what we mean. In the
context of a unicast, bi-directional transport protocol like TCP, I think I
understand what you intend. However, I don't know what is meant by "same
channel communication" in the context of broadcast communications. For
example, if a reply message is broadcast on the radio frequency as the
request message was received, is that "on the same channel"? How does the
original client requester know that it should listen to the response and
act on it, when some other receiving client may do so also?
Constraining the reply to be "on the same channel" as the request seems to
me to be placing a transport-specific constraint on the pattern, rather
than keeping the patterns transport-independent. In other words, it is
starting to talk about HOW messages will be delivered, rather than simply
talking about WHO will receive them. At the abstract (WSDL interface)
level, I don't think we should do that.
>. . . [Lots of variations and discussion deleted] . . .
>Let's do a reduced list:
>2umci-1: unicast input, unicast output to input source
Ignoring faults, this p2e.
>2umci-2: unicast input, unicast output to unspecified destination
Ignoring faults, this is p2c, p2d and p2d1.
>2umci-3: unicast input, unicast output to source not the same as input
I cannot imagine that the WG would want to adopt such a pattern, but if we
wanted to describe it, it would be (ignoring faults) exactly the same as
p2c, p2d and p2d1, with the further constraint that A != B.
>2umci-45: unicast input, multicast output may include the input source
Ignoring faults, this is p2a.
>2umci-7: multicast input, unicast output to input source
I've added this to meps-vs-iops[1] as pattern p2umci-7.
>2umci-1011: multicast input, multicast output may include the input
Ignoring faults, this is p2.
David Booth
W3C Fellow / Hewlett-Packard
Telephone: +1.617.253.1273
Received on Monday, 23 June 2003 02:29:31 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/5060
|
RE: Outstanding Issues - rdfms-not-id-and-resource-attr:
From: Jeremy Carroll <[email protected]>
Date: Wed, 20 Feb 2002 09:57:03 -0000
Message-ID: <[email protected]>
> rdfms-not-id-and-resource-attr:
> The propertyElt production 6.12 of the grammar does not
> allow both an ID attribute and a resource attribute to
> be specified (owner Dave Beckett)
> Dave has made a proposal in the syntax WD; awaiting counter
> proposal from Jeremy.
My counter proposal was made a while ago:
An rdf:ID attribute is permissable on all property elements and always
refers to the resource that is the reification of the triple corresponding
to that property element.
The only issue seems to be whether this is a change or a clarification.
I don't care which.
Given that we are trying to make reification usable for provenance and to
force a "reification is intended for provenance" reading from M&S, I think
this is sensible.
With what I understand of the lack of uniformity in the other proposal
actually using the syntactic mechanism for reification becomes a
hyper-specialized activity.
Received on Wednesday, 20 February 2002 04:57:25 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/5062
|
Guidance re Accesskeys
From: <[email protected]>
Date: Sun, 23 Feb 2003 23:04:40 +0000 (GMT)
To: [email protected]
Message-ID: <[email protected]>
As I understand it, accesskeys may be useful when they are used
considtently through an application, or (better) a user's entire
environment, so that users become familiar with them. This is
relatively uncommon on the web, where few sites can expect to be
visited so often as to benefit.
With mod_accessibility, the situation is somewhat different.
It offers a standardised set of options that are likely to
be consistent throughout a site, and could potentially be
shared amongst all sites using it. While the use of accesskeys
is ultimately controlled by the server administrator, I'd like
to designate default values for them, and use those at my
own sites.
Currently mod_accessibility offers users a choice of seven[1] views
on a page:
Asis, Noframes, Medium (basic renditions but with different treatments
of Frames and included contents).
Full (adds Title attributes to all links)
Betsie (emulates BBC betsie behaviour)
Outline (shows page outline)
Links (page links, with additional information)
I think these - particularly the Outline - will benefit from standardised
accesskeys. But in assigning them, I'd like to avoid clashes with other
applications users are likely to be familiar with. In the case of
Outline and Links, maybe I can do still better by assigning accesskeys
that are used for broadly equivalent functions in other apps.
Can anyone suggest accesskeys to use or avoid, or further reading
on the subject?
[1] Up to seven; this may be reduced by a server administrator,
as in the case of Site Valet where I've taken out the frames-fixing
options because it doesn't use frames in the first place:-)
Nick Kew
Received on Sunday, 23 February 2003 18:30:57 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/5063
|
Re: [Moderator Action] Re: src attribute on xforms:instance - link or inclusion?
From: Thierry Michel <[email protected]>
Date: Tue, 3 Sep 2002 18:09:45 +0200
Message-ID: <[email protected]>
----- Original Message -----
From: [email protected]
Sent: Monday, September 02, 2002 12:32 PM
Subject: [Moderator Action] Re: src attribute on xforms:instance - link or inclusion?
I had asked:
> In thinking further about the src attribute on xforms:instance I wonder
> whether this is not a "link" but rather should be an include.
Steven Pemberton replied (somewhat snipped):
XInclude is not a REC by the way. It is only at CR at the moment.
Correction accepted.
worse, it normatively references an out-of-date XPointer. We are not even
allowed to normatively refer to a specification more than one step behind
us. But that notwithstanding, XInclude would be rather heavyweight for the
role it would have to play, and would be a tough requirement for handheld
Surely the first question to address here is whether or not what is being done is an include or a link?
I notice you don't address that question.
If the process is an include rather than a link don't you agree that expressing it as a link is a little bit of a kludge?
(And by the way, XInclude has an href attribute which is also not an
xlink:href, so what would be the win from your point of view? And if it's OK
for them, why is it not OK for XForms?)
Well, if my suggestion is correct, that the process may be an include not a link then there would be no reason to think of XLink in this context.
I appreciate that your responses, at this stage, are informal but I would be interested to know if you consider that this is genuinely a "link" with "embed". If it's not then might it not be sensible to revisit the issue?
Andrew Watt
Received on Tuesday, 3 September 2002 12:10:27 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/5064
|
RE: [XForms] - print event?
From: Mark Birbeck <[email protected]>
Date: Mon, 18 Nov 2002 09:17:49 -0000
Message-ID: <[email protected]>
To: "'Roman Huditsch'" <[email protected]>, [email protected]
Roman wrote:
> is there any possibility to define something like a "print-event" in
> XForms? I would like to print a different form than displayed when
> a print- event is triggered. How can I accomplish that?
The idea is that XForms handles form processing only, with appearance and so
on coming from CSS. Printing is also best achieved with CSS. Take a look at
@media in the CSS spec. I know that IE supports 'screen' and 'print' as two
different types for @media (newer versions of CSS are adding 'mobile',
'aural', and all sorts of things), and Mozilla and X-Smiles have good CSS
support so no doubt they will have these types, too.
So, in short, you can already do what you want, although not all pseudo
classes may be implemented in all brwosers yet.
Mark Birbeck
Co-author Professional XML,
and Professional XML Meta Data,
both by Wrox Press
Try our XForms plug-in for IE
at http://www.FormsPlayer.com/
Managing Director
x-port.net Ltd.
4 Pear Tree Court
E: [email protected]
T: +44 20 7689 9232
M: +44 7774 102 413
W: http://www.x-port.net/
Received on Monday, 18 November 2002 04:18:09 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/5065
|
Troubles with proxy & root.
From: Peter Mcilroy <[email protected]>
Date: Tue, 10 Jun 1997 13:29:05 -0400
Message-ID: <[email protected]>
To: [email protected]
I ran into two troubles today.
Number one:
I attempted the following (naive!) sequence:
I had a threadstat attribute of root, called
Since the ThreadStat wanted to be called "threads"
I modified the properties name field for this object.
Then I went back to the root menu and selected "root"
and "update" -- this usually works on directory resource
objects to refresh the names of the objects -- I hoped.
The result (and this happened before for some similar problem)
is that the entire Admin/Editor (http://xxx:8001/Admin)
structure is destroyed, even after reboot. I get the following
error message:
Invalid URL
The URL http://athos.rutgers.edu:8001/Admin/Editor
that you requested is not available on that server.
Is this a recoverable problem? (can I recover my original
configuration without starting from scratch?)
Number two:
All this started when the Jigsaw proxy started sending broken copies of
some (previously cached) documents. For some addresses, I was
getting "document contains no data" errors. I tried setting the
cache size to 0, and deleting all cache files--to no avail.
(This problem did go away on reboot.)
The same files remained broken. Is there a preferred way to
flush the cache?
Peter McIlroy
Received on Tuesday, 10 June 1997 13:30:55 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/5066
|
From: Chris Moschini <[email protected]>
Date: Thu, 30 Oct 2003 13:01:43 -0500
To: [email protected]
Message-ID: <[email protected]>
Ian Hickson [[email protected]] wrote:
> I don't have a problem explaining how the rendering would work, but I have lots of trouble
> deciding on a syntax. All the syntaxes I've looked at have been very inadequate.
Is the goal to shortcut the move-to: ident; content: pending( ident ); ? Or is the goal to
do something a little different; for example to group Elements on the same level but not
necessarily siblings into an anonymous, or make them children of a common anonymous parent?
Which it is would help define what the syntax ought to be.
-Chris "SoopahMan" Moschini
Received on Thursday, 30 October 2003 13:01:41 GMT
|
global_05_local_5_shard_00000035_processed.jsonl/5067
|
[css3-namespace] published as CR
From: Bert Bos <[email protected]>
Date: Fri, 23 May 2008 20:02:44 +0200
Message-Id: <[email protected]>
The CSS WG published a Candidate Recommendation for the CSS Namespaces
Module. A Candidate Recommendation is a stable specification in W3C's
opinion, but one that still needs to see some use in real life before
becoming a W3C Recommendation.
It defines the '@namespace' rule, which is the missing piece to make
Selectors work in CSS, or at least those selectors that select elements
by their XML Namespace rather then by their names or attributes.
So please, start implementing!
In this case, we actually believe many implementers have already
implemented it, but we need to set up the test suite and test reports
before we can be sure. We hope to have some test results as early as
There were only few comments on the last working draft and all were
accepted by the WG: http://dev.w3.org/csswg/css3-namespace/issues-2
More feedback is still welcome, on this mailing list, as usual:
<[email protected]>. Please, prefix the subject of all relevant messages
with [css3-namespace] as I did on this message.
Contributions to the test suite, test reports, etc. are also welcome.
