text
stringlengths
454
608k
url
stringlengths
17
896
dump
stringclasses
91 values
source
stringclasses
1 value
word_count
int64
101
114k
flesch_reading_ease
float64
50
104
Please refer to the lc.exe task command line too long bug in the Microsoft Connect feedback center for more information. Please install the latest version of Visual Studio and you'll be able to add third party controls in SharePoint projects. Contents of the licx file: FarPoint.Web.Spread.FpSpread, FarPoint.Web.Spread, Version=5.0.3510.2008, Culture=neutral, PublicKeyToken=327c3516b1b18457 If I was to exclude the licx file the solution will build but then I get a runtime error for the You can find the next entries in the ActivityLog3412015/08/26 17:23:09.909ErrorEditor or Editor ExtensionSystem.NullReferenceException: Object reference not set to an instance of an object. have a peek here Does having a finite number of generators with finite order imply that the group is finite? Linked 6 LC.exe could not be run Related 2Convert SharePoint 2010 Solution to 2013 and Visual Studio 20120How to fix “the command line is too long” when compiling licx (lc.bat) with I pressed 'step over' (F10) several times, the code moves as expected. Thursday, February 14, 2013 11:47 AM Reply | Quote 0 Sign in to vote Hi, I wounder, maybe there is anytemporallyworkaround? Developer Express Inc disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. Please see the application event log or use the command-line sxstrace.exe tool for more detail - LC.exe error and conflict between DXperience and .Net Framework 4.0 Solution: If did you have Best regards,Ego [MSFT] MSDN Community Support | Feedback to us Develop and promote your apps in Windows Store Please remember to mark the replies as answers if they help and unmark There is no alternative for the /i parameter. When I added "Microsoft.Sharepoint" it blew up. I have already upgraded my Visual Studio 2013 to 2015. Please enter a workaround. Posted by MRR111 on 7/27/2016 at 7:29 PM Reviewing the lc.exe help at, it appears it can take a file parameter. Defendant"? The Specified Task Executable Cmd.exe Could Not Be Run I am set to Target framework = ".NET Framework 4" not client profile. I used the following codes to calculate the space character, please refer to the following codes snippets for more details. An attempt was made to load a program with an incorrect format (.resx file)326The type or namespace name could not be found2LC.EXE on 32bit windows running against an x64 assembly8Task could However, use of enable_if in the template parameter list of an operator leads to compiler errors. The filename or extension is too long". I also refere this solution :- "" but still i didn't get proper solution so please help me to resolve this error. Thanks in Advance. DETAILS Optional Password I have read and agree to the Terms of Service and Privacy Policy Please subscribe me to the CodeProject newsletters Submit your solution! Related Sites Visual Studio Visual Studio Integrate VSIP Program Microsoft .NET Microsoft Azure Connect Forums Blog Facebook LinkedIn Stack Overflow Twitter Visual Studio Events YouTube Developer Resources Code samples Documentation Downloads Support Support Center Search the KB My Questions Code Examples Resources Getting Started Documentation Demos Training Webinars Contact our Developer Advocates anytime. more hot questions question feed lang-cs about us tour help blog chat data legal privacy policy work here advertising info mobile contact us feedback Technology Life / Arts Culture / Recreation Lc.exe Path Too Long Print Anywhere With Google Cloud Print Entity Framework with Windows Form Application and... They only seem to be short term workarounds. You can solve this problem like copy, delete, long path files by using this tool. navigate here Is every parallelogram a rectangle ?? "There are neither" or "there are no neither"? But I cannot do without the SharePoint API... –Kiran Srikanta Feb 7 '13 at 9:19 4 Possible duplicate of LC.exe could not be run –Lafexlos Nov 24 '15 at 7:11 Posted by calebt1 on 8/30/2016 at 1:51 PM This is an important issue for us also with lots of small C# projects. Let's work to help developers, not make them feel stupid. The filename or extension is too long This error occurs when I compile my unit test project. Is it possible to short the paths in the command-line? Check This Out Email us at [email protected] or call +1 (818) 844-3383 between 7:30AM and 4:30PM Pacific Time. In this command normally all references are written with theit fullpath. We are using the default .Net Framework licensing mechanism; it automatically generates this file. Why did Sansa refuse to leave with Sandor Cleagane (Hound) during the Battle of Blackwater? February 08, 2011 LC.exe Error and Devexpress - The specified task executable "LC.exe" could not be run. Running the application for desktop,...Status: Active, 3 Up-Votes, 0 Down-Votes, 0 validations, 0 workarounds, 3 comments, feedback id: 1553293 0 0 08/27/15--03:36: Javascript Editor isn't work Contact us about this article Is there a way to force visual studio C# builds to use this rather than generate the excess command line? You may turn on diagnostic level logging in VS Options > Project and Solutions > Build and Run > Msbuild project output verbosity. Do you need your password? array_length(trial, size + 1) : size; } class v { const wchar_t * str; const size_t length; public: constexpr v(const wchar_t * string) : str(string),length(array_length(string)) { } constexpr size_t get_length() { With a larger solution that has lc.exe dependent components, your base path will start to become a lesser factor. –Shiv Jul 27 at 21:21 add a comment| up vote 0 down this contact form This issue you reported had been fixed in later release. In Sharepoint 2013 Solution. - by HirenTailor Status : Closed 2 0 Sign into vote ID 1588933 Comments 7 Status Closed Workarounds 0 Type Bug Repros 0 Opened 7/25/2015 3:58:09 Using Windows 10 Enterprise US English Edition and VS 2015 this works building as a .Net 2.0 project, but fails with any .Net 4.0-4.6 project. --- This doesn't work either, for Google+ Followers Labels Development (117) Windows (67) C# (56) Microsoft (56) .Net (43) OS (33) Source Code (29) Visual Studio (28) Software (26) WPF (25) Windows 7 (24) SQL (23) ASP Why does remote Bash source .bash_profile instead of .bashrc What is the truth about 1.5V "lithium" cells What's the correct term to describe baby food? I do have Resharper 9.2 (latest release) installed.Status: Active, 0 Up-Votes, 0 Down-Votes, 0 validations, 0 workarounds, 2 comments, feedback id: 1715261 0 0 08/27/15--03:36: Use of enable_if in template parameter Make sure the recent Visual Studio update is installed. Submit Posted by Microsoft on 11/2/2016 at 1:18 AM Thank you for your feedback. Thank you. Same result (see point 2 of Rocky).>Generally if the app is in...Status: Active, 1 Up-Vote, 0 Down-Votes, 0 validations, 0 workarounds, 5 comments, feedback id: 1667515 0 0 08/27/15--03:36: vshost.exe stops However, we've reached the point where this isn't feasible. Is the any simple way to split the single extra long lc.exe call to several that will be less then 32000 chars? Your response is too late so i try to resolve this issue and successfully i have resolved in Visual studio 2013 update 5 Version.After resolved this issue, I able to use barryk desteve 08.22.2016 search for related forum posts( where people are looking how to copy, delete, long path files )and leave there suggestion to try Long Path Tool Show all comments
http://cjdalert.com/the-specified/the-specified-task-executable-lc-exe-could-not-be-run.html
CC-MAIN-2018-09
refinedweb
1,293
65.73
Table of Contents FirePython is a sexy Python logger console integrated into Firebug. - Firefox - - Firebug - - FireLogger - If you haven’t installed TG2, you’ll need to do that first (see TurboGears 2.1 Standard Installation). Once you’ve got an up-to-date version of TG2, you’ll need to install FirePython and some dependancies, which you can do by: easy_install firepython easy_install python-cjson easy_install jsonpickle After that’s done, you can create a new TG2 project in the normal way: paster quickstart firepythontest ... cd firepythontest paster serve development.ini --reload Your project should now be started, and you should be able to browse to it at Now, you’re ready to add FirePython Middleware to your app: Edit firepythontest/config/middleware.py Add: from firepython.middleware import FirePythonWSGI Insert After line “app = make_base_app(global_conf, full_stack=True, **app_conf)”: app = FirePythonWSGI(app) This will wrap your Turbogears App with FirePython, and any/all Log messages will become available in Firebug.
http://www.turbogears.org/2.1/docs/main/TGandFirePython.html
CC-MAIN-2015-18
refinedweb
160
53.61
MS Dynamics CRM 3.0. Use innerHTML. However, be aware that certain browser <mumble>IE</mumble> will not fully expand innerHTML for certain elements. Hence, you may need to iterate through your XML and use createElement and appendChild. - Craig Taylor -----------------------------------------------Reply----------------------------------------------- var div = document.createElement('div'); div.innerHTML = client.responseText; Then you need to insert the div element somewhere. Or if you're updating a currently existing element it's even easier. But yeah, don't bother with XML unless the data you're returning is XML. If your problem was that you have some XML that you're returning and there is some HTML embedded within that XML, then you have a different problem. I'm not very XML savvy, but I thin what you do is get the XML document by using xmlhttptransport.responseXML and then navigating to the XML tag with the HTML inside it and using somethgin like nodeText or maybe nodeValue or somethgin like that? Sorry, I don;t really know. Hope this helps, though, Al. On Dec 14, 9:14 pm, "junee" <junai@yahoo.com> wrote: - Hide quoted text - >. Hi use this var temp=xmlDoc.getElementsByTagName("div"); var mydiv.innerHTML=getdata(temp[0]); function getdata() { return (node.textContent|| node.innerText|| node.Text); Hi, I am new to Ajax. if you can help me, i will explain it. In JavaScript, using XMLHttpRequest, brought an xml file from server, but it really contain some HTML code fragment, ie a DIV and its inner things. i want to insert this DIV tag directly into HTML page, but i cant. i did as follows, it is not full please help me. __________________________________________________ Do You Yahoo!? Tired of spam? Yahoo! Mail has the best spam protection around i did it without problem. i think both Craig and AI suggested same thing. because of lack of knowledge i didnt get what Craig proposed, fortunately AI explained it well i did it as AI shown, thanks, it really took only two line change. also Atul shown same. but i have only one div. so i did as AI. when i have more tags, i think Atul's will be useful. again thanks to all
http://www.megasolutions.net/ajax/Can-I-convert-XML-element-to-HTML,-please-help-6635.aspx
CC-MAIN-2015-27
refinedweb
363
77.84
can we create immutable class i know about immutable concept immutable means we cannot change the state of an object i think we can achive this by using private fileds in a class is Maths class immutable? is there any other way to create immutable class? am i right ? please correct me A = HARDWORK B = LUCK/FATE If C=(A+B) then C=SUCCESSFUL IN LIFE else C=FAILURE IN LIFE SCJP 1.4 Originally posted by saikrishna cinux: i know about immutable concept immutable means we cannot change the state of an object i think we can achive this by using private fileds in a class is Maths class immutable? Originally posted by saikrishna cinux: is there any other way to create immutable class? am i right ? no, you're wrong. Just using private fields doesn't make a class immutable. please correct me my pleasure. 42 Is this class immutable? Once this class is instantiated, can you change the state of the object, even though its only field is private? If you can, what do you need to change to make it immutable? That is how you make an immutable class. "Computer science is no more about computers than astronomy is about telescopes" - Edsger Dijkstra Immutable means which cann't be change further. So once you declare the class as final You cann't extend it.. That makes the class immutable. and yes most important is Not to provide any direct access to fields, and keep private all methods that alter the state of the object. If I am wrong then please correct me.. [ August 23, 2006: Message edited by: Ankur Sharma ] The Best way to predict your future is to create it - Every great individual common man Originally posted by Ankur Sharma: Well I don't know what you are thinking but according to me The class which is final is called as immutable. Immutable means which cann't be change further. So once you declare the class as final You cann't extend it.. That makes the class immutable. If I am wrong then please correct me.. With pleasure! Immutability is usually taken to mean that the data cannot be changed after instantiation. It has nothing to do with subclassing. (Later Edit) Well, as others later point out, you should make your class final, if you want it to be immutable, otherwise subclasses might defeat your attempts. But being final is just one feature of an immutable class, and not the most important one. [ August 24, 2006: Message edited by: Peter Chase ] Betty Rubble? Well, I would go with Betty... but I'd be thinking of Wilma. Originally posted by Ankur Sharma: and yes most important is Not to provide any direct access to fields, and keep private all methods that alter the state of the object. If I am wrong then please correct me.. Well thankx for the concern but I also edited my message... Pls check the above .. Am I wrong again??? The Best way to predict your future is to create it - Every great individual common man why string class is said to be immutable ? Pulling up a quick imagination in my mind... Maybe it's because when you assign a String reference a String value, you don't change a member at all. String a = ""; changed to a = "I am a String"; variable a now points to a different object. Perhaps there's nothing in the String class that lets you change its members. But that's just my imagination... SCJP 1.5 Sometimes, making all the fields private is enough, as long as you write the methods of the class in such a way that they never modify those fields. Remember, the class writer has direct control over the code within the class, so you only really need to worry about the code OUTSIDE of the class. Making fields private is enough to prevent outside clients from modifying the data in a class. The rest is common sense and careful method design. Don't provide mutators, and make sure accessors return copies of fields. However, making the fields private and <b>final</b> is even better, because the compiler will detect any code that could possibly change those fields, and complain about them. This is often a good idea, but occasionally can be troublesome when attempting to initialize an object in two stages for example (think deserialization, or also using a builder to create an immutable object). Sometimes, making the class <b>final</b> IS also important, because somebody could otherwise subclass your so-called immutable object and introduce mutability, either accidentally, or purposely. It's usually a good idea to either make the class final, or make the class package private, and use a factory method of a public class to get instances. The second solution allows you to sub-class the object, but doesn't allow others to sub-class the object. This is again working on the princinple that since you alone control the code of sub-classes, you could ensure all subclasses do not break the immutability just by using common sense when writing sub-classes. One more thing to consider. Any accessors (those are the getXXX methods) should return copies of the fields they access if the types of those fields are not also immutable. Theoretically, you could return the actual reference, an client could modify the reference, and now you have an object which technically still has all of the same field values it did before, but the data represented by those field objects has changed. This may or may not be an issue, depending on your design. Remember one thing: Immutability isn't a clearly defined, black and white concept. We must always be clear on WHAT attributes of an object are immutable. For example, the javadoc for java.io.File says that the File object is immutable, however, it has modifier methods such as setReadOnly and an accessor canWrite. One can call setReadOnly, then call canWrite, and notice that the state of the File has changed. Or one could call a method like delete, then call exists and also notice that the state has changed. The immutability that they refered to was the fact that the File always refers to exactly the same file, designated by the same path, whether it exists or not, and this cannot be changed after construction time. - Adam Sheriff To help us have clear conversations here, it would probably be better to post new information in new posts, rather than editing old ones. You're making it harder for people to understand the responses to the original post. [Ankur]: Am I wrong again??? Yes. Making a class final is necessary* to have an immutable class, but not at all sufficient. Adam's post addresses the additional concepts you are missing. * Well some may argue it's not necessary, since there are alternatives, and some definitions of immutability might allow for mutable subclasses. But most of us would regard it as a good idea at least. There are additional issues which could be debated here, but at this point I think the original poster just needs a basic understanding. "I'm not back." - Bill Harding, Twister Originally posted by Ankur Sharma: what's this Tony?? Could you come up with details what do you mean by above.. man ln It means one needs to know what referential transparency is before knowing what immutability is. There are many who are quick to define immutability without the slightest understanding of the mathematic definition of a function - one of the axioms of immutability, hence, I used UNIX terminology to create a "soft link". The best - though still incomplete - definition of immutability in this context that I have encountered so far is by Erik Poll in a document titled "Immutable objects in Java". [ August 24, 2006: Message edited by: Rusty Shackleford ] "Computer science is no more about computers than astronomy is about telescopes" - Edsger Dijkstra It has nothing to do with declaring the class itself as final, but everything to do with making sure that its members can't change during the lifetime of the class. This means that you declare your members final, which means you can only assign to them in the constructor. It also means that you never return a reference to an object in a get() method, but instead a reference to a clone of the object. [ August 24, 2006: Message edited by: Eitan Levi ] Ranch Hand A good question is never answered. It is not a bolt to be tightened into place but a seed to be planted and to bear more seed toward the hope of greening the landscape of the idea. John Ciardi Edit: I didn't look and think hard enough. Clearly the methods nextInt() and nextDouble() and so on are setter methods, even though no information is passed by the callers of those methods. [ August 24, 2006: Message edited by: Paul Clapham ] Sheriff Originally posted by Rusty Shackleford: Is the context of the original question, a mathematical background is not necessary to explain nor understand. It is like a college algebra or calculus course, an intuitive understanding of a function is all that you need. Not long after calculus that understanding is not useful and a more rigorous one is needed. Not that a rigorous definition of a function is all that difficult to understand. [ August 24, 2006: Message edited by: Rusty Shackleford ] One day, I hope this will no longer hold *and* be immediately obvious to the general population. I will continue to push for the appropriate education courses at the university I work at. Originally posted by Stan James: Is a class immutable if some of its members are mutable and accessible by get? Surely not using Tony's referential transparency as you could call one method twice and get different results. So all private variables and no set methods is not enough yet. I'm liking Tony's test for immutable better all the time, though it doesn't mechanically translate into how to code one. Looking at Erik Poll's work my definition of immutability aligns with his definition of "Observational Immutability". Poll also goes on to distinguish between "State-based Immutability" (which I claim is horribly flawed and is not worthy of having a name - Poll instead says it makes no guarantees but at least has a formal definition) and Shallow Immutability and Deep Immutability - both of which I think are missing some crucial points to provide a complete understanding of the topics. Originally posted by Paul Clapham: Okay. So, for example, is java.util.Random immutable? It doesn't have any "setter" methods, or any other method whereby other classes could affect the state of a Random object, as far as I can see. But it thoroughly fails the referential transparency test. Edit: I didn't look and think hard enough. Clearly the methods nextInt() and nextDouble() and so on are setter methods, even though no information is passed by the callers of those methods. [ August 24, 2006: Message edited by: Paul Clapham ] No it is not immutable - it can have some observable state change to "the world" (I prefer "the universe" but the generally accepted term is the world). To answer your question thoroughly, you might consider looking at category theory and how monads (hint: search term) solve the problems of observable world state "change" in functional languages. Consider the problem of entering some input from the keyboard: Input getInput(); clearly this is not a function, since Input may be observed to change. Note that if it were referentially transparent, it would be called a "constant function" since it accepts no parameters - which is related to how I use Java. When a client binds to implementation I ensure that they bind to a constant function - a static method that accepts no parameters and returns a referentially transparent (shallow immutable in Poll's terms) type. You may have seen me post some code of this nature previously but fail to justify its verbosity (imposed by Java to reduce complexity) - I hope you can understand why - the audience requires an understanding of monads, FP, a critical analysis of OO and many other topics before this justification can even begin. I use the term "change" loosely since some will claim that change does not occur - that the world is immutable - what appears as "change" is in fact a "new world". A revision control system demonstrates the immutable world in some ways. That ends my rant - have a good weekend [ August 24, 2006: Message edited by: Tony Morris ] Ranch Hand A good question is never answered. It is not a bolt to be tightened into place but a seed to be planted and to bear more seed toward the hope of greening the landscape of the idea. John Ciardi
http://www.coderanch.com/t/380741/java/java/create-immutable-class
CC-MAIN-2016-22
refinedweb
2,148
61.16
Ninja Web Framework Tutorial — Part 2 Ninja Web Framework Tutorial — Part 2 This is a continuation of the two part series featuring the significance and use of Ninja Web Framework. In this part, we will look at developing a sample application using Ninja API and framework semantics. Join the DZone community and get the full member experience.Join For Free This application that will have an input form which will accept and authenticate user credentials (user id and password). Upon successful authentication, we will display the name of the user in the next page. The application looks very simple on paper but we will cover important Ninja semantics that will help you understand the framework better, allowing you to use it to build a more professional real world web project. A brief flow will be something like this: a user will navigate to the login page and enter his/her user id and password, then proceed to click on the Login button. The system will perform basic validation and then authenticate the user id by checking the database to see if the id exists or not. If the user exists, then the authentication is successful, otherwise a decent error message is displayed. Once logged in, the user information in the session will be valid for 60 seconds during which time if you try to access the login page, it will indicate to you that the user is already logged in. Before we deep dive into the development, let’s set up the application environment 1. Setting Up the Application Environment Application environment setup is a very important step. We will use Maven to build and deploy the application. For database, we will use MySQL and setup ORM using JPA Hibernate implementation. Application-related global settings will be defined in the application.conf file. 1.1 Maven Setup We will create a Maven project. If you are not used to creating Maven-based projects from scratch then you can get the sample project shell using the Maven archetype "ninja-servlet-archetype-simple". This will create the basic Ninja application for you. The folder hierarchy will look like the following: Maven Folder Structure As discussed in Part 1 of this article, Ninja is modeled on convention rather than configuration, and therefore, you need to make sure the folder hierarchy and its components are named according to the framework norms. The routes (Routes.java) and module (Module.java) will be part of conf/folder. The application global settings will be defined in the application.conf file again as part of conf/folder. The controllers folder will host the controller class, we will name it as ApplicationController.java. The views folder will contain views categorized as controller defined views, layouts, and system error messages. We will manually add two new folders viz. filter and entity that will contain filter and entity class respectively. The below code shows the important portions of Maven POM file: pom.xml <project ...> <modelVersion>4.0.0</modelVersion> <artifactId>myninja</artifactId> <packaging>war</packaging> <groupId>demo.ninja</groupId> <version>1.0</version> ... <build> <plugins> ... <plugin> <groupId>org.ninjaframework</groupId> <artifactId>ninja-maven-plugin</artifactId> <version>${ninja.version}</version> </plugin> </plugins> ... </build> <dependencies> ... <dependency> <groupId>org.ninjaframework</groupId> <artifactId>ninja-servlet</artifactId> <version>${ninja.version}</version> </dependency> <dependency> <groupId>mysql</groupId> <artifactId>mysql-connector-java</artifactId> <version>5.1.37</version> </dependency> </dependencies> </project> The ninja-maven plugin allows you to make use of the SuperDev feature of Ninja. The feature is briefly described in Part 1 of this article. We will deploy the application as a WAR file and therefore you need to configure the dependency named ninja-servlet. 1.2 DB Setup We will setup our database as MySQL. We will create the DB or schema and name it as "ninja". Then we will create a table named "user" that will have the relevant columns and add a sample record that will contain a user id as "ninja" and password as "password". We will authenticate the user against this sample record. The below figure shows the table columns and the sample data. User Table and Sample Data 1.3 Setting Up ORM We will use JPA-Hibernate to implement ORM for our sample login application. JPA makes use of persistence.xml file to define and configure the database as one unit of persistence. Our persistence.xml file will look like the following: persistence.xml <persistence ...> <persistence-unit <provider>org.hibernate.jpa.HibernatePersistenceProvider<" /> </properties> </persistence-unit> </persistence> As you can see, this file will have configuration details about MySQL like the driver class, dialect and other relevant properties. The file will be part of the META-INF/folder. Next, we will configure the DB user credentials in the application.conf file: application.conf ninja.jpa.persistence_unit_name = mysql db.connection.url=jdbc:mysql://localhost:3306/ninja db.connection.username=sa db.connection.password= The above code snippet shows the ORM configuration defined in the application.conf file. The said file is placed under the conf/folder. It makes a reference to the persistence unit that we defined in the persistence.xml file. The persistence unit here is named "mysql". As our table name is "user", we will create an entity class named "User" that will map this table. The following code shows the entity class: User.java @Entity public class User { @Id @GeneratedValue(strategy = GenerationType.AUTO) Long id; @NotNull @Column(name = "USER_ID") String userId; @NotNull @Column(name = "PASSWORD") String password; ... // Getter and setters The entity class uses JPA-based annotations to map it with the user table. The code is pretty self explanatory. Also, note the use of @NotNull annotation—this is a Java validation feature employed on this entity class. It indicates that user id and password cannot be null and must have some value. 1.4 Setting Up web.xml Let’s take a brief look at the web.xml: web.xml <web-app ...> <display-name>ninja</display-name> <listener> <listener-class>ninja.servlet.NinjaServletListener</listener-class> </listener> <filter> <filter-name>guiceFilter</filter-name> <filter-class>com.google.inject.servlet.GuiceFilter</filter-class> </filter> <filter-mapping> <filter-name>guiceFilter</filter-name> <url-pattern>/*</url-pattern> </filter-mapping> </web-app> The class NinjaServletListener is used to bootstrap the Ninja application that tracks and binds dependencies in the application. The class GuiceFilter is used to perform Guice based dependency injection. 2. Creating the View Ninja uses Apache Freemarker to define template views. The code snippet below depicts a view template that renders our login page ( login.ftl.html). login.ftl.html <#import "../layout/defaultLayout.ftl.html" as layout> <@layout.myLayout "Login page"> <form action="/doLogin" method="post"> <div> ${i18n("label.user.id")}: <span><input type="text" name="userId" /></span> </div> <div> </div> <div> ${i18n("label.password")}: <span><input type="text" name="password" /></span> </div> <div> </div> <div> <button type="submit">Login</button> </div> </form> </@layout.myLayout> It defines a directive called @layout that contains the login form. This form will be replaced in the main layout file that is constructed using Freemarker tags like macro, nested, etc. At this point, it is just enough for you to understand that we have designed a login page using some view template. There is also another view ( result.ftl.html) that will show the appropriate message once the user logs in. Also, observe the i18n object that is used to localize the view in the language of your choice. The locale specific labels are stored in the messages.properties file under conf/folder. For simplicity, we will not deep dive into the semantics of Apache Freemarker as it is a seperate topic in itself. More information on Freemarker can be found at: 3. Defining Routes and Controller With most of the traditional MVC frameworks, request routing and delegation happens within a controller itself. With Ninja, URL routing is defined in a seperate file called Routes.java and the action methods, to which the requests are delegated, are defined in the controller class. Routing is the process of making an HTTP request using a well defined URL with one of the four HTTP methods viz. GET, PUT, and DELETE. This request is then mapped with the action method defined in the controller. We will configure our routes as following: Routes.java public class Routes implements ApplicationRoutes { @Override public void init(Router router) { router.GET().route("/").with(ApplicationController.class, "login"); router.POST().route("/doLogin").with(ApplicationController.class, "performLogin"); ... The root /URL will invoke the login() method that will render the login page. The /doLogin URL will invoke the performLogin() method that will display the welcome message. The methods login() and performLogin() are defined as part of ApplicationController class. Both the said methods return the Result object which contains the destination view to be rendered. ApplicationController.java @Singleton public class ApplicationController { @Inject Provider entitiyManagerProvider; @FilterWith(LoginFilter.class) public Result login() { return Results.html(); } public Result performLogin(User user, Session session) { String userId = user.getUserId(); if (userExists(userId)) { session.put("userId", userId); return Results.html().template("/views/ApplicationController/result.ftl.html").render("msg", "Welcome " + user.getUserId()); } else { session.clear(); } return Results.html().template("/views/ApplicationController/result.ftl.html").render("msg", "Invalid user, please login again "); } private boolean userExists(String userId, String password) { EntityManager entityManager = entitiyManagerProvider.get(); List users = entityManager.createQuery("from User where userId = ?1 and password = ?2").setParameter(1, userId).setParameter(2, password).getResultList(); return (users.size() > 0) ? true : false; } } The controller is injected with the EntityManagercomponent that represents our database. The userExists()method will check against the database whether user id and password exists or not. It makes use of the JPA-based EntityManagerclass to perform the query against User entity. If the credentials are found then the user id is put in the session. 4. Defining the Filter We will define a nice little filter that will check the session if it contains the user id. If the sesssion is empty it means we have to show the user a login page. The filter class is LoginFilter and it looks like the following: LoginFilter.java public class LoginFilter implements Filter { public Result filter(FilterChain chain, Context context) { String userId = context.getSession().get("userId"); if (userId != null) { return Results.html().template("/views/ApplicationController/result.ftl.html").render("msg", "You are logged in!"); } return chain.next(context); } } It gets the user id from the session using context object and checks if it is null. If it is not found then it takes the user to the login page or displays a message saying the user is already loggged in. 5. Build and Deploy You can use Eclipse to import the codebase as a Maven project. Alternatively, you can use command shell to manually build the code. To manually build the code, you can give the following command: Perform Build mvn clean install Please note that this command is to be given inside the folder where your Maven POM file resides. To run the application, give the following command: Run the server in SuperDev mode mvn ninja:run The above command will run Ninja in the SuperDev mode, thereby provding the hot deploy feature. 6. Conclusion As you saw, it is so simple to build a web application with Ninja. Though we took a very simple use case, it covered important concepts of Ninja. We saw how the MVC pattern is implemented through the use of routes and controller. For the view, Ninja uses Apache Freemarker. The view here is a template organized as layouts. You could make use of locale specific labels using the i18n object. We covered the session handling by persisting the user information in the session. Remember, Ninja handles sessions in the cookies and not on the server side. We looked at defining the filter that intercepts the request to check the login state. For persistence, we used JPA Hibernate as a ORM framework to query user data. There was also a use of Dependency Injection (DI) by way of @Inject annotation provided by Google Guice. There are still plently of features one can explore and this article has given you the base foundation for developing a more real world Ninja web application. 7. Download the Source Code This article provided a tutorial showing web application development using the Ninja web framework. You can download the full source code of this tutorial here: Ninja Web Framework Tutorial. }}
https://dzone.com/articles/ninja-web-framework-tutorial-part-2
CC-MAIN-2019-18
refinedweb
2,053
50.12
Some. """ >>> import parser >>> import pprint >>> ast = parser.suite(open('docstring.py').read()) >>> tup = parser.ast2tuple(ast) >>> pprint.pprint(tup) (257, (264, (265, (266, (267, (307, (287, (288, (289, (290, (292, (293, (294, (295, (296, (297, (298, (299, (300, (3, '"""Some documentation.\012"""'))))))))))))))))), (4, ''))), (4, ''), (0, '')) equivel, '') )) >>> found, vars = match(DOCSTRING_STMT_PATTERN, tup[1]) >>> found 1 >>> vars {'docstring': '"""Some documentation.\012"""'} def make_power(exp): "Make a function that raises an argument to the exponent `exp'." def raiser(x, y=exp): return x ** y return raiser): source = open(fileName).read() import os basename = os.path.basename(os.path.splitext(fileName)[0]) import parser ast = parser.suite(source) tup = parser.ast2tuple(ast) return ModuleInfo(tup, basename) See Also: symbol (useful constants representing internal nodes of the parse tree) token (useful constants representing leaf nodes of the parse tree and functions for testing node values) guido@python.orgguido@python.org
http://docs.python.org/release/1.5/lib/node49.html
crawl-003
refinedweb
145
51.75
This was already discussed and rejected at. I am reopening because I am not convinced that the discussion presented all arguments properly. The original problem description: lives_in = { 'lion': ['Africa', 'America], 'parrot': ['Europe'], #... 100+ more rows here 'lion': ['Europe'], #... 100+ more rows here } The above constructor overwrites the 'lion' entry silently, often causing unexpected behavior. These are the arguments presented in favor of the rejection, followed by my rebuttals. 1. "An error is out of the question for compatibility reasons". No real rebuttal here, except I wonder if exceptions are ever made and under what circumstances. I should point out that a warning may also create incompatibilities. 2. "There are ways to rewrite this as a loop on a list". Yes of course, but the entire point of the dictionary literal is to offer a concise and convenient notation for entering a dictionary as program text. 3. "Being able to re-write keys is fundamental to Python dicts and why they can be used for Python's mutable namespaces". This is fine but it applies to the data structure, not the literal constructor. 4. "A code generator could depend on being able to write duplicate keys without having to go back and erase previous output". Yes, but it seems wrong to facilitate automated code generation at the expense of human code writing. For hand-written code, I claim that in most (all?) cases it would be preferable to have the compiler detect key duplications. It is easier for an automated code generator to check for duplications than it is for a human. 5. "There is already pylint". True, but it forces an additional step, and seems like a cop-out for not wanting to do the "right thing" in the language. For context, someone ran into this problem in my team at Google. We fixed it using pylint, but I really don't see the point of having these constructor semantics. From the discussions I have seen, it seems just an oversight in the implementation/specification of dictionary literals (search keywords: dict constructor, dict literal). I'd be happy to hear stronger reasoning in favor of the status quo.
https://bugs.python.org/msg264657
CC-MAIN-2021-49
refinedweb
358
56.66
javax.servlet.* servlet not being found.David Sternberg May 1, 2006 8:41 AM OK, I've narrowed down the problem but I'm still at a brickwall. Something that should be working is not. I'm trying to compile a simple servlet class and it is complaining that it can't find the servlet library. Here is my code. import java.io.*; import java.util.*; import javax.servlet.*; import javax.servlet.http.*; public class ControllerServlet extends HttpServlet { } ------------------------------------------------------------------------------------ D:\>javac ControllerServlet.java controllerservlet.java:12: package javax.servlet does not exist import javax.servlet.*; ^ controllerservlet.java:13: package javax.servlet.http does not exist import javax.servlet.http.*; ^ controllerservlet.java:15: cannot find symbol symbol: class HttpServlet public class ControllerServlet extends HttpServlet ^ 3 errors ------------------------------------------------------------------------------------- This just does not make any sense. Here is the version I am running. D:\>java -version java version "1.4.2_10" Java(TM) 2 Runtime Environment, Standard Edition (build 1.4.2_10-b03) Java HotSpot(TM) Client VM (build 1.4.2_10-b03, mixed mode) Could these libraries not be installing. Does anyone know how to check if they are? Thanks Dave 1. Re: javax.servlet.* servlet not being found.Lance Drake May 20, 2006 1:39 AM (in response to David Sternberg) Hi David - Did you ever find out why the javax.servlet and javax.servlet.http; imports were not being accepted? Those files exist in my system - although not in the place where the eclipse IDE is looking for them. I have a BUNCH of books and access to the Eclipse docs - but have not stumbled on any indication of how to make those JAR files available to the system. Surely we are not the only two dudes out here trying to do this SIMPLE little exercise. If anyone would care to chime in with some info, in the words of 'Butthead, "THAT would be cooool... uh-huh-huh..." Thanks! 2. Re: javax.servlet.* servlet not being found.Lance Drake May 20, 2006 1:58 AM (in response to David Sternberg) Dave - By dropping the two javax JAR files from the JBOSS installation into the /System/Library/Java/Extensions folder in my system (MacOSX) - the error condition went away. I looked for 'vecmat.jar on my system and that's how I decided where the JAR files should go. HTH Lane
https://developer.jboss.org/thread/93416
CC-MAIN-2018-05
refinedweb
388
77.03
GCHandle Structure Provides a means for accessing a managed object from unmanaged memory. For a list of all members of this type, see GCHandle Members. System.Object System.ValueType System.Runtime.InteropServices.GCHandle [Visual Basic] Public Structure GCHandle [C#] public struct GCHandle [C++] public __value struct GCHandle [JScript] In JScript, you can use the structures in the .NET Framework, but you cannot define your own. Thread Safety Any public static (Shared in Visual Basic) members of this type are thread safe. Any instance members are not guaranteed to be thread safe. Remarks The garbage collector handle, or GCHandle value type, is used in conjunction with the GCHandleType enumeration to create a handle corresponding to any managed object. This handle can be one of four types: Weak, WeakTrackResurrection, Normal, or Pinned. Once allocated, you can use a GCHandle to prevent the managed object from being collected by the garbage collector when an unmanaged client holds the only reference. Without such a handle, the object can be collected by the garbage collector before completing its work on behalf of the unmanaged client. You can also use the GCHandle to create a pinned object that returns a memory address and prevents the garbage collector from moving the object in memory. From managed code, you can obtain a new object reference. For all but the IsAllocated property, you must apply unmanaged code permission by using SecurityPermission with the associated SecurityPermissionFlag.UnmanagedCode enumeration value. Example [Visual Basic, C#]. [Visual Basic] Public Class App Public Shared Sub Main() Dim tw As TextWriter = System.Console.Out Dim gch As GCHandle = GCHandle.Alloc( tw ) ' Platform invoke prevents the delegate from being garbage collected ' before the call ends. Dim cewp As CallBack cewp = AddressOf App.CaptureEnumWindowsProc LibWrap.EnumWindows( cewp, GCHandle.op_Explicit( gch )) gch.Free() End Sub 'Main Public Shared Function CaptureEnumWindowsProc( ByVal handle _ As Integer, ByVal param As IntPtr ) As Boolean Dim gch As GCHandle = GCHandle.op_Explicit( param ) Dim tw As TextWriter = CType( gch.Target, TextWriter ) tw.WriteLine( handle ) return True End Function 'CaptureEnumWindowsProc End Class 'App [C#] public class App { public static void Main() { TextWriter tw = System.Console.Out; GCHandle gch = GCHandle.Alloc( tw ); CallBack cewp = new CallBack( CaptureEnumWindowsProc ); // Platform invoke prevents the delegate from being garbage // collected before the call ends. LibWrap.EnumWindows( cewp, (IntPtr)gch ); gch.Free(); } private static bool CaptureEnumWindowsProc( int handle, IntPtr param ) { GCHandle gch = (GCHandle)param; TextWriter tw = (TextWriter)gch.Target; tw.WriteLine( handle ); return true; } } [C++, JScript] No example is available for C++ or JScript. To view a Visual Basic or C# example, click the Language Filter button in the upper-left corner of the page. Requirements Namespace: System.Runtime.InteropServices Platforms: Windows 98, Windows NT 4.0, Windows Millennium Edition, Windows 2000, Windows XP Home Edition, Windows XP Professional, Windows Server 2003 family, .NET Compact Framework Assembly: Mscorlib (in Mscorlib.dll) See Also GCHandle Members | System.Runtime.InteropServices Namespace | GCHandleType
https://msdn.microsoft.com/en-US/library/system.runtime.interopservices.gchandle(v=vs.71).aspx
CC-MAIN-2017-47
refinedweb
480
50.73
How can I filter Enhanced Monitoring CloudWatch logs to generate automated custom metrics for Amazon RDS? Last updated: 2020-10-07 How can I filter Enhanced Monitoring CloudWatch Logs to generate automated custom metrics for Amazon Relational Database Service (Amazon RDS)? Short description Enhanced Monitoring for RDS provides the following OS metrics: - Free Memory - Active Memory - Swap Free - Processes Running - File System Used You can use these metrics to understand the environment's performance, and these metrics are ingested by Amazon CloudWatch Logs as log entries. You can use CloudWatch to create alarms based on metrics. These alarms run. Resolution Note: If you receive errors when running AWS CLI commands, make sure that you’re using the most recent version of the AWS CLI. Create a custom metric using filters on a log group Note: These steps require that you enable Enhanced Monitoring in your RDS DB instance. For more information, see Monitoring an Amazon RDS DB instance. 1. Enable Enhanced Monitoring. 2. Open the Amazon CloudWatch console, and then choose Log groups from the navigation pane. 3. Filter for RDSOSMetrics from the list of Log Groups, and then choose Actions. 4. Choose Create Metric Filter, and then enter a Filter Pattern term for your RDS DB instance. For example: DISK UTILIZATION: { $.diskIO[0].writeKbPS="0.00"} DISK WRITE KBPS : { $.diskIO[0].util="0.00"} DISK READ KBPS : { $.diskIO[0].readKbPS="0.00"} DISK WRITE IOPS : { $.diskIO[0].writeKbPS="0.00"} Note: Be sure to update 0.00 to the value that you want to measure. 5. Select the Log Data to test, and then choose Test Pattern. 6. Choose Next. 7. Enter a Filter Name, and then select a Metric Namespace and Metric Name. 8. Enter a Metric Value—for example, $.cpuUtilization.idle—and then choose Create Filter. Repeat these steps for each additional metric that you add. Automation There are more than 60 monitoring metrics per RDS DB instance, and you can use a script to automate this process. See the GitHub repository for rds-support-tools for an example script that uses an RDS for MySQL DB instance that works with the following engines: - MySQL - MariaDB - Amazon Aurora (MySQL and PostgreSQL) - PostgreSQL Specify the RDS DB instance that has Enhanced Monitoring enabled and the namespace where you want these metrics to reside—optionally, you can add the names of the metrics and the Region. If no optional fields are specified, the script considers all the metrics to publish, and then uses the Region that is specified by default in the file .aws/config using the AWS Command Line Interface (AWS CLI). Note: The script doesn't create metrics for process list, so you might need to create filters manually, depending on the process that you want to display. The names of the metrics must be specified by the following pattern: group.metricname The following sample code illustrates a call to enable this metric for cpuUtilization.idle and diskIO.readKbPS: python RDSCreateMetricsFromEnhancedMonitoring.py --rds_instance mysqltest --namespace MySQL --metrics_to_filter cpuUtilization.idle diskIO.readKb You can then create alarms for these custom metrics. For more information, see Using Amazon CloudWatch alarms. Related information Did this article help? Do you need billing or technical support?
https://aws.amazon.com/ru/premiumsupport/knowledge-center/custom-cloudwatch-metrics-rds/
CC-MAIN-2021-17
refinedweb
534
57.77
@Frédéric-Grandjean Have to wait untill my level converters are arriving.. also don't have enough transistors laying around to make one my self.. did you use a level converter, probably you did? Jonathan Caes @Jonathan Caes Best posts made by Jonathan Caes - RE: [SOLVED] W5100 Ethernet gateway with RFM69 Radio fails at init Latest posts made by Jonathan Caes - RE: 💬 Sonoff relay using MySensors ESP8266 wifi or mqtt gateway @efflon Do you know how I can setup the sonoff gateway on the Vera Edge? I used the MySensors plugin to add the sonoff to the network but can't get the relay to toggle.. Help is much appreciated!! Thanks!! - Create multiple gateway devices in Vera? - RE: 💬 Sonoff relay using MySensors ESP8266 wifi or mqtt gateway How can I create a new device in Vera for a gateway? Can't seem to get that working - RE: 💬 Building a WiFi Gateway using ESP8266 Hi, Is it possible to use this setup without the nrf24l01 atached, so that i can use the esp8266 just as a sensor (not as a gateway)? - RE: 💬 Building an Ethernet Gateway Hi everyone, Is it possible to build an ethernet gateway with a RFM69 radio module? Because I tried this a while ago and that didn't work because of a software problem in the library's. Is that already solved or not? Thanks! - RE: [SOLVED] W5100 Ethernet gateway with RFM69 Radio fails at init @Tris This is the code I used, it was sugested by Frédéric. With this I don't need to change anything to the myconfig.h file, or do I? /** *FM69 #define MY_RFM69_FREQUENCY RF69_433MHZ // La définition des PIN ci dessous n'est pas nécessaire, car c'est celle de base //#define MY_RF69_IRQ_PIN 2 //#define MY_RF69_SPI_CS 10 // Enable gateway ethernet module type #define MY_GATEWAY_W5100 #define MY_IP_ADDRESS 192,168,0,22 #define MY_IP_SUBNET_ADDRESS 255,255,255,0 // The port to keep open on node server mode / or port to contact in client mode #define MY_PORT 5003 // #define MY_DEFAULT_ERR_LED_PIN 4 // Error led pin #define MY_DEFAULT_RX_LED_PIN 5 // Receive led pin #define MY_DEFAULT_TX_LED_PIN 6 // Transmit led pin #if defined(MY_USE_UDP) #include <EthernetUdp.h> #endif #include <Ethernet.h> #include <MySensors.h> void setup() { } void presentation() { } void loop() { } } - RE: [SOLVED] W5100 Ethernet gateway with RFM69 Radio fails at init posted in Troubleshooting - RE: [SOLVED] W5100 Ethernet gateway with RFM69 Radio fails at init @Tris Cut the reset connection and tried again, did not work.. still getting the same debugging info.. - RE: [SOLVED] W5100 Ethernet gateway with RFM69 Radio fails at init @Tris That can indeed be the fault, because i was looking at the hoop up page from sparfun () and thought I read that you have to connect the reset to ground, but that might be not true after reading it again. So i'll try doing that and see what happens. Thanks!! - RE: [SOLVED] W5100 Ethernet gateway with RFM69 Radio fails at init @Tris But I don't necessarily have to use the mqttw5100gateway, do I? Because I don't really know what you can do with mqtt, what the advantage is of that. I'm also using seperate 3.3V and a 4.7µF capacitor for the radio. Here is my schematic I used. I etched my own pcb for this and I think everything looks correct.
https://forum.mysensors.org/user/jonathan-caes
CC-MAIN-2022-05
refinedweb
549
70.13
void* bsearch (const void* key, const void* base, size_t num, size_t size, int (*compar)(const void*,const void*)); void*pointer to a matching element, if found. void*. void*. const void*). The function shall return (in a stable and transitive manner): 0), this may point to any of them (not necessarily the first one). intvalues and returns the result of subtracting their pointed values, which gives 0as result if they are equal, a positive result if the value pointed by a is greater than the one pointed by b or a negative result if the value pointed by b is greater. log2(num)+2times.
http://www.cplusplus.com/reference/cstdlib/bsearch/
CC-MAIN-2015-11
refinedweb
103
55.2
Apr 28, 2006 01:06 PM|jhd.honza@usa.net|LINK Hi, I wrote myhandler.ashx and I'm succesfully using ( /myapp/myhandler.ashx/requestparam) it without any additional steps. Today however, I captured network packets and found that some OPTIONS requests to my handler are denied as 403 Forbidden even without reaching the handler and with anonymous access available. I strongly need this requests to be accepted, how should I do it? As I read some other threads, it looks like I would have to add httpHandler section to the config. However, this is problem, since I do not have my handler pre-compiled. in the myhandler.ashx is code like namespace Company.MyApp.ThinClient { public class MyHandler : IHttpHandler { ... and I've tried all cobinations which came to my mind, like <httpHandlers> <add verb="*" path="MyHandler.ashx/*" type="Company.MyApp.ThinClient.MyHandler,MyHandler" /> </httpHandlers> but I'm not able to specify the correct type. What's the type or how can I find it? Or any other idea how to get all of the requests? Thanks Apr 30, 2006 02:13 AM|jhd.honza@usa.net|LINK Nobody knows? That's not funny... I found that beacuse of dynamic compilation, I really need to compile my handler into dll and link it in order to specify it's type, however how can I do it, when I access the web-project defiend types from the handler? Member 30 Points May 03, 2006 04:23 AM|zhuhua1006|LINK I am not sure whether you problem can be resolved by using a dll httphandler.I can only say if you want some file with certain extension to be handled by certain httphandler, the only way is to use a dll httphandler and add a section in the Web.Config. I provide some artciles to you and hope they are helpful to you. May 03, 2006 06:31 AM|jhd.honza@usa.net|LINK Hi zhuhua1006, Thank you for try. I read the articles and it didn't help me. At first, I don't need to handle any special extension, the handler is called just by its name. What I have tried to do is, made a regular class (MyHandler.cs) from the ashx and put it into the App_Code directory. However it didn't helped. Can you tell me, from the code I wrote in the first post, what the type should be? I tried type="Company.MyApp.ThinClient.MyHandler,Company.MyApp.ThinClient" but this shows up the configuration error in browser, Could not load file or assembly "Company.MyApp.ThinClient" or one of its depedencies, which is quite logical I think while the asembly is dynamically compiled and changes its assembly name every compilation. May 03, 2006 01:13 PM|jhd.honza@usa.net|LINK I would like to share answer from Davd Wang with you (from microsoft newsgroup): --- I'm working on a blog entry to answer this question (though I've got tons of other things to do right now). In short, you want to extend IIS server functionality with an ASP.Net Handler, but based on what you have said, your assumptions about HttpHandler definitely does not match reality so it all looks confusing to you. I agree, it is our fault, and we are fixing it in IIS7 such that what you want to do is easy. But, you don't have IIS7 yet, so you will have to understand how IIS6 AND ASP.Net works to do what you want. At minimum, you want to at least read the following blog entries to get context of what you are trying to do: WebDAV interaction is a special case for the IIS Request Pipeline. That's why it's going to get special treatment with its own blog entry. -- //David IIS ----------- Well as long as DAV is concerned, actually... this isn't in fact my case, I think. The IIS doesn't have DAV installed at all and also it doesn't know that my handler is going to behave as DAV server. Your articles helped a lot. I also noted that Application_BeginRequest doesn't fired at all in cases of the denied requests, so it defnitelly seems something has gone bad on the IIS side. I also found that DenisV at re: HOWTO: IIS 6 Request Processing Basics, Part 1 from Tuesday, March 21, 2006 6:13 AM has the same problem. What I expected is: to do all the DAV stuff like handle OPTIONS, GET and so on on the file marked with the guid. However, when Word is started from IE, it also queries (as expected) OPTIONS on the, which isn't unfortunately passed to the asp.net at all; thanks to you I think I know why now. I used the /guid notation because this is the only method how to preserve the guid in the request headers by Word, in contrast to ?guid..which was always thrown away. So... what you would you suggest me to do? I was thinking about virtually making the path one level deeper, so when the Word queries for the parent OPTIONS it will still get to my handler... will that work? Eg. to have and registering the handler for path "Documents/*". (at the moment I have no registration since .ashx is properly handled by the IIS) However if this the way, then the problem is going to the ASP.NET guys, how to register the handler, since I cannot define the type/assembly because of the dynamic compliation. So the first question now remains cricital... how can I register ashx handle in web.config? Member 30 Points May 03, 2006 08:50 PM|zhuhua1006|LINK If you look into \WINDOWS\Microsoft.NET\Framework\v2.0.50727\CONFIG\web.config, you can see the following section: <httpHandlers> ............................... <add path="*.ashx" verb="*" type="System.Web.UI.SimpleHandlerFactory" validate="True" /> ............................... That is the pattern you can reference to config ashx. 7 replies Last post May 04, 2006 02:09 AM by jhd.honza@usa.net
https://forums.asp.net/t/986127.aspx?httphandler+registration+and+dynamic+compilation
CC-MAIN-2018-13
refinedweb
1,008
74.69
KAboutLicense #include <kaboutdata.h> Detailed Description This class is used to store information about a license. The license can be one of some predefined, one given as text or one that can be loaded from a file. This class is used in the KAboutData class. Explicitly creating a KAboutLicense object is not possible. If the license is wanted for a KDE component having KAboutData object, use KAboutData::licenses() to get the licenses for that component. If the license is for a non-code resource and given by a keyword (e.g. in .desktop files), try using KAboutLicense::byKeyword(). Definition at line 180 of file kaboutdata.h. Member Enumeration Documentation Describes the license of the software. Definition at line 194 of file kaboutdata.h. Format of the license name. Definition at line 215 of file kaboutdata.h. Whether later versions of the license are allowed. Definition at line 224 of file kaboutdata.h. Constructor & Destructor Documentation - Since - 5.53 Definition at line 168 of file kaboutdata.cpp. Copy constructor. Performs a deep copy. - Parameters - Definition at line 188 of file kaboutdata.cpp. Member Function Documentation Fetch a known license by a keyword/spdx ID. Frequently the license data is provided by a terse keyword-like string, e.g. by a field in a .desktop file. Using this method, an application can get hold of a proper KAboutLicense object, providing that the license is one of the several known to KDE, and use it to present more human-readable information to the user. Keywords are matched by stripping all whitespace and lowercasing. The known keywords correspond to the KAboutLicense::LicenseKey enumeration, e.g. any of "LGPLV3", "LGPLv3", "LGPL v3" would match KAboutLicense::LGPL_V3. If there is no match for the keyword, a valid license object is still returned, with its name and text informing about a custom license, and its key equal to KAboutLicense::Custom. - Parameters - - Returns - The license object. - See also - KAboutLicense::LicenseKey Definition at line 372 of file kaboutdata.cpp. Returns the license key. - Returns - The license key as element of KAboutLicense::LicenseKey enum. Returns the license name. Default argument - Since - 5.53 - Returns - The license name as a string. Definition at line 310 of file kaboutdata.cpp. Assignment operator. Performs a deep copy. - Parameters - Definition at line 361 of file kaboutdata.cpp. Returns the SPDX license expression of this license. If the underlying license cannot be expressed as a SPDX expression a null string is returned. - Note - SPDX expression are expansive constructs. If you parse the return value, do it in a SPDX specification compliant manner by splitting on whitespaces to discard unwanted information or by using a complete SPDX license expression parser. - SPDX identifiers are case-insensitive. Do not use case-sensitive checks on the return value. - See also - - Returns - SPDX license expression or QString() if the license has no identifier. Compliant with SPDX 2.1. - Since - 5.37 Returns the full license text. If the licenseType argument of the constructor has been used, any text defined by setLicenseText is ignored, and the standard text for the chosen license will be returned. - Returns - The license text..
https://api.kde.org/frameworks/kcoreaddons/html/classKAboutLicense.html
CC-MAIN-2021-49
refinedweb
518
61.12
How To Use a Profiler To Get Better Performance The site has had many articles about improving the performance of your app, but never discussed the basic methodology on which all optimizations should be based. Today’s article will go over a scientific approach to optimizing that makes use of a tool known as a profiler and demonstrate using an AS3 application just why it’s so important to usage such a tool. A profiler is a tool that gathers statistics about the performance cost of each function in your app and presents it to you in a useful way. Usually, you’ll get a long list of functions with the top function taking the most time to complete and the bottom function taking the least. You see at a glance which functions are worth your time to optimize and which are not. This information is often surprising, even to programmers with many years of experience optimizing for performance. As an experiment, take a look at the following simple AS3 app and see if you can guess the performance problem. package { import flash.display.Sprite; import flash.display.StageAlign; import flash.display.StageScaleMode; import flash.events.Event; import flash.text.TextField; import flash.text.TextFieldAutoSize; import flash.utils.getTimer; public class ProfileMe extends Sprite { private static const SIZE:int = 5000; private var logger:TextField = new TextField(); private var vec:Vector.<Number> = new Vector.<Number>(SIZE); public function ProfileMe() { addEventListener(Event.ENTER_FRAME, onEnterFrame); stage.align = StageAlign.TOP_LEFT; stage.scaleMode = StageScaleMode.NO_SCALE; logger.text = "Running test..."; logger.y = 100; logger.autoSize = TextFieldAutoSize.LEFT; addChild(logger); } private function onEnterFrame(ev:Event): void { logger.text = ""; var beforeTime:int; var afterTime:int; var totalTime:int; row("Operation", "Time"); beforeTime = getTimer(); buildVector(); afterTime = getTimer(); totalTime += afterTime - beforeTime; row("buildVector", (afterTime-beforeTime)); beforeTime = getTimer(); vec.sort(vecCompare); afterTime = getTimer(); totalTime += afterTime - beforeTime; row("sort", (afterTime-beforeTime)); row("total", totalTime); } private function buildVector(): void { var SIZE:int = ProfileMe.SIZE; var vec:Vector.<Number> = this.vec; for (var i:int; i < SIZE; ++i) { vec[i] = Math.abs(i) * Math.ceil(i) * Math.cos(i) * Math.exp(i) * Math.floor(i) * Math.round(i) * Math.sin(i) * Math.sqrt(i); } } private function vecCompare(a:Number, b:Number): int { if (a < b) { return -1; } else if (a > b) { return 1; } return 0; } private function row(...cols): void { logger.appendText(cols.join(",")+"\n"); } } } In step one, the app builds a Vector of Number out of a lot of Math calls. In step two, the app calls Vector.sort to sort the list. I ran this test on the following environment: - Flex SDK (MXMLC) 4.5.1.21328, compiling in release mode (no debugging or verbose stack traces) - Release version of Flash Player 11.1.102.63 - 2.4 Ghz Intel Core i5 - Mac OS X 10.7.3 And got these results In a debug version of Flash Player, which is required to run the profiler, I got: So clearly the Math calls are faster than the Vector sorting. In this simple app it was easy to add getTimer calls around the only two functions. But what if your app consists of thousands or tens of thousands of lines of code? Clearly, it’s impractical to add so many getTimer calls, even if you limit yourself to what you guess are the expensive portions of your app. Enter the profiler. There are many available for AS3, usually as part of an IDE like Flash Builder, FlashDevelop, or FDT. Instead, we’ll be using TheMiner (formerly FlashPreloadProfiler) which is built in pure AS3 code rather than as an external tool. To set it up, let’s add a few lines of code to the above app: DEBUG::profile { if (Capabilities.isDebugger) { addChild(new TheMiner()); } } DEBUG::profile is simply a Boolean compile-time constant that lets us turn off the profiler with a compiler setting. Even if it’s enabled, it requires a debug version of the Flash Player to run, so we don’t try to run if Capabilities.isDebugger is false. Next, we simply download the TheMiner SWC and add it to the application. If you’re compiling with the command line tool MXMLC or COMPC, your new command will look like this: mxmlc --library-path+=TheMiner_en_v1_3_10.swc ProfileMe.as Now when we run the app we see a UI for the profiler at the top: Clicking on the “Performance Profiler” button, we see: Here we immediately see the source of the problem in top listed function: Notice how the sorting functions (the first two) dwarf the building functions (the second two). Together, they’re taking over 98% of the total run time! It would be a waste of our time to worry about the building functions, so let’s optimize the sorting ones. To do that, we’ll use skyboy‘s fastSort function instead of plain old Vector.sort. It’s a simple one line change from: vec.sort(vecCompare); To: fastSort(vec, vecCompare); With this in place, I now get these results in a release player: And in a debug player: So in release we’ve optimized the total application from 79 milliseconds to 24, nearly a 3x improvement. If we had spent our time optimizing out all of the Math calls with something like a lookup table, we could have only possibly gotten a 1 millisecond savings, which would be about 1% faster. In conclusion, a profiler is definitely a tool that you want to use while performance tuning your app. It helps you quickly and easily identify the performance problems and, perhaps even more importantly, the performance problems you don’t have. Don’t waste time optimizing (and often uglifying) your code if you don’t have to. Instead, try out a profiler like TheMiner and speed up your app without taking shots in the dark. Questions? Comments? Spot a bug or typo? Post a comment! #1 by jpauclair on March 12th, 2012 · | Quote Wow… awesome! #2 by Simon on March 12th, 2012 · | Quote Should that say “So clearly the Math calls are faster than the Vector sorting.” instead of “So clearly the Math calls are slower than the Vector sorting.” #3 by jackson on March 12th, 2012 · | Quote Thanks for spotting that. I’ve updated the article. #4 by Henke37 on March 12th, 2012 · | Quote Uhm, the tables point at a “compute” row, this is a little confusing given that the method is called buildVector. #5 by jackson on March 12th, 2012 · | Quote That was the time to compute the values of the Vector, but I can see how “buildVector” would be a clearer name so I’ve updated the article. Thanks for the tip. #6 by Bob on March 12th, 2012 · | Quote Isn’t Adobe coming out with some super new Profiler soon? Goggles perhaps? #7 by jackson on March 12th, 2012 · | Quote Yes, they gave a talk about it at MAX. #8 by Martin on March 12th, 2012 · | Quote Thanks for that. One thing, I don´t get: I just dived into skyboys sorting-functions, to get a deeper understanding of sorting arrays and vecs. You use it like this : But the function is awaititing other params: Hm.. I don´t get it. You can sort on fields in skyboys fucntion, but you cannot pass your own sorting function. #9 by jackson on March 12th, 2012 · | Quote You’re right! It looks like it’s getting transformed to a uintof 0, but the Vectoris still sorted. Since the sort was trivial in the first place, the net result is the same: a trivially-sorted Vectorin much less time. The actual guts of the optimization isn’t so much the point as using a profiler to find and optimize a chunk of your program. Still, it’s misleading in the article so thank you for pointing it out. :) #10 by Martin on March 13th, 2012 · | Quote Ah ok. Here we got it: if (!(rest[0] is Number)) rest[0] = 0; A bit offtopic, but it was making me crazy. Thanks. Martin #11 by skyboy on March 14th, 2012 · | Quote I intend to add sort functions back — previous implementation was scrapped due to poor (imo) implementation — but I’ll be investigating methods more thoroughly in an attempt to best Array since Array’s native implementation has no overhead for calling Function objects vs. instance methods (gah! cheats.). #12 by jackson on March 14th, 2012 · | Quote Cool, that will certainly come in handy. #13 by skyboy on March 19th, 2012 · | Quote I have added them back in now, and so passing in the sort function makes a substantial difference (~5x) vs. passing in Array.NUMERIC; though in the version used by this article, String sorting was invoked. #14 by jpauclair on March 12th, 2012 · | Quote Hey again, Looks there are some unexpected behaviour… The buildVector function create a list that is mostly made of negative infinity and positive infinity. for some reason, the vec.sort() REAAALy don’t like that. on my comp, with this “buildVector”, vec.sort() is 10x slower than fastSort. BUT! if we replace it with a simple Math.random(), fastSort takes twice the time it was before, and vec.sort become 4 time faster than fastSort!! The other thing is that fastSort is using void pointer everywhere. So when using native type like int, uint and Number, there are HUGE allocation of memory (void to Number conversion) So If we take a normal vector with valid values… The result for me on a 50 000 length vector is more something like this: Vector.sort(Compare) : 100ms + 400Ko allocation fastSort : 400ms + 5Mo / loop allocation And Now the nice thing! I updated the fastSort code to use native int, uint and Number. Result? NEW fastSort: 20ms + ZERO allocation Here is the new Code: ;) #15 by jackson on March 12th, 2012 · | Quote That’s a really nice optimization to fastSortand if I did this article over again I would definitely use your version. That said, the actual magnitude of the optimization is a bit peripheral to this article. The main point I was trying to make was the importance of using a profiler to find and track down performance issues in order to spend your optimization time wisely. Of course it’s nice that the optimization can be super effective, but the idea is that even a tiny (2%) optimization to the Vectorsorting would be more effective than a super (100%) optimization to buildVector. #16 by skyboy on March 14th, 2012 · | Quote I’ve just pushed the related update I had in progress (though another feature; specifying the start index, isn’t correctly implemented everywhere. tomorrow). I’ve consistently seen my method outperform Array::sortOn (by as much as 3x) across various machines with random data*. For the sortOn tests: * With reverse-sorted data, Array::sortOn outperforms fastSort by 50%; for sorted data, fastSort outperforms Array::sortOn by skipping the sorting phase if the presort (for NaN) finds they are all in order (excluding NaN, which is shuffled off to the end of the Array and not counted in the sorted-or-not). #17 by skyboy on March 15th, 2012 · | Quote In my testing, I found that accessing an Array from a variable typed as * is 5-20% faster than a variable typed as Array; and a variable typed Object is 10-30% faster than a variable typed Array. I can’t explain this behavior. #18 by jackson on March 15th, 2012 · | Quote Me neither, especially since I’m seeing the opposite on my Core i5 Mac: Array: 302 *: 354 Object: 369 What environment did you test in? #19 by skyboy on March 15th, 2012 · | Quote 32 bit x86 XP SP3; FP 11.1.102.55 release standalone on an intel celeron (northwood 0.13 micrometer; 8 KB L1 cache, 128 KB L2 cache) #20 by AlexG on March 19th, 2012 · | Quote How do you think which profiler is the best? And specifically, which is better, the Flash Builder profiler or theMiner ? #21 by jackson on March 19th, 2012 · | Quote Calling one profiler “the best” is really tough as each has its pros and cons. In the end they all use the flash.samplerpackage so they’re operating on the same set of data. I used TheMiner in the article because it’s really simple to add to a project and there is a free version for non-commercial use as well as its predecessor (FlashPreloadProfiler) for free commercial use (I think), so it’s directly usable by all my readers. This is in contrast to Flash Builder and FDT, which have fine profilers but charge a fee to use their products after the trial version expires. I think it’s a good idea to try out all of the profilers (e.g. Flash Builder, FDT, FlashDevelop, TheMiner) and decide which you like best. But keep in mind that Adobe’s next-gen profiler is on the way…
https://jacksondunstan.com/articles/1763
CC-MAIN-2020-34
refinedweb
2,151
63.49
HAWAIIAN GAZETTE , FRIDAY,. MAY 31, l$18.SEMl-VEEkLY. IIWlflGAIil::. ALLIES C ALM AND ' 'H . Alt - - H 4 "Vw 1 , ... i... - ' J' "" ' '.','''., -r,' ' u . , ; I LL U 10 I U nut yi-ui. i v MV : c i mm ul i- -.1 - Morale of Men In Cantigny Fight 'Told ' In Despatches that Shows How They Advanced In Their First Great Engagement HAIDERS T0LOT0 TAKE PRISONERS AND RETURN luneville Sector Is Attacked At Three Points and Enemy Loses Heavily All Reaching Lirie Are Killed OrWfahirtfd' v WASH I NGTON, May 30 ( Associated Press) Con solidation of the ponition which he American forces captured at Cantigny and the repulse of new attacks are told in the communi que which was received last even ing from General Pershing. The American forces are holding well in that sector of IScardy, h said, and have strengthened their posi tions materially since theiV first vi. tory at that point. Three at tempted raides in the Luneville sector of Lorraine are also told in these despatches. All were re pulsed, several were captured and many of the (oe were killed. Tv. iee yesterday the enemy count ered heavily against the ner American position in and about Cantigny aiul both times they were repulsed with Ifenvy lopse. the Machine gun und rifl fire from the- Asneritma treneher ih.kly- .brkinc; dawo tkeit attack. Pleb rrmiaa CHvan ,: t'Hiftt praise Jr the America! artil !cry aa well as the infantry Wi their Arfrt really Important engagement Is ,?iven in the reMrU from ,th Aajer j i-an front which tell of their advance and the cool and irenotute ' way in which they comported Uxirtsolve It wax iivf forty Be o'dtock ia the mnrnina hfn the American tiarrajti' vteacl heavily ea tba cnamr and it Vf aa hour later before tha atUcV of the infantry waa ordered and the B ' went r tba .top, t. Babiad tbfl barrK9t ;mJi. Untjl..teajJgi tbey ! vaneed. moving forward in perfect or der. Meantime tha artillery waa deinii nHnifieM .work anH ita accuracy haa beeq hihlv eomnteaxled. Clee tj Hehttng OnntUcay wan finally reached em' there hand to hand fihtiiitf occurred. Mnad prenndea were hurled like baae ba!)a into tb muuth of a tannel wherfl Vera lurated .a hundred of the- eaemy. Henoribin the advance an American officer Kavi that the men moved for wnrd Iniiphiie; and ainiliag but that their face reflected the trreat Ame-r iraji (teterniiiiation in which they felt they were at lant elding their part. The men foupht like veteran wher the officer tanned forward aboatinfj: "Cone on lioyn! " WorderfaJ Morula 'XXiieer npree that the outataodin f',tur,e. wajt tie wonderfiU morale of ' tha e. Their confidence waa be Irire and thr laughed and joked about tif)'iig ia. While the Uerman macbin, ptiKa (loured bullcU agaimtt them like B:iaii Itwm, they cmaaed No ManV liit). "JUey jukinirlv apiike of "eat ing bochea for break faat" aa tbey went. With twelve French tanka aupport lac them thev entered the German Knea for a full mil. Uree Attack Tall yftrderAd' to make riuner at any coat tbe enemy atteuitad to reack tbe American line in the Luneville wi tor at three ouitu yestenlay morn lac. report reeeived from the Amer ican front lant evouinjf reluted. Tbe ettscka were preeeded by a heavy gaj'r"V American and he wee reeov attack at an early hour in tbe mom I iug and wore repulseil with sum pa M-1 tively heavy Utsaea to the eneauy and light rout to the American. Both aides fouykt in as uattka diiriag tbe entire engagement. , ,. Fierce ina hiite gun fire from tbe American treiMbes broke dowa the Aral a'taeb two kilometer weat of Pre aneaJl. ..Iiebiad the heavy enemy barrage aboat a kilometer west of tkiaaeMtibl fuBsteea of the enemy managed to ra b tbe Ameiieau trenches aud hand to band liglitiug followed but all of (lie fourteen ho reached tbe Amer i"a les were lost. Nine ef theui were killed outright, oue died of bis tamada a abort time later and tbe remaining four were captured. The prisoners said they hud order to re tar with American priauaera at aiiy coat. Casualties of the main eagagement in Picardy have not yet beu jrepoite4 by ' the war department. The liat an nouneed yesterday was a small one. It included tbe uauu-i of five iilWil ia action, five dead of woaude an,4 jkat of disease, seven severely woundei aa two missing. . ('lamia from Berlin of tbe capture of American physicians who were serv ing with the British are reported in despatches from Amsterdam. The claim aid that a number of these doctors had been taken. PERSHING REPORTS AMTTRIPAM 5I IfTP; . ' " I WAHIIINOTON, May 2! (Orlicial) General Pershing, iu his report of the WASHtNOTOJT, My 30 QfflciaM , i -hffiii ae ' keinfc beilt and turned , ont by the lTt.it3 State, at a Ml more , . . than twice feat kt veftsele are Leinn; I ! lout, by the thited states, AlUe and, Uautrel, Meordin$t,,to the ncurea it- T :wl by tne ahipitiag board eovering 1ve.iela eonjpletea autj taanehingn for the week and for the month. BK'vKii- iwiw were completed for . the. government during tbe week which ended May 25 in me name wee taere eere eighteen launching of vcela which will have were ateel built and three were wooden r.aunchlue for the month were. flfty Ave abipa of thlch thirty were of steel construction. Taking the rate of launching for laaf week and the tba- aage or moae vemei a a Deal a year' production will be 0.704,400 tone, whkb ia more than twWe the tonnage now be ing lost by the, nationa of tbe world through tbe aubmatininf policies of the Tenton. Hew Typa Appr the Srst ef:U)e new, type of fubri cated steel ihipe waa launched for the iroemmeat today by an Atlnntie Const shipyard. It will b eealled the A g-.- warn, an Indiwn name which was sug-, gested by Mr. Woodrow Wilson. Uerlded Hatiafaetion ta expressed in government ctreiee over the ouic com- pletion of arrangement for the coa- (ruction and delivery of ship by Jap- an through the shipping board nnder the recently completed arrangement, to tbe feci Be Leant ,ahipbuilder in Contracts have been eigned for thirty which lie th0k the worker for giv. vesmO which will have Z4ft,00fl toa- ing up their holiday in porter,, to ad npe. veree; war ork. w ... .--,.11 To Wtf Coutitiy WASHINGTON, May 39 (Aseociated Preaay On the eve of Memorial Day, President Wilson, hit iesuoil nn urgent Appeal to tbe people of the country to make further effort and to exerelxe ireih eronomies- that they may do tbe more in supporting the country in iti war for the liberty of the world. . -I Buy only neeessitie. Eachew all luxuries. Practise all possible econo mies. Rave all that can be saved and Invest the prueeedswrf this Having; the results of the economies, all that can be epared In war savings stamps aad thrift stamp ia Ue burdea of bis plea. . v ; The winning of the war i a necessity greater than aay otter. Liberty, Freedom and tbe right of pursuit of huppioea are greater hj Juries than any that money eaa buy. Have and invest with tbe government he auks of all of the people. ..,..,.,", activities of tbe Ajherlcaa troops, made public by the -a-ar "department thl afternoon, say that tbe big smash by the American troop wa a com piete success. They advanced on a mile and a quarter front in Picardy, southeast of Amiens and near Mont didler, wbere the Germans bad vainly attacked them on liondar. 'Thev eao tured cantigny taking 182 prison. snd inflicting heavy loeae and auffer j lng comparatively little themselve.tl either la theia attack or is the count 7 era of the enemy which were all erf polred. Tbe Americana reached thch qbjectives In the abort time of forty five minute. Ia the Luneville sector German raider were repulsed, losing live in killed. . A German plane was destroyed by a California aviator arkile he M engaged in combat with'six foe mi chisea. , British military erosses have beoi awarded, to twenty seven Amariijios. Of, these one captain and eleven lien tenants are of the American medical service and fifteen other ia the 1e fantry branch of the service for brave ry, shown in fighting in the Luce sector. Military chief here are eloeely fol lowing the development in ' the re eently resumed German, offensive. Tbey regard several days a necessary ' to fully divulge the enemya pbsAC Observers Interested Important American participation in the fighting is welcomed, esnfecifelly a all reports indicate tlmt they are cm Tying on creditably ulongside of the Qrii and French veterans. .Earlier report on the Picardy ei gagements ot the American troop in fke Pieardv sector said that they sue eesafully defeniled themselves on Mon day against three attacks which wr p weeded by an intense bombardment in which more than 10.000 shells, in ukidin hundreds of gas shells, wen employed by the voemv. Some Oct man were captured but tbe foo took 'red, after the enemv had been fur P"m,,l by the Ainertrae. jajruuery Asalsta AmeTiria artillery la credlte.1 with (bowing a remarkable accuracy of Hie, tbu contribnting to nn impurtiii't elteat in the hik'Ci'hhc won by tin' infantry. President W Ton in keeping in -lor touch with 'he nit nation through the war depart in cut. How many more than 300,000 Anier lean troops are now in France is still undisclosed hut Baker's statement tl.ut 200,000 more have been, sent over thist month ia. regarded as lending import anoe to the Americans as a factor ff tbe supreme test. In Perihing's communique of ln-t night ha did not mention the general renewui or the deriuuo ouenaiv bu". ' SirSi ZrZTX point whence they were drtv,rtn lv sounter attneks in whii-b they entered, the enemy's lines. These were the' attack to uhlch he referred in bin later ronun.uniiiie, made public tod:iv. ue also oole. I that Uerman raids were repulsed ami a German ulane downel in the Woevre sector aud boittbwrdment of the Lorraine sector. w. a. t. MADRID IS SUFFERING FROM GRIPPE EPIDEMIC MADBU). Mhv XO f . eene-inte.1 Pre) There are 12,000 victim of ' "lr 'u Ghm city aud the spread of the epidemic in iim hecked. The king is ill but bis condition is not dan genius. "tha Aaaerienn toTemmeat ia alreadi f "Vnnf the Mn.pbaiMlag ate!, prom , th7 V'P nT utwr a. a pan or toe arrangement. ; . ., ftaMrt nn V&Kh "'' Government .engineers were abowA ,ta Bonewt TiJ8 falta In bar voyage trjon, ana. l'ajsiile port to aaother have rendered their report. It waa-tke maiden trip of the Faith and i t-vj p,j umj m aurtny a large pari 01 whkb the buffeted; by thirty five i foot wave and eipetlenced ne of tbe iongei and moat tare re atormi which ! baa bfen reported atonjf' the Pacific The Official . report aaya fa part: -'The aire under which tha Faith labifted w.aa practlcalry towtlnaom aa ia howa by tbe reeordi taken, by the ; trarq gauge. The meaa' were very heavy, Tnu enabnng a Mod opportun Hy fof the atnrly of otterete bull un der service onditVna. Tbe trip wa highly euecvaafnt nd.', indreation are all ery favorable for tbe anoee of tha eonereU ablp.". The president of the shipbuilding company wbien eonntraeted tbe Faith ia quoted in Ha a Francisco despatch a saying: ,"lt ta Bow, demontrated and unquestionable fact ht concrete shir are a eneee. 1 We shall start i building eight Meree'eaeh' ef 7600 tone, I lmieditBly. " . "l am glad that a" and hurricanes occurred trt friv the. Faith a thnrotigh test on her maiden- trip." President Wrlaoii ha arnt telegram " - .l.-WW-i. - .. ,1 . - fyyiift lfa Wai: imitation Panama Hats Are Hats Viel Usl Dmun anq HOI raper ' 'WASHINGTON, May 2fl (Official) 'Departing from it prohibition on import of paper, aa publiabea 1. the restricted import list, tbe ar trade board has authorized the importation o( certain clflHses of Japaneaaj papers, These Include the mino haku sorts when they are to be used for the raak ing of paper parachutes for-which this type of tough paper la particularly qualified. ...'.-,. Yoshino paper is also to be admit ted when it is used for blotting er stencil purposes. A further, concession classifies hats, like the imitation Panama hats which are made of paper fibre, not aa paper but as hat, the imports of which are ot restricted. These rulings permit of the contin uance of a considerable part of tbe Japanese trade with the United States. aiw Hills WASHINGTON, May 30 (Associa ted Press) - Flags for shipyards nd medals for the workmen are to be given where deserved by the shipping board, it was lust night announced. Yards that are making records, that are put ting forth strong efforts, that are meet ing or surpassing demands will receive flajfs. Workaien who are living op to the demands mudu upon them or who perform any signal industrial service will reneive medals. Thi is the first recognition that ha been given lv the government to the army of worker who are itriving be hiau the line. -f- . w. a. a &00SEVELT TELLS WHAT MUST BE KEPT IN MIND ' i.. .; Mir.WAl KKK, May 29 ( Associated Press) In u speech here today Colonel Koosevelt dee'ared that tne "one grand duty before America is to put the war through to a knockout. " Ho s:id that American mnst remem ber three thlngH, "Americanism, need for speeilintr on The w.tr activities and preptti i ilneHH. ' ' w. f. , REp0RTS OP SUBMARINE ARE DECLARED' UNTRUE ,, WAHIIINGTON', Mv 2fl (Official) AftPr a full investigation the navy department 1m Huuoiineecl that the re ports of n siiliuiuriue off the Atlantic ('oust are without foundation, Tbe loatiui: wreckage which wan feund ia luilieveil to be all that remains of a I target nt which u nhip tired flve shots, j taking a for nu cueuiy submarine. w. . . . . OAUSB CF DESPONDENOTF. Pes.iidef. v is often canted br tndi action und ( iinnipHtkos, and juk'kly dihappenis when t'lmuiberlaln Tablet, "i.'i-cii i hese tuldcts strengthen 4pe liu'e't K.ii nn I moe the bowels. For l !ll I'-iiIitm Benson, Hinith k Co., Ltd., agents for Hawaii. Advt. lull Atlas, En Route . To Philippines. ' Puts Into Honolulu With ' EnBrfldirri BaflWaf v EMERY piwDErTFOUND IN' THE FUEL TANKS Was Formerly Hun Craft and Captain 'Believes Hun Crew PlartneiJ'Tp Wreck Her' . 1 l vo ; VC . A Ilua plot to wreck the engine ot tbe vessel compelled She auxiHary two masted ec.hooaer Atlas, seventeen day out from ffea-raa'rc errroute to the PhilippineV'tS put into Honolulu ye terday afternoon, according to the state meat of the aaaater, Captain Berwhardt. Emery powder ifi large quantities wa discovered ill the fuel tanks, and it i. the belief of the officer of the veese .hat it waa placed there by the frrm German erew, the A this being recentlj s Genoao-veaaeL . V The eintry powder, discovered by'the 'hief. rngiaeer, waa exhibited to the -epre'shtkllve' of ; the naval intelll gence. bureaa .who boarded the 'vasse n her sirrlal. - While the vessel wa far to the south 'of the) HnWwiiaa Islands, eaddiegabap towifrd the ' Philippine, the' chief en (ineer began to experienee' trouble wit! hia engines. Because the A tie was r'rtneily..k dermaa ..vessel,- he beam Ktiapleiona .mad " after., considerable in vestigation Joeated - the cause in th tank,; Upon opsin ing these and draw lug up part of the coateat direct front the bottom, the emery powder wa dis covered, m. ''.., OtnapMa Does Wrong ' Aboat' ft"tithi the only real com oast aboarU became disabled throug, tbe glass cracking. Iavestigatioa re vealed - that' the 1 weather becoming a, uer ami warmer eaeb day the ve vl progressed toward her destination, "he liqntd tn 'the tube expanded, and rising -rapidly-' the foree caused the las to break. ' Ingenious method wen used by tbe captain, engineer and prac tiealljr everybody aboard, to atop v tbe gap, even wood alcohol being tued but each day-the glae cracked and th' ompas became comparatively , usele S'a mean of navigating tfie vessel or t true course.'' Then, to eap tbe climax, Captain Hen v Bernhardt," 'bo ha sailed the sear since: boyhood; was suddenly Strieker with sciatica rheumatism, which so erip pled kitn thaf le waa unable at time Vi (ret- to the -deck, and bad to do' al his computing In. hi cabin below deck' md give mawy of hi orders from hie bunt i " ''.'' ' iyrt$ Oerniaa-, Teasel . v. ''. '"tbe '-'Atiak was one of the) nuti.eroo Oartnan Jfleet ,of achoonera ojieratlng In (be Mouth .Seas when the -war broke on ia Auguat, 19)4," said Captain Bern har.lt, shortly, after berthing hia vease' jt pier 8. "She fled across the Pacifb iitk the Neptune and two or three ves scat. Nearly all. reached varioua Amer Iran porta where they. were Interned yOoe of them, the Aeolus'," I believe, w, naught by a Japanese erutner oil. tni port of Uon(4uW, nd destroyed by gull 'ire. .. .,: :,- 'After the United State entered thr wa, the Atlaa waa sold Ural to Wil lams. Dimond k Company, and then t 'he .Paeifie Commercial . Company, o' Manila. She was overhauled and load ed and we cleared- for. Manila -direct "be i to go . into tbe Inter-Island trade over there. ... "We were nineteen davs out wher we arrived in Honolulu today. Wbe we were south of Hawaii the chief er 'ineer renorted to me that he bad di eovred a lot of c round emerv in ou fnel tank, which bad worked iajtir to. the carburetor and the engine. abe "We tHlked over the eitufttion an' "a me to tbe conclusion thjLt the forme German erew ad officers, on quittinr the vessel left this powder in the tanks knowing that when the boat was taker over by the Americana, that would b the last place artv -of us would belie ' there was stored in a lot of trouble for thn vessel. And they figured right The fnel oil, leading. out of those tankr carried the powder alonr, and it fft int the carburetor and engine generallr Fortunately, our chief engineer discov eretl it iu time and the damage ma not be great, but it ml nil t have bee extremely serions to n had we gottc-- away down in the Pacific and then need d our engines. blvst Clean Tanka ''Mt is imnesative that our tank b cleaned out thoroughly and freed frer this menace. Thia work could only Ix dor in port. "Then, jut aa we leaebed the warm er weather region, tba glaee top of ou liquid ' compns. due to tbe expansion of tbe liquid, eracked right across causing tbe liquid to evaporate, anr1 while we daily refilled the bowl am' tried numerous scheme to make the via ticht, end Boade libera), ujss of wood aleohol, it wa found absolutely hiece'iarv thnt nw frlse be put on which meant coming to port. "M own ailment. I bnpe will con tinue to ease off craduallv. aa it ha been doiau in the last few days. I havi been subject to thia before. Howeve aa soon aa our tanks are cleaned ani' the compass repaired, I shall proeee, to Manila " The Atlas 1 a anng little schooner. painted white, and with graceful line, almost a sister abia of , the Uermea which lay so long in tbi harbor. The Atlai anil Neptune 'a ofleer decided to proceed to Han Francisco, on leaving tbe Caroline, aad anaeeeded in escaping I the' Japaaeae and British paUola, mis Vim' tba in w wbieh befoU-tba Aeolua . i ii k. .. .. ciapiaia inro su at xwtrs ia the Coast and Qeodetie. Htufey I)e prtient. ppM'ilriy in tha Pbilrp pines and in AlMkjan w,atera Ue is particularly proud of his name, "just the siiine as that of the 'Divine Sa.ali,' " ho said. I Mil ksai fcr t ,1 A t- V KM Express Companies Will Pay Vast Sum'To Jaroa(Is, Annually r Under Arrarfocment ' WASHINGTON', . MaV 2-r-(Officlal) Secretary of Treasury aad Ii rector Oeneral of Balliroada MeAdoo today- made pobli further mattarf rn connec tion aritb the aanalgassatioa of the four great erpea eompaalee of the eona try,, whereby' tha. Adam,. Amerioaa, Wells Fargo nnd8oothern express com -anie are merged into a 30,000,000 jombine. ' . Under tbe agreement with the gov 3rnment, after July 1 whea the merg ft beeomeaeireetive, they. wiD t 40 he ; govefnment mo V than half of '.hair gross revenue whioh in. 19)7 were Bore than 1100,000,009. . The purpose of -thia merger is to at tia wartime, edieleaey through econo mies, avoiding , duplicated iervice, equipment and afficera. , Tha atockbolder. are to receive flve erceat )n dividend, and to divide all excess of that amonot with the gov -nmeet ' whlck declined to take over the companion and to guarantee to tbem, Ividends on thf Dre-war bai a wa done with the railroad. LOCAL AGENCIES DO , NOT FEEL' SURPRISED No. advice , hav been received by faaagCf Hardeety;: of the iocal Wells fprgo Offlce, Fred L. Waldron, repre eatrng tb- Adam Esprena Co,, or rame Ixive, representing the American 'Cxpro Co. as to what effect tbe amal (nmatlon. erf those companies will hwve on the local office in Hawaii. v The, amalgamation did 'not come a surprise to. the local agents here, as hev -baTe-been preparing report fo' that home offlces of the com pan ins they represent for the past month or more. A the Well Fargo office in Hono lulu 1 the only express company her which devotee all Of it attention to thi Una ot boiiaese, it la the belief of Mr. Hardeaty that this office will be retained here and will take over the Swsie.es' of the Other express agencies Until definite instruction are received front tne. . aiainKuid all three express companies will eotTtiane to-do hnsine a nanalr . .. is mm onvicted School Teacher Lives VfJ to Picture Which Her ' Counsel Had Painted WAUKESHA, Wisconsin, May 30 Aisociated lre) Grace Lurk, the ehool teacher who killed the wife of (oetor Jtobinson, with whoa ike' wa ofatuated, wa last night -convicted of aurder-in the aeoond degree, . ; '.? When the verdict of the jury wa lelivered Miss Lurk iprang like a tig . ea upon Acting District Attorney FuJ T and sought to spangle him, Jiving .p to the desn-itlonf her character vhtch her ojvn attorneys had given her i a remarkable effort to secure an c.quittal. Sli'e was flnullv ovorpowerer1 nd was carried from the court room ghting and screaming. Novel and remarkable was the de ense of the school teacher. Her eou l elnimed a reversion to th cave wt nan of tbousamls of years ago. Born u New Knglund, of a plou New Kng md family, of careful up-bringing, tUr rime of which she wa convicted (een)-1 d foreign froher every natural instinct. Counsel claimed Mis Lurk wa ko er declining thirties when be-met )octor Robinson. Letters of his wesr resented to the jury. The hrgsmeat as that when unyone steped between r and the object of her affeetinni e reverted to a prehistoric, type. w. a. a. 1 IS SENT TO BOTTOW. Army Officers, Enlisted Mjen, anc Crew Members Drown ' ' LONDON, May 29 (Aaociute .'ress) One hundred and one Uvea weii ost when a Hun submarine toriedoe ad sunk the British troopship Lcaiuvse Castle in the Mediterranean last Sua day. .. . Numbered among those lost were thirteen ofticers of the army and seve ty-niae eullsted men. The other mis ng are believed to be member of tb crew. . ' . i The Leaaewe Castle wa a eomnar.i tively new vessel, built in 191(1 at Birk enbead for the Union Castle Mai Steamship Company aad was of 07: 'Has. For some time past she ha bee. doing service a ajtramport. w. a. a. WASHINGTON, May 2 (Offlcisl) Congress haa been asked by the treasury department to appropriate an additional 12,798,000 for the bousing ot worker in forty-4ve citiea were im portant war work is underway. There ia already an important appropriation for this purpose. Better housing facilities are consider ed essential to tbe porsecution of war work and much of the early dragginp of work wa attributed to the Jack ajf quarter tor workers, especially when new communities have grown up o whe-e l'"i iitnnts tinve !ir"l"nte,' much smaller ones, of pre-war day. jRITISH TRANSPORT MORE MONEY NEEDED TO HOUSE WORKER? WA I T R&SUL T S ; . -... v , f V. , ''.v eV, ?',( ' : jm ' t -1 4 I ' Jm ' aaasn " 1 ' a- forts of Enemy A t : Lcngtlj : , r'. .',: NEW YORK, May 30 (Aaaocitted Press) Pressing forward Vfth n trVes'sMbl StelgSt numbert; regardless of losses, the army of the Crown Prince is steadily advancing along the Aisno rrctae SoUstms lias" bejeh CapturedK after Sesbrate street fighting, although' the-French still hold the southwestern suburbs and ' art Jefendihg themfcelves gallantly kgaittst great' Odds: Rheirrrs appears to'te''dobirie(l,;'A'' - ' " M '- ' ' There is no official report from France that General Foch has ts yet' brought any of his reserves into thd' battle; ' although the Berlin report Say thatboth British and French reserves have been )fbughf "Up''aftd defeated. v ' ' ' '"" ' CALM AtfD CONFIDENT In London, where the reports from the Aisnt are being scanned with the utmost eagerness, the public is reported to be serious, but jalm and confident in the outcome of this phase of the great battle. v Paris anxiously watches the on-rolling hosts, of the Huns, but is superbly confident that along the new front' will be repeated the tale of Verdun, Amiens and YpreS. . Though reports from the froQjj show that, the battle is as yet ine sided feporti from French rmy headquarters say 'that' it is et ufldecided, 1he role to be phtyed by the reserves yet to be heard ,rom.' 'The headquarters reports" indicate that the 'general staff !s taking the reverses to date in calmness and without any ncrVoua iess3 as -to the final outcome: 1 ' - , ; v ' ' ' USfi MANY MACHINE GUNS The Germans' are using an "enormous rrumber 'of machine guns tnd are being greatly assisted "by a large fleet' of tanks. On the right flink; tHe British and ' French south of Befry au Bac were submerged when the battle resumed yesterday morning, gteat waves f Germans attacking and forcing the Allies steadily back. The etreat was made In perfect order, the Allies falling' back across the Vlsne 'at' Pohuvert, 'twelve miles northwest of 'Rneims. ' Sti further p'the tJist on this sect6r, the Allies retired behind the Aisne Canal, his forced movement leaving Rheims exposed. ' The4 British are still i61dihg'the'Br6ufllet-Savigny-Tilloy Une, where numerous German ssaults have been beaten back. SOISSONS FLANK READJUSTED On the Soissons flank a ' readjustment Was necessary because f the strong German ' attacks Which had bent in the center, the French falling back upon the tity. The Important position at ?ismes, south of the Vetre River, was taken early in the day and :he Germans were advancing westward towards Soissons and threat ming the advanced positions grimly held to the north of the city. The retirement before. Soissons brought on a heavy attack there, he Germans rushing troops to thia sector ;t take advantage of the ?rench realigning movement. " Early fn the day th lvil population iad evacuated Soissons, the Germans having directed a heavy bom ardment upon the place, twelve hundred shells having fallen there n Monday and many more ysterday morning and on Tuesday. FIGHTING IN STREETS Following upon the heels of the French, the Germans stormed he chy and there was Street fighting of the most desperate nature of several hoars, the French being gradually pressed back. Last tight this battle was being' continued in the southwestern suburbs, -vhere the Paris , and Compeigne railroads effect a junction. The "reneh were systematically throwing back the German efforts to eize ths junction, the streets running with blood and being liter Uy blocked with heaped up bodies. Southeast of Soissons is the present tip of the German wedge n this flank. In the center an advance in all of fifteen miles since 'Jonday morning has been scored. IN RHEIMS SECTOR On the Rheims front the latest reports show that the British ire successfully maintaining their positions on the heights south east of Fort Thierry, on "a line from the Vesle River to the Aisne "anal. The Berlin official wireless of last night announces that the umber of prisoners taken on the Aisne is now twenty five thousand, hese including one French and one British general. Giving the letails of the day's fighting Berlin states: "The Crown Prince has victoriously continued hia attack and he British and French reserves have been defeated. General Larisch -as captured the Terny-Storny ridge northeast of Soissons and has aken by storm the Conde Plateau, with the position of Vregny, orth of the Aisne.' Advancing he occupied the town of Missy on he southern bank of the Vesle east of Soissons, while on his left he 4ossed the Vesle, capturing Braine and the important center of "Msiries.- General 'Use '-has I reported the capture 'Of ViHers, Fran "enlrx and-Rcrurcy, on the south bank lof the Aisne northwest of Rheims.'' ' ' - KAISER IS JUBILANT An Amsterdam despatch' quotes a telegram sent by the Kaiser rom his headquarters in the field at Laon to the Kanerih, which ays: "We have crossed the Aisne and are approaching the Vesle. "he British and French have been completely surprised. Our losses "tave been small. Further progress certain tomorrow. May God jrant that this splendid victory will help further. A night despatcTt' sent' Out from Berlin reports that near Sois or.s and between Soissons and Rheims further progress has been nade. ' " "" ''- ' ' " "" ' .-' 1UNITI0N TRAIN BLAST CAUSES GREAT HAVOC MOSCOW, May 2fl (Associated "res) Forty casualties were caused aud 30,000,000 rubles (lapiue done lv explosion anil fire front n ' taUiiition train at Kazan, iu the K'olL'o-'repion. Heven warehouse and 450 loaded rail road car were burned. W IHPROVtD OUININE j DOES. NOT AFFECT THt HEAD , '(( pf Its toale and lasailv 9cl aXATIVS BkOMO Ol'lNlNR wlllbelou" ' 1 Uer than ordinary Quiiilne. loeo act cau vousness. nor Tinaiu- tn Ihe brbl. I 'ilirr, .here is only one "i:rrti,o (,'ul.it' . .1 sio'-,- f.i t't. t' . (.iu .r n I NEW NCORPORATION PAPERS ARE FILED ftAN FHA,NClKCO, Mar 29 (Offi cial) Articles of incorporation have Cl'll fil.'.l I.V tl.u ni,',,.u U.ll Ui.nn.l.1.1 ' ' " w,nMiWiij' v oiiiiauy. the incoroorator are M. V. K.n.r. .,,l, nrnosoii, (!. K. Brythe, II. T. HrHinle".'clt- :, ,( Tin VIII Th c:i.itnli-'i: of lic ii..i tiv is olvea ni nnooormn Tit s '-":""jm' is t-ov '-kcr:i4 i"r the "'".l"'!" I'Ui-M .-Mil Hill a,,on "'ip ove" V'lnl " i. f.,rn."1v th" '' i--c-s I' "ill in") i.. ,,,.(., , ),,, .uv,',.ii ;ul I'uncl.'i'o and tlie Orient. xml | txt
http://chroniclingamerica.loc.gov/lccn/sn83025121/1918-05-31/ed-1/seq-6/ocr/
CC-MAIN-2014-15
refinedweb
5,280
71.24
Coding Your First Camel Route A discussion of the architecture behind Camel and how Camel Routes work within large enterprise integration patterns, including sample code to get you started. Join the DZone community and get the full member experience.Join For Free Enterprises consists of N number of systems each supporting different protocols and transports, thereby making enterprise integrations quite complex. Apache Camel is an open source framework that provides an implementation of various enterprise integration patterns. Camel makes integration easier by providing support for a large variety of transports, data formats, and protocols. There are 100+ components provided for messaging queues, APIs, databases, Kafka, cloud integrations, etc. Camel Architecture - Camel Context acts as a runtime for Camel which needs to be started before using the Camel components. Camel Context provides access to all the other components in Camel. - Route Engine is responsible for managing the routes and can handle N number of routes. - Components - Different Extensions (JMS, Kafka, etc.). - Message Based Processors are responsible for transforming and enriching the message. Creating a Simple Camel Application Using Spring Boot Go to Spring Initializr and generate a skeleton Spring Boot project by selecting Web and Apache Camel as the dependencies. Unzip the generated skeleton code and import the project to the IDE. Import the Maven dependencies. Create a class with the @Component annotation that extends the RouteBuilder class and implements the configure() method to configure the route. The URI format for the timer component is timer:name[?options] and we have configured it as ("timer:test?period=5s") A log is used for intermediate logging. pollEnrich does not access any data from the current exchange, which means, when polling, it cannot use any of the existing headers you may have set on the exchange. The URI format for file components is[?options] package com.demo.camelspringboot.route; import org.apache.camel.builder.RouteBuilder; import org.springframework.stereotype.Component; public class CamelRoute extends RouteBuilder { public void configure() throws Exception { from("timer:test?period=5s") .log("Timer has been invoked") .pollEnrich("file:inputdirectory/input?delete=true") .to("file:outputdirectory/output"); } } Create the input directories and create a sample file as shown: Start the Spring Boot application. Notice that the timer gets invoked every five seconds, as per the configuration. Notice that the file is deleted from the input directory and copied to the output directory as per the configuration. Concepts The exchange object is created when Camel moves the content from the 'from' method to the 'to' method as depicted in the picture below. - Exchange ID – A unique ID that identifies the exchange. - MEP (Message Exchange Pattern) – Denotes whether you’re using the InOnly or InOut messaging. The default is InOnly. InOnly represents a one way message and InOut represents a request-response message. - Properties – Properties are similar to message headers, but they last for the duration of the entire exchange. - Exception – This will be set in case of any errors during routing. - Message – The content to be transported. References Opinions expressed by DZone contributors are their own.
