id
stringlengths 50
55
| text
stringlengths 54
694k
|
---|---|
global_01_local_0_shard_00000017_processed.jsonl/11767 | As shown in this recent Meta question, the tool to relocate or delete messages in chat is not easily found. It is hiding behind the "message admin" menu entry, which I personally find rather confusing.
As already suggested in the linked meta post, it should be renamed to something that gives a clear indication of what the tool actually does:
• "Delete/relocate messages" for moderators
• "Relocate messages" for room owners
share|improve this question
add comment
1 Answer
up vote 6 down vote accepted
That's a fair point, the wording was indeed ambiguous. Changed.
share|improve this answer
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/11768 | Should there be some sort of standardised list of features for new Stack Exchanges? What I'm thinking about is that different Stack Exchanges can make more or less use of 'custom' features.
For example, on of the most useful features for would be the ability to cross post between sites such as and because there will be a lot of 'borderline' questions that may be more suited to another site. What might be less useful for would be hosted posting of photographs.
However, for, cross posting right now is not particularly useful because there are few grey areas between the other sites and cooking. However hosting of photos, and adding a recipe 'module' to the cooking site would be very useful.
Should there be some sort of system for voting on standardised features so that the community can see what features would be most useful to add to each stack exchange site . Eventually I can inagine that there may be too many additional 'modules' for sites that switching all of them on at once may create too much clutter and user confusion.
share|improve this question
add comment
1 Answer
In general these should be discussed on the per-site metas.
Whether the engine gets the feature or not will be determined by the "strength" of the SE 2.0 site in the network, as well as how many other SE 2.0 sites could benefit from that feature.
Also, see Robert's answer here:
Of course, if the idea involves the core engine or the Network, the idea should be raised in Pretty cool, huh?
share|improve this answer
add comment
You must log in to answer this question.
Not the answer you're looking for? Browse other questions tagged . |
global_01_local_0_shard_00000017_processed.jsonl/11783 | Export (0) Print
Expand All
This topic has not yet been rated - Rate this topic
HTMLFrameSiteEvents::onreadystatechange Event
Fires when the state of the object has changed.
void onreadystatechange(VOID);
Return Value
No return value.
Event Information
Bubbles No
Cancels No
To invoke Change the ready state.
Default action Signals the ready state of the document.
You can use the readyState property to query the current state of the element when the HTMLFrameSiteEvents::onreadystatechange event fires.
All elements expose an HTMLFrameSiteEvents::onreadystatechange event. The following objects always fire the event because they load data: applet, document, frame, frameSet, iframe, img, link, object, script, and xml elements. Other objects will only fire the HTMLFrameSiteEvents::onreadystatechange event when a DHTML Behavior is attached.
When working with behaviors, wait for the HTMLFrameSiteEvents::onreadystatechange event to fire and verify that the readyState property of the element is set to complete to ensure that the behavior is completely downloaded and applied to the element. Until the HTMLFrameSiteEvents::onreadystatechange event fires, if you use any of the behavior-defined members before attaching the behavior to the element, a scripting error can result, indicating that the object does not support that particular property or method.
See Also
Did you find this helpful?
(1500 characters remaining)
Thank you for your feedback
Community Additions
© 2014 Microsoft. All rights reserved. |
global_01_local_0_shard_00000017_processed.jsonl/11791 | Sauvignon - TemeraireWiki
From TemeraireWiki
Revision as of 00:47, 28 August 2010; Wombat1138 (Talk | contribs)
Jump to: navigation, search
Character Profile
Name: Sauvignon
Date of Birth:
Breed: Plein-Vite
National Loyalty: France
Appearance: Small
Special Abilities:
Status: Active
Sauvignon was dispatched to spy on the Dover covert and met two of the sick dragons. To protect the secret of the Dragon Plague, William Laurence asked Temeraire to use the Divine wind on her. Temeraire spared her life by roaring above her head instead of directly targeting her, but she tumbled into the sand pit where the Longwings were quarantined.
She and Temeraire were forced into quarantine together. She began to show symptoms of the disease four days later, while Temeraire remained healthy. Later, Admiral Nelson, Lord Mulgrave and Admiral Gambier hoped to deliberately infect all the dragons of the Armee de l’Air by allowing the ailing Sauvignon to return to France.
The British Aerial Corps thought it terrible to knowingly spread the plague to Europe, and worried that Napoleon Bonaparte would then attempt to cross the Channel and invade England before the French dragons were significantly compromised.
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/11792 | Changes: Wind Release: Cast Net
View form
Back to page
Line 11: Line 11:
|jutsu range=Mid
|jutsu range=Mid
|teams=Fourth Division
|teams=Fourth Division, Wind Release Team
|debut manga=552
|debut manga=552
|debut anime=301
|debut anime=301
Revision as of 11:15, April 13, 2013
Wind Release: Cast Net
Kanji 風遁・掛け網
Rōmaji Fūton: Kakeami
Literal English Wind Release: Cast Net
Viz manga Wind Style: Casting Net
Manga Chapter #552
Anime Naruto Shippūden Episode #301
Appears in Anime and Manga
Classification Ninjutsu, Collaboration Technique
Class Offensive
Range Mid-range
Derived jutsu
Using her Giant Folding Fan, Temari along with two others create multiple narrow currents of wind that form a large net of sorts. The winds generated from this technique are extremely sharp and powerful enough to inflict shallow wounds into the Third Raikage, whose body was renowned for its tremendous durability, however it should be noted that the Third Raikage was not clad in his Lightning Release Armour, as seen when he survived a direct impact of a point blank Wind Release: Rasenshuriken while Naruto was in his Nine-Tails Chakra Mode with negligible damage.
Around Wikia's network
Random Wiki |
global_01_local_0_shard_00000017_processed.jsonl/11795 | [an error occurred while processing this directive]
BBC News
watch One-Minute World News
Last Updated: Monday, 9 June, 2003, 19:32 GMT 20:32 UK
In search of profitable connections
By Briony Hale
BBC News Online business reporter, Accra, Ghana
In the latest in a series on Africa's web ambitions, BBC News Online's Briony Hale asks whether the internet is delivering on the promise of increased prosperity
Astonishingly, Ghana's capital city of Accra boasts about 500 internet cafes, roughly six times as many as London.
"They're dating, they're being entertained, they're sourcing educational materials," says Mark Davies, founder of Ghana's biggest cyber cafe, when asked how surfers are making use of his 100-terminal facility.
Web surfers in Accra
E-mail is in high demand
Later, he adds that many are desperately trying to find a way of getting themselves out of Ghana, whilst others are engaged in the notorious, fraudulent activities more usually associated with Nigeria.
And the vast majority of Ghanaians are logging on for the sole purpose of e-mail, using the internet as a much-needed alternative to the expensive and frequently dysfunctional phone system.
Such anecdotal evidence throws serious doubt on the promise that being connected to the world wide web can help alleviate poverty.
False hope?
"There are lots of assumptions that being connected to the internet will in some way create a more equitable life," says Dr Robin Mansell, new media fellow at the London School of Economics.
"But there is little proof that the people who have internet access are striding ahead of their non-connected peers."
Information and communication technologies....are a powerful tool for economic growth and poverty eradication
Kofi Annan, UN Secretary General
Many experts are starting to agree that the digital divide - when defined as mere access to the internet - has been vastly overstated.
While the home and office connections enjoyed by Westerners is unparalleled, a reasonable proportion of African city-dwellers have some sort of access to the web.
The explosion in the number of internet cafes - admittedly sometimes home to just two or three terminals - in Accra is testimony to that.
But the goal of improved prosperity, greater business opportunities and increased participation in the global economy - promised by UN secretary general Kofi Annan amongst others - is still a rarity.
'Beautiful internet'
Linda Yaa Ampah, a clothes designer and entrepreneur who last year exported $40,000 worth of stock to Africans living in the US, is an exception to the norm.
Linda Cadling, fashion designer
Linda thanks hotmail for her business expansions
She was advised to get an e-mail address after handing out international mobile phone numbers to American customers at a fashion show in Accra.
"I went to an internet cafe and I couldn't believe it when I realised I could get an address for free," she says, adding that she had little knowledge of computers and presumed e-mail accounts were very expensive.
A few years later, Linda employs an army of 50 tailors to meet her orders and attributes her success to her humble hotmail account.
Americans are wary of long distance telephone calls, she says, but perfectly happy to e-mail their orders. 70% of business is now generated through e-mail from the US.
"The internet is beautiful, easy and clear," she says, "I wouldn't have got nearly so far without it."
In addition to such financial success stories, there are also many intangible benefits of the internet for developing countries.
Internet cafe, Accra
Internet cafes have sprung up on many a street corner
There is the empowerment that comes from being able to research any subject and the increased knowledge of the wider world, helping poor people become what development agencies call "information rich".
But this improved knowledge has also contributed to the exodus of many of Africa's most skilled workers in search of better opportunities abroad, the so-called brain drain that is frequently mentioned in debates about Africa's economic problems.
And the internet has also cemented Africa's image of corruption, the image it is trying so hard to ditch.
Broken promises
At Ghana's biggest internet cafe, BusyInternet, there are signs by every terminal prohibiting the wide array of illegal cash-seeking activities that first emanated from Nigeria.
Surfers, Accra
Some surfers are seeking a way to leave Ghana
But the cafe's owner admits that, in the early hours of the morning, the fraudsters are almost certainly to be found amongst his customers.
Dr Richard Heeks, a lecturer on Information Systems and Development at the University of Manchester, is amongst those who believe that the problem of the digital divide is over-estimated.
But he is equally adamant that, where the internet has arrived, it is being used for social rather than productive reasons, and doing absolutely nothing to alleviate poverty.
For Ghana's 500-strong internet cafe owners, there is at least a new business opportunity to exploit.
But for the vast majority of people, the internet is failing to deliver on its promise of prosperity.
Can the internet be of economic benefit to poor countries? Do we have unrealistic expectations about the power of the internet?
Send us your comments.
Your E-mail address
I believe the internet is over-hyped as the champion of poverty-relief. As an ehnancement of first world society it's great, particularly for research. But if your country has poor intrastructure and basic living standards, it's a fairly muted substitute.
Rory, Ireland
It is the intangible benefits of the internet that can in the long time improve the lives of third world internet browsers. The internet is here to stay and it can only inject the philosophy of openness, transparancy and information sharing. People will start asking for e-government and other e-services (computers don't take bribes).
Mustapha Hamoui, Ghana
Internet access alone cannot achieve social and economic prosperity. The people must be engaged in some form of economic activity in the first place and then take advantage of the internet to network their business, for instance.
Evans Chisanga, UK
The internet's greatest advantage is the inexpensive availability of information. Poverty reduction will be better served by writing off third world debt and scrapping first world agricultural subsidies to level the playing field.
Ikabot, South Africa
The BBC is not responsible for the content of external internet sites
Americas Africa Europe Middle East South Asia Asia Pacific |
global_01_local_0_shard_00000017_processed.jsonl/11808 | What is the world's defining software company for the 21st Century?
Red Hat wants to lead the world, but it doesn't. Google and Apple do. What do these companies have that Red Hat lacks?
Which company did you think of when you read that title? My guess is that you didn't think of Microsoft, Oracle, SAP, or...Red Hat, though Red Hat claims this mission as its own. Why? Red Hat has taken as its mission the mantle of leadership into software's future, but it is not the company we most associate with the future. Who gets that honor?
Apple and/or Google.
I spent some time this morning discussing this with a friend who who runs IT for part of Google's European operations out of its London office. He has a hugely interesting background, having spent a few years at Red Hat before joining Google in 2007. He left Red Hat on great terms and continues to be an admirer of his former employer.
Yet it is his former employer. Why? And why have Greg Stein, Guido Von Rossum, and other prominent open-source developers and advocates joined up with Google?
It's not about the money. Most have made plenty of money elsewhere.
Instead, I believe it has everything to do with the customer which, not coincidentally, is almost certainly the reason that Google (and Apple) get credit for defining the 21st-century software experience, rather than Red Hat (or any other enterprise software company).
Let me explain.
Something has changed in how software is developed and consumed, including by large enterprises. As the Internet and personal computers have democratized the computing experience, computers have become a home phenomenon as much as a work phenomenon. Indeed, for those like me with a laptop and home office, it's virtually impossible to distinguish between "home" and "work." There is no spatial distinction - it's just a matter of what I happen to be doing on my laptop at a given moment.
Along the way, "consumer IT" has increasingly displaced "enterprise IT," in large part because it is better designed and hence is much easier to use. Enterprise IT likes bland Dell boxes running Windows, but I prefer beautiful Apple machines running Mac OS X. Enterprise IT may insist I use SAP for invoices, but I prefer PayPal. Enterprise IT insists on Microsoft Office, but I increasingly prefer email and Google Docs because they let me collaborate in a more natural, web-centric way. Enterprise IT insists on using Exchange, but I prefer to POP my .Mac account and use Zimbra because of its sophisticated blending of third-party services with email (i.e., mashups).
And so on.
Enterprise IT is still there, and still cuts big checks to big vendors, but it is losing relevance as "prosumers" use what works rather than what is foisted upon them. No doubt this creates short-term manageability problems for IT, but the long-term gains of making software easier to use will benefit enterprise IT administrators. Tried managing Google Apps lately? At $50 per user, it's almost criminal how little it must be administered. How do these Google guys make any money on that?
And yet they do. They do because they have shifted all the ugly middleware and infrastructure "heavy-lifting" onto their own shoulders, focusing the end user instead on the software experience and charging around the periphery of that experience.
This, I believe, is the big shift that enterprise IT vendors need to learn.
Enterprise software vendors that neglect the user experience - that continue to ignore or overlook the revolution in how people interact with software - will lose. No, they won't evaporate tomorrow (Seen Microsoft's balance sheet recently?), but the future will relentlessly erode their comfortable present.
Where does Red Hat fit into this? Well, it makes exceptional software for enterprises, and has shown more ambition of late, going after the middleware market. This is good, and surely there will be a need for its services for many years to come, just as there will be demand for Oracle, SAP, etc.
But Red Hat is changing the way enterprises think about the software relationship between vendor and customer. It's very possible that Red Hat is defining a transition point but not the end point for enterprises. And unfortunately Red Hat is not doing much to redefine the end user's experience with software because its software (Operating systems and middleware) don't really visually affect the end user. They are brilliant, must-have pieces of the puzzle, but they don't change business users' or consumers' mindsets about software.
Instead, Apple is doing this with the iPod and iPhone (and, to a lesser extent, Mac OS X), while Google is doing this with Search, Apps, Earth, etc. etc.
Is this a bad thing? Does it really matter if Red Hat defines the software experience in the 21st Century?
Yes and no. No, in the sense that it's clear to me that Red Hat can create a multi-billion dollar business doing what it's doing. But yes in the sense that Red Hat (and all of us who sell software like Red Hat, whether open source or proprietary) will always cede the most poignant customer relationship to the Googles of the world who sit in front of normal people, day in and day out. Red Hat may power the Googles of the world, but Google powers the imagination and productivity of people.
Perhaps it's a false dilemma. Perhaps there must always be suppliers to consumer-facing companies, suppliers with no aspirations to serve that role and no demand that they do such. And perhaps it really doesn't matter.
But sitting there today with my friend, eating some of the best fruit I've had in years (Google really takes care of its employees), I couldn't help but notice the mountains of cash that await those that deliver and control the consumer experience. Microsoft has the dominant position it has today because of the cozy relationship it has with business users and consumers who trust its interface to the web and desktop. Google will own that experience in the 21st Century.
As such, Google may have more say over Red Hat's, SAP's, Oracle's, etc. futures than they do.
Am I missing something?
How to
Save $20 on your Amazon Prime membership
Play Video
Member Comments |
global_01_local_0_shard_00000017_processed.jsonl/11856 | Evaluating the fairness of electoral reforms is a critical requirement for electoral accountability in any democracy. There is, however, no research measuring the expected seat benefit for incumbent reformers in newly democratized countries. Much of this delay is due to the technical difficulties of generalizing previous seat-vote models to multiparty races, a problem that has limited both subnational and cross-national comparisons of electoral regime change. Using a multilevel Bayesian model we solve this analytical problem and produce comparable estimates of partisan bias and majoritarian bias across the Argentine provinces. Our model estimates the effect of reforms across many electoral regimes and can be applied to comparative analyses of electoral reforms within and across countries. In the particular case of Argentina, we show large seat premiums for incumbent parties initiating electoral reforms. |
global_01_local_0_shard_00000017_processed.jsonl/11860 | BISC220/S14: Mod 1 Lab 3
From OpenWetWare
(Difference between revisions)
Jump to: navigation, search
(Modified Bradford Dye Assay (Bio-Rad™ Assay) for Total Protein)
Current revision (11:33, 22 October 2013) (view source)
Line 277: Line 277:
[[Image:Series 1 gel loading.jpg]]<br>
{| border="1"
! Lane # !! Sample Name
! 1
| <center>Molecular Weight Standards</center>
! 2
| <center>Commercial β-galactosidase</center>
! 3
| <center>SKIP</center>
! 4
| <center>-IPTG cell extract</center>
! 5
| <center>+IPTG cell extract</center>
! 6
| <center>Crude Extract (CE)</center>
| <center>Purified Fraction (PF)</center>
Current revision
Wellesley College BISC 220 Cellular Physiology
Home Lab Calendars/Point Distribution Assignments Resources
Enzymes Secretory Pathway Apoptosis OWW Basics
Purifying and Handling Proteins
The first step in the purification of a specific intracellular protein is extraction from the cells. Bacterial cells can be broken and their enzymes extracted or solubilized by a variety of techniques that may involve mechanical methods (grinding, etc.) or chemical lysis of the cells. The objective is to release the desired enzyme from the cells as gently as possible to retain activity of the enzyme.
Isolation and Purification: There are several methodologies that can be employed for the purification of enzymes, many of which are discussed in your text. These include:
1. differential solubility
2. ion exchange chromatography
3. affinity chromatography
4. molecular sieve techniques
5. density gradients
6. electrophoresis
7. electrofocusing
Most of these methods rely on differences in either the net charge or molecular weights of the proteins. Generally cruder, less time consuming methods are used in the initial processing of cellular extracts. This is necessary not only because of the large quantities of protein to be processed but also because of the complexity of the protein mixture.
1. pH: Enzymes have multiple charges on their surfaces, which must be preserved to maintain the native 3-D structure and hence enzymatic activity. Buffers are used to maintain the enzyme solutions at a desired pH. The buffer must be in the appropriate concentration, have the correct pKa, and must not adversely affect the protein. See your general chemistry text for a review of buffers and other inorganic chemistry terms.
3. Protection Against Sulfhydryl Oxidation: Enzymes may contain many sulfhydryl groups (SH). One or more may be required for the activity of an enzyme. If these sulfhydryl groups become oxidized, they form intra- or intermolecular disulfide bonds. If necessary, the most effective method of retarding such oxidation is the addition of a reducing agent to the buffer. Dithiothreitol (DTT) and β-mercaptoethanol (βME) are among the most common and effective reducing agents. β-galactosidase seems to be most stable in a reducing environment, so often β-mercaptoethanol is included in the solutions used to extract and assay the enzyme.
4. Protection Against Heavy Metals: In addition to oxidation, sulfhydryl groups may react with heavy metal ions such as lead, iron or copper. Principal sources of metal ions are the reagents used to make up buffers, substrates, and water itself. Deionized or distilled water is used to make up reagents and a chelating agent such as EDTA (ethylenediaminetetraacetic acid) can also be added.
Basic Rules for Handling Enzymes
The following information is taken from a popular primer now published by Roche Pharmaceuticals, but first published in the December 1985 issue of BMBiochemica. by Boehringer Mannheim Biochemicals.
3. Enzymes should be handled in the cold (0-4°C) at all times. Dilute for use with ice-cold buffer or distilled water. While using an enzyme solution or suspension at the bench, keep it in on ice.
5. Enzymes, especially those that have been diluted, should be periodically checked for activity to ensure that any loss in activity is taken into account when designing an experimental protocol. Expiration dates on vials only refer to enzymes stored in the original form at the correct temperature.
8. Vials containing lyophilized enzymes (as well as cofactors such as NADH and NADPH) should be warmed to room temperature before opening. This prevents condensation of moisture onto the powder, which can cause loss of activity or degradation. If the reagent is hygroscopic, mishandling may ruin the entire vial.
9. Avoid repeated freeze-thawing of dilute enzymes and lyophilizates in solution. Store in small aliquots. Thaw one portion at a time and store that portion once thawed at 4°C. The stability of individual enzymes may vary greatly and often should be determined empirically under your exact conditions.
10. Detergents and preservatives should be used with caution, since they may affect enzyme activity. Sodium azide, for example, inhibits many enzymes which contain heme groups (e.g. peroxidase). Detergents added at concentrations above their critical concentration form micelles which may entrap and/or denature the enzyme.
11. Enzymes should be handled carefully. To avoid contamination of any kind, use a fresh pipette tip for each aliquot that is removed from the parent vial. Never return unused material to the parent vial. Wear gloves to prevent contaminating the enzyme with proteases, DNAses, RNAses, and inhibitors often found on fingertips. Never pipette by mouth.
12. Adjust the pH of the enzyme buffer at the temperature at which it will be used. Many common buffers (Tris, glycylglycine, Bes, Aces, Tes, Bicine, Hepes) change rapidly as the temperature changes. For instance, Tris buffer decreases 0.3 units of pH for EVERY 10°C rise in temperature. A solution of Tris, adjusted to pH7.5 at +25°C will have a pH of 8.1 at 4°C or 7.2 at 37°C. The change in pH per 10°C temperature change for other buffers is: Aces, -0.20; Bes, -0.16 ; Bicine,-0.18; glyclyglycine, -0.28; Hepes,-0.14; Tes, -0.20 [Good, N.E., Winget, G.D., Winter, W., Connolly, T.N., Izawa, S., and Singh, R.M. (1966). Hydrogen ion buffers for biological research. Biochemistry 5, 467-77.]
13. The absorbance at 280nm is widely used to quickly determine the protein concentration of an enzyme solution. However, this absorbance is due to the presence of tyrosine and tryptophan in the protein. If an enzyme (e.g. superoxide dismutase) contains low amounts of these two amino acids it will not absorb significantly at 280nm.
Resources: Detailed information is available on many enzymes. The following are excellent resources.
Affinity Chromatography
The use of metal chelate affinity chromatography for protein purification was first reported by Porath and colleagues in 1975. This landmark report applied the knowledge that histidine and cysteine form rather stable complexes with some cations such as zinc and copper ions. We now know that the amino acid tryptophan shares this characteristic with histidine and cysteine and that some proteins have specific binding sites for these metals. Porath et al. (1975) devised a method to tightly bind metal ions to a solid matrix such as agarose beads. The matrix resides in a column through which protein solutions are passed. Some proteins in these solutions bind to the matrix but can be specifically eluted by a low pH wash solution. Later work (Porath and Olin, 1983; Kagedal, 1998) showed that it is possible to release proteins from such columns using a strong soluble chelator such as EDTA or by chemically competing with the binding. For example, histidine binding can be disrupted by including imidazole in the protein elution buffer. The chemical structure of imidazole is similar to the ring structure of histidine, therefore it competes for the binding site on the cation matrix.
In today’s lab, we are using agarose beads chelated with nickel to fractionate the 6xHis-tagged β-galactosidase. Nickel effectively binds histidine, and the combination of 6 histidine residues in a row at the amino terminus of β-galactosidase should lead to rather tight binding. After washing the nickel chelated agarose to remove any unbound or loosely bound protein, we will use a buffer containing 200 mM imidazole to release the 6xHis-tagged enzyme from the nickel-chelated agarose beads.
Affinity Column Purification Protocol
In this laboratory session you will purify β-galactosidase from the cell pellet of the genetically modified E. coli you induced last week to overexpress this enzyme.
Microsoft Word File: Purification of 6xHis-tagged β-gal
1. Defrost the frozen pellet of E.coli BL21(pET-14b) cells prepared in the previous lab session and add 10.0 mL of B-Per Protein Extraction Reagent™, a mild anionic detergent (the exact ingredients of which are proprietary), to the centrifuge bottle. Add 20μL of DNAase (to achieve a concentration of 1 unit/mL from the 5000units/ml stock) to the B-Per and cells. Resuspend the cells by vortex mixing and pipetting up and down until the pellet is off the side of the bottle and all clumps are gone. Try to avoid bubbles. This should take about 5 minutes total, of alternately mixing and letting the mixture sit in your ice bucket. Your goal is to dissolve the cell walls and membranes which will lyse the cells and allow degradation of the DNA. Ask your instructor to check your suspension before proceeding to step 2. If you have obvious clumps, the cells are less likely to be lysed sufficiently.
3. Carefully pour the entire suspension into a Corex tube fitted with a rubber adapter and centrifuge for 15 minutes at 10,500 rpm in the Sorval refrigerated centrifuge at 4°C using an SS-34 rotor. You will need to make a balance tube with water. Be sure and record in your lab notebook the speed as g force (use the chart near the centrifuges to make the conversion).
4. Pour the supernatant only into a 15 mL graduated conical tube. This solution of dissolved proteins in B-Per reagent is your cell-free or Crude Extract (CE). The pellet is bacterial cell debris that can be dumped into your waste container. The Corex tubes are NOT disposable. Please rinse them out and leave them on your bench or return them to your instructor.
5. Determine and record the total volume of the crude extract (CE) using the volume markings on the tube. Pipet 600 µL of CE into a microcentrifuge tube labeled with your team color, lab day, initials and "CE" or “Crude Extract.” Store the aliquot on ice. At the end of lab today, you will give what remains of this aliquot to your instructor to freeze for use next time.
6. Add 1000µL (1mL) of the Nickel-Chelated Agarose to the volume of CE remaining in the 15mL conical tube. It is essential that the agarose suspension be properly mixed before removing an aliquot, so mix it well by swirling or gentle vortexing just before removing it from the stock.
8. Using a Pasteur pipette, carefully remove and discard the supernatant solution into the provided waste container. Do not try to pour off the supernatant! The 6xHis-tagged proteins should now be bound to the nickel-chelated agarose beads at the bottom of the tube.
9. Add 3.0 mL of Wash Buffer #1® to the agarose beads in the conical tube, and resuspend using a pipette. Do not vortex. Gently shake the suspension at room temperature for 5 minutes on the platform shaker. Centrifuge for 3 minutes in a clinical, benchtop centrifuge. Carefully remove supernatant and discard.
12. Place the spin column in a new collection tube and add 500µL of Elution Buffer containing imidazole. Mix the agarose and the buffer in the spin column using the NOT DISPOSABLE plastic mixer provided by your instructor. Incubate the spin column at room temperature for 5 minutes. During this time, most of the 6x His-tagged protein will be eluted from the nickel-chelated agarose into the buffer. After the 5 minute incubation period, recover the protein by centrifuging for 2 minutes at top speed in a microcentrifuge. Your purified fraction will be the flow-through in the collection tube. If you have considerably less than 500µL, respin the column to collect more volume.
13. Take the spin column out of the collection tube and discard the spin column. Do not discard the material in the collection tube. Using a Pasteur pipette, transfer all of the contents containing the purified β-galactosidase to a new microfuge tube with volume markings. Record the volume in your notebook! Label the tube to indicate that this is the purified β-galactosidase fraction (e.g., "PF β-gal"), and save it in your ice bucket.
You are now ready to assay both the Crude Extract and Purified Fraction for total protein, using a modified Bradford Dye Assay (Bio-Rad assay). You will later assay both CE and PE for β-galactosidase activity (enzyme function) using a different assay.
We will now determine the total protein concentration in our CE and PF fractions in order to load each lane of our gel with equal amounts of protein. Loading lanes equally is the ONLY way we can make comparisons between lanes.
Microsoft Word File: Media:Modified Bradford Dye Assay Protocol.doc
Testing the quality of the purification:
Dilution Preparation for the Standard Curve
Tube # BSA Concentration Z Buffer in μL Stock BSA
0.1 mg/ml
0.2 mg/ml
0.4 mg/ml
0.6 mg/ml
0.8 mg/ml
1.0 mg/ml
Dilution Preparation of Unknowns:
Amount of Z-buffer required = ?
Amount of CE or PF required = ?
Total Protein Assay Protocol:
Tube # BSA Standard Diluted in Z-Buffer CE (1:5 dilution in Z-Buffer) PF (1:5 dilution in Z-Buffer) Z-Buffer Protein Assay Reagent™
1 0.1 mg/ml (100 ul) - - - 5 ml
2 0.2 mg/ml (100 ul) - - - 5 ml
3 0.4 mg/ml - - - 5 ml
4 0.6 mg/ml - - - 5 ml
5 0.8 mg/ml - - - 5 ml
6 1.0 mg/ml - - - 5 ml
7 - 100 ul - - 5 ml
8 - 100 ul - - 5 ml
9 - - 100 ul - 5 ml
10 - - 100 ul - 5 ml
11 - - - 100 ul 5 ml
Polyacrylamide Gel Electrophoresis
3. 2% SDS Sodium dodecyl sulfate,
5. in the solvent 0.0625 M Tris buffer pH 6.7
Microsoft Word File: Media:Gel Electrophoresis Protocol GelCode.doc
Lane # Sample Name
Molecular Weight Standards
Commercial β-galactosidase
-IPTG cell extract
+IPTG cell extract
Crude Extract (CE)
Purified Fraction (PF)
Preserving the Enzymatic Activity of the CE and PF
Glycerol acts to preserve enzymatic activity while the samples are frozen. We will be using these aliquots of crude extract and purified fraction to study the enzyme kinetics of β-galactosidase in Lab 4.
1. Determine the remaining volume of the purified fraction and add an amount of 70% glycerol equal to 1/2 the volume of that fraction. Mix well by inversion. For example, if your purified fraction has a volume of 250 µl, you would add 125 µl of 70% glycerol solution it.
2. Pipette 750 ul of Crude Extract (CE) into a clean microfuge tube. Label it CE. Add 375 μL of 70% glycerol to this fraction. Mix well by inversion.
3. Give both labeled tubes to your instructor to save for next week.
2. Using the standard curve generated in the previous step, calculate the molecular weight of the band(s) that you have identified as β-galactosidase. What is the calculated molecular weight?
Background information on enzymes and lab techniques:
Kågedal, L. (1998) Immobilized Metal Ion Affinity Chromatography. In: Protein Purification (Janson, J. C. and Rydén, L., eds.), Wiley-VCH, New York, NY, pp. 311–342.
Specific References for β-galactosidase:
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/11871 | PokeBase Battle Subway Meta-PokeBase Q&A
Why were you banned? [For Moderator Use]
23 votes
Don't comment on this page unless you have real reasons. It bogs the page to hell.
You may request an unban for a user. Three rules of thumb:
- Don't make a dupe and request to be unbanned.
- Generally Moderators do not overturn the decisions of other Moderators. So don't beg Ninja to unban Challade or any other users. I'll kick you for being a pest.
- Certain users can never be unbanned, being Mewicune and (Abnormal1!). They have major offenses.
Useful link: Ban report thread
asked Aug 4, 2012 by trachy
edited Mar 5 by Le Scraf
Can I just ask a question even though I'm not a moderator. When people have duplicate accounts, does their newest one get banned? Please don't ban me!
The dupe would be banned permanently, and if it's your first offense and you'e honest about it you'll only get a temporary ban, normally a week or so. However repeated dupes and/or spam upvoting yourself will result in a permanent IP ban.
Basically, don't make dupes.
I thought you can't up vote yourself?
If you use a duplicate account to vote your main account you can, but you will be banned for doing it.
By the way, you don't need to be a mod to ask a question lol. They don't rule the site, they manage it and keep it clean.
3 Answers
6 votes
Has been banned for two weeks for spam voting friends with constant warnings.
You've had previous offenses. If you mess up again it will be a permanent ban.
Don't do it.
As for other users, SassyLittleMawile, Metaknight, Dragoon, and Immortalkitty, consider this a warning. Metaknight, one more offense and there will be bans.
Edit: Pokemon123 is now permanently IP banned for making a dupe and lying about it.
answered Feb 24 by Ninja
edited Feb 26 by Ninja
I'm saying this now. I had spam vote one time but Prof. Xerila said that i couldnt so i removed and Metaknight did the same with me so i did it 1 time but wont do it again. It was 4months ago and Meta knight have done it 4times Dragoon 1-2 times Imortal kitty 1 time to Pkmn123 i think and Mawile 2ti,es and me 1time i think i know 3more users also
Thanks for being honest.
makes a dupe, lies about it to mods. this dude has a big brain :/
Guys have bigger brains but some can only uses 20%
2 votes
1 day for racism in chat.
Edit by DT: Extended to a week for creating a second account. enter image description here
answered Mar 5 by Ninja
edited Mar 5 by DarkTyphlosion
I just saw it too. Tsk, tsk, tsk...
2 votes
Where to start?
First, Pearl Luxray logs in.
• Luxray says that Snorlax is not the same person. I ask Luxray to post on the sibling page.
• Luxray insists that he is not a duplicate, despite the fact that i just didn't say that.
• Shiny Snorlax comes in (Luxray apparently asked) and calls me rude and a retard.
• I ban Pearl Luxray, Diamondluxray is created. Snorlax
• And Nobody ate dinner that night.
DT used Mamudoon on them all. Triple instant kill.
answered Mar 6 by DarkTyphlosion
I felt this was just necessary, for context:
Did you have Mudo Boost xD
http://imgur.com/AxQsvuh I edited it all into one picture :D |
global_01_local_0_shard_00000017_processed.jsonl/11876 | Take the 2-minute tour ×
I heard many people saying that when developing algorithms you should first use pen and paper, flowcharts and what not, so that you can focus on the algorithm itself, not worrying about the implementation of said algorithm (i.e., you deal with one problem at a time).
However, most of the time I find it easier to actually develop my algorithm on the fly. That is, I think a bit about the problem until I know the general direction to take, and then I start writing code and making changes until the algorithm emerges and works.
Is this a bad habit that I should try to change?
share|improve this question
add comment
closed as primarily opinion-based by Jim G., MichaelT, gnat, Kilian Foth, StuperUser Oct 7 '13 at 12:10
8 Answers
up vote 11 down vote accepted
Some algorithmic development can require a lot of trial-and-error testing and tuning, as one can find that the assumptions that would go into a strictly paper design turn out not be accurate enough when given real data and performance constraints.
Maybe iteration (think-code-test-think-code-test...), rather than just an either-or choice for the optimal "habit".
share|improve this answer
add comment
There is also a middle way, that I usually use. Not thinking too much in advance, and not getting lost into the details of my code ...
