id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_05_local_5_shard_00000035_processed.jsonl/18527
|
Unity CEO David Helgason has revealed that his company, whose light-weight engine is becoming increasingly popular in both the mobile and PC gaming worlds, has been licensed by Nintendo for use with the upcoming Wii U.
The engine is being optimised for Nintendo's latest console, and while it's become surprisingly powerful in recent times (see above), you'd expect it's got more to do with downloadable titles than with frontline development. It'll also be useful in convincing developers of existing games and properties using Unity to also bring their games to the Wii U. Importantly, Nintendo has licensed the engine for use both with third-party developers and with Nintendo's own studios.
While it's no CryEngine 3, the fact a company like Nintendo is making such a deal at all shows the Japanese giant is becoming a little more savvy when it comes to embracing the modern development scene.
Nintendo licenses Unity engine for Wii U, both in-house and out [Eurogamer]
|
global_05_local_5_shard_00000035_processed.jsonl/18534
|
Silent Time Automatically Silences Your Android Phone Based On Time of Day
Android: Silent Time automatically silences your Android phone based on a user-defined schedule—so, for example, you don't end up trying to muffle an embarrassingly loud ring in the middle of your weekly meeting with your boss.
How It Works
Using the app, it's easy to define time-based rules for when you'd like your phone to go into silent mode, optionally enabling vibration as well. Each rule allows you to specify what days you want it enabled along with a time interval. The app also allows you to specify exceptions, either globally or rule-specific, so your phone will still sound off when certain people call.
When You'd Use It
Say you wanted to have one rule silencing the phone at night during the week, another with different hours to sleep in on the weekends, and a third to vibrate the phone at work, when you might want to know of calls but not disrupt those around you. Or if you're a student, you may want the phone silenced during specific intervals based on a class schedule. These might be times you'd want to silence or vibrate your phone anyway, but the app means you just don't need to think about it anymore.
Why It Stands Out
Many readers are likely already thinking of Tasker, a very powerful Android app that's been featured time and time again on Lifehacker in the past, which can do the exact same thing with the proper rules. However, Silent Time Lite is perfect if you don't need the power of Tasker and would prefer a simpler, more specific option.
Silent Time Lite is a free download for Android.
|
global_05_local_5_shard_00000035_processed.jsonl/18536
|
The Zune Tribute Desktop
MarioS loves the Zune Music software about as much as we do, so he decided to build this custom desktop as a tribute. Not only does it have the same good looks, it also helps him get things done. Here's how he set it up.
His desktop isn't just a tribute to the Zune software (which MarioS notes is still his favorite music player), but also to his favorite band, Queens of the Stone Age. If you want the same look, regardless of who your favorite band is, here's what you'll need to put it all together:
MarioS notes that he has a number of other wallpapers that shuffle over the course of the day, rotating out every few minutes. He even has a Flickr gallery of them if you're interested.
This setup is pretty straight forward, but we like the way he incorporated the Zune player's visual style into the whole thing. If you have any questions, want to give MarioS a thumbs up, or just want to let him know you like the desktop, head over to his Kinja blog to say hello.
Zune-QOTSA Tribute desktop | MarioS
|
global_05_local_5_shard_00000035_processed.jsonl/18542
|
Re: Multiple Content-Location headers
From: Einar Stefferud <[email protected]>
Date: Thu, 15 Jan 1998 16:51:09 -0800
To: Jim Gettys <[email protected]>
Message-Id: <[email protected]>
Hi Jim --
I hope the garbling of all that included text was an accident;-)... I
was gretly revlied to discover that there were no comments inserted
there-in;-)... (I trust such garbelling is not considered to be a
useful feature of WEB Mail UAs;-)...
Next, I think we may be out of synch in the discussion.
MHTML folk almost immediately gave up on the ideas of allowing
multiple Content-location headers, or of giving them multiple
This is no longer any kind of an issue between HTTP and MHTML!!!!
We are now looking for two other new things:
1. Are there any other gotchas lurking in the HTTP/MHTML wood pile
that we have not noticed before, since all us woodpile residents
would like to avoid all possible hidden gotchas???
2. Can we use the new idea articulated by Nick Shelness to use a new
Content-Label header, or allow a new Content-Alternate-Location?
I think MHTML is leaning toward Content-Alternate-Location, but lets
consider both in looking for gotchas.
rom your message Thu, 15 Jan 1998 12:57:56 -0800:
}> From: Jacob Palme <[email protected]> > Date: Thu, 15 Jan 1998 20:55:42
}+0100 > To: Nick Shelness <[email protected]>, [email protected] (Jim Gettys)
}> Cc: IETF working group on HTML in e-mail <[email protected]>, >
}http-wg%[email protected] > Subject: Re: Multiple
}Content-Location headers > > At 17.21 +0000 98-01-15,
}[email protected] wrote: > > Could I suggest that to break
}this impasse, that MHTML switches to a new > > header field Content-Label
}to replace its use of Content-Location. This > > would better capture the
}MHTML role of the header field, and would also > > allow the simplifications
}I argued for last week on the MHTML list to > > proceed. I.e., Content-Label
}could only specify an absolute URI, and would > > not establish a base.
}> > I am not very happy with changing an existing and already implemented
}> IETF proposed standard in such a radical way. But maybe it is necessary.
}> Let us examine the differences between how MHTML and HTTP uses Content-
}> Location to see if they really need to be split into two different >
}header fields. > > HTTP 1.1 spec says MHTML spec says
}(I have removed > the controversial
}text allowing > multiple Content-Location
}headers, > since we all agree to remove
}> this.) > > In HTTP, multipart
}body-parts MAY A Content-Location header > contain header fields which
}are specifies an URI that labels the > significant to the meaning of
}that content of a body part in whose > part. A Content-Location header
}heading it is placed. Its value > field SHOULD be included in the CAN
}be an absolute or a relative > body-part of each enclosed entity URI.
}> that can be identified by a URL. >
}A Content-Location header field is >
}allowed in any message or content >
}heading, in addition to one > Content-ID
}header (as specified in > [MIME1])
}and, in Message headings, > one Message-ID
}(as specified in > [RFC822]) > >
}The Content-Location entity-header An URI in a Content-Location > field
}MAY be used to supply the header need not refer to an > resource location
}for the entity resource which is globally > enclosed in the message
}when that available for retrieval using this > entity is accessible from
}a URI (after resolution of relative > location separate from
}the URIs). However, URI-s in > requested resource's URI.
}Content-Location headers (if > absolute,
}or resolvable to > absolute URIs) SHOULD
}still be > globally unique. > > A
}cache cannot assume that an When processing (rendering) a > entity
}with a Content-Location text/html body part in an MHTML > different
}from the URI used to multipart/related structure, all > retrieve it
}can be used to respond URIs in that text/html body part > to later requests
}on that Content- which reference subsidiary > Location URI. However, the
}Content- resources within the same > Location can be used to
}multipart/related structure SHALL > differentiate between multiple
}be satisfied by those resources > entities retrieved from a single and
}not by resources from any > requested resource, as described another
}local or remote source. > in section Caching Negotiated >
}Responses. Therefore, If a sender wishes a
}> recipient to always retrieve an >
}... URI referenced resource from its
}> source, an URI labeled copy of >
}If a single server supports that resource MUST NOT be included >
}multiple organizations that do not in the same multipart/related > trust
}one another, then it must structure. > check the values of Location
}and > Content-Location headers in In addition, since the source
}of a > responses that are generated under resource received in > control
}of said organizations to multipart/related structure can be > make sure
}that they do not attempt misrepresented (see 12.1 above), > to invalidate
}resources over which if a resource received in > they have no
}authority. multipart/related structure is
}> stored in a cache, it MUST NOT be
}> retrieved from that cache other
}> than by a reference contained in
}a > body part of the same
}> multipart/related structure.
}> Failure to honor this directive
}> will allow a multipart/related
}> structure to be employed as a
}> Trojan Horse. For example, to
}> inject bogus resources (i.e. a
}> misrepresentation of a
}> competitor's Web site) into a
}> recipient's generally accessible
}> Web cache.
}> My feeling is that the use of Content-Location as defined in the HTTP
}> and MHTML spec is not so different as to require us to use different
}> headers. But could the HTTP people please examine the quotes above
}> and check what you feel about this.
}The problem we have is syntax and implementation, not semantics.
}Lets clear this hurdle before we get into the meat of what you are trying
}to achieve, and whether your suggestion fits into the architecture of the
}Web, and my apologies of jumping into the meat in some of my early messages
}on this topic.
}Roy Fielding's point is that the syntax change required to allow the header
}name Content-Location to have multiple fields (needed as that is what proxies
}and one that may (likely) break exisiting implementations. It is also
}possible/likely this would break existing applications of HTTP, particularly
}clients and proxies. To include the URI in a comma separated list would
}require quoting of the URI's, as Roy points out; parsers may not be coded
}correctly to deal with this. It is quite likely that existing implementations
}will get the wrong answer, or even die, if one attempts to have multiple
}Content-Location headers, or that would not understand the quoting that
}this would require. And then there are the proxy issues....
}To quote from section 4.2 of the HTTP spec:
}"Multiple message-header fields with the same field-name may be present in
}a message if and only if the entire field-value for that header field is
}pair, without changing the semantics of the message, by appending each
}subsequent field-value to the first, each separated by a comma. The order
}in which header fields with the same field-name are received is therefore
}significant to the interpretation of the combined field value, and thus
}a proxy MUST NOT change the order of these field values when a message is
}These are the cruxes of the problem. So we're trying to follow the doctor's
}maxim "first, do no harm". We aren't worrying (yet) about the semantic issues
}that may or may not exist between how Content-Location is defined in the
}two different specs, but pointing out that allowing multiple of
}Content-Location headers is an incompatible change which may break
}implementations, and we have no data which shows this change is harmless.
}So until it is shown to be harmless, we must presume harm. IETF process
}attempts to avoid regression; we're worried that existing, deployed software
}would stop working, possibly in significant ways.
}So, please, as in my previous message, either present data that it
}doesn't break implementations, or don't argue about the name. Otherwise
}we're going to continue to bog down. I think that will let us all
}make faster progress.
}I hope this clarifies where the difficulty lies.
- Jim Gettys
}Jim Gettys
}Industry Standards and Consortia
}Digital Equipment Corporation
}Visting Scientist, World Wide Web Consortium, M.I.T.
}[email protected], [email protected]
Received on Thursday, 15 January 1998 17:47:07 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/18544
|
Re: freebase parallax: user interface for browsing graphs of data
From: Tim Finin <[email protected]>
Date: Tue, 19 Aug 2008 07:03:13 -0400
Message-ID: <[email protected]>
To: David Huynh <[email protected]>
David Huynh wrote:
> modeling and data linking. For example, the ISWC conferences have been
> using a page layout format of one column 4.5" wide (wasting 4" on a
> letter-size page). Most screenshots are landscape-oriented. So people
> who want to show screenshots in ISWC papers either have to resize their
> screenshots to unreadable sizes, or crop them. If there's an opportunity
> to adopt a two column layout, allowing screenshots to stretch across the
> columns, that would make someone like me a little happier publishing UI
> work to ISWC. :-)
> Maybe folks on these lists who are interested in publishing UI work to
> ISWC can vote if they want a more accommodating page layout...
ISWC uses Springer to publish its proceedings as an LNCS volume,
use Springer. Springer has been very accommodating in allowing ISWC
to simultaneously make the papers available online with free access,
Tim Finin, Computer Science & Electrical Engineering, Univ of Maryland
Received on Tuesday, 19 August 2008 11:04:14 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/18547
|
comments on transforms
From: Dean Jackson <[email protected]>
Date: Tue, 17 Feb 2009 20:59:20 +1100
Message-Id: <[email protected]>
To: [email protected]
Firstly, sorry I'm not there in person, despite it being so close to
home for me.
I read today's minutes: http://www.w3.org/2009/02/16-svg-minutes.html
A few questions/comments:
* why not adopt the syntax for CSS Transforms (which was written to be
as compatible as possible with SVG)?
In particular, I see this:
AG: I agreed to remove translateX/Y/Z and scaleX/Y/Z
JF: translateX/Y is part of the CSS specification but that's just
syntactic sugar
While these might shortcuts look like syntactic sugar, they allow for
something important - which is the ability to break a transform list
into components that can manipulated individually. This is especially
important when you're animating between transforms (not necessarily
with CSS Animations, even JS gets the benefit). Flattening all the
transform operations is a lossy process (not in the final matrix
result, but you lose the list).
In general I'm not sure there is benefit in minimising the syntax.
What is the cost?
* if there are features that are missing, it might be best to suggest
them as changes to CSS, so everyone can share the same spec. From
reading your requirements, I can't see anything that isn't met by CSS
Transforms. Now, I'm saying that mostly because I like it, but really
I wouldn't like to see another incompatible approach - much better to
merge :)
* I suggest you stick with 4x4 matrices over 3x3. I wouldn't let the
fact that OpenVG is 3x3 (is it? I read this in the minutes but didn't
check) impact the decision. Cameron says that "general 3d effects are
not useful" - maybe I misunderstood that? I guess I'm unclear as to
the goal: is it to add a transforms capability that is compatible with
OpenVG? If so, why? Or is the goal to add simple perspective
transforms to SVG?
I'll also note that Apple has shipped a mobile product that supports
arbitrary 4x4 matrix transforms applied to SVG content since about
July last year.
* There is an extremely important feature to 3d transforms that you
haven't discussed. In CSS Transforms we call it transform-style:
preserve-3d. Without this it is difficult to meet your requirements of
nested 3d transformations. On this point, I suggest you write up your
rendering model. As far as I can tell, this is the most important part
of applying 3d to SVG. What happens to the painters' model? Do things
closer in Z space draw in front, regardless of document order? What
about elements in adjacent siblings with different Z? Do you flatten
at group containers? Do objects intersect?
PS. I'm not sure if this should be sent to the public discussion list.
Feel free to forward it if that is the better place for discussion.
PPS. Please CC on replies - I'm not on the group email list, nor the
public list.
Received on Tuesday, 17 February 2009 10:00:03 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/18551
|
Re: Draft IETF DeltaV Versioning
From: Hartmut Warncke <[email protected]>
Date: Fri, 01 Dec 2000 11:21:45 +0100
Message-ID: <[email protected]>
To: [email protected]
CC: [email protected], [email protected], [email protected]
Hi all,
> Dear Colleges,
> >From the experience we have gathered trying to implement the DeltaV
> protocol, we have some basic comments and suggestions to make before the
> end of the last call period for the DeltaV protocol. We regard these
> issues to be important for the future development of DeltaV and WebDAV.
> This message is cross posted to the WebDAV mailing list because the main
> points pertain as much to WebDAV as to DeltaV.
> Valid XML should be used in WebDAV instead of simply well formed XML
> Using simply well formed XML misses half the benefit of XML: the
> automatic detection of syntactic errors. This is the best way to insure
> that a protocol stays open and correct. Any client or server can be
> easily tested for at least syntactic conformance. This does not means
> that every transaction must be validated, but ensuring that it can is
> important.
I totally agree! If you look, for example, at implementations of RFC2518 you will
come to the conclusion that a lot of problems of the "realworld" WebDAV client
server communication are caused by the fact that a lot of clients and servers do
*not* implement the DTD of RFC 2518 exactly because they don't have to. To my mind
a protocol should define a precise language which every client and server has to
speak in order to guarantee a perfect client server communication. Moreover clients
and servers are easier to implement if they are based on strict rules to which
they have to obey.
Best, Hartmut
Received on Friday, 1 December 2000 05:22:30 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/18552
|
Re: top-level Comment on lBase
From: Dan Brickley <[email protected]>
Date: Thu, 24 Oct 2002 07:36:12 -0400 (EDT)
To: Jeremy Carroll <[email protected]>
Message-ID: <[email protected]>
On Thu, 24 Oct 2002, Jeremy Carroll wrote:
> Politics:
> Some of this seems to be an extension of arguments in WebOnt in another
> forum.
Or arguments from the RDF Interest Group (c/o www-rdf-logic)... They
relate to all RDF-based Web language and protocol work.
> This seems unfortuante, particularly since those arguments are being
> resolved. I also dislike the use of phrases like: "quite intractable
> problems" rather than a less extreme "difficult problems".
> Given that this note is unlikely to be revised
I see no reason why it can't be revised. In fact I would hope to see it
revised, at least minimally, in the new year.
> I am likely to abstain whatever the editors do - publication is useful to
> move the debate forward, and is in charter; but I am unlikely to be
> convinced that it is appropriate for the RDF Core WG to make a proposal like
> this.
I tried to word the 'status' section quite carefully, to explain why it is
reasonable for such a document to be published via RDF Core. It may be
that the tone of the rest of the document is less cautious than the SOTD
section, but as a proposal and discussion document I'm quite happy with
Received on Thursday, 24 October 2002 07:36:13 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/18556
|
Easy math input language for MathML
From: William F. Hammond <[email protected]>
Date: Mon, 4 May 1998 17:27:59 -0400 (EDT)
Message-Id: <[email protected]>
To: [email protected], [email protected]
Cc: [email protected], [email protected]
Olle J\:arnefors, <[email protected]> wrote to [email protected]
on Thu, 30 Apr 1998 14:41:49 +0100 in part:
> Is it still the ambition of the HTML-Math WG to define
> such a language for easy math input (and possibly fall-back
> representation of math for web browsers lacking special
> math support) as a layer above the basic MathML layer?
Robert Miner <[email protected]> replied on Thu, 30 Apr 1998
22:40:50 -0500 (CDT) in part:
> Yes. However, instead of a single language, we intend to develop many
> such languages specialized for various user communities.
> In fact, we have already begun. Several are already available from
> our group member organizations, and several others are in advanced
> prototyope stages. Here is a partial list of MathML software, and the
> input languages they offer:
Robert Miner goes on to list:
1. WebEQ (Geometry Technologies, Inc.) -- proprietary
2. IBM Techexplorer -- proprietary
3. Ez Math (D. Raggett of W3C) --free
4. Amaya (W3C) -- free
(Free trials are available for the two proprietary items. Robert Miner
is associated with Geometry Technologies, Inc.)
It is a very important question what language an author uses to mark
up a document. Ideally, a document marked up in a language with high
"potential energy" can be subsequently processed by robots for many
different purposes. There may be human-authorable SGML instances (but
not HTML) that can be cited as examples. The most impressive example
that I have seen is "Texinfo" (the Gnu documentation language).
Natively Texinfo flows to either (1) "TeX" or (2) "Gnu-Info", but
there is a very nice Perl script, developed originally at CERN by
Lionel Cons, that flows Texinfo into HTML. (See the URL
ftp://ftp.cs.umb.edu/pub/tex/texi2html .)
Unfortunately, there is no math in "Texinfo" although math can be
included for regular TeX processing.
It is possible to imagine an extension of math into Texinfo that
could be flowed (1) into TeX or (2) by an extension of "texi2html"
into HTML extended as an SGML by MathML presentation tags.
"Ez Math" does appear to be an input language for MathML although it
does not for now suit my taste.
I fail to see how either IBM's Techexplorer, which is a browser
plug-in for rendering TeX source, or W3C's Amaya, which is both a
MathML rendering browser and a point-and-click MathML editor, offer a
response to the question about an easy input language for (conversion
to) MathML.
I am not happy at the prospect of the fruit of my personal labor
being tied up in a proprietary language. (This does not mean that
I object to robotic images of my markup in proprietary formats.
On the other hand, public document formats are preferable.)
1. Is the WebEQ input language a proprietary language?
2. Is it possible to retrieve a description of the WebEQ input
language anonymously?
-- Bill Hammond
Received on Monday, 4 May 1998 17:28:06 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/18558
|
RE: Listing vocabularies RE: Some questions
From: Pete Johnston <[email protected]>
Date: Tue, 13 Jan 2004 15:44:28 -0000
To: [email protected]
Message-ID: <003f01c3d9ec$212ecb90$2392268a@ulpcpj>
Charles said:
> I suspect you haven't a hope of ever getting all the schemas.
> One interesting approach would be to collect RDF content and
> collect up all the terms used, seeing if they are defined
> anywhere (like a traditional search engine does).
I have a vague memory of seeing an experiment like this conducted by one
of the FOAF aggregator services not too long ago. Well, not going as far
as looking up definitions, but listing/counting occurrences of
property/class URIs in the data. I can't recall where it was just now
but maybe one of the FOAF folk here might be able to point to something.
It was quite an eye-opener to see the large number of "variant" URIs
deployed for common terms (either because specs had changed over time or
because of typos in XML, "#" in place of "/" in XML namespace names, and
so on), as well as the range of "locally" minted terms.
Pete Johnston
Research Officer (Interoperability)
UKOLN, University of Bath, Bath BA2 7AY, UK
Received on Tuesday, 13 January 2004 10:44:10 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/18560
|
[css-font-load-events] Using Futures
From: Tab Atkins Jr. <[email protected]>
Date: Wed, 3 Apr 2013 22:35:57 -0700
Message-ID: <CAAWBYDBXKY2Nbch=hrRYVLzTztn_4qvR9tvhHEcHobmYUi0G=A@mail.gmail.com>
Cc: Anne van Kesteren <[email protected]>
The Font Load Events spec is currently event-based, with a few ad-hoc
callback-based APIs as well. It has an issue questioning whether it's
worthwhile to switch to DOM Futures. I believe it is, and have a
suggested new API for doing so.
To start, I'll outline the three use-cases I think the spec is trying
to address.
1. Sites that are going to do some type of DOM measurement that will
depend on the loaded font (such as the size/position of an inline, or
the height of a block), would like to be able to check if all fonts
are loaded, and be notified when any currently-loading fonts are done.
2. Drawing text in <canvas> uses the CSS font mechanism, but doesn't
trigger autoloading of webfonts like text in DOM does. Apps that do
this would like some way to force font loads and be notified when
they're finished, so they can actually draw the text.
3. Sites which offer UI for the fonts that are available, like Google
Docs, would like to be able to tell when a given webfont is loading or
loaded, so they can indicate the status appropriately in the UI.
Right now, #1 is addressed through notifyWhenFontsReady(), which takes
a callback called when fonts are ready (in the next event-loop spin if
fonts are already done loading). #2 is addressed by loadFont(), which
takes a 'font' declaration and optionally some text that it'll be
applied to, and kicks off font loads if there are any. #3 is
addressed by the loading/loadingdone events while fire based on the
global state (whether any fonts are loading or not), and the
loadstart/load/error events which fire per-@font-face.
We can simplify this significantly by adding futures, and
rearchitecting somewhat. Futures are a new concept defined in the DOM
spec, based on significant and long-running experiences in JS APIs,
where they have also been known as "Promises" or "Deferreds". Futures
are designed to be the standardized way to listen to a *single* event.
It solves this use-case more simply than DOM Events (less baggage from
Event objects, for example), and address the important problem
listening for an event that may have already happened (no race
conditions!). Please check out Alex Russell's explanation and examples
at <http://gitbug.com/slightlyoff/DOMFuture> for more information.
Here's my proposed new API (explanations/justifications will follow):
partial interface document {
readonly attribute FontList fonts;
interface FontList : EventTarget {
/* whatever idl magic you need to make this an array-like filled
with Font objects */
Future ready()
boolean checkFont(DOMString font, optional DOMString text = " ");
Future loadFont(DOMString font, optional DOMString text = " ");
attribute EventHandler onloading;
attribute EventHandler onloadingdone;
interface Font : EventTarget {
Future ready()
/* readonly versions of all the CSSFontFaceRule attributes, minus
ones that point into the stylesheet */
First of all, I'm replacing document.fontLoader with document.fonts,
an array-like of Font objects. Each Font object is a readonly version
of a CSSFontFaceRule object, without any links into the CSSOM. This
seems like a useful convenience API all by itself, but it's also
something that can be safely exposed to Workers, as there's no
DOM/CSSOM link to make it unsafe. The FontList contains Font objects
for all the @font-face rules in all the stylesheets for the document,
in document order.
The FontList.ready() function returns a Future. This is initially
unresolved, and resolves when the browser has loaded all stylesheets
and has finished loading all the fonts it chooses to initially load.
It must return the same future across multiple calls. If, after
resolving the future, the browser beings loading more fonts, it must
create a new future to return from .ready(), and again resolve it when
the browser stops loading fonts. This addresses use-case #1,
replacing notifyWhenFontsReady().
The loadFont() function has had its API reverted to be identical to
checkFont, and it just returns a future which is resolved as soon as
all the necessary requested fonts have loaded (which may be
immediately, if all necessary fonts are already loaded). This
addresses use-case #2.
checkFont() is unchanged.
loading status of individual fonts, look for the relevant Font object
loading/loadingDone events are unchanged - they're useful for
providing UI indicating whether fonts are loading or not, rather than
future is for.
I think this significantly simplifies several parts of the API, and
avoids potential race conditions with individual-font loads. It also
unifies the APIs across several parts - right now you pass a callback
as an argument to one function, as part of an arg object to another,
and register event listeners for a third. This is the reason de etre
for Futures, so it appears to be doing its job. ^_^ Finally, this
addresses the use-case of handling fonts in Workers well (necessary
since we're adding <canvas> to Workers), while the existing API has
severe race-condition problems in that case.
Received on Thursday, 4 April 2013 05:39:24 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/18561
|
Re: SEM: "natural" entailments
From: pat hayes <[email protected]>
Date: Tue, 17 Sep 2002 20:26:43 -0500
Message-Id: <p05111b10b9ad81b4e546@[]>
To: Ian Horrocks <[email protected]>
Cc: [email protected]
>On September 6, pat hayes writes:
>> >
>> >I don't see any a priori reason why set theoretic truths have any
>> >greater need to be included in Owl than arithmetic truths.
>> > Both set thery and arithmetic are really somebody else's concern.
>> >
>> >
>> >Jeremy
>> One of the things that is so misleading about the entire
>> description-logic way of thinking is that it treats some *logical*
>> truths as set-theoretical truths. Look, to infer
>> John is a student and John is an employee .
>> from
>> John is a student.
>> John is an employee .
>> is a *logical* matter. It has to do with the meaning of 'and'. It has
>> nothing to do with sets or classes or any of this paraphanalia. But
>> in the warped world of description logics, to assert a simple
>> conjunction requires us to invent a conjunctive class (an
>> intersection) and say that John is in it. The reason for this
>> intellectual warping goes back to an influential, but I think
>> perverse, publication by Ron Brachman about 20 years ago, which
>> invented the distinction between two 'kinds' of reasoning: that to do
>> with meanings, which is supposed to be done in one place (the
>> 'A-box') and the other to do with facts, supposed to be done
>> elsewhere (the 'T-box'). The same kind of distinction is sometimes
>> expressed by the distinction between 'data' (mere facts, assertions
>> which are true) and 'meta-data' (schemas; things that 'define the
>> meanings' of the terms used in the facts.) None of these
>> distinctions make any logical sense or have even the slightest basis
>> in semantics: they are pragmatic distinctions invented to facilitate
>> effective use of database technology with simple reasoners. By using
>> them as the basis for the *semantic* framework of the semantic web we
>> are making the entire future of the Web hostage to the intellectual
>> apparatus of a technology designed for the efficient use of
>> regularized, commercial databases, not to the emergent world of a
>> social semantic web. We should be focussing on the issues that will
>> matter, not on how to transfer old technology into a world where it
>> is probably going to be largely irrelevant.
>I know that we can all get a bit overheated sometimes (at least I know
>that I can), but I think that it is a bit unfair to take it out on
>poor Ron Brachman.
I only took it out on that particular paper, and it really wasn't
Ron's fault. Marx wasn't a Marxist, either. I agree that poor Ron
(who now wields life-or-death power over us academic soft-money folk
on this side of the pond) is a really, really Good Bloke.
>One of Ron's main contributions was to point out
>that KR languages are pretty useless unless they have a clear and
>unambiguous semantics - which is one of the few things that the WG
>seems to be in unanimous agreement about.
Well, that insight was hardly unique to Ron, even at that time.
>I should also correct a few factual errors. In modern DLs, if Tbox and
>Abox are talked about at all, it is only as a sometimes convenient way
>to group different kinds of axiom (by the way, in this context the
>Tbox is concerned with "meanings" and the Abox with "facts")
Sorry, I never could get that distinction straight.
>. No
>"logical" distinction is made between different types of axiom, and
>implemented reasoners for expressive DLs treat them in a completely
>uniform manner. In languages as expressive as OWL, the distinction is
>even more blurred as individuals can be used in class descriptions.
My point is that the 'distinction' was always 'blurred', because
there never was any such distinction that was worth making. Im glad
that after about 20 years, the DL community has come around to that
point of view.
>Having said all that, I believe that in some applications it can still
>be conceptually useful to separate ontologies (which roughly
>correspond to a Tboxes) from assertions that use terms from those
>ontologies, e.g., in semantic annotations (which roughly correspond to
>an Aboxes).
Sure. There any many possibly such pragmatic distinctions that might
be pragmatically useful. But one doesn't feel the need to erect an
entire methodology based on a foundational distinction between, say,
annotations and non-annotations.
>than decidable subsets of FOL with useful computational
that DAML doesn't have any notion of 'conjunction', strictly
speaking. So the inference
A, B |= (A and B)
which is about the simplest inference imaginable, so simple that
Aristotle didn't bother to give it a name, apparently isn't supported
by DLs. And the 'strong' OWL semantics requires us to assert (or
the DL version of the inference
A |= (A or B).
propositional logic where there aren't any classes to exist in the
first place. Union and intersection are *analogous* to disjunction
and conjunction, but they are not the *same*.
>So, in as much as FOL is an old technology, yes, DLs are
>an old technology (and proud of it).
FOL isn't a technology, fortunately. I was referring to the
implementation requirements of DLs.
IHMC (850)434 8903 home
40 South Alcaniz St. (850)202 4416 office
Pensacola, FL 32501 (850)202 4440 fax
Received on Tuesday, 17 September 2002 21:26:48 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/18562
|
Re: Choice of subelements by attribute value?
From: Eric van der Vlist <[email protected]>
Date: Fri, 22 Jun 2001 17:17:15 +0200
Message-ID: <[email protected]>
To: [email protected]
Cc: [email protected]
Bjoern Martin wrote:
> Hi (me again ;)
> I wondered if there is a possibility to restrict the appearance of
> certain subelements of an element by the value of an attribute.
No, W3C XML Schema is very strict on avoiding any possible ambiguity and
you would have to use different element names to make this possible
(getHTTPdata, getHTTPSdata, getFILEdata) with W3C XML Schema alone.
You can also add extra tests in addition to W3C XML Schema as Jeff
Rafter pointed out, but it's actually (IMHO) one of the key differences
between W3C XML Schema and alternatives such as RELAX NG where these
constructs are trivial to describe.
Pour y voir plus clair dans la nebuleuse XML...
Received on Friday, 22 June 2001 11:17:22 UTC
|
global_05_local_5_shard_00000035_processed.jsonl/18595
|
The Streamium MC-i200 micro hi-fi system is an Internet audio player. The MC-i200, from Philips Audio, a div. of Royal Philips Electronics, Netherlands, ( connects to online radio stations as well as digital music services such as AOL Music. A large, five-line LCD continuously shows what's playing and the name of the artist, regardless of whether the track is being streamed or played back via a CD.
The MC-i200 connects directly to cable or DSL broadband Internet service by a home network router. It also connects to a PC to transfer files. The micro system delivers 100 W and plays back from both CD-R and CD-RW discs. An MP3PRO format uses less space than standard MP3 files. The system also has a conventional AM/FM tuner.
Features include aluminum-alloy flat speaker cones said to produce a lower and louder bass line than current micro hi-fi systems. Price: $399.99.
|
global_05_local_5_shard_00000035_processed.jsonl/18596
|
Power operational amplifiers (POPs) are becoming increasingly common in control circuitry. Their primary advantages over conventional amplifiers are reduced part counts, increased reliability, and simplified design. And while the individual components of a power op amp may cost more than alternatives, total cost, including design time, logistics, and production costs, may be less.
There are other advantages as well. When used as linear motor drivers, operational amplifiers produce lower electrical noise than their fast-switching digital counterparts.
An op amp is considered to be a power device if it has an output current greater than ±50 mA and a supply voltage greater than 44 V (±22 V for a dual-supply device). Some power op amps have internal power dissipations of up to 500 W, and can deliver up to 1,000 W of peak power in audio applications. So far, most of these devices are found in submarine sonar units.
Some devices can dissipate 500 W continually and deliver 30 A of current. The power and current handling capability is primarily the result of new packaging and protection techniques.
POP designers give close consideration to thermal characteristics. Manufacturers use copper-alloy packages and lead frames over steel because of its superior thermal conductivity. Copper conducts heat over five times faster than steel. To isolate localized substrate heating, and prevent cracking, multiple substrates are used. New soldering processes eliminate voids under the die and substrate, allowing higher safe operating areas (SOA).
Some op amps incorporate a voltage-current limiter circuit to protect the amplifier from SOA damage such as a short to ground. The limiter senses both output current and voltage, and increases current limit value as output voltage approaches supply voltage. The circuit is activated by connecting a programming resistor.
Power op amps often use circuits that minimize the number of power-handling components. In many power amps, the output devices may take some 70% of the silicon die area and, thus, bear appreciably on device cost. Older designs frequently used at least three power components, a quasi-complementary pair of output transistors and a standoff diode. These components were required to provide class AB operation.
The alternative to power op amps in most applications is to build comparable circuits with discrete power transistors. The discrete approach has often been less expensive in applications that do not demand high performance. Typically, discrete designs must use class C power outputs (where output transistors are off for much more than half the cycle) rather than class B or AB complementary output used on hybrids.
One reason discrete designs are often built class C is because their outputs cannot be thermally matched sufficiently to obtain a class B output. The problem is that the voltage needed to drive a given amount of current through a transistor drops appreciably with temperature. Thermal tracking circuits that compensate for the effect are difficult to construct with discrete components because the circuits must precisely register the temperature of the base-emitter junction of the power transistor. On the other hand, hybrid circuits (and monolithic devices) can provide tracking more easily because of the close proximity of components.
Discrete power amps based on class C operation commonly use a feedback circuit to obtain adequate response. Manufacturers say that such designs are often acceptable where loop response time is less than 1 msec and where amplified signals are below 1 kHz. But these designs may be difficult to stabilize at higher speeds. Feedback in class C designs is nonlinear with rapid changes in stage gain as the circuit goes from threshold to full on. Because of such difficulties, discrete power circuits may produce greatly distorted outputs when operating at frequencies of around 10 kHz.
Automatic test equipment manufacturers often use power op amps in programmable power supplies. They are also used in phased-array sonar because of their accurate phase response and linearity. And head-up displays for fighter planes are simplified because of the high slew rates of POPs.
Many POP designs ultimately drive some type of dc motor. Manufacturers warn of several considerations that must be taken into account for such circuits, particularly back electromotive force. When the motor suddenly stops or reverses, a large voltage develops across the amplifier output stage. The output transistor also current limits, and this combination must be checked against the SOA.
Other inductive loads such as lead wires or coils can also drive a POP out of its SOA. To guard against transients, some amplifiers have built-in protection diodes that clip flyback voltages greater than Vs. In other designs, external diodes must be used.
Large capacitive loads can cause POPs to oscillate. Usually, critical capacitance depends on the amount of feedback. The lower the gain, the lower the capacitance that can start oscillations. Op amp manufacturers can suggest ways to deal with capacitive loads and prevent ringing.
Because POPs operate at high currents, manufacturers have issued precautions for prototype designs.
• When a circuit is powered up for the first time, power supplies should be set to the minimum operating level indicated on the data sheet.
• Current limit levels should be set by current limiting resistors, not the lab power supply. A low current setting on the supply does not always provide surge protection from the filter capacitors. Current limiting resistors ensure operation in the SOA, and prevent breakdown of the bipolar output stages.
• Once basic circuit operation is verified, the current limit can be raised. After the worst case operating conditions have been checked, supply voltages can be increased.