https://dzone.com/articles/coding-your-first-camel-route
CC-MAIN-2021-17
refinedweb
505
50.02
C# | Func delegate Prerequisite: Delegates in C# When we create a custom delegate we have to follow the following steps: Step 1: Declare a custom delegate with the format which is exactly equal to the method. Step 2: Create the object of custom delegate. Step 3: Invoke the method. By using these steps, we create a custom delegate as shown in the below program. But the problem is that for creating a delegate we need to follow the above procedure. To overcome this situation C# provides a built-in delegate that is Func. Using Func delegate you need not follow the following procedure to create a delegate. Example: Output: 485520 A Func is a built-in generic type delegate. This delegate saves you from defining a custom delegate like as shown in the above example and make your program more readable and optimized. As we know that, Func is a generic delegate so it is defined under System namespace. It can contain minimum 0 and maximum of 16 input parameters in it and contain only one out parameter. The last parameter of the Func delegate is the out parameter which is considered as return type and used for the result. Func is generally used for those methods which are going to return a value, or in other words, Func delegate is used for value returning methods. It can also contain parameters of the same type or of different types. Syntax: // Zero normal parameters and one result parameter public delegate TResult Func<out PResult>(); // One normal parameter and one result parameter public delegate TResult Func<in P, out PResult>(P arg); // Two normal parameters and one result parameter public delegate TResult Func<in P1, in P2, out PResult>(P1 arg1, P2 arg2); // Sixteen normal parameters and one result parameter public delegate TResult Func<in P1, in P2, in P3, in P4, in P05, in P6, in P7, in P8, in P9, in P10, in P11, in P12, in P13, in P14, in P15, in P16, out PResult>(P1 arg1, P2 arg2, P3 arg3, P4 arg4, P5 arg5, P6 arg6, P7 arg7, P8 arg8, P9 arg9, P10 arg10, P11 arg11, P12 arg12, P13 arg13, P14 arg14, P15 arg15, P16 arg16); Here, P1, P2….P16 are the type of input parameters, PResult is the type of output parameter, and arg1….arg16 are the parameter of the method that the Func delegate encapsulates. Example 1: Here, we use a Func delegate to create a delegate only in a single line without using the above procedure. This Func delegate contains four input parameters and one output parameter. Output: 1000000 Example 2: Output: 20 Important Points: - The last parameter in Func Delegate is always an out parameter which is considered as a return type. It is generally used for the result. - You can also use a Func delegate with an anonymous method. As shown in the below example: Example: - You can also use a Func delegate with the lambda expressions. As shown in the below example: Example:
https://www.geeksforgeeks.org/c-sharp-func-delegate/?ref=lbp
CC-MAIN-2022-05
refinedweb
501
50.77
In this section, you will learn how to read a file using Scanner class. Description of code: J2SE5.0 provides some additional classes and methods that has made the programming easier. In comparison to any input - output stream, the class java.util.Scanner perform read and write operations easily. It also parses the primitive data. Scanner class gives a great deal of power and flexibility. You can see in the given example, we have created a Scanner object and parses the file through the File object. It then calls the hasNextLine() method. This method returns true if another line exists in the Scanner's input until it reaches the end of the file. The nextLine() method returns a string on a separate line until it reaches the end of the file. Here is the code: import java.io.*; import java.util.Scanner; public class FileScanner { public static void main(String[] args) throws Exception { File file = new File("C:/file.txt"); Scanner scanner = new Scanner(file); while (scanner.hasNextLine()) { String line = scanner.nextLine(); System.out.println(line); } } } In the above code, instead of any input-output stream, we have used Scanner class to read the file. Output:
http://www.roseindia.net/tutorial/java/core/files/filescanner.html
CC-MAIN-2014-49
refinedweb
196
68.67
GHC is nondeterministic wrt. bytes allocated @mpickering and @osa1 brought my attention to the following nuisance. Save the following file as Simple.hs: module Simple where foo = () and compile it, multiple times: $ # set GHC_ENVIRONMENT to stop GHC from messing with environment files, use -V0 to rule out GC nondeterminism $ GHC_ENVIRONMENT=- ghc Simple.hs -fforce-recomp +RTS -s -V0 [1 of 1] Compiling Simple ( Simple.hs, Simple.o ) 38,612,600 bytes allocated in the heap 23,839,128 bytes copied during GC 5,780,144 bytes maximum residency (5 sample(s)) ... $ GHC_ENVIRONMENT=- ghc Simple.hs -fforce-recomp +RTS -s -V0 [1 of 1] Compiling Simple ( Simple.hs, Simple.o ) 37,505,496 bytes allocated in the heap 23,928,368 bytes copied during GC 5,774,512 bytes maximum residency (5 sample(s)) ... $ GHC_ENVIRONMENT=- ghc Simple.hs -fforce-recomp +RTS -s -V0 [1 of 1] Compiling Simple ( Simple.hs, Simple.o ) 37,513,808 bytes allocated in the heap 23,929,832 bytes copied during GC 5,774,512 bytes maximum residency (5 sample(s)) ... Note that - The first compilation allocates 1.1MB (almost 3%!) more than the subsequent ones, although we pass -fforce-recomp. I can live with that, though. I suspect it's just that we don't respect -fforce-recompeverywhere we should. - There is a spread of 8kB in total heap allocations between different runs. This is what's bugging me. I'd expect this number to be completely stable between successive runs. On the other hand it's far less than permille, so won't exactly influence our performance tests. - Bytes copied during GC is similarly affected, but much less so. Maximum residency was completely stable across all of my measurements. Some further observations: - If you pass -fno-code, the flukes go away. It's completely deterministic. - If you pass -fno-code -fwrite-interface, the flukes are there again, but only with a spread of +/- 32 bytes. Going from that last observation, I was able to still reproduce it on a stage2 compiler with the following diff: diff --git a/compiler/main/HscMain.hs b/compiler/main/HscMain.hs index ffb9b3ced9..454b9db293 100644 --- a/compiler/main/HscMain.hs +++ b/compiler/main/HscMain.hs @@ -169,7 +169,7 @@ import Control.Monad import Data.IORef import System.FilePath as FilePath import System.Directory -import System.IO (fixIO) +import System.IO import qualified Data.Map as M import qualified Data.Set as S import Data.Set (Set) @@ -869,8 +869,10 @@ hscMaybeWriteIface dflags iface old_iface location = do _ -> True no_change = old_iface == Just (mi_iface_hash (mi_final_exts iface)) - when (write_interface || force_write_interface) $ - hscWriteIface dflags iface no_change location + when (write_interface || force_write_interface) $ do + h <- openBinaryFile "Simple.hi" WriteMode + -- hscWriteIface dflags iface no_change location + return () -------------------------------------------------------------- -- NoRecomp handlers So opening a file in write mode leads to these wibbles. If you open the file in ReadMode, the fluctuations go away. I compiled a standalone program that simply opened "Simple.hi" in WriteMode: import System.IO main = do _ <- openBinaryFile "Simple.hi" WriteMode return () (invokation: ghc test.hs -threaded) But that multiple runs of the program don't exhibit any wibbles in allocations. At this point I gave up, because I suspect it's some race inside the event manager, but this ticket shall preserve my findings so that my work wasn't in vain.
https://gitlab.haskell.org/ghc/ghc/-/issues/17654
CC-MAIN-2020-34
refinedweb
547
61.53
Java do-while Loop: Video Lecture 14 Java do-while loop is one of the three looping techniques available with the language. The other two loops are: for loop and while loop. do-while is a little bit different than for or while loops. In the “for” or “while” loop, generally, a condition is checked in the beginning to realize whether the execution should go inside the loop, or not. In contrast, do-while checks for the requirement of iteration at the end of the loop. As a result. do-while would execute the code-block inside the loop at least once. Contents - 1 Java do-while Loop - 2 Problem Used in the Video - 3 The Solution - 4 The Video Lecture on Java do-while Loop - 5 Transcription of the Audio of the Video - 5.1 Why do you need a do-while loop? - 5.2 The structure of Java do-while loop and how it compares with other loops - 5.3 What is a common use of Java do-while loop - 5.4 Starting the code - 5.5 Scanner - 5.6 Java do-while loop - 5.7 A character variable - 5.8 Get user-intention regarding repetition - 5.9 Single quotes for a character - 5.10 The goodbye message - 5.11 Save, compile, and run - 5.12 Concluding remark - 6 Subscribe Java do-while Loop Java do-while loop has the following structure. do { // Code-block } while (condition); The condition is generally an expression that results in either true or false. If the condition results in true, another iteration of the code-block will occur. If the condition becomes false, the loop terminates and executes anything found after the while loop. Problem Used in the Video In the video, we demonstrate how to write a program using java do-while loop to repeat the same task based on user preference. The task that the program repeats is the addition of two number provided by the user. The following image provides a screenshot of the program. Notice that the program asks for two numbers from the user. The program prints the summation of the two numbers. Then it gives the user to enter ‘y’ to continue and any other letter to quit the program. The user repeats the task several times by entering ‘y’. When the user enters ‘n’ to quit, the program outputs “Good bye.” and terminates. We wrote the program using a Java do-while loop. Here is the solution. The Solution The solution is provided in the space below. import java.util.Scanner; class DoWhileTest{ public static void main(String[] args){ double a; double b; Scanner scan = new Scanner(System.in); char decision; String str; do{ System.out.print("Enter the first number: "); a=scan.nextDouble(); System.out.print("Enter the second number: "); b=scan.nextDouble(); System.out.println("The addition result is: "+(a+b)); System.out.print("Enter y to perform more additions."); System.out.println("Any other letter to quit."); str=scan.next(); decision = str.charAt(0); }while (decision=='y'); System.out.println("Good bye."); } } The Video Lecture on Java do-while Loop The video lecture below explains a lot of details on Java do-while loop. Transcription of the Audio of the Video In this video, we are going to discuss another looping technique known as do-while loops. We will discuss the structure of the do-while loop and compare it with other looping techniques in Java. Definitely, we will write a program to explain how a do-while loop works. Why do you need a do-while loop? Hi, I am Dr. Shahriar Hossain. Today, I am going to explain do-while loops in Java. From the previous videos, we are already familiar with for-loops and while-loops. Now the question is, why do we need a third type of loop, named do-while? Its a Good question. A do-while loop is a special kind of looping technique that is suitable for a situation when execution of a code-block is required at least for once. Now, you may ask if a programmer needs to absolutely know about do-while loops. The answer is, a programmer can avoid do-while loops and use for or while loops with some tricks to do the same work. However, knowing do-while loops makes a programmer’s life easier in some situations. Moreover, if you have to sit for a programming exam, or go for an interview, you absolutely need to be familiar with do-while loops. Do-while is one of the three looping techniques. As a programmer, we should be familiar with all the three type of loops: for, while, and do-while. The structure of Java do-while loop and how it compares with other loops Anyway, let us take a quick look at the structure of a do-while loop. // Show Handwritten animation do { // code-block } while (condition); ----- while (condition){ // code-block } ----- for (initialization; condition; change){ // code-block } The do-while loop starts with the word do. Then the scope of the code-block starts with a curly bracket. At the end of the code block, you end the scope using a closing curly bracket. Then the syntax “while” is written at the end with a condition. We have to put a semicolon at the end of the do-while loop. Notice that do-while is quite different than while loop and for loop. Do-while is different in the sense that in while and in for loops, the condition is executed before going inside the scope. If the condition results in “true” in a for or while loop, the execution goes inside. If the condition results in false, the condition does not go inside. In contrast, there is no condition before going inside the code-block of the do-while loop. That means the code-block will execute at least once. At the end, you have the condition with the while. Every time, the code block is executed, the condition-check will evaluate whether another repetition of the code-block is required. If the condition is true, then the code-block will be executed again. Otherwise, the execution will move forward to whatever statements are there outside the do-while loop. What is a common use of Java do-while loop A common use of do-while is to check if the user wants to repeat the same work. Let us discuss a program that uses do-while to repeat the same work as long as the user wants it to repeat. <<Show the terminal output of the program first>> Consider that we have an amazing program that can add two double-precision numbers. The program asks the user for two numbers. The program then reports the addition result. After the addition, the program asks the user if she/he would like to add more numbers. If the user enters ‘y’ for yes, then the program will ask again for two numbers that the user wants to add. After the user enters two new numbers, the program will report the new addition result, and ask if the user wants to do more additions. The process will keep repeating as long as the user enters ‘y’. If the user enters ‘n’, then the program will say “Good bye” and terminate. Starting the code Let us write code for this program. At first let us write a program that asks for two numbers, reports the summation result, and then terminates. Later we will modify the code to repeat the task. Scanner We already know how to write a Scanner object and ask the user to enter two numbers. We keep the two numbers in two variables named a and b. After receiving the numbers from the user, all we have to do is, to print the summation of the two numbers. If we compile the java file and run the generated class file, we will notice that the program asks for two numbers from the user, then the program reports the summation, and finally the program terminates. Java do-while loop Now, what we want to do is the following – we want to use a do-while loop to repeat this part of the code, where we ask the user for two numbers, and then print the summation result. Let us write the “do” syntax, and put our code inside the scope of the loop. The loop ends with the syntax “while” and then in parentheses we will need to provide the condition that is responsible for the repeat. Note that we have to put a semicolon at the end of the do-while loop. Now, we still do not have any information that we can use for the condition that should go here. In fact, with the current code-block, we did not collect any information from the user regarding her or his desire to repeat the addition for another set of numbers. A character variable Let us declare a character variable that will help us to store a letter representing user’s desire to repeat. A character variable is able to keep only a letter, digit, or a symbol in it. For example, at can hold, ‘a’, ‘b’, ‘c’, or any letter. A character can hold even a digit like ‘1’ or ‘2’, or ‘3’. It can even hold symbols like ‘+’, ‘-’, or ‘*’. There is a wide range of characters, letters, digits, or symbols that it can hold. We will ask the user to enter ‘y’ if she or he wants to do another addition. We will ask the user to enter anything else if she or he does not want to do any more addition. We will store whatever the user entered in the character variable named decision, we just created. Get user-intention regarding repetition We use the scanner object to get the user input for a character value. Unfortunately, the scanner object does not have a direct method to read a character. We have to read whatever the user enters using a the next() method. We have to keep the information in a String object. str is the String variable. Then we have to retrieve whatever we have in the first position of the String str and put it in the character variable decision. The value zero in the parentheses of charAt gives the first character. Characters in a String starts from 0. That is, the first character of a String has a location of 0, the second character has a location 1, the third character has a location of 2, so and so forth. Anyway, we just need to take a look at the first character, whether it is ‘y’ or not. If the first character is ‘y’, it will be in location 0 of the String str. Hence, the variable decision will contain ‘y’. If we find that the variable decision is not ‘, then we do not have repeat anymore. Now, notice that the repetition of this do-while is dependent on whether the variable decision is ‘y’ or not. Therefore, we can write the condition here as decision ==‘y’. That means, if the decision variable is the character ‘y’, then repeat, otherwise do not repeat. Single quotes for a character Note that a character is placed within a single start quote and a single end quote. Without the quotes, the compiler will think that ‘y’ is a variable and will throw and error stating that the variable y is not declared in this program. Therefore, to indicate that we are referring to the exact character value ‘y’, we have to provide the single quotes. The goodbye message After the do-while loop terminates, we want the program to write a “Good bye” message. Therefore, we write a System.out.printlin method outside of the do-while loop. Save, compile, and run Let us save the file, compile the code, and execute the generated class file. The user is asked for two numbers. The user enters the two numbers. The program reports the addition result. Then the program asks to enter y, if the user wants to do more additions. The user types ‘y’ and hits the enter button. The program asks for the numbers again. The addition result is displayed. Then the program again asks whether the user wants to do more additions. The user can keep entering ‘y’ here and keep doing additions. When the user enters anything other than ‘y’, the program says “Good bye” and then terminates. Notice again, how we wrote our program. The code block executes at least once. The decision whether to repeat the code-block or not is made at the end. This structure of do-while is different than for loop and while loop in this way. Concluding remark Through this video, we have covered the third looping technique used in Java. We already learned nested for-loops one of the previous videos. Similar to nested for-loops, you can write nested do-while loops. You can even write one do-while-loop inside a for-loop, or even one for-loop inside a do-while-loop. I hope the concept of looping. 8 Comments Thank you so much. I appreciate your quick response and the explanation. You are welcome. We wish you a wonderful new year. str = scan.next(); decision = str.charAt(0); I really did not understand this area well. why is the scan.next without String or any other variables? then the charAt. Thank you for the question. next() does not have any parameters. This is how the method is written in the Scanner class. Notice that reading the next entry really does not require input from the caller. charAt has a parameter. This is how it is written in the String class. Notice that, we need the parameter because we have to tell the method which character we want to retrieve from the string. We have covered methods and parameters in a later video, which might clarify how methods are written: Please note again that we have not yet covered classes and objects, and hence it will not make much sense to describe Scanner and String from class/object perspective. Thanks again. I am following up. It is really simplifying. I would want some direction on how to turn this code into a read time project. The following link has some indication on how to get the System time:. Since we have not yet taught classes and objects, it will be hard to explain this. Thank you for your question. Good afternoon. My name is Richard. Am writing from Ghana. I say thank you for providing this wonderful channel . your tutorials are one of the best and has helped to understand basic java. Continue the good work. Dear Richard, Greetings from Texas, USA. I appreciate your feedback and your comment. We will keep posting the video lectures. I hope the lectures will help learners all over the world. Please do not hesitate to contact us if you have any question regarding any of the materials. Thank you! Best regards, Shahriar
https://computing4all.com/java-do-while-loop/
CC-MAIN-2022-40
refinedweb
2,519
75.2
It’s about time I shared my reasons why I came back to web development after five years of iOS development, and why I attribute a lot of these reasons to React. - From Web, to iOS, and Back Again - Reason 1: React is Maintained by Facebook, and Facebook are Masters at Open Source Software - Reason 2: React is Fast, Fun, and Refreshing to Write - Reason 3: Getting Started with React Is a (Semi) Frictionless Experience - Reason 4: The React Community is Buzzing - Reason 5: The Job Market is Ablaze with React Jobs From Web, to iOS, and Back Again I began my career in web development eleven years ago, towards the end of 2008, although I’d been coding for fun long before that. I landed my first job in the heart of the country I grew up in, London, UK, working as a contractor. Initially, the apps I worked on were very simple. The majority of them were just extending the basic functionality of a webpage using libraries like jQuery and Backbone. These apps were definitely not like the fully-fledged web-apps that are common place in 2019. I was new to the industry, but overall quite content with web development as a career path. A few years passed. AngularJS became the de facto framework, revitalizing my excitement for web development. Angular allowed me, for the first time, to transfer ideas from my head into working, functional web-apps in a fraction of the time it would take if I had used jQuery. By mid 2012, I had inherited my older brother’s iPhone 4 after he upgraded to the sleaker iPhone 4S. And not long before that, I bought the 2012 MacBook Air (my favorite laptop to this day). I was heavily invested in the Apple ecosystem. After learning of the buzz and excitement that was brewing in the iOS development world, I wasted no time purchasing a copy of iOS Development for Dummies and, iPhone 4 in hand, I fired up Xcode. It was my first experience creating what felt like real apps. Of course, software isn’t real, but it felt like I was creating these tangible products using tools that I could trust (when Xcode decided to work), and not a flimsy text editor. I loved it. Compared to web, developing for mobile was a breath of fresh air. It came with new and exciting challenges, like how to design for smaller screen sizes and a completely new way to interact with the user interface. I would spend the next five years focusing on iOS development. During that time, I moved first to Berlin, Germany, and then on to New York, working at a handful of small startups developing iOS products. I even launched my own iOS app to the AppStore at the end of 2012. However, In hindsight, I never fully left the web development world. I like to keep up to date with what’s happening in the dev world. Whether that’s a new version of Unity, the latest browser-based design tool, or a new JavaScript library. Therefore, when I first heard of React in late 2016, I didn’t hesitate to jump in and begin experimenting with it. Although I had lost interest in Facebook as a product, I do hold their development practice in very high regard. You only to glance at Facebook’s Github repositories page to understand how much they contribute to the open-source community. Which leads me nicely into my first reason: Reason 1: React is Maintained by Facebook, and Facebook are Masters at Open Source Software Facebook open-source development teams write outstanding documentation. If a tool, library or whatever you’re learning is accompanied by easy-to-read, accurate documentation, the initial learning curve will be less. Facebook contributes so much to the open-source community that they even have a dedicated page listing all of their open source projects. Aside from Facebook teams writing fantastic documentation, it’s clear that the React development team work hard. Since August 1st, 2018, React has had seven major releases. In just over thirteen months, React has had some very exciting updates, including: - Hooks (A huge change) - A completely revamped DevTools - Code splitting tools with React.lazy There aren’t that many companies that have a dedicated team working on open-source software. So, thanks Facebook! Reason 2: React is Fast, Fun, and Refreshing to Write React is a library, therefore it’s more lightweight than a fully-fledged framework. There’s zero boilerplate code to create a React component and begin using it. Creating React components is even easier since the release of React 16.8, which introduced Hooks, doing away with class components, and allowing functional components to step out of the shadows and into the lime-light. Hooks let functional components ‘hook’ into state and lifecycle functionality. If you haven’t explored Hooks yet, check out my tutorial on Simplifying Forms using Custom React Hooks. As a result, look at how clear and concise a stateful functional component can be: import React, { useState } from 'react'; const Button = ({ label }) => { const [isClicked, setIsClicked] = useState(false); return ( <button onClick={() => setIsClicked(true)}>{label}</button> ); } export default Button; And if we wanted to use example Button component above, it’s just a case of importing it into another component and declaring it, like so: import React from 'react'; import Button from './Button'; const ButtonPage = () => ( <> <h1>Buttons!</h1> <Button label="Click me!" /> </> ); export default ButtonPage; JSX is my primary reason why React is so fun to write. I’ll admit, it took me a while to get to grips with JSX’s syntax, but when I did, I was very quickly able to separate the view code from the logic code. As a result, components are extremely clear and quick to understand. Take this next example demonstrating how to conditionally render a button’s label based on isPrimary’s value: import React, { useState } from 'react'; const Button = ({ isPrimary }) => ( <button> {isPrimary ? 'Primary Button' : 'Secondary Button'} </button> ); export default Button; Reason 3: Getting Started with React Is a (Semi) Frictionless Experience “Where do I begin?” is a question all developers ask themselves when learning a new programming language, library, or framework. That initial excitement of being able to create the next big thing quickly transforms into frustration as you slog through answer after answer on Stackoverflow of what do to next, or how to solve that one crippling bug. For many developers, me especially, learning how to code comes from practice. Building small apps, trying out new design patterns, building more apps, and breaking stuff. It’s the same for learning any skill. “Where do I begin?” is a question all developers ask themselves when learning a new programming language, library, or framework. As the saying goes: Practice makes perfect. The other aspect of learning is this: If you’re aware that you’re progressing at that skill, you’re more likely to continue using that skill. As a result, If you’re to be successful with a skill, the learning experience must be frictionless. In hindsight, it was this frictionless learning experience that, unbeknown to me at the time, kept me progressing further and further down that Apple shaped hole. Before I knew it, I was well on my way to launching my first iOS app. Why did I keep building iOS apps? It’s simple. Apple have made it painless for new developers to go from nothing to a running iOS app. I understand that web development will never be like iOS development, simply because there isn’t one company who can dictate the entire development stack. Google own the market share of web browsers with Chrome, Microsoft appear to take the IDE crown with Visual Studio Code, and Facebook are storming ahead in popularity of most used UI library with React. So, how does React make the learning experience faster? Well, once you’ve picked an IDE and decided to jump in to bed with React, The React team do a fantastic job of letting you hit the ground running with their absolutely brilliant Create React App tool. npx create-react-app my-app Create React App is a tool for quickly scaffolding a new React app so you can spend less time configuring and more time creating. With a single command, you can have a fully scaffolded, webpack’d React app in less than a few minutes. Reason 4: The React Community is Buzzing As with any skill, it’s a fantastic feeling when you’re part of a close-knit community of likeminded individuals who share that same excitement. Apple created a wonderful iOS development community when they put coding center stage with their WWDC events. I have fond memories crowding around a TV with other iOS devs wherever I was working at the time, watching WWDC every year. I’m pretty sure I’ve watched WWDC at every dev-shop I’ve worked at, first in London, then in Berlin, and finally, New York. I’ve been out of the iOS development space for almost three years now, and I still to this day tune in to watch WWDC. WWDC was a catalyst in making iOS development exciting, and, dare I say it, cool. Fast forward to 2019, and the React dev community is emulating a lot of what made the iOS community great. It contains that same buzz and excitement. What’s also fantastic, is that we’re seeing thought leaders emerge out of the crowd who provide a so much for the React community. Individuals like Dan Abramov, Cassidy Williams, Kent C. Dodds, and Sophie Alpert. These individuals, and many, many more, contribute a huge amount to the community, through sharing insights, learnings, and tutorials. A community is stronger if it works together. Reason 5: The Job Market is Ablaze with React Jobs I’m not going to lie, earning potential is a big reason for me. Yes, I, like many others, have a pipe dream that one day I’ll earn enough money to retire early and live the rest of my days on a remote island somewhere in the mediterranean (I’ll keep writing React tutorials until then!). That’s why job opportunities features on my list of reasons why React has reinvigorated my love for web development. Having said that, I’d much rather build products using languages and tools I enjoy rather than a technology stack that pays extremely well but isn’t my cup of tea. It’s relieving to see how many React jobs there are. This is only a hunch, however I’ve noticed more and more React jobs appearing on job boards. It’s comforting to know the skill I enjoy is in such high demand at the moment. I’m going to let you in on a secret. I knew about the influx of React jobs even before the hordes of recruiters did. How? It’s all thanks to that little React shaped badge nestled quietly in the top right corner of my browser window: The React Developer Tools. As well as being a must have for React developers, the React Developer Tools browser extension performs a neat little trick whenever I visit a website: It illuminates a cool-blue color if that website has been built using React. Over the last year, I’ve noticed that little blue React logo spring into life more and more whenever I visit some of the web’s biggest apps. Just take a look at some of these world-class web apps that are built using React: - Steam - Airbnb - Wayfair - New York Times - Hipmunk “That’s all well and good, James, but what does this have to do with the job market?” Smaller product teams will naturally look to the larger, established products to understand what technologies scale well. When the maturer products use a particular stack, it’s a pretty accurate indication that the stack has been tried and tested in a large-scale production environment. Blog posts on learnings, interesting tips and tricks, and tutorials are published and word gets around. As a result, other developers read these articles and adoption rates increase, which in turn creates more jobs. Before you know it, you get ten messages a day from recruiters about React jobs on LinkedIn… …until the next JavaScript library is released and nature repeats itself. 💻 More React Tutorials James, Amazingly Great job. These two points are well covered. “The React Community is Buzzing” and “Getting Started with React Is a (Semi) Frictionless Experience” Thanks for sharing this info. Thanks for your story. I have the exact same story. An iOS Dev of 6+ years now recently moved to React and Javascript and am enjoying it despite all of my initial hesitations. There’s a lot of pros and cons compared to iOS (and mobile) and I would say overall, I enjoy it a bit more.
https://upmostly.com/web-development/how-react-reignited-my-love-for-web-development
CC-MAIN-2020-29
refinedweb
2,163
60.35
It looks like you're new here. If you want to get involved, click one of these buttons! Hi I've been using KLayout for years without a problem and XSection since 2018. This last week I've found that XSection no longer works for me. I was running KLayout 0.26.12 (64 bit version) on Windows10 with a .lyp file customised for our CCD process. XSection version was 1.2 and that was fine until last week. We have a few XSection scripts which, according to the windows file properties, have not changed for a couple of years. Last week trying to run XSection suddenly gave this error message and a blank tab. undefined method 'string to layerinfo' for # in C:/users/rbell/Documents/ccd_with _implants.xs:9 I've tried updating to KLayout 0.27.4 and this still fails but with a longer, and to me completely incomprehensible, error message. I've also updated XSection to 1.4 which didn't help either. A colleague can run the same XSection script without errors using KLayout 0.25.3. The issue persists for several .gds files and different .lyp files. Rolling back KLayout to 0.26.12 did not solve the issue. I tried a clean install on a different laptop and the problem remains the same. Any advice welcome! Thanks Ray Hi Ray, I'm sorry, but this is impossible for me to debug with the information you give me. I'd need at least your .xs file or the beginning of it (at least until line 9 of ccd_with _implants.xs). And even if the error message isn't comprehensible to you, you can still paste it here. I may understand it. Files don't just get defunct - I'm sure someone has touched something. Maybe your .xs file is loading some layer properties which do no longer exist, maybe they are loaded from a network drive which is no longer mapped ... whatever. I cannot tell without details. As a general rule, if you write .xs files that require other resources, make sure these come from relative paths. Keep things inside a single folder and use a configuration management system such as git so your files don't magically get damaged. Finally, you can try resetting KLayout's configuration (rename c:\users\your_user_name\KLayout to something else). In c:\users\your_user_name you will also find a file called ".klayout-xsection". You can try removing this file as it holds the last used files. Maybe something is wrong with that one. Matthias Thanks Matthias, You've given me a few things to check out there. Looking at my files I think the problem may have started when I was using KLayout in editor mode to do some boolean operations on a copy of a layout file to build up a crude height map. I was using 0.26.4 or so then , I see there is a new function in 0.27.4 , the 2.5D view which looks as though it may be better suited to my needs anyway but having broken XSection I want to get it fixed before experimenting further. I thought I might have found the problem in that I had been a bit careless with the new layers I generated from an xor of existing layers and some of the numbers matched layers used in the xs script. I tried fixing that by deleting these layers from the layout but it didn't solve the problem. Is a screenshot of the error message from KLayout 0.27.4. Can you see that and does it help? And here are the first 20 or so lines of the ccd_with _implants.xs script. __## Standard CCD process flow: 85/85 dielectric, no anti-etalon, diffused n+, single level metal patched version of the original output function which can be called multiple times. It will override the output already present. def output(layer_spec, layer_data) ls = string_to_layerinfo(layer_spec) li = @target_layout.layer(ls) shapes = @target_layout.cell(@target_cell).shapes(li) shapes.clear # new feature # confine the shapes to the region of interest @ep.boolean_to_polygon([ RBA::Polygon.new(@roi) ], layer_data.data, RBA::EdgeProcessor::mode_and, true, true).each do |polygon| shapes.insert(polygon) end end_ _ I think they are largely copied from a generic example script. I am aware I didn't give you enough information in my original post to troubleshoot. I didn't want to flood the forum with irrelevant details. Thanks for your support, Ray P.S. Sorry about the huge font which crept in, I was trying to put the pasted text into Italic! Ray Hi Ray, To paste code, you need to put a single line with three backticks before and after the code. Otherwise it's formatted in Markdown convention (# will become a headline etc.). I agree the error message is somewhat gross, but it tells everything I need to know. To fix the problem you should entirely delete the function definition from "def output(layer_spec, layer_data)" to "end". It is no longer needed and isn't portable. That's why you receive this message. Your colleague probably uses an older XSection system. If you change the file both you and your colleague should switch to the version 1.4 installable from the package manager. Kind regards, Matthias Thanks Matthias That seems to have fixed it. Thanks also for providing and supporting this software. Ray
https://www.klayout.de/forum/discussion/1950/problems-with-xsection
CC-MAIN-2022-05
refinedweb
903
76.72
Hi all,new here i have this python function def gtest(request): p = request.POST print p g = p['information'] print g to_json = { "key1": "value1", "key2": "value2" } jsonValidateReturn = simplejson.dumps({"jsonValidateReturn": "ddddd"}) return HttpResponse(jsonValidateReturn, content_type='application/json' ,mimetype='application/json') and on the client side $.ajax({ url: "", type: "POST", data: { information : "You have a very nice website, sir."}, dataType: "json", success: function(data) { alert ("post is success"); }, error: function(request,error) { alert(request.responseText); alert(error); } }); no matter what i do when the post is back it goes to error.on my server i see this message "POST /api/gtest/ HTTP/1.1" 200 31so it looks like response should work but no matter what it does not go to the success function.. plz help :\ thxGuy Could you send a message to a moderator (anyone whose name is green or blue) and ask to have your code edited? Or post again, but wrap your code in code tags ([noparse] to start, close it with [/noparse]). Otherwise the forums eat up your indentation which with Python we need. Also: Python 2x or 3x? Are you using httplib? return HttpResponse(jsonValidateReturn, content_type='application/json' ,mimetype='application/json') What are the required arguments for this (I see a different list on the library pages at docs.python.org for version 2)? I ask because MIMEtype should be represented by Content Type as far as the browser is concerned. When you run your Javascript, in your browser debugger, can you see anything else being returned? What errors are being checked in thesuccess: function(data) {alert ("post is success");},error: function(request,error) { alert(request.responseText);alert(error);} section? Those success and errors should refer to the ajax readyStates I think. You may not be getting a readyState 4. Here are the states, and you should be able to see which one you get in your browser debugger as you step through your Javascript. Also back when I was doing ajax by hand I needed to add in a send() call just to make Opera happy, and I dunno if Opera fixed this or if jQuery (is that what you're using) already fixes this. This topic is now closed. New replies are no longer allowed.
http://community.sitepoint.com/t/send-httpresponse-to-client/44691
CC-MAIN-2014-52
refinedweb
372
65.73
VIVO 1.5.1 was released Monday, October 15. Many thanks to all who contributed through bug reporting, development, and testing. Updates - Brown - have been loading all the data into VIVO and building fairly detailed faculty profiles; hoping to have faculty starting to look in the next month. Have quite a bit of data, all off the CVs that faculty members are asked to produce based on patterns established by the University. Faculty members or their delegates will be asked to update in VIVO after this initial load. The main Brown website is running on Drupal and departments are encouraged to use Drupal as well; no discussions yet on feeding websites from VIVO but that's certainly a goal. - Colorado - Stephen has started and is looking at the upgrade path from 1.2 to 1.5.1. Since they don't allow editing it may be easiest to modify their input scripts to produce 1.5.1 data; they would otherwise need to go through each intervening major release (1.3, 1.4.1, and 1.5.1). - Cornell - working with multiple named graphs to allow adding/removing subsets of data as required. - Duke - EPA - Florida – preparing to upgrade to 1.5.1 - Indiana – still working with the Florida data to test the scale of Maps of Science that can be drawn. Recommends using the Jabbr service from Cornell to align journal names with those used by the base map of science in that visualization (an amalgamation of journals from Web of Science and Scopus) - NYU - tweaking the interface to be optimized for searching and displaying people - Penn - - UCSF Weill - Continued to get help from Stella on identifying "unlinked" data. Next step - look into the data and determine what to delete. (count (distinct ?o) as ?count) where { graph <> { ?s ?p ?o . filter (not exists { ?o ?p2 ?o2}) } } This query will be returning all the ref:type statements and all data properties – which likely explains the large number of values returned (273,000+) and the time it took to run. Demo of RIS2N3 Tool: - Now checks against an existing VIVO application by doing a SPARQL query ahead of time to retrieve a list of name parts – checking for people using a simple last name/first initial match that could be improved and applied to article titles, journals and/or publishers - Wrote his own parser for the RIS format - At IU they use it to ingest data from Endnote and Google Scholar – RIS is a common export format - Stella commented that she wrote a similar tool for Scripps that uses a bibtex parser and also checks for matches to existing journals and articles by title; these tools could be merged. - Stephen mentioned that the Harvester has a workflow designed to take MODS bibliographic metadata as input; an open source library was used to produce MODS metadata from other formats. Moving to Git/GitHub, Converting the Wiki. Notable Development List Traffic - Apache configuration -- alias and paths - Failed to rebuild search index - Brian Caruso: There was a problem parsing the JSON from the RDFService into a result set. What is odd is that /f is a valid escape in JSON for a form feed. If this is the problem it could be fixed in com.hp.hpl.jena.sparql.resultset.JSONInput.toJSON. A workaround would be to not have any form feed characters in your literals. - Modtime in VIVO – The property vitro:modTime is no longer supported and I do not think that it gets recorded in the triples. There is a field in the solr index named timestamp that has the time when the individual was last updated in the solr index. (note that this Solr index property reflects changes to anything indexed for the Solr 'document' corresponding approximately to a VIVO page, so could be very useful as a way to detect when a page needs to be refreshed in an apache caching solution like Squid) - Special character can't be removed from Jena model – see NIHVIVO-3994 - New site, new namespace - I wanted to change the "individual" part of the uri to just "uri" ... - Creating relationships in EditConfigurationGenerator - I am attempting to add a relationship between a newly created subject and a data type property within an implementation of EditConfigurationGenerator. Open Discussion - Eric Meeks want to know how to determine where to put things in the ontology. Examples are patents, clinical trials. Recommending the ontology list and the ontology call, so their questions are known to the whole group. Call-in Information Topic: VIVO weekly developer call Date: Every Thursday, from Thursday, October 4, 2012 to
https://wiki.duraspace.org/display/VIVO/Development+Call+20121018
CC-MAIN-2019-22
refinedweb
765
58.11
:I think we should change this. And actually it is quite easy. Replace : :#ifdef SMP : code :#endif : :with : if (is_smp) { : code : } : :and have some header doing : :#ifndef _KERNEL_MODULE :const static int is_smp =3D :# ifdef SMP : 1; :# else : 0; :# endif :#else :extern const int is_smp; :#endif : :and initialize is_smp appropriately in some kernel source. : :The kernel will be compiled optimized, because the compiler knows that is= :_smp is a const value and thus can remove dead code. Modules will take t= :he penalty of checking this variable, but that's hardly an impact, becaus= :e it will be in the cache anyways. Just make sure that the variable is i= :n its own cache line, which never changes. : :comments? : :cheers : simon This works to some degree. The only issue is that #ifdef'd SMP code is not parsed at all if SMP is not defined, and so it may reference variables and procedures that otherwise do not exist (and are undeclared) for non-SMP kernels. if (IS_SMP) { ... } code *IS* parsed by the compiler, so even though the compiler may optimize it out you could still end up with warnings and errors pertaining to variables that are not declared for SMP builds. My only other comment on the matter is that constant declarations replacing #ifdef's should probably be all-caps. e.g. IS_SMP rather then is_smp, to differentiate those variables from normal variables and make the code more readable. I use the const trick for the KTR logging code. It works quite well given the caveats. -Matt
http://leaf.dragonflybsd.org/mailarchive/kernel/2007-02/msg00132.html
CC-MAIN-2014-42
refinedweb
256
68.91
SOLVED Rotate 90º seems to send contours upward. I'm wondering if it'd make sense to slightly alter the built-in RF way to rotate. Continuing to rotate often won't return you to your home position, and instead send the glyph up or down, presumably because the bounds are odd. See video demo, and alternative script suggestion: g = CurrentGlyph() # gather midpoint of selection xs = [] ys = [] for pt in g.selection: xs.append(pt.x) ys.append(pt.y) mid_x = round((max(xs) + min(xs)) / 2) mid_y = round((max(ys) + min(ys)) / 2) # rotate around midpoint for pt in g.selection: pt.rotateBy(90, origin = (mid_x, mid_y)) g.update() This is for the selection, but you get the idea. TIA! RoboFont is using otRoundfrom fontTools.misc.fixedTools see the difference here: from fontTools.misc.fixedTools import otRound value = .5 print(otRound(value)) print(round(value)) value = .49 print(otRound(value)) print(round(value)) value = .51 print(otRound(value)) print(round(value)) see @frederik said in Rotate 90º seems to always round up.: otRound RF’s native rotate still sends the contour upward, and otRound doesn’t: see here. Something else must be going on. yeah, if this is the case then the numbers are just not working for you... by hitting a single rthe points are rotated and rounded off, next them the same happens. I can reproduce all cases: moving up, moving right, doing nothing... with both the internal rotation and your example script. I just have to move a point 1 unit up/down/left/right. @frederik I see. I just did some more testing with otRoundand roundand it looks like otRoundgoes rightward over several rotations, which I now notice from my last video. roundseems to return home each time, though. Any reason roundwould be bad? odd-width-and-height bounds: r: upward round: stationary on average otRound: rightward Here's another video and test script: from fontTools.misc.fixedTools import otRound g = CurrentGlyph() # contour 0 : round c_0 = g[0] mid_x_0 = round((c_0.bounds[0] + c_0.bounds[2]) / 2) mid_y_0 = round((c_0.bounds[1] + c_0.bounds[3]) / 2) c_0.rotateBy(90, origin = (mid_x_0, mid_y_0)) # contour 1 : otRound c_1 = g[1] mid_x_1 = otRound((c_1.bounds[0] + c_1.bounds[2]) / 2) mid_y_1 = otRound((c_1.bounds[1] + c_1.bounds[3]) / 2) c_1.rotateBy(90, origin = (mid_x_1, mid_y_1)) g.update() I tried when only the rounding the offset position with the default python roundits that seems to be oke... And this will be "fixed" in the next beta/release. The reason why every rounding is with otRoundis to keep a single rounding func for all sort of rounding. This is also the difference between roundin py2 vs py3. @frederik Makes sense to lean toward using one method. Did not know their were changes to roundfrom py2 to py3! Appreciate you looking at this, Frederik!
https://forum.robofont.com/topic/735/rotate-90%C2%BA-seems-to-send-contours-upward/5?lang=en-US
CC-MAIN-2022-27
refinedweb
473
69.58
Simple configuration system based on recursively merging dicts. Project description Zenconf is an unopinionated config management system. You put dicts in, it recursively merges them, then returns a single dict with values from later dicts overwriting values from earlier dicts. A default implementation shows how to pull values from a dictionary of defaults, a config file, environment variables and command line parameters. Simply create your own custom config class and add values from whatever data sources you like in your chosen order of precedence. Then, request the merged dictionary and use it throughout the rest of your code. Features - Simple. Just add dicts (or OrderedDicts) from wherever you like, and get the merged dictionary back. - No constraints on using a particular config file system, arg parser, etc. - Key names can be normalised by applying a function to keys recursively to make for easier comparison between keys from different data sources (e.g. from environment variables or yaml files, where one uses underscores to separate words, the other hyphens). By default keys will be converted to lowercase, have hyphens converted to underscores and then have leading underscores removed. - Support for filtering by, and stripping an app-specific prefix from keys (configurable per data source). This means that if your app is called MYAPP, only environment variables with a prefix of MYAPP_ could be added, e.g. MYAPP_LOG_LEVEL=debug could override a commandline argument –log-level. Installation Clone the repo then run ./setup.py install. Or, install from pypi with: pip install zenconf Run tests with: ./setup.py test Usage Usage is simple. Just instantiate an instance of zenconf.MergedConfig: - The appname parameter can be used to namespace keys (such as environment variables). - The dict_boundary parameter specifies a string that indicates that we should look up the next string fragment in a subdictionary. E.g. using a default of ‘__’, the string LOG__LEVEL refers to config[‘log’][‘level’]. Next, add dicts via the add() method. To get the merged dict, just call get_merged_config(). See comments in the code for more information about parameters. Also see the example in the examples directory of one way to use the class. Project details Release history Release notifications | RSS feed Download files Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
https://pypi.org/project/zenconf/0.1.4/
CC-MAIN-2021-25
refinedweb
385
57.47
IRC log of tagmem on 2003-02-24 Timestamps are in UTC. 20:04:17 [RRSAgent] RRSAgent has joined #tagmem 20:04:23 [C3s] rrsagent, pointer? 20:04:23 [RRSAgent] See 20:05:03 [C3s] zakim, agenda? 20:05:04 [Zakim] I see nothing on the agenda 20:05:35 [DanC] DanC has joined #tagmem 20:06:26 [Zakim] +DanC 20:06:44 [C3s] wondering where the log got to 20:07:11 [TBray] Norm chairs; TBray scribes 20:07:25 [TBray] Feb 17 telcon minutes? 20:07:29 [TBray] Accepted 20:07:32 [TBray] =============================== 20:07:34 [TBray] mods to agenda? 20:08:06 [TBray] accepted 20:08:07 [TBray] =========================== 20:08:19 [TBray] 3 March mtg canceled, 10 March is next meeting 20:08:37 [TBray] ======================= 20:08:40 [DanC] RRSAgent, pointer? 20:08:40 [RRSAgent] See 20:08:46 [TBray] Meeting planning 20:08:58 [TBray] Chris can do alternate Budapest dates 20:09:12 [TBray] put dates in IRC please? 20:09:25 [TBray] Proposed 22, 23, 24 May (2003/02/17) 20:09:43 [TBray] suggest alternate May dates of 22 (All day), 23 (Morning), 24 (Morning). DO, TB, PC, NW, IJ can meet those days. CL not sure yet. 20:09:43 [C3s] agenda 20:10:48 [TBray] DanC: might not be able to make dev-day session 20:11:27 [TBray] Stuart may have trouble with 24th too 20:11:31 [C3s] I can juggle my dev day presentation most likely to avoid a clash 20:12:49 [TBray] No input from TimBL on these dates yet, need to get it 20:13:22 [TBray] Holding May dates open a little longer... 20:13:26 [TBray] ============================= 20:13:38 [TBray] Nov. in Tokyo? 20:13:42 [TBray] Proposed 14-15 Nov Japan, Fri-Sat preceding AC meeting 20:13:52 [Roy] okay by me 20:14:08 [TBray] Need input from DC & TBL 20:14:12 [TBray] DanC: not aware of any conflicts 20:14:22 [TBray] Leave these open, try to close on 10th of March 20:14:27 [timMIT] timMIT has joined #tagmem 20:14:34 [TBray] Keio can host us on those dates 20:14:36 [Chris] we did get confirmation from keio that they could host us 20:14:55 [Norm] timMIT: are you dialing in? 20:15:30 [timMIT] yes, i will. 20:16:07 [Zakim] +TimBL 20:17:37 [DanC] "May dates of 22 (All day), 23 (Morning), 24 (Morning). DO, TB, PC, NW, IJ can meet those days. CL not sure yet." -- 20:18:49 [Chris] but CL is sure now 20:18:57 [TBray] Both questions left open till 10 March. 20:19:59 [TBray] ===================== 20:20:04 [TBray] Tech Plenary presentations? 20:20:11 [TBray] Only NW got his together in time 20:20:32 [TBray] Suggest review Tue evening at dinner in Boston 20:20:40 [Chris] My slides are half done but not on server yet 20:20:48 [TBray] SW: will try to have them done this week 20:20:50 [TBray] CL: half done 20:21:01 [TBray] NW: please before end of week so can look at them before Tue 20:21:12 [Chris] review slides at dinner on Tuesday 20:21:15 [TBray] =========================== 20:21:46 [TBray] Mailing list managemment 20:22:00 [TBray] SW: has action item outstanding to update policy & publish it 20:22:14 [TBray] SW: made an interim intervention, which seems to have helped 20:22:45 [Norm] ack DanC 20:22:46 [Zakim] DanC, you wanted to re metadata thread 20:23:40 [TBray] Dan: post-f2f, we did everything wrong; flameburst following on TimBL's post with TBL on vacaation 20:25:32 [TBray] SW: wait for my action item? 20:27:59 [Chris] we can ask for better quoting discipline; three pages of quoted matter without comment is not acceptable 20:29:17 [TBray] Proposal from someone: ask people not to post more than once per day without reply 20:29:40 [Chris] prefer leading by example to constraining by rules 20:30:17 [TBray] TBray: don't like doing by policy, it's an individual judgement 20:30:54 [TBray] TBray: propose offline intervention with people causing problems 20:31:52 [TBray] Dan: some people are way out into the territory of wasting everyone's time; perhaps a private email to them? 20:33:45 [TBray] Norm: SW will finish action item, and when individuals get out of line, it's appropriate for the chair to intervene 20:34:06 [TBray] DanC: of course this may take days to get to 20:34:21 [TBray] Norm: of course TAG members could send direct email to chair acting for intervention 20:34:30 [TBray] =============================== 20:35:31 [TBray] 20:35:45 [TBray] new issue? Site metadata hook 20:35:46 [Norm] Ian is on vacation today 20:36:20 [Roy] favicon.ico 20:36:53 [TBray] with only 3 thiings, not too bad a prob, but this is a slippery slope 20:36:56 [TBray] q+ 20:36:56 [Chris] reserved urls /robots.txt, /w3c/p3p, /favico 20:37:05 [Roy] q+ 20:37:39 [TBray] TBL reviews points in his posting referenced above 20:37:47 [Chris] guys, stop putting technical discussion in /me 20:39:46 [Norm] ack TBray 20:39:48 [Chris] is the question : given a uri x, how to get metadata about x? 20:40:00 [Chris] or is it given a site s, get metadata? 20:40:22 [timMIT] q+ to define site in the context of this issue proposal only 20:40:47 [Chris] q+ to talk about subsites, tenants, server sharing etc 20:41:56 [Norm] ack roy 20:42:06 [TBray] TBray: 1. support adopting the issue 20:42:26 [Chris] one persons data is another persons metadata 20:42:37 [timMIT] HTTP DNA domain metadata could well include delegation information giving actual notional "sites" 20:42:38 [TBray] TBray 2. web arch currently doesn't have notion of a "site" and to the extent it does it's coupled to host (e.g. robots.tx); so this is new but might be good 20:42:54 [TBray] TBray: recent proposal along same lines from (I think) Roger Costello 20:43:04 [TBray] TBray: TBL said HTTP "tag" meant header 20:43:12 [TBray] Roy: robots.txt isn't necessarily a file 20:43:22 [Norm] q? 20:43:25 [TBray] Roy: this isn't metadata it's just data about a resource 20:43:28 [Chris] any resource is not necessarily a file 20:43:29 [Norm] ack timMIT 20:43:31 [Zakim] timMIT, you wanted to define site in the context of this issue proposal only 20:43:36 [Roy] no, data about a site 20:43:40 [Roy] not a resource 20:43:51 [Chris] ok 20:43:56 [TBray] Roy: we need to manage this whole area of per-site names 20:44:16 [Chris] there is no way to give a URI of a site as opposed to a URI for a welcome page for it 20:44:41 [Chris] hmm... sites are significant resources, no? so they should have URIs..... 20:44:51 [Roy] / 20:45:01 [TBray] TBL on lack of distinction between data/metadata 20:45:12 [TBray] TBL on whole family of interesting metadata you could have about a site 20:45:22 [Norm] q? 20:45:27 [TBray] TBL: need a hook to hang this stuff 20:45:28 [Norm] ack chris 20:45:29 [Zakim] Chris, you wanted to talk about subsites, tenants, server sharing etc 20:45:34 [Roy] q+ 20:45:36 [TBray] No, "/" isn't the site it's the server, they're not the same things 20:46:42 [timMIT] Server isn't a perfect name eitehr ... tends to be a computer. 20:46:48 [TBray] Chris: echoing problem of site/server disconnect, bad architecture to require everyone to write one file 20:47:07 [TBray] Chris: if a Site is an important thing, it should have a URI; right now there's no such thing 20:47:27 [TBray] Chris: per our axiomms 20:48:08 [TBray] Roy: When robots.txt was invented.. (Chris: everyone had their own server) .. the idea was to knock politely on some part of a naming authority's domain 20:48:17 [TBray] Roy: haven't seen a proposal yet with equivalent semantics 20:48:19 [TBray] q+ 20:48:27 [Norm] ack roy 20:48:38 [Chris] it has had excellent expressive power at ultra low implementation cost 20:48:39 [timMIT] q+ to explain to roy where this fits in 20:49:04 [Norm] ack TBray 20:50:11 [Norm] ack timMIT 20:50:13 [Zakim] timMIT, you wanted to explain to roy where this fits in 20:50:19 [TBray] TBray: wants to introduce a new notion called "site" a collection of resources (on one server?) 20:50:41 [TBray] TBray: "Site" has a URI, which could be provided in an HTTP header and an HTML <link> 20:50:49 [TBray] TBray: could contain robotrs policies, RSS feed, all sorts of stuff 20:51:01 [Norm] I can't see how you're going to give site a URI independent of the pages on the site... 20:51:33 [TBray] Roy/TBL: Problem because many sites consider the root URI to be revenue-significant and don't want robots to go there 20:51:51 [timMIT] A head would work 20:51:55 [TBray] Roy: but likes TBL's idea 20:52:01 [timMIT] a HEAD would work. 20:52:11 [TBray] Roy: wants the issue to be tightly circumscribed 20:52:38 [TBray] Roy: i.e. we're just solving /robots.txt (but that cat's out of the bag) or more generally, algorithm for determining appropriate metadata for a site 20:52:51 [TBray] TBL: but doesn't like metadata/data distinction 20:53:06 [TBray] TBL: how would we design robots.txt if we were doing it now or ina couple years 20:53:56 [TBray] Bray: propose we accept SiteData-NN 20:53:58 [timMIT] SiteData-$int(ian++) 20:54:06 [TBray] Chris: does that include defining notion of a site? 20:54:08 [TBray] Bray: yes 20:54:15 [TBray] Roy: rather empower authors to define their own site 20:54:27 [TBray] Roy: rather than define for them what it is 20:54:32 [Chris] q+ to clarify 20:54:45 [Norm] ack DanC 20:54:46 [Zakim] DanC, you wanted to support the issue as proposed in Proposed issue: site metadata hook 20:54:48 [Norm] ack Chris 20:54:49 [Zakim] Chris, you wanted to clarify 20:55:07 [Stuart] Just found "What if I can't make a /robots.txt file?" at 20:55:14 [TBray] Chris just wants to make sure we don't leave undefined terms like "site" hanging 20:55:23 [TBray] Roy: can we define it reflectively 20:55:24 [Norm] q? 20:55:28 [TBray] TBray doesn't understand Roy 20:55:33 [Roy] aww 20:55:34 [TBray] Norm: any objection? 20:55:45 [TBray] Resolved: accept issue 20:55:53 [TBray] Chris: owner? 20:55:59 [Roy] all resources on "site" point to same "site URI" 20:56:08 [TBray] what roy said 20:56:49 [TBray] Issue owner: TBL 20:57:04 [TBray] Action item: proposal to close it 20:57:12 [TBray] TBL: not till after discussion 20:57:26 [Stuart] q+ 20:57:30 [TBray] q+ 20:57:43 [Norm] ack Stuart 20:58:00 [Roy] next number is 36 20:58:01 [TBray] I think this is SiteData-36 20:59:06 [Norm] q? 20:59:10 [Norm] ack tbray 20:59:56 [TBray] Action: TBL to summarize discussion & recast issue 21:00:01 [TBray] Action: TBray to post a strawman proposal 21:00:09 [TBray] Actions accepted 21:00:12 [TBray] =========================================== 21:01:26 [TBray] Paul: issue raised in respect to WSDL 21:01:42 [TBray] In regards their email Feb. 3rd 21:02:00 [TBray] This is regards to our issue #6 21:02:12 [TBray] Dan; Still have an outstanding action 21:02:17 [DanC] 4. rdfmsQnameUriMapping-6 affects WSDL too (score: 117) (2,068 bytes) 21:02:17 [DanC] Author: Dan Connolly <connolly@w3.org>, Date: 25 Nov 2002 12:26:15 -0600 List: Public/www-tag 21:02:23 [DanC];list=www-tag 21:03:06 [TBray] Paul: let's make sure this gets on our March 10 agenda 21:03:19 [TBray] ==================================== 21:04:37 [TBray] Deeplinking-25: Done 21:04:41 [TBray] ======================== 21:06:56 [Norm] ack DanC 21:07:11 [TBray] NamespaceDocument-8 21:07:29 [TBray] Bray: proposal: 21:07:41 [TBray] Very minimal, see exegesis in my covering email 21:07:51 [TBray] Dan: this isn't XHTML, they own the syntax (Chris doesn't agree) 21:07:52 [Norm] q+ 21:08:00 [Norm] ack norm 21:08:13 [TBray] Dan: would prefer a custom XML or RDF language, but not enough to object; would abstain 21:08:42 [TBray] Norm: you really think that HTML-WG has to approve any attributes in any namespaces 21:08:45 [TBray] Dan: yes 21:08:52 [TBray] Chris: flabbergasted 21:08:59 [Norm] I'm a bit flabbergasted as well 21:09:05 [TBray] Dan: doesn't like it but thinks that's the way it is 21:09:19 [Chris] Actually to clarify - they DO own the syntax, no argument; the syntax of the HTML namespace. Attributes in other namespaces they do not own and this was what I objected to in Dan's statement 21:09:38 [TBray] Bray: what about modularization 21:09:43 [TBray] Dan: then you have to change the DOCTYPE 21:09:49 [TBray] Chris: if you want it to be valid 21:10:00 [Chris] if you want it to be valid you would need to change the doctype and write a driver dtsd for it etc 21:10:03 [TBray] Bray: Granted 21:10:40 [Chris] q+ to correct TimB 21:10:48 [DanC] chris, there aren't any XHTML documents that aren't valid XML, are there? 21:10:53 [Norm] ack chris 21:10:54 [Zakim] Chris, you wanted to correct TimB 21:11:05 [TBray] Bray: not sure what the correct term is 21:11:13 [TBray] Chris: It's an XHTML-family doc, which is a defined term in the XHTML spec 21:11:29 [TBray] Bray: in technical terms, it's XHTML + 2 attributes, which is easy to understand and implement 21:11:38 [timMIT] q+ to express the concern that teh semantics are notwell defined in rddl 21:11:40 [timMIT] 3 21:12:09 [TBray] Norm: want to change proposal? 21:12:11 [TBray] Bray: no 21:12:18 [Stuart] q? 21:12:20 [TBray] Dan: does proposal want to change DOCTYPE 21:12:23 [Norm] ack timMIT 21:12:24 [Zakim] timMIT, you wanted to express the concern that teh semantics are notwell defined in rddl 21:12:25 [TBray] Bray: silent on that subject 21:12:30 [TBray] Paul: we're open to suggestions 21:12:46 [Chris] got it 21:12:47 [Chris] 21:13:08 [TBray] TBL: covering letter said RDF wouldn't give semweb people what they wanted; ? 21:13:45 [DanC] thx, chris. that's new to me. but it does involve changing the doctype... "A conforming XHTML family document is a valid instance" 21:13:47 [TBray] TBL: suggests that RDDL semantics be given in RDF terms, as classes & properties 21:15:16 [Norm] q? 21:15:25 [timMIT] 1. The cover note suggets the RDDL document does not meet its SWeb goals. In what way? 21:17:12 [TBray] Bray: Various RDF instantiations either fail to capture the linkage to the namespace as a resource, or are really complex 21:17:34 [TBray] Bray: prepared to believe that RDF-defined semantics are a agood idea, who's going to write it down? 21:17:46 [TBray] Dan: I would, but I wouldn't use XHTML, I'd use RDf anyhow 21:18:08 [Norm] q+ 21:18:13 [TBray] TBL: if introducing a thing called "nature", if you make it an RDF Class then that explains it to a lot of people and you don't need to say anything more 21:18:14 [Norm] PC+ 21:18:18 [Norm] q+ PaulC 21:18:27 [Norm] ack Norm 21:18:37 [TBray] q+ to say that I don't know what an RDF class is 21:18:51 [TBray] Norm: proposal could be left alone and people who wanted to do the RDF definition could do so 21:18:59 [Norm] ack PaulC 21:19:00 [TBray] TBL: no, interoperability suffers 21:19:17 [TBray] Paul: pushing back on Dan's thesis that we should use RDF 21:19:24 [TBray] Paul: we agreed that NS doc should be human readable 21:19:41 [TBray] Paul: and there were other issues with regards to using RDF in XML 21:20:11 [TBray] Dan: RDF can be as human-readable as you like 21:20:16 [TBray] Dan: consumer is a machine not a human 21:20:21 [TBray] Paul: disagrees strongly 21:20:40 [TBray] Paul: we have two objectives, hard to achieve both 21:20:52 [Norm] q? 21:20:56 [Norm] ack tbray 21:20:57 [Zakim] TBray, you wanted to say that I don't know what an RDF class is 21:22:33 [TBray] TBray: can we publish a XSLT or other code that would process a minimal-RDDL and emit the RDF that you'd like to see? 21:22:51 [TBray] Chris: user-agents, given XML & a stylesheet, typically don't work 21:23:05 [timMIT] q+ to wade into this one 21:23:05 [Norm] ack danc 21:23:07 [Zakim] DanC, you wanted to ask for a use case to focus on 21:23:11 [Norm] q+ PaulC 21:25:55 [TBray] Bray: Consider WordML; human perl programmer could dereference namespace name to figure it out 21:26:47 [DanC] ok, thanks for the use case. 21:26:54 [Norm] ack timMIT 21:26:56 [Zakim] timMIT, you wanted to wade into this one 21:26:58 [TBray] Bray: Also the desperate perl hacker could dispatch to code via RDDL to generate postscript etc 21:27:12 [TBray] Dan: but that's hard, subtle, hard to believe, given the experience of MIME dispatching 21:27:35 [TBray] TBL: agree that it's usable to have both; 21:27:49 [DanC] would people please stop saying "we've agreed to X"? I'm quite confident we have resolved *nothing* anywhere near this issue. 21:27:53 [TBray] TBL: consider high-volume applicatios, apps hitting this thousands of times a second, the architecture has to support this 21:28:27 [Norm] I'm not sure I agree it's infrequent... 21:28:31 [TBray] TBL: use case only appeals to fairly infrequent access 21:29:38 [TBray] TBL: If it doesn't have well-defined semantics people won't use it. Dan & I would both put RDF there. 21:29:49 [Norm] ack paulc 21:30:11 [Roy] scenario: human wants info about namespace (I don't care about automation here) 21:30:24 [timMIT] ?RDDL_based? 21:30:37 [TBray] Paul: perplexed how to handle at technical plenary, this has been going on for a long time and he hasn't seen statements from TBL, DC in public that non-RDF was unacceptable 21:30:43 [Chris] wondering about proposing reserved paths nsURI/rdf/ and nsURI/schema and so forth 21:31:13 [TBray] Dan: not saying "has to be RDF" - he's saying he would prefer RDF & would abstain on this proposal 21:33:02 [timMIT] I don't know what Paul meant by "RDDL-based" of all these various proposals for RDDL 21:35:21 [TBray] ... discussion of technial minutiae of how to make it valid, with DOCTYPE wrangling and so on ... 21:35:37 [Zakim] -Tim_Bray 21:35:38 [Zakim] -PaulC 21:35:39 [Zakim] -Norm 21:35:40 [Roy] Roy has left #tagmem 21:35:42 [Zakim] -Roy 21:35:42 [Zakim] -Stuart 21:35:43 [Zakim] -TimBL 21:35:52 [Zakim] -DanC 21:35:53 [Zakim] -Chris 21:35:54 [Zakim] TAG_Weekly()2:30PM has ended 21:36:07 [Chris] rrsagent, pointer? 21:36:07 [RRSAgent] See 21:36:20 [Chris] rrsagent, stop
http://www.w3.org/2003/02/24-tagmem-irc.html
CC-MAIN-2016-22
refinedweb
3,448
62.45
Odoo Help This community is for beginners and experts willing to share their Odoo knowledge. It's not a forum to discuss ideas, but a knowledge base of questions and their answers. How to authenticate user while taking database backup using XMLRPC? Hello Everyone, I have sample script which take dump backup using XMLRPC, This script works well with intra-network(Internal network), but having Access denied Error while applying on inter-network. Here is my script ------------------------ import base64 import xmlrpclib sock = xmlrpclib.ServerProxy('') #Real public IP all_database = sock.list() for database in all_database: file_path = "/home/serpentcs/backup/" #Give path of folder where backup file will be store file_path += database file_path += ".dump" backup_db_file = open(file_path, 'wb') backup_db_file.write(base64.b64decode(sock.dump('admin', database))) #admin is master password in my case backup_db_file.close() ------------------------ Does anybody has idea about this? help will be appreciated. Thanks & Regards, Anil. Hey, Try "Port Forwarding" on client server. 192.168.1.13 - is your private IP address on the LAN. That might be a case of IP change. contact your system admin and tell them to forward port. Very good article with pictures is here: How to Forward Ports on Your Router. You don't understand my question, I don't have problem with IP address, in example i have just added dummy IP, using that example with Public IP have authentication problem. @Openies : Thanks for the best link of IP forwarding, In I am using the Public IP, for the security reason I can not display on example that why I have just add sample IP. Just try this script with your any of your live server and see what is the problem I am facing. Hello Anil, I think problem is due to private IP. Private IP is only access within local area network. So try after make your IP as public IP. May be this will helpful you. Thanks. Shamji. @Shyam : The IP I am using for execute this script is already public static IP. its need some authentication to access that system. Which is accessible via inter network world from browser. Its not public. I cant access. @shyam: I appreciate your answer, But I don't have any problem regarding IP address. You don't understand my question properly. Read twice and Anil, Have you solved this?
https://www.odoo.com/forum/help-1/question/how-to-authenticate-user-while-taking-database-backup-using-xmlrpc-83690
CC-MAIN-2016-50
refinedweb
386
68.47
: August114 Related Items Related Items: Florida union (Jacksonville, Fla. : Semiweekly) Related Items: Jacksonville tri-weekly union Succeeded by: Weekly Florida union Full Text : -. - a -;- _ - - a -- .. .. .. ,, r.. ._ ----_ - -_ -.- - p __ r .. .. - : .1 tVt : TIII WEEKLY t/NIOX. TERMS iXO rf4 rUDLISUED EVERY riIuIAY.I 1 ecopyeneYrflt..4 QTJBSO2U33E s .. 'j.o....,.,. tit* .. .. nJt months..... ....... *.......... liT hE 1n4* 4 three month.......,......... ..... IM DVTAD. J& C1IEX' n : S lnideetpy.--_ ....TOADVSRTMElWs........... ..... ............. Mfl ,tno* XP PtL-JI. Insertion.n . One uroAro, flrrt 0 ( nI.mNI.wl l1U4l1J l#e ( hlrfrEI =::::: U N mouth.... .ire I. r" three month*...... _...se t._... 700 OFFICE : __ S. ,S .1* ...... ; .__... ito ----- -- : a. I. on.yn'..... ...fl..fl.. 100* UNION BUILDING, BAY STREET, FLORIDA : : :: : :::_ : : VOLUME o. JACKSONVILLE. THURSDAY, AUGUS11 1868., NUMBER""S8meiit J.ksoRrtUe. J1. 4q5Aat 1' XQCLT t ai Lixta orTKUCOflApmc xoxrazzh rs _ -- - ---- tDCR1flEfl.M.ud.WeekIr of rosourccs and increase of )> ,wcr to the 1 THE NATION'S PBAYES.Jllif FLORIDA LEGISLATURE of public instru ti n. anf those inr the neighboring State, and whoso 7 9TOIJCA&T.1VfthlnjtoB . TO nation, the asylnm of the oppressed all nations Xcw An act to organize the county courts' the services could bo, availed of hi' Florida,. aic , Uii1o. folio*ine IHM-III. wiilU-n t'ya youiiitUdyof several counties of the and thought,to-be adequate to Hews.L . .Btatc, to prescribetho suppress any insurrection - should l be footcrtxl and encouraged by a Turk br a >tiliiv-MTVic<*, first appcaro! In tlio New SENATK.MONDAY - whlcl hlW just literal and policy.Twelfth. York I'ott AugiiaiS, 1S1'4.( It* words seem prophetic, mode of Practice of said courts. \ against the government of said Stale, or political carnpan just 3 \\asHUtON 3. S the August 18G8. August )tnj. During the UNION as a wtni- This Convention declares its in MOW ot the coming ckiti n of Ocm-rnl Oraut a the An act to raiso additional revenue 'for tho any combination designed to frustrate the execntion crotarf cio.ea, e hii pWished I bym- next 1'n-ci.icnt :] The Senate met pursuant to adjournment, the State. of Iho laws ot the United'Statea therein. > has 'wucdanordar to toa.hotds.of his .wseklY, sending the With extra this issue week gratuitously gratuitous to struggling pathy with for all their the opprcsMxl rights.) jteoplo which aio Father to Thy throm-aionfls'r, President pro tern in the.chair. | Senate bill, No. 81, was taken up and finally The troops are ready I" ,av't. >f IVont.l .- -,, Dtpnrtmcnt to classify attention the clerks according totuir 'ntion' IT to Tht-v: 1Mr ;) c.ipouty anal to business, with a 0.ibscrbeT. List the > ]>raj A quorum prc-sent. I passed. by tho Governor uiu 3U.Uure of Flo- ends. but, as many of ,mr friend, The following rcolnions were offerwl by With their heart nn Several of f committees rucchod.A ida is in which it would - were ba leave introduced bill one lawful pibtictiOft tontifluo the *emi-weckly% wo General Carl JSchurx, and adopted an pint of the < reports Knight, on a to bo for the h&ye urg U3 tO verbal mcssugc from the Governor announced entitled an act to relievo Garnishees, which was President to employ thi* military force of the by which we can foi ogoing plat form: St. Marie has at last received his ten thousand baie m4 atTfl' ;r Wo have sulJirc, O our Father, his signature to the following Senate bills : read the first, second, and third times,, under a United States. subscribers with either a weekly Jtrnolcal, That we highly commund the spirit In the cau'o, Liberty ; dollars for betraying Sarratt, and is off for mohte or grent An act to permanently locate the county silo suspension ot the rules, and passed. (Cs'S"c'Ji) J- M. Se-iioiittu, chooc.rh. forbearance with which Thro for or both, ae they may of magnanimity and Now we conic to nuwtir ( Kurope.WASUIXOTOX. for other . of Suwanmu county, and purposes.An Several nominations were received from the . or a SBJH-WEEXI.T UNION will be issued the men whp h havn served in the rebellion, but tJDtRATV3CTOkT'.icant I S4>crefary of War. August 3,-Gen. Howard, ol : net relating to jurors. Governor, and tho Senate went into executive * A . Wednesday and Saturday morning, as at now frankly and honestly co-operate with us in chairs nrc mVnnant our loudo1ih., An act to provide for the organization and session. (See Appointments.) i true coj-j; thy Frecdmcn's Bureaustarted South this after. vory ?3.50 annum. the of this and recon hoard each day wt iw. C. Ii. Caise. Private Bccrctarj- visit Subscription price per restoring ;jw.ieo country goutmncnt of the Supreme Court. On Motion the Senate adjouined.ASSEMBLY. neon to the principal bureau stations and , prcflt UKWX will Iw issnod everyThdsY' the Southern Si-\to governments upon Th.it in nnguiith oftru whij'er| make to wind the The VVcwttr structing Ui.n-OuA>T-VICTORY : Afcsombly bill Xo. 91 was taken up, read boc- p _ Wait Dar.unmzx-r, preparations up concern by Snbwription $2.50 per an- the basis of impartial justice and equal lights, cud and third times, under suspension of tho Vudtintoncity, July 30. 18G8. J Janntiry. arc received bacluto the communion ot tho Father, ni-ver lot l>.mc tiailor* The Secretary of the Treasury has decided to "" tako the of the In Han land of br.-i.' nn the removal who now and we favor receive no more applications for . subscriber !, loyal people Vrfcthips If any of our ; oVr tbowj n hotc lu-.irtii Lire s j me bills Nos. 3, 20 and 75 wero read MONDAY, August 3d, 18C8. of your letter of.tho 23 inst., inclosing ofa Uke semi-weekly instead, disqualifications and restrictions imposed upon copy On the subject of the placing of General Banks desire to -UHANT VICTORY tint thud time and passed.Tho joint resolution e-f tic The met lo of Florida eck1y, Assembly pursuant adjournment Legislature X the email difference in the eub- the late rebels in the same measure is their bill introduced Mr in the Russian Mission as an fd ielervm. vie* pay following was by that the United States they can their names transferred accordingly spirit of loyalty will direct, and also may be Thus lo 1 1iecuiir prayvr it riuiia A quorum present.Sc asking Arsenal at Chat- Cassius 31. Clay, is hourly discussed at th bavs and rend first and nd * pcripflOfl, and Tbu we humbly come to Thev, Mobley, on leave tec \cral mrss'ages were received from the Senale. tahooeheo bo conveyed to the State, for the purpose - consistent with the safety of the loyal |>eople.Rffolrcrl White honso. Mr. Evarts! the General A-.kintr Tint- in broken acccntution" -- limes by title, under suspension of rules : of a State Pe-nitentiary, and to inform Attorney the semi-weekly UNION That we rccognizo the right princi < VICTOR you !, is howcter, and the President has make , BAKT away We ha1l aim to An act prescribing, on the part of this Stale, His Excellency the Governor, informed the that this department is not empowered to grant worthy of the pies laid down in tho immoitnl Pit-laration of decided to await his opinion on such dUcat commercial newspaper Electors of President Itit. if TIHIII wouM-it IOIII-.T lutcn,, the manner of appointing Assembly that ho had approved and signed the cither of said requests of Jack*)nvll as proved business prospects Independence Wi-'ll submit our all to Thco, and Viee-l'n-eideiit of the Uuilcd Slalw. following": Application should therefore be made j.Congrott any steps.The A. improving condition of our Slate, and shall go\eminent, and wo hail with gladni-ss Knowmit that in Hi Rtxxl vlc' MUi.xl Considerable skirmishing ensued and thy bill Assembly bill, an act making the Scrip issued which alone has any authority in the Revenue' receipts amount to over on* and in its publication neI&r7 effort tuwaid making thuw luiuciples' a ( iII print u< \ictr.r3IIien prom ahalfnV l ..3.WASHIXOTOX. every to its third icadijag. to labor or expense finally passed by tho Constitutional Convention receivable for ises. ipsr the requirement of our reading, jiving reality on every inch of American soil.I Senate took till four August 4. The Indian ''Durban - to meet w ln.-n tbi* ilruad drift u ovvi, On motion, tho a recess all dues. Very rep and working public. The weekly And lie Jny of JH-HCC wu tee."r o'clock r. M. J. received a dispatch this morning (tea An act for the regulation of Pilots and Pilot ( ) M. Scne.....:., I'Sait will contain all matter of importance or I The Scuopcriioiip; Grn| e. \\ liail krep our and country's wiitcbwoi t <::0(1 anij Urant VitotyPeriodicals. age ft-ars Indian disturbances. : tarcst published in the semiweekly.Oar united with i We arc glad fc> soc that this delirious fruit i iI is I1. M. Joint Resolution of the legislature of the To Hit Excellency the Governor of 'Iorida, Commissioners the _ of Central very low advertising rates, egining to attract attention at tho .South.i .- Senate bills Xos. 80, 2C, and 7-3 was taken up State of Florida, requesting the Senators and 'l'altahassee, Pacific Railroad our Urge circulation, (the largest in tho Male,) i It is detained, add very largely to the losonr- lead third t time and passed. Hepicoontatives of Florida, in Congress of the A true copy. (;. U. Cane1'riv.. Sec. report a section of 20 miles, terminating _ the host advertising me- TIM: AII.VNTII; MONTHLY, for August, appears and 178 miles from the initial point at Sacramento, the UKIOS very 1 Asw'inbly bill Xo. 02 was taken on mskei is Eastern up United States to the enactment Congress cots ot that enctjjn. Its native country procure by WhUh _ diem which) our merchants can select North Car-Una, and was first brought to with is! usual variety of good reading.eVjll mulion, thoolo by which it jiaw-ed to its third of a statute exempting curtain property in wore rood, and oidtred spread on the in good working order. journal. A convention of colored citizens of the border I May 23, 1868. notice by Col. James Illount, why found it the Coming Man Drink Wino," by James Par- reading was reconsidered. the Stato of Florida from forced sale, under proof { (On motion i ii amended follows ; Senate rc-solutiou Xo. 21, to adopt seal for States was hold at Balimoro to day. wild tho banks of the was as (1'85 the United States courls.OllUF.R a on Suuppcrnong of alcoholic | growing Ion, i is a protest againt>t tho iibc The revenue receipts today 1746,000.Th . him and the State read were firbt word The Cash System.1he River. Il has since been widely distribiitml Strike out in section 2-5 tho was second and third times, or THE DAI.Sunatu all the world the South. It is said to admirably stimulant! except)(, perhaps, in cases of consumption. inseij the words a justice of the peace or county under a suspension of the rules, and passed. International Commercial Convention experience orncwspapcrs, throughout grow bill Xo. 4o, lo entitled an act to incorporate Senate bill Xo. nut at Portland, Maine, to-day. Over two sketch bO to bo entitled is IJcefs to the necessity oi adopting and in Arkansas. In iU native State, jt is "On( the an intent-ting judge. an act over, has proved Tho bill then lead the second and third Apalachicola Channel Company, provide fur tho incorporation of benevolent and hundred delegates were prevent. After organizing been T. of w.is have the "cash system. \Vc considered to attain its full jmrfoction only in by ( ol. Wilder, formally of I'd! U. S. C. , ,4hering to read first time rule suspended read the the Convention Jill this after- was adjourned and chairilaulo socitios read office as the counties. times, und-'r u t usiiont ion of Iho rules, pasbud. first time, rule suspend this of tho L'onnoiseurs compelled to resort to it, in tho low grounds eastern wanderings in thu Archipelago around Key second and third times, and passed. ed, read second and third times, and passed. noon. only means of self-protection. all cash exMOSOS. I insist in the that its flavor has of decidedly Kaleigh and dctcrioratod \V 2 t. This jMjjMil.tr muga/ine i is for sale by On motion, tlio Senate went into exer.utive Xo. 90. A bill to be entitled an act lo provide Senate bill, No. 20, to bo entitled an act to Thaddeua Stevens is seriously ill in this I>city. The expenses of a newspaper are ncigboihood Columbus lrew.JlA1t1IItb for the payment of the Mcmbeis, Officers, and incorporate the St. Johns and Halifax WASHINGTON, August 5, Thad. Stevens' _ work Navigation diminish in delicacy M Slull. - be ptid of that it continues to Printers must every west Atlachecs of Iho present legislature, and for and condition is not considered critical. reeeived from the Govcinor Improvement rules credit. 1 a1 A iiu'asago was Company, suspended - irive We ourselves have associations no and *rci D5 v. 4DiUfi J -*i*ri with o.- all tho i productiveness. tho l.illn MAUVKIMfor August, tomes lo us asking the Senate to rescind its confirmation of other purposes, was read first time, rule suspended. read! first, v..md and third times, and pas- The receipts from internal revenue to-day per is a "cash article So pnncij j it growing in gardens among outlying with mote than its nsuil number of interesting W. T. Du\al to bo county judge of Wakulla read the second ar.d third tines, and passed. pen were seven hunderod and thirty-seven thousand incurred in "running aMMpaper. of the east Hank of the Blue Kidgc, at an ele.\- pal items of"the expense in this matter hundred thousand feet above KiliclrK. Tho contiriualion of Mr. hqiiire's illustrated county ; which was so rescinded, and the name Xo. 91. A bill to be entitled an act to pro Senate bill, Xo. 40, lo be entitled an act lo dollars.A . credit j tion of eight or a The system vido for correct list of the Owners of Heal Democratic conference at New York Governor.C. a provide for the Digest of tho Laws of that City l be returned tho State about tIm Ando of to 11 sitmed entitled there is no reciprocity its native home on tidi water. to us hcrics, Among works all one way ; B. King was confirmed as assessor of laxis property in the several counties of this State, of Florida, was read first time, rule suspended, indicates that Hoffman will bo the Democratic F it. is to bo living there upon its eastern reputation.It Peru and Bolivia, gives intciesting details of the for Columbia county. > was read first time, rule suspended, read the second rend hee' nd and third times, and passed. candidate for G'ircthor-hc is Tammai'gStevenson's The only way to carry There out such can a then system be no grows usually from a strong Instances stock, and cited its manners, bcencry and antiquities of a part of Iho (On motion, the doors wire oi cned, and IhuS. and third times, and passed.On Oa motion, the Assembly took a recess until favorite. it are from branches spro-id widely. asTer to deviate very motion, the Assembly took a recess until 8 o'clock majority fur the Kentucky Governorship said to-night. world but little know Thet-amo bo :natc adjouined. to one ; nor auy exception of a single old vine coveting hall an acre, may offence given any Senate umul iU Kbsion at S! o'clock i o'clock this afternoon. The Assembly resumed its session at 8 o'clock will exceed fifty thousand. The In this office, r > by any reasonable man, though these statements are certainly exagger of tho article John Hull in Abyiwitiia. For sale The Assembly resumed its pessi-.u at 1 o'clockP. r. M. The General of the armies has recommended issued and anRomnnhlt it bears I.. )L. is that iLordingly, 01 dors have been ated. Tho general impression by Columbus Drew. it!., a present.Tho Senate bill tiLe remission of the remainder of the sentences Xo. been made that no subscip- and cannot be cut back or train Oa motion, Senalo bill Xos. 23, 37, and 51 quorum il, to be entitled an act regulating - badly, has pruning committee whom referred bill and the release from of all and advertisement mtrrted. It is commonly IIAItJ'Ltn't.ViEK i.r well EUElains its regulation was taken on their third reading, under at1,1L5jrn lo -was a Ihe fees of ofiicers, was read the first imprisonment persons received no ed in trellises to advantage. , lioa will bo and entitled "an act to raise additional revenue for time rule now in confinement under sentences of "I tin tiles read the third time suspended, on motion read the second for in advance. allowed to and its arbor is extended as the of iK'ing the best ielorial in the : " paid grow iiaper union the Stato, beg to report they have duly con time by sections and amended rule militaiy commissions organized under the reconstruction of rtguhr suspended, The only exception is in the case branches spread from the central stalk. country. Wilkie Collins' Moonstone, which sidered.the same, and recommend that it pass read third time and passed. actt of Congress in the States in As legardsthaoe. advertisers would ha.ing be inconvenient monthly bills.and almost impracticable from Tho five bunches to ten berries areery each small The grapes, containing t hem- appears in iU columns from week lo week, is 'Ii L.I'.%S August 1, 18GS. with tho following amendments, viz : After Senate bill, Xo. 32, to bo entitled an act to which said acts have ccaied to be operative. it of ad vcrtiiwncnt size of color of the most inlercsling and thrilling of twelve having passed words "upon each commission as a County fund the outstanding debts of the Stale read The public debt statement will be issued on _ to require payment every solves are of large a pile green one productions The hour midnight, Treasurer, County Surveyor, Superintendent of first time into as handed in.Vith regard to occa- dotted with dusky orange spot*, reminding one of that powerful writer. For bale by the Senate bills Xos. 83 and 82 was taken up on Common Schools, County Commissioners, and a third time, and suspended, read the second and Sat unlay. The intimation however,there is no exception of certain birds The skin is quite tough, motion, road the third lime, and passed.On parsed. Treasury department qives no lional advertisew, ejrgs. Hoed & Malhcr at the Post Office.Kvhitv ) Justice of tim Peace, on third of the lit make till page Senate bill, Xo. 8-3, to bo entitled an act to of what the debt statement will show. It is to and ten It.would be invidious any, so that the fruit bears handling transportation motion, the Senate adjourned " made. section strike out the words $3.OO, and insert while by adhering to a uniform system, wo very well. They aro juicy, sweet, and of tSAicnuv\.-This entertaining fc.;iial (/clock this .\. M.The "t.OO., After words all other revise an ordinance of the Constitutional Con stated its promulgation is delayed on acccunt of _ "upon commiosions entitled I INgw lEan vention, an ordinance to inquire into the serious errors in its computations. who is avoid riving any occasion complaint the most delicious flavor. To any one continues lo reach us. The current number !Senate nn-t jiuisuant to adjournment, the uot above enumerated," strikeout the condition ot the Union Bank of Florida is refused it is not his first of the was YOKK, August 5.-Mr. Seymour has subscription fond of taste Scuppernong ' advartisftwent or really grapes I'nhident Inn in the chair. words "f J.OO and insert ?1.00. and Authority mo , contains fourth time on Anarchy read first rules a paper suspended read second and offerer written letter the nomination the existence. formally accepting in his by is gastronomic doubt of its payment an era from say On motion, Senate bill Xo. 81 was taken up, GFOKGK P. HAXKY, third time and the necessity of making tbo rule absolutely Most prefer their flavor to that of any by Mathcw Arnold, who may bo called paused. for President by that Democratic Convention. but from persons cad !hiid t tiinu and after some skirmishing pas- [ Chairman Select Committee. b'cnatc resolution No..23 joint the uniform.-JW/ife JUyuUr. other grapes. Besides the variety which weharejwt the lejucbCiilativo man among wrileisof the directing He says it was ur.soughtandwexpctd, bed.A Which was read, and the amendments proposed Secretary of State to investigate the printing but he the article has been pretty expensively described and which is now generally 18th was caught up by overwhelming The above liresent da". Tho coming oc Ii jibe, o.i the was lecehed from the Governor, incfctiagu committee The bill read b 11 of & adopted. was Dke Sparhawk read first time by was tide which is the '* to our l others tearing on a reat the "cash system" adopted by known there arc said to >o two one country . eopted exchanges.and We cannot more forcibly explain black ,and ono gulden colored. The former of August, is the subject of an inlcusling ailielc. Senate hrongli that his ho private had signed secretary Senate, informing bill To the incoipoiato the second time, rule suspended, read the third ruo: suspended, read the second time. political change and he finds himself nnablt to the arti- For sale Keod 4: Mather at the Post lime, and parsed. Mr. Scott moved ID amend by inserting the eist its The resolutions the principle involved than by copying ripens later than the vatioty wo have described by I tho Jark onvillo and St. A tigustinel.tlrti.1 r' pressure, adopted by the Senate of W. II. Several hills received from of were name Christy DuvaUounty. which fie Convention accord with his view lie delayed it moot the necessities of our case and makes a darker colored wino, om.-c. aU; and as Co'iipiiny which were trad and the bills ordered onrolted.I was not agreed to, resolution read third time formal until the it does that of the KtgMcr, we It is of the most productive of grajics.A .- Senatel.ill a acceptance adjourn- nils as fully as one Thf (OIIIlIIitlt't I lo i whom was relcncd RUle Scott without notice and and rigidly ,enforce vino will produce.froai 20 to 50 bubh- | suspended- pasml. n cit r>f Congress for the purpose ef seeing what sh.fl also adopt the syBtcm, tingle II AILTEIts l.rn1fr) III. Fioiui\, Xo. GO) IH- I.MXC to n-portlhc followingas t.tjazt tillered resolution concerning teachers of Senate bill Xo. 81 to bo entitled j joint act to I an l; its action would throw the interests condition of affairs, doing cia of truit. NVc have coon it stated that theie boidoptcd ;/ft upon ?ft. IB the prasent JACKVJNVIM.V:, Fi.\, Auiju1tli) 180fJujrju a {"tibstitulc-. They ho.p| thai substitute will frccdmen's schools during the year 18GS; which effectually pro\ido for good order of society and Reviws the of work on credit is almost equivalent fci doing itfor is a vine near Mobile which produces 40 buahclt (;l,.-.1L.L ( ; .-, Ko. 13.I. : as th" adoption of Iho, substitute will read the first time rule suspend read the to diiordrrly conduct real List 0 the country. course Congress was snppioss was 11 the condition of the Bquth, Peraoa- nothing; and hereafter all subscriptions to >, bringing. itsov\ncr over $300. A writer I I. la compliance with inructions! tmin M.ljor s.i\c fevnal lh'iu' :'iiid ilcill.us, :and will meet Ihow.illin third times and time rules road a present ond and passed.Uulu second time. suspended, Mr. and all Cultivator PP< ( i jy the Presidential ofiico has ho attractions for and advertisements in the VMOH, Job i from Aikansa in the Southern General Ale'ad'1. I'omanding Duji.irtmcnt) ot ol I Ilu Sl.iie. a , ; ; Mr. Cruce offered memorial Mckinnon offaied the in this establishment, must l>e 'WPUIforui. of vine in hi* neighboihood, 20 years ; suspended, a following amendment ; ii ita. During the war ho had given sixteen work dune t-peakH a the Svutl, the 7th Unitud SUiU-.x Infantry, on C. K. Moiti i.v; to Congress asking for a mail route front Madison To strike out "one hundred dollars and insert fbi usand commissions to officers of the of which Uurs from 20 to 30 bushels iuirually. I I army, ago,. The productiveness increases with the duty in this District, will be concentrated as Jh.iii m.t'.i < 'ummiitrt: on Code of Practice. Court House lo l'erryville, in Taylor county fifty," strike (put '.no thousand dollars and insert a: >l ho knew that they demanded the Union follows ; to which points tho respective Companies The bulihtitiilc was adopted, read second and ; which was read first lime, rule suspended, live hundred," in Sittion 2 strike out the :3 thty: fought for. The largest meeting of these . Republican ago flouri ot the vine fofa, and hundied as they are ,very the long-lived man who will proceed and take post wilhont d\j- Ihiid tinu- undi-r a suspciibiori of tho iulc, andSenate lead Iho socond and third times, and pajscd.On last lines, and adcd the follow ing,}"or as an allernalivo g< t'ant soldiers ever hold endorsed the action The National Ilepublican iaz-tyuf the United >hing them adds largely to years the future value of lay, viI'Ie i/ tt. ( ) motion, the Assembly adjourned until tomorrow he shall bo imprisoned not longer than o' *hc Convention. He does not doubt a triunv* Bute assembled in National Convention in the plants A bushel of give three gallons lIcHdquailetsof"( thcKemcnJ" with Companies ; ; ) j j'iiut ii-v.luii.jn, Xo. 