The preferred place for that is another mailing list:
The test suite will be based on (or maybe even the same as) the
Selectors test suite: http://www.w3.org/Style/CSS/Test/#css3-selectors
For the CSS WG,
[email protected] 2004 Rt des Lucioles / BP 93
Received on Friday, 23 May 2008 18:03:25 GMT
|
global_05_local_5_shard_00000035_processed.jsonl/5072
|
New "Additional MEPs" document
Date: Wed, 25 Oct 2006 10:17:05 +0200
To: Amelia A Lewis <[email protected]>
Message-id: <[email protected]>
As part of my action, I have just commited a new document that will
contain the additional MEPs moved out of Part 2. The file is available
under W3C CVS as :
I have kept the introduction, notations, namespaces and MEP sections as
is, leaving you the pleasure of deleting whatever you deem unnecessary.
I've compressed the change log**.
I've also removed the MEPs in Part 2 which are not used in our bindings.
Namely, I've kept only in-only, robust-in-only and in-out.
I believe this discharges me of my action item.
** Interestingly, the change log represents 1/4th the number of lines of
Part 2.
Received on Wednesday, 25 October 2006 08:17:40 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/5081
|
Is Wicca A Religion?
Published: Tuesday, February 27, 2001
"A Word In Edgewise" caught my attention last Monday (A-J, 1-29) when the topic was religious diversity. Even more interesting than the text, which was very informative, was the graphic used as an illustration.
Nine religious symbols were featured in the artwork. I can identify seven, possibly eight of the nine. There was the Yin-Yang of Taoism, what may be an artistic representation of a lotus flower for Buddhism, a totem for Native American religion, a Crucifix for Catholicism and Christianity, a Pentagram for Wicca, a symbol of the OM for Hinduism, a symbol I cannot place, a crescent and a star for Islam and a cross for Christianity.
Wait a minute, that was a pentagram? It was a symbol for what? Wicca is a religion? That's right, Wicca is a religion and its symbol is the pentagram.
I am not sure how that particular graphic was chosen. I wonder if someone forgot to count the points on the star and thought the pentagram was the Star of David. Regardless of the process, it was chosen and ultimately printed.
I do know that followers of the "old religion" all over Lubbock were quietly pleased upon seeing it.
Via e-mail
Related Searches
|
global_05_local_5_shard_00000035_processed.jsonl/5123
|
Otter52’s Activity
This user has no activity to display in this Activity Feed.
CAPS Stats & Trivia
CAPS Player Rating < 20
Player Rank 0 out of 75251
Score 0.00
Score Change Today 0
Accuracy 0.00%
Active Picks 1
Total Picks 10
Best Pick ISRG (+137.60)
Worst Pick FTEK (-87.78)
Average Score per Pick 0.00
Charms Earned 2
Highest Rated Favorite bbmaven
Go to Otter52’s CAPS page
Boards Stats & Trivia
Old School Fool Global Fool Motley Fool One Everlasting Fool
Board Posts 7
Recs Received 20
People who have rec'd these posts 20
Recs to Posts Ratio (last 30 days) N/A
Threads Started 0
Threads Started Percentage 0.00 %
Most Frequent Board Motley Fool Rule Breakers
Very First Post A RBIndustry: Biotechnology post. (4/6/2005)
Percentage of Posts Rec'd 42.86 %
Show Otter52’s 10 Latest Posts
|
global_05_local_5_shard_00000035_processed.jsonl/5128
|
Souichi Tatsumi
Souichi Tatsumi
Koisuru Boukun
add Main
add Supporting
Koisuru Boukun
add Main
Koisuru Boukun dj - Aru Hi, Mori no Naka.
add Main
Member Favorites: 198
Souichi Tatsumi
Occupation: Student
Hometown: Nagoya
Age: 25
Birthday: August 2 (Leo)
Blood type: A
Height - weight: 178 cm - 58 kg
Slogan: "I'll tell my dreams. To discover the gay gene, it is to wipe homosexuality from the world!"
Favorite Color: White
Favorite Food: Wings
Souichi Tatsumi is a second-year graduate student in agriculture and the friend and senpai of Tetsushiro Morinaga, who has a crush on him. He is an aggressive and outspoken homophobe who would like to see all gays wiped off the map - all the more so because his precious younger brother has run off with a male lover.
Voice Actors
Midorikawa, Hikaru
|
global_05_local_5_shard_00000035_processed.jsonl/5131
|
Zombie Driver User Reviews
Zombie Driver
- PC
The thing about Indie games is that they all have a simple idea to them, but somehow, the developers make that simple idea into a really fun game. The idea to Zombie Driver is for you to kill zombies and rescue survivors with your car. With this very fun idea, does Zombie Driver make good from it? Like said before, the idea to Zombies Driver is for you to kill zombies and to rescue survivo...
1 user review found
Zombie Driver
Average Score 6.4 Reviews(20)
Release Dates
PC Release Dates
AU November 2009
US 04 December 2009
EU 04 December 2009
PS3 Release Dates
Xbox 360 Release Dates
Xbox One Release Dates
|
global_05_local_5_shard_00000035_processed.jsonl/5134
|
Submitted by john2 910d ago | news
Assassin’s Creed III - The Hidden Secrets DLC Announced, The Tyranny of King Washington DLC Detailed
DSOGaming writes: "Today, Ubisoft announces the Assassin’s Creed III’s first downloadable content pack, The Hidden Secrets, is now available for Season Pass owners on X360 and PC and will be available tomorrow for PS3." (Assassin's Creed III, PC, PS3, Wii U, Xbox 360)
Alternative Sources
shammgod + 910d ago
They need to release the opera house as an MP map
typikal82 + 910d ago
... So basically all the preorder dlc is the first pack
Individually each dlc was tiny, I suppose(!) all together it's worth the $10...
<feels like an ass for paying real money for that Gamestop preorder dlc
TekoIie + 910d ago
Oh... I feel slightly screwed after shelling out £80 on the Freedom edition...
Add comment
New stories
Splatoon Review | Hardcore Gamer
Roundabout Review - A Pixelated View
Top 5 Video Game Releases - June 2015
Heroes of the Storm Review | GameRevolution
|
global_05_local_5_shard_00000035_processed.jsonl/5148
|
Page last updated at 16:13 GMT, Friday, 28 May 2010 17:13 UK
Electronic trading boost for Ethiopia's coffee farmers
A commodities exchange run by the Ethiopian government and supported by the World Bank is helping protect about 12 million small-scale farmers from exploitation.
Prices agreed on the trading floor are transmitted round the world and the farmer is guaranteed payment within 24 hours.
Follow African Journey with Jonathan Dimbleby through nine countries and over 7,000 miles on Sundays at 2100 BST on BBC Two from 30 May.
Story Tools
Sign in
BBC navigation
Americas Africa Europe Middle East South Asia Asia Pacific
|
global_05_local_5_shard_00000035_processed.jsonl/5156
|
Page last updated at 17:03 GMT, Wednesday, 16 September 2009 18:03 UK
'Gene cure' for colour blindness
Watch the squirrel monkey 'cured' of colour blindness. When untreated, he could only guess where to touch. (Footage courtesy of Neitz Laboratory.)
Scientists say they are a step closer to curing colour blindness using gene therapy.
A US team were able to restore full colour vision to adult monkeys born without the ability to distinguish between the colours red and green.
Nature journal describes the technique used by the researchers at the University of Washington.
Although more studies are needed, the same treatment may work for humans who are colour blind, experts believe.
Full colour
Until now scientists had not thought it was possible to manipulate the adult brain in this way.
It was considered that adding new sensory information, such as the visual receptors necessary for perfect colour vision, could only be done in the earliest years of life when the brain is at its most malleable or "plastic".
But Professor Jay Neitz and his team were able to introduce therapeutic genes into the light-sensing cells at the back of the eye of adult male squirrel monkeys.
This provides a positive outlook for the potential of gene therapy to cure adult vision disorders
The study authors
The therapeutic genes contained the necessary DNA code to enable the light-sensing cells to distinguish between red and green - something lacking in the male monkeys.
Tests revealed the gene therapy was a success. The male monkeys now possessed the necessary photopigments to see all colours and were able to correctly pick out red from green on computer image tests.
The monkeys were treated over two years ago and their improvement in colour vision has remained stable since.
Professor Neitz's team will continue to monitor the animals to evaluate the long-term treatment effects.
They are hopeful that a similar therapy could benefit people who are colour blind.
"This provides a positive outlook for the potential of gene therapy to cure adult vision disorders," they said.
There are several forms of colour blindness. The most common form is inherited red/green colour blindness, passed on through a faulty colour vision gene on an X chromosome.
Colour blindness test
A person with normal colour vision will be able to see the eye in this image
Sometimes colour blindness occurs because of diseases such as macular degeneration or from side effects of medicines.
Winfried Amoaku, an expert in ophthalmology at the University of Nottingham, said the research could eventually benefit approximately 7% of males and 1% of females born with genetic colour deficiencies.
He said: "These research seems to be the first in primates to address the colour vision deficiencies and indicate that intact cells are modifiable in their colour perception.
"Further research is required, however, before this comes to human clinical trials, and therapy in the clinics."
Print Sponsor
Colour blindness not all it seems
06 Dec 05 | Health
Colour blindness cell loss clue
04 Jun 04 | Health
The BBC is not responsible for the content of external internet sites
Has China's housing bubble burst?
How the world's oldest clove tree defied an empire
Why Royal Ballet principal Sergei Polunin quit
Sign in
BBC navigation
Americas Africa Europe Middle East South Asia Asia Pacific
|
global_05_local_5_shard_00000035_processed.jsonl/5187
|
Eduardo Saverin Not Leaving the U.S. Because of Taxes, He Swears
Eduardo Saverin, co-founder of Facebook
Photo: Jason Kempin/Getty Images
Brazilian-born, Harvard-educated Facebook co-founder Eduardo Saverin doesn't know why everyone thinks he's renouncing his U.S. citizenship because of money. Yes, his move to Singapore will save him at least $67 million on the billions he stands to make when the social network goes public, by Bloomberg's count, but according to his spokesman, "The calculations and assumptions are not only erroneous, they also further perpetuate the false impression that tax was the reason behind Eduardo's decision." Honestly! "His motive had nothing to do with tax and everything to do with his desire to live and work in Singapore."
The fact that he renounced his citizenship as of April 30 and Facebook's IPO is scheduled for May 18 must just be a crazy coincidence. He'll still pay about a $365 million exit tax (although he can defer until he sells his shares), but his savings will only increase if Facebook gains value. And he gets to hang in Singapore, which happens to not have a capital gains tax.