• Improper grounding also causes POP performance problems, since large output currents can cause ground loops. In general, loops can be avoided by returning grounds (for load, output compensation, and low-level signals) separately to the same point. Improper grounding of test equipment also causes difficulties. A common recommendation is to eliminate any direct ground connection between the signal generator and oscilloscope timing input.
• Although a POP may be rated to dissipate 90 W continuously, it cannot do so unless properly mounted on a heat sink. One manufacturer reports that customers sometimes drill a single hole encompassing both pins in the heat sink to mount a TO-3 package. Because most heat comes from inside the pin circle, a long thermal path and poor operation result.
|
global_05_local_5_shard_00000035_processed.jsonl/18599
|
Jon Skeet wrote: >>I'd like to submit a patch to add some functionality in >>zip-based tasks. >>Can someone please point me to the right procedure for doing this? >> >> > >I'd personally suggest opening a feature request and including the patch >in that. However, the Ant dev team may well have different ideas :) > > > For a new feature/enhancement request opening a report on Bugzilla would be best. If you'd like to discuss the features that you would like included (that your patch contributes), then this mailing list is a good place to chat in (kinda lost the plot with that sentence...) > - Command line tools > - Eclipse plugin > - Windows Explorer plugin > > > All good - subclipse plugin sometimes gets a bit flaky on what has changed etc (at least Eclipse 3.1/Subclipse does) >(Subversion's lovely, by the way. I've only been using it for a month, >but compared with VSS it's a dream. Admittedly most things are a dream >compared with VSS...) > > Indeed - rubbing ground glass into your eyeballs is actually better than VSS, but I've just come across an Oracle problem (ODBC + InstantClient) that seems to be violently opposed to user happiness - so perhaps VSS isn't as bad as Oracle. Kev --------------------------------------------------------------------- To unsubscribe, e-mail: For additional commands, e-mail:
|
global_05_local_5_shard_00000035_processed.jsonl/18600
|
From Thu Apr 28 19:40:25 2011 Return-Path: X-Original-To: Delivered-To: Received: from ( []) by (Postfix) with SMTP id 26932398D for ; Thu, 28 Apr 2011 19:40:25 +0000 (UTC) Received: (qmail 76206 invoked by uid 500); 28 Apr 2011 19:40:24 -0000 Delivered-To: Received: (qmail 76130 invoked by uid 500); 28 Apr 2011 19:40:24 -0000 Mailing-List: contact; run by ezmlm Precedence: bulk List-Unsubscribe: List-Help: List-Post: List-Id: "Ant Developers List" Reply-To: "Ant Developers List" Delivered-To: mailing list Received: (qmail 76120 invoked by uid 99); 28 Apr 2011 19:40:24 -0000 Received: from (HELO ( by (qpsmtpd/0.29) with ESMTP; Thu, 28 Apr 2011 19:40:24 +0000 X-ASF-Spam-Status: No, hits=1.0 required=5.0 tests=SPF_HELO_PASS,SPF_SOFTFAIL X-Spam-Check-By: Received-SPF: softfail ( transitioning domain of does not designate as permitted sender) Received: from [] (HELO ( by (qpsmtpd/0.29) with ESMTP; Thu, 28 Apr 2011 19:40:16 +0000 Received: from [] (unknown []) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by (Postfix) with ESMTPSA id 16D81509EB for ; Thu, 28 Apr 2011 15:39:54 -0400 (EDT) Content-Type: text/plain; charset=iso-8859-1 Mime-Version: 1.0 (Apple Message framework v1084) Subject: Re: [GUMP@vmgump]: Project test-ant-no-xerces (in module ant) failed From: =?iso-8859-1?Q?Nicolas_Lalev=E9e?= In-Reply-To: Date: Thu, 28 Apr 2011 21:39:53 +0200 Content-Transfer-Encoding: quoted-printable Message-Id: References: <> <> <> To: "Ant Developers List" X-Mailer: Apple Mail (2.1084) X-Virus-Checked: Checked by ClamAV on Le 28 avr. 2011 =E0 00:39, Matt Benson a =E9crit : > 2011/4/27 Nicolas Lalev=E9e : >> I could only reproduce the apply-test failing locally (on a mac). >> The following command line got me more info about what's happening: >> ant -lib lib/optional/ant-antunit-1.1.jar antunit-report = -Dantunit.testcase=3Dtaskdefs/exec/apply-test.xml = -Dantunit.loglevel=3Dinfo >>=20 >> In the output I can see these lines: >> [au:antunit] error at Pipe broken >> [au:antunit] z after y after blah >> [au:antunit] error at Pipe broken >> [au:antunit] x after y after blah >>=20 >> Not sure what to conclude from that since I'm not yet familiar with = what LeadPipeInputStream does. At a first glance I would say that we = could interpret that if the pipe is broken, then the "writing Thread is = no longer alive", which would be basically be a nominal case and not an = error one ? >>=20 >=20 > If it helps, LeadPipeInputStream (a poor pun) is intended to replace > the to recover from "writing thread is no > longer alive" errors, because often there is data remaining to be read > when the writer has already sent all he had to send, then terminated. ok I see. Then I think it will make sense to handle the "Pipe broken" = just like the "Write end dead". The read method in PipedInputStream = start to check the thread status, and can fail with a IOE with "Write = end dead" as a message the write thread is dead. If the write thread are = still alive but no content is yet available, a loop begins to wait for = content. Then if at some point there's still no content to read but the = write thread has stopped, there is an IOE with "Pipe broken" as a = message. So having either "Pipe broken" or "Write end dead" is just a = matter of timing. I'll commit a fix. Tested locally the ant unit tests then works (tested = several times). And I think it will fix the bug #48789 [1]. If gump shows us it now works I'll update the "what's new" and close = #48789. If not I'll revert my commit. Nicolas [1] --------------------------------------------------------------------- To unsubscribe, e-mail: For additional commands, e-mail:
|
global_05_local_5_shard_00000035_processed.jsonl/18605
|
From Wed Jan 05 16:24:09 2005 Return-Path: Delivered-To: Received: (qmail 89370 invoked from network); 5 Jan 2005 16:24:05 -0000 Received: from (HELO ( by with SMTP; 5 Jan 2005 16:24:05 -0000 Received: (qmail 86668 invoked by uid 500); 5 Jan 2005 16:17:35 -0000 Delivered-To: Received: (qmail 86339 invoked by uid 500); 5 Jan 2005 16:17:30 -0000 Mailing-List: contact; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Apache Directory Developers List" Delivered-To: mailing list Received: (qmail 86031 invoked by uid 99); 5 Jan 2005 16:17:24 -0000 X-ASF-Spam-Status: No, hits=0.0 required=10.0 tests= X-Spam-Check-By: Received-SPF: neutral ( local policy) Received: from (HELO ( by (qpsmtpd/0.28) with SMTP; Wed, 05 Jan 2005 08:17:03 -0800 Received: from [] (HELO []) by (Stalker SMTP Server 1.8b9d14) with ESMTP id S.0001722373 for ; Wed, 05 Jan 2005 09:20:41 -0700 Message-ID: <> Date: Wed, 05 Jan 2005 09:16:11 -0700 From: Richard Wallace User-Agent: Mozilla Thunderbird 1.0 (Macintosh/20041206) X-Accept-Language: en-us, en MIME-Version: 1.0 To: Apache Directory Developers List Subject: Re: [asn1] Stateful Decoder question. References: <> In-Reply-To: <> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Checked: Checked X-Spam-Rating: 1.6.2 0/1000/N Robert Newson wrote: > Hi, > > I'm developing an IMAP server in Java > ( I'm currently building the I/O layer > before moving on to the higher level commands. > Cool, how'd you come up with the name (just curious =P)? I'm working on building a SMTP server that is utilizes the networking libraries that are being developed here. Later I plan on adding POP3 and IMAP4 servers, also utilizing the networking libraries here as well as the AAA framework (formerly known as Janus) that Vincent is working developing. I've been in kind of a holding pattern lately tho, what with the holidays and all. I've also been waiting for the protocol api to develop a little further and standardize a little more before developing too much more, that way either MINA or (my preference) sedang can be used for networking. We should talk more about this stuff. > I've been communicating with Trustin as I'm currently using the MINA > framework (having migrated from Netty very recently). > > IMAP has an interesting I/O model where most strings (and all mail > messages) can be transferred as 'literals'. Here's an example of a > conversation; > > Client: 001 LOGIN {8}\r\n > Server: + continue for 8 bytes.\r\n > Client: username\r\n{8}\r\n > Server: + continue for 8 bytes.\r\n > Client: password\r\n > > Essentially, the client has to wait for a continuation message before > it can send the rest of the data (this is most useful for large > numbers of bytes, of course, but can occur for any number of bytes, > including zero). > > I started building an IMAP grammar with Antlr which can handle a > useful subset of the full IMAP grammar and I'm happy with this > approach. The generated parser blocks for I/O if its input is > incomplete, so I need to decode in several passes. > > My question (finally) is, is the StatefulDecoder work you're doing in > the Asn1 project applicable to my problem? I see that there's a basic > level that is Asn1-agnostic. > > I'm keen to build a high-performance, non-blocking and elegant > solution to this problem, but I'm now thrashing backwards and forwards > for the right tool. > In some of my initial work on the SMTP server I've been using the StatefulDecoder. Since the grammar for SMTP is pretty simple I just plan on writing a parser by hand to process the strings and generate the Command objects to be passed to the next stage. I haven't looked into the IMAP spec yet, but is it really complicated and large enough that you need to use a parser generator like Antlr? Here's what I'm doing right now (you can take a look at Basically, my SMTPDecoder the decode() method uses two buffers, a StringBuffer for the current command and byte[] for grabbing data from the ByteBuffer parameter provided to the decode() method. As much data as is possible from the network is taken from the ByteBuffer in one get() method and put into the temporary byte[]. (This is the part I don't like but can't figure out a way around ATM) I then have to iterate over the data in the temporary byte[] looking for a to indicate the end of the command. If I don't get them I append to the command StringBuffer. Once I do get them I pass the contents of the command StringBuffer and pass them to the command parser which returns a Command object that is passed to the next stage with the decodeOccurred() callback. I then continue processing data in the ByteBuffer if there is any (in case a client tries to send multiple commands all at once). I think this will work well, the only part I don't like is having to iterate over the data looking for a . I just seems too inefficient, because then I'm basically doing two passes over the data the client sends me (once here and then again in the command parser). But, I can't always trust the only a single command will be in the ByteBuffer, so I don't really have a choice. I think something similar will work for you're case. If you (or anyone else) can offer a better solution, I'm more than open to it (I'd be in your debt ;). Rich
|
global_05_local_5_shard_00000035_processed.jsonl/18615
|
From Fri Apr 7 22:27:32 2000 Return-Path: Mailing-List: contact; run by ezmlm Delivered-To: mailing list Received: (qmail 63986 invoked from network); 7 Apr 2000 22:27:32 -0000 Received: from ( by with SMTP; 7 Apr 2000 22:27:32 -0000 Received: from davidspirit ([]) by (Sun Internet Mail Server sims.3.5.1999. with SMTP id <> for; Fri, 7 Apr 2000 18:27:22 -0400 (EDT) Date: Fri, 07 Apr 2000 18:28:12 -0400 From: David Bourget Subject: Re: XSLT problem . . . To: "Chen, PeterX" , Message-id: <003e01bfa0e0$8f6c9680$0200a8c0@davidspirit> MIME-version: 1.0 X-Mailer: Microsoft Outlook Express 5.00.2919.6700 Content-type: text/plain; charset=iso-8859-1 Content-transfer-encoding: 7bit X-MSMail-Priority: Normal X-MimeOLE: Produced By Microsoft MimeOLE V5.00.2919.6700 References: X-Priority: 3 X-Spam-Rating: 1.6.2 0/1000/N Hi Peter, You will find more information on upcoming features for XSLT in the specification (see the w3c site) or James Clark`s home page ( If I was you I would probably convert the files to a more structured format, relying on a strong hiearchy. You'll not necessarily get significantly smaller files (you only save on linking elements, after all), but at least you'll have something more understandable and expressive on which to invent on-the-fly applications, like with stylesheets. When you are stuck reading plain text (this is almost what you have to do right now) you dont get the real advantages of XML.. this is my opinion :) Nevertheless, I have thought of a way you could have achieved your work with XSLT. Here's the trick : You order the elements, for examples by their /group child. Then you call a template on each (using the for-each instruction) and you always pass as a parameter the value of /group for the previous element in your loop to the template, in this case it would be the value of /group. When the template is called on a node which /group is not equals to the $group parameter it received, it can assume that it is now processing a new group and can close the other one. This is a kind of tricky application that is better done programmaticaly, but it is feasible.. I tend to wrap my stylesheets in scripting applications for this purpose. Note that you could also inline the inner template, for even simpler code in fact... Just to satisfy my curiousity, did you or your corporation had to pay the 10K$ fee to get access to RossettaNet DTDs ? I was interestered by it but when they mentioned the fees I ran away :) David > Thanks for your response. In your previous eMail you mentioned that there > might be a feature in a future version of XSLT that will may do what I'm > looking for. I've done this programmatically via the DOM. I was hoping > there might be a way with a XSLT stylesheet, although doing this with Java > code is an adequate design also. The files I'm working with are very large > and have complicated XML tree structures (most of the corresponding DTDs are > from the RosettaNet framework). I thought normalizing the XML documents > coming out of our databases would result in much smaller XML files. I might > just leave the XML documents in the denormalized form since these documents > still preserve the same information and can still be validated. > > Peter >
|
global_05_local_5_shard_00000035_processed.jsonl/18616
|
[Numpy-discussion] Another suggestion for making numpy's functions generic
Sebastian Walter sebastian.walter@gmail....
Tue Oct 20 04:24:51 CDT 2009
I'm not very familiar with the underlying C-API of numpy, so this has
to be taken with a grain of salt.
The reason why I'm curious about the genericity is that it would be
awesome to have:
1) ufuncs like sin, cos, exp... to work on arrays of any object (this
works already)
2) funcs like dot, eig, etc, to work on arrays of objects( works for
dot already, but not for eig)
3) ufuncs and funcs to work on any objects
examples that would be nice to work are among others:
* arrays of polynomials, i.e. arrays of objects
* polynomials with tensor coefficients, object with underlying array structure
I thought that the most elegant way to implement that would be to have
all numpy functions try to call either
1) the class function with the same name as the numpy function
2) or if the class function is not implemented, the member function
with the same name as the numpy function
3) if none exists, raise an exception
if isinstance(x) = Foo
then numpy.sin(x)
would call Foo.sin(x) if it doesn't know how to handle Foo
similarly, for arrays of objects of type Foo:
x = np.array([Foo(1), Foo(2)])
Then numpy.sin(x)
should try to return npy.array([Foo.sin(xi) for xi in x])
or in case Foo.sin is not implemented as class function,
return : np.array([xi.sin() for xi in x])
Therefore, I somehow expected something like that:
Quantity would derive from numpy.ndarray.
When calling Quantity.__new__(cls) creates the member functions
__add__, __imul__, sin, exp, ...
where each function has a preprocessing part and a post processing part.
After the preprocessing call the original ufuncs on the base class
object, e.g. __add__
On Mon, Oct 19, 2009 at 1:55 PM, Darren Dale <[email protected]> wrote:
> On Mon, Oct 19, 2009 at 3:10 AM, Sebastian Walter
> <[email protected]> wrote:
>>> numpy's functions, especially ufuncs, have had some ability to support
>>> subclasses through the ndarray.__array_wrap__ method, which provides
>>> masked arrays or quantities (for example) with an opportunity to set
>>> the class and metadata of the output array at the end of an operation.
>>> An example is
>>> q1 = Quantity(1, 'meter')
>>> q2 = Quantity(2, 'meters')
>>> numpy.add(q1, q2) # yields Quantity(3, 'meters')
>>> At SciPy2009 we committed a change to the numpy trunk that provides a
>>> chance to determine the class and some metadata of the output *before*
>>> the ufunc performs its calculation, but after output array has been
>>> established (and its data is still uninitialized). Consider:
>>> q2 = Quantity(2, 'J')
>>> numpy.add(q1, q2, q1)
>>> # or equivalently:
>>> # q1 += q2
>>> With only __array_wrap__, the attempt to propagate the units happens
>>> after q1's data was updated in place, too late to raise an error, the
>>> data is now corrupted. __array_prepare__ solves that problem, an
>>> exception can be raised in time.
>>> Now I'd like to suggest one more improvement to numpy to make its
>>> functions more generic. Consider one more example:
>>> q2 = Quantity(2, 'feet')
>>> numpy.add(q1, q2)
>>> In this case, I'd like an opportunity to operate on the input arrays
>>> on the way in to the ufunc, to rescale the second input to meters. I
>>> think it would be a hack to try to stuff this capability into
>>> __array_prepare__. One form of this particular example is already
>>> supported in quantities, "q1 + q2", by overriding the __add__ method
>>> to rescale the second input, but there are ufuncs that do not have an
>>> associated special method. So I'd like to look into adding another
>>> check for a special method, perhaps called __input_prepare__. My time
>>> is really tight for the next month, so I'd rather not start if there
>>> are strong objections, but otherwise, I'd like to try to try to get it
>>> in in time for numpy-1.4. (Has a timeline been established?)
>>> I think it will be not too difficult to document this overall scheme:
>>> When calling numpy functions:
>>> 1) __input_prepare__ provides an opportunity to operate on the inputs
>>> to yield versions that are compatible with the operation (they should
>>> obviously not be modified in place)
>>> 2) the output array is established
>>> 3) __array_prepare__ is used to determine the class of the output
>>> array, as well as any metadata that needs to be established before the
>>> operation proceeds
>>> 4) the ufunc performs its operations
>>> 5) __array_wrap__ provides an opportunity to update the output array
>>> based on the results of the computation
>>> library, that could serve as the basis for generalizing numpy's
>>> functions. But I think the PEP will not be approved in its current
>>> form, and it is unclear when and if the author will revisit the
>>> proposal. The scheme I'm imagining might be sufficient for our
>>> purposes.
>> I'm doing lots of operation on arrays of polynomials.
>> I don't quite get the reasoning though.
>> Could you correct me where I get it wrong?
>> * the class Quantity derives from numpy.ndarray
>> * Quantity overrides __add__, __mul__ etc. and you get the correct behaviour for
>> q1 = Quantity(1, 'meter')
>> q2 = Quantity(2, 'J')
>> by raising an exception when performing q1+=q2
> No, Quantity does not override __iadd__ to catch this. Quantity
> implements __array_prepare__ to perform the dimensional analysis based
> on the identity of the ufunc and the inputs, and set the class and
> dimensionality of the output array, or raise an error when dimensional
> analysis fails. This approach lets quantities support all ufuncs (in
> principle), not just built in numerical operations. It should also
> make it easier to subclass from MaskedArray, so we could have a
> MaskedQuantity without having to establish yet another suite of ufuncs
> specific to quantities or masked quantities.
>> * The problem is that numpy.add(q1,q1,q2) would corrupt q1 before
>> raising an exception
> That was solved by the addition of __array_prepare__ to numpy back in
> August. What I am proposing now is supporting operations on arrays
> that would be compatible if we had a chance to transform them on the
> way into the ufunc, like "meter + foot".
> Darren
> _______________________________________________
> NumPy-Discussion mailing list
> [email protected]
More information about the NumPy-Discussion mailing list
|
global_05_local_5_shard_00000035_processed.jsonl/18628
|
Iran Claims to Have Launched This Monkey Into Space
Iran is claiming to have successfully launched a monkey into space and brought it back alive, according to Iranian state television.
Iranian television says the craft carrying the monkey reached 72 miles above the Earth before safely returning, as reported by Time. Here's a picture of the monkey, via Mahir Zeynalov:
Iran's previous space-borne animal cargo has included a mouse, a turtle and worms.
The American and Soviet space programs experimented in their infancy with sending animals to space to test if the venture would be safe for humans. Albert I, a Rhesus monkey launched by the United States in a V-2 rocket, became the first monkey in space in 1948, but he suffocated during flight. Albert II was launched in 1949. He survived his trip but later died in a parachute accident. Laika, a Soviet dog, became the first animal to orbit Earth in 1957.
The United States fears that Iran's space program may be a veiled method of experimenting with intercontinental ballistic missiles and other military technology.
North Korea recently launched a satellite into orbit, later saying missile and nuclear tests would continue despite U.S.-backed United Nations sanctions.
Photo via Atta Kenare/AFP/Getty Images; photo courtesy of Mahir Zeynalov
Load Comments
What's New
What's Rising
What's Hot
|
global_05_local_5_shard_00000035_processed.jsonl/18641
|
What is meta? ×
I have been contributing to Stack Overflow for some time, and I have noted a particular situation with ASP tags (ASP-Classic, ASP.NET, etc). Very often the questions in ASP-Classic aren't related in any way to classic ASP. These questions are in the ASP.NET realm.
I can't figure a solution for this, because it seems like the OPs don't know what ASP Classic means or are just being lazy and tag the thing that comes in search. Every day I have to retag an average of 3,4 questions, and this is just me.
I don't know if this is a problem that needs more attention, but it's certainly a little tiring reminding the users that their questions are not related to ASP Classic and retag it correctly. How can I better deal with this situation?
share|improve this question
For history, see: Let's Ban the [ASP] Tag on StackOverflow! and Where'd the [asp] tag go, and why did it come back?, where the actual asp vs asp-classic vs asp.net thing was resolved once and for all... or was it? – Charles Nov 30 '12 at 19:07
well, the reality is this is far from being resolved, it's resilent. – Rafael Nov 30 '12 at 19:19
I believe it has to do with how the tag autocomplete suggestions are sorted. If you type "asp", "asp-classic" is displayed before "asp.net". This + laziness + lack of attention + lack of knowledge = mess. – bfavaretto Nov 30 '12 at 19:56
Let's make [ASP-Classic] a synonym of [ASP-Clbuttic]. Maybe that would help. – mikeTheLiar Nov 30 '12 at 20:09
for history & related: meta.stackexchange.com/questions/26870/… – Rafael Dec 1 '12 at 0:00
A thankless ASP, eh? Poor cleopatra. – Rosinante Dec 1 '12 at 13:35
Still a problem - though I have the opposite issue. I regularly run through 6-8 questions tagged asp-classic that should be asp.net... – AnonJr Oct 22 '13 at 14:47
@AnonJr i'm still having this problem but i don't find any suitable solution to this :/, i would prefer that any moderator say their opinnin about the problem. And to add more to this problem like a week ago i retagged a question didn't related with [asp-classic] tag, passed the edit and seconds later someone rettagged again with asp-classic. what a mess!! – Rafael Oct 22 '13 at 15:01
You must log in to answer this question.
Browse other questions tagged .
|
global_05_local_5_shard_00000035_processed.jsonl/18642
|
What is meta? ×
The Android app doesn't appear to give any kind of indication that a question has been closed, which I feel leads to poor UX. As an illustrative example, consider the (in)famous LOGO question:
enter image description here
As you can see, the left screenshot is the main question page, and it contains no [closed] marker in the title. Not only that, but the "Add an answer" button is still available, and pressing it takes you to the text entry field as it normally does. It's only after you hit Submit or Preview that you're greeted with a message that says:
This question has been closed or locked; no new answers will be accepted.
So, potentially, if I stumbled on to a closed question that I felt I could contribute to, I could end up spending time typing up an answer only to have it rejected at the very end.
Ideally, I think the question title should reflect that it's been closed and the "Add an answer" button should be disabled or hidden. In addition to this, it would seem logical that duplicates should have the link to the original, so that landing on a dupe via the Android app doesn't leave you at a dead end (this is not currently the case, either). Showing the specific close reason (and other post notices) would be great as well, but I could see that being of slightly less concern since I can always tap on the question title to view it in a browser if I'm really curious about the "why".
share|improve this question
@Danny: Dude. Help us test the Alpha version of our Android App – Al E. Aug 6 '13 at 15:39
@AlEverett Nice, I missed that! (I deleted my last comment since it contained a link to an unofficial app that I thought was the one in beta). – Danny Beckett Aug 6 '13 at 15:50
Yep, this didn't make it into the alpha, but it should make it in soon – David Fullerton Aug 7 '13 at 16:15
1 Answer 1
up vote 8 down vote accepted
We now will only show the "Add an answer" button when a question has all of the signals we require to be answerable. We also fixed the padding on that button.
share|improve this answer
This does seem to be addressed, except in the case where a question is closed and does not have any answers. In that situation I see "This question does not have any answers yet..." followed by the "Add an Answer" button, despite it being closed. Do you see that as well? – eldarerathis Aug 9 '13 at 16:06
@eldarerathis: I'm still seeing it. Geoff: Really there should also be some "closed" indicator on the question's own tab, without having to swipe to the answers to notice that there's no "add an answer" button. – HodofHod Aug 28 '13 at 9:00
The new "Put on hold" banner at the bottom of the question looks good! I like that implementation. – eldarerathis Sep 6 '13 at 15:52
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged .
|
global_05_local_5_shard_00000035_processed.jsonl/18644
|
October 21, 2012
Minot Daily News
David and Mavis Cobb, of Wroxton, Sask., announce the engagement of their daughter, Emily Joy Cobb, to Jeffrey Thomas Clarkson, the son of Bryan and Calina Clarkson, of Sawyer.
I am looking for:
News, Blogs & Events Web
|
global_05_local_5_shard_00000035_processed.jsonl/18679
|
Submitted by Finalfantasykid 863d ago | opinion piece
Changing With the Times – How DLC has Affected Final Fantasy
DLC is perhaps the most defining aspect of this console generation; prior to the launch of the Xbox 360 you’d be hard-pressed to find any console gamer that even knew what the abbreviation stood for (Downloadable Content, for those of you living under a rock). Nowadays, however, it is implemented in one way or another into almost every major game that gets released - it has become so prevalent that the implementation of DLC is often one of the game’s most discussed features. Due to the obvious financial benefits, every major publisher wants DLC in their games in some form or another, and yes, that includes Square-Enix. In this article I shall be discussing the effects of DLC on the Final Fantasy series thus far as well as the potential impact it could have on the series going forward. (Final Fantasy, iPad, iPhone, PS3, Square Enix, Xbox 360)
DragonKnight + 863d ago
As with all of Square-Enix's latest decisions, DLC has been a terrible idea. YAY FOR SELLING ENDINGS!
2pacalypsenow + 863d ago
DLC has affected Every game mostly for the worse
Tetsujin + 863d ago
I remember when DLC actually added to the game, and it was a different, more fresh experience. Now it's nothing more than a cash-cow and an excuse to cut content from games to further profits; then whine later because no one wants to buy content that should have been there to begin with. Don't even get me started on this whole season pass BS.
Max-Zorin + 863d ago
DLC is the devil.
NeXXXuS + 863d ago
reminds me of this lol
HarryMasonHerpderp + 862d ago
DLC has been used for evil.
It used to sound like a good idea but now it's the last thing I want to hear from a developer.
Get this new skin for only $3.99!
Want some weapons taken out of the game? only $4.99!
You can now change the colour of your characters! $2.99!
Want to cheat and skip ahead of gamers online by unlocking everything right away? $6.99!
You bought the game secondhand? unlock part of the single player now for only $6.99!
Just bought a game brand new? don't forget to use all of the codes included in the case!
Here's some character packs blatantly taken out of the game! $5.99!
But don't forget guys "you can always not buy it herp derp"
edit: My message looks like spam lol
#3.2 (Edited 862d ago ) | Agree(2) | Disagree(0) | Report | Reply
ScubaSteve1 + 863d ago
this gen was the worst gen ever. stupid DLC
Kratoscar2008 + 863d ago
A shame SE has sink this low, What the heck happened this Gen!
animegamingnerd + 863d ago
DLC is the worst thing about this industry
Add comment
New stories
Sparkle Unleashed Review - TXH
Summoners War New Character Update (6-2-15)
See what games are coming out in 2015
Steam’s Refund Policy And The Danger For Small Games
Secret Ponchos Gets 12 Week Update Program On Steam Early Access
Hatred (PC) review | Honest Gamers
|
global_05_local_5_shard_00000035_processed.jsonl/18696
|
BBC TwoNewsnight
Page last updated at 13:13 GMT, Wednesday, 16 April 2008 14:13 UK
How do we solve the food crisis?
The short-term consequence of the food price spiral is that even if donors can be persuaded to stump up the money, the emergency aid will buy less and less. Longer term, 400 experts backed by some of the most powerful UN organisations who've spent five years thinking about it, say the current system can't last.
Agriculture represents almost one third of all greenhouse gas emissions. Yet malnutrition remains rife in many parts of the world.
The International Assessment of Agricultural Knowledge, Science and Technology for Development 2,500 page report sends a clear message to governments - "Something's gotta change." But to what? Science editor Susan Watts reports.
Has China's housing bubble burst?
How the world's oldest clove tree defied an empire
Why Royal Ballet principal Sergei Polunin quit
• MMIX
• Back to top ^^
|
global_05_local_5_shard_00000035_processed.jsonl/18719
|
Neil Cavuto to Charlie Rangel: 'Your Party Lies a Lot'
Conceivably the best line uttered by a member of the media this week concerning the sequester debate came from Fox News's Neil Cavuto Friday
In a Your World discussion about the budget deliberations with Congressman Charlie Rangel (D-N.Y.), Cavuto marvelously said, "It seems that your Party lies a lot."
NEIL CAVUTO, HOST: I don't begrudge the fact that going after closing loopholes, but here's what I worry about, Congressman, and it just kind of gnaws at me. It's always so much easier to hike taxes than it ever is to cut spending.
And so the rap against your Party, and maybe you can disavow me of the notion, is that you would sooner hike than cut any time every time. The last deal, the budget brink deal, this deal where you change the rules going into it and after the fact, even Bob Woodward claimed that. So, I don't know, you doth protest too much.
CONGRESSMAN CHARLIE RANGEL (D-NEW YORK): You put a whole lot of things together that gnaw you, but I think…
CAVUTO: No, I'll cut to the chase: it seems that your Party lies a lot.
CONGRESSMAN: Forget the Parties and the lies. The facts are just too simple.
"Forget the Parties and the lies."
That's quite a line, isn't it?
Of course, on virtually every other station, they're not only forgetting the lies but also helping Democrats disseminate them.
Thankfully, not when Cavuto's around.
(HT Mediaite)
Noel Sheppard
Noel Sheppard
|
global_05_local_5_shard_00000035_processed.jsonl/18728
|
Numeric Algorithms Library
Note: Use only in the MuPAD Notebook Interface. This functionality does not run in MATLAB.
The numeric package provides algorithms from various areas of numerical mathematics.
The package functions are called using the package name numeric and the name of the function. E.g., use
numeric::solve(equations, unknowns)
to call the numerical solver. This mechanism avoids naming conflicts with other library functions. If this is found to be inconvenient, the routines of the numeric package may be exported via use. E.g., after calling
use(numeric, fsolve)
the function numeric::fsolve may be called directly:
fsolve(equations, unknowns)
All routines of the numeric package are exported simultaneously by
Note, however, that presently naming conflicts with the functions indets, int, linsolve, rationalize, solve and sort of the standard library exist. The corresponding functions of the numeric package are not exported. Further, if the identifier fsolve, say, already has a value, then use returns a warning and does not export numeric::fsolve. The value of the identifier fsolve must be deleted before it can be exported successfully from the numeric package.
Was this topic helpful?
|
global_05_local_5_shard_00000035_processed.jsonl/18734
|
Fung Wah Takes Almost All Its Buses Off the Road
Fung Wah pulled 21 of its 28 buses from service on Monday after state inspectors in Massachusetts found numerous safety hazards, including cracks in the frames. But you can still get to Boston for $15, the Globe reports, as the discount bus company hired charters to fill in on its routes. If the inspectors with Massachusetts State Police and the state's Department of Public Utilities have their way, however, the federal government will declare the company an "imminent hazard," which My Fox Boston reports would "essentially shut down the operation."
Given the littany of safety violations, DPU Chairwoman Ann Berwick may have a point with her assertion that Fung Wah "is currently incapable of maintaining a fleet of motor coaches." In addition to cracks in the frames of six buses, inspectors found transmission and oil leaks, at least one faulty air bag, loose seats, and incomplete welds on some previously identified cracks, Fox and Pix11 reported. So yeah, those charters are probably a good idea for right now.
|
global_05_local_5_shard_00000035_processed.jsonl/18769
|
Paizo Top Nav Branding
• Hello, Guest! |
• Sign In |
• My Account |
• Shopping Cart |
• Help/FAQ
About Paizo Messageboards News Paizo Blog Help/FAQ
Sub-Creator's page
Pathfinder Adventure Path Subscriber. 402 posts. No reviews. No lists. No wishlists.
1 to 50 of 402 << first < prev | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | next > last >>
Pathfinder Adventure Path Subscriber
The APs I've completed as GM are but one:
Serpent's Skull - Players had a blast. Was a lot of work, but worth it in the end.
The APs I'm currently running as GM are two:
Kingmaker - This campaign will be closing on the completion of its third year at the end of the summer, and we should be finishing the campaign about that time as well. We just completed Book 5, and there are a few things to do before Book 6 can begin. Everyone has loved this AP. It's been an absolute success.
Rise of the Runelords - We gather to play this one about once every 4-8 weeks. It's the first AP we ever started in PF back in 2010, and we are at the very end of Book 5. Players have enjoyed it despite the rather hectic scheduling through the years.
The APs I'm currently playing in, but that are not finished are one:
Jade Regent - I've been thoroughly enjoying this one. I've enjoyed the Asian flavor thus far, and the group has been a great deal of fun. It helps that I am now an enlarged dwarven magus using the Hammer of Thunderbolts. Joy!
The APs I am getting ready to run as GM are two:
Shattered Star - My group and I love all things Thassilonian, pretty much from our experiences with Runelords. Thus, this is the campaign we will be starting when Kingmaker reaches its conclusion.
Carrion Crown - I also have a group that enjoys the old Gothic horror schtick, which makes this a no-brainer for them also. Will be looking to run this one after Jade Regent has concluded, probably about the beginning of next year.
1 person marked this as a favorite.
Pathfinder Adventure Path Subscriber
Rogar Valertis wrote:
My two cents: playing an evil campaign is possible if your players are mature people and the GM is experiences. Is more about trying a different prospective on adventuring than "being evil" per se. If your players enjoy roleplaying and deeply complex characterizations and you are good at curbing excesses and situation with the potential to ruin fun for everyone then an evil AP is a great opportunity. If you don't have that kind of human material or experience then evil APs are probably not the right choice for you.
Nope. I'm not buying.
All of my players are incredibly mature . . . mature enough to know beyond all reasonable doubt that playing evil characters is not something they're interested in. Also, mature enough to know that to desire evil to gain victory isn't their cup of tea at all.
I would also argue that playing evil is quite easy, actually. It doesn't involve a great amount of depth at all, as evil is very much engrained within human nature. Unwillingness to lie, cheat, steal, or even bend the rules to get what you want or desire (lawful evil characters do this according to the society they wish to uphold, as well, though they do it in a fashion that would be logical, with loopholes -- think lawyers!) isn't easy to play. If you don't believe that good would be more difficult, look at all the Paladin alignment threads out there! People can't seem to grasp how good can even be quantified in-game!
I've also been running games for over 20 years, so I've got plenty of experience doing it. My friends would say I'm pretty good at it. ;)
For us, it's a question of morality and ethics, even in the characters we're portraying. I run evil characters as GM with the knowledge that such characters will get defeated by my players. It's not about evil winning with us. Evil is there to be defeated, not to be the stars of the show.
Thus, I disagree with your two cents. But, I will not argue with your play style! If you enjoy evil, have fun with it RV! I wish you many happy hours of gaming!
1 person marked this as a favorite.
Pathfinder Adventure Path Subscriber
Tangent101 wrote:
I'm curious as to how people would handle an adventure or AP where incrementally the players are put on a path of Falling and becoming evil. Each step, the easier path is the one that increases the chance of becoming evil. The good path is the path of suicide.