'JiJ, was taken up morning 10 o'clock. twelve months," which was adopted. Kule suspended p i which will brini;back peace and prosperity city of Chicago on the 20th of May, 186S, make his estate. It is grapes hardy in its native climate "I), and "11, *l Fort Marion St. icad thud tune, and parsed, with Ihe following : the bill load the third time and passed. to i.r land, and give once more the blessings ofjuict' vrry . of : A ugwttino.Comitanies 0 0. i'tEsIAaAugust 4th, 18G8. On motion, the Assembly adjourned until ten declaration principle wise the following neither to rot nor to mil vote, jous ; iiajs < i a rulijTOus and honest government being subject "D 1 "C : and First We congratulate tho couatry on the bearer. "A, "K. $t.itte bill, Xo. I 11 I, takc-u nj>, uad third timoui lie Assembly met pursuant to adjournment.A i/clock to-morrow morning. and is sure " of dew, a very "1 at Jacksonville, Florida. Lieut Colonel Southeru Ketve. assured success of he Eoconsruction pn ject level and sandy.It : soil U dry native Its , Congress as evinced by ilu adoptioi. ir majority low lands and tho open warm fields F. F. Flint, 7th Infantry, will assume command Ashe-mlih bill I, X.'. 7-1, w-.is Inkui up. lead Several bills were received from the Senate. WEDNE.--D..V, August 5, 18C8. MONTGOMERY, August 4.-Thi whole day was loves sunny of the KtaU latel\ in rebellion of Constitutions of;the tidn-watiT districts of tho Southern Stntcs. of the foregoing Companies at lie j point I thiid I lime, and p.i'-bed. His Excellency, tho Governor, informed the The Assembly ref pursuant to adjournment consumed by tho House in a wrangle over lh securing equa' :-ivil and political rights It is doubtful whotutr it can bo cultivated to designated, whii. h will IKJ known at the Post olJatkbonville. AsMinbly bill, Xo. 7N, was taken up- lead the Assembly that he had approved and signtdl the A bill to bucntiJed an act to regulate country bill allowing access to railroads and steamboats to all, and regard it us tuc duty of the Government advantage noith of Virginia or wcht of the I ''(! and "K at Fort l rooki.- thud t tuiK'I and parsed. following: government, was rcidsocon-J time, rule suspended without regard to color. The bill passed, 33 to to sustain these institutionb and to prevents hilif unless indeed, the hot plains of Companies Senate; bill, Xo. 7 4, was taken; uj, read third An act to incorporate thol'alatkallotel Com read third time, acd packed. 3' . Piedmont , people of such States from being remitted to and the waimcrportions Tampa, Florida, to which place Brevet Colonel thu.., ii.I l'.t.4.i.l. pany. On motion, the vote taken yesterday upon Tho Senate discussed the bill remowing polit- a iUAs of anarchy. the Trans-Mississippi of the Mississippi region Valley may suit it.- M. M. Blunt, Major 7th Ii ttnlrr, will proccetl A>-. cmlily bill, Xo. t Dl.I w.m lakiu up, read (Iho An act lo enforce Mechanics and Laborers' Senate bill. No. 23, to be entitled an act to provide lent disabilities, but without any decided *c- Sojoni The guarantee\by Congress of equal however that the whole ide-t and aSNUme command. third lime and pafsul.A&bftnbly lins on buildings and other property- for organizingand disciplining the militia of tioi- \\re doubt not , luffirage to all loyal men ai the South was dcisandod of, the Atlantic and Gulf Southern I II. Detachments of troups on Fj/etial duty bill, Xo. 01 was taken up, read &ccI Concurrent resolution relative to State Lands. Florida ; and. the motion was read tho second N\su VII.LE, August 3.-.Thirteen general officer - by every consideration of public safety, States water legion will bo found suitable for its cultuie.In throughout the State' will loitbwith} join their I ond limo by title, uiid'-r suspension of the rules An act lo incorporate the Suwannce Steam time. On motion r-f Mr. Butler, the amendment :) of the late Confederacy arc in convention of rntitudc, and Juvtico, and muss be main- of wine this has not had re-s|:-tivc couimand j iead third tim', under :a suspension of the rules, boat Com pan}'. offered by 3Ir Watson was stricken from hero to-day, to consider ways and means of re- matter ' the grape Talaha! U&cd while the question of suffrage in all the The almost universal opinion of III. Tho public property at the of a fair chance. required for immediate use, will lx placed in motion ol Mr. Aldcii, tho vote by whichthe into tho of the 3. Tho loyal BUtm property belongs to people been that it contained too little sugar On General to search history time and possvd. August partias charged giowcra has store, itt charge of2d Lieut. W. II. Nelson, 7th bill Xo. .1 indeliuitwly ix lponed with the murder of Dill in FairfibU District thoie States. have therefore U en in Senate was Claims against the h'tate. Senate bill, Xo, 31, to bo entitled an act for , Third. We denounce all foims of repudiation to keep it. They of, to Infantry, to whom two non-eomnnsfcioiied" officers was itronsi'lfiwl, and the bill taken upon its An act to locate the county site of Sumter the assessment of revenue, was read the second and who were recently turned over to the: civil u a national crime, and the national honor the habit of adding largo with quantities this tlu-y sugar h.ivo; aud ttn i>rivato8 of "F, Cotnpany, will IHJordeiod thiid l leading and piv !require* the payment of the public indebtedness thojuco. Not content Littloor : to lettucE( iur duty (On> inotnui, thin lules were butpundud, and Sen- OKUEIIS OF THE DAY. was adopted ; rule suspended, the substitute read Jtabeas corpus and been released on bail.3IoxtooME".T . in the utmost good faith to all creditors at homo adulterated it with aijile; finds brandy its to the I The lent floors, with such liiinlr liom the ate bill, Xo. S"i, was lead hccond and third limes I No. 93. A bin lo bo entitled aa act relating the third time and passed. August 5.-In the HOOM end abroad; not only according to the 'ctter, no Fcuvpernong undpriioinzthcfiodeteriorations.In wino way eamji a 1 is lit for use, will IKJ bent to F it and passed. j jOn to waits against lisa State, was. read, the third Mr. Harris moved to lecons'dur vote taken on nothing of ..termt.was done. The Senate passed irat the spirit of the law under which it WAS con IflLI lpt without maninulajions however I I'.n/oke, Tampa, and after supplyinij the troops' m-jlioM. thij Senate took a ieeo till four lime and put upon its passage and lost bill last night, in lefuren to the incorporation with one dissenting vote a bill removing tracted. spite of these barbarous connoisseur, who doijjnatod lo take jxwtat Tamjia, with thiity* o'clock! r. M. j jTho No. 02. An act entitled an act the better to of the Pcnsacola and Perdido Uailroa Cvfi.y iny political disabilities. It provides that all disabilities - Fourth. It Is duo to the labor of the nation we have never Known this a wine who did da) s rat ions, the lemafning subbibteiiee stons Senate r.suint.'l l its wfcoioii at four o'clock procure and secure Protection to Life, Liberty, ; which was agreed to. resting upon a citizen shall be ,removed Ibsi taxation should bo equalized and red uc dat tasted the older vintages of this it is of at Tullahasse-o will lx turned l o\er to the Assistant iM.., I the Picbidcnt pio trm in tho chair. i iTlio and l'ropvrty{ in the Slate of Florida, was read A message was rccoiv from the Governor upon his filing an application with the Probate rapidly as national facility will permit. not admire it Made in wine but way, of, Commissary of Subsistence at Jin kfonvillo, following rcpoita: ol vnintit te.'s we-io ic- thu third time and passed. vetoing an act for the reliof of David A. Fryer, Judge. No oath is required. ono a Fifth. The national debt, contracted as it course, oscntially, a liqueur Its, rich native Fin.I. c. -i\eil.: Senate bill Xo. } t. for an act to provide for tax assess- and collector of Alachua county for CUAIU.KSTON, August 5.-General Canby issued has bam fix the preservation of the Union for very Jiiirh order of excellence. admixtures Hospital ttoreN and other public pioj eity ''lli: Kiniinilhr$ 1 to whuin was icferrtd Senate I j the Kcgistration of Electors and the holding of the year 1SCO and 18GI ; which was read an order to-day officially relinquishing the all time to come, should be extended over yi fair aroma dominate over all flavor the not extraneous unlike U at at the I'o&ts of Gainesville, Lake City and Fernandina bill Xo. 80;, lor the eieaticn of a new e-ounly, j Elections, was read the second time, rule uspcndiil Thw Assembly then proceeded to reconsider command of the Second Military District. period for redemption, and it is the duty of and pioduccs a will be forwarded lo the Tost Jacksonville to be railed Do Solo, -poit Ihe same back, anti j lead the third time, and passed.Seiztt (Ihc question of the passage of the bill, notwjth. Northern News Congress to reduce the rate of interest thereon of him world-renowned Professor Kinmons Tokay., of North Carolina as also the Hospital Stores at Tallahassee.such recomi'tcnd, it pacs ". A. KMCIII, bill Xi,. 82.: to be entitled an ael pre- standing thu veto of His Mxcfllency the Gover- ST. Locis, August 3.-One thousand men The late of trHii nt ' 'whenever, it ran honestly be done. time the head of its G-julogical I V. Tho tneiiis iortatioii with the Cliait t ot this State, the manner; lor, and upon the question of Iho passage of are ai work en the Colorado Central Railroad.A , abandoned Sixth. That the best policy to diminish our for a long enthusiastic admiration for I I'osl.s as are to IHJ together bill was; taken up, ic-nd second and third 'If iipH| >iiiliii KUf'.ois: of President and VkePiiMd'iit he bill the Assembly sustained the veto of His telegram from Colfax state that he will de. most ion of had Company in the Survey, a hospital tents |K> 8c it-ad firsttjiti' . I'liKud States the Governor.A ihr l1l:4tnobtiI imtrcveourcrcdit that nl I was Flxrclloncy and Rote of lulon piis.seil by it destined times under Mispe-nbion ; cline public demonstration his : this and Iwlicvod that was Jommandcrfl will \be turned m to the Chu'if any on trip In grape, read the m-cond lime verbal received from Governor i-i'Mit. the csj3MaiIAts wili sk to loan us money at lower a w3flO (115- the h.1 low I rig iinaiiiinouH vote : inli MIS; message was the Rocky Mountains. rites of iatercjt than we now pay and must continee make the reputation much 01 disgust ino oouui**! at as the style of Quartermaster, District of Florida, at Jackson Air.! PivHidtnt, Messis. Atkins, Dradwdl, :MiVi: ,> .n -i t. i-l the following Hnioii'liii'-nt: stating that ho had approved and signed Three gamblers were lynched at Sioux City lie Florida.VI. . to repudiation partial tritt. was ville. Davis (I inn Kat zen berg, I'mxi'lt-d, I ln.i i thing contained in this ;wtfli.ill ho following Assembly bill* : or pay so long as | have mentioned, and experimented will Crawfoid, Davidvm) ; last week for cheating. total, or cavort is threatened or manufacture wo Tho (tuartuiinailvi'ii Dvpaituicut Meacham, McC.i..kill, i iPcarrr }. > t < .,!i i in -\ as to prevent th- ipjaliticdv.tfis A resolution asking the tovival of the grant Extensive open husjecled. tho juice. His Knight, Krnniuingcr, preparations are progressiiur here in his own celhr, upon luinish the inwNaary transportation for the im- ,,',. elixlion for attenuate sections of land for rail- .t. ! > holding of an difler- Piinnan. Und -iwnodVc ;k*, an<4 W- 1 < ii n rom building for the grand encampment of the Knights Templar widely , results it is needless to say, were mediate execution of this order. I Hit: .ni.-. '.I I I'n "i ;i.i t I'lidx Vicu Preoidi-nt t>f Uul"i roads. SevcnUu The Government of the United tho methods -10. next month. Commanders will be present ordinary obtained by T. SI-KU.I ovCVirjoNKi.Joii P. cot from those fly tnt'rit : Bills have '< I >i'-.l :* .!;i > .it tins limo and in t'.ic manner An act to incorporate the Withlacoochoe and KUlst should be administered with the ttricttt 15v concentrating a jwrtion of C1IAS. F. LAUIlAnKK, Tho) ci'inniittco mi liugiosSfd from all parts of the country. of the country. -vr.l'itl l Mi.' laws of the United Slates. Lake Panaofi'ka canal and steamboat and the auiiiie-1, the following bill, and find it corrcrllvetini"n pi >y company. The recent fight in Saline baa boon which boon easily county economy, corruptions have enabled to supply very U. S. A. taiL 13re\ct he was 1st Lieut. 7th Captain 1 tho miwt, bill entitled Kule suls cinl'il, the bill read the third time, The Committee on Education to whom was Stnato bill No. 2 1. a i Iohsadiitlnursed and fostered by Andrew of while adding the bouquet Aw Ustant (Jenoral.Itatincnllwu -d, vi/ : greatly exaggerated. A number of drunlen the deficiency sugar Acting Adjutant establish > and passed.On rtferrod a bill to be entitled an act for telegraph companies. disturbed the meetin Johnson call loudly for a radical reform. The beverage thus produced, : an act regulating i men .. Only one mr.n of wine. until of schools and university - took uniform motion'tho Atfiombly a recess lug a system a submiltod killed and Kigtak. wino of admirable llo pool fully was three wounded. Wftprofoundly deplore Ihe untimely a rich, amber-colored four o'clock P. M. leavb that they have had tho same M death was to Meeting.Sr. J. E. A. DAVIIWJON, Chairman.Tho bog report SAX FRANCISCO, August 4.-Mr. Brown ,tragic Abraham Lincoln, and ret delicious flavor, Infinitely superior , body and The Assembly resumed its session at four o'- under consideration and report the same back, the secession of Andn Johnson to the any native wino which wo have yet tasted. He Aif.fbTiNK, Fla., Aug. "Jd, ISCf, bill was taken up, icad Iho third time, clock, P, M., a quorum presentI and respectfully recommend its passage. Minister to China, sailed yesterday. Presidency, who has acted treaelnroosly to tho made besides this a dry wine, direct from tho A CJrant and Colfax ratification mooting of and | utKitl.Abicmbly. hub suspended, Mr. Cox, without notice, SAMUEI. J. PEABCE, Chairman. XBVT YORK. August"3. Charles G. llalpine people who elected him and the <>aut>o ho was juice, without any manipulation. This was a the lU'publiruna of St. Johns county was held bill, Xo. 00, wa taken up, read thoJiibt. j I ottered a joint resolution concerning the payment Rule suspended, the bill was read the Ihird alias "Miles O'Reilly of editor of the Citizen and late the died Ibis from Register city pledged to support; has naurpad| high l-jisla- Sauterne-like wine, and greatly enlarged our at the Union Club rooms in this city, on the 22d net ond, and thiid times, under a sUIIpeflMflltIE of thu present Legislature,which was read time and passed.On an over dosa chloroform, which ho morning took to tire and judicial functions ; has refusod to execcte ideas of the capabilities these most admirable th the lawi has used his office induce T. Javkson, of Hoston, of July. John G. Long, Esq., was o'.Cftcd an attack of neuralgia. ; high to rrapcs. Dr. Charles Tho} joint resolution No. t17 was taken up, j! of Iho rules, and passed. morning ten o'clock.A ' otto,officers to ignore and violate the laws; has who ha made numerous researches upon wines chairman, and Antonio Pupy, Secretaiy. Brief read fit bt, fcorond, and thud time under a (suspension t Senate bill No. 23, to bo entitiod an act to Forelgis Nsws. employed his Executive power to render insecure and wine grains tells us that this is capable of speeches were made by the chair and others, and of Iho rules), und piMtcd.Tho provide for organizing arid discipling the Militia cuiious in Africa MAXOIESTEK, EXOLAKD,August 1..... A dreadful the property, peace, liberty and lifo of the producing a wino extolling all other on the Jon- resolution adopted : following me>frag (the following but excessively rare in Europe, was recently otuonst has abuxed the has the pardoning power ; tln.ontMr. under suspension of rules. during regular performance at Lang's Music wmnced the National legislature as uncon- Sanders of North Ciu olina,'1niblished in /:'or.rfrnThat in General l?. S. Grant and Governor ; 11. Cnrsu to bo 'Mr- Watson offered the following amendment: at Anmal, Franca '1 he day had been HalL An alarm of fire was'raised and the entire Utntiontl; ha* pcisistcutly and corruptly re- recent number of the AW/Ami Cttltieator. a Schuyler Colfax: our candidates for 1'icsident I hereby nomiiiatc Goorge Provided, That nothing contained in this act very warm, when a few moments before sunset audience immetBatol'irushed for the doors Ww by in his a of this juice, in which and Vice I'rcsidcnt of the United Stairs, wo Adjutant .Gc'iieial. .. members the firmament towards the west assumed the the everjmnuuro power every pro statement tho character ,f .1 t nl..l ann.H.1 (lie shall bo so construed as to prevent the completely blocking up passage ways, end g per attempt at th nxxmstruetion of the Htateakldy Uo tfei it falls shoit of the ( aU ft IV o. have a hero and a ttatodtnan ; that ucncrai u. I On moti"ii, (tie ruus wriq bujniiuuu of organized under the provisions appearance similar to that of theaurora borealis. the wildest excitement prevailed. When order u yM and ( U/ Canto any company ... laknii tcorgo Then presented itself in rebonkm rnblic aia aim I bO i-ounui S. Giant will ever bo remembered among the above message up a singular panorama restored the ; has norvortod the m-' standard, 2S iiouwls oj ttcrsl.. of this act. from electing their own company was by repeated annoncement that into r of must. U u cruy to : American as the patriot and jhero whoso was continnol to lie Adju'ant Go in the clouds to the spectators ; first, a dense- zosige an engine of wholesale corruption, in the thousand i-ooplo and IhoSonato ofiicris ; which was adopted. there was no fire, it was ascertained that no less sugar lei tho annies of tho U. On motion, tl.o doois were opened, forest, with high mountains, having a lake surrounded - Md L ; ly impeached for high crimes supply such deficiencies as these, but our own nobly and fcarlpcsly } The rule suspended, bill read third time and than twenty-three persons mainly women and s4 *l$4iMnors. and properly pronounced inclination would lead us to look rather to the S. to succcs and complete victory over a wicked a ljonrneil.WF.KNEMIVT. pawed. by trees; then after a few seconds, a children, had been crushed to death in the stampede. giglt7 S instim-c w.oU not the kina and fearful rebellion, and wo believe I hat ho notice valley and a wooded incline, crossed by avenues, A number of Ly the rotn of thirty-five na- vine itself. For Kule suspended, Mr. Austin, without large persons had limbs - and stems, bruisd anti fermented with the must, will evor bo faithful to the best interests of this j August .5, 1868. introduced a bill lo be entitled an act to makea'propLilt which pro\ixl to bo a pel feet reflection of a property broken and were otherwise injared. : latL. diiw Jlcitain and supply the needed arid ? The ficionry! in ltU- nation, whom ho has saved ; In Schujlor Col- The Senilo met pnimiantlo adjournment, the ions for tho expenses of the State govcinuient situated at about four miles distance, andnet NEW Yoox, August .iX-The following was of Ureet .vibible from that Tho dig- of paths 4bcr be made up. a- wo bare already a'cnhr. lax wo could have no nohlor s-ieciincii; a t true- I Iho chair. of Slate of Florida for tho fiscal year spot. were received this afternoon by the Superintendentof might Pieiidout 1 trm in that Uaua a wqo U gar pio marked and the canal shone bril. saropciu ii' ) ilol juice sound and dctciminod, and a gloat tinc-tly ; quite aIIdin , Up1d it, by llcjiuhluaii, of the We- of December 1868, the New York, London" and Newfoundland uai.e i H\-t he is i always K). miwl I"' rcii.tedatS7Z.ard l3qtT) $ ) our Dill Xo. 72, for Ihu incorporation ending thiity-flist day liant, but the foliage and appeared as covered they therefore earnestly pli"lj-e grass Unitj relicJ Wo throw nut tlco lnis tioing may ttatesiniin; we Uiva steamboat was read the second bieh was read first, second, and third times Telegraph Company : company( State by Iho n a leaders who candidates Grant unJ Colfax.A by snow, to which the of tho sun lent the femLiI timw. not authori//! by the Lwo stimulate to experiment wmc of or( f support fur our thorough timo by tillo, read the third limo by section, under nu.siiension of the rules, and passed. tout ciutmllt. Two'rainbows rays intersecting "LoxDox, Monday afternoon. The cable! ( n9 or moro < : Clu| wj8 then organized for a quite a fairy to own lirifUt < ; f honor fortnnatn cnouxh and The following message, with accompanying of 1868 ceased to work at 12,35 this afternoon.T . asUons and t "with rntioiial are pabbcd.AssouiUy each other in the 11 war wur these Later in the b-.stson we 1IFItIU5d to rimviisfing of the con nti..loux bills No. 90, U? and 91.were taken documents, weld loceivod from, Excellency were soon opposite 3's show faults at the Newfoundland ittie,. nfopendence. Natnralizcd ('itZ7IIre onwtal riSno attention t the theory of G. 141u, Chairman. direction, and the phenomenon lasted fully twenty T.ie cable baa been damaged by the Governor probably an. to be protoctcd. hi all their rights of 4ttlP 4osotii special _teltmiorr? Jsmtr.Tho PAFY, rx-crolary. up, read third Unto, and passed. i minutes. **' ? '' "as though th.weronath'e born and the taaiantjrC$ of w ANTON The Senate took a recess till 4 p. jt. r STATE ov FLOUIUA, EiEcrnvB OFFICE, ) -ljcrg.i "Crars W. Frain. .z dtizt* of the United' HUtos, whether native v I The Senate resumed its session at 4 o'HOCK r. Tallahassee, .Augi 4, 1868. J JHon. HAVANA, August 5.-Marshall Falcon, lately it.natetlizjed, must bo liable to arrest and imuament -j friends of Andrew Johnson wehi utqorp! City and the surrounding country M., lie Pacsidcnt pro torn in the chair. W. W. Moore, Speaker of the Assembly : ;'A gold vein has been discovered in the town Pusident of Venezuela,has :re-appeared before by anv foreign power for acts done for tvertcrofTenn Tho t1tct4eetit'n w ss vjsitcd'wilh a terrible hoed Ji ly 2d, deulructivo Assembly bill, No. 93 was taken up, rent! the Sir : 1 have the honor to submit for the in t of Clinton, X. Y. An assay of samples of the Crro. Ho contemplates renewing the war to words spota, m this country, and If so .isr- name (1IeI flCIt take place for a year. both of lifo and property. Tho principal first, second and third times, under suspension. formation of the Legislature a communication; quarfi rock by coinjHJtcnt metallugiss( <, shows dr.vaMonagas from power. ' ; ** aM imprisoned it is the duty of the gov. them streets of the city wore submerged, in of the rules, and passed. .. received I this morning, from the President of the Haytien advices report that revolutionists ""wet to interfere in, their behalf. -_- -. same )d&CeBtO ,the depth of over seven feet.JJuildiugs .- The Governor informed I he Senate, through ; Unilcd Nnta* relating to United States, troops, ,that it contains $13.45 of gold to the too, and h i\3 gained a victory near JscmeL FOOT thoo - .Tenth. in the rials Savannah New. A: Herald, laCotyby owni4 wero undermined, property in cellars his private secretary, that ho had approved and and from Jho Socrolary.Qf War relating the about twenty per cent of silver.Tho .. a-icl revolutionists, well' provided with provision Of faithful all who The -were tinder the t.x- was ruined, street cars vure iwont from the signed. tho following Senato.Bills l T / Chaltahoochuo Arsenal property/ '. and ammunition, are pressing the Beige of ,Wttelate war, there none entitled to moreecIa1 Mason k Estill, is now marks and branda of beef :' Dominican were Mcrrs. tracks and about five person were diowned. An act concerning ic. I'vr an Prwca troops have: cro sed - honor than the brave soldiers and seaho clusivo control of 31,. J. II. &UU, be having The duresse, will amount to $3,000,000. At and stock cattlo. Very respectfully, $,,) ) } Governor.. statistics of cigar manufacture fchqw that ,frontiers iavading llayti Gen. Itoyer and his bsa endured the hsrdships !of campaign the interest of the senior propricbr.Mr. Ellicott City, about twonfy.miles from the city, An act to provide for enforcement of sec : Great Britain, and .colonies. and .Ihe, United so-1 have been murdered. Robberies and dprdationa'aro ... 4 . Cmi.; n4 Imperilled their lives in (113 purchased impaired that ho the line of tho JJalti more and Ohio Jlvlroad, tion 7, -dinance 9, entitled an ordinance for %YA1t flpj'AhTxr, States half Ibo of the world -and reported in vjurous parts of th* eormtiy. _ *r4 the eoit2try ; the bountiiz and penMinsltoktcd Mason's health became so on Oranito Mills were swell away, and sixty submitting: tho ContlltuHnn to tho people for 1 ''Washington City,'July 11, 1863.1 consume crop ; - by law for the bravo defenders of the could nc longer fill hj rusponalbla po>Uon. the were drowned. ratification. -. ( 'The'commnnieation, from the liovernIjegislatnro anti that Cuba proelurc one-third of tim whole ?npplvofthQ SL Domfngo advices report that the wrolationary p 'th* obligations never to ba forgotten ; persons I *An act fixing Iho limes for holding the circuit of Florida, referred this day byi tho. :t world. movement against Bans & steadirj:pro '"widows and of the gallant d ad arc I'stiuwoTna road from the river to ProfcidBnt to the of War f jr considerfatlon -' :: orphans \ At a ahelj manhood is lo take courts of this Stat Secretary I srcssing under Gen,Luforon, and that L feroa 'ne t>[ tnpolo-a saem! Lrgaey be.qlaetbea ibo beach wjalkcd of. I The final vote on November.suffrage There w little An act rotating to seals of <*onrts and cletks. ,'and report id returned td the President; I' The fortress of Xew Ilumaita has finallv' fallen had gained a derisiv victory OTV tLa IOTCSA 1.t9n' lrot.acting caw.P brink of revolution-now place in Iowa .in. An act to provide an offico for the superintendent-I with the remark that troopinowin'Florida, into tho bands of the allies. leiltgtunitlum. , onthe' Eleye, Foreign emigraUon, ir(4 h1 th)} $pini: I doubt that H will U carried. , )1a id&i4i0 much jto the wealth, 4evcop- aFyP, #i ,.. -- .:_ : : . - - - - -- -- _ w- ---- .- . .- .;:' 5. I.. . K t 1ttj the election for p - carry Seymour and Blur B* rdf Trade. The L.gt.lrnture. An act to incorporate Ptnsacola and Lou- I liah Facon, chargtrl with being concerned in .___ by any means no matter how revolutionary murdecof llr. Weimar, at Waldo.Bnd.the . , 1 JACJtsojrnit Ui, 1868.A. This body completed ita.labors and i villo Railroad Company. the recent wit local govnm r i b.t or desperate. Tho people want regular meeting of thi :Board of Trade Thursday last adjunintdon An act, cotaeerniiig forciablo entry and deaider. robbery oft31r. Kinard's stoic, harbccn'irtTstcd 9. !ltaetrc4, That 'olemly diiioi'1 ening The ITarien f following is n \ tan I enl to Fort atsgtUtine. ncciwuvjthi t p :;: ---------_ --------- -::: peace, not tumult and strife, and in the wu Sold at'thcuroota lhl evening, Vim Prosident'T. list, though nqt entirely,complete,) of the acts Angust .IAfl,? 3An r 4 One'91.tbo 'party has madnfgfltion. {': 1 unI'(or a iiiorganuzat1o any cistn, oE prt and ii TKXTllSJDAL'V. A.TJO, 13. 18OSNo present partially organized condition oftho afceltffa thittuur. and itspltttronirpasaed during the acseiontf act anlnorjisrg tho Board of Commisskm- ThaI CbuicsT illo !;>*isys t that fuha a "tent on a basis thig jr T. nlavte of,tbj hut meeting wore read *"* *** : csoT PilofaRc.. (ov.appoint Stevedores nndtfor o'bccn cb'cifed irblch load lo the Uli.f tluiW ) ; CtlWtjuticcto t all, prec II notice trill bo taken; of annoymus commujiicalion government, it is better to rctnovfttho a nJppsd ': ;;; LIST orAci4ND 'BEsoitmpss passed by the I o ithcrpuiTjJeswi- ;-gjj regular organl&i on exists in East Florid t, tfwhci Oils only i&iite puiple sIItj pj *. The name and address of tbo writer disturbing cause {han it :'ia j to rely Mr. R Tairbauk offered the following I'vsol- first Logfslatare held xindiw'tho ,revised Constitution. July Sit. *f -,. .g the\bovc ro rabj are meinVr, for the fundamental laws ? to so so "Memorial lo Congress, asking for the "cstabishment purposeof ifrardcr and roblwry. and their posterity .u8t bo givxm a* a guaranty of good faith. upon putting down the disturbance. ut ion, which WM adc ptcd. li of a mail route from Tampa to ClearWater at liberty. and thus thoblcasiap save We cannot undorUko to return or pn-scrve A third reason may bo found in the immense Whereas, by recent military order _the Headquarter An act the to Militia provido for organizing and disciplining harbor. ( curral'Stephens Ntvr. from the evils always attemW our of the Military to be removed of the Stato. 31. established communication which are July are not need. to -- on principle 'f baring of expense-an expense '*. Augustine,, and in coniequenca the Colonel Approved, August 6. An act to legali/o tho ordinance a'itwl in tho the late I lleBillVntFoT Ki.inn satiafi4tb&t *hoattajnnt 4.. i--- which Commanding and Staff An act to more effectually provide for the Brotherhood in the (L'nilcJ tiratidj.is |. ii"1iingI'nltVh fth, I ii a hurried registration and a general are to remove to that good order Constitutional Convention, called an ordinance .urpo.c4. of greater impotan -* *.- EWPrticteut5' ,- '"1Itesolvcd of society, and_ to. suppress disorderly a abolishingcountycnminal courts. in Paris. ity if cur State tb.r the election would involve at a season That the. Board of Trade proceedings? July 3ir "* wiTs vTsiti-d iniiuiiicrlT.'tarui political SUe hereby Chiiagw by & ,_ .. *1y ULYS S. GRANT. when the State treasury is almost empty tender their thanks to Cot Sprague and officers, An August act 6. An act to ratifv. tn amendment, to the Coniitution of sand tlics on the evening of the 20th ult. union ('fall claaseijh to efere when dollar is needed for the for their assistance in all measures advocated by Printer. provide for tho flection of' a State s of the United States known as article They covered some t>f (ho btreel lamps s.j thickly joust Politics, in order to "e to For Vice-President, every this Board in mfermee to XIV.July. commercial and cnT-a : city August G.An h that it was almoot ininosoiblo to sec the gasjet. government fottwhrtioh .SCHUYLER COLPAX. necessary expenses of the government, inttresti, at aim, for their uniform courtesy tootrr act 31. They all disappeared bcforvwcxt mMrninj. suggest that a State Convr--- 11 aa4 citizens. supplementary to an act, entitled an An j7 act to lesjalize the ordinance the city and no time is allowed to iaie superfluous Resolved, That the furnish act, to provide for the creation of Corporations Constitutional pasadin It id commonly fcald that bctvrccn nino hundred feet Wednesday th Convention called ordinanceo Secretary a copy an an organization local ----------- nnd to irs 1-, prescribe their and thousand millions of Unite ti cbadn of above general and liabilities. a States revenue. resolution to Col. prague. powers t provido for the means of paving the expenses euro tie object herein ihjt. . R> til lleftu i )> > Convention rosiponed. bonds held in This I3uropc. are now u probably Mr. Adams of the Committee o f this Convention. Mr., C E. Dyke in the , , Thori are many objections to the to State August 7. an exaggeration : but the amount cannot be a fcWmni, RcrrnucAy STATE EXECUTIVE COMMIT?EK. > Agricultural Association, hold at Madison, Btrbmitled An act to provide for tho enforcement of sec July A 31. l loss than 700,000,000 ; all of it cs(*>rtitl within bo resolutions and wa3foUordbyff which tho jACKsoxvii.i.r., Aug, 8, 1868, ) course Legislature has thought tion VII memorial to Congress and resolutions to our UH m a speech of great Ordinance power , ( ropoii; of their proceedings, which, IX, entitled an ordinance Senators and i six veal's. upon the The Representatives, requesting e.iablishmcnt resolutions TLo call issued the proper to pursue in this matter, but on for submitting the Constitution to the for reported bj b. by Republican State people t moton, was received. ratification. of certain mail route in West Baron Bcust Lt comes boldly boligcreut. It la were then put and nnanimoBsfj ; :Executive Commit too on Iho 2-ith ult., for a tho whole, these objections arc more Dr. Baldwin, after reading a letter from Mr. August 6. F'lorida. evidence of n gn-at chan;u in Austria whin a Jlr. a K. Dyke offered IbefoUowi, An act to provido for the publication of the I government minister dwldrca to the bishoi and tion, which was adopted mo.i| . than An counterbalanced the E. P. Beach to act to i by advantages in incorporate the Capt. Jacksonville - Whiting to Hotel 'nominating Convention regard bo held putting r<< -") to at Lako City, Company Laws and of official and legal advertisements. priests that if they tic! not conform the laws JfrWrrrf. That tho rmidootoflM on tho lotli.day of September in-xt, i hereby which will ensue, and, as to its effect a line of steamers on from New Yoik to August 6. July 31. they will bo subject to line ami imprisonmentlike lion bo authorized to appojn t v.l"! 01 withdrawn. upon the result of the election, it will this i place,ofTrird the following resolution, which An act to provide for the Incorporation ol t t An ratio act funds to authorize tho Governor of this State ordinary mortal.- *,> l-o selected from the vario.i ii o to the of the .'*i' not change that in the slightest Whichever was adopted: Cities and Towns and to establish a uniform rxgislaturo. pay expenses present Civil uiarriago; without the sanction of clerical county Convention, to represent lisn O> t. Tbo said Convention i is postponed until fur"Uicr system: of municipal government in this State i ii proposed by thejth iola the Resolved That authority, so bitteily opposed the 27. by letter of E. 1'. Beach, July announce thraugh the ** the election is conduced the August G. ,of ) notice.f' way E An Church iu Austria, that tonii* of the 11ibh1s p.pr the aq., to Capt. Whiting, be referred to a committee Joint act to provide for tho payment of the r2><> further business n2L *':*.. result will bo the same. Grant and of three, consisting of merchants of this resolution to adopt ti soul for (tut Stilu. Members, Officers, Attaches and other expenses; have ordered their curates U refuse absolution to adjourned si.e Offering i oa a"Cunvhution H order of the Comuiittcv. August G. dicr. } f thoso so united, even in the hour of death. One city, with instructions tkat they inquire as to tho o> the first Legislature held under the Conslitu- Colfax will be for the Ee- An THOMAS 'RAN-IULL "- Ei>wn. 51. CIILNLI, triumphant, practicability of establishing this line of steam-1 the set prescribing ou the part of this Slate I t ion of Iho State of Florida. prelate goes *y far a* to say in a circular adurcssexl , publican majority ten thousand votes or between New York and this city, and if the | and manner Vice of appointing Electors o President Vetoed by Governor and parsed over hi< vutn. to' hi inferior clergy : "} vtry time W. }:i U.VXFJJ.V, Secretary.A President . Si' of entity.V from the United States. August G.Tho that OLI have lo register the birth of .1 thild .. ... secured at the last election cannot be requirements our citizens can be met, and August 6. . ; V _-_ born in civil nedlock only, must cut that this roaa you Dcuiocrmtic committee at import a subsequent meeting above laws will bo in Victory iIe.I . UtfaJiCol An act concerning Marks und Brands of Beef]r published officially tho formula ' overcome by the Democracy and the of this Board. "Jegilimato child: anti staff left hero for , t . : Sprague and Stock Cattle t he Union as fast as correct copies can IKJ fur- Il I-M'B.; E'LAIxZD.-.IJJ vote of the Legislature will be the sam The Chair appointed T. Hart ridge, S. Fairbanks August 4. A correspondent of the Springfield: : {Cc tttbli- St. Augustine, the future Headquarters n bhed by the Secretary of Stato.f can says : "Tho Rut l'rLo at Harvard College of tlio District of Florida, on tho as would bo the vote of the people. and C. Dishes said committee. August An act relating 1. to Jurors was taken by a colored youth, Richard Thcodoio (VY. J'iuu3 0. 1troadkad: The following Tide Tablo was received: An act to City Treasurer' Ileport.The CJrwncr, of the junior class, the ion of a lear ColonelIn 7th instant.Vo Appointment. Tide table for the St. Johns Bar, Florida, for Channel incorporate the Appalm-hicoU Finance Committee, having examined Cite ('jiyna5urer's I>oor woman in Boston, why lilted for college at bog leave to say that 1 reply lear.to yo yeu.tt sq Company.'r Obcrlin and Andover Tho (Jorcrnor, since the adjournment of the the month of August, 11368, showing the time August Yearly Report, fin \ ;publish:; in another column the Legislature,has appointed Hon. G. J. Alden, of of high water. There ii 7 feet of water on tne S tate.An act to fund thu outstanding debt ol tho l'rIYvt thin : were an graceful as Edward Kvcielt's, his gestures voice Democratic whether my Convention n.una shall be pcwcnuJ 7,, * platform adopted by tho Democrats of Pensacola, Secretary of State. Mr. Alden isan I bar at low water. August (;. ,, tintrcccireitroil .ljnil 1, 1S37, tit ..lr<7 1, 1 IcG(W.Uaeli musical "and flexible, and )iia whole tearing a l- lowing, as what I consider, and the to sabsit real t J Florida, nt TallaffiiSHoe, in August last, indefatigable worker and will undoubtedlyjive August h. m. .ft. in. An act to provide un office for the Superin- Merchandise( on IianJ lianrtc.i April ,.1.,..... .JI.195.SO l.UOt.lx) mirablo."Drops of the coming shower.'' iifiiu in thftrrrattst.( .- _. 1 It ii high water the e 8 12 6 tendent The satisfaction in the position to which he has ou of Public Instiuction. I Pray licences. .ViK.oorn reconstruction polity of the RrficaU (1the letter of Gen. Blair, upon which 2 St. Johns Bar at full 6 49 12 00 August o. Il liceuse ,... C.'iOoO A gathcringof somo twelro or fifteen hundred: be complete before the next election wfll : is based their platform now. been appointed. 3 &ch&ngeoftha moon, 7:50: 12 00 An act to incorporate the Siiw.inntj Steam B I[unpin tIliflI(1 table licenses licenses,. 10,110, Indians was held at Fort Lamed i-ecciitly, for BO long excluded, will have been aditWs; the St.i . alley ** Mr. Wcstcott, though appointed and confirm 4 at 7 o'clock 20 min. 8 10 12 00 I boat Company. C ity Market rcnt.... 1,1H7,00 25,1 w the purpose of receiving their annual supplies gro suffrage established, and the oipet4 , It 13 singular that so marked a change o: 843 12 00 *Ho\e under Council of arms and ammunition. On account of installed in their ,, 3. cd as Associate Justice of the Supreme Court, i isetill August Koom. 3K*, should have taken place in so short u dischaJging the duties of Attorney-General,p G 7 921 12 00 I An act to incoiporalo the U'ltliliicoot-lio aud L i Fines ating to Itouse Keb.,.1,..18C8................................ 583,2 63,00*> depredation weeks committed by the Choyonnessomo grwa. rhcreisnopofflibih-ty of. ehangc r , time and it shows how hollow wero the 958 12 00 Lako Pansoffka Canal and Steamboat Company. Virtus Iiccni ,............................... f<0,0t) ago, the (Government oricrol that political character of tho1 Sanafi, "lad i th, no successor haring boon yet appointed. 8 10 36 12 00 August 1;. y'ountj of Duviil for quota expense for mail- no supplies should be issued, and the meeinz Democrats should elect their Prewdent professions which an apparent necessity James T. Magbce has been appointed Judge JOHN JoH.Nbox Pilot St. Johns Bar. An act to raise additional pox p.itient.1,1306,.. ....... ............... 97.W) was broken up in confusion. A great deal of majority of the branch revc-nuu l I..r the popular oi I talian Opera Co., &c.............. ......... i>,: ) discontent exists \ Coe fcfrced thai"unprincipled to adopt and Hon. C. 1*. Mobley State Attorney for ihe On motion, th* Board adjourned.E. S tate. -rgau grinders.............................. ti.UO I. amon tho Indians on account \ c eannot. th rpforo. rnut iI. P.a- party August o. HwlmmTng cattle,............................. J,2J'' of tho order, and tcvcral acts of hostility havo reconstruction, by Congressional actio vI and how readily they discard them when L Sixth .1 udicial Circuit. A. FERNANW/, Secretary. An act to provide for tho l'unishnieiit 1-oi; tax,..................................... 2U.O!) already been perpetrated. The matter ha not Senate will eontinue bar fo its , It is reported on good authority that Colonel Crime and in u l'anorama... ...... 5,10* been settled wo submit to it? How repeal 3fit proceedings criminal Sidewalks can it be 'g offers to out boldly CHMV. orwtiwt? an opjpoXtunity come Win m. A. Code, of Jloaticello. will bo appointed PiANo-FoKTE. a country when the natural August 6. Two cemetery loti, at J20,. Orders hare been i.-Autd by the of It can only be overthrown by thS authofit/if their true colors. desire of the people is to reach the highest: Joint Resolution Amount recceiv Judge of tho Eccocd Judicial Circuit. concerning Toaohtis u:Ireedmen's fur expenses of DUTIJC for sick sailor... tho Navy to Rear Admiral David, commanding sworn to mainttim tii : The Tallahassee platform,-then aug- point in ART, it ia very difficult for success tobe p F Schools during the year ISfiS. Kibitioa of laughing gas. 10,00t, South Atlantic f>{'iadrun, to cut down his Constitution, and who will fail to do hb dcty if obtained without arduous August G. S ea-cow. ..................................... 10,00 force one-half. This will necessitate the ho allows the Constitution to1peruh ttafari most lalx return of the colored Fnmi UAU TO WOUSE.-The Savannah Jle- >r. Public k ish dtall In ling for the votes people* An act to revive an ordinance of the Consti City Market. Sl.23 of series of Congressional enactment 'wUdk several of downward track opinion is extremely exacting and not always t tution City lax, balance for the year 1866 and '67,... 1,231>,95 the war vessels now in those waters. i in m uUec'n started the Convention palpable violatioa and hoping to delude them by emptypromises p having on entitled an ordinance to City tax lor thw year 1W7 and 'OS. 9, H8,7IJ.iln It is left to the discretion of the Admiral of it* fundamental priae.pies. . teems lo bo going headlong to the bottom of the just ; but often unjust and cruel criticism L i inquire into the condition of tho Union Bank 1 what vessels shall be went home. Tho 9 .-declares that "it accepts as of Florida. Amount received from all source*,......... Navy If the President, elected the : Copperhead Democratic abyss. With every haa produced the most beneficial results ; the f fgreatat August G. lice dill) the Trcusurcr...............J...' (V j 17 Department expects to hear from him on lie enforces or permits others by DenoctK* thr civil and subject in about tcf enforce ttn ! settled principles, political have been under a month. R downward step, its bitterness increases, and L improvements made An act to incorporate the IVnsacda and Per Total.....................................*lfi,47,53 construction acts, the Radical*, by the aecowa finality of all its (i1iCII, that it regards while its editorials arc now characterised by continued discouragements, and in many successful di "tie .reconstruction nets as An act relating to the Penning and riu>exENTb.i Leo County Coiivciilion. and his administration will be as t it invites the copcration of all the peo aro disfigured by more low-bred scurrility and I those concerned. In ne one branch of art has of Cattle in this State. Milking G.i; furaL-Litl city, tho present one of Mr. Johnson! pomrieat. * abuse of there been more trials and failures, and in no G. i M. Bowc' ........gas... .pipe, postd Ac., lai.1 T.u.tAHiT, Aug 21, KSC7to There is but pie of the State without reference to ungentlcm'anly political opponent August ................ ... eIl2J.3 ono way restore tie gtntn- This, however, was to be expected. An apostate single instrument is there BO many differentparts An act to provide for the Registration of Elec 1 I'.al.mceon' Hospital groundn.ions ................. l'ntniut :i call publushcd iu the city papers ment and the Conatution, 'and.ttat&fcrtt* color that funiinheU pflsoilers............... i "did wet on i foundedon race or t and the President elect * always goes to extremes, hoping to to perfect, in order to make the whole af ors holding of Elections. Mrs. M. I*. Sluttuck, draft due L. Hoattuck a Convention of delegates from the various to declare these act*' oil'tadvoid it recognizes the "necessity of securing sho'r August G. for services a wawhman In Isco............ compel the army to undo Its vsarpi&fes, ; his sincerity by his excess of zeal in the success, as the Piano-Forte; this is always attended An act fixing tho time for holding the Circuit Cancelled coupons for 0. i% Sweption, flaw precincts of the county met at the Court.J louse at the South, disperse the carpet-bag SUta civil and jwlitiwiJ equality to a?[} to tho( cause, and his enmity to that which he has deserted. with great expense, requiring large capital Courts of this State. fldanee river, by pai.1 order 11. of Council, year. lMG ......... this day. allow the white people to norguta government """'" *"* - 'i end that not only at the ballot but, but So with the apostate rpnUict -the i and patient perseverance. .1. 11. trovcstecn,I August 5.Concurrent. Interest.. '......n"...ngmi........nttinuncc.witli ..... 2K' in the dixlribidion the history of the claims elected President and W. K. a majority of Dmnocnt fr. : t. .... Ditntlly t ( of office, there shall bo no distinction I>*y fool; is trying to surpass hi* illustrious exemplars. Fuller & Company, commenced manufacturing against the State. \v. ir. Ciin.tjbondf F' ,.Cheney..............70,0 oO.OO* H'l.UO appointed Secretary. Tho l'ic-.iUtnt addressed the North, and they will admit the Bcptotttativcs - Pianos thirty- ight years ago, and is one of the August 3. Amount paid City Marshal, 5 p c on market the Convention its elected by the white people of the Boot growing out of past differences or: An act rtnt ...................... .............. explaining objects and coun and with the *, The Jttjjiilliinii of the 3d inst., devotes a whole oldest honses in thft country. They aim to making the scrip isnuud by the Constitutional I. City Marshal), 5 p c on 88 licensor, ISUi...... 41.1$) selling union'and harmony in carrying them out. co-operation of the Pnodeatit precious condition." editorial column to senseless abnte of the Union make the beet itibtruuont, und sell it at tho Convention receivable for all Stat One iltT-k and chair for Councifroom........ Tho credentials fof tin d-.lcgiiled v.cto then will not bo difficult to compel theSenfcf dues.. City Marnli.il, for purviews January to March, prcdcntcd and read by the follows submit once more to the obligation of th. OPK- Now it throws off the mask ; repudiates and the Sdtlincl. Its charge against the Ui&a smallest profit. These Pianos cannot be oxccllsjed. August 3. Clerk March of Oouncil to Oct.,,for from> mon.Oct., at2., ISCG.,........... --'if1 (Here follows the iuumof secretary Si.ult. as late candidate : slitution. It will not bo able to withstand tt* : these generous sentiments ; goes (which serves as a text for a political } I Their singing quality is pnrc, full, and An act to make appropriations for the expenses I ls.7; 13 Jilecting) >,...............,.to...j\pnl..*".!.') lor Governor, ex-Senator Calf, Dyke, Bio- public judgment, if distinctly invoiced and clearly - back its declared that we reported yellow fever in Savannah for I easily retained through the most lengthy pas of tho Stato Government of the State of ,' April to Oct., 21 mwtings,............ 120'to.OC kaw and ISO other citi t-nii of In count).) expressed, on this fundamental issue, tad 2la solemnly platform L \ M. 1t.iw.oii, on m. tho purpose of injuring the trade of that enterprising sages. For power they are unparalleled, and( Florida for the fiscal year ending 31st day December from May amount 3, 1SC7.expended to M.nxh.on IStiS rity'gaccount ,.. 14)I On motion, a com mil!to on tev>lutionj was the sure way to avoid all future strife to pot and declares that there can bo no civil 18G8. Cancelled lor li. U. tax, IMG and '07......... appointed by the President, consisting of the this igboc plainly to the country. city. The stupid editor, with all"his] are celebrated for their great brilliancy, exquisite Joint resolution of the gialaturu ot the State t MlMcrltanvous account paoI by Council.... 77,1 following delegated : I repeat that this is the real and only qui and political equality for freedmen ; that editorial experience, does not seem to know that touch, und elegance of stylo and finish. of Florida, petitioning Congress for an appropi Amount Krpcuri, locks>aid J.,Ac C., forclty, jail............. 34,7.; C. E. Dyke, A. J. lVcr! G ku AV. S.ott, S. I which wo should allow to control us. ''Shall T* ] irdy on to lire rep.iirs engino - the reconstruction acts arc unJonstitu- i incorrect reports will sometimes find a place i in iatioti for the improvement and placing in a l.ibor and material for j.iil........... 161,32 Sills, J. (I. leonard, J. It. T. \loi, Jft&n A\e- submit to the usurpations l>ywhich the govia- and void and the : Supreme Court condition of safe navigation, Moccasin sluice i in Purcn.iM of hose....................|4'X.i) > > tiLt, Dr. R. X. Gardner, SiLts H.irtlielil, CicnvralMundec I ment has been overthrown, or shall we surf tional governments the most carefully guarded journal-(though in I Ladders, a< Uarlumn, ... ! Ala term of tho Court oftlie the Apalachicola River. | puiutinj, ke, 54)0,00Mlfl,0Il) ti.! A. Chaiis, F. J:. Cotton, J. B. Oliver ourselves for its full" and coniplefo ratontwi? Pptvial Supreme Kotutc of l> 11. r. Stttle, 1 established under them must bo overthrown this case, the report came to us on what wo conbidered I- August 6. amount due for issu- W. X. J. ( Croinailic It is idle to talk of bonds, greenback, gold th* State of Florida held in the of Tallahassee lag Uci-nM.- 18W5, ....................... W ,W> Taylor, i. l.saac Tay , that distinctions founded on: the very best authority.) Moreover, theKopMieau city An act the better to procure and scenic Protection Chen A. Carroll-, making City 1'ouud, 12.IX) lor, Benjamin. Ilargravc. TLotn.is Sirus. Robert public faith and the public credit. Wb4qaai ; ignores the fact that the report re'' on the 4th day of August, in the year to Lifo and Property in the State of .Jhl F. 'L'Knslc iM to old,for powder labor and mngit/.inp,..... 8ix> 'JOF. ,'/)) Kent, Robert Braden, Henry Cook, J. 31. Thur- Democratic President do in. regard (Ii uj of material fur street race and color must not only be main erred contradi ted in the nextissue of our Lord, one thousand eight hundred and Florida. croju-ingc, as per contract..............,.- ( >Sl-.'> ston, Jesse Dennis, 1).ivid Taylor, Ijtwu Moriug these, with a Congress ia both, branche wntrollcd - tained but must be made more distinct t, lo was promptly : sixty-eight, in of an act of the legislature Augufct 0. E. F. IVt'uttw, privalc crot ins ,............ 1SO.I.J: Luke tic.-. Boston lawyer, and Alfred Pulmur. by the carpet-baggers and,.their"jtri] ! i of the Union, three days after. pursuance An act to prwciibo the dutks of Stato Attorneys I AV. M. Boatwit-k* Co.,mod. furnM #15,23 t He will be powerless to stop toe luppGe I b 7 and bo approved on-day of said month and K.1'. Wclwtcr i Co,................104.40U9, which idle 4 that not only must negroes excluded : Burial of paupcra....................*tt,50 Dannie) the absence of thu coumiillu.-. J. 1 negroes are organized into poUncal from office but they must also ( u&LIn.TIox or Tuoors.-Tho OiJcr issued year. August G. propriatioiw| for PA"IX.T,.......,.12bUO 1V' Peeler, Es-j., bung: called for, addressed the I clubs-by which an army i* maintained to pntert - , I Present Edwin :M. Randall, Chief Justice.Ossian An act to provide for a correct list of tho Iive-o.ik block for City Market,............ It'.tW Convention ia a logical and practical fepotrh these vagabonds in their outrage upoa,the bo dfiten from tie lallot loi.'S a short time ago for the concentration of B. Hart, Associate Justice.; Owners of Real property in the several counties 8.Keeping Ucnc\up, wntclun and grading powder btrccts.....,....... 290'J, eliciting repealed applausu.Thu Conventioa was ballot. Thcso and thing like these eat ip ft Sand When the tho ttoops stationed in Florida at St. Augustine, Wm. S. Hogue. Clerk. of this State 7.ine.Mdajsat! ) .fl.OO,.....maga-........$IS ; Jacksonville and Tampa, has not yet been carried 1. Ordered by the Court, That the rules of August G. Watching chain-gang.5, clay*...........7,50- .>V>0 tea ; Robert Kent, Thomas |Sims, Cicoar Forl, ;, credit, and make the difference between jpbl.Tcenbacki. Amcasing laxt 'and ........... declared in the columns of.the An act makinu liookn, 1'O,0I1) , adopted wo relating to Vacancies in into ofl'cct., The companies now at Tallal 1.1 this Court heretofore in force and not inconsisI I-, oflicu. T.ix collector, 5 ]P c commission on balance of and Luke Jennings, who was not a dulegutf. Uxiox, that if it meant what it l I tent with the laws of this State be, and tho August G. Ux, ]WjOiid'J7........................... :19,01 The Committee on Resolution.-, through th< ir We must restore the Constitution wiote w basst-o had completed their arrangement I to same are hereby, adopted as the rules of this| A resolution asking the renewal of the grant W' H. Uawaon, dniiuin lot, per order chairman, reported thu following resolution* : can restore the finances; and to do this we ant said, it was to all intents and purposes leave by the last steamer, but their departureboa Court, until otherwise ordered. of alternate sections of land for building Kailroads. 1- Tax of refunded.Council....... *10,7J 10, 1. Ktsoircd, That we accept as ecttltd principles I hate u President who will, execute the will of a republican platform, but tin LO boon postponed until the next. Ho with the 2. Ordered, That the present rule of the Circuit CommiDition, cirtua license. 4,0-* -1,7" in the Policy uf our (Country, tlio I'erjtit- the peoplo by trampling into dost tie niuipttioiis - Courts be and are hereby adopted as the An act relating to Seals of Colitis and Clerk CitypoUcc,. ual Union of the {States, "ii / tie liciti'ndjflititul r of Congress, known-a the Uccoatrnrt has proved that it did not mean tchat it detachments at Lake City and other points, their August 5. Wm. Caulk, '.',', months' rent of building lor acts. I wish to stand before., the ,0 awafi>*i iu rules of the Circuit Courts in this State far {niily o(1L its cit; :s BO in. 1iopltl, ... .... . at13. .... .............. mill. It was meant to deceive and mislead departure is delayed, and rumors are prevalentthat as they are not in coflict with the lawn of tho An act to incorporate St.Johns and hal bntiug Council room in mourning,......... lO$1 -' HisviKulf That the objott of Civil GoeruniLiit {>on this issue, but it is one which eouirio) 5it the delay will bo indefinite. We trust that State. fax Navigation and Improvement company. C. Drew, stationery Ax,..................... I ..5] being the security i>f Life, Liberty and everything dec that is of value in. its larjt and but it failed in its purpose, and thee rumors are correct and that the proposed 3. Ordered, That the rules oi practice in thoQircuit > August 6. Thebout ket.A; Uurch.. on ext msion of city..mar .. > Property, wise ind humane laws, a firm but impartial comprehensive it suits. His ticoneOaDsthil ' is now contcmptously thrown aside.- concentration will not take place, at least for the Court not conflicting with the State I>e An net to provide for making a Digest of tho A. C. tjuuill building stall,extension ot roof, ,-- administration of thuui, and cordial includes all that u worth a contwVand wifit and the same are hereby adopted as the rules of Laws of Florida. A.C., in City Market,. 21))M; ) olxxlit-uro to their mandates, as Interpreted: it there is nothing that gives dignity.hOs' '"The honied accents in which the high present. In tho absence of all civil power the practice in tfce county court*, except that writs August G. Taid Bill on of contract slate. K.for I*.powder uiagHZino and uxocutcd by lawful officers, aib 5nJi3[>cujn- valne to the struggle., , toucd (so-called,) declared to the free 1- troops have preserved order and acted as a military ] shall bo tested in tho name of the judge of tho An act to organi/u the County (Join'Id ol tho 1'uidA. UCanova, ,Webster..t31,3 loo.oi' Lie to this end,.and concern all alike. Your friend, FLa BLLII police force, lothe general welfare of the county court of the proper count'. several counties of the State, and to prescribe Win. Houston building fence..82,30- 'jJIOtj: 3, llcsdcti That in view of tho recent history - incn that they were their best friends the mode of practice of said 1'aid for draining road, appropriation of : The Fly lag M* . U. the 1. Ordered, That Charles Foster, Kq I be courts. of country, and its present condition, the 1 stato and to the of life and ... arc no longer heard, but instead thereof protection property, and he is hereby appointed Clerk of thin Court, August 4. Iteubeu Alley. ,.ln contract for putting f2tMV*> great duty of the day is C jeiliitiou, and the; At u recent meeting of.tha Aeia.1cali- ,' hare the bold assertion of superiority I and their services arc still needed in the same and on his qualifying, according to law, he An act to provido for the iiitoiporatiou of in trunk.125,00- .;:J, we bohalf. Wo hope, if possible, the order for concentration will take charge of the Clerk's office, books, records Benevolent and Charitable Societies. liuildin Lumber furnished eweron liayotruet,.f'11,10' to our love of country our pi'fjmit'fi, and L one of the members of UM society, Mr..Spsr, ; the contemptuous denudation: will be countermanded, or at least ,and papers, and the Supreme Court librar:.. August fi. S. Mitchell, scmoes.at Council room,.l,2ii- :Pl,3 Hit()> burying the uuiuiositits engendered by cur late I had already constructed an apparatus by 6 i and tho confident threat. Tho freedmcu 5. Ordered,That the clerk furnish each judge An act to incorporate the Ocklawaha River Cleaning street welk. 1;>,1" unhappy btriic. and banishing as far na jioi iblo r aid of which ho had accomplished the fat rf postponed. and clerk of the circuit court and of the county and Lake Apopka Steamboat and Canal Com Cancel! :.l coupons for K. Ii. tax of 1SU7 A. 'OS, ,.l'UIw, ) all its bitter memories, ciceyt fir their usffulli r raising himself from the ground levtl and P-' could not bo flattered and deceivcd court with a certified copy of these orders, and pany. Amount, to J.of K.fine Camp refunded,.by order of?1V Council &vnt uf tlftailfttl tomiffctieea vf ticil iliafwJ, wo I | forming a horizontal flight of sixty foot,, M i ",* now they must bo bullied and dofiod. As.ttirTiI A KNIFE.-A dwgraceiul a Lf- that they be published iu the newspapers print L- August G. C. Mcholuu,ou liccn c..... 1-3,00 will do all in our power to reconcile dilTercnci. was further stated by )lr.-Winham, that fray look place at Tallahassee, near the City ed at the seat of government. An act to incoi'jKiralc the >uwuniuc .Steam M. Hcarn, removing fence. i,00 heal dissentious, promote harmony K-twccn all i Spencer expected to fly the-length.;of UM.Crj*- Such is Democracy in its true colors Hotel, on Sunday evening. Several colored I The Court ia adjourned until the next regu- boat Company. Apprupriationafor Mr.-i. Jane Burns, over cleaning tax,...tip.the walkn 12,00 iu ,">7,50 the people of our land. tat I'alace during the meeting of the Acoustical and such arc the principles which men, ono or more of them waiter at the Hotel I lit term. August 3. city cemctcrj'. IWi.fH) 4. llcsolct'J, That,apprc.iatiug the iuipoit.mcu r Society to bo held thaw on the 25ta.JRtt I Joint resolution of the Lv ialaturc of thu Dr. E. T. Sabal, on account of niedi'-al bill,. 5')tK) of harmony in the reorganization, of the State Since the above anooncoment .wai, ioJ 'S the people -and strange as it seem, and all more or less intoxicated commenced an State of Florida the Kxcuralou, on steamer Jlattic Government may Important A t.PHEftlDLNTIAL rcqucsting Senatois and I!. & Togni, account. and fully conscious of the impossibility have rccicvcd from Mr, ioapspsitiithats - e'ycn the colored people-are asked to altercation on the back piazza, disturbing with( W.ECTOM TO HE AWOIVI IIYTHK Representatives of Florida, in Congress of tho I.. Warrock. j'J7,00 6,00 of bringing the People together in such a I of the* apparatus employed .by h' ft United States, to the enactment J.CUrk, for Boat,. 43,00 work which, consists of of smahl' their loud brawling and profanity, the public procure by Xi'O on any pla'form declared a purpose> u pair wings of rather support in the persons of Seymour and J.KIM.A.Tl'RE.The Congress of a statute exempting certain property Amount M. Mather paid, the mayor, canh, as per bill of l affiliating with either of the great Xatioi.il I urrangul so that they, can bet worked ty thi and the of the hotel The building bidewalk in front of Mrs Blair. peace, peace gueU. following bill has been passed by both I in the Stato of Florida from forced sale b llurritt'* lot........$11,00 Parties now disputing for thu possession of the i arms, and a largo fan hapcdt 41of .ver men finally left the building and went out on to branches of the Legislature, and has gone I to under process of the United State* Courts. License issued.... 50,00 Oli>0 Federal Government; this Convention, rryinliny construction connectedto, the body lj, Iho etrett for the purpoco of seltlinz their difficulty ] the Governor for his approval, viz : August 3. City pal surveyor's church..draft..for salary In.favor. Kpisco the? JtecoHstrttctioits .Jet* as a foutlity, and as presenting work;, so that it stands at.auapffUw -37'iU I We rcceivo information from Tallahabseo the of this Sin An act to locate the county situ oi Sampler i-thodist $ the only practicable of three degrees with tie iZr..S'duos . and during the fight, which followed, one ifl act prescribing, on part t teit church 37,5U 73IX> means securing; hpriwntaL that Legislature has passed I the manner of appointing Electors of l'rcside, county, and for other puqws Five per coat commimlon to Treasurer ou peace and harmony, does most earnestly invite not propose to fly.intyts, ordinarr MOM if of.them set the rest . being by dangerously l . upon was t3,19t,3li. ,. August 3. ,.,. tim * and 'Vice l'reident of the ijuitcil States. 7.VJ.J7TotU co-operation of all the Peoplo of the Stato tho term. llcuaeshia apparatai tikigs a,bill providing that tho Electors! for f etablied in the bowels. Ilk recovery is The people of the, State of Florida represented An act to permanently locate the county .situoCSuwanneo ,.;. jlli.417,53II. in the dart to rehabilitate our local govtrnmont, short, quick run, this run being ctil 1'resident and Vice President shall 1 be doubtfuL Such affrays, which are of constantoccurrence in Senate and.ssernbly, do enact aa follows Ii: county, and for other purposes. K. 1IOI.MKS, without reference to antecedent or personal con by pressure of tho air against tit ; not only in Tallahassee but elsewhere Section 1. "Electoia'of President and Vice July31. Trc-uurcr. siderations, / <'ohr.a. face of the tail, ho is raisedirom li , elected by the Legislature, as was formerly President of the'United States shall be appointed An act to pro\ido for the organi/ation: and Examined iiiol fount correct, an.! approved by Haucu EtfolrtJf That freedom of spew h and of lie then, by using th.' wings maintaiatuiomeutum w th' done 1n South Carolina. A copy arc a disgrace to the community in whichthey : in the Assembly,Hall, at Tallahassee, on tI t10 government of the Supreme Court. Committee., t 11_:. BI.K.JK 1. WtBSTKR: the press, education, e iiulity before the law, and I which ho has acquired u to? " occur and seine means should bo found tore first Titf dfty after the first Monday of November July 30. JUHX) 8.Ausii 5AWt.i. in political rights and privilu us, are the t-bsea- possible, and ia thus enabled, skim tloi J 1 * of the bill is published in another column. end thcui.. One or two stringent example a next, at twelve o'clock, at noon, by the Legislature An act to incorporate the 1'alatka Hotel Company. ; ,t 12,4L hats of any satisfactory rccont>truction Uc the short distance above the ground. Mr. i 8P : nccdod. The new criminal code provides evere' of ibis State, or by such persons as shall South;" and that the leading principles atfcct- commenced his operations by pr&tLZ be esteemed members thereof, and shall bo present August 4. ing the personal rights tnd liberty t-f th riti- jumps without the aid of the apparato, ana Tho, reasons for this courso are obvious punishment for assault with deadly weapon- on that day, and said Electors shall, each, An act to enforce Mechanics and Laborers State Items.AVo zen, io be embodied in the Constitution, having then commenced using the wings,, and Enahhl The fact that no proper registration Let tho law be carried info effect and the nit ir. before executing the duties of their office, take Lien on Buildings ,and other property. learn from Fcrnandina Lulcj: that the been definitely,fixed by t ho at U of Congress, wo the taiL By continued practue, and fi' dote and maimfngs, at which the old law 'winked the oath of office prescribed by the constitution August 4. revenue cutter,, Itescuc, arrived in that port on recognize the necessity of securing tiril and jx>- ,timo to time making alteration jn his sPP" can bo completed in season for the be summarily stopped. of this State. An act to incorporate Jacksonville and St the 1st instant. She has been stationed on our litU'id equality to nil, to tho end that not only at tus. iir. Spencer, ha* been ubled to ext election makes election-undesirable Section 2. All actd or parts of acts inconsistent Augustine Railroad Company. coast during the past year. Lieut. D. 1". To/ier the billot box, but iu the tltntrilution of the tutiior* considerably his aarial ..flights'pi ---- --- --- with the provisions of this act, are hereby August 3.Concurrent. has been detached from the Rescue, and ordered ami tuioluiiients of ojltet thtro hall bo no distinc we were informed by him jfow.sdayt.ho . and further than this, if tho. freedmen j4mcu L.tw.-On Sunday afternoon hurt a repealed. resolution relative to State Landf. to report at Brownsville, Texas, for duty on lion growing out of past differences jtrcriont had lately accomplished.. &JIOrIIO11t are called'from their labors first to colon! man by the name of Washington August 3. board tho Antiotum, at Brazes (OJldit of 180 feet, starting and alh.ting.at$* register was tied by the hands and severely whipped Mono !;IL- A USEIJ-VT POMTICII.N --' Wopaddle An act for the regulation of Pilots and Pilotage Captain Trcadway has been detached from G. JiftalctJ, That the imiHxsitioti of Taxes fur level. 3Ir. -Spencer. now'.engagei in and next to vote at u time whentheir August 3. the "Rescue," and ordered to New the of Orleans. support t government, justice und sound pitting which ho hopes Salt Rivov.DEMWUVTU' a new with switches by Peter Johnson, John Primus our own canoo -up apparatus, services are particularly needed in .. --S An act to establish a State Penitentiary and Captain It. R. Graham, U. S. l\ C. succucnla policy forbid tho taxing <>f ono class t<* the exclusion ish in time for the exhibition'of the AO1 : and another colored man. He received upon I hi, ---- for the government and support thereof. hint in command of the Rescuo," of another. an>l that, thertfJrc, the tax cal Society at the Crystal Palace,and we ' the field,,it will interfere with the intercists bare back about ono hundred stripes which, in MJOlLttt.-ThO large Democratic July 29. Tallaha&soo ia to have brass band. She has on cotton ia u discrimination against the indus forward with some interest to wltiwe' b 1 and and drew majority at the last election in Kentucky Memorial to the Congress of the United Slates try of the South and ought to W i coaled, and" formancc-London of tho farmers 'planters and somo instances, cut the skin blood.- praying for the establishment a colored book and ladder company. LEcriN.q. . of a mail route. wo pledge ourselves to all ia explained when it is understood (that use legitimate influences easily The charged him with their lym-biT stealing July 29. and laborers"J3j embarrass, both employers The last number of the I ako City lrtat for its removal, as u measure just ia itself OLDEST TKEEH TiWOBLD.4'h11l clothing. Tho affair was witnentxl by a largticrowd the Republican had no randidate in the hVld.Upshire An act for the relief of W. E Jackson Kd con and as a means of ix wt , \dispensing with a popular election in ward Thomas tains an account of tho oiganization of an Agricultural encouraging Southern pro of Komma in Lombardy Italy,: is ptrk Pj of men and boy*, and va fin ill}' stop- William Spear, John Craig, Jaa. and Immigration Society in Suw nneo duction by offering to tabor its highest reward- oWosttrce record. It was known tow* ,f Novjcniber, and holding the election for pod by the interference of a white .man. ..L'bepartha County; West Virginia, claims to and B. Walker and their nssodates, now owning county; Thomas'A. Carruth was chosen Presi 7. Rttvlral, That ad a means favorablo to the existence in the time of Julius Caesarfcrt/ ** Railroad in December durjriig'lhtf have the largest and richest iron mountain in operating from Jacksonville to dent, and Walter Uwinn and David policy of raateiial development and tho advarito before; b Members of Congress Lake Long, Sec years Christ; and is, tbeefof . concerned colorod. This all , wore outrage the world, not excepting that of Missouri, un- City retaries. Uen. J. J. Finlcy, in an itble and > mont of all our people in virtue and intelligence, nd nine hundred bld It i* nand t jiristmas holidays (as is occurred in the donald by vein of bituminous coal July'29.An -- ap we will favor the years proided eastern portion of the city, a twenty-five propriato address explained to the meeting the liberation of the Public Lands sue feet in height, and'twenty fricititfekti the road CoL Hodman' feet iii tniclcnosa.' It i ii only ono hundred and act for the repealing of the Relief Ordinance. intentions and of this of the State from the existing lien * .. in>.Another bill,).this delomuiu is on leading to All tbfl objects association and u on some o at one foot from the grow* < fifty miles from PitUburg and a railroad ia already similar ones to be organied in just basis acceptable to all concerned, und their rjoleon * * parties concerned should' be arrested and pun July 29. every county in when laying down the pbn Another reason for tho projected to run to it., the State, and tho immense in appropriation for purposes of Homesteads thocncouratremont road' the jUVoreomo. advantage tho over Binirjlon ft' Boet'OO ; ixhod. The la w provides punishment for thieves An act to change the county lines between ; of , iiskj'atio ,. und : improvement of stock .nd iii flflnr.nr lini to *' " from agticnlturo horticulture Alps < arises from the threatening St Johns and Putnam counties. diverged a straight + change and fiu man, either white or colored, has right 'Over twelve hundred emigrant a from Scandinavia 30. and the mechanic arts, hoped to IKJ gained by of Common Schools. juring this tree. The honor of supealO' ':; rerplutJonaiy spirit: of'tho Democratic take tbo law into bis own'hand*. : Holland, England and Wales wero recently July the State, by tho* aid of those associations. A i;. JtftvleAt That wo invite all who can bet. quity, howeves', is claimed by some " Contention; '. ,lieU in Tallahassee last received "at Cost In Garden, 'N. Y., by ,An act to transfer' suits and proceedings m committee of three 'consisting'of CJeorgo. C. ter their condition by a change of homes, and the immense and, venerable; tree uiC, the late'courts in thii State to,tho.courts. White) George T Turner and the especially the people of our sister States to fro . Tunis HOLDING Counr iir 4TU IJULkUT..la .- agents of the Mormons from Salt Lake City, to organ recording secretary com* Cd, California, which is supposed, fidtafj&f J id tim determination ex- or whom they Wore consigned, and forwarded west ized under the present Constitution.. was appointed to solicit subscript ns to with their strong anna, their useful skill, and number concentric ciiclc* in the.'e woarly, .speaker and ( );County, lit)Monday October; Bradford ,by rail. Oypr two thousand more are expected 'Jal28.! pay the initiation feo of of this association; in their accumulated wealth, and, casting their two'' thousand fire hundred and syP'i'1' .." preaiwtiy: every 2d Monday October ; Ilalcor, 3d Monday in daily and those wU| follow the ,others. They An ac.'toorganize tho Southern Inland .Navi Agricultural and Immigration' Association fortunes with us, partake- with us tho inviting old.- ,.. Democrat present, to gation and Improvement of Honda. The Association ''will hold its attractions this section of our common _ cheered by every October b't Johns 4th Monday In October are -workmen, mechanic and agriculturist Company. next coun -f the ; Brigham Young baa a contract for, building a July 28. regular quarterly meeting( Houston' on tho13th try, a'nd that we ass'uro to'all a cordial welcome, Several persons voonted&ni1 & inaugurate foroe&Wa opposition to Xauau, 2d Monday after 4th Monday in October part of the Pacific railroad, and these ,poor foreigners An act to provido for holding an notion for day of October noxt. social appreciation according tu their personal to $Jifi banhmeuLau4fmprinmefl"' ,$ i t;' to )reYInt! ; Dnval, 3d Monday aflw 4th Monday in.OcUW will probably put to work upon that Representative in Congress. Five "named. worth, full protection in the enjoyment and ta for participation In, a "Snttee, 9f\| \ Bill negroes, Morgau Smart $ expression of their opinions and in tho security burning with the body of her 4e d ) i lile, the freedmen from voting tuid' to fr4t highway nations. August 6, Walker/Alfred McCall, Dick i Kelson and Hezo- of their opinions and home, and a friendly and contravention ot the! n ti1j1.. _ --, - ---, -- :: : _. _________ ------ __._.;__:_.____ __ ---. - p - . -' -S : - -. " , -.w = - - ---- - -' ,UI ltt Cmlii. i3iMIIoumn to-dar:I cra al duU at T1.aiMgJtmartnhfta :. ax'i ,: - t. -ute of T3 fZ13; lull TV-. i : 7: inuring dimabiIiti frunafl ctsuue ; l1uwt4to V T 1 tfitlcM *aV oc7r'li'CK : :.:;;. 11 4i1 ir .Uaa.JuiIe 11)1* jtrJtad L n diC1werbd g anety o1 jh, 1vl.r N-tlrr, cliicflv utt low j-n Jcs : uiwrfine omens Ot7.n tiwittisi.t r E1t.r .1 UglD 01 tue e.W si W. Dsp', s.of IWt.r fifty ft hgh.C T'reeiden1i1 lLtiumif&e,,.. *< rot .V> ; ertra, fJ 7v& 11 edt ._ 'I ,diicstd a.. &hftt ,csror4iftary plamt J haw ome ate and wa cent to the !Hpuae.AViLJiiKcrrox X ; nhs.wh1ttaH.tan.tiVO.l3W..; j jCi A. M. to 6 r. M.'except 5- r, - kuu ) 4JC.k a> wlyH" engaged Ju, tlm ..UnitedrHau | AuKiiat 7.-Thw AIiry 'arf..jd : nil Gwrgtt. fi* > % & infvej,**1 f f51 t i IWnIhy *" ,.- A. i cRTaWPNT T . , aid Hekic nJQ jan4iprjJ Surrey, few struck on New IidiJ bar :U M''.. p-iin. )esIh.. Adranriw : boud tHe. : N Tur7xntiiu higher, M. Ji aincr I oJ'in vatious diicctiona There atcamflm atv'lijhtcr hi.'r% i t CLO8 >& iPliysioian . years carj. JULTIHOIIK. Au, ii't n. Coirox-)ul! i t .T> Surgeon; I : where it grows &nd cnude the meat 5IoxT Unux Win-fit nil, 2 1k,. tt ni wtiit ,, | .- ', l; uchwi the ivgntna iOMin\-, August ,3,-Tlic lIouM lhimurnirij "*" v. y thioUtfli 1r.stt | to Xew York, W.* ;JAVKSOXT1LLX FLORID ' t-arrfol Arawinga of many of.these plants. t 11 ia rcjct-ted the Senate bill by a vote of 13 n'iti it CORkn 4))IF LAUCA -L - -f; WHt ALUTnwj be! *, d rlnf UM at the ttne< > day Drug r ndfoiidadoiigUii: Ijor. pfi Vtrr ' tho ( to 2 the - ''sM& -W t9 tAhe anl&1atuaso-flhimS, XOlvrarn.I \J &'1)eliet MUtef. .- te > IkMrtwfck UBiMtle-- AItI.eeddee.ce of Mr. eiit t r. Trfirii, Ai.qisi 8. Corn, in sr - III which dir .r. ; tit-lk-l ;; 4411 of ja Jffgtjrr iona .iun ? the t3tato. flxtmtho Sic.: Mf*.n |i-rk hell at f J"J; lard ut 11$ Isu ,',,-. I Lnke City.GaincillYernndtna-uloridii Unilrua ,uhnT. HcfcrUt, alter si-jIn.' J ' rt thrtiqjr*4.Pit;;" parts ofIffrwTHexiVo.Arixtma JToinr ?roovicidcrrd ithVlrill and Trcsaeola tc Oconria }ta'lrottd-IAILT, 10 So., a. tt. ,80tt TMtlri at the-Hime. { 110CSE, &iiI U* SUtc of Sonora ia Alcxii-o. < vote of 48 to \ JI.IrctT,1 :. .\ ,:. 1'- XiiT.il ISInres.--tfinrt, TurpeuIUneattiiiui'.l iii-nlnaml Tamps, Mo'1'ATs, TVtiM! >Ay MM riiI :-r-r'; : L ,-- JL ! by & 1 8.COLVKBIA specIally prrjwrwl l I tent ijrn!firm tt in . owhg4blt 'drygravfiiy LindV.: whero UIP.O i i01gdcmt it, Augunt 9Tiip Itniu'r'mntje 1 II i.'rsnie4. 2 13; Xo '., lj41,2 4ro-t; ** ,; Ce4I,1CU&TriIIfl9UTURNATi., ios a. I ;& Edwards .1C D. during the (til an>l wlnt I sflT 1' .ertjio d.nr. | ja At &d ajpiuoa I Electoral Convention hag just r itMsUne 1'womlaywr<** rs Jnr and ShiI tsrb4s, Th TABLEd are adjourned. urnlMxt by th ) _ _ tw ()ps.i ivxJAnu. 10. -Finnii.itSterlin?, I.HUV I 7 a. ni. tby stage.) ficDathrcr Tlic tw"l, ti' na endorse the platform, expirs I163 ; Xrw Vik >islt *, |irfmiiiin : pulJ, UK',. !' ITp this liiver, through !It. Ui-terpri*, IHT steAMer PHYSICIAN & ; Korth. Farmer tad feet in diameter, with taanjbranebex.. gratitude to Andrew Johnson, and return ( on.Jhill : M l.l.lliiig 27SC t J k- : F.Vcs. :'-' t.uli'-i; !| l* l IlllglOII, -8l'.XDATS 8, A. 'R. JAjuJ5s. I --U1Wt Tratnivut Ruotiiur i> ICwkrt Qudtner. In ttinfljrkeiiiTrtrvtr'W d nVMMhire inrhMof thanks to the oiliirn soldiers and sailors c lti.; 10: no epofl.| : ; -J. on rcKsonablo tcnu '. sM.iie c JS'orth oi1 of UM MW.COTTOIT - Flour. J82. .N5i) 91IxEraa. -MjjH-iliiM OPFICE : 00 0 0 the-outer'rtuf| ordinary enluimiarf-acti ; who t4jsedjhiryyioijn behalf V insult(.4 and < .- Corn active; nl !.W(V.V l Oj ; ,Mlr- aciiat H i S *.Usal l.vilh *tiwrtto*sa UM c. tlnA cctmn $ portion nt hard, wtmdy nuLctsnce.iff anil oTifrB &l frtcdobi. lls' -Active atf H ng.Meiuv The i hrajieM to nny, safest i,irt and of mod tlie United ospiditibiu States wa ot &a\A-tlb tJOKKKJ: WCEAS AKU !!iOAUg' 8TCBETWy. S C R E \ B -. A3OJ MCB, is bv ? ifpcft**** tn quality like wliitc oak 1 imbvi, On motion of General Hampton it was "!1k- Proviqns.-1'.rk active nt #tO Si( ; luM-r : U'it, :'|'Postal Af'iiH-y (inter oyctem now in openttian Bt ttts s pWt.1b .Hoarrib, IBirtl 1 <;i/, s clrnr, I 17' ! , vuo-'l ; liiiuir. . mjar J CXWN rit.LE 1.LA. Lout4Utiird of the Iiamhr. , 2.j nit ( and ovrd! That s . (lC vrhilcmontcring our prutcat agsins lt2li: br'l, l5''k;. I IUII oflUe.i I 0 :I' ' Onlcr i.'suitl in uinounta to suit li*wr wlU ha,.the h a hollow. t1Ia1kit Ijojoihit pun $ Zsm.rue iv- the center ruction Acts, tc& _. in wt rrlj Few on fame, Jit and under, lo tU.Frmn ' it t.ET"S. .I"!.O-Cotton Mi.M.'ipK: a I IJt1- : s tli l treef foftmtf. "The:trtflt 1thont'tw6 nnd 'U half lluee iuiitM iidcntly on ecnMitntional agencies and peaceful 11 t,1Il.,.. ?*Mo50, 35 'i ; MOLXk. OOK I1OCS . long, filled with' Tflr.V sweet pulp like that j jit measure*! alone to Anting-us flfaf relief sought 4 'A I : *. ** .* .- IJ'ustal .TK. IiatEEU, IVst M. DB; ; TU.E T. 8ABAL, The at oTf Ch rl.too. H. C. MASONIC a < afl$, *A many Tefy nall shining Mnck and reforms needed. J, / .- NOTJci1.:. I_. .%. with all the f oF.PI,9; 'cdii y -he'onUide skin is not eatable. Thn The proceedings were entirely harmonious THE rrtiliu\iic .>litic4 of ZtmMalvl (1.njifir.| | D'' ffte/es. Ilotrl, has ,; pant t for Sale. flowed J *hUe. waxjtwo and on>tJ.rch )1s.9.brlt '>n the lit an 1 5r llguv (> C ,. .- Over Frank Smith's Grocery atoic, id floor j .uetrd , diamrtor, with ft doep mylx, making ;hc 1iding to a recently reported uttcram-e of his, : 't' -rvnntliC.3' S '( ifc > \ ii ror- occurliy i ptraontii'it -Ertiag; 'Ute'foU SA.IS' LOQJoc.LinseiUi > Patent Vrtyntwt Draw Md Baner JTMltor vtsi 4I'$ $ aM.i P' ?.1 1K ? thei ed bjr.cunm'Qond reproduced in Northern papers, in refurrncc to ciiAnr.ra I.. PLUSSKK v., Kt-r.HAI.SM..ma E.'>11.VT P.M I 1 ,l.Iiiu e1jiuu-tiuj, 'PiII.I jUbhICLtiIil1i.I jIJII$ I.a..depo-ltin-j In < Irttrn for mulling, Jmpcrs:br mlsffiit Floridq. tFeb.2d. 53--1y. | T. S. 3.'boot* .hikst'd*. Jltdnti IK*BMT. burM Uow.wnod BMIV se .i, IheJLL I )Icxi1Uai idi8 ji.Thiscactua the Qonfcdetate flag, lie said : "This statement 1 1i LlJnt4JlI.L.. nku1Lh, 5 baIt 1 bsdtd, .,sd make. ha., - 1reA 1t& ,:- k Pt in i-ofv respect false. On the I $'.tifll-| ,. oi the TL.1NTKK3 to U crate per bushel than any tber :M ; muM have becn well known to when T rpolfe of the flag of the Confederacy contrary 1, MASONIC: j wiihiii' I'repu.riisetit ttiv Citllml by btaniijlre.l 8t&te5. ii sIIlettr,to J. D. MITCHELL, D., ; Atlanta The furniture, and >i< SE.*<<)K | I will StateexceptOeoirlallm'exchange tin *a!. t far FlerUe i r the Ei-aninh and Mexican ptoi'le ever since the rcmarlrol that it wag now ftirlod forever, to lc !! T11K riiiiir! nu-rlinus or Htim.:tv 1..sl.1 X'i. 1"'. 1-'. full iTepnyiaeii l.y Mninim rp.uirctl OR all transientpriuir.i rur'icii: J? ASD HUUOEOJt : scription, the room | t. John' ttivwWptwvel pwJrrrtO.ae>T*r ttlcine l of thc* rautra\-c four.4 it around buried in the grate of thn Lost Cause." I' ami A. V. M. flil.J on th. I'ir.t and Tl.ir.I) Vri-ldT '.1 ,ni.atcr foreign and douientic. hute'laM th. : to esabark hi e ptnkutrat s4 ]Mr1i>j( the fvcrv inonlli. ( A. T,'. LA\Vs. TV. M. Uy iiuxu-tln tho County \ the Qice is Im-atrd Oflfet!at his 1brm residence, eor cr of Forsyth sad I IZCII I: bouth. in Pbrda.TIjids, Maryland er any of the old nuwwn rttfemcntfl.IJthforiRb aeurly SEW QJU.RAVH. AugustA bill baa passed/, ft itr i I SMJ88EU, Her. \ tlBBBKlMBIViW upon nil luttriv. nianyHirrura in Hiipejsalpiioa mnyurtleti Travelers utoppinpr nt or (IuU fftatea waere weod st soil be tfLEGAL. sea whole lW g* **tf*)**' *ntyf>f' tmrTtt '"1 Jot 'l the House forb.dding thts formation of Military >i "BWIMBV HM< HV had n Ter bwiQ properly d cribed or illu tratv unlHc upprr right hnn'leornrf Th- proprietor pleitgrs xa Cpu CU, ) until our partj gate attention to tho nulnert, This j is intended u* a blow at |x,litical clubs ex- tIIw th'ttticincnt, 1'Ont, uud niiirkin-j leuve, .without j tee butwetn interfering lh s Ktumpnnd with the direction willing.lor ., .j constantly forded wither supplied by t.),,' I 2O TfT. Hofliccltural Societj Late a landscape; : islins almost ever, precinct of the city. All letter can led outside of the maiLs must be in (J.t>- I - byjnjaelf, and Jjircsontcd th ra by our rnimnd Xlumjirii :sri'I'ic.i. Any Vh>ItioU of this law I Ifeul'jcrlH B. FULLER naintad Northern New NOTICE. the eiurier to a tine of I lid, J. S. SWAIM T E V E , . . friend L. M. argenl, Esq., ron.prigjfir , lamented IS. U. .1 reyutst/nrllierrltirmnr Irltrr (.Uif icril'r, *'A View of Magdalen TSonora," whieKtfipfrfe ) Ni\v YORK, Angnst 6.-There art several j ji "TlTIIEKKAi', my wife, Elizabeth AVoTll. lii. left niv if uticlaiui'tl within thirty days orient?, written or pnntetl - t rrect idea of this! and other cacti, as i ilh can* of yellow! fever in the hospital ships at ; ? V 1-eil nml lioard: all prrsoui ar-. warned, not to trust vitli the wrttent name, /'Mce n g' State ncro-ii Justice of the 3eace. ,tllt 23, 25 aiic1 1 Street New Jork or credit heron uuiy 0tit1Int, its IwiOjucj u-jd'-liti>f Uw tiM Itf)tl'juid end of the envelope im the fi.ee side, will City in th* vicinity of that quarantine. ( ipt. Reed: from Cionfucgus, and , iww growing j *n tOni IItIT1 after this h'te. IH ouniplie 1 with.I Letters y ) lieannu such rnd< I J <> > >osUe ir eraeii j i I lila ofBf atI one of his boatmen died of thn blwk vomit A LL k-usinesa pertaining to e promptly - yes- < will !he rcttmieil to the writer \ SIVACTICI* .5 /rce of FflJ1)EUCK WOLFF..iipi.t fntt.tgt. I I A. tended to at the office, Summer' buildIng lately j OX THE :*! Jiarw alto' at my studio, painting whichiwta'portrait tcrday. ; 10. 1S1 $ 11LANDFOR Territorial. : occupied by A. "W. DuCostH. aug Hf j AN1.8TAflO.4Ar of ene growiujf on the JIaiicopa 1. Anjrnst :7.-An engine and flirt freight carson TILE uTRvcs i Suwmtain-Be. 'heUilarivpr nhowinp the plant, the Xew Haven Railroad went through the i SALE. All nialVi-r ruuvcycd by mail -westTrBrd b.yowI the | i ii I the traveling puhiic. -. !: ZOJZA'ZY the flower and frnit, being painted of the natnral bridge at Norfolk, in consequence of the watchman !' feti-rii bdiindury ol KnnsuB, and utwaid "from the H.:: BISBEE, Jr. < to merchants and , eastern V'umUry of California, ejux-iit to tho businciw of which with other western negK-Hing the signals. Six I\ TN Vohrrintwinty. nrw Nnr-fmrnnt nnJ ivilhm Iwo one liewspapi-r i part 2 TO t3* nORBH 'OW. eeViul: .color, persons were to a Ijmui Jic iiiil>Mriber frniikcu Southern and TVe JL iiiilcK of na i .iblr water, u tract <>iiUitit rl ai-ii-o HIM mutter, mutt bepxcp.ii'L i ATTORNEY AT TL\T: ; lern Hcenerr I am happy to slww to any persons' injured. at leUei .itvs. ,| principal Railroad and $ Circular ant CprffM Saw JfCk, Sim who wi h to nee them, at Xo. 8 liromfield street, UOSTOX.; FIItST-CLtSS HAMMOCK :J.AXD.) .- ira eLASe ftp i.Efllk5 &*C 'er nr. AS- 4 The 1Ilis. and alt ktM.OEM1nIa aM 11M- 3osi'i.Villitnus. Aujjubt 7.-The biis: Idiur| tioui ; "fa-. -*- *. 3*.- '."" T&atistpr- ; : rricft is IISEG'S BI.ICK, over 400 guerta--k is ry en hand and befit to nrtnr. the new .,tablibhmentof Tlic >.,il i H aricli ctablc mould Krliii l t modern for jrer Cienfneposjs an anchor at quaranliny,* ilhtli> uu< < with marl. Iraprorrtnetit Pull.Leather t Erwett.-H. ('- I'zatt, Ikwton, i iii .Y. /;. /-/- yellow fever on hoard. The captain, his wife" j j aui.t l is lniinibly mlHj.tiil to Hit: growth of Hup' r-'Mnc Ui.s 1. it Litter iineliiinieil, IKUHIIiTijiii'6t, .r to retained to 1* a returned spcrined t*tlm the.vri-l- ti i JAUKS9XTJLLE, L'LtRIfrA. t of d its-prarliteU inmnl' with The ass I ,.,of Iron and Woof.wsrklr4Xa.Wa.ry.sail &ihbse - A XI) KKMI-TKoriCAL and and two seamen died on the pa sayc, and the | TRU1TB. 2. letter. for pci-H.ns who regularly call nl or send Ic 1y I prompt ami respectful- the lowest Raflrost-npIi., --- rmtea. 1 mate i is still sick. Will! Nolili'liiMn) furrasli. A|ll1'l at tlii ofli" lL'>Jst-lil. yided with every itcUc j jrAtes. Sotrnr.it?' Giuw.s.-TI&j Koutheru people ai s' Anii-t-'l If < .' .. { a. Inup and .iCt4Aflui,1lctlers' rrlnrnl twthewritna E. K. FOSTER, Jr. STEAM GAS - h Mcirised on.the ubjactof WeateruO News. jt iiviulJiclioiulLuttcrofflee. ; The r.onid lmvm< , Winning; to ImTury nM J. J.etlvr direrteti to tit hotels pereom nBdTcturnt4inmi ; are ennlileit to oflVr extra grawcf wutid'' to their climat Many ,,' >IAIIA, August 7.-The Democratic) (Jim volition All Wanting Farrar in floridar'hrnlt tlieiicv to the ]I'ot i.niec. ATTORNEY AT !1AW..wN2. pleasure.rour gcmtt. plantemia tt* 3t i.3Bipoa ible to grow nominated James It. Porter for Governor. j. i'. tier, whKh tb T parties M4 IIHVItlic eel't . grea.p1an zgtioi. *** Kesolutions passed denouncing A L-GrsrIxE, ?'LA 6 ly 40-Gm. P1PFS geMs '- were C4'ngress 0. lA'ttt.iv:utMresmil to ]lrons! kiiovm *o l.e dee..e4, , ?. pinion. for impoi-ing negro miflrHge oa Nebraska.YOKOJI.VMA : Florida Real Estate Register. or to pi-rwiui who have rc-uiovetl to plxcf uoknortm. ') : BOILER )LVs Men WhO havIi seen graeaos, coarse indeed, but 7. iM-tleri ,iidJrei<,,-d 't. penons who hsv r reeiofcd-. , within the them- ForeIii Sent to nnv 'Mic Hon it-eipt] ol & t..iinp lu pr-Iay> bill f lioi n st olllje addre,is known. -tf. ; E. M. BANDALL i i .f Br ..and Iron FUttn.iTMM, Ja_ V tropics flflthCiOt. growinjj po1i1t': ; I.. K. JJKWr.V A: fo.Hoeklaud Olli'jiiil( letter, lor nny Uei rtni.n* of th- sorcm-I / | > Steam sod 0.1 PUet'I wlrflCrSwy b. xcued from-bel.cving the South Japan, July 4.- -The Statskashi july 'J I I .Jiir-ki'tin-ille, J"Ii. meiit. : I I ,I bstt swd Iarsst incapable of producing auwe ort of prasd. family Wldl'C defeating the Southern Confodera-I 0..Cir.-iilir l/'ttem<, frto ijuikctrtvOBtalniuflncumiMitr. : ATTORNEY AT LAW .TOHN prtr u fend s.sset for Priea a I>t u .a4 K) at rts , A variety known as the Torrall gras has lionists at >oint. Yeddu and Yokohama iteaK> intended for lemons on Nrir I -0 every j ol d' . 'tit.tlIi 'iiiite; : Lime expected to nrritr. bueaintrodnred in Alabama, and is very highlypokirn. wer'ngain under StaUbashi's control. Stats- ; iAcxsAArzLz.r, FLJM; I IOilI. \rARDIXO AND NEW MBAJIRKZ.f . 'It ;is sown hi the fall and grows Lashi had refused tho Tycoonate. The nflicr: Jicffish'.r Office.VMlUiiliJ . | mi )liun.l and Inr *i l* i ii loin tn -ml.i t I y 1'S0TILL throughout the winter. Caltlv delight in it. was then oflbred to Uomcsboro, aboj- six > ears; I Cuinlaiitly RlrlI.u:104N|| : A. r.AU.NAKl |..ltirfur any pait of the United &tate. In lhe> Uain Buildiaff.Ttay street, up klairn. 4 tf , UM Moottlent and eweet, and it ia believed to old, one of the three branch of the Tokugawa July 1 >If iyaiinih"? : ", On.i (',&ieila. ary at-UrHaln, Iidnn4 i'f-Jaiisj.a. ll-lland. thc UKOUKKIKH. litiw Rev1I l gr8tTadliti0nrto( the feeding n-soun-es of family, but his f.tther refused the honor, Ithhtan4tLtt N1 OttIIe 'ftJeniii-Austrinn rtat t LIQUORS, D8* dating SANDERSON t:, I J. P. will lju re-Rlcred nioii, on uppb< atk lictwevn the AOBXT rout THE : >u Salt thaTiotler regions of the South. that he denied the of the Mikado ( .r in.., aWW fDd. authority to : ai cri ci hours '>f A. Jt.uude I'. M. ] I : A. U. Rct-A1 Speaking of grass reminds as of another iod- appoint the Tycoon. The Mikado is now in Ki-Kirteii.il li-ttern, to go the MIU djy, innat beetl haunt- : vrrxo3Eij>rEr3a" A.T x.A.'vr, I I June 16 of aU jte.buRt t*rde and DMUlcn Kt 4 der plant which is just now attracting much at- prison at Kiolo, and is. in charge of the High i Ii : I in I.IKJ h nr hi for-- the clo-inj of the mail.tnpn JACKSONVILLE, FLA. I raVW. - 1 en lion in middle (; oria., It is J Hiff:e' Bttt J'ricst. ': 1- *t*, or bush clover. Like clover itself, it bc- I Climate Soil, and Productions, I .Auvi.t4-tf .1.1I | HOME EVERY KINl> OF . SAX FjtA.srisco -- -- -1. ---,- -- -------- - natural August 4.Japanese id vices \ ; i.ltitLtcIItioiIIM! i calbil ;; I I longs to the great,,. order, JjCguminoKu, lo the Moo OrWtu oj.-- , the1)efcnrrfb) ItVfjjportod.la havo made represent the season as unusually wot. Tho tea with a bkntcli ut itt .-. ;I hun an 11 ante ami t-heap method of tranrniittiD- H O. B. HART N e1 1TAOHIKERY. er in Gworgia five or six cai s and silk markets are dull. The Tycoon has IIiPt(,. -, Natural roAliirt" Smial f 'niudt; iou,. > sum,* through the nmili' Orders arc i issu..i l In sum* 1AflINl AND its appearance } ago } not moro titan *.Vi. I. irirerumouniHCHii b. ImnxmittM j I .A1'lUKNJY AND COUNHKLLOl: AT LAM. Pown*. Qrirt Uil ,AnietfeoMt Ir-j t. boon nccrs&ful in his wind it has I generally military oilration ) 10 thy Mini* "ii, at the .. tiiiv. Ia after a aevaro storm* Sincetthen in-r i 4m' h.T 1ltinnal l or- dumlptiMi stem, a.4 for fcf at MMCOTTOK rapidly pread over the ooantry, th4vhgbzt the ,* against the Mikado. A MANUAL tier... ; JACKSONViLLE, FLA. i Ofli&cin th L-irut-r . hroomstidge and the IJennuda gniw, so hat -d by 1*A ills,, Alight G.-Spanuh lvkes IeIe1.'cnt or KiluUf I liilvnnatiuti, roiv-rnin;; tI.) Kv..>un &- ,ftlin 'Jtutes, will practice in the State and TTmiled Statw Courts ;! staire D.'t.2 tf S QINR thf-ftatheru planter. It lores the shad&and that tho whole power of the Government is uecessary -j! trtnu-itli and,iiT? irhi'ti it vlh-rj t-i Ijrniigiant" t Mi i.rtlcr* mil tuvvdnii; |JO.............. ..lo< enU. ,' .0 *"* ! in the thinnest soil liar has been made Ciuiit1'ZetujO11r.LVS1fIli t >n or-lern ovr and up to ).... ... .. ...2rn .-iiT - gnna to prevent an outbreak. vncral disquietude . Th 1 <- niiiiii-y order irti-.r T ill IKJ oiit-n from A. 51.. to of-which has been greedily devoured by all cxits.I.ITERI'OOL JLU: 11 T. M. JJN: : kittdTbf tot-k. Sheep arc particularly fond of ; Viilu.-il-lr Irlti-r-t a'nould be carried to the office andnsiit.rid. r PRESSES. it is ..Augu 6.-Mr. l>avio nrnvTid A J.I, alfi utcliiilitt| : I Kiiil nilluliIxmlil I li.ixi: .1 ; If niunry IH to l, ivmltteil, a | >ittal monev I (-/ I.A ir ft c.uo..i.er in t'NAX'kJlT. It k said that h. moreover, a gu-at rcnoratorof - here lust 'r| y. I In it- i>rriMr.iti"ii, wtli..,\t n1 j order rlionld I v nbtaiiied > if njiuli points where tlterc{K \g j jaiht. -AJSTD ' j the soil-Jtflt: .jmdt, au--mT tliv iKittlilutit. til *iiiyuj'ju u.lsi..h v>ru toiitinu.UIj TB Beat j I iw*"} IH.hr I irflKv, ihen I he k-tlrr mwuhl be. rf wtfr- I STKAM lJtXKST i I II I () >6x, August 8.-A J-'rwiicli trading \i' -l I U-ins niii.li' nlH.nl ..nrSi.itui'l t I..JK.j !-u<-liv Inl'inii'll'' *, lliDHV xvli'i think "I < oniiii't" l''l-'li'l t t" Commissioner of Deeds LEHS, IUON GIN BYEK 34AJB Cun ute.-Tho Japaneae plant cucumbers near the frontiers Cochin China, garrisoned by ci-it(, \\ itt !I-. niiMotii Iu iilitnin.Stlit I I j jFirtfXK Order in dnlle three or four feet apart and bu 'h them twen4v.fivemen, was captured byltio I Anamnlxjs l-y iiaul lo.inj s.i.i- -. i,it i< c-ifl uf IR ;-lil- Mimcy Offices. : --FOK TUB lUKFERKlfT STATES. Kotjic, Drown, fiouta rmywi W aww A and the entire company massacred. 1 he KI-.lHttllA. 0 o fltiatai r4 like peas, with tall brushwoyl, arching the top th ; T.. F. UliW'J.T A MJ..jnlj I j .\'Uttl:> i C'oluillbtDt. w.N bws se.ctruslr4fFzis., ; sad ail rappHn In Mice, far & .1 tte together. IteaTe apace, avoids trampling on ; Frcm-frFsiiUwquenlly recaptured" I .i'l; t tf .Ji.-kiu-n, itl P1',r.l.i. A mi-lien*' \ Maix 1 and dicpcred the rebels. .. >n.AlU.im 1Vn putctice in nil the Btate ainl Federal Courts in I the rine in picking,and securing n uniform development Milledrille.. J.Lyt'LLM't: , Florida And in the Supreme Court of the United ta4es, 47 Strest New Atlaut.i; Koine. Dey Yt of U e frnit on all sides. si coBort all claims against the TJnttcd Stitce. Aiig'i.i&i -aitith. ----- - 'A T U. S. Marshal's Sale. XJ-AJEUS onrv.r. E'XaA.- NO. 3 --- 0 Jules Farfe has -nnearthod rich docuim-nt t'L'JHI/'A. J4-tf. I & Lot d.I. a > _ r'5 . ', Ja.l rt'iitill- . ; . 'rallali.iiicr.Kiy till lie of n writ i.f \ fiWi-ini > //' .u'', t" lu.j'll-j > j - which is cerisla to produce a great'commotion i **""' JAK os TILUC, Auy. 11, iM; UY _led and delivered. I uillwll at puhlif iti. HMD lit j Wt-t I Varruigton..II. 13. E. PERRY A : ; in Bonaparte Qttlee. It ia a petition drawn up \VfatliT-wiltrrwitli lizht shower. Olitr K.->N Florida on Tl I IUKS1'.\Y. t hMb! l.n' t>f'i .l lit W.I. , in 1846, and praying King Ivonis 1'hillippo to I Unrett at 7 A. M. 80. 1Iighet i AVOUST, IHTA. at 11 t'i loek in UKtore'ioon.. th-- Mmtji I r* flAt 8 in Store nml ) j P. DEWEY) CO! Kar Louis marlialod ': .. .. 0 j jr. mmi.- JrniirKI... b'-r l l.MIti taeLI npp>m I niwl l tiiinMin.M.EXAXliKU -. 1i.v,'. fni04y_ ATTORNEY AND COUNSEtt ,, Jlo1* Fork II - court Xajtoleon Bonapnrte 'S 9I'.M.7. MA'iltl I j lU.i: l'.r.Iiii . .. .. ... ... .... .. torgsa. Chete, Mackerel ii j --_ 0 and shot as an enemy to the peace and tran- M jm1nncn turc f.Tr the ek.I. MMr>li.il of IIIfnilv qtility of France. Among the signers of this Th" Itaroinrtrr lm,; ranfr l from .i.UI.'i$ to JU4'N i i.Amount july td"i' I Sic Northern I Iit tiit of I'.oriU. I t '.Hut It-r. 3t' U *.URT S TtEET j! refined Jteptfa, vOU- I I $ NOTICE OF APPOINTMENT interesting document are one of the Emperor'spresent of ruin Jiirinj: thc week A.C.1O 1 ml 1 iml<\ illi .. . ............... whfc&waoateni ; .. .. ........ Nor &Iret I Court -of th United SMto- AW I .1.J II. (tpivwitifii founder tb.o14nmid t&0r- Uu4iik. ..., .........Mol.il Boston MJWS. \ w v : i Ministers one oi his cx-MiniMcr half f , ; ity.inciy....,.;;.. ..,.;.. ..MontjHiHiry : a dozen ultra Ikinapartiitic members of thoCorj UST or IJE1TKKK a.lly Known hou of Cirovctlmjirt: Co.5 1ir1u,,*......... 44 2r *> Northern District i of Thr ,. Legislatif, and Lieutennnt-Coloncl (now : .- ,, ; .. .. ...................rnkIi s. Wa lleIMiuiI in tinJi''k: mivillftj"-. .\iuu-t 12th.ISGS. I ';IOVKSTIEN: : : I-TI.LEKA '.'.. I ot J nm K. Ifarruoa. aflr1a K. Marshal) Canrobert. iF i.'iivii'i'i.I FINANCIAL. it Qt '\ FJC Per Mouth may coDcrra:-Tae atxfcntxB bcr r Afl1flton ii TurLu.U J'ime t tI ."..', Mi-t.rt f1!., X. Y.i '., '.. ....... ... ......... .Lowndi i". .f qpl IO insf Maeliine. of of Cnuilurd his wi>(winuaeBt as and swigiM State*of. Jaau s... Tl e lnk Paeific road is I Addioon, James Thomio.n..Jhn (,rtuut.lj..... ... ...................... ,il.tiu4i.. ; FREEDMAN'S 0 standard mivhitie8 in District, who county hzit beea, adjnjrd f >l irUa, now completed ..... .. .. low price of .*ai. a Kukrmp4 I5.on Mr Turner, J J{ PrATNoFORTEs. Holly Hpri ; .. .. own petition, by the ZMatrfct esaxi of <*4sin bvndrud miles west from Omaha and the NATIONAL aajd Hry nt, AllrcJ ,ThoniMin| I3.4fM .1:1.-U"ll....Hinds.Mttilii I JC.. Central! 1'acific two hundred and fifty milce cast I Jl.init-tt, .In" W t, Jaino <' ,...., ..Iituitertlalr_ BANK S junc43m Jnlrll, 1ST 3wj OlEi.XTAmIja.o. from JSacmmento. Both roads are being (iotlevMriP. M lwtjet-t ,. i Tlic.l. Bl new c-litlnri to our dirten i lit hlyU., ijiltiarilux | Nat'lie.. >.:.. .-.i'.:.". i..;....Adaiu*. SAVINGS I _ _ pnnhedig ti>x, John \V-; -P i Ihv itduiinittun uf Imtll rntii uud Jtoplilu.'. Vg j Vi'-k'p .,/i. .'..;.. .".'.