TDD (Test driven development) lets you think a bit, then make it work ; then think a little more about what you need, then make it work, having the security net that your previous Use Case keeps working at all times... The steps are:
1. Write a test (ie a Use Case).
2. Watch it fail, make the failure understandable.
3. Write the code.
4. Refactor the code and the test.
share|improve this answer
add comment
Who are these "many people?" And are they programming for a living? What you are doing is exactly what most programmers do, at least most that I have known. There's little use for paper when it's faster to type, and little use for pseudo-code when programming in a high-level language. Occasionally I do use pen and paper to visualize a tricky algorithm (e.g. rotating a tree), but mostly I start with high-level code and gradually fill in the blanks.
Like KLE, I think this works better following test-driven development. Assuming you are going to write tests anyway, you may as well write them first.
share|improve this answer
add comment
This depends on your thinking habits and algorithm complexity.
Pen and paper offer "free form" thinking without a compiler shouting at each character you type.
Some of us who use pen and paper, take the time to adjust loop limits, try different values, etc.
So, I guess that writing the code directly encouraging test-first approach where as the pen and paper promotes think-first approach. It is definite that if the task is trivial, you can code it on the fly (if you are experienced enough) but complex algorithms would probably need a different development approach.
Diagrams help in some cases, but this requires that you be familiar with them and have used them before.
share|improve this answer
That is more or less why I asked. I think that the "think-first" approach will make you a better programmer in the long term. Thanks for the answer. – daniels Aug 29 '11 at 20:49
Yes, but are you that kind of guy? Some people develop code iteratively by trial and faliure and won't learn any other way. – Emmad Kareem Aug 29 '11 at 20:51
add comment
I think yours is the more common approach. If the algorithm is especially intricate or difficult it can be tough to both figure out the algorithm and implement at once, but in general I doubt it helps most people.
But I wouldn't, say, invent rules for a grammer and implement a parser for it without writing the rules out on paper (or maybe with some special tool I don't have) first, or implement a B-Tree without pseudo-code available.
I wouldn't say you have a bad habit unless it's doing you some harm, and I think you would notice if it were.
share|improve this answer
Gotcha, and yeah I think that for larger/more complex projects I do tend to spend more time on paper. – daniels Aug 29 '11 at 20:48
add comment
you can create a design while making the stub classes, methods and tests but you can get bogged down while creating the details
for the really complex stuff (compilers and such) a pen and paper design (or at least on a design tool of sorts) will help to keep you on track and the eye on the whole picture and avoid bad design choices and even let you choose certain design patterns from the start
but ultimately it depends on how well you can keep seeing the big picture
share|improve this answer
add comment
I'd recommend sketching the general directions (the "pen & paper" phase) before jumping to implementation to save time by getting the most obvious requirements/constraints out of the way.
Then you can finetune it on the way given you can never guess everything at the start because further contraints may/will appear later in development, for various reasons.
That way you know where you're going but you can still adapt to changes.
share|improve this answer
add comment
1. The amount of preparation needed is typically proportional to the complexity of what you are doing. It makes no sense to pen&paper 2 full days for an algorithm that is used once in a quarter, runs one hour singlethreaded on one machine only. It makes sense to pen&paper three man-weeks (if necessary) to design the new high-performance flux compensator module which will be able to process half a million requests per hour and has to run 24/7/365 without downtime.
2. You can tell if it's a bad habit within 30 seconds if you look at what solutions you are coding. You asked if it is a good or a bad habit. Well, that depends on you. If you are a slow learner at the beginning of your programming career, it is probably a good idea to pen&paper to full detail everything. If you got some years of experience, it will be enough to just think it through for 5 minutes and then just do it. Of course still with respect to 1. above.
Bottom line
Only your code tells the thruth whether you need more or less pen&paper. Don't let anyone else dictate that to you, but find it out on your own. That keeps you learning.
Disclaimer: This may not be what's called mainstream thinking and common sense. That's ok. Just set a bookmark and read it again in five years or so.
share|improve this answer
add comment
protected by GlenH7 Oct 6 '13 at 13:43
|
global_01_local_0_shard_00000017_processed.jsonl/11877 | Take the 2-minute tour ×
We are building a web service(SOAP, .Net) which would be talking to (mostly) native clients (windows, C++) and we are wondering what is the best way to communicate errors to the client (e.g. SomethingBadHappened like login service not available or something like user not found) and haven't been able to decide between throwing exception to the client or using some kind of error code model to do the above.
What you would prefer on the handling on the client side: receiving a error code or handling a ServerFault exception which contains the reason for the error?
1) Why are we thinking exception: Because it would make server side code a lot more uniform
2) Why are we thinking error codes: Because we think it makes more sense from the client side perspective.
If 2) is really true we would probably want to go for error codes than exceptions? Is that the case here?
Also, would the answer change if we were talking to managed clients instead of native clients?
share|improve this question
Just to add a bit of clarification: a) I am looking for best practices here and experience from the client side (since the client is lot more complicated and we would rather handle stuff at server side if we can keep client code simpler) b) The client contains a lot of legacy code and we may or may not be able to use C++ exceptions. – Amit Wadhwa Nov 1 '10 at 6:30
This may help- www.codeproject.com/KB/cpp/cppexceptionsproetcontra.aspx – Gulshan Sep 16 '13 at 8:06
add comment
3 Answers
up vote 4 down vote accepted
SOAP has a concept of faults, you can convert an exception to a fault on the server side and on the client proxy the fault can again be converted back to an exception. This works remarkably well in WCF and Java metro stack, cannot comment on native C++ clients.
As regards to SOA best practice define one generic fault and few specific faults only if the client need to handle a certain type of error differently. Never send a exception stack trace to client in production deployment. This is because in theory the server trace has no meaning for the client and for security reasons as well. Log the full error and stacktrace on the server and send a unique reference to the log in the fault. In WCF I use the Microsoft Exception Handling block from Enterprise Library to generate a guid and also convert a exception to SOAP fault.
Check the guidance at Microsoft Patterns and Practices.
share|improve this answer
Thanks this sounds good. Can you give me a more specific link there within the page there. – Amit Wadhwa Nov 1 '10 at 18:07
Also what about business level errors like UserNotFound etc. should these also be handled as exceptions – Amit Wadhwa Nov 1 '10 at 18:16
add comment
If it's a web service, you can't exactly cause the server to throw an exception that will be caught by the client. At the interface, your server basically has to return some sort of error code, even if that's a string that says An exception occurred. Type %s, message %s, stack trace %s.
As for the client side, you could have your response reading code check the response to see if it contains an error and raise an exception on the client side. That's a very good way to do it, in languages with good exception handling at least. C++, though, does not have good exception handing, and it's a good idea to stay as far away from C++ exceptions as possible. If you can't use a better language, then just stick to error codes.
share|improve this answer
I guess the uncaught exception would go as ServerFault to the client – Amit Wadhwa Nov 1 '10 at 5:11
There is nothing wrong with C++, or C++ exceptions. There are plenty of reasons to use a language other than C++ for certain projects, but exception handling is not one of them. – KeithB Nov 1 '10 at 14:07
Not only that it is against security best practices: What exactly should the client do with the stack trace of your server? Print it and send it to you? Send as email? Use for lube paper? – JensG Dec 9 '13 at 18:04
@JensG: If this is a web service and not a website, the client should be professional enough to email it to you as a bug report. – Mason Wheeler Dec 9 '13 at 18:07
add comment
I recently did a web service with the Java 6 libraries, which can report an exception back to the caller (I haven't looked into how as it is done automatically).
The ability to have the client provide a stack trace in the error report to the developer has been very useful (opposed to getting an approximate timestamp and then have to look it up in your logs, if you happen to log it).
So, seen from a developers point of view, use Exceptions.
share|improve this answer
I agree that this could be useful in dogfood and beta, but do you really want to spew out stack traces in event logs or log files in real world usage (and of course revealing more details about the service than you need/want to in process) – Amit Wadhwa Nov 1 '10 at 6:45
@Amit, trust me on this: If you hit a situation giving a stack trace in production, you WANT the stack trace! – user1249 Nov 1 '10 at 7:50
What's the benefit on stack trace on the client side, We will definitely log all exceptions on server side before passing it on to the client. – Amit Wadhwa Nov 1 '10 at 18:05
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11878 | Take the 2-minute tour ×
Setup: Suppose you are teaching an introduction to Databases class, the students are CS students that have a working knowledge of tree structures, how they can speed up searches, and have probably implemented a few in their lifetime.
Question: How would you describe the way in which a database uses indexes to search a table for a set of keys? What structure is a database index most similar to?
Bonus: How does someone write a SQL query where clause to take advantage of the searching capability of the index they design on a given table?
Answers should correspond to all database products as a whole. I'm looking for general tips which allow faster searching on all databases. Plain english descriptions please, no code, Big O searching descriptions are fine. This question might be too specific for this site, I considered asking on StackExchange but since I'm requesting a plain english description of a broad concept I thought this site would be Ok.
share|improve this question
The bonus part would seem to rely on implementation details... right? – Izkata Apr 9 '13 at 14:34
I'm looking for something like, "Your first where clause should narrow down the possible results (i.e., cutting out half of the tree searching)" – wfoster Apr 9 '13 at 14:36
What are you missing when you look at en.wikipedia.org/wiki/Database_index? (This is not meant as a rethorical question, it's meant literallly). – Thomas Apr 9 '13 at 14:37
And here: stackoverflow.com/questions/1108/… – Thomas Apr 9 '13 at 14:42
@Thomas that stackoverflow one is good! Maybe this question ought to get closed. – wfoster Apr 9 '13 at 14:52
show 3 more comments
6 Answers
up vote 30 down vote accepted
Database indexes are modeled after textbook indexes, then made more efficient:
Textbook index
The non-indented parts are the primary part you're searching on, and the indented part underneath some of them further identifies specific topics. Each indentation level is similar to another column on the index.
Taking advantage of indexes is (I think) partially implementation-specific. For example:
• If you query column food for "chicken", the index will be utilized.
• For "chick%", I would say it depends on the database/type of index, although all the ones I know of will still use it.
• Similar rules apply for querying columns food and drink for "chicken" and "water": First it limits results based on the first column in the index, then the second - just as if you used the outer index, then the indented index, in a textbook.
• Likewise for "chik%" and "wat%"
• However, "%ken" cannot be searched in an index in the databases I know of, because they index from the front of the word, not the back - same as textbook indexes. So the database will have to scan the whole table.
share|improve this answer
Exactly what I'm looking for, thanks for the expansion of your answer. – wfoster Apr 9 '13 at 15:00
@wfoster: I find it hard to believe that there would be any value in this answer to students who really have "a working knowledge of tree structures, how they can speed up searches, and have probably implemented a few" – Michael Borgwardt Apr 9 '13 at 15:16
OTOH, textbook index does not cover all the data in the textbook, only arbitrary chosen parts. – vartec Apr 9 '13 at 15:52
Regarding your last point, you can use a k-gram index or similar. I don't know how common that sort of technique is in off-the-shelf database indexes though. – Karl Bielefeldt Apr 9 '13 at 16:41
add comment
I mean, it's most similar to an index. Instead of rummaging through the entire book, you look it up in the index and find the page it's on.
The magic works because the index is organized in an easier-to-search way than the book, i.e. alphabetically.
share|improve this answer
What about an index comprised of multiple columns? How does this relate to an index in a book? Would this be like an index of indexes? – wfoster Apr 9 '13 at 14:37
@wfoster I feel like at this point it's better just to explain that as a generalization. "A weakness of a dictionary is it's really hard to look up all the words starting with A that are nouns." But you can do this with multiple-column indices. – djechlin Jul 12 '13 at 20:10
add comment
Take a book, any technical book.
Go to the end - where there is an... Index.
Why is it there? Same reason for the DB. So you don't have to search through a whole book for a specific entry.
Think about a dictionary. It is an index of words, sorted alphabetically.
share|improve this answer
And also, every time you write a new entry into the dictionary, the index has to be updated. – nbv4 Apr 9 '13 at 15:03
add comment
Assuming that the audience really has "a working knowledge of tree structures, how they can speed up searches" (and thus "plain English" is really not what they need):
A DB index is a B-Tree using the values of one or more columns (tuples in the case of multiple columns) as keys and references to the corresponding records as values.
A B-Tree is a search tree with a very high branching degree that is optimized for data locality and thus still performs well when it's too large to be kept in RAM (and random access becomes extremely expensive).
From this, it should be clear that an index can only help speed up a query when the WHERE clause involves the columns of the index either in an equality condition, a greater/smaller condition or by specicfying a prefix (which uses the columns in the sam order they appear in the index, for multicolumn indexes) - because those are the operations supported by a search tree.
share|improve this answer
add comment
It doesn't have to be a b-tree, but many databases do use b-trees to implement their databases. Anything you want to know about how an index works, and what its performance characteristics are, you can find out by studying b-trees.
share|improve this answer
add comment
From Use the Index Luke:
share|improve this answer
@wfoster: a metaphor only goes so far, if you try to stretch it, it breaks. – Joachim Sauer Apr 9 '13 at 14:47
@wfoster: Some book indexes have indented subsections under each index. – Brian Apr 9 '13 at 15:13
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11879 | Take the 2-minute tour ×
I've just started creating my very first little Java Swing app. When the program opens, it brings up a single, simple window with a label and a couple buttons. Clicking one of those buttons is supposed to wipe out the welcome screen and replace it with a totally different panel.
I'm not sure what the best way to create that functionality is. One method would be to pass my JFrame as an argument into... just about every other component, but that feels hacky to me. Or, there's making each panel double as an action listener, but that doesn't seem right, either.
Is there a design pattern I should be applying here? "Replace the contents of the main — and only — window" must be a reasonably common operation. A name for the pattern would be enough; I can use Google on my own from there. (I wouldn't say no to a longer explanation, though.)
share|improve this question
This being a question about actual programming techniques, you'll likely get a lot more answers on Stack Overflow. – Alex Feinman Jan 25 '11 at 17:05
add comment
3 Answers
When building Swing apps, I usually base it on the Mediator Pattern. In this pattern, a Mediator class (usually the main JFrame) handles the different GUI parts (usually the JPanels, JMenus...) and takes care of communication between them.
For example, if an event occurred in JPanel1, JPanel1 notifies the mediator (the JFrame). the JFrame then takes action by modifying JPanel2.
FYI: all my projects were small-to-mid GUI apps, so I'm not sure this patterns scales well. But if you could design an adequate architecture, the Mediator pattern can be a solid base.
share|improve this answer
add comment
You can have the main method display a JDialog. When the dialog is closed, the main JFrame is created and displayed.
JDialog gives you easy-to-use static methods that display a dialog with custom contents and buttons, and return the code of the button that was clicked. By testing this value, your main method can decide to either display the main frame or exit (or anything else). Please read the Javadoc.
Unlike some older UI frameworks, a Swing application is not tied to a specific frame or window. You can create as many windows as you want. The application ends when all threads end, not when all windows have been disposed. This is typically achieved with System.exit(0).
I don't know if there is a specific design pattern for that case. I recommend the Java Swing tutorial.
share|improve this answer
-1. This is a design pattern question. Recommending changing the specs I was given and ending with "I don't know if there is a specific design pattern" doesn't answer it. – Pops Jan 25 '11 at 15:21
His answer is very accurate. You don't have a design pattern problem you need to learn how forms and dialogs work first. – Alex Jan 28 '11 at 3:57
add comment
Many UI frameworks have different rules regarding the 'main' or 'active' window. One way to manage that complexity is by having your main window, which controls the main message loop, to be an invisible one (or small, chromeless 1 pixel one, off screen for the particularly annoying frameworks). then have all other windows and dialogs be a child of that window.
This method has many advantages, especially when dealing with global keyclicks and mouse events, as well as in top-level logging and exception handling.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11884 | And yousa fake fuck like a fleshlight
from Childish Gambino – Fire Fly Lyrics on Rap Genius
A fleshlight is a fake rubber vagina sex toy. But not the real thing.
|
global_01_local_0_shard_00000017_processed.jsonl/11900 | where the writers are
Cynthia Carbone Ward's Blog
RSSSyndicate content
I am writing this at 2 a.m. in a room that is filled with moonlight. I couldn’t sleep, so I crept out of bed and found my way to the sofa, laptop in hand. Through the front windows I can see the familiar outline of the hills and a sky so bright its shine is cast in rhombus shapes upon the walls and...
Continue Reading »
Thanksgiving back then was like all of our holidays. An effort was made but the joy was missing. As usual, the work fell to my father, who had learned that you could count on no one, which of course became a self-fulfilling prophecy. I remember smelling the tomato sauce cooking early...
Continue Reading » |
global_01_local_0_shard_00000017_processed.jsonl/11904 |
VAPR. It sounds like a nefarious spy agency bent on world domination, doesn't it?
Instead, VAPR stands for Vanishing Programmable Resources, and it's a new program created by DARPA -- the Defense Advanced Research Projects Agency -- to develop tech that self-destructs either on demand or at a pre-scheduled time. That's not to say it isn't involved in the world of espionage. That's exactly its point. According to DARPA:
Sophisticated electronics can be made at low cost and are increasingly pervasive throughout the battlefield. Large numbers can be widely proliferated and used for applications such as distributed remote sensing and communications. However, it is nearly impossible to track and recover every device resulting in unintended accumulation in the environment and potential unauthorized use and compromise of intellectual property and technological advantage.
That's all another way of saying: "We want to send spy toys over enemy lines that we might not be able to get back, so we want to blow them up before the enemy gets them." … Read more
World's first public space telescope gets Kickstarter goal
Intel employee sues over alleged 'Kick Me' sign
He claims in a lawsuit that Lehman … Read more
Some stories make you wonder.
Some, however, make your eyeballs cease to move.
App tracks the wise who hate their bosses on Twitter
Frustration is an essential element of the human condition.
They're different there. They're tight-lipped and generally superior.
The Sun got hold of a bookRead more
Apple's biggest problem: People might quit?
There is something slightly entertaining about the alleged crisis at the world's most famous and successful company.
Just because a bunch of greasy-haired speculators have decided that Apple's shares are worth less than Google's (this week), garments are rended and teeth gnashed.
And then there's teens. Apparently, they're all fleeing the brand and rushing toward Microsoft's Surface. Which, apparently, isn't selling well.
In times of such rampant face-contorting and mind-numbing, I always remember the words of Mitt Romney: "Companies are people, too."
And so it is that in a rather more measured discussionRead more
Best Web sites for older job seekers
The pundits can't decide whether the real unemployment problem is older people taking jobs from younger people or younger people taking jobs from older people.
Unemployed and underemployed folks in their 40s, 50s, or older just want a job that will keep the bill-collectors at bay, and maybe even provide a little fulfillment.
The recent slow decline in the U.S. unemployment rate may be misleading.'s Peter Ferrara writes that the labor force participation rate has dropped from 65.7 percent in 2009 to 63.5 percent at the end of 2011. Ferrara claims the true … Read more |
global_01_local_0_shard_00000017_processed.jsonl/11910 | elementary school
Talk of Iowa
2:09 pm
Mon November 4, 2013
Foreign Language Learning in Elementary School
Credit Miguel Vaca
Join host Charity Nebbe to hear about out how foreign languages are being taught in some elementary schools in Iowa and about the benefits of introducing a new language early in life. Guests include administrators and teachers of foreign language in Iowa.
Read more |
global_01_local_0_shard_00000017_processed.jsonl/11915 | Robert J Lee > Net-TCP-PtyServer > Net::TCP::PtyServer
Annotate this POD
View/Report Bugs
Module Version: 1 Source
Net::TCP::PtyServer - Serves pseudo-terminals. Opens a listening connection on a port, waits for network connections on that port, and serves each one in a seperate PTY.
The actual algorithm is simple, although the implementation looks a bit ickey.
1 Create a listening socket
2 Wait for the next connection on the socket (by calling accept).
3 Fork.
3.1 Parent process closes its copy of the handle (by calling stopio) then goes back to 1.
3.2 In the child process, we create a pseudo-TTY and fork
3.2.1 The child process runs the command by re-opening STDOUT, STDERR and STDIN to the pseudo-TTY's slave terminal and then calling exec; this does not return
This is necessary because the filehandles need to be exactly the same, and we get buffering/crashing issues if we try an open3()
3.2.2 The parent process closes its copy of the pseudo-TTY's slave terminal (using close).
3.2.3 The parent then repeatedly pipes the data between the pseudo-TTY and the networked filehandle until the exec()ed process completes.
3.2.4 The parent process then closes the pseudo-TTY (by implicit destruction) and the networked filehandle (by close), and exits.
Coping with terminal size changes
To set the size of a terminal, you need to call ioctl(), and pass the pseudo-TTY handle, the constant TIOCSWINSZ (defined in termio.h or termios.h - or on my system, defined in the asm includes and imported by one of them), and a winsize{} C-structure.
The TIOCGWINSZ (G instead of S) can also be used to get the size of a terminal. This is used to generate the structure passed to ioctl in the case of the pseudo-TTY running on a real terminal; see this code from IOS::TTY (referenced by IOS::PTY):
sub clone_winsize_from {
my ($self, $fh) = @_;
my $winsize = "";
if not POSIX::isatty($fh);
and return 1;
return undef;
The structrure of winsize is defined in termios.h as follows:
struct winsize {
unsigned short ws_row;
unsigned short ws_col;
unsigned short ws_xpixel;
unsigned short ws_ypixel;
And the Internet tells me that ws_row is the number of rows, ws_col the number of columns, ws_xpixel the number of horizontal pixels across the terminal, and ws_ypixel the number of vertical pixels across the terminal.
After a little experiementing, this seems to work to create the struct, although it should be noted that this assumes that the struct has the same memory alignment as an array of unsigned shorts:
my $winsize = pack("S*",$ws_row,$ws_col,$ws_xpixel,$ws_ypixel);
So that's what I'm trying to use (thus saving an XS C function)
The module still has to handle the TELNET protocol properly. In particular, the remapping of IAC and handling of TELNET escapes.
For now, we just send the command to turn off echo and linemode, which otherwise interferes with the UI (we also ignore the response, but this seems to have no ill effects so far).
Control characters (ctrl+q, ctrl+x) are coming in as 0x11 (17) and 0x18 (24); these seem to need translating into \C and the keycode for some reason; the translation is not being picked up through the pseudo-TTY. (For now I'll just use character codes in the code that uses this; they seem simpler to me anyway).
When the TCP connection is dropped, we don't currently SIGHUP. We may be able to do this by close()ing the master terminal, but it's probably better to send an explicit HUP signal as well.
# Don't make zombies when we don't wait for forks (see perlipc): $SIG{CHLD} = 'IGNORE';
Used internally in response to an incoming NAWS command
Takes the terminal as the first argument, followed by the number of rows, then the number of columns. The number of horizontal and vertical pixels can also be specified, but the default is to assume an 8x8 pixel character.
Takes a port number as the first argument, followed by a command and its arguments.
Listens for connections on the given port. exec()s the given command on a pseudo-terminal on the given port in a child process for each connection.
Does not return (but it could die if something really goes wrong)
syntax highlighting: |
global_01_local_0_shard_00000017_processed.jsonl/11927 | Take the 2-minute tour ×
For the purposes of running Active Directory and DNS Server, what are the minimum memory requirements for Server Core 2008 R2?
I've read of someone using 256MB. This seems pretty low although summing up the memory usage when running tasklist suggests it's OK.
Is there any way to know?
share|improve this question
WinPE 2.0 and later requires a minimum of 256MB of RAM, any less and you won;t be able to install windows. – commandbreak Jun 16 '10 at 4:52
add comment
4 Answers
up vote 4 down vote accepted
Server 2008 R2 Core takes about 350 MB just to start. If you have a smaller AD and DNS install you can easily fit it in 512MB (without swapping going crazy). Anything smaller and you'll pretty much be swapping non-stop.
share|improve this answer
I run my Server Core DCs on 256 MB of memory and they're not swapping like crazy ^^ I doubt it takes 350 MB to start, more like 90-100 MB? It's not a big AD though. – Oskar Duveborn Jun 16 '10 at 6:15
The Windows 2008 R2 Core kernel is about 280 MB without anything "extra" installed; and the critical OS processes like winlogon, wmi provider, and other things take several more megs. There's no way you can fit a DC in 256MB without paging. Perhaps "paging like crazy" was a bit over the top, but having to page the kernel as a requirement to start the server doesn't sound like a good idea to me. – Chris S Jun 16 '10 at 12:54
I haven't really checked but some guy states: "The memory footprint in RAM for Server Core has been reduced to less than 100MB, compared to roughly 130MB for Windows Server 2008 and 244MB for Windows Server 2003" (windowsitpro.com/article/virtualization/… ) and my 256MB DC/DNS are quite snappy so I didn't doubt it. Perhaps the swapped out stuff is never used/swapped back in again. But I'm going to look at the perf stats for fun tonight, you got me curious ^^ – Oskar Duveborn Jun 17 '10 at 13:39
add comment
I was running them on 256mb for DNS only - worked for some time ,but sometimes DNS would stop responding. Up to 512mb now, and it works like a charm. Hosts half a dozen zones only.
share|improve this answer
add comment
I couldn't find anything specific to core installations but the minimum RAM requirements for Server 2008 and Server 2008 R2 is 512MB.
share|improve this answer
add comment
I would not recommend less than 512MB. I assume you're looking to run this virtually - I agree that the bump from 256MB to 512MB will save you the swapping which in turn will save load on your storage backend. For the "price" of the extra RAM the tradeoff is most likely worthwhile.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11928 | Take the 2-minute tour ×
I'm wondering if tailf can generate blocking I/O which will slow down server responsiveness due to logging.
For ex. assuming the following setup:
Debian 5.1 linux server (foo) which is managed via terminal (foo is hosted on EC2).
Foo runs several applications, each writing to their own log file. For the sake of example, Apache httpd to /var/log/apache/access.log & Tomcat 5.5 to /var/log/tomcat5.5/myApp.log.
If I open an ssh connection to foo, (note: Internet link, high latency, relatively slow upload) and run tail -F /var/log/apache/access.log can't I reach a situation where the kernel blocks httpd's writes to this log file and thus slows down httpd's performance because of the wait enforced on each thread?
To give some numbers, let's assume that foo logs ~200kb of log data per second which needs to be pushed over the wire to the ssh client.
Another theoretical aspect: What would happen if the /var/log file system set on an infinite size ram (remember: Theoretically speaking) so that the hard disk seek time is eliminated ?
Third aspect, what would happen if I'd open the ssh connection from a really slow link (Let's assume that foo is traffic shaped to push only 5kb/s upload)?
Would love to hear what you think guys.
Thanks for reading, Maxim.
share|improve this question
add comment
2 Answers
up vote 1 down vote accepted
I don't think there will be some blocking over I/O here. When you do "tail -f", what's happening is
1. your shell process, let's say bash, will spawn a new process 'tail'.
2. tail will open the file, move file pointer to the end, wait for 3 seconds and check whether there are new data.
3. if there is new data, tail will push it back to the bash using unix pipe.
4. this data gets transmitted from server to your machine by bash + ssh.
So as you can see, a slow internet connection won't affect step #2, which is the key for I/O performance anyway.
Plus, tail opens file in 'read-only' mode and, an educated guess, logs are open in 'append-only' mode, so there shouldn't be much locking here to worry about. If this is still a bit concern for you, then you may want to try out the inotail which is based on latest linux inotify api to avoid polling the file.
Hope this helps, Alex
share|improve this answer
add comment
I don't think it is likely. I believe the writes will be cached in ram and since they were just written I imagine that tail will be reading those pages from ram as well. The pages will be periodically synced to disk. I would be surprised if Apache blocks on waiting for the logs to be written out to disk myself.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11929 | Take the 2-minute tour ×
I have god installed on at least a dozen (or more) servers running CentOS 5.5 in both i386 and x86_64 flavors that work perfectly. I just setup two new CentOS 5.5 x86_64 servers and installed God, but I'm getting an event system error:
$ tail /var/log/god.log
E [2011-04-22 12:33:17] ERROR: Condition 'God::Conditions::ProcessExits'
requires an event system but none has been loaded
$ god check
using event system: none
[fail] event system did not load
$ uname -a
Linux server2.example.com 2.6.18-238.9.1.el5 #1 SMP Tue Apr 12 18:10:13 EDT 2011 x86_64 x86_64 x86_64 GNU/Linux
I can't find any cn or netlink kernel module on any of my CentOS servers. Yet I have other servers that work fine:
$ god check
using event system: netlink
starting event handler
forking off new process
forked process with pid = 17559
killing process
[ok] process exit event received
$ uname -a
Linux server1.example.com 2.6.18-194.el5 #1 SMP Fri Apr 2 14:58:14 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux
All servers run ruby v1.8.6-399:
# ruby -v
ruby 1.8.6 (2010-02-05 patchlevel 399) [x86_64-linux]
Ruby comes from the ELFF repo:
# rpm -qi ruby
Name : ruby Relocations: (not relocatable)
Version : Vendor: Bravenet ELFF <[email protected]>
Release : 2.el5 Build Date: Fri Apr 16 18:53:48 2010
Install Date: Thu Mar 24 11:23:48 2011 Build Host: el-build.local
Group : Development/Languages Source RPM: ruby-
Size : 1738695 License: Ruby or GPLv2
Signature : DSA/SHA1, Fri Apr 16 19:07:49 2010, Key ID 551751dfe8b071d6
Packager : Bravenet ELFF <[email protected]>
I did a little digging and can see the exception getting thrown when God tries to load the Netlink event handler:
no such file to load -- netlink_handler_ext
What could possibly be different between my servers? Am I missing something simple?
share|improve this question
add comment
1 Answer
which ruby interpreter does god use ?
ruby -v ?
centos ships with a very old 1.8.6 ruby.
share|improve this answer
I'm using ruby 1.8.6-399 on all servers. – organicveggie May 2 '11 at 15:38
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11930 | Take the 2-minute tour ×
I'm stuggling with installing WebDeploy service on my development PC (Windows 7 Professional with IIS 7.5). Can someone give me the steps required to do that.
Update: I installed the Web Deployment Tool from WPI and verified that the web deployment service is running (I believe it's "Web Deployment Agent Service"), however, when I open IIS Manager I can't see the Management Service; as per my understanding it's were I configure web deployment.
If I'm missing something may be someone can tell me what it is and what to do next.
Thanks in advance,
share|improve this question
You'll get a better answer if you full describe exactly what you've done, and what results and/or errors you see. – mfinni Jun 15 '11 at 12:43
@TheBlueSky - if you've solved this for yourself, maybe you can help me at serverfault.com/questions/557539/… ? – uosɐſ Nov 27 '13 at 13:54
add comment
3 Answers
up vote 1 down vote accepted
The Management Service Delegation UI will only appear on Server SKUs, as only server SKUs have a functional Web Management Service (which delegation relates to). This will therefore never install on your Windows 7 client machine.
You can still enable Web Deploy publishing (for administrators only) using the Web Deployment Agent Service (msdepsvc) by starting the service if it is not started ("net start msdepsvc" on command line) and opening port 80 in the firewall for the service, as needed. There is no UI for this service.
If you need any direction on the right command line for the client or VS publishing options to use the Agent service, please post again on the IIS forums: http://forums.iis.net/1144.aspx
Hope that helps! -Kristina
share|improve this answer
Thanks Kristina for the reply. Based on the information you provided I must be ready for the deployment as all the applications or services I need are installed and running; however, this is what I'm getting when trying to deploy from WebMatrix for example: http://bit.ly/mpVxVD... what is it that I'm doing wrong? – TheBlueSky Jul 4 '11 at 5:16
Hi TheBlueSky. I'm afraid WebMatrix is set up to use only the Web Management Service (WMSvc) for Web Deploy publishing and will not work with the agent service (msdepsvc). The destination server must be a server SKU with IIS7 or IIS7.5 (i.e. SKUs with functional WMSvc). If you really want to publish to this client machine, then you can still do so using the Web Deploy command line and the agent service - I'll post how to do this on the forum thread: forums.iis.net/t/1179465.aspx#1987891 (more space there). – Kristina Jul 5 '11 at 14:59
Thanks Kristina. I'm marking this post as an answer to my question, but for anyone reading the question, please go to http://forums.iis.net/t/1179465.aspx for more details. – TheBlueSky Jul 12 '11 at 5:05
add comment
For anyone else that finds this and is having trouble finding the Management Service Delegation option on Windows Server the issue is that you have to use the standalone Web Deploy installer and not the Web Platform Installer version and that you have to select some additional options in the standalone installer during installation.
When installing select custom install from the menu and make sure that the "IIS Deployment Hander" and "Management Services Delegation UI" options are selected.
share|improve this answer
add comment
Installing Web Deploy
Web Deploy
Web Deploy (Web Deployment Tool) is an IIS extension, containing essentially a set of tools and a managed framework for simplifying the deployment, management, synchronisation and migration of Web applications, sites, and even entire servers.
This link explains how to Export a Package while this one how to Import a Package using IIS Manager.
To access Web Deploy functionality you need to navigate to your site in IIS Manager (expand the Server node and the Sites node, then select the desired Site or Application), now right click on it, choose one of the entries from "Manage packages" sub-menu and follow the wizard. You need to do a Export operation on your dev PC and when all done do Import on your Server.
share|improve this answer
What the first article is saying is what I did already. Please re-read the question as I updated it with the steps I did previously. – TheBlueSky Jun 16 '11 at 8:03
@TheBlueSky: Updated my answer. I have not used console or synchronize whole server, just Export/Import functionality for the website. – LazyOne Jun 16 '11 at 9:16
The question wasn't about how to export and import an application. What I'm trying to achieve now is publishing an application (e.g. from Visual Studio or Web Matrix) to my IIS, from my dev machine or remotely... I just can't see the section where I can configure that in IIS. – TheBlueSky Jun 17 '11 at 4:45
No, this is not a new question, and No, you did not give me the answer to my original question. In order to be able to deploy anything to my IIS, I need to first configure the web deployment service (correct me if I'm wrong), and in order to configure this service, I need to access "Management Service Delegation"... I still can't see the Management Service; i.e. the one in this picture Management Service Delegation. – TheBlueSky Jun 17 '11 at 15:28
The details were added as soon as I read mfinni comment and not recently. Am I stuggling? Sure, and here are few screen shots of what I did and still can't get it working: IIS Management Service Setup, Installing WebDeploy, checking the services and IIS Manager... noticed the last screen shot? Where are "Management Service" and "Management Service Delegation"? – TheBlueSky Jun 21 '11 at 15:48
show 2 more comments
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11931 | Take the 2-minute tour ×
• How to (re)install utility partition for a Dell Poweredge 2900?
• Where is installed this?
share|improve this question
add comment
1 Answer
up vote 1 down vote accepted
Unless you already have an image of the utility partition, you don't/can't reinstall or recover it.