You'd see a lot of groups go into the path of evil, more being annihilated, and a few lucky (or very tactically adept) ones somehow remaining Good.
My group would be all about going that difficult path to suicide if it meant doing the right thing. They're awesome that way! =D
Pathfinder Adventure Path Subscriber
CorvusMask wrote:
Really what confuses me about subscribers is that I'd stick around to first part at least before unsubscribing <_< Heck, I'd get them anyway even if I'm not planning to run them since I like reading material even if I don't get to use them
Its kinda like people who unsubscribed from Iron Gods without giving it a chance, saying "Nope, I won't have any interested in it no matter how well it is done" is kinda... Eh, you know.
Iron Gods was in no way my cup of tea. I'm a fantasy nut, but not overly big on sci-fi. However, I'll admit that their story and continuity in Iron Gods was great. Even more important than my appreciation that they created a great AP in a genre I'm not big on, though, is that I have players who would choose it as an option for a future game.
Hell's Vengeance, being an AP for evil characters, does not give me such an option. My players won't do evil. Period. Doesn't matter how great the story might be. You can criticize that all you want, CM, and tell me I'm being silly, ridiculous, unfair, or a whole host of other flavorful titles. What it comes down to in the end is: My players won't play such a game, and I don't enjoy running evil campaigns either.
Thus, there's no purpose for me to spend my money on this one and give it a chance. I hope it's fantastic! I want Paizo to make money because I enjoy the products Paizo puts out.
This one is a no-go, however. I'll look forward to Hell's Rebels and whatever AP follows Vengeance!
1 person marked this as a favorite.
Pathfinder Adventure Path Subscriber
Duiker wrote:
Steve Geddes wrote:
Duiker wrote:
Steve Geddes wrote:
Is there any official confirmation that Hell's Vengeance will "undo" the results of Hell's Rebels? (Or even that it's a sequel?)
All I've seen is that you're expected to play evil PCs. Has there been any further information?
I have seen no confirmation of that one way or the other. The only details tweeted by those actually there are the title and the fact that you're playing evil characters. Everything else has been speculation and assumption that this will be the worst thing ever and the standard threats to unsubscribe. After a hundred AP volumes, I kind of tend to give Paizo the benefit of the doubt that even if at face value I don't see the appeal that they're going to put out a damned good story that's worth giving a chance.
Cheers. I just wondered if I'd missed something - my recollection is that the REAL Adventure Path spoilers/news comes on the Sunday of Paizocon.
Yep! That's my understanding as well. If I recall, there's a panel on Sunday discussing it in more detail and the presentation tonight was just a teaser on the heels of giving a lot of Occult Adventures details, and product announcements.
No threat here, my friend (Duiker)! I meant no disrespect to Paizo at all, which is why I wished them all the best with this one. This simply comes down to play style. This AP could be the greatest, most unbelievably awesome story ever conceived in modern day gaming . . . but once you've slapped the "Evil PCs" tag upon it, there's nothing about it that my group will buy into. Nothing.
I don't blame Paizo for making this AP. I know there has been an outcry by many for an evil AP, and now they've got it. Which is cool! I buy APs to give my players options of campaigns to play, however, and this provides us with none. My players want to play heroes, and good-aligned ones at that. Literally, there is one kind of AP that is of absolutely no use to me, and an evil one is it.
I'll plan to resubscribe after this one is done. Has nothing to do with giving benefit of the doubt though, and everything to do with a play style that's useless for myself and my group. I suppose you can take that as you will.
2 people marked this as a favorite.
Pathfinder Adventure Path Subscriber
Samy wrote:
Starglyte wrote:
Well, all my guesses were wrong. The next AP after Hell's Rebels is Hell's Vengeance. Evil PC AP.
Seriously? Ah hell. Seems like a bit too much hell in a row. I think I'm'a pass.
I'm with you there, Samy. My players don't do evil. No use for this AP at all. I wish Paizo the best with it, of course, but I'll not keep my subscription up for this one.
It will also be the only AP in their line that I'll not own. Sadness . . . :(
Pathfinder Adventure Path Subscriber
Thanks for all the responses and ideas, all! Greatly appreciated!
Pathfinder Adventure Path Subscriber
Doomed Hero wrote:
Effortless Lace?
I just looked at this magic item . . . unfortunately, according to the rules, it won't allow me to wield it one-handed, but instead wield it two-handed without size penalty. I was disappointed.
Plus, it appears effortless lace only works on slashing and piercing weapons, not bludgeoning. Something else I find absurd, personally.
Pathfinder Adventure Path Subscriber
I have a dwarf character who just got a Hammer of Thunderbolts. Is there a way for a medium-sized character to wield the artifact with one hand? He's a Magus (Spellsword Archetype), and I'd love to be able to continue to use the athame if possible!
That whole large weapon for it the warhammer is what's stifling me on this. How do medium players wield it without size penalties?
Pathfinder Adventure Path Subscriber
Tels wrote:
Fourshadow wrote:
Sean K Reynolds said "If you play an RPG to maximize your damage, you may as well play a video game."
No, this is basically declaring that one person's way of playing a game is 'wrong'.
You absolutely could interpret it that way! my interpretation of the quote, however, would be that if one enjoys soloing games, perhaps it would be more fun for you and those around the table if you played solo games. ;)
Clarification: "You" here not intended to point a finger at anyone in particular on these forums.
Greylurker wrote:
little bit on Multiclassing that actually sounds pretty neat. Kind of like 4E feat dip multiclassing.
This actually scares me just a touch . . . When you start looking to 4E for inspiration . . . Oi!
All the same, I'm looking forward to this one.
Pathfinder Adventure Path Subscriber
WormysQueue wrote:
All those powerful NPCs in the Realms made it difficult to justifiably explain why they never showed up when a huge problem arose though. They were everywhere! And their driven purpose in the Realms was to affect it, both overtly and covertly. Having some great Realms-shattering storyline happening and not working these NPCs into it was virtually enough to destroy suspension of disbelief. Even those players that hardly knew anything about Realms continuity still knew about Elminster and Drizzt and the Seven Sisters and so on. If everything in Faerun was going to the hells in a handbasket, did it make sense for a few of these superpowers--namely the ones that could teleport around the world on a whim, and who were so connected with the Weave and the gods that they knew everything that was happening anywhere in the world--to not show up and do something about it? It didn't make sense.
To Paizo's credit, the NPCs they have hovering around their world aren't nearly as intrusive. Yes, there are powerful ones, but they either keep to themselves or are the big bads your characters are supposed to beat! The ones we read about in their PF Tales novels are cool, but none of them are overly powerful. The two coolest, in my opinion, are Radovan and Jeggare from Dave Gross's novels, and I've got PCs in the world that could easily walk either of them, or both of them together. That's good thinking on Paizo's part, as far as I'm concerned. They saw the problems an overabundance of potent NPCs created and learned from it.
And WQ, this is coming from a person that still enjoys reading about the Realms. I always enjoyed that world!
WormysQueue wrote:
At one point in my campaigns, I had ten players around the table. (One thing I loved about 2E, you could run a game with these types of numbers no problem--not the same in PF!) While the majority of them were the folk I described in my post above--they had lives and other things to do other than keep up on Realms continuity, there were a couple of them that were exactly the opposite. They read every book (including ones I hadn't read!), and knew every little thing that went down in the Realms. It meant I had to try and decipher this intricate puzzle to keep everyone happy. You know how some people are! If the world's creators make it canon, how can you say it's not? Telling those people, "In this game, that and that and that never happened, but this and this did" just never really worked, because it all created the whole to them. Missing anything meant it affected everything else.
Thus, the majority of my group back in the day would argue that this bit of continuity really screwed them over, while the minority of the group would argue that that bit of continuity was crucial because, without it, these other things don't make sense! Either way, you're ruining the experience for some people or for all people.
Again, haven't had this problem in Golarion yet because they created a static world in which the players' continuity is the only thing that matters. (And what I want to do with the rest of it, of course, as it sounds like you do, WQ!) From a gaming and player perspective, this works better for us.
That's not to say I'd get all disgruntled if they did it otherwise. I played in the Realms for 15 years plus, as I stated, and we made it work. There were just a lot more complications involved.
WormysQueue wrote:
This was an interesting note you made, too, as I'd not heard this one. I do recall listening to Greenwood, Salvatore, and a couple of the developers (Baker, I believe was one of them) comment that because 4E was so drastically different mechanically, they needed to jump the Realms so the world would work mechanically with the system. The price one pays for having a world that requires adaptation to the game that's being played in it, as opposed to stories just being told via novels.
Perhaps there was a little of both going on!
3 people marked this as a favorite.
Pathfinder Adventure Path Subscriber
WormysQueue wrote:
Except you're not breaking canon because you're creating it . . . by playing the game. That's one of the beautiful things about how Paizo does this. They give you all the backdrop details. All those little intricacies about what could be going on here and here and here and there and over there. They don't give you the storyline of the whole world past a point (4708, as you stated). Thus, everything that happens beyond 4708 in your games is canon!
I usually play different APs with different years as the starting time. Our Runelords game was in 4709; Serpent's Skull in 4710; Kingmaker also in 4710 and has progressed into 4714. As we continue playing new APs, the events from those APs has taken place, and the results are canon in my world. There's continuity there that's beautiful because we made it! My players like that a lot too! It's fun for them to hear about stuff their old characters have already done and how that changed the world someplace else.
In Forgotten Realms (the world I ran for nigh 15 years between the mid-90s to 2010), the continuity often got in the way for my players because I was the only one keeping up on it as GM. They would construct character stories from stuff they'd learned in past campaigns, to which I would tell them repeatedly, "No, no, see that's changed because of such-and-such who wrote a book about it." It aggravated them a great deal.
No such problem in Pathfinder! Everyone is much happier in my crew!
I love advancing continuity! I just love when my players are the ones doing it and not necessarily a plethora of writers and developers for the company.
Pathfinder Adventure Path Subscriber
If run "as is," I've found that PF APs usually last us between 18-22 months. Kingmaker will probably make it to the 3 year mark because I added a large amount of stuff to it, both my own and other module/mini-campaigns (playing weekly, ~4 hours/night).
When I used to GM 2E, the campaigns were much, much longer! I've run five 2E campaigns to their conclusions. The shortest took about two years. However, the last one I did completed in just over three years, while the CoRD game (2E Forgotten Realms -- our primary world of choice) took almost 7 years, and our Ravenloft 1890s game ran for about 9 years.
In 2E, our characters averaged about 12-14th level by completion. PF really streamlines the leveling process, so we're usually finishing APs at about 17th level.
Pathfinder Adventure Path Subscriber
Gargs454 wrote:
For instance, while I said earlier the idea of the megadungeon in the Stolen Lands sounds awesome (and still think it does) I could see that causing issues with some of the players that I have played with over the years. The main issue being that a lot of my players do not like the idea of ever leaving a dungeon unless every single critter inside has either been freed or killed. Granted, there are things the GM can do to handle that, but that is a different issue.
I think the group can definitely play a large part in determining this, absolutely. My players have been much more organic in their thinking in this campaign, as opposed to simply being a band of adventurers out to kill everything. Making them royalty has certainly had a change in mindset as to how they play this one, and it has been for the best, I assure you! They don't necessarily seek to "kill everything," for instance. They haven't always cleared entire dungeons just to say they have, but have gone in with purpose and, when achieving that purpose, sealed the place back up and made it next to impossible for anyone else to fine (as an example).
Basically, they haven't been XP sponges. Their mindsets have been far more focused on the mission of growing a kingdom and political intrigues. They do what they think is best for their kingdom. It's been a blast!
Pathfinder Adventure Path Subscriber
Orthos wrote:
Yeah I learned the hard way that Kingmaker is not the game to throw a ton of extra events and encounters into if you're still using XP, and once this campaign is over we will not be using it for any future ones. It was a long hard road to convince me to do that, but it did the job.
I'd hate to disagree, but I have to! I've thrown two modules, a mini-campaign (Red Hand of Doom), and been creating my own Lovecraftian storyline throughout this campaign using the slow progression XP charts the whole way. My group has just now gotten to the point of starting the 5th book, and they're 5k away from 14th level.
Needless to say, I've added a ton of additional content (including a lot of political intrigue involving Mivon) to this campaign, while still using XP, and it's worked out perfectly in our run.
Again, individual mileage may vary.
Pathfinder Adventure Path Subscriber
Use Gedovius, the gargoyle rogue, from the dungeons of Irovetti's palace in Book 5. The background of that character is just too cool to be simple fodder. I actually added 5 mesmerist levels of the Occult playtest to make him a bit more powerful, then turned him into a recurring assassin-type able to manipulate the minds of those around him so as to keep from being caught in my players' kingdom. His connection to Irovetti gives some very interesting leads towards Pitax, yet Irovetti's ability to lie via his bard skills offers him a great amount of leeway in "honest" denials.
In my game, the players never actually caught Gedovius, but there was evidence left behind in one of the assassin's victims that led to the perpetrator being a gargoyle. Thus, between the sorcerer's legend lore spell and the master spy, connections were made as to this gargoyle's origins, and its connections to Pitax.
Just one example of something that gets virtually no time in the books which can be played up more in the campaign! You can find his stats/story in Area S2 (pg 48-49)
Pathfinder Adventure Path Subscriber
I'm simply using the slow progression. It's pretty much done all I needed it to, and players have had more time to play with their current levels. My players do like to keep track of advancement, so eliminating XP would not be something they appreciate overly. I also like it because the chaos in level advancement can add some interesting depth to the campaign. They've fought things 4+ CR higher than them at times, and been able to slaughter things that would have been a challenge, except they had out-leveled it by the time they came back to it. That's almost like a reward in-and-of itself for them!
Additionally, my players pretty much stopped the vast majority of hex exploration after Book 2. Once they started getting into the ebb and flow of ruling a kingdom, they actually found that simple exploring no longer was something they had a lot of time for! They started hiring out that gnome troupe to do a lot of the exploring for them. That's really another thing that makes this AP so awesome: there are a ton of different ways it can be played, and none of them are wrong or boring. In some ways, I feel that if I were just giving them XP at "appropriate" times, it might have actually hindered the randomness of the sandbox.
Still, individual mileage will vary.
Pathfinder Adventure Path Subscriber
Gorbacz wrote:
What, Asmodeus CR 36? That's two rounds of combat from a moderately optimized mid-level party, and when I say "moderately optimized" I mean that even chimpanzees could do that, let alone human beings who actually comprehend what 'math' and 'balance' mean.
Well, I can't speak for mid-level, moderately optimized parties or anything, but if you throw a CR 36 against a party of level 20/tier 10 heroes, you're almost certainly looking at a 1-2 round fight, tops. Either he'll be dead within that first twelve seconds of mythic combat or they all will.
I mean, CR 30s have a rough average of about 775 hit points, right? Based on Nocticula and Cthulu and such . . . . At CR 36, you're probably not looking at much more than 1100 or so, which still places this "god" within single round for a buffed up melee type or wizard that can bypass any and all immunities or resistances.
1 person marked this as a favorite.
Pathfinder Adventure Path Subscriber
Zagig wrote:
Well, I don't want to have them gain a bunch of XP through the Scenarios and then the regular parts of the AP are too easy.
I'll be using PFS scenarios with my group. They already know that they'll be gaining no XP for them, but will be gaining the riches that come from them, which will effectively raise their WBL, which should be prize enough!
All my players have indicated they're fine with this arrangement. It's really the stories they enjoy. =)
Pathfinder Adventure Path Subscriber
I am indeed one who included Red Hand of Doom into my KM game. It truly fits in there rather seamlessly . . . In fact, many of my players still believe that it was part of the actual Kingmaker campaign! I run my game at slow XP progression, so it was a bit easier for me to incorporate it.
In my campaign, Hargulka, from Book 2, was an advance Wyrmlord seeking to weaken the area before the main body came in. At that point, I pretty much threw them into the whole thing going into Book 3. While I didn't do it this way, it would be easy for someone to replace the Ghost Lord with Vhordekai (BBEG of Book 3), if they so desired.
Granted, due to the nature of the KM AP, there's a lot of playing around with the Red Hand mini-campaign, but it works beautiful if you have the time or inclination! My players loved it!
Pathfinder Adventure Path Subscriber
I played 2E for nigh on 17 years and couldn't stand 3.0/3.5 rules. It was too rigid for me. Encounters were more epic in 2E because they required everyone get involved, which I've noticed in this edition isn't necessarily the case. And 2E allowed the GM more wiggle room within the rules.
Now, I'm definitely getting used to 3.x, though there are still aspects about it that I find ridiculous (like the amazingly high damage output at higher levels). Having a blast with PF!
1 person marked this as a favorite.
Pathfinder Adventure Path Subscriber
thenovalord wrote:
You should have hung around for books 4 to would have really disliked it by then...everyone knows everything and you just interfere with the NPCs very important lives
Four was that bad I dropped out for most of it
Five was the best of the bunch
the writer of book 6 obviously forgot the PCs would be 16th and therefore full of tricks, resolve and bypasses....and the ending one big anti-climax....
A problem I have with most PF AP's...the writers seem to want to be novelists, where everything is an npc, not adventure writers where the PCs have input and independence of thought
Or you just need to consider who's running your games and not play in one of their games again. Serpent Skull was the first AP I ran and completed for my players, and they absolutely loved it.
thenovalord wrote:
A railroad is ok if done well
You go from a to b to c etc.....they are adventure PATHS after all
What is needed is what you do at each point is....
To be interesting
To have some affect down the line, gives the players choice
SS fails for me as it doesn't matter what you do, someone gets there first, the npcs are too over bearing, important, invincible etc
That's just poor GM'ing you're talking there, my friend. Again, I had none of these problems in the game I played. My players determined how things went down. They were even able to form an alliance with the vegepygmies (and that took some work on their part)! Not all the factions arrived at Saventh-Yhi (at least until much later) because my players tried to keep things on the hush-hush (except they let a couple things slip, which enabled a couple of the factions to arrive shortly after them--one actually before). Their actions determined events that took place in Book 4 (which I actually blended in throughout Book 3). Book 6 was by no means a cakewalk for them because there were numerous villains from earlier books that had gotten away and warned the enemy of their capabilities.
Everything ran smoothly for me, and much of what happened was dictated by the PCs themselves, by their actions. Again, they loved it! If an AP doesn't allow for player decisions and their consequences (good or ill), that's a GM not doing their job. It's not the AP's fault.
Pathfinder Adventure Path Subscriber
archmagi1 wrote:
My biggest problem to date, is that without the revenge vs the cult or vs Nebta angles, the motivation for a Neutral party to continue along the AP past book 2 is a bit esoteric. My players understand its an AP and requires a certain amount of "just go with it", but I can easily see how other groups might not care to go do research about the mask (particularly when legend lore will give all the artefactory powers anyway, and is cheap), and even less to go tromping off through the desert to kill a miniscule cult. Book 5 and 6's stakes are a bit easier to sell to a N party, but its the mid-3 through 4 pull that really is difficult for a group who isn't out to save the world.
See, I don't agree with this. You could have absolutely neutral characters and still easily go through this entire AP. Two possible examples would be for monetary (ie. treasure hunters) or scholarly purposes. Neither requires a desire to save the world, and both can act as a form of personal enrichment exclusively (or to share an incredible discovery with the academic community of Osirion or elsewhere). These two routes could even be taken with minimal alterations by the GM.
Pathfinder Adventure Path Subscriber
CWheezy wrote:
Depending on class make up they either win extremely hard or just regular hard
Class makeup would be:
- Paladin of Sarenrae
- Master Spy Rogue (scout)
- Sorcerer (arcane bloodline)
- Monk/Inquisitor/Barbarian/Bard
- Heavens Oracle
- Druid (this one is off-and-on as to whether he shows)
I will also say this: I'm intending to give Cthulu that mythic feat that makes him immune to smiting, and am teetering as to whether I want to also make him immune to critical hits (albeit, not sneak attack damage, cuz that would totally screw the rogue). Still determining how I wish to play that one, because I know the Monk/Inquisitor/Barbarian/Bard halfling is also very reliant on crits for damage potential.
Pathfinder Adventure Path Subscriber
NobodysHome wrote:
You know, maybe Hathor and Cthulu should come along...
I'll be throwing 5-6 PCs at ~19th level 5th Tier against Cthulu. We'll see how that goes!
Pathfinder Adventure Path Subscriber
Sorry for the double post! I just got back here too late to edit the last one!
I've found enough info to make a pretty good dent in what I need to do with Mythic up to Tier 5, so don't bother answering the second part of my post above! (Unless you want to!)
My apologies again!
Merry Christmas everyone!
1 person marked this as a favorite.
Pathfinder Adventure Path Subscriber
NobodysHome wrote:
(2) The "easy switch" gets turned on. Not to repeat myself ad nauseum, but the CRs of all encounters get dropped too low for even non-mythic PCs. (Generally from character level to character level - 2). For mythic PCs, the encounters are just pathetic. I've heard it was for XP reasons, which (if true) is just yet another argument for dumping XP entirely.
Well, I'll disagree with the bolded part (which I added). I think it's yet another argument for fewer encounters in a book, so that the encounters that do exist are more story-based and less "just because." The occasional encounter to allow the heroes to feel like heroes is great, but we don't need adventures that have 19 of them and two worthy ones. We need more APs that focus on great story and great story-based encounters. You do that, there's no issue at all with the XP system.
I've been running games for 20 years (nigh on, anyway), and I've never had an issue where the XP system inhibited my storytelling capabilities. If such happens, that's a flaw in designing the story, not the XP system itself.
Not saying that playing without XP is a bad thing, mind you! If that works better for you, then by all means do so! Whatever is most fun for you and your group, I say go for it! However, I don't believe for a second that it's an issue of pointing the finger at the XP system and saying, "It's all your fault," is accurate.
It's the design decisions that make or break a system. Paizo has focused their current design for their adventures on a plethora of meaningless encounters with a couple significant ones thrown in, which leads to this outcry that XP is to blame. Tweaking that design philosophy slightly so that there are fewer insignificant encounters and more story-based, meaningful encounters would also fix the problem without having to eliminate the XP system.
On a separate note! For those of you that have run Mythic, I could use some of your input here. I'm planning on adding a Mythic adventure at the end of my current AP, but will only be granting my players 5 mythic tiers. I've heard that 3rd Tier abilities are where things break down. Any suggestions as to changes I should make to see to it that no one can one-shot or easily eradicate Cthulu (CR 30) would be appreciated!
Everyone is awesome! Thanks in advance! =D
Pathfinder Adventure Path Subscriber
I don't know about PFS, so I can't say anything about what's legal or illegal. I can tell you that, in Golarion, there's a university in the Mwangi Expanse called Magaambya that has the knowledge of taking druid spells and making them arcane. It was a specialty of its "founder" -- Old Mage Jatembe -- to do such.
I believe there are rules for it in Inner Sea Magic, but I don't know how or if such a thing will help you for PFS. Still, the precedent is there for such a thing being possible in the world!
Pathfinder Adventure Path Subscriber
I haven't decided on race yet; either human or half-orc.
I plan to play a Hunter Mammoth Rider with a Megatherium animal companion (as they have the natural ability to climb). Rather than going all 9 levels in Hunter though, I might dip 2-3 levels in Ranger or Fighter for better BAB and Favored Enemy/Feat help.
Pathfinder Adventure Path Subscriber
Mogloth wrote:
Doing away with XP would be an incredible thing. XP is so archaic.
Don't see the point of making such a drastic change, honestly, since they already give you what you want at the beginning of every adventure anyhow. There are those of us that still enjoy XP, actually. I know my players very much enjoy the tangible reward at the end of every game.
Additionally, as mentioned already, XP doesn't hinder anything when it comes to progression through adventures. Make more higher CR fights instead of all these APL -2 ones we're getting, include more story awards for roleplaying XP, and you could easily get up to 20th in six books (if so desired). Again, this matters not to me, as I have no problem with them cutting it off at 17th or so at AP's end.
I do so love archaic things! History is awesome!
Pathfinder Adventure Path Subscriber
We all have life issues . . . such comes from living life!
2 people marked this as a favorite.
Pathfinder Adventure Path Subscriber
Orthos wrote:
I think the main obstruction to such a thing is, I have to say it, the XP Budget. So long as that restriction is in place, the majority of such efforts will be hamstrung by the need to keep encounters to relatively add up to the expected amount of experience for that particular section/module/quest.
If you could start the module or adventure with a disclaimer saying "It is highly recommended that you not use experience as the method of progression for this adventure, but rather grant the players levels and tiers at the appropriately-marked events" and support that by not listing the "XP ZZZ,ZZZ" line in ANY statblocks, you could probably pull it off. Someone could, at least.
Or, maybe the could forgo the idea that a single printed adventure needs to have 20+ encounters in it, settle for something like 12-15 encounters that are difficulty-based, and concentrate the rest of it on story. Wouldn't have to change the XP budget at all, then . . . only the expectations of how many actual encounters a single adventure should have in it.
Pathfinder Adventure Path Subscriber
Because chicks dig them . . .
And glory lasts forever.
'Nuff said.
Pathfinder Adventure Path Subscriber
Just a couple things:
Mogloth wrote:
Yeah, as a player, if I ever get the sense that the GM is out to kill my character simply because I made an effective character, then I'm out. Too many other things to do than play with a GM who has to prove that he can 1up me.
I agree. If the GMs purpose involves showing up the players to the point that they look to eliminate those characters they don't agree with, it's not worth playing a game with that GM. A spiteful GM is not a fun GM by any stretch. I want someone willing to work with me as a player, and that's what I try and do as a GM for my players.
Mogloth wrote:
As an example, my current character in one of my games I am in is a Pouncebarian. I do have Come and Get Me. But, honestly, I rarely use it or activate it.
He is a pure combat machine. He was designed to eat faces. And he does that quite well.
I do believe some caution must be used when creating a character, however. I don't believe there to be anything wrong with a Pouncebarian, or other such powerful force on the field of battle. Unless, that character makes every other character at the table unnecessary. When one character build has become some dominating that the other players no longer have fun, then I have a problem.
Such a problem is typically able to be dealt with via communication, however. You may have that amazing battlefield stomper, but the rest of your table may be playing characters that support or work well with such a character as you have, in which case they are all having a blast with combat scenarios. It's all about group dynamics, in my mind. When a single player decides his character's awesomeness is more important than every player having fun, we've got a problem. Luckily, that rarely happens with my group!
Mogloth wrote:
The prevailing thought in my head during character creation was Wulfgar. I wanted a 2H weapon wielding barbarian from the north.
Wulfgar, however, was not a 2H weapon wielder. Aegis Fang was a warhammer, and thus a one-handed weapon. Just noting that! ;)
1 person marked this as a favorite.
Pathfinder Adventure Path Subscriber
boring7 wrote:
Also, multiple ranged attacks from lots of mooks already kind of operate like that, since they are all within range of the target, I presume that part of the troop or swarm's charm is that they get a larger attack bonus (so the jerk with a 37 AC doesn't just laugh it off).
Actually, as I understood the troop subtype from looking it over in RoW:B5, you needn't have an attack bonus at all. You've got a large number of enemies attacking a specified area with a plethora of arrows . . . the troop makes no attack at all, and instead you treat it more like an excellent ability: PCs roll a Reflex save for half damage, while those with evasion dodge all of it successfully.
Same goes for melee, except without the save. These are a large swarm of enemies flooding over and around you. There is no attack roll, only damage.
I used a troop of hobgoblin regulars against my PCs just last Tuesday, and they were a hit with my group. They loved it!
Pathfinder Adventure Path Subscriber
James Jacobs wrote:
(The adventure that "B" happened to me was, by the way, "Red Hand of Doom," so that was more amusing than annoying, since that particular adventure's got a pretty good reputation...)
Not only did I absolutely love Red Hand of Doom, I incorporated it into my current Kingmaker campaign. Save for the one player that I told, all the others think it is part of the actual storyline of the AP, and they are loving it too!
I've always meant to thank you for the greatness of that mini-campaign, Mr. Jacobs. Well played, sir! HUZZAH!!
1 person marked this as a favorite.
Pathfinder Adventure Path Subscriber
You may wish to consider the module Crucible of Chaos by Wolfgang Baur. It's all about the lost city vibe, and it puts together a better inherent story, as well. It's PF 3.5 version, but it translates incredibly well and is an excellent adventure. It's for 8th level characters, so don't know if that'll make a difference.
1 person marked this as a favorite.
Pathfinder Adventure Path Subscriber
Shain Edge wrote:
Example is if a dog killed your favorite cat. Is the dog evil? You could think so, because that cat has meaning to 'you'. It's amazing how we are ok with a mountain lion killing a fawn, but if the same killed a child? It's a 'man killer(!!!)' and must be put down as dangerous (if not evil).
Because it is a man killer . . . it killed a man (using the term as encompassing all mankind here, should said child have been a girl). Are you saying that this animal should not be held responsible for its actions?
Perhaps the people in the area where this child was killed should seek to make a treaty with said mountain lion. Maybe ask it not to kill children, or anyone, anymore. Surely, if these people simply communicated rationally with this mountain lion, explaining to it that killing people is wrong, it will understand and quit doing it. Such is how any purely rational, intelligent being should react, I would think.
Pathfinder Adventure Path Subscriber
Lucius Erasmian wrote:
zergtitan wrote:
Lucius Erasmian wrote:
False. I am without fault.
then the fault you bear is pride for you lack humility.
Modesty is a virtue only to the weak.
And the meek will inherit the earth!
Pathfinder Adventure Path Subscriber
Ditto on the "get this done" vibe!
1 person marked this as a favorite.
Pathfinder Adventure Path Subscriber
Just a note: I'm relatively positive that Jason B. stated there will be no playtest for this book. Can't remember if it was earlier in this thread or in a different one, but I've noticed a couple people getting excited about playtesting . . . might want to just look forward to the book next Spring! Playtesting isn't going to happen for this one!
Pathfinder Adventure Path Subscriber
Some of the discussed issues of versatility for sorcerers are not as applicable anymore either thanks to gear. For 5k gold, a sorcerer can get their hands on a Mnnemonic Vestment, which enables them to cast any spell they can get their hands on. Likewise, Rings of Spell Knowledge can help them to know more spells, as can favored class bonuses these days. Limitations to these items are obvious, but they greatly increase the sorcerer's versatility at any given time.
Pathfinder Adventure Path Subscriber
Bossun wrote:
With the aforementioned information in mind... what I want to see is a skill test system for everything, most especially trap finding. Make trap finding something more than some one in the party spotting a trap and the rogue disabling it because he just happens to have +1 to +10 points better in disable from his class. Make it worthwhile to be a rogue! You remember that D&D movie that only the otaku/cult mentality types liked because they love D&D that much? I want to see traps like that! That's what makes it exciting to be a rogue. I want to be a rogue because the game makes it worthwhile and fun to be one, not because the party needs one "just in case we run into a trap".
I can completely appreciate this thought, though I think more needs to be done with traps period. Traps in 3.X have always been something of a disappointment in that they're not dangerous. You get a nice CR 16 trap that's really nothing more than pathetic because it has a DC 33 Perception/Disable Device score which any rogue by that time has no problem disabling. And these high CR/easily disabled traps take up half-a-page with their descriptions on how they work, despite the fact that the trap itself will never be used because it will be seen and disabled before anyone ever triggers it. Traps need to be made deadly again, or at least something more than just free XP. Devise a system that makes them a challenge! I'm fine with the rogue being the primary trap finder/disabler, of course, but if it actually became something of a mini-game in and of itself, that would be cool, too!
Bossun wrote:
Give us a threat system, and give certain classes like rogues and rangers a way to ignore threat so that they can target that pesky spell user anyways.
Be careful with this. Now you're talking about taking PnP gaming and turning it into an MMO, which I would not appreciate one bit. Challenges in PnP gaming should not be programs. That would make the whole system far less fun when you can force an enemy to behave in a certain way through a threat system like some bot in a computer game. I want villains/enemies that think for themselves and adjust according to their intelligence and what the GM knows about how they think. When you attach a system that dictates how villains/enemies perform, it cheapens them, and it destroys enjoyment and intuitiveness in the game.
Bossun wrote:
Above all, expand on your teamwork feats idea. GIVE US MORE BENEFITS FOR WORKING TOGETHER AS A TEAM AND LESS BENEFITS FOR BEING THE STRONGEST IN THE PARTY! It is a team game, not a soloist game. Reward the party with a system that supports teamwork.
I absolutely agree with this! One of the big issues I find with the game as it currently stands is that everyone wants to be the Big Show, that one character that can do it all. If I can't build a character that hits every time, deals an enormous amount of damage on every hit, can roll high on every skill check, have high save DCs for my magic that can't be defeated, and never fails a saving throw, then there's something wrong with the class/game. I would actually be more appreciative of a system designed where a single character can't do near as much cool stuff on his/her own, but which becomes more potent when actively and cooperatively working tactically with a group. A system that encourages this and not "why can't my fighter/rogue/monk/barbarian/sorcerer/etc. completely win the game alone?!?!" would be most welcome!
Pathfinder Adventure Path Subscriber
magnuskn wrote:
JFK68 wrote:
I don't think Great Cleave works on Mirror Image.
Not per RAW, since Paizo inexplicably decided to buff the best second level spell in the game and then, when people were justifiably upset and confused by that decision, clarify via FAQ that, yes, they wanted Mirror Image to be even more OP than it already was throughout 3.0 and 3.5.
I don't roll with that, hence (Great) Cleave/Whirlwind Attack work just fine to get rid of Mirror Images. Arcane casters are OP enough already and that way those otherwise almost useless feats have some value at high levels.
Granted, I'm coming into this late, since I never really played 3/3.5 AD&D, but only Pathfinder, I'm going to say that they actually kind of weakened mirror image from 2E, since you can actually dispatch images without even rolling high enough to touch the actual individual. In 2E, if you didn't hit the AC of the real creature, you didn't touch a single image either. The PF mirror image spell says that if you come within 5 of hitting the target creature's AC, you've still dispelled an image. That only makes it easier to get through the spell, at least from my own personal history. Do players hate the spell? Oh yeah! When my monsters/villains use it, I hear a collective grinding of teeth around the table! I'm fine with that though, because it does give my enemies a little more longevity in combat, which makes things more exciting at the same time.
Naturally, magnuskn, I agree with all the talk about there being major issues with Mythic play. I do admit though that one has to be careful about assessing Mythic will supplying all the problems when our own house rules can oversimplify things for our players and make it so much easier on them, as well. Not to say that said villain above couldn't have been taken down just as easily by a magic-using member of your party perhaps, if Great Cleave hadn't worked to eliminate all those images. However, the fact that Great Cleave worked on a spell it shouldn't have via a house rule can't be used as justification that Mythic makes combat too easy. That's an unfair and misleading justification.
Truly enjoying this thread and the discussion taking place here. I believe that you're doing the community a service via the keeping of this log thread, though it sounds like that may be coming to a close soon, sadly. Keep up the good fight, sir!
Pathfinder Adventure Path Subscriber
Auren "Rin" Cloudstrider wrote:
Rathendar wrote:
Not seeing it your way here.
just as humans use cattle on farms for sustenance required to survive, vampires use free humans for sustenance. at least vampires don't cage their "meal tickets" the way humans do. humans keep cattle encaged behind small fences on a farm to be raised for nothing more than to die and feed their human masters, vampires don't do that to humans at all.
I'm actually a little bit concerned that, in your personal view, humans equate to nothing more than cattle. ;)
Humans are intellectual superior beings to cows. Vampires are not intellectually superior beings compared to humans, but are equally intellectual due to the fact that they are human undead. If a vampire that once was human maintains its human intelligence, it should realize without doubt that killing other humans is an inherently evil act that one should not do. That it chooses to do so, treating another human being as nothing more than a (relatively) mindless animal, indicates the inherently evil nature of the vampire.
Especially since, if blood is all it needs, it could simply take the blood from the cow.
Just sayin'.
Pathfinder Adventure Path Subscriber
OldManJim wrote:
Here's a link to the map of The Stolen Lands / Brevoy / Pitax / Mivon etc.