-..... .Warren. I I >rously towards Salt Lake City. <3inch. Houston Lu.!! l.i.i im-iition *]>< -uilj! >OL iul tlic<.UluiB ,f tlii- iw I'lnnu. s r- '. FAIRB j NOTICE OF APPQITMTI i Lewis Ales Mr HcatnDennett 1 ltcivhiuicaoor uhouU be na iK-.iundil to ihitjr : : , Ii.-bruuch, *"T tTKUECO > TMK RATIOSAL FBKKDIIAK'B 9AYIXSS AND f u.t melody lo the ear, we liavc paid gtc.it attention to i Cmtrt fa United I MmBrUbric of State Fox. TliumwFJoyJ Mv \ftllC SCMM ART. selling tnetii iu u style lliut H W"ili'.l l I'V ill who I II HatMii: Ui.ni<....1::. lilt. KuU.Monroe. I f.r Sni.irt LyId1l.4Fu4.a uji ... .. ... \ , )IKITC H.-OH Ihem to U- thy liiiiiiUMUi, I'i.ino-Kortr made. ., .OuiivhlUi. TRUST COliTAXT. ] District H M lilitcli. Mm tf FlorT4. iewa. *. C3t1IkI.1 ... I entirely new K-, with tour inuu'l con.i-i. Natchiit'hi ; .. ... .. .NAtehkwb -0- Thov ( $ ltNsUuugs. Tbomas tttker,.1tn. litKi-VJIy arc'hat 1es aud t.\stj rt. Ixuc ruJUy ..mtiuUcd, itii'tcontain j 1 bet la...... .. .. ... ............St. Martina.hk.im ) 0 OHARTERED BY CONORES \ AT I of A. J. T. Wright. Zeaikrspt. .iusIoTo August 6.-The President has llarth/Albert Campbell, Mr, J M (;ia : 'our Uitc l new ocwl"1 and ai-tioti. Thittie i ( ... ... ................ .Orleans. ]1 it may concern:-Tk* tttdenign*, kr W.J. acoefted CommlHeioner KollinK rcfaignation Jackson, Thorn yull.. Mrs CnrolniJ'anraiir. -- mt-lo4io suit /Mid.iptability to |>assistt< of eT<-rr'; < 1j'doiias.| .. .. .. .... .. ......St. 1-aiiilrr.riiucminc I'WNCIPAL I "t>FKICfE.WAaUINGTONB.Ci 0 of huii appointment as assIgnee of .5. T. without any remarks on conditions, which still Johi-con. Kphram.Win Mm A Tllnwiii I !I iliHliof cx s |>-ioiitfroni the s.fl't nmrim-r.' tin- Cnanndo | ...................Ibeiville.* S -, I *. f Lake City Columbia cottars,and But *f hold. The is it Llsrt. M l Johnson, Jjtuni ami Uic FF, uivia thu portoriiu-r MTV .ail..inlue Mt. Kianein\illt:. ............ .......fV. Feliriuna j BANK IN JACKSONVILLE, FR Dutriet, who ..ha teen adtqaji a acceptance a iss&id mere J II Mho i eHXT formality, MoSep, Cfu In the Nurtlierii 4lal all I'ost Office his < nmrly arc oftliei-niHTrt graui.l. 1'rhf ?VK). jiiiySOly) |I upon own petition, by th.- Ihstrirt eeart aad doe not change the situation. MerwereVm ''I44flrMh4s11ar iu ,uIi.y I,rl"r 'ffii ., is located on Bay Street, here 47-tf. J C oitEzj . There ia toft authentic information" McCormick, John IctMm Mary 0 S I( 4 ,- .. 0 .: 11, 1565 3w. regat ding March,JI .Moore, Ur 1} A | HOUSE TO KENT.i J'oslttf/c, Depoiilo will ie received uA Drafts paid.: ,; ... - tie Executive' intention relative to Federal in- Mjnn.o. W I: :Attack, Urn I JJlni (I "latetiw*allowed on all earns wf Fire 1tlswdiap. forforrnoe in Ixrnitfiana anaii I Miuon. KamuH 41intknev i A in-atlj linirhe.1 deviling ll,iu--e n-itli live u-wn, IIte.iu.4ttt'; on letters to be forwarded m the luuil to ;i I wards ; but deposits ef One Dollar are recetyod.f'BitiikIourslOA.IL ssignees. I'lunkett. \ ,1lk ROTtutr any part: of the United State* i-i Three UenU per half j jTlie to 3 K M. i I . Funny ,.Ueneral Ktlpatrick Minister to Chili has to bLO1' OH Firsytl.o i-lreet, net! to Dr. hurtri.lgc" - "IuieeraEvAtunrsTnips. ,.. >bin onJ $iaith, Mrs Kllen : w.L.'oAN. leave uf aLaevoe, and returns home tho first of SlrwflrtJitcol. XI &amik. Dora Aim i i'ii.1"n'. u. J-r tiirther partwnlnrn I,. W. in-i'iii1'-HAV1.S, .it ;portage uiilclti-rs dri>pi d>iii tliit IMlk-e, lur<!*- May 13 I, '7-tf.. Acting Cashier.REAL MAIL & j [ OF APPOINTMBKT. I 8likney.. Vf !>' Fric, Mri flatly jmnr 11 tf( Furniture room neir: di].n'. | livery in thin city, !hi One Cent per half ounce, prepaid S. A ugist 7.-The public debt statement fchowaaajncrttuw I i Kiblry, C L / \Vryrlit, Clara IMARLVE by htain p. \ Court of &e Umte Sitf t for #9 TrAnsient I'unr hleU oof-nhecU TtooktiiiiiuUii. StcvcnHon W'J Nt.wiPitlN.'Thi l l |> , since tho first of June of ?13,288- J I i:. II. HKKl': ''"A'1IU.U' I I Mantuai-iits. SiiniideCardii.. Vhotoirauh Curds.Card. ESTATE. St I Ij I rtAern 114nd.f Fkriia. ; Hlauk Kn ' .rLaIGeUt -* Majw. Itl.tnko. Taper, UnKrarings, elIHT. - oeanng coin interest is two ( ., tieedri, Ko()ti<, Bcioin. and printed matter, f except u : of Samuel 0. 1tow* 3aszsjt. thenaand) tighty-eight and a quaitcr millions ; NEWS. REED & MATHER, <4n-iiliirH and bookS), will bv rated at Two cents for FLORIDA LAND AGENCY. I j A IAILT LINE it may concern :The mdnfaA hsre4y that"bearing currency is eighty four and a half every four oiuu-i-w,or fn.etlon thereof;lxepskl by stsmps. I XX relays of horyus, I. of hia appointmaat M aanno* million; matured but not presented cighteon JACKSONVILLE. AUGUST 1 TJ, 16'' Post Office Building.MIiilc .DoiiMu the nbove ntes will charged fur Book j 8t. Auxtuitin and of Ocab, Marion county,and Stat *f TWrUa, i imiUkm lTnM.-ul IJirculare, one and not exceeding three in t promptly at ; A. M. District, who ha. bMnadjadaedaBaaknat including two bundrod and Cftj--i>ixIhpTisaniTeyjijidemuitj.bondj. >alc and IMall nuniltr, in one ciwlcpe, will hveharKud Tw* rent ; | J* F. DEWEY & CO.. petition. by the' District Cwut *C aaid The pmomwt and that proportion for a greater numbfr,toone'uddra*, THROUGH \ : L Cwfatil lae tz.sury is 'i Lfj'.threo and AiiK-i- s tr. I .zIp Ilaker. Fitr rerald, eaviiuiiIi, 1'repnid by KIani; .. i Real Estate -Brokers .1 C 6ZZZLT, se. half millions a ,' _AUKHtr.. C ty IVjInt, Kin Chat lv t. Stationers $ BooksellersWlLMuxiMjoiibUiitU Canada, X ova Hcclia and cw Brunnv.-ick Six cent | connecting at ,July U,156*. Iv. ; currency in Treasury twenty- Atiif. .-Sir. 4u. A. e WWI5s, T, K. fayuf, Miurt.Atiff. I per haiti otmee,preimynient optional 'Tn cent if paid OFFICE: IX THE "UNiON I3UITJUNU," nab, Tallahassee, six and a )iif mUlion. The Alaska purchase ; f.-Str.Thullngton, flwckF.ut'rpn.c.cIAiL j jAu luind.Htl .ci 3i ices than nt the tiflicu ol delivery. ,, mwej floea itt enter into this Ktatcment. ,_ I on lierv in Ili .$t.ite,nil ilticlos1100KH. Nuwfo M US1. be i' , Thad. jnepiiil byatam] StCl'nimn . SteTui is .. improving. | or Itatiouicry. ; :; :- - ytuk-K. Prussian Clorfd Mull, ii crul APplNTJCJUTT. preKiynunt QF The 7 -tr.Lizzk Baker, Fil? vraldl5Hi iiiwh.Auff. Mr ll.U line pao , nvonue receipt tda j were *:1 20,000. 7>-Prr. UHyJ'olnt.'willor.Bt.AtiWdtliK' SCHOOL JiOOh'N, Jh-., Ar. ]. optional (ierma.i States Hrpiniin Jlnil, lo ljoRIDi: AGENCY vehicles,ami w Uhrti\ < Private advices from Alabama indicate that Aujr. 7.- -Sehr. Monteren, Onklin, New York. 4t ,eiitp, Out U),inl. |i jp than by stay oth nr tWrt a1ff-S frr-Ou**+*+ *- rrrnr llainl.nrt by worth ISeruiun Union direct MaU!!, 10 the bifl ; : Met tFMrid 7. K* Hattt,1anstieId. Femsadlna.Augf.lclir3rilllinks utomig tthc Legulatuu tt elect1'resij1i 4Ui{ ; 'U , Wintt.Jacksonville <>-ntt>, iivKiyinent| optional. Hamburg by clo.cd MailS j P achy et for : I? ecStrt will pasb. / lIe i. i i lOii'/land, 15 cents, optional. F THK # of Wm.W. SVott. Im Meesrs. Browning, McCulloch Schotield lir>zilN vkt Eiailaad, ccnfa, M.U8T. be .prepaid. .by livroL! &. / It may ccnoeniv-.Th. undenyn MInr 'Nw1RUG i.- j .of his asiinie ,.tt'. K'arts and Mr. Hunter STORE rti-.mi NEW ENGLANp appolntmeM as *of IT* ! as Scward'a . proxy, Markets.Prsjsrol PorPasssceapp& in Alacaoa. cmntr.ai ut of , Ir.Lhls VII American 1'ncket, i'J! CJeli month frnrn j were in the Cabmcf meeting to-daj They hadThC1CCflUeComnnibsion. New York, 10 cent ; M UrfT be r.-pald. liouse;" And ia 8t? said district.wto La. besa a.t4 s Fl'll TIUiT- a Uong 4 d Uae acnion.k1Z,4q I j j.rthe rios lg H'tfliaiiti f e.JAgNVILLE (',.uti.U OftAN AM' VIHK Italy, vli cloMMfJIalV{2 cents, optional. Emigrant Aid Company, 16-tf. : upon. his owm petixfoo, fry tke.)- IefT1a J QKESUTT ( OPCW1tCflI8Iied.S1FPeiOpes AaciajsMev ..c&Qdiljlt what rwrfts VLula.ak J.4 Cz3O7YII.L3, JP J. Jet7 U, IM*, tw , i-aUUinlitU his not yet ACOL-ST 12, IV;*. f\H. II. UOniNSyX lsiis u . Uanipired.. It is stated tHat the Secret of JL/ and IJetail Urug Store at the aliove iiaiii'ilan Flitr Upon all letter and official size envelopes, there will - war, by order of r/erident will issue ary circular I 'l ha- n new ami well assorted tock ofDrugsMedlcines be printed across the eml, without additional charge, PIXWLL NOTICB OF APP I1TMT a Ciiss > the iiiimec, Imainerts and I'oHt-odtcv Address of partten. order coverim/ih* ntJrc ground of State Northern White, |*rbu. full weight *1 W) *fl f'i &Perfumery I and a re(1u,4t| to return if unclaimed within a ifirca 49 Tremomt Stnct, BoetoB, assaohiuellc. t . Uor nnn requiring ,GoVwnmcnt and Tenneww WhiU- ,. time -the whole not to exceed four lines-when ordered T. TOBVUBH EecrtUry. .nrt tflke United SMnf.- th. JTtr troot *. ... & "> this will dispose of an nch that of Mixed Wi slow , request as j Southern- Governor iKilitiluil. J'rwcriplioiw j put tip willi car- tALL Kpeeilio-demomlnation. ] Florida Agency : AVartnouthJ I Fi.ovaHblxNihtFaMUy- AinonKthe advantage S"cured to the public Ity th. \ .f Walter U. Tint. Hojiknyt. action mill be taken in the In- ,..per Mil. : HOUliS, DAY OU NIU1IT.( use of etani Ped envelope an : it may concern '-Tt -aajenn.! fcf bv terna.l lUvenue ,regard to i; Nortlicrn brand........... |? (u 1$ VU First-Cheapness. Bay Stiset, (IJaI.a BuiMiag), JacksonTille, Fht.KDWAltD | of his sppoInti.sM'...ga..e Walter J Comnnssionerahip, until after TennewiMt nn.1 Georgia. "" I,* 1K Ot .HUT the store i b i-lomil nt night, |tTM.iis ilpirinHidkiiitiS Second-Security to correspondence .in Uii.-that \ of fenunOhM.K.aM eowtty, *4 Iftot* al i Extre. winter m-iieat,. will IIJIBing? I t he Mump cannot be removed nor lost. U. CHBNBT, it.1KOPBIETOB5 avid JMstrkC who has bw. aJJadcW i ................. ' tad t4iiacrIne. hte protongid intcrrk-W with Third -Where a request endorsed for the return Jof upon ewm petition/ tke DUtrirteuvn The Prident OAT -Full weight 6w 32 Ibnkii inc.) thy Night Bell, :i Id let, it will not be isud to the Deo Letter Ofilcc In : OF LANDS, Weekly . A. regarding Mexican aflairs. i tJksIWCItTfl...................... > the event of its non-delivery, but will be returned directto 0 j 4L W. Wwk relive* General Kili>*trick as I flAy- and they will get i>rouii>l attcutiuii.i the writer freeof podtarc. in Florida, la large or mail pareela, wisbins BIM purchasers < i. July, 11, Ian tw . t'hiliiin Minister. I Kastrrn,.percwt" (' i -. --x. It. J>r. rliion i i waduiilf ,,Ihc i liii: i-rrily Ti.e iotao nit Ktumiiea envelopes spoiled In direct- or settlers for the.sae can apply at ;this fflcf The Ulief iii current that the Cabinet has do- I'M < l : of IVnn I and lo Ihvcilixviik of J.avksonihl' lieen nuiil and that bent the misdirection fursi-ou nvvsr by **" fc mterture- Southern Htatus only in Flue stamlard......... ............. 23 t nud riiyMcian vkinity. July 1 1 tf ou-iirred at the place whom the redemption aotuiilly is- Persons residing.ut of the flUle who may desire iuformatiaa tort tf ft* Umttd Shun Lv TS1 w palpable insurrection. J>ntail* will i UACOXoJduro .. claimed. I n ii'i (also U any envelope t* be redeemed at or advice aa to the purchase,sale or settlement Is Jr Iranaptre in salt, (uoi1uottiots") tho po t oBice. lo whiuh It in directed of lands In Florida,with a View to emitfratiiuc to this ) -dMfr en Monday, A .... (it founder of the old ,nn-1 livor.ilily ; / Fbrt'J smoked, (good bright) & J. II. tr jy.st..cmi, Ciy The jiublio aro requested to inattention State for the of investing capital safely and or ****HMai> ....... < Co.uuovESL'EEN report any purpose lt, of c ean.. of Governor Wannoth's staff Cum1siLiid ili.ldlraiu '* ki.ciwn liiniMC Oroywileoii ofthe of I. F. , l >tl on the part employees of the ofllce, or tiilure profitably, can apply to the Company in Boston,er D. rey. Banknrpt. ?. >" tpnflned hinurtf in his IklIstm, IhUC in Hi" rceeipt or delivery( mail matter to this AadreaaJEOPARD It tnda i beeeLv repifiuehtationa repeiiing post may wnoern: The BM aux LopUiana to au- IuI'b'il 5ides, smoked.............. mainly .tho c&c 3Uhbeit Rides, nnokrd.A M .-.4 J3) fo FLA JacksonTtUe > .l utaL > .MBi GMMef wonbea. fo removed to Ihrir esonty- whom lie was sent. In general ;4I5tI4L5,Bi amok l-.i\iaafe, <(* to- aaU DUtrk-t who naa been ad>Jfea* VQYeTtWn, while rcpre.entiag tho situation as Short U* 4e. uluon ku' onp. itloo,-by the Kbtriet Cmrt no** and requiring prompt attention from the I IP'Twmaent ': L = Th 0'I.'dka N ew Warerooms, JOBPRINTINIF RF4AL ESTATE AGENCY. Ew j"E I r ? : ,.hue- 11,. U0.J C OXtLX*ar . he draws milder jucture i.faBJurs (Done In snsrkr.) >5 Morcur ititct, New Yuak.PLANO . n naome othors lately front 'e v Orleans have ; I'll me- l,inan.l. 1IE UNJBMIOWJO HAS FOE SALE, LOW, XOTJCE.OP JOTp NTinarr ** He Hump I .1. mud on liberal flMalIOJLCTbP Lsiiln ,. . rencral i of ( Haja ana other ,apwtks very kindly flENAMks. FQRTES. (iF yjjL ,DSCILll'TION iUN T thu vkinity of Jackon iU !"*4ebnwhero'tB Last l- Cmart of tiu. Xfotbtl SUt* .jtr G* and rominent Contideratea' hoe- - ex Our in.ut.-l, U iv.sent,J* no 4ull thnt il will not jintity lda aaU'sTi S -w fl iit distract- > I'lanoFortcatlironthoiit Uly of their probablo atlitudo and a355YIfl reto | Of would tin-re flt great hIwieiiM'in the demand for our it ViM\ attend to buying and selling Lands and fr Northern fl'Jtri&i. .ny.I.1initequot'tio* gn n.- any '*Uos I Hie ouato have compelled| urn to extend ; I.ols, cn the most teaaonable terms. of John K.JRhtoeiu3akrwft, pablja order.ecitnz 1 UooiixtdiTaWe n thotuaikwt, although held by nxfulardivlpni ourilanufuctnrinirfi tllitleto three hues their former Thc'Union JQ e. C. L. BUB1N8OS. It may ceaeera>-Tbe> Meniaed:fcereiy I leives for Mexico the iniJdlu, of 1 demand alow. !lw,and Itavtotg aiUod uuuijMM'W iuiprovuiMniiii iu i'auutactorlnjr November 8 U .t than any ot hie ppon.tneAt'a* axlynae af Jelm September.L.Deane'baJ. 1 Our Corn market, at present, M below ho Aavnuimli ,'we1 *h ir vontisiun to'Lee' our prices the 42 ; _.,. .. ..-.i. i f r S :..1.1M22L'1 1867. *Lake Ouhnnbis) y. Cityr eeaMy;14 Mate of quotation; 'wutth In i4a'annsli *I 40. alm have been, the lowest of lint- any they IrC same $5 y seld vIse haa Wea ; an interview Ui'u morning Our lktooa and 1'ork market is dull, very little doing, tin* ptano-Eortemaker.bat tcitoue third, and wercBucctfnlly GE GUIDE.Yuuqg's .u li We wa petttioo, adjadfed a 6t'en.SchofiQld, and wilt, have a definite us mod planter t>uppli"d themnelvca ui curly kumincr. ioHcit by parlies about purthi iiit{ UMU- aposi. O JrAz.ewutt. .**$* regarding hi* 0us, on on Mondays It Fine lots of Mtw. art h.-ld at,f 32, however some transactions 1.uisno with )l otlK-r mnkew. July_:30 >ly Great Fbyaological Work, T rery one Ins BLANKS FOR SALE ,June U,186Sw are mode for )U' )#qter,- Ucinj a Private. Instro4 for Var- 'fuuleratood that while tho Government con- n* )n, thiuiumoki.l linns take the nreferplico, nod forson br thoe about tomarry, both male Mid female - 1515:5: situation as.on 'of' 'delicacy and ri- ai mt-butMltUitol : we tiveosnltisut1.k4a in everything concernIng the phyaioletry and relations V .'*>' .i NOTICE 4)PIAff OITWT km PW *c VMcth.k i Oklg of sexual and the Production 1'reventiou' M *JMK our system or - 'lmrtng , ; ita S l.r gmt diacrbtMih. it will uso lowers | >a lln |>rcfcrretojrot1liernbrandi|. 'ritE iclwvjuer Yacht"FLliT- tlve tans N. M., f oQspHo, inchidlnsaU; 'tho-aew dbicnTcries DEEPS 'HAVING" ouri IheUonatitulion,the laws to rcpr *swith'proniptiirf thr U"f to*if rUiUed. s4 aomo,*wclian&l Joti IHIe hthlt at Ngss&U Jti t)Cfl,of Ibo be,.t mulct)*!*; thornuh- never before given In the English language, by William y r1r- 1ti j 0 ; and, rigor.t hand* afrtSi per ount bt tno.fIyr4 11i.. lannil Ia saul w, rt xin ,'anchorn, rabbi, watur ciikk,' Young, M. li. This U really a valuable and JnUwitW rBJLLy OF LADING, Northern Dm. .jITZoidg._ llu ineM jciierallj-very dull. ibTiTfurniturB, *w, complete I hua juiiit relunwd from work. Itifwrltunjre plaaan{ | T e to-'lfejjiwnenJ .- - tb.ark e Wa. ._ ,* -.-- ; --1 a voyage to Key ..Wed r eam ba.Btcu at Hlrvens' ship leader, and (a illustrated with upwards of one hundred APPLICATIONSTOR 'i'rr 7 ef A. H.Johnma dt Ce yard. ForjKVnrjrWd fUrtliw Wtir* lo'DUTIES rtiirravings. All young married people, or thoae cot.- It may coaoera-b aai5siga Iie . .TLI.TA( August G.-iTho election$ of'3tato Doinetu f.avcet pyly tem plating marriage, and having the leant Impediment ?. hl, npaobttasevt is >i irnn of A., if < c r fhe.cntirekpUbli I : i4il.4gr ; :, to married life,should rend this book. It dUctoso secret 0 UO IESTEADS, NI1i & fc Oes of -MIeano 7 AbetaK. - '- that every one should be acquainted with. Still itin wltfeta aU.Oictrkawha i-Z'lmm.' SAVAXAU. AuguO. 10-C -m x.-'llic reoi-lp" t tu-diX a book) ,that must be locked up, and not He about the S K" AND LEGAL BLANKS Bankrupt* npoa.tbctr - A bill woa pramtod to-day for an tdection of amount to 1 Unte. ,1 Ulonlca for alo at this hotub., it will be sent to any cue on the receipt ef Fifty 'kl W' ; MkldjiSiTTJ- lazmd atkoritieri for Augtinta,to Tplinvti o 'ua. Mijlist lO-FsAiiCiAL.-1IOiIY: U in- conts. Addras Dr: WN. Yowo.lfo. 418 Hpraoo atnwt, ). t'OK SALE AT THIS OFF ICE. I' r thepw, C RILiTiy All nhippen ahonld have thtm., Is 11MI1; . p'eett Jlflitry'&lntees. "* M OToaCjddimaod f but readily rm>t at 3cA5; prime paperf .UfllC5h above Fourth, Philadelphia. Wr4 , " --- -- - - i L ' ,- ...- ,-. ." '' ---- _- -_ -- - -. : : : ; : - .- -, .. .- 1 . -, - . S a = T 1r-i.-----. -- -- IJI- -t.1 -,-. ". ,/ .'-, .--- -. '-. . - I II ;I . - 1Srn.1 - 1:3O O k- ; E., 1 I ; '. .. JTbo following. .)i a. coppcjod,.list, uf thtpcirmnonti a. 4sMaty-Judge-JQhn W R n8 *ad cotiflnnea to data:, Clerk, John P&isbley. I l : UNITED STAT18 , Sheriff; RidlardnllDLP1 take this netbod UforauM our Mono in the .. '1 PROVISIONS -MAIL. ' CABINET: Assessor, It' T I interior and the jJUblh r-nwmily, that w. have For Pal atka ;:East- JSta*<-*' ry .,o'Stole--- > 1 Collector, Warren S Roberts. formed a copntBenhip under Ute name L of 'o 4 i IC _{ Gtrw.rwl BANTA. ROSA. ;j. pBRiii .W ''Ob. STAPLE DRY GOODS AND GROCERIES ; AXDZ.IQUO.KS. tTlscduThro ArM.4Rr. DtBZM..y." ,.ttfiJUI., , Cotnptrvlltr-ROBERT H. QAM.I..Th.iurer8. County Judge- Henry Bashnvll. : LU7 "Mq _, / : . B. COXOVER. I Clerk, E. It. Riley: to do a OeaenU Oo ramlBsoa! D1.. J-1 r 1I I r .A1- rzceL.r. 'F .'.v "i'! ..GerttrnI'aux W. WBBSTEX. Sheriff; John W. Butler. .T. r. Buc.".,.!late of BellTillr, Flortda.I I, .. f ',II" .s.iVi 1 e1-.c. T.CAUE.. Cnu.I rJamOllltCrearr. t I :E. M. FKILEKII,from Qulncr, Florida. - D.I Collector, J.,'V. Butlr. t Eira To-lfcwr J R Harrl & Bro..J T.&epr?, tWc : a.1s'a.n.d Q2ce' ; .ftljettmt.Cttttrtll-Oao.OB ,. Eq.,J L UeFtflin Mcetri. !.1 I : : Svxi& '. Darktoa It LoweQaUicr ; : CoNftnoNer f 1mmptioi.r4.! E. Av4x. ; Measr*.Xnnroe Uaige*Uon Geo. Dau\cJ., I t. I County Judge, A J Cassidr. Tallahaisee; bomnel 1 ule ton, Monticello'j' Bufua : : Y .1 JOHN CLARK . I Clerk W 'y Cassady. Diction Madioon 1 D M Jackson, . 1it.'J'UEU COVET: POlhlU'l - ii Co,Bellrill; B U Monroe,Eta.'Lake City : , Cltiff-Suttitx-EDWIX M. RAMLL.48ociateL8 j Sheriff, Akin Stivender. George Powell A J Pothill, EIq'..' JAke Jtwiup,1''. ; MANILA AND TARRED ROPE THZ NEW AND LXO AXT rrLizzie. : ."J>." WEffTCOTT, 0. 11. UAKT.3rd r Or.1 C Lee. Order enclosing Cub will reccfrtf-protaptaneftUon : I BAY '., JACKSONVILLE, IAfJ-' Collector, R B Lee. Strict attention given to the ale of i " BUki"CAPT I' , ; . : *"' "CIKCVIT COXTHT- : ST. JOHNS. All Kinds icturi.tJy'PFoMce.Ve tANCHORS HAS JC.XT IlleElTlp ,', let Judicial Circuit-Homer O.'Tlantz. County Judge, Nathan D Benedict. -- ', a -M'' II' ""It" (not appointed.) Clerk, David R Dunham. \ will in a few days open ,fine T stork of good, consisting XND CHAINS One of the JIIJTJS UZJJfj , : > i '* '. Thomas Lon. Sheriff, U Hernandez. of Pry Goods list and Cnrm", Boot nnd Blioei., LargestAND Will leave " Baddlny, -c.. &C.,which we will I reziarljr for Uw *. ,. . LEATHER AND FINDINGS . Assessor Andrew Anderson. . 4th. AC A. A. Knight. -. ; "- ne.idy morning at 9 of :k. 3etwaia. _ 6th c. J. U. Gosa.Cth Collector,John O Long.TAYLOR.. SADDLERY Jacksonville every Saturday iMndmr.0. ,: Sell at Cost, ITerJ' -'or.. "lftat . u .. fool vointod. ) I BEST SunJay mon D . th" "c.' John Price. County Judge Allen O. Quinn. in order to change our businon- SELECTEDSTOCK for1' hisrie aDft airy alate . Clork Charles F O'Harra. J. BKACEWELL fe COt n' _. STATE ATTOBJflYS: Sheriff, H Wilder. I _23_tf : U ion Building,JackiOnTineTla.._ SEA ISL AND BAGGING AND TWINS) ; team for packet freight wharf er pwM or jrr to,.'' atVLAOJ1ORLN tle.; '.J * let Judicial r rcnIt-rDWitt.. C, Dawkioi. Assessor, Alderman Simmons. 4*. I ASSIGNEES NOTICE OF APPOINTMENT ._ ctnnx..ur.; . .c iT1.' Collector Wm. Merritt.YOLVSIA. !d (not appointed. Arn"at 3rd Joh A. Warrock.4th ) I District Court of the United Siatafor the Paints and Oils of tdl Hinds ; Of the above Articles ever brought to Ms M.rk.-t, -V- DIBBLE, Agsnt'I IS /' HKFoator.th County Judge, James PreratL. Northern district of 17or coJsIsTico or -** J. W. Culpcppt'r.6th. Clerk, Hilton Ii Daniels. n.I ; sAIL - (not appointed.) Sheriff, Alonzo A lIo't.I I In the matter of James E. Young. Bankrupt. Teas CJoffccs Sugars, Cigars, Tobacco, U. ROUTFCAPTAIN - Assessor,John H Mollison. To whom it may concern:-The undersigned hereby Tar Pitch and 7th" Oscar JlartOFFICER Turpentine Soaps Candles Yeast _ I fives notice of appointment assignee of James 0. ; Powders Wm. Mincbew.WAIVLLA.. Collector, Young of Lake City, Columbia county and State er Syrups, Vinegars. Starch &c. OOCI''ty *!. }Florida within said District who baa been adjudged a , ... County Judge, Bankrupt upon his own petition,by the District court of ALAcu .. ; II Clork, W W Walker. aid Jacksonville district. ,.Tune 27, 1808 J C QREELEY.Sw Assignee. Leather Belting and Steam Packing ; Raisins, Salt, Lard Oil, Kerosene Oil, County JuJge, UJcnkins, Jr. Sheriff Noah Posey. Molasses, &c., &c. CHerk;Wm. K. Cessna. I Assessor, N \V Butler. ASSIGNEES NOTICE OF APPOINTMENT STOVES,.A"D HOLLOW WAKE TIN ATA UK. STONE WAKK,AND CROCKERY; TUE YAVORITWrZA1 Sheriff Goo. L. Barnes. Collector, W G Robinson. WOODEN WAKE ANI WILLOW WAKE.' Assessor, i ,. i I WALTON. District" Court of the United States for th* Corn, Flour Bacon, Pork, Butter,Lards, DARL'INGTO.< . Collector, John E. Hicks.BRADFORD.. '. County Judge, John Newton _- Northern District of Florida. ltcant Vessel and Mill supplies ; Ship Chandlery in all its Cheese, Mackerel, Hams, Monl, JACOB BROCX, . 1 Clerk John I Campbell. :Hominy, Beans, Rice, been thor Counly-Judgc, Wna.. W. ililie... :1\ ". ,'1 Sheriff Samuel Rutan. I Ju the matter er Ramon Canova. Bankrupt. branches ; Boe &c., &c. HAVING route betveta qbl7reSu.d.JtckMmvlU I. .aW , Clerk! B E Tucker. V I Assessor, :Finlay McCaskilJ.I gives To whom notice of It may appointment concern:as-The assignee undersigned of Itamon hereby Ca- CHARLES A. FAIRCHILD prise,stopping at aU intermediate poiato. lvtaJi. Francu.M .Weeks.Assoesgr Collector Samuel Rntan. I ao TUle every Sunday morn tag aft .'.. . Sheriff; I nova, of Volnsia, volusia county, and State of Florida, Vi Richard L Ilolloway. .. j W'ASRIXGTOX.j within said District,who has been adjudged a Bankrupt Condensed Milk, Buckwheat Flour, o'clack Monday I'JlltBnjf.If. Returning 4 o'clock mrrinrng at Zeuipss,$ Collector, Isham Brown. j County Judge, John J .Tones. trict.upon his own petition, by J.the C. District QKKELEY Court, Assignee.of aaid dis Reed's Block, Bay Street, Apples, Potatoes, Onions, Pickles, nesday morning 3 o'clock,IVatka lea Thvnday Bat.rpyj..r MftIII'. ,,, B. ... ; Clerk, J B Carroll. I Jacksonville .July 2J, K68. 3w Canned Fruits and Vegetable o'eteck.Will arriTlng at Jaekjonrille I .'etoe 1'.). - -Clerk, Franklin Smith.B..UtEK.. Sheriff \V B Owen. JACKSONVILLE. aisomak.reguIa trIps I.J .. I 5ly. of all kinds. DAY letriDf JackMnrffle, at 8 A. 1C- . " Assessor, E P Melvin. ASSIGNEES NOTICE OF APPOINTMENTDistrict JOHN cusr, .ta-\ County Judge, J E Townsend. Collector, W B 0 won. Jnfy 7-tf Vfrfft Wharf;Jack*** .' Cl rk, George W Fraricr. Court of the United States, for the 'FRESH-SUPPLIES.: A LARGE; ASSORTMENT OF -. -ti t' - U. S. MAII. EOUTK Sheriff Thomas Leddy. Assessor,r, Irwin J.'Roberta..Collector t ASSIGNEES NOTICE OF APPOINTMENT Northern district of Florida.In ooden Ware . Thomas J Groen. the A'ortkcm the matter of R. C.;Martin. :ankrnpt.To , United States j1J.fricl Court (.ftfic ,for THE NEW C LHOU .., whom it may concern :-The undersigned herebygives t SPLENDID 8TZJLM1&& District of Florida. notice of hut appointment as assignee of It. C. County Judge, J L Cotneford I I Martin of Lake City Columbia county and State of COYI.tl"G of Clerk, \Vm. Clark. i II In the mutter Walter II. Hunt. Bankrupt. Florida within said District,,who has been adjudged & Pace 1 To whom it concern --The undersigned hereby a Bankrupt his the District' Baya BUCKETS W may upon own petition by I TUBS, BROOMS: &e. Sheriff, Jas. Yearly.Assessor civps notice of his appointment an assignee of Walter Court of ad! district. M L Nobles. j j. II. Hunt of Fcrnandina. Nassau county, and Suite ofi J. C. ailKELEY, A.ignee. - CoJl ctor"Jiw4AViYcaHJ\ i / Ii Florida-witbin said Dist. ct."I'bo has been adjudged Jacksonville, July 11, 186M 3w CORY MILLS ORTTB HOES PLANTATION 1 : a Bankrupt upon his own petition,l>y the District courtof I HOg,. OARPEN HOE 4. CLAY. -- -- -' - County Judge, JOriah Bnddington. Mid Di.Itrict.J.. C. GUEKLEV, Assignee. now in Store and are landing por Schooners "TICKSBUHG," and "SIIEI rAN," aAT I.. Clork Sheriff;B John McRea.W Sullivan. j I 1 JecUoiiTille, July, 11, -1SG8_3w GREAT BARGAINS HAVE; New York, an excellent assortment of Stone Jars and Jugs. Capt. GEO:,MANSHELD, - , Assess* B C Carter.BlitchCoiUM .,' ; ASSIGNEES NOTICE 8F APPOINTMENT ;-. ",0_ SLAGER; GROCERIES AND PROVISIONS, POWDER, SHOT AND LEAD 11:1.with hri1= < .a the thy. S51id I "' Collector, Elijah, J District Court of the United State, for the 8E3lIWUXLY' )IA. General Commission Merchant, Consisting in part of CofFee, Sugar, Butter, I.rd, Ch'-csp, Crackers, Rice Hominy, Meal, Flour Full Assortment of Seine and Net Twin 8b. will leave JackmtTiU renr WUma&AT Samuel Day. Xorllicm district Florida. County Judge,, $, of Pork, Bacon, &c., &c, Collin's Axes,50 No. 10 Hough,Store HORSING at>o'clock.1"a1atb TXrCXtDATiMM Clerk, Henry P Eastoni In tue matler of L. F.Dcwey. Bankrnpt. I No. 1 Hoeg'fl Block Bay St., and Wharf Truck, Wheelbarrows lug at 1 o'clock,will;arriTio at Eaterprile at''17'returning P Sheriff, Benj. JlcFarland. To whom it may concern:-The undersigned hereby leave Enterpriw every VCVOAT # Assessor, C B King. gives notice of his appointment as assignee I of L. >. JACKSONVILLE, FLA., Te ge-tb.er witb. and Grindstones injr at S o'clock; FaUtka ever, MOSDAT mnSTa l>cwey, of Jacksonville Duval county, and State of 7 o'clock arriving at Jtekwmrtll at t.t'lltnt Jlt_ Collector, Jacob C Moore. I Honda within raid District who has been adjudged a 0FT"U :- 40 KEGS OF NAILS.1AE:2S' in time to connect with the Tri for Iaftft. net.RTi5 .. and wants such as Ploughs, Ploughlincs. Hamcs, Collars, Ho Powder ' DUVAU Unnkrupt upon bis own petition by the District Court my old friend and the public generally 1 would Farmers Housekeepers - County Judge, A "NV )lcJJC n. of said district. J C GltEELEV Ae1gnve.JackonihIe J- announce that I am now opening and constantly ro.ceiving and Shot, Nails, Solves, Ovens, Spiders, :. _For further i inJurmation apply 2.JOIN* . Clerk, Chas. L Mather. i .June 11, 18C8 Sw _. a complete and select stock of : $ Pure Xj>e WJ11SJCJST. CUB, -r"L' =-- :: 7-:: = i-tf. Sheriff; James J Holland. T i DRY GOODS TJJXr. AR.E: cf c. aQc A.fI --- --- - I Assessor, S N Williams. READY-MADE CLOTHING, And a full Assortment of Liquors Collector 0 Thompson.BADE. j' JOBPRINTIE GROCERIES HARD-W..IU;, of all kinds. and QUEENS-WARE, ALSOLiquors Also other Articles too numerous to Watches Jew Iy.. - ,t,1ziit.iuago: Geo.JJ. PhillilESCAUBIA. *. '.' I BOOTS & SHOES, mention all of which will he sold I HATS & CAPS, by the case and barrel, which they propose telling at Wholesale and Retail, and as low for cash. GEO. A. PECK i TRUNKS County Judge, Wm. Kirk. I , Clerk: Kollin A. Stearns. VALISES, b. Wholesale and Retail. WATCH-MAKES. AXD Sheriff George E. Wcntworth. and in fact everyUiiug kept in aFirstClass cEIBiAP IF 3STOT ciii , John Varnum. .- --- .---- --- -- .-- .--- S Col1 Assessor ctoi,. A7B., Tutnatn. IP & !1. Store.My Than any other Establishment in the City. JIVE THEM A CALL AT THE CORNER AD Jzwnar'l- hi au1 tot 'FR.1L1s..' goods have been bought with special rcJcrrncc to JOINING THE MARKET.Jacksonville JACKSONVILLE j - County Judge, John D Atkins. the interests of customers, and embrace as good an assortment Fla., Deo. 22sin.crc THE COTTON PLANT Thomas 0 Connor as there Is to lie found in this market .. .-, .- .- - Clerk - CIT*I respectfully ask aa examination: of my sto'k. Ii' tSberfff- I --0- -26tf. ___ __ _. - h Abdossor, John F lienezeta I - Collector, George-Redgatc.GADSDEX. PA.IJXrTS I : - CHEAPESTAND TO FtA1 'S i County Judge, J E A nit,..i.ltJll.. loll I iI iI I i .. Clerk,.lUAwsrt Jones. i PLANTERS AND OTHERS. ,! j J Sheriff; Charles L Williams.Aeseesor !, t ,. .. iI Wm.Mcllao f THE Orafton Mineral mt Coinoany, now manufac ,: I Collector,'%%': R. Random. \ i ;the Best Cheapest and most Durable I'alnt I I Is in use; two coats well put on, mixed with]>nrc 1.ln..ed IIoi.MFh. r.FLORIBAUNION Oil, F OR I I County udge-- I ._. Will Last 10 15 " i or Years ; , Clerk, John A Vaughn. : I Assessor Jas. ESykca. THE I It ii of a light brown or beautiful chocolate color and S ,I Ii I Collector, George W Piltuian.UEEXAXDO. can be changed to green,lead fctone,drab,olive orcream.\\ i TTLEPIc constantly on hand. wrO ;eleet.4 steeL t * 1 to suit the taste of the consumer. It U "- i .11 line Watches and ,Jewelry an I -all other mt. Barns }Fences Carriage and Car-makers Pails and usually kept by the t..ley which he elf-n to The psia County Judge, Samuel .:. Wooden-ware, Agricultural Implements, Canal floats '. I at reduced prieer.VI . ( N S McXinn. I Cloak VESSELS AND SHIPS' BOTTOMS :. GROCECu RIES1 Sheriff, W''Smith. 3PRINTING,0 JE3 4 i 15 THE BESTLIGHTWOOD ALSO ! Assessor, E J Bowdcn. Canvos Metal and shingle Roof, cit I being Fire und + Collector, M M Edwards Water proof Floor Oil Cloths, (one Manufacturer bar : ERT ing used 5000 bbls. the past year.)and as a paint for any HAMILTON. I OFFICEis purpose Is unsurpassed for body durability, elasticity, STA TI USER 1', County Judge J W Childs. and adhesiveness. 1 bhl.will supply a planter for yours _. SEWLYO MACMNXS, _ .Clerk, W R Tnten. tho most complete and extensive to come. --- -- --- -- ------ -- - i A If A 1'AKIETY OF OTHER JJUICL $. . Sheriff, Dnval Selph. establishment in this city. In WARRANTED. IN ALL, CASES, BERCKMAN'S All kinds of repairing done at short Dice'M .- HlLLSBOROGH. printing p t warranted. At the old stand of C. IX Oat Oesn County Judge, Wm. Lee Avthor addition to our i as abov. (. Send for a circular which gives full particular L. ROBINSON STOVE rtreet.-- -A.M.Reed's fIinL'7": I-tI None genuine unless branded Mather P. in trade mark FRUIT NURSERIESAUGUSTA Clerk, Lyons. Grafton Mineral Taint. Add ' Assossor, J&mesfl. Hay. Gordon's Improved Job Press JIT.. H. MAXEY. WM. GROTHE :1 Collector, B C Loonardi. 22 may 6 3m Jacksonville. Fla.u IN THE SOUTH. , : JACKSON. ______ ___. ._ __. Corner of Bay & Ocean Streets, GEORGIA. 4 (the only one in this city) which enablesus Ill C. L. ROBINSON. WATCH-MAKER ; Clerk County John Judge L, W Finlayson.J Parman. ib executo the finer descriptions of FLORIDA AGENCY _. __ __ __ -_'_ I kd XEXT TO .utCIlWAT1 dispatch , neatness'and Sheriff John W King. JOB WORK, with NATIONAL hu o. hand l, ul will alI!! at the I Assessor, Wm. B Lacy. we have recently procured a TUBES, rr.AXT8 AND GRAPE cnrrnfas- J. J. HOLLAND II I IN HAIJTRIDGE'S Btq .ic, BAT: IUzm Collector,Homer Brync.JEFFERSON.. . HOE'S RAinWAY PBESS, FREEDMAN'S LOWEST POSSMLE RATES, Choice Tanetitt. Jacksonville, Fla.R . S SAVINGS Connty Judge, A B GnimtrelLCmk f VEALU.Ixo TEACH TREES BUDDED IrON ESPECTFULLT informs the- .1 ". Robert Meachazn.t : of _I_ _native seedling stocks. yUle and Ticinity,that h< ha retunM4 a .c . Sheriff J 'V PowelL acknowledged to bo the best style rders tiolicited and fiJIe.1 at list price opened hU place of busineoi as ahoy*. . 'AH McCann. Power Press in use, and are now pre AN STOVES Catalogues Mr.O.will be happy to reeeirtf the "'pahrmaf* .f _ Collector, ? furnished.EOBT. -. oM friends and as many new oae a*wvfc t*.turnvatches tM9 Assessor, J u. 1>. Morris. I pared to execute. all kinds ofi\ _, TRUST COMPANY. C. LOWRY, carefully repaired and guaranteed&at b.pm e -., LtnEl1T\ I !:,-tf. Agent for Florida, Jacksonville, lln.AdvortiMcmenU .. Jt:1 that with his experience: a practical TValttutate. WiNDOWS AXO ])UOIt. WOOUKN-WAKK, the bk4 forty in this aM . ._ I I years country Zr.p.,ka County Judge John W Hortford.Clerk CHARTERED: ACT OV C0flESs.ORi'4Rs. ; -- ---- i I be able to give full Btisfactioa.to ali vk. . \ Wro. II Gnnn.Khcriff,1 JOB PRINTING I BY. ]KOl'K UUUDEH PACKIKO: OAKUM, matches to be repaired. AH w leM* vansa5s_ :'JoBopK Sheppard. ':. GEOP fCtU'JaaS741_ _ i .0I --- , - I ((9jELL & ( .Anenor, KiA; Black,jr. "'JL.uUt.T1& \' from the smallest Card to tho largest I H5ATHEH JJEM'INU; - -Collector A Turner. FRESH ; ': :.." Poster in the best manner and in the'I J. W. ALVOltD President.LKW1B I I .- CIJBPHANE First Ylw ? .ltJt"nt. I forwarded to all Newspapers. Count) Ju-ige, D R To\\'obelll1. ..,: shortest time. By increasing the speedwe I). W. ANDERSON Second Vice I'rtfid'-nt. FURN l.r rUl-E. B No advance charged on Publisher's prices.AH i Clerk J PoncMer.. there- DAN1KL L. EATON Actuaryjif .; ', leading Newspapers kept on file. GARDEN SEEDS !; - ". r decrease the cost, and, can SAM L. IlARRI8Oeneral Iii.-jx'-i(or.IJankinj -0CRQCKERV- formation u to Cost of Advertising fanilnKe.1. Shrift Wro. D Scan. fore furnish better work at a House, I'l-nti vlTgnla Ay<'IJLU',.con"'I' , .i.sessorJohn Gronto. I street,Washington I). C. Iu : O U'Ctor.w-Edwards. I Complete l'rinted Lists of Newspapers for sale. I FOR tiA.rF; WHOEE3ALE OlCBTT 'm r. LOWER Special Lint for Customers. AND DEALER IX RICE prepared Lzo.CuntysSherman'. ? Branch at Jacksonville Fla. ; Advertisements Written and Notices secured. I Conant.Clerk5 Orders for Uuaiacss Men especially, solicited. Fine Watches Solid Silver and , LcltoyvD Ball. ,. than any other office in Jacksonville. .VO.22l'1..t..TREET. *,| , Sheriff, A_ B Munper.Lrvv.. .' I Letter Headings, 'Bill Heads, Ball from OpcuVCIT 10 *. M., t day*rf ,f.-Sundays M., and Sfltunlay and Holidays e\'nlntr\1rctrn txwiitc-d Ii, 8rU WAIJE:; 401 AR R. PlateclWaies._ ., y E. P. WEBSTER: & CO, , County Judge, A J Clyalt'Oerk to 8 .. M. Kerosene Lard & Lubricating I d' Tickets Auction .. -r.. i 4 i HOLLAND would George t Leavitt "I Programmes, : July 8 18C8 tf JJ. respectfully inform the STieriffJohnTyor. .aifir" II Bills Hand Bills. Circulars, DEPOIT5 e.Nf AMOUNT RECEiVE 1'KOMAH I --- A. Cane in the that late, having firm of bought C. A":out IJune the ft lateral Co,he of will C. Wholetttle awl ZRettttl, 1' ? Hn&MBW Or, Joseph P. I" use nil care and diligence to sustain the 0"! : t isot9 :' : >* LS0 reputation of Cards Q Market the old CoUoctorhn Tyer. Invoices, Deeds ; for Vegetables. stand for selling , T* - !!.. ; t I.---nits! Receipt8J. Deposits all: always be drawn without uolier. U"llOs' -I GOOD ARTICLE AT .1 KKASOA'AllLK FRlCl, rgitr ,County J miff 2, Enoch lIi1Al1e. '-".: Lading, Its in Bpecie are repaid In specie All other dcponiU are PRODUCE. Commission Merchaats, Persons *hi. ' ret>aid ill "Green backs'\ ,r Rational Bank Uill. LItis ke.&.to New York would do well doln;Good Work, anddealinjt honestly and fairly with ". " p ckk,John FBartholC "' 'i. .r i Posters, Law Blanks.Placards Interest payable in January and July, in each yen,, .- to comign toVIRGIL *l'v' .1.: J. ", would also slate that lic Itu **">eutea ; Sheriff; A W Gamer. SchcdulesInvitations and by special rule,on depoafu of f M) an upviml.i remaining IlILLYER'S with nim Assessor, A',W Gamer. I; in the Bank at least thirty days. SONS, James Collector, J M Youmas. I f. : ; :; t. ) ',f I All Branches the profits hive belong been esUblinhe the depositors.in the principal cities LAMPS WITH THE PATENT I 207 Duano Street, I S. Doyle, : t MAPUO.N. '. Railroad i-1-h from New York to XewaOrleanjiJfcnd 'accounts''tun be New York. i who baa long sustained tile n-putAtio-i of K superior , 'E CWodas. alHa transferred from one Branch to another without charge workman and to conduct Co nJyJaa! e, I (l..ttaLII..bcd in JW7. competent k4neM of this ) t Qork.,Dennis Eagan.. .!14 .t\ I I SteamboatI'rinting or The intenuptin/t Institution/ tO) has interest.now on deposit a JIOt _aver$(iOO.Q'H! and $ Situ lJlll'llt:, and Vhimney, \\'. It. HILI.TIK, II. L. HII.LTKK C. T. IhLLTEIl kind for in all Its branches. We still retain the IOIe) agencyMorton's NO 4 : ',-; t Whcrtf,' David MontgomwlAssoasor )-. "flt'Ji 1 it J this Branch ban on deposit over 17000.* Ihe latest and best f/tiiii/ out June 27 it - Aridiew J. Wifliams.MARION., "I.Jt."X I ;1tf1 !.f erchants and others desiring to deposit and chock: I -.--, -- '-- -- Gold Tens, SAMMIS' BLOcK BAY: '.ST.;, ' against their accounts can be - accommodated. '". .".,. ,: 'oauyrvi-equired: size* allt.Lc.rC1.1variety We draw Exchange on New York and all the prominent : Jbr economy and PENSACOLA OBSERVER in tbU town and blioll cndt'Rvor to keep the best oAort- County Jodgei Edward Barker. in Southern.cities at the lowest rate I. ment of table and pocket cutlery in this Ie\Uo .- J7.l.CKoYO.i\7ILL.Jr. FLJf A J.r, of Blanks are printed Drafts J'ublitlied TRI- Hoping to merit the continual I C1erk.ntIhJTarns. on New York nre'paynUe .at the Banking; I liffhf, hlERKL Y confidence and p Oron te Rouse of Jay Cooke ic Co. of old customer and friends I invite reMi cctfuly all to Lbeu3LAC0ntL: ; : _H.' .A,..h'' ,!r. a work manlike style at this office. Government Draft on tiirunnah Charleston Wash' I _. WILLIAM KIRK & COMPANY. come and look for themllCl\' may 30 ly - AweMor/Wm. McGrath. t ington and New York also Bank Drartu, and Cortill';iUs ; ,I I hating'.uadufrumaIargs MmuicemeaU to be kept freaUyffVyOtf '..Ooitertor Neal Fergernon.' .- of, Deposit cashed at lowest rates. 1'1'' Si-Bscnirriox : ' )[OX1lOF. .'-. -- --r- old.Gold, Silver' and Government. Hccurle" : Ixmzht BH<! Kt7KNlNG 'FLUID & LAMPS Twelve mouths ......, .....,........ $800 F ISK'S METALIC BURIAL CASES 8KED'T\'A1- ;UOC8B, ". - County Judn'f', James W Lockf. I To such of our merchant as order Investments are only made hi Hfcuritic.* of iiietjnl-, ; Six months ........ 5pg I wehurolli _dspatup (or our traaddre trill,wi._ (Jerk Henry A Crane.Ataottor ". ,' their printing u New York ve would t4l4t1lfrs! ''!' .. ". (In advance always) oiieT jiiiidW8e; oIla1l..s.iii lcti6ARIiEN . L : : very \ . Philip Cosgroyc. AXLE 011KA8E . X 1 that:*" canfill'their orders' in as Chainnan AdisoryComjtte.'. at this time in view of the fact that 1'unsncola i.s i._ ; '- -- -- -_ I ! Colkvtor'John T Young .1. *' say =: . . 'J' ; C. F. DAI.KV, effecting her Railroad communication with the North. \ SA"E.1J: ,DEPOT, !* b; ,. .. 'N'.A..Nl4 :., .' *., ,. Ro'.tt"lnr". west, nnd becoming point of interest to enterprislrg i" ,.. ... . 01 '' If(1) ';' w- 1 men. It U devoted to -- &" East lori.ht, anJ will!' ntwitr.kn abd the A .. t'OANi i; development of the mKteriM '! ------l. Oovnly. Jadgo; IX M Hammond. ; :.f M! Good GROCJiRIES&c. interests of the Slate of ol all kind. lianten,Full and .r ' fr ilowrt ; Florida and | Style : 4 1 ,: rt! c a r. in its local dirartiiunt I I :. ._ . IJJerk. Samuel Kidcll. .ge-_ ... Icanu ; ----- ______ H.t J l t i ". j" devoirs spcciiil attention to the Immense Lumber : -- the rut our soil I and cttnuav. Tltervibre WI"*ivfte,Sfi4* i " ... { ',4--; I I'I"1. and Timber trade growing up in Its vicinity, as also to attention and orOrr*of.B interested in kartaff t9. ** _ A'Kinikn. J J t,11 f 1t'- -_: --'I other commercial: items which to tho careful reader will Gardens and the an..t kinds of Vegetable*. ' \tloctJ:oi1e .,.' ) hn ; '{: 1 and at a very small adrauoo on New : : indicate tho development of the gwa n.tural adnint- I(EI't Cllf\l't.11\tIY an hAA and for Mak- I"" alt Just".*ivuJ;.the followia; brYuswlater K 8 Peat'to. gee of rcnancola as port. prepared to fumlllh I , .Y k nfi'e8. .nn.,1 wo.Qld..re. ooe-tul1&P, JJB.CRAWDEALER REALESTATEBOMh' lug: , Advertisements solicited.Admiaiatrators. .AUBLE Fun "OUKOI' : f, .I'n : laji-J.. ;ln.1. MONTJMKXTS, ' ., :f'l :' n' 'I, r: 1"'J.tli&'V''I '. -- -- --. --- .- -, .- 1"r f HEAP AND TOMB STONES: 1 000 Papers. Flat Dutch i' ., :. . . r : : AN U Vl 1 000 a "V oun 1 Ji0J. AUIttUO. .:1.. ," : 41Cut.T >K Purple Top Rata Btt*., * ,. f ___ . ,. , "-- I RON FEXC.E8 K CScrkVAlcr. StoctonISkerifl ; : & BOLD Notice., : 1 500 IW: c. 'n 'I S ;- D'tid)[')lizolle. -, ,-',' .: >', FLORIDA UNION IN ,, or 'tI1l" ,y lots,lawn, &e. CALVIN OAK ,,600 Skirving' Ruta Dag . ': .j'I.'" : persons holding'demands the \ ft3n1nH f. THE :: Jrr ALL estate of fDce. 16-tf I WOI M aiiJ ,,. \tjj&8ait3t kK>i\kl : .'; .0., *"J5' Wilson formerly resident of Duval county __ IJtckaouvfle,Fte I Long Blood SUgar ett "i.Uo5orIbbflrt'Buting'; ;:.. ;: ) FAMILYnQRO Htato of Florida late of Patterson,in tho Stoto of Wow j-- .I I 000 'c Larg En".Drumbe.td. csbbato '.; 'I. .., I'Ii Jersey, deceased, will present them for payment to IL NATIONAL 600 yC ' I'iL: I has removed ,from the old stand /m j? m iiU 1 V U c. .LEOflINSONt11EAL ; Blsbee.jr., Attorney In ti1ct for Kdward M. Cheney cc : U, : IIIt-1 :J tne Tj Wj 4KtI..I. *+&tLn'thWto 1tdefdd&i *oithcdi-!, 1'ROVISIO.NS, ',' Administrator by law,or the sratntc'of upon widoslate limitation,withlt wit tho be plead.time Iimlte.1 In bar I PRBBDMAN'B SAVINGS 500 500 cc La.rge Is Duich u. !;'i' .. ,. <'crk. Aim Ya1d'O L..i fitted expressly for its 1 I .ESTATE AGENT." Unroot 500 CI : ". _ 1 \ \ p' 4iM,, jgus premises, up of" SogMLoal .t" ni, .' I "\ di- .t _,_ II B19BKK. JK.. t i. rur'it cI Hc ) : L ; And Ship Stores ; \" -f Agent In fact for ,AND TRUST 500 .1' ; v"inthe': ; COMPANY. JLong Orango Carrot . june1 Ow E. M. ' . AMO1PJtMLWlI1dXOfl. ,,;i 1 ,. '. z ; q. CHENEY, Admini. 300 c" CbUa < : e' Tracts of .L , Collector J 'Ih N J 9.'... .' '. ,,tta' : t!i i't' ] "UNION ;BUILDING :! WHITE I'INEILVI13IUI: !, .. n" Branch at Jacksonville Fla. 600 CI Long&*rt. Ib4iih1 t Guardians" II <4 _ .PrnAJLt .f .Wi. J \ OF .... ot1c 500 E dy: 12ign . .11 L i 'It'\o" 'tiibq- .,." .:. "'' f':. : street. ".IJ T.. P iJ. p.\lS: "'. .. 'T IIIIITY days after dato' wKI to the or No.: BAy 'snh;: : G .. ' ..'VQ nt1.. PJ IW .IIJlI.r' Ji'AfI'ir..d j On the South side of Bay : "It .BVBH.YJE: cm}'.1'IO JL Probate of Duval county Btate arply of Florida Judge, for an .f the QOLDEK MOET12... . "C1 it'1I.lcLeodJ1.' n. 4-tL "'J' ';n>.l1 ,;': '. / / / j t't:{ tittf. I .yt! rl, AXDSWKKP8 .d 1. IU order to authorise mo to sell Block 01 and 91, of land r 'hiMldflk wilt PUlCluUJt' nt t.1\ "t : ! ,'ttseri1r.' SbttJa". !:I: .1" I ,',. 'd t rCJIARTEU1'4RflES I Blnki'-for s1e I at)11.1J I 0X841%; AT' ALL\TttlES.\ in Hart tho; a city minor..o{ Jadt."lnlllr..tbo Propert1iOfary- K. and GQTemn14'nt rl\l"', ', QoLI.SilYef NEW. FORNTTUBB" B'roaE-r..la 1- . Collector., 'l'bocDu'be''J 6hRl y. .,..,&1 1 office .AU'Mbfppotl1Doutd? h&fe't e : ; t i. J1'f 1 11 J.; : H -J l'CI1'f "ILLF..lNl. ,!5, 18' I Stf june $7 it ;o."B-; 1I 1tT'ft tdtt. l'tf W.Acttnt.'VO.AN 0uraItr.,; rT hefrT" earnfr.Oar#t''L Bd L*1tO J*JS *i111I. . " -I. .- _ .. ''.. . . _: -- -- >-_-_-:- -' --- -. -- _. T . - - I' l I" Contact Us | Permissions | Preferences | Technical Aspects | Statistics | Internal | Privacy Policy © 2004 - 2011 University of Florida George A. Smathers Libraries.All rights reserved. Acceptable Use, Copyright, and Disclaimer Statement Powered by SobekCM
https://ufdc.ufl.edu/UF00053711/00114
CC-MAIN-2019-26
refinedweb
29,701
68.97
Hey Folks, Is there a way to access the csv file that is populating the datasouce prior to loading the datasource. I'm attempting to isolate only certain rows in the csv file but in order for this to be dynamic I need to be able to determine which rows the data exists so that I can populate the datasource with only those rows. Something like: def objGlobalProperties = com.eviware.soapui.SoapUI.globalProperties;def regionToRun = objGlobalProperties.getPropertyValue("region"); def locale = context.expand( '${DataSource#locale}' ) if(locale == regionToRun){def dataSourceTestStep = testRunner.getTestCase().getTestStepByName("DataSource") def endRow = dataSourceTestStep.getCurrentRow() dataSourceTestStep.setEndRow(endRow) } I'm not sure if I'm overcomplicating this so I'm open to suggestions. Ideally I would like it to completely ignore the data that isn't in the regions to be run. This is at the testcase level so if there is a way to run this from the project or suite level it would be even better. Each testcase has it's own csv file that it uses to populate the DataSource. Many thanks! Thanks for reaching out, @caz88! Community, any ideas or suggestions? Hi @caz88, You can add a Groovy script right after your DataSource Test Step that will check if the region value from your source is equal or is not equal to something and based on this either continue the loop execution or jump to the end of the loop. Example: Thank you, @NBorovykh!@caz88, is this what you were looking for? We are looking forward to your results. Hi @NBorovykh Thanks for the message - but have you ever noticed that this doesn't continue to run the tests and stops at the DataSource Loop? Is there a way to inject this method into the into each teststep while running the tests through the command line? We are running our ReadyAPI tests from Jenkins. At runtime we are only wanting to excute the tests in certain regions that we specify. These value would be passed to the testrunner from the jenkins job and then passed to to readyAPI. Any thoughts are being able to develop an approach this way? I'm not familiar with Groove very well. What if you add continue or return after "if"? Pseudocode: if (region.....) ... else return // or continue to move to the next test step
https://community.smartbear.com/t5/SoapUI-Pro/How-to-load-values-from-csv-PRIOR-to-setting-DataSource/m-p/187787
CC-MAIN-2019-35
refinedweb
386
66.44
The MaxCompute UDF consists of UDF, UDAF, and UDTF functions. This article explains how to implement these three functions through MaxCompute Python. RESTRICTED ENVIRONMENT - Read and Write local files - Promoter process - Start thread - Use SOCKET to communicate - Other system calls Because of these restrictions, user-uploaded code must be implemented throughj pure Python, and the C extension module is disabled. - All modules implemented by pure Python are available. - The following modules are available in C-implemented extended modules. - array - audioop - binascii - _bisect - cmath - _codecs_cn - _codecs_hk - _codecs_iso2022 - _codecs_jp - _codecs_kr - _codecs_tw - _collections - cStringIO - datetime - _functools - future_builtins - _hashlib - _heapq - itertools - _json - _locale - _lsprof - math - _md5 - _multibytecodec - operator - _random - _sha256 - _sha512 - _sha - _struct - strop - time - unicodedat - _weakref - cPickle - Some modules have limited functionalities. For example, the sandbox limits the degree to which user code can write data to the standard output and the standard error output; that is, sys.stdout/sys.stderrcan write 20 KB at most; otherwise, the excessive characters will be ignored. Third-party Libraries The use of third-party libraries is also subject to 'prohibit local', 'network I/O', and other restrictions. Therefore, APIs that have such functions are also prohibited in a third-party library. Parameters and return value types @odps.udf.annotate(signature) MaxCompute SQL data types that are currently supported by the Python UDF include bigint, String, double, Boolean, and datetime. The SQL statement must determine the parameter type and the return value type for all functions before execution. So for Python, a dynamically-typed language, you must specify the function signature by adding a decorator to the UDF class. arg_type_list '->' type_list arg_type_list: type_list | '*' | '' type_list: [type_list ','] type 'bigint' | 'string' | 'double' | 'boolean' | 'datetime' - The left side of the arrow indicates the type of the parameter and the right side indicates the type of the returned value. - Only the UDTF returned value can be multiple columns, while UDF and UDAF can only return one column. - ‘*’ represents varargs. By using varargs, UDF/UDTF/UDAF can match any type of parameter. The 'bigint, double-> string' # parameter is bigint, double, and the return value is string The 'bigint, boolean-> string, datetime '# udtf parameter is bigint, Boolean, the return value is string, datetime '*->string' # variable length parameter, input parameter arbitrary, return value string The '-> doubles' # parameter is empty and the return value is double - Datetime type is passed to user code in the form of an int, with a value of epoch UTC Number of milliseconds from time to date. The user can deal with ‘datetime’ type through the ‘datetime’ module in the Python standard library. - NULL corresponds to NONE in Python. In addition, the parameter of odps.udf.int(value[, silent=True]) has been adjusted. Parameter ‘silent’ is added. . When ‘silent’ is true, if the value cannot be converted into ‘int’, report no error and return NONE. UDF from odps.udf import annotate @annotate("bigint,bigint->bigint") class MyPlus(object): def evaluate(self, arg0, arg1): if None in (arg0, arg1): return None return arg0 + arg1 Since October 16, 2018, the use of Python UDF in the MaxCompute public cloud environment has been fully opened. UDAF - class odps.udf.BaseUDAF: Inherit this class to implement a Python UDAF. - BaseUDAF.new_buffer(): Implement this method and return the median ‘buffer’ of the aggregate function. Buffer must be marshallable object (such as list, dict), and the size of the buffer must not increase with the amount of data, in case of limit, Buffer size after Marshal must not exceed 2 MB. - BaseUDAF.iterate(buffer[, args, ...]): This method aggregates ‘args’ into the median ‘buffer’. - BaseUDAF.merge(buffer, pbuffer): This method aggregates two median buffers; that is, aggregate ‘pbuffer merger’ into ‘buffer’. - BaseUDAF.terminate(buffer): This method converts the median ‘buffer’ into the MaxCompute SQL basic types. DTF - class odps.udf.BaseUDTF: The basic class of Python UDTF. Users inherit this class and implement methods such as process, close, and so on. - BaseUDTF.__init__(): The initialization method, the inheritance class, if you implement this method, the base class's initialization method, super(BaseUDTF, self).__init__() must be called in the beginning. The init method can only be called once during the entire UDTF life cycle; that is, before the first record is processed. When the UDTF must save the internal state, all states can be initialized in this method. - BaseUDTF. process ([args,...]): This is one of the MaxCompute methods. The framework calls this method. Each record in SQL calls ‘process’ once accordingly. The parameters of ‘process’ are the specified UDTF input parameters in SQL. - BaseUDTF.forward([args, ...]): The UDTF output method, which is called by user codes. Each time ‘forward’ is called, a record is output. The parameters of ‘forward’ are the UDTF output parameters specified in SQL. - BaseUDTF.close(): The termination method of UDTF. This method is called by the MaxCompute SQL framework and only to be called once; that is, after processing the last record. #coding:utf-8 # explode. py from odps.udf import annotate from odps.udf import BaseUDTF @annotate('string -> string') class Explode(BaseUDTF): """Output string comma-separated to multiple records """ def process(self, arg): props = arg.split(',') for p in props: self.forward(p) Referring to resources Python UDF can reference resource files through the ‘odps.distcache’ module. Currently, referencing file resources and table resources are supported. - odps.distcache.get_cache_file(resource_name) The example of using ‘get_cache_file’ is as follows: - Returns the resource content for the specified name. resource_name: ‘str’ type, corresponding to the existing resource name in the current project. If the resource name is invalid or has no responding resources, returns an error. - The return value is file-like object the caller must call the close method to release the open resource file after this object has been used. ): The example of using ‘get_cache_table’ is as follows: - Returns the contents of the specified resource table. resource_name: ‘str’ type, corresponding to the existing resource table name in the current project. If the resource name is invalid or has no responding resources, returns an error. - Returned value: Returned value is a ‘generator’ type. The caller obtains the table content through traversal. Each traversal has a record stored in the table in the form of a tuple.)
https://www.alibabacloud.com/help/doc-detail/73359.htm
CC-MAIN-2019-26
refinedweb
1,021
56.45
A simple C program to display "Hello, World!" on the screen. Since, it's a very simple program, it is often used to illustrate the syntax of a programming language. Program to Display "Hello, World!" #include <stdio.h> int main() { // printf() displays the string inside quotation printf("Hello, World!"); return 0; } Output Hello, World! How "Hello, World!" program works? - The #include <stdio.h>is a preprocessor command. This command tells compiler to include the contents of stdio.h(standard input and output) file in the program. The stdio.hfile contains functions such as scanf()and print( Hello, World! text on the screen. - The return 0;statement is the "Exit status" of the program. In simple terms, program ends with this statement.
http://anishsir.in/keywords-identifier/c-hello-world-program
CC-MAIN-2020-29
refinedweb
121
72.42
Suppose we have a list of words and a string called letters, we have to find the size of the longest word that can be made by rearranging the given letters. In the letters there may be asterisk character (*) it can match any character. And it is not necessary to use all the letters. So, if the input is like words = ["prince", "rice", "price", "limit", "hello"] letters = "*r**ce*", then the output will be 6, as the longest word we can make is "prince" the length is 6. To solve this, we will follow these steps: Let us see the following implementation to get better understanding: from collections import Counter class Solution: def solve(self, words, letters): has = Counter(letters) def valid(s): need = Counter(s) extra = sum([max(0, need[char] - has[char]) for char in need]) return extra <= has["*"] return max([len(word) for word in words if valid(word)]) ob = Solution() words = ["prince", "rice", "price", "limit", "hello"] letters = "*r**ce*" print(ob.solve(words, letters)) ["prince", "rice", "price", "limit", "hello"], "*r**ce*" 6
https://www.tutorialspoint.com/program-to-find-length-of-longest-word-that-can-be-formed-from-given-letters-in-python
CC-MAIN-2022-21
refinedweb
176
61.5
Troubleshooting Conversion to Visual Web Developer When you use Microsoft Visual Web Developer to open a Web application project that was created in earlier versions of Microsoft Visual Studio .NET, Visual Web Developer automatically converts the Web application to the format used in ASP.NET version 2.0. Under some circumstances, your Web applications will behave differently after conversion. This topic describes the most common of these situations and suggests solutions. For more information on migrating troubleshooting, you can also consult the migration information at the ASP.NET Development Center for Migration. This topic describes the following conversion issues: Controls Render Different Markup After Conversion Markup Validation Produces Errors Page Events Are Raised Twice After Conversion Ambiguous Classes Reported During Compilation Errors Related to Changes in the Code-Behind Page Model Excluded Files No Longer Excluded Partially Converted Solutions for Mixed Project Types Opening a Web-Based Site as a File-System Site Client-side IDs Get Deleted From the Code-Behind File In ASP.NET 2.0, unless the browser is identified as not supporting XHTML features, the Page class and ASP.NET Web server controls render markup by default that is compatible with the XHTML 1.0 Transitional standard. The conversion wizard automatically sets the mode attribute of the xhtmlConformance element to Legacy. After conversion, elements might be rendered slightly differently than they were in earlier versions of ASP.NET. In most cases, the differences in rendering have no effect on the functionality of the application. However, if you have client script that relies on specific tags or attributes, your application might not work as it did previously. For more information, see ASP.NET and XHTML. After migration, the default markup validation schema is set to Internet Explorer 6.0. This means that the editor compares markup in your page against a schema that defines what Microsoft Internet Explorer 6.0 considers valid HTML. This step is taken to make the transition to Visual Web Developer easier. It is a good practice to modify your markup so that your application pages validate using the XHTML 1.0 Transitional validation schema. For details on how to change the validation schema, see How to: Select Validation Schemas for HTML Editing in Visual Web Developer. The conversion process removes the AutoEventWireup attribute of the @ Page directive. The default value for this attribute is true, which means that the page automatically raises events that have the name Page_event. If a page had explicitly set the AutoEventWireup attribute to false, after the conversion, events on the page will be automatically raised. If the page includes another explicit way to raise the event, such as the Handles keyword in Visual Basic, the event might be raised twice. To resolve this issue, add AutoEventWireup="false" to the @ Page directive. After converting a project, it is possible that the compiler will report that a class is ambiguous, which means that it was imported from more than one namespace. For example, if a converted project creates an instance of the Cache class, the compiler reports that the class resides in both the System.Net and the System.Web.Caching namespaces. In cases like these, the .NET Framework version 2.0 contains a new class that has the same name as an existing class. To correct this problem, locate any references to the class in your code and then prepend the class name with the namespace name, creating a fully qualified reference. Converting projects with .aspx pages that access class protected members in code-behind classes might generate exceptions. This is caused by the change in the code-behind model in the .NET Framework 2.0. In earlier versions of the .NET Framework, pages were derived classes of code-behind classes. However, in ASP.NET 2.0, code-behind classes define partial classes that are used with the .aspx page during page generation to create the resulting compiled page. A common scenario in which you might encounter this conversion issue is in an application that defines shared layout components in a base class code-behind class. You can get the same shared layout functionality by using user controls or master pages, or by using the CodeFileBaseClass attribute of the @ Page directive. For more information about developing user controls, see ASP.NET User Controls Overview. For more information about using master pages, see ASP.NET Master Pages Overview. The conversion wizard reports parsing errors on .aspx files that could not be parsed. The causes of parsing problems fall into the following categories: The .aspx page was not correctly formatted before the conversion wizard was run. A CodeBehind or Src attribute of the @ Page directive was not found. The code-behind file referenced in an .aspx page was not found. An .aspx file is listed in the project file (.csproj or .vbproj, for example) but is not in the project directory. If the file is not part of the project, this error can be ignored. In previous versions of Visual Studio, you had the option to include or exclude files in a Web project. Additionally, a file could be excluded from the project build by setting its build action to None. The migration wizard treats these two cases differently. The migration wizard converts files in a Web project that are not marked as excluded. The migration wizard does not convert files that are not part of the project build -- files configured with their build action set to None. After the conversion process is complete, you can delete any previously excluded files or rename them with an extension that is not used in Visual Studio, such as the .exclude extension. If a file in a project within the Web project was not converted, check to make sure its build action is not set to None. Files that have their associated build action set to None generate an error message in the conversion report. For more information on the conversion report, see Migration Conversion Report Format. In Microsoft Visual Studio 2005 and previous versions it is possible have a solution that is composed of both Web projects and client projects such as class libraries or Windows applications. If you are using an express edition of Microsoft Visual Studio 2005, then only the part of the solution that pertains to the express edition can be converted. For example, if you use the conversion wizard in Visual Web Developer 2005 Express Edition, then you will only be able to convert the Web projects of solutions you open, regardless of what other project types the solution contains. The resulting converted solution will only be partially converted. To fully convert a solution containing mixed project types, use Visual Web Developer 2005, Visual Studio 2005, or Visual Studio 2005 Team System. The recommended way to open a Web site created in a previous version of Visual Studio is to use the Open Web Site menu option in Visual Web Developer 2005. You can then choose to open the site as a file-based site, a local Microsoft Internet Information Services (IIS) site, a File Transfer Protocol (FTP)-deployed site, or a remote site. Opening a Web-based site as a file-based site will cause IIS metadata information to be lost. In particular, information about subfolders marked as virtual directories will not be retained. The conversion report will report a warning when a Web-based site is converted to a file-based site. It is recommended that you close the Web site and reopen it using the Open Web Site command and selecting the Local IIS tab. For more information on how to use the migration wizard, see How to: Convert a Visual Studio .NET Project to Visual Studio 2005. For more information on the conversion report, see Migration Conversion Report Format. If you have markup that uses a client-side ID attribute (for example in an HTML div element) that has the same name as a member variable declared in the code-behind page, then during conversion the ID tag in the markup is removed. To address this issue, review your markup and code before conversion and look for conflicts in names between client-side ID attributes and member variables, and change them so they are using different names. The conversion process adds @ Reference directives to code-behind pages that reference other pages or user controls. There might be situations where this creates a circular reference. To aid in troubleshooting, you can set the batch attribute of the compilation element to False. The default batch attribute value is True. Setting the batch to False might eliminate circular reference issues. Longer term, you can redesign the pages or user controls to use an abstract base class defined in a class stored in the App_Code folder and set the batch attribute back to True.
http://msdn.microsoft.com/en-US/library/ms178461(v=vs.90)
CC-MAIN-2014-41
refinedweb
1,466
55.74
Hey version. This command specifically creates a project with .NET Core 5.0 as target. The --no-https flag specifies we will be only working with non-SSL HTTP server config, and the type of project we generate is web (from an empty ASP.NET core template). If the command is successful, we should now be able to see the folder GqlNet5Demo. Change directory on to it so we could start our changes to the template project. Inside the project folder, we need to add now the base core of GraphQL.Net library and its default deserializer. Execute the command in an open shell: Then this next package is optional only if you need GraphQL Websocket support, specially useful if you are implementing a subscription based GraphQL API. Anyways, for our project lets add this dependency. Also, add this other package which helps in debugging GraphQL statements on browser. This will install an embedded GraphQL Playground on our demo project, just don’t forget to remove this on a production server. After all those package installed, lets move on now on to editing our first file. Let’s create the file first named EhloSchema.cs and place it on the root folder. On the file, import the library namespace that we will be using. After importing the needed libraries, we implement our root query type which will contain the query structure of our GraphQL schema. The query type is useful if you want to only read data. From the above we also implemented our first query type named “greet” which can be then called like this on the GraphQL playground. The instruction on creating a GraphQL type starts with Field or AddField following by type of field that will be returned and its required field the name and of course resolver. If called on the GraphQL playground it would output a JSON with a data message containing “Hello, World”. To be able to run the GraphQL playground, let’s continue on the tutorial. Still on the file EhloSchema.cs, add this instructions below in order for us to create our first schema. This schema will map the Query to our created class EhloQuery instance. That’s all for now on the EhloSchema.cs file! This is the most basic requirement needed in order to create a super basic GraphQL server. Let’s now start modifying the Startup.cs file. Add this new imports which are needed for our constructor. This two imports allows us to use the IConfiguration and the IWebHostEnvironment abstract interface and their respective allowable methods. The next thing is implement our constructor and class scope variables. See below on what to implement. After implementing the constructor, we also need to import the GraphQL base library. Then on the ConfigureServices method we add and build the GraphQL service. If you look at the instructions above we set and add first our Schema as a singleton class that will be initialize once. Then we set parameters to our GraphQL server, and set its default deserializer. Also, don’t forget we add websocket and dataloader to it. The dataloader is useful to prevent n+1 attacks that happen on GraphQL servers. More information can be found on this link. We now need to implement calls to respective middlewares and activate the services. First is to activate the websocket protocol on our server, then also enable the GraphQL websocket middleware to inject our schema. The /graphql is the endpoint where the schema will be deployed. Don’t forget we need to activate also our GraphQL playground so we can use it on our demo GraphQL server. Here’s the full source of our Startup.cs, check whether if you forgot or missed something. If its all successful, then you should head out to:<port>/ui/playground to access the GraphQL Playground. The <port> field pertains to the port indicated in the applicationUrl inside launchSettings.json that can be found inside your project. If you encounter any problem, just try to re-check all the things we did above or check the full source at bottom of this article. Our next step is to implement a complex query structure. We first need to implement this classes in our EhloSchema.cs. This will create two classes which are Message and MessageType. The Message class will be our model class that will store data temporary into our program’s memory. And the MessageType will be the conversion from GraphQL type to our model class which is After that we need to implement this new field type on our EchoQuery constructor. This a simple example or returning low-complex type query on our server. Then to test it, we need to access our GraphQL Playground to execute this GraphQL statement. If everything is okay, it would return a JSON containing no error message and correct response with structure similar to Message data structure. Next, we move to mutation type. The mutation type is specifically useful if you want to modify data, in CRUD it will be the CUD (Create, Update and Delete). We now need to create the root mutation type, just implement the following class below. On the constructor, you’ll see we also implemented a field type that will return string and accepts one string argument. We also need to initialize this mutation class that we created on our main schema. Add the line below in the constructor of our EhloSchema class. After implementing the mutation, build and run the whole project and go to GraphQL Playground to test our mutation. In our case the mutation doesn’t modify any stored data but just return a simple string appended by argument. The mutation statement starts with mutation instead of query. Next, we implement GraphQL subscription. The subscription on GraphQL is mostly used on events (e.g. someone registered, login notifications, system notifications, etc.) but mostly it can be use on anything that can be streamed. Let’s implement it now on our EhloSchema.cs file. Similar to the Query and Mutation, will only implement simple event stream resolver and a subscriber listener. The greetCalled method will just return a simple string upon call on OnNext. Then on EhloSchema constructor same in mutation we also link the root subscription type. Then we test it on GraphQL Playground. In order to call a subscription type, we start by using the subscription statement. Here’s the full source code of EhloSchema.cs file. You can re-check all the changes you did before and compare it to this. Also on this source, you’ll find that we also implemented a low-complex method in mutation that will return a structure on mutation. The mutation also accepts custom structure named MessageInputType. That’s all guys, after checking — build and run the whole project. 🙌 Conclusion Implementing GraphQL seems a bit daunting at first, but if you know the internals of it you’ll reap many benefits by using it versus normal REST API endpoints. It’s not for this article to discuss the pros and cons of that. Anyways, as you can see its bit easy now to implement GraphQL on C# but I don’t see many enterprise switching over it as it will probably disrupt some of their services. You can found the complete repository here. Let me know in the comments if you have questions or queries, you can also DM me directly. Follow me for similar article, tips, and tricks ❤. - GraphQL is an open-source data query and manipulation language for APIs, and a runtime for fulfilling queries with existing data. GraphQL was developed internally by Facebook in 2012 before being publicly released in 2015. ↩︎ -. ↩︎ - ASP.NET is an open-source, server-side web-application framework designed for web development to produce dynamic web pages. It was developed by Microsoft to allow programmers to build dynamic web sites, applications and services. ↩︎
https://ffimnsr.medium.com/quick-simple-graphql-provider-on-asp-net-core-5-0-6edf52236c18?source=---------2----------------------------
CC-MAIN-2021-21
refinedweb
1,317
65.93
inline-java Java interop via inline Java code in Haskell modules. See all snapshots inline-java appears in Module documentation for 0.8.3 - Language inline-java: Call any JVM function from Haskell NOTE 1: you’ll need GHC >= 8.0.2 to compile and use this package. The Haskell standard includes a native foreign function interface (FFI). Using it can be a bit involved and only C support is implemented in GHC. inline-java lets you call any JVM function directly, from Haskell, without the need to write your own foreign import declarations using the FFI. In the style of inline-c for C and inline-r for calling R, inline-java lets you name any function to call inline in your code. It is implemented on top of the jni and jvm packages using a GHC Core plugin to orchestrate compilation and loading of the inlined Java snippets. Example Graphical Hello World using Java Swing: {-# LANGUAGE DataKinds #-} {-# LANGUAGE QuasiQuotes #-} {-# LANGUAGE OverloadedStrings #-} {-# OPTIONS_GHC -fplugin=Language.Java.Inline.Plugin #-} module Main where import Data.Text (Text) import Language.Java import Language.Java.Inline main :: IO () main = withJVM [] $ do message <- reflect ("Hello World!" :: Text) [java| { javax.swing.JOptionPane.showMessageDialog(null, $message); } |] Building it Requirements: - the Stack build tool (version 1.2 or above); - either, the Nix package manager, - or, OpenJDK and Gradle installed from your distro. On OS X, you’ll need to install the Legacy Java SE 6 runtime when prompted, even when using Nix. To build: $ stack build You can optionally get Stack to download a JDK in a local sandbox (using Nix) for good build results reproducibility. This is the recommended way to build inline-java. Alternatively, you’ll need it Debugging The generated java output can be dumped to stderr by passing to GHC -fplugin-opt=Language.Java.Inline.Plugin:dump-java If -ddump-to-file is in effect (as when using stack), the java code is dumped to <module>.dump-java instead. License inline-java is free software, and may be redistributed under the terms specified in the LICENSE file. Sponsors inline-java is maintained by Tweag I/O. Have questions? Need help? Tweet at @tweagio. Changes Change Log All notable changes to this project will be documented in this file. The format is based on Keep a Changelog. [0.8.4] - 2018-07-11 Changed - Dependency bounds and import declarations to build with ghc 8.4.1. [0.8.3] - 2018-07-04 Changed - Rename all BUILD files to BUILD.bazel. - Workaround Gradle sometimes trashing output in recent versions. [0.8.2] - 2018-02-27 Changed - Fix check for settings.gradle file in cabal hooks. Prevents the file from growing a few bytes each time a project using gradle hooks is rebuilt. [0.8.1] - 2018-02-27 Changed - Relaxed upper bound of jni to admit jni-0.6.0. [0.8.0] - 2018-02-27 Added addJarsToClasspath: a function to add a list of jar paths to the CLASSPATH in cabal hooks. Changed gradleHooksnow extends the CLASSPATH even if the CLASSPATH is set. - Renamed setGradleClasspathto prependClasspathWithGradle. [0.7.2] - 2017-12-27 Changed - CLASSPATH is now set in Cabal hooks before running haddock. [0.7.1] - 2017-12-05 Added - A hello-java example project. - Upper bounds to jniand jvm. Changed - Normalize type families before inspecting the return type of quasiquotations. [0.7.0] - 2017-08-31 Added - Plugin option to dump the generated Java to the console or a file. - Partial support for inner classes. Antiquoted variables and quasiquotation results can refer to inner classes now. Changed - Use a compiler plugin to build the bytecode table and to generate Java code. We no longer need static pointers to find the bytecode at runtime, and we can check at build-time that values are marshaled between matching types in Java and Haskell when using antiquated variables or the result of quasiquotations. Also, now java quasiquotes work inside Template Haskell brackets ([| … |]). - Use only the lexer in language-java. This defers most parsing errors to the javaccompiler which produces better error messages and might support newer syntactic constructs like anonymous functions. - Java checked exceptions are now allowed in java quasiquotes. Fixed - Gradle hooks now produce a correct build-time classpath. [0.6.5] - 2017-04-13 Added - Exposed loadJavaWrappers. [0.6.4] - 2017-04-09 Fixed - Fixed handling of repeated antiquotation variables, which in some cases was causing a compilation error. [0.6.3] - 2017-03-12 Fixed - Setting the CLASSPATHusing Gradle is now fully supported. It was previously unusable due to a bug (see #42). [0.6.2] - 2017-02-21 - Avoid producing warnings about unused inlinejava_bytecode0 bindings. - Support type synonyms in variable antiquotation. - Update lower bounds of jni to 0.3 and jvm to 0.2. [0.6.1] - 2016-12-27 - Support passing array objects as arguments / return values. - More robust mangling of inline class name. [0.6.0] - 2016-12-13 Added - Can set a custom CLASSPATHin Setup.hsfrom Gradle build configurations to use when compiling inline expressions. - GHC 8 compatibility - Support inline expressions that compile to multiple .class files (e.g for anonymous classes and anonymous function literals). Changed - The return type of inline expressions no longer needs Reify/ Reflectinstances. Fixed - Fix antiquotation: in [java| $obj.foo() |], objis now recognized as an antiquotation variable. - Passing multiple options to the JVM using withJVM. [0.5.0] - 2016-12-13 Added - First release with support for inline Java expressions. Changed - Split lower-level and mid-level bindings into separate packages: jni and jvm.
https://www.stackage.org/package/inline-java
CC-MAIN-2018-30
refinedweb
920
60.21
The functions and classes in this module are available from Python-based scripts, DTML, and Page Templates. DTML - temporary, security-restricted DTML objects Render the DTML. To accomplish its task, DTML often needs to resolve various names into objects. For example, when the code <dtml-var spam> is executed, the DTML engine tries to resolve the name spam. In order to resolve names, you must be pass a namespace to the DTML. object is the composite of these three methods. You can pass any number of them or none at all. Names will be looked up first in the keyword argument, next in the client and finally in the mapping. Create a DTML object with source text and keyword variables. The source text defines the DTML source content. The optinal keyword arguments define variables. Convert a mapping object (such as a dictionary) or a sequence of two-element tuples to a URL encoded query string. Useful for generating query strings programmatically. "Python urllib module": urlencode function. Convert newlines and carriage-return and newline combinations to break tags. Insert commas every three digits to the left of a decimal point in values containing numbers. For example, the value, "12000 widgets" becomes "12,000 widgets". Convert characters that have special meaning in URLS to HTML character entities using decimal values. "Python urllib module": quote function. Like url_unquote but also replace + characters with blank spaces. "Python urllib module": unquote_plus function. Convert HTML %xx character entities into the characters they represent. (Undoes the affects of url_quote). "Python urllib module": unquote function. Show a numeric value with a dollar symbol. Convert single quotes to pairs of single quotes. This is needed to safely include values in Standard Query Language (SQL) strings. Show a numeric value with a dollar symbol and two decimal places. Like url_quote but also replace blank space characters with +. This is needed for building query strings in some cases. "Python urllib module": quote_plus function. Convert characters that have special meaning in HTML to HTML character entities. "Python cgi module": escape function. Convert a string in structured-text format to HTML. Structured-Text Rules
http://www.tcplweb.org/Control_Panel/Products/PythonScripts/Help/standard.py
CC-MAIN-2014-52
refinedweb
351
61.22
This is part of the series Django For Beginners we are going to see about apps in app and we will see about models in django in this part. In this post we are going to learn about queries in django. When we use django we do not need to write SQL Queries it is done by django itself, we write super user friendly syntax for the queries , Let's see we want to get all the objects in a model ( note each model is a table, it may be more depending on the type of relation used while creating it ), let the schema of this model be simple it will be as follows, from django.db import models class Book(models.Model): title = models.CharField(max_length=250) createdAt = models.DateTimeField(default=timezone.now) description = models.TextField() orders = models.PositiveItegerField(default=0) Now to get it all we use the following syntax, allBooks = Book.objects.all() and that's it will return all the books of QueryList form. How to run Queries in Django ? I should have told it first I know but I told it now because you should understand how easy it is to write queries in django. Now let's see how to run them, There are two ways, - Interactive Way ( in command line ). - In any python file. Interactive Way To use it interactively just go to your root directory of your django project and type the following command to start the interactive console, python manage.py shell It will start the interactive console from which you can import any model in the project, you can access all of the project files. Also you can also import normal python libraries. Regular Way You can import models to any file in the project and can use it as per your will and in later part of this series we are going to use in this way in views.py to write views for our website. Now let's see the basic operations on models,, To Create New Model Object To create new model object we first import it and then we use create method which is build in model on it and create it. Let me show a example to you, from myapp.models import Book newBook = Book.objects.create(title="Harry Potter - Some Part", description="Don't you know it ?") newBook.save() As you may have seen that creating models is simple damn simple. We just need to pass values in objects.create method of that model and store it in variable and than use save method on it. It is as simple as it could get. You may have seen that I have not passed certain parameters, such as createdAt and orders, because we have provided default values to it. But we can also pass it. Let me show you how, from myapp.models import Book from datetime import datetime from random import randint currentDateTime = datetime.now() orders = randint(0,10) newBook = Book.objects.create(title="Harry Potter - Some Part", description="Don't you know it ?", createdOn=currentDateTime, orders=orders) newBook.save() This is how it is done. You may have seen that I have passed createdOn in third place but while creating model it was in 2^nd^ place I did it to show that order in which you pass these keyword arguments doesn't matter. Query The Object Now comes the part of querying the model, here I will cover basics as querying is a very big topic, with the part I cover here would e more than enough for many project , at least in the beginning. Now let's start, Sorry to interrupt you but I want to tell you one thing that I have started a small blog you may continue reading it here it will help me a lot. Discussion Nice. Thank you! Welcome Sir.
https://practicaldev-herokuapp-com.global.ssl.fastly.net/ketanip/basic-operations-on-models-in-django-part-6-django-for-beginners-5636
CC-MAIN-2021-04
refinedweb
644
72.46
50th edition of The Java(tm) Specialists' Newsletter. Last week I casually mentioned that I was presenting my Design Patterns Course at "The Shuttleworth Foundation". I really thought I was. However, when I arrived at TSF, I discovered that I had gone to the wrong place My booking had been with Thawte Consulting, the company that Mark Shuttleworth sold to Verisign, and TSF has nothing to do with Thawte. I had simply assumed, and assumption is one of the biggest failings of a programmer. When I finally got there, I was amazed that all my students were there already, waiting for me. (The course was supposed to start at 8:30 and I got there at 8:20). The next day, when I arrived at 8:20 again (after missing my turnoff due to daydreaming), the students were *again* all there, waiting for me. WOW, I thought, these guys are *really* keen! The bubble burst when they told me that somehow they got the message that the course started at 8:00 instead of 8:30! The course went extremely well, partly due to very bright students and partly because I am getting more comfortable presenting this new course. Last Monday at 2:00am I at long last *clicked* with the GoF Factory Method. If you think you understand the Factory Method (like I did for a few years), my bet is that you actually don't You might understand a different type of pattern commonly known as "Factory Method", but there are very few people who understand the Factory Method according to GoF. Please let me know if your company would like some Design Patterns training, by simply sending me an email. I will personally contact you within 24 hours and we can take it from there. Something I dislike even more than useless comments is code that is commented out. When I work with code, instead of commenting it out, I delete it. That way I don't have to remember why I commented out broken code, and it makes my code much easier to maintain. It's like telling the truth: you don't have to remember what you said. However, this newsletter is not a rant about commented out code, it is about how even commented out code can cause compiler failures, and how commented out code can end up as part of your class. I want to thank Clark Updike from for the ideas that sparked this newsletter. He picked it up while studying for the Sun Certified Java Programmer (SCJP) Examination, which I did not author, by the way. I know the guys at Sun can be quite evil with the SCJP, but I don't think they would go this far. The SCJP seems to be getting more difficult to keep pace with the immense number of Java developers arriving on the scene. When I wrote it, you basically had to show up to get 91%. I promised you last week that I would show you some code that could not compile, even though the problem code was commented out. Let's first look at the original program: public class A1 { Character aChar = new Character('u000d'); } Try compile it, and you will get an error, such as: A1.java:2: illegal line end in character literal Character aChar = new Character('u000d'); ^ 1 error Imagine sitting with this code, and not getting it to compile. What would you do? You would probably comment out the offending line to try get it to compile: public class A2 { // Character aChar = new Character('u000d'); } You compile it, and what do you get: 2 errors instead of the 1 that you had without the comment! A2.java:3: unclosed character literal } ^ A2.java:3: expected } ^ 2 errors But we can get even more confusing, have a look at class A3: public class A3 { // Character aChar = new Character('u000d{System.out.println("Hello");} } Amazingly, it compiles, but does it do anything? Let's have a look at A3Test.java: public class A3Test { public static void main(String[] args) { new A3(); } } The test compiles, and when we run it, the output is: Hello Say what? I'm sure that you know what happens. The unicode character 'u000d' gets converted to a newline character as part of the "preparation for compile". At some point, before the class A2 actually gets compiled, it looks like this: 'u000d' public class A2 { // Character aChar = new Character(' '); } Obviously that does not compile! Similarly, at some point, A3 looks like this: public class A3 { // Character aChar = new Character(' {System.out.println("Hello");} } I wish I could say: There, you should not comment out code! However, I can only say that you will get strange effects if you use 'u000a' or 'u000d' in your code. 'u000a' Until the next newsletter ... Heinz RSS feed Java FAQ News
http://www.javafaq.nu/java-article912.html
CC-MAIN-2014-41
refinedweb
809
70.13
Hi, I need to make a program that can count and solve basic math problems (addition, subtraction) with natural integers using strings. I'm not aloved to use parseInt so thats basicly where my world started to fall apart... Would realy appreciate if someone could help me with this. The code I have been given import java.util.*; //Scanner import static java.lang.System.out; public class OperationerMedNaturligaHeltalGivnaSomTeckenstranger { public static void main(String[] args) { out.println ("OPERATIONS WITH NATURAL INTEGES GIVEN " + "AS CHARACTER STRINGS\n"); // input the natural integers Scanner in = new Scanner (System.in); out.println ("two natural integers"); String tal1 = in.next(); String tal2 = in.next(); out.println(); // add up the integers String tal = addera (tal1,tal2); // set an appropiate length on the integers and the result (this should be here) int len1 = tal1.length (); int len2 = tal2.length (); int len = tal.length (); int maxLen = Math.max(Math.max (len1, len2), len); tal1 = sattLen (tal1, maxLen - len1); tal2 = sattLen (tal2, maxLen - len2); tal = sattLen (tal, maxLen - len); // show the integers and the result out.println (" " + tal1); out.println(" " + tal2); for (int i = 0; i < maxLen + 2; i++){ out.println ("-"); } out.println (); out.println (" " + tal + "\n"); // the numbers should also subtract, and show the diferential // here I just setup the call to the metod // String diffTal = subtrahera (tal1, tal2); // here I just setup how it should be displayed // int diffLen = diffTal.length(); // diffTal = sattLen(diffTal, maxLen - diffLen); } // addera takes two natural integers given as character strings, // and returns their sum as a character string public static String addera (String tal1, String tal2){ String summa = ""; for(int i = 0; i < tal1.length(); i++){ summa += tal1.charAt(tal1.length()-i-1); } return (summa); } // subtrahera takes two natural integers given as character strings, // and returns their diferential as a character string. // The first integer is not smaller than the second integer. /* public static String subtrahera (String tal1, String tal2){ } */ // sattLen adds a given number of blanks // at the start of a given string public static String sattLen (String s, int antal){ StringBuilder sb = new StringBuilder (s); for (int i = 0; i < antal; i++){ sb.insert (0, " "); } return sb.toString(); } } So what I basicly need is help with addera, cuse if I can get that I think I can solve the rest.
https://www.daniweb.com/programming/software-development/threads/469023/doing-math-with-strings
CC-MAIN-2019-18
refinedweb
379
65.42
Inky pHAT Driver Project description. Installation The Python pip package is named einky, install with: sudo pip install einky Usage The Inky library contains modules for both the pHAT and wHAT, load the InkyPHAT one as follows: from inky import InkyPHAT You’ll then need to pick your colour, one of ‘red’, ‘yellow’ or ‘black’ and instantiate the class: inkyphat = InkyPHAT('red') If you’re using the wHAT you’ll need to load the InkyWHAT class from the Inky library like so: from inky import InkyWHAT inkywhat = InkyWHAT('red') Since Inky wHAT is currently only available in red, we pick that colour. 0.0.4 - BugFix: Reverted normal red LUTs to correct values 0.0.3 - Enhancement: Added support for display variant detection - Enhancement: Added DocStrings - BugFix: Fixed set_border for all colours 0.0.2 - BugFix: Yellow Inky pHAT now yellow instead of brown/black - Enhancement: Performance tweak for set_image 0.0.1 - Initial Release Project details Download files Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
https://pypi.org/project/einky/
CC-MAIN-2021-25
refinedweb
178
64.75
This article describes my attempts at deploying a .NET Framework 2.0 application using InstallShield X. I'm not really happy with the outcome, but hopefully it will help someone understand the issues and perhaps pave the way for something better. InstallShield X provides a helpful deployment wizard that allows you to select the version of .NET Framework from a drop-down list box. This takes out of your hands all the messy business of detecting the .NET version on the target platform and installing the appropriate framework; you just make your selection and it's all done for you. Unfortunately, the list box doesn't support .NET v2.0 and after consulting the Macrovision website it became clear that there are no plans to address this issue in the near future; see this. It was for this reason that I decided to write this article. The problem can be split into the following steps: I found a program called DetectDotNet after searching CodeProject. This seemed to do most of what was required for the first step. However, it needed a bit of surgery before it could take the required .NET Framework as an input parameter and return a suitable exit code; see Listing 1. My plan was to create an InstallShield script and custom action that would launch DetectDotNet and run the necessary installation packages before continuing with the installation; see Listing 2. However, I ran into the following problems, which is why I'm not too happy with the overall result: The solution presented here doesn't check whether Windows Installer 3.0 has been installed on the target platform because I ran out of time. The best I can suggest for now is that you tell the user to install Windows Installer 3.0 before running your setup.exe (or App.msi). Installing this program multiple times doesn't seem to hurt. The dependency on Windows Installer 3.0 (or 3.1) seems to imply that the only supported environments for .NET v2.0 are: However, you can use Windows Installer 2.0 for non-NT platforms so this extends your reach to: [Thanks to David Kean for informing me about the above dependencies]. You can find the redistributables for Windows Installer 3.1 (WindowsInstaller-KB893803-v2-x86.exe) and .NET v2.0 Framework (dotnetfx.exe) in the Microsoft website. I created the installation program and the script using InstallShield X, but other versions work in a similar fashion: //******************************************* //program takes an optional single parameter, //the version of CLR to find. The //program returns 0 (success)if this version //of CLR is found, otherwise it //returns -1 (fail). If no parameter is given //the program returns 0 (success). // // examples: // c:\>DetectDotNet 1.2.4455 //returns 0 if v 1.2.4455 is found // c:\>DetectDotNet 2.0* //returns 0 if any v2.0 of CLR is found // c:\>DetectDotNet 1.* //returns 0 if any v 1. of CLR is found // c:\>DetectDotNet * //returns 0 if any version of CLR is found // c:\>DetectDotNet //returns 0 whether CLR is found or not //********************************************************************** int _tmain(int argc, _TCHAR* args[]) { int rc = 0; size_t matchLen = 0; CDetectDotNet detect; if ( argc > 1 ) { matchLen = _tcslen(args[1]); for ( size_t x = 0; x < matchLen; x++ ) { if ( args[1][x] == '*' ) { matchLen = x; args[1][x] = '\0'; } } cout << "searching for v" << args[1] << endl; rc = -1; } vector<STRING> CLRVersions; // cout lines ommitted for clarity for(vector<STRING>::iterator it = CLRVersions.begin(); it < CLRVersions.end(); it++) { cout << *it << endl; if ( rc == -1) { if ((*it).compare(0,matchLen,args[1]) == 0) { cout << "matching CLR found" << endl; rc = 0; } } } return rc; } #define CHECKPROGRAM SUPPORTDIR^"Detect.cmd" #define BOOTPROGRAM SUPPORTDIR^"dotnetfx.exe" #include "ifx.h" export prototype DetectDotNet2(HWND); ///////////////////////////////////////////////////////////////////// // // Function: MyFunction // // Purpose: This function will be called by the script engine when // Windows(TM) Installer executes your custom action // (see the "To Do," above). // ///////////////////////////////////////////////////////////////////// function DetectDotNet2(hMSI) STRING svResult; BOOL bExit, bLaunchAndWait; begin LaunchAppAndWait (CHECKPROGRAM, "", LAAW_OPTION_WAIT | LAAW_OPTION_HIDDEN); if (FindFile (SUPPORTDIR, "Found.txt", svResult) < 0) then AskOptions (EXCLUSIVE, ".NET Framework 2.0 Deployment", "Install .NET Framework 2.0", bLaunchAndWait, "Abort installation", bExit); if bExit then abort; endif; if (LaunchAppAndWait(BOOTPROGRAM, "", LAAW_OPTION_WAIT) < 0) then abort; endif; endif; end; echo off detectdotnet 2.* if %errorlevel% EQU 0 (echo found > found.txt) This article has no explicit license attached to it but may contain usage terms in the article text or the download files themselves. If in doubt please contact the author via the discussion board below. A list of licenses authors might use can be found here <br /> #define CHECKPROGRAM SUPPORTDIR^"Detect.cmd"<br /> #define BOOTPROGRAM SUPPORTDIR^"dotnet2.exe"<br /> <br /> #include "ifx.h"<br /> <br /> export prototype DetectDotNet2(HWND); <br /> <br /> /////////////////////////////////////////////////////////////////////<br /> // <br /> // Function: MyFunction<br /> // <br /> // Purpose: This function will be called by the script engine when <br /> // Windows(TM) Installer executes your custom action <br /> // (see the "To Do," above).<br /> // <br /> /////////////////////////////////////////////////////////////////////<br /> function DetectDotNet2(hMSI) <br /> STRING svResult;<br /> begin <br /> <br /> LaunchAppAndWait (CHECKPROGRAM, "", LAAW_OPTION_WAIT |<br /> LAAW_OPTION_HIDDEN); <br /> <br /> if (FindFile (SUPPORTDIR, "Found.txt", svResult) < 0) then <br /> if (LaunchAppAndWait(BOOTPROGRAM, "", WAIT) < 0) then<br /> MessageBox ("Error installing .NET Framework 2.0", WARNING); <br /> endif; <br /> endif; <br /> end;<br /> General News Suggestion Question Bug Answer Joke Praise Rant Admin Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.