However, everything on the utility partition is available for download from Dell, so you'd download the diagnostics tools/utility you're looking for from their support site - this is the page for the PE2900 - burn it to disk and boot from that instead.
share|improve this answer
that utility is for Windows? – rkmax Jan 4 '13 at 15:35
@rkmax Depends what utility you're talking about. Their diagnostic utilities usually boot into their own environment, whereas their management utilities generally have Linux and Windows versions available. – HopelessN00b Jan 4 '13 at 18:30
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11938 | Forgot your password?
Comment: Re:Price, polish, brand! (Score 3, Interesting) 432
by Gator (#36651526) Attached to: Why Are There So Few Honeycomb Apps?
I second this post. I can't say enough good things about the ASUS Transformer. The tablet rocks especially when you consider how much cheaper and open than the iPad it is. Not many people are talking about it here, I guess its still a secret with not as much publicity as the Zoom.
The Android OS right now is pretty close to iOS. Its a little less polished, and does suffer from the occasional bug, but for the price you're gaining flexibility.
Comment: Re:News Flash (Score 1) 477
by Gator (#36575688) Attached to: The Intentional Flooding of America's Heartland
I'm perfectly okay with you going after the insurance industry. They deserve every bit of the mid westerner's ire. But the difference is, the insurance companies are deliberately screwing you out of your claim. The Army Corps was responding to a natural event. Even if there were no dams these areas would be flooding anyway.
|
global_01_local_0_shard_00000017_processed.jsonl/11939 | Forgot your password?
Comment: Re:Bitcoin is hard to explain... (Score 1) 111
by Valdrax (#46493227) Attached to: Recent news events re: Bitcoin ...
It's hard to explain Bitcoin to Kleptomaniacs because they always take things literally.
It's hard to explain Bitcoin to Kleptomaniacs because they always take things. Literally.
Isn't it always grand on the internet when someone posts a joke, and then someone responds with the same joke, only phrased more obviously for his fellow, less subtle readers to laugh at and congratulate themselves for being smarter than the original poster who obviously wasn't witty enough to make the same goddamned joke first.
Yeah, that's always awesome.
Comment: Re:AKA the I HATE AMERICA ACT (Score 2) 329
by Valdrax (#46487467) Attached to: EU Votes For Universal Phone Charger
Most phones except for the American Company Apple uses a Micro USB.
Oh, please -- put down the flag.
As an American Apple user, I hate the fact that Apple doesn't use the same charger / data cable as everyone else and that, worse, my iPhone 5 isn't even compatible with my iPhone 3 charger. It's an overpriced, short POS that has a pointless chip in it to prevent third party cables from working properly. It's also not water-resistant (which is great in case you accidentally drop the end of it into a glass of water on your desk). All in all, Apple's new charger has significantly worsened my enjoyment of the phone.
So, I'm all for standardization on something nearly everyone else has agreed is sane. Apple gets no free pass for being American with me.
Comment: Why standards? (Score 4, Insightful) 329
by Valdrax (#46487285) Attached to: EU Votes For Universal Phone Charger
Why do they think this is a matter for governments to decide?
Same reason each country has a standard railroad track, a standard power outlet, etc. Letting industries decide on mutually incompatible standards largely serves to lock in consumers and also creates great inefficiencies in the economy due to incompatbility. Standardization would allow business like cafes & airports to offer charging solutions that fit all their customers, and it would produce less physical waste.
Comment: Re:Chickens and bees (Score 1) 173
by Valdrax (#46475745) Attached to: Power Cables' UV Flashes Apparently Frighten Animals
Not really. UV vision is pretty common among insects & birds. Additionally, it's pretty common in lizards and fish that live close to the surface. And don't get us started on the ridiculously overengineered eyes of the mantis shrimp.
Among mammals, it's common in nocturnal species like mice & bats, and we've started to notice it in reindeer and have theorized that it might be common in snow-adapted species.
Comment: Re:Protection from Deer Car accidents (Score 2) 173
by Valdrax (#46475701) Attached to: Power Cables' UV Flashes Apparently Frighten Animals
Funny how 30-40 sec into the video they've identified UV discharges from a tower that appears to have a flock of sheep browsing under it. Perhaps not so scary after all?
What makes you think sheep can see UV light?
Most mammals that can see UV light are nocturnal or live in arctic conditions where it helps deal with snow-blindness (according to current theories). It's also worth noting that mammals whose eyes filter out UV (like humans) tend to have better visual resolution.
Sheep are diurnal animals that rely heavily on vision for defense from predators. They also, like most dichromatic animals, have roughly red & green cones with no blue cones. It's pretty unlikely they can see the flashes.
Power Cables' UV Flashes Apparently Frighten Animals 173
Posted by timothy
from the what-can-you-see? dept.
Rambo Tribble writes "Ultraviolet light flashes, or "corona", may be scaring animals and altering behavior. An international scientific team, first studying behavioral anomalies in reindeer near power lines, have found that sporadic flashes of UV from the lines are probably responsible. As most mammals can see into the UV spectrum, this has broad implications for the disruption of animal behavior. From the BBC article: "Since, as the researchers added, coronas 'happen on all power lines everywhere,' the avoidance of the flashes could be having a global impact on wildlife.""
|
global_01_local_0_shard_00000017_processed.jsonl/11940 | Forgot your password?
+ - How Apps Are Reinventing the Worst of the Software Industry->
Submitted by Anonymous Coward
Link to Original Source
Comment: Re:And it's fucking irritating (Score 2) 321
by R.D.Olivaw (#35336278) Attached to: Apple Deemed Top of Movie Product Placement Charts
That's the thing. Watching Castle and seeing that Rick Castle has an iPhone, or that Detective Beckett has a Palm Pre? Eh, whatever. They're probably going to have a cell phone, like most of the people in the US. As long as you're not throwing that device into my face really obnoxiously, I don't care what it is.
Especially if the phone doesn't fit the personality/work/hobby. e.g. in Tron Legacy, Sam is running around with a Nokia N8. Surely a Unix geek as would choose a N900 :)
Comment: Re:Price difference (Score 1) 120
by R.D.Olivaw (#34937666) Attached to: Nintendo 3DS Launching On March 27 For $250
One of the reasons Nintendo gave for region-locking the 3DS was for differences customizing each region for the best experience, like language. So, clearly, since Europe has so many languages, the need to pay more. I guess.
Why would you need region locking for that? If someone needs the extra language then they will buy the localised, more expensive, version. If people do not care and would rather buy the cheaper english version then probably localisation isn't needed after all.
Comment: Re:It is Vista 1.1 (Score 1) 412
by laron (#30295276) Attached to: Windows 7 Share Grows At XP's Expense
4) Vista SP 1 fixed a lot of performance-related bugs. In other words, pre-SP1, Vista was slow and buggy: http://social.technet.microsoft.com/forums/en-US/itprovistadesktopui/thread/30c9c7f3-2cc4-426a-9db9-885086ff183e/ That bug for example was fixed, but the crucial point is, it was there when Vista was rolled out and everyone and their dog wrote reviews. Recovering a ruined reputation is hard.
Comment: Re:How insensitive! (Score 0) 125
by billsayswow (#30295214) Attached to: AbleGamers Reviews Games From a Disability Standpoint
Though, I will add, the bit about the lawsuit is rather excessive. While, yes, I see why there are laws that govern things like handicap accessibility in buildings and jobs, but when you're playing what is, essentially, visual media... that's starting to stretch it. Thanks to nerve damage sustained from a Hot Wheel car when I was a kid, I am unable to diverge my eyes.... maybe I could sue the Magic Eye people.
by pla (#30290428) Attached to: I know X people with diagnosed H1N1 flu, where X is:
The CDC estimates 22M cases among Americans through mid-October. The actual number is probably close to 30M by now, which is nearly 1 in 10. Since most people know roughly 100 other people, that means the poll averages should be closer to 10, not 2-5, and *certainly* not "none at all." Most people who picked the "None" option are either willfully ignorant or woefully uninformed.
Okay, if you want to take that approach (and personally, I consider the CDC as full of shit on this one - No way have they actually confirmed 22M cases, they've gone by MD reporting, which currently consists of "You have flu symptoms? Go away. Swine flu. Have a script for Tamiflu, and consider yourself yet another statistic"), let me clarify my answer of "none":
If I know anyone with the swine flu, then, as per my expectations, it counts as nothing worse than every other yearly flu contracted by millions of people. No one that I know dead, no one that I know knocked on their ass any harder than by any other flu, no one that I know who even felt the need to go to the doctor for treatment.
So Swine Flu? I can't with 100% certainty say "none". I can, however, say with 100% certaintly that no one has caught the media-feeding-frenzy, FUD-of-the-year plague-to-end-all-plagues.
Comment: Re:Day is Night, Black is White, and Good is Evil (Score 1) 505
by Procasinator (#30127004) Attached to: Microsoft Responds To "Like OS X" Comment
Oh, I understand. You jumped straight into a thread without understanding what it is about.
You try to discredit me through attacking my character, instead of attacking my premise. I don't think you even understand my premise.
I never suggested there was less malware for Windows than OS X (cause obviously Windows is littered with it). I never suggested to ignore bugs (where did you get this from?). All I suggested was that Windows Vista/7 has many security features built in that Mac OS X does not. And it is of my opinion, for example, a person surfing with IE8 in Vista/7 is more secure than that of a person surfing Safari on OS X. However, I still think you are more likely going to be targeted on a Windows platform than an Apple one - so while the security of product might be better or on par with Mac OS X, it will be more likely of the 2 to have malware.
Being a target does not make a product less secure, but rather makes security problems more likely to arise.
I do think it's a baseless and obviously biased claim when people say Mac OS X security is fantastic, and in the same breath say Windows is so far behind in this department. This people are usually Mac fanboy's or M$ bashers.
You, I think, are just an idiot.
Comment: Re:Multics (Score 1) 875
by bennomatic (#29459285) Attached to: Old Operating Systems Never Die
Reminds me of something my father told me about. He's in the cyclotron (atom smashers, for medical purposes) business, and back in the 70s, the control systems for his machines were run on PDP 11s.
Well, the old computers have all died over the years, but some of that equipment is still running, albeit with it's third owner. Y'know, Sloan Kettering upgrades and sells their cyclotron to UCLA. UCLA upgrades and sells it to University of Shanghai. Shanghai sells it to a hospital in Java...
Anyway, the same control software is being used; they're just running PDP 11 emulators in a Windows context.
Comment: Re:How much? They'll tell you how much. (Score 1) 199
by commodore64_love (#29388227) Attached to: How Much Is Your Online Identity Worth?
>>>they'd make off with around two grand before they were stopped. I was informed that I'm only worth 645 dollars. :/
Correct. The "guy" pays $645 for your information and he scores about $2000 using it. So around $1300 profit minus expenses like gasoline, renting a place to atash the stuff, and so on. It wouldn't make sense for the guy to pay $5000 for your data if he's only netting $2000 stolen, would it?
I had my credit card number stolen one time, and somebody in California bought $3500 worth of stuff at Walmart. I had been traveling and I suspected the girl behind the Motel 6 desk had collected and sold my number. I don't know how much the scammer paid that girl but if it was around $1500 (Symantec's estimate), then he "earned" $2000 profit overall. Not bad.
See it's not about "your" value. It's about the value to the scam artist and how much he thinks he can get with that data.
Remember, UNIX spelled backwards is XINU. -- Mt. |
global_01_local_0_shard_00000017_processed.jsonl/11941 | Forgot your password?
Comment: I agree, plus proposal: (Score 1) 73
by arisvega (#46493031) Attached to: Why Are There More Old Songs On iTunes Than Old eBooks?
The music industry has a long and sordid history of ripping off the artists...
The music industry got cold sweat from the diversity of available media (vinyl, magnetic tapes, optical disks, whatever) and the easyness of internet sharing and binded the artists with all-encompassing contracts, taking the music out of their hands: you are not allowed to perform your own songs in public without your label sanctioning it (and making millions from your fans by selling them beer) first because, technically, they are not your songs any more.
In return, the label sends its armies of lawyers (along with corrupt government elements) to Hell and beyond to track, terrorize and imprison teenagers who had the audacity to publicly share even a small exrept of the (formerly yours) work, and grand you your 0.00000000001% cut from the process.
I only know the book publishing "established" rules a little bit, and -unexpectedly- they are not too much in favor for the writer either.
A good initiative, especially in the music industry, is to have different classifications: streaming is not vinyl is not concert, and those things need to be handled seperately. Artists need to stop signing those all-encompassing deals and a very good start would be e.g. to use a label to produce an LP, then go to a different label and let them handle your content via streaming on the internet: do NOT give up all rights for your art, because that is what you live from. The labels will resist of course but if enough artists do it, then it is done.
Comment: Re:Vive le Galt! (Score 1) 695
by arisvega (#46361663) Attached to: Mt. Gox Gone? Apparent Theft Shakes Bitcoin World
[..] an outlandish system of universal volunteering which barely even works in theory let alone practice?
I understand how you may be convinced that money is the only viable option, and other systems that you are conditioned to believe that 'barely even work in theory' seem to you like naive romantic notions. A world without money? How is that even possible, right? THAT is how bad the situation is.
The request was that you be less ridiculous, not as utterly absurdly ridiculous as possible.
Instead of acting like an opinionated smartass, may I suggest that you direct your vigor towards actually investigating a few of those 'outlandish' systems and their underlying principles: ubuntu may be a very good place to start.
Comment: Re:Vive le Galt! (Score 1) 695
by arisvega (#46335481) Attached to: Mt. Gox Gone? Apparent Theft Shakes Bitcoin World
Volunteering isn't bartering. Assuming you meant bartering...
It is not bartering in the strict meaning I guess, no. Still I did not mean bartering, I meant exactly what I said.
in exchange for what?
In exchange for nothing! That is what volunteering means!
Picture everybody doing this --or for starters, picture a small town doing this, so you can also get an idea of how it can spread to neighboring towns.
Consider this scenario: a bridge breaks, and needs to be fixed: it needs engineers, masons perhaps, other experts, workers, all that. Those are the the ones that are going to physically fix it. It may also need replacement material, which has a 'cost' (a monetary cost). Last, there is a bunch of politicians and burreaucrats that have to rule on the economics and whatnot and the rest of the 'administrative stuff' regarding the rebuilding of the bridge, which is a crowd that somehow has hypnotized everyone over the years into believing that their work is essential.
In this scenario, the town's experts volunteer time to do their best to fix the bridge. The town's best minds, via an emergent selection from the town itself, are on to it. People who have nothing direct to volunteer, volunteer snacks and entertainment for the people who do the work. Snacks get too many too soon, and the town has an excess that it can perhaps DONATE to a neighboring town (that is going through a similar 'bartering', if you want to call it as such, process) and that neighboring town may have an excess of bridge material (the material that has a 'cost') to DONATE to the town with the faulty bridge.
Where does money fit here? Nowhere. Where do burreaucrats fit here? Nowhere. Bridge gets fixed? Hell yes.
As long as people keep greed in check, this can work surprisingly well.
Comment: Re:Exactly what I was thinking (Score 1) 365
by arisvega (#46188923) Attached to: Do Hypersonic Missiles Make Defense Systems Obsolete?
Also how much of a payload can one missile really carry? Not much, good only for targeted strikes.
For your edification: a hypersonic missile DOES NOT NEED to carry ANY payload. The missile itself IS the payload, which is part of the whole 'hypersonic' point (the other part being to be able to hit globally in under 60 minutes).
|
global_01_local_0_shard_00000017_processed.jsonl/11942 | Forgot your password?
Comment: Re:This is why patent reform must outlaw suppressi (Score 1) 377
by boutell (#35773324) Attached to: New Gasoline Engine Prototype Claims 3X Current Engine Efficiency
Comment: What a dumb way to spin the story (Score 1) 212
by boutell (#34876104) Attached to: Amazon EC2 Enables Cheap Brute-Force Attacks
Comment: Re:150 in one (Score 1) 458
by boutell (#34297836) Attached to: Thought-Provoking Gifts For Young Kids?
Comment: Re:Good for everyone (Score 1) 186
by boutell (#33519642) Attached to: Rupert Murdoch Publishes North Korean Flash Games
Comment: Active Directory (Score 1) 365
by boutell (#17066812) Attached to: Is Microsoft An Innovator? - The Winer-Scoble Debate
I'm not a huge Microsoft fan, but Active Directory is one innovation of theirs that's tough to argue with.
All things considered, Active Directory is a very well-thought-through directory system that doesn't seem to be a mere refinement of a competitor's system. At least not when you consider its most innovative features like multimastering. Linux and Unix in general are still playing catch-up with AD and it's been out for years.
Yes, I know about NIS/YP, but it's more appropriate to compare simplistic flat systems like that to old-style NT domains. AD is several quantum jumps beyond that. Who had a really usable enterprise-class distributed hierarchical directory service before Microsoft?
AD does so much so well that it's possible to, for instance, set up intranet secure web servers and have them get their keys automagically through AD. Compare that to the hoops you jump through to do anything similar on Linux.
Remember, UNIX spelled backwards is XINU. -- Mt. |
global_01_local_0_shard_00000017_processed.jsonl/11943 | Forgot your password?
Comment: The teachers unions are skewed the wrong way (Score 1) 399
by markass530 (#46076049) Attached to: California Students, Parents Sue Over Teacher Firing, Tenure Rules
Read an article a while back in LA weekly, like 10 pages about how impossible it was to fire bad teachers. I Don't remember exactly what this one middle school teacher said to a female student, but I remember thinking if I ever heard him say that to my niece, I would walk over and slug the guy. And that wasn't his first or last offense either, he was skeevy as hell. He continued to teach for months, and then got paid for YEARS TO do nothing.
|
global_01_local_0_shard_00000017_processed.jsonl/11944 | Forgot your password?
Comment: What could be gleaned from exact numbers? (Score 1) 117
by sapped (#46103139) Attached to: DOJ Announces New Methods For Reporting National Security Requests
What could the terrorists (as if it's even remotely about them anymore) glean from the exact numbers that they couldn't deduce from rounded numbers? I.e. what state secret goes out the window if we knew 1024 NSLs were sent to Google rather than 1000-2000? This is what bugs me the most about petty pointless crap like this. They graciously are "allowing" us to know the rough numbers but give no justification for the added secrecy.
Comment: Re:simple (Score 1) 381
by sapped (#44236165) Attached to: Ask Slashdot: Preventing Snowden-Style Security Breaches?
Sorry, but you're wrong with those numbers. If the police stopped and searched 100 cars, and all 100 of those people were breaking the law, they find 9 people who are breaking the law.
In reality you would have to stop 1000s of cars before you caught 9 people breaking the law.
Comment: Re:Google Voice: Add PER CONTACT calling preferenc (Score 1) 172
by sapped (#44120919) Attached to: Is Google Voice Doomed To Be 2nd-Class Messaging System?
Use an app called Voice Plus https://play.google.com/store/apps/details?id=com.bbrother.googlevoicebyname&feature=search_result#?t=W251bGwsMSwyLDEsImNvbS5iYnJvdGhlci5nb29nbGV2b2ljZWJ5bmFtZSJd You can set area codes to be dialed with your regular number or groups within GV to be dialed with regular numbers. It's indispensable when using GV.
Comment: Re:Miranda (Score 1) 768
by sapped (#43952711) Attached to: Seeking Fifth Amendment Defenders
I think the OP is assuming that the set of criminal *statues* is small and they are concretely defined. Just California has over 34000 intentionally ambiguos *statues* in its penal code. So there is absolutely no way for a common citizen to live a life that doesn't violate a single one of those *statues*. California passes statutes and then has a statue made to represent each of these statutes? And then those poor statues are violated as well? It's a good thing I don't live there. Also, they might be able to cut back on their budget problems if they just stopped making all these damn statues.
|
global_01_local_0_shard_00000017_processed.jsonl/11945 | Forgot your password?
Comment: Re:This'll be Nice (Score 1) 314
by vaksion (#20125893) Attached to: World of Warcraft - Wrath of the Lich King Officially Announced
Wow. What class was his Piglet? I bet it had the magical power of shooting bacon. The bacon would cause 'Sizzling Burn' on the target causing 20 food damage every 5 seconds. That would be a racial thing. And they could have resistance to things like Bleed and stuff, those would be racial passive .... oh the wild imagination I have .... lol. What guild is it?
|
global_01_local_0_shard_00000017_processed.jsonl/11955 | Take the 2-minute tour ×
Most music editing programs will tell you the BPM of a song, but how do they calculate it? Obviously they try to find some sort of constant pulse throughout the song, but:
• how are they separate from other sounds? How is a 'beat' found in the audio?
• How are tempo changes handled, are they averaged together or is it based on longer duration of a specific tempo?
• How would BPM calculation be different for say, an acoustic guitar solo (harder) than from a pop song (easier)?
(if we had the community wiki for questions back I'd invite people to edit in their own questions so this can serve for a more complete reference)
share|improve this question
If you want a question to be community wiki, you could ask a moderator to convert it to a community wiki question. But I don't feel that this question would benefit from being community wiki, as knowledge of BPM calculation is an expertise worth the reputation and only a very small amount of users know something about it. – Tom Wijsman Dec 24 '10 at 20:43
add comment
migrated from video.stackexchange.com Feb 21 at 10:54
1 Answer
up vote 10 down vote accepted
It basically amounts to emphasizing the sudden impulses of sound in the song and then finding the fundamental period at which these impulses appear. This is done by breaking the signal into frequency bands, extracting the envelope of these frequency-banded signals, differentiating them to emphasize sudden changes in sound, and running the signals through a comb-filterbank and choosing the highest energy result as our tempo.
Beat This - Beat Detection Algorithm
The first three steps should be easy to understand, let's look at the last step:
A comb filter adds a delayed version of a signal to itself, causing constructive and destructive interference. The frequency response of a comb filter consists of a series of regularly-spaced spikes, giving the appearance of a comb.
Wikipedia - Comb filter
The last step uses such a comb filter to figure out the BPM, as you can see on this graph (145 BPM spike):
alt text
You also see a spike at 72,5 BPM, the inference pattern also creates spikes at the half and double frequencies. This is the reason that software sometimes picks the half or double BPM instead of the real BPM.
GameDev.net - Beat Detection Algorithms explains the whole thing in more depth.
How are tempo changes handled?
Most algorithms don't support tempo changes, they will either pick a part in the middle to determine the BPM or decide to calculate an average BPM as you suggested. From a DJ perspective I haven't seen an algorithm yet that supports mixing two songs with a dynamic BPM...
How would BPM calculation be different?
This doesn't depend on instrument or genre, but rather how it is played. For example, in an electro pop song the algorithm can easily be confused in a bridge part of the song or due to some kind of due to those overused digital effects. For the guitar, if you play a classic part with accurately timed notes it would be easy for the algorithm do determine the BPM you are playing.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11968 | The Environmental Spectator
Cap and Pollute
The sober green case against cap and trade.
By 7.2.09
Send to Kindle
The House passage of the American Clean Energy and Security Act Friday was billed as a narrow victory for President Obama and the green lobby. But was it a victory for real environmentalism?
Sadly, no. The legislation's many loopholes that had to be added to secure its passage will make it far less effective -- to be charitable. The "cap and trade" regime that the bill would create promises to ratchet down carbon emissions over time but creates a dangerous precedent for the environment.
Cap and trade essentially creates a property right out of polluting. Once Company A has an emissions permit, it can release a certain amount of carbon dioxide into the atmosphere. Or it can sell its permit rights to Company Z.
The bright idea is to create an incentive to decrease carbon emissions so that a company can profit off its excessive permits. In reality, what it does is create an enforceable right to pollute.
In the past, pollution was seen as a sort of "necessary evil" that could be regulated or rescinded if necessary. Now companies will have a right to pollute because they were already in the polluting business and were grandfathered in, or because they paid good money for that right.
Cap and trade guarantees the right to pollute over a certain, fixed amount of time. The bill ratchets down the amount of carbon emissions allowed over time by a schedule. That sounds like a win for environmentalism. However, the percentages and dates create expectations that go along with these permits being sold.
Companies will purchase permits from each other with the expectation that they will be able to emit a specific amount of carbon over a specific time period. These percentages and dates are political goals and are not based on solid scientific research.
That could lead to unexpectedly bad results. For example, the amount of carbon emissions allowed could turn out to be incredibly dangerous to the public. Under a cap and trade regime, if the government attempts to "fix" the problem the action would amount to a "taking." Lawyers would then tie it up in court for years.
And the "cap" part of cap and trade is hardly set in stone. The bill allows companies to offset their carbon emissions beyond their permitted use by "helping the environment" in some other politically favored way.
For example, if a company pays to preserve an acre of rain forest, it secures the right to release more carbon emissions. That might superficially seem to maintain the balance between carbon producers and carbon reducers, but that balance is a convenient myth.
Forget for a moment that the generous offsets allowed by the bill were crafted in response to industry prodding. There is no hard evidence that carbon offsets actually work.
And, remember, the environment is far bigger than the United States. Companies can often go elsewhere. Congress has to take into consideration that pushing companies out of the United States into other, less regulated areas, would have the opposite effect of the bill's intention.
Politicians need to realize there is a difference between doing "something" to help combat global warming and doing "anything" on that front.
It's unwise to ram a 1,500-page bill through the House in the dead of the night -- with a last minute 300-page amendment tacked on to buy needed votes -- and expect that to work.
All it amounts to now is a "feel good" bill with no realistic environmental benefits at a huge cost to individuals.
Like this Article
Print this Article
Print Article
About the Author
Jeanne Marie Hoffman is a writer in Alexandria. |
global_01_local_0_shard_00000017_processed.jsonl/11980 | Take the 2-minute tour ×
I've got a tab control with a region attached to it and I've also got a content control inside my tab controls content with another region.
The problem I'm having is - if I call RegisterViewWithRegion it adds the view to the region no problem (first time that is, get issues if you swap tabs). But this isn't very flexible and I'm looking for a better way to do that.
When I look inside IRegionManager.Regions as well - I can only see the two top level regions. I cant see my sub region TabContentRegion. Is there a way to register this so I can just work in the usual way with adding views and activating them?
<TabControl TabStripPlacement="Left"
SelectedItem="{Binding SelectedTab}">
cal:RegionManager.RegionName="TabContentRegion" />
This code adds the views to the TabRegion
public void Load()
IConfigurationDetailsPresentationModel convDetailsView1 =
IRegionManager manager = this.Container.Resolve<IRegionManager>();
manager.RegisterViewWithRegion("TabRegion", () => convDetailsView1);
IConversationDetailsPresentationModel conversationDetails =
manager.RegisterViewWithRegion("TabRegion", () => conversationDetails);
Then this is the code I've been using to actually display the view in the TabContentRegion
public IPresentationModel SelectedTab
get { return _selectedTab; }
_selectedTab = value;
IRegionManager service = this.Container.Resolve<IRegionManager>();
if (service != null)
() => _selectedTab.View);
As you can see - it's a bit janky and doesn't quite work. Any ideas what I'm doing wrong?
Thanks for any help!
share|improve this question
add comment
1 Answer
up vote 0 down vote accepted
After alot of playing and googling I finally came across and answer!
because the region was inside a datatemplate, that ment that prisms standard behaviours wouldn't pick it up and register it with the region manager.
using the code provided here it helped me to fix this and carry on as normal! :)
cheers. ste.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11981 | Take the 2-minute tour ×
I have a Regex object created with the new Regex(string pattern) constructor, is there a way afterwards to see what pattern the regex object was created with?
I can't seem to be able to access the "pattern" string member in either the Regex or in RegexOptions objects.
Context: Reason I'm asking is I'm creating a few regex objects early on while initializing (patterns are stored in a config file), they then get passed to a different class to be used frequently. However, I also need to compare the pattern string to those stored in a SQL database at run-time.
I would prefer not having to pass a string with the pattern in addition to the regex object. I also feel that creating the object once at startup is not a bad idea since the regex will be reused hundreds of times?
Feel free to provide alternative advices.
share|improve this question
protected internal string pattern That's really awkward... – Andre Calil Aug 19 '12 at 2:49
@Andre Calil Hmm.. perhaps they wanted to keep the freedom of modifying the patterns internally for compatibility or optimization purposes. – mtone Aug 19 '12 at 2:57
add comment
2 Answers
up vote 5 down vote accepted
So, in the debugger hovering the cursor over a regex object was showing the pattern, so it had to be close. Turns out Regex.ToString() returns the pattern.
ToString: Returns the regular expression pattern that was passed into the Regex constructor.
share|improve this answer
Easiest solution. No need to create a whole new class. – John Davis Aug 19 '12 at 4:01
Ha, brilliant! You might want to mark that as the answer. – Fabian Tamp Aug 19 '12 at 13:28
add comment
It doesn't seem like you can do it like this, seeing as the Regex.Pattern field is marked internal.
You are correct in saying that it's a good idea to create the object once and reuse it multiple times, but passing the string as another parameter might be your only option.
If you really want to avoid doing that, you could create a new class that inherits from Regex, and then sets a Pattern property in the constructor, as follows:
public class MyRegex : Regex
public String Pattern {protected set; get;}
public MyRegex(String Pattern) : Regex(Pattern)
this.Pattern = Pattern;
share|improve this answer
Thanks for your answer, and I like this suggestion! – mtone Aug 19 '12 at 2:58
No problem, glad it helped. – Fabian Tamp Aug 19 '12 at 3:13
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11982 | Take the 2-minute tour ×
I've been struggling with this for some time now.
So I have a simple file called index.php encoded in UTF-8. The content of this file is:
$html =
'<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"/><style> body { font-family: verdana; } </style></head><body>'.
'templating system.</p><p>Č Š Ž č š ž €</p>'.
$dompdf = new DOMPDF();
Basically I'm trying to show the letters Č Š Ž correctly in PDF. Š and Ž work fine but I can't seem to get Č to show up properly, instead I see ? in my PDF file. Any ideas?
share|improve this question
try a different font, you can specify fonts in dompdf – Dagon Sep 20 '12 at 3:08
I tried all the fonts that are available, I'm also 100% sure that Verdana supports Č. – Erik Kralj Sep 20 '12 at 3:09
@Erik see Fabien's response. Verdana does support the character, but if the font isn't loaded into dompdf it won't be able to use it. Without a supporting font you'll get the results you noted. – BrianS Sep 20 '12 at 14:54
add comment
1 Answer
The guide to enable Unicode in DOMPDF may help you. If you are using the latest version (0.6beta or trunk), there is also a new font installer in dompdf/www/fonts.php via your web browser, at the bottom. Also, be sure to check dompdf/www/setup.php.
share|improve this answer
Also, with 0.6.0 beta 3 you can skip loading a font and try one of the DejaVu fonts instead (e.g. try DejaVu Sans). – BrianS Sep 20 '12 at 14:55
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11983 | Take the 2-minute tour ×
How can I configure ELMAH to display only for certain people without default ASP.NET authorization roles manager?
I (as well as many others, I think) use my own authorization logic and build my projects from zero without using provided templates. I want to log errors but it seems that it is impossible to configure ELMAH (somehow override functionality) to make it work with some other authorization or even to make it work only for particular IP addresses.
Since I will have access to web.config I tried to change these values in order to NOT display elmah by default.
<add key="elmah.mvc.requiresAuthentication" value="false" />
And when I want to view errors switch them from true to false and see errors, then switch back. But it seems that when I change these values all logs are erased.
What can I do?
share|improve this question
Allowing users access by username doesn't work? If, on login, you set an authentication cookie with something like FormsAuthentication.RedirectFromLoginPage it should work. In your custom authorization, do you set people in roles? – MikeSmithDev Jan 23 '13 at 14:07
@MikeSmithDev I'm not even using Roles or Cookies. I just have a admin page where user logs in and session is created. It's all done by me, no MS code. – Steve Jan 23 '13 at 14:14
add comment
2 Answers
up vote 5 down vote accepted
I think the easiest approach would be to make some minor alterations to your custom authorization so the ELMAH authorization will work.
Option 1: Set the FormsAuthentication cookie on login. This way, in the web.config the allow users="username" should work. On successful login you can set the cookie with FormsAuthentication.SetAuthCookie(theUsername, true).
The ELMAH authorization would look something like:
<allow users="theUserName" />
<deny users="*" />
...other config settings
Option 2: If you are using putting users into roles, you can override the default role provider to use the function you made to get roles. This way is a little more involved but then lets you harness role-basing authentication in the web.config, which is really nice for securing things like static file (.pdf etc) delivery. I can add code for this if interested.
share|improve this answer
Works. It really does not care for username tho. But whatever, at least now only when you log in to admin panel session is created and only then you can view /elmah. Thanks. – Steve Jan 23 '13 at 14:33
add comment
It doesn't matter how the system gets the username or roles in this case. Whether it be from the built-in providers, a provider you implement yourself, or if during your custom authentication you populate this information yourself. All it takes is to manually set the principal during something like the Application_PostAuthenticationRequest event. This should give you the jist of it.
protected void Application_PostAuthenticateRequest(object sender, EventArgs e)
//Obtain username and roles from application datastore and use them in the next line
Thread.CurrentPrincipal = new GenericPrincipal(
new GenericIdentity("userNameHere"),
new string[] { "Admin", "CanDeleteStuff", "CanEditStuff", "OtherRole" }
This will let you use something like this in your web.config
<allow roles="Elmah"/>
<deny users="*"/>
Not to mention being able to use User.IsInRole("CanEditStuff") in your code.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11984 | Take the 2-minute tour ×
Can any one help me how to convert Multipage .pdf to Multipage .tiff in c# in window application using PDFSHARP?
What are some methods I can call with buttons or some tutorials to do this?
share|improve this question
add comment
2 Answers
up vote 0 down vote accepted
With PDFsharp you cannot convert PDF to TIFF.
It's possible to convert TIFF to PDF (but that's off topic here).
share|improve this answer
Hey thanxxx man!! – user2028367 Feb 26 '13 at 6:13
add comment
Here is the link for you to convert pdf to tiff and vice versa. Hope this gives you a start!
and If you want to use ABCPdf here is the link for that
share|improve this answer
i am not able to implement that code....Thanks but can you provide some method or code for this...like taking file from opendialogue and converting it to tiff on button click..???? – user2028367 Feb 22 '13 at 7:39
can you please combine the code for me i am not able to understand the flow of code contained in your link....and i need only open source free library – user2028367 Feb 22 '13 at 11:06
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11985 | Take the 2-minute tour ×
I have a variable in Universal.vb module in my Windows Store App (Windows 8/8.1).
Public TestMaze As Boolean = (GtSt("MazeOn", 0) = 1)
I want to use TestMaze in a XAML page to turn on/off a ToggleButton. The code looks like this:
<ToggleSwitch x:Name="chkMaze" IsOn={StaticResource TestMaze}"/>
What is the right method to do it?