Be warned, it's a 16.5MB jpg file.
It shows what I think are the house borders in Brevoy, along with major towns & my best guestimate at major roads.
This version of the map should be useable by any GM running Kingmaker without giving any major spoilers, plus the Stolen Lands are left empty (no Fort Drelev / Varnhold) so you can place them differently if you wish.
Seriously, dude . . . this is the most incredible thing ever!!!!! You're amazing, and I pray your life is truly blessed!
Pathfinder Adventure Path Subscriber
This was the first AP I ran to completion.
1) GM Ease of Play: (3/10) If Kingmaker needed a GM willing to put the work in to make that AP his or her own, Serpent's Skull required just as much effort just to make the AP viable for play. Book One served its purpose exquisitely well, but Book Two through Four required an enormous amount of work on my part to run well, especially the infamous Book Three. Books Five and Six ran themselves relatively well with a couple alterations here and there, but without the extensive work in those middle books, it's quite possible a group will never get to the final third.
2) Synthesis of the Story: (6/10) I actually think the story does fit together fairly well, and it even has its moments of excitement for the players. However, it can get quite railroady in Book Two and in Book Five, especially. The PCs are literally expected to go a certain way, or to work with certain races that there's no guarantee or likelihood that they will or would. I had to eliminate a significant portion of Book Five because for my players it just wasn't feasible that they'd deal with a certain group. There were workarounds, but they were all still involving dealing with that certain group in some capacity, and that just wasn't possible. A few more or different story options would have increased this score by a point at least.
3) Role-play Friendly: (9/10) This AP still worked quite well in this category. There were plenty of NPCs for the characters to interact with, which was truly necessary since there was virtually not travel outside the location discovered at the beginning of Book Three. Civilization, in general, was out the door by Part II of Book Two, in fact! This is one aspect this AP still got right, which is one of the reasons why I love Paizo so much! They never fail to give me plenty of viable roleplaying encounters or opportunities for my players!
4) Combat Design: (5/10) The vast majority of the combat design worked well for the appropriate levels and 15-point character builds, but there was a ton of repetition found here, especially in Books Three and Five. Naturally, this does favor the PCs, because once they realize the best tactic to defeat a specific type of enemy, and then they face that enemy a dozen or a score more times in rapid repetitiveness, well, you understand . . . The final conflict, as written, was a huge letdown, too. I did a lot of beefing up the second to last encounter to make it a CR 20, which I accomplished by throwing in villains from earlier that had interacted with the PCs (in some cases numerous times) but always got away. By doing this, it caused the final confrontation--a CR 19--to be more hair-raising because they'd had to use up more resources in the fight immediately prior.
5) Fun factor: (7.5/10) We certainly did! My players had a lot of fun, though had I run everything "by the book," this probably wouldn't have been the case. Still, that's pretty much a given for any AP, I think. There were moments and aspects to the AP that wore on them a bit more, though. More traps, more high-end treasure, and more variable enemies would have increased the fun factor a bit more, I think. All of my players commented upon the completion of the AP that for a legendary lost city, there was nothing there for them except for discovering its history (a mechanic I had to build in, since the AP had nothing for that) and saving the world. It just didn't live up to their expectations of what it should have been.
Pathfinder Adventure Path Subscriber
Right there with ya. I love Varisia. It's probably my favorite place in Golarion, and there's plenty they could do there. Keep bringing those Varisian APs as far as I'm concerned. So far, they've not gone wrong there.
2 people marked this as a favorite.
Pathfinder Adventure Path Subscriber
More than anything right now, I'm looking forward to seeing what they've cooked up for this new martial combat system, as well as how they plan on fixing action economy. It's the systems they're playing with moreso than the classes they're "fixing" that make this book worth it to me. People will complain about class issues until the day RPGs go out of style; they'll never fix such things to everyone's contentment. However, if they can make combat more intuitive, that'll be a godsend, I agree!
Pathfinder Adventure Path Subscriber
Seannoss wrote:
Hit points for both the enemies and PCs are a joke when it comes to mythic output. We can all cheat for the NPCs and hand wave their HPs but the character's HPs are written down. There are many foes that can drop a fully healed player in one round or one attack.
If mythic is supposed to be fantasy super heroes then each rank or tier should grant an extra 50-100 hp.
That . . . does nothing, except increase the math. If my players are gaining 100 additional hit points every tier, and my baddies are increasing 100 hit point with every rank, I'm just blowing up the math department, but doing nothing to fix the problem. As far as gameplay is concerned, you're increasing the fights by--what?--a round? Half a round? Still not superhero material here.
I always thought this hilarious when I saw friends playing FF games, too. "Look how much cooler this is!" they'd tell me. "My tabletop character has 16 hp at level 3, but my FF character has 500!"
My response: "And how much do the enemy hit you for in FF? 80-100 points of damage a shot? How much different is that than your tabletop character getting hit for 3-4 points a shot? None, except you've got more math to work out."
Tossing hit points around means nothing unless you cut back on damage output. Problem is that doing this makes it feel less mythic in the eyes of many. The system is rather broken, of that I absolutely agree, but throwing out hit points arbitrarily won't fix that.
Well, except it'll make it even easier for PCs to walk through the game, because now they don't have to worry about getting hurt hardly at all while taking down the big bads in a round or less.
|
global_05_local_5_shard_00000035_processed.jsonl/18770
|
Paizo Top Nav Branding
• Hello, Guest! |
• Sign In |
• My Account |
• Shopping Cart |
• Help/FAQ
About Paizo Messageboards News Paizo Blog Help/FAQ
nd23rin's page
13 posts. No reviews. No lists. No wishlists.
That is helpful....but one thing I struggle with is: should I be asking them to do perception check or do they need to ask for it themselves. That's more of a general GM question I guess.
Also, My PCs when they heard Roldare wailing, wanted to go through other door in the very 1st room which would take them to room 6. Am I supposed to let them do it? It seemed like it would screw up progression and story. I ended up just telling them that door was almost impossible to open...hinting to them to just not bother and follow the path to room 2.
Hi All-
So I was running through my first play of “Crypt of the Everflame” which happens to be only my second adventure ever. I was GM running it with only two players playing two characters each. This is a group of players also with no experience (my wife and kid ). When we ran the beginner box adventure, things went fine, but I have found running Crypt of the Everflame…that we are struggling to get through some parts. We played last night but quite frankly, I felt that getting through some of these difficult areas are slowing the game down to the point where my players are losing interest quickly. Hoping to get some from those familiar this module:
1. On the first part of the crypt itself (lower level), there is a room called Maze of Pits. The pits have pillows at the bottom, as they were setup as tricks, etc, etc. When my PC’s walk into the room and fall into one they take some non-lethal damage after a reflex save. So as they fell into them, the nonlethal damage thing became really monotonous. Also, how can they get out of the pits?
2. It says that a player poking around with a stick would be able to notice the traps, but if they didn’t know traps were in the room why would they be poking around with a stick?
3. After pulling all 3 switches at once the door opens, however it only opens for one round and the far switch is REALLY far from the door. How could that player get all the way through the door at the other end?
4. Once the PC’s reach the door to Roldare’s chamber, they are supposed to complete a “trio of strength checks” to push it open. However it also mentions the door is locked with a device. So, is it a choice? Is the crossbow fired between each strength check or each “group” of checks (four players)?
5. My players didn’t choose to pay any attention to Roldare’s sister. So should I just let it be?
6. After meeting Roldare they made there way to the room with the large beetle. But the room seems awfully small for the beetle plus 4 PC’s. There is really no room for maneuvering unless I am missing something.
7. In this room the module reads to the PC’s something along the lines of “the room is mostly empty, save for the body of a villager”. However then its says later that the beetle attacks anyone who enters. How should this play out? Is this a situation where there is a surprise round? It just seemed kind of clunky to me. The PC’s walk in, I tell them the room is empty save for a body and then immediately tell them to roll for initiative?
8. When I am attacking as the GM, when do I know when to use the monsters “special moves” etc?
9. When reading a statblock it will say something like HP 19 (3d8+6)…what is the second part referring to?
Thanks so much for your help guys / gals. I am sorry if this is poorly written, but I am writing at work so wanted to get the questions out fast as I know how helpful this group normally is!!
Thanks Again!
Hey All, I was wondering what I might need to do to convert Crypt of the Everflame to play using only BB rules. Some of the enemies seem to incorporate things from the core rules, so wouldn't the PC's be at a disadvantage? Thanks!
"Remember that if the cleric channels near living enemies that those enemies are healed too."
But not if they are undead right? Don't they have to be same type as the others otherwise it would actually hurt them?
I get the idea that your party doesn't have to physically wait 8 hours for them to rest, but if its just the act of saying "OK we rest here" and then a second later all spells are refreshed....that doesn't sound right to me.
If you are in a corridor of a cave why not just rest there. How would you know the goblins were actively patrolling that area?
So, in between encounters the cleric can just say "I am preparing new spells" and thats it? He can then do it again after the next encounter?
OK, when you say that feats are passive bonuses, that makes it much clearer. So another question about time. I understand the 6 seconds idea, but things like, once per day, or must rest for an our to prepare spells....well not so much. Scenarios like the one we played seem to occur in one day. However, if we decided to just say let's rest here, an say its been 8 hours...I dont understand? So if I was about to start an adventure with 4 others I would have to sit out an hour of game time to prepare spells?
Last night I ran most of the way through the Beginner Box Adventure in the GM Book. Played it with only three PC's...Cleric, Fighter, Rogue. After playing, I have a few probably basic questions I was hoping the experts could clarify?
1. With the Cleric being able to channel energy, I would think it to be almost impossible to ever have a PC die, or even become very badly injured. Am I missing something with regard to how many times it can be used. I believe it was 6 times it can be used, but for this adventure and given the fact that it heals in 30ft seems like the PC's were always above 80% of HP.
2. In the Rogue pregen character sheet they show the melee attack bonus to be +3, but that doesn't jive with the formula using STR. If I look at the Rogue weapon Rapier it shows attack bonus as +3. Is this because they are assuming the weapon finesse feat is just "turned on at all times", making the bonus based off of DEX even for melee weapons?
3. Again getting back to the whole healing dilemma, if the cleric can either use "Heal" skill or channel energy, isnt it beneficial to just heal between every encounter. It just seems like healing is almost an unlimited benefit making the characters sort of always healed up prior to an encounter.
4. In our game, the fighter pregen indicated he had a longsword and a shortbow. However, is it true he could have taken Longsword and Shortsword and then had two attacks each time? Why would he ever choose bow over two melee attacks?
5. I am confused about the difference between "Detect Magic", "Spellcraft", and "Knowledge Arcana". They seem to this noob to basically do the same thing?
6. The Stealth & Sneak Attack mechanism for Rogues is not making all that much sense to me yet. What does the Rogue need to do to be stealth and how is that related to sneak attack?
7. So Cleric can in one turn channel energy and then attack an adjacent enemy right?
8. Am I to believe that feats like "Weapon Focus" should just always be assumed "on" for that player? Why would you ever not use it? I guess maybe if you wanted to use another feat, say "Power Attack" you would then no longer get the bonus from "Weapon Focus" right?
Thanks for all of the help guys / gals!
OK, this is let me play out a scenario:
3 PC's (Bob, Joe, Tina) just finished defeating a goblin and walk into a room with a large statue at the center and some ancient words inscribed on the walls
1. GM - "What do you guys want to do...Bob?"
2. Bob - "I would like to roll knowledge religion on the writing"
3. GM - "OK, you cant quite make it out."
4. Bob - I would like to roll detect magic on the wall"
5. GM - You can't detect anything in particular
6. Bob - "I would like to roll knowledge history on the wall"
7. GM - you can tell that the wall was built in 1400AD, meaning it probably has such and such a meaning to the group.
Is this type of thing possible...if so, how can the PC's ever lose?
I am brand new to RPG's and struggling with one concept in particular. I understand the sequence of rounds during combat. However, when not in combat what are the general rules for how far you can move, how many skills you can use, etc.
1. Can you walk into a room say and do perception check to find out a trap exists and then immediately do disable trap, or do you have to let everyone else do something first. I guess what I am getting at is, what is to keep people from just doing skill checks until they finally pass.
2. How about movement? Up until players encounter a monster how does movement turns? If a statue is in the middle of the room and a player wants to poke it with his sword, does he have to move first...and if so, what is the use since if not in combat, movement isnt measured?
Hope these make sense.
Hi All-
I have watched some of those videos, and while helpful...they really only helped me with character creation. There are some others out there on youtube as well that are useful, so Ill be checking those out as welll.
One thing that is actually knid of annoying and why I usually don't like beginner box type game modules is that the character sheets are different in the beginner box than what is used in the real game. It is missing half of the skills at least and the arrangement of sections is very different. I realize this is done to make it easier for a new player, but for someone like me who has gaming experience, I would rather just use the full sheet and not utilize all of it, if that makes any sense.
I have a another question:
From afar, it seems that once anyone reads the GM information for an adventure path, say Rise of the Runelords for example, how could they ever truly enjoy it as a player? Wouldn't you always know what gear to buy, room to search, etc?
OK so a couple of quick ones from the beginner guide tutorial adventure.
1. There is a lot of mention of things lasting a certain amount of time. Now, I know that each round in combat is 6 seconds right? However in the scenario it explains how certain potions last 1 minute, etc. in that case is that to be 10 turns or 1 real life minute? I know that's probably a stupid question but just makin sure.
2. So the while idea of taking move actions, 30ft 20ft, etc makes sense in combat rounds, but sometimes it says players are free to do what they want? Then it will randomly say, "the wizard can take a standard action to do such and such". So, when not in combat can you just explore and move around freely?
3. When weapons are foun in chests, etc it doesn't say anything about the cost of pickin them up?
4. When it mentions fire and rolling to save and all of that, it says the fire damage is 4d3 per minute or something that seems really big. Wouldn't the fire kill most level 1 players immediately or is there a difference between fire damage and regular HP damage?
Thanks again! This is one of the best forums I've been on, and I've been on tons.
I have returned. Well first attempt at walking through the tutorial with the wife didn't go that was super slow. However, we agreed to come back to it once I have read more of the guides and rules. So I started watching some YouTube videos and reading everything I could find and I think I had that lightbulb moment where it starts to click. You see, when you have played mostly linear board games and video games that sort of force you really to stick to every little rule without deviation, the rpg concept isn't that easy to grasp. Once I started to read a bunch of the game master adventure paths, it started really becoming more clear to let go of those reatraints. Now I am literally hooked on reading this stuff. I can't believe someone writes all of this stuff....there are literally so many options and the books seem to somehow cover most of it.
Anyway after taking all of this in, we are even more excited to get going. Unfortunately I'm away all week in Denver on business, but I brought my core rules with me to study up on some of the player mechanics. I do have some questions based on what I read, but those can wait until tomorrow when I'm not ony iPhone lol.
Wow, thanks for all of the advice...that helps! If the prepackaged stuff is tougher to "make work" with less people, it will have to work for at least the beginner box stuff.
Right now I think it's hard for me to even imagine how to "make my own" so to speak, because I can't yet wrap my head around the concept of how actual gameplay works. I read through some of the free adventures on this site and although I understand the story that needs to be read to players, I am not sure yet how it will play out. In other words in one of the adventures it says something like, "players are allowed to ask questions about the "mysterious ruin", some of the more common ones are......" OK, so I get that but what if they ask me what color the well is? It has nothing to do with the story, and I dont know the color as the GM. That whole non-linear aspect is still strange to me given my inexperience.
I can see this being yet another potential money pit for me :) which is actually kind of exciting!!!
Hey All, I am completely new to tabletop RPG's although I have lots of experience with computer RPG's such as Elder Scrolls, Baldur's Gate, Witcher, Skyrim, World of Warcraft, etc. I am reading that Pathfinder is much better than D&D 4ed especially with beginner's box. I do have a couple of questions, hopefully not to noobish!
So right now, I think I can get bigger groups together on occasion, but a lot of times it would be me and the wife and possibly my young son. I realize these types of games are not made for small groups, but what are some ways we could play with just us three? Can my son play one character, I play 2 characters and my wife be GM? Can GM also play a character?
If I buy the beginner box, and money is not a huge issue, will it be good for learning purposes to buy the core rules and maybe bestiary or any other books. I have a work trip coming up so I will have lots of time to read, etc.
The beginners box comes with one set of dice, but with them being so cheap does it make the game run a lot smoother with more than one set?
Any other recommendations?
Thanks all for your help
|
global_05_local_5_shard_00000035_processed.jsonl/18790
|
Viewpoint: Good fortune from a broken mirror
• Klaus Jungmann, Kernfysisch Versneller Instituut, University of Groningen, 9747 AA Groningen, The Netherlands
Physics 2, 68
A huge, predicted atomic parity violation has now been observed in ytterbium, further aiding tabletop experimental searches for physics beyond the standard model that complement ongoing efforts at high-energy colliders.
Illustration: Carin Cain
Figure 1: Electrons in an atom interact with the nucleus through the electromagnetic force via the exchange of massless photons (γ). The weak force is mediated by Z0 bosons. The weak effects by themselves are too small to see directly. However, it is possible to measure the effect of Z0 boson exchange between an electron and a neutron by looking at the quantum mechanical interference between this process (right) and the electromagnetic interaction (left). The figure provides a pictorial representation of how the quantum interference between the two processes—the sum of the amplitudes squared—contributes to a measureable signal.Electrons in an atom interact with the nucleus through the electromagnetic force via the exchange of massless photons (γ). The weak force is mediated by Z0 bosons. The weak effects by themselves are too small to see directly. However, it is possible ... Show more
The Berkeley group performed laser measurements to determine how the weak force, which very slightly modifies the interactions between the electrons and the nucleus, affects the ground state of an Yb atom. Since the weak interaction effect is much smaller than the Coulomb interaction between the electrons and the positively charged nucleus, a tour de force in experimental efforts is required to extract it from the transition rate between the ground state and an excited state. Tsigutkin et al.s experimental success is based on careful quantum mechanical interference techniques and their ability to thoroughly control systematic effects that could otherwise mimic a signal. But to fully appreciate the Berkeley group’s experimental art, some background is first required.
The standard model of particle physics describes every known electromagnetic, weak, or strong process in nature in one coherent picture over the entire energy range that is currently accessible by experiment [1]. We know that matter consists of fundamental fermions: the leptons such as the electron, and the quarks, which form hadrons such as protons and neutrons. The forces between the matter particles are mediated through the exchange of “gauge” bosons. These are the massless photons γ for electromagnetism, massive Z0, W+, and W- bosons for weak processes, and eight gluons for the strong interaction.
The weak force is special because it does not respect certain discrete symmetries. These include the parity (P) (or, the mirror symmetry), which describes the symmetry between right- and left-handed particles; charge conjugation (C), which is the exchange of particles by antiparticles, i.e., particles with the same mass but opposite charge; and the combination of these two symmetries (CP). Scientists first observed parity violation in 1957 with a crucial pioneering experiment on the β-decay of polarized 60Co nuclei [5] where it was found that electrons are emitted preferentially in the direction of the nuclear spin. The standard model explains this process by assuming that the W± bosons that govern the weak interaction only exist in a left-handed version.
One outgrowth of the standard model is that the electromagnetic and weak interactions are really just different manifestations of one single electroweak force. This unification led to the prediction of another neutral boson called the Z0, which was observed in both high-energy neutrino scattering experiments [6] and at low energies in atoms. The discovery of Z0 removed any doubts about the general correctness of the theory [7] and became a crucial success of the standard model. The Z0 boson exchange in atoms between electrons and nuclei is associated with parity violation and manifests itself, for example, by different absorption of left- and right-circularly polarized light [3].
The virtual particles that carry the electroweak force can exist only for a short time Δt, given by the energy corresponding to their mass mX and the Heisenberg uncertainty relation. This gives them a range rX=cΔtħ/(mXc), which for photons is infinite, but for weak bosons is only 1/1000 of the diameter of a proton or neutron. As a consequence, the weak effects in atoms are very small and only affect those electrons with wave functions that overlap with the nucleus, such as the ground state in Yb. Since the weak effects are so small, we can fairly accurately calculate the electronic energy levels in atoms using only parity conserving electromagnetic interactions and a purely electromagnetic Hamiltonian describing the Coulomb interaction between electrons and the nucleus, which is mediated by γ exchange. The additional small contribution from Z0 boson exchange can be treated as a perturbation that mixes wave functions of different parity, i.e., the true energy levels in the atom correspond to mixtures of different parity electromagnetic states [8]. Now, the closer states of opposite parity are to each other in energy, the larger their mixing will be. In this respect, nature has bequeathed Yb with a favorable atomic structure in which weak effects are actually quite large [9]. In addition, in the standard model the strength of weak interactions is characterized by a quantity called the weak charge QW, which is determined primarily by the number of neutrons in the nucleus (the protons play only a minor role). The size of parity violation effects in atoms also scales approximately with Z3, which favors observing such effects in heavy atoms, like Yb [8], or heavier.
The experimental challenge in the Yb atom experiment performed by the Berkeley group is to make the tiny parity violating effect visible. For that, the authors have chosen to laser excite the “forbidden” transition 1S0 (6s2) to 3D1 (5d6s) at 408-nm wavelength. Because Z0 boson exchange mixes the 3D1 state with the 1P1 (6s6p) state, there is a tiny transition amplitude ζ for this otherwise forbidden transition. This amplitude would provide a measure of the weak interaction, but it cannot be measured directly. The trick therefore is to place the Yb atoms in a combination of static magnetic and electric fields [2, 4]. The magnetic field splits the magnetic sublevels in the excited state (the Zeeman effect). The electric field E also mixes atomic states of opposite parity (the Stark effect), which interferes with the parity mixing in the atom and yields a strong enhancement of the overall observable effect. In particular, two terms arise in the transition rate R between the ground state and individual Zeeman levels. One of them is determined by the Stark effect only and is proportional to E2 and the second one (represented pictorially in Fig. 1) comes from the interference between the Stark effect and the weak interaction and is proportional to ζE. Hence RaE2 +bζE, where the constants a and b depend on the states involved in the transition and the light polarization and intensity. To separate out the second, much smaller term, the Berkeley group modulates the electric field at a frequency ΩM. The transition rates then contain a part that depends on ζ and oscillates at ΩM and another part that oscillates at 2ΩM. With a modulation phase and frequency sensitive detection (lock-in) method they were able to produce a signal at ΩM , from which the parity violation amplitude can be extracted, on top of a background that is some 25 times larger that the signal itself.
The measurement at Berkeley demonstrates that it is possible to observe parity violating effects in complicated atoms such as Yb. This is an exciting result, because there are seven stable isotopes of Yb. The strong dependence of the weak charge on the neutron number means it will be possible to study the effect of nuclear neutron distributions on the weak interaction in Yb [10]. The so-called anapole moments, which reflect the parity violating interaction between a single (valence) nucleon and the core of an atomic nucleus [11], can be accessed by looking at different hyperfine components in isotopes with odd neutron number. These experiments are very sensitive to small perturbations and systematic errors, but the Berkeley group shows that with time they should be able to minimize these problems.
The Ytterbium experiment can potentially go further than verifying physics within the standard model—it may permit future sensitive searches for new physics beyond the standard model. It’s not surprising that the theory may need to be extended, given that that there are still many open questions, among them why there are exactly six leptons and six quarks, and which mechanisms underlie certain symmetry breakings.
Beyond Yb, there are a number of complementary experiments on their way that use isotopes of the alkali atom francium (Fr) [12] or of the alkali-like barium ion (Ba+) [13] and radium ion (Ra+) [14]. (The theoretically predicted enhancement factors of weak effects in these atoms compared to Cs are 2.3, 16, and 52.) The atomic structure of these two atoms is simpler and easier to calculate than that of Yb. The combination of advanced calculations and these precision experiments will allow us to determine the weak charge QW to much better than 1% accuracy. Together, these atomic parity violation experiments has the great potential to reveal new physics such as a new weak boson Z0, supersymmetric particles, leptoquarks, or smaller components making up the matter building fundamental fermions, all of which would cause a modification of the weak charge and the Weinberg angle (a free parameter in the equation that determines the strength of the weak interaction) [12, 13, 14, 15, 16]. Alternatively they can provide important limits on parameters in such models, which have been suggested to extend the standard model, and thereby steer theoretical model building—just as cutting edge experiments in Cs and its subsequent theoretical exploitation continue to do [16].
More than 50 years after the discovery of mirror symmetry breaking in physics, the subject remains lively and has a robust chance to provide new surprises. The large weak effects in heavy atoms, such as what the Berkeley group has demonstrated in Yb, open a new round for exploiting the broken mirror symmetry and shine new light on the yet not-understood features of the standard model.
1. S. L. Glashow, Nucl. Phys. 22, 579 (1961); S. Weinberg, Phys. Rev. Lett. 19, 1264 (1967); A. Salam, in Elementary particle theory: relativistic groups and analyticity, Proceedings of the 8th Nobel Symposium, edited by N. Svartholm (Almquist and Wicksell, Stockholm, 1968); G. t’Hooft, Nucl. Phys. B33, 173 (1971); G’Hooft and M. Veltmann, Nucl. Phys. B44, 189 (1972)
2. K. Tsigutkin, D. Dounas-Frazer, A. Family, J. E. Stalnaker, V. V. Yashchuk, and D. Budker, Phys. Rev. Lett. 103, 071601 (2009)
3. M. A. Bouchiat et al., Phys. Lett. 117B, 358 (1982)
4. C. S. Wood et al., Science 275, 1759 (1997)
5. C. S. Wu, Phys. Rev. 105, 1413 (1957)
6. F. J. Hasert et al., Phys. Lett. 46B, 121 (1973)
7. S. Weinberg, Dreams of a Final Theory (Pantheon Books, New York, 1992)[Amazon][WorldCat]
8. P. G. H. Sandars, Phys. Scr. 36, 904 (1987); M. A. Bouchiat and C. Bouchiat, in Parity Violation in Atoms and Polarized Electron Scattering, edited by B. Frois and M. A. Bouchiat (World Scientific, Singapore, 1999)[Amazon][WorldCat]; V. F. Dmitriev and I. B. Khriplovich, Phys. Rep. 391, 243 (2004); J. S. M. Ginges and V. V. Flambaum, Phys. Rep. 397, 61 (2004)
9. V. A. Dzuba et al., Z. Phys. D 1, 243(1986); D. DeMille, Phys. Rev. Lett. 74, 4165 (1995)
10. B. A. Brown et al., Phys. Rev. C 79, 035501 (2009)
12. G. Gwinner et al., Hyperfine Interact. 172, 45 (2006); G. Stancari et al., Eur. Phys. J. Special Topics 150, 389 (2007)
13. J. A. Sherman et al., Phys. Rev. A 78, 052514 (2008)
14. L. W. Wansbeek et al., Phys. Rev. A 78, 050501 (2008); B. K. Sahoo et al., Phys. Rev. A 79, 052512 (2009); K. Jungmann, Hyperfine Interact. 171, 41 (2006); R. Pal et al., Phys. Rev. A 79, 062505 ()
15. M. J. Ramsey-Musolf, Phys. Rev. C 60, 015501 (1999)
16. S. G. Porsev et al., Phys. Rev. Lett. 102, 181601 (2009)
About the Author
Image of Klaus Jungmann
Klaus Jungmann studied physics at the University of Heidelberg, Germany, and was later a post-doctoral researcher at IBM Almaden Research Center in San Jose, California. He is currently a full professor at the University of Groningen and director of the Kernfysisch Versneller Institute, which oversees a dedicated facility (TRIμP) for research on fundamental interactions and symmetries at low energies. His research interests lie at the interface between atomic, particle, and nuclear physics in precision experiments. This includes the determination of fundamental constants and searches for new physics with free muons and the muonium atom.
Read PDF
Subject Areas
Atomic and Molecular PhysicsParticles and FieldsNuclear Physics
Related Articles
Synopsis: Quantum Microscope Images Fermionic Atoms
Atomic and Molecular Physics
Synopsis: Quantum Microscope Images Fermionic Atoms
Two new quantum gas microscopes demonstrate the imaging of fermionic atoms in an optical lattice, providing a step towards simulating complex electronic systems. Read More »
Synopsis: Spatial Tests of Dark Matter
Synopsis: Spatial Tests of Dark Matter
Maps of merging galaxy clusters could help find signatures of dark matter based on its decay into photons. Read More »
Viewpoint: Cavity with Iron Nuclei Slows Down X Rays
Viewpoint: Cavity with Iron Nuclei Slows Down X Rays
More Articles
|
global_05_local_5_shard_00000035_processed.jsonl/18802
|
Take the 2-minute tour ×
Why does the following code output y>x when clearly 1>-1?
unsigned x=1;
signed char y=-1;
else {
Please explain this result.
share|improve this question
closed as off topic by tdammers, gnat, maple_shaft Nov 9 '12 at 12:13
3 Answers 3
Implicit type conversion is biting you. Because x is unsigned, y is cast to unsigned as well; because -1 doesn't fit in an unsigned char, it overflows and becomes 255 (the bit-wise unsigned char equivalent of -1), which obviously is larger than -1.
share|improve this answer
But how Compiler decide whether unsigned would be cast to signed or vice-versa ? – Sudhir Nov 9 '12 at 11:08
sudhir: It will just do it because it has to. It just can't compare them otherwise at all. The internal bit representation is different and not converting would not make sense too. In fact there isn't really a "good" way to do it for the compiler and it's the job of the programmer to prevent such situations by either using proper datatypes or doing manual conversion when necessary. – thorsten müller Nov 9 '12 at 11:12
@thorstenmüller It means always there would be casting of signed to unsigned. Is there is a possibility of unsigned to signed conversion? – Sudhir Nov 9 '12 at 11:16
@sudhir: yes, of course. You can always cast explicitly to avoid such things. Another thing I've seen a lot is storing individual chars in int variables. – tdammers Nov 9 '12 at 11:18
@thorstenmüller I have one more confusion when Iam removing unsigned from int then the output must be same as by-default int is unsigned.But the output gets reversed.Why so? – Sudhir Nov 9 '12 at 11:27
This is a case where hopefully you are getting a compiler warning about the mixing of an unsigned and unsigned value. It may be even more specific where it talks about an unsigned lvalue and a signed rvalue.
This example underscores the hazards of C and to a lesser extent, C++ (which tends to be a little more strict about type checking, and which offers multiple kinds of casts). If you want to write good quality C code several things can help:
• As a basic precaution, use compiler options to generate the strictest warnings possible.
• Very specifically, avoid mixing of signed and unsigned values in comparisons and most calculations. (signed = signed * unsigned OK, signed = signed + unsigned OK, most other mixing, bad).
• Use printf(), trace(), or inspection of variables in a debugger to better understand where things go wrong. If your program included a statement like printf("x=%d, y=%d/n", x, y); you would see that things went bad as -1 was assigned into y.
• Study, study, study... C is a demanding language and you should make yourself as expert as possible on the semantics and side-effects of signed and unsigned comparisons and calculations. You also need a very high degree of attention to detail about the range of input values to equations, the possible range of equation results, and whether constants can actually fit into the variables to which they are assigned.
• When appropriate, use defensive programming techniques like asserts to expose programming problems during development.
share|improve this answer
The compiler does not warn. Implicit casts, even narrowing ones, are valid C, and no warning is issued. Explicit casting on variable assignment is seldom required in C. – tdammers Nov 9 '12 at 11:48
To elaborate: gcc 4.7.1 at least does not warn, at least not for signed vs. unsigned char, and it does produce the correct result (i.e., signed -1 tests smaller than unsigned 1) - but it does warn for signed vs. unsigned int (and, consequently, produces the "wrong" result). My guess would be that gcc casts to a larger integer type to do the comparison; I'm unsure though whether this is standard C behavior. – tdammers Nov 9 '12 at 11:55
@tdammers answer is correct, let me expand a bit.
The binary representation for negative values assumes the highest bit has value of 1. E.g., all negative 8-bit values look like 1xxx xxxx.
8-bit value for -1 is 1111 1111.
Hence, the very same binary 1111 1111 for unsigned is 255. So, the same binary value can be interpreted two different ways, depending if it is signed or not.
In your case, as @tdammers noticed, your -1 is stored into signed variable, but then implicitly interpreted as unsigned. Of course, 1 < 255, hence the result.
P.S. You should always check compiler warnings. All modern compilers would raise a warning on this matter.
share|improve this answer
|
global_05_local_5_shard_00000035_processed.jsonl/18804
|
Same-Sex Marriage Is a Radical Feminist Idea
Does anyone remember yesterday, before our minds were blown away by watching (on Twitter) Roberts vote to uphold the Affordable Care Act and Kennedy join with the three billygoats to declare the whole thing unconstitutional? I’m having trouble remembering, too. But my notes here say that yesterday I wrote about David Blankenhorn’s decision to support same-sex marriage, and I critiqued (via something Richard Kim wrote at The Nation) the more progressive faction of the LGBT movement for their long-ago hopes of rerouting the marriage equality movement into a more general attempt to overhaul marriage and family law.
That post yesterday took some hits, in ways that suggested I hadn’t accurately conveyed my beliefs. In particular, Chris Geidner wrote, in a series of tweets that I’ll condense here:
Whoa: @ejgraff takes on @RichardKimNYC (& many others) in an almost stridently conservative piece: The piece, in several places, was dismissive of what was a far more even split on how to approach marriage than you treat it. It reads, in many ways, like something Sullivan would write. Which is, of course, interesting in its own right. And then, to add your dig at those w advanced degrees who want to think deeply about these issues, it was a very striking piece.
The fact that Geidner would call me conservative, much less stridently so, suggests that the post left out some key portions of my thinking. So let me try to backfill here. I first started writing about same-sex marriage (before we called it “marriage equality”!) in the mid-1990s to counter both the antigay folks and Andrew Sullivan’s high-profile contention that marriage was inherently conservative and would domesticate gay men. In fact, I’m going to post here the piece that I published in The Nation on June 25, 1996. I was younger and angrier then, so the tone is a little strident. I can no longer find this piece on their server, so I am going to quote large swaths of it here, leaving out some then-contemporary references that are no longer contemporary:
The right wing gets it: Same-sex marriage is a breathtakingly subversive idea. So it’s weirdly dissonant when gay neocons and feminist lesbians publicly insist—the former with enthusiasm, the latter with distate—that same-sex marriage would be a conservative move, confining sexual free radicals inside some legal cellblock. It’s almost as odd (although more understandable) when pro-marriage liberals ply the rhetoric of fairness and love, as if no one will notice that for thousands of years marriage has meant Boy+Girl=Babies. But same-sex marriage seems fair only if you accept a philosophy of marriage that, although it’s gained ground in the past several centuries, still strikes many as radical: the idea that marriage (and therefore sex) is justified not be reproduction but by love.
… Same-sex marriage will be a direct hit against the religious right’s goal of re-enshrining biology as destiny. Marriage is an institution that towers on our social horizon, defining how we think about one another, formalizing contact with our families, neighborhoods, employers, insurers, hospitals, governments. Allowing two people of the same sex to marry shifts that institution’s message.
…Very little about marriage is historically consistent enough to be “traditional”. That it involves two people? Then forget the patriarch Jacob, whose two wives and two concubines produced the heads of the twelve tribes. That it involves a religious blessing? Not early Christian marriages, before marriage was made a sacrament in 1215. That it is recognized by law? Forget centuries of European prole “marriages” conducted outside the law, in which no property was involved. That it’s about love, not money? So much for centuries of negotiation about medieval estates, bride-price, morning gift, and dowry... Those who tsk away such variety, insisting that everyone knows what marriage really is, miss the point. Marriage is—marriage always has been—variations on a theme. Each era’s marriage institutionalizes the sexual bond in a way that makes sense for that society, that economy, that class.