http://www.codeproject.com/Articles/12236/Installing-NET-Framework-2-0-Applications-with-Ins
CC-MAIN-2017-17
refinedweb
892
58.58
In the first article in this series I went through the process of setting up a database for identity storage and storing a single admin user in the database. However I still have not enabled logins to my application yet. I need to enable identity within the application, set up a view that needs to be authenticated and write some views to handle logging in. I am not going to be adding registration in this article – that’s the subject for another day. You can retrieve the starting point for this article in the AspNetIdentity project on my GitHub repository. The first stop is to my Startup.cs file. I need to actually enable Identity in the same way as I enable static files, detailed error pages, browser link, MVC and just about anything else. I need to tell the pipeline that I am using identity. Like this: public void Configure(IApplicationBuilder app) { // A 404 Error Page with useful information app.UseErrorPage(ErrorPageOptions.ShowAll); // Serve up the stuff in wwwroot app.UseStaticFiles(); // Authentication and Authorization app.UseIdentity(); // Configure ASP.NET MVC6 app.UseMvc(routes => { routes.MapRoute( name: "default", template: "{controller=Home}/{action=Index}/{id?}" ); }); // Create a default user IdentityDbOperations.InitializeIdentityDbAsync(app.ApplicationServices).Wait(); } Just one line was added to this method. Now I need to get some authentication going. I want my whole application to require authentication except where it isn’t possible – like the login screen. I have a HomeController right now so let’s add authentication to that. Here is the whole file: using Microsoft.AspNet.Mvc; namespace AspNetIdentity.Controllers { [Authorize] public class HomeController : Controller { [HttpGet] public IActionResult Index() { return View(); } } } That [Authorize] tag tells the ASP.NET application that we want authentication. Let’s run our application and see what happens: This is just part of the detailed error report I get when I get the 404 result. The system is redirecting me to a login page because I’m not authorized to be on the home page. However the login page doesn’t exist. To create one I’m going to need an Account controller and a Login view. Let’s start with the controller. Add a new MVC Controller Class called AccountController. I’ve broken the class down into manageable chunks below: namespace AspNetIdentity.Controllers { public class AccountController : Controller { public AccountController(; } When my AccountController first gets created, it is passed the user manager and sign-in manager objects that are part of the Identity Framework (using Dependency Injection). I need to store those for later on. Those objects are stored in two properties that I’ve set to be read-only to the outside world. /** * GET /Account/Login */ [HttpGet] [AllowAnonymous] public IActionResult Login(string returnUrl = null) { ViewBag.ReturnUrl = returnUrl; return View(); } When first entering the login process, we saw that it does a GET of /Account/Login with a returnUrl field. This method processes that request and returns the login page. More on that later. [HttpPost] [AllowAnonymous] [ValidateAntiForgeryToken] public async Task<IActionResult> Login(LoginViewModel model, string returnUrl = null) { ViewBag.ReturnUrl = returnUrl; if (ModelState.IsValid) { var result = await SignInManager.PasswordSignInAsync(model.UserName, model.Password, model.RememberMe, shouldLockout: false); if (result.Succeeded) { return RedirectToLocal(returnUrl); } if (result.IsLockedOut) { return View("Lockout"); } else { ModelState.AddModelError("", "Invalid username or password."); return View(model); } } // If we got this far, something failed - redisplay the form return View(model); } This is a little more complex, but should be fairly readable. We first of all check that our parameters (which are contained in the LoginViewModel – more on that later) are good. If they are, then call the password checker in the sign-in manager. There are three possible outcomes – the login succeeded, the user is locked out or “something else”. I’m going to assume “something else” is a bad username or password. If the login is successful then the user is authenticated and gets redirected back to where they were. If not, then display the login page with appropriate information about the failure. To wrap this up I need to write the RedirectToLocal helper method: private IActionResult RedirectToLocal(string returnUrl) { if (Url.IsLocalUrl(returnUrl)) { return Redirect(returnUrl); } else { return RedirectToAction("Index", "Home"); } } This basically says “if you specified a valid local URL, then go there. Otherwise go to the home page.” There are two additional pieces I need to complete the sequence. The first is a basic ViewModel for the Login action. I’ve created a new directory called ViewModels and placed the LoginViewModel.cs in there: using System.ComponentModel.DataAnnotations; namespace AspNetIdentity.ViewModels { public class LoginViewModel { [Required] [Display(Name = "User name")] public string UserName { get; set; } [Required] [DataType(DataType.Password)] [Display(Name = "Password")] public string Password { get; set; } [Display(Name = "Remember me?")] public bool RememberMe { get; set; } } } ViewModels are just like models, except they model the data coming in from the client rather than the data going out to the client. You can add decorators to the view model properties to give the view some information on how to render it. In this case, I’m telling the view that the username and password are required fields in the form and have specific default display attributes. The second piece I need to complete the login sequence is a login view. I’m going to create a new layout file for the login view. I’ve placed this in Views/Layout/LoginPage.cshtml with the following contents: </Login.css"> <title>@ViewBag.Title</title> </head> <body> @RenderBody() </body> </html> I’ve also got a Views/Account/Login.cshtml view file which I will build. My initial contents (it will grow) are as follows: @model AspNetIdentity.ViewModels.LoginViewModel @{</div> I’m stopping there temporarily because I want to show this off in order. Right now, my LESS file is as follows: @import (less) "mixins/reset.less"; @loginbox-height: 200px; @loginbox-width: 200px; body { background-color: #666666; } .login-form-outer { border: 1px solid #333333; border-radius: 16px; background: white; width: @loginbox-width; height: @loginbox-height; position: absolute; left: 50%; top: 50%; margin-left: -(@loginbox-width / 2); margin-top: -(@loginbox-height / 2) } This uses a technique that I found on css-tricks.com for centering the box on the page. After this, everything else is in the form, so I won’t be worrying about the CSS too much. If you want to see the whole CSS, check out the project on GitHub at the end. Now, back to our Login view. The next thing we have to do is to bring in the form. This is the bulk of the view: @model AspNetIdentity.ViewModels.LoginViewModel @{ @using (Html.BeginForm("Login", "Account", new { ReturnUrl = ViewBag.ReturnUrl }, FormMethod.Post, new { @ @Html.LabelFor(m => m.UserName, new { @ @Html.TextBoxFor(m => m.UserName, new { @ @Html.LabelFor(m => m.Password, new { @ @Html.PasswordFor(m => m.Password, new { @ <div class="col-md-offset-2 col-md-10"> <div class="checkbox"> @Html.CheckBoxFor(m => m.RememberMe) @Html.LabelFor(m => m.RememberMe) </div> </div> </div> <div class="form-group"> <div class="col-md-offset-2 col-md-10"> <input type="submit" value="Log in" class="btn btn-default" /> </div> </div> } </div> Run this and see what you get. You should be able to enter any username and password – wrong ones will get you an Invalid username or password message. The correct admin password will get you to your home screen. We have not integrated our identity information into the existing views yet – we’ve just authenticated. My simple home page looks like this now: @{ ViewBag.Title = "Home Page"; } <h1>Hooray! Let's take a look at the user</h1> <p>Everything is in User.Identity</p> <ul> <li>AuthenticationType: @User.Identity.AuthenticationType</li> <li>IsAuthenticated: @User.Identity.IsAuthenticated</li> <li>Name: @User.Identity.Name</li> <li>IsInRole("admin"): @User.IsInRole("admin")</li> </ul> As you can see when you run this I can get the username, the admin status and the authentication type. In my next post I will take a look at what is required to register a new account for my application. Until then, check out my GitHub Repository for the latest code bundle.
https://shellmonger.com/2015/04/04/asp-net-vnext-identity-part-2-the-login-process/
CC-MAIN-2017-13
refinedweb
1,342
51.44
On Mon, Dec 27, 2010 at 10:12 PM, Michael Niedermayer <michaelni at gmx.at> wrote: > On Mon, Nov 15, 2010 at 08:37:01AM -0500, Alexander Strange wrote: >> See doc/multithreading.txt for details on use in codecs. >> --- >> doc/APIchanges | 5 + >> doc/multithreading.txt | 63 +++++ >> libavcodec/avcodec.h | 80 ++++++- >> libavcodec/options.c | 4 + >> libavcodec/pthread.c | 656 +++++++++++++++++++++++++++++++++++++++++++++++- >> libavcodec/thread.h | 98 +++++++ >> libavcodec/utils.c | 64 +++++- >> libavcodec/w32thread.c | 6 + >> libavformat/utils.c | 5 + >> libavutil/internal.h | 11 + >> 10 files changed, 979 insertions(+), 13 deletions(-) >> create mode 100644 doc/multithreading.txt >> create mode 100644 libavcodec/thread.h >> >> diff --git a/doc/APIchanges b/doc/APIchanges >> index b6806f8..c8892d9 100644 >> --- a/doc/APIchanges >> +++ b/doc/APIchanges >> @@ -13,6 +13,11 @@ libavutil: 2009-03-08 >> >> API changes, most recent first: >> >> +2010-11-XX - rX - lavc 52.xx.0 - threading API >> + Add CODEC_CAP_FRAME_THREADS with new restrictions on get_buffer()/ >> + release_buffer()/draw_horiz_band() callbacks for appropriate codecs. >> + Add thread_type and active_thread_type fields to AVCodecContext. >> + >> 2010-11-13 - r25745 - lavc 52.95.0 - AVCodecContext >> Add AVCodecContext.subtitle_header and AVCodecContext.subtitle_header_size >> fields. >> diff --git a/doc/multithreading.txt b/doc/multithreading.txt >> new file mode 100644 >> index 0000000..65bdfb1 >> --- /dev/null >> +++ b/doc/multithreading.txt >> @@ -0,0 +1,63 @@ >> +FFmpeg multithreading methods >> +============================================== >> + >> +FFmpeg provides two methods for multithreading codecs. >> + >> +Slice threading decodes multiple parts of a frame at the same time, using >> +AVCodecContext execute() and execute2(). >> + >> +Frame threading decodes multiple frames at the same time. >> +It accepts N future frames and delays decoded pictures by N-1 frames. >> +The later frames are decoded in separate threads while the user is >> +displaying the current one. >> + >> +Restrictions on clients >> +============================================== >> + >> +Slice threading - >> +* The client's draw_horiz_band() must be thread-safe according to the comment >> + in avcodec.h. >> + >> +Frame threading - >> +* Restrictions with slice threading also apply. >> +* The client's get_buffer() and release_buffer() must be thread-safe as well. >> +* There is one frame of delay added for every thread beyond the first one. >> + Clients using dts must account for the delay; pts sent through reordered_opaque >> + will work as usual. >> + >> +Restrictions on codec implementations >> +============================================== >> + >> +Slice threading - >> + None except that there must be something worth executing in parallel. >> + >> +Frame threading - >> +* Codecs can only accept entire pictures per packet. >> +* Codecs similar to ffv1, whose streams don't reset across frames, >> + will not work because their bitstreams cannot be decoded in parallel. >> + > >> +* The contents of buffers must not be read before ff_thread_await_progress() >> + has been called on them. reget_buffer() and buffer age optimizations no longer work. > > why does the buffer age optimization not work anymore? > if a MB is skiped in 100 frames and you have 10 frame decoding threads then > the optim should allow some skiping still. And actually this should be easy > And it does happen in reality (the black bars on top and bottom of films) The problem is that each decoding thread has its own copy of the AVCodecContext, and when get_buffer() is called it uses that copy. So they end up with their own internal_buffer, and the ages don't make sense when the AVFrames travel across threads. This can be fixed by sharing the same internal_buffer between threads. But I tried it and everything broke; I spent too much time looking at it so I've punted it into a branch: The nice thing is that mt adds so much speed (clock time) than skipping that I found it didn't really matter on mpeg4 I tried, so I think this can be put off. VP3 and H264 don't use it at all. The new patch works with mplayer dr + custom get_buffer() by default, as it calls get_buffer() on the client's thread by default. Setting thread_safe_callbacks restores the old behavior and ffplay uses this. !thread_safe_callbacks is slower, and dr is not any faster than !dr for me, so it can probably improve a little by disabling dr. > [...] >> @@ -1203,7 +1219,8 @@ typedef struct AVCodecContext { >> * If non NULL, 'draw_horiz_band' is called by the libavcodec >> * decoder to draw a horizontal band. It improves cache usage. Not >> * all codecs can do that. You must check the codec capabilities >> - * beforehand. >> + * beforehand. May be called by different threads at the same time, >> + * so implementations must be reentrant. > > thread safe or reentrant ? > for many video filters, slice N has to be done before N+1 starts, and they have > to be called in order even if you mix calls from several frames. Unfortunately the patch doesn't enforce this. I looked at it and I believe this was already not enforced (just decode mpeg2 with threads on and it will be called out of order), but nothing ever seemed to use draw_horiz_band() with 4:2:0 video, so nobody noticed. Wrote a longer comment about what you can expect. (which is that anything at all can happen) Note that playing 4:2:2 Theora video with this patch series will break in mplayer because of this, but it's better to turn it off in mplayer than to fix it in here IMO. >> >> * The function is also used by hardware acceleration APIs. >> * It is called at least once during frame decoding to pass >> * the data needed for hardware render. >> @@ -1457,6 +1474,9 @@ typedef struct AVCodecContext { >> * if CODEC_CAP_DR1 is not set then get_buffer() must call >> * avcodec_default_get_buffer() instead of providing buffers allocated by >> * some other means. >> + * May be called from a different thread if thread_type==FF_THREAD_FRAME >> + * is set, but not by more than one thread at once, so does not need to be >> + * reentrant. > > isnt it thread_type&FF_THREAD_FRAME ? Yes. > and it can be called from more than one thread at once i think There's a mutex around it (buffer_mutex) so it can't be. > [...] >> @@ -2811,6 +2863,26 @@ typedef struct AVCodec { >> const int64_t *channel_layouts; ///< array of support channel layouts, or NULL if unknown. array is terminated by 0 >> uint8_t max_lowres; ///< maximum value for lowres supported by the decoder >> AVClass *priv_class; ///< AVClass for the private context >> + >> + /** >> + * @defgroup framethreading Frame-level threading support functions. >> + * @{ >> + */ >> + /** >> + * If defined, called on thread contexts when they are created. >> + * If the codec allocates writable tables in init(), re-allocate them here. >> + * priv_data will be set to a copy of the original. >> + */ >> + int (*init_thread_copy)(AVCodecContext *); > >> + /** >> + * Copy necessary context variables from a previous thread context to the current one. >> + * If not defined, the next thread will start automatically; otherwise, the codec >> + * must call ff_thread_finish_setup(). >> + * >> + * dst and src will (rarely) point to the same context, in which case memcpy should be skipped. >> + */ >> + int (*update_thread_context)(AVCodecContext *dst, AVCodecContext *src); > > src could be const Done. > > > [...] >> +int ff_thread_decode_frame(AVCodecContext *avctx, >> + AVFrame *picture, int *got_picture_ptr, >> + AVPacket *avpkt) >> +{ >> + FrameThreadContext *fctx = avctx->thread_opaque; >> + int finished = fctx->next_finished; >> + PerThreadContext *p; >> + int err; >> + >> + /* >> + * Submit a frame to the next decoding thread. >> + */ >> + >> + p = &fctx->threads[fctx->next_decoding]; >> + update_context_from_user(p->avctx, avctx); >> + err = submit_frame(p, avpkt); >> + if (err) return err; >> + >> + fctx->next_decoding++; >> + >> + /* >> + * If we're still receiving the initial frames, don't return a picture. >> + */ >> + >> + if (fctx->delaying && avpkt->size) { >> + if (fctx->next_decoding >= (avctx->thread_count-1)) fctx->delaying = 0; >> + >> + *got_picture_ptr=0; >> + return 0; >> + } >> + >> + /* >> + * Return the next available picture from the oldest thread. >> + * If we're at the end of the stream, then we have to skip threads that >> + * didn't output a picture, because we don't want to accidentally signal >> + * EOF (avpkt->size == 0 && *got_picture_ptr == 0). >> + */ >> + >> + do { >> + p = &fctx->threads[finished++]; >> + >> + if (p->state != STATE_INPUT_READY) { >> + pthread_mutex_lock(&p->progress_mutex); >> + while (p->state != STATE_INPUT_READY) >> + pthread_cond_wait(&p->output_cond, &p->progress_mutex); >> + pthread_mutex_unlock(&p->progress_mutex); >> + } >> + >> + *picture = p->picture; >> + *got_picture_ptr = p->got_picture; >> + >> + avcodec_get_frame_defaults(&p->picture); >> + p->got_picture = 0; >> + >> + if (finished >= avctx->thread_count) finished = 0; >> + } while (!avpkt->size && !*got_picture_ptr && finished != fctx->next_finished); >> + >> + update_context_from_thread(avctx, p->avctx, 1); >> + >> + if (fctx->next_decoding >= avctx->thread_count) fctx->next_decoding = 0; >> + >> + fctx->next_finished = finished; >> + >> + return p->result; >> +} > > I think this design has some issues. > 1. (minor) I dont see why you dont return frames when they are ready at the > begin > 2. Frames can have variable duration, if the picture doesnt change. A timespan > of 2 seconds without changes is quite realistic, 32 frames make one minute > delay, this will kill AV sync with some players and could also underflow > video buffers if they are time based (iam thinking of RT*P here). > Thus i think frames should be returned when they are ready > 3. This code blocks when no frame is available to be returned, thats ok but > we should try to also support a non blocking EAGAIN returning form, > its usefull for players that try to also do other things in the decoding > thread and dont want to be blocked for half a second in unlucky cases > [...] >> + /* >> + * Buffer age is difficult to keep track of between >> + * multiple threads, and the optimizations it allows >> + * are not worth the effort. It is disabled for now. >> + */ >> + f->age = INT_MAX; > > I see nothing hard in relation to age and threads. > Please elaborate what is difficult Commented up there. > [...] >> +/** >> + * Set the threading algorithms used. >> + * >> + * Threading requires more than one thread. >> + * Frame threading requires entire frames to be passed to the codec, >> + * and is incompatible with low_delay. >> + * >> + * @param avctx The context. >> + */ >> +static void validate_thread_parameters(AVCodecContext *avctx) >> +{ >> + int frame_threading_supported = (avctx->codec->capabilities & CODEC_CAP_FRAME_THREADS) >> + && !(avctx->flags & CODEC_FLAG_TRUNCATED) >> + && !(avctx->flags & CODEC_FLAG_LOW_DELAY) >> + && !(avctx->flags2 & CODEC_FLAG2_CHUNKS); >> + if (avctx->thread_count == 1) >> + avctx->active_thread_type = 0; >> + else if (frame_threading_supported && (avctx->thread_type & FF_THREAD_FRAME)) >> + avctx->active_thread_type = FF_THREAD_FRAME; >> + else >> + avctx->active_thread_type = FF_THREAD_SLICE; > > style nitpick if{}else if{}else Done. > [...] >> +/** >> + * Waits for decoding threads to finish and resets internal >> + * state. Called by avcodec_flush_buffers(). >> + * >> + * @param avctx The context. >> + */ >> +void ff_thread_flush(AVCodecContext *avctx); >> + >> +/** >> + * Submits a new frame to a decoding thread. >> + * Returns the next available frame in picture. *got_picture_ptr >> + * will be 0 if none is available. >> + * >> + * Parameters are the same as avcodec_decode_video2(). >> + */ >> +int ff_thread_decode_frame(AVCodecContext *avctx, AVFrame *picture, >> + int *got_picture_ptr, AVPacket *avpkt); >> + >> +/** >> + * Codecs which define update_thread_context should call this >> + * when they are ready for the next thread to start decoding >> + * the next frame. After calling it, do not change any variables >> + * read by the update_thread_context method. >> + * >> + * @param avctx The context. >> + */ >> +void ff_thread_finish_setup(AVCodecContext *avctx); >> + > > > >> +/** >> + * Call this when some part of the picture is finished decoding. >> + * Later calls with lower values of progress have no effect. >> + * >> + * @param f The picture being decoded. >> + * @param progress Value, in arbitrary units, of how much of the picture has decoded. >> + * @param field The field being decoded, for field-picture codecs. >> + * 0 for top field or frame pictures, 1 for bottom field. >> + */ >> +void ff_thread_report_progress(AVFrame *f, int progress, int field); >> + >> +/** >> + * Call this before accessing some part of a picture. >> + * >> + * @param f The picture being referenced. >> + * @param progress Value, in arbitrary units, to wait for. >> + * @param field The field being referenced, for field-picture codecs. >> + * 0 for top field or frame pictures, 1 for bottom field. >> + */ >> +void ff_thread_await_progress(AVFrame *f, int progress, int field); >> + >> +/** >> + * Call this function instead of avctx->get_buffer(f). >> + * >> + * @param avctx The current context. >> + * @param f The frame to write into. >> + */ >> +int ff_thread_get_buffer(AVCodecContext *avctx, AVFrame *f); >> + >> +/** >> + * Call this function instead of avctx->release_buffer(f). >> + * >> + * @param avctx The current context. >> + * @param f The picture being released. >> + */ >> +void ff_thread_release_buffer(AVCodecContext *avctx, AVFrame *f); > > You should document what the functions "do" not when to call them. > Well you should document when to call them too but what they do is more > important IMHO. And i mean from a high level view not low level implementation > dox of course Wrote more comments. >> >> + >> +#endif /* AVCODEC_THREAD_H */ >> diff --git a/libavcodec/utils.c b/libavcodec/utils.c >> index 3875140..c931484 100644 >> --- a/libavcodec/utils.c >> +++ b/libavcodec/utils.c >> @@ -36,6 +36,7 @@ >> #include "dsputil.h" >> #include "libavutil/opt.h" >> #include "imgconvert.h" >> +#include "thread.h" >> #include "audioconvert.h" >> #include "internal.h" >> #include <stdlib.h> >> @@ -256,6 +257,11 @@ int avcodec_default_get_buffer(AVCodecContext *s, AVFrame *pic){ >> (*picture_number)++; >> >> if(buf->base[0] && (buf->width != w || buf->height != h || buf->pix_fmt != s->pix_fmt)){ >> + if(s->active_thread_type&FF_THREAD_FRAME) { >> + av_log_missing_feature(s, "Width/height changing with frame threads is", 0); >> + return -1; >> + } >> + >> for(i=0; i<4; i++){ >> av_freep(&buf->base[i]); >> buf->data[i]= NULL; >> @@ -517,18 +523,29 @@ int attribute_align_arg avcodec_open(AVCodecContext *avctx, AVCodec *codec) >> goto free_and_end; >> } >> avctx->frame_number = 0; >> + >> + if (HAVE_THREADS && !avctx->thread_opaque) { >> + ret = avcodec_thread_init(avctx, avctx->thread_count); >> + if (ret < 0) { >> + goto free_and_end; >> + } >> + } >> + >> if (avctx->codec->max_lowres < avctx->lowres) { >> av_log(avctx, AV_LOG_ERROR, "The maximum value for lowres supported by the decoder is %d\n", >> avctx->codec->max_lowres); >> goto free_and_end; >> } >> >> - if(avctx->codec->init){ >> - ret = avctx->codec->init(avctx); >> - if (ret < 0) { >> - goto free_and_end; >> + if(avctx->codec->init && !(avctx->active_thread_type&FF_THREAD_FRAME)){ >> + if(avctx->codec->init){ >> + ret = avctx->codec->init(avctx); >> + if (ret < 0) { >> + goto free_and_end; >> + } >> } > >> } >> + >> ret=0; > > cosmetic Removed. (there was a funny merge glitch there too) > > > [...] >> @@ -737,7 +757,7 @@ av_cold int avcodec_close(AVCodecContext *avctx) >> >> if (HAVE_THREADS && avctx->thread_opaque) >> avcodec_thread_free(avctx); >> - if (avctx->codec && avctx->codec->close) >> + if (avctx->codec && avctx->codec->close && !(avctx->active_thread_type&FF_THREAD_FRAME)) >> avctx->codec->close(avctx); >> avcodec_default_free_buffers(avctx); >> avctx->coded_frame = NULL; > > Moving init/close elsewhere is a bit ugly, is this unavoidable? close: avoidable, removed. init: not avoidable, I just rediscovered why it was and then forgot because it's 5 AM. If it is avoidable, the change would involve more than one line. >> >> @@ -745,6 +765,7 @@ av_cold int avcodec_close(AVCodecContext *avctx) >> if(avctx->codec && avctx->codec->encode) >> av_freep(&avctx->extradata); >> avctx->codec = NULL; >> + avctx->active_thread_type = 0; >> entangled_thread_counter--; >> >> /* Release any user-supplied mutex. */ >> @@ -985,6 +1006,8 @@ void avcodec_init(void) >> >> void avcodec_flush_buffers(AVCodecContext *avctx) >> { >> + if(HAVE_PTHREADS && avctx->active_thread_type&FF_THREAD_FRAME) >> + ff_thread_flush(avctx); >> if(avctx->codec->flush) >> avctx->codec->flush(avctx); >> } >> @@ -1185,3 +1208,30 @@ unsigned int ff_toupper4(unsigned int x) >> + (toupper((x>>16)&0xFF)<<16) >> + (toupper((x>>24)&0xFF)<<24); >> } >> + > [...] > >> diff --git a/libavformat/utils.c b/libavformat/utils.c >> index 8fcbe96..0b5d89c 100644 >> --- a/libavformat/utils.c >> +++ b/libavformat/utils.c >> @@ -913,6 +913,11 @@ static void compute_pkt_fields(AVFormatContext *s, AVStream *st, >> /* do we have a video B-frame ? */ >> delay= st->codec->has_b_frames; >> presentation_delayed = 0; >> + >> + // ignore delay caused by frame threading >> + if (delay && st->codec->active_thread_type&FF_THREAD_FRAME) >> + delay -= st->codec->thread_count-1; >> + >> /* XXX: need has_b_frame, but cannot get it if the codec is >> not initialized */ >> if (delay && > > This looks wrong > Please elaborate on what you are trying to do here I removed the change and everything still appears to work. I think it may have been fixed by using pkt_dts?? The problem before was that threading increased has_b_frames, which caused it to print the "invalid dts/pts combination" warning on codecs that had dts==pts all the time like vp3. But I don't see it now. Attached another patch that just adopts pkt_dts in some places so a/v sync works better. -------------- next part -------------- A non-text attachment was scrubbed... Name: 0001-Adopt-pkt_pts-pkt_dts-in-lavc-clients.patch Type: application/octet-stream Size: 2651 bytes Desc: not available URL: <> -------------- next part -------------- A non-text attachment was scrubbed... Name: 0002-Frame-based-multithreading-framework-using-pthreads.patch Type: application/octet-stream Size: 46907 bytes Desc: not available URL: <> -------------- next part --------------
http://ffmpeg.org/pipermail/ffmpeg-devel/2011-January/106781.html
CC-MAIN-2017-17
refinedweb
2,447
58.48
Laura Stewart wrote: > On 10/17/07, Rick Hillegas <Richard.Hillegas@sun.com> wrote: > >> Recently, the DB PMC discussed whether we should make Derby a top level >> Apache project. The consensus seemed to be that a) Derby is mature >> enough to be a top level project, b) no-one felt passionately one way or >> another, c) therefore this decision should be left to the Derby >> community. It seemed to me that the major argument for promoting Derby >> to be a top level project was >> >> + This would increase Derby's visibility. >> >> The major argument against promoting Derby to the top level was >> >> - This would force us to rototill our website. >> >> What do you think? Should we move Derby to the top level? >> >> > > What sort of "rototilling" are we talking about for the Web site Rick? > Are there guidelines that will help us comply with the changes that > are necessary? > > Hi Laura, I haven't wrapped my head around this myself, yet. At a minimum I would expect some urls to change since we would be going from a db.apache.org/derby namespace to a derby.apache.org namespace. For the sake of external links back to Derby I would hope that the Apache site would be able to redirect the old urls--but I don't know that. I think that a detailed understanding of this could be provided by the folks who managed our graduation from the incubator namespace into the db namespace. Regards, -Rick
http://mail-archives.apache.org/mod_mbox/db-derby-dev/200710.mbox/%3C4716944C.7040502@sun.com%3E
CC-MAIN-2014-23
refinedweb
246
71.65
write a c program that asks the user how many results there are per experiment then, using a nested loop, ask the user to enter the results for all four experiments..... Here is what i have so far. i can't get the experiment value included in the loop. CAN U PLEASE HELP? but i can get the number of results Code:#include<stdio.h> int main() { int num_results,i,j; float exp_value, total, average; printf("Please enter the number of results per experiment:"); scanf("%d",&num_results); for( i=1 ;i<=num_results ;++i ) { printf("Please enter result %d for experiment %d\n",i,j); } return (0); }
http://cboard.cprogramming.com/c-programming/25616-nested-loops.html
CC-MAIN-2015-48
refinedweb
106
64.51
_InjectDll UDF #41 Posted 25 October 2008 - 10:01 PM here you can find dll and this is forum thread for how to use dll functions Regards Tip MsgBox_Tipped: Eye candy msgboxes/inputboxes/loginboxes. | CreateBlankBox: Semi-transparent layers with borders and rounded corners. #42 Posted 29 January 2009 - 04:45 PM Im trying to make little script for inject process you want with dll, I tried the main example and another example and its not working, it return always error -7 (Write memory error) #include "_InjectDll.au3" $ret = _InjectDllByPid(ProcessExists('calc.exe'), '7-zip32.dll') If @error < 0 Then MsgBox(16, $ret, @error) Else MsgBox(64, $ret, 'Injected !') EndIfoÝ÷ Ø Ý~í+Å©©èën®{®º+â^èqë,zºè«¢+ØÀÌØíÉÐô}%¹©Ñ±°¡]¥¹Ñ! ¹± Ìäí ±Õ± ÑÉ¥Ìä줰Ìäìܵé¥ÀÌȹ±°Ìäì¤(ÀÌØíÉÈôÉɽÈ)%ÀÌØíÉȱÐìÀQ¡¸(5Í ½à ÄØ°ÀÌØíÉаÀÌØíÉȤ)±Í(5Í ½à ØÐ°ÀÌØíÉаÅÕ½ÐíeU@ÌÌìÅÕ½Ðì¤)¹% Cheers, FireFox. Edited by FireFox, 29 January 2009 - 04:49 PM. ! #43 Posted 29 January 2009 - 06:30 PM #44 Posted 25 September 2009 - 07:09 PM #45 Posted 04 February 2010 - 04:34 PM im also getting the -7 write memory error... i've tried substituting the one provided with another one from a different UDF but it doesnt change anything.. does anyone know why its not working? I think i got it fixed. Change both of the "int_ptr" items in the injector to "ptr*" JD #46 Posted 04 February 2010 - 08:00 PM Edited by wraithdu, 04 February 2010 - 08:03 PM. 0 user(s) are reading this topic 0 members, 0 guests, 0 anonymous users
http://www.autoitscript.com/forum/topic/26831-injectdll-udf/page-3
CC-MAIN-2014-52
refinedweb
264
64.3
Important: Please read the Qt Code of Conduct - QML artifacts - Android Hi all, This is my first post, so thank you for your understanding. I am writing an android application and I have a problem with appearing artifacts on Image elements. Have any of you encountered such a problem? I have searched many Google pages but unfortunately I have not found the answer. Qt version: 5.12.5, but the same problem also occurs in version 5.12.4, 5.12.3 It doesn't matter what the android version is. Problem available on versions 6,7,8 and 9. Thank you in advance for any help. @zoolek Hello and welcome to the forum. To be honest, I don't really understand what you want to tell us :( Can you give more details what the problem is? - What is the expected result and the reel result. - How you construct the view: QML? C++? - Are you using PNG, SVG? - ... additionally to what @KroMignon said, can you show us, how you actually draw /show the problematic items (code) Also, I would try to check out 5.12.6 there were quite a lot of bugs in the version 4 & 5 (recessions even) I use images in png format. My problem is that these paintings have artifacts. For example for dots: Image { id: delegateDotsImage width: 20 height: 20 smooth: true antialiasing: true x: parent.width - width + 5 anchors.verticalCenter: parent.verticalCenter source: "icons/dots.png" opacity: delegateDotsMouseArea.pressed ? 0.4 : 1.0 clip: true ColorOverlay { anchors.fill: parent source: delegateDotsImage color: "black" } main.cpp QQmlApplicationEngine engine; NotificationClient *notificationClient = new NotificationClient(&engine); engine.rootContext()->setContextProperty(QLatin1String("notificationClient"), notificationClient); const QUrl url(QStringLiteral("qrc:/main.qml")); QObject::connect(&engine, &QQmlApplicationEngine::objectCreated, &app, [url](QObject *obj, const QUrl &objUrl) { if (!obj && url == objUrl) QCoreApplication::exit(-1); }, Qt::QueuedConnection); engine.load(url); The rest of the application is written in QML. @zoolek I don't have an android device here to test, but I think, the issue is either the opacity or (more likely) the ColorOverlay. You could check if, when you turn one or both off, that helps? If yes, I'm sure we'll find a way do get your desired results :) Without ColorOverlay is ok. In addition (with ColorOverlay), I tried to add the following code on an older device with android 6: static QSurfaceFormat createSurfaceFormat() { QSurfaceFormat format; format.setSamples(4); format.setDepthBufferSize(24); format.setStencilBufferSize(8); format.setVersion(2, 0); return format; } and there were no problems. On higher versions, for example android 7 - the application crashes at random moments. Overall, I think this is a rendering problem when using ColorOverlay. But ColorOverlay is useful.. import QtGraphicalEffects 1.12 I will check on version 5.12.6 and write what the result is. I need to download and install first :)
https://forum.qt.io/topic/109114/qml-artifacts-android/?
CC-MAIN-2021-43
refinedweb
467
52.56
Import PR refs as branches using the GitHub import There could be a reason to do it this way I'm ignoring, so feel free to close this issue if so. At the moment we use the following configuration: def set_remote_as_mirror(name) config = raw_repository.rugged.config # This is used to define repository as equivalent as "git clone --mirror" config["remote.#{name}.fetch"] = 'refs/*:refs/*' config["remote.#{name}.mirror"] = true config["remote.#{name}.prune"] = true end - We fetch all refs, including refs/pull/*/{merge,head} - For every imported MR, we fetch the ref again and create the branch that actually points to ref/pull/###/head Suggestion: Change remote.#{name}.fetch to match refs/pull/* and create them as branches under /heads, that way we can modify the source_branch to point to this and we don't need to fetch these refs again.
https://gitlab.com/gitlab-org/gitlab-foss/issues/36288
CC-MAIN-2019-51
refinedweb
141
54.32
OpenLayers uses the Test.AnotherWay framework for unit testing. This testing framework is designed to run in a browser: you can run the tests against SVN to see how they work. Writing tests is simple, and creating an entirely new test file requires three steps: Create an HTML file First, create an HTML file. Because testing is carried out in the tests/ dir of OpenLayers, it should reference ../lib/OpenLayers.js to load code. An example HTML file looks like this: <html> <head> <script src="../lib/OpenLayers.js"></script> <script type="text/javascript"> var map; </script> </head> <body> <div id="map" style="width: 1080px; height: 600px;"/> </body> </html> This page should contain any elements you need to run your test. Adding test functions The next step is to add functions which are your 'tests'. Any function which begins with the string 'test_' is run by the testing framework. One argument is passed to these functions: that argument is a 'testing' object which you can use to assert certain things. A simple testing function might look like this: function test_Map_Zoom(t) { t.plan(1); var map = new OpenLayers.Map("map"); var layer = new OpenLayers.Layer.WMS("ABC", "", {'layers':'test'}); map.addLayer(layer); map.zoomTo(0); t.eq(map.zoom, 0, "Zoomed to level 0 correctly."); } The first line is the test plan. This is how many tests you expect to succeed. The next four lines set up a simple map object, and the last line uses t.eq() to test equivilance of two variables. Other test methods are: - t.ok(boolean, "String for output") - t.like(value, regex, "String for output") - t.html_eq(DOM Element, HTML expected, "String for output") For more information on how to write asynchronous tests and the like, see the Test.AnotherWay docs. Add your tests to the testing plan The last step is to edit list-tests.html in the tests/ directory to run your tests. That's it! Open run-tests.html, and you can choose to run just the test file you created, or you can choose to run all tests. Modifications to Test.AnotherWay The Test.AnotherWay code has been modified in a number of ways to better suit our needs. Testing XML Equivalence Test objects have been extended to include an xml_eq method. The run-tests.html page includes the xml_eq.js script to get this functionality. With the xml_eq method you can compare element nodes to element nodes, xml strings to nodes, or strings to strings. The xml_eq method takes three arguments (and an optional fourth): - got - {DOMElement|String} The element node (type 1 node) or xml string you are testing. - expected - {DOMElement|String} The element node or xml string you expect. - msg - {String} Message for test output. - options - {Object} Optional object for configuring the tests. Setting options.prefix to true causes namespace prefixes (aliases) to be compared as well. Without this option, namespace URI are always tested. By default, nodes with the same namespace URI but different prefixes are considered equivalent. A test function on a test page might look something like the following: function test_soup(t) { t.plan(4); var format = new OpenLayers.Format.XML(); var doc, got, exp; // Create a doc and check that root is equivalent to some string doc = format.read( "<chicken>soup</chicken>" ); got = doc.documentElement; exp = "<chicken>soup</chicken>"; t.xml_eq(got, exp, "passes"); // See what happens with bad expectations exp = "<chicken>fat</chicken>"; t.xml_eq(got, exp, "fails"); // Fails with the following message: // Bad child 0 for element chicken: Node value mismatch: got soup // but expected fat // Test xml with different namespace aliases got = "<foo:chicken xmlns:soup</foo:chicken>"; exp = "<bar:chicken xmlns:soup</bar:chicken>"; t.xml_eq(got, exp, "passes"); // Assert that prefixes are equal t.xml_eq(got, exp, "fails", {prefix: true}); // Fails with the following message: // Node name mismatch: got foo:chicken but expected bar:chicken } Testing Geometry Equivalence Test objects have been extended to include an geom_eq method. The run-tests.html page includes the geom_eq.js script to get this functionality. With the geom_eq method you can compare two geometry objects for equivalence. This effectively compares geometry type, all components for equivalence, and all coordinates of points. The geom_eq method takes three arguments: - got - {OpenLayers.Geometry} The geometry object you are testing. - expected - {OpenLayers.Geometry} The geometry object you expect (not based on identity, based on equivalence). - msg - {String} Message for test output. A test function on a test page might look something like the following: function test_soup(t) { t.plan(1); var format = new OpenLayers.Format.WKT(); var wkt = "POINT(10 20)"; var geom = new OpenLayers.Geometry.Point(10, 20); var feature = format.read(wkt); t.geom_eq(feature.geometry, geom, "point read"); }
http://trac.osgeo.org/openlayers/wiki/WritingUnitTests
crawl-003
refinedweb
785
60.41
C Program to Capitalize the First and Last Letter of Each Word of a String Capitalize first and last letter of each word Today we will learn how to code a C program on how to Capitalize first and last letter of each word of a string i.e. to convert first and last letter of each word into uppercase . We will use toupper() function in the process. The toupper() function is used to convert lowercase alphabet to uppercase. Example Lets take example to understand this if the input string is :- "Prep insta" we need to capitalize first and last letter of each word of a string. The output here will be "PreP InstA" Algorithm: - Initialize the variables. - Accept the input. - Calculate the length of input. - Initialize a for loop and terminate it at the end of string. - Convert first and last index of the string to uppercase using toupper() function. - Check for space and if space found convert the element present at index before space and after space to uppercase using the same function. - Print result. C programming code to capitalize the first and last letter of each word of a string #include<stdio.h> #include<conio.h> #include <ctype.h> #include<string.h> int main() { //Initializing variables char str[100] = "str ing"; int length = 0; //Calculating length. length = strlen(str); for(int i=0;i<length;i++) { if(i==0||i==(length-1)) //Converting character at first and last index to uppercase. { str[i]=toupper(str[i]); } else if(str[i]==' ') //Converting characters present before and after space to uppercase. { str[i-1]=toupper(str[i-1]); str[i+1]=toupper(str[i+1]); } } //Printing result. printf("String after capitalizing first and last letter of each word:\n%s", str); return 0; } Output String after capitalizing first and last letter of each word: StR InG Note The time complexity of above method is o(n) as we are iterating over the string once in the for loop Login/Signup to comment 2 comments on “C Program to Capitalize the First and Last Letter of Each Word of a String” we have to include the “ctype.h” library Hey Promit, yeah we surely can use this, but here we are trying to do it without using any special library functions
https://prepinsta.com/c-program/to-capitalize-the-first-and-last-letter-of-each-word-of-a-string/
CC-MAIN-2022-21
refinedweb
381
61.97
UB external runs fine ppc and PC crashes Intel Mac Greetings to all… I am new to developing Max externals, and a relatively inexperienced C programmer. That said, I’m trying to develop a set of simple objects for use with Just Intonation, and have been cheerfully coding away over the past weeks until I hit a strange snag. My latest object compiles successfully in Xcode 2.5 (this works on both PPC G4 and on Mac Intel platforms), producing a universal binary object which loads on both platforms. (It also works on PC and on a G5). On the PPC it does exactly what it should, and on an Intel Mac it crashes as soon as it receives a number in inlet 1. I’ve isolated what causes the crash, and it is a very simple subroutine that performs a search, given a starting input value (t) and a test value (l). The bit of code looks like this: int ftti_searchdown(int t, int l) /* brute-force search downwards matches within prime limit (l) or returns -1 */ { int check, t_in; t_in=t; if (t > 0) { t–; check = ftti_TIpl(t); /* ftti_TIpl returns values from a lookup table of prime limit values which range between 1 and 23 */ while ((check > l)&&(t > 0)) { t–; check = ftti_TIpl(t); } } if (t == t_in) { t = -1; } return t; /* search returns -1 if it failed */ } If there is anyone willing to check this out, I would appreciate any suggestions. I’ve attached a zip archives, containing my Xcode project folder, the compiled external, a test patch and a crash report. best regards and many thanks in advance Marc PS subfolders: ftti-sabat has the external, a test patch, and the crash report ffti-xcode is my source code file ftti.c and related files: Info.plist, ftti.xcodeproj, ftti.def Hi Marc, I’m not sure how you’ve narrowed this down, as I can’t get any useful info from a crash log… Anyway if you compile it under the development configuration (optimisation off) it runs fine under intel. If you set any other optimisation mode then it crashes – so it seems like the problem is something that gcc is doing to your code when it optimises it…. I suppose it’s possible that this is a bug in gcc, I’m not really sure. Probably to track this further you need to read the assembly code or whatever that gcc is spitting out, and debug it there. I can’t help there unfortunately. Possibly someone who knows more can say something more helpful, but at least you have the option of just turning optimisation off for now and working round it that way.. Regards, Alex Thank you for the optimization tip, I’ve recompiled and will wait to hear from my beta testing Intel users. Strange bug, good to know there is a way out… many thanks Marc Hi, Could you post the resolution for this? Marc’s responses weren’t included. Posting the resolution details would help to make sure that someone doesn’t have to hunt for the answer in the future. thanks _Mark Quote: Mark Pauley wrote on Mon, 04 February 2008 16:27 —————————————————- > Hi, > Could you post the resolution for this? Marc’s responses weren’t included…. There’s nothing missing here. The thread in the forum shows all the correspondence. To clarify – the (possible) workaround for now is: Turn optimisations OFF in XCode in the deployment configuration. Recompile. It works on my machine at least. But this is not a resolution really, just a workaround. It seems that gcc compiles duff code when optimisation is on for this particular source file. This may be a bug in gcc. There is perhaps a way to alter the source code to avoid this, or if someone locates a bug in gcc due to this then maybe it’ll get fixed for the next version, but at the moment this is simply a way to try to get the external to work on the intel platform… Alex In ftti_TIpl() you declare a 121-element int array and fill it with 122 values. int TIpl[121]; . . TIpl[121]=7; The declaration means you can use the indices 0 to 120. Writing to the array element TIpl[121] is an error. The element doesn’t exist. You need to declare your array as having 122 elements if you want to do that. In the optimized build that write is probably screwing up a return address or something. Over and above, your implementation is rather inefficient. You should have the implementation of isalpha() & Co somewhere in the XCode libraries. It is worth studying for a more efficient and idiomatic approach. Basically you want to define the array globally, outside your function, something like enum { kArraySize = 121 }; // A lot of people do this as a #define, but // I prefer using compiler constants. int TIpl[kArraySize] = {1, 3, 5, 7, //etc.etc. }; . . . int ftti_TIpl(int n) /* lookup prime limit values */ { int res=1; if (n >= kArraySize) { res = 7; } else if (n > 0) { res = TIpl[n]; } return res; } Hardcore C programmers will do it even more compactly, for instance { return (n >= kArraySize) ? 7 : (n >= 0) ? TIpl[n] : 1; } Thanks for these — found the 121 bug late yesterday night and am currently thinking over about how to structure the array globally as you suggest. I would very much appreciate any shortcuts for the snaky "find" subroutine I wrote which seems very "case-by-case" with far too many logical "if" clauses. My basic problem : given a rising lookup-table, I want to locate the index of the nearest and next-nearest fit to a target value. Then use the index to lookup other data. There must be a library of efficient algorithms for such a standard type of search? Any further thoughts would be kindly appreciated! Thanks Marc Long term, I’d suggest "Algorithms + Data Structures" by Nick Wirth and Jon Benley’s "Programming Pearls". Lots of ideas in both on writing efficient code. Both are old, Wirth’s book is very Pascal oriented, neither of which is not necessarily a bad thing in my book. Both Wirth & Bentley talk about binary search. Off hand, by convention chained else-if statements do not indicated additional indentation (your ifs aren’t nested, they’re chained). That would already make your code look less complex. Not having analyzed your code in detail, but you may find that breaking the input value into integer and fractional parts could streamline your code. You can then switch() on the integer part and inside each case block do an if(fractPart > 0.0) {} else {}. You can test at the beginning of your search function for out-of-range input, set flags & do a quick return. Then focus on the core of your search in the main body of your routine. That can also streamline your code. Hope this helps, Peter Forums > Dev
https://cycling74.com/forums/topic/ub-external-runs-fine-ppc-and-pc-crashes-intel-mac/
CC-MAIN-2016-07
refinedweb
1,157
70.13
ServiceMix provides a number of service engines and binding components out of the box. You can configure all these components using a Spring-based XML file. In this appendix, we give you an overview of the components provided by ServiceMix and show you which elements you can use to configure these components. The following tables describe each element you can use in the ServiceMix configuration file for a specific component. Most of the descriptions are based on the XSD documentation, ServiceMix’s wiki, and the Javadocs of the specific classes. The elements in table E.1 are from the namespace. You can use them to configure the ServiceMix ... No credit card required
https://www.safaribooksonline.com/library/view/open-source-esbs-in/9781933988214/kindle_split_028.html
CC-MAIN-2018-13
refinedweb
112
59.19
Usage Guide¶ This tutorial covers some basic usage patterns and best-practices to help you get started with Matplotlib. # sphinx_gallery_thumbnail_number = 3 import matplotlib.pyplot as plt import numpy as np A simple example¶ Matplotlib graphs your data on Figures (i.e., windows, Jupyter widgets, etc.), each of which can contain one or more Axes (i.e., an area where points can be specified in terms of x-y coordinates (or theta-r in a polar plot, or x-y-z in a 3D plot, etc.). The most simple way of creating a figure with an axes is using pyplot.subplots. We can then use Axes.plot to draw some data on the axes: fig, ax = plt.subplots() # Create a figure containing a single axes. ax.plot([1, 2, 3, 4], [1, 4, 2, 3]) # Plot some data on the axes. Out: [<matplotlib.lines.Line2D object at 0x7fdb9e7ee8e0>] Many other plotting libraries or languages do not require you to explicitly create an axes. For example, in MATLAB, one can just do plot([1, 2, 3, 4], [1, 4, 2, 3]) % MATLAB plot. and get the desired graph. In fact, you can do the same in Matplotlib: for each Axes graphing method, there is a corresponding function in the matplotlib.pyplot module that performs that plot on the "current" axes, creating that axes (and its parent figure) if they don't exist yet. So the previous example can be written more shortly as Out: [<matplotlib.lines.Line2D object at 0x7fdb9ec7d790>] Parts of a Figure¶ Now, let's have a deeper look at the components of a Matplotlib figure. Figure¶ The whole figure. The figure keeps track of all the child Axes, a smattering of 'special' artists (titles, figure legends, etc), and the canvas. (Don't worry too much about the canvas, it is crucial as it is the object that actually does the drawing to get you your plot, but as the user it is more-or-less invisible to you). A figure can contain any number of Axes, but will typically have at least one. The easiest way to create a new figure is with pyplot: fig = plt.figure() # an empty figure with no Axes fig, ax = plt.subplots() # a figure with a single Axes fig, axs = plt.subplots(2, 2) # a figure with a 2x2 grid of Axes It's convenient to create the axes together with the figure, but you can also add axes later on, allowing for more complex axes layouts. Axes¶ This is what you think of as 'a plot', it is the region of the image with the data space. the axes.Axes.set_xlim() and axes.Axes.set_ylim() methods). Each Axes has a title (set via set_title()), an x-label (set via set_xlabel()), and a y-label set via set_ylabel()). The Axes class and its member functions are the primary entry point to working with the OO interface. Axis¶ These are the number-line-like objects.. Artist¶ Basically everything you can see on the figure is an artist (even the Figure, Axes, and Axis objects). This includes Text objects, Line2D objects, collections objects, Patch objects ... (you get the idea). When the figure is rendered, all of the artists are drawn to the canvas. Most Artists are tied to an Axes; such an Artist cannot be shared by multiple Axes, or moved from one to another. Types of inputs to plotting functions¶ All of plotting functions expect numpy.array or numpy.ma.masked_array as input. Classes that are 'array-like' such as pandas data objects and numpy.matrix may or may not work as intended. It is best to convert these to numpy.array objects prior to plotting. For example, to convert a pandas.DataFrame a = pandas.DataFrame(np.random.rand(4,5), columns = list('abcde')) a_asarray = a.values and to convert a numpy.matrix b = np.matrix([[1, 2], [3, 4]]) b_asarray = np.asarray(b) The object-oriented interface and the pyplot interface¶ As noted above, there are essentially two ways to use Matplotlib: - Explicitly create figures and axes, and call methods on them (the "object-oriented (OO) style"). - Rely on pyplot to automatically create and manage the figures and axes, and use pyplot functions for plotting. So one can do (OO-style) x = np.linspace(0, 2, 100) # Note that even in the OO-style, we use `.pyplot.figure` to create the figure. fig, ax = plt.subplots() # Create a figure and an axes. ax.plot(x, x, label='linear') # Plot some data on the axes. ax.plot(x, x**2, label='quadratic') # Plot more data on the axes... ax.plot(x, x**3, label='cubic') # ... and some more. ax.set_xlabel('x label') # Add an x-label to the axes. ax.set_ylabel('y label') # Add a y-label to the axes. ax.set_title("Simple Plot") # Add a title to the axes. ax.legend() # Add a legend. Out: <matplotlib.legend.Legend object at 0x7fdbbc2db2e0> or (pyplot-style) x = np.linspace(0, 2, 100) plt.plot(x, x, label='linear') # Plot some data on the (implicit) axes. plt.plot(x, x**2, label='quadratic') # etc. plt.plot(x, x**3, label='cubic') plt.xlabel('x label') plt.ylabel('y label') plt.title("Simple Plot") plt.legend() Out: <matplotlib.legend.Legend object at 0x7fdbbc4e0160> Actually there is a third approach, for the case where you are embedding Matplotlib in a GUI application, which completely drops pyplot, even for figure creation. We won't discuss it here; see the corresponding section in the gallery for more info (Embedding Matplotlib in graphical user interfaces). Matplotlib's documentation and examples use both the OO and the pyplot approaches (which are equally powerful), and you should feel free to use either (however, it is preferable pick one of them and stick to it, instead of mixing them). In general, we suggest to restrict pyplot to interactive plotting (e.g., in a Jupyter notebook), and to prefer the OO-style for non-interactive plotting (in functions and scripts that are intended to be reused as part of a larger project). Note In older examples, you may find examples that instead used the so-called pylab interface, via from pylab import *. This star-import imports everything both from pyplot and from numpy, so that one could do for an even more MATLAB-like style. This approach is strongly discouraged nowadays and deprecated; it is only mentioned here because you may still encounter it in the wild.: Out: [<matplotlib.lines.Line2D object at 0x7fdba5878df0>] or if you wanted to have 2 sub-plots: Out: [<matplotlib.lines.Line2D object at 0x7fdb9ea8aca0>] For these simple examples this style seems like overkill, however once the graphs get slightly more complex it pays off. Backends¶ What is a backend?¶ run Jupyter notebooks and draw inline plots for quick data analysis. Others embed matplotlib into graphical user interfaces like wxpython or pygtk to build rich applications. Some people use matplotlib in batch scripts to generate postscript images from numerical simulations, and still others run web application servers to dynamically serve up graphs. To support all of these use cases, matplotlib can target different outputs, and each of these capabilities is called a backend; the "frontend" is the user facing code, i.e.,"). Selecting a backend¶ There are three ways to configure your backend: - The rcParams["backend"](default: 'agg') parameter in your matplotlibrcfile - The MPLBACKENDenvironment variable - The function matplotlib.use() A more detailed description is given below. If multiple of these are configurations are present, the last one from the list takes precedence; e.g. calling matplotlib.use() will override the setting in your matplotlibrc. If no backend is explicitly set, Matplotlib automatically detects a usable backend based on what is available on your system and on whether a GUI event loop is already running. On Linux, if the environment variable DISPLAY is unset, the "event loop" is identified as "headless", which causes a fallback to a noninteractive backend (agg). Here is a detailed description of the configuration methods: Setting rcParams["backend"](default: 'agg') in your matplotlibrcfile: backend : qt5agg # use pyqt5 with antigrain (agg) rendering See also Customizing Matplotlib with style sheets and rcParams. Setting the MPLBACKENDenvironment variable: You can set the environment variable either for your current shell or for a single script. On Unix: > export MPLBACKEND=qt5agg > python simple_plot.py > MPLBACKEND=qt5agg python simple_plot.py On Windows, only the former is possible: > set MPLBACKEND=qt5agg > python simple_plot.py Setting this environment variable will override the backendparameter in any matplotlibrc, even if there is a matplotlibrcin your current working directory. Therefore, setting MPLBACKENDglobally, e.g. in your .bashrcor .profile, is discouraged as it might lead to counter-intuitive behavior. If your script depends on a specific backend you can use the function matplotlib.use(): import matplotlib matplotlib.use('qt5agg') This should be done before any figure is created; otherwise Matplotlib may fail to switch the backend and raise an ImportError. Using usewill require changes in your code if users want to use a different backend. Therefore, you should avoid explicitly calling useunless absolutely necessary. The builtin backends¶ By default, Matplotlib should automatically select a default backend which allows both interactive work and plotting from scripts, with output to the screen and/or to a file, so at least initially you will not need to worry about the backend. The most common exception is if your Python distribution comes without tkinter and you have no other GUI toolkit installed; this happens on certain Linux distributions, where you need to install a Linux package named python-tk (or similar). If, however, you want to write graphical user interfaces, or a web application server (How to use; it is used by the Qt5Agg, Qt4Agg, GTK3Agg, wxAgg, TkAgg, and macosx backends. An alternative renderer is based on the Cairo library, used by Qt5Cairo, Qt4Cairo, etc. backend for each; these are non-interactive backends, capable of writing to a file): To save plots using the non-interactive backends, use the matplotlib.pyplot.savefig('filename') method. To save plots using the non-interactive backends, use the matplotlib.pyplot.savefig('filename') method. And here are the user interfaces and renderer combinations supported; these are interactive backends, capable of displaying to the screen and of using appropriate renderers from the table above to write to a file: Note The names of builtin backends case-insensitive; e.g., 'Qt5Agg' and 'qt5agg' are equivalent. ipympl¶. GTK and Cairo¶ GTK3 backends (both GTK3Agg and GTK3Cairo) depend on Cairo (pycairo>=1.11.0 or cairocffi). What is interactive mode?¶ with style sheets and rcParams).. If the default backend does not support interactivity, an interactive backend can be explicitly activated using any of the methods discussed in What is a backend?. Interactive example¶ From an ordinary python prompt, or after invoking ipython with no options, try this: This will pop up a plot window. Your terminal prompt will remain active, so that you can type additional commands such as: plt.title("interactive test") plt.xlabel("index") On most interactive backends, the figure window will also be updated if you change it via the object-oriented interface. E.g. get a reference to the Axes instance, and call a method of that instance: If you are using certain backends (like macosx), or an older version of matplotlib, you may not see the new line added to the plot immediately. In this case, you need to explicitly call draw() in order to update the plot: plt.draw() Non-interactive example¶ Start a fresh session as in the previous example, but now turn interactive mode pyplot: which makes three plots, one at a time. I.e. the second plot will show up, once the first plot is closed. Summary¶. Performance¶. Line segment simplification¶. Marker simplification¶ Markers can also be simplified, albeit less robustly than line segments. Marker simplification is only available to Line2D objects (through the markevery property). Wherever Line2D construction parameters. Splitting lines into smaller chunks¶() Legends¶ The default legend behavior for axes attempts to find the location that covers the fewest data points ( loc='best'). This can be a very expensive computation if there are lots of data points. In this case, you may want to provide a specific location. Using the fast style¶
https://matplotlib.org/3.2.1/tutorials/introductory/usage.html
CC-MAIN-2022-40
refinedweb
2,029
57.57
2.8. Documentation¶ Due to constraints on the length of this book, we cannot possibly introduce every single MXNet function and class (and you probably would not want us to). The API documentation and additional tutorials and examples provide plenty of documentation beyond the book. In this section we provide you with some guidance to exploring the MXNet API. 2.8.1. Finding All the Functions and Classes in a Module¶ In order to know which functions and classes can be called in a module, we invoke the dir function. For instance, we can query all properties in the np.random module as follows: from mxnet import np print(dir(np.random)) ['__all__', '__builtins__', '__cached__', '__doc__', '__file__', '__loader__', '__name__', '__package__', '__spec__', '_mx_nd_np', 'absolute_import', 'choice', 'multinomial', 'normal', 'randint', 'shuffle', 'uniform'] Generally, we can ignore functions that start and end with __ (special objects in Python) or functions that start with a single _(usually internal functions). Based on the remaining function or attribute names, we might hazard a guess that this module offers various methods for generating random numbers, including sampling from the uniform distribution ( uniform), normal distribution ( normal), and multinomial distribution ( multinomial). 2.8.2. Finding the Usage of Specific Functions and Classes¶ For more specific instructions on how to use a given function or class, we can invoke the help function. As an example, let us explore the usage instructions for ndarray’s ones_like function. help(np.ones_like) Help on function ones_like in module mxnet.numpy: ones_like(a=None, out=None, name=None, **kwargs) ones_like(a) Return an array of ones with the same shape and type as a given array. Parameters ---------- a : ndarray The shape and data-type of a define these same attributes of the returned array. Returns ------- out : ndarray Array of ones with the same shape and type as a. From the documentation, we can see that the ones_like function creates a new array with the same shape as the supplied ndarray and sets all the elements to 1. Whenever possible, you should run a quick test to confirm your interpretation: x = np.array([[0, 0, 0], [2, 2, 2]]) np.ones_like(x) array([[1., 1., 1.], [1., 1., 1.]]) In the Jupyter notebook, we can use ? to display the document in another window. For example, np.random.uniform? will create content that is almost identical to help(np.random.uniform), displaying it in a new browser window. In addition, if we use two question marks, such as np.random.uniform??, the code implementing the function will also be displayed. 2.8.3. API Documentation¶ For further details on the API details check the MXNet website at. You can find the details under the appropriate headings (also for programming languages other than Python). 2.8.4. Summary¶ The official documentation provides plenty of descriptions and examples that are beyond this book. We can look up documentation for the usage of MXNet API by calling the dirand helpfunctions, or checking the MXNet website. 2.8.5. Exercises¶ Look up ones_likeand autogradon the MXNet website. What are all the possible outputs after running np.random.choice(4, 2)? Can you rewrite np.random.choice(4, 2)by using the np.random.randintfunction?
https://www.d2l.ai/chapter_preliminaries/lookup-api.html
CC-MAIN-2019-47
refinedweb
534
56.05
Using the Http service, you can load in data to create your routerLink navgation. This builds on the same concepts of using *ngFor, but since Http uses streams, you’ll need to use the | async pipe to be able to properly display the loaded data. I have some "Star Wars" data at this URL. It's just an array of all the people in Star Wars. If you want to set this up yourself to follow along, just go here, $ npm install and $ npm start, and you'll have your own local copy running. In my contacts.component, I want to load in this data. I'll say constructor, and I need to inject the http service. To be able to use this, I'm going to have to add the http module to my contacts.module. contacts/contacts.module.ts @NgModule({ imports:[CommonModule, contactsRoutes, HttpModule], declarations: [ContactsComponent, ContactComponent] }) We'll import the HttpModule. Then, back in the component, I can load all the people by http.get, and paste in that string from my API. contacts/contacts.component.ts export class ContactsComponent{ constructor(private http:Htpp){ http.get('') } } . Always remember, if you use a RxJS operator, you need to import it, rxjs/add/operator/map. Then I'm going to assign this to contacts, and since this will be an observable, I'm going to add a $ to the end. It's a naming convention for that. I'll say contacts$ is all of this stuff. if you use a RxJS operator, you need to import it contacts/contacts.component.ts import "rxjs/add/operator/map"; @Component({ template:' This is a contacts component ' }) export class ContactsComponent{ contacts$; constructor(private http:Htpp){ this.contacts$ = http.get('') .map(res => res.json); } } That's going to be an array of people, which I can then display in this template. I'll say <div *. Render out the contact.name. Just made a typo. I forgot to invoke JSON. JSON's a method to take the response, get the body, and return the JSON object off of that. contacts/contacts.component.ts @Component({ template:' <div * {{contact.name}} </div> ' }) export class ContactsComponent{ contacts$; constructor(private http:Htpp){ this.contacts$ = http.get('') .map(res => res.json()); } } I'll hit save, and now we should see, in the Contacts, an array of divs, or the divs that are parsed out and loaded, a collection of divs that each have the contacts that we loaded in and displaying the contact.name. Let's take these divs and nest an a tag inside of it. We can set up, just like we've done before, these links to click on, and set up the router link. The [routerLink] here is just going to be the contact.id. This is going to be relative to the current URL, so we're in Contacts, and this will just append the ID to it. contacts/contacts.component.ts @Component({ template:' <div * <a [routerLink]="contact.id"> {{contact.name}} </a> </div> ' }) When I click on Luke, it's going to append 1 onto that. When I click on C3PO, it's going to append a 2 onto that. If I wanted to hard code this, it'd look a little bit different. It wouldn't be contact/contact.id, because that wouldn't evaluate anything. It's like contacts divided by contact.id. What you do is you make an array, and then you use strings for the parts that you know what the strings and names are, and then comma-separate the values you want to evaluate. contacts/contacts.component.ts <a [routerLink]="['contacts', contact.id]"> {{contact.name}} </a> This would evaluate to contacts/contact.id, but because we're inside of the /contacts path already, this would actually try and take us to contacts/contacts, and then contact.id. We could solve that, if you need to work with absolute URLs, just by putting "/" in the front. This will work the same and behave as you'd expect. I'll go to Contacts, click on Darth. It will take us to Contact 4, go back to Contacts. contacts/contacts.component.ts <a [routerLink]="['/contacts', contact.id]"> {{contact.name}} </a> What makes sense most of the time is keep track of where you are inside your app. We are currently inside of the contacts.module, which is mapped to that /contacts path, so a contact.id is all we need to make sure to go to the proper /id. contacts/contacts.component.ts <a [routerLink]="contact.id"> {{contact.name}} < Httpservice, you can load in data to create your routerLinknavgation. This builds on the same concepts of using *ngFor, but since Httpuses streams, you’ll need to use the | asyncpipe to be able to properly display the loaded data.
https://egghead.io/lessons/angular-2-load-data-to-build-angular-2-navigation
CC-MAIN-2017-04
refinedweb
795
67.15
/> A while ago I wrote a post on estimating Pi using a variety of methods. As a sort of follow-up I will now write a post on estimating e, or Euler's Number, in JavaScript. This project consists of a JavaScript file called estimatinge.js as well as an HTML page and a few ancilliary files. You can download the source code from the Downloads page or clone/download the Github repository. Source Code Links If you open estimatinge.htm in your browser you'll see this, the results of four different methods of estimating e. /> The numbers in white are the correct values to 15dp (the most that JavaScript can handle with accuracy) and the values below them are the estimates with correct digits shown in green and incorrect digits shown in red. This is the first part of the source code. estimatinge.js (part 1) window.onload = function() { firstExpansion(); secondExpansion(); NewtonSeries(); BrothersFormula(); } function printAsText(e) { let e_correct = "2.718281828459045"; const e_string = e.toString().substring(0, 17); writeToConsole("Definitive: " + e_correct + "<br />", "console"); writeToConsole("Estimated: ", "console"); for(let i = 0, l = e_string.length; i < l; i++) { if(e_string[i] == e_correct[i]) { writeToConsole("<span class='green'>" + e_string[i] + "</span>", "console") } else { writeToConsole("<span class='red'>" + e_string[i] + "</span>", "console") } } writeToConsole("<br /><br />", "console"); } function factorial(n) { return (n < 2) ? 1 : factorial(n - 1) * n; } window.onload This function simply calls the four functions implementing various methods of calculating e. printAsText Here we take a value of e as an argument and print it below the correct value, showing correct/incorrect digits in green/red respectively as shown in the screenshot. factorial It is shocking that there is no Math.factorial function so I had to write my own. Now let's look at the four e-estimating functions. estimatinge.js (part 2) function firstExpansion() { writeToConsole("First expansion: n = 100000<br />---------------------------<br />", "console"); const n = 100000; let e = (1 + 1/n)**n; printAsText(e); } function secondExpansion() { writeToConsole("Second expansion: n = 0.000000001<br />---------------------------------<br />", "console"); const n = 0.000000001; let e = (1 + n)**(1/n); printAsText(e); } function NewtonSeries() { writeToConsole("Newton's Series: n = 0 to 12<br />---------------------------<br />", "console"); let e = 0; for(let n = 0; n <= 12; n++) { e += (1 / factorial(n)); } printAsText(e); } function BrothersFormula() { writeToConsole("Brothers Formula: n = 0 to 8<br />---------------------------<br />", "console"); let e = 0; for(let n = 0; n <= 8; n++) { e += (2*n + 2) / (factorial(2 * n + 1)); } printAsText(e); } First Expansion The formula implemented here is... e = (1 + 1/n)n ...with which I have used a value of n = 100000. This gives us 4dp of accuracy; you might like to experiment with different values for n. Second Expansion The next formula is... e = (1 + n)1/n... with n = 0.000000001, giving us 5dp of accuracy. Again you can try different values. Newton's Series.) Obviously we cannot keep going on to ∞ but the 12 incrementations I have used give us 9dp of accuracy. Brothers Formula As with π people are still working on ways to calculate e and I'll finish off with this impressive recently discovered method, Brothers Formula, devised as recently as 2004./> As with Newton's Series this is the sum of a infinite series although rather more complex. The extra complexity pays off though: we only need to count to 8 to get 15dp (possibly more) of accuracy.
https://www.codedrome.com/estimating-e-in-javascript/
CC-MAIN-2020-34
refinedweb
562
57.16
duftler 02/04/30 12:17:16 Added: targets/soap test.html Log: Temporary... Revision Changes Path 1.1 xml-site/targets/soap/test.html Index: test.html =================================================================== <html> <head> <meta http- <meta name="GENERATOR" content="Microsoft FrontPage Express 2.0"> <title>Apache SOAP Installation Instructions</title> </head> <body bgcolor="#FFFFFF"> <h2 align="center">Installation Instructions for Apache SOAP v2.2</h2> <p>The Apache-SOAP distribution can be installed for use as a client or as a server. This document provides installation instructions for both cases and also has a trouble shooting section to help sort out common installation related problems.</p> <p><strong>Important note for users upgrading from older versions of Apache SOAP: </strong>If you are upgrading from an older version of Apache SOAP then you must be sure to remove any cached class files, DeployedServices.ds files etc. or you will get a variety of strange errors. If you deployed Apache SOAP using a Web app, then any old expanded WARs must also be removed. Services deployed into the old version cannot be automatically transferred to the new version - you must manually re-deploy them to the new version. That is, the old DeployedServices.ds file cannot be read by this new version. We apologize in advanced for the pain this will cause some of our users. If you are in fact upgrading from an older version of Apache SOAP and get any funny, unusual looking exceptions or behavior, then most likely the problem is some unexpected interaction with code from the older version. Please clean up and try again or try installing in a virgin environment.</p> <h3>Unpack the Distribution</h3> <p>We assume that you have downloaded the binary distribution of Apache-SOAP and have extracted the archive into the directory <tt>/foo</tt>. Thus the files from the distribution are in the directory <tt>/foo/soap-2_2/</tt>.</p> <p>Note that if you are on a Win32 machine then you should replace "/" with "\" as you follow these instructions.</p> <h3>Client-Side Instructions</h3> <p>Your classpath must contain <strong>/foo/soap-2_2/lib/soap.jar</strong> and the following:</p> <ul> <li><strong>mail.jar</strong> from <a href="">JavaMail</a></li> <li><strong>activation.jar </strong>from <a href="">JavaBeans Activation Framework</a></li> <li>a <a href="" target="_top">JAXP</a> compatible, namespace-aware XML parser such as <a href="">Apache Xerces</a> (v1.1.2 or later). If you have other non-namespace aware XML parsers on your classpath then the namespace-aware parser must be at the front of your classpath. Apache SOAP will not work otherwise.</li> </ul> <p>Additionally, to run the samples that came with the distribution, add <strong>/foo/soap-2_2</strong> to your classpath.</p> <h3>Server-Side Instructions</h3> <p>You need to ensure that the server classpath contains all of the above components. In addition, to implement services in scripting languages (such as the calculator sample), add <strong>bsf.jar</strong> from <a href="">BSF</a> and <strong>js.jar</strong> from <a href="">Rhino</a> to your classpath.</p> <p>To install the server-side of Apache-SOAP, you need a Web application server that supports servlets and JSPs (if you want to run the admin client as well). </p> <p><strong>Installing the router servlets and admin client:</strong> The instructions for how to install varies from one app server to another. Here are instructions for the following servers:</p> <ul> <li><a href="tomcat.html">Apache Tomcat v3.2</a></li> <li><a href="weblogic51.html">BEA WebLogic Application Server v5.1</a></li> <li><a href="weblogic60.html">BEA WebLogic Application Server v6.0</a></li> <li><a href="websphere.html">IBM WebSphere v3.5</a></li> <li><a href="iPlanet.html">iPlanet Application Server 6.0</a></li> <li><a href="JRun.html">JRun 3.0</a></li> </ul> <p>Didn't find yours listed? See whether the instructions for Tomcat (for example) gives you enough hints on how to do it. If not, first check the FAQ (<a href="" target="_top"></a>) and if that fails try asking on the Apache-SOAP user's list; more than likely someone else has done it already. You can subscribe to the list here: <a href="" target="_top"></a>.</p> <h3><a name="test-install">Testing Your Server-Side Installation</a></h3> <p>Point your browser to:</p> <blockquote> <p><code></code> </p> </blockquote> <p>and</p> <blockquote> <p><code></code> </p> </blockquote> <p>where <code>port</code> is <code>8080</code>, or <code>4040</code>, or whatever port your particular HTTP server is listening on. The browser should display the following:</p> <blockquote> <h4>SOAP (RPC|Message) Router</h4> <p><code>Sorry, I don't speak via HTTP GET- you have to use HTTP POST to talk to me. </code></p> </blockquote> <p>If you don't see this message, your server is not configured correctly. If you do, you now know your router URLs: they are the URLs you pointed your browser to.</p> <p>To test whether you have proper server and client-side stuff set up, follow the client-side instructions to put the right things on your classpath and type the following:</p> <blockquote> <p><code>java org.apache.soap.server.ServiceManagerClient </code><code><em>rpc-router-url</em></code><code> list</code> </p> </blockquote> <p>where the first argument above is the RPC router URL you determined earlier (the one with "rpcrouter" at the end). [NOTE: The above command line is one long line; your browser may show it on two lines but do NOT put it on two lines!]</p> <p>If this succeeds you will see it return with no output or with a list of URIs. Either case is successful - it indicates what services are already deployed on your server. If you get anything else then its time to <a href="../trouble/index.html">troubleshoot</a>. </p> <h3>SSL Instructions</h3> <p><strong>Getting SSL support up and running:</strong> The instructions for how to get SSL support running vary from server to server: Here are instructions for the following servers:</p> <ul> <li><a href="FAQ_Tomcat_SOAP_SSL.html">Apache Tomcat v3.2</a></li> </ul> <p> </p> </body> </html> --------------------------------------------------------------------- To unsubscribe, e-mail: general-cvs-unsubscribe@xml.apache.org For additional commands, e-mail: general-cvs-help@xml.apache.org
https://mail-archives.eu.apache.org/mod_mbox/xml-general-cvs/200204.mbox/%3C20020430191716.92294.qmail@icarus.apache.org%3E
CC-MAIN-2021-25
refinedweb
1,074
58.38
A fork to traitlets' link and dlink to link traits in addition to traitlets. Project description link_traits is a fork of traitlets’ link and dlink functions to add the ability to link traits in addition to traitlets. Installation Make sure you have pip installed and run: pip install link_traits link_traits depends on traits which is not a pure Python package. In Anaconda you can install link_traits and traits as follows: conda install link-traits -c conda-forge Running the tests py.test is required to run the tests. pip install "link_traits[test]" py.test --pyargs traitlets Usage import traits.api as t import traitlets from link_traits import link class A(t.HasTraits): a = t.Int() class B(traitlets.HasTraits): b = t.Int() a = A() b = B() l = link((a, "a"), (b, "b")) >>> a.a = 3 >>> b.b 3 Project details Release history Release notifications Download files Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
https://pypi.org/project/link-traits/
CC-MAIN-2019-51
refinedweb
165
78.35
I’m working on a project that requires a quite substantial amount of frontend javascript work. As part of this I wanted to use the next version of javascript (es6) to undo some of the general javascript craziness and give me more options for structuring the app. For a list of some of the features in es6 see here es6 in current jscript A lot of the features of in es6 can be emulated using the constructs in the current version of javascript. E.g. javascript devs have been simulating classes and modules for ages by using function encapsulation. As such you can use a transpiler to convert your nice es6 code to something that will run in current browsers. Modules current javascript To allow me to use modules in current javascript I’m using browserify. This lets me define frontend modules in the same way I do in node (using the CommonJs module standard). As a bonus it also lets me use lots of npm modules unchanged in my frontend code. Under browserify a file of javascript does not export anything usable by default. So, given a file called foo.js that contained the following: function sayHello() { return "Hello"; } module.exports = sayHello; I could reference the file in bar.js: var hello = require("./foo"); console.log(hello()); and the console would get ‘hello’ printed to it. Anything I do not explicitly export from foo.js would not be accessible to bar.js. ##es6 es6 modules are actually quite similar to the common Js standard used above, the syntax is just a little different. foo.js: function sayHello() { return "Hello"; } export { sayHello }; bar.js: import { sayHello } from "./foo"; console.log(sayHello()); Note: googling around for the es6 module syntax will give you lots of different structures, the spec has changed a lot but this is what seems to work right now. As part of my workflow I want to keep using current jscript modules as well as my fancy new es6 modules and classes. As such I need a workflow that does the following: - Look at all the es6 modules and convert them to their current javascript equivalents. - Resolve the modules and bundle them together into something the frontend can use. Tools I need something to run all of the steps above so my tool list ends up as follows: Task runner: gulp.js. Grunt is also fine but having played with both I much prefer the gulp syntax. Convert es6: es6ify. This is a plugin for browserify that uses traceur to convert es6 to es5. Module bundler: browserify. #Setting up gulp Go follow the instructions on the gulp website also make sure you have ran npm init in the root of your project so that you have a project.json. Use the following command in the root of your project to tell npm to fetch all the npm modules we will need: npm install browserify es6ify vinyl-source-stream Note: you may be tempted to use the gulp-browserify plugin, don’t, it hides features we need and even the gulp devs say it shouldn’t be used (I wasted ages trying to figure out what was wrong thanks to this). Then we need to setup our gulpfile: var gulp = require("gulp"); var browserify = require("browserify"); var es6ify = require("es6ify"); var source = require("vinyl-source-stream"); var paths = { //all js files scripts: ["./src/js/**/*.js", "!./src/js/build/**/*.js"], //entry point for browserify browserify: "./src/js/main.js", //output folder bundleFolder: "src/js/build/", //output file name bundleName: "bundle.js", }; gulp.task("browserify", function () { return ( browserify({ debug: true }) //try to transform all files except node modules from es6 to es5 .add(es6ify.runtime) .require(require.resolve(paths.browserify), { entry: true }) .transform(es6ify.configure(/^(?!.*node_modules)+.+\.js$/)) //bundle the result together .bundle() //output file name .pipe(source(paths.bundleName)) //output file location .pipe(gulp.dest(paths.bundleFolder)) ); }); The end result You can then use es6 features throughout your code. You can also still use commonJS style modules but you will need to use the require(‘./foo.js’) syntax to import these modules rather than the es6 syntax. es6 and jshint If you run jshint against your code (and you should) it will moan about the es6 keywords. To fix this set “esnext” to “true” in your .jshintrc file.
https://www.shiggsatwork.co.uk/an-es6-frontend-workflow/
CC-MAIN-2021-04
refinedweb
717
64.41
Name CYGPKG_GCOV — eCos Support for the gcov test coverage tool Description The GNU gcov tool provides test coverage support. After a test run it can be used to find code that was never actually executed. The testing conditions can then be adjusted for another test run to ensure that all the code really has been tested. The tool can also be used to find out how often each line of code was executed. That information can help application developers to determine where cpu time is being spent, and optimization effort can be focussed on critical parts of the code. A typical fragment of gcov output looks something like this: 80002: 60: for (Run_Index = 1; Run_Index <= Number_Of_Runs; ++Run_Index) -: 61: { -: 62: 80000: 63: Proc_5(); 80000: 64: while (Int_1_Loc < Int_2_Loc) /* loop body executed once */ -: 65: { 80000: 66: Int_3_Loc = 5 * Int_1_Loc - Int_2_Loc; 80000: 67: Proc_7 (Int_1_Loc, Int_2_Loc, &Int_3_Loc); 80000: 68: Int_1_Loc += 1; -: 69: } /* while */ 240000: 70: for (Ch_Index = 'A'; Ch_Index <= Ch_2_Glob; ++Ch_Index) -: 71: /* loop body executed twice */ -: 72: { 160000: 73: if (Enum_Loc == Func_1 (Ch_Index, 'C')) -: 74: /* then, not executed */ -: 75: { ######: 76: Proc_6 (Ident_1, &Enum_Loc); ######: 77: strcpy (Str_2_Loc, "DHRYSTONE PROGRAM, 3'RD STRING"); ######: 78: Int_2_Loc = Run_Index; ######: 79: Int_Glob = Run_Index; -: 80: } -: 81: } -: 82: … -: 83: } Each line show the execution count and line number. An execution count of -: means that there is no executable code at that line. In this example the main loop is executed 80000 times. The body of the inner for loop is executed more often, but the if condition never triggers so four lines of code have not been tested. The gcov tool works in conjunction with the gcc compiler. Application code should be built with two additional compiler flags -fprofile-arcs and -ftest-coverage. The first option causes the compiler to generate additional code which counts the number of times each basic block is executed. The second option results in additional files with .gcno suffixes which allow gcov to map these basic blocks onto lines of source code. Older versions of the compiler used to generate files with .bb and .bbg suffixes instead. The resulting executable can be run on the target hardware as usual. The basic block counting will initialize automatically and the counts will accumulate. If gcov is used for native development rather than for embedded targets then these counts will be written out to .gcda data files automatically when the program exits (older versions of the compiler used to generate files with .da suffixes). A typical embedded target will not have access to the host file system so a different approach must be used. The counts can be extracted from the target using either a gdb macro or by a tftp transfer, giving a single ecosgcov.out file with counts for the entire application. This file should then be processed with the ecosxda script to give count files for each application source file. It is now possible to run gcov on each source file. The exact format of the various files varies with the compiler version so it is important to use the version of gcov that comes with the compiler. $ m68k-elf-gcov dhrystone.c 89.25% of 214 source lines executed in file dhrystone.c Creating dhrystone.c.gcov. # gcov will read in the basic block counts from the generated .gcda file. These basic blocks are mapped onto the source code using the information in the .gcno files. gcov provides various options, for example it can output summaries for each function. Full details of the available functionality can be found in the gcov section of the gcc documentation. Building Applications for Test Coverage To perform application test coverage the gcov package CYGPKG_GCOV must first be added to the eCos configuration. On the command line this can be achieved using: $ ecosconfig add gcov $ ecosconfig tree $ make Alternatively the same steps can be performed using the graphical configuration tool. The package only has two configuration options related to tftp transfers, described below. In addition application code should be compiled with two additional options, -fprofile-arcs and -ftest-coverage. The first option causes the compiler to insert additional code for basic block counting, plus an initialization call to __gcov_init_func() which is provided by the eCos gcov package. The second option results in additional .gcno output files which gcov will need later. The target-side memory needed to store the basic block counts is allocated statically. When code is compiled with optimization the compiler may rearrange some of the code, if that leads to better performance. Sometimes this causes the gcov output to be rather confusing. Compiling with -O0, thus disabling optimization, can help. Extracting the Data The basic block counts must be extracted from the target and saved to a file ecosgcov.out on the host. This package provides two ways of doing this: several minutes to retrieve all the counts for a non-trivial application. The gdb macro is called gcov_dump, and can be found in the file gcov.gdb in the host subdirectory of this package, and in the subdirectory. A typical way of using this macro is: ECOS_INSTALL_DIR/etc (gdb) source <ECOS_INSTALL_DIR>;/etc/gcov.gdb (gdb) gcov_dump This macro can be used any time after the application has initialized, and will store the counts accumulated so far to the file ecosgcov.out in the current directory. The counts are not reset. If the configuration includes a TCP/IP stack then the data can be extracted using tftp instead. There are two relevant configuration options. CYGPKG_GCOV_TFTPD controls whether or not tftp is supported. It is enabled by default if the configuration includes a TCP/IP stack, but can be disabled to save target-side resources. CYGNUM_GCOV_TFTPD_PORT controls the UDP port which will be used. This port cannot be shared with other tftp daemons. If neither application code nor any other package (for example the gprof profiling package) provides a tftp service then the default port can be used. Otherwise it will be necessary to assign unique ports to each daemon. Using tftp requires some additional code in the application. Specifically the daemon cannot be started until the network is up and running, and that usually happens at the behest of application code rather than automatically. The following code fragment illustrates what is required: #include <pkgconf/system.h> #include <network.h> #ifdef CYGPKG_GCOV # include <pkgconf/gcov.h> # include <cyg/profile/gcov.h> #endif … int main(int argc, char** argv) { … init_all_network_interfaces(); #ifdef CYGPKG_GCOV_TFTPD gcov_start_tftpd(); #endif … } ecosgcov.out Received 138740 bytes in 1.7 seconds tftp> quit The address 10.1.1.134 should be replaced with the target's IP address. ecosxda gcov expects separate .gcda files for each application source file compiled with -fprofile-arcs. However it would be inconvenient to extract each .gcda file via tftp or a gdb macro. Instead the data is first written to a single file ecosgcov.out. The ecosxda utility script should then be used to process ecosgcov.out and generate the .gcda files. The ecosxda script can be found in the host subdirectory of this package. Since it is a simple Tcl script it does not need to be built or installed. If desired it can be copied to a suitable location on the user's PATH. Alternatively the subdirectory contains suitable configure and Makefile.in files, allowing the script to be installed automatically as part of the generic eCos host-side build system. The toplevel file README.host contains more information about this. Typically ecosxda will be invoked with no arguments. $ ecosxda It will read in an ecosgcov.out file from the current directory and output or update the .gcda files appropriate for the application. If a given .gcda file already exists then by default ecosxda will read it in and merge the old and new counts, rather than write a new set. This allows data from several test runs to accumulate, giving more comprehensive test coverage. Merging the counts is only possible if the source file has not been recompiled, otherwise the old counts will be discarded to avoid contaminated results. ecosxda takes a number of command line options. - -h, --help - Provide brief usage information. - -V, --version - Display the version of the ecosxda script being used. - -v, --verbose - Provide additional diagnostic output. Repeated uses increase the level of verbosity. - -n, --no-output - Do not actually create or modify any .gcdafiles. Typically this is used to find out whether any files would be replaced rather than merged, and it can also be used to validate the ecosgcov.outfile. - -r, --replace - This forces ecosxda to ignore any existing counts in the .gcdafiles, rather than try to merge the existing and new counts. Typically it is used to discard the results from previous test runs. In addition it is possible to specify the file containing the new counts, instead of the default ecosgcov.out. This may prove useful if several sets of results are extracted to different files during a single test run, to determine what code gets run at various stages. For example: $ ecosxda -r stage2.out Directories and eCos Test Coverage In a simple build environment the source code, the .gcno files generated by the compiler, and the .gcda files output by ecosxda, will all reside in the same directory. That makes it easy for gcov to find the various files it needs. gcov will also generate its .gcov files in the same directory. In more complicated build environments the source code may be kept completely separate from the build tree. eCos itself provides an example of this: the source code is held in a clean component repository, and builds happen in separate build trees. To use gcov in such an environment it is necessary to understand what files will be created where: - The compiler will output the .gcnofile in the same directory as the object file. For an eCos build tree this will be below the version directory of each package. For example, if the kernel source file sync/mutex.cxxis built with -ftest-coveragethen the kernel/current/src/syncsubdirectory in the build tree will contain the mutex.gcnofiles. - The .gcdafiles will end up in the same directory as the .gcnofiles. The compiler puts the full path name in each object file, and this path is copied into the ecosgcov.outfile and used by ecosxda. It is assumed that ecosgcov.outwill be processed on the same machine that was used to compile the code. - When gcov is invoked it can be given a full pathname for the source file. By default it assumes that the other files will be in the current directory, but a -ocommand line option can be used to override this. - gcov will output its .gcovfiles in the current directory. To perform test coverage of eCos itself, in addition to or instead of the application, it is necessary to rebuild eCos with the appropriate flags. This involves changing the configuration option CYGBLD_GLOBAL_CFLAGS to include -ftest-coverage and -fprofile-arcs, then performing a clean and a full make. The basic block counts can be extracted and processed with ecosxda as before, and the .gcno and .gcda files will all end up in the build tree. This test coverage data can then be processed in the build tree using, for example: $ cd <build> $ cd kernel/<version> $ m68k-elf-gcov -o . <repo>/kernel/<version>/sync/mutex.cxx … 58.50% of 147 source lines executed in file <repo>/kernel/current/src/sync/mutex.cxx Creating mutex.cxx.gcov. Where <build> is the location of the build tree and <repo> is the location of the eCos component repository. Additional Target-side Functions The eCos gcov package provides a small number of additional target-side functions. Prototypes for these are provided in the header file <cyg/profile/gcov.h>. … int main(int argc, char** argv) { … init_all_network_interfaces(); #ifdef CYGPKG_GCOV_TFTPD gcov_start_tftpd(); #endif … } If the eCos configuration includes a TCP/IP stack and if a target-side tftp daemon will be used to extract the data from the target to the host then application code should call gcov_start_tftpd once the network is up. This cannot be done automatically by the gcov package itself since that package has no simple way of detecting when the network is ready. extern void gcov_reset(void); This function can be used to reset all basic block counts. If the application operates in a number of distinct stages then it may be useful to get coverage data for each stage, rather than a single set of results for the whole test run. It can also be used to get test coverage for a specific sequence of external inputs. 64-bit arithmetic is used for the basic block counts. Hence it should not be necessary to perform occasional resets to avoid counters overflowing. To operate properly gcov_reset needs to disable interrupts for a while, so it should not be used in situations which require hard real-time performance. extern void gcov_dump(void); This is a utility routine which outputs some of the basic block information via diag_printf calls. It is intended primarily to help with debugging the gcov code itself. In addition the <cyg/profile/gcov.h> header exports the data type gcov_module and a variable gcov_head which acts as the head of a linked list of gcov_module structures. This allows application code to access and manipulate the basic block data directly, if desired.
https://doc.ecoscentric.com/ref/gcov.html
CC-MAIN-2019-35
refinedweb
2,211
57.16
In most situations, asynchronous I/O is not required because its effects can be achieved with the use of threads, with each thread execution of synchronous I/O. However, in a few situations, threads cannot achieve what asynchronous I/O can. The most straightforward example is writing to a tape drive to make the tape drive stream. Streaming prevents the tape drive from stopping while the drive is being written to. The tape moves forward at high speed while supplying a constant stream of data that is written to tape. To support streaming, the tape driver in the kernel should use threads. The tape driver in the kernel must issue a queued write request when the tape driver responds to an interrupt. The interrupt indicates that the previous tape-write operation has completed. Threads cannot guarantee that asynchronous writes are ordered because the order in which threads execute is indeterminate. You cannot, for example, specify the order of a write to a tape. #include <aio.h> int aio_read(struct aiocb *aiocbp); int aio_write(struct aiocb *aiocbp); int aio_error(const struct aiocb *aiocbp); ssize_t aio_return(struct aiocb *aiocbp); int aio_suspend(struct aiocb *list[], int nent, const struct timespec *timeout); int aio_waitn(struct aiocb *list[], uint_t nent, uint_t *nwait, const struct timespec *timeout); int aio_cancel(int fildes, struct aiocb *aiocbp); aio_read(3RT) and aio_write(3RT) are similar in concept to pread(2) and pwrite(2), except that the parameters of the I/O operation are stored in an asynchronous I/O control block (aiocbp) that is passed to aio_read() or aio_write(): aiocbp->aio_fildes; /* file descriptor */ aiocbp->aio_buf; /* buffer */ aiocbp->aio_nbytes; /* I/O request size */ aiocbp->aio_offset; /* file offset */ In addition, if desired, an asynchronous notification type (most commonly a queued signal) can be specified in the 'struct sigevent' member: aiocbp->aio_sigevent; /* notification type */ A call to aio_read() or aio_write() results in the initiation or queueing of an I/O operation. The call returns without blocking. The aiocbp value may be used as an argument to aio_error(3RT) and aio_return(3RT) in order to determine the error status and return status of the asynchronous operation while it is proceeding. You.
http://docs.oracle.com/cd/E19253-01/816-5137/gen-29/index.html
CC-MAIN-2017-30
refinedweb
357
54.15
A SOAP messages consists of SOAP headers and a SOAP body wrapped by a SOAP envelope. The SOAP body can be accessed and modified in the integration flow. With the 14-April-2019 release it is also possible to access SOAP headers received by a sender channel and to set SOAP headers to be sent to a receiver system. This blog describes how SOAP headers can be processed in an integration flow. Example Integration Flow The example shows how SOAP headers can be set in the request and in the response message and how they can be evaluated within the integration flow. I use one integration process (Integration Process I) to build a message that contains an additional SOAP header. This process is started by a SOAP message that is received by a SOAP sender channel. Thus, you could use a tool like SOAPUI to create a SOAP message with an arbitrary SOAP body and send it to this channel. Another possibility to start a scenario would be to use a timer step and a content modifier to set an XML payload in the integration flow. A second integration flow (Integration Process II) receives the request message with the added SOAP header, evaluates the content and adds another SOAP header for the response that is sent back to the starting Integration Process I. The response header is also evaluated. Instead of using two integration processes one can also use two separate integration flows. There are three new methods available in the Message interface to process SOAP headers: - Method getSoapHeaders: This method returns a list (type ArrayList) of SOAP headers represented by objects of type SoapHeader. This list is filled after a message was received by channel. - Method setSoapHeaders: This method can be used to set SOAP headers in a request or response message before the message is sent. The types used are the same as in setSoapHeaders: instances of SoapHeader in an ArrayList object are passed as parameter. - Method clearSoapHeaders: This method can be used to remove Soap headers that were received. Therefore, they will not be propagated to avoid undesired consequences. No parameter needs to be set, and the method returns no result. Prerequisite Due to the complex objects (a SOAP header is based on XML) the SOAP header processing can only be done in a script step. Therefore, some basic knowledge about Groovy script and how to create a script step in an integration flow is required to understand all aspects of this blog. Integration Process I A SOAP sender which could be a SOAP UI client or any other tool/system that can send SOAP messages sends a message to Integration Process I. Now I want to add a SOAP header to send the original payload including the added header to the SOAP receiver ‘Receiver’. Be aware that I use a Request-Reply call to the receiver system. The reason is I want to evaluate the response returned by the receiver system. For simplicity I use a receiver channel without WSDL configuration. Let us assume I want or I must send a message identifier to the receiver system via SOAP header. I use the SOAP header that is defined for the SAP RM protocol. I have added the script step ‘SetRequestSoapHeader’ to add this header via Groovy script: import com.sap.gateway.ip.core.customdev.util.Message; import javax.xml.namespace.QName; import com.sap.gateway.ip.core.customdev.util.SoapHeader; def Message processData(Message message) { //Body def headers = new ArrayList(); defurn:uuid:4CF78C4F-7395-9312-E100-00000A4286B3</messageId>"; def header = new SoapHeader(new QName("", "messageId"), xml, false, ""); headers.add(header); message.setSoapHeaders(headers); return message; } The goal is to create an instance of class com.sap.gateway.ip.core.customdev.util.SoapHeader. I use the constructor of the class that allows passing the header as string. For simplicity I use a constant string where the messageId is set. A variable messageId could be set using string operations. Be aware that you must mask double quotes (‘”’) as shown in this example. If the operations are more complex to obtain the header it can be beneficial to use a DOM parser/renderer to create the header and set an element instance instead of the string instance. The qualified name that identifies the type of the header is set by creating an instance of javax.xml.namespace.QName. The value for the SAP RM message id header is set. MustUnderstand is set to false. That means that if the receiver does not know the header he can ignore it. If I set MustUnderstand to true in our scenario I must declare the header in the WSDL of the sender channel of Integration Process II. Actor is set to an empty string. In the integration flow Actor is not evaluated by the channel and can therefore be freely used for your own purposes. The header object is added to an array list and the method setSoapHeaders of the message interface is called. That is all. You can add other headers by using the same method at any place in your Integration Flow before you send the message. Before I now move on to Integration Process II to see how this header is evaluated, let me continue this process and show how the response SOAP header is processed. As already mentioned I use a Request-Reply call to contact the receiver system. That means I can continue modelling the flow after calling the receiver channel and process the response. The script step GetResponseSoapHeader is doing that:()); message.clearSoapHeaders(); return message; } The method getSoapHeaders of the message interface returns the headers in an array list. First a few checks are executed. There should be exactly one SOAP header (headers.size()!=1) and then the qualified name (qname) should be the expected one, name and namespace must match. I use again the same header for the response as for the request. That means I receive a message id. The header representation in the com.sap.gateway.ip.core.customdev.util.SoapHeader instance is now an Element instance. The method getTextContent of Element returns a string representation of the header content and in this case the message id. For more complex header structures, the Element is just the starting point to a complex DOM tree and the DOM parser API must be used to get the desired information. As an example, I set the integration flow header SapMessageIdEx from the result. As a final step I delete the SOAP header received by calling the method clearSoapHeaders of the message interface. As a result, the header will not be propagated back to the sender. Integration Process II The message is received via SOAP sender channel. No WSDL is configured here. As a first step the SOAP header is evaluated in the script step GetRequestSoapHeader.()); return message; } In fact, the same steps as in the script step GetResponseSoapHeader were executed. It is checked whether the correct header was received, then the header is processed and afterwards the header is deleted. If the header is not deleted it will be sent back as part of the response in this scenario and Integration Process I will receive two message id headers. The script step SetResponseSoapHeader sets a message id SOAP header that contains a different message id. import com.sap.gateway.ip.core.customdev.util.Message; import com.sap.gateway.ip.core.customdev.util.SoapHeader; import javax.xml.namespace.QName; def Message processData(Message message) { message.clearSoapHeaders(); def headers = new ArrayList(); defurn:uuid:4CF78C4F-7395-9312-E100-00000A4286B4</messageId>"; def header = new SoapHeader(new QName("", "messageId"), xml, false, ""); headers.add(header); message.setSoapHeaders(headers); return message; } This step is very similar to the script SetRequestSoapHeader. Execution To see how the integration flow is executed, I enable MPL log level Trace and check the message content at the receiver channel: When I now switch to the message content I see 3 messages. The first one is the original message: The second one is the message after the additional SOAP header was added: And the third message is the response message sent by Integration Process II: Summary You have learned how to set a SOAP header in a SOAP request and access it in an receiver integration flow using script steps. I showed the same for the SOAP response. The result of the change can be visualized using the existing MPL. Please share feedback in comments Hi Joerg, Thanks for the information! Waiting for the tenant to get the update 🙂 Regards, Fatih Hi Joerg, Thanks for the blog. Is there API documentation on SoapHeader? Kr. Ivo Hi Joerg Kessle, Any actualization for this scenario?. I have currently this error using XSLT Mapping "java.lang.IllegalArgumentException: The PayLoad elements cannot fit with the message parts of the BindingOperation. Please check the BindingOperation and PayLoadMessage." Regards I must be missing something. When I put my IFLOW into trace mode, the payload right before my script does not contain any header information and there are no header properties showing the SOAP Headers. My message is coming from our ECC system, and I'm trying to extract the <sap:TraceContext><TRC_SSID>. Using the example script that you provided, I'm getting the error Exception: no SOAP header found. def headers = new ArrayList(); headers = message.getSoapHeaders(); if(headers.size !=1){ throw new Exception("no SOAP header found"); } Hi Beverely Parks, Might be you have more than one headers in your soap header. Please change the condtion if(headers.size >1){ It should work. thanks and regards, Praveen T
https://blogs.sap.com/2019/04/08/cloud-integration-accessing-and-setting-soap-headers-in-an-integration-flow/
CC-MAIN-2021-25
refinedweb
1,593
55.84
This is a playground to test code. It runs a full Node.js environment and already has all of npm’s 1,000,000+ packages pre-installed, including ts-trapper with all npm packages installed. Try it out: require()any package directly from npm awaitany promise instead of using callbacks (example) This service is provided by RunKit and is not affiliated with npm, Inc or the package authors. A tiny module that gives you the typeWrapper class constructor + static methods bundle, for quick definition of type wrappers. A way of declaring a new type, that is simply a wrapper around another type, to make mix-ups easier to prevent. For example, declaring a wrapper around string called UserID, to stop User IDs from being mixed up with other strings (like usernames or descriptions). This is elaborated on in this blog post (TypeScript-specific version to come). import { typeWrapper } from 'ts-trapper'; // Declare a new type wrapper: class UserID extends typeWrapper<UserID,number>() { private brand: any; } // Number -> UserID-wrapped Number const id = UserID.wrap(123); // 💥 Can't use like a number without unwrapping. const wrong1 = id * 55; // 💥 Can't use it like another wrapped type. const wrong2 = CompanyID.unwrap(id); function greet(userId: UserID, name: string): string { // UserID-wrapped Number -> Number const userIdNumber = UserID.unwrap(userId); // Unwrapped; fine to use now. return "User #" + userIdNumber + ": " + name; } console.log(greet(id, "Bert")); See the examples/ directory for more. Inspired by @giuliocanti's original "class constructor" pattern from this TS Playground example.