PS: I do not want to do it on Loaded event of the page because it cause an impulse flicker in ToggleButton. PS2: GtSt is a function I defined for quicker access for RoamingSettings.
Public Function GtSt(SettingName As String, Optional DefaultVal As Double = 0) As Double
Dim ProgSet = Windows.Storage.ApplicationData.Current.RoamingSettings
If Not ProgSet.Values.ContainsKey(SettingName) Then
SvSt(SettingName, DefaultVal)
End If
GtSt = ProgSet.Values(SettingName)
End Function
share|improve this question
The redundant department of redundancy called, they want their If(condition, True, False) back. Just write condition. – Konrad Rudolph Jul 20 '13 at 18:34
Oops! hahaha. My bad. I don't appreciate redundancy neither. – Ajay Raghav Jul 21 '13 at 16:03
add comment
1 Answer
up vote 1 down vote accepted
I achieved my goal by writing
chkMaze.IsOn = TestMaze
on the SizeChanged event of the page. I didn't knew SizeChanged occurs before Loaded.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11986 | Take the 2-minute tour ×
I want to use jQuery's .get method to send an ajax call to the server.
I am using this line:
$.get("InfoRetrieve", { },addContent(data));
As you can see I want to call a function call addContent and pass it the data that is retrieved from the server.
The function addContent is below:
function addContent(data){
It doesn't seem to work, can you see why.
share|improve this question
I am not passing any data at the moment, I have left the {} as I will be soon. – Ankur Dec 2 '09 at 7:04
add comment
2 Answers
up vote 6 down vote accepted
Just change it to:
$.get("InfoRetrieve", { },addContent);
It will take care of passing data when it calls the function.
share|improve this answer
It makes no sense that it works that way but it works! – Ankur Dec 2 '09 at 7:09
When you tried to use it like this addContent(data), you were actually triggering the function, not passing a reference to it. By omitting the (data) you passed a reference to your function that $.get could call upon success. – Doug Neiner Dec 2 '09 at 7:12
I see :) thanks – Ankur Dec 2 '09 at 7:15
@dcneiner: +1, you got it, I mis-readed the question... – CMS Dec 2 '09 at 7:19
add comment
Try wrapping it in a new function object:
$.get("InfoRetrieve", { },function() { addContent(data) });
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11987 | Take the 2-minute tour ×
I have a controller 'User' & action 'index', it it's view file with '$this->requestAction' I am calling a different controller & action. Like this:
//My html code
<?php echo $this->requestAction('anotherController/anotherAction'); ?>
//My html code
Now, the problem is in 'anotherController' & 'anotherAction', I want to get the requested Controller 'User' & Action 'index' with '$this->params' arrays, but it gives me 'anotherController' as current controller & 'anotherAction' as current action. Like
public function anotherAction(){
//It gives me
//['controller'] = anotherController
//['action'] = anotherAction
//I want to get the requested controller & action of url here
//which should be 'Users' & 'index'
$_SERVER['REQUESTED_URI'] gives me the url but is there any better way to find out what is the Controller & Action here from URL?
share|improve this question
It would be useful to show why you're using request action at all - typically using request action in a controller indicates poor application design. (e.g. calling code in a controller action that should be in a model). – AD7six Dec 31 '13 at 15:49
Yes, it is true, I know it is a poor coding style, but I am not very expert in cake. I was trying to generate the <title> in my layout depending on Controller & Action & parameters, that's why i'm calling requestAction in my layout file when I don't know which controller or action will be called, if you have any better idea, please, advice me. Thanks – user2432443 Jan 1 at 10:27
In the absence of any code/details my advice is: Don't do that =). – AD7six Jan 1 at 12:17
add comment
1 Answer
up vote 0 down vote accepted
You can pass it as a parameter
array('controller' => 'anotherController', 'action' => 'anotherAction'),
array('pass' => array('curentController','currentAction'))
You can then get the parameters as
Syntax for requestAction: requestAction(string $url, array $options)
share|improve this answer
Thanks, bro, it works fine for me :) – user2432443 Dec 31 '13 at 9:12
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11988 | Take the 2-minute tour ×
Is there a command or a variable that shows me all the different warnings which get enabled when I use the warning-pragma?
share|improve this question
add comment
2 Answers
up vote 6 down vote accepted
perldoc perllexwarn shows the hierarchy of categories warnings uses.
share|improve this answer
add comment
perldoc perldiag
The output starts:
perldiag − various Perl diagnostics
(W) A warning (optional).
(D) A deprecation (optional).
(S) A severe warning (enabled by default).
(F) A fatal error (trappable).
(X) A very fatal error (nontrappable).
The majority of messages from the first three classifications above (W, D & S) can be controlled using the "warnings" pragma.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11989 | Take the 2-minute tour ×
I'm designing a contact manager/address book-like application but can't settle on the database design.
In my current setup I have a Contact, which has Addresses, Phonenumbers, Emails, and Organizations. All contact properties are currently separate tables with a fk to the Contact table. Needless to say a contact can have any number of these properties.
Now, I find myself joining all these tables together if I want to read contacts into the app. Since no filters, reverse lookups, sorts etc. are performed on the related tables, isn't it a better/simpler solution to just store the related fields as json-encoded lists on direct properties of the Contact table?
E.g., instead of a Contact with a fk to a phonenumber table with 3 entries, just encode all phonenumbers and store them into a field of the Contact table?
Any insights really appreciated! (fyi I'm using Django although that doesn't really matter)
share|improve this question
add comment
3 Answers
up vote 6 down vote accepted
Can you guarantee that your app will never grow to need these other functionalities? Do you really want to paint yourself into the corner such that you can't easily support all of this later?
Generally, denormalization happens only for preformance reasons. And then, a copy of the normalized data is still kept for live work and the denormalized data is used for offline processing where having a static snapshot is fine.
Get used to writing joins. That's the way SQL works. Having to do so doesn't meant something is wrong.
share|improve this answer
+1...I agree 100%! – John Hartsock Dec 23 '10 at 0:34
add comment
I know I'm too late, but for anyone with the same issue.
IMO, in this case metadata modeling is the way to go. http://searchdatamanagement.techtarget.com/feature/Data-model-patterns-A-metadata-map
share|improve this answer
add comment
Sounds like you propose taking data currently modelled as five SQL tables and converting it to a common multi-valued type (does your SQL product have good support for this?) The only way I can see this would constitute 'denormalization' would be if you were proposing to violate 1NF, at which point you may as well abandon SQL as a data store because your data would no longer be relational! Otherwise, your data would still be normalized but you will have lost the ability to query its attributes using SQL (unless your SQL product has extensions for querying multi-value attributes). The deciding factor seems to be: do you need to query these attributes using SQL?
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11990 | Take the 2-minute tour ×
Good day to all.
I must create a table cell with a fixed height and with but with a lot of content... something using overflow: auto. The problem is that I can't use display: block on a table cell (it kind of breaks the table layout) so I tried just this:
height: 100px;
overflow: auto;
position: relative;
width: 1280px;
But... not working.
Can any1 help? Thank you.
<td colspan="3" style="width: 1280px; overflow:auto;">
{assign var="latime" value=$agenda|@count}
{assign var="latime" value=$latime*150}
<div style="width: 1280px; position: relative; overflow: auto; ">
<div style="width: {$latime}px; height: 100px; position:relative;">
{assign var="i" value=0}
{foreach from=$agenda item=ag}
{assign var="img" value=$agenda[$i][3]}
<img src="{$img}" id="imag{$i}" onclick='schimbaslidetoti({$i})' />
{assign var="i" value=$i+1}
share|improve this question
I'd need to see more code (or a link) to understand your question better. – werm Apr 14 '11 at 11:16
why not use overflow: scroll explicitly? auto is browser dependent AFAIK. – Felix Dombek Apr 14 '11 at 11:33
add comment
2 Answers
You can nest a block-level div with the overflow:scroll property set inside the table cell. ie
<td><div style="overflow:scroll;">Content</div></td>
share|improve this answer
add comment
up vote -8 down vote accepted
Resolved... I used a div with that properties and inserted it in the table cell.
share|improve this answer
can you show me your html by editing your question ?? – asharajay Apr 14 '11 at 11:20
So, shouldn't you mark DavW's answer as the correct one instead of your own? – pkExec Jun 19 '13 at 11:32
If you check the date mine was first. I up-ed his because was correct, but mine was faster and the same. Why should I accept an answer that might be a copy of mine? – zozo Jun 19 '13 at 11:42
2 minutes hardly matters when he came to the table with examples. – fiXedd Jul 9 '13 at 6:41
Please show your code – alias51 Dec 28 '13 at 10:30
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11991 | Take the 2-minute tour ×
I am new to OpenCL programming and my input is a 3D array. I am calculating the index as:
int gidX = get_global_id(0)?1:get_global_id(0);
int gidY = get_global_id(1)?1:get_global_id(1);
int gidZ = get_global_id(2)?1:get_global_id(2);
int index = gidX + (gidY*SizeX) + (gidZ*SizeY*SizeZ);
Is this the right way to do it? How do I use the local thread ids with 3d arrays? I had used it with 2d arrays as:
int tid = get_local_id(0);
int gid = get_global_id(0);
int index = tid + gid*width;
And, is there a way I could use image3d_t type for my 3D volume?
share|improve this question
add comment
2 Answers
up vote 1 down vote accepted
It depends how you have your 3D array linearized to memory.. but Rick's answer coded as an inline function would work fine. The other optimization you may want are prefetching to local memory when possible.
/* Visualize as a cube. You are looking at the front in x,y coordinates. Z is depth. You have stored it by starting at (x=0, y=0) and taking the depth z lists of elements one by one and placing them in a contiguous array.*/
//Inline this
int matrix3D_lookup(int x, int y, int z, int sizeZ, int sizeX){
return z+ sizeZ*x +(sizeZ*sizeX*y);
share|improve this answer
add comment
What you seem to need is some basic information about the functionality and working principles of OpenCL. Please have a look to the following links:
1. http://developer.download.nvidia.com/compute/cuda/3_2_prod/toolkit/docs/OpenCL_Programming_Guide.pdf
2. http://www.nvidia.com/object/cuda_opencl_new.html
3. http://developer.download.nvidia.com/compute/cuda/3_0/sdk/website/OpenCL/website/samples.html
You code samples for getting gidX, gidY and gidZ do not make much sense and the calculation of the index is wrong, too. The calculation depends on the ordering of your 3D matrix. It should look something like:
int index = x + y * sizeX + z * sizeX * sizeY;
But you should check the documentation first. Especially the working principle of the local ids are not explained quickly.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11992 | Take the 2-minute tour ×
I have rails 3 app that generates a lot of requests for analytics. Unfortunately this drowns the logs and I lose the main page requests that I actually care about. I want to separate these requests in to a separate log file. Is there a way to specify certain actions to go to a certain log file? Or possibly a way to reduce the logging level of these actions, and then only show certain level logs when reading back the log file?
share|improve this question
add comment
2 Answers
up vote 4 down vote accepted
I found this site, which talked about using a middleware for silencing log actions. I used the same sort of idea and ended up writing a middleware that would swap the logger depending on which action was being called. Here is the middleware, which i put in lib/noisy_logger.rb
class NoisyLogger < Rails::Rack::Logger
def initialize app, opts = {}
@default_log = Rails.logger
# Put the noisy log in the same directory as the default log.
@noisy_log = Logger.new Rails.root.join('log', 'noisy.log')
@app = app
@opts = opts
@opts[:noisy] = Array @opts[:noisy]
super app
def call env
if @opts[:noisy].include? env['PATH_INFO']
logfile = @noisy_log
logfile = @default_log
# What?! Why are these all separate?
ActiveRecord::Base.logger = logfile
ActionController::Base.logger = logfile
Rails.logger = logfile
# The Rails::Rack::Logger class is responsible for logging the
# 'starting GET blah blah' log line. We need to call super here (as opposed
# to @app.call) to make sure that line gets output. However, the
# ActiveSupport::LogSubscriber class (which Rails::Rack::Logger inherits
# from) caches the logger, so we have to override that too
@logger = logfile
And then this goes in config/initializers/noisy_log.rb
Rails::Rack::Logger, NoisyLogger, :noisy => "/analytics/track"
Hope that helps someone!
share|improve this answer
add comment
One option could be using a service like New Relic which would give you the required scoping (per action).
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11993 | Take the 2-minute tour ×
I have a project which worked great under Xcode 3.2.x. Under Xcode 4.2, I'm getting the following error when compiling:
"error: unknown type name 'BOOL'; did you mean 'BOOL'?"
I can right click on the offending BOOL and Xcode will jump to Apple's definition. BOOL is defined in <objc/objc.h>, so I included it in my source file (despite the fact that I'm using precompiled headers with UIKit.h and Foundation.h). Still no joy - the compile error persists.
Any ideas for Xcode 4 work arounds would be appreciated. Google is offering 0 hits.
EDIT: added the offending code to remove any ambiguity.
// AppConstants.h
typedef enum { ThreadPriorityLow = NSOperationQueuePriorityLow, ThreadPriorityNormal = NSOperationQueuePriorityNormal,
ThreadPriorityHigh = NSOperationQueuePriorityHigh, ThreadPriorityDefault = ThreadPriorityNormal } ThreadPriority;
static inline BOOL IsValidThreadPriority(ThreadPriority priority)
return priority == ThreadPriorityLow || priority == ThreadPriorityNormal || priority == ThreadPriorityHigh;
EDIT: after looking at the source under Emacs and HexFiend for illegal characters and finding none (source is 8-bit clean), I'm inclined to believe this is due to some kind of bug on Apple's part.
share|improve this question
Which line of code is triggering this error? Which BOOL did you right-click on in that line? – BoltClock Oct 13 '11 at 8:35
@BoltClock - "did you right-click on in that line" - Of course I did :) – noloader Oct 13 '11 at 8:38
Were you still getting the error after including objc.h? Your question is a little ambiguous on that point. – JeremyP Oct 13 '11 at 8:40
@JeremyP - OK, I bite. Why would I ask the question if I had already fixed the problem? Forgive my snippiness - Apple bricked my iPod tonight too. – noloader Oct 13 '11 at 8:46
@noloader: The question could have been read as "I got it working by including objc.h but is there a better solution" – JeremyP Oct 13 '11 at 11:14
show 1 more comment
2 Answers
A wild guess is a special character that appeared on your line, you were probably using some special character encoding in XCode 3 and opening the file in XCode 4 triggers this error.
To see if this answer is correct I would recommend you cat or vim the file in your terminal and see if some wild characters are located at this specific line.
Let us know if this works
share|improve this answer
@apouche - Under emacs, it looks like all the characters are 8 bit clean. – noloader Oct 13 '11 at 9:02
(an earlier version of) clang barfed when it encountered a header with a BOM. took hours to find it, and i had to locate the issue by sending it through a trunk build of clang. – justin Oct 13 '11 at 9:02
@apouche - Under HexFiend, all the characters on the offending line are 8 bit clean (7 bit ASCII). – noloader Oct 13 '11 at 9:24
HexFiending was a good idea, you problem seems tricker than it appeared at first. Keep us posted if you find the solution – apouche Oct 13 '11 at 9:33
@Justin - you should have answered - it was a broken LLVM 3.0 front end. – noloader Oct 13 '11 at 9:59
show 2 more comments
up vote 2 down vote accepted
It was broken Apple software.
Apple disregarded my 3.2.6 projects settings and decided to use the LLVM 3.0 suite rather than GCC 4.2. Previously (under Xcode 3.2.6), I had specifically set the project to use GCC due to my extensive use of GCC warnings and flags.
After I changed 'Build Settings' -> 'Compile for C/C++/Objective' back to GCC 4.2, it worked.
Apple Radar 10278815 reported, and LLVM Bug 11126 reported. Hopefully Apple will fix it before Xcode 5.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11994 | Take the 2-minute tour ×
I'm have a WAR file export from eclipse, now i want to deploy into server tomcat running on linux server hosting, but i can't set up to run this project ? I'm using RICHFACES 4, Tomcat 6 I've already copy WAR file to folder webapps but server didn't deploy WAR file. Thanks for helping and sorry about my bad English.
share|improve this question
add comment
2 Answers
You seem to be using a 3rd party hosting. You need to read their developer documentation / user guide how to deploy web applications to it. On most (usually the elcheapo ones), you need to extract the WAR yourself and then upload the WAR's contents to the "public" www folder yourself. A WAR file is basically a ZIP file, so you should be able to extract it yourself with any ZIP tool.
share|improve this answer
add comment
1. Stop Tomcat.
2. Delete existing deployment. If you have previously deployed "foo.war" in TOMCAT_HOME/webapps, then it has been unpacked into webapps/foo/... You must delete this directory and all its contents. On Unix, this can be done with rm -r $TOMCAT_HOME/webapps/foo
3. Copy WAR file to TOMCAT_HOME/webapps/.
4. Start Tomcat.
For more details Check http://www.jguru.com/faq/view.jsp?EID=123229
share|improve this answer
Thanks for answer but it's not working My hosting have 2 folder : tomcat and www I uploaded to folder tomcat/webapps and start up tomcat but it's not deploy WAR file. When i create a.jsp file in folder www and run with link www.mypage.com/a.jsp , it's working So , how can i call WAR file in folder tomcat when i standing in folder www . Thanks you very much – user1000566 Oct 18 '11 at 7:51
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11995 | Take the 2-minute tour ×
I thought I'd found the solution a while ago (see my blog):
If you ever get the JavaScript (or should that be JScript) error "Can't execute code from a freed script" - try moving any meta tags in the head so that they're before your script tags.
...but based on one of the most recent blog comments, the fix I suggested may not work for everyone. I thought this would be a good one to open up to the StackOverflow community....
What causes the error "Can't execute code from a freed script" and what are the solutions/workarounds?
share|improve this question
add comment
10 Answers
up vote 8 down vote accepted
It sounds like you've hit a bug/problem in the way some tags are handled or that you have references to released objects on which you are trying to execute methods.
First I'd move any <meta> tags before any <script> tags as suggested here and here and numerous other places.
Then check to see if you have page/security issues discussed here.
share|improve this answer
Psst.. One of your links is for the OP's blog.... – erlando Sep 17 '08 at 14:13
Moved <meta> tags before any <script> tags solved the issue for me too, with IE6 – Enrico Detoma Nov 25 '09 at 10:18
i just got the error without any meta tags on my page – Daniel Brink Sep 27 '12 at 11:22
link rot. Please fix or remove the links. – Benjamin Gruenbaum Jan 15 at 9:27
add comment
You get this error when you call a function that was created in a window or frame that no longer exists.
If you don't know in advance if the window still exists, you can do a try/catch to detect it:
if (e.number == -2146823277)
// f is no longer available
share|improve this answer
would this do the same thing? (typeof f == "undefined") { /* not avail */ } – TJR Nov 4 '11 at 16:06
I'm not sure, but I wouldn't count on it. I'm guessing that typeof f would throw an error, or otherwise returns "function" or "unknown". – Sjoerd Visscher Nov 5 '11 at 12:53
Thanks Sjoerd..But why would this just happen in IE? – ManJan Mar 26 '13 at 16:03
It depends on the implementation of the browser. I think in IE each window has its own Javascript engine. In newer browsers (perhaps also in newer IE versions) there's a shared engine exactly when two windows have access to each others code, because one window was opened by the other. – Sjoerd Visscher Mar 26 '13 at 21:12
add comment
The error is caused when the 'parent' window of script is disposed (ie: closed) but a reference to the script which is still held (such as in another window) is invoked. Even though the 'object' is still alive, the context in which it wants to execute is not.
It's somewhat dirty, but it works for my Windows Sidebar Gadget:
Here is the general idea: The 'main' window sets up a function which will eval'uate some code, yup, it's that ugly. Then a 'child' can call this "builder function" (which is /bound to the scope of the main window/) and get back a function which is also bound to the 'main' window. An obvious disadvantage is, of course, that the function being 'rebound' can't closure over the scope it is seemingly defined in... anyway, enough of the gibbering:
This is partially pseudo-code, but I use a variant of it on a Windows Sidebar Gadget (I keep saying this because Sidebar Gadgets run in "unrestricted zone 0", which may -- or may not -- change the scenario greatly.)
// This has to be setup from the main window, not a child/etc!
mainWindow.functionBuilder = function (func, args) {
// trim the name, if any
var funcStr = ("" + func).replace(/^function\s+[^\s(]+\s*\(/, "function (")
try {
var rebuilt
eval("rebuilt = (" + funcStr + ")")
return rebuilt(args)
} catch (e) {
alert("oops! " + e.message)
// then in the child, as an example
// as stated above, even though function (args) looks like it's
// a closure in the child scope, IT IS NOT. There you go :)
var x = {blerg: 2}
functionInMainWindowContenxt = mainWindow.functionBuilder(function (args) {
// in here args is in the bound scope -- have at the child objects! :-/
function fn (blah) {
return blah * args.blerg
return fn
}, x)
x.blerg = 7
functionInMainWindowContext(6) // -> 42 if I did my math right
As a variant, the main window should be able to pass the functionBuilder function to the child window -- as long as the functionBuilder function is defined in the main window context!
I feel like I used too many words. YMMV.
share|improve this answer
i got the error just now. i'm doing something similar to the above code - iframe calling js in the parent window's scope. hahaha fun :) – Daniel Brink Sep 27 '12 at 11:26
add comment
Here's a very specific case in which I've seen this behavior. It is reproducible for me in IE6 and IE7.
From within an iframe:
window.parent.mySpecialHandler = function() { ...work... }
Then, after reloading the iframe with new content, in the window containing the iframe:
This call fails with "Can't execute code from a freed script" because mySpecialHandler was defined in a context (the iframe's original DOM) that no longer exits. (Reloading the iframe destroyed this context.)
You can however safely set "serializeable" values (primitives, object graphs that don't reference functions directly) in the parent window. If you really need a separate window (in my case, an iframe) to specify some work to a remote window, you can pass the work as a String and "eval" it in the receiver. Be careful with this, it generally doesn't make for a clean or secure implementation.
share|improve this answer
add comment
Beginning in IE9 we began receiving this error when calling .getTime() on a Date object stored in an Array within another Object. The solution was to make sure it was a Date before calling Date methods:
Fail: rowTime=wl.rowData[a][12].getTime()
Pass: rowTime=new Date(wl.rowData[a][12]).getTime()
share|improve this answer
yes. IE9 will mangle types. You may also get it with arrays. You can do Array.prototype.slice.call(data) if you want. Sometimes it will throw this error, sometimes it will throw E_UKNOWN ... it's usually caused by a spurious "delete" improperly invoked and unfortunately has nothing to do with the child/parent issue; it's the browser going nutso over something and giving you a red herring. – user535759 Aug 3 '11 at 4:53
add comment
This error can occur in MSIE when a child window tries to communicate with a parent window which is no longer open.
(Not exactly the most helpful error message text in the world.)
share|improve this answer
Or vice versa (parent to child) – erlando Sep 17 '08 at 14:15
add comment
This isn't really an answer, but more an example of where this precisely happens.
We have frame A and frame B (this wasn't my idea, but I have to live with it). Frame A never changes, Frame B changes constantly. We cannot apply code changes directly into frame A, so (per the vendor's instructions) we can only run JavaScript in frame B - the exact frame that keeps changing.
We have a piece of JavaScript that needs to run every 5 seconds, so the JavaScript in frame B create a new script tag and inserts into into the head section of frame B. The setInterval exists in this new scripts (the one injected), as well as the function to invoke. Even though the injected JavaScript is technically loaded by frame A (since it now contains the script tag), once frame B changes, the function is no longer accessible by the setInterval.
share|improve this answer
add comment
I got this error in IE9 within a page that eventually opens an iFrame. As long as the iFrame wasn't open, I could use localStorage. Once the iFrame was opened and closed, I wasn't able to use the localStorage anymore because of this error. To fix it, I had to add this code to in the Javascript that was inside the iFrame and also using the localStorage.
if (window.parent) {
localStorage = window.parent.localStorage;
share|improve this answer
add comment
I ran into this problem when inside of a child frame I added a reference type to the top level window and attempted to access it after the child window reloaded
// set the value on first load
window.top.timestamp = new Date();
// after frame reloads, try to access the value
if(window.top.timestamp) // <--- Raises exception
I was able to resolve the issue by using only primitive types
// set the value on first load
window.top.timestamp = Number(new Date());
share|improve this answer
add comment
If you are trying to access the JS object, the easiest way is to create a copy:
var objectCopy = JSON.parse(JSON.stringify(object));
Hope it'll help.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11996 | Take the 2-minute tour ×
How to delete the remote branch itself in sourceforge with all files in it, using egit ?
share|improve this question
add comment
3 Answers
up vote 55 down vote accepted
Go to Team > Remote > Push… from the menu. Select your repository, and click Next. Under Remote ref to delete… select your branch and click Add spec. Then click Finish. This should delete the remote branch.
share|improve this answer
thanks a lot ! it was there in front of me and I never saw it :D – Ismail Marmoush Dec 24 '11 at 19:01
+1 for simplicity ! – Ismail Marmoush Dec 24 '11 at 19:02
No problem :) Happy to help. – Michael Mior Dec 25 '11 at 3:31
I love me some straightforward and effective SO answer. – mtyson Feb 5 '13 at 23:09
Also works with GitHub. – user515655 Mar 5 at 8:10
show 1 more comment
(Update March 2012)
As tukushan mentions in the comment:
In Egit 1.3.0, this only deletes the remote tracking branch in the local repository, not the remote branch.
As Michael Mior details in his (upvoted) answer, you need to push "nothing" to the remote branch : git push origin :branch, which from git1.7+ is better coded as git push origin --delete branch.
With Egit, see "Delete Ref Specifications section":
Remote ref to delete in Egit
(Original answer December 2011)
You can also check out the very latest release of EGit (1.2, released yesterday December 23rd, 2011). You now have another way to delete a remote
From its EGit/New and Noteworthy/1.2:
It remains to be tested if that option can delete a branch for a commit on a remote namespace (a commit part of a remote repo and fetched in your local repo).
share|improve this answer
In Egit 1.3.0, this only deletes the remote tracking branch in the local repository, not the remote branch. – tukushan Mar 29 '12 at 4:57
@tukushan: right. I have edited my answer to make the correct answer visible (and reference Michael Mior's answer) – VonC Mar 29 '12 at 7:48
add comment
Right click project > Team > Advanced > Delete Branch... > Select the branch you want to delete and hit ok.
You can select both local and remote branches.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/11997 | Take the 2-minute tour ×
On the following two strings I'd like to create a regular expression that returns the binding property and value for the visibility binding.
In this string I would want to get back: visible:visible()
In this string I would want to get back: visible:propertyIsVisible()
In this string I would want to get back: visible:properties.visibilityProperty
"visible:properties.visibilityProperty, click:clickMe"
Any regexperts out there have a good suggestion for getting this using a regular expression?
share|improve this question
visible:[^,]+ ? – darkmist Feb 29 '12 at 17:11
add comment
1 Answer
up vote 1 down vote accepted
What about something like this?
share|improve this answer
you rock dude, works like a charm – KodeKreachor Feb 29 '12 at 17:32
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/12030 | Take the 2-minute tour ×
I got a new Western Digital WD15EARS Caviar Green 1.5TB SATA drive but it seems to use WD new advanced format using 4k blocks or something (I get the general idea but not really).
Is there a way to properly format it for an Ubuntu 9.10 Server to take advantage of the advanced format? Such as with sector sizes?
share|improve this question
I just posted a little guide about all this. It's partially explained on Western Digital's website but somehow it's incomplete and I ended up gessing from what the WD Align tools fixed in my partitioning mistakes... Anyway here it is: notepad.patheticcockroach.com/927/… – patheticcockroach Aug 17 '10 at 21:10
add comment
2 Answers
up vote 5 down vote accepted
The potential problem arises not from formatting the drive but from where on the drive the partitions are located. 4K sector drives need to be aligned on a logical block address that is a multiple of 8.
Supposedly the Linux tools have been updated to do the right thing when it comes to the 4K sector drives.
If you are using the most recent version of a popular Linux partition editor to create one or more new partitions on the drive you should be OK.
One warning: The WD drives can be jumpered as a kludge to work "correctly" with partitions created by Windows XP. Since you are using Linux make sure you do not have the jumper set for Windows XP. (If you did have the XP jumper set then you would get terrible performance from the drive).
OK, after Googling around a bit further, I'm confused. On the one hand, I've read the overview articles which claim Linux has no problem at all with 4K sector drives. But on the other hand, there are articles like these which claim the opposite.
Linux Not Fully Prepared for 4096-Byte Sector Hard Drives
Linux WD EARS Advanced Hard Drive Format
The second link above is probably more useful since it seems to offer suggestions on how to properly partition a 4K sector drive.
What I suggest is that you first check the alignment of your partitions by using fdisk -lu to display their starting LBAs. If your partition(s) are already aligned on LBAs that are a multiple of 8 then you should be fine. (You could also time the transfer of a large file just as an extra sanity check.)
If you have unaligned partitions then you probably want to delete and recreate using the method in the second article to ensure they are aligned properly.
Hope this helps ...
share|improve this answer
I'm using the latest version of Ubuntu 9.10 (aptitude full-upgrade). Is that enough? Also, I was using this guide but it may be a bit outdated. I used ext4 instead of ext3. – wag2639 Jun 4 '10 at 21:51
ext4, ext3, NTFS ... whatever, it doesn't matter how you format the partition. What matters is the Logical Block Address (LBA) where the partition starts. The Anandtech article you linked to in your question says, "Notably, Linux and Mac OS X are not affected by this issue." I think you'd be safe with Ubuntu 9.10 since it was available around the time WD appears to have been doing their testing. – irrational John Jun 4 '10 at 22:05
@wag2639 BTW, what tool are you using to partition your 4k sector WD drive? I'm in the process of trying to digest this article osnews.com/story/22872/… to see if it points out anything which really needs to be worried about. – irrational John Jun 4 '10 at 22:15
@john I just left fdisk do whatever the default setting was, at least at first just to make sure the drives works, I was hoping others would chime in over time and offer some advice or other experience. – wag2639 Jun 4 '10 at 22:56
just realized i didn't include the guide i was using, i'll include for others with this problem: help.ubuntu.com/community/InstallingANewHardDrive – wag2639 Jun 5 '10 at 18:00
add comment
Parted tool starting from version 2.1 is includes support for aligning Advanced Format drives. This recommendation is from WD official FAQ.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/12031 | Take the 2-minute tour ×
How is iPod touch determining my location accurately despite it not having GPS.
share|improve this question
As per the Super User FAQ, questions about electronic devices are off topic. However, I'd recommend that you ask your question on the Apple Stack Exchange beta site instead, they should be able to help. – DMA57361 Sep 22 '10 at 8:43
add comment
closed as off topic by Mehper C. Palavuzlar, DMA57361, Diago Sep 22 '10 at 12:06
1 Answer
up vote 1 down vote accepted
One way might be the detection of WLANs that are covering your current position.
A while back Google was in the news for collecting Data from unprotected WLANs. They were scanning for WiFi networks and were trying to make some kind of "map" of WLANs. That way you can send them (or other providers who offer the same service) a list of reachable WiFi networks and the try to figure out where on their map that constellation might be.
It's like looking out for landmarks (a hill, church tower, roadsign) and looking it up on a map.
BUT: AFAIK for that to happen you need access to the internet.
share|improve this answer
add comment
|
global_01_local_0_shard_00000017_processed.jsonl/12032 | Take the 2-minute tour ×
Whatever language I select there are no syntax highlighting. Just the font color and background color are changing. In other editors there default syntax highlighting and they are pretty good.
Update showing selecting language does not make syntax highlighting:
selecting language
nothing happens after selecting python
the same code in Programmers Notebook with default highlighting
Here's what's happenning with style configurator as I commented to Sathya. Increasing font size increases line height:
enter image description here enter image description here
share|improve this question
Are you opening files that have a file extension? If not, you should be able to select what language are using in a drop-down menu. – Pubby Oct 14 '11 at 3:12
@Pubby8, I added images showing that selecting a language from the menu does not change the screen display. The last picture shows the same code in Programmers Notebook. – Zeynel Oct 14 '11 at 4:14
add comment
1 Answer
up vote 1 down vote accepted
I can't simulate this - have you overridden the default syntax highlighting rules?
Head over to Settings -> Style Configurator and ensure that the syntax highlighting rules are present
I see what you're saying now - changing font setting for individual language does not seem to apply the font setting. Seems like a bug with Notepad++.
As a alternative, set the Global Font overrides as shown in the screenshot
Notepad++ global font settings
Font increased to 16
Font increased to 24
share|improve this answer
@Satya thanks I uninstalled the program and I will reinstall it and see what happens – Zeynel Oct 14 '11 at 21:43
I installed it again. The logic of this Style Configurator does not make sense. I choose a theme as shown in your image; I select a language; then I change font size... and what happens? the line spacing between line increases but not the font size! I change the font but font is not changing. I gave up and I click cancel and the alert tells me that there are unsaved changes... I want to use Notepad++ but I cannot because of this issue. Style configurator just does not work for me. Can you help. Say I want to change font and font size in javascript what do I do? – Zeynel Oct 30 '11 at 3:38
Updated @Zynel. Also , once you created a new file you'll have to select the language from Language -> J -> Javascript to apply the syntax highlighting rules. i.imgur.com/taDR6.jpg | i.imgur.com/TnODV.jpg | i.imgur.com/oxbdg.jpg. However, since we have a global override, it'll pick up font settings mentioned in the answer. If you're opening a saved file, this step isn't needed – Sathya Oct 30 '11 at 5:05
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/12033 | Take the 2-minute tour ×
I have a Dell Laptop, and the drivers has been installed with Windows 7.
I downloaded a package with specific and updated drivers. I would like to install all drivers found in this folder.
In the device manager I do a right click on a device and select "update driver software...", then I select "Browse my computer for driver software".
Can I do this automatically for all device? Because it's too long to do this on each.
I looked at this question Automatic driver search & update on Windows? but I don't want to install another software. So my question is: Is it possible to do this automatically with Windows 7?
Update : Windows 7 haven't this option.
So I update my question to know if it's possible to install driver with command line ?
Maybe with a script, can we execute the command for all devices ?
I don't need to do this often or on many computers.
share|improve this question
Do you even need to install the drivers? Windows 7 comes with a hundreds of thousands of generic drivers that in most cases allow the device to work. – Ramhound Jul 5 '12 at 13:13
Yes, the devices work with generic driver, but I think the real driver is better than the generic. For exemple graphics card is Generic VGA device instead of Intel HD Graphics family. Touchpad driver, and sound driver don't have full option with generic driver. – Hyralex Jul 5 '12 at 13:23
add comment
1 Answer
up vote 2 down vote accepted
It depends on how the drivers are packaged.