The only potential downside, per Talking Points Memo, is that he might never be allowed back: The U.S. can deny visas to "Former citizens who renounced citizenship to avoid taxation." Good thing that's not what Saverin's doing.
|
global_05_local_5_shard_00000035_processed.jsonl/5190
|
How Bruno Got Into Paris Fashion Week
When Sacha Baron Cohen tried to invade the Versace show during Milan Fashion Week as his alter ego Bruno, Italian fashion authorities were pissed. Security blocked him from Versace and the Italian Chamber of Fashion sent out a press release urging designers not to let anyone affiliated with his production company into their shows. When he managed to walk the runway at Agatha Luiz de la Prada's show, security chased him down and the lights were dimmed. This was clearly not a joke to the Italians.
But it was to the French! Bruno met a far different fate in Paris, easily infiltrating Stella McCartney and Jean-Charles de Castelbajac's shows. McCartney seemed to be in on the joke, though she pretended she wasn't. "I love his work in fashion," she told WWD. Bruno's production company called De Castelbajac the day before the show and told him Jude Law was coming. Alas, Bruno showed up clad entirely in leather.
The French seem to have a greater sense of humor than the Italians, God bless them. Bruno is reportedly off to Moscow Fashion Week next. We hope he runs around clad entirely in Swarovski crystals.
Defining Moments: International Male [WWD]
Related: Sacha Baron Cohen Storms the Runway in Milan (Updated with Video!)
You Won’t Believe What Sacha Baron Cohen Did at the Stella McCartney Show Today
Video: Sacha Baron Cohen Wreaks Runway Havoc Again!
|
global_05_local_5_shard_00000035_processed.jsonl/5236
|
Take the 2-minute tour ×
What would a large project that spanned multiple files and >1000 lines show to an employer that a few individual files and a couple hundred lines couldn't capture?
share|improve this question
How you organize your code, whether or not you understand higher-level architecture. – Robert Harvey Oct 3 '12 at 18:35
Why do you feel a 1,000+ lines of code is a large project? I would consider that a small project. – Ramhound Oct 4 '12 at 11:28
Are you supposed to show them some of your older projects, or are you supposed to create for free something they can sell to their customers? – Viliam Búr Oct 4 '12 at 12:48
7 Answers 7
I think it is likely that this potential employer wants to see how you would structure a larger application and is looking for whether you made use of good design principles.
You should just politely contact this potential employer and ask them yourself.
share|improve this answer
I'm going to turn this into a separate question, thanks. – Ryan Jarvis Oct 3 '12 at 15:41
Reason 1: Is it your own code, or something you copied?
(Mostly) anyone can copy a short piece of code from the internet, explore it, and give it as his own during an interview while being able to explain the code itself.
Doing the same with a large codebase would be difficult, since it would be easily recognized and searchable as one of the an open source projects.
Reason 2: Do you have skills to work on a large codebase?
When you give a link to a large codebase under version control, you show that you actually have the skills required to write a large codebase.
When you give a small piece of code, you are showing just that you was able to write a small piece of code. Would you be able to work on a codebase with thousands of lines?
Reason 3: Have you studied/verified your code enough?
For an interviewer, it would be easy to find an issue in a large codebase¹, and to interview you on it. The interviewer may ask if you are aware of one of those bugs, why didn't you solve it, and how do you think to be able to solve it now.
Moreover, during an interview, the interviewer can target any smallest part of the codebase, and ask you to explain it in details, to see how well do you know your own code.
¹ Strangely enough, it is not rare to see small (under 100 lines) pieces of code with one or several bugs where the code is not doing what it is expected to do. This applies as well to candidates who are writing that they have +10 years of professional experience and qualify themselves as highly skillful.
share|improve this answer
Only one bug in 20k LOC? That would be impressively low. I think 1 bug in 1000 LOC is more realistic - for good code. – Doc Brown Oct 3 '12 at 18:14
@Doc Brown: I apologize, my answer was not clear. Edited it. Thank you for your feedback. – MainMa Oct 3 '12 at 18:26
@Doc Brown: I'd settle for 1 bug in 1000 characters :) – Joel Etherton Oct 3 '12 at 20:04
Also relevant: in testing, as a sample size grows, accuracy of the test increases. – Jimmy Hoffa Mar 21 '13 at 15:36
Writing small pieces of code and stitching them together to form a coherent, bigger whole are two different skill sets entirely.
Asking for bigger pieces of code across several files is a way of testing for the latter. I.e. the employer isn’t simply interested in your “coding skills” but in your architectural skills.
share|improve this answer
Thanks, I'm going to turn this into a separate question. – Ryan Jarvis Oct 3 '12 at 15:42
Gives them a nice chunk of code that they can steal without paying you for when they discard you.
share|improve this answer
that's what I'd suspect would happen indeed. Same with the "requirement" I've seen at times that prospects put in several days or weeks of (usually unpaid) work before a contract is offered to "see if you fit in". Easy and quick way to get a few new hands to get bread and butter work done for free, just get several such and tell them all after a week or so that "we don't think you'd make a great addition to our team". – jwenting Oct 4 '12 at 7:33
How is it stealing exactly? Why wouldn't they just get somebody they already have on staff to write the code, instead of wasting that persons time, reviewing code written by random people? – Ramhound Oct 4 '12 at 11:32
you don't consider getting others to write your code for you in the guise of a "test" for a job they'll never get stealing? You never intent to hire those people, you just get the top 10 you would otherwise hire to build your new system for you, one module each, as a "test" to see "if your quality is good enough for us" (unpaid of course). – jwenting Oct 4 '12 at 13:23
(Wish I could post this as a comment, but not enough rep points yet)
In response to the comments on # of errors per KLOC, well, it sounds like we all under-estimate the prevalence of latent bugs in commercial software :) In mission-critical systems (like flight traffic control), 1 error per 100 lines of code is considered average [http://history.nasa.gov/sts1/pages/computer.html]. Per the same link, the software used on the Challenger space shuttle had approximately 1 error per 10K lines; that code cost $1,000 per line to develop.
share|improve this answer
I guarantee you that there is not 1 error per 100 lines in flight traffic control software. Reading your source myself, I cannot find any indicate that your claims about flight traffic control software is even true, let alone having a 0.01 error rate. – Ramhound Oct 4 '12 at 11:38
it would show you're likely to hand their code to a competitor if asked to produce a code sample during a job interview.
share|improve this answer
How exactly does writting code for an interview with Company A show that you will hand their code over to Company B which is their competitor in the market place? – Ramhound Oct 4 '12 at 11:33
do you have several thousand lines of code sitting around, highly polished and optimised, for handing in at a job interview? No, of course not. The majority would take some code from what they're currently working on at their current job, scrub copyrights and colleagues' names, and send that. – jwenting Oct 4 '12 at 13:22
Mostly because of the verbosity of the languages. After all 1000 lines of code in Java/C# especially if over engineered do not allow to cram much functionality inside. So he just have to ask for something big enough to have at least some insight in how you work or think.
share|improve this answer
I didn't think of that. I was thinking more of writing a web app or service using PHP/Python/Ruby. You can create a pretty robust program in less than 1000 lines using a scripting language, especially if you use templating for html markup. – Ryan Jarvis Oct 5 '12 at 13:48
And the first 50 problems of project euler combined take around 100 lines in Haskell. Depends on the position and language you are applying for. But if you have request for 1000 lines in Python - better add license info to the file. – Daniel Iankov Oct 5 '12 at 16:01
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/5237
|
Take the 2-minute tour ×
This question already has an answer here:
I think I'm struggled in some situation!
We are a new start-up with 5 employees (2 Programmers). I'm the Technical Manager and that was so fine!
Now I can see the fingers point to me to take the control of everything, as I've the big vision of what our organization do and play the role of CEO or General Manager!
I want to, but I've no idea if it would be risky to our organization to make such a decision? How would managerial interrupts affect the technical productivity?
Any tips or previous experience about such situation would help :)
Thanks in advance!
share|improve this question
migrated from stackoverflow.com Feb 18 '11 at 19:17
This question came from our site for professional and enthusiast programmers.
marked as duplicate by gnat, MichaelT, Dan Pichelman, Bart van Ingen Schenau, amon Nov 29 '14 at 10:59
That's what I do, but every situation is different. You just have to find what works for you and your organization. – David Heffernan Feb 18 '11 at 18:55
Check this out: programmers.stackexchange.com/questions/43460/… – user2567 Feb 18 '11 at 19:24
@Pierre, your comment is a duplicate of your other comment :) – Marcie Feb 18 '11 at 20:19
@Marcie: technical problem with the site ;) – user2567 Feb 19 '11 at 10:32
7 Answers 7
It depends on the state of your company. Having someone with technical background in a managerial position in a software company is usually a good thing. It means you are in the position to communicate with both your team and your users and make those two aspects meet. Even more so if you are the one with the vision for the company.
If the technical work you are doing can rather be done by another (new) employee, or adequately handled by the current team, and your company possesses the necessary resources for this, be the general manager while just overseeing that the technical side is still on track. It's much harder to hire someone new to take a managerial position in a new company than it is to hire someone to do technical work.
share|improve this answer
+1 For mentionning about what's harder to find between a general manager and CTO. – Will Marcouiller Feb 18 '11 at 20:58
It depends on the amount of work that needs to be done.
At some point, it makes more sense to have one person handle the business end of the company, who would not have time to do programming.
share|improve this answer
This has nothing to do with your answer: I love your dog! =P – Will Marcouiller Feb 18 '11 at 21:01
Me too! :) ...... – Jonathan Wood Feb 18 '11 at 22:12
Yes. In fact I think its a good idea to have someone with a programming background in that role in a tech startup. Because, as you say, you have the 'big vision' understanding of whats going on with the technology and how it all fits together. The average business manager without a tech background is not suited to make good technical decisions.
You may not be doing a lot of coding, or have pressures not to, but make sure you stay involved with it lest you become out of touch.
share|improve this answer
Of course you can, it's just a matter of how much you compromise on each to do both.
That is, you can be a great manager or programmer. Or you can be a slightly less great manager and programmer.
share|improve this answer
Any type of technician has to be able to make a transition to become a manager. If you'd rather hide in your office and code than dealing with other people and their problems, you probably won't make it.
It would be really helpful to have another person in the firm at a manager level that compliments your expertise. They could handle: client relationships, business operational matters, or some of the direct/day-to-day supervision of the other developers (Do you really want to get involved in vacation schedule conflicts?).