So what makes sense in ours? Or, to put it another way, what is contemporary marriage for?... Its answer has to fit our economic lives. In a GNP based on how well each of us plumbs our talents and desires in deciding what to make, buy, or sell, we can hardly instruct those same innards to shut up about our intimate lives—as people could in a pre-industrial society where job, home, and religion were all dictated by history. The right wants it both ways: Adam Smith’s economy and feudal sexual codes. If same-sex marriage becomes legal, that venerable institution will stand for sexual choice, for cutting the link between sex and diapers.
Ah, but it already does. Formally, U.S. marriage hasn’t been justified solely by reproduction since 1965, when the Supreme Court batted down the last laws forbidding birth control’s sale to married couples....
A more notable progressive shift is that… marriage law will have to become gender-blind. Once we can marry, jurists will have to decide every marriage, divorce, and custody question (theoretically, at least) for equal partners, neither having more historical authority. Our entrance might thus rock marriage more toward its egalitarian shore.
Some progressives, feminists, and queer nationalists nevertheless complain that instead of demanding access to the institution as it is, we should be dismantling marriage entirely. But lasting social change evolves within and alters society’s existing institutions…. Making lesbians and gay men more visible legally will insist that there is no traditional escape: that our society survives not by rote but by heart.
Yesterday, I was trying to accurately characterize the intellectual underpinnings of the Blankenhorn/Gallagher/Catholic Church idea that all of the above is bad. It’s worth understanding that their opposition does have logic. But here’s my larger point: They’re fighting a rearguard action. Once upon a time, as I’ve written before, marriage was a gendered labor partnership, the way families exchanged one of two ways of enabling their offspring to make a living: land or labor. If your family had property, they found another family with whom to exchange it, through you. If you belonged to the rest of us, you found a fellow worker whose savings and skills matched up with yours, and started your own farm or blacksmitherie or butcher shop. But with the rise of capitalism, work left home. Very rarely does a working couple today work together in a family business. For the most part, we explore and exploit our own skills and talents, looking for what we have that the market will buy. We do the same on the love market. Capitalism is a radical centrifuge, spinning apart the various parts of our lives and hopes—work, income, sex, intimacy, babies—into unrelated à la carte items. They needn’t match up for us to survive in this economy. Often they do not. Those mismatches can lead to a different sort of agony (see under: divorce, infertility, unemployment, et al.) But those are the challenges of our era.
One thing I didn’t yet understand in 1996, before I had researched the social history in depth, was that between 1850 and 1970 marriage law underwent a feminist revolution. For various reasons, as industrial capitalism ascended married women had less power under Western marriage law than they had had previously. The early feminist movement changed that, knocking down all kinds of barriers to married women’s equality. The Married Women’s Property Acts were radical and hard-fought legal changes that allowed women to own what they inherited and earned. Women gained the right to have custody of their own children. They gained independent legal identities, the right to work without their husbands’ permission while married, and the right to vote. During the 1970s, second-wave feminists changed marriage laws still further, inventing the concepts of “marital rape” and “domestic violence”—in other words, giving even married women the right to say no in bed and at home without spousal punishment. The gendered requirements to “obey” and “support” one’s spouse were taken out of marriage laws across the Western world. All these were more bitterly fought than we can imagine today. But as a result, the only gender requirement left now in American marriage law is the entrance requirement—which same-sex couples are challenging.
In other words, same-sex couples are following, not leading, the radical changes made in marriage law since 1850. (There are others, but I can’t recap my entire book here!) All those changes leave room to change the marriage equation from Boy+Girl=Babies to Girl+Girl=Love. Blankenhorn and others who are trying to turn back the clock cannot do it—even though they are correct that marriage equality further inscribes these changes into the institution’s meaning.
Is all this conservative? Was my tone unfair to the radical faction? Well, given that this diatribe is already well beyond an appropriate blog length, let me take all that up in still another post, tomorrow. Stay tuned!
You need to be logged in to comment.
|
global_05_local_5_shard_00000035_processed.jsonl/18825
|
Video Debunking of the Fox News Viewers are Misinformed Study
Also see...
Related Articles
Breitbart Is Here!
FacebookTwitterEmail I generally don’t push videos, other than my own, but I’m going to make an exception for this one.
Share This
Share this post with your friends!
|
global_05_local_5_shard_00000035_processed.jsonl/18839
|
Take the 2-minute tour ×
We currently have about 150 seats and growing. Our IT staff is very small so we need an efficient and accurate way to handle the provisioning of new-hires with equipment, software, credentials, etc. We have several different businesses and departments each with their own software/hardware needs.
The way it works now: When a person is hired, we end up sometimes with several work orders in our Help Desk system requesting various resources. HR manager requests security badge and phone extension. Hiring manager requests phone extension and computer setup. And on and on. Invariably, the hiring manager forgets an app or printer that the new user will require and we are constantly going redoing work.
I'd like a way for the HR manager to start the process and pass buck along to each manager in the chain to check off what the new-hire needs. This would then be submitted to IT. That way there is both a record of what was requested and a checklist for what we need to do. It would also be nice for this same form or software to store what that user was setup with for future reference.
Does anyone have the same problem we do in this regard? How have you solved it? What technology-based solutions have you used?
NOTE: We would be willing to purchase software if its out there but a plug-in for SharePoint or something similar would work too.
Thanks in advance.
locked by HopelessN00b Dec 5 '14 at 10:26
2 Answers 2
up vote 3 down vote accepted
I would start low tech. Once it is working smoothly you can automate it. We are in a similar situation, and are moving this direction (slowly).
1- Build a "new user" checklist. Make it comprehensive, including everything all the apps, options and equipment permutations. Put one person in charge of it, including keeping it current.
2- Only accept these requests from HR. Until HR tells you someone is coming, it is just gossip. Tell everyone that this is the deal.
3- When the request comes from HR, the support person starts a fresh version of the checklist. Then s/he calls the hiring manager, and goes through checklist.
4- The support analyst obtains any approvals necessary.
5- The checklist is then routed internally (in IS) down the line, and as each item is done it is initialed by whoever does it.
6- When complete, it goes back to the support analyst, who delivers the results and files the paper.
The support analyst is responsible for adjusting the checklist as necessary, and for following each instance through the process.
Note #1: I would do the same thing for user terminations. Nothing done without HR or senior exec direction, then follow the checklist. Having one filed for the user is a great place to start at that point!
Note #2: this kind of system is called "workflow", and lots of software will do it (some free, some not). Some issue-tracking software will even do routing through more than one task. But I would get the process dialed in on paper first.
I like your idea of getting it done on paper first. Of course, by paper you mean an infopath form or something. ;) The routing can come later. We use WSS 3.0 which doesn't have built-in support for workflows unless you do it programmatically. Maybe its time to upgrade though. Thanks. – Daniel Lucas May 19 '09 at 18:27
Actually, I would put the checklist in a word doc (or a page in a sharepoint wiki), and print it out when it needs to be used. Only once the precess is settled would I automate it. – tomjedrz May 19 '09 at 20:59
I built something like this as a simple workflow system for someone.
It is part asset management (Tracking resources handed out/created) and part notification/workflow so you can assign particular tasks to particular queues so you can answer the one magical question everyone gets... Where is everything at?.
What I did was create a list of all the resources there could possibly be and categorize them by type (network access, security codes, etc). Next I made profiles for departments or positions so one could be picked and applied to a new hire.
The key item in this kind of a system is making one that is easily extensible. This means, every time you want ot store a new type of data.. you have to create fields in a database which leads to a mess everywhere.
What I built has document templates that allow you to create new fields on the go and store them at any time for all users moving forward. So if you decide to start tracking photocopier codes, you can add that field and initialize the value for everyone. We are getting to the point where we can even send out email notifications for it.
If you'd like to know more, feel free to contact me offline.
If not, good luck, share what you end up doing here!
|
global_05_local_5_shard_00000035_processed.jsonl/18855
|
Forgot your password?
Comment: Garbage. (Score 1) 2219
by JustAnotherIdiot (#46196787) Attached to: Slashdot Tries Something New; Audience Responds!
I've been reading slashdot since about 2004ish, and back then it was my one stop news site for tech stuff.
However, now, I only read it as a joke, a reminder of what used to be.
The editors are a joke, most of the articles put up aren't newsworthy and/or are very poorly edited/summarized.
And this new beta page? Absolute shit.
We get it, the current owners of slashdot don't give a single fuck.
I seriously doubt you hear us, but we hear you loud and clear.
I have no doubt that this beta page will be the straw that broke the camel's back, and long time members will leave in droves.
Comment: Video games. (Score 4, Interesting) 231
by JustAnotherIdiot (#46049801) Attached to: Ask Slashdot: How To Reimagine a Library?
When i think back to my elementary school, there was only one reason to visit the library other than to check out books, and that was to play games on the computers.
We had games like Spellevator Math Blaster as well as some adventure game that constantly quizzed various knowledges that I can't for the life of me remember the name of.
(I wish I did because I never beat it and I'd love to go back and do such now)
The point is, there's many an educational game out there, and it's an easy way to get younger kids learning things they may not otherwise take interest in.
Students Tracked In UK College Via RFID For 1-3 Years 64
Posted by Soulskill
wendyg writes "As part of redeveloping its three-site campus and without consultation with parents or the Information Commissioner, the UK's West Cheshire College installed a highly detailed tracking system using ultrawideband RFID tags handed out to its 14- to 17-year-old students. The system, which cost up approximately £1 million, was abandoned earlier this year because of escalating costs and lack of the functionality the college wanted. The college has been reluctant to answer questions, dubbing privacy campaigner and persistent questioner Pippa King 'vexatious,' and material relating to the trial has been vanishing off the Net. The law requiring parental consent for the use of biometrics in schools (for things like taking attendance and paying for meals) came into force last month. It seems it already needs to be updated."
Comment: "accessing the internet"? (Score 1) 365
by JustAnotherIdiot (#45417397) Attached to: Nearly 1 In 4 Adults Surf the Web While Driving
This seems like a fairly broad statement. Despite what the horrible title says, people did NOT admit to "surfing the web" but "accessed the internet".
The only definition in this incredibly short article defining what that means is the following:
(e.g. check email, surf websites, etc.)
However, it doesn't say if they prefaced that when asking the question. If they simply asked me, for instance "Do you access the internet while you drive?", my answer would be "Yes, yes I do!"
Using google navigator, maps, etc? That access the internet. Even if it's sitting on my dash the entire time without me touching it, I am, indeed, accessing the internet while I drive.
I have a feeling that, gasp, this study was purposefully skewed for shock effect. And as per usual, slashdot took the bait.
|
global_05_local_5_shard_00000035_processed.jsonl/18870
|
The Common Good
February 2014
A Prayer for Mandela
by Jim Wallis | February 2014
NELSON MANDELA was the most important political leader of the 20th century. While Roosevelt and Churchill helped protect the West and the world from Hitler’s Nazism, Mandela heroically exemplified the movement against the colonialism and racism that oppressed the global South, shown so dramatically in South Africa’s apartheid. And from a Christian point of view, he combined justice and reconciliation like no other political leader of his time, shaped by the spiritual formation of 27 years in prison.
Shortly after Mandela was released from prison, he came to New York to meet with a small group of Americans who had been involved in the anti-apartheid struggle, and I was blessed to join them. From the start, I felt in Mandela a moral authority I have never experienced with any political leader.
Attending Mandela’s inauguration in 1994 was a highlight of my life. We were picked up at the airport by friends, a couple who had both been in prison and tortured, but now she was about to become a member of the new South African parliament. We saw a group of the infamous South African security police. Having been interrogated by these thugs before, I immediately said, “Let’s get out of here!” To which they replied, “Don’t worry, Jim, they’re ours now.”
At the ceremony, joined by my South African friends, we watched Nelson Mandela announce his vision for a new rainbow nation. More than 100,000 people (and a billion or so more via TV) listened with tears in their eyes and great hope in their hearts.
Near the end of the ceremony, we heard noise in the sky and saw many helicopters, followed by jets, flying in our direction. For a moment, the crowd became anxious at the coming of the South African Air Force. No, they wouldn’t do this; could they do this now? But then the planes released streams in the colors and pattern of the new South African flag. The white pilots were honoring their new president. Having been in South Africa in the worst of times, this complete transformation of history occurring right before my eyes forever taught me that history really can be changed.
On Dec. 11, I was blessed again to offer an opening prayer at the memorial service for Nelson Mandela at the Washington National Cathedral. Here is what I prayed.
ALL MERCIFUL AND loving God, we give thanks for the witness of your faithful people in all generations. Especially today, we give thanks for your son and faithful servant, Nelson Mandela: for all that he is remembered for, for all that he was to those who loved him in South Africa, to us who loved him here, to all who loved him around the world, and for everything in his life that reflected your mercy and love. We give you thanks for how he taught us and the world your ways of justice and forgiveness, for how he turned righteous anger into the power of reconciliation.
We thank you, Lord, that you were with him every day he was in prison, showing him the path to freedom, for how he became free even before his captors released him. His long road is the one we now ask you for strength to walk.
We thank you, God, that for him sickness and sorrow are no more and that he is at rest with you. We believe that you have welcomed him as an honored guest at your table.
Today we also pray for ourselves, that we may throw off the sin, anger, despair, and cynicism that so easily beset us and that we may run the race that is set before us, with we Christians looking to Jesus, the author and finisher of our faith. We thank you, God, that our dear brother Nelson, our father Madiba, was such a strong runner, always running ahead to the places we need to go: to freedom, to fairness, to human dignity, to the true justice that makes for peace. Help us to run like him and to run after him.
And we thank you, God, that we remember Nelson Mandela in this Christian season of Advent, a time of radical and expectant hope. As he waited for 27 years in prison, expectantly and always hopeful for freedom to come to his country and people, strengthen us with his indomitable spirit to wait with expectant hope for all the things we long for today in our lives and in this world.
Thank you, Lord, for how Nelson Mandela taught us the meaning of the scripture that says, “Faith is the substance of things hoped for, the evidence of things not seen.” And thank you for teaching us a theology of hope through our brothers and sisters in South Africa. Thank you for how Mandela showed us that hope means believing in spite of the evidence, and then watching the evidence change. Inspire that evidence-changing hope in us today.
I am the resurrection and the life, says the Lord. Those who believe in me will live, even though they die; and whoever lives by believing in me will never die. Today we commit ashes to ashes and dust to dust, but Nelson Mandela and his spirit will never die, but live on in us forever.
Jim Wallis is editor-in-chief of Sojourners magazine.
Image: Mourning for Nelson Mandela at the South African embassy in Berlin, 360b /
Related Stories
Like what you're reading? Get Sojourners E-Mail updates!
Sojourners Comment Community Covenant
|
global_05_local_5_shard_00000035_processed.jsonl/18905
|
Take the 2-minute tour ×
I used to work in a place where a common practice was to use Pair Programming. I remember how many small things we could learn from each other when working together on the code. Picking up new shortcuts, code snippets etc. with time significantly improved our efficiency of writing code.
Since I started working with SQL Server I have been left on my own. The best habits I would normally pick from working together with other people which I cannot do now.
So here is the question:
• What are you tips on efficiently writing TSQL code using SQL Server Management Studio?
• Please keep the tips to 2 – 3 things/shortcuts that you think improve you speed of coding
• Please stay within the scope of TSQL and SQL Server Management Studio 2005/2008 If the feature is specific to the version of Management Studio please indicate: e.g. “Works with SQL Server 2008 only"
I am afraid that I could have been misunderstood by some of you. I am not looking for tips for writing efficient TSQL code but rather for advice on how to efficiently use Management Studio to speed up the coding process itself.
The type of answers that I am looking for are:
• use of templates,
• keyboard-shortcuts,
• use of IntelliSense plugins etc.
Basically those little things that make the coding experience a bit more efficient and pleasant.
locked by Bill the Lizard Nov 30 '12 at 2:05
30 Answers 30
Take a look at Red Gate's SQL Prompt - it's a great product (as are most of Red Gate's contributions)
SQL Inform is also a great free (online) tool for formatting long procedures that can sometimes get out of hand.
Apart from that, I've learned from painful experience it's a good thing to precede any DELETE statement with a BEGIN TRANSACTION. Once you're sure your statement is deleting only what it should, you can then COMMIT.
Saved me on a number of occasions ;-)
Some updates are just as damaging as deletes, because they annihilate the data stored in a particular (set of) column(s). – Mark Rogers Feb 9 '09 at 17:48
up vote 24 down vote accepted
community owned wiki Answer - feel free to edit or add comments:
Keyboard Shortcuts
• F5, CTRL + E or ALT + X - execute currently selected TSQL code
• CTRL + R – show/hide Results Pane
• CTRL + N – Open New Query Window
• CTRL + L – Display query execution plan
Editing Shortcuts
• CTRL + K + C and CTRL + K + U - comment/uncomment selected block of code (suggested by Unsliced)
• CTRL + SHIFT + U and CTRL + SHIFT + L - changes selected text to UPPER/lower case
• SHIFT + ALT + Selecting text - select/cut/copy/paste a rectangular block of text
Other Tips
• Using comma prefix style (suggested by Cade Roux)
• Using keyboard accelerators (suggested by kcrumley)
Useful Links
F5 will also execute only selected text if there is active selection. – Pasi Savolainen Apr 24 '09 at 10:57
Drag and drop columns from the object browser rather than use select * For that matter draga and drop object names of all types to prevent mistyping – HLGEM Aug 12 '09 at 20:57
I comment/uncomment selected blocks of code so often, I assigned them to [ALT-C] & [ALT-B], respectively (using Accelerator Keys, since SSMS08 doesn't do real Keyboard Mapping). – kmote Jun 28 '12 at 17:46
+1 for SQL Prompt.
Something real simple that I guess I had never seen - which will work with just about ANY SQL environment (and other languages even):
After 12 years of SQL coding, I've recently become a convert to the comma-prefix style after seeing it in some SSMS generated code, I have found it very efficient. I was very surprised that I had never seen this style before, especially since it has boosted my productivity immensely.
It makes it really easy to edit select lists, parameter lists, order by lists, group by lists, etc. I'm finding that I'm spending a lot less time fooling with adding and removing commas from the end of lists after cut-and-paste operations - I guess it works out easier because you almost always add things at the end, and with postfix commas, that requires you to move the cursor more.
Try it, you'll be surprised - I know I was.
+1 - I found this very useful as well – Burt May 29 '09 at 11:15
This makes sense... for large lists. Otherwise it's just ugly and a little trickier to read. – Joe Philllips Sep 24 '09 at 1:03
I almost always use this format, it makes it easy to comment out columns when testing different result sets. Another format I find useful is keeping a cte's open and close parens above and below its contained sql so I can readily select those lines and hit F5 if I want to see only the cte results – Scot Hauder Mar 24 '10 at 4:11
@Scot Hauder - I also do that, I think it merits its own answer. – Cade Roux Mar 24 '10 at 15:14
My favorite quick tip is that when you expand a table name in the object explorer, just dragging the word colums to the query screen will put a list of all the columns in the table into the query. Much easier to just delete the ones you don't want than to type the ones you do want and it is so easy, it prevents people from using the truly awful select * syntax. And it prevents typos. Of course you can individually drag columns as well.
Highlighting an entity in a query and pressing ALT + F1 will run sp_help for it, giving you a breakdown of any columns, indexes, parameters etc.
I love Alt-F1; use it almost everyday. Makes for easy shortcutting of column names when I am writing an insert or update statement. – p.campbell Feb 9 '09 at 21:07
Try to use always the smallest datatype that you can and index all the fields most used in queries.
Try to avoid server side cursors as much as possible. Always stick to a 'set-based approach' instead of a 'procedural approach' for accessing and manipulating data. Cursors can often be avoided by using SELECT statements instead.
Always use the graphical execution plan in Query Analyzer or SHOWPLAN_TEXT or SHOWPLAN_ALL commands to analyze your queries. Make sure your queries do an "Index seek" instead of an "Index scan" or a "Table scan." A table scan or an index scan is a very bad thing and should be avoided where possible. Choose the right indexes on the right columns. Use the more readable ANSI-Standard Join clauses instead of the old style joins. With ANSI joins, the WHERE clause is used only for filtering data. Where as with older style joins, the WHERE clause handles both the join condition and filtering data.
Do not let your front-end applications query/manipulate the data directly using SELECT or INSERT/UPDATE/DELETE statements. Instead, create stored procedures, and let your applications access these stored procedures. This keeps the data access clean and consistent across all the modules of your application, and at the same time centralizing the business logic within the database.
Speaking about Stored procedures, do not prefix your stored procedure names with "sp_". The prefix sp_ is reserved for system stored procedure that ship with SQL Server. Whenever SQL Server encounters a procedure name starting with sp_, it first tries to locate the procedure in the master database, then it looks for any qualifiers (database, owner) provided, then it tries dbo as the owner. So you can really save time in locating the stored procedure by avoiding the "sp_" prefix.
Avoid dynamic SQL statements as much as possible. Dynamic SQL tends to be slower than static SQL, as SQL Server must generate an execution plan every time at runtime.
When is possible, try to use integrated authentication. It means, forget about the sa and others SQL users, use the microsoft user provisioning infra-structure and keep always your SQL server, up-to-date with all required patches. Microsoft do a good job developing, testing and releasing patches but it's your job to apply it.
Search at amazon.com books with good reviews about it and buy it!
Thanks VP for some good pointers here, but in my question I was looking more into different aspects of writing TSQL namely on tips on how to improve the speed of coding itself, not the quality of code. The quality is obviously more important but not the main scope of the question. – kristof Sep 19 '08 at 13:31
Perhaps we could add a "community owned wiki" type of question to address those more generic guidelines that you have mentioned – kristof Sep 19 '08 at 13:34
CTRL + I for incremental search. Hit F3 or CTRL + I to cycle through the results.
If you drag from Object Explorer Columns node for a table it puts a CSV list of columns in the Query Window for you
shut up! AWESOME – jcolebrand Jan 25 '12 at 18:12
Wow, It's help me alot, thanks – Conan Apr 12 '12 at 4:57
Keyboard accelerators. Once you figure out what sorts of queries you write a lot, write utility stored procedures to automate the tasks, and map them to keyboard shortcuts. For example, this article talks about how to avoid typing "select top 10 * from SomeBigTable" every time you want to just get a quick look at sample data from that table. I've got a vastly expanded version of this procedure, mapped to CTRL + 5.
A few more I've got:
1. CTRL + 0: Quickly script a table's data, or a proc, UDF, or view's definition
2. CTRL + 9: find any object whose name contains a given string (for when you know you there's a procedure with "Option" in the name, but you don't know what its name starts with)
3. CTRL + 7: find any proc, UDF, or view that includes a given string in its code
4. CTRL + 4: find all tables that have a column with the given name
... and a few more that don't come to mind right now. Some of these things can be done through existing interfaces in SSMS, but SSMS's windows and widgets can be a bit slow loading up, especially when you're querying against a server across the internet, and I prefer not having to pick my hands up off the keyboard anyway.
If you could paste in the SQL you use for each of those commands that would be super useful. – Justin R. Aug 12 '09 at 20:35
Just a tiny one - rectangular selections ALT + DRAG come in really handy for copying + pasting vertically aligned column lists (e.g. when manually writing a massive UPDATE). Writing TSQL is about the only time I ever use it!
The thing is, that all those tiny bits when added together and used properly can make a real difference – kristof Apr 24 '09 at 13:27
I've tried this once but I always forget it exists! – Joe Philllips Sep 24 '09 at 0:52
For Sub Queries
object explorer > right-click a table > Script table as > SELECT to > Clipboard
Then you can just paste in the section where you want that as a sub query.
Templates / Snippets
Create you own templates with only a code snippet. Then instead opening the template as a new document just drag it to you current query to insert the snippet.
A snippet can simply be a set of header with comments or just some simple piece of code.
Implicit transactions
If you wont remember to start a transaction before your delete statemens you can go to options and set implicit transactions by default in all your queries. They require always an explicit commit / rollback.
Isolation level
Go to options and set isolation level to READ_UNCOMMITED by default. This way you dont need to type a NOLOCK in all your ad hoc queries. Just dont forget to place the table hint when writing a new view or stored procedure.
Default database
Your login has a default database set by the DBA (To me is usually the undesired one almost every time).
If you want it to be a different one because of the project you are currently working on.
In 'Registered Servers pane' > Right click > Properties > Connection properties tab > connect to database.
Multiple logins
(These you might already have done though)
Register the server multiple times, each with a different login. You can then have the same server in the object browser open multiple times (each with a different login).
To execute the same query you already wrote with a different login, instead of copying the query just do a right click over the query pane > Connection > Change connection.
Another thing that helps improve the accuracy of what I do isn't really a management studio tip but one using t-sql itself.
Whenever I write an update or delete statement for the first time, I incorporate a select into it so that I can see what records will be affected.
select t1.field1,t2.field2
--update t
--set field1 = t2.field2
from mytable t1
join myothertable t2 on t1.idfield =t2.idfield
where t2.field1 >10
select t1.*
--delete t1
from mytable t1
join myothertable t2 on t1.idfield =t2.idfield
where t2.field1 = 'test'
(note I used select * here just for illustration, I would normally only select the few fields I need to see that the query is correct. Sometimes I might need to see fields from the other tables inthe join as well as the records I plan to delete to make sure the join worked the way I thought it would)
When you run this code, you run the select first to ensure it is correct, then comment the select line(s) out and uncomment the delete or update parts. By doing it this way, you don't accidentally run the delete or update before you have checked it. Also you avoid the problem of forgetting to comment out the select causing the update to update all records in the database table that can occur if you use this syntax and uncomment the select to run it:
select t1.field1,t2.field2
update t
set field1 = t2.field2
--select t1.field1,t2.field2
from mytable t1
join myothertable t2 on t1.idfield =t2.idfield
where t2.field1 >10
As you can see from the example above, if you uncomment the select and forget to re-comment it out, oops you just updated the whole table and then ran a select when you thought to just run the update. Someone just did that in my office this week making it so only one person of all out clients could log into the client websites. So avoid doing this.
Use the Filter button in the Object Explorer to quickly find a particular object (table, stored procedure, etc.) from partial text in the name or find objects that belong to a particular schema.
I have a scheduled task that each night writes each object (table, sproc, etc.) to a file. I have full-text search indexing set on the output directory, so when I'm looking for a certain string (e.g., a constant) that is buried somewhere in the DB I can very quickly find it.
Within Management Studio you can use the Tasks > Generate Scrips... command to see how to perform this.
Care to share that code? Simple as it may seem ... Some of us are learning SSMS for the first time ;) – jcolebrand May 5 '10 at 20:41
I like to setup the keyboard shortcut of CTRL + F1 as sp_helptext, as this allows you to highlight a stored procedure and quickly look at it's code. I find it is a nice complement to the default ALT + F1 sp_help shortcut.
And before hitting Ctrl-F1 hit Ctrl-T first to output the results to text so you can copy it. – Geert Immerzeel Jul 27 '10 at 8:44
I suggest that you create standards for your SQL scripting and stick to them. Also use templates to quickly create different types of stored procedures and functions. Here is a question about templates in SQL Server 2005 Management Studio
How do you create SQL Server 2005 stored procedure templates in SQL Server 2005 Management Studio?
I am developer of SSMSBoost add-in that was recently released for SSMS2008/R2, the intention was to add add features that speed up daily routine tasks:
Shorcuts: F2 - (in SQL Editor): script object located unted cursor
CTRL + F2 - (in SQL Editor): find object located under cursor in object explorer and focus it +It includes Shortcut editor, that is missing in SSMS2008 (is coming in SSMS2012)
also SSMSBoost adds toolbar with buttons:
• Syncronize SQL Editor connection to Object Explorer (focuses current database in Object Explorer)
• Manage your own preferred connections and switch between them through combo-box (including jumps between servers)
• Auto-replacements: typing "sel" will replace it by select * from and you can also add your own token-replacement pairs
• and some more useful features
SSMSBoost toolbar
Display the Query Designer with CTRL + SHIFT + Q
Also don't be afraid/ashamed to use it. It's good place to forge connections & join directions. – Pasi Savolainen Apr 24 '09 at 10:59
Make use of the TRY/CATCH functionality for error catching.
Adam Machanic's Expert SQL Server 2005 Programming is a great resource for solid techniques and practices.
Use ownership chaining for stored procs.
Make use of schemas to enforce data security and roles.
Use Object Explorer Details instead of object explorer for viewing your tables, this way you can press a letter and have it go to the first table with that letter prefix.
If you work with developers, often get a sliver of code that is formatted as one long line of code, then sql pretty printer add-on for SQL Server management Studio may helps a lot with more than 60+ formatter options. http://www.dpriver.com/sqlpp/ssmsaddin.html
Using bookmarks is great way to keep your sanity if you're working with or troubleshooting a really long procedure. Let's say you're working with a derived field in an outer query and it's definition is another 200 lines down inside the inner query. You can bookmark both locations and then quickly go back and forth between the two.
(@ptilton: if you want to add some information to an answer, you should either comment or post your own answer instead of editing) For all others: @ptilton mentioned the following (useful) shortcuts for bookmarks: CTRL+K+K - Create/Remove a bookmark on current line in editor; CTRL+K+P-Navigate to previous bookmark; CTRL+K+P-Navigate to next bookmark – MartinStettner Nov 29 '12 at 22:09
If you need to write a lot of sprocs for an API of some sort. You may like this tools I wrote when I was a programmer. Say you have a 200 columns table that need to have a sproc written to insert/update and another one to delete. Because you don't want your application to directly access the tables. Just the declaration part will be a tedious task but not if a part of the code is written for you. Here's an example...
CREATE PROC upsert_Table1(@col1 int, @col2 varchar(200), @col3 float, etc.)
UPDATE table1 SET col1 = @col1, col2 = @col2, col3 = @col3, etc.
IF @@error <> 0
INSERT Table1 (col1, col2, col3, etc.)
VALUES(@col1, @col2, @col3, etc.)
CREATE PROC delete_Table1(@col1)
AS DELETE FROM Table1 WHERE col1 = @col1
Note : You can also get to the original code and article written in 2002 (I feel old now!)
Using TAB on highlighted text will indent it. Nice for easily arranging your code in a readable format. Also, SHIFT + TAB will unindent.
F5 to run the current query is an easy win, after that, the generic MS editor commands of CTRL + K + C to comment out the selected text and then CTRL + K + U to uncomment.
• ALT+SHIFT + Selection
This is a great one I discovered recently - it lets you select a rectangular section of text regardless of line breaks. Very handy for clipping out a subquery or list quickly.
Devart' SQL Complete express edition is an SSMS addon and is a free and useful addon. It provides much needed code formatting and intellisense features.
I also use SSMSToolsPack addon and it is very good. I Love;
1. It's SQL snippets where you can create short keys for code snippets and it appends them automatically when you type these keys and press enter.
2. Search through history to retrieve your queries which you ran months ago and forgot, saved a lot of my time.
3. Restore last session. Now I never save my queries if I have to just restart my windows. I just click on restore last session and my last session gets and restored and connection created automatically.
4. Create insert statements from query results (very useful). Just love this addon.
A small catch recently introduced. SSMSToolsPack is not free anymore for SSMS 2012. It's still free for SSMS 2005 and SSMS 2008, till yet. Use it only if you want to buy it when you migrate to SSMS 2012. Otherwise may be it's a good idea to wean away from it.
I warmly recommend Red Gate's SQL Prompt. Auto-discovery (intellisense on tables, stored procedures, functions and native functions) is nothing short of awesome! :)
It comes with a price though. There is no free-ware version of the thing.
Being aware of the two(?) different types of windows available in SQL Server Management Studio.
If you right-click a table and select Open it will use an editable grid that you can modify the cells in. If you right-click the database and select New Query it will create a slightly different type of window that you can't modify the grid in but it gives you a few other nice features, such as allowing different code snippets and letting you execute them separately by selection.
Use a SELECT INTO query to quickly/easily make backup tables to work and experiment with.
|
global_05_local_5_shard_00000035_processed.jsonl/18906
|
Take the 2-minute tour ×
I'm getting the typical error on Heroku, that it appears the solution is to precompile locally and then commit to git.
ActionView::Template::Error (application.css isn't precompiled)
However I have my assets on Rackspace CloudFiles CDN using asset_sync and they are compiled fine, so I don't really want to also have to commit the compiled assets to git.
Any solution?
share|improve this question
1 Answer 1
before you push your app to heroku run the following.
bundle exec rake assets:precompile
That will precompile all the necessary javascript and css.
If you are running the app on your computer after you precompile you will not see any css and js changes until you run.
bundle exec rake assets:clean
that will remove all precompiled files, you need to precompile every time you push your app.
share|improve this answer
Do you mean I have to precompile and commit to git? As otherwise they won't end up on heroku anyway... But I shouldn't need them there as they're on the CDN. – Colin Apr 27 '12 at 9:47
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18907
|
Take the 2-minute tour ×
I am trying to figure out how to get selected options from ajax-Chosen plugin with no luck.
This is my html:
<select multiple='multiple' class='chzn-select' data-placeholder='users'>
<option value='0' selected>username1</option>
<option value='1' selected>username2</option>
And this is JS part:
method: 'GET',
url: 'users.php',
dataType: 'json',
minTermLength: 3,
afterTypeDelay: 300
}, function (data) {
var terms = {};
terms[i] = val;
return terms;
This all works fine. But when I remove one option "username2" the select field does not get updated. So when I want to get all selected users from list I get wrong list - in this case I always get both values even that one was removed from list.
I've also tried to trigger update with no luck:
Does anyone have a suggestion how to get real values from select list?
share|improve this question
1 Answer 1
up vote 3 down vote accepted
Just found a solution thanks to stof:
Instead of $(".chosen-select option").each(); I did this: $(".chosen-select).val();
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18908
|
Take the 2-minute tour ×
I am trying to use ajax in one of my wordpress templates. In my functions.php I added the following code.
function wp_ajax_nopriv_my_special_ajax_call()
// generate the response
$response = json_encode( array( 'success' => true ) );
// response output
echo $response;
add_action('wp_ajax_nopriv_my_special_ajax_call', 'my_special_ajax_call');
In My template I am calling this
jQuery.get('/my_wordpress_folder/wp-admin/admin-ajax.php', {action:'my_special_ajax_call'},function(response,status){ alert(response);alert(status);
But I am getting -1 as response.
The site is multisite wordpress.
Please help
share|improve this question
2 Answers 2
up vote 0 down vote accepted
It returns -1 because you are calling it in wrong way. Change the function name to "my_special_ajax_call"
share|improve this answer
You need to change the function name from wp_ajax_nopriv_my_special_ajax_call to my_special_ajax_call
the call back in the add action needs to be the name of the function that does the ajax
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18909
|
Take the 2-minute tour ×
my nginx conf:
location / {
include uwsgi_params;
uwsgi_param UWSGI_PYHOME /usr;
uwsgi_pass unix:/var/run/uwsgi-python/uwsgi/socket;
uwsgi_param UWSGI_CHDIR /var/www/my_site;
uwsgi_param UWSGI_SCRIPT my_site:app;
uwsgi_param SERVER_NAME my_site;
uwsgi_param UWSGI_SETENV DEPLOY_VERSION=Development;
my uwsgi para:
/usr/local/bin/uwsgi --master --processes 2 --logdate --chmod-socket=666 --uid www --gid www --limit-as 512 --harakiri 60 --max-requests 1000 --no-orphans —-reload-os-env --daemonize /var/log/uwsgi-python/uwsgi.log --pidfile /var/run/uwsgi-python/uwsgi/pid --socket /var/run/uwsgi-python/uwsgi/socket --xmlconfig /etc/uwsgi-python/apps-enabled/uwsgi.xml
uwsgi xml:
In my flask app
print os.environ.get('DEPLOY_VERSION', 'NONE') #pring NONE
How I can get the env_vars?