However, in general, you can right-click on the .inf files in the driver folder and install them that way instead of going through the device manager. It should be noted that this doesn't always work due to the way the drivers are packaged but it will normally work.
To go further than this would require a fair bit more work and wouldn't be worth it unless you are doing a lot of updates (e.g. updating them all each month or more often or updating many computers). If you are, update your question and I will expand the answer.
UPDATE: To install using a batch script, the following command format is used:
Just replace <file> with the appropriate file name. You can do a number of these or even create a loop to walk through all of the .inf files in a folder though I don't really recommend this as there may be plenty of occasions when you don't want to or indeed shouldn't install all of the available drivers. So if you automate too far, you would need to remember to remove or rename inf files before running. Given the use case, it is better to copy/paste the appropriate lines.
share|improve this answer
Ok. I don't need to update often or many computers (just 3 or 4). I just ask because i'm curious. I updated my question with your response (+1) to ask if it possible to install driver with command line. – Hyralex Jul 5 '12 at 16:18
Updated in line with your update! – Julian Knight Jul 5 '12 at 16:24
Thx for this. I think isn't a good idea to do the update by this way. I search a solution to list all my devices and search the driver in the folder. I accept your answer anyway. – Hyralex Jul 9 '12 at 9:02
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/12034 | Take the 2-minute tour ×
I'd like to find a way to automatically install the dependencies for Geany (which has all its dependencies installed automatically on Ubuntu, when installed from the Ubuntu software center) Is it possible to do this on Windows as well?
share|improve this question
This question sort of makes no sense for me: If its all automatically installed, what dependencies do you need? – Simon Sheehan Aug 17 '12 at 2:51
In my case, I want to be able to compile Java, C, Python, and C++ files from Geany. – Anderson Green Aug 17 '12 at 3:25
Also, I fixed the typo that led to this ambiguity. I hope the question makes more sense now. – Anderson Green Aug 17 '12 at 3:27
So... you want it to download and install MSVC for you? – Ignacio Vazquez-Abrams Aug 17 '12 at 3:32
No, I'm not using Microsoft Visual C++. I'm using Geany, as stated in the title. – Anderson Green Aug 17 '12 at 3:36
show 2 more comments
Your Answer
Browse other questions tagged or ask your own question. |
global_01_local_0_shard_00000017_processed.jsonl/12035 | Take the 2-minute tour ×
I'm setting up a VM based Linux Mint 14 Cinnamon dev env and just installed putty to connect to my Ubuntu servers. Problem is that when I try to use "username@hostname" or "username@ip" (no quotes obviously) then I get the error "Unable to open connection to username@hostname: Name or service not known".
If I use just the hostname or IP it connects fine - it asks for the username and then correctly logs in using my private key.
On my Windows 8 host machine I use "username@hostname" in Putty's Host Name field and it works flawlessly.
Does the Linux putty use a different syntax in the host name field? I checked around but couldn't find anything.
share|improve this question
I think you are answering your own question, clearly it does have a different syntax since your usual one does not work :). Why in the world would you want to use putty for linux? Why not just ssh directly? – terdon Dec 2 '12 at 13:39
@terdon The syntax differs using the command line. I'm referring to the GUI, which should also have an option to set the username. – AndyAtTheWebists Dec 2 '12 at 19:46
I realize that but if the windows syntax does not work then the linux one must be different. Seriously though, why do you want putty on linux? What does it offer over normal ssh? You can simply open a terminal and type ssh user@host. – terdon Dec 2 '12 at 20:06
Fair enough question. I'm switching from Windows to doing my dev work in a Linux VM. I guess I was just sticking to solutions I'm used to as part of my usual workflow. Just one less thing to figure out for when I need to setup port forwarding or something. I have started using ssh and zssh now instead. – AndyAtTheWebists Dec 3 '12 at 9:18
add comment
1 Answer
up vote 0 down vote accepted
It does look like you can't specify a username in the putty GUI. However, you do not need to use putty if what you want to do is connect to other linux hosts over ssh. Just open a terminal and type:
ssh user@host
This will do exactly what putty does for you in windows.
If you want putty in order to save connections, add lines like the following into your ~/.bashrc file (the following are adapted from mine):
alias myserver='ssh myuser@myserver'
alias petitbonum='ssh bob@petitbonum'
alias docpad='ssh [email protected]'
alias badabing='ssh -Y lacoloc@'
Obviously, change the user and server names and/or IPs to whatever you need. Then, you open a new terminal and type, for example, myserver and hit enter. This will run the command defined in the alias you placed in .bashrc.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/12036 | Take the 2-minute tour ×
My computer won't update.
I went to the Services folder and I don't have a "Windows Update" folder. I don't think my computer has updated for quite sometime and I'm sure it's well over due for one.
I just defragmented it as well, if that helps the problem. I keep an external hardrive with all my pictures, business and Illustrator files on it, to keep my computer free from big files and running better.
share|improve this question
add comment
1 Answer
Try contacting http://windowsupdate.microsoft.com. Yes, it is generally a good idea to keep your system patched, however, remember that as old patches fix old problems it is possible to introduce new problems with the patches.
share|improve this answer
I cant get my computer to update at all. There is an error message that says it cant because the service isnt running. I went to the services folder to check to see if its running or not and there is no "Windows Update" folder. Any other suggestions?? – Megan Goode Jan 18 '13 at 17:28
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/12037 | Take the 2-minute tour ×
Possible Duplicate:
Can windows command line support Linux “cd -”?
Under Linux, I can use cd - to return to the last directory. How can I do that on Windows?
share|improve this question
Duplicate of this question: superuser.com/questions/81755/… – Snark Dec 18 '09 at 10:12
add comment
marked as duplicate by Snark, innaM, ChrisF, harrymc, Phoshi Dec 18 '09 at 11:12
2 Answers
up vote 3 down vote accepted
you can use the pushd and popd commands.
pushd will change directory from location a to location b popd will change directory back to directory a
share|improve this answer
add comment
Cmd.exe is an emulation layer for the old MS-DOS, commands are the same :
1. One step backward = cd..
2. All Backward = cd /
For the others look at some Ms-Dos table around the web
share|improve this answer
This is not what cd - does. If one is in /a/b/c/d then cd's to /a/e/f, cd - as a command returns you to /a/b/c/d, whereas cd .. moves you to /a/e and cd / moves you to /. – Neal Dec 18 '09 at 15:18
You are right i've misunderstanded the question. (What poor figure!) :-( – Акула Dec 18 '09 at 15:39
add comment
|
global_01_local_0_shard_00000017_processed.jsonl/12042 | The TR Podcast 30: The CES 2009 edition
In which we compile and discuss the hardware highlights from CES 2009
— 2:48 PM on January 11, 2009
In this special edition of the TR Podcast, Jordan and Scott summarize TR's coverage of CES 2009. Scott (on the phone with us from the airport in Las Vegas) talks about the markedly different mood for the new year, the unusual bevy of product releases for the event, highlights from the show floor, and more.
View options
This discussion is now closed. |
global_01_local_0_shard_00000017_processed.jsonl/12043 | Take the 2-minute tour ×
I am using the following to customise my footline, but it does not seem to change the height of the footline. What am I missing
{\begin{beamercolorbox}[wd=\paperwidth,ht=2.25ex,dp=1.5cm, leftskip=.3cm,rightskip=.3cm plus1fill]{author in head/foot}%
{\large \url{www.yahoo.com}}
share|improve this question
While code snippets are helpful, it is best to add a minimal working example (MWE) that illustrates your problem. To do so, edit your post and add the relevant content. – Werner Dec 23 '11 at 16:03
add comment
1 Answer
You can use the \fontsize{size}{skip} command, where size is your desired fontsize, and skip is the distance between lines (multiplied by \baselineskip)
The height of footline is computed to fit the font. Is this what you want?
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/12044 | Take the 2-minute tour ×
I'm using the apa6 package with the document mode "doc". Now I ran into some problems with the heading line. On even pages the heading line exceeds the textwidth on the left hand side and on odd pages on the right hand side.
Even page: even
Odd page: Odd page Example Code:
\title{Sample APA-Style Document Using the \textsf{apa6} Package}
\author{Brian D. Beitzel}
\affiliation{SUNY Oneonta}
\abstract{This is the abstract}
\keywords{APA style, demonstration}
Text long enough to fill several pages...
I guess it is a bug in this otherwise excellent apa6 package. Is there a quick (and dirty) way to fix this issue?
share|improve this question
add comment
1 Answer
up vote 6 down vote accepted
just before \begin{document}
share|improve this answer
wow, that was easy! thanks a lot! – deboerk Jan 30 '12 at 15:24
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/12045 | Take the 2-minute tour ×
In floating environments such as the captions of figures, LaTeX has a \global\@minipagefalse, why is this necessary and what does this switch do?
\sbox\@tempboxa{#1: #2}
\ifdim \wd\@tempboxa >\hsize
#1: #2\par
\global \@minipagefalse
share|improve this question
add comment
2 Answers
up vote 10 down vote accepted
The @minipage switch is used by LaTeX to handle vertical spacing at the beginning of a minipage environment (or a similar construct). If it is true then \addvspace is not adding space. So if, for example, a minipage starts of with a list environment then the space normally added in front of the list (by \addvspace) is suppressed.
The switch will be set to true at the beginning of a minipage environment (or a similar construct) and is normally set to false by \everypar, i.e., the moment textual material appears in that "minipage".
Now in the case of the caption implementation, two different strategies are used: if the caption is wider than the current horizontal width, then it is re-set as a normal paragraph (so the switch would be set to false by \everypar). However is it is small then the box is used directly without triggering the paragraph builder. Therefore one has to set the switch manually in this case.
And the reason that it is done globally is just because the switch is always manipulated globally.
share|improve this answer
add comment
The sources say
The float mechanism, like minipage, sets the flag |@minipage| true
before executing the user-supplied text. Many \LaTeX\ constructs
test for this flag and do not add vertical space when it is true.
The intention is that this emulates \TeX's `top of page' behaviour.
The flag must be set false at the start of the first paragraph. This
is achieved by a redefinition of |\everypar|, but the call to
|\@parboxrestore| removes that redefinition, so it is re-inserted
if needed. If the flag is already false then the |\caption| was not
the first entry in the float, and so some other paragraph has already
activated the special |\everypar|. In this case no further action is
The most important command that tests this switch is \addvspace which is the command that is mostly used to add the vertical space around display environments such as lists. It is a global flag and setting it in a float environment means the float acts in a consistent way even if it floats from somewhere where it is set to somewhere where it would not be set.
share|improve this answer
This much I could gather from the source2e, but shouldn't it then be outside the conditional? Why only at the hboxed caption? – Yiannis Lazarides Apr 29 '12 at 19:52
@YiannisLazarides Frank just answered the point about caption in his answer – David Carlisle Apr 29 '12 at 19:54
@Yiannis I think David's last part of the answer is a red herring. The switch takes care of itself and it only has to be set by \caption because of the caption implementation avoiding normal paragraphs. It is not doing a standardization which happens elsewhere. – Frank Mittelbach Apr 29 '12 at 19:59
Hmm if in doubt I'd believe @FrankMittelbach, rather than me:-) But I wasn't so much thinking about caption there, as arbitrary addvspace at the top of the float. If the switch wasn't set by the float addvspace would pick up whatever value was current at the point of the float, wouldn't it? Ah we are agreeing. I think. the start of the float is the "elsewhere" that Frank meant:-) – David Carlisle Apr 29 '12 at 20:04
indeed :-) the elsewhere is \@floatboxreset which sets the switch. And by the way if the caption is at the bottom of the float then it is correct if `\addvspace adds space. – Frank Mittelbach Apr 29 '12 at 20:10
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/12046 | Jump to: navigation, search
2 revisions of this difference (25524 and 331568) were not found.
File history
current10:19, 23 January 2014Thumbnail for version as of 10:19, 23 January 2014640 × 480 (39 KB)Andrew (Talk | contribs)
• You cannot overwrite this file.
The following page links to this file: |
global_01_local_0_shard_00000017_processed.jsonl/12066 | Tolkien Gateway
(Difference between revisions)
(Rewrote etymology)
Line 18: Line 18:
*[ A theory on Bladorthin] by [[Andreas Möhn|Andreas Moehn]].
[[Category:Rulers of Middle-earth]]
Revision as of 14:18, 4 January 2012
The Hobbit, Inside Information
Bladorthin was a king of the Third Age who flourished long before T.A. 2941. He had ordered thrice-forged spears of superior quality for his soldiers from the Dwarves of Erebor. The smiths forged them, but Bladorthin never received his weapons.
It is possible that the descent of Smaug on the Lonely Mountain prevented the trade, in which case his death can be put after Third Age 2770.
On the other hand his death was perhaps premature and it was this that prevented the trade.
John D. Rateliff has noted that Tolkien never explained the meaning of the name Bladorthin. However, Rateliff suggests that the name is "clearly Gnomish (or perhaps Noldorin)", speculating that the element blador "probably applies to wide open country" and that the element -thin likely has the meaning of "grey" (as in Thingol). This would give the translation "the Grey Country", "Grey Plains Fay", or "Grey Master of the Plains".[1]
Other Versions of the Legendarium
"Grey" here betrays a curious connection with Gandalf the Grey: in the early drafts of The Hobbit, Tolkien's name for Gandalf was Bladorthin. Despite this, in the published version the name survives in just the single sentence quoted from The Hobbit.[1]
External links
|
global_01_local_0_shard_00000017_processed.jsonl/12081 | View Single Post
Old 03-15-2011, 02:01 PM #60
Talk Tennis Guru
drakulie's Avatar
Join Date: May 2004
Location: FT. Lauderdale, Florida
Posts: 23,971
OK, guys,,,I'll give it another shot.
You want to start your crosses in a way that the majority of your pulls on the crosses are going under the last main on the outside of the string bed.
This has nothing to do with the last cross string, rather, with most of the crosses.
For example, on a Youtek Prestige Pro, which has a 16 x 19 pattern, and I'm stringing a normal one piece pattern, my first cross would go under the first main I encounter. This ensures that crosses 2-18 are being pulled under the last main string on the outside of the string bed.
The theory is, that by going under the outer main on the pulls, there is less friction, and as a result, a tighter string bed.
Hope that helps.
Head Stringer @ the LTC, Babolat Star 4 Stringer
drakulie is offline Reply With Quote |
global_01_local_0_shard_00000017_processed.jsonl/12089 | main index
Topical Tropes
Other Categories
TV Tropes Org
Literature: Mass Effect: Revelation
Mass Effect: Revelation is a novel within the Mass Effect universe.
It serves as a prequel to the first game, telling the story of how Capt. Anderson tried and failed to become a Spectre, and how Saren found Sovereign.
Mass Effect: Revelation provides examples of the following tropes:
• Anti-Hero / Anti-Villain / Villain Protagonist: Saren.
• Armor-Piercing Question: The asari councilor asks one of Goyle, when she asks her whether humanity has ever put the interests of the galaxy above its own interests as a species.
• Badass Normal: In a universe with dinosaur-like aliens with extremely fast regenerative capabilities and people who can manipulate gravity with their minds, Anderson manages to kill Skarr, a member of said aliens AND able to manipulate gravity with his mind, with little more than a pistol. By himself.
• Call Forward: The retired Admiral Grissom (not fond of visitors) goes to answer his door and wonders who it might be. "If it was a reporter, he'd punch him — or her — right in the mouth."
• Even Evil Has Standards: Though Saren's torture of Groto was for information, Saren also stopped him from torturing a human prostitute and was disgusted by Groto's intentions. This trope is in play because Saren despises humans.
• Eye Scream: Groto Ib-ba, a mercenary member of the batarians, a species whose members each have four eyes, gets one of them burst — not removed, burst — by his torturer during interrogation. This particular instance is also one of Pay Evil unto Evil, as the victim in question was also hateful of humans and had planned to "break" a human prostitute as a means of "stress relief". The novel says Groto even went out of his way to try and pick the weakest prostitute to make it more likely he'd break her.
• First Contact: The book begins just after this happens.
• Foreshadowing: Ambassador Goyle suggests that there could already be an advanced AI out there somewhere in the galaxy (besides the geth).
• Framing Device: Set up the Mass Effect universe, since the game was unreleased during its publication.
• Freudian Excuse: Apparently Saren's hatred of humanity was caused by his brother's death during the First Contact War. Of course, that does nothing to defend Saren's brutal treatment of every other species that gets in his way.
• Humanoid Aliens: Early on, the book lampshades their commonness in the franchise. Anderson subscribes to the most common explanation, that there's some undiscovered evolutionary advantage to the humanoid body structure.
• Jack Bauer Interrogation Technique / Cold-Blooded Torture: Depending on whether you view Saren as an Anti-Hero or Villain Protagonist.
• Mythology Gag / Self-Deprecation: There's a line somewhere about a lengthy elevator ride.
• Prequel
• Rule Number One:
"I have two rules I follow," Saren explained. "The first is: never kill someone without a reason."
"And the second?" Anderson asked, suspicious.
"You can always find a reason to kill someone."
• Start of Darkness: For Saren, though the story shows that he was a huge racist and Knight Templar even before he turned bad.
• Token Romance: Anderson and Kahlee Sanders, though it does not actually go anywhere.
• Vasquez Always Dies: Subverted; Dah is 6' 3", stated to be stronger then most of the men in her squad and with an attitude that's kept her from advancing in her career. She gets ambushed and badly hurt, but ends up recovering to full health.
Mass Effect InfiltratorFranchise/Mass EffectMass Effect: Ascension
Mass Effect: RetributionScience Fiction LiteratureMed Ship
Permissions beyond the scope of this license may be available from
Privacy Policy |
global_01_local_0_shard_00000017_processed.jsonl/12090 | main index
Topical Tropes
Other Categories
TV Tropes Org
Piecemeal Funds Transfer
In the land of TV and movies, all electronic funds transfer systems work by transferring the money a little bit at a time.
We know this because while the transfer is in progress, you can clearly see a Viewer-Friendly Interface displaying the amount of money, which starts at zero and quickly increases. This is apparently because the money is being stuffed, one dollar bill at at time, through the connection.
In reality, a form of fraud known as salami slicing or penny shaving exists. Often using rounding errors to steal substantial amounts of cash, often a cent at a time. Of course, the goal is to steal the cash so slowly that nobody notices. If you're going to steal a whole load of cash in the time frame of the following examples, then you may as well just steal it all in one transaction rather than slicing it up into tens of thousands of microtransactions. (Unless it's being directed at multiple accounts, though obviously it isn't feasible to have thousands of those.)
Well, unless you want to further annoy your victim with the arrival of a bank account statement several thousand pages long at the end of the month. Or annoy the bank by making them print and ship it. Or both!
Another real-life approach is structuring or smurfing: if all transactions above a certain limit ($10,000 in the United States) are reviewed by regulators as a matter of course, then a large illegal transaction may be split into several still-sort-of-large pieces that are each below the limit. To muddy the waters further, each piece may be transferred by different accomplices at different locations.
This might become Truth in Television in the future if electronic stores of value are ever implemented which would consist of individual, cryptographically signed, monetary tokens in the form of computer files. They would work in a similar fashion to electronic postage or coupon codes and if you had a large number of small denomination tokens, they would take time to transfer one by one.
open/close all folders
Anime and Manga
• In an early chapter of AI Love You, Hitoshi has to correct a bank error himself using an AI program. On his screen, he sees the balance of his account go down several yen at a time. Somewhat justified in that the process of removing the virtual money is represented as his AI avatar entering a house and taking out armfuls of bills and dumping them...
• Fair Game, a 1995 movie starring model Cindy Crawford (and a yacht the villains needed to hack a undersea phone line) featured this, and worse, the transaction was aborted because everything exploded before the Exact Progress Bar was finished.
• The theft of the billions in Entrapment was shown on a progress bar. Granted, this ridiculously huge amount of money was probably stored on multiple accounts.
Video Games
• For a game that intentionally invokes Hollywood Hacking and gleefully uses Magical Computer tropes, Uplink surprisingly averts this.
• An AI on the Citadel in Mass Effect 1 is siphoning money from Flux. When you confront it, it both transfers its money and threatens to self-destruct, taking you with it. Shutting down the self-destruct allows you to take whatever money it couldn't shuffle away. Perhaps justified as the AI transferring many small payments from various gambling machines.
Western Animation
• On The Simpsons, a character downloads money on to a floppy disk, employing this trope.
Real Life
• Truth in Television: One man was actually caught because his program worked too fast. He hadn't thought about how much money he would actually acquire, and when his account grew beyond reasonable levels, someone wondered where all the money was coming from.
• That is pretty much the plot of Office Space, too. Due to a rounding error, the program in that film actually transfers a dime at a time, rather than a fraction of a cent... still a small transaction, but now large enough to be noticed.
• And of course in Office Space they point out that the same technique was used in Superman III. Which was the exact reference that sprang to mind for me at that point, too.
Password Slot MachineMagical ComputerPlayful Hacker
Permissions beyond the scope of this license may be available from
Privacy Policy |
global_01_local_0_shard_00000017_processed.jsonl/12100 | Revision history of "Undictionary:Atrophy"
From Uncyclopedia, the content-free encyclopedia
Jump to: navigation, search
• (cur | prev) 16:27, June 29, 2011Haydrahlienne (talk | contribs) . . (384 bytes) (+384) . . (Created page with '{{dictionary}} {{lowercase title}}<!-- Remove this if not a lowercase term --> ==English== {{#ifexist: {{PAGENAME}}|{{uncyclopediapar|{{subst:PAGENAME}}}}}} ===Ad...')
Personal tools |
global_01_local_0_shard_00000017_processed.jsonl/12101 | Take the 2-minute tour ×
I just set up a new AirPort Extreme and CentOS 6.2 server - the server is meant to be a general-purpose storage machine, and so I've set up Samba and Avahi on it. I can easily access the server by IP address from my MacBook Pro running OS X Lion, but attempting to resolve it by name - from the terminal with ping, in a connect prompt (smb://my-server/) - doesn't work.
Are there any particular configuration steps I need to take? How can I get access by name to the server from OS X?
share|improve this question
Tim, I suggest that you flag your question and ask a mod to move it to either Unix & Linux StackExchange, or Server Fault. This question is predominately how do I configure avahi to automatically announce my server's hostname. It's not actually a question about Apple Hardware or Software. OS X automatically broadcasts the computer name and associated address for link-local resolution and browsing, Avahi does (last I knew) only on a service-by-service basis. The details of which, however, are quite a bit over my head. – VxJasonxV Dec 27 '11 at 12:31
add comment
migrated from apple.stackexchange.com Dec 28 '11 at 15:25
2 Answers
Support has been available for mDNS and related discovery services on most Linux distros for sometime. Static IPs or fixed hostnames are not scalable for cloud/rapid deployment/Vagrant. Ideally, there is some good hackery in the cloud init tools and also possibly generating a unique hostname based on a string template on first boot (along with reseal scripts).
Anyhow, here's the easy way to get mDNS working for most major OSes.
On CentOS/RHEL/Fedora:
su - -c 'yum install -y avahi avahi-tools nss-mdns ;
service avahi-daemon start'
On Debian/Ubuntu: http://wiki.debian.org/ZeroConf
sudo su - -c 'apt-get install -y avahi-daemon avahi-discover nss-mdns ;
sudo invoke-rc.d avahi-daemon start'
On Arch: https://wiki.archlinux.org/index.php/Avahi
echo 'You won't need hand-holding here I assume.'
What's nice is this gets mDNS working on the Linux box the other way too, so you can usually just start pinging/ssh/etc to your Mac right way. Woot. avahi-browse --all is very neat.
Don't forget the inbound firewall rule on the box acting as a server.
-A INPUT -d -p udp -m udp --dport 5353 -m comment --comment "mDNS" -j ACCEPT
Also, configure with /etc/avahi/ and restart the daemon.
Incidentially, I am building a CentOS 6.2 x86_64 minimal appliance for a client on my MacBook Pro under VMware Fusion 4.x.
Perhaps someone will add the bit for making sure that the announcement work and publishing of services (esp. ssh and web urls) works correctly for Mac, Linux and even Windows clients.
share|improve this answer
I'm using CentOS, and have avahi-daemon (as well as avai-dnsconfd) started, but no dice: the MacBook still can't resolve the server by name. Is there additional broadcasting I can do server-side to get that working? – Tim Dec 29 '11 at 6:36
add comment
I'll take a stab at this from the Apple side of things. Jason's comment is very true - in a nutshell the question is more about how to work with Apple software coming from an OS that isn't at all common to the Mac OS.
On the Apple side, your mac needs no configuration whatsoever to see any server that is broadcasting SMB so in addition to turning on the SMB daemons, make sure no firewall is blocking those broadcast packets and ensure both computers are on the same network segment so that broadcast packets are moving back and forth. You can see the list of bonjour services, which also might help you if you want to grab the source, browse the documentation and compile bonjour for your CentOS server.
Again, the mac needs nothing other than to be connected to a network where your server advertises (sends) packets to announce it will share either SMB or bonjour services.
Another tack would be to run DNS on the CentOS server and have your mac's get it's DNS records and it should be able to resolve the server name whether or not the server is actively sharing.
Lastly, static IP addresses would also work and you could simply pop your CentOS server's address in /private/etc/hosts (there's a sym link of /etc that points to /private on the Mac OS.)
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/12112 | Working with South London underground Rap Artist Kasha Rae, Director Dale Hooker took on multiple roles in order to create this music video with music sensation Ed Sheeran.
Director - Dale Hooker
Producer - Dale Hooker
DOP - Dale Hooker
Set Design - Dale Hooker
Online Editor - Dale Hooker
Loading more stuff…
Loading videos… |
global_01_local_0_shard_00000017_processed.jsonl/12129 | Take the 2-minute tour ×
This is my first question here on Pro Webmaster... I'm really glad to be here!
I believe this question will have a simple answer but I'm starting with htaccess and I want to learn something about this file and its rules.
I have a long and ugly affiliate link but I want to create a 301 redirect to this URL, without typing it. My website is http://www.matthewlabs.com/ and I want to use a link like http://www.matthewlabs.com/wishonlist/appstore which automatically redirects to my affiliate link.
I tried to write this in my htaccess file:
Redirect 301 /wishonlist/appstore http://myAffiliateLinkHere
but it doesn't work. Must the directory /wishonlist/appstore exist to redirect? Because now I receive a 404 error...
And to use this link, can I create a simple link with html a tag?
<a href="http://www.matthewlabs.com/wishonlist/appstore">Click</a>
Thank you so much for your time and I hope you can help me!
share|improve this question
add comment
1 Answer
up vote 1 down vote accepted
Your .htaccess file needs to look something like this:
RewriteEngine on
RewriteRule [URL to redirect from] [URL to redirect to] [options]
RewriteEngine on basically switches the mod_rewrite module on.
Then you need to say what the URL you're expecting people to enter looks like, you can use regular expressions here, in fact, the whole thing IS a regular expression.
URL to redirect to is usually internal, but it should work with a full link.
So in practice, something like:
RewriteEngine on
RewriteRule ^/wishonlist/appstore(/)?$ http://myAffiliateLinkHere [301,L]
The ^ and $ to denote the start and end of the URL, and (/)? means that it can be entered with or without a trailing slash and still work.
Options - The 301 basically says send a 301 header, and L says this is a 'last instruction' - after which no more instructions should be processed.
There's a good wealth of options available, check the documentation - but here's a link to a good cheat sheet I always keep handy: http://www.addedbytes.com/cheat-sheets/mod_rewrite-cheat-sheet/
share|improve this answer
Thank you so much for your answer... I tried it but without success... This is my htaccess file: cl.ly/Chba Now I get an Internal Server Error – matteodv Dec 17 '11 at 23:29
I would try redirecting to a simpler, short URL on the same machine first, see if that works. If so, then try a short, simple URL on another host, and if so, build up your URL till you find whats causing the problem. Two guesses - one, the space between '301' and 'L', or more likely, some character(s) in the long URL that need to be escaped (with a backslash). – Codecraft Dec 18 '11 at 16:06
Thank you... I solved with some tricks ;) – matteodv Dec 21 '11 at 16:57
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/12132 | P2 Environment Export/Visualization
From Eclipsepedia
Jump to: navigation, search
The idea for this proposal is based on the description in bug 267275, and the summary on the Google Summer of Code 2009 Ideas page.
The project will entail adding the ability to export the current state of the system, as well as the requested change in the event of a failure. This functionality would probably be added to the resolution page of the install wizard in the event of a failure, though switches could also be added to applicable command line applications as well. The dump will likely be written in XML and would probably need to include the current profile, the IUs changed (and how, removal, installation), related metadata, and potentially the results of the resolution failure.
Closely tied to the ability to export is importing the dumped data, the project will also need the ability to recreate the system in memory and trace the failed resolution. If it isn't possible to effectively dump resolution data, the failure could be recreated by re-executing the change request using state data from the export.
Creating an effective visual representation of the state, and the problems encountered will be one of the more time consuming steps in the project. Though the difficulty of this process may be simplified if an existing Eclipse project packages visual elements which could be imported. |
global_01_local_0_shard_00000017_processed.jsonl/12134 | WTP Smoke Test Results R30 092007
From Eclipsepedia
Revision as of 11:03, 24 September 2007 by Jlanuti.us.ibm.com (Talk | contribs)
Jump to: navigation, search
Web Tools 3.0 Smoke Test Results
This Week's Results
Component Result Initials/Comments
Java EE Checkmark.gif ICT
JSF Checkmark.gif CB, Caveat: [204203] is still active in this build.
Dali Checkmark.gif njh
Server Checkmark.gif AV
Web Services, WSDL Questionmark.gif Questionmark.gif Web Services
Checkmark.gif WSDL (aw I20070920200216)
Checkmark.gif XSD (aw I20070920200216)
Smoke Test Passed = Checkmark.gif
Smoke Test Failed = Fail.gif
Smoke Test Pending = Questionmark.gif
Back to the WTP Smoke Test Results Main Page |
global_01_local_0_shard_00000017_processed.jsonl/12136 | I occasionally have to build a Web site, an experience that is always humbling. My problem is that I don't do Web work often enough to build any real expertise, and the time between my Web adventures is usually long enough that I forget everything I learned on the previous project. Fortunately, HTML tags simplify Web work. And even if you forget the tags, you can use Microsoft Word or Microsoft FrontPage to handle them. But gathering information from forms for use on a Web page is a hassle.
I don't want to learn Perl or any other Common Gateway Interface (CGI) programming tool to handle forms. I maxed out at 20 programming and macro languages, and I refuse to learn any more. I usually let FrontPage's built-in form bot handle the forms. Although FrontPage is a good program, getting FrontPage's Internet Information Server (IIS) extensions to work is difficult. Even FrontPage 2000's form bot is rather fragile. Downloading and installing the FrontPage 2000 IIS extensions is a challenge. As I performed this task, I worried about disaster recovery—did I want to add a step to rebuilding my Web server? I wanted to avoid using the extensions, so I searched for a way to easily collect and store form information without using heavy-duty programming. Then I remembered Active Server Pages. ASP lets you use VBScript to build server-side Web-based applications. VBScript, a variant of Visual Basic (VB), is ideal for occasional programmers.
The Task
I needed to collect comments and stories about software bugs that readers had submitted to my Software Conspiracy Web site ( I wanted the ASP script to collect three identification fields (name, telephone number, and email address) and a comment field, surround each field with double quotes, put commas between the fields for ease of importing to programs such as Microsoft Excel or Microsoft Access, and append the new information to an ASCII file called feedback.txt.
I feared that the project might be time-consuming, but it took only about an hour and a half. For illustrative purposes, I've summarized only the program's essentials. To save space, my example doesn't include error-handling code. You might find this example useful on your next Web project that involves forms.
In the example, I display a simple form that asks for a user's name and email address. When the user submits this information, ASP shows the information to the user and stores it in feedback.txt.
In my project, I used three files: the HTML file with the form (form.html), the ASP file to collect the data and write it out (addtext.asp), and the file to write the data to (feedback.txt). The HTML file looked like the following file:
<form method="POST" action="addtext.asp"><BR>
<p>Name<input type="text" size="35" maxlength="256" name="Username"></p><BR>
<p>Email<input type="text" size="35" maxlength="256" name="UserEmail"></p><BR>
<p><input type="submit" value="Submit Info"> <input type="reset" value="Clear Form"></p><BR>
tag takes two parameters: method="POST" and action="addtext.asp". The first parameter is standard, but the second parameter is unique. The second parameter is the part of the
statement that tells the user's Web browser to ask the Web server to start the addtext.asp program. If this program isn't in the same directory as the form, you need to provide the full pathname. The
(i.e., paragraph) and tags simply display descriptive text (e.g., name) on the screen and put fields on the browser so that users can enter their responses. The last two tags tell the browser to put a Submit Info button and a Clear button on the screen. You don't need to do any programming to make these functions work; they're built into the HTML
In my example, the ASP file looked like the following file:
<%@ Language=VBScript %><BR>
option explicit<BR>
dim fso, myfile, uname, email<BR>
set fso = CreateObject _<BR>
set myfile = fso.OpenTextFile _<BR>
uname = request.form("Username")<BR>
email = request.form("UserEmail")<BR>
myfile.writeline(uname & " " & email)<BR>
set myfile = nothing<BR>
<p>Email address=<%=request.form("useremail")%>
ASP files usually contain regular HTML tags and VBScript programming commands. You place the programming commands within <% and %> brackets. ASP scripts work only on Web servers running IIS or machines running Peer Web Services (PWS) 3.0.
When a browser asks an IIS system to deliver a Web page with an HTML or HTM extension, the IIS system simply retrieves the file and transfers the file to the browser. In this case, the IIS system is nothing more than a file server.
In contrast, when a browser requests a file with an ASP extension, the IIS system checks the ASP file closely, finds the VBScript commands in the HTML code, and executes the VBScript commands. Running those commands usually modifies the HTML on the Web page; the resulting HTML is what the browser receives. IIS doesn't send the VBScript code (thus preventing people from easily figuring out how you set up your site), just the HTML that results from a combination of the original HTML and the text that added when the VBScript commands ran.
For example, consider the following one-line ASP file:
<p>The time is <%=time()%> </p>
Before transmitting this file, IIS sees the command =time(), which tells IIS to run the built-in VBScript time function (i.e., the function that returns the current time) and insert the result into the HTML. The resulting HTML that the user sees is
<p>The time is 03:16:32</p>
The ASP file for my solution has a large portion of VBScript at the beginning and a small amount of HTML at the end. The main job of the resulting Web page is to add the collected form text to feedback.txt, but the page also displays the name and email address that the user entered.