Seems like Google has decided to put a technical person in control.
share|improve this answer
Every lousy manager I've worked for has been an ex-developer who refused to give up the developer cap. It is amazing how smooth things go with a good manager, to the point that you don't think they are even doing anything. Then, you get the bad manager and that makes you realize all the stuff that was getting done without your knowledge. Being a manager is a full-time+ job. I'm sure some people can wear both hats successfully but I've never worked with them and I've worked with probably a hundred project leads/managers.
share|improve this answer
Getting a new PM every 3 months for 25 years is a lot. – JeffO Feb 18 '11 at 20:16
I wasn't referring to program managers exclusively. I was also referring to software, hardware, systems leads and project engineers. Any of the roles where their job is supposed to be oversight and customer management rather than technical development. – Dunk Feb 18 '11 at 20:29
If the business is yours, you definitely have to be the CEO since you are the one who got the sight of where you want your business to go.
I'm a professional software developer and the founder CEO of my own consulting company, and I wear both hats adequately. This is only to say that this is doable. Besides, this requires a lot of hours each week. This is not to mention that I do my own accounting, except the end of year taxes.
As already mentioned, it is simply better for your business to have a CEO capable of technical understanding and who is able to get how did a project not succeeded or else, and not to point out someone unnecessary.
Beware though, you may be a good technical guy, but no good CEO and vice-versa. You got to know yourself enough to put your own limits and to recognize them so that you may call for help from employees later anytime as needed.
As a technical capable CEO, you will also be able to recognize those who work for your business (you), and others who work for themselves. For sure you can do both for a while until your business grows big enough for you to only put the manager hat on and let a current employee be the CTO or system administrators, that is, if you got no problem in dealing with customers and getting new contracts, which is a rather different game to play than system administrator, that is for sure!
I hope that my grain of salt may help somehow!
I wish you the best of success! =)
share|improve this answer
|
global_05_local_5_shard_00000035_processed.jsonl/5252
|
@Inproceedings {export:215597, abstract = {
We demonstrate how information gathered from social network profiles can be used to predict personal attributes such as gender and age, religious and political views, intelligence, happiness and personality traits. Our approach is based on applying machine learning techniques to a large dataset of people who volunteered their Facebook profiles along with their demographic and psychometric test results. We combine various features from the profile, including the numbers or rates of posting status updates, pictures and group memberships, and the specific items liked by individuals. Our system provides insights regarding how the predictions are made, allowing people to understand how they may be perceived by others based on their social network profiles.
}, author = {Yoram Bachrach and Thore Graepel and Pushmeet Kohli and Michal Kosinski and David Stillwell}, booktitle = {AAMAS}, title = {Your Digital Image: Factors Behind Demographic and Psychometric Predictions from Social Network Profiles}, url = {http://research.microsoft.com/apps/pubs/default.aspx?id=215597}, year = {2014}, }
|
global_05_local_5_shard_00000035_processed.jsonl/5260
|
Patrick Kaeding > Search-Lemur-1.00 > Search::Lemur
Annotate this POD
View/Report Bugs
Module Version: 1.00 Source
Lemur - class to query a Lemur server, and parse the results
Version 1.00
use Search::Lemur;
# run some queries, and get back an array of results
# a query with a single term:
my @results1 = $lem->query("encryption");
# a query with two terms:
my @results2 = $lem->query("encryption MD5");
# get corpus term frequency of 'MD5':
my $md5ctf = $results2[1]->ctf();
This module will make it easy to interact with a Lemur Toolkit for Language Modeling and Information Retrieval server for information retreival exercises. For more information on Lemur, see
This module takes care of all parsing of responses from the server. You can just pass a query as a space-separated list of terms, and the module will give you back an array of result objects.
Main Methods
Create a new Lemur object, connecting to the given Lemur server. The $url should be a full URL, ending in something like 'lemur.cgi'.
Return the URL of the Lemur server
Get some information about the databases available
Returns an array of Lemur::Database objects.
Set the database number to query. This will specify the database number instead of just using the default databse 0.
If the num is not specified, the the current database is returned.
Make a query to the Lemur server. The query should be a space-delimited list of query terms. If the URL is has not been specified, this will die.
Be sure there is only one space between words, or something unexpected may happen.
Returns an array of results (See Lemur::result). There will be a result for each query term.
Returns the lexicalized (stopped & stemmed) version of the given word. This is affected by weather or not the current database is stemmed and/or stopworded. Basically, this is the real word you will end up searching for.
Returns a string.
Patrick Kaeding, <pkaeding at>
Please report any bugs or feature requests to bug-search-lemur at, or through the web interface at I will be notified, and then you'll automatically be notified of progress on your bug as I make changes.
You can find documentation for this module with the perldoc command.
perldoc Search::Lemur
You can also look for information at:
Copyright 2007 Patrick Kaeding, all rights reserved.
syntax highlighting:
|
global_05_local_5_shard_00000035_processed.jsonl/5263
|
Take the 2-minute tour ×
Possible Duplicate:
I've set up an MX record for a local mailserver before, but I've never done this...
I want to set up my public domain (registered by Dreamhost) to accept IPP (Internet Printing Protocol) jobs and send them to the IPP LaserJet printer on my home LAN. IPP uses port 631.
What do I put in my DNS records?
share|improve this question
marked as duplicate by Chris S Jan 26 '12 at 14:53
2 Answers 2
up vote 7 down vote accepted
DNS doesn't do anything with ports, it's strictly for mapping names to IP addresses. What you need to configure is your firewall to accept connections to port 631 on your public IP and to forward those to the (presumably) internal IP address of the printer.
share|improve this answer
And be aware that your public ip address is likely to be at least somewhat dynamic if it's a home isp connection. I'd be considering whether you actually need to do this or if there's a better solution. – kaerast May 29 '10 at 20:43
In his/her comment to Ward's answer kaerast makes a good point. It might be a whole lot simpler to use DynDNS or similar and print directly to your home connection. Of course we are now in the realms of Super User. not Server Fault.
share|improve this answer
|
global_05_local_5_shard_00000035_processed.jsonl/5264
|
Take the 2-minute tour ×
Okay, here's the deal. I have a server set up in my home that I want to use for a variety if things. It is running Windows Server 2k8 R2 with Active Directory Domain Services, Domain Controller, and DNS server roles installed. I bought a domain name from a Canadian domain registrar and I want to manage said domain using this server machine.
I have done a lot of Googling but I can't seem to find what I'm looking for. What I want to do is somehow forward all the domain stuff to this server so I can control the domain name as well as things like subdomains.
Do I just open the proper ports and set this server as the nameserver in the registrar's panel? I tried doing this and their panel gives me an error. If this is the proper way I can then take the ticket to their panel as to why it's giving me an error, but I want to make sure it's set up on my end first.
Also, I just want to make sure that the outside world will be able to go to that domain, so how does this work exactly? When they query the name does it go to the registrar then the registrar passes them to my nameserver?
I suppose I should note as well that my local domain (on the network) is mydomain.local, but the domain I want to actually route to the server is mydomain.com and mydomain.ca (can I pair these two or do I have to set everything up for both? [by everything I mean subdomains and the like])
If you need any more info let me know, hopefully though this gives you a good idea of what I have and need.
share|improve this question
1 Answer 1
up vote 1 down vote accepted
It sounds like you could do with some background on how the DNS system works. Have a look at that answer briefly.
You need, at minimum, two DNS servers to host the DNS for your Internet domain (to provide redundancy and to satisfy IANA's requirement that there be at least two delegated DNS servers for the domain). Hosting the DNS for your domain yourself on this single physical server probably isn't the best strategy for availability. If you're just playing around then it's probably not a big deal (except that you'll still have to satisfy the IANA requirement).
You're ultimately looking to set the DNS server delegation at the registrar for the affected domain names to the DNS servers you're hosting. The text of the error that the registrar's "control panel" is giving you would probably be helpful in telling you why the registrar is denying your attempt to change the DNS server delegation to your own machine.
You will also need to open UDP and TCP port 53 through your firewall to the DNS server machine as you suggest in your question.
The Microsoft DNS server can be the authoritative DNS server for an arbitrary number of domains, so you can host "mydomain.local" along side "mydomain.com" and "mydomain.ca". Records are not replicated between domains, though, so if you create a "sub1.mydomain.com" domain that will not cause a "sub1.mydomain.ca" domain to exist automatically. Any replication like that you'd need to work out yourself w/ scripts, etc.
share|improve this answer
Your answer is good, but I think I have to clarify my intentions a bit, maybe what I'm trying to do isn't what I'm wanting to do. My plan is to have a domain mydomain.com that i can distribute the subdomains myself, for mostly my own personal use (so things like redundancy aren't important). I wanted to use my domain controller at home to route traffic based on what subdomain is given. My current setup is one machine with a few vm's on it, so if I have mail hosted on my linux box, I wanted to route mail.mydomain.com to that server directly, and other such things, can I do this easily? – Tylor Feb 2 '11 at 18:11
@Tylor: What you're talking about, in terms of "routing" traffic for hostnames in the "mydomain.com" domain to your home computers is just creating "A" records (MX records for email, etc) in the "mydomain.com" DNS zone hosted by your current DNS servers. No DNS server delegation would be necessary. – Evan Anderson Feb 2 '11 at 18:16
@Evan-Anderson The problem is that the servers will all be on the same internet facing ip, now if I were to say have 3 web servers, all wanting to be run on www.mydomain.com, web2.mydomain.com, and web3.mydomain.com would I just have to put each web server on a different port? I've noticed internally using DNS I can route subdomains to specific local IPs, and that's what I was hoping to do. Even if the windows server just caught the subdomain calls and routed them, that would be fine too, but I assumed I needed to make it a full name server to do this. – Tylor Feb 2 '11 at 18:37
@Tylor: HTTP host headers can help you host multiple web sites on the same IP address sharing the same TCP port 80. Unfortunately, if you only have a single public IP address then you only have a single public IP address. DNS takes care of resolving hostnames to IP addresses, and any services you'll be hosting behind that same public IP will all have to resolve to that public IP. That means, in effect, you only have one set of TCP ports to host services from, and no amount of DNS haggling is going to give you more. – Evan Anderson Feb 2 '11 at 19:04
@Evan-Anderson Okay, thank you very much – Tylor Feb 2 '11 at 19:17
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/5265
|
Take the 2-minute tour ×
I have recently renamed a SharePoint 2010 server and have been experiencing some odd errors. Mostly the site works but when I try to run the Sharepoint Configuration Wizard or access some Service Account settings under CA, I get error thrown.
After checking the log file I see messages referring to the User Profile Service...
The server has been renamed and added to the domain so the problems may have been caused by either of these things.
share|improve this question
1 Answer 1
up vote 0 down vote accepted
You need tell SharePoint that your server has been renamed.