Maybe I can not get the env_vars setting by UWSGI_SETENV in <vhost/><no-site/> mode?
btw: How you deploy multi version(Development/Beta/Release) of app in one machine without virtual env?
share|improve this question
2 Answers 2
up vote 3 down vote accepted
Instead of:
uwsgi_param UWSGI_SETENV DEPLOY_VERSION=Development;
You could set it as a per request variable in nginx: uwsgi_param DEPLOY_VERSION 'Development';
And then within Flask, access the variable via request.environ: request.environ['DEPLOY_VERSION']
(I had a similar problem and was pointed to the above solution on the uwsgi mailing list)
share|improve this answer
indeed; you probably cannot set environment variables for uwsgi from nginx; as nginx does not actually launch uwsgi, (uwsgi must already be running) and so there's not really an option to set them. – SingleNegationElimination Aug 1 '12 at 12:17
That's a very good point. – corford Aug 1 '12 at 12:32
@TokenMacGuy Oh, good point, thanks! – linnchord Aug 14 '12 at 10:43
I had a similar issue defining environment configurations for a django Mezzanine CMS deployment.
As the DEPLOY_VERSION seems to target the underlying application and not the uWSGI service, I think the correct place to put it to be the uWSGI configuration file instead of the Nginx one.
Try changing the .xml file to:
<env>DEPLOY_VERSION=Development</env> <!-- this -->
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18910
|
Take the 2-minute tour ×
I'm getting started preparing an installation script for a software package onto an Ubuntu server. I would like to write a script as a .deb package that is aware of dependencies that must be installed beforehand (a database, web server, etc.).
Can you recommend any tutorials/resources to help a newbie developer get started writing deb packages?
Update: Canonical has a thorough Packaging Guide which explains the process very well.
share|improve this question
closed as off-topic by Ciro Santilli 六四事件 法轮功 纳米比亚胡海峰, Yu Hao, EdChum, chridam, Christian Gollhardt May 17 at 20:23
3 Answers 3
up vote 8 down vote accepted
If you are entirely new to building Debian packages, I suggest that you look at the Debian New Maintainers' Guide and use the Debian Developer's Reference as reference. As a starting point, dh_make (from the dh-make package) should give you a good template to work with.
share|improve this answer
Thank you. This is exactly what I was looking for. – Peter Bratton Jul 24 '09 at 12:39
Earlier question at stackoverflow:
How to build a Debian/Ubuntu package from source?
share|improve this answer
If you plan to install some software with their dependencies, you don't really need to make a .deb package. A Shell script should work, calling the package manager to resolve dependencies, etc.
The default Shell on Ubuntu is Bash. If you don't know how to do it, here is a basic tutorial and an advanced guide.
Hope it helps.
share|improve this answer
The reason I want to do a deb is that we will be creating many of these servers over time, and I'd like to distribute updates via this mechanism. I imagine I'll be using bash scripts within the installer to carry out steps of the installation. Thanks for the help! – Peter Bratton Jul 22 '09 at 15:11
Thanks for the advanced guide link. – Liran Orevi Jul 23 '09 at 21:49
|
global_05_local_5_shard_00000035_processed.jsonl/18911
|
Take the 2-minute tour ×
I plan to create a program that will visualize the audio waveform of a .wav file.
So far, I have started by properly reading the header part of the said wav file. The code I use would be this:
#include <iostream>
#include <string>
#include <fstream>
using namespace std;
using std::string;
using std::fstream;
typedef struct WAV_HEADER{
char RIFF[4]; // RIFF Header Magic header
unsigned long ChunkSize; // RIFF Chunk Size
char WAVE[4]; // WAVE Header
char fmt[4]; // FMT header
unsigned long Subchunk1Size; // Size of the fmt chunk
unsigned short AudioFormat; // Audio format 1=PCM,6=mulaw,7=alaw, 257=IBM Mu-Law, 258=IBM A-Law, 259=ADPCM
unsigned short NumOfChan; // Number of channels 1=Mono 2=Sterio
unsigned long SamplesPerSec; // Sampling Frequency in Hz
unsigned long bytesPerSec; // bytes per second
unsigned short blockAlign; // 2=16-bit mono, 4=16-bit stereo
unsigned short bitsPerSample; // Number of bits per sample
char Subchunk2ID[4]; // "data" string
unsigned long Subchunk2Size; // Sampled data length
// Function prototypes
int getFileSize(FILE *inFile);
wav_hdr wavHeader;
FILE *wavFile;
int headerSize = sizeof(wav_hdr),filelength = 0;
string answer;
string input;
string answer;
const char* filePath;
cout << "Pick wav file from the Windows Media File: ";
cin >> input;
cout << endl;
path = "C:\\Windows\\Media\\" + input + ".wav";
filePath = path.c_str();
wavFile = fopen( filePath , "r" );
if(wavFile == NULL){
printf("Can not able to open wave file\n");
filelength = getFileSize(wavFile);
cout << "File is :" << filelength << " bytes." << endl;
cout << "RIFF header :" << wavHeader.RIFF[0]
<< wavHeader.RIFF[1]
<< wavHeader.RIFF[2]
<< wavHeader.RIFF[3] << endl;
cout << "WAVE header :" << wavHeader.WAVE[0]
<< wavHeader.WAVE[1]
<< wavHeader.WAVE[2]
<< wavHeader.WAVE[3]
<< endl;
cout << "FMT :" << wavHeader.fmt[0]
<< wavHeader.fmt[1]
<< wavHeader.fmt[2]
<< wavHeader.fmt[3]
<< endl;
cout << "Data size :" << wavHeader.ChunkSize << endl;
// Display the sampling Rate form the header
cout << "Sampling Rate :" << wavHeader.SamplesPerSec << endl;
cout << "Number of bits used :" << wavHeader.bitsPerSample << endl;
cout << "Number of channels :" << wavHeader.NumOfChan << endl;
cout << "Number of bytes per second :" << wavHeader.bytesPerSec << endl;
cout << "Data length :" << wavHeader.Subchunk2Size << endl;
cout << "Audio Format :" << wavHeader.AudioFormat << endl;
cout << "Block align :" << wavHeader.blockAlign << endl;
cout << "Data string :" << wavHeader.Subchunk2ID[0]
<< wavHeader.Subchunk2ID[1]
<< wavHeader.Subchunk2ID[2]
<< wavHeader.Subchunk2ID[3]
<< endl;
cout << endl << endl << "Try something else? (y/n)";
cin >> answer;
cout << endl << endl;
}while( answer == "y" );
return 0;
// find the file size
int getFileSize(FILE *inFile){
int fileSize = 0;
return fileSize;
I've tried it several times and the data it gives seems consistent through different wav files in the Media folder in the Windows folder.
The next step then would be storing the actual data of the wav file in a vector. However, I'm quite clueless on how to do this. Online solutions that I found only went as far as reading the header file.
Any ideas on how to store (and hopefully display) the actual data of the wav file? Thanks!
share|improve this question
Just a note, you should not use unsinged long, short or even char or other such types for reading binary files. The size and signedness of those types may not be exactly what you expect them to be (especially long which can be either 32 or 64 bits depending on platform). Instead use the types from <cstdint>, like uint32_t etc. – Joachim Pileborg Dec 1 '12 at 15:25
1 Answer 1
This image is taken from a Stanford course
WAV File Format
So you can see that the audio data occurs immediately after the headers you already read and there will be Subchunk2Size bytes of audio data.
The pseudocode for this would be
int32 chunk2Id = Read32(BigEndian);
int32 chunk2Size = Read32(LittleEndian);
for (int i = 0; i < chunk2Size; i++)
audioData[i] = ReadByte();
If the audio is stereo you'll have two audio streams in data. If the audio is compressed (mp3, aac, etc) you'll have to decompress it first.
share|improve this answer
One very important thing to note is that fmt chunks are not always the same length. They can be an instance of WAVEFORMATEX which has extra bytes at the end. Use Subchunk1 size to find out what the real size of the fmt section is. You also need to be aware that the data chunk doesn't necessarily follow the fmt chunk. A WAV file can have more than just a fmt or data chunk, so it is always best to check that chunk2 Id is 'data' and if not, skip over it until you find the data chunk. – Mark Heath Dec 2 '12 at 7:51
Noted. Can a vector also work in place of the array? – Razgriz Dec 2 '12 at 10:02
Another important thing to note is that RIFF is an extensible format, and the "DATA" sub-chunk is not guaranteed to come immediately after the "FMT " chunk. tinyurl.com/riff-wav – Collin Mar 12 '14 at 2:06
Furthermore, if you are decoding the IBM/MS RIFF format, all the multi-byte words are little endian. None are big endian, as this image claims. (In fact, the numbers that this image claims are big endian aren't meant to represent numbers at all, and the endianness is merely a matter of how you wish to interpret the series of bytes as a number.) – Collin Mar 12 '14 at 2:12
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18912
|
Take the 2-minute tour ×
I see there's a new version of Facebook SDK (3.0) that deprecates the old Facebook class and introduces a new way of logging in using the Session class.
I quickly wrote a simple app using the new login API:
public class MainActivity extends Activity {
private Session mFacebookSession;
private StatusCallback fbStatusCallback = new StatusCallback() {
Log.v("dbg", "state: " + state);
Log.v("dbg", "session: " + session);
public void bc(View view)
mFacebookSession = Session.openActiveSession(this, true, fbStatusCallback);
The callback should get called twice, first for destroying the actual session token and second for getting a new access token. Of course, my app id is set as a meta-data in my manifest file, etc.
When I execute the code, the Facebook Login dialog appears, I input my username and password and then it closes.
However, in my log I only see this:
01-17 03:28:01.587: V/dbg(7002): state: OPENING
01-17 03:28:01.587: V/dbg(7002): session: {Session state:OPENING, token:{AccessToken token:ACCESS_TOKEN_REMOVED permissions:[]}, appId:xxxxxxxxxxxxxxx}
As a result, if I try to call mFacebookSession.getAccessToken() i get an empty string (not null).
What seems to be the problem?
I have overridden onActivityResult and called Session.getActiveSession().onActivityResult(this, requestCode, resultCode, data);
share|improve this question
Are you 100% confident your appID is correct and you have set up the facebook app correctly? I had a similar problem and it came down to me using the id of another of my facebook apps – seaplain Jan 17 '13 at 1:58
Well, the login dialog displays my application name and if I add some permissions (i also found a way to add them but didn't include in this code to keep things simple for everybody to understand), they are also displayed correctly. – Sterpu Mihai Jan 17 '13 at 2:02
hmm.. I now realize that in the *Native Android App' section I didn't put any hash. But why don't I get an Exception via the callback? – Sterpu Mihai Jan 17 '13 at 2:21
I honestly don't know, I wasn't getting any exceptions either. At least you found your answer – seaplain Jan 17 '13 at 2:23
Did you also override the onActivityResult method in your MainActivity class, and call Session.getActiveSession().onActivityResult(...)? – Ming Li Jan 17 '13 at 17:30
2 Answers 2
Im just going to put this here for anyone else:
The Facebook SDK is really terrible at letting you know you have forgotten something. If it's not working for you double check your Facebook app and make sure you haven't forgotten something or put in the wrong values. In my case the appID was wrong in Sterpu Mihai's case it was the hash key
share|improve this answer
I don't know it's the hash, I didn't test it:) I'll post any update when I know for sure – Sterpu Mihai Jan 17 '13 at 8:49
I also found this on a forum: I have not been able to get hash key for android but facebook seems to be working eitherway :) – Sterpu Mihai Jan 17 '13 at 8:58
another thing that would cause the same error (Token_removed)
Android Facebook SDK3.0, session state OPENING
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18913
|
Take the 2-minute tour ×
I want to output the query generated by a symfony propel select for testing purposes. Is there any way to do this? I know I can use the sf_debug bar, but sometimes I need to see the statement in a situation where the sf_debug bar hasn't loaded yet, or isn't going to load at all.
share|improve this question
4 Answers 4
up vote 4 down vote accepted
Timmow is right that there is a Criteria::toString() method, but it's not the magic _toString() method that's automatically called when the object is referenced as a string.
If you want to see the SQL you have to explicitly call Criteria::toString().
$c = new Criteria();
// HERE: add criteria
// what's it do?
echo $c->toString(); // oh, that's what it does
share|improve this answer
Interesting - it "sorta" works - I get this output for the page I happen to be working on: Criteria: SQL (may not be complete): SELECT FROM ORDER BY ugc_question.LAST_RESPONSE_AT DESC Params: – kewpiedoll99 Nov 4 '09 at 16:03
also, the above code snippet should say echo $c->toString(); // oh... (not $c->getString(); ) – kewpiedoll99 Nov 24 '09 at 22:49
just updated it, thanks for the extra eye – dibson Dec 15 '09 at 17:23
Propel Criteria objects have a toString method, so you should simply be able to echo / var_dump / log to a file the criteria object you are interested in
share|improve this answer
It also might be helpful to take a look at Day 6 of the Jobeet Tutorial, Debugging Propel generated SQL. If you're in the debug environment, the raw queries are output to the log files. Not 100% sure as I use Doctrine.
share|improve this answer
You'll get the generated SQL statement that way after you've build the criteria :
$params= array();
$resulting_sql_statement = BasePeer::createSelectSql($criteria,$params);
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18914
|
Take the 2-minute tour ×
I'm trying to create a sidebar gadget without the use of Visual Studio. I've looked around for ways to debug them, but everything says that the Visual Studio JIT debugger is the only way to do it.
Has anyone been able to debug sidebar gadgets without Visual Studio?
share|improve this question
2 Answers 2
up vote 12 down vote accepted
For years, I didn't use Visual Studio to work on Gadgets. There are a couple of ways you can debug gadgets without it, just not as extensively. For instance, you can't use the debugger; command without a proper debugger attached to the process. What you can do is use a program like DebugView to catch messages output by the System.Debug.outputString() method:
function test ()
System.Debug.outputString("Hello, I'm a debug message");
This allows you to output variable dumps and other useful tidbits of information at certain stages of your code, so you can track it however you like.
As an alternative, you can roll your own debugging/script halting messages using window.prompt(). alert() was disabled for gadgets and confirm() is overridden to always return true, but they must have overlooked prompt().
function test ()
// execute some code
window.prompt(someVarToOutput, JSON.stringify(someObjectToExamine));
// execute some more code
The JSON.stringify() method really helps out if you want to examine the state of an object during code execution.
Instead of window.prompt, you can also use the VBScript MsgBox() function:
window.execScript( //- Add MsgBox functionality for displaying error messages
'Function vbsMsgBox (prompt, buttons, title)\r\n'
+ ' vbsMsgBox = MsgBox(prompt, buttons, title)\r\n'
+ 'End Function', "vbscript"
vbsMsgBox("Some output message", 16, "Your Gadget Name");
Finally, you can catch all errors with your script using the window.onerror event handler.
function window.onerror (msg, file, line)
// Using MsgBox
var ErrorMsg = 'An error has occurred'+(line&&file?' in '+file+' on line '+line:'')+'. The message returned was:\r\n\r\n'+ msg + '\r\n\r\nIf the error persists, please report it.';
vbsMsgBox(ErrorMsg, 16, "Your Gadget Name");
// Using System.Debug.outputString
System.Debug.outputString(line+": "+msg);
// Using window.prompt
window.prompt(file+": "+line, msg);
// Cancel the default action
return true;
The window.onerror event even lets you output the line number and file (only accurate with IE8) in which the error occurred.
Good luck debugging, and remember not to leave in any window.prompts or MsgBoxes when you publish your gadget!
share|improve this answer
Very useful. Thank you. Do I need a library to use the JSON object or is it part of the Windows gadget host environment? – bshacklett Feb 18 '10 at 19:17
@bshacklett: It's built into IE8, but your gadget needs to be in IE8 mode. You can also get a parser and stringifier from json.org/js.html – Andy E Feb 18 '10 at 19:25
Do they run in IE8 mode just by virtue of having IE8 installed on the system or is this something I have to specify? – bshacklett Feb 18 '10 at 23:27
You can specify IE8 mode using a meta tag. See blogs.msdn.com/ie/archive/2008/06/10/… – Andy E Feb 19 '10 at 0:01
Great stuff. Many thanks. – Drew Noakes May 21 '10 at 10:43
In Windows 7 a new registry key has been added that displays script errors at runtime on a given PC:
With that value set, you'll see dialogs when script errors occur.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18915
|
Take the 2-minute tour ×
I'm recently working in a company where we use PowerBuilder extensively. The only documentation or resources we have access to is some basic course saying things like "Do A, then B and you'll get C". I was wondering if there is some better crash courses or tutorials for this language on the net or somewhere else which actually explain something instead of simply taking me by the hand.
share|improve this question
closed as off-topic by animuson Jan 7 at 19:31
8 Answers 8
up vote 7 down vote accepted
"Better" sounds intimidating, since it's hard to tell how your learning style works and what's better for you. (I guess I like the ABC approach.) So, instead of listing things that will be hit or miss, I'll try one resource that has both quantity and quality. The PowerBuilder Developer's Journal has a large online archive of old and fairly recent articles online. (The current issue gets online pretty quickly, but I wouldn't venture to guess how quickly.) Like any technical journal, the quality of the articles can vary, but IMHO stays pretty high on average. They'll range in topic from navel-gazing speculations to detailed instructions on how to accomplish very specific goals. I'm not sure it's necessarily great for starting off, but it's a good place to go once you've dragged your way through the ABC tutorial in the PowerBuilder manuals.
Good luck,
share|improve this answer
PBDJ has sadly ceased publication but the online archive is still there. – Bernard Dy Feb 28 at 18:53
Unfortunately there is not much out there for PB, compared to other languages. Here are some useful resources on the web:
• Back when I was writing PB I found Google Groups was a great resource for finding information about specific issues with PowerBuilder code.
• Terry Voth runs a website called Sequel's Sandbox that has a lot of useful PowerBuilder resources. He's also on StackOverflow, so perhaps he can chime in with more info :)
One thing that we did was have any new PB developers run through the tutorial that comes with PB (Disclaimer: we had an enterprise version, I am not sure if all versions of PB come with the same tutorial). Anyway, this was a great way of getting started and learning your way around the IDE.
share|improve this answer
Thanks for the links, i'll look at that. The tutorial that I'm talking about is in fact the tutorial that comes with PB. – tmoisan May 14 '10 at 17:35
Ah, OK. I still strongly recommend you spend a day or two just going through that tutorial though, even if it's tedious at times... – Justin Ethier May 14 '10 at 17:40
+1 for review the included tutorial. It's not the easiest thing, but it does have good material if you stick it out. – DaveE May 28 '10 at 17:37
Don't forget the books. Much of PowerBuilder 9: Advanced Client/Server Development still applies. And if you can find a copy of a book like PowerBuilder 7 unleashed you can get most of the PowerScript syntax.
share|improve this answer
Have you looked at the stuff that Yakov Werde is doing:
He's a former Sybase training guy and one of them that did a lot of the training classes at the Sybase TechWave events.
share|improve this answer
This question has a few resources for learning PowerBuilder.
I've got lots of PowerBuilder bookmarks on Delicous.com. Some of that stuff might be useful.
share|improve this answer
The key to Powerbuilder is the Datawindow. One of the best books written on the subject is "The Definitive DataWindow" by Richard Brooks. It is 11 years old but it is still the best resource for datawindow information.
You can find it at Amazon at http://www.amazon.com/Definitive-DataWindow-Your-PowerBuilder-Success/dp/020170224X
share|improve this answer
PowerBuilder used to provide PowerBuilder Foundation Classes (PFC) but they discontinued it. The PFC lives on though as an open source project here:
For older versions of Powerbuilder (8, 9, and 10) the below site has several code samples and DLLs. As other developers have mentioned, you'll end up looking all over the place for PB help.
Here's another resource:
share|improve this answer
Since this topic isn't yet closed you should find a lot here.
http://www.displacedguy.com - PowerBuilder, .NET, Silverlight Developer Blog with a PB Training Page containing over 100 links to sample projects, self created training material or other blogs and every link is free, the only requiring registration are from Sybase themselves.
DisplacedGuy Blog with PowerBuilder Tutorials, Training, Videos, Interview Questions, EBF Links and More - 4 years in the making
share|improve this answer
|
global_05_local_5_shard_00000035_processed.jsonl/18916
|
Take the 2-minute tour ×
I'm trying to create an sqlite database by importing a csv file with urls. The file has about 6 million strings. Here are the commands I've used
create table urltable (url text primary key);
.import csvfile urldatabase
After about 3 million urls the speed slows down a lot and my hard disk keeps spinning continuously. I've tried splitting the csv file into 1/4th chunks but I run into the same problem.
I read similar posts on stackoverflow and tried using BEGIN...COMMIT blocks and PRAGMA synchronous=OFF but none of them helped. The only way I was able to create the database was by removing the primary key constraint from url. But then, when I run a select command to find a particular url, it takes 2-3 seconds which won't work for my application. With the primary key set on url, the select is instantaneous. Please advise me what am I doing wrong.
[Edit] Summary of suggestions that helped :
• Reduce the number of transactions
• Increase page size & cache size
• Add the index later
• Remove redundancy from url
Still, with a primary index, the database size is more than double the original csv file that I was trying to import. Any way to reduce that?
share|improve this question
Try creating another column with a hash of the url and make that unique. – JoshRoss Jun 4 '11 at 22:11
If the data doesn't have to be unique, why not add a regular index to the url column? – JoshRoss Jun 5 '11 at 12:57
@JohnRoss : About your first comment, If I make the hash column unique, how will I handle hash collisions? About the second comment, the url data is unique. – buffer Jun 5 '11 at 18:46
If you know the input data is unique, why make the database verify that on insert? If you pick a hashing algorithm with good entropy, like SHA1, you probably won't get a collision. I was thinking of what had to be checked on insert, when all your inputs start with http://www. that's 11 characters that could otherwise be ignored when checking the validity of each insert. – JoshRoss Jun 6 '11 at 2:25
@JoshRoss Nice suggestion, for my case I could split urls and ignore the common portion. – buffer Jun 6 '11 at 9:31
2 Answers 2
up vote 3 down vote accepted
A PRIMARY KEY or UNIQUE constraint will automatically generate an index. An index will dramatically speed up SELECTs, at the expense of slowing down INSERTs.
Try importing your data into a non-indexed table, and then explicitly CREATE UNIQUE INDEX _index_name ON urltable(url). It may be faster to build the index all at once than one row at a time.
share|improve this answer
isn't that what's happening when I use BEGIN...COMMIT block.. i.e. indexing at the end – buffer Jun 5 '11 at 6:43
@buffer, it's not exactly the same, dan04 is right, creating the index after the inserts are done can significantly speed up the overall process. However, with that much data and a small cache size, you can still get a lot of disk thrashing so the better solution is to increase the cache size (or better yet--do both). – Samuel Neff Jun 5 '11 at 18:08
thank you @dan04 & @Samunel Neff. Your approach does help in creating the database. Keeping url as the primary key more than doubles the size of the db. How can I cut down on that? A 600MB text file of url translates to 1.5GB of database with primary index on url. – buffer Jun 6 '11 at 10:22
@buffer, you can't cut down on the size and still use sqlite. SQLite always internally stores data in pages indexed by a numeric sequence and additional indexes are stored in separate pages. If you just want to store that data once and all you have is that list of URLs, then you can use a data structure and alternate storage mechanism that is more efficient and specific. I've even heard that some people used the tree code within SQLite separately from SQLite. – Samuel Neff Jun 6 '11 at 18:28
Increase your cache size to something large enough to contain all of the data in memory. The default values for page size and cache size are relatively small and if this is a desktop application then you can easily increase the cache size many times.
PRAGMA page_size = 4096;
PRAGMA cache_size = 72500;
Will give you a cache size of just under 300mb. Remember page size must be set before the database is created. The default page size is 1024 and default cache size is 2000.
Alternatively (or almost equivalently really) you can create the database entirely in an in-memory database and then use the backup API to move it to an on-disk database.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18917
|
Take the 2-minute tour ×
i get error: device not found out of sudden once running adb -d install. it worked well before, and "down" once I changed SIM card in my SAMSUNG Android.
I tried to revert back ~ using old SIM card ~ seems illogical, but still I get "device not found" error.
I have set Setting * Application * Development * USB Debugging... restarted my phone, as well as my PC.
Is there any idea how to resolve this?
share|improve this question
2 Answers 2
Your driver is not finding the phone. Try "adb devices" command, if the device is found it will display a number, if not it wont display anything. You may want to reinstall to your driver.
share|improve this answer
no device was listed by "adb devices"... sorry any reference how to reinstall the driver.. , and however it was worked before (few hours back) – iwan Jul 14 '11 at 0:50
In windows, you can do Start Menu -> Control Panel and then Add/Remove programs (Win XP). – omermuhammed Jul 14 '11 at 4:03
hmm.. I am using mac.. are you saying reinstall the ADB? – iwan Jul 14 '11 at 12:48
No, you should not need to do so. I dont do debugging on Macs but take a look here (developer.android.com/guide/developing/device.html#setting-up), this may help. – omermuhammed Jul 14 '11 at 14:19
hi, in the link given, for mac -- we don't need to install any driver, do you have any other idea? – iwan Jul 16 '11 at 1:20
Try killing the adb process and restarting it. I've noticed that the Adb sometimes refuses to recognize devices after you've been working with them for a long time.
share|improve this answer
it did not help :( – iwan Jul 14 '11 at 0:50
This worked for me. – Ryan Oct 18 '12 at 4:31
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18918
|
Take the 2-minute tour ×
Since upgrading my to using ruby 1.9.2 I've seen these kind of errors a lot using bundler (on Mac):
Using aasm (2.3.1) from git://github.com/rubyist/aasm.git (at master) .../specification.rb:733:
in `gsub': invalid byte sequence in US-ASCII (ArgumentError)
My previous workaround was to not use the git source but that's not a workable workaround for all situations. From what I've read online you need to ensure that all your locales are set, but running locale I got this:
I tried doing export LC_ALL="en_GB.us-ascii" to fill in that last one and running bundler again but that didn't fix the issue.
share|improve this question
2 Answers 2
You may correct this error writing this
export LC_ALL="en_US.UTF-8"
to your ~/.profile, ~/.bash_profile or similar. It works like a charm.
share|improve this answer
The sequence is invalid in the US-ASCII locale because it's a UTF-8 character. The most likely fix is to set your LANG to something like "en_GB.UTF-8".
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18919
|
Take the 2-minute tour ×
I would like to ask if anyone knows how to use the filechooser dialog in glade and pygtk. (It should be very similar in any of the language bindings, and that is why I didn't specify the language.) Basically, the filechooser now looks like this: there are two columns, one for the folders (left), and one for the files (right). Then at the bottom of the dialog, there are two empty slots for two buttons, so I just dropped a cancel and an OK button there. But then my question is what does the dialog return? My code looks like this:
filename = None
response = self.widget('filechooserdialog').run()
print response
#if response == Gtk.RESPONSE_OK:
filename = self.widget('filechooserdialog').get_filename()
and at the moment, the callback to 'Cancel' and 'OK' just hides the dialog. But I can't find out what the dialog is supposed to return. In other words, how can I specify in the response whether the 'Cancel', or the 'OK' button was pressed?
PS: Here is an image to illustrate the situation:
enter image description here
share|improve this question
1 Answer 1
up vote 4 down vote accepted
Dialog with buttons returns the response id which is associated with the button pressed. In your case, when you create your "Cancel" & "Ok" buttons in glade & drop them into empty slot available in the file chooser dialog, in the edit box (right bottom of the screen which will have heading like "Button Properties ...") you can see Response ID: option (its a spin button with default value as 0) under General tab. Just set that to a value you want to receive when that button is pressed. Set this as different values for your different buttons. Now when you run the dialog and the button is pressed you will get the response id value which you had set. Based on this you can take your actions.
Hope this helps!
share|improve this answer
Many thanks for the reply! It did solve the problem. But it just leaves me wondering where one could find these pieces of information. It seems to me that glade and gtk are developed at a faster pace than what the documentation can keep up with. – v923z Dec 3 '11 at 12:06
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18920
|
Take the 2-minute tour ×
I get notified about "unchecked" warnings when I compile my Scala project with SBT 0.11, but I can't see the warnings themselves.
What I see is
[warn] there were 8 unchecked warnings; re-run with -unchecked for details
[warn] one warning found
What exactly am I to "re-run with -unchecked" and how to do that? Neither compile -unchecked, nor compile unchecked, nor xsbt -unchecked seem to work.
share|improve this question
1 Answer 1
up vote 37 down vote accepted
I've found the answer here.
The solution is to add
to the project's build.sbt file.
It can also take "-feature" as an option and works with sbt 0.13
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18921
|
Dapper is a micro-ORM, offering core parameterization and materialization services, but (by design) not the full breadth of services that you might expect in a full ORM such as LINQ-to-SQL or Entity Framework. Instead, it focuses on making the materialization as fast as possible, with no overheads from things like identity managers - just "run this query and give me the (typed) data".
However, it retains support for materializing non-trivial data structures, with both horizontal (joined data in a single grid) and vertical (multiple grids) processing.
Quite possibly the fastest materializer available for .NET, and available here: github.com/StackExchange/dapper-dot-net
Getting Started with Dapper
Dapper comprises of a single file, it lives on Google code: SqlMapper.cs (or SqlMapperAsync.cs for .NET 4.5 if you like async). You can either include the file, as is, in your project. Or install it via nuget.
Here is a video with a simple example.
A simple Hello World sample
using Dapper;
using (var connection = new SqlConnection(myConnectionString))
var posts = connection.Query<Post>("select * from Posts");
//... do stuff with posts
CRUD operations
Dapper provides a minimal interface between your database and your application. Even though the interface is minimal it still supports the full array of database operations. Create, Read, Update, Delete are fully supported. Using stored procedures or not.
See also:
The Multi Mapper
Dapper allows you to automatically split a single row to multiple objects. This comes in handy when you need to join tables.
See also:
A key feature of Dapper is performance. You can go through the performance of SELECT mapping over 500 iterations at this link.
.NET Framework support
Dapper runs best on .NET 4.0 or later. It makes use of Dynamic features in the language and optional params. You can run Dapper on .NET 3.5 as well. There are no known ports that avoid dynamic method generation. There are no known ports to .NET 2.0.
Dapper also works fine in Mono.
Nuget package
Dapper can most easily be installed through its NuGet package.
Install-Package Dapper
The Dapper solution includes the following extensions:
• Dapper.Rainbow
• Dapper.Contrib
• Dapper.SqlBuilder
3rd party extenions
There are some extensions available, developed by 3rd parties:
history | show excerpt | excerpt history
Code Language (used for syntax highlighting): default
|
global_05_local_5_shard_00000035_processed.jsonl/18947
|
Take the 2-minute tour ×
I have 7 CD drives. Currently I'm writing the CDs using NTI Media Maker.
The problem is that all drives have weird name like HL DVD-RW S224. It is very hard to find which drive is which.
Is there any way to rename a drive to Drive 1 or Drive 2 so I can clearly see which drive failed to write a CD in NTI Media Maker?
share|improve this question
1 Answer 1
up vote 3 down vote accepted
Looking up the name of the software, it seems you're on Windows XP or Vista.
You can change the drive labels in the registry, but you will have to make some keys are they are not there by default.
• Open regedit from the run box (XP) or Start menu search (Vista)
• Expand the treeview in the left pane to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
• Right click the Explorer key and select New -> Key and call this new key DriveIcons
• Right click this DriveIcons key, and create new keys underneath it for each drive you want to modify, then inside those keys, create one more key called DefaultLabel, once again this also must be done for each drive
For example, if I wanted to modify the D: drive, the key hierarchy should look like this:
Remember, every single drive must have:
• It's own drive letter underneath the DriveIcons key.
• and it's own DefaultLabel key under the drive letter key, for a total of 2 keys per drive.
now inside the DefaultLabel key for each drive, there should be a default string value created. Modify it to whatever label you desire:
alt text
Your drives should now have different names:
alt text
share|improve this answer
Thank buddy i will try that – Mirage Jan 26 '10 at 9:13
Does this apply to Windows 7? – mindless.panda Aug 8 '11 at 19:33
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18948
|
Take the 2-minute tour ×
Hi I've created a Email Template for Outlook. And have set it up so now when I open a new email my template is display nicely.
But I may not always want to use this template and might have 2 or 3 templates that I need to change between on a regular basis. Is it possible to change to another "Theme" when composing a new email.
There is under the "Options" section of the ribbon a option called "Themes" but this seems more to do with fonts and colours not replacing a proper "Theme" which contains background colours and Image banners in it.
Any ideas?
share|improve this question
migrated from stackoverflow.com Feb 11 '11 at 15:56
This question came from our site for professional and enthusiast programmers.
Wow, I hadn't realized they kept "email templates" after Office 97... – sarnold Feb 11 '11 at 10:50
1 Answer 1
No it's not possible without using a macro. I've put a question on stackoverflow.com on how to change it using a macro: http://stackoverflow.com/questions/5259206/how-do-you-change-outlook-stationery-using-a-macro because I don't know how to do that myself.
If you want to create a custom template, then you can do so using an HTML editor to create a html file. Find out where the themes live on your C drive (varies by operating system). Then put the html file there. You will then see the file appear on the themes list.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18949
|
Take the 2-minute tour ×
I might not have searched around really hard enough the answer of this, my question, but I really would like to know why.
share|improve this question
Do you have any sources for your assertion? I wouldn't think the the differences would be that great, but the journaling, ACLs, and other features that NTFS supports that exFAT doesn't may cause enough extra writes to notably shorten lifetime. – afrazier Nov 28 '11 at 1:22
I might have to edit the question to "Does exFAT give longer life expectancy to flash drives, than NTFS?" link – Karolinger Nov 28 '11 at 2:14
1 Answer 1
up vote 3 down vote accepted
There are some big differences between NTFS and ExFAT - the biggest one being that ExFAT was specifically made for removable media and NTFS was specifically made for fixed-disks. But there are some other reasons why NTFS causes more disk activity than ExFAT:
• NTFS has journalling which must be written to during every operation. ExFAT doesn't.
• NTFS has a more complex on-disk structure with alternative data streams, higher precision filesizes, multiple attributes, hardlinks, encryption, sparse files and so on, all of which mean putting simple files onto the disk is marginally more expensive.
• NTFS more agressively moves stuff on disk to reduce fragmentation during file writes, whereas ExFAT just happily fragments the files.
• NTFS tries to organise itself on disk in such a way that multi disk-platter systems can take better advantage of it - this often leads to duplication of data when the disk has lots of space available to allow for faster reads from disk. ExFAT doesn't care.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18950
|
Take the 2-minute tour ×
I'm not really sure this is possible (or how to explain it properly)...
My hosting provider is Bluehost My Domain Registar of choice is Hover
For email I use google apps. What I would like to do, is be able to set up my DNS settings, for email and google apps through Hover and have it ignore the settings in Bluehost. From what I'm reading it doesn't seem like this is possible because my namesevers point to bluehost. My question is: is there any way to do what I'm saying or no? And if it's totally not possible, is there a better/different solution out there that I could research.
PS - The reason for this is because I'd like to be able to leave Bluehost, but I'm realizing that it will be a hassle to move a bunch of domains and all their DNS records, it would be easier if I could set all that stuff up in one place and change hosts easily.
share|improve this question
2 Answers 2
up vote 1 down vote accepted
You can use a third party DNS provider (hurricane.net is one). I kind of look at this as three levels: you have your registrar (who registered your domain name, thus, who you use to point your nameservers), DNS, and then Hosting (files).
If you host your DNS on a third party, you'll just have to copy the records you have currently set on Bluehost over to said third party. Then change the nameservers to point to your new DNS provider. Wah-lah, works.
Now, when you plan to jump, make sure a few days before this happens you change the TTL to ... oh, 5-30 minutes. That way when you have to change the IP to your new address (where the files are going to be hosted), you'll have minimal down time.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18951
|
Take the 2-minute tour ×
I can't make less use my favorite editor. To my horror, it starts ed which I've never used and really am not going to.
> echo $EDITOR
> less somefile
Pressing v starts usr/bin/editor +7 somefile. I've never seen less ignoring $EDITOR, so it may be an Ubuntu issue.
share|improve this question
2 Answers 2
up vote 3 down vote accepted
Try adding "export EDITOR". The behaviour of unexported shell variables is really confusing, but I can reproduce this problem myself.