The first two statements in the ASP file tell IIS that the script is VBScript (other languages also work in ASP scripts) and that variables must be declared before they are used in the script. In general, you don't need to declare variables in VBScript. However, many people like to declare variables for organizational purposes and to decrease the probability of a mistyped variable name causing a bug. The Option Explicit statement tells IIS to enforce variable declaration.
The two Set statements let you manipulate files on the server. The first Set statement creates a file-system object, which activates the programming language's tools that allow file reads and writes. The second Set statement's parameters provide the name of the file you're working with (the default path is the \winnt\system32 directory), signal that you want to append data to the file (1 signifies read; 8 signifies append), and specify that the data must be in ASCII rather than Unicode. (For the append process to work, the file that you're appending must exist. Create an empty feedback.txt file before you try to execute the OpenTextFile method.)
The uname and email variables receive the user's name and email address. Request.form is a built-in VBScript method. To retrieve the user's information, you must pass the form's field names, "Username" and "UserEmail". You need to surround the form's field names (which must exactly match the names in the input type= statements in the HTML file) with double quotes.
The myfile.writeline method writes a string of characters to a file. In this case, the method writes the user's name and email address (separated by a space) to feedback.txt and starts a new line.
The myfile.close method closes the file. Finally, the last Set statement supports cleanup on the ASP server.
Use As You See Fit
I used this method because I've had trouble with FrontPage's server extensions and because I'm familiar with VB. However, my method might not work for you. VBScript isn't particularly fast, so you might not want to use it for a busy Web site. (My Software Conspiracy Web site has only about 10 visitors a day, so server performance wasn't a consideration.)
Although my example saves the data in a simple form, you might prefer to collect and save data in a Microsoft SQL Server database. If you're thinking about doing some ASP scripting, see Microsoft's Developer Network Web Workshop Web site ( workshop/c-frame.htm#/workshop/server/default.asp) for links to ASP information. For additional ASP information, see SQL Server Magazine.
Corrections to this Article:
• Inside Out: “Active Server Pages Takes the Bite out of Forms” (February 2000) contains an Active Server Pages (ASP) file in which some lines of code wrap across two lines of text but don’t contain a continuation character sequence ( _). A correct version of the file is available for download at Enter 7951 in the InstantDoc ID text box and click on the Zip file in the Article Info box. |
global_01_local_0_shard_00000017_processed.jsonl/12141 | Take the 2-minute tour ×
Hey guys, My WordPress permalink structure is set to `/%postname%/.
When I create a page with a name "FAQs" the permalink generated is "mydomain.com/faqs".
When I link to this page in my code (hardcoded) like this...
<a href="<?php bloginfo('home'); ?>/faqs#b" title="FAQ's">FAQs</a> (pay attention to the #b hash at the end)
...wordpress somehow automatically notices that there is a page /faqs and replaces /faqs#b just with /faqs (without the hash).
Is there a chance I can write a kind of exception to my .htaccess file so WordPress doesn't do that?
Any idea how I could make that work?
share|improve this question
add comment
2 Answers
up vote 2 down vote accepted
If your permalink structure is /%postname%/ with a trailing slash, you need to pass the hash like this: /faqs/#b with the trailing slash.
share|improve this answer
add comment
The URL hash (everything after the #) does not get sent to the server, so Apache or WordPress can't detect it.
WordPress redirects all URLs to the canonical version of the URL, to make sure everyone uses the same URL when linking to a post (which can help increase your ranking in search engines). This causes a redirect from /faqs to /faqs/. Browsers should append the #hash part to the redirected URL, but it seems IE does not do this.
You can prevent a redirect by using the canonical URL in the URL, like Milo suggested. So link to /faqs/#b and it should work.
share|improve this answer
add comment
Your Answer
|
global_01_local_0_shard_00000017_processed.jsonl/12142 | 101 reputation
bio website victorronin.com/en
location Reston, VA
age 33
visits member for 1 year, 4 months
seen Nov 5 '12 at 1:00
You can contact me at victor [DOT] ronin [AT] gmail [DOT] com
I am entrepreneurial software engineer (I enjoy being in startups). Mainly my focus over the years were mobility, security and low level sw. However I did huge amount of other stuff.
And my personal favorite thing is working on a problem which other people believe to be unsolvable.
You can check out my LinkedIn profile here: http://www.linkedin.com/in/victorronin
This user has not participated in any bounties |
global_01_local_0_shard_00000017_processed.jsonl/12157 | Swan nods to The Boss and digs at miners
Australian Broadcasting Corporation
Broadcast: 01/08/2012
Reporter: Leigh Sales
Federal Treasurer and Acting Prime Minister Wayne Swan joins us from Melbourne before giving the annual John Button lecture to elaborate on his thoughts connecting Bruce Springsteen to his political views and targeting Australia's mining magnates.
LEIGH SALES, PRESENTER: The Acting Prime Minister Wayne Swan thinks Australia can learn some lessons from the songs of American rocker Bruce Springsteen. Springsteen sings about the struggles of the American working class and the gap between rich and poor.
Tonight, Wayne Swan is giving the John Button Lecture, and in it he claims Labor's current set of economic policies will prevent Australia suffering America's economic and social fate.
The Treasurer also argues that the chief opponents of the Government's mining tax, Gina Rinehart, Clive Palmer and Andrew Forrest, only care about building their own wealth.
Earlier I spoke to Wayne Swan in Melbourne, but first here's a look at part of a YouTube video the Treasurer posted today.
WAYNE SWAN, TREASURER (YouTube video): Well I first started listening to Springsteen's music in the early 1970s. But I guess Springsteen's Born to Run, when it came out in late 1975, was I guess one of those albums that really influenced me for a long time. When I go into work early in the morning and I feel like I want to pep me up, I want to get going, I want a bit of inspiration, I'll put on Born to Run and I'll play it as loudly as I possibly can. ... Sometimes I think those cleaners in Parliament House must think there's something really weird going on in the Treasurer's office.
LEIGH SALES: Wayne Swan, when Julia Gillard went on holidays for a week and said you could be the boss, did you take her a little bit too literally?
WAYNE SWAN: (Laughs) No, I don't think so. I've planned to do this lecture for a long period of time, well before she planned to take a holiday.
LEIGH SALES: Bruce Springsteen wrote his best stuff in 1970s and 1980s America. That's a very long way from 21st Century Australia, isn't it?
WAYNE SWAN: I don't think so and in fact if you look at his latest album, Wrecking Ball, which came out this year, it's all about the impact of the Global Financial Crisis and the recession on the United States and the dramatic impact that has had on the divides in that country, that many people are being left behind, an army of working poor, but also a very, very high unemployment. And he sings about that on Wrecking Ball and I find that quite relevant to the situation here, because here we put in place a different set of policies based on Labor values which have protected our country from the ravages of high unemployment and also from the terrible divides that you're now seeing in the United States and the inequality that arises from that.
LEIGH SALES: In your speech tonight you single out the trio of mining billionaires for having a disproportionate impact on public debate. But let's be honest here: you wouldn't care about their influence, would you, if they were supporting Labor policies?
WAYNE SWAN: Well they're certainly opposing Labor policies, but most importantly, what they are doing is acting in their own interests, in their own vested interest in opposing the mining resource rent tax, a tax which is actually accepted by the great bulk of the mining industry and which goes to the core of why we need to spread prosperity around our country. The mining tax is going to fund a very substantial increase in superannuation and for someone, say, 30 years old on average earnings that'll mean an additional $100,000 a year when they retire. We are spreading the benefits of the boom from the mining tax through additional family payments and so on, and they have been out there publicly opposing this tax, when it's been in their direct personal interest and they've been seeking to have a disproportionate say in the public debate and a disproportionate influence on public policy.
LEIGH SALES: Well in your speech you say, "We have to stand up and be heard because when the massively wealthy buy the loudest megaphones, the voices of people are drowned out." Well given that, would you like to criticise Cate Blanchett, for example, for using her wealth and fame for promote the carbon tax and environmental concerns?
WAYNE SWAN: There's nothing wrong with anyone who has made a lot of money, creating wealth in our country, from having a say in our national debates.
LEIGH SALES: Except if they oppose Labor policies.
WAYNE SWAN: What I'm pointing to is - no, not at all. What I'm pointing to here is three billionaires in particular that have decided to pursue their only personal economic interests at the expense of working Australians and of course they've managed to get the Liberal Party to adopt their policy holus bolus and we're not gonna be able to spread the benefits of the mining boom to all corners of our country and create a fairer and more prosperous society if their views were to prevail. And they are deploying their resources in extraordinary ways. I mean, I don't regret a word I said about those people in the Monthly essay because we've seen play out over the past couple of months those people trying to exert disproportionate influence in our politics. Gina Rinehart trying to take over Fairfax. You've got Twiggy Forrest mounting a challenge to the mining tax. You've got Clive Palmer, who's taken over the LNP in Queensland holus bolus and is out there advertising as we speak.
LEIGH SALES: But Twiggy Forrest mounting a legal challenge to the mining tax, I mean, you don't have to be the billionaire to do that. What about the case of that father from Toowoomba who took the Federal Government successfully to the High Court after your school chaplain's program. You don't have to be a billionaire in Australia to do that.
WAYNE SWAN: No. No, you don't. And people will have views about the actions of that particular gentleman. But the point I'm making is these people have very deep pockets and they're seeking to have a disproportionate say in our public debate, taking out newspaper ads for example, as Twiggy Forrest has done and a whole lot of other activities. They're seeking to have a disproportionate say in our democracy and a disproportionate influence in the policy outcomes which are at the expense of hardworking Australians who deserve to see the benefits of the mining boom spread to every corner of our country.
LEIGH SALES: But, OK, if you talk about deep pockets and influence then what about the millionaire property developer Maurice Schwartz who - you write for his magazine, The Monthly? His wealth allows him the megaphone of having his very own magazine to promote his hobby horses.
WAYNE SWAN: And I would criticise people like that if they were out there opposing important public policy which is in the national interest, trying to do it in the national interest, but really doing it in their own vested interests.
LEIGH SALES: But that's a subjective view though.
WAYNE SWAN: They're not the only people in Australia ...
LEIGH SALES: That's very subjective ...
WAYNE SWAN: Of course it is!
LEIGH SALES: ... because you say, "They're my policies and they're great and they're in the national interest," but others beg to differ.
WAYNE SWAN: Yes. That's right. That's right.
LEIGH SALES: And they're allowed to.
WAYNE SWAN: But these people have disproportionate - yeah, and - well, take Gina Rinehart: she's worth $30 billion. She doesn't need a very big tax cut from Tony Abbott. That's what she's gonna get. And that's coming at the expense of ordinary workers, coming at the expense of their super, coming at the expense of investment and infrastructure, coming at the expense of increases in family payments for people on low and middle incomes. And that's a legitimate point to make. That's why I wrote the essay in The Monthly, and since that period their behaviour has justified everything I said back in March.
LEIGH SALES: In that John Button Lecture tonight you say that, "Labor doesn't talk nearly enough about our party's broad traditions and political culture, certainly not in ways that are appealing to young people." But is the problem more - it's not that you don't talk enough, but perhaps you're talking about things that young people don't connect with, for example the Prime Minister's opposition to gay marriage, which is an issue that a lot of young people support.
WAYNE SWAN: Well I think what I'm trying to do tonight is to speak very candidly. That's something that John Button did. It's something that I'm doing tonight, but I'm trying to do it also in a different way, because, you know, music really fuels the passion. Music fuels your imagination. John Button said that his inspiration was literature. I've just said that my inspiration tends to come more through music. And each to their own. But I'm not in any way ashamed that I find in music the sustenance that I need to pursue my energies in public life and to pursue the policies that I think are good for the country. I think that's a pretty logical thing to do.
LEIGH SALES: Wayne Swan, thank you very much for making time to speak to us tonight.
WAYNE SWAN: Thank you. |
global_01_local_0_shard_00000017_processed.jsonl/12158 | Israel police hunt for failed British suicide bomber
Posted May 01, 2003 22:11:00
Israeli security forces are hunting for a British citizen, who had planned to blow himself up with his compatriot in Tel Aviv on Wednesday.
The passport photographs of British Muslims Asif Hanif and his friend Omar Khan Sharif are splashed across newspapers today, with editorials warning of a new global wave of anti-Israeli attacks.
Israeli officials are investigating possible links with the Al Qaeda network and the Lebanese Shi'ite militia Hezbollah.
Asif Hanif died after exploding his bomb outside a Tel Aviv bar.
His compatriot was not able to detonate his device, instead fleeing after a scuffle with passers-by.
It is the first case of a foreign suicide bomber in the 31-month conflict.
Topics: unrest-conflict-and-war, israel, palestinian-territory-occupied, united-kingdom |
global_01_local_0_shard_00000017_processed.jsonl/12195 | Page is loading...
The Constituents of Supplication
One of the important issues included in the holy verse regarding supplication and Almighty God's promise to respond (2:186) is that it has mentioned some constituents for supplication:
The second constituent is the supplicant who should have certain conditions for his supplication to be responded to. The supplicant should be sincere in his intention. This is because, as it has been mentioned earlier, the mouth's tongue should express the heart's tongue. Therefore a wandering heart (Lahi) and an ignorant heart (Sahi) can not be a supplicant (da'ee).
The third constituent is Allah (or Mad'uo—the invoked one). This means that the supplicant should recognize his God and should know that Allah is unique.
فَادْعُوا اللَّهَ مُخْلِصِينَ لَهُ الدِّينَ.
أَمَّنْ يُجِيبُ الْمُضطَرَّ إِذَا دَعَاهُ وَيَكْشِفُ السُّوءَ.
وَاجْعَلْني مِمَّنْ يَدعُوكُ مخلِصاً في الرّخاءِ دُعاءَ المُخْلِصينَ المُضْطَرّينَ لكَ في الدُّعاءِ.
He also says:
اَللّهُمّ إنّي أخْلَصْتُ بإنقِطاعِي إلَيْكَ وَأقْبَلْتُ بِكُلِّي عَلَيكَ وَصَرَفْتُ وَجْهي عَمَّنْ يَحْتاجُ إلى رِفْدِكَ وَقَلَبْتُ مَسْألَتي عَمَّنْ لَمْ يَسْتَغْنِ عَنْ فَضْلِكَ وَرَأيْتُ أنَّ طَلَبَ المُحْتاجِ إلى المُحْتاجِ سَفَهٌ مِنْ رَأيِهِ وَضِلَّةٌ مِنْ عَقْلِهِ.
مِنْ أيْنَ لِيَ الخَيْرُ يا رَبِّ وَلا يوجَدُ إلاّ مِنْ عِنْدِكَ؟ وَمِنْ أيْنَ ليَ النَّجاةُ وَلا تُسْتَطاعُ إلاّ بِكَ؟ لا الَّذِي أحْسَنَ اسْتَغْنى عَنْ عَونِكَ وَرَحْمَتِكَ وَلا الّذي أساءَ وَاجْتَرأَ عَلَيْكَ وَلَمْ يُرْضِكَ خَرجَ عَنْ قُدْرَتِكَ يا رَبِّ.
The Prophet (s) says:
فَاسْأَلوا اللهَ رَبَّكم بِنِيّاتٍ صادِقَةٍ وَقُلوبٍ طاهِرَةٍ.
Imam as-Sadiq (s) says:
القَلْبُ السّليمُ الّذي يَلقى رَبَّهُ وَلَيسَ فيهِ أحَدٌ سِواهُ.
تَبَحَّروا قُلوبَكُم فإنْ أنْقاها اللهُ مِنْ حَرَكَةِ الواجِسِ لِسَخطِ شَيءٍ مِن صُنْعِه فإذا وَجَدْتُمُوها كَذلِكَ فَاسْئَلوهُ ما شِئْتُم.”
اَللّهُمّ اغْفِرْ لي ما تَقَرَّبْتُ بهِ إلَيكَ بِلِساني ثُمّ خالَفَهُ قَلبي.
الَّذِي خَلَقَنِي فَهُوَ يَهْدِينِي. وَالَّذِي هُوَ يُطْعِمُنِي وَيَسْقِينِي. وَإِذَا مَرِضْتُ فَهُوَ يَشْفِينِي. وَالَّذِي يُمِيتُنِي ثُمَّ يُحْيِينِ. وَالَّذِي أَطْمَعُ أَنْ يَغْفِرَ لِي خَطِيئَتِي يَوْمَ الدِّينِ.
He has ascribed to God the power of guidance and the acceptance of guidance to himself. He has ascribed feeding to God and hunger and thirst to himself. He ascribed healing to God, but disease to himself. He recognizes life and death to be Allah's. He knows that to err is a matter of man but to forgive is Allah's. Then he invoked Allah by saying:
رَبِّ هَبْ لِي حُكْمًا وَأَلْحِقْنِي بِالصَّالِحِينَ. وَاجْعَلْ لِي لِسَانَ صِدْقٍ فِي الْآخِرِينَ. وَاجْعَلْنِي مِنْ وَرَثَةِ جَنَّةِ النَّعِيمِ. وَاغْفِرْ لِأَبِي إِنَّهُ كَانَ مِنْ الضَّالِّينَ.
First Constituent: The Spiritual Attraction
مَنْ أعْطَى الدُّعاءَ أَعْطى الإجَابَةَ.
“The one who has given you supplication will respond to it.”4
الدُّعاءُ سِلاحُ المُؤمِنِ.
“Supplication is the believer's weapon.”5
In Bihar al-Anwar, we read the following tradition:
لا يَرُدُّ القَضاءَ إلاّ البَلاءُ.
“Nothing causes a divine decree to be annulled except supplication.”6
Imam as-Sadiq (s) has said:
الدُّعاءُ يَرُدُّ القَضاءَ بَعْدَ ما أُبْرِمَ إبْراماً، فَأَكْثِرْ مِنَ الدُّعاءِ فإنَّهُ مِفتاحُ كُلِّ رَحْمَةٍ وَنَجاحُ كُلِّ حاجَةٍ وَلا يُنالُ ما عِنْدَ اللهِ عَزَّ وَجَلَّ إلاّ بالدُّعاءِ وَلَيْسَ بابٌ يَكْثُرُ قَرْعُهُ إلاّ يوشَكُ أنْ يُفتَحَ لِصاحِبِهِ.
We read in Imam Ali's will to Imam Hassan (s) mentioned in Nahj al-Balaghah:
ثُمَّ جَعَلَ في يَدِكَ مَفاتِيحَ خَزائِنِهِ بِما أَذِنَ لَكَ فِيهِ مِنْ مَسأَلَتِهِ، فَمَتی شِئْتَ اسْتَفْتَحْتَ بِالدُّعاءِ أبْوابَ نِعَمِهِ وَاسْتَمْطَرْتَ شَآبيبَ رَحْمَتِهِ.
Imam as-Sajjad (s) says:
الحَمْدُ للهِ الّذي أُنادِيهِ كُلَّما شِئْتُ لِحاجَتي وَأَخْلو بهِ حَيثُ شِئْتُ لِسِرّي بِغَيْرِ شَفيعٍ، فَيَقْضِي لي حَاجَتي.
In the Sabah (morning) Supplication, we read:
إلٰهِي إنْ لَمْ تَبْتَدِئْني الرّحْمَةَ مِنْكَ بِحُسْنِ التّوْفِيقِ فَمَن السّالِكُ بي إلَيْكَ في وَاضِحِ الطّريقِ.
Imam Husayn (s) says in Arafah Supplication:
إلٰهِي أطْلُبْني بِرَحْمَتِكَ حَتیّ أصِلَ إلَيكَ وَاجذِبْني بِمَنِّكَ حَتیّ أُقْبِلَ عَلَيكَ.
هَلْ تَعْرفونَ طُولَ البَلاءِ مِنْ قِصَرِهِ؟ قلنا: لا، قال: إذا أُلْهِمَ أَحَدُكُم الدُّعاءَ عِندَ البَلاءِ فَاعْلَمُوا أنَّ البَلاءَ قَصيرٌ.
Concerning this, Imam al-Kadhim (s) says:
ما مِنْ بَلاءٍ يَنْزِلُ عَلى عَبْدٍ مُؤمِنٍ فَيُلْهِمُهُ اللهُ عَزَّ وَجَلَّ الدُّعاءَ إلاّ كانَ كَشْفُ ذلِكَ البَلاءُ وَشيكاً وَما مِنْ بَلاءٍ يَنْزِلُ عَلى عَبْدِ مُؤمِنٍ فَيُمْسِكُ عَنِ الدُّعاءِ إلاّ كانَ ذلِكَ البَلاءُ طَويلاً؛ فإذا نَزَلَ البَلاءُ فَعَلَيْكُمْ بِالدّعاءِ وَالتَّضَرُّع ِإلى اللهِ عَزَّ وَجَلَّ.
Supplication is a Kind of Acceptance
Hafiz, the Iranian poet, says:
Hafiz, it is your duty to engage in supplication,
Do not worry if it is heard or not.
إنَّ اللهَ إذا أرادَ أنْ يَستَجيبَ لِعَبْدٍ أذِنَ لهُ في الدُّعاءِ.
He has also said:
مَنْ فُتِحَ لهُ مِنكم بابُ الدُّعاءِ فُتِحَتْ لهُ أبوابُ الرّحْمَةِ.
Asking Allah to be given a chance of Supplication
Imam as-Sajjad (s) has said:
اَللّهُمَّ إجْعَلْني أَصولُ بِكَ عِندَ الضَّرورَةِ وَأسْألُكَ عِندَ الحاجَةِ وَأتَضَرَّعُ إلَيْكَ عِندَ المَسْكَنَةِ.
وَلا تَفْتِنّي بالإسْتِعانَةِ بِغَيرِكَ إذا اضْطُرِرْتُ وَلا بِالخُضوعِ لِسُؤالِ غَيرِكَ إذا افتَقَرْتُ وَلا بِالتَّضَرُّعِ إلى مَنْ دُونَكَ إذا رَهِبْتُ فَأستَحِقّ بذلِكَ خُذْلانَكَ وَمَنْعَكَ وإعْراضَكَ.
فَذَكَروكَ بِمَنِّكَ وَشَكَروكَ بِفَضْلِكَ وَدَعَوْكَ بِأمْرِكَ.
وَأعْمِرْ لَيلي بإيقاظِي فِيهِ لِعِبادَتِكَ وَتَفَرُّدي بِالتَّهَجُّدِ لَكَ وَتَجَرُّدي بِسُكوني إلَيكَ وَإنزالِ حَوائِجي بِكَ.
It is also narrated:
فَإنّا بِكَ وَلَكَ وَلا وَسِيلَةَ لَنا إلَيْكَ إلاّ أنْتَ.
A poet says:
“Both supplication and response are yours,
Security is from you, magnanimity is also yours.” 17
لَمْ يَمْنَعْكَ جَهْلي وَجُرْأتِي عَلَيْكَ أنْ دَلَلْتَني إلَى مَا يُقَرِّبُني إلَيْكَ وَوَفَّقْتَني لِما يُزْلِفُني لَدَيْكَ.
إلٰهي أنا الفَقِيرُ في غِنايَ فَكَيْفَ لا أكُونُ فَقِيراً في فَقْري!
In the Holy Qur'an, we read:
يَا أَيُّهَا النَّاسُ أَنْتُمْ الْفُقَرَاءُ إِلَى اللَّهِ وَاللَّهُ هُوَ الْغَنِيُّ الْحَمِيدُ.
The Permanent Attraction
Those who reach this stage will not say:
اَللّهُمَّ اجْعَلْني أَصُولُ بِكَ عِنْدَ الضّرورَةِ.
We read in the Holy Qur'an:
قَالَ فَبِعِزَّتِكَ لَأُغْوِيَنَّهُمْ أَجْمَعِينَ. إِلَّا عِبَادَكَ مِنْهُمْ الْمُخْلَصِينَ.
In other words, that lofty position is beyond the Satan's reach. At this stage, the attraction between God and His servants has reached the highest degree of elevation. Their supplication “O my Lord, fill my heart with love to You and fear of You,”20 is already answered. There is no place in their hearts for the Satan's penetration. This is because they are among those, who say: “O my God! Let me be among those, in whose hearts the trees of longing to You have rooted and whose hearts have been occupied with Your love so to the best of grace they resort, in the gardens of nearness and disclosure they delight and from the ponds of love they drink.”
لَقَدْ دَعَوْتُ اللهَ مَرّةً فَاسْتَجابَ وَنَسِيتُ الحَاجَةَ لأنَّ اسْتِجابَتَهُ بإقْبالِهِ عَلی عَبْدِهِ عِندَ دَعْوَتِه أعْظَمُ وَأَجَلُّ مِمّا يُريدُ مِنهُ العَبدُ.
“Once I invoked Allah. My supplication was answered but I forgot my need I wanted to ask for. This is because Allah's response to His servant when invoking Him is greater and loftier to him than achieving what he wants.”2129
مَنْ شَغَلَهُ ذِكْري عَنْ مَسْألَتي أَعْطَيْتُهُ أفْضَلَ ما أُعْطي السّائِلينَ.
We also read:
إنّ العَبْدَ لَتَكونُ لهُ الحاجَةُ إلى اللهِ فَيَبْدَأُ بِالثّناءِ عَلى اللهِ وَالصّلاةِ عَلى مُحَمّدٍ وَآلِهِ حَتىّ يَنْسى حاجَتَهُ فَيَقْضِيها مِنْ غَيرِ أنْ يَسْألَهُ إيّاها.
“Sometimes a servant needs something from Allah and then he begins praising Allah and praying Him to bless Muhammad (s) and his pure progeny to a degree that he forgets his need. But Allah achieves his need without being asked for it by this servant.”22
Imam as-Sajjad (s) invokes Allah by saying:
إلهِي فَأجْعَلْنا ممَّنْ هَيَّمْتَ قَلْبَهُ لإرادَتِكَ وَاجْتَبَيْتَهُ لمُشاهَدَتِكَ وَأَخْلَيْتَ وَجْهَهُ لكَ وَفَرّغْتَ فُؤادَهُ لحُبِّكَ وَرَغّبْتَهُ فيما عِنْدكَ وَقَطَعْتَ عَنهُ كُلّ شَيءٍ يَقْطَعُهُ عَنكَ.
The Second Constituent: the Supplicant
For Him is magnanimity, pride and glory,
For us wretchedness, feebleness, and needs of all sorts.
From Imam Ali's spring of eloquence in his prayers, we also read:
إلَهي كَفى بيَ عِزّاً أنْ أَكونَ لَكَ عَبْداً، وَكَفى بي فَخْراً أنْ تَكُونَ لي رَبّاً، أنْتَ كَما أُحِبُّ فَاجْعَلْني كَما تُحِبُّ.
1) Submission
إلهِي لَيسَ تشْبَهُ مَسألَتي مَسألَةَ السّائِلِينَ لأنَّ السّائِلَ إذا مُنِعَ إمتَنَعَ عَن السّؤالِ وأنا لا غِناءَ بي عَمّا سَألْتُكَ عَلى كُلّ حالٍ بهِ. إلَهي إرْضَ عَنّي فأعْفُ عَنّي فَقدْ يَعفو السّيِّدُ عَن عَبدِهِ وَهوَ عَنهُ غَيرُ راضٍ، إلَهي كَيفَ أدْعوكَ وَأنا أنا؟ أمْ كَيفَ أيْأسُ مِنكَ وَأنتَ أَنتَ؟
Imam as-Sadiq (s) in his prostration says:
سَجَدَ وَجْهِيَ الذّلِيلُ لِوَجْهِكَ العَزيزِ، سَجَدَ وَجْهي البالي لِوَجْهِكَ الدّائِمِ الباقِي، سَجَدَ وَجْهي الفَقيرُ لِوَجْهِكَ الغَنيِّ الكَبيرِ، سَجَدَ وَجْهي وَسَمْعي وَبَصَري وَلَحْمي وَدَمي وَجِلْدي وَعَظْمي وَما أقَلّتِ الأرْضُ مِنّي للهِ رَبِّ العالَمِينَ.
Imam as-Sajjad (s) says:
وَكَيْفَ يَسْتَغْني العَبدُ عَنْ رَبِّهِ؟ سَيّدي لَمْ أزْدَدْ إلَيْكَ إلاّ فَقْراً وَلَمْ تَزْدَدْ عَنّي إلاّ غِنىً.
2) Believing in God’s Power
The second condition for a genuine supplicant is to recognize Allah with the attribute of “Absolute Rich” and realize that the Creator is aware of all the contents of one's heart and is capable of satisfying all his needs and that there is no impediment and hurdle on the way of His might and power.
تَمَدَّحْتَ بِالغِناءِ عَنْ خَلْقِكَ وَأنْتَ أهْلُ الغِنى عَنْهُم وَنَسَبْتَهُم إلى الفَقْرِ وَهُمْ أهْلُ الفَقْرِ إلَيْكَ فَمَنْ حاوَلَ سَدَّ خِلَّتِه مِنْ عِندِكَ، وَرَامَ صَرْفَ الفَقْرِ عَنْ نَفْسهِ بِكَ فَقَدْ طلَبَ حاجَتَهُ في مَظانِّها وأتَى طِلْبَتَهُ مِن وَجْهِها.
سُبْحانَ رَبّي! كَيفَ يَسأَلُ مُحتاجٌ مُحْتاجاً وَأنَّى يَرْغَبُ مُعْدِمٌ إلى مُعْدِمٍ!
Imam Ali (s) says:
سُبحانَ الّذي يَتَوكَّلُ كُلُّ مُؤمِنٍ عَلَيهِ وَيُضْطَرُّ كُلُّ جاحِدٍ إلَيْهِ وَلا يَسْتَغني أَحَدٌ إلاّ بِفَضْلِ ما لَدَيْهِ.
In Al-Sahifah al-Sajjadiyyah, we read:
سُبحانَ مَنْ قَدَّرَ بِقُدرَتِهِ كُلَّ قُدرَةٍ.
“Glory be to Him, Who has determined with His power every power.”29
أصْبَحْنا في قَبْضَتِكَ، يَحْوِينا مُلْكُكَ وَسُلْطانُكَ وَتَضُمُّنا مَشيئَتُكَ وَنَتَصَرَّفُ عَنْ أمْرِكَ وَنَتَقَلَّبُ في تَدبِيرِكَ، لَيْسَ لَنا مِن الأمْرِ إلاّ ما قَضَيْتَ وَلا مِن الخَيرِ إلاّ ما أعْطَيْتَ.
لا يَصْدُقُ إيمَانُ عَبْدٍ حَتىّ يَكونَ بِما في يَدِ اللهِ أوْثَقَ مِنْهُ بِما في يَدِهِ.
“One's faith will not be true unless he is certain of what there is in Allah's hand more than his certainty of what there is in his own hand.”32
3) Regarding God’s Closeness to Man
وَإِذَا سَأَلَكَ عِبَادِي عَنِّي فَإِنِّي قَرِيبٌ.
وَنَحْنُ أَقْرَبُ إِلَيْهِ مِنْ حَبْلِ الْوَرِيدِ.
وَاعْلَمُوا أَنَّ اللَّهَ يَحُولُ بَيْنَ الْمَرْءِ وَقَلْبِهِ.
Imam Ali (s) in his Saturday's Prayer says:
أَتَقَرَّبُ إلَيْكَ بِسَعَةِ رَحْمَتِكَ الّتي وَسِعَتْ كُلَّ شَيءٍ وَقَدْ تَرى يا رَبِّ مَكانِي وَتَطَّلِعُ عَلى ضَميرِي وَتَعْلَمُ سِرّي وَلا يَخْفى عَلَيكَ أمْرِي وَأنْتَ أقْرَبُ إلَيَّ مِنْ حَبْلِ الوَريدِ.
And we read in Abu Hamzeh Thomali's prayer, “Praise be to Allah, Whom I ask for my need whenever I like and Whom I become alone with to disclose my secret whenever I like and then He achieves my need without an intercessor.” Thu'lub al-Yamani asked Imam Ali (s), “Have you seen your God?” Imam Ali (s) said, “Do I worship what I do not see?” Imam Ali (s) then was asked how he had seen God and he replied:
لا تُدْرِكُهُ العُيونُ بِمُشاهَدَةِ العَيانِ وَلَكِنْ تُدْرِكُهُ القُلوبُ بِحَقائِقِ الإيمانِ. قَريبٌ مِنَ الأشْياءِ غَيرَ مُلامِسٍ وَبَعيدٌ مِنْها غَيرَ مُبايِنٍ.
Imam Ali (s) in another sermon says:
سَبَقَ فِي العُلُوِّ فَلا شَيءَ أعْلى مِنْهُ، وَقَرُبَ في الدُّنُوّ فَلا شَيءٌ أقْرَبَ مِنْهُ، فَلا اسْتِعْلاؤهُ باعَدَهُ عَن شَيءٍ مِنْ خَلْقِهِ ولا قُرْبُهُ ساوَاهُمْ في المَكانِ بهِ.
Hafiz, the Iranian poet says:
There is no wall between a lover and a beloved,
You yourself are a wall, then get removed.
4) Sincerity
5) Real Invoking
6) Good Manners in Supplication
In other words, the best kind of good manners is obedience and servitude towards God and self-denial and confessing one's faults. Such have been the morals of the prophets and the infallible imams (s). Concerning the matter of obedience and servitude to God, Allamah Tabataba’i has stipulated certain conditions all of which are based on the Holy Qur'an. We will briefly refer to some of them.
Examples of the Prophets’ Manners towards Allah as mentioned in The Holy Qur’an
Jesus (s)
Allah has said:
وَإِذْ قَالَ اللَّهُ يَا عِيسَى ابْنَ مَرْيَمَ أَأَنتَ قُلْتَ لِلنَّاسِ اتَّخِذُونِي وَأُمِّي إِلَهَيْنِ مِنْ دُونِ اللَّهِ قَالَ سُبْحَانَكَ مَا يَكُونُ لِي أَنْ أَقُولَ مَا لَيْسَ لِي بِحَقٍّ إِنْ كُنتُ قُلْتُهُ فَقَدْ عَلِمْتَهُ.
Out of this verse we learn the following points:
• Jesus Christ (s) did not use negative response to God's question. He did not say that he had not done it. There are two points here. Firstly, negation here is one sort of denying, which is against etiquette. Secondly, negation is used when there is a possibility for an act to occur, but we know that being a god for any of God's servants is impossible.
• Jesus Christ (s) left the issue to be cared for by Allah. Thus, he said: “If I had done this, you would have known it”. It is because that God's knowledge is not like ours. It is not incomplete. Whatever is in the whole creation is within His knowledge.
This verse teaches us to be polite when we talk to God. A servant should observe all the sides of his servitude. By the way, one of the advantages of the establishment of the school of supplication is that a God's servant has to learn how to behave before Allah, the Almighty.