Use powershell: Rename-SPServer [-Identity] -Name
Afterwards do an IISRESET
Afterwards you may want to look at your alternate access mappings and such. '
Let me know how you go.
share|improve this answer
Yeah, I had renamed the server already and had fixed up AAMs so the issue wasn't with those things. On top of these errors, the Sharepoint 2010 Configuration Wizard would fail to run as well as I thought I could use this to fix the farm and service accounts. – Sambo Apr 10 '11 at 13:37
...in the end I recreated the farm. – Sambo Apr 10 '11 at 13:37
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/5266
|
Take the 2-minute tour ×
Not so long ago I did setup my development server on vmware. Currently I'm using ubuntu server. Yesterday when I was trying somethings with php mail() function it didn't work. I got curious. Well for one I went to google. Okey. So I need sendmail program. Then I edited php5/apache2/php.ini file. Set path to sendmail -t -i and restarted apache2 server. Great mail is sent, but nothing was received.
So a coworker said, that I also need a mail server. So now there's a question, what would be the best choice if there is such.
Read this article Setup ubuntu server to send mail(). Can't say much. Would like to hear other opinions if there are any.
Thanks a lot.
share|improve this question
closed as not constructive by Sven, gravyface, jscott, Cakemox, MDMarra Apr 23 '11 at 14:07
Can you explain what you're trying send via email? ie. outbound only, various website notices, password reminders, registration confirmation, etc.? If you're sending out as yourdomain.com, are you also expecting to receive replies to yourdomain.com on the same server, or is there another authoritative mail server somewhere else? – gravyface Apr 22 '11 at 14:09
Currently I'm on local server and I'm trying to create error reporting for me. It should be in my understaing only outbound, but later on same code will go in production. – Eugene Apr 22 '11 at 17:01
Can you answer my comment in greater detail please? There's many different ways you can configure a Mail Transfer Agent (MTA) like Postfix, qmail, exim, etc. – gravyface Apr 22 '11 at 17:06
@gravyface I don't expect to receive replies. Is this what you asked about? – Eugene Apr 22 '11 at 17:15
5 Answers 5
up vote 1 down vote accepted
Not really clear from the question whether or not you already have a mail service set up somewhere to receive these emails. I'm going to assume that your organization has one or that you're sending it to Gmail/Yahoo/Whatever.
We've had very good results with the default Ubuntu exim4 on servers that can simply forward their email elsewhere for safekeeping. Our customer-facing LTSP servers only use it for crontab'd script output and Logwatch.
We use Exim on those forwarding boxes because that's what Ubuntu installs by default with mailutils. Running dpkg-reconfigure exim4-config and it's a mere 30 seconds of configuration work to point it at the main server.
easy peasy.
share|improve this answer
Any example(exim4)? Because currently all examples from internet, that I found don't help. Current config is Oracle VirtualBox and Ubuntu 12.04.02 LTS. Maybe something is blocking in background? – Eugene Jul 8 '13 at 15:15
I won't call it the best, but I like postfix a lot... It is powerful and easy to configure, which is important for security purposes. When it installs, you will get an alias to it as sendmail, so scripts that work with sendmail should be fine under a postfix install.
UBUNTU / DEBIAN TUTORIAL for outbound mail with local delivery:
(as root)
aptitude install postfix
# OR, if already installed....
dpkg-reconfigure postfix
# Select "Internet host".
# Accept defaults
echo "a test from me" | mailx -s "postfix test" [email protected]
If your ISP blocks port 25 outbound, configure relayhost = <hostname_of_your_isp_mailserver> in /etc/postfix/main.cf and restart postfix.
Older linux admins tend to use mail, but Ubuntu has renamed mail as mailx
share|improve this answer
Okey. So I guess, that from all of this help.ubuntu.com/community/MailServer, I need only this help.ubuntu.com/community/Postfix and it should be enough to get it up and running? – Eugene Apr 22 '11 at 10:46
@Eugene, That tutorial sets you up for inbound and outbound mail... If all you want is outbound mail, it asks you to do too much work. – Mike Pennington Apr 22 '11 at 10:58
@Mike Pennington no worries. Thanks a lot. I won't just yet set your answer as the answer. Hope to here some other opinions. But really thanks. – Eugene Apr 22 '11 at 11:11
@Eugene, if you still have sendmail running, I would disable that while you figure this out. If you have a misconfigured mail server, it might be operating as an open relay. – Mike Pennington Apr 22 '11 at 11:15
@Mike I did as you proposed sudo /etc/init.d/sendmail stop and also after light reading sudo update-rc.d sendmail disable. Also did most of the things written here help.ubuntu.com/community/Postfix, but that didn't help either. Mail isn't still comming. – Eugene Apr 22 '11 at 14:11
You want to be able to receive email? Then you need something that will accept email into a mail box. Although this is for Debian, there isn't much difference between it and Ubuntu. It includes a full setup of Postfix and Courier.
Setup Mail server
I find that HowToForge has many great setup guides for the Linux community.
There are other equally good SMTP and MAilStores, but this is the better supported setup from the Ubuntu community. Other SMTP servers include Exim and Sendmail. Another MailStore includes Dovecot.
share|improve this answer
I've asked for more details, but I'm going to bite here:
For most Web applications/sites I setup that need to send mail (and again, this isn't necessarily the best way to scale, but my stuff is usually low-load with < 100 concurrent users), I use Postfix on the same box as Apache/PHP.
Because I'm usually dealing with a domain that already has MX records and an authoritative mail server somewhere else, I'll either relay it through that authoritative mail server as a smarthost (usually the easiest method) or set it to send outbound only directly and make sure that the SPF records are updated accordingly and that the public IP address I'm (usually) NAT'ing out as has reverse DNS setup.
If you do end up sending it directly, make sure your banner that's displayed from Postfix has mail.yourdomain.com and that you have an A record setup that resolves to the public IP that Postfix is listening on. This shouldn't be necessary, but there's alot of odd anti-spam vigilance out there. I'd also setup [email protected] and [email protected] as well; these can be aliases/forwarders to your real email address, but again, I've seen some mail servers try to reconnect and issue a rcpt to from the address that mail is sent as in the header and if it doesn't exist, you'll be black/graylisted.
If you don't have an authoritative mail server, you could setup Postfix and Dovecot for IMAP support, but you'll likely have an easier/more reliable experience setting up Google Apps for your Domain for free and relaying mail off of their servers. As long as you don't plan on sending massive amounts of mail, this works really well and gives you a nice interface for adding email addresses.
Note: I'm finding that increasingly receiving mail servers/anti-spam configurations are setup to drop SMTP traffic originating from Amazon's EC2 block and other commodity hosting providers (HostGator, Dreamhost, etc.), so again, setting up a secure relay to your authoritative mail server is likely the best option.
share|improve this answer
Not saying that it is the "best" but I like qmail a lot, espeacilly for its security and modularity. qmail is built in the Unix way: one small task is handled by a simple process and ali tais processes interact with each other.
Hope this helps!
share|improve this answer
|
global_05_local_5_shard_00000035_processed.jsonl/5267
|
Take the 2-minute tour ×
Is there a free proxy-server service that I can configure my computer (Windows 7) to connect to the internet through?
I'd like to test some networking software that we are developing between two computers in the same office... yet have the connections go through a proxy (preferably far away).
Is there any easy way to do this? (And how would I go about configuring it? I've never used proxy before.)
share|improve this question
What are you trying to test/achieve by doing this as there maybe other alternative. – Sim Oct 28 '09 at 2:02
2 Answers 2
up vote 2 down vote accepted
You could try doing a Google search for free proxy servers and pick ones that suit you.
You then have to go into your browser settings and configure it to use the proxy server. Assuming you are using IE on Win 7 the steps would be:
• Tools Menu -> Internet Options
• Connections Tab and then choose LAN Settings.
• Select "Use a Proxy Server for your LAN" and enter the appropriate server and port details.
However be careful as you will now be sending ALL your internet traffic to an unknown and untrusted machine which you have no control over.
share|improve this answer
Will this send all information (even that not sent through the browser) through the proxy server? – George W Bush Oct 28 '09 at 17:48
If you are using IE then yes it will send all info for apps that use IE's internet proxy settings. – Sim Oct 28 '09 at 22:10
If you have SSH access to a computer on a remote network you can use SSH to create a SOCKS proxy over a tunnel between you and the remote host. You would then configure your browser to use your local host as the SOCKS proxy.
To set up a SOCKS proxy connection you will initiate an SSH connection from your local machine. The two best methods, depending on your local OS are to either use the ssh command or PuTTy (for Windows). To use the ssh command, open a terminal and type:
ssh -D 8080 [email protected]
To use PuTTy, open PuTTy and specify the host to connect to, then expand the Connections branch on the left. Finally expand SSH and click Tunnels. In Source Port specify a port number greater than 1024 and select Add. If you'd like to save your connection you can go back to the Session branch, specify a name under Saved Sessions and click save, then click Open.
Most browsers allow you to specify a proxy server to route traffic through. In Internet Explorer go to Tools -> Internet Options and click the Connections Tab, then LAN Settings and configure the Proxy settings using localhost for the hostname and the port you chose above.
In FireFox the best add-on I've found for managing proxies is FoxyProxy. If this is just a one time thing though go to Tools -> Options -> Advanced. Click the Network tab and click the Settings button under Connection. Select the Manual Proxy Configuration radio button and fill in the information for your proxy, again using localhost for the hostname and the port you chose above. If you don't want to proxy all of your protocols you can leave them blank and they will route normally.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/5274
|
Deficiencies in the Twitter Archive
There are a number of deficiencies. Of course, it's impossible to please all the people all the time but, in typical Twitter fashion, they don't appear to have taken the effort to satisfied anyone.
Let's take a quick run through of where the archive breaks down.
Usernames Change
When I first signed up to Twitter, I was known as "Vodaclone". What a witty and original name! I took advantage of Twitter's ability to change screen names a few months after joining.
Yet all the tweets are written as though they come from @edent.
Profile Picture Changes
Like many people, I update my avatar. According to the Twitter archive - I've used the same one since the dawn of time.
Twitter Archive
It's sad that there doesn't appear to be any record of the faces I pulled or the banners I added.
Missing Media
Indeed, it's odd that the avatar images aren't linked to the originals. What's more annoying is that the images I've uploaded to Twitter's image service aren't included. My archive of ~28,000 Tweets weighs in at 6MB - while adding in dozens of images would balloon that - it's couldn't be a huge strain on Twitter's resources.
I used grep to extract all the media_url parameters, then used wget to download them all. My 370 images took up a mere 33MB.
Remember all those cool Tweets you favourited? They're not here.
No Direct Messages
Twitter has gone to great lengths to try and kill off its DM service. Once it realised that people were using the service in a way which wouldn't force them to interact with advertisers, they've made it steadily harder to access private messages.