https://npm.runkit.com/ts-trapper
CC-MAIN-2020-40
refinedweb
248
58.28
Basics of Entity Resolution with Python and Dedupe by Kyle Rossetti and Rebecca Bilbro Entity resolution (ER) is the task of disambiguating records that correspond to real world entities across and within datasets. The applications of entity resolution are tremendous, particularly for public sector and federal datasets related to health, transportation, finance, law enforcement, and antiterrorism. Unfortunately, the problems associated with entity resolution are equally big --- as the volume and velocity of data grow, inference across networks and semantic relationships between entities becomes increasingly difficult. Data quality issues, schema variations, and idiosyncratic data collection traditions can all complicate these problems even further. When combined, such challenges amount to a substantial barrier to organizations' ability to fully understand their data, let alone make effective use of predictive analytics to optimize targeting, thresholding, and resource management. Naming Your Problem Let us first consider what an entity is. Much as the key step in machine learning is to determine what an instance is, the key step in entity resolution is to determine what an entity is. Let's define an entity as a unique thing (a person, a business, a product) with a set of attributes that describe it (a name, an address, a shape, a title, a price, etc.). That single entity may have multiple references across data sources, such as a person with two different email addresses, a company with two different phone numbers, or a product listed on two different websites. If we want to ask questions about all the unique people, or businesses, or products in a dataset, we must find a method for producing an annotated version of that dataset that contains unique entities. How can we tell that these multiple references point to the same entity? What if the attributes for each entity aren't the same across references? What happens when there are more than two or three or ten references to the same entity? Which one is the main (canonical) version? Do we just throw the duplicates away? Each question points to a single problem, albeit one that frequently goes unnamed. Ironically, one of the problems in entity resolution is that even though it goes by a lot of different names, many people who struggle with entity resolution do not know the name of their problem. The three primary tasks involved in entity resolution are deduplication, record linkage, and canonicalization: - Deduplication: eliminating duplicate (exact) copies of repeated data. - Record linkage: identifying records that reference the same entity across different sources. - Canonicalization: converting data with more than one possible representation into a standard form. Entity resolution is not a new problem, but thanks to Python and new machine learning libraries, it is an increasingly achievable objective. This post will explore some basic approaches to entity resolution using one of those tools, the Python Dedupe library. In this post, we will explore the basic functionalities of Dedupe, walk through how the library works under the hood, and perform a demonstration on two different datasets. About Dedupe Dedupe is a library that uses machine learning to perform deduplication and entity resolution quickly on structured data. It isn't the only tool available in Python for doing entity resolution tasks, but it is the only one (as far as we know) that conceives of entity resolution as it's primary task. In addition to removing duplicate entries from within a single dataset, Dedupe can also do record linkage across disparate datasets. Dedupe also scales fairly well --- in this post we demonstrate using the library with a relatively small dataset of a few thousand records and a very large dataset of several million. How Dedupe Works Effective deduplication relies largely on domain expertise. This is for two main reasons: first, because domain experts develop a set of heuristics that enable them to conceptualize what a canonical version of a record should look like, even if they've never seen it in practice. Second, domain experts instinctively recognize which record subfields are most likely to uniquely identify a record; they just know where to look. As such, Dedupe works by engaging the user in labeling the data via a command line interface, and using machine learning on the resulting training data to predict similar or matching records within unseen data. Testing Out Dedupe Getting started with Dedupe is easy, and the developers have provided a convenient repo with examples that you can use and iterate on. Let's start by walking through the csv_example.py from the dedupe-examples. To get Dedupe running, we'll need to install unidecode, future, and dedupe. In your terminal (we recommend doing so inside a virtual environment): git clone cd dedupe-examples pip install unidecode pip install future pip install dedupe Then we'll run the csv_example.py file to see what dedupe can do: python csv_example.py Blocking and Affine Gap Distance Let's imagine we own an online retail business, and we are developing a new recommendation engine that mines our existing customer data to come up with good recommendations for products that our existing and new customers might like to buy. Our dataset is a purchase history log where customer information is represented by attributes like name, telephone number, address, and order history. The database we've been using to log purchases assigns a new unique ID for every customer interaction. But it turns out we're a great business, so we have a lot of repeat customers! We'd like to be able to aggregate the order history information by customer so that we can build a good recommender system with the data we have. That aggregation is easy if every customer's information is duplicated exactly in every purchase log. But what if it looks something like the table below? How can we aggregate the data so that it is unique to the customer rather than the purchase? Features in the data set like names, phone numbers, and addresses will probably be useful. What is notable is that there are numerous variations for those attributes, particularly in how names appear --- sometimes as nicknames, sometimes even misspellings. What we need is an intelligent and mostly automated way to create a new dataset for our recommender system. Enter Dedupe. When comparing records, rather than treating each record as a single long string, Dedupe cleverly exploits the structure of the input data to instead compare the records field by field. The advantage of this approach is more pronounced when certain feature vectors of records are much more likely to assist in identifying matches than other attributes. Dedupe lets the user nominate the features they believe will be most useful: fields = [ {'field' : 'Name', 'type': 'String'}, {'field' : 'Phone', 'type': 'Exact', 'has missing' : True}, {'field' : 'Address', 'type': 'String', 'has missing' : True}, {'field' : 'Purchases', 'type': 'String'}, ] Dedupe scans the data to create tuples of records that it will propose to the user to label as being either matches, not matches, or possible matches. These uncertainPairs are identified using a combination of blocking , affine gap distance, and active learning. Blocking is used to reduce the number of overall record comparisons that need to be made. Dedupe's method of blocking involves engineering subsets of feature vectors (these are called 'predicates') that can be compared across records. In the case of our people dataset above, the predicates might be things like: the first three digits of the phone number the full name the first five characters of the name a random 4-gram within the city name Records are then grouped, or blocked, by matching predicates so that only records with matching predicates will be compared to each other during the active learning phase. The blocks are developed by computing the edit distance between predicates across records. Dedupe uses a distance metric called affine gap distance, which is a variation on Hamming distance that makes subsequent consecutive deletions or insertions cheaper. Therefore, we might have one blocking method that groups all of the records that have the same area code of the phone number. This would result in three predicate blocks: one with a 202 area code, one with a 334, and one with NULL. There would be two records in the 202 block (IDs 452 and 821), two records in the 334 block (IDs 233 and 699), and one record in the NULL area code block (ID 720). The relative weight of these different feature vectors can be learned during the active learning process and expressed numerically to ensure that features that will be most predictive of matches will be heavier in the overall matching schema. As the user labels more and more tuples, Dedupe gradually relearns the weights, recalculates the edit distances between records, and updates its list of the most uncertain pairs to propose to the user for labeling. Once the user has generated enough labels, the learned weights are used to calculate the probability that each pair of records within a block is a duplicate or not. In order to scale the pairwise matching up to larger tuples of matched records (in the case that entities may appear more than twice within a document), Dedupe uses hierarchical clustering with centroidal linkage. Records within some threshold distance of a centroid will be grouped together. The final result is an annotated version of the original dataset that now includes a centroid label for each record. Active Learning You can see that dedupe is a command line application that will prompt the user to engage in active learning by showing pairs of entities and asking if they are the same or different. Do these records refer to the same thing? (y)es / (n)o / (u)nsure / (f)inished Active learning is the so-called special sauce behind Dedupe. As in most supervised machine learning tasks, the challenge is to get labeled data that the model can learn from. The active learning phase in Dedupe is essentially an extended user-labeling session, which can be short if you have a small dataset and can take longer if your dataset is large. You are presented with four options: You can experiment with typing the y, n, and u keys to flag duplicates for active learning. When you are finished, enter f to quit. (y)es: confirms that the two references are to the same entity (n)o: labels the two references as not the same entity (u)nsure: does not label the two references as the same entity or as different entities (f)inished: ends the active learning session and triggers the supervised learning phase As you can see in the example above, some comparisons decisions are very easy. The first contains zero for zero hits on all four attributes being examined, so the verdict is most certainly a non-match. On the second, we have a 3/4 exact match, with the fourth being fuzzy in that one entity contains a piece of the matched entity; Ryerson vs. Chicago Public Schools Ryerson. A human would be able to discern these as two references to the same entity, and we can label it as such to enable the supervised learning that comes after the active learning. The csv_example also includes an evaluation script that will enable you to determine how successfully you were able to resolve the entities. It's important to note that the blocking, active learning and supervised learning portions of the deduplication process are very dependent on the dataset attributes that the user nominates for selection. In the csv_example, the script nominates the following four attributes: fields = [ {'field' : 'Site name', 'type': 'String'}, {'field' : 'Address', 'type': 'String'}, {'field' : 'Zip', 'type': 'Exact', 'has missing' : True}, {'field' : 'Phone', 'type': 'String', 'has missing' : True}, ] A different combination of attributes would result in a different blocking, a different set of uncertainPairs, a different set of features to use in the active learning phase, and almost certainly a different result. In other words, user experience and domain knowledge factor in heavily at multiple phases of the deduplication process. Something a Bit More Challenging In order to try out Dedupe with a more challenging project, we decided to try out deduplicating the White House visitors' log. Our hypothesis was that it would be interesting to be able to answer questions such as "How many times has person X visited the White House during administration Y?" However, in order to do that, it would be necessary to generate a version of the list that contained unique entities. We guessed that there would be many cases where there were multiple references to a single entity, potentially with slight variations in how they appeared in the dataset. We also expected to find a lot of names that seemed similar but in fact referenced different entities. In other words, a good challenge! The data set we used was pulled from the WhiteHouse.gov website, a part of the executive initiative to make federal data more open to the public. This particular set of data is a list of White House visitor record requests from 2006 through 2010. Here's a snapshot of what the data looks like via the White House API. The dataset includes a lot of columns, and for most of the entries, the majority of these fields are blank: Using the API, the White House Visitor Log Requests can be exported in a variety of formats to include, .json, .csv, and .xlsx, .pdf, .xlm, and RSS. However, it's important to keep in mind that the dataset contains over 5 million rows. For this reason, we decided to use .csv and grabbed the data using requests: import requests def getData(url,fname): """ Download the dataset from the webpage. """ response = requests.get(url) with open(fname, 'w') as f: f.write(response.content) DATAURL = "" ORIGFILE = "fixtures/whitehouse-visitors.csv" getData(DATAURL,ORIGFILE) Once downloaded, we can clean it up and load it into a database for more secure and stable storage. Tailoring the Code Next, we'll discuss what is needed to tailor a dedupe example to get the code to work for the White House visitors log dataset. The main challenge with this dataset is its sheer size. First, we'll need to import a few modules and connect to our database: import csv import psycopg2 from dateutil import parser from datetime import datetime conn = None DATABASE = your_db_name USER = your_user_name HOST = your_hostname PASSWORD = your_password try: conn = psycopg2.connect(database=DATABASE, user=USER, host=HOST, password=PASSWORD) print ("I've connected") except: print ("I am unable to connect to the database") cur = conn.cursor() The other challenge with our dataset are the numerous missing values and datetimeformatting irregularities. We wanted to be able to use the datetime strings to help with entity resolution, so we wanted to get the formatting to be as consistent as possible. The following script handles both the datetime parsing and the missing values by combining Python's dateutil module and PostgreSQL's fairly forgiving 'varchar' type. This function takes the csv data in as input, parses the datetime fields we're interested in ('lastname','firstname','uin','apptmade','apptstart','apptend', 'meeting_loc'.), and outputs a database table that retains the desired columns. Keep in mind this will take a while to run. def dateParseSQL(nfile): cur.execute('''CREATE TABLE IF NOT EXISTS visitors_er (visitor_id SERIAL PRIMARY KEY, lastname varchar, firstname varchar, uin varchar, apptmade varchar, apptstart varchar, apptend varchar, meeting_loc varchar);''') conn.commit() with open(nfile, 'rU') as infile: reader = csv.reader(infile, delimiter=',') next(reader, None) for row in reader: for field in DATEFIELDS: if row[field] != '': try: dt = parser.parse(row[field]) row[field] = dt.toordinal() # We also tried dt.isoformat() except: continue sql = "INSERT INTO visitors_er(lastname,firstname,uin,apptmade,apptstart,apptend,meeting_loc) \ VALUES (%s,%s,%s,%s,%s,%s,%s)" cur.execute(sql, (row[0],row[1],row[3],row[10],row[11],row[12],row[21],)) conn.commit() print ("All done!") dateParseSQL(ORIGFILE) About 60 of our rows had ASCII characters, which we dropped using this SQL command: delete from visitors where firstname ~ '[^[:ascii:]]' OR lastname ~ '[^[:ascii:]]'; For our deduplication script, we modified the PostgreSQL example as well as Dan Chudnov's adaptation of the script for the OSHA dataset. import tempfile import argparse import csv import os import dedupe import psycopg2 from psycopg2.extras import DictCursor Initially, we wanted to try to use the datetime fields to deduplicate the entities, but dedupe was not a big fan of the datetime fields, whether in isoformat or ordinal, so we ended up nominating the following fields: KEY_FIELD = 'visitor_id' SOURCE_TABLE = 'visitors' FIELDS = [{'field': 'firstname', 'variable name': 'firstname', 'type': 'String','has missing': True}, {'field': 'lastname', 'variable name': 'lastname', 'type': 'String','has missing': True}, {'field': 'uin', 'variable name': 'uin', 'type': 'String','has missing': True}, {'field': 'meeting_loc', 'variable name': 'meeting_loc', 'type': 'String','has missing': True} ] We modified a function Dan wrote to generate the predicate blocks: def candidates_gen(result_set): lset = set block_id = None records = [] i = 0 for row in result_set: if row['block_id'] != block_id: if records: yield records block_id = row['block_id'] records = [] i += 1 if i % 10000 == 0: print ('{} blocks'.format(i)) smaller_ids = row['smaller_ids'] if smaller_ids: smaller_ids = lset(smaller_ids.split(',')) else: smaller_ids = lset([]) records.append((row[KEY_FIELD], row, smaller_ids)) if records: yield records And we adapted the method from the dedupe-examples repo to handle the active learning, supervised learning, and clustering steps: def find_dupes(args): deduper = dedupe.Dedupe(FIELDS) with psycopg2.connect(database=args.dbname, host='localhost', cursor_factory=DictCursor) as con: with con.cursor() as c: c.execute('SELECT COUNT(*) AS count FROM %s' % SOURCE_TABLE) row = c.fetchone() count = row['count'] sample_size = int(count * args.sample) print ('Generating sample of {} records'.format(sample_size)) with con.cursor('deduper') as c_deduper: c_deduper.execute('SELECT visitor_id,lastname,firstname,uin,meeting_loc FROM %s' % SOURCE_TABLE) temp_d = dict((i, row) for i, row in enumerate(c_deduper)) deduper.sample(temp_d, sample_size) del(temp_d) if os.path.exists(args.training): print ('Loading training file from {}'.format(args.training)) with open(args.training) as tf: deduper.readTraining(tf) print ('Starting active learning') dedupe.convenience.consoleLabel(deduper) print ('Starting training') deduper.train(ppc=0.001, uncovered_dupes=5) print ('Saving new training file to {}'.format(args.training)) with open(args.training, 'w') as training_file: deduper.writeTraining(training_file) deduper.cleanupTraining() print ('Creating blocking_map table') c.execute(""" DROP TABLE IF EXISTS blocking_map """) c.execute(""" CREATE TABLE blocking_map (block_key VARCHAR(200), %s INTEGER) """ % KEY_FIELD) for field in deduper.blocker.index_fields: print ('Selecting distinct values for "{}"'.format(field)) c_index = con.cursor('index') c_index.execute(""" SELECT DISTINCT %s FROM %s """ % (field, SOURCE_TABLE)) field_data = (row[field] for row in c_index) deduper.blocker.index(field_data, field) c_index.close() print ('Generating blocking map') c_block = con.cursor('block') c_block.execute(""" SELECT * FROM %s """ % SOURCE_TABLE) full_data = ((row[KEY_FIELD], row) for row in c_block) b_data = deduper.blocker(full_data) print ('Inserting blocks into blocking_map') csv_file = tempfile.NamedTemporaryFile(prefix='blocks_', delete=False) csv_writer = csv.writer(csv_file) csv_writer.writerows(b_data) csv_file.close() f = open(csv_file.name, 'r') c.copy_expert("COPY blocking_map FROM STDIN CSV", f) f.close() os.remove(csv_file.name) con.commit() print ('Indexing blocks') c.execute(""" CREATE INDEX blocking_map_key_idx ON blocking_map (block_key) """) c.execute("DROP TABLE IF EXISTS plural_key") c.execute("DROP TABLE IF EXISTS plural_block") c.execute("DROP TABLE IF EXISTS covered_blocks") c.execute("DROP TABLE IF EXISTS smaller_coverage") print ('Calculating plural_key') c.execute(""" CREATE TABLE plural_key (block_key VARCHAR(200), block_id SERIAL PRIMARY KEY) """) c.execute(""" INSERT INTO plural_key (block_key) SELECT block_key FROM blocking_map GROUP BY block_key HAVING COUNT(*) > 1 """) print ('Indexing block_key') c.execute(""" CREATE UNIQUE INDEX block_key_idx ON plural_key (block_key) """) print ('Calculating plural_block') c.execute(""" CREATE TABLE plural_block AS (SELECT block_id, %s FROM blocking_map INNER JOIN plural_key USING (block_key)) """ % KEY_FIELD) print ('Adding {} index'.format(KEY_FIELD)) c.execute(""" CREATE INDEX plural_block_%s_idx ON plural_block (%s) """ % (KEY_FIELD, KEY_FIELD)) c.execute(""" CREATE UNIQUE INDEX plural_block_block_id_%s_uniq ON plural_block (block_id, %s) """ % (KEY_FIELD, KEY_FIELD)) print ('Creating covered_blocks') c.execute(""" CREATE TABLE covered_blocks AS (SELECT %s, string_agg(CAST(block_id AS TEXT), ',' ORDER BY block_id) AS sorted_ids FROM plural_block GROUP BY %s) """ % (KEY_FIELD, KEY_FIELD)) print ('Indexing covered_blocks') c.execute(""" CREATE UNIQUE INDEX covered_blocks_%s_idx ON covered_blocks (%s) """ % (KEY_FIELD, KEY_FIELD)) print ('Committing') print ('Creating smaller_coverage') c.execute(""" CREATE TABLE smaller_coverage AS (SELECT %s, block_id, TRIM(',' FROM split_part(sorted_ids, CAST(block_id AS TEXT), 1)) AS smaller_ids FROM plural_block INNER JOIN covered_blocks USING (%s)) """ % (KEY_FIELD, KEY_FIELD)) con.commit() print ('Clustering...') c_cluster = con.cursor('cluster') c_cluster.execute(""" SELECT * FROM smaller_coverage INNER JOIN %s USING (%s) ORDER BY (block_id) """ % (SOURCE_TABLE, KEY_FIELD)) clustered_dupes = deduper.matchBlocks( candidates_gen(c_cluster), threshold=0.5) print ('Creating entity_map table') c.execute("DROP TABLE IF EXISTS entity_map") c.execute(""" CREATE TABLE entity_map ( %s INTEGER, canon_id INTEGER, cluster_score FLOAT, PRIMARY KEY(%s) )""" % (KEY_FIELD, KEY_FIELD)) print ('Inserting entities into entity_map') for cluster, scores in clustered_dupes: cluster_id = cluster[0] for key_field, score in zip(cluster, scores): c.execute(""" INSERT INTO entity_map (%s, canon_id, cluster_score) VALUES (%s, %s, %s) """ % (KEY_FIELD, key_field, cluster_id, score)) print ('Indexing head_index') c_cluster.close() c.execute("CREATE INDEX head_index ON entity_map (canon_id)") con.commit() if __name__ == '__main__': parser = argparse.ArgumentParser() parser.add_argument('--dbname', dest='dbname', default='whitehouse', help='database name') parser.add_argument('-s', '--sample', default=0.10, type=float, help='sample size (percentage, default 0.10)') parser.add_argument('-t', '--training', default='training.json', help='name of training file') args = parser.parse_args() find_dupes(args) Active Learning Observations We ran multiple experiments: - Test 1: lastname, firstname, meeting_loc => 447 (15 minutes of training) - Test 2: lastname, firstname, uin, meeting_loc => 3385 (5 minutes of training) - one instance that had 168 duplicates We observed a lot of uncertainty during the active learning phase, mostly because of how enormous the dataset is. This was particularly pronounced with names that seemed more common to us and that sounded more domestic since those are much more commonly occurring in this dataset. For example, are two records containing the name Michael Grant the same entity? Additionally, we noticed that there were a lot of variations in the way that middle names were captured. Sometimes they were concatenated with the first name, other times with the last name. We also observed what seemed to be many nicknames or that could have been references to separate entities: KIM ASKEW vs. KIMBERLEY ASKEW and Kathy Edwards vs. Katherine Edwards (and yes, dedupe does preserve variations in case). On the other hand, since nicknames generally appear only in people's first names, when we did see a short version of a first name paired with an unusual or rare last name, we were more confident in labeling those as a match. Other things that made the labeling easier were clearly gendered names (e.g. Brian Murphy vs. Briana Murphy), which helped us to identify separate entities in spite of very small differences in the strings. Some names appeared to be clear misspellings, which also made us more confident in our labeling two references as matches for a single entity (Davifd Culp vs. David Culp). There were also a few potential easter eggs in the dataset, which we suspect might actually be aliases (Jon Doe and Ben Jealous). One of the things we discovered upon multiple runs of the active learning process is that the number of fields the user nominates to Dedupe for use has a great impact on the kinds of predicate blocks that are generated during the initial blocking phase. Thus, the comparisons that are presented to the trainer during the active learning phase. In one of our runs, we used only the last name, first name, and meeting location fields. Some of the comparisons were easy: lastname : KUZIEMKO firstname : ILYANA meeting_loc : WH lastname : KUZIEMKO firstname : ILYANA meeting_loc : WH Do these records refer to the same thing? (y)es / (n)o / (u)nsure / (f)inished Some were hard: lastname : Desimone firstname : Daniel meeting_loc : OEOB lastname : DeSimone firstname : Daniel meeting_loc : WH Do these records refer to the same thing? (y)es / (n)o / (u)nsure / (f)inished Results What we realized from this is that there are two different kinds of duplicates that appear in our dataset. The first kind of duplicate is one that generated via (likely mistaken) duplicate visitor request forms. We noticed that these duplicate entries tended to be proximal to each other in terms of visitor_id number, have the same meeting location and the same uin (which confusingly, is not a unique guest identifier but appears to be assigned to every visitor within a unique tour group). The second kind of duplicate is what we think of as the frequent flier --- people who seem to spend a lot of time at the White House like staffers and other political appointees. During the dedupe process, we computed there were 332,606 potential duplicates within the data set of 1,048,576 entities. For this particular data, we would expect these kinds of figures, knowing that people visit for repeat business or social functions. Within-Visit Duplicates lastname : Ryan meeting_loc : OEOB firstname : Patrick uin : U62671 lastname : Ryan meeting_loc : OEOB firstname : Patrick uin : U62671 Across-Visit Duplicates (Frequent Fliers) lastname : TANGHERLINI meeting_loc : OEOB firstname : DANIEL uin : U02692 lastname : TANGHERLINI meeting_loc : NEOB firstname : DANIEL uin : U73085 lastname : ARCHULETA meeting_loc : WH firstname : KATHERINE uin : U68121 lastname : ARCHULETA meeting_loc : OEOB firstname : KATHERINE uin : U76331 Conclusion In this beginners guide to Entity Resolution, we learned what it means to identify entities and their possible duplicates within and across records. To further examine this data beyond the scope of this blog post, we would like to determine which records are true duplicates. This would require additional information to canonicalize these entities, thus allowing for potential indexing of entities for future assessments. Ultimately we discovered the importance of entity resolution across a variety of domains, such as counter-terrorism, customer databases, and voter registration. Please return to the District Data Labs blog for upcoming posts on entity resolution and discussion about a number of other important topics to the data science community. Upcoming post topics from our research group include string matching algorithms, data preparation, and entity identification! Recommended!
https://www.districtdatalabs.com/basics-of-entity-resolution
CC-MAIN-2018-17
refinedweb
4,302
53
US20040148611A1 - Peer-to-peer networking framework application programming interfaces - Google PatentsPeer-to-peer networking framework application programming interfaces Download PDF Info - Publication number - US20040148611A1US20040148611A1 US10/351,727 US35172703A US2004148611A1 US 20040148611 A1 US20040148611 A1 US 20040148611A1 US 35172703 A US35172703 A US 35172703A US 2004148611 A1 US2004148611 A1 US 2004148611A1 - Authority - US - United States - Prior art keywords - peer - method - managed - group -42—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving topology management managed class peer networking framework and associated object-oriented application programming interfaces are presented. An application uses the framework API to communicate with the various peer networking subsystem interfaces. These subsystems utilize lower level Win32 interfaces and services to provide access to the group database, security, and data transfer to other machines. Managed classes are provided for the peer name, identity, cloud, invitation, group, policy, data store, peer and record collections, peer, and record classes. Peer name resolution objects and record search objects are also provided. The peer networking framework of the present invention is particularly applicable to Microsoft's NET Framework. Description - The present invention relates generally to peer-to-peer networking application programming interfaces (APIs), and more particularly to peer networking framework APIs and methods utilizing managed classes. [0001] - Various communication technologies on the Internet allow users with common interest to collaborate, share files, chat with one another, multi-cast audio and video for presentations and group meetings, and engage in multi-player gaming. Currently, however, most communication on the Internet takes place in a server centric environment whereby all communication flows to or through large central servers to which individuals may connect to join and participate in such communication. [0002] - With the reemergence of peer-to-peer technology, the current server centric model of Internet communication is quickly being replaced. Indeed, peer-to-peer technologies enable users to contact one another in a serverless environment, free from the constraints of server based Internet communication. In a peer-to-peer based system, a users anonymity and privacy may be maintained since communication occurs directly between peers within the network. However, while individual communication and file sharing is relatively well established in peer-to-peer networks, establishing, discovering, joining, maintaining, and sharing information in a group peer-to-peer environment is not well established. However, individuals have grown accustomed to the benefits provided by such grouping technology in the server centric environment. Therefore, a need exists for technology that allows both the benefits of peer-to-peer technologies and grouping technologies to be realized in the serverless environment that is peer-to-peer. [0003] - As with a server centric environment, groups may be entirely open to allow Internet file searching and sharing within groups. Network location based groups that are typically groups of computers sharing the same access point in a conference room or groups of computers behind a firewall are another type of group known in the server centric world. Additionally, password defined groups allowing for private communication/collaboration within the group, such as secure conference room groups, in home networking groups are also known. External groups, such as NT domain based groups and groups of passport users also exists. Finally, voting based groups that are governed by peer reputation based systems where members are voted in and out are also known. Therefore, the existence of similar groups within the peer-to-peer serverless environment are also desired. [0004] - Peer-to-peer communication, and in fact all types of communication, depend. However, entities may have one or several addresses that may vary because the entities move in the network, because the topology changes, because an address lease cannot be renewed, because the group function or purpose has changed, etc.. [0005] - by maintaining a robust graph. That is, the better the information about other peers and groups in the network (i.e. the more robust the graph), the greater the likelihood that a search for a particular resource or record will converge. [0006] - Additionally, because peer-to-peer networks are formed as a graph of distributed users or peers, it is necessary that group communication be passed to one peer to another before all peers within a network may become cognizant of the shared information. Systems that provide such routing include Usenet and OSPF. However, such current systems suffer from limitations that have, to date, limited the full development of group peer-to-peer technology. Additionally, peer-to-peer networks currently suffer from a lack of adequate graph management that, at times allows the graphs to “break” or become split when one of the members leaves the group. In such an instance, information from one half of the group may no longer be passed to peer members on the other side of the partition created by the departure of one of the peers. As a further disadvantage, no adequate mechanism exists for the detection of such partition. [0007] - Currently, P2P systems utilize a logical programming model that requires an extensive amount of code to implement. However, the assignee of the instant application has released the .NET framework programming model. Microsoft's .NET is software that connects information, people, systems, and devices. It spans clients, servers, and developer tools, and comprises the NET Framework programming model that enables developers to build Web-based applications, smart client applications, and XML Web services applications which expose their functionality programmatically over a network using standard protocols such as SOAP and HTTP. NET also includes developer tools, such as Microsoft Visual Studios NET, which provide a rapid application integrated development environment for programming with the .NET Framework. Further, .NET comprises a set of servers, including Microsoft Windows® 2000, Microsoft SQL Server™, and Microsoft BizTalk® Server, that integrates, runs, operates, and manages XML Web services and applications. Finally, NET includes client software, such as Windows XP, Windows CE, and Microsoft Office XP, that helps developers deliver a deep and compelling user experience across a family of devices and existing products. [000. [0009] - The class libraries include base classes that provide standard functionality such as input/output, string manipulation, security management, network communications, thread management, text management, user interface design features, and other functions. The Microsoft ADO.NET data classes support persistent data management and include SQL classes for manipulating persistent data stores through a standard SQL interface. XML classes enable XML data manipulation and XML searching and translations. The Microsoft ASP.NET classes support the development of Web-based applications and XML Web services. The Windows Forms classes support the development of Windows-based smart client applications. Together, the class libraries provide a common, consistent development interface across all languages supported by the NET Framework. [0010] - However, despite the clear advantages provided the NET environment, there are currently no P2P systems that take advantage of the benefits provided by this environment. [0011] - The inventive concepts disclosed in this application involve a new and improved managed programming system and method for establishment and management of a peer-to-peer (P2P) network. More specifically, the present invention is directed to a new and improved object-oriented set of Framework interfaces and methods that developers can use to create peer networking applications. By utilizing the managed interfaces of the present invention, which may be used with the NET Framework, the complicated details of the underlying Win32 implementation are hidden from the developer. [0012] - In one embodiment of the present invention, an interface hierarchy is developed. An application uses the peer networking framework application programming interface (API) of the present invention to communicate with the various peer networking subsystems. These lower level Win32 interfaces and services provide access to group database, security, and data transfer to other machines. The core pieces of the peer networking managed APIs may be grouped into five categories. The first relates to an identity object. This object represents a single identity or user in the Peer-to-Peer system. An application can obtain a list of identities that are available on the local computer, delete them, or create new ones. The second relates to a cloud object. The discovery portion of the Peer-to-Peer system defines a set of interconnected computers to be in a specific cloud. Applications can obtain the list of available clouds, register data that can be discovered in that cloud, and resolve (find) peer names that have been registered by other computers in a cloud. The third category relates to groups. One or more identities can join together to form a group in a cloud. The Group object allows a developer to enumerate the members and monitor changes within the group. The data store associated with a group is be used to distribute information between the members of a group. The fourth category relates to the data store. This object holds a set of records for a specific group. An application can add, update, and delete records in the data store. When a record is added to the data store of one member of the group, the peer networking system floods that information to all other members. The fifth category relates to the search. Applications can search the meta data of records in the data store by using the search object. The same interfaces can also be used with a distributed search where the information comes from each active member in the group. [0013] - Preferably, the main peer networking classes are defined under a main namespace, e.g. Microsoft.PeerToPeer. Several managed classes are defined under this main namespace that allow for discovery, grouping, record management, and security. In one embodiment, a discovery managed class, e.g. Microsoft.PeerToPeer.Discovery, exposes interfaces that provide peer name resolution through a peer-to-peer name resolution protocol. An identity managed class, e.g. Microsoft.PeerToPeer.Identity, includes a collection of secure identity routines that are used to manage a person's identity information within the P2P system. Additionally, a group managed class, e.g. Microsoft.PeerToPeer.Group, contains a collection of grouping interfaces. In addition to maintaining the information about the group policy and peers, this managed class also provides a means to access the data store for the group records. [0014] - In one embodiment of the present invention, managed application programming interfaces (APIs) for the identity class of objects are provided that create peer identities, that retrieve friendly names of identities, that set friendly names of identities, that get cryptographic key information for an identity, that delete peer identities, that export peer identity information, that import peer identity information, that enumerates peer identities, that enumerates groups associated with peer identities, that retrieves XML fragments containing security information for an identity, and that creates peer names based on existing names of identities. Each of these interfaces utilize various parameters that are passed in from an application program that uses these interfaces to manage a peer identity. The interfaces return a value that indicates the success or failure of the function. For failures, the interfaces provide an indication as to the problem resulting in the failure. [0015] - In another embodiment of the present invention, managed APIs for the discovery class are provided. Discovery involves registering information on one machine, and finding such data from another in the same cloud of machines. Preferably, the application uses a peer name register object to publish the discoverable peer name. Other machines can then use a peer name resolver object to find the information. The managed APIs also include functionality to obtain information about the cloud and to watch for and signal cloud changes to the application. [0016] - In a still further embodiment of the present invention, managed APIs and methods are exposed to the application writers in order to establish peer-to-peer groups and to efficiently and reliably pass data between its members. The grouping framework ensures that each member has a consistent view of the data in the group. The core piece of the grouping technology is the group member node (hereinafter “member”). A member represents a particular instance of an individual on the network who is a member of the group. Members are able to connect to each other to form, expand, contract, etc. a group. The members are able to send data between each other in the form of records. [0017] - Group records are essentially pieces of data flooded (sent) to all members in a group. Once a group record (hereinafter “record”) has been received by a member, the member places the record in a group database or data store. Grouping is responsible for ensuring each member's group database has the exact same view of the data in the group. It keeps each member synchronized. As members connect and disconnect from groups, partitions or “splits” in the group may occur. Grouping is also responsible for detecting and repairing these partitions. If they desire to do so, members in the group can create connections separate from the traditional group connections. These group direct connections allow members to send arbitrary data to each other individually. Finally, grouping has an eventing infrastructure that allows applications to register and receive event notifications. Event notifications are the mechanism grouping uses to alert applications to the fact that something has changed within the group. [0018] - Managed APIs are included that provide group creation and access management. These APIs create a new group, allow a peer to join a group, open an existing group for connection, connect to a group, close a group, delete a group, create a group invitation, and parse a group invitation.19] - In another embodiment of the present invention, managed APIs are provided that provide the retrieval and management of group and member information. These APIs get group status, get group properties, set group properties, enumerate the group members, and authorize the credential renewal of members.20] - In a further embodiment of the present invention, a data store class, e.g. Microsoft.PeerToPeer.Store is provided. This is the class that controls access to the records within a group. The group state must be either connected or disconnected, otherwise attempting to perform any operation will cause an exception. Managed APIs are provided that provide this record management. These APIs add records, update records, delete records, retrieve records, enumerate records, and search for records.21] - The accompanying drawings incorporated in and forming a part of the specification illustrate several aspects of the present invention, and together with the description serve to explain the principles of the invention. In the drawings: [0022] - FIG. 1 is a block diagram generally illustrating an exemplary computer system on which the present invention resides; [0023] - FIG. 2 is a simplified framework diagram illustrating a peer-to-peer (P2P) interface framework into which the system and methods of the present invention find particular applicability; [0024] - FIG. 3 illustrates the objects, collections, properties, and methods of the identity managed class of the present invention; [0025] - FIG. 4 illustrates the objects, collections, properties, and methods of the cloud managed class of the present invention; [0026] - FIG. 5 illustrates the objects, collections, properties, and methods of the group managed class of the present invention; [0027] - FIG. 6 is a state diagram of the states in and through which the group class may exist; [0028] - FIG. 7 illustrates the objects, collections, properties, and methods of the store and record managed classes of the present invention; and [0029] - FIG. 8 illustrates the objects, collections, properties, methods, and implementation classes of the search object of the present invention.[0030] -. [0031] -32] - FIG. 1 illustrates an example of a suitable computing system environment [0033]35] - With reference to FIG. 1, an exemplary system for implementing the invention includes a general purpose computing device in the form of a computer [0036]. - Computer [0037]38]39]40]41] personal computer [0043] - As introduced above, the success of a peer-to-peer (P2P) protocol depends on the protocol's ability to establish valid connections between selected entities. grouping system. [0044] - However, one skilled in the art will recognize from the following teachings that the managed P2P interfaces interfaces managed set of functions, and particularly to any P2P system that desires to take advantage of the benefits provided by the NET framework. [0045] -.. [0046] - For communication between individual peers in PNRP, when a member receives a query it searches for the entry in its routing table whose key best matches the target, excluding the members that have already been visited. The query is then forwarded directly to the member that advertised the entry. If there is no adequate entry, the request is sent back to the member from which the request was received; this member will try another entry in its own routing table. The request is successful if it reaches the entry whose key matches the target. It is unsuccessful if the target is not reached in the maximum number of steps, or if the member from which. [0047] - member generates its own pair of privatepublic keys, although such may be provided by a trusted supplier. The public key is then included as part of the member identifier. Likewise, a group creator generates group public and private keys. Only the member that created the pair of keys has the private key with which it can prove that it is the creator of the identity. In this way, identity theft may be discovered, and is, therefore, deterred. [0048] - As also discussed in this above-identified application, peer identification certificates provide integrity and validity to a peer's identity in the P2P network. These ID certificates are of the form [Version, ID, <ID Related Info>, Validity, Algorithms, P[0049] Issuer (also know as Greenwich Mean Time , P[0050] ID, K[0051] Issuer. managed system and methods of the present invention finds particular applicability, attention is now directed to FIG. 2. This FIG. 2 illustrates an exemplary P2P interface hierarchy [0052] 200 in which the peer networking framework APIs of the present invention may exist, although it is not limited for use with only such hierarchy. Indeed, the system and methods of the present invention may be used with various frameworks which need or desire a managed, coordinated set of interfaces that allow complete management of P2P functionality. Of course one skilled in the art will recognize that various application programs can utilize the managed APIs of the present invention to provide a rich user interface and a set of functions that allow management the P2P environment, particularly with the .NET Framework. - As illustrated in this FIG. 2, an application [0053] 202 uses the peer networking framework API 204 to communicate with the various peer networking subsystems 206, 208, and 210. The lower level Win32 interfaces and services 212 provide access to the group database 214, security and data transfer via, e.g. Winsock 216 in this exemplary embodiment, to other machines. The peer networking framework API 204 includes a namespace, e.g. Microsoft.PeerToPeer, under which the main peer networking classes are defined. Discover, grouping, record management, and security are all defined under this main namespace, as will be discussed more fully below. - Included in the underlying Win32 interfaces/services [0054] 212 are graphing interfaces that are responsible for establishing and maintain a well-connected graph of peers. A description of one embodiment of such graphing interfaces is contained in co-pending application Ser. No. 10/309,865, entitled Peer-To-Peer Graphing Interfaces and Methods, filed on Dec. 4, 2002, the teaching and disclosure of which are hereby incorporated in their entireties by reference thereto. Some form of P2P name-to-address resolution 208 must also typically be provided to allow the P2P system to function. As discussed above, one such system is the PNRP system described in the above identified co-pending applications. These Win32 interfaces also include Win32 grouping interfaces are also provided to allow proper participation in P2P groups. A description of one embodiment of such grouping interfaces is contained in co-pending application Ser. No. ______, entitled Peer-To-Peer Grouping Interfaces and Methods, filed on even date herewith, the teachings and disclosure of which are hereby incorporated in their entireties by reference thereto. - As will become apparent to those skilled in the art from the following description, the APIs and methods of the present invention preferably take an object-oriented approach to their design. Objects have the base implementations for ToStrings, Equals, etc., except where explicitly called out. Collections are almost always static snapshots of an underlying dynamic lists. A GetXxx method is normally used to obtain the collection instead of using a property. Some objects can be serialized so that they can be stored or transmitted to another machine. As will become apparent, records and invitations are examples of this. The group classes, on the other hand, cannot be converted to a XML/text format since they represent transient data, specific to the local machine, and cannot be persisted. In order for the serialization to work, any IDs used within the group must be unique and consistent, e.g. record IDs, group IDs, peer IDs. [0055] - In order for an application to participate in the P2P framework of the present invention, the application must create a new peer identity or select an existing one. Such an identity is required to participate in groups or register a peer name in the P2P system. As illustrated in FIG. 3, the PeerName class object [0056] 220 is a simple string that represents the basis of a peer to peer identifier with the following structure: <authority>.<classifier>. Either the authority or classifier must be non-empty strings. The authority is normally a 128-bit value that applications should not normally have to deal with. The classifier is an application-specified string that is used to differentiate the various PeerNames. - The constructors of the PeerName class object include PeerName(String authority, String classifier). This version of the constructor allows the application to specify the two parts of the PeerName. The constructors also include PeerName(String peerName). This version of the constructor allows the application to specify the entire PeerName. The string must contain a “.” to indicate the separation between the authority and classifier parts. The properties of this class include the string authority, which represents just the first part of the PeerName, before the first period. Applications should not normally specify the authority. It is usually a 128-bit value, based on some security context. It is the user's identity or the group certificate. The other property of this class, the string classifier, represents the second part of the PeerName, after the first colon. Applications should select unique classifier names to differentiate PeerNames. The only static method exposed by this class is the ToString( ) method, which returns a string which represents the entire PeerName. [0057] - The Microsoft.PeerToPeer.Identity class [0058] 222 is a collection of secure identity routines that are used to manage a person's information within the peer to peer system. Initially it contains five static functions. The first of these static functions allows a user to create a new identity. A user may also import an identity and identity. The password is used to decrypt the XML data that must be the result of calling the export function described below. A user may also delete an identity. The user may also retrieve an identity associated with the unique PeerName through the get identity function. Further, the user may retrieve an enumeration of all identities registered on the local machine associated with the user through the get identities function. An identity collection 224 is constructed as a result of this last static function, which contains a count of all identities in the identity collection 224. This identity collection 224 exposes a static function that allows a user to retrieve any particular identity 226. - The identity [0059] 226 is used to define the information about a user so that they can participate in the peer networking system. A user can have more than one identity 226, and the same identity 226 can be used in more than one group. An identity 226 consists of a unique identifier (e.g. the PeerName 220) and a string that is the user's friendly name. Each of these properties are read only. Internally, the class 226 also maintains public/private key pairs, group membership and ownership data. The identity 226 also exposes a static function that allows the identity 226 to be exported as an XML structure that can be imported by another machine using the import identity function described above. The password is used to encrypt the data. The identity class 226 also exposes a static function that allows for the creation of a new peer name 220. An example of code that performs this identity creation in one embodiment is as follows: - Discovery in the peer networking system of the present invention involves registering information on one machine and finding that data from another in the same cloud of machines. As illustrated in FIG. 4, an application learns of the clouds from which data could be found through the static function get clouds exposed by the Microsoft.PeerToPeer.Cloud class [0060] 230. This static function returns a cloud collection object 232 that includes a count of the cloud enumeration. A particular cloud 234 object can then be retrieved from this enumeration. A cloud 234 defines a set of reachable nodes. Each cloud 234 is identified by the type of address and network scope 236 for which the cloud is valid. The cloud scope 236 defines the network span in which an address is valid, and the cloud state 238 defines the state of the cloud, i.e. uninitialized, stand alone, active, or invalid. The address family property indicates the type of address used in this cloud. - The cloud watcher class [0061] 240 is used to watch for changes to a set of clouds. Applications should first create a handler for the cloud changed event, and then set the scope and type of change 242 that they are interested in, preferably the default is all. Such change types 242 include notification when a cloud is created, deleted, or upgraded, although the default is preferably none. Once the cloud changed notification is triggered, the application can retrieve the cloud changed event arguments 244 to determine what cloud changed, and how it changed. - Once a particular cloud is set, the application uses a peer name registrar object [0062] 246 to publish the discoverable peer name 248 through the register static method. The discoverable peer name class 248 defines the information that can be registered. While all of the items are optional in the constructor, the peer name and the cloud must be set before the object 248 can be registered. This information is then available for discovery by another machine through the peer name resolver 250 discussed more fully below. The registration state enumeration 252 provides an indication of the status of the registration, including providing a signal upon registration failure of if a problem is encountered with the cloud after the peer name has been successfully registered. An error code will preferably be provided to indicate the reason for the failure. The peer name registrar object 246 also exposes an unregister static method that removes the registration for the object 248. The end points property specifies an array of end points (addresses) associated with the object 248. That is, an application registers a peer name for a specific identity and a set of endpoints within a cloud. The constructor for the peer name registrar 246 requires an identity and the same properties as the base class 248. The refresh time parameter is optional and defaults to four hours in one embodiment of the present invention. An example of code that illustrates the publication of a peer name in the global cloud in accordance with one embodiment of the present invention is as follows: - To find information [0063] 248 that other machines have registered, an application can use the peer name resolver object 250. The constructor sets the two properties necessary for resolving a peer name. In order to process any results, the application must first hook into the name found event 254 before calling the start static method. The application specifies the peer name to resolve, the cloud to search on, and an end point hint to finding the peer name. Setting this last property is optional in a preferred embodiment, but doing so may provide better results. The application can also set the maximum number of results that the system should attempt to find, although the default is all. The Boolean resolving property is true when the system is actively searching. The start method is called to star the resolving process. After this call returns, the resolving property will be true until the resolve complete event is raised. The cancel method stops the resolution process. The resolving property will be false after this call returns. The peer name found event will fire as results are found, one at a time. The main property of the peer name found event arguments 254 is the discoverable peer name 248. Finally, the resolve complete event is fired when the resolve operation is complete. An example of code that illustrates the publication of a peer name in the global cloud in accordance with one embodiment of the present invention is as follows: - As illustrated in FIG. 5, the Microsoft.PeerToPeer.Group [0064] 260 is the main class for group operations and the starting point from which to retrieve peer data. This object exposes two static functions that allow an application to retrieve a group collection 262, or an individual group 264. The group collection 262 provides a count of all groups enumerated that are associated with a particular identity, and exposes a static function that allows an application to select an individual group 264. This function retrieves the group associated with a specific group PeerName. If another process on the same machine is using the same group with the same identity, the group state 268 may be connected after the initialize method (discussed below) is called. Otherwise, the application should call connect (discussed below) to attempt to establish a connection with other members. - The group class [0065] 264 provides the basic create mechanism of establishing a new group. All parameters are required, and the application must call the initialize static method before attempting to perform any other operations. An exception is thrown if any of the parameters are invalid. The properties of this class 264 include the peer name, which is the group identifier, and the friendly group name. The policy for the group is defined by the policy class 266, which specifies the maximum record size for the group, the search engine, and the scope. This policy class 266 also exposes an update static method. The group state property indicates the current state of the group from the group state class 268. A normal group state progresses from uninitialized to creating to connected. A group will become invalid when the user's membership in the group is deleted. The disconnect method changes the group state to disconnected, thereby allowing access to the records without being distracted by updates from other peers. The final property of the group class 264 is the designation of the data store 300 (discussed in detail below with regard to FIG. 7) for the group. - The group class [0066] 264 exposes several static methods. The initialize method must be used to move the object's from the Unitialized state. No events will be fired before the application calls this method. The connect method can be used to attempt to reconnect to other peers. It is only necessary to calls this method if the group's state is disconnected. The disconnect method can be used to disconnect from the group, while the delete membership method allows a peer to leave a group permanently. When this occurs, the group state is changed to invalid. None of the records in the store 300 are accessible after the application makes this call. The object will be removed from the group collection for the identity. The static method create invitation creates an XML invitation 270 that can be used to join the group. An exception will be raised if the user does not have the right to create invitations. The group class 264 also exposes the get peers method, which creates a peer collection 272 of all the peers in the group. The get peer function retrieves the peer object 274 associated with the peer ID. - The group class [0067] 264 also provides indications for various events. One such notification is fired when the peer state has changed. The peer change event argument class 276 provides notification of the peer change type 278, such as is a peer has left the group, joined the group, connected to the group, or disconnected from the group. - The group state object [0068] 268 provides the various states in which the group object 264 can exist. As illustrated in FIG. 6, a group object begins in the uninitialized state 280. In this state the application can hook into events and retrieve read-only properties, but it can not modify records or expect to see other nodes. The application must call the initialize function to transition to another state. After the initialize call, it transitions through the creating state 282 and on to either the disconnected state 284 or the connected state 286. The creating state 282 is an intermediate state which is the result of using the Initialize method. The disconnected state 284 will be entered if this is a new group or if it is an existing group with no other applications using it. The group is valid, but there are currently no connections to other peers. Although the application can assume no new data will be received from remote system, it (or another application on the same machine) can still add records and be notified of updates to the store 300. From the disconnected state 284, the state will transition through the intermediate connecting state 288 (as a result of using the connect method) to the connected state 286. The connected state 286 may also be entered directly if the group was created as a result of accepting an invitation or if another application was already using the group. In this connected state 286, the group is active and ready to accept new peers. Records may be sent and received. Alternatively, the group state may be invalid 290. In this state, the group object is invalid and no access to the group data or peers is permitted. This is a terminal state. - As introduces above, the group policy [0069] 266 (see FIG. 5) is the class that controls the policies within a group. Applications can read the policies currently in place, but may not be able to modify them if they do have the proper role/right. Note that rights/roles can be added, but not removed and at this point. There are no strings associated with the values. The properties of the group policy class 266 include the designation of the maximum size of a user-defined record that will be flooded to another node. In one embodiment, the default is 10,000 bytes. This policy class 266 may also define the ID of the search engine that will be used in the group. By default in one embodiment, this is the local group search engine. The scope in which the group exists is also specified. This policy class 266 also exposes an update function that updates the group associated with this policy. If the user/identity does not have the right to do this, this will generate an exception. - Also as introduced above, the group invitation [0070] 270 class is used to gain access to an existing group. A valid user in the group must first use the create invitation method (exposed in the group object 264) to generate the XML data, which can be passed (e.g. out of band, via email, via a web page, etc.) to the local system, and to convert it into an invitation object 270. The invitation object 270 can be used to join an existing group. The properties of the invitation object 270 include the group name of the group for which the invitation is intended. The peer name property specifies the unique identifier for this invitation. The creator name is the friendly name of the user who created the invitation, while the creator peer name property is the unique identifier for the identity which created the invitation. The invitation object 270 also specifies the expiration time, i.e. the date/time after which the invitation will expire. The scope is also provided. - The peer object [0071] 274 introduced above represents an instance of a user (or member) in the group. This object 274 specifies the peer name for the user, the friendly name for the user, and the endpoint (IP address) for the peer. Further, this object 274 provides an indication of whether the peer is currently present in the group. This peer object 274 also exposes a revoke membership static function. This function revokes the user's ability to participate in the group. However, the local user must have the right to perform this operation. This peer object 274 can be accessed directly from the group object 264 via the get peer function, or through the peer collection object 272 introduced above. This collection object 272 is a snapshot of the peers of which the local node is aware (neighbors and flooded participant records). The peer item function exposed by this collection object 272 is the method by which an application can retrieve any particular peer object 274 in the collection. - The following is an example of code that illustrates the creation of a new group called “Fish People” in accordance with one embodiment of the present invention. Once the group is created, the application registers for notifications before the group is connected so that the application will be sure to catch all changes. [0072] - The following is an example of code that illustrates the retrieval of the first group from the group collection object [0073] 262 and the connection to that group in accordance with one embodiment of the present invention: - The following is an example of code that illustrates the creation of an group invitation by a valid peer in the group that will allow another machine to join the group: [0074] - The following is an example of code that illustrates the joining of a group by a machine that has received the group invitation from a valid peer in the group: [0075] - As illustrated in FIG. 7, the store class [0076] 300 is the class that controls access to the records within a group. The group state must be either connected or disconnected; otherwise attempting to perform any operation will cause an exception. The application should obtain the store object 300 from the group property. The property of the store object 300 is the record watch list 302, which retrieves the list of record watcher objects 304 associated with the group store. The store object 300 exposes several static functions, including the get records function that creates a record collection 306 or records 308 of a specific type. If no particular type is specified, a snapshot of all the records is put in the collection 306. Alternatively, the get record method retrieves a single record 308 from the store. The store object 300 also exposes a method to add records to the store. The application creates a new record and sets its properties before adding it to the store. The store object 300 also provides a method to update an existing record in the store. An exception is raised, however, if the record does not already exist, has expired, or is marked for deletion. An application may also delete a record from the store via the delete static method. Finally, a purge function, which removes all of the records from the local machine, is also provided. The main purpose of this function is to support a Kiosk scenario in which the user does not want to persist and information on the local machine. - The record collection object [0077] 306 is a collection of records, usually of a specific type. The collection is a snapshot of the group database and obtained by using the method get records. Not specifying a record type will match all records. However, some types of records are not available to the application (participant records, group policy, etc.). This collection is read-only, but individual records can be modified by using the update method. This object 306 provides a count of the number of records in the collection. The record collection object 306 also exposes a function that retrieves a particular record 308 from the collection. - The record class object [0078] 308 is the base class for all records in the group database. The record (GUID type) constructor is the basic method to create a new record. The record will have a unique ID. After the other properties have been set, the record 308 must then be added to the store using the add record method. The record properties include the GUID ID, which is the unique identifier for this record, and is generated by the system. The creator peer name is the peer name of the user who created the record 308, and is also automatically set by the system. The type property specifies the type of the record. Some GUID values are reserved and will cause the record creation to fail if used. The creation time and the time of the last modification are also included. The expired property is set when the time specified for the record's lifetime has passed. The user who created the record can increase the expiration time. The expiration time property indicates when the record will expire. The record attributes are also specified. The data property represents the generic data storage (or payload) for the recorded. - As indicated above, the record watch list is a property of the store object [0079] 300. This object 302 retrieves the list of record watcher objects 304 associated with the group store. Its property is a count of the records in the watch list. This object exposes a method to retrieve a particular record watcher object 304, a method to add an item, and one to remove an item. The record watcher object 304 specifies the Guid of the record and the type of event change recorded by the record change event argument object 310. The change types are enumerated in the record change type object 312, and include an indication that a record has been created, updated, or deleted. - As illustrated in FIG. 8, the search class [0080] 320 is used to define and control the search for records within the group. Application s can set the properties to limit the results. Further, attributes may be added one at a time through the add attribute method, when initially creating the object 320, or by sending the XML directly through the attributes property. Results are passed to the application through the record found event handler 322. The search must operate in a particular group. The application can then set the various properties to define the search criteria and establish an event handler before calling the start function. If the group is set to null, all know groups will be searched. - The properties for the search class [0081] 320 include a unique id for the search. The group in which the search is to be performed is also specified, as is the ID of the search engine 324 used in the group. The application may also limit the search by setting the maximum number or results to return before the search is stopped. The default is no limit. The maximum time during which the search will proceed is also specified, with a default of no limit. The record type and publisher of the record are also included as properties. The search class 320 also specifies the earliest and the latest date/time for the record, as well as the earliest and latest update times for the record. The XML representation of the attributes may also be specified. The is searching property indicates if the system is currently searching for records. Note that there is no event to indicate when this value changes. The search may end very quickly if the search is local and there are no records that match the criteria, or it may continue for a long time if a distributed search is used. It should be noted as well that in a preferred embodiment, the defaults for each of the settable properties just discussed provides the broadest search. The individual properties may be added to further specify, and therefore limit, the search. - The static methods exposed by the search object [0082] 320 include a start function to start the search process based on the current search criteria. The application should establish a callback to handle the results before invoking this method. The cancel function stops the search process. It cannot be resumed, but the application can restart the process by using the start method again. The add attribute method adds a name-value pair to the list of attributes. The type from the search type class 328 and comparison operation from the search compare operator class 326 are optional. The Attributes property is modified to reflect this change. The distribution engine implementation class 330 exposes the send function, and fires an event with the result. - The following is an example of code that illustrates the search for any attribute which contains the string “video” in accordance with one embodiment of the present invention. In this example, the MyDataFoundHandler callback is invoked as the search engine finds records. This happens asynchronously, not on the thread in which the search was started. The sample routine just extracts the record ID and the XML attributes, and then passes the data to another routine for further processing: [0083] - The following is an example of code that illustrates a search for a video with some specific attributes, i.e. this sample refines this search to only look for a keyword of “video” with a “FileName” attribute that starts with “Jim.” The * can be used to match zero or more characters. The * can appear more than once in the string. To match an asterisk, use the \* sequence. [0084] -. [0085] Claims (40) 1. A peer-to-peer networking infrastructure, comprising: a first layer in which exists at least one application; a second, logically lower layer in which exists a peer networking framework application programming interface (API); a third layer logically below the second layer in which exist at least one managed class interface; a fourth layer logically below the third layer in which exist Win32 interfaces and exposed services; and a fifth layer logically below the fourth layer in which exist a group database. 2. The peer-to-peer networking infrastructure of claim 1, wherein the application uses the peer networking framework API to communicate with at least one managed class interface to perform certain functions, the managed class interface utilizing the Win32 interfaces and services to execute the functions desired by the application. 3. The peer-to-peer networking infrastructure of claim 1, wherein the third layer includes an identity managed class interface, discovery managed class interfaces, and group managed class interfaces. 4. The peer-to-peer networking infrastructure of claim 3, wherein the identity managed class interface provides methods to create, import, export, delete, and enumerate identities, and to create a peer name. 5. The peer-to-peer networking infrastructure of claim 3, wherein the discovery managed class interfaces provides methods to enumerate peer clouds, resolve peer names registered within a cloud, enumerate peer groups, enumerate peers within a group, enumerate records within a group, and search for group records. 6. The peer-to-peer networking infrastructure of claim 5, wherein the discovery managed class interfaces further provides notifications through the peer networking framework API to the application of changes in a cloud, changes in a group state, changes in a peer, and changes in a group record. 7. The peer-to-peer networking infrastructure of claim 3, wherein the group managed class interface provides methods to initialize a group, connect to a group, disconnect from a group, delete membership in a group, create an invitation to allow another to join a group. 8. The peer-to-peer networking infrastructure of claim 7, wherein the group managed class interface controls a state of the group, the state of the group selected from one of an uninitialized state, a creating state, a disconnected state, a connected state, a connecting state, and an invalid state. 9. The peer-to-peer networking infrastructure of claim 7, wherein the group managed class interface further provides a data store managed class that provides functionality to add records to the group database, update records, and delete records. 10. A method of managing by an application a peer-to-peer identity in a managed framework, the method comprising the steps of: communicating with a managed peer-to-peer networking identity interface object, the managed peer-to-peer networking identity interface object exposing methods for creating, importing, deleting, and enumerating managed peer identities through a managed identity class object; selecting one of the methods; passing to the managed peer-to-peer networking identity interface object parameters required by the method selected; and initiating the method. 11. The method of claim 10, wherein the method selected in the step of selecting provides an identity collection object exposing an item method, the method further comprising the steps of selecting the item method, passing to the identity collection object a parameter identifying a particular identity, initiating the item method, and receiving the identity class object identified by the parameter. 12. The method of claim 10, wherein the method selected in the step of selecting provides an identity class object exposing an export method, the method further comprising the steps of selecting the export method to export the identity class object, passing the identity class object export parameters, and initiating the export method. 13. The method of claim 10, wherein the method selected in the step of selecting provides an identity class object exposing a create peer name method, the method further comprising the steps of selecting the create peer name method to create a new peer name class object, passing the identity class object new peer name parameters, and initiating the create peer name method to create a new peer name to associate with the identity class object. 15. A method of enumerating by an application peer-to-peer clouds in a managed framework, the method comprising the steps of: communicating with a managed peer-to-peer networking cloud interface object, the managed peer-to-peer networking cloud interface object exposing a method for enumerating managed peer cloud class objects; passing to the managed peer-to-peer networking cloud interface object parameters required by the method; and initiating the method, the method providing a managed cloud collection class object, the cloud collection class object exposing an item method to select a particular cloud. 16. The method of claim 15, further comprising the steps of initiating a cloud watcher object to notify the application upon a change in the cloud. 17. A method of managing by an application discoverability of a peer name in a managed framework, the method comprising the steps of: passing peer name parameters to a peer name registrar managed object; and initiating a register method exposed by the peer name registrar managed object, the peer name registrar managed object creating a discoverable peer name managed class object in response thereto. 18. The method of claim 17, further comprising the steps of passing peer name parameters to the peer name registrar managed object to identify a discoverable peer name, and initiating an unregister method exposed by the peer name registrar managed object, the peer name registrar managed object deleting the discoverable peer name class object identified by the peer name parameters. 19. A method of resolving by an application a peer name in a managed framework, the method comprising the steps of: passing peer name parameters to a peer name resolver managed object; and initiating a start resolution method exposed by the peer name resolver managed object, the peer name resolver managed object returning a discoverable peer name managed class object in response thereto. 20. A method of discovering by an application peer groups in a managed framework, the method comprising the steps of: passing identity information for which a group enumeration is desired to a group managed object; initiating a get groups method exposed by the group managed object; and receiving a group collection managed class object. 21. The method of claim 20, further comprising the step of passing a parameter to the group collection managed class object to select a particular group associated with the identity information, initiating an item method exposed by the group collection managed class object, and receiving a group managed class object. 22. A method of retrieving by an application a peer group in a managed framework, the method comprising the steps of: passing group identity information to a group managed object to identify a group managed class object; initiating a get group method exposed by the group managed object; and receiving the group managed class object. 23. A method of managing by an application a group managed class object, comprising the steps of: retrieving the group managed class object; selecting one of an initialize method, a connect method, a disconnect method, a delete membership method, a create invitation method, a get peer collection method, and a get peer method exposed by the group managed class object; providing parameter information required by the selected method; and initiating the selected method. 24. The method of claim 23, wherein the step of selecting comprises the step of selecting the get peer collection method, further comprising the steps of receiving a peer collection managed object, selecting an item method exposed by the peer collection managed object, and receiving a peer managed class object. 25. The method of claim 24, further comprising the step of initiating a revoke membership method exposed by the peer managed class object. 26. The method of claim 23, further comprising the steps of retrieving a group policy managed object, setting at least one policy parameter, and initiating an update method exposed by the policy managed object. 27. A method of managing by an application group records in a group database, comprising the steps of: retrieving a store managed class object; selecting one of a get records method, a get record method, an add record method, an update record method, a delete record method, and a purge method; providing information required by the selected method; and initiating the selected method. 28. The method of claim 27, comprising the steps of retrieving a record watch list managed object, selecting one of an item method, an add record to the watch list method, and a remove record from the watch list method, providing information required by the selected method, and initiating the selected method. 29. A method of searching by an application for a record in a managed peer framework, comprising the steps of: retrieving a search managed class object; selecting one of a start method, a cancel method, and an add attribute to a search method; and receiving at least one indication of a record found and of the search complete. 30. The method of claim 29, further comprising the step of providing at least one attribute to limit the search. 31. A peer name managed class, comprising an authority property field, a classifier property field, and wherein the peer name managed class exposes a ToSting static method. 32. An identity managed class, comprising a peer name property field, a friendly name property field, and a key property field, and wherein the identity managed class exposes an export method and a create peer name method. 33. A cloud managed class, comprising a scope property field, a scope ID property field, a state property field, and an address family property field. 34. An invitation managed class, comprising a group name property field, a group peer name property field, a creator name property field, a creator peer name property field, an expiration time property field, and a scope property field. 35. A group managed class, comprising an ID property field, a name property field, a policy property field, a state property field, and a store property field, and wherein the group managed class exposes an initialize method, a connect method, a disconnect method, a delete membership method, a create invitation method, a get peers method, and a get peer method. 36. A policy managed class, comprising a maximum record size property field, a search engine property field, and a scope property field, and wherein the policy managed class exposes an update method. 37. A peer collection managed class, comprising a count property field, and wherein the peer collection managed class exposes an item method. 38. A peer managed class, comprising a peer name property field, a name property field, and an address property field, and wherein the peer managed class exposes a revoke membership method. 39. A store managed class, comprising a record watch list property field, and wherein the store managed class exposes a get record method, a get records method, an add record method, an update record method, and a delete record method. 40. A record collection managed class, comprising a count property field, and wherein the record collection managed class exposes an item method. 41. A record managed class, comprising an ID property field, a creator peer name property field, a type property field, a creation time property field, a last modified time property field, an expired property field, and expiration time property field, an attributes property field, and a data field. Priority Applications (1) Applications Claiming Priority (1) Publications (2) Family ID=32735841 Family Applications (1) Country Status (1) Cited By (44) Families Citing this family (9) Citations (11) Family Cites Families (1) - 2003 - 2003-01-27 US US10/351,727 patent/US7437440B2/en active Active
https://patents.google.com/patent/US20040148611A1/en
CC-MAIN-2019-26
refinedweb
9,745
50.46
Instructions for installing MicroPython on the Sipeed Maix range of RISC-V 64 boards. I bought an M1w dock suit to test from an Indiegogo campaign. They are now available on Seeed and Banggood. These feature the Kendryte K210 processor – DualCore RV64 IMAFDC, 8MB SRAM, Neural Network Processor(0.25~0.5TOPS, support TensorFlow Lite), APU, hardcore FFT. The easiest way to get up and running with MicroPython is to flash the newest binary from the releases page: If you want to compile from source then read on… These instructions utilise Ubuntu running in the Windows Subsystem for Linux. This is a neat way of being able to run a Linux distribution ‘inside’ your Windows installation without using a virtual machine. WSL and Ubuntu Setup First you should install WSL following the instructions here:. I choose Ubuntu from the Windows Store. When it’s installed and the shell opens run the following commands: sudo apt-get update sudo apt-get upgrade sudo apt-get install build-essential sudo apt-get install cmake sudo apt-get install python3.6 sudo ln -s /usr/bin/python3 /usr/bin/python sudo apt-get install unzip sudo apt-get install zip MaixPy Download and Setup Create a directory in your C drive. in the following examples the directory is called abc – replace this with your directory name. Run the following commands: cd /mnt/c/abc/ git clone --recursive cd /mnt/c/abc/MaixPy/ make -C mpy-cross Compiling Download v8.2 RISC-V 64bit toolchain for Kendryte K210_ubuntu_amd64 from Copy it to the C:\abc\MaixPy directory Run the following commands in the Linux shell: cd /mnt/c/abc/MaixPy/ tar -xf /mnt/c/abc/maixPy/kendryte-toolchain-ubuntu-amd64-8.2.0.tar.gz In a text editor create the file: C:\abc\MaixPy\ports\k210-freertos\config.conf add this line to set the toolchain path: toolchain_path=/mnt/c/abc/MaixPy/kendryte-toolchain I’m having to copy some files for it to compile for me at the moment. Search the MaixPy directory and subfolders for: spiffs.h spiffs_config.h spiffs_configport.h spiffs-port.h and copy them to: MaixPy\ports\k210-freertos\mpy_support\standard_lib\include\ Run the following commands to compile: cd /mnt/c/abc/MaixPy/ports/k210-freertos chmod +x build.sh ./build.sh You’ll find a new binary called maixpy.bin in C:\abc\MaixPy\ports\k210-freertos\output\ Flashing Binaries Connect your device to USB In Windows, download K-Flash from , unzip and run K-Flash.exe In K-Flash select the device’s port For the Firmware – navigate to C:\abc\MaixPy\ports\k210-freertos\output\maixpy.bin Click Flash I use Putty for the serial monitor. Connect using the settings below: Press the reset button on the device. You should boot into MicroPython and see something like this: Viewing Camera Output on the LCD Copy and paste all the code below at the >>> prompt in Putty and press enter a few times and you will see the camera image on the LCD. import sensor import image import lcd lcd.init() sensor.reset() sensor.set_pixformat(sensor.RGB565) sensor.set_framesize(sensor.QVGA) sensor.run(1) while True: img=sensor.snapshot() lcd.display(img) Face Detection This part appears to have disappeared from the current build. At the MicroPython prompt in the serial monitor, type or paste the following: >>> camera = machine.ov2640 () ; >>> camera.init () ; >>> lcd = machine.st7789 () ; >>> lcd.init () ; >>> demo = machine.face_detect () ; >>> demo.init () ; >>> image = bytearray ( 320*240*2 ) ; >>> while( 1 ) : >>> camera.get_image ( image ) ; >>> demo.process_image ( image ) ; >>> lcd.draw_picture_default ( image ) ; Press enter a few times and you should see the face detection start up: If you have problems, try pressing TAB when you enter code to see possible commands you can enter. References MaixPy on Github: Sipeed Homepage: Releases including binary: Face detection binaries: MaixPy port: Buy Me A Coffee If you found something useful above please say thanks by buying me a coffee here... 12 Replies to “Sipeed MAIX RISC-V Module | MaixPy MicroPython Win10” there is a typo in your demo code: demo=machine.demo_face_detect() is correct. it tool me hours to find out. demo = machine.face_detect () ; worked for me. You can see it in the screen capture of the console. Are you working with the .kfpkg file? Maybe something has changed in the source files. You can always press TAB to see possible commands. So far the best tutorial available for this board! Is it possible to have a video with the whole process? I’ve managed to replicate all steps up to the serial connection, but didn’t manage to connect to maixpy. Just want to be sure I’m doing everything correct. What do you see in Device Manager for ports when you connect the device? Im using Maix Go, and what I get is CMSIS-DAP CDC with failed drivers. On win 8.1. Got CH340 and CP210X drivers installed from other boards. I believe GO uses STM32 as an interface? Tried this:, this (doesn’t instal, it says no device is connected). No luck! This was on my PC. I’ve borrowed my sons’ PC that is Win10, got all working beside serial connection to the board (Putty). Firmware upload on win10 works fine. What do you see in K-Flash for the Device? Just to be clear, I have 2 issues: 1. Running the tutorial on win 10 works fine untill MaixPy login that just shows random chars on Win10 the Device shows: “USB Serial port (COM3)” 2. On win7 and win8.1 can’t connect, because COM driver fails. on Win7 no connection (Got some COM listed from Bluetooth adapter) I do believe might be something with Go board serial driver on systems that are lower than win10. So far no luck from the telegram group…I guess I’ll wait until this gets more matured until I dive into this board. If the the USB to serial chip is new it probably won’t support older OS. I’m following the telegram group and there was a discussion about this. You could try different speeds (baud rate) but it’s a shot in the dark. You could also try Some more settings I have: But like you say.. sometiimes with these things it’s better to work on something else. If you get and use this command, you’ll be able to connect to the GO. start plink -serial COM3 -sercfg 115200,8,1,N,N Hi, i manage to complete all the steps without errors until the build.sh it says ../../../py/mkrules.mk:47: recipe for target ‘build/.//omv/py/py_cpufreq.o’ failed make[1]: *** [build/.//omv/py/py_cpufreq.o] Error 1 make[1]: Leaving directory ‘/mnt/c/maixpy/MaixPy/ports/k210-freertos/mpy_support’ Makefile:41: recipe for target ‘subcompile’ failed make: *** [subcompile] Error 2 any ideas? I just ran through the tutorial again to check the latest files and it all worked OK for me. Which board do you have?
https://robotzero.one/sipeed-maix-micropython/
CC-MAIN-2022-40
refinedweb
1,165
66.64
Opened 5 years ago Closed 16 months ago #11870 closed Bug (wontfix) Moderation doesn't work with comments extended from BaseCommentAbstractModel Description CommentFlag has a hardcoded foreign key to django.contrib.comments.models.Comment and thus the moderation-bits of django.contrib.comments cannot be used when inheriting directly from BaseCommentAbstractModel. Either this should be mentioned in the documentation or CommentFlag should have a import comments ... comment = models.ForeignKey(comments.get_model(), verbose_name=_('comment'), related_name="flags") instead of comment = models.ForeignKey(Comment, verbose_name=_('comment'), related_name="flags") Attachments (3) Change History (19) Changed 5 years ago by thejaswi_puthraya comment:1 Changed 5 years ago by thejaswi_puthraya - Needs documentation unset - Needs tests unset - Patch needs improvement unset - Triage Stage changed from Unreviewed to Accepted comment:2 Changed 5 years ago by thejaswi_puthraya - Version changed from 1.1 to SVN comment:3 Changed 5 years ago by thejaswi_puthraya The patch uploaded by me doesn't work because it goes into a cyclical import and fails. Sorry for uploading that patch without verifying. Underestimated this issue... comment:4 Changed 5 years ago by jezdez Any progress on this? Changed 5 years ago by thejaswi_puthraya git patch against the latest checkout comment:5 Changed 5 years ago by thejaswi_puthraya - milestone set to 1.2 The latest patch works but it does late module loading ie the imports are called within an if...else statement. This is discouraged in PEP-8 and django's contributing guide but is the only way it can be solved. Every other method I could think of results in a recursive ImportError. comment:6 Changed 5 years ago by jezdez - Needs tests set Hm, I can't really think of an alternative, too. But a test of this behaviour would be good. Changed 5 years ago by thejaswi_puthraya git patch against the latest checkout with the required tests comment:7 Changed 4 years ago by ubernostrum - milestone 1.2 deleted 1.2 is feature-frozen, moving this feature request off the milestone. comment:8 Changed 4 years ago by unbracketed - Cc brian@… added comment:9 Changed 4 years ago by jezdez - Patch needs improvement set The last patch didn't run me: comment:10 Changed 4 years ago by jezdez Jesus, of course the patch didn't run me, but it didn't run *for* me, too :) comment:11 Changed 4 years ago by thejaswi_puthraya Jannis, This patch works but the settings.py should have the COMMENTS_APP attribute set before the tests are run. The toggling of the COMMENTS_APP attribute in the CustomCommentTest class (present under comment_tests/tests/app_api_tests.py) does not help, because syncdb would've already taken place as soon as the test started and in the process, the evaluation of get_model function in the CommentFlag model. The problem of setting the COMMENTS_APP to the custom comments explicitly before the tests are run will cause all the default comment tests to fail, unless there are some changes made the CommentTestCase class' setUp method. What do you suggest? Do we require a test for this or modifying the comment tests? comment:12 Changed 4 years ago by thejaswi_puthraya As per a discussion with Jannis and Russell, this ticket needs to wait till LazyForeignKey or some equivalent. comment:13 Changed 3 years ago by julien - Severity set to Normal - Type set to Bug 16 months. git-patch against the latest checkout
https://code.djangoproject.com/ticket/11870
CC-MAIN-2014-23
refinedweb
561
62.07
On Friday 30 January 2009, Ingo Molnar wrote:> Sam, would you mind to remove the CONFIG_* warnings from headers_check, > and get that commit to Linus ASAP? (or we can put it into this branch too, > if you prefer it that way)> > Those warnings wont be worked around in the headers and that check litters > the CONFIG_HEADER_CHECK=y build with warnings right now and make it > impossible to reach a warning-free build.I double-checked the remaining CONFIG_* warnings in this version to make surethat we are not dropping any warnings about actual bugs. There are a few placeswhere the kernel exports more than it should, but there is a lot more of thatwithout warnings, so that's fine.The only places that believe to be bugs that needs fixing are in<linux/kvm.h> and <asm-x86/ptrace-abi.h>. Avi has a patch for kvm.hthat in the kvm tree.Below, you can find a patch for the remaining problem. Arnd <><---Subject: x86: export PTRACE_BTS interfaces to user spaceThe definitions for PTRACE_BTS_* are inside of #ifdef CONFIG_X86_PTRACE_BTS,which means that they are invisible to user space. Remove the #ifdef sothat the interface becomes visible.Signed-off-by: Arnd Bergmann <arnd@arndb.de>--- a/arch/x86/include/asm/ptrace-abi.h+++ b/arch/x86/include/asm/ptrace-abi.h@@ -80,8 +80,6 @@ #define PTRACE_SINGLEBLOCK 33 /* resume execution until next branch */ -#ifdef CONFIG_X86_PTRACE_BTS- #ifndef __ASSEMBLY__ #include <linux/types.h> @@ -140,6 +138,5 @@ struct ptrace_bts_config { BTS records are read from oldest to newest. Returns number of BTS records drained. */-#endif /* CONFIG_X86_PTRACE_BTS */ #endif /* _ASM_X86_PTRACE_ABI_H */
https://lkml.org/lkml/2009/1/30/266
CC-MAIN-2015-27
refinedweb
264
65.83
Making the untestable testable with Anonymous Methods and Dependency Injection It can be frustrating to want to write unit tests, only to hit some code which is rather untestable. Take for example, the following code: public class MailS}; new SmtpClient().Send(message); } } Obviously, I can’t test this method as-is without making sure that a mail server is setup. And even if it was, how would I verify that the properties of my MailMessage object were properly set? In the past, I probably would have solved this by using a virtual method and mocking it:); } public virtual void SendMessage(MailMessage message) { new SmtpClient().Send(message); }. Before you move on, you should be familiar with anonymous methods, I’ve blogged about them in the past and/or you can check out this dimecast. First we’ll change our MailSender class to accept a simple anonymous method into its constructor: public class MailSender { private readonly Action<MailMessage> _sendMessage; public MailSender(Action<MailMessage> sendMessage) { _sendMessage = sendMessage; } } Next we’ll change our SendActivationMail to use the sendMessage); } Before we write our test, let’s configure this dependency for our normal, production use. Here I’m using Ninject (some version of the 2.0 branch, so the syntax might be slightly different for you): Bind<Action<MailMessage>>().ToConstant(message => new SmtpClient().Send(message));: [Fact] public void SendsActivationEmailToUser() { var user = new User {Email = "nail@namekian.cool"}; var action = new Action<MailMessage>(m => Assert.Equal(user.Email, m.To.ToString())); new MailSender(action).SendActivationMail(user, null); } There you have it. By injecting our own test-specific anonymous method into our MailSender class we’ve turned otherwise untestable code into code which is easy to test. This is great for mocking out functionally only found all those static classes that Microsoft made so unmockable! Like DateTime as mentioned above! I like this approach. If you think about it, for a moment, it kind of seems silly to have interfaces with a single method these days now that the Framework has a nice way of supplying lambdas. After all, there’s not much difference between an Action and an interface with a single method. Except that an action provides for even less coupling since your no longer coupled to an interface definition, but a method signature, which anyone can create anonymously. Sandor: If you are talking about server/port/username/password, I mentioned in my post that I would put those in the config file under the system.net section. These are automatically picked up by the SmtpClient class and used by default. Where would you modify the state of the SMTP client based on certain parameters if you would need to? Wouldn’t that place code that belongs to the MailSender class outside of it? In the context that its being used, it’s a really smart use (and example of) of anonymous methods. Its lean, simple and uses as little code as possible. I’m all for it. Thanks Karl. I agree with Tom and Garry, I’d go with a special class that takes care of sending Emails. is much less readable in the long term than a I believe that an Action ISmtpSender with an accompanying SmtpSender class. The test code doesn’t change all that much, since I could use RhinoMocks directly on the interface to create an expectation. In case you need to inject only one method, like in this case, using lambda expression as a constructor parameter is simpler and more obvious than defining and using special interface. Interface makes sense if there are many methods which we need to mock. Completely agree with James: more options = good Especially if somebody writes a great example of how it fits in Interesting. I imagine this works well where you have one distinct “action”, the implementation of which is the thing you want to mock out. Definitely something I’ll keep in mind. Personally my knee-jerk approach would have been to create an ISmtpClient interface Using Func, Action instead of Mock object makes the unit test weired, difficult to find its intend, SystemTime.Now() is okay it does not distract the actual purpose of the test, but id does IMHO. @David. This pattern is quite common in functional programming, also. It’s also seen in the .Net world a lot with Linq extension methods. Also, I like the Ninject love. I considered this approach for my own stuff, but then thought “naah, that’s getting crazy.” I think it’s straightforward to use and easy to mock, I’m just nervous that others will think it’s going too far. Side note: abstracting DateTime.Now would be one place to use this technique, and tons of folk have blogged about their approaches to abstracting it away… e.g. This looks closer to how dependencies are sometimes swapped out at test time for dynamic languages like Ruby and Python (based on my limited exposure to them). I think I like it – like Peter said, you’re actually asking for even more detail than just an interface. Sure, there will be times when you need to inject an interface, but this seems very lightweight. I’ll have to try it out. Sean, You mean through the SpecifiedPickupDirectory SmtpDeliveryMethod? Well first, I didn’t know about it until your comment Aside from that, I guess you could, but that seems like a lot more work and doesn’t seem like a unit test anymore. Which I agree doesn’t matter if it gets the job done, but larger tests tend to be more brittle. I think I agree with Karl. When using an interface you’re saying: I have this MailSender class which depends on the ISmtpSender interface, but which method I’m using on this interface is not clear. When injecting an Action<> object you’re a bit more specific: you are telling MailSender depends on/uses this type of action/method. For testing, couldn’t you drop the mail message to a folder and then validate it? No mail server is needed and a little post-test cleanup to get rid of the dropped files could be added too. Funny, I thought this was a simpler and a more straightforward approach. Either works. I could see the facade being a much better choice if I wanted to use more methods of the SmtpClient class. I don’t see how the client is coupled to the SmtpSender. The dependency can be changed, and is being injected via auto-wiring. Also and more important; haven’t now you created a coupling between the SmtpSender and the client? That’s exactly what I was thinking Tom, this way seems more complicated that implementing a simple facade over SmtpClient Hey Karl, it sure looks funky and all that… but why not extract interface on the SmtpSender class and inject that using the DI container? Tom
http://codebetter.com/karlseguin/2009/05/08/making-the-untestable-testable-with-anonymous-methods-and-dependency-injection/
crawl-003
refinedweb
1,148
71.34
When running the program, the next message box appears: "A program is trying to access e-mail addresses...." How can I get rid of this message?Reply Hi, I'm trying to write the same app but for a console application. I'm not really familiar with c++ so I'm not sure what to do. Could someone tell me which changes I have to make to make this work (I'm trying to do this so later on I can export the contacts to a java app). thx, AndyReply Originally posted by: Chris Bartle I had been looking for a way to extract calendar data from Outlook 2000 and this code works well for that too. Just replace _ContactItemPtr with _AppointmentItemPtr and use GetDefaultFolder(olFolderCalendar). I've been having a hard time finding any good documentation from Microsoft on using these classes in VC, so I've been stuck decoding the header files. Still, this code provides a great launching point for accessing more than just Outlook contacts. Originally posted by: Dennis liao Dear all: Do anybody knows How to import and export vcard files from Outlook in vc application? Hoping for a reply, Thanks and Regards, Dennis liao Originally posted by: Paras Shah Hi there, Is there any possibility to create/modify the email account in Outlook 2002(office xp) programmatically using vc++? Paras Shah Originally posted by: majk Hello, it's elegant concept. The problem I have: 'GetEmail1Address' returns just string like here: '/o=XYZ/ou=ABC012/cn=Recipients/cn=Firstname Lastname' 'GetEmail2Address' and 'GetEmail3Address' return empty string. Any idea? M. ReplyReply How to dynamic import mso9.dll and MSOUTL9.OLB in my program? I got the file path from the Registry but I couldn't do it dynamically in my program. #import "C:\\Program Files\\Microsoft Office\\Office\\mso9.dll" named_guids #import "C:\\Program Files\\Microsoft Office\\Office\\MSOUTL9.OLB" \ no_namespace exclude("_IRecipientControl", "_DRecipientControl") ReplyReply Originally posted by: dima namespace::PickFolder() method displays outlook's "Select Folder" window in a corner. Does anyone know how to force the window to be opened in a center?Reply Originally posted by: Peter Nelson Is there a way to enumerate the namespaces that can be retrieved? You get the 'MAPI' namespace each time - but that returns no contacts to me - even though when I open up Outlook I've got dozens. I'm assuming that my user is not set up as an exchange user, and so has no Mapi entries... but there must still be a way. -PeterReply Originally posted by: Robert Thank you very much. This code is exactly what I've been looking for. There is not enough sample code for Outlook out there.Reply
http://www.codeguru.com/comment/get/48258910/
CC-MAIN-2016-22
refinedweb
449
56.66
Sirius/Compatibility and Migration This page documents the compatiblity policy for Sirius releases, both for users of the Viewpoint technology (the previous name of Sirius) who want to switch to Sirius and from new adopters of Sirius itself. Note: this is a draft. See the discussion at. Feedback welcome. Contents Background Sirius is new as an official Eclipse project, but the code is already mature and has been deployed for many years (under the name Viewpoint) by Thales and Obeo. This means that even though we are still in incubation, we have an existing user base. We must: - ensure these existing users can safely and easily migrate from Viewpoint to Sirius; - be careful about any change we make as it can have an impact on these users. At the same time, we recognize that the time between now and 1.0 is a unique window of opportunity for changes we can not usualy make, even in a major release: things will break for existing users anyway because of the name change, so now is a good time to implement some changes we need to improve the architecture of the system and ensure it can be maintained and evolved in the future. The constraints we have to balance: - existing users who have invested in the Viewpoint technology; - technical debt accumulated over the years, and also lots of experience accumulated with ideas on how to do certain things better with hindsight; - we expect a much larger user base now that Sirius is open source, with expectations and more varied use cases and requirements we have not imagined yet. This means we must be able to innovate and react quickly to the community needs. The technical debt in the current code base does not allow us to be as agile as we will need. we consider these changes necessary for the future of the project. the current state of the code would not allow us to implement important new features and improvements in a fast enough and in a maintainable way. time until 1.0 will not be enough to implement all the changes we would want, we may need to break API also in Luna+1 but hopefully with less structurally impacting changes. easy migration with no data or major functionality loss of paramount importance. loss of minor functionalities and corner-behaviors acceptable on a case-by-case basis (to be discussed with users and stakeholders) if (i) the change is clearly documented, and (ii) an equivalent or better feature is already planned for a future release. some functionalities may exist but in a different way in Sirius than in Viewpoint (beside the API changes), in which case a migration path must be provided and documented. an example (just for the sake of illustration, I am not saying this will happen for 1.0): we currently distinguish node mappings from container mappings, with inconsistencies in which styles, tools etc. can apply to each. we could decide to have a single unified type of mapping, with nodes just being a special case of a container with no sub-mapping. Overview of the Sirius Releases Roadmap Until 1.0 Sirius is currently in incubation. The goal is to get get out of incubation status with a 1.0.0 release to be included in the Luna release train in June 2014. We will follow the Luna calendar and the corresponding milestones, starting from M4 (M3 has already passed). Before that we will do a first official release named 0.9.0 in the next few weeks (having at least one official release is a requirement of the Eclipse process to be allowed out of incubation). The scope of this version 0.9.0 is to be as close as possible to the current version of the previous code base (Viewpoint), except for the "rebranding". This is to facilitate the migration of users who previously used Viewpoint to Sirius by providing a baseline version in which the only changes to be concerned about are related to the rebranding, with no new features or API changes. In practice there might be a few incompatible changes beyond just the rebranding but they will be very small and documented in the release notes for Sirius 0.9.0 (see the actual release notes document). The 0.9.x branch will not be maintained, it is purely transitional. We may do 0.9.x maintenance releases if major issues are detected on the 0.9.0 release which prevent people to migrate to it with functionalities equivalent to what they add in Viewpoint, but bugs which already existed in Viewpoint will not be fixed in the 0.9.x branch. Even "normal" (i.e. neither blocker or major) bugs specific to Sirius 0.9.0 may not trigger a 0.9.x maintenance release by themselves. Note that according to the EDP, maintenance/service releases do not need the full paperwork of normal Eclipse releases, so the decision to not maintain 0.9 is purely so that we can focus our developement time solely on providing a high quality 1.0 release and not disperse the team on maintaining more branches. Between 0.9.0 and 1.0.0, we will provide milestone releases synchronized with the Luna calendar. Again, milestone releases are not official Eclipse releases with paperwork associated. Milestone releases do not result in a separate branch, so they will not be maintained (i.e. no M4.x releases); any issue on a milestone will only be addressed on the master branch. This gives is the following calendar: - 2013-11-30: Sirius 0.9.0 released (more likely early December given the current state). - 2013-12-20: Sirius 1.0.0M4 released with Luna M4. - 2014-01-31: Sirius 1.0.0M5 released with Luna M5. - 2014-03-14: Sirius 1.0.0M6 released with Luna M6. - 2014-05-07: Sirius 1.0.0M7 released with Luna M7. - 2014-06-25: Sirius 1.0.0 released with Luna. Objective and General Rules In general incompatible changes between two versions should be the exception and not the general rule. Any incompatible change should be clearly justified and its impacts minimized. The window between Sirius 0.9 and 1.0 is special in that large-scale incompatible changes are planned for each milestone, but the rule about justifying each change still apply. The goal is to concentrate as much as possible of these large-scale changes (many of which we have wanted to do for a long time but could not because of their impact) in this time window. The rules: - whenever possible, allow seamless and transparent migration; - if that is not possible, provide automated or semi-automated tools to assist in the migration. These tools should be usable programmatically (no just by UI actions) to allow users with lots of existing data to automate the migration. - if automation is not possible or considered too costly, provide complete documentation of the manual steps to perform to migrate existing projects. In all cases (even when the migration can be handled transparently), all changes should be clearly documented in the release notes of the release or milestone in which they appear first. Supported Platforms The versions of Eclipse Sirius (0.9 & 1.0) will support are: - Eclipse 3.8, as the last of the 3.x, as we expect many users to stay on 3.x as long as they can to avoid the changes implied by moving to 4.x. Note that this is not really an official Eclipse release, but corresponds to a subset of Eclipse Juno (4.2) without the 4.x platform and features which depend on it. - Kepler (4.3), at least until we ship Sirius 1.0, as this is the stable version early adopters of Sirius milestones will most likely be using unless they fell very adventurous and try Luna milestones. - Luna (4.4) as our main target, as we are part of the train. Types of Compatibility Issues - VSM - Note that Sirius itself, as available from Eclipse.org, will not support the old Acceleo 2.x language for expressions in VSMs. Many existing users used Acceleo 2 extensively. - Representations Files - Modeling Projects - Nature "fr.obeo.dsl.viewpoint.nature.modelingproject" no longer exists. It should be replaced by "org.eclipse.sirius.nature.modelingproject". - Plug-in dependencies - Extension points and other ids - Java namespaces - Java APIs Migration Rules - Stepwise migration: first to the latest version of Viewpoint available, then to Sirius 0.9.0, then each milestone in turn up to 1.0.0 final. - For a given project, document in which order to migration the VSMs, APIs, aird etc. - For projects which depend on each other (e.f. modeler B which extends modeler A and user projects with representation data for A and/or B): only start to migrate the representation data once all the relevant modelers have been migrated. Migration Path from Obeo Designer or Viewpoint to Sirius - First: migrate to the latest version of Viewpoint available to you. If you are an Obeo Designer user, this means migrating to Obeo Designer 6.2.x, which corresponds to Viewpoint 6.8.x. Some users (Thales) have access to more recent versions of Viewpoint which were not released as part of Obeo Designer. In that case, migrate to the most recent version first (Viewpoint 6.10 as of this writing). *Migrating to Sirius from versions of Viewpoint older that 6.8 will not be supported.* - Then, the safest way is to migrate stepwise through all the milestone releases. If at all possible, users should migrate to Sirius milestone as they are released instead of waiting for the final 1.0 release to start the migration. The more users we have trying the milestone *and giving us feedback* the better the 1.0 release will be, in all respects.
http://wiki.eclipse.org/Sirius/Compatibility_and_Migration
CC-MAIN-2016-22
refinedweb
1,644
65.52
another (similarly structured) Quilt package in your production environment. 1. The problem Qxf2 is developing a simple survey application for internal use only. We decided (reasons in section 5 below) to use Quilt to store our data instead of SQLite. We need to use one Quilt data package for our development and test environments and one Quilt data package for our production. The two packages would be similar in structure (same variables, dataframe columns, etc.) but have different data in them. With databases, you would store the database configuration in a settings file and read that into your code. However, a similar approach with Quilt poses an additional problem – Quilt scripts have an import statement that uses the name of the package explicitly. 2. Dynamic imports with Python To solve the above problem of an import statement referencing a package name, we need to be able to dynamically import the module. This will help us use the same application code in both production and the development environments. There are two popular ways to do dynamic import in Python: __import__ and the importlib module. We decided to go with the importlib module since we found its syntax intuitive. For example, a. import foo is simply foo = importlib.import_module('foo') b. import foo as blah is simply blah = importlib.import_module('foo') c. from foo.bar import blah is app = importlib.import_module('foo.bar.blah'). This particular statement is what we will use to dynamically import the Quilt package. 3. The Quilt script without dynamic imports In this example, we will write a Python script to create a new package (called jose), store a simple table and then push the package to Quilt. Without dynamic imports, the script would look something like the code below. You will notice the problem is the line from quilt.data.qxf2 import jose which hard codes both ‘qxf2’ (the repo name) and ‘jose’ (package name). If I wanted to use the package ‘jose’ in my development environment and the package ‘capa’ in production, I would need two different scripts. 4. The Quilt script with dynamic imports To make the above code handle multiple environments (i.e., different packages), we would store the package name in a file that had different configuration values on your development and production environment. In our example, the file (let’s say we call it quilt_settings.py) would have only one line PACKAGE_NAME="capa". Then, change the import statement to look like: Putting it all together, the code would look like this: That’s it! Now you have the exact same code working on both production and development environments while still using two different (but similarly structured) data packages on each environment. 5. Why we are using Quilt instead of a database Because we really like using Python. I know, I know – “if all you have is a hammer, everything looks like a nail”. But in this case, we feel good about simply using Python to manage our data instead of designing tables, designing an ORM, managing configurations & deploys, thinking about different platforms and then adding extra steps to our setup documents, etc. It helps that the application we are building will be small, not have too many users and the data is ideally suited to storing data in dataframes. Disclaimer: We are using Quilt as a database. We aren’t sure that the creators of Quilt built Quilt for this use case. This is simply Qxf2 creatively using the data package manager to write small web.