Adam (s)
When Adam (s) ate from the forbidden tree's fruit and was addressed by:
أَلَمْ أَنْهَكُمَا عَنْ تِلْكُمَا الشَّجَرَةِ؟
He and his wife began to invoke Allah by saying:
رَبَّنَا ظَلَمْنَا أَنفُسَنَا وَإِنْ لَمْ تَغْفِرْ لَنَا وَتَرْحَمْنَا لَنَكُونَنَّ مِنْ الْخَاسِرِينَ.
Abraham (s)
Manners of Supplication in Imam as-Sadiq’s Statements
إحْفَظْ آدابَ الدُّعاءِ وَانْظُرْ مَنْ تَدْعو وَكَيفَ تَدْعو وَلِماذا تَدعو، وَحَقِّقْ عَظَمةَ اللهِ وَكِبْرِياءَهُ، وَعايِنْ بِقَلْبِكَ عِلْمَهُ بِما في ضَمِيرِكَ وَاطِّلاعَهُ عَلى سِرِّكَ وَما يَكونُ فيهِ مِن الحَقّ وَالباطِلِ، وَاعْرِفْ طُرُقَ نَجاتِكَ وَهَلاكِكَ كَيلا تَدعُوَ اللهَ بِشَيء مِنهُ هَلاكُكَ وَأنتَ تَظُنُّ فيهِ نَجاتكَ. قالَ اللهُ عَزَّ وَجَلَّ: “وَيَدْعُ الْإِنسَانُ بِالشَّرِّ دُعَاءَهُ بِالْخَيْرِ وَكَانَ الْإِنسَانُ عَجُولًا.”وَتَفَكَّرْ ماذا تَسألُ وَكَمْ تَسألُ وَلِماذا تَسألُ. وَالدُّعاءُ اسْتِجابَةٌ لِلكُلِّ مِنْكَ لِلحَقِّ وَتَذْويبُ المُهْجَةِ في مُشاهَدَةِ الرَّبِّ وَتَرْكِ الإخْتِيارِ جَميعاً وَتَسْليم الأمُورِ كُلِّها ظاهِراً وَباطِناً إلى اللهِ، فَإنْ لَمْ تَأتِ بِشَرْطِ الدُّعاءِ فَلا تَنْتَظِرْ الإجابَةَ فَإنّهُ يَعْلَمُ السِّرَّ وَأخْفى، فَلَعَلَّكَ تَدعُوهُ بِشَيءٍ قَد عَلِمَ مِنْ سِرِّكَ خِلافَ ذلِكَ.”
● A supplicant should regard the grandeur of God.
● He should be aware that God has the infinite power.
● A supplicant should have in mind that God knows how to respond to one's needs.
● A supplicant should be aware that God knows what there is in one's mind and knows his secrets, whether good or bad.
● A supplicant should sacrifice every thing to gain Allah's favors. He should love Him sincerely, submit to God in managing his affairs, do away with his wishes, be obedient to God and follow God's commands. This is because the result of all supplications is determined by God. Anybody, who reaches this stage of prosperity, is successful in this life and in the hereafter.
• 1. Al-Sahifah al-Sajjadiyyah, No 22.
• 2. Al-Sahifah al-Sajjadiyyah, No 28.
• 3. Nahj al-Balaghah, Faydh al-Islam, p. 167.
• 4. Al-Kafi, vol. 2, p. 65.
• 5. Al-Kafi, vol. 2, p. 468.
• 6. Bihar al-Anwar, vol. 93, p. 2.
• 7. Al-Kafi, vol. 2, p 470.
• 8. Faydh al-Islam’s Nahj al-Balaghah, p. 924, letter No. 31.
• 9. The Dawn Supplication known as Abu Hamzeh Thamali’s Supplication, Al-Balad al-Amin, p. 205.
• 10. Falahel Sa’el, p 27.
• 11. Al-Kafi, vol. 2, p. 471.
• 12. Tafseer Al-Mizan, vol. 2, p. 42, as quoted from al-Durr al-manthour.
• 13. Al-Sahifah al-Sajjadiyyah, 20.
• 14. Al-Sahifah al-Sajjadiyyah, 45.
• 15. Al-Sahifah al-Sajjadiyyah, 47.
• 16. The 15 Munajat (of Al-Sahifah al-Sajjadiyyah).
• 17. Mathnawi, second Daftar.
• 18. The Supplication of Arafah by Imam Husayn (s).
• 19. Al-Sahifah al-Sajjadiyyah, supplication 20.
• 20. Misbah al-Mutahajjid, p. 100.
• 21. Bihar Al-Anwar, vol. 93, p. 323.
• 22. Bihar Al-Anwar, vol. 93, p.312.
• 23. Bihar al-Anwar, vol. 77, p 402.
• 24. Al-Balad al-Amin, p. 316, Imam Ali’s prayer.
• 25. Al-Balad al-Amin, p.331.
• 26. Al-Sahifah al-Sajjadiyyah, p 336.
• 27. Al-Sahifah al-Sajjadiyyah, No. 13.
• 28. Al-Balad al-Amin, p. 96.
• 29. Al-Sahifah al-Sajjadiyyah, p. 24.
• 30. Al-Sahifah al-Sajjadiyyah, p. 6.
• 31. Al-Kafi, vol. 8, p. 127.
• 32. Nahj al-Balaghah, Sobhi Saleh, No. 310.
• 33. Nahj al-Balaghah of Faydh al-Isalm, No. 178 and Sobhi Saleh No 179.
• 34. Uddat al-Da’ee, p. 242.
• 35. Bihar al-Anwar, vol. 93, p. 322.
Share this page |
global_01_local_0_shard_00000017_processed.jsonl/12208 | Find Your Next Favorite Book
Our Money-Back Guarantee
Way I See It: Autobiog
Test falsehoods about the Reagans, Ronald and Nancy's daughter tells the truth, as only she knows it, in a poignant, at times shocking story of ... Show synopsis
Find your copy
Buy it from $0.99
Buy new from $2.94
Collectible from $10.00
Change currency
Reviews of Way I See It: Autobiog
Write this item's first Alibris review Review it now
Discussions about Way I See It: Autobiog
Start a new discussion
1. What's on your mind? Review post guidelines
Join Today!
Share your ideas with other community members
Create account
Already a member?
Log in now
|
global_01_local_0_shard_00000017_processed.jsonl/12244 | Frequently Asked Questions
What objects of corporate plunder can I acquire in Harry the Handsome Executive?
Last Updated Sep 19, 2005
A coffee mug, donut or donut box will increase your energy. A caffeine pill will give you a quick blast of energy. To defend yourself from hostile takeovers you can use a staple gun, major staple gun, or a shrapnel gun. Of course to use any of them you'll need to gather ammo. You'll also find Mystery Vials in the game, the result of experiments gone awry in the laboratories of ScumCo Inc. The effects of these are unpredictable and inconsistent.
Related question(s):
|
global_01_local_0_shard_00000017_processed.jsonl/12256 | xBlazingStar94x (Level 11)
Wooo, watching Akira :D
followed by
| |
Death Note (Opinion)
So considering i am a big fan of the death note series, i decided for my first proper blog i would write up my opinion of the series.
To start with, if nobody is aware of this anime, i will tell you the basic just of what the series is about. The 'death note' is a notebook that allows you to kill anybody you like just by writing their name into the notebook whilst picturing the face of the person. The death note has several rules to it these include:
1. it will happen.
1. The notebook shall become the property of the human world, once it touches the ground of (arrives in) the human world.
1. The owner of the note can recognize the image and voice of the original owner, i.e. a God of death/Shinigami.
1. The human who uses the notebook can neither go to Heaven nor Hell.
1. The human who touches the Death Note can recognize the image and voice of its original owner, a Shinigami, even if the human is not the owner of the note.
1. Gods of Death, the original owners of the Death Note, do not do, in principle, anything which will help or prevent the deaths in the note.
1. A Shinigami has no obligation to completely explain how to use the note or rules which will apply to the human who owns it unless asked.
1. A Shinigami can extend their own life by putting a name on their own note, but humans cannot.
1. A person can shorten his/her own life by using the note.
1. The human who becomes the owner of the Death Note can, in exchange of half his/her remaining life, get the eyes of the Shinigami which will enable him/her to see a human’s name and remaining life span when looking through them.
1. A god of death cannot be killed even if stabbed in his heart with a knife or shot in the head with a gun. However, there are ways to kill a Shinigami, which are not generally known to the Shinigami.
1. The specific scope of the condition for death is not known to the Shinigami, either. So, you must examine and find out.
These are not all the rules but the main and you get the idea of what the death note does.
So it all begins when a shinigami (god of death) named 'ryuk' drops his notebook into the 'human world' A young high school student, Light Yagami, finds the notebook on the floor and decides to kill off all criminals and become a 'god' of the 'new world' by getting rid of all evil. It later becomes battle to the death between the two greatest minds the world has between L and Light.
What is good about this anime is that you could take a side of either L, a very talented detective, or Light. L doesn't believe all criminals should be killed and works with police to stop light or aka 'Kira'.
I don't want to go into the entire series and say what i thought was best but i want to say what i thought about the death of L. After L dies, the anime seems to die a bit. I wouldn't mind if he died at the end of the series with Light but bringing Near into it was just like a smaller, younger version of L and i didn't like him at all really.
What i wanted to ask in this post, to the fans of death note, is what you think the ending should of been like. So an alternative ending? Or do you actually like the ending how it was, if so why do you think that?
Mandatory Network
Submissions can take several hours to be approved.
Save ChangesCancel |
global_01_local_0_shard_00000017_processed.jsonl/12273 | I think it really depends on the reputation of the seller and whether there is any trial period.
For example, if someone here tells me that there is a small defect in the lens, but it has no noticeable effect on the image, I'm likely to believe them. And if I get the right to examine and return it if dissatisfied, then I would most likely take the chance. This is a small tight knit community, and nobody want the reputation of being a cheat..
OTOH, if someone on evilBay says it's mint out of the box, but "I don't know nuthin about cameras man" then I just assume it got tested, doesn't work, and they're playing stupid. Or, in the lens example "It such a small defect I couldn't get a picture of it" then it may very well have a knife gouge across the front.
So, yes, I might very well by a less than perfect lens, so long as it's disclosed and I'm not paying a premium price. In my case, the limiting factor is usually the photographer, not the lens. |
global_01_local_0_shard_00000017_processed.jsonl/12275 | Quote Originally Posted by jdef
Davis does not exclude the use of a spotmeter for use with BTZS...
In Kirk's example, a spotmeter seems to me the better tool for the job, requiring less interpretation and workarounds.
I'm sure Sandy's method for determining low subject ranges with an incident meter works well enough, but that is not the same as saying it works better than a spotmeter would in that situation.
Jay - I did see that Davis does discuss the use of spotmeters, and I also agree that a spot metering technique should be more accurate, as it is directly measureing the luminance range of the scene, and not estimating it as the incident system would.
I was just curious about how the other half lives when they only have an incident meter when I posed the question.
I do highly recommend the Minolta Flashmeter VI because it can do both incident and reflected metering. And even flash! It can even compare an incident measurement with a spot reading and display the difference in stops. Really neat feature. I love it! (Sekonic also makes a similar meter.)
And since the Flashmeter VI reads in 0.1 stop increments, so you actually could measure SBRs to decimal places, like 7.9 - 4.5 + 5 = 8.4 SBR.
Not that you really need that sort of precision, but you could if you wanted to... |
global_01_local_0_shard_00000017_processed.jsonl/12276 | Mike, (and j-dogg who commented in Gallery), Looking forward to your shots.
It's interesting the "command performances" we had this year, the eclipse, the transit of Venus. In each case, the 12-inch telephoto was the best tool in my shed, though not exactly suited to the task.
I think you are right. I should have tried to center the image, then that would have happened. |
global_01_local_0_shard_00000017_processed.jsonl/12279 | Good drawings. Yes as I said we are just saying the same thing differently. To me the second picture is not just upside down it is flopped. It is upside down and backwards. The 3rd image is merely upside down. If you actually take a piece of paper and make that drawing in picture #1 and then spin it round till it is upside down you get picture #3. If you spin it round upside down and turn it over you get picture #2. That is if you can see through the paper. |
global_01_local_0_shard_00000017_processed.jsonl/12301 |
Can you help me get my mini Dell laptop's touchpad to work again?
Well all ive tried were the restart button,F6,and the reboot button.
Report as
First make sure that the mouse settings are correct. If that doesn't fix the problem, download the 'touchpad' driver and install it. Check out the link for additional details
Report as
Add a comment...
Do you have an answer?
Answer this question...
Did you mean?
Login or Join the Community to answer
Popular Searches |
global_01_local_0_shard_00000017_processed.jsonl/12305 | Skip to main content
9ff shows 272-mph GT9 Vmax at Essen show [w/video]
by Jonathon Ramsey (RSS feed) on Dec 5th, 2012 at 2:31PM
There's a scene in Wall Street: Money Never Sleeps where Shia LaBoeuf asks a fellow banker, "What's your number – how much would you need to get out of the business?" The answer he gets: "More." More is apparently the operating principle at 9ff, the specialist Porsche tuner out of Germany that has showed up at Essen with its 9ff GT9 Vmax. Over the four years of the GT9's existence it has gone from 987 horsepower and a 253-mile-per-hour top speed to this, a 1,381-hp El Superbeasto with a terminal velocity said to be 271.54 mph. Built on the skeleton of the 997-model Porsche 911, it... Read More
Autoblog iPhone App
Shop for a vehicle |
global_01_local_0_shard_00000017_processed.jsonl/12313 | or Connect
AVS › AVS Forum › Audio › DIY Speakers and Subs › Market for quiet amps.....
New Posts All Forums:Forum Nav:
Market for quiet amps.....
post #1 of 12
Thread Starter
Do you think there is a market for proamps that have aftermarket quiet fans... Just a thought....
post #2 of 12
My Ashly KLR series amps are extremely quiet stock. There may be small demand for quieter EP4k and FP clones though.
post #3 of 12
The only down side is you now have an amp without enough cooling for demanding jobs, IE, PA use. Someone grabs one, tosses it in their rack, cooks one after an hour, and calls you demanding a new one under warranty.
But just tossing out ideas. If I were to build an amp specifically for HT use, I would design it with a lot of metal in the heat sink to help absorb the heat generated by the loud passages. Instead of thermal swings of the heat sink from say 80° to 200° back to 80° in just a matter of a minute, they might be 80 to 120 to 80 in five minutes. There would be no need for a fan to increase fan speed to help cool it down due to excessive heat build up, because the temp would be kept more consistent.
post #4 of 12
Thread Starter
Almost seems like a Crown K2 clone would be in order, any takers ?????
post #5 of 12
A K2 in a plain black case with removable ears so it can rack mount or go in a consumer stand would seem like a winner to me.
post #6 of 12
I think the potential liability for modded amps (Berry EP/iNuke, Peavey IPR, etc.) would exceed the financial benefit. It's one thing for an owner to do something to a personal unit that one reasonably knows could impair its function. It's quite another to sell such a part.
As for something like a Crown K2 clone, I don't know whether that's feasible, given IP issues. But even if it is feasible, I suspect the market for people who want them would be quite small. Especially since it wouldn't have Crown's warranty or resale value. And such an amp, I'd assume, would not be properly safety-certified by an OSHA-approved NRTL. I cannot fathom why people would allow uncertified electronics into their home. (Note that a Dayton SA1000 has a UL stamp on the back. Likewise, a Crown XLS2500 carries a CSA stamp on the back. Others have stamps from ETL or other OSHA-approved testing labs.)
IMO, people who want quieter amps should either use amps known to have less active fans (e.g. Crown XLS Drivecore rather than Berry iNuke or Peavey IPR), or amps designed without them (e.g. Dayton SA1000). Or modify one's own part at one's own risk.
post #7 of 12
There is also the Yamaha P7000s already besides the k2
post #8 of 12
Originally Posted by Svendsen View Post
There is also the Yamaha P7000s
I've never heard the fans on any of my older P or current P-S series Yamaha pro amps come on at home. When I used some of them for PA, it was still rare to note the fans were on.
The only market for high power, low fan noise amps is the DIY and niche even for audio, audio sectors.
The alternatives like the Yamahas and others get overlooked because they are not as cheap as a Behringer in W/$.
post #9 of 12
Originally Posted by kgveteran View Post
Are we assuming sub only use for these quiet amps? Didn't the K2 have problems (output) down low? I think I remember a test a few years ago.
post #10 of 12
As a general rule to keep the size realistic(of the heatsinks and therefore the overall amplifier size) with passive or very low speed fans a very high power amplifier must be incredibly efficient, and efficiency costs. The ep's are cheap and powerful but they generate a lot of heat, worst part is they generate a very inconsistent amount of heat, I don't mean depending on usage I mean from one amp to the next their idle heat generation varies considerably. Some work just fine with fan mods and some meltdown, with the same usage.
post #11 of 12
speakerpower might already have a rackable/stand alone version of its plate amp. i don't think that it has a fan and it puts out pretty good power.
post #12 of 12
you main problem will be... people have a hard time to pay 300$ for a cheap beriger with 2k watts..... how can you compete against beri????? i hate beri but 300 $ is a no brainer for the bang.
New Posts All Forums:Forum Nav:
Return Home
Back to Forum: DIY Speakers and Subs |
global_01_local_0_shard_00000017_processed.jsonl/12332 | Journey into an Icelandic volcano
Dr Freysteinn Sigmundsson, a geophysicist at the University of Iceland and a co-leader of the FutureVolc project shows the BBC's Neil Bowdler around the dormant Thrihnukagigur volcano in Iceland.
They head down into the volcano on a cradle and see the magma-filled crack where magma forced its way up through the Earth's crust 5000 years ago, carving out a unique volcanic chamber.
|
global_01_local_0_shard_00000017_processed.jsonl/12366 | 1. Early Period
2. The Older Empire
3. The Second Empire
4. Last Period and Fall of Empire
Assyria, a Greek name formed from Asshur ('ashshur; 'Assour; Assyrian Assur):
The primitive capital of the country.
I. Geography.
The origin of the city (now Kala'at Shergat), which was built on the western bank of the Tigris between the Upper and Lower Zab, went back to pre-Sem times, and the meaning of the name was forgotten (see Genesis 2:14, where the Hiddekel or Tigris is said to flow on the eastern side of Asshur). To the North of the junction of the Tigris and Upper Zab, and opposite the modern Mossul, was a shrine of the goddess Ishtar, around which grew up the town of Nina, Ninua or Nineveh (now Kouyunjik and Nebi Yunus). Another early sanctuary of Ishtar was at Urbillu, Arbailu or Arbela, East of the Upper Zab. North of Nineveh was Dur-Sargina (now Khorsabad) where Sargon built his palace (720 BC). All this district was embraced in the kingdom of Assyria which extended from Babylonia northward to the Kurdish mountains and at times included the country westward to the Euphrates and the Khabur.
II. Early History.
The whole region was known to the early Babylonians as Subartu. Its possession was disputed between Semitic Amurru or \AMORITES\ (which see) and a non-Semitic people from the North called Mitannians. The earlier high priests of Assur known to us bear Mitannian names. About 2500 BC the country was occupied by Babylonian Semites, who brought with them the religion, law, customs, script and Semitic language of Babylonia (Genesis 10:11,12, where we should read "He went forth to Asshur"; see Micah 5:6). The foundation of Nineveh, Rehoboth-'Ir (Assyrian Rebit-Ali, "the suburbs of the city"), Calah and Resen (Assyrian Res- eni, "head of the spring") is ascribed to them. The triangle formed by the Tigris and Zab, which enclosed these cities, was in later times included within the fortifications of the "great city" (Genesis 10:12; Jonah 3:3). Assyria is always distinguished from Babylonia in the Old Testament, and not confounded with it as by Herodotus and other classical writers.
III. Climate and Productions.
Assyria, speaking generally, was a limestone plateau with a temperate climate, cold and wet in winter, but warm during the summer months. On the banks of the rivers there was abundant cultivation, besides pasture-land. The apple of the North grew by the side of the palm-tree of the South. Figs, olives, pomegranates, almonds, mulberries and vines were also cultivated as well as all kinds of grain. Cotton is mentioned by Sennacherib (King, PSBA, December, 1909). The forests were tenanted by lions, and the plains by wild bulls (rimi, Hebrew re'emim), wild asses, wild goats and gazelles. Horses were imported from Cappadocia; ducks were kept, and mastiffs were employed in hunting.
IV. Population.
The dominant type was Semitic, with full lips, somewhat hooked nose, high forehead, black hair and eyes, fresh complexion and abundance of beard. In character the Assyrians were cruel and ferocious in war, keen traders, stern disciplinarians, and where religion was concerned, intense and intolerant. Like the Ottoman Turks they formed a military state, at the head of which was the king, who was both leader in war and chief priest, and which offered a striking contrast to theocratic state of theBabylonians. It seems probable that every male was liable to conscription, and under the Second Empire, if not earlier, there was a large standing army, part of which consisted of mercenaries and recruits from the subject races. One result of this was the necessity for constant war in order to occupy the soldiery and satisfy their demands with captured booty; and the result, as in the Northern Kingdom of Israel, was military revolution, with the seizure of the throne by the successful general. As might be expected, education was confined to the upper classes, more especially to the priests and scribes.
V. Trade and Law.
As far back as the age of Abraham, when Assyria was still a dependency of Babylonia, trade was carried on with Cappadocia and an Assyrian colony of merchants settled at Kara Eyuk near Kaisariyeh. Down the Euphrates came the silver, copper and bronze of Asia Minor, together with horses. Cedar wood was brought from Mount Amanus, and there was already trade, through Syria, with the Mediterranean. Nineveh itself was probably founded in the interests of the trade with the North. In later days commercial reasons had much to do with the efforts of the Assyrian kings to conquer eastern Asia Minor and the Mediterranean coast of Syria and Pal:
under the Second Empire no pains were spared to obtain possession of the Phoenician cities and divert their commerce into Assyrian hands. Hence the importance of the capture of the Hittite stronghold, Carchemish, by Sargon in 717 BC, as it commanded the road to Syria and the passage across the Euphrates. Nineveh had at that time already become a great resort of merchants, among whom the Semitic Arameans were the most numerous. Aramaic, accordingly, became the language of trade, and then of diplomacy (compare 2 Kings 18:26), and commercial documents written in cuneiform were provided with Aramaic dockets. As in Babylonia, land and houses were leased knd sold, money was lent at interest, and the leading firms employed numerous damgari or commercial agents. Assyrian law was, in general, derived from Babylonia and much of it was connected with trade. The code of Khammu-rabi (Code of Hammurabi) or \AMRAPHEL\ (which see) underlay it, and the same system of judicial procedure, with pleading before judges, the hearing of witnesses, and an appeal to the king, prevailed in both countries.
VI. Art.
Unlike Babylonia, Assyria abounded in stone; the brick buildings of Babylonia, accordingly, were replaced by stone, and the painted or tiled walls by sculptured slabs. In the bas-reliefs discovered at Nineveh three periods of artistic progress may be traced. Under Assur-nazir-pal the sculpture is bold and vigorous, but the work is immature and the perspective faulty. From the beginning of the Second Empire to the reign of Esar-haddon the bas-reliefs often remind us of embroidery in stone. Attempts are made to imitate the rich detail and delicate finish of the ivory carvings; the background is filled in with a profusion of subjects, and there is a marked realism in the delineation of them. The third period is that of Assur-bani-pal, when the overcrowding is avoided by once more leaving the background bare, while the animal and vegetable forms are distinguished by a certain softness, if not effeminacy of tone. Sculpture in the round, however, lagged far behind that in relief, and the statuary of Assyria is very inferior to that of Babylonia. It is only the human-headed bulls and winged lions that can be called successful:
they were set on either side of a gate to prevent the entrance of evil spirits, and their majestic proportions were calculated to strike the observer with awe (compare the description of the four cherubim in Eze 1).
In bronze work the Assyrians excelled, much of the work being cast. But in general it was hammered, and the scenes hammered in relief on the bronze gates discovered by Mr. Rassam at Balawat near Nineveh are among the best examples of ancient oriental metallurgy at present known. Gold and silver were also worked into artistic forms; iron was reserved for more utilitarian purposes. The beautiful ivory carvings found at Nineveh were probably the work of foreign artificers, but gems and seal cylinders were engraved by native artists in imitation of those of Babylonia, and the Babylonian art of painting and glazing tiles was also practiced. The terra-cotta figures which can be assigned to the Assyrian period are poor. Glass was also manufactured.
VII. Mechanics.
The Assyrians were skilled in the transport of large blocks of stone, whether sculptured or otherwise. They understood the use of the lever, the pulley and the roller, and they had invented various engines of war for demolishing or undermining the walls of a city or for protecting the assailants. A crystal lens, turned on the lathe, has been found at Kouyunjik:
it must have been useful to the scribes, the cuneiform characters inscribed on the tablets being frequently very minute. Water was raised from the river by means of a shaduf. VIII. Furniture, Pottery and Embroidery.
The furniture even of the palace was scanty, consisting mainly of couches, chairs, stools, tables, rugs and curtains. The chairs and couches were frequently of an artistic shape, and were provided with feet in the form of the legs of an ox. All kinds of vases, bowls and dishes were made of earthenware, but they were rarely decorated. Clothes, curtains and rugs, on the other hand, were richly dyed and embroidered, and were manufactured from wool and flax, and (in the age of the Second Empire) from cotton. The rug, of which the Persian rug is the modern representative, was a Babylonian invention.
IX. Language, Literature and Science.
The Assyrian language was Semitic, and differed only dialectically from Semitic Babylonian. In course of time, however, differences grew up between the spoken language and the language of literature, which had incorporated many Summerian words, and retained grammatical terminations that the vernacular had lost, though these differences were never very great. Assyrian literature, moreover, was mainly derived from Babylonia. Assur-bani-pal employed agents to ransack the libraries of Babylonia and send their contents to Nineveh, where his library was filled with scribes who busied themselves in copying and editing ancient texts. Commentaries were often written upon these, and grammars, vocabularies and interlinear translations were compiled to enable the student to understand the extinct Sumerian, which had long been the Latin of Semitic Babylonia. The writing material was clay, upon which the cuneiform characters were impressed with a stylus while it was still moist:
the tablet was afterward baked in the sun or (in Assyria) in a kiln. The contents of the library of Nineveh were very various; religion, mythology, law, history, geography, zoology, philology, mathematics, astronomy, astrology and the pseudo-science of omens were all represented in it, as well as poetry and legendary romance. See NINEVEH, LIBRARY OF.
X. Government and Army.
XI. Religion.
The state religion of Assyria was derived from BABYLONIA (which see) and in its main outlines is Babylonian. But it differed from the religion of Babylonia in two important respects:
(1) the king, and not the high priest, was supreme, and
(2) at the head of it was the national god Asur or Assur, whose high priest and representative was the king. Asur was originally Asir, "the leader" in war, who is accordingly depicted as a warrior-god armed with a bow and who in the age when solar worship became general in Babylonia was identified with the sun-god. But the similarity of the name caused him to be also identified with the city of Asur, where he was worshipped, at a time when the cities of northern Babylonia came to be deified, probably under Hittite influence. Later still, the scribes explained his name as a corruption of that of the primeval cosmogonic deity An-sar, the upper firmament, which in the neo-Babylonian age was pronounced Assor. The combination of the attributes of the warrior-god, who was the peculiar god of the commander of the army, with the deified city to which the army belonged, caused Assur to become the national deity of a military nation in a way of which no Babylonian divinity was capable. The army were "the troops of Assur," the enemies were "the enemies of Assur" who required that they should acknowledge his supremacy or be destroyed. Assur was not only supreme over the other gods, he was also, in fact, unlike them, without father or wife. Originally, it is true, his feminine counterpart, Asirtu, the ASHERAH (which see) of the Old Testament, had stood at his side, and later literary pedants endeavored to find a wife for him in Belit, "the Lady," or Ishtar, or some other Babylonian goddess, but the attempts remained purely literary. When Nineveh took the place of Assur as the capital of the kingdom, Ishtar, around whose sanctuary Nineveh had grown up, began to share with him some of the honor of worship, though her position continued to be secondary to the end. This was also the case with the war-god Nin-ip, called Mas in Assyria, whose cult was specially patronized by the Assyrian kings. See BABYLONIA AND ASSYRIA, RELIGION OF.
XII. Excavations.
Rich, who had first visited Mossul in 1811, examined the mounds opposite in 1820 and concluded that they represented the site of Nineveh. The few antiquities he discovered were contained in a single case in the British Museum, but the results of his researches were not published until 1836. In 1843-45 the Frenchman Botta disinterred the palace of Sargon at Khorsabad, 15 miles North of Nineveh, while at Nimrud (Calah) and Kouyunjik (Nineveh) Layard (1845-51) brought to light the ruins of the great Assyrian palaces and the library of Assur-bani-pal. His work was continued by Rassam (1851-54). Nothing more was done until 1873-75 when George Smith resumed excavations on the site of Assur-bani-pal's library; this was followed in 1877-79 by the excavations of Rassam, who discovered among other things the bronze gates of Balawat. At present a German expedition under Andrae is working at Kala'at Shergat (Assur) where the English excavators had already found the cylinder-inscription of Tiglath-pileser I (see SHERGHAT).
XIII. Chronology.
The Assyrians reckoned time by means of limmi, certain officials appointed every New Year's day, after whom their year of office was named. The lists of limmi or "Eponyms" which have come down to us form the basis of Assyrian chronology. Portions of a "synchronous" history of Assyria and Babylonia have also been discovered, as well as fragments of two "Babylonian Chronicles" written from a Babylonian point of view. The "Eponym" lists carry back an exact dating of time to the beginning of the 10th century BC. Before that period Sennacherib states that Tiglath-pileser I reigned 418 years before himself. Tiglath-pileser, moreover, tells us that Samas-Ramman son of Isme-Dagon had built a temple at Assur 641 years earlier, while Shalmaneser I places Samas-Ramman 580 years before his own reign and Erisu 159 years before Samas-Ramman, though Esar-haddon gives the dates differently. Apart from the native documents, the only trustworthy sources for the chronology (as for the history) of Assyria are the Old Testament records. In return the "Eponym" lists have enabled us to correct the chronology of the Books of Kings (see KINGS, BOOKS OF).
XIV. History.
1. Early Period:
Assyrian history begins with the high priests (patesis) of Assur. The earliest known to us are Auspia and Kikia, who bear Mitannian names. The early Semitic rulers, however, were subject to Babylonia, and under Khammurabi (\AMRAPHEL\) Assyria was still a Babylonian province. According to Esar-haddon the kingdom was founded by Bel-bani son of Adasi, who first made himself independent; Hadad-nirari, however, ascribes its foundation to Zulili. Assyrian merchants and soldiers had already made their way as far as Cappadocia, from whence copper and silver were brought to Assyria, and an Assyrian colony was established at Kara Eyuk near Kaisariyeh, where the Assyrian mode of reckoning time by means of limmi was in use. In the age of Tell el-Amarna Letters (1400 BC) Assur-uballid was king of Assyria. He corresponded with the Egyptian Pharaoh and married his daughter to the Bah king, thereby providing for himself a pretext for interfering in the affairs of Babylonia. The result was that his son-in-law was murdered, and Assur-uballid sent troops to Babylonia who put the murderers to death and placed the grandson of the Assyrian king on the Babylonian throne.
Babylonia had fallen into decay and been forced to protect herself from the rising power of Assyria by forming an alliance with Mitanni (Mesopotamia) and Egypt, and subsequently, when Mitanni had been absorbed by the Hittites, by practically becoming dependent on the Hittite king. Shalmaneser I (1300 BC), accordingly, devoted himself to crippling the Hittite power and cutting it off from communication with Babylonia. Campaign after campaign was undertaken against the Syrian and more eastern provinces of the Hittite empire, Malatiyeh was destroyed, and Carehemish threatened. Shalmaneser's son and successor Tukulti-Mas entered into the fruits of his father's labors. The Hittites had been rendered powerless by an invasion of the northern barbarians, and the Assyrian king was thus left free to crush Babylonia. Babylon was taken by storm, and for seven years Tukulti-Mas was master of all the lands watered by the Tigris and Euphrates. The image of Merodach was carried to Assur as a sign that the scepter had passed from Babylon to the parvenu Assyria. A successful revolt, however, finally drove the Assyrian conqueror back to his own country, and when he was murdered soon afterward by his own son, the Babylonians saw in the deed a punishment inflicted by the god of Babylon.
2. The Older Empire:
A few years later the Assyrian king Bel-kudur-uzur lost his life in battle against the Babylonians, and a new dynasty appears to have mounted the Assyrian throne. About 1120 BC the Assyrian king was Tiglath-pileser I, whose successful wars extended the Assyrian empire as far westward as Cappadocia. In one of his campaigns he made his way to the Mediterranean, and received presents from the king of Egypt, which included a crocodile. At Assur he planted a botanical garden stocked with trees from the conquered provinces. After his death the Assyrian power declined; Pitru (Pethor, Numbers 22:5) fell into the hands of the Arameans and the road to the Mediterranean was blocked.
A revival came under Assur-nazir-pal III (884-860 BC) who rebuilt CALAH (which see) and established the seat of the government at Nineveh, where he erected a palace. Various campaigns were carried on in the direction of Armenia and Comagene, the brutalities executed upon the enemy being described in detail by their conqueror. He then turned westward, and after receiving homage from the Hittite king of Carchemish, laid the Phoenicians under tribute. The road to the West was thus again secured for the merchants of Assyria. Assur-nazir-pal was succeeded by his son Shalmaneser II (859-825 BC), who, instead of contenting himself, like his father, with mere raids for the sake of booty, endeavored to organize and administer the countries which his armies had subdued. The famous bronze gates of Balawat were erected by him in commemoration of his victories.
In his reign the Israelites and Syrians of Damascus first came into direct relation with the Assyrians. In 854 BC he attacked Hamath and at Qarqar defeated an army which included 1,200 chariots, 1,200 cavalry and 20,000 infantry from Ben-hadad of Damascus, 2,000 chariots, and 10,000 infantry from. "Ahab of Israel," besides considerable contingents from Ammon, Arvad, Arabia and elsewhere. In 842 BC Shalmaneser penetrated to Damascus where Hazael, the successor of Ben-hadad, who had already been defeated in the open field, was closely besieged. The surrounding country was ravaged, and "Jehu son of Omri" hastened to offer tribute to the conqueror. The scene is represented on the Black Obelisk found at Nimrud and now in the British Museum. Shalmaneser's campaigns were not confined to the West. He overran Armenia, where the kingdom of Van had just been established, made his way to Tarsus in Cilicia, took possession of the mines of silver, salt and alabaster in the Taurus mountains among the Tabal or Tubal, and obliged the Babylonian king to acknowledge his supremacy.