They are, of course, complete absent from the archive. Hopefully all the meaningful DMs which were sent to you are backed up in email somewhere - but the ones you sent are nowhere to be seen. Good luck future scholars of the world!
Lack of Thread Context
A typical tweet from 2010 reads
What was Amanda saying? The only way to find out is to go on to the Twitter website and see the thread in question. The archive doesn't include any of the replies people sent you.
Ideally, Twitter could have included the complete conversation threads in the archive. Twitter's threading tools are notably abysmal. The lack of being able to search for tweets via the "in_reply_to" metadata makes understanding conversation threads particularly troublesome.
No Updated Metadata
I remember sitting down with Twitter's developer relations guy - Raffi Krikorian - at WarbleCamp (this was back when Twitter cared about developers). We thrashed out some of the ideas around Entities and how they could be useful to the developer community.
One of the things which never happened was "backporting" entities. Tweets which were made before entities were switched on are stuck with no metadata. So if you're trying to examine your archive for hashtags, links, etc - you'll have a hard time.
A perfect example is this early tweet about Twitter annotations. Even on the Twitter website, the URL isn't automatically linked.
Comparisons to Other Services
Facebook, for all its failings are pretty good at giving you an archive of all your content. Given the complexities of their databases, it's not surprising that it's a bit mangled - but it's there. You get all the photos and videos you uploaded as well.
Yes, it's great that Twitter has finally kept its word on data extraction - but this really feels like an underwhelming effort.
So, it looks like I'll have to write a tool to download all the missing tweets, conversations, photos, favourites, and DMs. I'll also need to write a script which reformats the metadata on old posts to ensure they are compatible with new ones.
Then dump everything into a database, or series of flat files.
Of my 28k Tweets - around 12k are replies to other tweets. How very sociable of me! Twitter rate limit their API to 150 queries an hour. So it will take around 4 days to get all the tweets to which I've replied. Of course, then it becomes a recursive issue (I have to see which of those are replies, and which of those replies are replies etc). So, probably a week.
Fun times ahead.
One Comment
What do you reckon?
|
global_05_local_5_shard_00000035_processed.jsonl/5287
|
Follow Slashdot stories on Twitter
Forgot your password?
Comment: Re:Why do this in the first place? (Score 1) 90
I don't think SpiderMonkey/Gecko are the villains here. Specs are in order to reach a price point.
Profit margins on a $25 device are zilch, so manufacturers need to cut corners by releasing products unsuited to a 2015 era OS. Try running iOS 8 or Android 5 on a handset with 128MB and a Cortex A5 CPU - that's a phone released in 2014 with specs equivalent to an iPhone 1 or a Nokia 97 from last decade.
By comparison on better hardware - Performance on their reference phone, the Flame, is decent. ZTE are releasing the Open-L this month with a quad core Snapdragon 210. Hardly iPhone 6 territory but still - The previous model has been retailing for about $US77 here in Australia. When my Flame breaks I'll willingly shell out the dough...
Comment: Re:Counter attack (Score 1) 227
by ChunderDownunder (#49761017) Attached to: Google Developing 'Brillo' OS For Internet of Things
I'd rather JanOS gain traction.
The video from the JSConf is fun. A "software guy" smashes open his €60 phone to extract the main board, fully scriptable from JavaScript accessible via the Firefox development tools.
This could see a hobbyist after-market for phones with cracked screens... Built in wifi, bluetooth, GPS, 4G, camera etc.
Comment: Re:Sudafed (Score 2) 333
Next Australians will be stopped at airport security for smuggling.
Security Goon: "We detected a suspicious dark slurry in your luggage"
Bloke: "Strewth mate, I'm not stupid enough to bring drugs into a country, with the tragic deaths of Chan and Sukumaran..."
SG: "The canister gave off a salty odour. We fed a sample to our narcotics canine Charlie, who is now convulsing on the floor"
Bloke: "Sorry um that's just my Vegemite. I have it on toast for breakfast"
SG: "You eat that stuff? Surely not!"
Bloke: "Honest to Warnie, I swear. Got any bread on ya?"
SG: "(sniffs and dry retches) No one could stomach that!"
Security Goon 2: "Chemical analysis reveals a high concentration of morphine. Lock him up for ten years"
Comment: Re:Maybe people are not desperate (Score 2) 294
Here's a coverage map -
Most of the population centres, it seems.
I wonder if they have managed to produce any *decent*, affordable Android phones out of Tierra del Fuego yet. That silly electronics tax that just hikes up the prices of international brands, so I'd be curious if they have produced quality tech competitive of what's coming out of Asia. They have the same 240V wall sockets as here in Australia - so I could use my electrical devices there but allegedly the wiring was crippled slightly different to disallow exporting Argentinian goods to Australia without regulatory oversight? Well it's all micro-usb now anyway, at least for phones...
Comment: Re:PDF retains the layout (Score 1) 200
by ChunderDownunder (#49695823) Attached to: Ask Slashdot: What Is the Best Open Document Format?
PDF is a print format, which is fine if your audience is going to print it out on a piece of A4 paper - though I think yanks have their own standard. :)
But they don't generally reflow. e.g. Viewing a document formatted for portrait on landscape monitor, journal articles with multiple columns, reading on a 4" smartphone are challenges for reading onscreen.
Money cannot buy love, nor even friendship.
|
global_05_local_5_shard_00000035_processed.jsonl/5288
|
Federal budget cuts shut down Earth monitoring projects
05/22/2013 | Nature (free content)
Federal budget cuts known as sequestration are shutting down some Earth monitoring projects by the U.S. Geological Survey including stream gauges and snowpack measurement. So far, 50 storm gauges are being closed and 100 others may be at risk. Researchers worry the shutdown could affect climate-change studies.
View Full Article in:
Nature (free content)
Published in Brief:
SmartBrief Job Listings for Education
Job Title Company Location
Director of Professional Services
Engaging Schools, Inc.
Cambridge, MA
Principal at Timberland Charter Academy
Timberland Charter Academy
Muskegon, MI
VP - Partnership Operations
Discovery Communications
Silver Spring, MD
Principal at Hamtramck Academy
National Heritage Academies
Hamtramck, MI
Technical Assistance Associate (8330)
American Institute for Researcher
Chicago, IL
|
global_05_local_5_shard_00000035_processed.jsonl/5297
|
Recent changes to Comix 3.6.2 released changes to Comix 3.6.2 releasedenWed, 31 Jan 2007 15:44:02 -0000Comix 3.6.2 released<div class="markdown_content"><p>Comix is a user-friendly, customizable image viewer. It is specifically designed to handle comic books, but also serves as a generic viewer. It reads images in ZIP, RAR or tar archives (also gzip or bzip2 compressed) as well as plain image files. It is written in Python and uses GTK+ through the PyGTK bindings. </p> <p>Version 3.6.2 adds a Japanese translation by Mamoru Tasaka.</p> <p>Read more at <a href=""></a></p></div>Pontus EkbergWed, 31 Jan 2007 15:44:02 -0000http://sourceforge.netcae155148a660cec92896742825ea8ef711bf847
|
global_05_local_5_shard_00000035_processed.jsonl/5326
|
Take the 2-minute tour ×
I have two repos and made a .patch file from one. Inside it the path looks like this:
a/views/filename b/views/filename
I made the patch file by checking out the branch and running git format-patch -number for the commits I needed. The files look to have the diffs I need, and the relative paths look correct.
However, when I try to git am --signoff the patch in my other repo (which has a different absolute structure but same relative structure) from the same relative position, I get an error like:
error: views/filename: does not exist in index
Any help?? Thanks!!
share|improve this question
Can you add the first 10 lines of your patch ? – gracchus Apr 18 '12 at 17:28
Your Answer
Browse other questions tagged or ask your own question.
|
global_05_local_5_shard_00000035_processed.jsonl/5327
|
Take the 2-minute tour ×
I am looking at developing an app that will make use of Facebook and have a question. In order for the app to work it would need to not only access the user's friends list, but also the user's friends' friends list and beyond. It would only access the users who have also signed up to the app. Thanks in advance Samy
share|improve this question
1 Answer 1
up vote 0 down vote accepted
And your question is …? :-) If you want to know if it’s possible to get that information – well, as long as the friends have authorized your app, there should be no problem, even over several „levels” of friends.
share|improve this answer
Sorry after all that I forgot to ask the question ! Yes that's correct, thanks for the answer. – Samy Kamel Jun 2 '12 at 22:35
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/5328
|
Take the 2-minute tour ×
I'm new to ember and am still getting my sealegs under me with the framework. So far I think its great, except there is one thing that I can't seem to figure out: how to bind a property of an array item to a property of an adjacent array item.
My model is like so:
App.SRDate = Ember.Object.extend({
timeValue: null,
reductionAmount: null,
id: null,
index: null,
date: Ember.computed(function(){return formatted date as a string}).property('timeValue') ,
previousDate: ???
And I have a simple arraycontroller that just holds a list of the above objects. What I am trying to do is be able to call App.dates.objectAt(1).get('previousDate') and have it return App.dates.objectAt(0).get('date'). I got it to kind of work initially by using a computed property for the previousDate, but it would only update when I changed an item in bound object (i.e. if I changed the date for object 0 it wouldn't update in previousDate for object 1 until I changed the date in object 1, which caused ember to re-evaluate the computed property). If there is a way to define what objects a computed properties are associated with, then that would probably do the trick, however I don't think that is what computed properties are really supposed to be used for...
I also tried a binding like:
previousDateBinding: 'App.dates.getObject('+this.get('index')-1+').date'
but that didn't work either.
Thanks in advance for any help with this.
share|improve this question
Could you provide more details as to what you're trying to do that requires you do this? – ebryn Jun 12 '12 at 2:25
Ya I'm working on a score system for an online testing platform. Basically it is to allow a professor to set it up so that students can take a test for a certain amount of time for full credit, then be able to take it for a amount of time for 80%, then an amount of time for 60% etc. The previousDate reference above will be used in the ui for this, so it will basically say: "From {{previousDate}} to {{date}} remove {{reductionAmount}} points". I can probably use some sort of view helper to perform the same action, but initially figured it might be easier to do it this way.Thanks for the help – AWTrost Jun 12 '12 at 19:02
Also on the first item in the array, previous date would return the final day to get full credit. – AWTrost Jun 12 '12 at 19:13
Honestly it sounds like you should create intermediate objects that have the properties you'll be outputting rather than trying to do this in your controller. – ebryn Jun 13 '12 at 15:31
Would that break the live binding? or is their a way to make an object with parameters like dateBinding: 'App.objectAt(1).date', previousDateBinding: 'App.dates.objectAt(0).date' – AWTrost Jun 13 '12 at 19:21
1 Answer 1
up vote 0 down vote accepted
Just had a similar problem, here's how I solved it: http://jsfiddle.net/aMQU6/1/
In my ArrayController, I have a function that observes changes to my content. Then once it is added, I set a property in the new object to be the previous object, then bind the previous object's date to the previousDate property in the added object.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/5329
|
Take the 2-minute tour ×
I'm experimenting with CMake a bit for a C++ repository, but I'm running into some trouble trying to make it easy to build applications against libraries in the same source tree without a lot of extra CMake code.