https://qxf2.com/blog/quilt-local-and-production-packages/
CC-MAIN-2022-05
refinedweb
584
55.03
Microsoft's official enterprise support blog for AD DS and more Hi Hi folks, Ned here again. Today I discuss the so-called “urgent replication” of AD, specifically around Fine-Grained Password Policies. folks, Ned here again. It’s that time where we look back on the more interesting questions and comments the DS team got this week. Today we talk about FRS, AD Users and Computers, Load-Balancers, DFSR, DFSN, AD Schema extension, virtualization, and Scott Goad. Let’s ride! If you get a journal wrap when using FRS, there is an event 13568 like so:. But when I review KB292438 (Troubleshooting journal_wrap errors on Sysvol and DFS replica sets) it specifically states:. Important Microsoft does not recommend that you use this registry setting, and it should not be used post-Windows 2000 SP3. Appropriate options to reduce journal wrap errors include: So which is it? The KB is correct, not the event log message. If you enable the registry setting you can get caught in a journal wrap recovery “loop” where the root cause keeps happening and getting fixed, but then happens again immediately and gets fixed, and so on: replication may sort of work – inconsistently – and you are just masking the greater problem. You should be fixing the real cause of the journal wraps. As to why this message is still there after 10 years and four operating systems? Inertia and our unwillingness to incur the test/localization cost of changing the event. When you have to rewrite something in all these regions and languages, the price really adds up. I am way more likely to get a bug fix from the product group that changes complex code than one that changes some text. I was wondering if it is intentional that the "attribute editor" tab is not visible when you use "Find" on an object in AD Users and Computers? Ughh. Nope, that’s a known issue. Unfortunately for you, the business justification to fix it was not convincing. This happens in Win2008/Vista also and no Premier customer has ever put up a real struggle. However, you have another option: Use the “Find” in ADAC (aka AD Admin Center, aka DSAC.EXE). This lets you find and when you open those users, you will see the attribute editor property sheet. If everyone here hasn’t already figured it out, ADAC is the future due to its PowerShell integration and ADUC doesn’t appear to be getting any further love. Are there any issues with putting DC’s behind load-balancers? If you put a domain controller behind a load balancer you will often find that LDAP/S or Kerberos authentication fail. Keep in mind that SPN’s can only be associated to one computer account, so Kerberos is going to go kaput. You will have to issue certificates manually to the domain controllers if you are trying to do LDAP/S connectivity because the subject and subject alternative name needs to match the DNS name of the load-balanced address. Domain controllers are load balanced already in that there are multiples of them. If you need to find a domain controller correctly your application should do a DCLocator or LDAP SRV record lookup like a proper citizen. Answer courtesy of Rob “Sasquatch” Greene, our tame authentication yeti. The documentation on DFSR's cross-file RDC is pretty unclear – do I need two Enterprise Edition servers or just one? Also, can you provide a bit more detail on what cross-file RDC does? Just one of the two servers in a given partnership – i.e. replicating with DFSR connections – needs to be running Enterprise Edition in order to have both servers use cross-file RDC. Proof. There is no difference in DFSR in Standard Edition versus Enterprise Edition code; once the servers agree that at least one of them is Enterprise, both will use cross-file RDC. Otherwise, anytime you got a hotfix from us there’d be one for each edition, right? But there never are: (and yes, this article has gotten a bit out of sync with reality, we’re working on that.) As for what Cross-File RDC does: if you are already familiar with normal Remote Differential Compression, you understand that it takes a staged and compressed copy of a file and creates MD-4 signatures based on “chunks” of files: This means that when a file is altered (even in the middle), we can efficiently see which signatures changed and then just send along the matching data blocks. So a doc that’s 50MB that changes one paragraph only replicates a few KB. An overall SHA-1 hash is used for the entire file - to include attributes, security info, alternate data streams etc. - as a way to know that two files match perfectly or not. DFSR can also make signatures of signatures, up to 8 levels deep, to more efficiently handle very large changes in a big file. Cross-file RDC takes this slightly further: by using a special hidden sparse file (located in <drive>:\system volume information\dfsr\similaritytable_1) to track all these signatures, we can use other similar files that we already have to build our copy of a new file locally. Up to five of these similar files can be used. So if an upstream server says “I have file X and here are its RDC signatures”, we the downstream server can say “ah, I don’t have that file X. But I do have files Y and Z that have some of the same signatures, so I’ll grab data from them locally and save you having to transmit it to me over the wire.” Since files are often just copies of other files with a little modification, we gain a lot of over-the-wire efficiency and minimize bandwidth usage. Slick, eh? I’m seeing DFS namespace clients going out of site for referrals. I’ve been through this article “What can cause clients to be referred to unexpected targets.” Is there anything else I’m missing? There has been an explosion of so-called “WAN optimizer” products in the past few years and it seems like everyone’s buying them. The devices can be very problematic to DFS namespace clients, as the devices tend to use Network Address Translation (NAT). This means that they change the IP header info on all your SMB packets to match the subnets of the appliance endpoints – and that means that when DFS tries to figure out your subnet to give you the nearest targets, it gets the subnet of the WAN appliance, not you. So you end up using DFS targets in a totally different site, defeating the purpose of DFS in the first place – a WAN de-optimizer. :) A double-sided network capture will show this very clearly – packets that leave one computer will arrive at your DFS root server with a completely different IP address. Reconfigure the WAN appliance not to do this or contact their vendor about other options. I have created/purchased a product that will extend my active directory schema. Since it was not made or tested by Microsoft, I am understandably nervous that I am about to irrevocably destroy my AD universe. How can I test out the LDF file(s) that will be modifying my schema to ensure it is not going to ruin my weekend? What you need is the free AD Schema Extension Conflict Analyzer. This script can be run anywhere you have installed PowerShell 2.0 and does not require you to use AD PowerShell (for all you late bloomers that have not yet rolled out Win7/R2). All you do is point this script at your LDF file(s) and your AD schema and let it decide how things look: set-executionpolicy unrestricted C:\temp\ADSchemaExtensionConflictAnalyzer.ps1 -inputfile D:\scratch\FooBarExtend-ned.ldf -outputfile results.txt set-executionpolicy unrestricted C:\temp\ADSchemaExtensionConflictAnalyzer.ps1 -inputfile D:\scratch\FooBarExtend-ned.ldf -outputfile results.txt It will find syntax errors, mismatched attribute data types, conflicting objects, etc. plus give advice. Like here it warned me that my new attributes will be in the Global Catalog (in the “partial attribute set”). The script makes no changes to your production forest at all, but if you’re nervous anyway you can export your production schema with: ldifde.exe –f myschema.ldf –d cn=schema,cn=configuration,dc=contoso,dc=com ldifde.exe –f myschema.ldf –d cn=schema,cn=configuration,dc=contoso,dc=com … and have the script just compare the two files (if you’re paying attention you’ll see it call LDIFDE in a separate console window already though. You big baby.). I <blah blah blah> Windows <blah blah blah> running on VMWare. You must be made of money, Jack. You’re already paying us for the OS you’re running everywhere. Then instead of using our free hypervisor and way less expensive management system you’re paying someone else a bunch of dough. “But Ned, we want dynamic memory usage, Linux support, and instantaneous guest migration between hosts”. Ok: If you really want to give your CFO a coronary, try this link: Then while the EMT’s are working on him to start his ticker back up, take out your CIO with this: Support policy for Microsoft software running in non-Microsoft hardware virtualization software Support policy for Microsoft software running. This is more common that you might think, we find VMware-only issues all the time and our customer is now up a creek. There are troubleshooting steps - especially with debugging - that we simply cannot do at all due to the VMware architecture. Hence why you will need to reproduce on physical hardware or hyper-v, where we can gather data. Although when we find that it no longer repro’s off VMware… now what? And of course, when all those VMware ESX servers stopped working for 2 days last year, their workaround could not be performed on DCs as it involved rolling back time. I know that sounds like schadenfreude, but when a customer’s DCs all go offline, we get called in even if it’s nothing to do with us - just ask me how it was when McAfee and CA decided to delete core Windows files. Spoiler alert: it blows. I feel strongly about this… Finally, I want to welcome Scott Goad to our fold – you have probably noticed that the KB/Blog aggregations have started again. If you look carefully you’ll see that Scott has taken that over from Craig Landis, who has moved on to getting us better equipped to support ADFS 2.0. Scott used to be a cop and he also has been working on those podcast pieces with Russ. Naturally, Office has clipart for that precise scenario
http://blogs.technet.com/b/askds/archive/2010/08.aspx?PageIndex=1&PostSortBy=MostComments
CC-MAIN-2014-23
refinedweb
1,807
61.56
Hi guys, i really need help here. I must write a program in c that reads a file .RAW that it contains photos in sequential order, every photo has a head-board of 4 bytes. (0xff 0xd8 oxff 0xe0 or 0xe1) and that way I can identify the beginning of the photo and the size. dont know if i must read the file in binary form or not, and i do not understand whath this storing in the dynamic vector The files in this folder will have to be separated and with the extension .JPG which it will allow his visualization. In turn, these will have to have a name that goes from 0.jpg up to [Number of photos in the file].jpg. It will have guard in a dynamic vector the size of each one of the photos. It is to say that The size of the vector will be exactly the quantity of the existing photos in the file to To recover. This is what I did till now #include <stdio.h> #include <stdlib.h> void load(FILE *archivo, unsigned char *vector, int n); void findHeader (unsigned char *vector, int n); int main() { unsigned char *character; int cont=0; int nBytes; char c; FILE* file = fopen("fotos.RAW", "r"); if(archivo != NULL) { fseek(archivo, 0, SEEK_END); o nBytes = ftell(file); // size in bytes rewind(file); printf("The size of file is: %d Kbytes\n", nBytes/1024 ) ; while( ( c = fgetc( archivo ) ) != EOF ) cont++; } else { printf("error!\n"); } rewind(file); cargar(file, character, cont); findHeader(character, cont); fclose(file); getch(); return 0; } void load(FILE *archivo,unsigned char *vector, int n) { int i; char c; vector = (unsigned char*) malloc (sizeof(unsigned char)*n+1); if (vector == NULL) printf("wrong operation\n"); else { while( ( c = fgetc( file ) ) != EOF ) { for (i=0; i <= n; i++) { vector[i] = c; printf("0x%x", vector[i]); // to control what is saving in the array getch(); } } } } void findHeader (unsigned char *vector, int n) { int band=0;; int i; for(i=0; i <=n; i++) { if ((vector[i] == 0xff ) && (vector[i+1] == 0xd8) && (vector[i+2] == 0xff) && (vector[i+3] == 0xe0)) band++; else { if ((vector[i] == 0xff) && (vector[i+1] == 0xd8) && (vector[i+2] == 0xff) && (vector[i+3] == 0xe1)) band++; } } printf("Band show up %d times\n", band); //to control how many pics are }
https://www.daniweb.com/programming/software-development/threads/301381/help-reading-a-raw-file-into-byte-array
CC-MAIN-2018-39
refinedweb
388
69.52
Queue for verifications that have to be performed. More... #include <checkqueue.h> Queue for verifications that have to be performed. The verifications are represented by a type T, which must provide an operator(), returning a bool. One thread (the master) is assumed to push batches of verifications onto the queue, where they are processed by N-1 worker threads. When the master is done adding work, it temporarily joins the worker pool as an N'th worker, until all jobs are done. Definition at line 30 of file checkqueue.h. Create a new check queue. Definition at line 130 of file checkqueue.h. Definition at line 159 of file checkqueue.h. Add a batch of checks to the queue. Definition at line 145 of file checkqueue.h. Internal function that does bulk of the verification work. Definition at line 66 of file checkqueue.h. Worker thread. Definition at line 133 of file checkqueue.h. Wait until execution finishes, and return whether all evaluations were successful. Definition at line 139 of file checkqueue.h. Master thread blocks on this when out of work. Definition at line 40 of file checkqueue.h. Worker threads block on this when out of work. Definition at line 37 of file checkqueue.h. Mutex to ensure only one concurrent CCheckQueueControl. Definition at line 127 of file checkqueue.h. The temporary evaluation result. Definition at line 53 of file checkqueue.h. Mutex to protect the inner state. Definition at line 34 of file checkqueue.h. The maximum number of elements to be processed in one batch. Definition at line 63 of file checkqueue.h. The number of workers (including the master) that are idle. Definition at line 47 of file checkqueue.h. Number of verifications that haven't completed yet. This includes elements that are no longer queued, but still in the worker's own batches. Definition at line 60 of file checkqueue.h. The total number of workers (including the master). Definition at line 50 of file checkqueue.h. The queue of elements to be processed. As the order of booleans doesn't matter, it is used as a LIFO (stack) Definition at line 44 of file checkqueue.h.
https://doxygen.bitcoincore.org/class_c_check_queue.html
CC-MAIN-2020-24
refinedweb
363
62.14
Red Hat Bugzilla – Bug 1010518 [abrt] cura-13.04-2.fc19: special.py:323:glutInit:TypeError: 'NoneType' object is not callable Last modified: 2014-10-27 12:48:54 EDT Description of problem: I simply installed cura using 'sudo yum install cura' in my terminal on fedora 19 and then tried running cura by typing 'cura' into my terminal. I also tried 'sudo cura' to the same effect. Version-Release number of selected component: cura-13.04-2.fc19 Additional info: reporter: libreport-2.1.7 cmdline: /usr/bin/python /bin/cura executable: /bin/cura kernel: 3.11.1-200.fc19.x86_64 runlevel: N 5 type: Python uid: 0 Truncated backtrace: special.py:323:glutInit:TypeError: 'NoneType' object is not callable Traceback (most recent call last): File "/usr/lib64/python2.7/site-packages/wx-2.8-gtk2-unicode/wx/_core.py", line 14656, in <lambda> lambda event: event.callable(*event.args, **event.kw) ) File "/usr/lib/python2.7/site-packages/Cura/gui/splashScreen.py", line 16, in DoCallback self.callback() File "/usr/lib/python2.7/site-packages/Cura/gui/app.py", line 39, in afterSplashCallback from Cura.gui import mainWindow File "/usr/lib/python2.7/site-packages/Cura/gui/mainWindow.py", line 9, in <module> from Cura.gui import preview3d File "/usr/lib/python2.7/site-packages/Cura/gui/preview3d.py", line 24, in <module> from Cura.gui.util import opengl File "/usr/lib/python2.7/site-packages/Cura/gui/util/opengl.py", line 20, in <module> glutInit() File "/usr/lib/python2.7/site-packages/OpenGL/GLUT/special.py", line 323, in glutInit _base_glutInit( ctypes.byref(count), holder ) TypeError: 'NoneType' object is not callable Local variables in innermost frame: count: c_int(1) currentDirectory: '/usr/lib/python2.7/site-packages' os: <module 'os' from '/usr/lib64/python2.7/os.pyc'> args: ['foo'] i: 0 arg: 'foo' holder: <OpenGL.GLUT.special.c_char_p_Array_1 object at 0x3168a70> Created attachment 800828 [details] File: backtrace Created attachment 800829 [details] File: dso_list Created attachment 800830 [details] File: environ Thanks for reporting. I have the very same version of the package and never got this error, will definitely look at it. According to this [0] it appears to be missing freeglut, but that's not possible, as PyOpenGL requires it. However this [1] leaded me to an idea: both Cura and PyOpenGL are noarch. PyOpenGL requires ANY freeglut. So after installing freeglut.i686 and removing freeglut.x86_64, lot's of stuff went away, but PyOpenGL and Cura stayed. After, I got the very same error. So, could you please check, if you have 64bit freeglut? And if not, please check if installing cura without any freeglut brings 654bit or 32bit freeglut. Here I got: # yum remove freeglut cura PyOpenGL ... # yum install cura # or PyOpenGL ... freeglut x86_64 ... ... That means you might have 32bit freeglut form some weird reason, but should not get it from yum. [0] [1]
https://bugzilla.redhat.com/show_bug.cgi?id=1010518
CC-MAIN-2018-26
refinedweb
478
53.47
Bart De Smet's on-line blog (0x2B | ~0x2B, that's the question) It's great to see the Silverlight story coming together. This morning at MIX07, Scott Guthrie demoed the cross-platform .NET API support in Silverlight together with dynamic language support (Python, Ruby), debugging across barriers using Visual Studio, etc. Jason Zander has his top 10 feature list posted today. Check out Scott's interview on Channel 9 too, as well as Tim Sneath's blog for all sorts of Windows Presentation * related content. And did you know you can get 4 GB hosting space for free on Microsoft Silverlight Streaming? Have fun! This: 1 // 2 // Put additional namespace imports here 3 // 4 5 class Program 6 { 7 static void Main() 8 { 9 Source<Customer> src = null; 10 var res = from s in src 11 orderby s.Name, s.Age descending 12 where s.Name == "Bart" 13 select s.Age; 14 } 15 } 16 17 class Customer 18 { 19 public string Name { get; set; } 20 public int Age { get; set; } 21 } 22 23 abstract class Source<T> 24 { 25 // 26 // Put code here 27 // 28 }! All C# quizzes on my blog so far were covering C# 2.0 language features. Today, we'll start with a first quiz on C# 3.0, which is rather a knowledge check than a quiz in the classic sense of the word. This quiz focuses on the core concepts in C# 3.0 that drive LINQ. Consider the code fragment below: This piece of code doesn't compile with the following messages:. The goal of this quiz is to provide a minimal abstract definition of the Source<T> class in order to make the code compile. We won't execute the application though, we're just focusing on the compilation (and the result of the compilation). A few rules: Additional questions:. Earlier this week, "The IQueryable Tales" were published on my blog, with great success. This series covered the end-to-end creation of a custom query provider for LINQ, focusing on the LINQ to LDAP case. For your reference, here are a few links to the episodes: As the matter in fact, this implementation is primarily meant for "academic purposes", showing how to go ahead in creating your own query provider using IQueryable<T>. Other samples around the blogosphere include LINQ to Amazon and LINQ to NHibernate. The LINQ to LDAP provider was written in a quick-n-dirty fashion in about one afternoon but has serious restrictions because of the underlying query language (LDAP filters) being quite simplistic, limiting our expressiveness. Nevertheless, it's both a good sample annex tutorial and useful for people dealing with Active Directory or ADAM who don't like to mess around with LDAP filters themselves. Today, I'm happy to announce another fun project of mine, of which an alpha is to be released on CodePlex in the next few weeks: LINQ to SharePoint. Again, it's meant as a (good) sample of implementing query providers and to serve developers when consuming SharePoint data from lists. Essentially, the implementation provides a translation of LINQ queries to CAML, together with a "list schema to entity mapping tool" called SpMetal. CAML, which stands for Collaborative Application Markup Language, is the language used by SharePoint for various purposes, including querying. LINQ to SharePoint translates LINQ queries like the following: 1 DateTime startDate = new DateTime(2007, 01, 01); 2 string firstNameStartsWith = "B"; 3 int maximumAge1 = 24; 4 string lastNameContains = "Smet"; 5 int minimumAge2 = 50; 6 var res = from usr in users 7 where ( (usr.FirstName.StartsWith(firstNameStartsWith) && !(usr.Age > maximumAge1)) 8 || (usr.LastName.Contains(lastNameContains) && usr.Age >= minimumAge2)) 9 && usr.Member == true 10 && usr.MemberSince >= startDate 11 && usr.ShortBio != null 12 orderby usr.MemberSince descending 13 orderby usr.Age ascending 14 select new 15 { 16 Name = usr.FirstName + " " + usr.LastName, 17 usr.Age, 18 usr.Homepage, 19 usr.ShortBio, 20 usr.Activities, 21 MembershipInfo = new { usr.MembershipType, usr.MemberSince }, 22 FoodPreferences = new { usr.FavoriteFood, usr.FavoriteFoodOtherValue } 23 }; into the corresponding CAML query, like this: <Query> <Where> <And> <And> <And> <Or> <And> <BeginsWith> <FieldRef Name="First_x0020_name" /> <Value Type="Text">B</Value> </BeginsWith> <Leq> <Value Type="Number">24</Value> <FieldRef Name="Age" /> </Leq> </And> <And> <Contains> <FieldRef Name="Last_x0020_name" /> <Value Type="Text">Smet</Value> </Contains> <Geq> <Value Type="Number">50</Value> <FieldRef Name="Age" /> </Geq> </And> </Or> <Eq> <Value Type="Boolean">1</Value> <FieldRef Name="Member" /> </Eq> </And> <Geq> <Value Type="DateTime">2007-01-01T00:00:00Z</Value> <FieldRef Name="Member_x0020_since" /> </Geq> </And> <IsNotNull> <FieldRef Name="Short_x0020_Bio" /> </IsNotNull> </And> </Where> <OrderBy> <FieldRef Name="Member_x0020_since" Ascending="FALSE" /> <FieldRef Name="Age" /> </OrderBy> </Query> Finally it's sent to the server using either the SharePoint Object Model (SPList) or the SharePoint web services (lists.asmx). The query provider is "intelligent" on several fields: In order to be able to write a query like the one above, one uses SpMetal to export the schema of the list: The underlying list looks like this in SharePoint: During the export, SpMetal creates a class like this: 1 using System; 2 using BdsSoft.SharePoint.Linq; 3 4 /// <summary> 5 /// Demo 6 /// </summary> 7 [List("Demo", ID = "34c90895-fbf3-4da7-a260-4b3ddc67146d", Version = 36, Path = "/Lists/Demo")] 8 class Demo 9 { 10 /// <summary> 11 /// First name 12 /// </summary> 13 [Field("First name", Type = "Text", ID = "f5164cc0-8a1b-423d-8669-e86bb65a3118")] 14 public string FirstName { get; set; } 15 16 /// <summary> 17 /// Last name 18 /// </summary> 19 [Field("Last name", Type = "Text", ID = "42de3b10-2186-4db1-9345-0ec91fb8a62d")] 20 public string LastName { get; set; } 21 22 /// <summary> 23 /// Age 24 /// </summary> 25 [Field("Age", Type = "Number", ID = "95feebc1-5719-440d-8c95-eccfc2c88f4d")] 26 public double? Age { get; set; } 27 28 /// <summary> 29 /// Member 30 /// </summary> 31 [Field("Member", Type = "Boolean", ID = "32c5c166-6890-4685-acd4-c8d3ad78031c")] 32 public bool? Member { get; set; } 33 34 /// <summary> 35 /// Member since 36 /// </summary> 37 [Field("Member since", Type = "DateTime", ID = "3320e4c8-b7d2-4a7f-b828-d995167bbecc")] 38 public System.DateTime MemberSince { get; set; } 39 40 /// <summary> 41 /// Homepage 42 /// </summary> 43 [Field("Homepage", Type = "URL", ID = "72e5a0be-72cf-4be1-8e38-f234e25a05c5")] 44 public System.Uri Homepage { get; set; } 45 46 /// <summary> 47 /// Account balance 48 /// </summary> 49 [Field("Account balance", Type = "Currency", ID = "f8a1efb7-3bac-444a-a122-6245754b47da")] 50 public double? AccountBalance { get; set; } 51 52 /// <summary> 53 /// Short biography 54 /// </summary> 55 [Field("Short Bio", Type = "Note", ID = "0460ce4a-1282-4ba7-8235-30cf74cb80ab")] 56 public string ShortBio { get; set; } 57 58 /// <summary> 59 /// Membership Type 60 /// </summary> 61 [Field("Membership Type", Type = "Choice", ID = "f51ebc87-6402-4bb8-a70e-f11ee5428b43")] 62 public MembershipType? MembershipType { get; set; } 63 64 /// <summary> 65 /// Activities 66 /// </summary> 67 [Field("Activities", Type = "MultiChoice", ID = "c311147f-efec-4938-af6b-374b23706bf9")] 68 public Activities? Activities { get; set; } 69 70 /// <summary> 71 /// Favorite food 72 /// </summary> 73 [Field("Favorite food", Type = "Choice", ID = "bdf129e3-b899-4aa0-badb-6529a630a01e", OtherChoice = "FavoriteFoodOtherValue")] 74 public FavoriteFood? FavoriteFood { get; set; } 75 76 /// <summary> 77 /// Favorite food helper for value FavoriteFood.Other 78 /// </summary> 79 public string FavoriteFoodOtherValue { get; set; } 80 81 /// <summary> 82 /// DoubleAge 83 /// </summary> 84 [Field("DoubleAge", Type = "Number", ID = "0acee3ef-a076-44ad-9818-531d6e6b626e", ReadOnly = true, Calculated = true)] 85 public double? DoubleAge { get; set; } 86 87 /// <summary> 88 /// Full name 89 /// </summary> 90 [Field("Full name", Type = "Text", ID = "1f062f0a-9783-4638-ba2b-2400e8a04602", ReadOnly = true, Calculated = true)] 91 public string FullName { get; set; } 92 93 /// <summary> 94 /// Test 95 /// </summary> 96 [Field("Test", Type = "MultiChoice", ID = "a65b9acc-2513-4f0c-8198-adf78658a13c", OtherChoice = "TestOtherValue")] 97 public Test? Test { get; set; } 98 99 /// <summary> 100 /// Test helper for value Test.Other 101 /// </summary> 102 public string TestOtherValue { get; set; } 103 } 104 105 enum MembershipType { Platinum, Gold, Silver, Bronze } 106 107 [Flags] enum Activities { Quiz = 1, Adventure = 2, Culture = 4 } 108 109 enum FavoriteFood { Pizza, Lasagna, Hamburger, Other } 110 111 [Flags] enum Test { A = 1, B = 2, C = 4, Other = 8 } This allows writing strongly-typed queries and contains all of the information required at runtime to translate the query expression into the corresponding CAML query. Notice that choices with custom values are supported (line 73, 74) and that non-required values are indicated as nullables (? syntax in C#). Also calculated columns and read-only ones are indicated in the Field attributes, as in lines 84 and 90. Also, multi-choice fields are translated into "Flags" enums. Another reason to keep an eye on my blog ... you'll be the first to know when the first alpha is available!: .
http://community.bartdesmet.net/blogs/bart/archive/2007/04.aspx
CC-MAIN-2016-22
refinedweb
1,413
52.19
Add a null logger implementation -------------------------------- Key: LOG4NET-326 URL: Project: Log4net Issue Type: Improvement Components: Core Reporter: Carl Raymond Priority: Minor Please consider adding a null logger implementation to log4net. This would be an implementation of ILog where all logging method do nothing and all IsXxxEnabled methods return false. This supports Dependency Injection and unit testing patterns. By providing a do-nothing implementation of ILog, it is easier to move creation of a real logger via LogManager.GetLogger(...) outside of the logging class, and into the DI container configuration. Because this class is inherently thread-safe, a singleton is appropriate. Note that this class would never be returned by LogManager.GetLogger(). It exists to serve as a default value for a read/write property of type ILog. Use case: A client project with class Thing that (optionally) logs has a property of type ILog, where the default value of the property is the null logger. The property can be set to another logger by the DI container in production, or set to a mock ILog by a testing framework. Code: public class Thing { private ILog _myLogger = log4net.NullLogger.Instance; public ILog MyLogger { get { return _messageLogger; } set { _messageLogger = value; } } public SomeMethod() { // do some work... MyLogger.Info("message"); } } The advantage of using a null logger as the property's default value is that the logging class does not need to wrap all calls to the logger with null checks. In a unit testing situation, it is not necessary to activate log4net at all. When the test at hand tests logging behavior, the test code would set the property to a mock ILog implementation, which would then verify that the appropriate method was called. Other tests not involving logging do not need to set a value on the property. -- This message is automatically generated by JIRA. If you think it was sent incorrectly, please contact your JIRA administrators: For more information on JIRA, see:
http://mail-archives.apache.org/mod_mbox/logging-log4net-dev/201203.mbox/%3C1283864290.26590.1331935359809.JavaMail.tomcat@hel.zones.apache.org%3E
CC-MAIN-2020-24
refinedweb
321
54.02
You can subscribe to this list here. Showing 1 results of 1 On 30 Aug 2002, Ian Bicking wrote: > Really, there should be a way to render the items in a radio field > individually, instead of having to display the whole set at once. The > only fields I can think of that need this are RadioField and > MultiCheckboxField, both of which also don't need to be wrapped in > anything (unlike a select box that needs <select></select> around the > options). > > I'm not exactly sure what that accessor should look like. I'd vote for something like: ## the whole HTML $form.myRadioField.selections.mySelectionName ## empty string / false / None or "checked" or "selected" $form.myRadioField.selections.mySelectionName.selected Of course, it would be nicer if "selections" was a shorter word. Maybe "options" or "items" or somesuch. But you get the idea... I don't think it's a good idea to just put the named options / selections into the namespace of the aggregate field itself, since your selection names will probably clash with some of the defined attributes and methods of the aggregate field. Like "name", for instance :) On a related note, it's not obvious how to add arbitrary attributes to the HTML for a field. For instance, I want to add a CSS "class" attribute to some of my inputs. Right now, I'm coding the inputs by hand, but I'd prefer to use FFK and give it a class option. Am I missing anything, or does that just not exist yet? Thanks! - t.
http://sourceforge.net/p/webware/mailman/webware-discuss/?viewmonth=200208&viewday=31
CC-MAIN-2014-52
refinedweb
257
62.48
A package used to spawn the Dart Developer Service (DDS), which is used to communicate with a Dart VM Service instance and provide extended functionality to the core VM Service Protocol. Existing VM Service clients can issue both HTTP, websocket, and SSE requests to a running DDS instance as if it were an instance of the VM Service itself. If a request corresponds to an RPC defined in the VM Service Protocol, DDS will forward the request and return the response from the VM Service. Requests corresponding to an RPC defined in the DDS Protocol will be handled directly by the DDS instance. For certain web clients it may be preferrable or required to communicate with DDS using server-sent events (SSE). DDS has a SSE handler listening for requests on /$debugHandler. import 'package:sse/sse.dart'; import 'package:vm_service/vm_service.dart'; void main() { // Establish connection with DDS using SSE. final ddsChannel = SseClient('${ddsUri}\$debugHandler'); // Wait for ddsChannel to be established await ddsChannel.onOpen.first; // Initialize VmService using the sink and stream from ddsChannel. final vmService = VmService( ddsChannel.stream, (e) => ddsChannel.sink.add(e), ); // You're ready to query DDS and the VM service! print(await vmService.getVersion()); }
https://dart.googlesource.com/sdk.git/+/e698500693603374ecc409e158f36c25bff45b12/pkg/dds/
CC-MAIN-2022-33
refinedweb
198
57.47
Conservapedia talk:What is going on at CP?/Archive75 Discussion for organising a new Biggest Idiot at CP award is going on HERE. Feel free to add your opinion regarding the discussion. [edit] A new Andy classic We were overdue. Seems Evolution ain't just a meme, it's an actual pathogen. Well done, Assfly, you've outdone yourself. --JeevesMkII 08:17, 17 September 2008 (EDT) - Points 2 and 3 are classics of their time. Andy's still grumpy about getting pwned at WP and that other place whose name escapes me. --PsyGremlinWhut? 08:23, 17 September 2008 (EDT) - I think he's actually sort of talking about us behind our backs. Armondikov 08:27, 17 September 2008 (EDT) - "See also - Stockholm Syndrome". Genius.--seventhrib 08:34, 17 September 2008 (EDT) - And as always, there is a certain logic behind Andy's wild rambles - it's in support of Ken this time: "The locking (of the Evolution article) is due to the prevalence of evolution syndrome. If someone can propose a solution, I welcome it." Andy doesn't have to manage when he can concoct bullshit weasel words and phrases. - He's becoming a parodist of himself. His reply here is a classic: "There are are different beliefs about evolution, but the person who has evolution syndrome insists that his belief is true to the exclusion of other beliefs. Most normal people do not take that attitude." Substitute "creationist" for evolution, and a truer picture emerges. --PsyGremlinWhut? 09:25, 17 September 2008 (EDT) - Well, I kinda already did substitute creationism for evolution :S.Armondikov 09:49, 17 September 2008 (EDT) - "There are are different beliefs about evolution, but the person who has evolution syndrome insists that his belief is true to the exclusion of other beliefs. Most normal people do not take that attitude." Notice how he takes a thoroughly reletavist attitude. If you believe P then you believe P to be true, that's what believing is. If you believe P is true then you exclude the possibility that not-P is true - you cannot believe P and not-P, that's what logic is. So how do you allow (or not exclude from) Person S's belief, not-P, to be true? Only if not-P is true-for-him and P is true-for-you.--Toffeeman 11:17, 17 September 2008 (EDT) - I like how in the middle of getting pwned, teh assfly runs off, writes some article about a made-up topic, and refers to it as if his interlocutors would gain something by reading more of his drivel. That article is essentially an ad hominem attack on a handful of people trying to comment at talk:PNAS response. At least PJR "tries", by referring people to articles that already exist, crappy as they may be. ħuman 14:11, 17 September 2008 (EDT) - I'm sure Andy's becoming more unhinged. It seems his m.o. now, as Human said, is start an argument, change the rules every 30 seconds and if that still doesn't work,make up some all-embracing bullshit phrase that he then keeps referring to ad infinitum. I wish he'd realise that he doesn't win arguments through rational debate, he wins because those that haven't been reverted and blocked eventually shrug their shoulders, think "what a mad wanker" and wander off. Can you imagine having him as your defence lawyer? --PsyGremlinWhut? 14:47, 17 September 2008 (EDT) - Psy, that is quite possibly the most terrifying thought I've ever had.... And what you and Human point out is exactly why the Assfly won't debate people in real life (although I'd still trying really hard to get him to do it). If he were in a hostile situation, where he didn't have the banhammer and power of instant reversion to take out the strong points against him, he'd be exposed as the pathetic, washed up loser he is. SirChuckBA product of Affirmative Action 14:58, 17 September 2008 (EDT) - Not even a hostile environment, but a level one. Hence the demand of a security deposit. (adding more) One of my favorite things about Andy is that he coins a ridiculous phrase and starts throwing it around like it's common knowledge or an accepted medical term. CorryMom signed me up for the army, just because the fat man dared her to. 17:27, 17 September 2008 (EDT) [edit] Crease a Deist I've been informed by certain sources about this appalling website, and aside from the general anti-CP claptrap you have on here, I demand that you cease and desist mentioning anything about me. Your allegations that I am a parodist have undoubtedly contributed to my brief ban on Conservapedia, but fortunately the sysops there have something you lack - a brain - and were able to see through your deception. --DRamon 10:57, 17 September 2008 (EDT) - Aw... look at the ickle CPer. Ain't he cute? Just a brief correction, we are not anti-CP, without you guys, what would we do for humour? And unlike CP, we have a small difference... we arn't going to ban you for posting here. Have a nice day. ĵ₳¥ášÇ♠ʘ do do da de do da de - Also, being accused of being a parodist is a good thing. The alternative is being accused of being a raving wingnut fanatic. But if you want to insist that you're actually a raving wingnut fanatic, we will comply. Bjones 11:04, 17 September 2008 (EDT) - (ec) Wow - some big words there - who wrote it for you? Oh and I think the legal minds on here might have a word in your ear about flinging around terms like "cease and desist". It's called freedom of speech, fuckhead, something we have here, unlike over at Club Andy. Oh, and we didn't really contribute to your blocking - a combination of your inane edits, Poe's Law and their paranoia did it. --PsyGremlinWhut? 11:09, 17 September 2008 (EDT) - A fake I think. A good one, but still fake. Bondurant 11:13, 17 September 2008 (EDT) - Implying that we're getting messages from a parodist of a parodist? The internet is about to implode! Armondikov 11:22, 17 September 2008 (EDT) DRamon, please read the entirety of this page. What sysops have, and what we lack, we gain in rationality wherein they don't. Have a nice day. NorsemanWassail! 11:15, 17 September 2008 (EDT) - Mr DRamon, would you care to explain this 'correction' of yours to another editor's user page? weaseLOId ~ 11:19, 17 September 2008 (EDT) Looking at Mr Ramon on CP, it looks as if he is a spoof of Bugler (who is a spoof of Aschlafly, who is a spoof of Pschlafly). Bondurant 11:22, 17 September 2008 (EDT) - His level of sycophancy is far too implausible for a genuine new user. Most likely a parodist, but there is a possibility he could be the sock of an established CP user (Bugler? Jinx?). It would explain the toadying & also the fact his block was so swiftly lifted. weaseLOId ~ 11:27, 17 September 2008 (EDT) - Oooh, conspiracy. Armondikov 11:43, 17 September 2008 (EDT) - Mr DRamon, if you care for CP, you should at least correct your entry: A Cauchy sequence is an infinite series of numbers that approach some other number. These sequences are often used in real analysis. For example, the sequence 1/2, 1/4/, 1/8/, 1/16, 1/32... is a Cauchy sequence that approaches 0.It hurts my eyes --LArron 11:45, 17 September 2008 (EDT) - Fake or not, his addition to the Evolution syndrome registers high on the irony meter. weaseLOId ~ 19:33, 17 September 2008 (EDT) This hurts the brain ... but, I guess, keep up the good work, DRamon, whoever you are! Learn from Bugler, he is the master. Etc 20:18, 17 September 2008 (EDT) - Argh! Poe! Poe! Poe! Would even the worst parodist want to make themselves look this stupid? --PsyGremlinWhut? 09:34, 18 September 2008 (EDT) [edit] Finally, a verifiable claim Andy steps over the line here. Surely we can comb the archives to prove him wrong...--Antifly 11:11, 17 September 2008 (EDT) - I had a brief look when Andy gave me an almost identical reply here. I'm sure there is something there, but I'm done arguing with him. It makes me feel dirty and it distracts from the lulz because I get pissed off. If someone else wants to do it I'll give them a goat. Bjones 11:25, 17 September 2008 (EDT) - I tried but just opening the PNAS website page hurts my feeble mind. Then again, Andy doesn't allow meaningful criticisms on that very talk page, so... NorsemanWassail! 11:28, 17 September 2008 (EDT) gotta find an industrial irony meter I went to the archives. Second issue I clicked on had this. Critical of “single origin” model of human evolution (EDIT:Or something, I skimmed). Should be about 50 more of them in there. I have to go back to work. Bjones 11:38, 17 September 2008 (EDT) - That would be good, but it's far too long and complex for Andrew "Concise" Schlafly. Armondikov 11:41, 17 September 2008 (EDT) - God knows he won't read any of them. If I had time I would just collects about 10 examples, post the links on the talk page with a smarmy tone, and make him squirm. I know he's never going to back down from his position. The point is to take advantage of that and embarrass him publicly. Bjones 11:45, 17 September 2008 (EDT) - Squirm? You mean insta-rollback, surely. Armondikov 11:48, 17 September 2008 (EDT) - I dunno. I (as KimEide) basically told him he didn't know shit and he left it on the talk page. Who knows. Bjones 11:52, 17 September 2008 (EDT) - Oh, you're Kim. Nice work. Armondikov 12:08, 17 September 2008 (EDT) He'll move the goalposts by claiming that PNAS never publishes rebuttals critical of Evolution. On a related note, I did a survey of the time between submission and acceptance dates that covered about a year's worth of Inaugural Articles in PNAS. The Blount article had a turnaround time of 14 days, which was within a standard deviation of the average. In think about 3-5 papers had the some turnaround time as Blount's (about 10% of the total papers). The histogram was pretty interesting and showed that the review time of the paper was not extraordinary. I'll have to dig that out next weekend.--Neon 12:08, 17 September 2008 (EDT) - Alright I did the work, except I'm blocked. This is just for 2008: This is why I have a "No Arguing with The Assfly" policy. He's just too stupid. It isn't any fun. It only pisses me off. He says "MikeR, PNAS never publishes a letter containing a meaningful criticism of a pro-evolution article...." You show him an article that makes a meaningful criticism. His response? "No, it doesn't." How can you argue with that? I give up again. Bjones 15:20, 17 September 2008 (EDT) - Andy decides who is a real conservative. Andy decides what defines a liberal. Andy decides which comments are substantial. Andy decides what is meaningful criticism. Sense a pattern? No, you don't, bitch. Andy decides what you sense. >=( --Sid 17:14, 17 September 2008 (EDT) [edit] Heh Toffeeman reverts Liberalist's edit giving Andy the monkey barnstar. (In fairness, he reverted the "Get Stuffed!" edit shortly thereafter. I just found it a funny diff.) --Marty 13:08, 17 September 2008 (EDT) [edit] Under Aschlafly's pleasure Horace, given that you were there for awhile, what does it feel like to be "under Aschlafly's pleasure" and do you want to remain? For that matter, what does Kookie know about being in such a position? --Shagie 15:24, 17 September 2008 (EDT) - I am also banned except under assfly's pleasure, and i can definitively say that i will NEVER be under his pleasure. Ever. No matter how many time he asks.-- -PalMD --Trust me; I'm a doctor 18:37, 17 September 2008 (EDT) - What if he wore a goat suit and very little else? 18:41, 17 September 2008 (EDT) [edit] History Homework 2 BethanyS's check out answer 4. Particularly the third sentence.--Toffeeman 15:34, 17 September 2008 (EDT) - Makes perfect sense to me. God guided Columbus to the New World so that good Christians could colonize and kill the heathens, so it only makes sense that Satan would try to throw a monkey wrench in the works.--WJThomas 16:46, 17 September 2008 (EDT) - What's the status on those... have they all been turned in and graded? I'm still refraining from looking at them until I start the grading process.... By the way, any other educators doing this or is it just me? SirChuckBA product of Affirmative Action 16:55, 17 September 2008 (EDT) - This endlessly makes me laugh. My honors kids wrote 2-4 paragraphs per question on a "homework", and a page, sometimes two, on a full out "test". The AP exam expects **well written essays** for each question, not a quick, vapid answer.-- En attendant Godot"Such is life." 17:01, 17 September 2008 (EDT) - I'm trying to avoid looking at the questions/answers as if a real person as asking/answering them. If I pretend they're merely characters in a complicated new form of literature, I can laugh at it. When I think that these are real kids, some of whom will be taking the AP test, it's a bit depressing. I remember my AP history class most out of all the classes I took in high school. The teacher was amazing, the class kicked my ass, and both fundamentally changed the way I wrote essays/papers. The bullshit that passes in too many English classes didn't fly when writing a history essay (especially DBQs). These kids aren't getting any of this - some of them barely seem literate, much less capable of concise, well thought out, critical essays. The disservice Andy is doing to these kids is nigh criminal. --Arcan ¡ollǝɥ 17:13, 17 September 2008 (EDT) - Woah, someone is doing weirdo stylesheet-breaky things. TMT, have you been at the peach schnapps again? Anyway, the status is that all the homework ones are in and graded, we've moved on to homework two which, if possible, is even more inane. Question: Do the inestimable Miss Bethany's parents know what Assfly is teaching these kids? Why on earth to they keep committing her back to this maniac? Raving fundies or not, bad teaching is bad teaching and anyone of voting age ought to be able to recognise it. --JeevesMkII 17:08, 17 September 2008 (EDT) - Yes, there are obvious signs that Trent is working on the slider system for the Conservapedia Day Awards voting. ħuman 17:15, 17 September 2008 (EDT) - I was beginning to wonder if I'd already started my drinking binge for the night -- without my noticing I'd started. Given my day, it's a distinct possibility!-- En attendant Godot"Such is life." 17:18, 17 September 2008 (EDT) - To be fair, I don't think most of these kids are preparing for an imminent AP exam. Only seniors take those, right (or perhaps a very gifted younger student?)? Based on the little I know of Andy's classes from what I've picked up and from his "CP on the Hour" Youtube video, his classes have students of a variety of ages, most younger than high school seniors. In that video, the girl who is actually seen speaking is SharonS (according to Kettleticket). She's probably 15 there? Bethany is her younger sister. These aren't high school honors seniors. Yes, his questions are mostly astoundingly inane, and the answers are generally no better, but we shouldn't be holding most of these kids to AP standards, with perhaps a few exceptions, though we can't say who those exceptions are without more information. DickTurpis 17:23, 17 September 2008 (EDT) - Most of my AP history and AP chem classes were 11th graders, actually, but maybe that's not typical. I could have sworn Andy had an article on preparing for the AP exams, but maybe I'm misremembering or perhaps it wasn't connected to the current class. I'd still say the answers are ridiculous and almost painful to read, and I'll still dissociate them with any real people as much as possible, but you're right that we shouldn't hold them to an AP standard if they aren't intended to be in an AP class. - Well, I'm not sure who takes AP classes normally (I never took any; I was a bit lazy in high school, if you can believe it) but I think I've known them to be taken by seniors generally. They're supposed to be college level, right? If you're taking them in 11th grade what are you taking in 12th? But no matter. The point is they are for the most advanced upperclassmen, which I do not think Andy's students have illusions of being as a whole. I think Andy likes to bill his classes as getting students on the road to the APs, and, being completely delusional as he is, he probably thinks taking his class is a good preparation, but I don't think it's billed as an AP class for P students. I'm sure he thinks they're better than AP classes in that they are devoid of liberal deceit, but he's not teaching for those tests, as far as I know. I tried watching his youtube video to get an idea of the ages of his students, assuming they're about the same now as they were then, but I'm too removed from that age group to classify them as anything more specific than "young 'uns". I suggest asking Na-Thang for more specifics; didn't he say was enrolling in this? DickTurpis 18:07, 17 September 2008 (EDT) - I guess it's urban (wiki) legend, but yeah, I too thought he (Andy) has stated that the class is prep for AP level exams. - Anyhow, when looking at his topics for education, one topic is "Animals". not "biology" or "biological taxonomy" but "types of animals. Some days I wonder what he thinks he is preparing kids for. he has a college education (or so he claims) so he must, somewhere, realize he is destroying his kid's chances at something great in life like a chance at college.-- En attendant Godot"Such is life." 18:21, 17 September 2008 (EDT) - We actually should go through his statements on his classes and see how he presents them. As far as I recall, he never billed them as AP classes. He may have presented them as alternatives to AP classes, in that they are free of liberal bias, but I am not aware that he specifically bills them as their equivalent. Of course, knowing Andy, he would deny that AP classes are in any way better, because in Andyland, no one can do anything better than Andy can. He could watch Apollo 13 once and be convinced he'd be a better astronaut than anyone at NASA. But, anyway, I'll take a look at how they are officially presented to parents and see what claims he makes. I could be wrong, he may say they are college level. I'll see what I can find. DickTurpis 18:28, 17 September 2008 (EDT) - Okay, doing a whopping 2 minutes of research I did find this statement in his American Government class: "Students seeking to earn college credit can take the CLEP or AP exams upon successful completion of this course." That isn't exactly saying it's an AP course, but it does imply that students could emerge from the class prepared for the AP exam in US Government and politics. Again, I think he has students of a variety of ages, and some of them do the "honors" work, so presumably only they would consider the AP exam. So it is at least inaccurate to say all of his students should be doing AP level work, though it is quite clear Andy is not asking AP level questions. And, to be excessively literal, he does say they "can" take the exam. And, well, anyone can, can they not? DickTurpis 18:39, 17 September 2008 (EDT) - I think that some of the confusion is that Andy teaches/has taught several "courses". This one looks like routine high school US History - and it's the first time he's really doing this one on CP - still working on his "lectures", most of the homework isn't written yet, etc. The Govt class may have been a bit more "advanced". He also has that list of all the fine first-choice colleges his students have been accepted at on his user page. He's been doing this for what, six years now? (You know what's funny is the "unimproved" versions of his "lectures" are still as they were years ago on the Eagle Forum U. website) ħuman 19:16, 17 September 2008 (EDT) - Considering I aced his Government exam without having taken an actual course on US Government, I don't think it was of AP level. But, without having seen his cirriculum, I can't say for sure. His test was certainly not at the AP level. DickTurpis 20:07,) A couple of points: - Anyone can indeed take an AP exam. However, as of a few years ago, in order for a course to be billed as "AP", the syllabus for the course must be approved by the College Board. I think they had a problem with people teaching classes they claimed were AP, but which did not adequately prepare students for the test, so they decided to impose some quality control. (See [2] for details and an informative link.) - Typically in high school advanced students may take an AP class Junior year to get a taste of them, then take two or three senior year. Super-advanced students may begin in Sophomore year, but this is not all that common. Homeschoolers who do AP may start a bit earlier; they need the outside validation of their work, and they have more time to focus on a particular topic. On subjects like Math, the students must have the background to take Calculus, so that limits somewhat when they can start. For subjects like US History, it is easier to start younger. (I'm generalizing here, based on my observation of my (bright, academic-type) kids and their friends and cousins, one of whom did five or six AP classes before graduation, another of whom did three, another probably 4 (including one in the summer), another who started at about age 13, etc.) - On [3], AS states "We need a basic college-level textbook, or advanced high-school textbook, in United States history that is free from liberal bias and adequate to prepare students for AP, CLEP, or SAT II exams." See also [4] for more from AS on these exams. No mention of DBQs. It astounds me that anyone could consider the same course to prepare for CLEP, SATII, and AP - they are all quite different. I'm surprised he didn't throw in IB. - $250 each times 40ish = over $10,000+. I'm just sayin'. --Too tired to log in 19:26, 17 September 2008 (EDT) - Interesting, this. As I recall, my school offered very few AP courses, I think. Then again, I was never good at science, so I was never in contention to take any (my sister, I believe, had to commute to the neighboring high school to take AP biology her senior year), after completing trig my sophomore year I never took math again until college, so I wasn't about to take any AP math, and I think our history/government regimen was mostly dictated to us, so basically I had little opportunity for AP. I was hardly an overachiever anyway. I think (other than maybe American History) at my school you basically couldn't take AP until you had completed more basic courses (no AP bio until you had taken regular bio, and generally you'd take chemistry and physics first as well; no AP English until you had finished the 9th, 10th, and 11th grade courses), so you usually had to be a senior to take the few classes offered (if they offered AP music theory at my school I'll eat my hat). I took it easy my senior year (and consequently got straight A's for the first time since elementary school, unless you count gym). So I'm no expert in AP. It's pretty clear Andy isn't either. DickTurpis 20:04, 17 September 2008 (EDT) [edit] Sample questions from a real online site Just for comparison's sake, these come from here. "Students should be able to write a thoughtful paragraph or 2 on each of these" (note: the author lists 20 some essays questions. I just took the first five) - Even though the Albany Plan of Union was not successful, why was it an important precedent? - For what three reasons did Native Americans side with France during the French and Indian War? - In what three ways did the Seven Years’ War directly affect the colonists’ growing discontent toward the British? - How did the Sugar Act differ from the preceding Navigation Acts? - How did colonial protest evolve? What steps were initially ineffective and what later steps proved successful?-- En attendant Godot"Such is life." 17:06, 17 September 2008 (EDT) - Is the answer to #2 "Liberté, égalité and fraternité"? :D --JeevesMkII 17:52, 17 September 2008 (EDT) - I thought "wine, cheese, and chonklit" myself. I do admit, i don't think I could pass the AP exam if it were on my desk tomorrow. shameful, huh? -- En attendant Godot"Such is life." 18:01,) [edit] US High School for Jeeves - Someone help me out here. I'm totally bemused by how High School in the US works and wikipedia is no help. My understanding is something vaguely like this: - Everyone takes some basic SAT test that only covers English and Maths and consists largely of multiple choice questions (WTF?) - There may also be a state sanctioned high school graduation exam to receive a high school diploma. - There are also about have a dozen SAT subject specific exams in a narrow range of subjects. Not all students will take these. - Smart students will take some other and different subject specific exams too, AP, CLEP, whatever. These too consist of more multiple choice questions (WTF? x 10^25) These AP sample questions look no harder than the history GCSE I took way back when, but am I given to understand these are for 17 to 18 year olds? It's a complete mystery to me. --JeevesMkII 19:38, 17 September 2008 (EDT) I'll try to give you an overview... the "basic" system is the 1st to 12th grade structure, running from about 6/7 to 18/19 years old. Many places have pre-school and kindergarten type programs, some paid for publicly as part of the system, many not. The younger years are usually split around 5th or 6th grade, so you have an elementary school and a middle or junior high school. The high school then runs 9th - 12th grade (freshman, sophomore, junior and senior years). While education is "mandatory" in most places, students can usually "drop out" with varying criteria of age, grade completed, and parental permission. The only "result" of finishing the program is a high school diploma, with various states having different requirements for what courses must be taken. For example (racks brain), at my school, one year of math was required (or both years of two year algebra or the general math courses), one year of science (I think), four years of English, one year of US History (usually taught in 11th grade), and maybe one or two other things. A "drop out" can attain the equivalent of the diploma by passing the "GED" test if they later desire. Some students have to use an extra semester or two to finish up the required credits for their diploma if they smoke too much pot. Most students take standardized tests along the way that don't affect their grades (but influence class tracking), partly to evaluate the school systems themselves. College-bound students take one of a few independently-administered tests in their Junior and Senior years. For instance, juniors can take the "PSAT" (preliminary SAT) to get used to the test, and to qualify for being a "Merit Scholar" by doing well on the PSAT and the SAT. Senior year, people take things like the SAT or the ACT (I think it's called that) to help colleges decide if they want them or not. These are falling out of favor a bit since there is little correlation with college performance. In addition, students can take these "AP" tests of which we speak, which, if they go to a college that accepts the results, will get them college credit (or sometimes let them simply skip an introductory course). AP = "Advanced Placement". At the college I went to, they ran a calculus placement test on campus to see who could skip/get credit for Calc I and Calc II, and probably had some other programs like that in other subjects (that was also a long time ago). So there is it in a nutshell - K/1 - 12, only possibly ended by "dropping out", with much tracking and difference in coursework as the years go by. All the college-entrancey type tests are administered separately from running the schools, and colleges make up their own entrance criteria. ħuman 19:58, 17 September 2008 (EDT) - PS, the SAT used to be two large sections, Engs and Maths, all multiple guess. They have now added a third section which requires "writing". ħuman 19:59, 17 September 2008 (EDT) - Wha? So, all university entrants are judged on just the basic SAT (which seems to have no relevance to tertiary education performance) + whatever entrance exams universities cook up? I think I'm even more confused than ever now. Where do subject specific exams come in to this? Are non-university goers ever examined on anything other than English and maths? Is this system really as insane as the picture I have in my head? --JeevesMkII 21:12, 17 September 2008 (EDT) - Many colleges also require tests that specialize in certain areas. Once called the SAT II's, they're now called SAT subject tests. They cover things like bio, physics, chem, math, u.s. history, etc. At least in Pennsylvania, we have to take other standardized tests every year in school. PSSA's are in 5th, 8th, and 11th grade. All the other grades take the Stanford Aptitutde Test (IIRC), but that's not the SAT (which is Scholastic Aptitude test, IIRC). The PSSA's and the "not those SAT's" generally cover just about everything, including math, english, science, and social studies. ThunderkatzHo! 21:19, 17 September 2008 (EDT) - Right, the PSSAs and stuff. Which, oddly enough, don't affect one's grades or future (except for "tracking" kids into appropriate levels of classes in later years). ħuman 21:35, 17 September 2008 (EDT) - Hahaha. I think I should just give up trying to understand. It seems like a confusing morass of acronyms some of which are the same but refer to different exams. --JeevesMkII 21:39, 17 September 2008 (EDT) - Sorry for the alphabet soup, that does make it harder to follow. But the test acronyms ought to be on wikipedia. The main thing to keep in mind is that there's "school", with classes and tests and papers and grades and stuff, that gets one to a diploma, normally in twelve years. Then there are the mandatory standardized tests, administered statewide, that help sort out the students a bit and also track the school's quality (allegedly). Then, there is all the college-related crap, which is all optional, and in some cases not even looked at by colleges. The college-related tests are standard nationwide, and administered by a private company (ETS). ħuman 21:51, 17 September 2008 (EDT) My two cents: - Everyone takes some basic SAT test that only covers English and Maths and consists largely of multiple choice questions (WTF?) The SAT is only for the college-bound. The original idea was that it was an aptitude test, not a test of knowledge or skill. Basically, roughly, how smart are you; are you smart enough for our college. Colleges needed a way to tell whether a kid with all As from high school #1 was anything like a kid with all As from high school #2. SATs are given by an independent corporation. While they are typically given AT a local school, they are not run by the school at all. The ACT is pretty much the same thing, from a competing company, except that it is more about knowledge than aptitude. Most colleges require one of these tests as part of the college application process; some are moving away from that, especially in less academic fields. - There may also be a state sanctioned high school graduation exam to receive a high school diploma. There are two versions of this. 1) More and more states are requiring "exit exams". You don't just have to take and pass 3 years of math (or whatever), you also have to pass a math exam in order to graduate. The problem, of course, is when you've got kids who *have* passed their classes but can't pass the exam. Also, it's pretty clear some kids are *never* going to pass exams in certain subjects, so they tend to drop out earlier - why bother sticking around? Unlike European systems, you generally have to pass ALL of the subjects. 2) There is also the GED exam. If you do drop out, but later decide that you want a diploma, you can study for and take the GED. It is theoretically the equivalent of a high school diploma, but tends to be looked down upon as compared to a "real" diploma. Note that you can't decide to take this at, say, 15, instead of finishing out the last few years of high school, even if you are well-qualified to pass it, as it would be way too tempting to way too many students who find high school to be a waste of time, so the rule in most cases is that you can't take the GED until after your age-peers have graduated. - There are also about have a dozen SAT subject specific exams in a narrow range of subjects. Not all students will take these. These are again part of the college admissions process. Typically, you'd have to take an English, a Science or Math, and one other exam. Again, the idea is to give the colleges something standardized to compare applicants. As we all know, one school's US History class may be substantially different than another's. These often come into play for students heading into the sciences (have they had a basic high school science education?), etc., and which ones are required often depend on the applicant's major. These do measure knowledge rather than aptitude, and they are designed to test knowledge at a typical high school level. A good time to take these is at the end of the year, just after you've finished the corresponding course (e.g. take Physics when you've just finished taking your high school Physics course, etc.) At this point in the process, most students don't know what colleges they're applying to, so they don't really know which ones will be required, but if they wait, they will run out of opportunities to test, as the tests are only offered at certain times. Note that these tests are an excellent way for a homeschooler to show that their high school work is up to snuff in comparison to other high school students. In many cases, colleges will accept AP scores in lieu of the corresponding SAT subject test. As the AP is at a college level, and the SAT subject test is at the high school level, someone who does well on the AP clearly would have done well on the SAT subject test. - Smart students will take some other and different subject specific exams too, AP, CLEP, whatever. These too consist of more multiple choice questions (WTF? x 10^25) Let's take these one at a time. CLEP tests are designed for adults who return to college after some time in the workforce or real world. The idea is that they've picked up some knowledge through work or self-study, and ought to be able to skip some college classes if they already know the material. Thus CLEP tests can be taken for college credit. However, CLEP tests are typically accepted for credit only at the lower rungs of the University ladder. More selective universities don't accept CLEP tests for credit. These tests are fairly obscure - college-bound high schoolers typically do not ever take them. Homeschoolers might choose to take them, again to show that their work at home is up to standard - I'm not sure why they'd choose these over AP. My impression is that CLEP tests are not as challenging as AP tests, even though CLEP is supposed to give college credit. CLEP seems to be less likely to result in college credit or advancement at selective colleges. - AP tests, on the other hand, are quite challenging. The idea is that an AP course in high school is equivalent to a college course. Many colleges will award credits for AP classes. The super-selective colleges may not award such credit, mainly because they expect their incoming students to have more-or-less all taken such classes as almost a prerequisite to admission. AP scores show that the student is capable of college-level work; good scores reflect well on the student. While there is some multiple choice (drawn from a very broad area of expected knowledge), there are also essay questions. The US History exam (and I think maybe some others) also have DBQs - Document-Based Questions, where the student must do some analysis of primary sources. Most AP US History courses I'm familiar with drill students by giving them DBQs frequently, so they know how to do them. - These AP sample questions look no harder than the history GCSE I took way back when, but am I given to understand these are for 17 to 18 year olds? It's a complete mystery to me. Yeah, Europeans have a system that, to me, makes a lot more sense. But we all have to be equal here in America. - So, to relate it back to the subject at hand, the idea that the same history course can prepare a student for the SAT subject exam (which is a high school level exam) OR the AP exam (which is a college level exam) raises some concerns. Of course, for $250 per student * 40+ students, there's a lot of incentive to create a course that is all things to all people. The problem, of course, is that for most of these tests, scores are permanent. If you score badly, it's on the paperwork that gets submitted to colleges, and you can't remove it. (Since the SAT and SAT subject tests all come from the same company, your score sheet includes all scores from any time you took one of the tests. (I'm not sure about the AP scores - they too are from the same company but it might be a different score report.) Which makes me worry about students who think they're going to be ready to take the AP when clearly they are not.--Too tired to log in 23:09, 17 September 2008 (EDT) Oh and then there's the State of New York, with the lovely and complicated Regent's Exams which don't affect your GPA at all but still make graduating High School in New York just that little bit harder. Although most NYS Universities factor your Regent's Status into deciding weather to take you or not. I got my High School Diploma "With Honors" with a GPA of %89 because my Regents Scores were all above 95%. --Wren 09:02, 20 September 2008 (EDT) [edit] Question. What's the deal with some people posting Conservapedia URLs with an extra period . between the ".com" and the slash? I mean like [5] (as opposed to [6]). It annoys me; does it serve any other purpose? --Marty 16:56, 17 September 2008 (EDT) - I know personally, I do it just to piss you off. I can speak for anyone else, though. Bjones 17:21, 17 September 2008 (EDT) - In the DNS/BIND world, a period at the end says "don't try any further resolutions." For example, in the resolv.conf file I have here I have hq.corp.com eng.corp.com corp.com lab.corp.com dmz.corp.com where 'corp' is company I work for. If I look up 'www' it will look up www,,,,,. If I look up 'www.' it will look up www and then stop. So really, a period at the end of "." won't make a difference unless the server can't find. --Shagie 17:23, 17 September 2008 (EDT) [edit] This belongs to Conservapedia Awards V.2 But I'm posting here instead. We need a new category: Best parodist edit by a non-parodist - or alternatively: The Poe's Law Award. Only articles and edits by established non-parodists, that is Aschlafly, Ed Poor, PJR, Conservative, Karajou, DeanS and a couple more accepted, no Bugler please. My nomination is Aschlafly with the WIGOed article Evolution syndrome. How could one not take it as parody?!? Editor at CPLiar at RP! 17:23, 17 September 2008 (EDT) - And obviously I'm too late on WIGO Talk, sorry. :P Editor at CPLiar at RP! 17:34, 17 September 2008 (EDT) [edit] Under attack! </melodrama> Items in WIGO are being voted down by some kind of bot. Even ones with very large scores have fallen to about zero . Can someone get the president Trent on the line? ^_^ Pink(Astronomy Domine) 20:04, 17 September 2008 (EDT) - Quick, everyone take their cyanide pills! Ace McWicked55.3 million page views! 20:13, 17 September 2008 (EDT) - Mine tastes like strawberries! --Kels 20:26, 17 September 2008 (EDT) - This is not how I envisioned our emergency response. Pink(Astronomy Domine) 20:31, 17 September 2008 (EDT) - oHHHHH, did you want something more like this: - Run away! Runaway! (monty python style).-- En attendant Godot"Such is life." 20:33, 17 September 2008 (EDT) Hanlon's razor. tmtoulouse annoy 20:35, 17 September 2008 (EDT) - Would I be right in thinking that translates as "I screwed up WIGO somehow but now I've fixed it"? Pink(Astronomy Domine) 20:42, 17 September 2008 (EDT) - Swallow this coconut. Pink(Astronomy Domine) 20:42, 17 September 2008 (EDT) - I hate you all. *sulks* - Here's what would happen if we were pirates: - CHAOS: There's a hole in the side of the ship. - RW MEMBER: I'm an astronaut! - CHAOS: The ship is sinking. - RW MEMBER: Don't touch my unicorn. - CHAOS: We're all going to die. - RW MEMBER: Look! I can surf down these stairs! Wheeeeeeeeeeeeee! - And to put the icing on the cake, you all edit conflicted me. Pink(Astronomy Domine) 20:39, 17 September 2008 (EDT) - Wait a second, my cyanide pill is just a Tic-Tac! Boy is my face red and my breath minty fresh. Ace McWicked55.3 million page views! 20:47, 17 September 2008 (EDT) - Shoulda tested them on Blondi first, yo! --JeevesMkII 20:50, 17 September 2008 (EDT) It was goats that done it. DogP 20:59, 17 September 2008 (EDT) So, I'm guessing there was no "actual immediate site problem to deal with"?--ζειαηđδηǐ (τ|ϛ) 21:00, 17 September 2008 (EDT) - There may well have been. This time you were lucky. Remember: constant vigilance! Pink(Astronomy Domine) 21:06, 17 September 2008 (EDT) - Nothing to see here but a few dead bodies, folks, move along, move along... ħuman 21:03, 17 September 2008 (EDT) - All quiet on the western front. tmtoulouse annoy 21:03, 17 September 2008 (EDT) - Now that that's all settled, who wants some nice refreshing Flavor-Aid? ThunderkatzHo! 21:07, 17 September 2008 (EDT) Something is goofed. When I vote on a WIGO item, the total changes from--say--6, to something like 0.75 (or .224 or whatever, but nothing over 1). If I refresh the page, everything is hunky-dorry, with my vote counted correctly.--WJThomas 21:53, 17 September 2008 (EDT) - Keep in mind that Trent is breaking the site so we can haz generic slider vote bars. See his comment way above... ħuman 22:33, 17 September 2008 (EDT) [edit] Attention all Conservapedia sysops It seems that this page is watched by sysops at Conservapedia, and since I cannot make edits on that site without an account, I need to tell you at Conservapedia that I have forgotten the password to my account on there, User:Heisoursavior. To negate the risk of someone compromising my account, would you please block that account indefinitely so I can fall with honor, rather than fall dishonorably at the hands of a vandal? Thank you. 75.169.203.208 23:16, 17 September 2008 (EDT) - I have a similar problem, gentlemen at CP. I humbly request that you block my account, "Karajou". I know it's a bizarre, childish and uninspiring name. I was six when I made it. Pink(Astronomy Domine) 23:19, 17 September 2008 (EDT) - I already blocked it, but some idiot unblocked it... Silly Mr. Cat 23:32, 17 September 2008 (EDT) - I know! What's wrong with them? Pink(Astronomy Domine) 23:46, 17 September 2008 (EDT) Please, do not do this. This is a serious request I have made with nowhere else to go. I am ashamed that I had to make this request at a site that pokes fun at where I edit, but this is all I could do. Thank you for your compliance. 75.169.203.208 - If you're serious, you should probably verify your account through email. It still works when you're blocked, and will be more compelling than an IP address on a hostile site making an unverifiable claim. Pink(Astronomy Domine) 23:24, 17 September 2008 (EDT) - No problem, I'll take care of it...PFoster 23:23, 17 September 2008 (EDT) - He's talking about CP. Pink(Astronomy Domine) 23:24, 17 September 2008 (EDT) Pardon me, but you do not seem like you are a sysop at Conservapedia. Like I said, I realize this site was made to smear conservatives (and this is why it pains me to even write on this site), but I really do not want to go to bed tonight knowing there is a risk of someone knowing my account password. 75.169.203.208 - E-mail someone on CP from inside your account. And you're a parodist, actually. Pink(Astronomy Domine) 23:29, 17 September 2008 (EDT) - And how would anyone know your password? Pink(Astronomy Domine) 23:30, 17 September 2008 (EDT) - That's kind of a strange request considering (to my knowledge) nobody's account has ever been hacked, and considering you only have 6 edits (1 mainspace), so you don't have much of a reputation to uphold. JazzMan 23:32, 17 September 2008 (EDT) I am insulted. I am not a parodist. And if you read mu comment, it says I have forgotten my password. There is no way I can get into my account and email someone. And anyway, how do I email someone? I do not see email addresses displayed on their pages. I do not know how someone would know my password but if Governor Palin's email account is able to be compromised, I suppose my account is at risk as well when I have no control over it. I do not want to argue about this with you, I have just asked someone from Conservapedia to intervene. Also, I would have made more edits but I forgot my password a while ago; ever since the news of Governor Palin's email account compromising I want to protect myself. 75.169.203.208 - Indeed, I bet those sneaky hackers are going straight from Palins email account to your CP account. My god man, will they stop at nothing?! Is nothing sacred anymore? Ace McWicked55.3 million page views! 23:41, 17 September 2008 (EDT) - I'll head over there and have a few guesses at your password and see if I can fix things for you. Can you tell me some your other passwords, some clues? DogP 23:38, 17 September 2008 (EDT) - I'm very sorry, 75. I'm a little tired and I somehow read your comment as saying you'd been blocked. My sincerest apologies. In that case, I suppose the only way to verify the account is to supply some internal information from your account -- like the real name field. - As far as email goes, you can always email CPWebmaster -- his address is in there somewhere. Pink(Astronomy Domine) 23:40, 17 September 2008 (EDT) I thank you very much, Mowse. I did find CPWebmaster's email. I appreciate the advice and thank you for helping me! 75.169.203.208 - Don't mention it ^_^ Pink(Astronomy Domine) 23:46, 17 September 2008 (EDT) [edit] Wait a Minute From higher up, "...SharonS (according to Kettleticket). She's probably 15 there? Bethany is her younger sister." So correct me if I'm wrong, but CP has a 13/14 year old wielding supreme executive power over there? I mean Bethany, of course, Andy's mental age is 5. --PsyGremlinWhut? 00:57, 18 September 2008 (EDT) - Seems like it. She is too young to feel empowered enough to exercise her bureaucrat powers but it means there are other bureaucrats other than Andy and CPwebmaster, so Andy doesn't look like he is running a dictatorship but he remains unchallenged. Quite clever by his standards. Mowse 01:21, 18 September 2008 (EDT) - That reminds me, did we ever learn something about the CP Panel other than it's made up of teenagers? NightFlarei haz a talk page. 01:44, 18 September 2008 (EDT) - I don't know if it really is related, but cPanel also seems to be the name of the company that hosts the CP server. See (which is the ip address of). Very curious, me thinks. Etc 07:13, 18 September 2008 (EDT) - Coinkidink? Or just another method that Andy has used to silence detractors (before discovering the ability to concoct bullshit weasel phrases). --PsyGremlinWhut? 13:34, 18 September 2008 (EDT)for - Actually, cPanel is just a website management tool that nearly every hosting company makes available to their clients. It provides an easy-to-understand interface for managing higher-up tasks, like e-mail accounts and page/file permissions and deletions. The other alternative is learning to use FTP programs and *nix commands, which is too much for most people to handle. Sandman 14:23, 18 September 2008 (EDT) - It was Andy's original home-schooling class that founded CP, most would be gone by now except the few that got exclusive power sysopship/bureaucratship. Even they have abandoned Andy's blog. Mowse 01:48, 18 September 2008 (EDT) - (Off Topic) I don't know if the archive was too server, but make it less severe next time. I don't know the guidelines, but at least half a day of messages should be kept. In addition, engineering-pi, your sig makes me confuse you with Jellyfish/Chaos!. Is this what you really want..? Editor at CPLiar at RP! 03:05, 18 September 2008 (EDT) - No wonder you are a Liar at RP. Please make substantive comments or they will be removed and you will be blocked 90/10, talk, talk ,talk. Godspeed. Mowse 03:15, 18 September 2008 (EDT) - 3.14, add something substansive or be elswhere. I detect Evolution Syndrome. We are not fooled here. Open your mind and reject Big Science. Gods peed. Ace McWicked55.3 million page views! 03:29, 18 September 2008 (EDT) - Reject Big Science? But that's my favourite Laurie Anderson album! 04:41, 18 September 2008 (EDT) Totnesmartin - Actually, despite their contributions to Eragon etc., I have always though that Sharon and Bethany have shown a maturity far greater than their older (male) sysop colleagues. ГенгисOur ignorance is God; what we know is science. 06:47, 18 September 2008 (EDT) - Given that list includes Ed, Conservative and Karajou, my puppy has shown greater levels of maturity and intelligence than those three. Mowse 07:35, 18 September 2008 (EDT) - Great - I now have an image of Ed having his nose rubbed in the carpet. --PsyGremlinWhut? 07:44, 18 September 2008 (EDT) - Ed should have his nose rubbed into some of those articles he "write" until he stops doing it. Mowse 07:53, 18 September 2008 (EDT) - No kidding. Conservapedia's bullshit, hypocrisy, bigotry, and general stupidity are all galling enough, but the inability to call them on it is what REALLY makes it obnoxious. --Gulik 14:30, 18 September 2008 (EDT) - 18 months ago a bunch of kids were having fun on CP. Then it got publicized and a bunch of internet rejects turned up to play powermonger. And, of course, a bunch of sane people turned up to argue the case for evolution, etc. After they got banned all that was left were the power-hungry idiots and trolls/vandals encouraged by every bit of publiscity CP ever gets. It's never been the same. Those kids probably could made a decent little project out of it, in spite of Andy. ħuman 18:52, 18 September 2008 (EDT) - It's actually quite sad when you think about it that way. --AKjeldsenCum dissensie 18:55, 18 September 2008 (EDT) [edit] Who would believe it? The first mention of The Albany Plan appears on this page at 17.06 on 17 September....the new article on The Albany Plan appears [7]on CP at 08.11 on 18 September! In spite of the speedy response to an o0bvious need for such an article, it's a load of crap. Oh well, just be careful her because but Chippeterson is clearly watching you! Woneder if Andy knows that Chippy baby is looking in at the adults at play? Mick McT 09:09, 18 September 2008 (EDT) - Oh well, if he is - Chippers, old chap, you're freaking worse than Ed Poor when it comes to creating stupid stub articles and if you had any sense of self-worth you would not bask in the "glory" of Crockoshite counting the ridiculous "articles you create. Oh, and if I see you spell "their" or "they're" as "there" one more time, so help me I am going to send demons through the intertubes to pop out of your monitor and wring your scrawny neck. On the plus side, however, your sister looks kinda hot... I can haz number? --PsyGremlinWhut? 09:25, 18 September 2008 (EDT) - Chippy also has a decided lack of knowledge regarding the use of apostrophes, as well of a dim understanding of ordinary sentence structure. And his (non-copy/pasted) articles are largely random facts strung together in a way that makes clear his general lack of reading comprehension (of the source materials). ("George Washington is the father of our country and of George Washington Carver. He chopped down a cherry tree and used it to make wooden teeth for himself. Congress chose him as there first president. He was a midget with fourteen fingers and seven toe's.") - He typed that??? Obviously he is a Poeradist. ħuman 18:53, 18 September 2008 (EDT) Intriguing. The Albany Plan is mentioned is Anerican History Lecture Two, so that might be a reason for it, although I don't think Chipmeister is on the course(?). If he is reading this Hi Chips I wonder who introduced him to RW. . . In reply to Mick McT, be careful of what? I don't think he's dangerous. weaseLOId ~ [edit] Conservapedia has a problem? Anyone else getting this? Armondikov 10:06, 18 September 2008 (EDT) - Same shit as always for me. What are you getting? Mowse 10:07, 18 September 2008 (EDT) - It literally just says "Conservapedia has a problem" in big black text. :S Armondikov 10:10, 18 September 2008 (EDT) - Gone now...Armondikov 10:10, 18 September 2008 (EDT) - Maybe Conservapedia was overcome with honesty for a while. Mowse 10:11, 18 September 2008 (EDT) - Right when I pressed the Submit button for my wonderful Conservapedia edit, argh! Editor at CPLiar at RP! 10:18, 18 September 2008 (EDT) - That was God's way of telling you you shouldn't be posting there. --PsyGremlinI haz no mowse? 10:40, 18 September 2008 (EDT) - Should have screengrabbed that one. Armondikov 10:41, 18 September 2008 (EDT) - We already have- see: Image:Cpproblem.png PFoster 10:46, 18 September 2008 (EDT) - I seem to get occasional 500 time outs, so maybe Andy's borrowed the hamster for recreational purposes again. --PsyGremlinWhut? 11:51, 18 September 2008 (EDT) Seems to be offline again now. weaseLOId ~ 12:01, 18 September 2008 (EDT) & It's back. weaseLOId ~ 12:02, 18 September 2008 (EDT) [edit] Palin's email hacked Wonder how CP will take it? You have hackers from Anonymous (the same group who took on Scientology, presumably) exposing her public emails that didn't fall under the umbrella of the Trooper Gate thing. However, the emails show "DPS" (Department of Public Safety) which may have been informative of the investigation. Deletion of the yahoo accounts shortly thereafter may result in a charge of destruction of evidence, if those emails are relevant to the investigation. If anyone cares, I'll post links, but I'm far too lazy at the current prevailing time. NorsemanWassail! 10:55, 18 September 2008 (EDT) - It's interesting because there seems to be good evidence that Palin and her office used private e-mail to discuss official business in a deliberate attempt to circumvent the subpoenaing (is that really a word?) of said e-mails. I think that's it- I'm no lawyer. CorryMom signed me up for the army, just because the fat man dared her to. 11:05, 18 September 2008 (EDT) - There's no "evidence" of that. Just speculation. It was certainly in breach of protocol and a bad idea, but there's no reason right now to think it was anything but stupid.--Tom Moorefiat justitia ruat coelum 11:06, 18 September 2008 (EDT) - Just what the USA needs, a stoopid VP. ГенгисOur ignorance is God; what we know is science. - There were articles referencing how Palin's assistant admonished someone in the administration for sending a particular message on the official govt email system, when the Yahoo account was supposed to be used for the type of subject in question. Very Rovian, as in the way he used erasable RNC emails to communicate things he wanted off the record. --SpinyNorman 11:41, 18 September 2008 (EDT) - Norse, your questions have been answered, by our old friend Jinx hi Jinx! no less.... He's taking the typical CP line, hypocritical liberals, call the fbi, they always scream about privacy rights etc... When someone brings up that we have no idea what the political affiliation of the groups, he respondes with the classic view. They're doing something I don't like, they're liberal.... I guess that makes National Enquirer a Conservative publication... SirChuckBA product of Affirmative Action 12:33, 18 September 2008 (EDT) - Tom Moore, you do not have the legal right to say "all my e-mail is privilidged" just by your say-so, regardless of what account you use, so the argument is both speculative and wrong - but for the wrong reasons. The *only* mail that is given executive privilege would be mail that could do immediate harm to the Safety of the State. Things regarding, say knowledge of military actions against a foreign country" (oh wait, governors don't do that). Topics dealing with an unavoidable safety hazard that the State has not yet concluded how to best deal with (ie., something that might cause a serious panic, and we are at the 'what should we do' state). Bush has batted around teh term "executive privileged" for so long, most of us just assume it means any and all communications from an executive to his or her staff. and that simply is not protected in an investigation under subpoena or warrant. (waitingforgodot...)--71.208.215.187 12:40, 18 September 2008 (EDT) - You are correct, except for all the things you said that were wrong, because I never said anything like that. I was only replying to the speculation that she was doing this deliberately to hide her emails, and I didn't even mention privilege.--Tom Moorefiat justitia ruat coelum 19:35, 18 September 2008 (EDT) What's this about Michelle malkin linking it to us? TMT provided a link to her blog her it doesn't mention us. I iz a confoozd lemur. Totnesmartin 14:51, 18 September 2008 (EDT) - It's in the comment section... basically just saying that the guy who supposedly did it is a member of our site. SirChuckBA product of Affirmative Action 15:06, 18 September 2008 (EDT) - (studies his fingernails) Seriously though, is it worth asking her to put up or shut up? --PsyGremlinWhut? 15:15, 18 September 2008 (EDT) - Yea, not really a big deal, just came across it searching server logs and as a large number of incoming hits from her blog. Thought I would share. Found it humorous. tmtoulouse annoy 15:16, 18 September 2008 (EDT) Anonymous went after Palin? Haha. I wonder if she used seven different passwords as well. --AKjeldsenCum dissensie 18:16, 18 September 2008 (EDT) [edit] Jinx hi Jinx! Are we 100% sure that Jinx hi Jinx! isn't a parodist? I mean really Jason, you think anyone is going to "despise" someone giving thanks. You've been brainwashed by Christian teachings. Contrary to what you may think, we don't hate religious people, nor do we hate religion. You can worship whoever and whatever you want. If you want to join a cult that wears only Cotton/polyester blend Haynes brand jockey shorts and professes that camel spit is the secret ingredient in the fountain of youth for all I give a damn. I just don't want you attempting to force the rest of us to subscribe to it and I don't the government giving you any special attention... Do you comprehend that my Incan (Olmec?) friend? SirChuckBA product of Affirmative Action 13:21, 18 September 2008 (EDT) - And on the eighth day, god created Engineer imbued with the power of padding of the estimate. And god beheld his creation, and saw that he had made a terrible mistake. Thus god gave us the contractual penalties for time and cost overruns as a sign of his covenant never again to interfere in the course of man's progress. --JeevesMkII 13:41, 18 September 2008 (EDT) - You really think that somebody who is a regular reader of RW would have difficulty coming to believe that some very vocal people here hate religion? That would surprise you? - Hunh. Aziraphale 16:31, 18 September 2008 (EDT) - You're mixing two completely different things here. I've been involved here for several years now, and I've never seen anyone express hatred of individual, otherwise rational religious people. There's hatred towards religion in general, and serious mocking of accepting thousand year old books over common sense and observation. There is also extreme mockery and dislike of those that seek to foist their views on us and demand we respect them when they are not willing to return the favor. However, I would like some examples of (regular, real) users showing hatred towards someone that doesn't fall into those categories. Hell, speaking for myself, I liked Pope JPII. I had no respect for his office (fun fact, I have as much authority as the pope, I just don't have as many followers) but I respected his work, including the forgiving of the young man who shot him. I, however, have no respect for the current Nazi Pope, but that's just me SirChuckBA product of Affirmative Action 16:40, 18 September 2008 (EDT) - And again, "individual, otherwise rational religious people" or "there's hatred towards religion in general, and seriour mocking of etc etc". Wrong wiki my fellow, try Atheistwiki. Editor at CPLiar at RP! 16:43, 18 September 2008 (EDT) - What? Was that to me or the other guy? I'm not sure... Also, a note for clafication, because I see this being distorted, when I say "otherwise rational religious people," I don't mean that being religious makes them irrational. I mean people who are not batshit insane. I don't fault Barack Obama for his religion, I fault George Bush for manipulating his religion.SirChuckBA product of Affirmative Action 16:48, 18 September 2008 (EDT) - So you fault Christians but not Muslims, eh? DickTurpis 17:18, 18 September 2008 (EDT) - That's funny, SirChuck, since I have great respect for the office of the Pope, but considerable dislike for JPII's work, which to a considerable extent involved rolling back or preventing a lot of the necessary changes that came out of the Second Vatican Council. However, mpore importantly, I must say that I'm greatly disappointed to see that this myth of the "Nazi Pope" still being bandied around here. People really ought to know better. --AKjeldsenCum dissensie 18:21, 18 September 2008 (EDT) (unindent)If I've allowed myself to become deluded, well, so be it. However, I'm not going to wade through, for example, Susan's edits to find the ones I find damning enough to prove my point. At some point we'll start splitting hairs about who is "otherwise rational" and so on. I'm prepared to be wrong about this, but presently remain unconvinced. Aziraphale 18:25, 18 September 2008 (EDT) - I for one think this "hate religion, but not religious individuals" is a bit of a cop-out. In the end, any religion is made up of individuals. It seems logical that hatred of the religion also implies hatred of the adherents of that religion, at least because without them, it wouldn't exist at all. - So that really means we end up in the old situation of "my friend Muhammad here, he's a nice guy, but all the other Muslims? I don't really like them at all, know what I'm saying?" There are several words that can be used to describe this, and I think we know well what they are. --AKjeldsenCum dissensie 18:36, 18 September 2008 (EDT) - Shall we institute Headless Chicken Mode, or do we lack a quorum due to Susan's incarceration in no-web-access hospital room? By the way, we try to clean out the religion-hating junk people sometimes leave in our articles. We don't delete what people say on talk pages... those are signed comments that do not "speak for" the wiki. ħuman 19:00, 18 September 2008 (EDT) - If Jinx is reading this, & there's no reason to believe that he isn't, no doubt he is laughing and clapping his hands and weeing in his pants with glee that his offhand comment about a new interstate bridge could cause such a stir about attitudes to religion. weaseLOId ~ 19:10, 18 September 2008 (EDT) - Human, while it is true that the wiki as such does not have an "official position" on these things (which is for the best), that does not tell the whole story. If you'll pardon my academia (because sadly enough, I don't really know how else to express this), I think it's obvious that there is a pretty strong Self/Other division at work on the site, with the theists playing the role of constitutive Others to the mainstream atheist Selves. It's really a question of which sort of discourse is dominant on the site. --AKjeldsenCum dissensie 19:41, 18 September 2008 (EDT) - Yes, but as a hard core atheist myself, how often do I thrust my opinions as such into the wiki? Do I treat you as the "other"??? Actually, I usually act as a buffer against the lamer hard cores atheists like PC. I mostly ignore Bob and Susan, since they contribute so much elsewhere. ħuman 00:56, 19 September 2008 (EDT) - Trying to catch all of the above points, if I miss something, please forgive me. To AKjeldsen, I don't think the pope is or ever was actually a Nazi. I use the term as a sign of the supreme dislike I have towards his lurching the church back to the reactionary body it once was. Not only did his unneeded comments almost start a war with the muslims, but his entire demeanor just seems awful. Also to you, I don't see my opinion as a cop out. I don't personally hate religion, just the horrible things done in the name of it. I think the vast majority of religious people are very kind, loving people. At the risk of sounding cliched, I have many religious friends (of very different religions) I don't agree with their views, and I personally find their beleifs silly, but I don't hate them by any means. I will also say that I think the Ghandi quote is a much accurate reflection on the situation. "I like you Christ... However, I do not like your Christians, they are not much like your Christ." - To Aziraphale, I have no intention of splitting hairs over what is and is not rational behavior. I think it's very obvious. Taking religion out of the equation, it's very easy to discern between rational and irrational behavior. As a final note, Dick, I have no idea what you're talking about, please clarify for me. SirChuckBA product of Affirmative Action 21:20, 18 September 2008 (EDT) - I have already explained myself numerous times. If you cannot make substantive comments perhaps you would be more at home at that National Enquirer of the Internet, Wikipedia? DickTurpis 22:07, 18 September 2008 (EDT) (unindent) Humor duely(sp?) noted, but I still have no idea what you meant by your earlier comment... However, I am really tired, so I pledge to sleep on it and see if it makes any more sense tomorrow. SirChuckBA product of Affirmative Action 00:10, 19 September 2008 (EDT) - I think he also meant to mimic teh Assfly with that earlier comment, you know, with the whole "you say republicans did this but refuse to say that democrats did this other thing" or "Bush blew up the world but it doesn't matter because Obama did worse" crap. NightFlarei haz a talk page. 05:08, 19 September 2008 (EDT) - Chuck - amazingly, once we begin to differ on what is and isn't obvious, we can then begin to differ on what is and isn't hair-splitting. I'm just trying to cut out the middle man and jump to the part where we diagnose what went wrong, without the tedium of having the conversation that goes wrong. Aziraphale 03:30, 20 September 2008 (EDT) [edit] Not WiGO worthy, but This was still pretty funny. DickTurpis 14:10, 18 September 2008 (EDT) - So were the next two or three diffs. But he was right! Oh no he isn't!! Oh YESH HE IS!! Pure panto. Armondikov 15:04, 18 September 2008 (EDT) - I look forward to your attempts to explain Panto to our fellows across the pond :D Totnesmartin 15:20, 18 September 2008 (EDT) - Retired Canadian ballerina Karen Kain has been producing pantomimes over here for about 20 years now, with her husband. Some of them were filmed and put on CBC, they're brilliant stuff. --Kels 16:05, 18 September 2008 (EDT) - Conservapedia: The Pantomime almost seems like a good idea. We should drink until it's an awesome idea and has it's own namespace. Armondikov 16:39, 18 September 2008 (EDT) - when discussing Conservapedia, the word pantomime is almost redundant. 18:26, 18 September 2008 (EDT) Totnesmartin [edit] Trumpeter Trumpeter wades in both feet first with an all-out assault on his fellow CPedians. DogP 16:57, 18 September 2008 (EDT) - ...and gets decidedly unfamily-friendly with his block comments. --SpinyNorman 17:02, 18 September 2008 (EDT) ......and finally bans old friend HelpJazz for being a Rationalwiki sock. DogP 17:10, 18 September 2008 (EDT) - His prose ("Defy the drivel") is also starting to make him sound like an angry Dr. Smith on Lost in Space - "You bubble-headed booby!", "you ludicrous lump", "Bellicose Bumpkin ", etc. --SpinyNorman 17:12, 18 September 2008 (EDT) And now he's banhammered DRamon. Onr parodist blocks another. DickTurpis 17:19, 18 September 2008 (EDT) So, what, are we heading for Night of the Long Notes? Barikada 17:59, 18 September 2008 (EDT) No, BrianCo just blocked him with a one-day banhammer. DogP 18:13, 18 September 2008 (EDT) - Now I'm confused. Having come across to the Bugler-is-a-parodist camp I put earlier lengthy blocks down to "playing the part". What's going on now (remember he's defending his Big Science piece) just seems deranged, even beyond Fox on here when drunk. Perhaps it really is the medication wearing off, he isn't a parody after all! Or maybe he read our recent comments about him being a parodist and is going all out to protect his cover. --Toffeeman 18:16, 18 September 2008 (EDT) - Hmmm I am confused about Bugler now. Although, he is obviously quite unhinged. I bet Aschlafly will stay far from this one. Ace McWicked55.3 million page views! 18:20, 18 September 2008 (EDT) - I think he's definitely a parodist, but as I clumsily tried to say below, I think he's enjoying the power and attention he's getting over there. I think he may be going NATIVE!!! Matt oblong 18:21, 18 September 2008 (EDT) - I realize this conversation can't be trusted in public for reasons that are (or will be)self-evident, but my paro-dar has never gone off for him. My assumption (yes yes, I know) is that people here keep calling him a parodist to undercut him on CP, since most CP brass at least casually browses RW. - He clearly puts on airs and, I suspect, is talking in a way he doesn't talk in real life, but that dis-ingenuousness shouldn't automatically be assumed as broader deception. Two cents, Aziraphale 18:22, 18 September 2008 (EDT) - I agree with Mr Aziraphale. Pink(Astronomy Domine) 18:25, 18 September 2008 (EDT) - Aziraphale, you're likely right about why HelpJazz is on Bugler's list, but you do realize that you've likely just "incriminated" yourself as well? --Arcan ¡ollǝɥ 18:32, 18 September 2008 (EDT) - Well, after my swan-dive off of Andy's talk page a few months ago I lost whatever magic shielding I had before anyway. Heck, LearnTogether reverted me just a minute ago, that never would've happened when I had my mojo. ;) Point being, I'm feeling freer to speak my mind in all places because I no longer value access to CP higher than I value my desire to say what I want. - I just really really hope he's a parodist. If not he is utter utter scum that's proud, according to his userpage, of being called a racist. Matt oblong 18:40, 18 September 2008 (EDT) - Besides, similar to what I said about HelpJazz just a moment ago (before LT reverted it), any balanced reading of my edits here would show that I no more approve of y'all's methods than I do of theirs. Y'all are just friendlier, and I'm always willing to get along with those so inclined. :D Aziraphale 18:37, 18 September 2008 (EDT) Sock or not, Bugler is doing more to disrupt things over there any of my/our/your previous socks have ever done. Ace McWicked55.3 million page views! 18:24, 18 September 2008 (EDT) - Maybe we'll never know. The old final night block spectacular just doens't cut it now. I don't think we'll ever know definitely if he's a sock or not. Matt oblong 18:31, 18 September 2008 (EDT) - I go back & forth in my opinions about Bugler. His rage tonight seemed pretty genuine, but he still came up with lines like this, which is absolutely Shakesparean. I think he probably is a right wing lunatic rather than a parodist, but also that he deliberately pushes things to extremes just to piss people off & to get his own way. weaseLOId ~ 18:34, 18 September 2008 (EDT) Are there really still some people who don't know that Bugler is a parodist? It's certain. It's been confirmed. What his endgame is, I don't know (not sure he does), but yeah, he's a parodist. DickTurpis 18:45, 18 September 2008 (EDT) - "It's been confirmed". When & how & by whom? weaseLOId ~ 18:48, 18 September 2008 (EDT) - Ditto. -- YossieSpring in Fialta 04:09, 19 September 2008 (EDT) - I decide to watch some footy on the telly and miss all the excitement. At least we now know for sure that Bugger reads RW. ГенгисOur ignorance is God; what we know is science. 18:50, 18 September 2008 (EDT) - I think Bungler is just a British version of TK, though perhaps more "right wing" on his own. TK's political compass, recall, was almost 0,0 - but he played along with the "rules and regs" at CP to build his power base. Now, Burglar may be a similarly politically-neutral - but aware - power hungry reject from the rest of the internet, but uses what he knows of right-wing attitudes in the UK to come across as the real thing. And since it's UK politics, no one on CP can tell (except Fox maybe?). I could pull a Bugger at CP, but they'd see through my "American" right wing parody. However, we have a healthy contingent of real Brits on here. Listen to who the people are who are absolutely sure that Bagbalm is a parodist... ħuman 19:10, 18 September 2008 (EDT) - Good point, if you're going to be a good sock and worm your way up, there's no sense in talking US politics if you're not American and into politics. Whereas if you're a "furriner", you can talk about your own country's politics all you like, make a complete hash of it and the CP xenophobics won't be able to tell. Armondikov 04:57, 19 September 2008 (EDT) [edit] I understand BUGLER I just watched a film called ID. Now I know what's happened to Bugler. Matt oblong 17:36, 18 September 2008 (EDT) [edit] Bugler - parodist or not? Opinion is divided on this Bugler fellow. I'm interested to find out: who here thinks he is a parodist / mole? Johann 19:17, 18 September 2008 (EDT) - Also please put your country code first, like - [GB] Genghis - so we can test Human's theory. ГенгисOur ignorance is God; what we know is science. 19:22, 18 September 2008 (EDT) [edit] Yea - (US) - he is the most disruptive sysop on CP since TK. --Shagie 19:29, 18 September 2008 (EDT) - (Democratic Republic of Fukistan) Definitely. No question. DickTurpis 20:45, 18 September 2008 (EDT) - (AQ) - he is far too active not to be a parodist. Silly Mr. Cat 21:11, 18 September 2008 (EDT) - (US) - Absolutely. No question about it. And a very talented one. Consider edits like this [8], where he tells someone off for being a parodist, and [9], where he criticises those on the site who create "sterile, circular debates" "merely to disrupt and damage" (on a debate page he created), or here [10], where he actually provides a link to Andy's Liberal Denial article, or or here [11], where he links to BOTH the Liberal article and the Liberal Tricks article, or here[12] - this stuff cannot possibly be written seriously. I think we need a Bugler drinking game, based on a Bugler Scale of parody. The core would be a point system to rate edits (both Bugler's and others'). Say five points for linking to a "Liberal Denial", "Liberal Tricks", "Liberal Deceit", etc. article. (Must be an actual link - only one point for a reference that is not linked.) Another 5 points for praising Andy. Five points for, when presented with a coherent argument, replying by calling the poster a Liberal and dodging the argument (a la Andy). Twenty-five points for, well, I think of it as recursion - when he pontificates about the evils of parody. And so on.--Too tired to log in 00:00, 19 September 2008 (EDT) - (DS) - Without a doubt. He's always been too OTT and acting as Andy's Minime. Now that he's realised that he's basically untouchable (I wonder if Beth still has her eye on him) and Andy's not going to do anything (I don't believe he's Andy's sock) he's really starting to push the envelope. Of course, I say yes, because to think that somebody could naturally be that obnoxious is scary. --PsyGremlinWhut? 00:49, 19 September 2008 (EDT) - (non Brit EU) - he is one of us, and I have suspicions on three RW editors, two in UK and one based in the US. I concede him this: he is doing it cleverly. Harassing HelpJazz shows that he has been following CP for a long time. Editor at CPLiar at RP! 02:36, 19 September 2008 (EDT) - Susan is out sick, but has chimed in before. So I post for her. (Susan, feel free to overwrite this comment when you come back) ħuman 03:03, 19 September 2008 (EDT) - (UK) - Slightly surprised we are still having this discussion, to be honest. He's so blatantly a parodist. I can see how he confuses people though, as he puts an extraordinary amount of effort into it. As to his end game, I think it's an experiment to see how far he can push the envelope before being found out, or alternatively, being elevated to sysop or even beaurocrat. Bondurant 04:26, 19 September 2008 (EDT) - (UK) - Most definitely a parodist, although how he's as sucessful as he is when other people who have essentially been as extreme as him have been given the parody-shaped boot is anyone's guess. My theory (well, strictly, hypothesis) is that he's actually a consortium of RW socks and this entire discussion and site is an elaborate ruse orchestrated by the multiple people who run Bugler's account. Armondikov 04:45, 19 September 2008 (EDT) - (UK) - I just don’t think there’s any doubt. His language veers between that of a Mary Poppins script-writer and aping Assflipper. He just doesn’t use the language of a British right-wing nut. The word liberal is normally used as an adjective in combination with something not as a noun. His school boy insistence on calling HelpJazz HJ. Loads of edits that are just too specifically wink wink to be serious. Definitely guilty. Matt oblong 04:50, 19 September 2008 (EDT) - (UK) I have it from an extremely reliable source, which I unfortunately cannot reveal, that Bugler is indeed a parodist. Auld Nick 10:10, 19 September 2008 (EDT) - (UK) 100% certain. A genuine British right-wing nutter wouldn't be able to resist the temptation to rail against the EU. Barnaby 19:15, 19 September 2008 (EDT) - (US) I think so. --CPAdmin1 09:26, 20 September 2008 (EDT) [edit] Nay - (NZ) I have always thought that he was a sock of Andy that he uses to perform actions that even the assfly knows is below the belt. --DamoHi 19:33, 18 September 2008 (EDT) - I don't think Andy's amsrt enough enough to run a sock - and he sure doesn't know British politics as well as Bungler. ħuman 03:05, 19 September 2008 (EDT) - (JV) Seriously, now, people. He is far too active to be a parodist. You think anyone here has that much spare time?? Pink(Astronomy Domine) 19:59, 18 September 2008 (EDT) - (UK) I don't reckon so, but can't decide for sure. Still wondering if he might be disgraced BNP candidate Dominic Bugler. weaseLOId ~ 20:06, 18 September 2008 (EDT) - I think probably not, but then Bugler is the defining example of Poe's Law. --symuunWords! 20:10, 18 September 2008 (EDT) - I think he's a conservative-leaning Brit with a wicked sense of humour, who agrees with most of CP's basic positions but can't resist stirring things up. He's awesome!--KrissAkabusiAwoogar 04:36, 19 September 2008 (EDT) [edit] Goat - tmtoulouse annoy 19:27, 18 September 2008 (EDT) [edit] Don't know/don't care - I am not really to sure but he did float the idea of CP day so perhaps that'll be his moment, if he is a parodist.(NZ) Ace McWicked55.3 million page views! 19:25, 18 September 2008 (EDT) - I just had a vision of Bugler in his workshop, hammering and welding away at his version of the Delta House float/car in Animal House, except that the outside is a big Yorkshire Pudding. --SpinyNorman 19:40, 18 September 2008 (EDT) - I have my suspicions, but either way it doesn't matter. In the end, Bugler is just a wickedly bent spoon who gives the pot of conserva-gumbo we call CP a much-needed stir now and then. Stir on, Bugler. Stir on. --SpinyNorman 19:34, 18 September 2008 (EDT) - Don't care, he dances so well. Soon for the concerto! NorsemanWassail! 19:34, 18 September 2008 (EDT) - Per Poe's Law, or rather a logical extension of it (as one's views become more extreme, it becomes more difficult to distinguish between a parody of that view and the view itself), it's basically impossible to know without knowing Bugler in person, and you might not even be able to tell then. Also, I don't think it matters. We get our lulz either way, right? OneForLogic 19:41, 18 September 2008 (EDT) - We can always put him in a sealed box that will release poison gas with a .5 probability, and then declare that he is or isn't a parodist until the box is ope--- oh wait, wrong experiment. --SpinyNorman 19:47, 18 September 2008 (EDT) - I don't know (DK), but it doesn't really matter. The fascinating thing is that regardless of whether he's genuine or a parodist, Bugler is the cancer that is killing /b/CP. If they were smart, they'd kick him out sooner rather than later, but... --AKjeldsenCum dissensie 19:50, 18 September 2008 (EDT) - (US) I don't know. He has no "trail" like Jinx does (his blog, WP, etc.) which make me a little more suspicious, but it's really a tough call. Some of his edits have been almost word-for-word lifted from Andy's comments, but it could be just happenstance and the environment. I think he his Poe's Law made manifest. - i) If he's a parodist, my hat's off to him, I love his or her work, and I continue to think I'd be pissed off at you all trying to out me if I was him; ii) if he's not a parodist, brilliant again, he's just a supremely entertaining totally ignorant fuckwit, who I love for all the same reasons I love Andy. Poe's Law is a closed circle, you know.... DogP 20:34, 18 September 2008 (EDT) - Maybe Bugler's (if parodist) doing a reverse-Poe's Law, anticipating that we'd sit here and scream PARODIST! PARODIST! and become so entrenched in the belief that he is, that it only deepens his roots within the system of CP? Like Ted Bundy, where women said they loved him even while he sat in prison for murdering and raping so many women. NorsemanWassail! 20:39, 18 September 2008 (EDT) - All I know for sure is that he's doing RW no favors...--WJThomas 21:08, 18 September 2008 (EDT) - I tend to bounce back and forth. Sometimes his comments seem to be over-the-top enough that they qualify as a level of parody. On other occasions, it seems like he's defending things that are so distasteful that I'd have a hard time believing that anyone who was a parodist at heart would be capable of it. Ultimately, it doesn't matter to us. He's such a perfect fit for their project that his presence will only hasten the eventual demise of CP (assuming it isn't already DOA). - Lardashe - (SE) Virtually all of his mainspace edits are disagreeable additions to hot topics - which screams parody all around. On the other hand, removing vandalism seems to be his "big thing", and if he was a parodist he wouldn't be so swift with the infinite blocks, instead let every sock vandalize a few times more before blocking. On the third hand, this is just what made Andy fall in love with him so he'd better keep it up. Etc 18:27, 19 September 2008 (EDT) [edit] bent spoon - Best idea I saw so far... ħuman 23:50, 18 September 2008 (EDT) - Either he started off mad or he has been a parodist so long he has forgot how to stop and has become mad, either way it makes no difference now. Mowse 02:49, 19 September 2008 (EDT) - We are all born mad. Some remain so... -- YossieSpring in Fialta 00:42, 20 September 2008 (EDT) - (GB) Flibble. What more can I say? Whatever he is the man is absolutely hatstand.--Toffeeman 04:13, 19 September 2008 (EDT) [edit] He is TK - [US] Surprised it wasn't posted already. Pinto's5150 Talk [edit] He is not TK - Bugler : TK = Hannibal Lecter : Darth Vader. Editor at CPLiar at RP! 04:46, 19 September 2008 (EDT) [edit] Stockholm syndrome I believe Bungler to be the Mr Hyde to an RWian's Dr Jekyl. He (she?) started out just a little bit right of centre, but has progressively become more and more fascist as (s)he finds out what fun it is - to the point where they're actually beginning to believe what they're saying. (I have an idea which, lately rather inactive, RWian it is) ContribsTalk 23:48, 19 September 2008 (EDT) [edit] "Exam" questions The fact that Andy keeps accepting and grading papers after he's already publicly posted all the answers gives a whole new meaning to the term "open book". I'm pretty amused that the one posted in WIGO expresses doubt in answer #7 that the Vikings discovered North America before Columbus, and then in the very next answer talks about the settlement the Vikings had in North America well before Columbus. Great stuff! --Kels 21:08, 18 September 2008 (EDT) - I haven't seen him give anyone less than a grade in the high 90's. What a racket - Andy takes money from parents who homeschool their kids, fills their minds with his propaganda, and then hands out ridiculously high scores which validate the parents' delusion that their choice to homeschool has made the kids smarter. Bravo, Andy. --SpinyNorman 21:27, 18 September 2008 (EDT) - Actually his students have a pretty good record taking standardized tests on the subjects they take from him. --CPAdmin1 22:00, 18 September 2008 (EDT) - Which standardized tests? Don't try telling me they're getting 5s on the American History AP after taking his excuse for a class. DickTurpis 22:03, 18 September 2008 (EDT) - I personally got 73 on the microeconomics CLEP, 69 on the Western Civ 1, and a good score on the Western Civ 2 which I don't remember what it was off the top of my head. And I know other students doing very well on CLEPs. I am not sure whether anyone took APs. Some people took the SAT II American History test and scored very well. --CPAdmin1 14:54, 19 September 2008 (EDT) - I admit I know very little about the CLEPs. Perhaps I'll look into them and see what they're like. It seems they're multiple choice, which would be a far cry from the APs, and it's these essays of Andy's that are generally so bad. If CLEPs are anything like the tests needed to attain a GED, then I have substantial doubts that they're terribly rigorous. Anyway, regardless of the tests themselves, I think in general homeschool kids are more likely to take an interest in learning, and will therefore on average do better on some tests than other kids regardless of their exact lessons. So I guess what I wonder is if his students did well because of his class or in spite of them. I will say that many of these essay responses that are getting 99/100 from Andy wouldn't pass muster on a rigorous exam. 67.242.83.173 15:48, 19 September 2008 (EDT) - If the students generally do well on nationwide exams, then great. Seriously- no sarcasm. I remember the AP exams being rigorous, and if Andy's students perform well, that reflects well on them. If Andy's students are intelligent and driven, they deserve reciprocal effort from the teacher, and Andy's homework assignments just don't pass muster. Questions about how great Columbus was? Unintellectual, unchallenging, dogmatic, sycophantic garbage. Andy should be challenging these (paying) students to critically analyze historical events and relate them to a present day context, not teaching them how best to agree with him. My advice for improving their AP/CLEP/SAT II scores: drop the class, get your parents to stop the check if he hasn't been cashed yet, buy Tindall and Shi and learn from legitimate historians. CorryMom signed me up for the army, just because the fat man dared her to. 18:47, 19 September 2008 (EDT) - I mentioned this earlier, its a very weird way to mark papers. You know, before everyone has actually handed them in. Andy has a strange way of doing things. He seems like a "shoes first, pants second" kinda of guy. Ace McWicked55.3 million page views! 