In his later days, when too old to take the field himself, his armies were led by the turtannu or commander-in-chief, and a rebellion, headed by his son Assur-danin-pal (Sardanapalus) broke out at home, where Nineveh and Assur were jealous of the preference shown for Calah. Nineveh, however, was captured and the revolt suppressed after two years' duration by another son, Samas-Ramman IV, who shortly afterward, on his father's death, succeeded to the throne (824-812 BC). His chief campaigns were directed against Media. His son Hadad-nirari III (811-783 BC) was the next king, whose mother was Sammu-ramat (Semiramis). He claims to have reduced to subjection the whole of Syria, including Phoenicia, Edom and Philistia, and to have taken Mari'a, king of Damascus, prisoner in his capital city. After this, however, Assyria once more fell into a state of decay, from which it was delivered by the successful revolt of a military officer Pulu (Pul), who put an end to the old line of kings and took the name of Tiglath-pileser IV (745-727 BC).
3. The Second Empire:
Tiglath-pileser founded the second Assyrian empire, and made Assyria the dominant power in western Asia. The army was reorganized and made irresistible, and a new administrative system was introduced, the empire being centralized at Nineveh and governed by a bureaucracy at the head of which was the king. Tiglath-pileser's policy was twofold:
to weld western Asia into a single empire, held together by military force and fiscal laws, and to secure the trade of the world for the merchants of Nineveh. These objects were steadily kept in view throughout the reigns of Tiglath-pileser and his successors. For the history of his reign, see \TIGLATH-PILESER\. In 738 BC Tiglath-pileser put an end to the independent existence of the kingdom of Hamath, Menahem of Samaria becoming his tributary, and in 733 BC he commenced a campaign against Rezin of Damascus which ended in the fall of Damascus, the city being placed under an Assyrian governor. At the same time the land of Naphtali was annexed to Assyria, and Yahu- khazi (Ahaz) of Judah became an Assyrian vassal, while in 731 BC, after the murder of Pekah, Hoshea was appointed king of Israel (compare 2 Kings 15-17).
In 728 BC Tiglath-pileser was solemnly crowned at Babylon and the following year he died. His successor was another military adventurer, Shalmaneser IV (727-722 BC), whose original name was Ulula. While engaged in the siege of Samaria Shalmaneser died or was murdered, and the throne was seized by another general who took the name of Sargon (722-705 BC). Sargon, for whose history see SARGON, captured Samaria in 722 BC, carrying 27,290 of its inhabitants into captivity. A large part of his reign was spent in combating a great confederation of the northern nations (Armenia, Manna, etc.) against Assyria. Carchemish, the Hittite capital, was captured in 717 BC, a revolt of the states in southern Palestine was suppressed in 711 BC and Merodach-Baladan, the Chaldean, who had possessed himself of Babylonia in 722 BC, was driven back to the marshlands at the head of the Persian Gulf.
In 705 BC Sargon was murdered, and succeeded by his son \SENNACHERIB\ (which see). Sennacherib (705-681 BC) had neither the military skill nor the administrative abilities of his father. His campaign against Hezekiah of Judah in 701 BC was a failure; so, also, was his policy in Babylonia which was in a constant state of revolt against his rule, and which ended in his razing the sacred city of Babylon to the ground in 689 BC. Nine years previously his troops had been called upon to suppress a revolt in Cilicia, where a battle was fought with the Greeks.
4. Last Period and Fall of the Empire:
His son Esar-haddon, who succeeded him (681-669 BC) after his murder by two other sons on the 20th Tebet (compare 2 Kings 19:37), was as distinguished a general and administrator as his father had been the reverse. For his history see \ESARHADDON\. Under him the Second Empire reached the acme of its power and prosperity. Babylon was rebuilt and made the second capital of the empire, Palestine became an obedient province, and Egypt was conquered (674 and 671 BC), while an invasion of the Cimmerians (Gomer) was repelled, and campaigns were made into the heart of both Media and Arabia. Esar-haddon died while on his way to repress a revolt in Egypt, and his son Assur-bani-pal succeeded him in the empire (669-626 BC), while another son Samas-sum-ukin was appointed viceroy of Babylonia. Assur-bani-pal was a munificent patron of learning, and the library of Nineveh owed most of its treasures to him, but extravagant luxury had now invaded the court, and the king conducted his wars through his' generals, while he himself remained at home.
The great palace at Kouyunjik (Nineveh) was built by him. Egypt demanded his first attention. Tirhakah the Ethiopian who had headed its revolt was driven back to his own country, and for a time there was peace. Then under Tandamane, Tirhakah's successor, Egypt revolted again. This time the Assyrian punishment was merciless. Thebes--"No-amon" (Nahum 3:8)--was destroyed, its booty carried away and two obelisks transported to Nineveh as trophies of victory. Meanwhile Tyre, which had rebelled, was forced to sue for peace, and ambassadors arrived from Gyges of Lydia asking for help against the Cimmerians. Elam still remained independent and endeavored to stir up disaffection in Babylonia. Against his will, therefore, Assur-bani-pal was obliged to interfere in the internal affairs of that country, with the result that the Elamites were finally overthrown in a battle on the Eulaeus beneath the walls of Susa, and the conquered land divided between two vassal kings.
Then suddenly a revolt broke out throughout the greater part of the Assyrian empire, headed by Assur-bani-pal's brother, the viceroy of Babylonia. For a time the issue was doubtful. Egypt recovered its independence under Psammetichus, the founder of the XXVIth Dynasty (660 BC) who had received help from Lydia, but Babylonia was reconquered and Babylon after a long siege was starved out, Samas-sum-ukin burning himself in the ruins of his palace. Elam remained to be dealt with, and an Assyrian army made its way to Susa, which was leveled to the ground, the shrines of its gods profaned and the bones of its ancient kings torn from their graves. Then came the turn of northern Arabia, where the rebel sheikhs were compelled to submit. But the struggle had exhausted Assyria; its exchequer was empty, and its fighting population killed. When the Cimmerians descended upon the empire shortly afterward, it was no longer in a condition to resist them. Under Assur-etil-ilani, the son and successor of Assur-bani-pal, Calah was taken and sacked, and two reigns later, Sin-sar-iskun, the last king of Assyria, fell fighting against the Scythians (606 BC). Nineveh was utterly destroyed, never again to be inhabited, and northern Babylonia passed into the hands of Nabopolassar, the viceroy of Babylon, who had joined the northern invaders. Assur, the old capital of the country, was still standing in the age of Cyrus, but it had become a small provincial town; as for Nineveh and Calah, their very sites were forgotten.
See G. Rawlinson, Five Great Monarchies of the Eastern World, 1862-67; Perrot and Chipiez, Histoire de l'art dans l'antiquite, II, 1884; Maspero, Struggle of the Nations, and Passing of the Empires, 3 volumes, 1894-1900; Rogers, A History of Babylonia and Assyria, 1900; Johns, Assyrian Deeds and Documents, 1898; Schrader, KAT, English translation by Whitehouse, 1885; Pinches, The Old Testament in the Light of the Historical Records of Assyria and Babylonia, 1902.
A. H. Sayce
Copyright Statement
These files are public domain.
Bibliography Information
Orr, James, M.A., D.D. General Editor. "Entry for 'ASSYRIA'". "International Standard Bible Encyclopedia". 1915. |
global_01_local_0_shard_00000017_processed.jsonl/12367 | Ezekiel 3:27 (Hebrew Names Version)
View In My Bible
27 But when I speak with you, I will open your mouth, and you shall tell them, Thus says the Lord GOD: He who hears, let him hear; and he who forbears, let him forbear: for they are a rebellious house.
Link Options
More Options |
global_01_local_0_shard_00000017_processed.jsonl/12403 | 08:28AM | 09/28/04
Member Since: 08/23/03
4 lifetime posts
For the last few months, we have noticed that two of the four recessed light fixtures in our kitchen make a periodic popping sound. It can happen when the lights are on, but most often it happenss for a couple hours after the lights are turned off. These fixtures also seem to burn through bulbs in just a couple of months. When we take the bulbs out, the glass has come right out of the metal base. The two parts are only connected by the bulb's internal wires. We, being a little lazy, have just gotten used to it, but it needs to be addressed now that our house is for sale. We live in a 4 year old, one story single family home. Any ideas?
11:22AM | 09/28/04
Member Since: 06/06/03
1250 lifetime posts
By "When we take the bulbs out, the glass has come right out of the metal base" you mean that they're screwed in too hard (or something)? I've heard that you can use a tennis ball (or something like it) to unscrew the base from the socket.
As for the popping noises....hmmmm, I'll hold off and hope someone else fields that one. (But the bulbs wouldn't happen to be brighter than the fixture's recommendation, would they?)
-k2 in CO
Moderator, Miscellaneous Forum
Post a reply as Anonymous
type the code from the image
Post_new_button or Login_button
Painting Garage Floors More_clips
Get the Adobe Flash Player to listen to this audio file.
Newsletter_icon Google_plus Facebook Twitter Pinterest Youtube Rss_icon |
global_01_local_0_shard_00000017_processed.jsonl/12406 | Forgot your password?
Resources for students & teachers
Denis Florence MacCarthy
But I sit and watch the west
Till the sun goes down, in vain;
It was only a cloud with an ivory crest,
A cloud of vapor and rain;
It rises and hides the sea,
And my heart grows chill and numb,
Lest this terrible thing should be,
That my ship will never come.
But the morn is bright—the wave
Is a golden and shining track,
Softly the waters the white sands lave,
And my trusting faith comes back;
Oh, all that I ever lost,
And all that I long to be,
Will be mine when the deep is crossed,
And my ship comes home from sea.
I said that I would see
Her once, to curse her fair, deceitful grace,
To curse her for my life-long agony;
But when I saw her face,
I said, “Sweet Christ, forgive both her and me.”
High swelled the chanted hymn,
Low on the marble swept the velvet pall,
I bent above, and my eyes grew dim,
My sad heart saw it all—
She loved me, loved me though she wedded him.
And then shot through my soul
A thrill of fierce delight, to think that he
Must yield her form, his all, to Death’s control,
The while her love for me
Would live, when sun and stars had ceased to roll.
But no, on the white brow,
Graved in its marble, was deep calm impressed,
Saying that peace had come to her through woe;
Saying, she had found rest
At last, and I, I must not love her now.
It may be in Heaven’s grace,
Beneath the shade of some immortal palm,
That God will let me see her angel face;
Then wild, wild heart be calm,
Wipe out that old love, every sorrowful trace.
I know that if it be,
We two should meet again in Paradise,
’Twould trouble her pure soul if she should see
The old grief in my eyes;
’Twould grieve her dear heart through eternity.
Wipe out that grief, my soul,
And shall I lose all love, in losing this?
Unclasp my spirit, self’s close stolid stole.
Are there no lives to bless?
So will I give my love, my life, no stinted dole.
God will note deeds and sighs,
Throned in far splendor on the heavenly hill,
Though mad sounds from this wretched planet rise—
Moans wild enough to fill
Heaven’s air, and drown its harps in doleful cries.
And angels shall look down,
Through incense rising from my godly deeds.
Approving gleam those eyes of tender brown;
Sure on a brow that bleeds,
The thorns should change to a more glorious crown.
Well done, my soul, well done,
Out of thy grief to rear a ladder tall
To reach the land that lies beyond the sun,
To scale the jasper wall,
And rise to glory on grief’s stepping stone.
God looks into the tide,
Angel and demon troubled, of a man’s mind;
And if my alms are scattered far and wide,
Only my love to find,
Only to pave a path to reach her side—
Follow Us on Facebook
Homework Help
Characters Left: 200 |
global_01_local_0_shard_00000017_processed.jsonl/12440 | That Federal Reserve May Have Finally Found The Limits Of Its Effectiveness en-us Wed, 31 Dec 1969 19:00:00 -0500 Sun, 16 Mar 2014 02:02:02 -0400 Lance Roberts Gary Anderson Fri, 14 Dec 2012 19:49:43 -0500 I think they want little booms after little busts, until they allow a dollar down for houses again. Gary Anderson Fri, 14 Dec 2012 19:48:55 -0500 It can if it gives money to consumers. But it loves the banks. The banks are everything. So, growth won't happen. But then, without the US consumer, the world economy faces a bleak future. Chinese folks are threatened with jail if they run up their credit cards. They won't be packing the trunk with goodies. Maneb Fri, 14 Dec 2012 13:05:58 -0500 The FED will never learn. After all, it can create UNLIMITED paper money.Eventually they will create a boom followed by an epic bust. The kind of bust that Lenin dreamed of. Then follows revolution. john1066 Fri, 14 Dec 2012 12:47:55 -0500 The fed cannot get money into the demand side of the economy. |
global_01_local_0_shard_00000017_processed.jsonl/12484 | Kitty Bobo Resurrected
Kitty Bobo
Remember A KITTY BOBO SHOW? It was a pilot that Cartoon Network produced back in 2001, and as far as CN pilots go, it looked like it had some potential. The appealing design and color styling is what I remember most about the short, though as I recall, the cartoon had decent storytelling too. The show’s co-creator, Kevin Kaliher, recently created a 50-page show bible in Flash where he explores the world of KITTY BOBO in greater depth. You can check out the Flash “electrobooklet” on Kevin’s blog and let him know what you think of the ideas. |
global_01_local_0_shard_00000017_processed.jsonl/12491 | « Prev Though God Makes Us, We Perish Unless He Re-makes… Next »
From this most true and firmly-established principle of the apostolic and catholic faith the writer before us departs in company with the Pelagians. He will not have it that men are born under the dominion of the devil, lest infants be carried to Christ to be delivered from the power of darkness, and to be translated into His kingdom.22692269 Col. i. 13. Thus he becomes the accuser of the Church which is spread over the world; into this Church everywhere infants, when to be baptized, are first exorcised, for no other reason than that the prince of this world may be cast out22702270 John xii. 31. of them. For by him must they be necessarily possessed, as vessels of wrath, since they are born of Adam, unless they be born again in Christ, and transferred through grace as vessels of mercy into His kingdom. In his attack, however, upon this most firmly-established truth, he would avoid the appearance of an assault upon the entire Church of Christ. Accordingly, he limits his appeal to me alone, and in the tone of reproof and admonition he says: “But God made even you, though it must be confessed that a serious error has infected you.” Well now, I thankfully acknowledge that God did make even me; and still I must have perished with the vessels of wrath, if He had only made me of Adam, and had not re-made me in Christ. Possessed, however, as this man is with the heresy of Pelagius, he does not believe this: if, indeed, he persists in so great an error to the very end, then not he, but catholics, will be able to see the character and extent of the error which has not simply infected, but absolutely destroyed22712271 There is a climax in infecerit and interfecerit. him.
Please login or register to save highlights and make annotations
Corrections disabled for this book
Proofing disabled for this book
Printer-friendly version
|
global_01_local_0_shard_00000017_processed.jsonl/12539 | Click here to Skip to main content
Click here to Skip to main content
How to Create an HTML Editor for ASP.NET AJAX
By , 15 Jun 2012
Rate this:
Please Sign up or sign in to vote.
Prize winner in Competition "Best ASP.NET article of May 2008"
Most blog, forum, and Wiki applications use an HTML editor as the primary authoring tool for site content. With this type of a control, an online user can create and edit an HTML document. The user is able to modify the text — including its format, fonts, and colors — as well as add links and images. Often, the user can also view and/or edit the HTML source.
Microsoft AJAX (ASP.NET AJAX Extensions) introduces a new implementation model for server controls with related scripts. This article discusses how to create an HTML editor server control specifically for the Microsoft AJAX environment. The reader can also download the source code, including a sample web page, and view an online demo.
Most modern browsers now support the "editing" of displayed HTML content by the user. When the document designMode property is set to true, the rendered HTML on the page can be edited by the user. While in designMode, the document's execCommand method supports additional commands that enable "programmatic" modification of document content. For example, passing the command string bold as the first parameter to execCommand causes the selected text to appear bold by adding appropriate HTML tags and/or attributes.
The resources listed at the end of this article discuss designMode and execCommand in more detail, and describe how to implement a basic HTML editor. Also, the source code available with this article can be examined for implementation examples.
Microsoft AJAX Model for Server Controls with Related Scripts
As part of ASP.NET AJAX, Microsoft introduced a new "model" for extending the capabilities of a server control with client-side script. That model is described in an ASP.NET AJAX tutorial that should be read along with this article. In general, we create two related controls:
• A server control that implements the IScriptControl interface
• A related client control derived from Sys.UI.Control (part of the client-side AJAX library)
In order for ScriptManager to know how to create and initialize the related client control, we implement the new IScriptControl interface, adding two callback methods. Then, we add a few lines of code to OnPreRender and Render to trigger those callbacks at appropriate times in the page life cycle. The specifics are described in the tutorial, and again in the discussion of HtmlEditor.cs below.
We also encapsulate our client-side behavior in a JavaScript class, implemented as a Microsoft AJAX client control. This permits the client control object to be created and initialized in a standard way by the client-side AJAX code. The specifics are described in the tutorial, and again in the discussion of HtmlEditor.js below.
Source Code
Click the link below to download the source code, including a sample web page.
System Requirements
• ASP.NET 4.0 or higher
Component Parts
• HtmlEditor.cs (the C# file for our server control)
• HtmlEditor.js (the JavaScript file for our client control)
• Images/*.gif (image files for our toolbar images)
UI Elements
Component appearance:
• Two toolbar rows across the top
• Two tabs along the bottom
• An editor area that displays and/or edits the document in either mode
Screenshot - HtmlEditor.jpg
Click here for an online demo.
HTML Schema
• Div container for the control
• Div container for each Toolbar
• Select elements for dropdown lists
• Img elements for buttons
• Div container for the Design editor
• IFrame element for the Design mode document
• Div container for the HTML editor
• IFrame element for the HTML mode document
• Textarea for HTML mode editing
• Div container for the Tabbar
• Div element for each tab
• Img element for the tab icon
• Span element for the tab text
Server Control
• Creates child controls for each HTML element required
• Provides public property methods for configuration properties (colors, etc.)
• Implements property methods for properties passed to the client control on initialization
• Implements default property values
• Implements IScriptControl methods
Client Control
• Provides get and set property methods for properties passed from the server control on initialization
• Dynamically creates the IFrame documents
• Sets designMode to true for the Design mode document
• Provides appropriate handlers for Toolbar and Tabbar mouse events
• Converts to and from XHTML when appropriate
• Converts deprecated syntax inserted by the designMode browser to a standards-based equivalent
• Filters tags and attributes to those allowed
• Removes/restores extraneous default tags inserted by designMode browsers
The component itself contains many different HTML elements, so the server control class is derived from CompositeControl. In addition, the class must implement the IScriptControl methods:
public class HtmlEditor : CompositeControl, IScriptControl
In CompositeControl, child controls are added in the CreateChildControls method:
protected override void CreateChildControls()
To implement the IScriptControl interface, two callback methods are required. The first, GetScriptReferences, tells ScriptManager what related script file(s) to load and from where. For this server control, we have chosen to embed the HtmlEditor.js file in our assembly resources. We tell ScriptManager the full resource path and assembly name so that it can load it from there, simplifying deployment:
protected virtual IEnumerable<ScriptReference>
ScriptReference htmlEditorReference =
new ScriptReference(
return new ScriptReference[] { htmlEditorReference, ... };
The second callback method, GetScriptDescriptors, "maps" properties in the client control(s) to properties in the server control. ScriptManager uses this information to set the appropriate values in the client control as part of its client-side creation:
protected virtual IEnumerable<ScriptDescriptor>
ScriptControlDescriptor descriptor =
new ScriptControlDescriptor("Winthusiasm.HtmlEditor",
return new ScriptDescriptor[] { descriptor };
Although we have now implemented the IScriptControl methods, there are two remaining modifications to make so that the IScriptControl callbacks get called. First, OnPreRender must be modified to call RegisterScriptControl, as follows:
protected override void OnPreRender(EventArgs e)
if (!this.DesignMode)
// Test for ScriptManager and register if it exists.
sm = ScriptManager.GetCurrent(Page);
if (sm == null)
throw new HttpException(
"A ScriptManager control must exist on the page.");
Then, Render must be modified to call RegisterScriptDescriptors:
protected override void Render(HtmlTextWriter writer)
if (!this.DesignMode)
Because the client-side behaviors for an HTML editor are fairly extensive, there is a fairly extensive amount of JavaScript required in the client control. Most of this is typical designMode client-side programming. More from the point of this article, the entire JavaScript code structure has been formatted to follow the client-side coding model recommended by Microsoft for all client controls built upon the AJAX client-side libraries. This includes:
• Namespace registration
• Constructor
• Prototype block with all methods comma-separated
• Prototype get and set methods for each property passed from the server control
• Prototype initialize method
• Prototype dispose method
• Descriptor method
• Class registration
Namespace registration:
Winthusiasm.HtmlEditor = function(element)
Winthusiasm.HtmlEditor.initializeBase(this, [element]);
this._htmlencodedTextID = "";
Prototype block with methods comma-separated:
Winthusiasm.HtmlEditor.prototype =
method1: function()
method2: function()
Prototype get and set methods for each property passed from the server control:
get_htmlencodedTextID: function()
return this._htmlencodedTextID;
set_htmlencodedTextID: function(value)
this._htmlencodedTextID = value;
Prototype initialize method:
initialize: function()
Winthusiasm.HtmlEditor.callBaseMethod(this, 'initialize');
Prototype dispose method:
dispose: function()
Winthusiasm.HtmlEditor.callBaseMethod(this, 'dispose');
Descriptor method:
Winthusiasm.HtmlEditor.descriptor =
properties: [ {name: 'htmlencodedTextID', type: String },
... ]
Class registration:
Using the Code
Download the appropriate zip file and unzip it to a new directory. It includes:
• The Winthusiasm.HtmlEditor control project
• A sample website that uses the HtmlEditor control
• A solution that contains both
Double-click the solution file to start Visual Studio, and then select Build/Rebuild Solution from the menu. This will build the project and copy the project DLL to the Bin folder of the sample website. Set the sample website as the Start Project, Demo.aspx as the Start Page, and press F5.
Use Model
• Create the website as an "ASP.NET AJAX-enabled Web Site"
• Copy the assembly Winthusiasm.HtmlEditor.dll to the Bin folder
• Add a Register statement to the page
• Add a custom control tag (s) to the page
• Use the Text property to set the editor HTML
• Save the HTML when appropriate
• Use the Text property to get the "saved" HTML
Example Register statement:
<%@ Register TagPrefix="cc"
Assembly="Winthusiasm.HtmlEditor" %>
Example custom control tag:
<cc:HtmlEditor ID="Editor"
Width="600px" />
Example set Text:
Editor.Text = initialText;
Use Model Details: Saving the HTML When Appropriate
The editor's "client-side" Save method instructs the editor to store the current HTML (converting to XHTML, if appropriate), and clears the modified flag. When the editor property AutoSave is set to true (the default), the client-side Save method is called automatically as part of the client-side ASP.NET validation process before the form is submitted. All controls with a CausesValidation property set to true (the default) trigger the behavior. If the AutoSave implementation is not appropriate or sufficient, the client script to trigger the client-side Save can be attached through the optional SaveButtons property, or manually.
Retrieving the Saved Text
In the server-side event handler, the Text property is used to retrieve the "saved" text:
Points of Interest
Embedded Resources
To simplify deployment, the HtmlEditor.js file and the image files for the toolbar buttons are embedded as resources within the HtmlEditor.dll assembly.
HtmlEncode and HtmlDecode
Storing un-encoded HTML in a form control, such as a text area or a hidden input element, is problematic when submit behavior is triggered on the client:
Screenshot - Error500.jpg
This implementation uses HiddenField to store the edited HTML, and therefore always stores the text in an HtmlEncoded state.
Setting the Text Property on Postback
The HiddenField used to store the HTML text is created within UpdatePanel. If the Text property is set during an "asynchronous" postback, the server control responds by calling Update on UpdatePanel and registers DataItem with ScriptManager. Because the client control uses an endRequest handler to monitor all PageRequestManager updates, it detects that DataItem has been registered, and automatically updates the HTML in the editor.
XHTML Conversion
Both Internet Explorer and Firefox output "HTML" when in designMode. To convert to "XHTML", this implementation reads the "client-side" DOM tree and outputs the elements and attributes in XHTML format. This "client-side" conversion of HTML to its XHTML equivalent effectively "hides" the underlying HTML implementation. When the user switches from Design to HTML mode, the output displayed is XHTML. In addition, the server-side Text property retrieves XHTML. Note that the editor configuration property OutputXHTML is defaulted to true. If set to false, no XHTML conversion takes place and the output is browser-generated HTML.
Converting Deprecated Syntax
Internet Explorer and Firefox both output and "expect to modify" deprecated syntax while operating in designMode. Consequently, the implementation of this editor converts the deprecated syntax into a standards-based equivalent when converting to XHTML. It "restores" the deprecated syntax when converting back to designMode HTML. Note that the editor configuration property ConvertDeprecatedSyntax is defaulted to true. If set to false, no conversion takes place and the output includes the deprecated syntax.
Converting Paragraphs in Internet Explorer
Internet Explorer versions less than 9 output and "expect to modify" paragraph elements while operating in designMode. If the editor configuration property ConvertParagraphs is set to true, the implementation of this editor "modifies" the displayed style of paragraph elements while in designMode. It converts the paragraph elements into appropriate break and/or div elements when converting to XHTML, and "restores" the paragraph elements when converting back to designMode HTML. Note that this configuration property applies only to Internet Explorer versions less than 9 and is defaulted to false. Unless set to true, no conversion takes place, and the output includes the paragraph elements.
Script Injection
A web page containing an HTML editor most likely stores the HTML created by the user. Later, it probably displays that HTML in another web page, perhaps for a different user. This presents a classic exposure to Script Injection, and perhaps SQL Injection as well. The client of the HTML editor should take appropriate steps to control these exposures.
Browser Testing
The control discussed in this article was tested on Firefox 2+, IE 6+, and Opera 9+.
Using the tutorial from Microsoft, as well as the designMode and execCommand resources listed below, the HTML editor server control has been implemented to work in a Microsoft AJAX environment. Possible enhancements include:
• Support for Safari
• Support for additional HTML constructs
• Additional configuration properties
Additional Resources
designMode and execCommand
Other Tutorials and Articles
Online Documentation
• June 15, 2012
1. Workaround for Internet Explorer 9 selection and range issues
2. Constrain FormatHtmlMode to Internet Explorer versions not in standards mode
• July 1, 2009
1. Reduced ViewState size by 72%
• June 19, 2009
1. Fix for client-side ASP.NET Validator support
• June 17, 2009
1. Full support for client-side ASP.NET Validators
2. Fix pre tag conversion issues
• June 7, 2009
1. Fixed XHTML conversion issue with Internet Explorer duplicate DOM elements
2. Included valign in the default AllowedAttributes
3. Converted deprecated valign attribute to standards-based equivalent
4. Fixed GetInitialHtmlEditorOuterHTML missing textarea end tag
• April 29, 2009
1. Refactor how the Link dialog reads the href attribute
2. Refactor how the Image dialog reads the src attribute
3. Refactor to support class extension
4. Refactor client-side descriptor
5. Workaround for ModalPopupExtender issue
6. Fixed client-side Save issue with an internal timer
• April 9, 2009
1. DesignModeEmulateIE7 property
2. Workaround for Internet Explorer 8 designMode scrollbars issue
• March 19, 2009
1. CLSCompliant(true) assembly attribute
2. Links to FAQ, etc. on demo page
3. Force close of open dialog on SetMode
4. Workaround for Visual Studio 2008 Designer rendering
5. Workaround for IFrame onload validator issue
6. Fixed several W3C Validator issues
7. Fixed ToLower Culture issue
• July 13, 2008
1. Fixed Firefox 3 delete/backspace key issue
• June 29, 2008
1. Fixed Firefox 3 initial render layout issue
2. Fixed Opera 9.5 issues
• May 28, 2008
1. Visual Studio 2008 (ASP.NET 3.5) source code
2. Visual Studio 2005 (ASP.NET 2.0) source code
• May 25, 2008
1. Fixed initialization issue
2. Fixed Color.htm issue
3. Fixed conversion issues
4. Fixed Link.htm issue
• February 3, 2008
1. Fixed Image.htm issue
• January 2, 2008
1. Namespace changes to client-side classes
2. Client-side GetVersion method
3. Added sub and sup to default allowed tags
4. Fixed DesignModeCss absolute path issue
5. Fixed Designer embedded image issue
• December 3, 2007
1. AutoSaveValidationGroups property
2. Fixed ConvertParagraphs horizontal rule issues
• November 21, 2007
1. AutoSave property
2. Modified server-side property
3. ValidationProperty attribute
4. Fixed GetText client-side method
5. Fixed resource identifier
6. Enforced pixel height and width
• October 30, 2007
1. SaveButtons property
2. Added Selection and Range links to the Additional Resources section
• October 18, 2007
1. Toolstrips
2. Separator toolbar element
3. Toolstrip background images
4. Color schemes: Custom, Visual Studio, Default
5. ColorScheme property
6. CreateColorSchemeInfo server-side event property
7. ToolstripBackgroundImage property
8. ToolstripBackgroundImageCustomPath property
9. NoToolstripBackgroundImage property
10. EditorInnerBorderColor property
11. SelectedTabTextColor property
12. DialogSelectedTabTextColor property
13. Demo options: Toggle mode, color scheme, and toolstrips
14. Fixed ScriptReference issue
15. Refactored Color.htm
• October 9, 2007
1. Dialog framework
2. Text color dialog
3. Background color dialog
4. Hyperlink properties dialog
5. Image properties dialog
6. Dialog color properties
7. DialogFloatingBehavior property
8. CreateDialogInfo event property
9. Included alt and title in allowed attributes
10. Fixed context issues
11. Fixed XHTML font conversion issues
• September 24, 2007
1. Toolbars property
2. Removed ToolbarButtonsTop property
3. Removed ToolbarButtonsBottom property
4. Removed ToolbarSelectLists property
5. Fixed empty toolbar issue
• August 29, 2007
1. Optional toolbar buttons: Save, New, Design, HTML, View
2. ToggleMode property
3. ToolbarDocked property
4. ToolbarClass property
5. EditorBorderSize property
6. EditorBorderColor property
7. SelectedTabBackColor property
8. ModifiedChanged client-side event handler property
9. ContextChanged client-side event handler property
10. Save server-side event handler property
11. Fixed ConvertParagraphs issues
• August 7, 2007
1. ToolbarButtonsTop property
2. ToolbarButtonsBottom property
3. ToolbarSelectLists property
4. CreateToolbarInfo event property
5. TextDirection property
6. Included dl in allowed tags
• August 5, 2007
1. ConvertParagraphs property
2. ReplaceNoBreakSpace property
3. Fixed Internet Explorer horizontal rule issue
4. Fixed Internet Explorer ordered and unordered list issue
5. Fixed $find startup issue
• May 29, 2007
1. Additional fix for Internet Explorer 6 security context issue
2. EditorBackColor property
3. EditorForeColor property
4. DesignModeCss property
5. NoScriptAttributes property
• May 25, 2007: Fixed Internet Explorer 6 security context issue
• May 15, 2007: Support for Opera 9+
• May 14, 2007: Added properties:
1. InitialMode
2. DesignModeEditable
3. HtmlModeEditable
• May 11, 2007: Fixed Firefox hide/show editor issue
• May 4, 2007
1. Added Internet Explorer key-down handler
2. Fixed postback setting initial Text issue
• May 2, 2007: Fixed initial text issue
• May 1, 2007
1. Added Modified and Save concepts
2. Converted deprecated syntax for u, blockquote, and align
• April 10, 2007: XHTML output
• April 2, 2007: Fixed Internet Explorer focus issue
• March 31, 2007: Initial article
About the Author
Eric Williams (
Web Developer Winthusiasm
United States United States
Eric Williams is a .NET and Web developer who has been working with ASP.NET AJAX since the March 2006 Atlas CTP. Eric is the founder of Winthusiasm (, a .NET technology company that offers consulting and development services, and Colorado Geographic (
Comments and Discussions
QuestionCreating HTML Emails PinmemberJ.Grieder20-Feb-14 12:02
Questionhow to use image of local drive in html editor PinmemberMogya8-Apr-13 6:36
AnswerRe: how to use image of local drive in html editor Pinmemberseenit30-Sep-13 12:20
GeneralMy vote of 5 Pinmemberhassan wasef4-Apr-13 11:48
QuestionHTMLeditor is disabled PinmemberMember 475096328-Mar-13 1:09
GeneralMy vote of 5 Pinmembercsharpbd14-Mar-13 19:57
GeneralMy vote of 5 PinmemberAkram El Assas15-Jun-12 15:06
QuestionIE9 Issue PinmemberTim Dutton8-Jun-12 20:04
GeneralDevoted to your Article Pinmemberonurag1922-May-12 19:00
GeneralMy vote of 5 PinmentorMd. Marufuzzaman2-Mar-12 18:05
GeneralMy vote of 5 PinmemberAlobidat20-Oct-11 7:27
QuestionHTML Editor save text to database PinmemberMember 79715346-Sep-11 1:54
Generalgood working Pinmemberamr rabie21-Apr-11 10:10
GeneralAsk? PinmemberAbhimanyu Kumar Vatsa19-Apr-11 22:59
Generalthank you Pinmemberdj_zia1-Mar-11 4:32
Generalnot getting aal the buttons controls displayed Pinmembersvknair9-Feb-11 20:41
Questionhow to Get html selected text Pinmemberjainpr27-Jan-11 2:19
Generalcreating the editor with template feature Pinmembersvknair17-Jan-11 1:28
QuestionHow to add new font PinmemberIrfanRaza28-Dec-10 22:26
Questionadding rtl/ltr buttons PinmemberYisman226-Oct-10 2:02
GeneralMy vote of 5 PinmemberGenericJoe20-Oct-10 2:39
GeneralNot maintaining ViewState [modified] PinmemberGenericJoe19-Oct-10 23:18
GeneralSpell Check Pinmemberkoese3-Oct-10 15:10
GeneralNot working with Chrome PinmemberJcmorin3-Jun-10 4:30
QuestionChange Editor BackColor PinmemberHenri073-May-10 0:01
| Advertise | Privacy | Mobile
Web04 | 2.8.140315.1 | Last Updated 15 Jun 2012
Article Copyright 2008 by Eric Williams (
Everything else Copyright © CodeProject, 1999-2014
Terms of Use
Layout: fixed | fluid |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.