The layout of the source tree is basically the following:
The libraries are independent of one another, and the applications may link against one or more of the libraries.
Currently I have a root CMakeLists.txt that lists out each application and library as a subdirectory so that if the library is changed and the application is rebuilt, so is the library. This works fine and CMake links it in without me having to specify where the library lives, but I don't see a way to do something similar for include directories.
Is there a common way to handle this? I'd prefer not to have each application's CMakeLists.txt have to manually list out the path to the libraries it needs.
share|improve this question
1 Answer 1
If you are not afraid of making more headers available than you actually need for each application, you could list all lib directories in an INCLUDE_DIRECTORIES statement e.g. in the CMakeListst.txt adding all application sublists. But there is no such concept of managing "belonging" include folders per target built-in.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/5330
|
Take the 2-minute tour ×
I have this site here: http://msdn.microsoft.com/en-us/library/jj164022(v=office.15).aspx
the text in some part says: The following JavaScript code demonstrates how to make this GET request that returns a JSON representation of all of a site’s lists by using JQuery. It also assumes that you have a valid OAuth access token that is stored in the accessToken variable. You do not need the access token if you make this call from inside an app web, as you would in a SharePoint-hosted app.
url: http:// site url/_api/web/lists,
type: "GET",
headers: {
"Authorization", "Bearer " + accessToken
the specific question is how can I get the access token??
share|improve this question
2 Answers 2
up vote 1 down vote accepted
Your entire approach is incorrect. When it comes to accessing the REST services of a sharepoint 2013 server using javascript you don't need an Access Token. You have to use the Sharepoint 2013 cross-domain library instead.
The page at http://msdn.microsoft.com/en-us/library/jj164022.aspx explains after showing a classic REST request using an oauth token:
This request would look a little different if you are writing your app in JavaScript but using the SharePoint 2013 cross-domain library. In this case, you don’t need to provide an access token. The following code demonstrates how this request would look if you are using the cross-domain library and want to receive the OData representation of the lists as XML instead of JSON. See How to: Access SharePoint 2013 data from remote apps using the cross-domain library for more information about using the cross-domain library.
This is currently the url to that article http://msdn.microsoft.com/en-us/library/fp179927.aspx
This should be your correct answer
share|improve this answer
How do you generate a token for apps/services accessing SharePoint lists via REST? – AnimaSola May 14 '14 at 3:08
@AnimaSola I don't know that... I searched for that answer myself a lot. Oauth seems to be used only for Sharepoint Apps. What I did end up doing was to authenticate the rest calls using the sharepoint clasic flow: present a webview to the sharepoint page indicated by user, grab the FedAuth and rTfa cookies after user authenticates with Microsoft, and attach them with every rest call – Radu Simionescu May 14 '14 at 8:05
There doesn't seem to be a way to get the access token only using JavaScript. You need to use an app to generate the access token. See the Sharepoint OAuth Tips and FAQs for more information about how to get the token.
share|improve this answer
In that case how we can access REST API in client like Android or iOS devices ? – Altaf Patel May 16 at 9:01
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/5331
|
Take the 2-minute tour ×
I have set up my production server with passenger and nginx by basically doing this (its Ubuntu 11.04)
1) Install and configure RVM
2) Install Ruby 1.9.2
3) Install Rails 3.2.6
4) Install Passenger
5) Run passenger-install-nginx-module
6) Configured nginx.conf appropriately
Now, when I deploy my app I do the usual stuff:
1) update_code
2) precompile assets
3) touch tmp/restart.txt
The first time I start up my app I invariably get "We're sorry, but something went wrong."
If I run WEBrick with "rails server -e production" the site loads fine at port 3000. After I've done this everything loads fine via nginx, and I can there are no problems with the app and it loads to my heart's content.
But if I redeploy again, update the code etc as mentioned above, same problem. I need to run WEBrick one time for the passenger-nginx setup to serve the app. And this is driving me crazy. I have no idea why the app doesn't load by itself, and what could WEBrick possibly be doing when it loads that is causing it to then make Passenger work? Help!
share|improve this question
You should check the Nginx log file and the production.log and find out what exactly is the problem. One general hint: If you are ssh'ing into the server you are using user-specific environment settings Nginx is not able to use if it's started as a system service. – iltempo Nov 9 '12 at 8:24
Thanks, you nailed it. Wrong user permissions. I edited the user line in nginx.conf and that seemed to fix it. Though still seems strange that it would work after launching WEBrick, no? – user1594803 Nov 9 '12 at 12:05
Your Answer
Browse other questions tagged or ask your own question.
|
global_05_local_5_shard_00000035_processed.jsonl/5332
|
Take the 2-minute tour ×
I am trying to add the tab to a page I am admin of. I use the url to do that - http://www.facebook.com/dialog/pagetab?app_id=&next=.
Facebook shows a list of all the pages I am admin of. And that drop down has no specific sorting order.
Now my problem is - I have multiple pages with same page name. They ofcourse have different urls. I tried changing the name of pages, but due to high number of likes I can't change the names.
The only option I am left with is hit & Trial. And I have to do it for more than 30 apps.
So you understand my pain point.
Please advice any alternative.
Thanks Pankaj
share|improve this question
1 Answer 1
I would recommend writing down the page ids and making some sort of system for yourself to remember (perhaps only the last few digits) which page is which.
In any case, there is a way for you to add a tab application directly to a page without ever seeing that "Add Page Tab" dialog. You can do it all through the API. This means you'll need your pages access token so head on over to the Graph API Explorer, make sure you click the "get access token" button and mark the manage_pages permission.
1. You need to query /me/accounts to get a list of all the pages you administer.
You'll see a list with the page id, name, category... I hope you will be able to identify your page more easily here. Once you have, you'll need to get the access_token for that page. Keep a record of it - we'll need it in a few minutes. You'll also need the page id.
2. Modify the following URL to include the parameters we got previously -
Navigate to that URL and if all goes well, you'll get a simple true message indicating that the action was successful.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/5333
|
Take the 2-minute tour ×
I am relatively new to matchers. I am toying around with hamcrest in combination with JUnit and I kinda like it.
Is there a way, to state that one of multiple choices is correct?
Something like
assertThat( result, is( either( 1, or( 2, or( 3 ) ) ) ) ) //does not work in hamcrest
The method I am testing returns one element of a collection. The list may contain multiple candidates. My current implementation returns the first hit, but that is not a requirement. I would like my testcase to succeed, if any of the possible candidates is returned. How would you express this in Java?
(I am open to hamcrest-alternatives)
share|improve this question
2 Answers 2
up vote 36 down vote accepted
assertThat (result, anyOf(equalTo(1), equalTo(2), equalTo(3)))
From Hamcrest tutorial:
Moreover, you could write your own Matcher, what is quite easy to do.
share|improve this answer
Thanks, dude. Saved my life. – ViniciusPires Sep 8 '14 at 22:06
marcos is right, but you have a couple other options as well. First of all, there is an either/or:
assertThat(result, either(is(1)).or(is(2)));
but if you have more than two items it would probably get unwieldy. Plus, the typechecker gets weird on stuff like that sometimes. For your case, you could do:
assertThat(result, isOneOf(1, 2, 3))
or if you already have your options in an array/Collection:
assertThat(result, isIn(theCollection))
share|improve this answer
Hmmm... for some inexplicable reason my Eclipse environment (which is only about 6 months old) has an ancient Hamcrest library and I don't get these goodies. – CurtainDog Jun 27 '12 at 6:50
Thank you for mentioning isOneOf() . Didn't know about that. – asmaier Aug 31 '12 at 14:45
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/5334
|
Take the 2-minute tour ×
I have a list of instances of a class A
class A:
def __init__(self,ox,oy):
Now I need to find out the instance in the list which has y' as non-zero - and apply that value to all the other members in the list.
It is given that only one unique member will have y as non-zero.
With the usual for-loop we would need to iterate the list twice - with or without comprehension.
Is there a way to achieve this any better.
I have not used filter and map much but feel there may be a better option.
Help is appreciated.
share|improve this question
What if there were multiple instances of A with y as non-zero? – Thrustmaster May 19 '13 at 4:32
in my solution I just "assumed" he wanted only the first one ... – Joran Beasley May 19 '13 at 4:35
2 Answers 2
No, there isn't. At least two loops would be required no matter how it was implemented.
share|improve this answer
wouldnt my solution above only require a single iteration ? – Joran Beasley May 19 '13 at 4:34
@JoranBeasley: Of a, yes. – Ignacio Vazquez-Abrams May 19 '13 at 4:35
import numpy
a = numpy.array([[3,0],[5,0],[7,3]])
zero_mask = a[:,1] == 0
a[zero_mask] = a[~zero_mask][0]
unfortunately it does not use your A class ...
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/5335
|
Take the 2-minute tour ×
I'm starting a new project with symfony which is readily integrated with Doctrine and Propel, but I of course need to make a choice.... I was wondering if more experienced people out there have general pros and/or cons for going with either of these two?
Thanks a lot.
EDIT: Thanks for the all the responses, useful stuff. There's no truly correct answer to this question so I'll just mark as approved the one that got the most popular up-votes.
share|improve this question
Guys, are there any updated responses? Seeing that this way out of date – Qiniso Jan 23 at 17:23
8 Answers 8
up vote 51 down vote accepted
I'd go with Doctrine. It seems to me that it is a much more active project and being the default ORM for symfony it is better supported (even though officially the ORMs are considered equal).
Furthermore I better like the way you work with queries (DQL instead of Criteria):
// Propel
$c = new Criteria();
$c->add(ExamplePeer::ID, 20);
$items = ExamplePeer::doSelectJoinFoobar($c);
// Doctrine
$items = Doctrine_Query::create()
->from('Example e')
->where('e.id = ?', 20)
(Doctrine's implementation is much more intuitive to me).
Also, I really prefer the way you manage relations in Doctrine.