If that still doesn't work, "sudo update-alternatives –config editor" will let you configure /usr/bin/editor
share|improve this answer
My bad... I always use things like export EDITOR=emacsclient; export VISUAL="$EDITOR"; export LESSEDIT="$EDITOR '%f'" and this time I copied it from somebody else... – maaartinus Feb 15 '12 at 20:37
less pays attention to three environment variables to determine what editor to invoke for the v command: $VISUAL, $EDITOR, and $LESSEDIT. man less and search for LESSEDIT for details.
Normally it probably makes sense to set $EDITOR to your favorite editor and leave $VISUAL and $LESSEDIT undefined. (The distinction between $EDITOR and $VISUAL is probably not useful these days; it used to be a way to distinguish between a full-screen editor like vi and a line-oriented editor like ed.)
And as pjc50 says, be sure the $EDITOR variable is exported.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18952
|
Take the 2-minute tour ×
After reboots, my Windows 7 desktop icons will randomly change size.
I am referring to the icons with a gray border around them. A search has not yielded me a working resolution. How do I fix this?
share|improve this question
can you paste a screenshot? – tumchaaditya May 14 '12 at 9:43
Are those... My little ponies over all your icons? – BloodPhilia May 14 '12 at 14:00
1 Answer 1
up vote 3 down vote accepted
So many things can cause this, from desktop settings to a corrupt user profile.
Things to try.
1.) Right click on the desktop and select View, be sure "auto arrange icons" is Not selected.Right click again to view settings and un-select "align to grid"
2.) Some suggest software to sort it out in some cases
3.) Try rebuilding the icon cache
4.) Create a new user account, then copy the old user account settings to the new account
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18953
|
Take the 2-minute tour ×
Hi i just tried plugging in my WD 500g Hard Drive when it just shows me the drive with no data. I ran a cksdsk/e and it says Invalid Parameters. It also asks me to format disk.
Can anyone help solve this problem?
share|improve this question
You need to format the disk to use it... I'm assuming this is a new disk? – Kyle Jun 13 '12 at 16:58
That is not correct (assuming it came formatted which is almost always the case) – soandos Jun 13 '12 at 16:58
I've never seen a preformatted HDD before... How would they even decide what to format it as? – Kyle Jun 13 '12 at 17:10
1 Answer 1
up vote 0 down vote accepted
This command will take a while, but try chkdsk I: /r /f /v /x where I: should be replaced with your drive letter.
share|improve this answer
ok running it now seems to be working will let you know when i finish. thanks – Jon Jun 13 '12 at 18:05
hey they Soando, just curious i know you said it would take a while but any idea of how long. i have had it running for 6 hours now and it seems to be stuck in stage 4 not sure if it just takes a long time to go thru all the files or if it has froze. also what would happen if i prematurely unpluged the hard disk before it was finished? – Jon Jun 14 '12 at 1:06
ok so i wasn't able to finish yesterday. trying again today but now it says "the type of the file system is RAW. CHKDSK is not available for RAW drives. Do you know of anything else i can do? – Jon Jun 14 '12 at 15:35
At some point you messed up the formating on the drive (between today and yesterday). Now you have to forma – soandos Jun 14 '12 at 16:03
ok couldn't see your last msg lol. stopped at forma... but was looking around and saw something called "diskpart.exe clean" now it sounds to me like this will format my drive. which it looks like i need to do anyways my biggest concern is the photos i have on the drive. I do have Recuva which is suppose to recover data from formatted drives but have never used it before. any more pointers lol! thanks again for your help – Jon Jun 14 '12 at 16:27
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18954
|
Take the 2-minute tour ×
I have no idea how to find any information about this. I am running redhat 5 with a gnome destkop. Periodically, I hear chimes, three tones, either ascending or descending, at random intervals. It used to be once or twice an hour, but has become more frequent. Does anyone have any idea what might cause this?
share|improve this question
What apps do you run? Anything in the background or sitting in the notification area? An instant messaging app (Pidgin) for instance? – regan Sep 29 '09 at 15:29
do you have a program called TreoHour installed – admintech Sep 29 '09 at 15:34
@regan it's pidgin. Thanks. Submit that as an answer and I'll accept it. I run pidgin in the background for work, but I hardly ever have it foregrounded, so I never associated the notification with the program. Thanks again! – David Berger Sep 29 '09 at 18:59
1 Answer 1
up vote 2 down vote accepted
Apparently it's Pidgin, per my comment. You can change notification settings so it doesn't ding on status changes.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18955
|
Take the 2-minute tour ×
I often switch between compiling "classic" LaTeX and XeTeX documents.
Sublime Text 2 has a package called LaTeXTools that allows you to build LaTeX documents via a simple CmdB. Neat.
The build file LaTeX.sublime-build obviously exists in the standard package folder, and you can copy it to your User folder to customize it. Here, it allows you to change the arguments given to latexmk, namely to switch from pdflatex to xelatex, for example like this:
"cmd": ["latexmk", "-cd",
"-e", "\\$pdflatex = 'xelatex %O -interaction=nonstopmode -synctex=1 %S'",
"-f", "-pdf"],
Now, it's very tedious having to do that every time I open up another document – open my build preferences, comment out the one line, save, etc.
Ideally, I'd like to be able to switch the engine
• … automatically – TextMate for example somehow does that, and I can compile both LaTeX documents and XeTeX documents with a simple CmdR, although the TextMate configuration is set to pdflatex. Maybe it's some latexmk.pl-fu, I don't know.
• … with a simple keyboard shortcut or setting – Maybe pressing CmdL, CmdX or similar. This would then toggle between pdflatex and xelatex building.
How could I set that up?
share|improve this question
1 Answer 1
up vote 9 down vote accepted
Note: LaTeXTools for Sublime Text now supports automatic engine detection if your file starts with %!TEX program = <program>, where <program> is any of pdflatex, xelatex or lualatex. The below instructions are only necessary if you need to manually switch engines for whatever reasons.
Take the LaTeX.sublime-build file in the LaTeXTools folder under ~/Library/Application Support/Sublime Text 2/Packages and copy it to ~/Library/Application Support/Sublime Text 2/Packages/User/, but do it twice and give those files the following name:
• LaTeX.sublime-build.latex
• LaTeX.sublime-build.xetex
Change the files to use the pdflatex for LaTeX and xelatex engines for XeTeX, respectively (as seen in the question).
Then, create a new plugin through Tools » New Plugin… (saving it as switch.py to the location above):
import sublime, sublime_plugin, os, shutil, filecmp
class SwitchCommand(sublime_plugin.ApplicationCommand):
def run(self):
folder = os.path.expanduser( \
'~/Library/Application Support/Sublime Text 2/Packages/User/')
latex_src = folder + 'LaTeX.sublime-build.latex'
xetex_src = folder + 'LaTeX.sublime-build.xetex'
dest = folder + 'LaTeX.sublime-build'
if filecmp.cmp(dest, latex_src):
sublime.status_message("Switching to XeTeX")
shutil.copy(xetex_src, dest)
sublime.status_message("Switching to LaTeX")
shutil.copy(latex_src, dest)
And create a keyboard shortcut for it in Preferences » Key Bindings – User:
[ {
"keys": ["super+shift+x"], "command": "switch"
} ]
You can also add this to your menu by adding the Main.sublime-menu file to your User package:
[ {
"id":"tools", "children":
[ {
"command": "switch",
"caption": "Switch between LaTeX/XeTeX"
} ]
This will now compare the currently active build file with the build settings needed for XeTeX and LaTeX and switch them if necessary.
This could sure use some improvement, but it works for the moment.
share|improve this answer
Works like a charm, except that LaTeXTools doesn't seem to be giving precedence to LaTeX.sublime-build in my user packages folder. Quite odd... – fgb Apr 13 '13 at 6:58
Do you make a full copy of the default LaTeX.sublime-build, which you then modify, or just include the relevant osx portion? – fgb Apr 13 '13 at 7:25
First of all thanks for the edits. I did a full copy of the default file and modified them accordingly. What I found out though was that XeLaTeX compiles all LaTeX sources fine, at least on all of the files I tested. Maybe there's a fallback somewhere in the background? – slhck Apr 13 '13 at 7:55
Copying and modifying the full default file solved my issue. Interesting that using just XeLaTeX is sufficient for both. I'll check this out in the future as it'll definitely be better than having to switch compilers. Thanks for the prompt response! – fgb Apr 13 '13 at 19:33
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18956
|
Take the 2-minute tour ×
I thought that maybe 21.5" were for 1650x1080 and 22" for 1920x1080 because I found this comment here:
Monitors labeled 21.5" usually have a resolution of 1920x1080, while 22" monitors usually have a resolution of 1680x1050.
But I can see:
• 22" monitors with 1920x1080 (like Viewsonic VA2248m-LED 22" TFT Monitor 1920x1080 Black)
• And also 21.5" monitors with 1920x1080(like ASUS 21.5" VE228D 1920x1080)
So, what is the real difference? Smaller screen with same resolution? Same screen but smaller borders?
share|improve this question
I think it is all down to personal choice. I like bigger screens; some people prefer smaller screens. – Kevdog777 May 20 '13 at 9:50
The obvious correct answer to this question is one has a half inch larger viewing area. – Ramhound May 20 '13 at 10:30
A half-inch difference in advertised diagonal measurement is the least-important characteristic of a display that I'd worry about. Aspect ratio, resolution, brightness, color rendition, et al are all more important. – Daniel R Hicks May 20 '13 at 11:13
1 Answer 1
up vote 5 down vote accepted
Sometimes it is down to rounding or honesty issues: checked the detailed specs. When I was last shopping for monitors several advertised as 24" officially had a 23.6" display area when you looked at the detailed specifications. The difference could have been down to simple rounding by marketing and/or the retailers or perhaps there was a bit of visible panel each side with no pixels (that some were counting as they were quoting panel area and others were not as they were quoting actual display area).
If the display sizes genuinely differ by that much then the 22" has about 2.3% larger display area so will be better assuming all other things are equal. If the smaller screen is a better quality panel by other measures then that may be more valuable than the larger area.
I suspect that is someone extrapolating a very small set of data points to produce a view of the whole market that is inaccurate.
On a semi related note, those two resolutions are different aspect ratios. 1920x1080 is 16:9 and 1680x1050 is 16:10. The 16:10 equivalent of 1080p is 1920x1200 - about 11% more pixels down. A 22" diagonal at 16:9 is 19.17x10.78 (~206.7 square inches) and at 19:10 is 18.65x11.66 (so less wide but taller, with a slightly larger area at ~217.5"2). Coders and designers tend to prefer a 16:10 screen, though they are generally more expensive due to the economies of scale as far less 16:10 panels are made and sold (because almost all TVs and most monitors are 16:9), and general home users prefer 16:9 as video content is more likely to target that ratio so they see less unused screen space (due to letter-boxing) when playing movies.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18957
|
Take the 2-minute tour ×
I choose the public option for all my albums in Picasaweb, these mostly (>90%) contain pictures of my children which I share with my family. Ever so often somebody I don't know adds me as a favorite, at current count I have 7 people in my fan list (non of whom I know) and only three of them have any public albums.
Is this creepy? I take care not to upload any pictures that may attract perverts
What would you recommend, private by default or continue with public?
share|improve this question
You can share private albums on Picasaweb by sending your friends the unlisted link to the album and not posting it anywhere online. If it somehow does get into the hands of people you'd rather not see it, you can reset the unlisted link. – humble coffee Dec 4 '09 at 2:41
7 Answers 7
up vote 10 down vote accepted
private - never disclose more than needed. after all, what for ? why would you ?
you wouldn't go about giving photos of your kids to strangers in the street, right ?
share|improve this answer
My theory on this is pretty much the same. If in doubt, make it private. If the album truly contains stuff I don't care about then, meh, whatever. The only time I would explicitly want to make stuff public is if I was promoting my photography business and the like. – JMD Dec 3 '09 at 20:51
i don't store photos of private nature that i don't want strangers to see on the internet, public or otherwise. even private accounts are not safe (and most certainly not with the notorious 'doers of good', who happen to own Picasa).
but then, that's just paranoid old me.
share|improve this answer
although i have much more faith in google, than pretty much anyone else - even they did have a few lapses regarding making private stuff public accidentally and so ... i won't even start about other (facebook, myspace, ... your choice). so yes, nicely put. – ldigas Dec 3 '09 at 21:02
Keep in mind that ANYTHING you put online, is retained. So making something private is not just a good idea, but a smart way to keep photos from getting into where they shouldn't - technically.
As it was said, if you worry about private photos getting into the wrong hands, don't post them online, private or not, its ONLINE.
share|improve this answer
As soon as your pictures are publicly visible you lose any control over what happens to the pictures, how they are used or in what context or in what form or state of modification. You can't change your mind later, as people might have copied them to somewhere else. You most likely won't have legal remedies either as the internet is international and offending parties may be anywhere in the world.
share|improve this answer
"You can't change your mind later, as people might have copied them to somewhere else." Quoted for emphasis. This applies to any content you make public online, including blogs, news article comments, etc. – Miss Cellanie Dec 4 '09 at 0:02
This is the main reason I'm still with Flickr, which allows you to select individual PHOTOS within an album as public/private. I'm frustrated that in Picasa, ALL photos within an album are public or private. In my case, within a photo album (say, of a holiday trip), I'll make the generic ones public while the ones with family members private. I really wish Picasa would implement this relatively basic feature.
share|improve this answer
I have a particular problem with having to be constantly nagged to do something I simply don't want to do by an impersonal company. I can't access my own photos without yet another box forcing me to find the 'x' (sometimes it doesn't show up) to close. Why can't companies with so many users simply add on opt-out? More to the point, why do they feel the need to pretend concerns about privacy are not worth recognising? I happen to be a teacher and the last thing I want is students accessing photos. I read Google's FAQ page- with all my marks and a new baby this week (:)) the last thing I want to do is waste more time jumping through hoops just to appease a business. Thankfully I'm not in China anymore or else I could get into serious trouble with the photos that appear from my anti-regime blog. And then where does it end? Will I be unable to read the NY Times without more links to Google or Blogger getting in the way a la Facebook?
share|improve this answer
Congratulations! – Motti Dec 28 '10 at 9:16
im a mom. i raised two great kids. yet i just dont get all the hyperconcern that "some bad person somewhere on earth" might see a picture of a kid. so what? do you put a bag over them when they go outside? after all, outside is unregulated. why, anyone happening by can actually -- gasp -- see your kid.
people, on the net they dont even know who the person in a photo is. i get so tired of unreasoning and endless, vague fears on the part of society. in special cases, sure, but in general? what exactly is it you think might happen? jeeze.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18958
|
Take the 2-minute tour ×
in all versions of Windows we are unable to rename a file or a folder name as con unless we use a renaming software. Why a file or a folder can't be renamed as con?
share|improve this question
9 Answers 9
In addition to Pablo Santa Cruz's answer here comes the full list of protected keywords in MS-DOS:
these keywords are used by Windows internally and are reserved Keywords. CON is used for CONSOLE, PRN for PRINTER, LPT’s for PARALLEL PORTS...
You can use _con instead
share|improve this answer
As mentioned, you can create and manipulate files and folders with reserved names on the command line by using a device or filename namespace such as \\.\C:\NUL, but look at what happens when you try to access such a file or folder through Windows Explorer:
Error opening folder named NUL Error deleting folder named NUL
Any access to an object with a reserved device name is treated as referring to the device specified by that name, unless you use the aforementioned namespace workaround. These errors occur because Windows is attempting to operate on them as if they were normal folders, but you can't open a device named NUL, CON, or otherwise as a folder—hence the Incorrect function error (which is similar to the Inappropriate ioctl for device error on Linux).
share|improve this answer
You’ve mixed up the terminology a bit. \\.\… is a Win32 device namespace, \\?\… is a Win32 filename (also for folders) namespace, and \\compname\… is a UNC (network) path. – Synetech Sep 26 '12 at 5:02
@Synetech: Corrected. – DragonLord Sep 26 '12 at 13:14
This is because it is used to represent the "internal devices". However, you can create this folder using the following command in a command prompt:
C:\>md \\.\e:\con
This folder can't be deleted via right click, delete. You have to use the following command (again in a command prompt):
C:\>rd \\.\e:\con
Source: http://yhisham.blogspot.in/2012/09/mystery-about-con-folder-in-windows.html
share|improve this answer
CON is a reserved name in Windows. So are PRN, AUX, NUL, LPT1 and others.
share|improve this answer
CON is short for console. Open a command prompt window, navigate to a directory with a text file and type "copy file.txt con" It will write the contents of the text file to the console (the command prompt window) – Keltari Sep 12 '12 at 18:45
i gave this answer to a duplicate, and thought i'd post it here for your reference:
as previously stated. it's a reserved word from back in MS-DOS, for the CONsole device (as far as i can remember). but, you can force windows/dos to create the folder for you. for devices, it uses the format \\.\[RESERVED_WORD] to access the "file" (these devices used files for communication). to force windows to create your folder, instead of doing mkdir [RESERVED_WORD], do the following:
mkdir \\.\[absolute path to folder of choice, including drive letter]\[RESERVED_WORD]
for example, to create CON folder on my desktop,
mkdir \\.\C:\Users\me\Desktop\CON
to delete the folder, you have to reference it the same way, or else it won't work.
rmdir \\.\C:\Users\me\Desktop\CON
my advice though is to just use a different name. it would be very difficult to always refer to it via its absolute path, especially if you are developing an app you plan on deploying.
share|improve this answer
You can rename it without using any special software, just the command prompt:
For example:
C:\>echo Test > \\?\C:\con
C:\>type \\?\C:\con
C:\>rename \\?\C:\con test.txt
C:\>type test.txt
After \\?\ the full path should be specified.
share|improve this answer
copy con is an archaic (MS-DOS) method of creating a text file. For example:
copy con output.txt
So it is a reserved word and cannot be used as a folder name in Windows.
share|improve this answer
Just like there are characters that cannot be used in a filename, there are also several words (whole filenames) that cannot be used because they are reserved.
share|improve this answer
"con" is the name of a system I/O device, the console.
• con
• err
• nul
And a couple others, I think.
In the old days it was common in DOS to create a file (and I still do this occasionally) with:
C:\>copy con foo.txt
I'm typing some text here.
1 file(s) copied.
share|improve this answer
A minor correction: err is not reserved. The full list of reserved device names is: con, nul, prn, com1..9, and lpt1..9. They are even reserved when used with any extension (e.g. con.txt). – efotinis Dec 23 '09 at 19:52
"unless we use a renaming software" About the quoted part, how do the "renaming software" get around what is essentially an OS limitatiom – Sathya Dec 23 '09 at 19:57
You got me. I'm sceptical that any "renaming software" can even do it. But if it can, I'd be worried about being able to open or even move the file. As you said, the OS is going to take issue with it. – JMD Dec 23 '09 at 20:32
The master list is at msdn.microsoft.com/en-us/library/aa365247%28VS.85%29.aspx Do not use the following reserved device names for the name of a file: CON, PRN, AUX, NUL, COM1, COM2, COM3, COM4, COM5, COM6, COM7, COM8, COM9, LPT1, LPT2, LPT3, LPT4, LPT5, LPT6, LPT7, LPT8, and LPT9. Also avoid these names followed immediately by an extension; for example, NUL.txt is not recommended. – shf301 Dec 24 '09 at 17:07
@Sathya: By using the \\?\ prefix to bypass file name parsing. For example, " \\?\C:\con\nul.txt ". – grawity Aug 26 '11 at 17:29
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18959
|
Take the 2-minute tour ×
I want to avoid using my mouse to click the button "I'm feeling lucky", like how you press Enter to get your search results. How to set up a shortcut key for this button?
share|improve this question
4 Answers 4
up vote 5 down vote accepted
Press Tab twice, then press enter.
X = Tab * 2 + Enter
share|improve this answer
wouldn't that be XX ? :) – akira Jan 5 '10 at 5:57
Can we settle on X = tab(2) ? :) – John T Jan 5 '10 at 7:53
#IfWinActive, Google
x::{Tab 2}{Return}
There's your X :) (John T's answer in AHK form)
share|improve this answer
You could define a specialised search depending on which browser you use and call that via shortcut or special command.
share|improve this answer
Type it in your browser location bar, and you have set it to use google.
share|improve this answer
Your Answer
|
global_05_local_5_shard_00000035_processed.jsonl/18963
|
Poll: Your most anticipated PC game
— 12:17 PM on October 13, 2010
Each holiday season, a torrent of new PC games floods the market. This year is no different, although publishers seem to be spacing things out a little more than they have previously. Nevertheless, there are numerous titles due out before the end of the year, most of which are sequels or expansions to existing properties. Which one are you anticipating the most? We've come up with a list of choices that covers most of the major releases slated to be released before January. Feel free to add anything we missed in the comments. You can cast your vote over on the right column on the front page or after clicking on the comment link below.
In last week's poll, we tackled the subject of music, and more specifically, where you buy it—or if you do at all. As it turns out, 42% of those who voted don't buy their music. Yarrr. Of those who do, 16% purchase CDs online or via mail order, and another 12% pick up discs at retail stores. 11% download MP3s from Amazon, while only 9% go the iTunes route. 8% get their music online but use another service, and 2% stubbornly cling to vinyl.
Loading poll...
More polls »
Top contributors
10. cygnus1 - $126
View options
This discussion is now closed.
|
global_05_local_5_shard_00000035_processed.jsonl/18986
|
The Pros and Cons of Parenthood
Mom Moment 12
toddler in tunnelPeople make pro and con lists for all sorts of things -- my husband and I had one when we were house hunting. And what you realize with these lists is that nothing is going to be absolutely perfect, you will make sacrifices. It's the exact same way when it comes to parenthood.
My friend and sex and relationship writer Jamye Waxman recently asked her friends on Facebook to share the pros and cons of having babies. She's gathering responses for a book she's working on, and of course I, a mom of 3-year-old twins, had to weigh in.
I told her that I've never been happier. Kids are incredible. They teach you, and you grow in ways you never thought possible. The love you feel defies words.
Clearly, I'm all hearts and flowers and smiley faces when it comes to parenthood. My first reaction when seeing the word "con" and "parenthood" together was to shake my head. There is no con. But then I saw how there were really only a few responses like mine. Maybe it's easier to see the cons of parenthood when you aren't a parent. Maybe parenthood does something to your mind that you only see the good stuff. Maybe it's sort of like that anti-drug commercial with the fried egg: This is your brain (perfectly shaped egg). This is your brain on drugs (egg cracked and fried up). This is your brain before kids (clean house with a well-dressed couple smiling happily). This is your brain after kids (messy house, kids crying, disheveled parents smiling happily). Are parents brainwashed once the birth certificate is official? Is it all that oxytocin? I just think parenthood is fantastic, messy house, crying kids, and all. The pros outweigh the cons so much that I'm completely oblivious to the cons.
But I wanted kids. Really wanted to become a mom. I'm not the guy who accidentally got a girl pregnant but didn't know it and found out years later I had a child and ended up full of resentment. I'm not the woman whose kid did something terrible, truly terrible. Even then, I think a parent forgives ... at least in some way. But I really don't know. So this pro and con thing really depends.
I couldn't help but wonder about the guy who responded to Jamye saying how parenthood means you will still have to deal with the woman you will end up hating for your entire life. Huge con, if that's the case, I suppose. Was he talking about the woman he had a child with? Someone perhaps he divorced? Or his daughter? There is a lot of pain in that comment. No hearts and flowers and smiley faces there.
Then when I read the response that "your child is your greatest teacher and your greatest artwork," the birds sang again.
But back to that con up there. A child changes your relationship. If it wasn't strong to begin with, a baby isn't going to make it better. Though if you work at it, realize sacrifices are worth it, and perhaps with some patience -- make that a whole lot of patience -- everything can be sunshiney and rose-colored again. Or you move on. There are plenty of amazing single parents out there. Sometimes things just don't work out. Though it all depends. People are still people and some people, well, let's just say that not everyone is kind.
What are the pros and cons of parenthood? Do you think there are no cons because the pros overshadow them?
Image via Theodore Scott/Flickr
bonding, time for mom, motherhood
|
global_05_local_5_shard_00000035_processed.jsonl/18989
|
If you're like us, you've been closely following the trials and tribulations of the Granthams and those who serve them. Like last season, Ben Zimmer and Ben Schmidt have been busy catching the anachronisms. Zimmer recently noticed a doozy — steep learning curve — while Schmidt found such out-of-place terms as ritual humiliation and shenanigans.
Spoilers may follow.
1. blimey
Blimey is a British expression many of us are familiar with. It's used to express anger, surprise, excitement, etc., and originated around 1889 as a corruption of "(God) blind me," says the Online Etymology DictionaryGorblimey is another variant.
Example: Sybil: "Mary, you know what I said about the baby being Catholic. I've just realized the christening will have to be here, at Downton."
Mary: "Blimey."
— Episode 4, January 27, 2013
2. Chu Chin Chow
Chu Chin Chow is a musical comedy based on Ali Baba and the 40 Thieves in which "the wealthy merchant Kasim Baba (brother of Ali Baba) [gives] a lavish banquet for a wealthy Chinese merchant, Chu Chin Chow, who is on his way from China." The show premiered in London in 1916 and ran for five years.
Example: Mrs. Hughes: "Then your dinners would be grand enough for Chu Chin Chow."
— Episode 6, February 3, 2013
3. Debrett's
Debrett's is a British publisher of etiquette guides and Debrett's Peerage & Baronetage, a "genealogical guide to the British aristocracy," or as Patsy Stone of the TV show Absolutely Fabulous calls it, the "Who's Who in what's left of the British aristocracy."
Example: Cora: "Not everyone chooses their religion to satisfy Debrett's."
— Episode 5, February 3, 2013
4. hobbledehoy
hobbledehoy is "a raw, awkward youth." The word is very old, originating in the 16th century. The first syllable hob probably refers to "a hobgoblin, sprite, or elf," while -dehoy may come from the Middle French de haye, "worthless, untamed, wild."
Example: Carson: "Miss O'Brien, we are about to host a society wedding. I have no time for training young hobbledehoys."
— Episode 1, January 6, 2013
5. in someone's bad books
To be in someone's bad books means to be in disgrace or out of favor. The phrase originated around 1861, says the Oxford English Dictionary (OED). An earlier phrase (1771) is to be in someone's black book. A black book was "a book kept for the purpose of registering the names of persons liable to censure or punishment, as in the English universities, or the English armies." So to be in someone's black book meant to be in bad favor with that person (or on their shitlist, as we Yanks say). As you may have guessed, to be in someone's good books means to be in favor. That phrase originated around 1839, says the OED, in Charles Dickens's Nicholas Nickleby: "If you want to keep in the good books in that quarter, you had better not call her the old lady."
Example: Daisy [to Mosely about O'Brien]: "I wouldn't be in her bad books for a gold clock."
— Episode 2, January 13, 2013
6. in the soup
To be in the soup means to be in a difficult spot, according to the OED. The phrase was originally American slang, originating around 1889.
Example: Daisy [to Mosely]: "You're in the soup."
— Episode 2, January 13, 2013
7. Johnny Foreigner
Johnny Foreigner is a derogatory term for "a person from a country other than those which make up the United Kingdom." We couldn't find an originating date or first use of the phrase. If anyone has information, let us know!
Example: Robert: "But there always seems to be something of Johnny Foreigner about the Catholics."
— Episode 3, January 20, 2013
8. left-footer
Anachronism alert! Left-footer, which is slang for a Roman Catholic, didn't come about until 1944, according to the OED, 24 years after this episode takes place. The term seems to come from the belief that "in the North of Ireland that Catholic farm workers use their left foot to push the spade when digging, and Protestants the right." Kicks with the left foot is another slang term for Catholic, while kicking with the wrong foot "is used especially by Protestants of Catholics and vice versa."
Example: Robert: "Did you hear Tom's announcement at breakfast? He wants the child to be a left-footer."
— Episode 6, February 3, 2013
9. plain cook
plain cook, says the OED, is "a cook who specializes in, or most frequently prepares, plain dishes." Plain dishes are "not rich or highly seasoned," and have a few basic ingredients.
Example" Mrs. Bird: "She says there's plenty of work for a plain cook these days."
— Episode 4, January 27, 2013
10. rich as Croesus
Croesus was, in ancient Greece, the last king of Lydia "whose kingdom, which had prospered during his reign, fell to the Persians under Cyrus." Croesus came to refer to any rich man by the late 14th century.
Example: Mary: "He's as rich as Croesus as it is."
— Episode 1, January 6, 2013
11. squiffy
Squiffy means tipsy or drunk, and is of "fanciful formation," according to the OED. Other ways to say drunk.
Example: Robert: "I'm very much afraid to say he was a bit squiffy, weren't you, Alfred?"
— Episode 6, February 3, 2013
12. stick it up your jumper
The full phrase is oompah, oompah, stick it up your jumper!, and is "an expression of contempt, defiance, rejection or dismissal." It may have originally been "a meaningless jingle chanted jocularly or derisively" from the 1920s. The phrase makes a famous appearance in the Beatles' song I Am the Walrus.
Example: Anna: "They'll have to give Thomas his notice." Bates: "Mr. Barrow." Anna: "Mr. Stick It Up Your Jumper."
— Episode 6, February 10, 2013
13. tuppence
Tuppence is an alternation of twopence, two pennies or a very small amount. One who doesn't give a tuppence doesn't care at all.
Example: Isabel: "She couldn't give a tuppence about Ethel."
— Episode 6, February 10, 2013
More from Wordnik...
* Words from the first two seasons of Downton Abbey
* 11 words coined by Charles Dickens
This week's language blog roundup
|
global_05_local_5_shard_00000035_processed.jsonl/18992
|
Tolkien Gateway
Revision as of 11:06, 29 June 2012 by Ederchil (Talk | contribs)
Template:Istari infobox
"Radagast the Brown! ... Radagast the Bird-tamer! Radagast the Simple! Radagast the Fool! Yet he had just the wit to play the part that I set him."
Saruman, The Council of Elrond
Radagast the Brown was one of the Wizards, a good friend of Gandalf, and had a strong affinity for animals. He lived at Rhosgobel, on the western eaves of Mirkwood, near the Gladden Fields on the Great River.
Radagast, like the other Wizards, came from Valinor around the year 1000 of the Third Age and was one of the Maiar of the Valië Yavanna. His original name was Aiwendil (pron. [aɪˈwendil]). Yavanna forced Curumo to accept Radagast as a companion, which may have been one of the reasons Saruman was contemptuous of him.
The wizard's home was in Rhosgobel on the western borders of Mirkwood. Considering the location of Rhosgobel (Being uncomfortably close to Dol Guldur) it is likely that Radagast had something to do with The White Council's attack on the fortress in T.A. 2941. He was a friend of Beorn as well as a friend to the forest's many creatures, especially birds whom he communicated with. He spent most of his time with the wildlife instead of Men and Elves, whom he found more difficult to deal with. Despite this, Gandalf was actually more knowlegable about the birds and beasts, and was more respected by them than Radagast. Radagast grew neglectful and easygoing, and he lacked courage, however he remained of good will.
In the summer of 3018 Radagast was unwittingly used by Saruman to lure Gandalf to Orthanc, sending him to Bree with a message for Gandalf. In this message Saruman asked Gandalf to come to Orthanc, where Saruman trapped and captured him. Luckily, Radagast didn't mean any harm to Gandalf, and wasn't aware of Saruman's plan. So Radagast also helped rescue the grey wizard by alerting the Eagles of Gandalf's journey there.
Radagast is without a doubt a mysterious character. While there is little doubt that his heart was in the right place, he did not possess that same selflessness that allowed Gandalf to fulfil the task set to him by the Valar, to aid the free people. Deigning to leave his wooded home, Radagast remained in Northern Mirkwood with the birds and the beasts and the trees.
When Elven scouts were sent to find Radagast after the Council of Elrond, he was not at his home in Rhosgobel: he plays no further role in events and is not mentioned again by Tolkien. There are several theories to his disappearance. He may have gone to spend time among the wildlife, or his friends among the Beornings, or he may have visited Thranduil's folk in Mirkwood. He may have also been forced to abandon his home, and it is quite possible that he was removed by the nearby fortress of Dol Guldur. However, Tolkien once stated that Radagast's failure was not as great as Saruman's, and that he may have eventually been able to return to Valinor, implying that he survived The War of the Ring.
The assumption that Radagast failed in his task may not be entirely accurate, as he was sent specifically by Yavanna, and he may have been charged with the protection of the flora and fauna of Middle-Earth, a task that would not end with the defeat of Sauron. However, what is certain is that he did not achieve the primary task set for him by the Valar, and he did not (for whatever reason) return to Valinor, according to the poem that Tolkien wrote about the Istari.
Radagast by Angelo Montanini
Names mockingly given to Radagast by Saruman:[1]
In a manuscript written by Tolkien in 1954, the name Radagast is said to mean "tender of beasts" in Adûnaic, the language of Númenor.[2] However, in a later note Tolkien said that the name is in the language of the Men of the Vales of Anduin, and that its meaning is not interpretable.[3]
As stated by Hammond and Scull, several theories have appeared concerning the inspiration of the name Radagast.[4] One such theory has been proposed by Douglas A. Anderson, who notes the name Redigast in Slavic mythology.[5]
The name Aiwendil is likely Quenya, perhaps derived from aiwe ("(small) bird") and ndil ("devoted to").[4][6]
Portrayal in adaptations
1981: BBC Radio's The Lord of the Ring:
Donald Gee provided the voice of Radagast. He is however not the person who sends the Eagle to save Gandalf from Orthanc.
1987-: Mithril Miniatures:
Radagast has been issued in a couple of different versions: figure LR3 "Radagast the Brown" is seen with a cat and an owl;[7] an older version of the figure portrays Radagast without beard and with a different bird.[8] There is also a "Radagast Mounted" (MS539), where Radagast (again without beard) is portrayed mounted on a horse.[9]
1988: J.R.R. Tolkien's War in Middle Earth:
Radagast is a non-playable character in this game.
The character Radagast and virtually all references to him were removed. He was originally to appear in a background scene, but this was removed because it was thought it would only confuse people.[source?] He later appeared on a Decipher Card, played by Weta's John Harding.
2001-: The Lord of the Rings Strategy Battle Game:
2007: The Lord of the Rings Online:
2012-13: The Hobbit films:
Radagast will be played by Sylvester McCoy. Although the character is only alluded to in The Hobbit, he may have been involved with The White Council's confrontation with the Necromancer around this time period. Sylvester McCoy has stated that Radagast will have more than just a brief cameo, and Sir Christopher Lee (who plays Saruman) stated that Radagast "has a considerably important part" in the upcoming films.[13]
See also
4. 4.0 4.1 Wayne G. Hammond and Christina Scull (eds), The Lord of the Rings: A Reader's Companion, pp. 240-1
7. Mithril Wizards Miniatures at (accessed 8 October 2011)
9. 32mm Fellowship Figures - MS539 Radagast Mounted at (accessed 8 October 2011)
10. Radagast the Brown at Games-Workshop-com (accessed 8 October 2011)
11. NPC: Radagast the Brown at (accessed 8 October 2011)
12. Allies at (accessed 8 October 2011)
Rebel: Melkor
Associated Maiar
Ulmo Ossë · Uinen · Salmar Estë Melian · Arien
Oromë Tilion · Blue Wizards Vána Melian · Arien
Other Maiar
Evil: Sauron · Balrogs (Gothmog · Durin's Bane)
Wizards Saruman · Gandalf · Radagast · Blue Wizards
Music · Valarin · Almaren · Valinor · Valmar · Second Music
|
global_05_local_5_shard_00000035_processed.jsonl/18993
|
Tolkien Gateway
War of the Dwarves and Orcs
Revision as of 15:14, 9 January 2013 by Dwarf Lord (Talk | contribs)
Previous war: War of the Dwarves and Dragons
Next war: War of the Ring
War of the Dwarves and Orcs
Mikel Janin - Battle of Azanulbizar.jpeg
Beginning: T.A. 2793End: T.A. 2799
Place: The northern Misty Mountains and Mount Gundabad
Outcome: Crippling defeat for Orcs, pyrrhic victory for Dwarves
Thrór fell into despair after living many years in poverty, or perhaps the Ring he wore was ultimately working towards his bearers evil. Whatever the case, he decided to leave his people in T.A. 2790 to seek out and look upon the ancestral halls of Khazad-dûm. Accompanied by his friend Nár, they crossed the Redhorn Pass and came down to the East-gate of Moria where the Thrór took it upon himself to enter alone, despite the warnings of Nár who stayed behind in the dale.