I think this page from the Doctrine documentation is worth a read: http://www.doctrine-project.org/documentation/manual/1_2/en/introduction:doctrine-explained
To sum up: If I were starting a new project or had to choose between learning Doctrine and Propel I'd go for Doctrine any day.
share|improve this answer
In Propel 1.5, this query can also be written as Example_Query::create()->joinWith('FooBar')->filterId(20)->find() (or findPK(20) after the joinWith if Id is your primary key). As you can see, it takes the nice syntax from Doctrine, and adds a bit more. The release is planned for the end of Q1 2010, but you can test it now in your Symfony projects. – Jan Fabry Jan 15 '10 at 7:24
Nice input, I didn't know that :-) – phidah Jan 15 '10 at 10:10
doctrine implementation seems much more complex to me. Get Entity manage get repository... this and that – Somesh Mukherjee May 9 '13 at 11:43
I am biased, since I help a little bit on the next release of Propel, but you must consider that Propel was indeed the first ORM available, then lagged a bit when Doctrine got created, but now has active development again. Symfony 1.3/1.4 comes with Propel 1.4, where most comparisons stop at Propel 1.3. Also, the next release of Propel (1.5) will contain a lot of improvements, especially in the creation of you Criteria (resulting in less code for you to write).
I like Propel because it seems to be less complex than Doctrine: most code is in the few generated classes, whereas Doctrine has split up the functionality in lots of classes. I like to have a good understanding of the libraries I am using (not too much "magic"), but of course, I have more experience with Propel, so maybe Doctrine is not so complicated behind the scenes. Some say Propel is faster, but you should check this for yourself, and consider whether this outweighs other differences.
Maybe you should also consider the availability of Symfony plugins for the different frameworks. I believe Propel has an advantage here, but I don't know how many of the listed plugins are still up-to-date with the latest version of Symfony.
share|improve this answer
The new query improvements in Propel 1.5 are really nice indeed. – Tom Jan 14 '10 at 21:08
It should be noted Doctrine 2 is currently in development released [ed] and functions almost completely different from the current stable version of Doctrine 1. It relies on the Data Mapper pattern instead of Active Record, and uses an 'entity manager' to handle persistence logic. When released it will bear closer resemblance to Java's Hibernate (Doctrine 1 is more like Rails' ActiveRecord).
I've been developing with the alpha release of Doctrine 2, and must say it is heads and shoulders above Doctrine 1 (just my opinion, and I've never used Propel). Chances are good that the Doctrine community will move toward it when it's released.
I would encourage you to check out Doctrine, but if you prefer the Active Record style that Propel and Doctrine use now, you might want to just stick with Propel.
share|improve this answer
wow... thanks for the insight. – Tom Jan 17 '10 at 10:09
A stable version of Doctrine 2 was recently released. doctrine-project.org/blog/doctrine2-released – Trevor Allred Jan 4 '11 at 2:35
It comes down to personal preference. I use Propel because (among other things) I like the fact that everything has its own concrete getter & setter method. In Doctrine, this is not the case.
echo $person->getName();
$person->name = 'Derek';
echo $person->name;
The reason I like having getters & setters is that I can put all kinds of logic in them, if I need to. But that's just my personal preference.
I should also add that although Propel was slow-moving in the past, it is now under active development again. It has released several new versions in the past few months. The most recent version of Propel includes a "fluent query interface" similar to Doctrine's, so you don't have to use Criteria anymore if you don't want to.
share|improve this answer
in Doctrine you can override setters and getters for each property and also have custom logic (see doctrine-project.org/documentation/manual/1_2/en/… - search for ATTR_AUTO_ACCESSOR_OVERRIDE to get to the relevant section) – Marek Karbarz Jan 20 '10 at 2:21
That looks ok, but you still set the property by calling: $x->propname = 'abc'; This is problematic because it doesn't appear to support passing multiple parameters. – lo_fye Jan 20 '10 at 17:11
The two references are somewhat outdated so you nevertheless cover some generalities, basically you'd have to evaluate your experience with the framework as such, a major drawback to doctrine is the inability to have an IDE that lets you auto-code in that propel is a winner, learning curves propel and doctrine are very different, it is easier to propel, if your project will need to manage complex data model uses doctrine, if you want to work quickly with an ORM which is best documented and find more support in Propel Internet uses, is much more mature and I believe that most used.
share|improve this answer
In the symfony world it seems that Doctrine is definately the most used - especially for newer projects. There are of course a lot of sf 1.0 projects that still use Propel because Doctrine wasn't available for symfony until 1.1. – phidah Jan 14 '10 at 6:58
I'm not a user of PHP 5 non-framework ORM, but here's some good comparison posts (in case you haven't seen them yet):
Both conlusion favorite towards Doctrine as a newer generation of ORM for Symfony.
share|improve this answer
Just ran across this one: propel.posterous.com/how-fast-is-propel-15#more -- very interesting... – Mike Crowe Apr 7 '10 at 14:46
For the record, this comparison is totally outdated - current version of Propel does use PDO, does use support many-to-many relationships, and has great documentation. Also worth considering: some of us prefer the verbose criteria-builder query-style over proprietary query languages like DQL - it has IDE support, and it's a class, so you can extend it. I'm still trying to choose, but I see a lot of plus'es for Propel over Doctrine, if you don't mind static code-generation and can see the advantages of "real" PHP code as opposed to proprietary query-language, which is just strings to an IDE. – mindplay.dk Nov 8 '12 at 14:49
I'd suggest using DbFinder Plugin. This is actually a very powerful plugin that supports both, and is quite a nice powerful. I actually like using it better than either.
share|improve this answer
@Mike: thanks, didn't know about the plugin but seems it only supports up to Sf1.2. I ended up going with Doctrine in the end, feels like it was the right choice, although writing direct SQL is needed for the more complex stuff. – Tom Apr 7 '10 at 2:43
I'd suggest to use propel 1.6 which is better for netbeans autocomplete.
share|improve this answer
-1 Autocompletion of an IDE shouldn't be the reason of a technical choice – Clement Herreman Sep 26 '12 at 13:54
@ClementHerreman I agree it shouldn't be the criteria, but I believe how productive one can be with a particular technology should certainly be a reason for choosing it. And with all-due respect I therefore disagree with your downvote... regardless of if you agree with the answer, it's not "wrong" (or is it?), and it is of some use (unless it's wrong, in which case, you should state this). – Sepster Sep 26 '12 at 14:00
IMO if your productivity is more improved by autocompletion instead of software quality, intuitivity and consistency, then something weird is happening. See codinghorror.com/blog/2009/01/…. But you're right, at some point this answer isn't wrong, just not good enough, maybe even not good. – Clement Herreman Sep 26 '12 at 14:05
@ClementHerreman, if isn't helpful don't use it anymore ;), +1 – Ahmad Jan 21 at 12:28
Are there any up to date responses to this? This is way out of date. – Qiniso May 7 at 19:25
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/5336
|
Take the 2-minute tour ×
I am making a prototype and I want the search button to link to a sample search results page.
How do I make a button redirect to another page when it is clicked using jQuery.
share|improve this question
I had asked for js because I didn't imagine that a simple HTML solution was available. Thanks it solved my purpose. – Ankur Feb 11 '10 at 8:57
12 Answers 12
up vote 38 down vote accepted
Without script:
<form action="where-you-want-to-go"><input type="submit"></form>
Better yet, since you are just going somewhere, present the user with the standard interface for "just going somewhere":
<a href="where-you-want-to-go">ta da</a>
Although, the context sounds like "Simulate a normal search where the user submits a form", in which case the first option is the way to go.
share|improve this answer
Who would have thought of a link? haha – meouw Feb 10 '10 at 16:36
+1 for the form. Since it will be a proper search form eventually you should do it like that now if possible. – DisgruntledGoat Feb 10 '10 at 16:41
+1 for non-JavaScript solution – Alexander Farber Sep 11 '11 at 7:56
every body knows this. i want to check reigel he has some good suggestion – suhail Jun 27 '13 at 9:30
@ayjay — Clicking a submit button only submits a form if the submit button is associated with that form. Putting the input in it is the traditional and best supported way to do that. – Quentin Jun 1 '14 at 22:29
is this what you mean?
$('button selector').click(function(){
share|improve this answer
According to this stackoverflow question and answer, one should lean towards window.location and not document.location as it's not the canonical way. – Jujhar Singh Mar 20 '14 at 15:18
window.location.href = '/some/new/page';
return false;
share|improve this answer
why to return false ? – Francisco Corrales Morales Feb 9 at 16:10
With simple Javascript:
<input type="button" onclick="window.location = 'path-here';">
share|improve this answer
The OP want's it in jQuery.. – Reigel Feb 10 '10 at 16:26
@Reigal: Or just JavaScript – meouw Feb 10 '10 at 16:35
This should work ..
$('#buttonID').click(function(){ window.location = 'new url'});
share|improve this answer
You can use:
location.href = "newpage.html"
in the button's onclick event.
share|improve this answer
You can use window.location
Or you can just make the form that the search button is in have a action of the page you want.
share|improve this answer
No need for javascript, just wrap it in a link
<a href="http://www.google.com"><button type="button">button</button></a>
share|improve this answer
This is the best solution, thank you. – 23W Oct 10 '14 at 15:10
You can use this simple JavaScript code to make search button to link to a sample search results page. Here I have redirected to '/search' of my home page, If you want to search from Google search engine, You can use "https://www.google.com/search" in form action.
<form action="/search"> Enter your search text:
<input type="text" id="searchtext" name="q">
<input onclick="myFunction()" type="submit" value="Search It" />
<script> function myFunction()
var search = document.getElementById("searchtext").value;
window.location = '/search?q='+search;
share|improve this answer
In your html, you can add data attribute to your button:
<button type="submit" class="mybtn" data-target="/search.html">Search</button>
Then you can use jQuery to change the url:
$('.mybtn').on('click', function(event) {
var url = $(this).data('target');
Hope this helps
share|improve this answer
And in Rails 3 with CoffeeScript using unobtrusive JavaScript (UJS):
Add to assets/javascripts/my_controller.js.coffee:
$ ->
$('#field_name').click ->
window.location.href = 'new_url'
which reads: when the document.ready event has fired, add an onclick event to a DOM object whose ID is field_name which executes the javascript window.location.href='new_url';
share|improve this answer
There are a lot of questions here about client side redirect, and I can't spout off on most of them…this one is an exception.
Redirection is not supposed to come from the client…it is supposed to come from the server. If you have no control over the server, you can certainly use Javascript to choose another URL to go to, but…that is not redirection. Redirection is done with 300 status codes at the server, or by plying the META tag in HTML.
share|improve this answer
Your Answer
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.