Thrór was found and slain by Azog the Orc-chieftain who had ruled in Moria, and after a few days Thrór's head had been branded with Azog's name and the corpse was thrown out of the gate where it was found by Nár. He was left alive to serve as a messenger to the Dwarves that Azog now claimed to be the King of Moria, and to stay away.
From 2790 to 2793 the Longbeards responded to this tragedy by gathering an army, and calling on all the other six Houses of the Dwarves for war.
Early Stages
In 2793 the Dwarf host was ready, and set departed for war; assailing and sacking one by one all the Orc-holds they could find from Mount Gundabad in the north, to the Gladden in the south.
Little is actually known about what happened during six year-long war, however it is know that most of the it was fought underground, in the great mines and tunnels of the Misty Mountains, where Dwarves excelled in combat.
The Final Battle
The war came to a climax 2799 (Probably the January or February), when the final battle was fought in the Dimrill Dale below the East-gate of Moria, the Battle of Azanûlbizar. The Dwarves gained victory in this notoriously bloody encounter when reinforcements arrived late on the scene from the Iron Hills. Azog was slain by Dáin Ironfoot.[3]
The Orcs suffered irreparable damage to their numbers by war's end. 10,000 alone were killed in the Dimrill Dale, and It seem highly likely that at least that many were killed throughout the previous five years of the war. Those that survived the final battle (as many as 10,000 or so) fled south through Rohan, seeking refuge in the White Mountains beyond, where they troubled the Rohirrim for two generations. As a result of such losses, the Orcs of the Misty Mountains virtually disappeared as a threat for Eriador and Wilderland. One and a half centuries later the Orcs of the North were recovering, but their numbers were permanently depleted to severely low levels in the aftermath of the Battle of Five Armies in 2941. It was here that Bolg son of Azog tried to avenge his father and the Great Goblin, but in his failure three fourths of his people were killed.
Noteable Veterans
See Also
Preceded by:
Long Winter
Major events of Middle-earth
T.A. 2793 - T.A. 2799
Followed by:
Fell Winter
|
global_05_local_5_shard_00000035_processed.jsonl/19007
|
Carol Platt Liebau
Remember the apocryphal story from 1992, when -- we were told by a breathless press -- President Bush didn't even know how grocery scanners worked? As it turned out, the story was false (http://www.snopes.com/history/american/bushscan.asp) but it was used to great effect by a pro-Clinton media to paint the incumbent as out-of-touch.
Well, today comes a story about how President Obama apparently didn't know how to dial an Iphone (http://www.washingtontimes.com/blog/inside-politics/2012/sep/9/tech-challenge-obama-has-trouble-iphone/); the pool report describes him as looking "befuddled." If there were any justice, we'd hear as much about this as Bush and the scanner, but don't hold your breath -- even though, it seems, the President conceded his ineptitude, noting that he still uses a Blackberry!
What's even more revealing of his character is what comes next, according to the press account discussed by the Washington Times' Dave Boyer:
The president then has more trouble dialing. When the call didn't go through, he blamed [the phone's owner for having an insufficient cell phone plan.
President Obama, seeking to shift blame?! Who'd a thunk?
Truly, this is only a small episode, but it's revealing. Like many arrogant people, President Obama is also profoundly insecure -- hence his proclivity for blaming others rather than taking responsibility for his own shortcomings or ineptness.
The problem with this character trait is that it signals that, for the person displaying it, the paramount concern is with proving himself right or smart or best. And that means it's always "about" him, rather than about other people -- or the country.
Carol Platt Liebau
|
global_05_local_5_shard_00000035_processed.jsonl/19010
|
Putin in The New York Times: Notion of American Exceptionalism is "Dangerous"
Katie Pavlich
9/12/2013 9:40:00 AM - Katie Pavlich
Russian President Vladimir Putin has done a pretty good job throughout the past week embarrassing the United States on the world stage over the crisis in Syria and now, he's written an op-ed in the New York Times to further prove his points and explain his position. Naturally, his words are laced with communism and slams against the United States.
Just a nice little reminder that Putin is a former KGB officer. But the worst part? Obama and Putin might not agree on Syria, but they have a lot in common when it comes to defining American exceptionalism.
|
global_05_local_5_shard_00000035_processed.jsonl/19011
|
You are viewing toxic_glory
21 August 2009 @ 10:52 pm
Why so Keira-centric?
So my recently-madeover journal has a theme. In case you're blind or just incredibly stupid, I'll go ahead and say it outright: Keira Knightley! Why Keira? Why now? Well, recently I've been appreciating her a lot more. She is quite beautiful and I think she's a lovely actress (this is not to say she's the best in the world, but she's certainly got some talent). So, since I love her, I've got Keira icons and a Keira mood theme and a Keira header (all of which are credited properly on my userpic page and my profile). I also plan on using this journal more often for both fanfiction and personal entries. So...that's pretty much it for now.
Current Location: home
Current Mood: relievedrelieved
|
global_05_local_5_shard_00000035_processed.jsonl/19019
|
Thread: overheads
View Single Post
Old 03-16-2004, 02:09 PM #14
Hall Of Fame
Join Date: Feb 2004
Location: Auckland, New Zealand
Posts: 4,405
Default Pointing with elbow
I point with my off-arm straight at the lobbed ball, but pointing with the elbow might work even better. I will try that too. It might be easier and more fluid to do it that way.
kevhen is offline Reply With Quote
|
global_05_local_5_shard_00000035_processed.jsonl/19020
|
Language Selection
English French German Italian Portuguese Spanish
Enter your Tux Machines username.
Enter the password that accompanies your username.
More in Tux Machines
Deepin 2014.3 at a Glance
Deepin, the Chinese Linux distribution, has previously been covered on MTE. In the two years that passed, Deepin has evolved both visually and in functionality, beyond expectations. Read more
Ubuntu Spotted in Google's Futuristic "Project Soli" Promo
Time and again, Ubuntu keeps popping up whenever there's some Google product launch. Remember Google's Project Tango or that bit of news about the use of a 'lightly custmozied Ubuntu' in Google's Driverless Car project? Given its widespread use inside Google, it's no surprise than Google is an Ubuntu Advantage Customer. Read more
Sourceforge Hijacking Projects to Deliver Malware
It's been a crazy few days in Linuxville to be sure. Sourceforge is accused of locking out GIMP developers and inserting malware into the application for users to download. Scott Dowdle spotted a "GNOME versus KDE" in MR. ROBOT and Ubuntu was seen in a Google promotional video. David Both shows users how to use Konqueror and Attila Orosz takes a look at Deepin 2014.3. And finally, is the Bling factor in Linux doomed? Read more
|
global_05_local_5_shard_00000035_processed.jsonl/19022
|
You work as a dustman or in a shoe shop for a while, you move on and everyone forgets about it. You work as an actor in a single role, and everyone refers to you as "an actor" for ever afterward.
* ''Film/GalaxyQuest'' is very largely composed of variations of, lampshades hung on, and aversions of this trope.
* ''Film/SunsetBoulevard'' is a tragic variation.
* The banjo-playing boy in ''Deliverance'' is so described in "the other wiki".
* The various nonentities and Z-listers who attempt to cross over from ''BigBrother'' and related shows.
* Ann Marie in ''Series/ThatGirl'', far too obviously.
* PlayedWith in ''Series/ArrestedDevelopment''; Tobias uses this as a reason to refuse any other work. Given that he is trained and licensed as a psychiatrist (and therefore, a medical doctor) and has had ''no'' success as an actor, this is an expensive self-indulgence.
|
global_05_local_5_shard_00000035_processed.jsonl/19023
|
Analysis: Dong Dong Never Die
Inexact title. See the list below. We don't have an article named Analysis/DongDongNeverDie, exactly. We do have:
If you meant one of those, just click and go. If you want to start a Analysis/DongDongNeverDie page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
|
global_05_local_5_shard_00000035_processed.jsonl/19024
|
Analysis: Goofy Print Underwear
Inexact title. See the list below. We don't have an article named Analysis/GoofyPrintUnderwear, exactly. We do have:
If you meant one of those, just click and go. If you want to start a Analysis/GoofyPrintUnderwear page, just click the edit button above. Be careful, though, the only things that go in the Main namespace are tropes. Don't put in redirects for shows, books, etc.. Use the right namespace for those.
|
global_05_local_5_shard_00000035_processed.jsonl/19026
|
Log In
Sign Up
For Business
Collecting data on @liddoslounge.
It may take up to 1 minute.
Oops, Screen Name @liddoslounge doesn't exist or is inactive on twitter.
This is a premium feature
Upgrade now to:
• Build your community
• Analyze your brand and competitors
• Find Influencers
Start 14-Day Free Trial
|
global_05_local_5_shard_00000035_processed.jsonl/19027
|
Third-Party Products & Services
Working Model 2D
Software for motion simulation and analysis of mechanical systems on desktop computers
• Best-selling dynamics/kinematics tool
• Combines ease-of-use with analysis power
• Design, analyze, and test designs before prototyping
• Test your MATLAB control systems
Working Model 2D_image
Working Model 2D is an award-winning motion simulation package that allows engineers, designers, and animators to build and analyze mechanical systems quickly on desktop computers. Users can import geometries from popular CAD systems or draw them in Working Model 2D. Click the Run button and watch your designs spring to life. Interface MATLAB to Working Model 2D and start simulating how your control systems behave when driving a real mechanical system. Working Model 2D communicates with MATLAB in real time, so your control system can receive measurement information from Working Model 2D and send control signals back while you watch the mechanical system move on your PC.
Graphs and digital display tools let you measure standard system variables, or use a built-in equation language to graph any calculation.
Design Simulation Technologies_logo
Design Simulation Technologies
43311 Joy Road # 237
Canton, MI 48187
Tel: 734-446-6935
Fax: 734-259-4207
Required Products
• Macintosh
• Windows
• Telephone
• Training
• E-mail
Product Type
• Modeling and Simulation Tools
• System Modeling and Simulation
• Kinematics/dynamics
• Automotive
|
global_05_local_5_shard_00000035_processed.jsonl/19028
|
User:Ryanasaurus0077/The Harsh Reality
From Uncyclopedia, the content-free encyclopedia
Jump to: navigation, search
There is currently no text in this page. Would you like to create Ryanasaurus0077/The Harsh Reality or Search for Ryanasaurus0077/The Harsh Reality in Uncyclopedia?
Personal tools
|
global_05_local_5_shard_00000035_processed.jsonl/19046
|
Governor Christopher 'Chris' J. Christie's Political Positions
Office: Governor (NJ), Republican
On The Ballot: Potential, Republican for President
Chris Christie has refused to provide voters with positions on key issues covered by the 2013 Political Courage Test, despite repeated requests. Chris Christie is still welcome to submit the test at any time.
What is the Political Courage Test?
|
global_05_local_5_shard_00000035_processed.jsonl/19067
|
Get the latest news about PS4 at and Xbox One at!
Check out the Funk of Titans Wii U trailer [VIDEO]
Nintendo Minute team shares some Splatoon fan art [VIDEO]
Splatoon pre-orders at GAME get a free hat
Amiibo rap song makes fun of the inventory situation
Yooka-Laylee Kickstarter now live, funding already reached
May 1st - Yooka-Laylee's Kickstarter has been nearly instantly funded, but the stretch goals for simultaneous release on all platforms still need to be hit.
Europe getting the Splatoon Wii U bundle on June 19
May 1st - Nintendo of Europe has announced that the Splatoon Wii U premium pack will be available on June 19.
Mario Kart 8 update 4.1 is now live
May 1st - Nintendo has released an update for Mario Kart 8, making some changes to how you access 200cc and mirror mode.
Playtonic Games unveils Yooka-Laylee, the spritual successor to Banjo-Kazooie
Apr 30th - Playtonic Games have finally revealed what they're working on. Project Ukulele is actually Yooka-Laylee!
200cc mode in Mario Kart 8 is so fast it’s breaking some tracks [VIDEO]
Apr 30th - If you've got a need for speed, you might want to watch it on those ramps in 200cc mode. You could fly outside the track!
Yacht Club games is still working on Shovel Knight DLC
Apr 30th - Yacht Club Games would love to see Shovel Knight feature in Super Smash Bros., but in the meantime they're working on new DLC!
Reminder: Today is the last day for Club Nintendo Elite rewards
Apr 30th - Today is the last day for you to choose your reward game for Gold and Platinum status at Club Nintendo, so don't forget!
Splatoon Direct coming on May 7 for both US & EU
Apr 30th - Nintendo has announced a special Direct for Splatoon on their Twitch channel, airing on May 7. Check inside for times.
Rare amiibo getting restocked in Europe this summer
Apr 29th - A German Nintendo customer service representative has confirmed that there will be an amiibo restock for Europe this summer.
Japanese sales: Bravey Second launches in Japan, Wii U still steady
Apr 29th - Here's the latest look at sales in Japan, where Bravely Second for 3DS has launched, while Wii U sales continue to remain steady ahead of Xenoblade Chronicles X release.
Nintendo of America holding Splatoon art contest
Apr 29th - Nintendo of America is holding a Splatoon art contest on Tumblr, with a Wii U and several copies of the game to give away!
Comcept reveals the Wii U box art for Mighty No. 9
Apr 29th - The team at Comcept have revealed the box art for Mighty No. 9 and it looks spectacular!
|
global_05_local_5_shard_00000035_processed.jsonl/19070
|
After installing Update Rollup 1 for Windows 2000 SP4 on a computer that is using a hyper-threading processor, or a dual-core processor, the CPU temperature increases abnormally.
To resolve this behavior:
1. Open a CMD.EXE window.
2. Using REG.EXE, installed from the Windows 2000 Support Tools, type the following command and press Enter:
REG ADD "HKLM\SYSTEM\CurrentControlSet\Control\HAL" /V 14140000FFFFFFFF /T REG_DWORD /F /D 16
NOTE: Restart Windows 2000 for this change to become effective.
|
global_05_local_5_shard_00000035_processed.jsonl/19072
|
Bag of Raptorleaf Seeds
From Wowpedia
Jump to: navigation, search
• Bag of Raptorleaf Seeds
• Binds when picked up
• Use: Throw a handful of Raptorleaf Seeds in an area, sowing them in up to 4 plots of Tilled Soil.
• 10 Charges
• Sell Price: 7g 50s
A Bag of Raptorleaf Seeds is used to sow four Raptorleaf Seeds at a time at Sunsong Ranch.
Purchased from Merchant Greenfield for 30g or traded for 30 Raptorleaf Seed with Milly Greenfield.
Patch changes
External links
|
global_05_local_5_shard_00000035_processed.jsonl/19074
|
Tattered Note
From Wowpedia
Jump to: navigation, search
Tattered Note
Tattered Note [58.0, 48.4] is a piece of parchment at the base of a cave in blocking the mouth of the Mysterious Den in the Red Stone Run, on the eastern side of the Timeless Isle.
Tattered Note
I have tried everything to remove this cave-in! Black Ox give me fortitude, I cannot move even a single rock. Perhaps if I were to borrow one of the great weapons of legend from the temple grounds...
This suggests to find one of the [Timeless Legends] on the isle, and use the provided bonus ability on the Cave-In. Should players somehow find themselves locked inside the mysterious den, there is a Rock-breaking Hammer on the inside that can be used to break the cave-in as well. Either method of breaking the cave-in will immediately summon Spelurk, a rare mistlurker.
Patches and hotfixes
External links
|
global_05_local_5_shard_00000035_processed.jsonl/19076
|
Taim Ragetotem
Revision as of 16:58, August 25, 2012 by MarkvA (Talk | contribs)
102,769pages on
this wiki
HordeNPC 32Taim Ragetotem
Taim Ragetotem
Race Tauren (Humanoid)
Level 61
Location Thunder Bluff
See Icon-3D-48x48
Taim Ragetotem is a level 61 Alterac Valley battlemaster located on Hunter Rise in the tauren city of Thunder Bluff.
See List of Thunder Bluff NPCs.
Patch changesEdit
External linksEdit
Around Wikia's network
Random Wiki
|
global_05_local_5_shard_00000035_processed.jsonl/19113
|
Accordance® for
It's Here!
For over ten years, Accordance has been available to PC users with the Basilisk II emulator. While the emulator version included most of the same features as Accordance for Mac, it was an imperfect solution. We have long desired to give Windows users the native version of Accordance they truly deserve, and now that day has finally come. We are pleased and excited to present Accordance for Windows.
Watch the
Windows Video
Watch the
Features Video
Why Choose Accordance for Windows?
Native Code
Accordance for Windows is fully native and does not require the use of an emulator. Our developers also chose not to use a compatibility layer, even though this would make it much easier to code for multiple platforms. Instead, Accordance for Windows is based entirely on native Windows code to ensure that Windows users experience the same speed and reliability that Mac users have enjoyed for almost 20 years.
Fast & Efficient
While we are on the topic of speed, Accordance for Windows is fast. Really fast. Even complex Greek and Hebrew searches deliver results that feel instantaneous. Even better, you do not need to buy a brand new computer with maxed out specs in order to experience this speed because Accordance for Windows is an efficient program that will not bog down your system.
Backwards Compatible
Accordance runs on many different versions of Windows. The full compatibility list includes Windows 8 (including the Surface Pro tablet), Windows 7, Windows Vista, and Windows XP.
Universal License
All you need is one Accordance 11 (or 10) license to run Accordance on up to five separate Windows, Mac, or iOS devices. If you already own Accordance 11 for Mac, no additional purchase is necessary to run Accordance 11 on your Windows PC. Just download the app, enter your user name and password, and begin downloading your Accordance modules.
How do I order Accordance for Windows?
Just click on the Buy Now link above and choose a Collection. You can also purchase additional Bible texts, commentaries, dictionaries, and study tools, but you will need a Collection to access the Accordance for Windows engine. Once your order has been processed, you will receive an email with download instructions.
How do I download Accordance for Windows?
You should receive an email with the download link once your order has been processed, but you can also get the file from our Installers page.
Do I need to purchase Accordance for Windows separately if I already own Accordance 11 for Mac?
No, you only need one Accordance 11 license to run Accordance on up to five personal Mac, Windows, and iOS devices.
Which Versions of Windows are Supported?
Accordance for Windows will run on Windows XP, Windows Vista, Windows 7, and Windows 8. It will not run on Windows RT or any version prior to Windows XP.
Can I try Accordance for Windows before buying?
Yes, we have a demo version of Accordance for Windows that you can download on our Free Trial page. The demo version has some limitations that are not in the full version, but it will allow you to explore the Accordance interface and it includes a small selection of Bibles and tools for you to use.
Does Accordance for Windows have all the same features as Accordance for Mac?
Almost. Accordance for Windows is extremely close to feature parity with Accordance for Mac. The Windows version even has all of the latest features that were released in the 11 update to Accordance for Mac. However, the following features are still forthcoming in the Windows version.
• WiFi sync with Accordance for iOS
• Text-to-speech
• Spell check
|
global_05_local_5_shard_00000035_processed.jsonl/19190
|
Rock Star (feat Lil Wayne) Testo
Testo Rock Star (feat Lil Wayne)
Amici, ecco i finalisti
Rock star, rock star (rock on)
Rock star (rock on) let's rock-n-roll! (rock on)
I got ladies that love my ladies, haters that hate my haters
I'm a Chamillionaire but got billionaires for my neighbors (rock on!)
[Chorus One: Chamillionaire]
I been had the paper, I been had the stacks
The crowd's screamin loud in every city on the map
Got the groupies goin crazy, they don't know how to act
I bring 'em backstage and tell 'em, "Baby just relax"
Rock on, they see the jewels is so sick like flu spit and flu cough
Take it off and you lost, the tough talk you tuned it off
Keep the four-iron there, keep on thinkin that it's for golf
Nickel plate on your head, silverware is food for thought
The Grammy winner, the haters is like "How could this happen?" (how?)
On the red carpet so much they mistake me for Aladdin
Now I'm a rapper with revenue like a rock star
If I'm there you can believe the Black Card is not far
Teen spirit ain't what they smellin, they yellin "Where that Nirvana?"
The crowd is rockin and rollin them swishas full of marijuana
They judgin me like Your Honor, your daughter's here with her momma
They me that I'm a charmer, more freakier than Madonna
Famous looked right at me and said "Know why I got my lighter up? (why?)
Cause like the throwback P. Diddy alias, I'ma (Puff)"
See how we rippin up tickets the police writin us
Do like Michael Jackson's complexion mister and lighten up, ha ha
[Chorus Two: Chamillionaire]
Ladies love it when you're livin like a rock star
I got 'em screamin loud as they keep screamin comin out bras daily, daily
Ladies love it when you're livin like a rock star
She sayin she's in love with me and she is probably your lady
Like a rock star (lady) like a rock star (lady)
Ladies love it when you're livin like a rock star (rock star baby)
Catch me gettin into trouble like it's my job (baby, baby)
When we listen 'til the cops come then I'ma - rock on!
[Chorus One]
[Lil Wayne (Chamillionaire)]
Chamilli-tary (and now Mr. Young Money himself)
Lil Weezy, baby! Hahaha
Rock-n-roll fly, {bitches} behold I
I am the {shit}, hear the commode cry
Hear the guitar scream, that double-R lean
And if it's for me, then it's for-eign
Ha, I mean my cars, I mean my clothes
I mean my {hoes}, I mean my flows
You dress different 'round me then I'ma clean your nose
Step into the line of fire, jalapeño toes
Compared to Bigfoot you just Twinkle Toes
I get your girlfriend wet like wrinkled clothes
Rock star like, money drugs freakin {hoes}
World tours, walk-throughs and TV shows
My hair's out (heyyy) no shirt (heyyy)
I stage dive (rock rock) I crowd surf (heyyy)
I'm a Hot Boy (heyyy) I'm on my hot {shit} (rock rock)
Reportin to you live from the moshpit
[Chorus Two]
I'm so cool, I'm so smooth, I'm that dude, I'm so muah
Groupies trillin me like a spy, the ground be tellin me that I'm fly
The clouds see me and they cry just to get a glimpse of I
Got Mother Nature so jealous she knockin pigeons out the sky
Can't help it I got 'em rockin they velvet
Bones and losin clothes the higher my album sales get
They love me that's right you nailed it, they treatin me like I'm Elvis
Naked pictures she mailed it, she licked on the stamp and melt it
Huh, so save your rap for the rookies cause it ain't no rappers here
A show you do in the club is a show we do in the Amphitheater
We packin stadiums, ladies come in I'll introduce ya
It's too packed to maneuver, crowd look like Lollapalooza
We outshinin the losers (heyyy) know I rock with the Ruger (heyyy)
You know I'm a producer, weapon upside your medulla (heyyy)
Got no time to seduce her, Superhead type of seducer
Groupies tryin to snake me but Koopa denyin Medusas, ha ha
[Chorus Two]
[Outro: Chamillionaire]
Rock rock (rock on) rock rock (rock on)
We gon' keep on rockin and rollin until the wheels fall off
Knowmtalkinbout? Chamillitary mayne
Young Money, we the new Red Hot Chili Peppers
We on fire, sold out arenas, tearin up tourbuses
You know how we get down, ha ha
Rock on, hold up, hold up, hold up
Tryin to get that Ozzy Osbourne paper mayne
I'ma throw a pool party, me and the Playboy bunnies
gon' be swimmin in a pool of paper like Scrooge McDuck
Heh, you invited, if you can swim
Ha ha, rock on
|
global_05_local_5_shard_00000035_processed.jsonl/19191
|
Runnin' Testo
Testo Runnin'
Amici, ecco i finalisti
(feat. Tony Yayo)
Got to live for today cause tomorrow ain't promised to me
Don't just want a piece I want my whole destiny
(If you got it)
I'm gone take it
(If you're in it)
You're coming with me
(Bench warmers)
Get no playing time
(No sleeping)
Till I cross the line
I'm runnin'
[The Game]
With 99 miles left, on the Avis rental car
blowing horns like Miles Davis at the pearly gate
God let me in
Give me a room by Aaliyah with ESPN
I know I got more sins than two lesbians
Been back and forth across the border like Mexicans
But (I'm runnin') like New York pedestrians
Trying not to scuff my Nike Air checks again
It's funny how niggaz be the best of friends
And fall out over pussy and wanna dead they man
One of my niggaz in the grave the other one in the pin
She fuckin my enemies inside my homeboys Benz
Now she beggin God's mercy cause she ain't listen to Nas
And never heard about Ike and the Iverson jersey
He got a cousin named Jason that rock the Gary Payton
Now the same trifling bitch is a HIV patient
True story
[Tony Yayo]
If I get knocked with my blunt nigga I'm runnin'
If I catch a murder one nigga I'm runnin'
Homicide come around and they keep on coming
That's why I'm out of state and I keep on runnin'
I ain't Nelly but my desert eagles on girl
Just dropped bail traveling the world
When I sign my deal I said fuck jail
I went on tour to Barcelona and Brazil
This shit real fuck an appeal
D's want my head like that bitch in Kill Bill
Sling dope sling crack and them e pills
That's why I'm on the low like a dead navy seals
I'm runnin'
Cause I gotta pack them shows
And Dre told me ain't no coming back from Go
So I gotta get my album in place
My G-Unit features
My Eminem sixteens
My Dr. Dre beats
And it was two years from today when I started rhyming
And took my demo to Suge and he ain't sign me
Niggaz threatening my life like it's hard to find me
See me shining in the hood like twenty inch Lexanis
My mom said I'm hard head
I don't follow the rules
Why should I when Reebok giving niggaz they own shoes
And I'm dealing with the same problems 50 Cent got
Yayo in jail and they think I'm trying to take his spot
I'm in the studio laughing at Chris Rock
Then I turn on MTV and see Soulja Slim shot
And niggaz trying to gun me down in the rim shop
Cause I just want the same recognition that the crypts got
They say I'm the next in line and if I get shot
Then I go out as the Bobby Fischer of hip hop
Make yo chest move
Sylvia Rome and Kevin Lyle slept cool
Jimmy Iovine was the best move
|
global_05_local_5_shard_00000035_processed.jsonl/19192
|
Let Me Take Over Testo
Testo Let Me Take Over
Amici, ecco i finalisti
Baby, you and I know
that you've down much too
long and there is no reason
in this world you should be
hangin out messin with the
one who's doing you wrong
so if you believe in me boy
I know I can set you free simply
all you got is do is.
Let me take over, baby, baby, baby
let me take over, just let me take over,
you'd be better off with me baby
let me take over,I know one thing
if there's a will, there's a way
and there's nothing left to say
baby, let me take over.
Darling, I heard you were feeling
just a little bad the other day
and when you called your doctor
on the phone, he even said
you'd be better off if you leave that girl alone
you need to clear up you mind just by
leaving her behind
and just let me take over.
Honey everybody knows
that you're the only one for me
so with no hesitation,just come right here
and I'll be biggest and the best lover, baby
don't have no fear.
Just put your hand in mine
and I'll be faithful all the time
if you let me take over.
|
global_05_local_5_shard_00000035_processed.jsonl/19193
|
Digimon Movie 8: Digimon X-Evolution | Anime-Planet
Digimon Movie 8: Digimon X-Evolution
Movie (1 ep x 77 min)
3.056 out of 5 from 1,664 votes
Rank #2,953
The Digital World is a place where all kinds of digital monsters live together in harmony. That is, until one day their world is thrown into disorder when Yggdrasil, the super computer that governs the Digital World and everything in it, can’t handle any more data. Thus, it comes up with a solution: to restart the Digital World, erasing both the world and most of the Digimon along with it! Only a few chosen Digimon are transported to the new world, along with Digimon that carry the X-Antibody. The latter are considered errors, so Yggdrasil sends his Royal Knights to hunt them down. Young Dorumon, a X-Anibody Digimon on the run, is a small glint of hope for the Digital World. Will he, along with new friends and allies, be able to survive and save their new home?
my anime:
If you like Digimon Movie 8: Digimon X-Evolution, you might like...
Digimon Movie 8: Digimon X-Evolution has no manga recommendations yet. Be the first and add some today!
See all reviews
Fluffypaw's avatar by Fluffypaw on May 6, 2015
Score: 10/10
Digimon X-Evlution was something new for me when I saw it back in 200-something. I was a big fan of Dorumon which was a playable character in the Digimon videogame so I found out about this movie.
All in all I enjoyed it a lot. The story is based around this new Digimon call Dorumon which was a project. Dorumon was alone most of the time and as I remember he didnt had any friend. (Except for one but... read more
Related anime
Digimon Season 1: Digital Monsters TV 1999 TBD
Digimon Movie 1: Digimon Adventure Movie 1999 TBD
Digimon Season 2: Digital Monsters TV 2000 TBD
Digimon Movie 2: Bokura no War Game Movie 2000 TBD
Digimon Movie 3: The Golden Digimentals Movie 2000 TBD
Digimon Adventure 3D: Digimon Grand Prix! Movie 2000 TBD
Digimon Season 3: Tamers TV 2001 TBD
Digimon Movie 4: Diaboromon Strikes Back Movie 2001 TBD
Digimon Movie 5: The Adventurers' Battle Movie 2001 TBD
Digimon Movie 6: Runaway Locomon Movie 2002 TBD
Digimon Season 4: Frontier TV 2002 TBD
Digimon Movie 7: Revival of Ancient Digimon Movie 2002 TBD
Digimon Season 5: Savers TV 2006 TBD
Digimon Movie 9: Digimon Savers - Ultimate Power! Burst Mode Invoke!! Movie 2006 TBD
Digimon Savers: Tokuten Eizou DVD Special 2007 TBD
Digimon Xros Wars TV 2010 TBD
Digimon Xros Wars: Aku no Death General to Shichinin no Oukoku TV 2011 TBD
Digimon Xros Wars: Toki o Kakeru Shounen Hunter-tachi TV 2011 TBD
Digimon Adventure Tri. Movie 1: Saikai Movie 2015 TBD
Related manga
Digimon D-Cyber TBD
Digimon Chronicle TBD
Digimon TBD
Digimon Frontier TBD
Digimon Tamers TBD
Digimon Adventure (Light Novel) TBD
Digimon Adventure V-Tamer 01 1999 TBD
Digimon Next 2006 TBD
Digimon Xros Wars 2010 TBD
Love it? Hate it?
Discuss in the forums
Custom lists
View all
Favourite Anime by Icingdeth Apr 6, 2015
Digimon in Chronological Order by KyroAuditore Feb 20, 2015
Willian super animes by willian23 Nov 14, 2014
|
global_05_local_5_shard_00000035_processed.jsonl/19195
|
Hello ppl,
I couldn't think of any other forum where this question might have been suitable. Sorry.
I set up an 8-machine cluster running RHL8.0 for some parallel processing work. Though each machine has an identical build both in terms of hardware and OS, I can't seem to run remote commands with rsh between machine#1 and machine#3. On all other machines rsh is running fine. For example,
mach01$> rsh mach02 ls <--- this works
mach01$> rsh mach03 ls <--- doesn't work, gives access denied
mach01 is already listed in mach03's /etc/hosts.equiv file. This is evident coz, I can remote login from mach01 to 03
mach01$> rsh mach03 <--- this works, logs me into mach03
So, overall, rsh is working but it won't let me execute remote commands. What am I doing wrong? I even added the machine names in .rhosts in the user home directory, but still to no avail.
Any help in this matter would be really appreciated. Thanx a ton.
|
global_05_local_5_shard_00000035_processed.jsonl/19208
|
Welcome to AquariaCentral.com
-General Freshwater
-Marine and Brackish area
-Terrarium and Vivariums
-DIY, Classifieds, Members Tanks Photographs and more.
Welcome to the Internet's friendliest aquatic forum!
- Team AC
Sign Up
1. Hello Guest, Welcome back to AquariaCentral don't forget to setup your avatar! --> http://www.aquariacentral.com/forums/index.php?account/avatar
Atlantic Silversides
Discussion in 'Brackish' started by Cpt. Nemo, Nov 20, 2011.
1. Cpt. Nemo
Cpt. Nemo Registered Member
Feb 2, 2010
Likes Received:
Trophy Points:
Last Seen:
Nov 17, 2013
Has anyone ever had any luck with keeping atlantic silversides in an aquarium? We caught some while netting and they looked like they'd be cool to try and keep. I hear they can be a bit sensative to water conditions.
Share This Page
|
global_05_local_5_shard_00000035_processed.jsonl/19215
|
Skip to Content
Overview of content related to 'learning platforms'
Syndicate content
This page provides an overview of 1 article related to 'learning platforms'. Note that filters may be applied to display a sub-set of articles in this category (see FAQs on filtering for usage tips). Select this link to remove all filters.
'Inspecting article' image: copyright, used under license from
Key statistics
Metadata related to 'learning platforms' (as derived from all content tagged with this term):
• Number of articles referring to 'learning platforms': 1 (0.1% of published articles)
• Total references to 'learning platforms' across all Ariadne articles: 1
• Average number of references to 'learning platforms' per Ariadne article: 1.00
• Earliest Ariadne article referring to 'learning platforms': 2009-04
• Trending factor of 'learning platforms': 0 (see FAQs on monitoring of trends)
See our 'learning platforms' overview for more data and comparisons with other tags. For visualisations of metadata related to timelines, bands of recency, top authors, and and overall distribution of authors using this term, see our 'learning platforms' usage charts. Usage chart icon
Top authors
Ariadne contributors most frequently referring to 'learning platforms':
1. astrid recker (see articles on this topic by this author)
Title Article summary Date
April 2009, issue59, event report
Syndicate content
by Dr. Radut
|
global_05_local_5_shard_00000035_processed.jsonl/19216
|
Skip to Content
Articles tagged 'john paschoud'
Syndicate content
This page provides an overview of 7 articles tagged 'john paschoud', listing most recently updated content first. Note that filters may be applied to display a sub-set of articles in this category (see FAQs on filtering for usage tips). Select this link to remove all filters.
'Inspecting article' image: copyright, used under license from
John Paschoud has contributed 7 articles to Ariadne. For contact and affiliation details (as of latest published article), see John Paschoud author profile.
Most frequently used terms in this author's articles (ordered by total usage / articles): "database", "jisc", "metadata", "digital library", "url", "software", "shibboleth", "infrastructure", "data", "london school of economics". For more statistics, see data charts for John chart icon
Title Summary Datesort icon
The Filling in the PIE: HeadLine's Resource Data Model
March 2001, issue27, feature article
Internet 2 Spring Member Meeting
July 2002, issue32, event report
Review: E-learning and Teaching in Library and Information Services
Book review by John Paschoud
January 2003, issue34, review
The Biggest Digital Library Conference in the World
April 2004, issue39, event report
Book Review: Information Architecture - Designing Information Environments for Purpose
July 2004, issue40, review
Don't You Know Who I Am?
April 2010, issue63, feature article
Book Review: Being an Information Innovator
March 2012, issue68, review
Syndicate content
by Dr. Radut
|
global_05_local_5_shard_00000035_processed.jsonl/19217
|
Skip to Content
Articles tagged 'david robey'
Syndicate content
This page provides an overview of 1 article tagged 'david robey'. Note that filters may be applied to display a sub-set of articles in this category (see FAQs on filtering for usage tips). Select this link to remove all filters.
'Inspecting article' image: copyright, used under license from
David Robey has contributed 1 article to Ariadne. For contact and affiliation details (as of latest published article), see David Robey author profile.
Titlesort icon Summary Date
January 2008, issue54, feature article
Syndicate content
by Dr. Radut
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.