21:30, 18 September 2008 (EDT) - More "shoes first, socks second" I think. DickTurpis 21:38, 18 September 2008 (EDT) This seems strangely appropriate, under the circumstances. --Kels 22:08, 18 September 2008 (EDT) - Yeah... Andy's the world's worst teacher, as far as we can tell. The kids only do well, if they do, because of other influences (highly involved parents?) - and he takes credit for it. ħuman 02:59, 19 September 2008 (EDT) [edit] Andy's Academic Record Andy's persistent focus on credentials being/not being important has brought up that he claims to have taken advanced statistics classes. Since he claims considerable expertise, why don't we push him to post his entire educational transcript? That way, at least we'd know on which subjects to consider him beyond question. - Lardashe - You fool, nothing is beyond Andys scope. Nothing! he even knows more about NZ Politics than me and I work in NZ Politics! Ace McWicked55.3 million page views! 21:57, 18 September 2008 (EDT) - Andy would freak out if he really understood our politics. Either that or he'd get a job hosting talkback on Newstalk ZB.--DamoHi 22:47, 18 September 2008 (EDT) (undent) Here's a prediction - when we start getting results from the Large Hadron Collider that lead to unexpected and/or revolutionary insights into physics, watch for Andy to jump in and start discrediting them "because I have a degree in engineering, dammit". "You say you've shown how mass is imparted and you've created dark matter? I want to see the raw data!" --SpinyNorman 06:06, 19 September 2008 (EDT) - If the LHC doesn't count as "Big Science" then I don't know what does... (Sorry, I had to get that out of my system).--Antifly 07:08, 19 September 2008 (EDT) - "It's not a black hole until I say it's a black hole. Please send your data+any black holes so far created. Aschalfy - Also, "no independent, non-liberal scientist has been able to reproduce the experiments from the Large Hardon Collider!" Etc 18:04, 19 September 2008 (EDT) - Did you just call it the Large Hardon Collider? I bet I could reproduce that sort of experiment. DickTurpis 18:07, 19 September 2008 (EDT) - @ Antifly, yeah, I thought the same thing while I was digging through their photos. One of my favorites in that vein was one showing a shitload of people in one of their funky buildings (had a huge center atrium). Something like 1900 scientists are working on/with it. That's more than 12! ħuman 20:51, 19 September 2008 (EDT) [edit] Just a reminder We should try to avoid posting parody edits on WIGO (except those by Bugler). DickTurpis 23:09, 18 September 2008 (EDT) - Wait, those aren't parody, also? ħuman 00:02, 19 September 2008 (EDT) - I must admit I am not so good at distinguishing parody from genuine edits. Apologies for any inconvenience caused.--DamoHi 01:47, 19 September 2008 (EDT) - Me neither. PS, Andy hasn't turned off editing yet. Unless I somehow got "night editing" privs, which I doubt... ħuman 02:22, 19 September 2008 (EDT) - Indeed, still open for business. They seemed to open up pretty early yesterday too (unless you northern types' daylight saving has kicked in/out again, which messes me up totally). Have the UK put their cocks back or forward yet? Ah - somebody's noticed - hamster has gone to bed.--PsyGremlinWhut? 03:23, 19 September 2008 (EDT) - I just let my "cock" dangle. Arr! Cap'n GengArrr, Jim lad. 04:27, 19 September 2008 (EDT) - A person makes one typo around here... --PsyGremlinWhut? 05:07, 19 September 2008 (EDT) - No, cocks and clocks are exactly as they were yesterday. And I thought a WIGO-CP rule was that we didn't out clear parodists or on it? Armondikov 05:08, 19 September 2008 (EDT) [edit] How about a new userbox? "Karajou has asked this user to apologise or some such. Ace McWicked55.3 million page views! 23:51, 18 September 2008 (EDT) - "Bugler asked this user to provide a tossed salad... without dressing." ħuman 00:57, 19 September 2008 (EDT) - This User Is Clueless. Ace McWicked55.3 million page views! 01:34, 19 September 2008 (EDT) - I think that one exists, it might be called template:user:cabal? ħuman 01:38, 19 September 2008 (EDT) - An "I gave Karajoy the finger" one would look pretty good on the wall of fame. Armondikov 05:05, 19 September 2008 (EDT) (undent)Is there a list of all the userboxes that have been created? Just wonderin...Bjones 09:44, 19 September 2008 (EDT) - RationalWiki:Userboxes#Adding userboxes There are several liinks from this page. However, you just have to look. A lot of users (like me) have boxes that they've simply created themselves and haven't made an official template. SirChuckBA product of Affirmative Action 12:18, 19 September 2008 (EDT) [edit] Derangement syndrome spreads: Linked to Conservative values Beliefnet blogger Michele McGinty ("Reformed Chicks Blabbing") channels her inner Schlafly in her post: "Palin Derangement Syndrome". Somebody call the CDC.--Neon 09:12, 19 September 2008 (EDT) [edit] ...Is this his usual response? I noticed that you guys saw the response I dropped for Andy to think about, and then noticed his complete lack of response. Judging by the rest of the page, am I the only one who thinks that Andy never answers any criticism? Alexa 10:45, 19 September 2008 (EDT) - You are wrong. He often answers. "Open your mind", "I'm not going to waste my time with you", "you are breaking the 90/10 rule against talk, talk, talk" are among his deeply thought answers. Editor at CPLiar at RP! 10:48, 19 September 2008 (EDT) - And let's not forget the "You're clueless. Godspeed." DickTurpis 10:49, 19 September 2008 (EDT) [edit] Time to get a new IP Dean is in rare form today. Apparently he took a break from copying and pasting blog headlines to block every account I've made, and a few I don't even remember making. I wonder if asking the IT guy at my work how to get a new IP would sound suspicious....Bjones 10:47, 19 September 2008 (EDT) - Maybe it was me who started it all, wasting those MikeX accounts. Now he has discovered CheckUser and likes to play with it. It's a pity as there are some good contributors in that block list, along with some funny parodists. I had a soft spot for Carolyn. Sigh! Editor at CPLiar at RP! 10:50, 19 September 2008 (EDT) - Crocoshite has had CheckUser for quite some time, and he's done this very often, going on a checkuser blocking rampage. Thankfully, as in the past, he hasn't hit any of my own socks. Yet. DogP 10:53, 19 September 2008 (EDT) - When he figures out how to use this all their troubles will be over. CЯacke® 10:55, 19 September 2008 (EDT) - Hey Shite, you could have saved Carolyn. She was legitimate - I mean: could I fall in love with a sock?!? This was uncalled for. Editor at CPLiar at RP! 11:03, 19 September 2008 (EDT) - Re: falling in love with a sock, there are at least literary precedents. Sort of. --AKjeldsenCum dissensie 11:31, 19 September 2008 (EDT) - Oh, thanks for that AKjeldsen. I feel in good company now. Editor at CPLiar at RP! 11:45, 19 September 2008 (EDT) - You're welcome. ^_^ Just try to avoid committing suicide by jumping out from a townhall steeple. --AKjeldsenCum dissensie 12:16, 19 September 2008 (EDT) - I don't take literary suggestions so... literally. I have devised many ingenious ways to leave this world in the last few months. Editor at CPLiar at RP! 12:21, 19 September 2008 (EDT) It's my fault he went CheckUser crehzeh. I sent him an email about having more fun with blocks and he took my advice... go figure. Silly Mr. Cat 13:31, 19 September 2008 (EDT) - See what you get? Now CP is boring, no discussions, no talk, no PNAS letters. Is this what you really want? Shame on you :-D Editor at CPLiar at RP! 14:05, 19 September 2008 (EDT) [edit] Best of demarcation Currently the "best of" criteria is >=10 votes. This was established at a time when the average vote level was between 3-6 votes. >20 votes an amazing turn out, and >40 was practically unheard of. I notice now that we have a lot more voting coming in. I think it might be time to up the criteria to define a "best of" entry. tmtoulouse annoy 11:27, 19 September 2008 (EDT) - While 20+ is still relatively rare, the "best of" criteria could go up a little. Once something breaks double figures it's definitely good (or at least has caught people's attentions in a big way) but not necessarily "best". Armondikov 11:31, 19 September 2008 (EDT) - I noticed it too, but only in the last few days. Has it been going on for a longer time? Or should we wait and see if it will go back to old levels? Editor at CPLiar at RP! 11:32, 19 September 2008 (EDT) - I have been seeing it as more of a gradual increase.....there is an easy way to figure this out. I will just pull the data from the database and plot it. Be back this afternoon with results. tmtoulouse annoy 11:35, 19 September 2008 (EDT) - You rock, tmt. But take into account that perhaps... Conservapedia has gradually "improved" over time :-D Editor at CPLiar at RP! 11:43, 19 September 2008 (EDT) - Well, whether it's more RW traffic or CP "improving", it'll still need readjusted. Armondikov 11:56, 19 September 2008 (EDT) Instead of a hard-and-fast vote count, you could grade on a curve. Take the top 25% vote-getters, or somesuch.--WJThomas 12:19, 19 September 2008 (EDT) - Eh? Why not just take the 90th percentile of the month's pickings? --JeevesMkII 12:24, 19 September 2008 (EDT) - Are you Z-transforming that?--87.83.175.26 12:31, 19 September 2008 (EDT) The data plots are now at Conservapedia:What is going on at CP?/Vote data. I think there is clear evidence of a gradual upwards trend, but it is fairly minor. However, 10 does seem to be a low cut off point based on the data. I would argue against a monthly percentile as a cut off because you can create a situation where crappy wigo items get in, or good ones get left out based on the fluctuating average per month. There shouldn't be an artificial min/max. Take a look at the data and let me know what you guys think. tmtoulouse annoy 15:37, 19 September 2008 (EDT) - I think it could be raised to 12 or 15 safely. Someone did notice that the BO transfer to August seemed a bit "bulky", we should go see if they were "really" good. - This site is growing rapidly! ħuman 21:14, 19 September 2008 (EDT) - I agree with raising the standards for Best of to 15+ votes. Actually, that occurred to me a while ago. Radioactive Misanthrope 02:26, 20 September 2008 (EDT) (I know this'll sound idiotic but bare naked with me) Why not just take the entries that have significant votes and have a yea or nay page dedicated to Best Of? That way, any slight revisions and/or additions can be made to said entries before they are exalted and praised in our shrine of epic lulz. Just a thawt. NorsemanWassail! 22:22, 19 September 2008 (EDT) [edit] Insight (or, fun with anagrams) I've figured out why Dear Leader always runs from a fight: "Andrew Layton Schlafly" = "Fly then, nasally coward...". In other news, "LearnTogether" = "enlarge the rot", "Phillip Rayment" = "thinly prim ape", and "DeanS/Crocoite" = "dance so erotic".--WJThomas 13:04, 19 September 2008 (EDT) - Nice one! I have seen the future and it involves some very creatively named socks. --PsyGremlinWhut? 13:30, 19 September 2008 (EDT) - If only I had a "y" in one of my usernames... "NathanG/Kektklik" = "get khan talk kinky" Silly Mr. Cat 13:36, 19 September 2008 (EDT) - If you want to have fun with CP Sysop anagrams: - Edmund Poor - One Odd Rump - Duped Moron - Proud Demon - Conservative - Cave Investor - Servant Voice - Learn Together - Ghetto Learner --SpinyNorman 11:16, 20 September 2008 (EDT) [edit] No new account creation I'm confused by all the powerz and rights at CP. Andy and only Andy decides when CP goes to sleep (night editing shut down), right? But what about new account creation? For example it has already been blocked many hours today and Andy hasn't been active today. Is it all Sysops? And do they have a reminder to put New account creation back? Editor at CPLiar at RP! 14:19, 19 September 2008 (EDT) - Probably done to avoid the daily visit from Liberalist et al. --PsyGremlinWhut? 14:34, 19 September 2008 (EDT) - I think a certain amount of sysops have to use their special rights to unlock CP fury!!1!. Silly Mr. Cat 14:57, 19 September 2008 (EDT) - Account creation is baaack. Bjones 15:36, 19 September 2008 (EDT) [edit] No more fossils? [13] Wait, what? Did Ken DeNier go crazy again? Barikada 17:03, 19 September 2008 (EDT) - That would seem to imply that there was a time when he was, in fact, not completely crazy. I find that proposition doubtful. Bjones 17:08, 19 September 2008 (EDT) - Which, of course, breaks this.(Not to metion these.) Brilliant. CЯacke® 18:02, 19 September 2008 (EDT) - Does anyone have (or can get) a copy of what was ON teh fossil page? Us no-nuttin's (vs, know nothings) don't have access to such lofty thingies.-- En attendant Godot"Such is life." 18:08, 19 September 2008 (EDT) - Google cached version here, dates from a month ago so might have been changed between this version & deletion. Can't see anything "inappropriate" about it - it presents both evolutionist & creatist perspective - but I guess this information was just too much for the creationists to stomach. weaseLOId ~ 18:16, 19 September 2008 (EDT) - "This is Jane. See Jane Run. Run, Jane, Run!" too much information for creationists to stomach...-- En attendant Godot"Such is life." 18:22, 19 September 2008 (EDT) - Andy - "We're building an encyclopedia here" Ken - "Not if I can help it". <facepalms> Cap'n GengArrr, Jim lad. 18:59, 19 September 2008 (EDT) - It's easy to pinpoint what is wrong with the cached article. - The evolution section... - ...is longer than the Creation section. - ...accidentally debunks the "rapid fossilization" thing. - ...treats radiometric dating as something that actually works instead of the blind guessing Creationists try to make it look like. - ...also puts a speed bump in front of the whole "organic matter in fossils means they're young" argument. - On the other hand, the Creationism section... - ...comes only after the evolution section. - ...says that Creationists (implied: merely) believe in a young Earth. - ...fires off the "organic matter" and "rapid fossilization" arguments right after they have already been shot down. - ...fails to convince people that Creationism is correct - even by CP standards. - So expect Ken to "rewrite it" in the usual way: "Create, protect forever, add quotes by Creationists, smear non-Creationist scientists, cherry-pick a few 'candid quotes' from papers such as 'There are still many open questions about fossils but this paper shows that they can be answered in a satisfying way.' and link fossils to Hitler." --Sid 20:22, 19 September 2008 (EDT) - It's a well known fact that Hitler had his Nazis create fake fossils in order to prove that evolution happens. He was such a well known Evolutionist. I mean, he only misunderstood the whole idea of natural selection. SirChuckBA product of Affirmative Action 20:37, 19 September 2008 (EDT) Weird. I hit "random page" and got cp:Lucy in the Sky with Diamonds, which they "unstubbed" by.... listing the lyrics. Which are, of course, copyrighted. ħuman 21:11, 19 September 2008 (EDT) - Ha ha ha! Ken comes up with an "answer" for his deletion. Goebbels and Hitler get a mention. Maybe we should base a new drinking game on how many times Ken mentions Hitler, or Nazi. Clearly the fuckwit hasn't heard of the AFD process, or mostly likely, doesn't care. Any socks want to complain in that dusty mausoleum that is the 'abuse' section? --PsyGremlinWhut? 04:55, 20 September 2008 (EDT) [edit] Lippy chimp? Oh please does anyone have a copy of Image:Lippychimp.jpg that Dean just deleted? That sounds like that would have been fun. --BoredCPer 21:43, 19 September 2008 (EDT) - If memory serves, it was a pic of a chimpanzee with red lipstick and oversized eyeglasses. Looked a bit like Andy's mommy. I'm wondering, too, what sort of "unauthorized use" he feared.--WJThomas 22:28, 19 September 2008 (EDT) - Ah! Looks like somebody's been paying close attention to the idiot competition.--WJThomas 22:32, 19 September 2008 (EDT) - J'accuse either Fuzzy Kettleticket who is now spying on us (bravo!), or Dean read it himself. In which case - Dean - you're a fucking arsehole! DogP 22:38, 19 September 2008 (EDT) - I was at church for the past 7 hours. Sorry, I couldn't do any spying. Silly Mr. Cat 23:39, 19 September 2008 (EDT) - SEVEN HOURS in church?!?!?!?! What does one do in church for six whole hours? That's some pretty serious praying. (Unless it was this church, of course....)PFoster 23:42, 19 September 2008 (EDT) - Nope.. it wasn't a service. It was actually set-up for a service. Tomorrow my church is having an outdoors worship thingy. We had to sound check everything, set up lights, make sure the camera and projector are in working order and lots of other junk. Not fun. Silly Mr. Cat 00:03, 20 September 2008 (EDT) - Not fun eh? You know if you waz an atheist you could have sat around the house drinking. Works for me. Ace McWicked55.3 million page views! 00:07, 20 September 2008 (EDT) - If you were a scientologist you could have Improved your Communication Skills Pink(Astronomy Domine) 00:35, 20 September 2008 (EDT) - For pre-clears, there's nothing more worthwhile than a good auditing. DickTurpis 01:14, 20 September 2008 (EDT) [edit] Gallup rationality study That study on the "rationality" of Christians is actually pretty funny. Can they honestly say with a straight face that Christians are less likely to believe in "pseudoscience" than non-believers? What about the pseudoscience known as Creationism? Oops. I guess someone forgot to count that. "Do dreams foretell the future?" Of course not! Who would believe that. Oh wait. It happens in the Bible. "What about ghosts?" Of course not! Well, there is that one. All the study shows is that Christians are less likely to adhere to some irrational beliefs because they are contradicted by another set of irrational beliefs of their own. They even cite "demonic possession" as a superstitious belief. Remind me, is it, say, the Catholic Church, or is it atheists who believe that people are possessed by Satan? That might as well argue that being a Christian makes one less likely to believe in Vishnu than the population at large. No shit. Wonderful how they lump atheists and New Agey folk into one category? Oh, and Jinx hi Jinx!, if you actually had the brains to comprehend anything you've read at this site, you'd know that it is dedicated to countering all irrational ideas, including pseudoscience, superstition, and the supernatural. And that Maher! What an idiot he is! He doesn't even believe in vaccines! Oh......wait.... DickTurpis 00:28, 20 September 2008 (EDT) - Of course Mr. Turpis, dont you know the belief in some invisible, all knowing, all seeing man that can read your thoughts is the height of rational thinking. Ace McWicked55.3 million page views! 00:31, 20 September 2008 (EDT) - It does make me wonder, it's not the first of April anywhere, is it? Is the Wall Street Journal writing parody pieces all of a sudden? DickTurpis 00:33, 20 September 2008 (EDT) - The study actually makes sense to me. When you believe in a single voice of all-encompassing authority, you are more likely to exclude possibilities not accepted by that authority. Many Christians believe that the Bible and their preachers are the voice of authority on virtually all matters, so naturally when that authority precludes belief in ghosts only a smaller percentage will believe in ghosts. People who do not accept such authority don't have that preclusion, so a larger percentage will be more willing to accept the paranormal and pseudoscience. It's not a happy fact for me as an atheist, but it's something I have to acknowledge.--Tom Moorefiat justitia ruat coelum 02:18, 20 September 2008 (EDT) - The problem with the study is it defines "I think Amazing Larry the Miracleman raised the dead and walked on water" as an irrational superstition, but "I believe Jesus Christ raised the dead and walked on water" as a rational idea that has greater merit. A person who thinks "Maybe there are haunted places. There are many reports of them, and there is stuff beyond my understanding" is irrational and a person who says "there are no haunted places because my clergyman says there aren't" is rational. If you stack the deck that way then of course Christians are going to come off as more "rational". All the study shows is that many non-Christians still have some wacky beliefs. Tom Cruise has made that very clear to us already. Anyway, I'd like to see the actual study, not some nut-job's commentary on it. I wouldn't be surprised if it gave a different picture. DickTurpis 02:27, 20 September 2008 (EDT) - I'm going to go out on a limb here and suggest that no one on Conservapedia bothered to read the survey and the actual findings. But examining the actual findings shows a variation of only about 5% between the most extreme ends of the scale of paranormal belief. As examples, the poll found that the most frequent church attendees were 24.68% likely to believe in paranormal topics compared to 28.88% for the most infrequent attendees; Evangelicals were 25.43% likely to believe in such topics, whereas "non-Christian" theists were most likely to believe at 30.81%. - What the study actually demonstrates along these lines is that the people who are most likely to believe in paranormal topics are religious non-Christians. The "none" category (agnostics, atheists, and apatheists) demonstrated only a 27.1 average paranormal score, compared to evangelical Protestants at 25.4 and "other" (unlisted religious) at 30.8. - The most interesting pertinent statistic in the study is paranormal belief by church attendance. Those who attended church weekly had a markedly lower score than all other sectors, 24.7 points. Those who attend church "less than once a week," "less than once a month," and "never" were all within less than one percentage point of each other. It supports my proposal about the voice of authority, certainly. - The study's methodology is sound; I can find little fault with the survey or the assessments. But their summary is a hatchet-job pandering to their own beliefs (since it's from the Baylor Institute of Religion specifically), and so is the WSJ piece (little surprise there).--Tom Moorefiat justitia ruat coelum 02:45, 20 September 2008 (EDT) - Not surprisingly, the actual study sounds substantially more reasonable than the CP and WSJ summaries. Do you have a link? However, I still have some beef if they are not counting, say, belief that a wafer becomes the body of Christ as a "paranormal belief" just because it is adhered to by a mainstream religion. That's pretty damn paranormal, and should drive up the percentage of Christian theists believing in the paranormal (at least among devout Catholics) by a substantial amount. DickTurpis 03:08, 20 September 2008 (EDT) - Like it or not, mainstream religious beliefs are not considered "paranormal." I don't consider them that way, either, for that matter. It's a matter of definition more than anything else. Still, your point is well-taken.--Tom Moorefiat justitia ruat coelum 03:12, 20 September 2008 (EDT) - I looked at the actual surveys. One has a 14 page survey with 84 multi-part questions (some have 10 or more parts) and of this only 4 parts of one 12 part question deal with the paranormal at all, asking whether the subject thinks these exist, and how strongly: ghosts, extraterrestrial life, bigfoot, and psychic phenomena. Also asked in the same question are belief in the Rapture, hell, armageddon, and various other Christian concepts no less paranormal than ESP. The survey itself makes no distinction between the apparently "paranormal" beliefs and the mainstream religious ones. Anyone reading that non-Christians are more likely to believe in the paranormal because they checked the "ghosts" box more than Christians is giving their own interpretation of the data on deciding which of those are paranormal (eg ghosts are but demons are not). Additionally, if by Extraterrestrials they mean any life in the universe apart from Earth, then strongly believing in them isn't paranormal or irrational at all. Mathematically, it's a pretty good bet. This isn't the same as UFOs. - The other survey (the earlier one) has a section on "The New Age" with 4 multi-part questions. Right off the bat, they're sort of poisoning the well. Many Christians, seeing the heading "New Age" are likely to reject everything therein. What follows includes some pretty unclear questions. To what extent do you agree: "Ancient advanced civilizations, such as Atlantis, once existed?" Well, advanced (defending on how you use the term) ancient civilizations existed, just not Atlantis, so I don't even know how to answer such a question. If I disagree am I saying there were no advanced civilizations, or am I denying Atlantis? "Some alternative treatments are at least as effective as traditional medicine?" Some? Maybe. Alternative medicine can become mainstream you know. "Dreams can sometimes foretell the future or reveal hidden truths?" Revealing hidden truths is unclear. If by "hidden truths" they mean "things known only subconsciously" then there is probably widespread belief that dreams can connect with the subconsious. By if by hidden truths they mean "show you where Jimmy Hoffa is buried" then they're asking an entirely different question. The subconscious is not paranormal so anyone answering the question in that sense is not making any statement about paranormal beliefs. - The next question asks if as an adult you have ever: "consulted a Ouija board to contact a deceased person or spirit?" I did once not believing any of it. It was a game. Does that count? "Had a dream that later came true?" I once dreamt I found my missing remote control in the seat cushions. I found it there the next day. Hardly remarkable, but technically I suppose that makes the answer "yes". The next question asks if you've ever researched various topics, including astrology, UFOs, ghosts, Nostradamus, and other such things, almost all of which I've at least looked up on Wikipedia at some point. If they are counting this as belief in the paranormal, they are quite mistaken. - Looking at the results, the only belief that scored high was the belief in alternative medicine, which in most cases is hardly "paranormal". Dreams scored just above 50%, which again, is not necessarily a question about the paranormal. Atlantis scored pretty high, making me wonder if people were answering a question on ancient civilizations or Atlantis is particular. The only other to clear 30% was belief in haunted houses. The answers to the belief in 10 "paranormal" phenomenon were combined to get total results (the 10 being Atlantis, alternative meds, telekinesis, psychics, astrology, talking to the dead, haunted houses, dreams, UFOs, and monsters (Bigfoot and Nessy mentioned by name)). So we have three questions not really about paranormal activities highly skewing the results in a question allegedly about paranormal activities. And, of course, the results do not vary widely among any of the groups. Evangelical Protestant had the lowest with 25.4 (this is not a percentage, I believe, but a cumulative score. But I could be wrong, it's nearly 5 AM and I haven't been to bed yet). Non-religious got 27.1, below the average of 27.4, and less than all the remaining groups except Jews who scored 26.6. In addition to this, it does not define any religious belief, no matter how scientifically invalid, as being paranormal. WSJ's and CP's assertions that non-believers are "less rational" is utterly flawed. Time for bed. DickTurpis 05:00, 20 September 2008 (EDT) - Nice post, Dick. There is certainly a muddying of the waters over what construes "paranormal". But intercessionary prayer, bleeding statues, resurrection form the dead, crackers turning into flesh, water turning into wine and wine turning into blood, sharing five loaves and two little fishes between several hundred(?) people, and dinosaurs coexisting with humans of course are all perfectly rational beliefs. ГенгисOur ignorance is God; what we know is science. 05:39, 20 September 2008 (EDT) - I think you pick at it a little too closely; the questions on the current survey (the latest one) seemed to me to be generally fair attempts. Things like the Ouija board are just you overinterpreting it a bit... few are really going to think that the use of the board while laughing at it as nothing more than a game interprets to an attempt to "contact a deceased person." Similarly, "UFO" has the universally-understood connotation of ETs having visited earth (and thus becoming UFOs), with all the associated connections. For almost everyone, a surface interpretation of the question will be used, and that will obtain the desired result. It's a sound survey. - You're right about the score; they took the numerically-indicated level of belief (1 for strong disbelief, up to 5 for strong belief) and added them together for the ten paranormal things, resulting in a total skeptic of 10 or a total believer at 50.--Tom Moorefiat justitia ruat coelum 06:42, 20 September 2008 (EDT) - Sigh. Editor at CPLiar at RP! 06:24, 20 September 2008 (EDT)
http://rationalwiki.org/wiki/Conservapedia_talk:What_is_going_on_at_CP%3F/Archive75
CC-MAIN-2016-30
refinedweb
21,172
72.26
Polymorphism in C#: Introduction and Types The word polymorphism can be broken down into two different words, ‘poly’ meaning many and ‘morph’ meaning forms, and hence the meaning ‘having many forms’. In C#, or for that matter in any object oriented programming language, polymorphism is used to imply one name with multiple functionality. In polymorphism we declare methods with the same name and different parameters in same class or methods with the same name and same parameters in different classes. Polymorphism has the ability to provide different implementation of methods that are implemented with the same name. Before we begin our detailed discussion about polymorphism, it would be a good idea to learn some of the basic programming techniques in C#. Learning these basic programming techniques is important because the concept which is being discussed here, polymorphism, can be understood completely and effectively only when you will be familiar with the other related concepts like classes or methods. polymorphism. We have already discussed the definition of polymorphism. Now we are going to discuss the two types of polymorphism in detail. These are static polymorphism and dynamic polymorphism. Static Polymorphism In static polymorphism, the response to a function is determined at the time of compiling and hence it is also known as compile time polymorphism. In this polymorphism, the methods are overloaded with the same names but are given different signatures. Hence it is also called method overloading. A method in C# is basically a group of statements that combine to perform a task. Here is an amazing course about the introduction of programming in C# which will teach you about methods and other related concepts in C# and will help you in understanding static polymorphism in a better way. Let us try and understand the concept of static polymorphism with the help of an example. public class addition { public int Add(int a, int b) { return a+b; } public double Add(int x, int y, int z) { return x+y+z; } } In this example, we have a class ‘addition’ having two functions with the same name ‘Add’ but with two different input parameters. First function contains two parameters while the second function contains three parameters. Hence this polymorphism is also known as method overloading. In this polymorphism, the compiler knows about the type of object it is linking to and it is also aware about the methods which are going to be used to call it and hence the name compile time polymorphism. Two techniques are provided in C# for the implementation of static polymorphism, function overloading and operator overloading. Function overloading means having multiple definitions for the same function name in the same scope. The definitions of the function must differ from each other on the basis of types or the number of arguments in the argument list. The function declarations which differ from each other only by the return type cannot be successfully overloaded. In operator overloading, the type of the operator is defined by the user. Overloaded operators are the functions with special names, the keyword operator followed by the symbol for the operator being defined. The overloaded operators, like any other function, have a return type and a parameter list. The function overloading and the operator overloading are the two different techniques for the implementation of static polymorphism in C# and these have their own particular areas of application. They should only be used for the right program as per the requirements as the incorrect implementation will only lead to errors. Dynamic Polymorphism In dynamic polymorphism, the response to a function is determined at run time and hence is known as run time polymorphism. In this polymorphism, the different methods have the same name and also the same signature but differ in the implementation. In this polymorphism the methods are overridden and hence it is also known as method overriding. This course about the programming techniques in C# will help you in understanding these concepts in a better way. Now let us try and understand the concept of polymorphism with the help of an example. public class shape { public int _radius = 5; public virtual double getArea() { return 0; } } public class circle : shape { public override double getArea() { return 3.14 * _radius * _radius; } } public class sphere : shape { public override double getArea() { return 4 * 3.14 * _radius * _radius; } } In this example, we have used one base class ‘shape’ with a virtual method ‘getArea()’ and two derived classes ‘circle’ and ‘sphere’, each having an override method ‘getArea()’ with different implementations. In this example, the class ‘shape’ and a function ‘getArea’ have been declared. Then two other classes ‘circle’ and ‘sphere’ have been declared which give the output as the area of the circle and the area of the sphere, using the same function ‘getArea()’, as per the input which is provided. The ‘virtual’ and ‘override’ keywords are used for method overriding. This is how the dynamic polymorphism works. This was all about the different types of polymorphism in C#. Here, we discussed the concept as well as its different types in detail. The different types of polymorphism were studied with the help of relevant examples and all the related concepts were also properly discussed. Till now, our discussion has been theory based. We have discussed the examples and the code for the different types of polymorphism polymorphism. This course has been specifically designed keeping the requirements of the beginners in C# in mind and hence it will prove equally beneficial for the users of all experience levels. So take this course and start learning. Good luck! Top courses in C# C# students also learn Empower your team. Lead the industry. Get a subscription to a library of online courses and digital learning tools for your organization with Udemy for Business.
https://blog.udemy.com/polymorphism-in-c/
CC-MAIN-2020-29
refinedweb
960
52.09
Paper presented at the annual meeting of the Committee on Developing Countries of the German Economic Association, 30/6/00 (revised draft September 2000) Katharina Michaelowa 1 Hamburg Institute of International Economics 1. Introduction Over the second half of the 20th century, and in particular during the 1960s and the 1970s, Africa experienced a massive growth of enrolment at all levels of education. On average for sub-Saharan Africa, gross enrolment rates at primary level doubled from 40% in 1960 to almost 80% in 1995. At the secondary level they increased eightfold, from 3.4% to 27% during the same period (World Bank 1999). The growth of education for females was even more impressive than for males, and led to a growth of female literacy rates which many other developing countries in South Asia, the Middle East and North Africa could not match (Sender 1999, pp. 92ff.). Education affects the life of individuals, their participation in economic activities, and overall economic development in various ways. Since a person without basic literacy and numeracy skills is in a difficult situation to master everyday life, the lack of basic education has always been accepted as one of the major components of any multidimensional concept of poverty. Moreover, education is strongly linked to the notion of empowerment. This paper, however, will focus on the economic returns to education. Other effects will only be discussed where they interfere with economic effects. Human capital theory as well as endogenous growth theory suggests that there are substantial economic effects of education on the micro and the macro level respectively. Looking for an effective tool to foster economic progress in developing countries, the analysis of economic returns to education has been a much-researched field since the beginning of the 1960s. This paper attempts to review some of the available empirical evidence for Africa and to clarify the limitations of current research. Since literature on economic returns to education is abundant and uses multiple methods with a variety of results that are not always easy to reconcile, it seems worthwhile to provide a structured overview and discussion of different approaches. In this context, particular 1 The author would like to thank Silvain Côté and Marcelo Soto for many helpful comments and suggestions. 1 emphasis will be given to the link between micro and macro level analysis. Since the focus of this paper is on low income countries in Africa, arguments will be checked for their specific relevance for this group of countries. Figure 1 provides an overview over expected effects concerning economic returns to education. This overview can be useful to guide through the following sections. Starting at the micro level, the direct link between education and individual earnings will be at the center of discussion. Moreover, indirect effects and externalities, as well as the impact of education on labor market participation will be taken into account. Finally, the consequences of microeconomic results on macroeconomic outcomes and the difficulties to reach convincing empirical results at that level will be discussed. Figure 1: Economic returns to education micro externalities and other indirect effects related to education, health and population growth: higher educ. attainment and achievement of children better health and lower mortality of children better (own) health lower number of births macro lower population growth and better health of population (and labor force) Education increased earnings (higher productivity) increased earnings of neighbours participation in the labor force higher growth increased labor force 2. Evidence at the micro level 2.1. Direct private returns to education The link between education and increased individual earnings is very well documented in the literature. The most commonly used approach is based on some variant of the Mincerian earnings function (Mincer 1974). Thereby the natural logarithm of wages (w) is regressed on years of schooling (S), a proxy of labor market experience (E), its square (E²), and, depending on the author, a variety of control variables (X) (Temple 2000, pp. 9f.): (1) ln (w) = α + β1S + β2E + β3E² + β4X + ε 2 Assuming that the cost of additional schooling is equal to foregone wages the semi-logarithmic formulation allows to interpret the coefficient of the schooling variable as the private returns to education, i.e. the annual increase in income (ws – ws-1) divided by the annual cost of the investment (ws-1) (Glewwe 1996, p. 269): (2) w s − w s −1 w e α +β1S+β 2 E +β3E +β 4 X + ε = s − 1 = α +β (S−1)+β E +β E 2 +β X + ε − 1 = e β1 − 1 ≅ β1 2 3 4 w s −1 w s −1 e 1 2 Psacharopoulos (1994) provides an overview over the results of the extensive literature in this field for over 70 countries, presenting in each case the latest study available until the early 1990s. While the disadvantage of this survey is that it does not cover more recent studies of the 1990s, the overriding advantage is that the studies are selected out of an even wider sample of hundreds of studies to this topic, on the basis of common and therefore comparable methodologies. With respect to studies using the basic Mincerian framework described above, his survey covers 62 countries. Results appear to be quite consistent across countries and across time in that there is a clearly positive effect of additional education. For the nine African countries covered, one additional year of schooling leads to private returns of between 8 and 20% (Psacharopoulos 1994, pp. 1342f.). Figure 2 shows how the average rate of return of sub-Saharan African countries compares with the average rates of other regions in the world. The simultaneous ordering of regions by returns to education and average years of schooling suggests a negative relationship between these two variables: The rate of return to education is particularly high when the supply of educated labor is rather scarce. Even though enrolment has greatly increased in sub-Saharan Africa over the last decades, the region has not yet been able to catch up in terms of average years of schooling. This could explain why the rate of return to education is markedly higher in this region than in any other region of the world. At the same time, demand for educated labor obviously influences private returns to education as well. This effect is difficult to separate from the supply effect discussed above. In order to obtain an unambiguous estimate of the supply effect, Mwabu and Schultz (2000) select a specific situation where supply of education varies independently of demand. Their model case is South Africa during the apartheid system, where the government rationed the access to the education system for political reasons. The resulting relative scarcity of skilled black labor as compared to the relative 3 Observing trends in supply and demand of skilled labor in many African countries suggests that in recent years. 1321 and 1331) Another approach to distinguish demand and supply effects is to look for exogenous factors determining either of the two separately. Birdsall.abundance of skilled white labor. With growth of enrolment. pp.4) Rate of return (%) 11 10 Asia* (9. Moyo.6) 9 8 7 6 5 6 7 8 9 10 11 12 Europe. in many countries. the increasing supply of skilled labor was initially absorbed by the public sector. North Africa* (8.2) OECD (6. Source: Psacharopoulos (1994. Ross and Sabot (1995. independently of labor market demands. both trends would jointly tend too reduce the high estimates for private returns to education found by Psacharopoulos in studies for earlier decades (Hussain. the supply of skilled labor rose considerably in the next decades while private sector demand did by far not evolve at the same pace. 3). there was a strong demand for skilled labor to fill the posts left by the previously colonizing power. p. pp. Knight and 4 . Caribbean (12.4) Latin A merica. M iddle East. for instance. and to create the countries‘ own administrative and economic structure. was clearly reflected in the considerably higher returns to an additional year of schooling for blacks than for whites. In the early years after independence.) argue that returns to education are positively related to growth in manufactured exports. Oshikoya 2000. Supply of labor with secondary attainment and above was extremely limited. The latter is interpreted as an indicator of an expansion of demand for skilled labor. Comparing East Asian and Latin American countries. Figure 2: Mincerian returns and average years of schooling 14 13 12 Sub-Saharan A frica (13. 182f. However.8) Y ears of schooling *Only non-OECD. Gelb. During the 1980s. 107% in Egypt. In Tanzania and Egypt. the young age of school leavers makes it rather improbable that foregone earnings correspond to a full adult annual salary.g. dummy variables have to be introduced into equation (1) to allow the coefficient of schooling to vary between levels. 190% in Tanzania and 418% in Zambia. However. where children often do not even complete primary school. to the final year of each educational level. Psacharopoulos (1994) synthesizes the results of another 78 country studies distinguishing specific levels of education. In low-income countries. it is possible to distinguish between different levels of education even in the simple Mincerian framework. This approach has the advantage not to automatically equate the cost of an additional year of education with the annual earnings of a person with one year less of schooling. However. In order to compare the rates of return at different levels of education involving different age groups of students. it became obvious that this employment policy was financially unsustainable in the long run. for example.g. Besides his review of studies on the Mincerian rate of return for one additional year of schooling. Today secondary school leavers can no more automatically expect the access to the civil service. for instance. up to the late 1980s. Assaad 1994). public sector employment accounted for 67% of the rise in total wage employment in Kenya. Forced by financial constraints and / or by the requirements of structural adjustment programs. leading to the completion of a particular program (see e. In principle. Table 1) show this by comparing the growth of wage employment in the public and the private sector. secondary and tertiary education. but this seems to be. this might become an interesting issue of research in coming years. In this case. But even more importantly. a rather rough approximation. with the fast increasing number of available household and labor force surveys. There could be higher returns. differences in returns could be expected with regard to the basic educational levels primary. 77).Sabot (1991. The above discussion assumes that the effect is uniform across levels and identical for each additional year. only few African countries have sufficient data on wage structures over a long period of time to empirically analyze the trends in the returns to education (Schultz 1999. a corresponding distinction of foregone 5 . Apart from looking at the overall effect of one more year of education. the effect can be differentiated with respect to different educational levels. Unfortunately. leading to detailed age-earnings profiles by level of education (“elaborate method”). the studies discussed by Psacharopoulos use a more complex and highly data consuming approach. many African countries started to revise their policy. Between the mid-1960s and the early 1980s. Belman and Heywood 1991). students with completed secondary education were guaranteed entry into the civil service (see e. at best. p. 7 59.9 Primary education 99. Africa Country (reference year) Botswana (1983) Côte d’Ivoire (1984) Ethiopia (1972) Ghana (1967) Kenya (1980) Lesotho (1980) Liberia (1983) Malawi (1982) Nigeria (1966) Senegal (1985) Somalia (1983) Sudan (1974) Tunisia (1980) Zambia (1983) Zimbabwe (1987) Country average 16.0 33. p. direct cost and foregone earnings.0 15. The elaborate method deduces education benefits as well as education costs from a direct comparison with a control group of graduates of a lower level of education. The latter can be expressed in terms of wa where appropriate. or omitted and / or replaced by lower values for younger age groups.0 Source: Psacharopoulos (1994.0 Tertiary Education 38.8 17. The rate of return (r) is calculated as a discount rate equating the stream of benefits to the stream of costs at a given point of time (Psacharopoulos and Ng 1994. pp.5 16.0 19.4 37.5 99.7 35.1 27.8 36.0 46. 1340f.6 34.6 15. Table 1: Private returns to education by level of attainment.1 27.earnings seems to be particularly relevant.5 26.0 30.2 15.0 24.3 48. including both. 188): s wb − wa = C b (1 + r) t ∑ ∑ t t =s +1 (1 + r) t =1 n (3) The difference in earnings between a person with a higher level of educational attainment b and a lower level of educational attainment a is expressed by wb-wa.0 13.7 22.7 30.2 5.0 27. Cb are the annual cost during the s years of additional schooling.0 25.6 41.0 33.0 16.0 25. Table A1. The results for the African countries covered by Psacharopoulos (1994) and reported in Table 1 only cover those studies which do not assign foregone earnings to primary students aged 8 years and below.3 13.7 30.8 14.0 13.5 17.0 26.5 Secondary Education 76.) 6 .0 21. 3% for males and about 1. Schultz (1996) estimates for Ghana and Côte d’Ivoire also don’t generally show any substantial difference between both sexes. it should be noted. The overall patterns across educational levels are similar for other world regions: Primary education consistently shows the highest returns while tertiary education tends to slightly dominate returns to the secondary level (Psacharopoulos 1994.).3 percentage points higher for females. 49). As compared to the women in those two other regions. between the agricultural and other sectors of the economy. The average rate of return is 11. When a distinction is made between different levels of education. primary education yields by far the highest private returns.1329. As compared to women in south and west Asia. women’s returns to schooling appear to be slightly higher than men’s. in particular in agriculture and trading occupations. 6f. fn. however. one exception appears. p. that much of the differences of returns between levels is influenced by the differences in the opportunity costs of schooling discussed above. 79). in particular. Malawi and Zimbabwe they dominate the returns of secondary education in all African countries for which this information is available. however. p.The table indicates considerable differences between the results of individual country studies. 5. Moreover. Psacharopoulos (1994. p. In particular. one can compare the returns to education for different subsets of the population. 51. however: At the secondary level in Ghana. Côte d’Ivoire. p. rather than by differences in the wage increments (Pritchett 1997. holding inputs constant. farming output increases by only 2% for each additional year of schooling. Liberia and Zimbabwe. With the exceptions of Côte d’Ivoire. women’s rate of return appears to be almost twice as high as men’s. p. Table 8) indicates that in his sample of countries all across the world. 1328). that technological progress might increase the returns to schooling in agriculture due to the complementarity of human and physical capital. In order to correctly interpret these results. it is much more common for women in Africa to work outside the family. Overall.g. it might be of interest to compare the returns for men and women. Another interesting disaggregation is by sector of employment. It seems. This could explain the particularly low rates of return to education for farmers in sub-Saharan Africa (Pritchett 1997. More recent studies on farming in Africa equally found only very low effects (see e. fn. Besides looking at returns to education for all. the estimates presented by Jamison and Lau might underestimate the 7 . they thus have an enhanced possibility to make use of their human capital on the labor market and to capture the corresponding returns (Schultz 1999. An early literature review by Jamison and Lau (1982) finds that. Tertiary education leads to higher returns than secondary education in all countries but Botswana. however. Gurgand 1997). Table 1. Lesotho. g. p. and even more important in sub-Saharan Africa than in other regions of the world. Education could therefore lead to higher returns precisely via the changes in inputs. Even if students spend the same time in school. or for other people in the person’s neighborhood.2. Glewwe (1996. This effect would bias the regression results. At the example of Ghana. returns to primary education generally appear to be the highest. Finally. 277) shows that the reading and mathematics skills acquired in school are positively correlated with wages. Returns for African women are at least as high as for men. because foregone earnings for smaller children are lower than for older ones. these findings have not changed in any significant way although more recent studies generally use more sophisticated econometric methods to correct for a possible sample selection bias (e. the quality of education plays a significant role. but the latter also tends to remain positive and significant. And finally. there is no generally accepted overall measure for this kind of effects comparable to the private rate of returns. Unfortunately. that pupils may leave school after several years of schooling without even reaching sustainable levels of basic literacy and numeracy. private returns to education generally appear to be higher in the non-agricultural than in the agricultural sector. even though some questions remain open. Education improves the ability to make informed decisions about new inputs both in terms of machinery and fertilizers. 2. Externalities and other indirect effects Besides the direct effect of education on earnings. The inclusion of these variables generally decreases the coefficient of the education quantity variable. All in all. Over the last decades. The so called “social rate of returns” only adds public expenditure on education to the private cost 8 . Learning conditions in many African countries are so bad. either for the educated person him.effect of education since they correct for a change in farming inputs. it has to be noted that besides the quantity of education. the main results of the analysis of private returns to education in economic literature are clear and unambiguous: The private returns to education are substantial. through the method introduced by Heckmann (1979)) and for the interdependence of education and other explaining variables (through instrumental variable methods). the quality of the educational outcome can vary considerably. it can be observed that education influences other variables. Across different levels of education. which again have an impact on private income.or herself. 345). many authors also report an effect of education on fertility (see e. Just as education itself. Besides the effect on children’s health. there is abundant evidence on specific externalities and indirect effects. It is therefore not surprising. The social rate of return thus relates individual returns to the total cost of education. social rates of return generally show an even clearer advantage of primary as compared to secondary and tertiary education.g. Other studies reporting a positive effect of mother’s schooling on her children’s health in developing countries include Glewwe (1999). However. the social dimension is included only on the cost.considered for the calculation of the private rate. that these factors influence private earnings. and Thomas. In his econometric analysis of returns to human capital in Côte d’Ivoire and Ghana. All in all. and to a reduced number of childbirth. According to Cochrane.g. health is a relevant component of each individual’s human capital. Hobcraft (1993). p. Moreover. Even though there is no agreed overall measure in analogy with the private rate of returns discussed in the previous section. Timmermann and Graff 1995. he uses the variables adult height and weight-to-height-squared (Body Mass Index) to 9 . Behrman 1990). 42). Strauss and Henriques (1991). Schultz 1989. in particular of mothers. Schultz (1996) distinguishes between the different forms of human capital. A healthy and well-nourished worker will be absent from work less often and will be more productive while at work.and not on the benefitside. Social rates of return are generally used to provide some indication of the efficiency of educational expenditure. These figures are roughly consistent with the recent results from Demographic and Health Surveys (DHS) for sub-Saharan Africa reported by Pritchett (1997. Positive externalities are not taken into account in the social rate of return (see e. The concept of social returns thus does not allow us to provide information in this respect. Leslie and O’Hara (1980) and Schultz (1981) one additional year of schooling for mothers in low-income countries can be associated with a 5-10% reduction in the likelihood that their children die before reaching the age of five. there is abundant evidence that education leads to more informed decisions with respect to health and hygiene. Taking into account total cost instead of private cost alone reduces the overall rate of return. These indirect links are particularly well documented concerning externalities within the family where education of the parents. since public expenditure per student tends to rise considerably with the level of education. Besides the years of education. p. Schultz (1993). Wolfe and Behrman 1984. was consistently shown to be a significant factor improving children’s health and education. just as education does. Education of parents. p. and Martorell and Habicht 1986). there are also positive externalities of parents’ schooling on their children’s education. Mook and Leslie 1986 for Nepal.) shows that children’s undernutrition tends to have a negative influence on their performance in school. 38f. Madagascar is shown to be a particularly problematic case with an extremely high dropout rate of this group of pupils. and of mothers in particular. Strauss and Thomas (1998) present an extensive overview over the literature analyzing the effects of health and nutrition on productivity and income. for both women and men. work is based to a great extent on physical strength and endurance. Just as much as there are positive externalities of parents’ schooling on their children’s health. The interlinkage of health and education is thus clearly established in the literature. Michaelowa (2000. Coefficient estimates in the latter study indicate that. Moreover. Other authors obtain the same result for other regions of the world (see e. pp.measure the impact of child nutrition and adult health and nutrition respectively. in developing countries. Comparing data from DHS on young children’s undernutrition (see Morrisson. which also suggests a particularly high importance of good health (Strauss and Thomas 1998. leads to earlier dropout. they can be expected to influence students’ productivity at school. Both variables. leads to better health and nutrition for their children. which is reflected in lower educational attainment. tend to be significantly and positively associated with private earnings. A few examples for Africa are Glewwe and Jacoby (1994) for Ghana. Jamison 1986 for China. Underperformance again. They emphasize that the link is strongest at very low levels of health and high levels of malnutrition as prevalent in many low-income developing countries. test performance of fifth graders in math and French increases by between 4. Cameroon. ceteris paribus.) indicates that African countries vary considerably in the extent they manage to retain these children in school. Guilmeau and Linskens 2000. In precisely the same way health and nutrition are influencing productivity at work. Harbinson and Hanushek 1992 for Brazil. The literature showing this effect is equally abundant since parents’ education proved to be a relevant control variable for any regression of students’ educational attainment and achievement for developed and developing countries alike. and this in turn influences the children’s educational achievement and attainment . 767 and 813). 24f.5 and 10 . Madagascar and Senegal. Table 4. 18) with students´ nutrition at grade 5. At the example of five sub-Saharan African countries. Tansel (1997) for Ghana and Côte d’Ivoire. the latter more clearly than the former. Côte d’Ivoire. p. and Michaelowa (2000) for Burkina Faso. Michaelowa (2000.g.thereby enhancing the next generation’s earnings prospects on the labor market. pp. 96 13.) document this effect with evidence from India.10 *Labor force data for Botswana are from 1996. p. For instance.5% of average scores when both parents are literate as compared to the situation when both parents are illiterate.7.50 Women % no schooling % illiterate in in labor force population 10. for selected African countries. Moreover.77 24. there can be another microeconomic effect of education that does not necessarily correspond to higher individual earnings (although the probability seems to be quite high that it will do so. if an educated farmer successfully tries out higher yielding crops or new production methods. mother’s education does not generally seem to have a more important impact than father’s education does (see e. Tansel 1997.00 21. too). with respect to children’s educational achievement. 1995* Country Botswana Mauritius Morocco Tunisia All % no schooling % illiterate in in labor force population 22. other members of his village observing this might copy the innovations and thus also reach higher income. For a few countries. It appears to be stronger for women than for men (OECD 2000a.40 6.80 56.00 Men % no schooling % illiterate in in labor force population 3.50 47. there can be positive externalities on other people in the neighborhood. in particular for Mauritius and Morocco. This effect is the higher chance that a person participates in the labor market if he or she is educated. 260f. World Bank (1999) for illiteracy rates. educating themselves (future) parents rise the chances for their children’s education as well. that the share of uneducated persons is much higher in the population as a whole than in the labor force.1 for OECD and eight Asian and Latin American countries. for Tunisia from 1994. Mincer 1996). In any case. 11 . pp.70 42.30 22.90 69. however.06 27.40 24.91 25. Table 2:Education of the labor force versus education of the population. 826). which in turn will increase their chances to find a relatively well paid job when they start working. it is possible to compare illiteracy rates of the population aged 15 years and over with the share of workers without schooling in the labor force.01 27. however. Sources: ILO (1998) for labor force data.46 33. Besides the externalities of education on the educated person’s own children.g. For Africa. Table 2 shows. If education of persons in and outside the labor force was about the same. It will be mentioned here for completeness. As opposed to the influence of education on children’s health. Foster and Rosenzweig (1995. these shares should be approximately equal.22 28.15 17.10 35. pp. The effect can be observed in both developed and developing countries. 1194f. and Table E1. data on labor force participation rates by educational attainment and gender are not available. 1. and illiteracy rates. A ratio of 100% would indicate that the share of uneducated men or women is as high in the labor force as in the total adult population. Figure 3: Ratio share of labor force without schooling to population illiteracy rate. where the effect is measured for the whole population. that the overall positive impact of education is even greater than the direct private returns discussed in section 2. the overall impact of education will come out very clearly. one would expect to find strong evidence for an important impact of education on growth. 12 . the share of uneducated persons in the labor force is only 30-60% of the share of uneducated persons in the population as a whole. and they point to the fact. This indirectly confirms the observation for nonAfrican countries. expressed as the former divided by the latter. A ratio below 100% indicates that their share is lower in the labor force. by gender 100% 80% 60% 40% 20% 0% Morocco Mauritius Tunisia women men Source: Table 2. It should thus be expected that at the aggregate level. In particular.Among the three countries where a distinction by gender is possible. Overall. they may also invest their human capital more productively. and even more strongly than at the individual level. with the exception of men in Tunisia. that participation in the labor force is positively related to education. if the different direct and indirect microeconomic effects find their reflection on the macro level. Educated persons seem to have higher chances to participate in the labor force. This is illustrated in Figure 3 which shows the relationship between the share of persons without schooling in the labor force. and through the increased choice between work options. the indirect effects and externalities of education are well documented in micro level analysis. two show the usual pattern that differences are higher for women than for men. All in all. but in many cases this effect seemed to be greatly overestimated as compared to what one would expect on the basis of the microeconomic evidence (Topel 1999. the following links between the effects of education at the micro level and the macro level can be expected: • The increased earnings of educated persons themselves as well as of those who indirectly learn from them can be interpreted as a reflection of productivity gains through education. economic productivity should be enhanced which in turn should lead to higher growth. Mankiw. Cross-country studies in the early and mid-1990s relating growth to proxies for the level of human capital such as educational finance. Although few economists would object that education has an important impact on macroeconomic growth. it is clear that the number of childbirths affects women’s physical ability to work and their productivity. Evidence at the macro level 3. Expected links and empirical evidence According to Figure 1 in the introduction. education positively influences a second dimension of human capital with similar consequences for increased productivity and growth. increased education of the population as a whole will lead to a higher labor force participation rate that might be expected to correspond to a reallocation of the population towards economically more productive activities. It is closely related to the effect of health mentioned above. While microeconomic effects are clearly documented in the literature and relatively unambiguous.3. contributes to an increased national output. Put differently.g. enrolment rates. This in turn should have an impact on growth. Bils and Klenow 2000). education for a greater part of the population leads to reduced birth rates. If overall. In the more recent 13 . this obviously has to be considered if national income and growth are considered on a per capita basis. However. • Finally.1. But even a part from that. as an input factor in the national production function. A multitude of empirical studies was carried out to test the effect of human capital on growth. empirical evidence is difficult to interpret. or years of schooling (see e. • • Through its impact on health. Through its impact on reduced population growth. if education induces more persons to participate in the labor force. the population reaches a higher educational attainment. this is not the case for macroeconomic effects. Unfortunately the link between the micro and the macro level is not as straightforward as it might appear in the first place. Romer and Weil 1992. these studies do not come to reliable results. overall. Barro 1991) generally found a positive effect. From a merely statistical point of view. the wage differential reflects the higher (productive) value of human capital which. Levine and Renelt 1992. up to date. Esquivel and Lefort 1996. responsible for the lack of clear evidence of the impact of education on growth in panel and first difference specifications. These counterintuitive findings have recently induced some authors to elaborate further on the measures of human capital. some authors preferred to regress growth rates on changes in human capital (e. at least for subsets of the sample or under particular model specifications. that the problems encountered to measure the true effect of education on growth in these studies. while male primary and female schooling turns out to be insignificant. his proxies for education quality are based on inputs since more reliable data (such as the Hanushek. not just for evidence on low-income countries. This is true for international evidence in general. De la Fuente and Doménech (2000) reexamine the panel data sets on years of schooling provided by Barro and Lee (1996) and Nehru. Authors using these approaches frequently reported insignificant or even negative results. The specifications in first differences used by Pritchett (1997) as well as the panel specifications in Islam (1995) and Caselli. for instance. Others included time-series information and carried out panel data estimations (e. at least in parts. Questioning the relevance of a theoretical approach relating growth rates to human capital levels. Pritchett 1997). Non of the above quoted studies has a particular emphasis on developing countries. Esquivel and Lefort (1996) lead to significant and negative coefficients. Barro 1996). Swanson and Dubey (1995). pp. they reach much more intuitive results. Caselli. they find considerable measurement problems. Although these approaches seem encouraging. will be even greater when the 14 . Benhabib and Spiegel (1994) show positive and significant results when the model tested allows for a specification of human capital in levels.). Dessus (1999) attempts to correct for education quality and comes to some more satisfactory results. Barro and Sala-i-Martin (1995) report a negative effect of female education. For various reasons. Barro (1996. Using their improved data set and introducing time fixed effects.literature. Islam 1995. it can be assumed. They argue that these problems could be.g. while results are insignificant (with negative point estimates) when the model specification requires a measure of human capital in first differences. Comparing these data over time and with more recent data provided by the OECD (various issues) for its member countries. in particular in the time series. 15ff. continues to find a high growth impact of male secondary and tertiary schooling. However. even the direction of the effect has become a matter of debate. Kim (1995) data set on educational achievement) are only available for a single year and thus not usable in panel specifications.g. macroeconomic empirical evidence is so unreliable that it would be misleading to quote any specific figures referring to estimates of the effect of education on growth. i. but the full difference in earnings due to education . in a production function framework without explicit consideration of human capital. in reality. 6). it has to be clarified that for measuring productivity gains. The problem is that.has to be taken into account. or. p. the following section offers a more structured discussion of these issues. generally also get more education (Psacharopoulos 15 . The underlying idea is that factor prices are set in line with factor productivity so that the wage differential reflects the increased productivity of labor due to additional education. the Mincerian rate of return can be introduced as a direct component of Total Factor Productivity (see the description of the dual approach to growth accounting in Barro 1998. the increased value of human capital. p. and (2) the problems of data availability and quality. Pritchett (1997. the measured earnings increment does not necessarily reflect only the individual’s gains in productivity. 5) for instance.analysis is confined to Africa or other regions of the developing world. p. While labor economists generally agree about the sign and the approximate size of the coefficient in private wage equations. equating private returns to education with the individual’s productivity gains through education is an extreme oversimplification.without any reductions for the cost of education . At first. The corresponding formula can easily be reformulated in terms of the Mincerian rate of return. While some of the possible problems have already been mentioned in the above literature overview. might be the reason for his or her higher income. Rudman and Wößmann 2000.e.2. Recent studies of growth accounting are generally based on this type of approach (Gundlach. there is considerably less clarity about what this coefficient actually means. Two issues will be dealt with here: (1) The difficulties to correctly interpret the coefficient in the private wage equation with respect to productivity gains in education. 8).1. which. Alternatively. not the private rate of return to education. at the same time. and why those who mathematically deduce macroeconomic results from microeconomic evidence generally come to clearer conclusions than supported by direct empirical evidence on the macro level. 3. The interpretation of the coefficient in the private wage equation In the first place. variable interlinkages and other stumble stones There are various reasons why the micro level evidence is not reflected at the macro level. defines the value of the stock of human capital as the discounted value of the wage increment due to education. 3. Higher educational attainment might at least partly reflect the individual’s innate abilities or determination. Those more able a priori. Data problems. the coefficient of the private wage equation. put otherwise.2. 13). p. p.) for instance argues. Since there is a strong negative correlation between women’s education. For an overall review of the relevant literature see Card (1999). 347) note that the predominance of the latter depends on factors like the rationing of the labor market. and that it may be particularly strong in poor countries with traditional systems. 1328). However. especially at the primary level. In the same way. Barro 16 . educational attainment and income. p. hidden unemployment and the dominance of employment in the public sector. The problem to accurately separate out the effects of the different dimensions of human capital appears in a similar way on the micro and on the macro level. results of the natural experiments are not really conclusive with respect to judging the signaling or screening effect (Temple 2000. have a relatively high income later. They will offer higher wages to the more highly educated person even if actual ability is the same. pp. The externalities of education mentioned in section 2. a person’s social background is clearly related to both. Therefore. Timmermann and Graff (1995. a child has high chances to both. Temple (2000. During the 1990s some authors have attempted to clarify the relative importance of signaling through the use of natural experiments. other effects rather tend to provoke an underestimation. there is a risk that the influence of education will be biased downwards since it can assert its influence partly via these other channels artificially held constant. However. if employers interpret different educational attainments as a sign of higher ability. While signaling could lead to an overestimation of productivity gains through education.1994. the positive effect of female education may be reflected by the coefficient of the latter. to find out to what extent higher earnings are due to a positive effect of education and to what extend they just reflect the individual’s background variables (signaling effect). Moreover. analyze a sample of identical twins whose background variables are obviously identical. and. 24) argues that social returns might not be appropriately captured in traditional earnings functions. It is therefore very difficult.2. and Quiggin (1999) on the other hand. that the insignificant effect he finds for women’s education on growth might be related to the fact that he corrects for fertility. even if he or she does not learn much there. go through many years of education. Ashenfelter and Krueger (1994) for instance. if not impossible. if an attempt is made to control for the influence of other dimensions of human capital. 16f. For differing opinions on the importance of the signaling effect see Weiss (1995) on the one hand. Barro (1996. it is not actual ability but the employers’ perception that really matters. and fertility. p. Coming from a wealthy and influential family. imply an increased productivity of children and neighbors which is obviously not taken into account in the individual’s private wage equation. pp. assume that returns to human capital are constant across countries (Schultz 1999. Gelb. payment structures rewarding social connections rather than skill. The discussion in section 2. Domestic and external trade policies in many African countries have been particularly favorable for this kind of economic behavior. pp. it means an additional year of primary schooling in most low-income countries. extreme regulation of the private sector.) classifies countries according to different indicators of inequality and political repression.). Moreover. one might suspect that it should be stronger in the latter. however. 50ff. and the reduction of competition through sealing off from foreign markets have been well known characteristics of most African countries during the last decades (Collier and Gunning 1999. 8ff. 10ff. A further problem is related to the fact that the coefficients in the private wage equations highly depend on the national context: the supply of skilled labor. pp. The task to disentangle the different effects therefore seems to be even more difficult in a region like Africa than for OECD countries. The sign of the coefficient for primary education turns from negative to positive. Knight and Sabot (1991) empirically show the detrimental effect of the absorption of “surplus“ educated labor in the public sector. Private returns on education will greatly overestimate the impact of education on productivity in countries where people have a high incentive to rather invest their human capital into rent seeking and directly unproductive activities (Pritchett 1997. and shows that the effect of education on growth depends on these variables. but remains insignificant. Graff (1999. Thus in the context of a particularly 17 . The positive impact of education on health and reduced fertility is mainly found at the level of basic education. and private sector as well as public sector demand for human capital.2 showed considerable differences between regions and even within the African region alone.). p. Extreme expansion of public sector employment. lack of accountability of civil servants. While an additional year of education in industrialized countries generally means an additional year at the upper secondary or tertiary level. corruption at commercial courts leading to considerable difficulties in contract enforcement. Comparing the industrialized and developing countries with respect to the problem of interdependence of different dimensions of human capital.does not find much change in his results when he omits fertility from his growth equation. countries vary widely in the extent human capital can be expected to be used for productive activities. Many of the macroeconomic growth regressions. 73). it becomes less surprising to see a low. they are generally not linked to the human capital variable as the above argument would suggest. including self-employed and own-account workers and the economically non-active population. is equally problematic because it involves estimating nonwage and even non-monetary earnings. However. There may be still other reasons why human capital is not always invested in productive activities: In Africa. Since taking part in the labor force is a choice that is itself dependent on education (see Table 2 in section 2. studies restricting analysis to wage labor might well underestimate the impact of education. The above arguments suggest that the sign of the coefficient might be sensitive to an adequate combination of the human capital variable with policy variables such as corruption indices.badly managed country. additional education. insignificant or even negative coefficient of education in a growth regression for the African continent. A further problem relating private returns measured at the micro level to macroeconomic growth can be the possible sample selection bias in microeconomic earnings studies (if not corrected for by econometric methods). public employment policy indicators. one can say. p. that although there exists considerable unanimity concerning the positive private returns to education. can actually lead to a negative effect on growth.). The latter might lead to an upward bias of average returns to education for this region as a whole for reasons of geographical selection.2. and dummies for war periods. and because the different groups of income are difficult to compare. and in Côte d’Ivoire. All in all. only 7% of women and 26% of men receive hourly wages.g. the shares are 4% and 19% respectively (Schultz 1999. it is highly relevant for low-income countries where only a relatively small share of the population participates in the labor force and receives money wages. for example. international and civil wars have greatly impeded the productive use of human capital. it is not actually clear how this result has to be interpreted in terms of 18 . more than on any other continent. though privately profitable. Microeconomic studies on returns to education are generally not carried out in war torn countries for the simple reason of non-availability of the relevant micro data. While policy variables have frequently been introduced in growth regressions as separate explanatory variables (e. In Ghana. If these aspects are taken into account. even though private returns to education have been shown to be particularly high. 78). While this effect is irrelevant for industrialized countries. Collier 1999). or underestimated.2. Plotting the shares of the population with primary. the regression of growth rates on levels should lead to the problem of non-stationary residuals. this would be inconsistent with the strongly positive coefficient found in the micro level private wage equations.productivity gains for the economy as a whole. In general. Measurement and interpretation of the human capital variable in growth equations Empirical analysis of endogenous growth has relied on differing model specifications. while earlier studies regressing growth rates on education levels more often find the expected significant and positive effect of education. Interpreted as an indicator of productivity. On the other hand. The most common specifications in the tradition of Romer (1990) imply that the initial stock of human capital positively influences growth via the development of ideas and inventions. though possibly related explanation.) seriously questions the empirical analysis based on this type of models. when these regressions are carried out in first differences . that the implausible results reported by Pritchett and others might be caused by outliers. the coefficient of education in the private wage equation tends to encompass much more than just productivity effects. Pritchett (1997. 24). He therefore proceeds with a regression of growth rates on change in educational attainment. However. he indicates that on purely econometrical grounds. 3. not all relevant productivity effects are captured by the coefficient. On the one hand. They explain the problem of implausible regression results – in particular.2. Moreover. secondary and tertiary attainment according to Barro and Lee (1996) for each of 21 OECD countries over time. Though relevant for all regions of the world. it is not always clear to what extent national calculations are based on a representative sample of the population or corrected for sample selection bias in an appropriate way. pp. they find unexplainable sharp breaks and shifts in attainment levels. empirical evidence from crosscountry regressions has been much more successful in finding a positive link between growth and the initial level of education than between growth and changes in education (Temple 2000. he comes to rather unintuitive insignificant or even negative results. it appears that all the problems discussed above have an even stronger impact in developing countries than anywhere else in the world. and with measurement errors concerning educational variables. Temple (1999) argues. Moreover. the expected positive relation reappears. in their comparison of educational attainment according to various data sources. they find that recent OECD data show secondary attainment rates which are more than twice as high as 19 . depending on the relative strength of either effect.with period specific shocks through unmeasured variables. His main argument is that if the positive effect of education was primarily related to spillover effects. De la Fuente and Doménech (2000) find another. When some of these are eliminated from the sample. it could thus be either over. p. 35f. Moreover. Figure 4 shows 2 The initial Barro-Lee data set from 1993 contains a considerable number of even more extreme cases. This is true in particular at the primary and secondary levels where the coefficient of correlation is only 0. and at least until the early 1980s. such as the rise of attainment levels (primary and above) in Botswana by 30 percentage points from 45. it is far from convincing for the more homogenous group of OECD countries.4% tertiary. as well as about variables such as wars and civil wars which can heavily influence the size of the adult population (denominator) is necessary to judge each individual country case.4% to 75. Out of 25 African countries for which complete time series are available. They show that while the coefficient of correlation of these data series is respectable for the whole sample of countries (0. only 32. Data for these countries have been revised in the 1996 data set.those reported by Barro and Lee for six out of twenty countries.) also compare the two most commonly used data sets for years of schooling from Barro and Lee (1996) and Nehru. It can be assumed that the correlation for a homogenous set of low-income countries in sub-Saharan Africa would be equally low. 20 . 5ff. This is surprising given that overall. Moreover. enrolment increased so heavily throughout the last decades.362 and 0. Indeed Table A1 in Annex 1 shows some surprising trends. mainly because Barro and Lee apparently do not include apprenticeships and other vocational training programs. 2 However. 153) figure for the younger age groups in India! De la Fuente and Doménech (2000. It can therefore be expected. Germany is an extreme case since the share of vocational training programs in secondary education is very high.4% of the population in West Germany completed at least lower secondary education (22% secondary + 10.397 respectively. Table 6. p. Table 2.81). pp. Senegal. According to Barro and Lee. it is more difficult to interpret the available time-series for African countries than for OECD countries. In the four countries Kenya. Background knowledge about the development of national education policies over time. that the problems highlighted by De la Fuente and Doménech multiply when the focus is on developing countries. South Africa and Swaziland the share of the population aged 15 years and over with at least primary attainment is reported to have risen by more than 15 percentage points within a single five-year period. in 1990. Swanson and Dubey (1995). This figure roughly corresponds to the 1997 OECD (2000b. 10 show at least one 5-year period where attainment rates decreased. 9). because many of the former experienced considerable shifts in education policy so that even dramatic changes in attainment over a period of five years do not necessarily need to be impossible. see De la Fuente and Doménech. data problems and measurement errors are particularly strong in developing countries. p. Generally.6% between 1980 and 1985. there are considerable jumps in attainment rates. a country whose education policy has been well documented over the years (see e. one is left with considerable doubt about the quality of the available attainment series. Central Statistical Bureau. They might reflect a non-weighted average of enrolment rates of different population groups in the 1950s. higher than in any other African country and as high as in several European countries of that time. enrolment rates decreased again down to a level of 69%. Overall. The difficulties to distinguish 21 . If a lag of five to ten years is considered for the enrolment rates to translate into adult attainment. during the financial crisis. Thereafter. Figure 4: Barro-Lee attainment rates for Tanzania (for the population aged 15 years and over) At least primary attainment (%) 75 70 65 60 55 50 45 40 1960 1965 1970 1975 1980 1985 1990 Source: Barro and Lee (1996) The data shown seem extremely implausible. They start from an extremely high level.g. however. the development of attainment rates from 1980 onwards seems to be reasonably well depicted in Graph 4. but restarted even more strongly in the 1970s (see UNESCO 1960. Lambert and Sahn 2000). education is only one aspect of human capital. gross primary enrolment rates rose indeed from 34% in 1970 to 53% in 1975. Until the late 1970s Tanzania dramatically increased its enrolment capacity with the objective of reaching Universal Primary Education. including Europeans. and reached their peak of 99% in 1977. between 1960 and 1990 attainment rates would have considerably decreased. enrolment rates grew significantly during the 1950s. various issues). the positive trend slowed down. there is the statistical problem of constructing relevant indicators. Afterwards. For the population as a whole. As already mentioned. All in all. in particular between 1981 and 1988.the example of Tanzania. Besides measurement error. According to the World Development Indicators (World Bank 1999). These initial figures from the 1960s seem to be greatly overestimated. which should be reflected by an upward trend of attainment rates for the population aged 15 years and older during the 1960s. between the effects originating from schooling and those originating from improved health have already been discussed. work experience should certainly be integrated more frequently into macro-level equations. the dimension of education quality (as opposed to quantity) seems to be even more important at the macro. p. varies across countries between a formal duration of four years and a formal duration of ten years (UNESCO 1998. To reflect the different dimensions of human capital more fully. Table 3. it is obviously not education quantity alone that matters. the formal duration of primary schooling is lowest in Angola and Sao Tome and Principe (four years) and highest in Libya (9 years). and also to be more consistent with microeconomic specifications. This means that the average nine-year old primary student in the Philippines will receive the same amount of instruction within a single year as a student of the same age in Uruguay within 2. 3-7ff. Thus primary attainment corresponds to very different realities in different countries.than at the micro-level. Hanushek and Kim (1995) construct a new data set based on educational achievement in mathematics and science as 22 . cross-country comparisons on the basis of these indicators are not unambiguous. 169).3 years. annual hours of instruction for a nine-year old student vary between 455 hours in Uruguay and 1067 hours in the Philippines. there is the aspect of work experience. Moreover. pp. This is why more recent studies concentrate on attainment data and average years of schooling at different levels of education. for instance. Surprisingly.1. Hanushek 2000. additional years of education are worth nothing if these competencies are not really acquired. just as on the micro-level. at the aggregate level. it is generally neglected in macroeconomic growth regressions. Work experience is a factor regularly taken into account at the micro-level. Table 36. even for the educational component of human capital alone. Moreover. at least during periods of rapid educational and demographic transition as experienced by many developing countries (Barro and Lee 1993.). p. the choice of adequate indicators is a matter of discussion. Among the 13 non-OECD countries covered by the corresponding indicator in OECD (2000b. Moreover the actual instruction time during one year in school varies considerably between countries. It has been widely acknowledged in the recent literature that enrolment rates are only very poor indicators of the stock of human capital. 366. 2). as long as additional information on the structure of the school system and instruction time is not taken into account. They represent neither the stock of human capital. In Africa. Actually. While an individual might earn higher wages because more years of education signal higher competencies to the employer. nor its change over time. However. Moreover. Pointing out the crucial importance of education quality for growth regressions. p. The national concept of primary education. However. Its introduction into the regression considerably reduces the positive effect attributed to education quantity (Hanushek and Kimko 2000.measured by the International Association for the Evaluation of Educational Achievement (IEA) and the International Assessment of Educational Progress (IAEP). There is only a single observation for each country. In their original estimation procedure. and robust with respect to the introduction of additional variables. In Africa. education quantity and quality simultaneously. since they measure inputs rather than outputs. Figure 5 plots public expenditure on primary education against the share of students who reached a minimum of 40% of correct answers in standardized tests for the subjects French and mathematics. it also varies considerably with respect to the effectiveness of its use.28) sometimes even obtain negative achievement scores for these countries. Both indicators are. use a single measure combining the information for all years. the coefficient of education quality appears to be consistently high. highly debatable. Expenditure does not only relate to both. so that for these countries. Barrow and Lee 1996 data set. however. for none of the few African countries covered in either data set. 23 . p. In their original analysis as well as in the more extensive testing for robustness by Hanushek and Kimko (2000). p.g. Unfortunately. estimates for the remaining low-income countries in sub-Saharan Africa still remain of debatable quality. 8). schooling quality. 3 For a number of OECD countries IEA and IAEP surveys were carried out repeatedly. Finally. however. In any case.g. all countries below the achievement level of the lowest performer are dropped from the sample. time series of student achievement could be constructed (see e. so that specifications in first differences or panel regressions are not possible. Table 2). Dessus 1999). Hanushek and Kim (1995. positive. original information through IEA or IAEP data is available only for two countries (Mozambique and Swaziland). due to the thinness of observations at this end of the distribution. that it can only be used in model specifications using the level of human capital. in principle. low-income countries are only very badly represented in the data set. observations for more than one year are available. 3 One might therefore be tempted to introduce variables such as public expenditure on education or student-teacher ratios as proxies for education quality (e. Barro 1991. The limited number of observations for low-income-low-attainment countries also restricts the possibility of estimating achievement values for these countries in order to include them into the authors’ augmented data set. Hanushek and Kim. For five francophone African countries for which separate direct information on student achievement of fifth graders has been collected by the conference of their education ministries (CONFEMEN 1999). A second problem of the achievement data set is. 5 2. even though factors like differences in equipment. one could equally argue that possible endogeneity problems at the micro level – due to the fact that demand for enrolment will be higher 24 .4 . at best. it is extremely low in Côte d’Ivoire and Senegal.6 . 21f. Hanushek (1998. while micro level studies at school and classroom level rather find a positive than a negative relationship between class size and achievement.8 . p.9 . Curiously.5 . averages 1985-95 Source: Michaelowa (2000. However.g. the link to education quality is equally problematic. It can be shown in the specific African context as well.) comes.7 Madagascar Cameroon Burkina Faso .5 Public expenditure for primary education (% of GNP) . p. According to the survey of primary education expenditure in Uganda by Ablo and Reinikka (1998) for instance. to a very mixed result. are controlled for (Michaelowa 2000. Mingat and Suchaut 1998. p. In his overview over more than 250 studies regressing education outcomes on student-teacher ratios (and other variables) Hanushek (1998.3 . p. 15) No direct relationship between expenditure and achievement can be observed. While the efficiency of expenditure with respect to education quality seems to be relatively high in Madagascar.5 1. pp.Figure 5: Educational expenditure versus educational achievement 1. Concerning class size or student-teacher ratios.12ff. urban or rural environment etc. more than 70% of non-wage expenditure never even reached the schools.0 2.0 1.). macro studies tend to show the expected negative correlation. Moreover.0 Share of students with at least 40% of correct answers .0 3. that there is no clear evidence for a negative correlation between class size and education quality. 29). Cameroon and Burkina Faso take intermediate positions.5 Côte d'Ivoire Senegal 3. there is plenty of evidence on inefficient public spending on public services in Africa. 23) explains this effect with the problems of aggregation and the correlation of student-teacher ratios with other relevant policy variables at the state level which would make aggregate estimates rather unreliable. The missing direct link is confirmed by other studies (see e. the interpretation of this result in terms of its overall economic relevance is ambiguous. empirical analysis fails to provide commonly agreed and reliable estimates of this effect. in a joint project financed by the World Bank. and it remains difficult to provide clear evidence of the benefits of education at the aggregated level. efforts should be concentrated on the improvement of data on educational indicators. Increasingly. restricted data availability and measurement errors cast considerable doubt on the reliability of growth regressions on human capital indicators. While the theoretical relevance of human capital as a factor of production and a key to innovation and productivity gains is hardly questioned. Moreover. All in all. A part from an improved collection of new data. the Southern African Consortium for Monitoring Education Quality (SACMEC. Conclusions While private returns to education estimated in microeconomic studies give a clear indication of the positive impact of education for the individual. see Ross 1998) and the Laboratory Project of UNESCO-Santiago (1998) provide comparable data on student achievement for anglophone African and Latin-American countries respectively. the OECD and the UNESCO are trying to bring about a considerable improvement of the reliability and cross-national comparability of conventional quantity and input based education indicators for about 20 developing countries (World Education Indicators. the low income countries of sub-Saharan Africa. see OECD 2000b. it is even more difficult to give an indication of the impact of education on productivity and growth. it would be necessary to undertake a restructuring of the political and economic framework.in good schools – might not be relevant for the cross-state or cross-country analysis. In the future. ongoing project). for the time being. that given the highly intransparent and inefficient political and economic systems of many of these countries. For developing countries such as. so that one should rather trust the macro level evidence. the relevance of this kind of policy suggestions cannot be 25 . for instance. Besides PASEC. This means that in order to increase the relevance of education for economic growth. a retrospective revision of data for the 90s is foreseen in the future to permit a trend analysis. much of the private returns to education are achieved through non-productive activities. in particular concerning non-OECD low-income countries such as those of the African continent. There are good reasons to believe. in particular. Some useful work is already under way. the program carried out under the responsibility of the CONFEMEN (1999) in francophone Africa. conceptional problems. standardized school surveys on educational achievement also cover low-income developing countries. 4. Some work still needs to be done to clarify this issue. However. 26 . for low-income countries even more than for others. And as long as even the most general results concerning the overall impact of education cannot be answered. One major problem. empirical studies at the aggregate level cannot be expected to come to generally agreed and consistent conclusions. In particular. since macroeconomic estimates of the overall effect of education on growth are not sufficiently robust. So far. with respect to the important factor of education quality. such as how to make the education system more efficient. aggregate approaches do not offer any consistent insight concerning these issues.deduced from empirical evidence. which part of the system to support most. is the incompleteness and inconsistency of current data sets for the stock of human capital. As long as these problems persist. comparable data on African and other low-income countries are extremely limited. At the current stage of empirical growth analysis. are best analyzed at the micro level. how to reduce possible political barriers to the productive use of human capital etc. important questions. this is even more the case for the more detailed policy relevant questions lying behind. 8 43.8 47.7 30.2 62.4 49.4 9.9 23 25.2 Lesotho 66.9 12.1 35. 27 .8 84.1 13.Annex 1 Table A1: Share of population aged 15 and over with at least primary attainment.8 39.4 Sudan 12.6 63.1 10.6 65.9 55.3 35.9 22.9 33 48.7 35.1 26.6 38.1 61.5 14.7 35. Source: Barro and Lee (1996).5 Note: Figures provided here are calculated as the sum of primary.6 52.9 36. secondary and tertiary attainment rates.3 57.7 Liberia 10.3 9.6 Tanzania 69.7 Mali 5.5 68.8 36.4 60.1 45. Republic 7.3 20.8 6 7.9 Uganda 25.5 56.2 Zambia 45.4 34 34.9 21.7 Botswana 34.8 37.7 55.3 41 46 51.2 54.7 6.5 17.9 20 24.4 50.7 30.7 53.6 38.1 58.2 43.8 9.3 Malawi 36.9 80.7 49.1 40.6 Central Afr.7 66 70.1 69.5 35.1 49 Kenya 29.1 27.8 73.2 Mozambique 14.8 11.3 58.6 30 35.9 35 38.4 26.5 34 Swaziland 34.5 13.4 57.9 Zaire 19.1 15.7 58.3 64.3 Tunisia 9 15.5 18.9 28.3 19.7 23.1 50.9 Senegal 36.6 Ghana 20.4 15.5 22.3 12.1 60. African countries (in %) 1960 1965 1970 1975 1980 1985 1990 Algeria 20 18 26.8 65.4 59.6 32.8 46.1 46.2 55.9 9.9 28.3 47.5 42.6 45.3 11.7 41.9 39.1 57.4 56.4 Sierra Leone 7.4 68.3 47.8 10.8 69.7 17.1 35.5 31.3 60.7 73.1 51 51.3 64.4 42.4 78.4 South Africa 54 55 60.9 20.2 61.3 21 25.4 38.9 71 Zimbabwe 47.5 50.2 48.7 Mauritius 60.2 44.6 83.7 69.2 35.2 60.7 32.2 33.9 33.9 43.3 66.2 Niger 6 5.2 30.2 84.8 13.2 Cameroon 28.7 33.9 26.7 Togo 5. in: Review of Economics and Statistics. mimeo. background paper for the World Development Report 1995. Emanuel and Ritva Reinikka (1998): Do Budgets Really Matter? Evidence from Public Spending on Education and Health in Uganda. (1998): Notes on Growth Accounting. 32. NBER Working Paper No. Vol.): Social Tensions.ox. Robert J. Cambridge MA Barro. Paris. in: Journal of Monetary Economics. and Xavier Sala-i-Martin (1995): Economic Growth. No. 407-443 Barro. 106. Vol. 6654.References Ablo. Gerardo Esquivel and Fernando Lefort (1996): Reopening the Convergence Debate: A New Look at Cross-Country Growth Evidence. McGraw Hill. No. Vol. No. 2. pp. in: Ashenfelter. 363-394 (for the data see:. Orley and D. 143-173 Bils. (1990): Women’s Schooling and Nonmarket Productivity: A Survey and a Reappraisal. pp. 32. 2. 84. Mark and Peter J. Washington DC Ashenfelter. Orley and Alan Krueger (1994): Estimates of the Economic Return of Schooling from a New Sample of Twins. Jere R. 2. 1157-1173 Assaad. No. 1926. Nancy. (1994): The Role of Human Capital in Economic Development. in: American Economic Review (forthcoming) Birdsall.nuff. No. 69-91 Barro. pp. (1996): Determinants of Economic Growth: A Cross-Country Empirical Study. 218-223 Behrman. D. Robert J. Robert J. pp. 4. Colm Foy and Guillermo Larraín (eds. (1999): The Causal Effect of Education on Earnings. pp. Klenow (2000): Does Schooling Cause Growth. Ragui (1994): The Effect of Public Sector Hiring and Compensation Policies on the Egyptian Labor Market. Card (eds. 1. in: Quaterly Journal of Economics. Dale and John Heywood (1991): Sheepskin Effects in the Return to Education. and Jong-Wha Lee (1996): International Measures of Schooling Years and Schooling Quality. Jess and Spiegel Mark M. Francesco. Amsterdam 28 . Robert J. Vol. 363-389 Card. 2. A. in: American Economic Review. (1990): The Role of Maternal Schooling and its Interaction with Public Health Programs in Child Health Production. pp. in: Journal of Development Economics. in: Journal of Monetary Economics. David Ross and Richard Sabot (1995): Inequality as a Constraint on Growth in Latin America. Papers and Proceedings Vol. in: Turnham. No. pp. Robert J.ac. in: Journal of Economic Growth. No. 720-724 Benhabib. Vol. pp. 1.): Handbook of Labor Economics. David. OECD Development Centre. 34. Vol. and Jong-Wha Lee (1993): International Comparisons of Educational Attainment. Job Creation and Economic Policy in Latin America. 86. Vol. Evidence from Aggregate Cross-Country Data. University of Pennsylvania Belman. 5689. World Bank Policy Research Working Paper No.htm ) Barro. Robert J. pp. World Bank. 73. 175-208 Caselli. NBER Working Paper No. 5. Vol 3A. (1991): Economic Growth in a Cross Section of Countries. Cambridge MA Barro. in: American Economic Review. New York Barro. North-Holland. Washington DC Barrera. Kiel Institute of World Economics. Rosenzweig (1995): Learning by Doing and Learning from Others: Human Capital and Technical Change in Agriculture. Alan. Evidence from Ghana. 267-290 Glewwe. Rent Seeking. 103.42-43. Susan H. 34. (1998): The Evidence on Class Size. and Economic Growth. in: Journal of Economic Perspectives. Dakar De la Fuente. Vol. and Economic Growth. No. Angel and Rafael Doménech (2000): Human Capital in Growth Regressions: How Much Difference Does Data Quality Make?.Central Statistical Bureau. No. Knight and Richard H. in: Journal of Economic Development. in: Journal of Development Economics. 124-159 Glewwe. Cambridge MA Hanushek. Michael (1999): Educational Imbalance. in: American Economic Review (forthcoming) 29 . pp. Vol. Vol. Eric A. 168-183 Collier. Occasional Paper No. in: Economic Journal. Kiel Gurgand. in: Oxford Economic Papers. Paul (1996): The Relevance of Standard Estimates of Rates of Return to Schooling for Education Policy: A Critical Assessment. 101. Vol. CD-ROM. 51. Vol. Labor Force Quality. mimeo. Kimko (2000): Schooling. 13. United Republic of Tanzania (various issues): Statistical Abstract. 24. and Dongwook Kim (1995): Schooling. pp. 1. Ministry of Economic Affairs and Development Planning. pp. 6. 843-864 Graff. 1-18 Gundlach. 113-144 Hanushek. 3-22 CONFEMEN (1999): PASEC: Les facteurs de l’efficacité dans l’enseignement primaire: données et résultats sur cinq pays d’Afrique et de l’Océan Indien. O´Hara (1980): The Effects of Education on Health. pp. Andrew D. pp. 3. 2. in: Journal of Human Ressources. Vol. in: Journal of Political Economy. in: Journal of Human Ressources. NBER Working Paper No. Vol. Vol. pp. Desmond Rudman and Ludger Wößmann (2000): Second Thoughts on Development Accounting. Sébastien (1999): Human Capital and Growth: the Recovered Role of Education Systems. 1176-1209 Gelb. No. Dar Es Salaam Cochrane. 1186-1199 Glewwe. University of Rochester. Socio-Economic Inequality. 98-1. 405. 51. Eric A. Paul (1999): On the Economic Consequences of Civil War. pp. in: Cahiers d’Economie et Sociologie Rurales. mimeo. pp. No. Political Freedom. No. No. No. Allen Wallis Institute of Political Economy. pp.K. Universidad Autónoma de Barcelona and Universidad de Valencia (January) Dessus. World Bank Staff Working Paper No. J. Eric A. Washington DC Collier. Paul and Hannan Jacoby (1994): Student Achievement and Schooling Choice in LowIncome Countries. Rochester Hanushek. and the Growth of Nations. 5399. and Mark R. 29. Sabot (1991): Public Sector Employment. OECD Development Centre (August) Foster. W. mimeo. Erich. Marc (1997): L‘éducation est-elle rentable dans l'agriculture? Une approche duale appliquée a la Cote-d'Ivoire.. Joanne Leslie and Donald J. 3. and Economic Development. Paul (1999): Why Does Mother’s Schooling Raise Child Health in Developing Countries? Evidence from Morocco. Paul and Jan Willem Gunning (1999): Why Has Africa Grown Slowly?. Labor Force Quality. 2. and Dennis D. pp. Geneva Islam. Vol. No. Moyo and T. Vol. No. and J. (1993): Women’s Education. No. 29-48 Mingat. in: Quaterly Journal of Economics. Paris ILO (1998): Yearbook of Labour Statistics. 3: Methodology. mimeo. Paul Schultz (2000): Wage Premia for Education and Location. No. Experience. James J. pp. 942-963 Mankiw. Vol. Child Welfare and Child Survival: A Review of the Evidence. Linskens (2000): Une estimation de la pauvreté en Afrique subsaharienne d´après les données anthropométriques. 82. OECD Development Centre Technical Paper No. and D.-P. pp. in: Human Growth: A Comprehensive Treaty. Sylvie and David Sahn (2000): Incidence of Public Spending in the Health and Education Sectors in Tanzania. study for the French Ministry of Foreign Affairs. in: Econometrica. 4. 2. and Earnings. 407-437 Martorell. Vol.Weil (1992): A Contribution to the Empirics of Economic Growth. Habicht (1986): Growth in Early Childhood in Developing Countries. M. Nazrul (1995): Growth Empirics: A Panel Data Approach. New York Mincer.W.. Johns Hopkins.G. in: Quaterly Journal of Economics. Hanushek (1992): Educational Performance and the Poor: Lessons from Rural Northeast Brazil.in: Economic Development and Cultural Change. Journal of Development Economics. J. Dean and Lawrence Lau (1982): Farmer Education and Farm Efficiency. S. Christian. in: Journal of Economic Growth.Harbinson R. Cooperation and Francophonie. 157. R. pp. Vol. Guilmeau and C. Katharina (2000): Dépenses d´éducation. and the Dynamics of the Wage Structure. Oshikoya (2000): Human Capital and Poverty Reduction. Growth of Human Capital. Paris Mook. Oxford Heckmann. pp. (1979): Sample Selection Bias as a Specification Error. 407-437 Jamison. Columbia University Press. Paris Mwabu. Childhood Malnutrition and Schooling in the Terai Region of Nepal.. 159-175 Hussain. Vol. Jacob (1996): Economic Development. 307-334 30 . 107. 3-4 February. 1. OECD Development Centre. 2. No. Paris Mincer. in: The Health Transition Review. No. 1. Plenum Pub. Vol. Vol. D. 299-309 Lambert. P. 3. 20. Jacob (1974): Schooling. Alain and Bruno Suchaut (1998): Une analyze économique comparative des systèmes éducatifs africains. paper presented at the First International Forum on African Perspectives jointly organized by the African Development Bank and the OECD Development Centre. 20. 2. in: Journal of Development Economics. 47. and Eric A. Oxford University Press for the World Bank. N. by Gender and Race in South Africa. in: American Economic Review. No. No. Vol. Vol. Paris Levine. Leslie (1986). 2. 107. pp. and J. 48. pp.S. H. 1. Ross and David Renelt (1992): A Sensitivity Analysis of Cross Country Growth Regressions. pp. Dean (1986): Child Malnutrition and School Performance in China. Ecological and Nutritional Effects on Growth. New York Michaelowa. Baltimore Jamison. No.N. 33-52 Morrisson. Germano and T.. 1. Romer. pp. qualité de l´éducation et pauvreté – l´exemple de cinq pays d´Afrique francophone. 153-161 Hobcraft. 2. 159. OECD Development Centre Technical Paper No. R. 98. 766-817 Temple. 1. in: Journal of Economic Perspectives. New Haven CT Schultz. 2. Vol. 2. pp. 187-207 Quiggin. S71-S102 Ross. T. Paul (1996): Wage Rentals for Reproducible Human Capital in West Africa. Paul (1999): Health and Schooling Investments in Africa. pp. T. Reading MA Schultz. pp. PHRWD background paper 89/001. E.Nehru. 28. IIEP. 5. pp. Berlin. No. 379-401 OECD (various issues): Education at a Glance. J. 65. 2. in: Journal of Economic Literature.. Jonathan (1999): A Positive Effect of Human Capital on Growth. George (1994): Returns to Investment in Education: A Global Update. V. Duncker & Humblot. No. Jonathan (2000): Growth Effects of Education and Social Capital in the OECD. 26. No. No. paper prepared for the OECD (April) Thomas. in: Journal of Economic Perspectives. 13. Paris OECD (2000a): Education at a Glance. T. Paul (1990): Endogenous Technical Change. Swanson and A.): Bevölkerungsdynamik und Grundbedürfnisse in Entwicklungsländern. (1999): Human Capital Theory and Education Policy in Australia. 89-114 Strauss. J. in: World Development.. Vol. Nutrition and Economic Development. and Nutrition Department. No. pp. No. in: Education Economics. 32. Washington DC Schultz. in: Journal of Political Economy. 2. Vol. pp. 2. T. George and Ying Chu Ng (1994): Earnings and Education in Latin America. Health. 130-144 Romer. 46. pp. Vol. T. Washington DC Psacharopoulos. pp. Vol. in: Hans-Bernd Schäfer (ed. No. mimeo. 1325-1343 Psacharopoulos. Vol. World Bank: Population.) (1998): SACMEQ Policy Research. 13. Strauss and M. D. in: Economic Letters. Methodology and Results. 339-367 31 . 131-134 Temple. 183-211 Timmermann. Paris OECD (2000b): Investing in Education – Analysis of the 1999 World Education Indicators. Ken (ed. Henriques (1991): How Does Mother’s Education Affect Child Height?. Vol. pp.. Addison-Wesley Pub. The Quality of Education: Some Policy Suggestions Based on a Survey of Schools (series of country reports). in: Journal of Human Ressources. No. in: Journal of Development Economics. Vol. Vol. pp. Paris Pritchett. pp. No. Paul (1993): Investments in Schooling and Health of Women and Men. 4. 36. 3. Paul (1981): Economics of Population. 3. No. Paul (1989): Returns to Women’s Education. Vincenz and Michael Graff (1995): Bildung und wirtschaftliches Wachstum in Entwicklungsländern. Dubey (1995): A New Database on Human Capital Stocks in Developing and Industrial Countries: Sources. No. 22.Co.-H. in: Journal of Human Ressources. 694-734 Schultz. Paris Schultz. Lant (1997): Where Has All the Education Gone? World Bank Policy Research Department Working Paper No. Vol. 1581 (revised). Yale University. John (1999): Africa´s Economic Performance: Limitations of the Current Consensus. 9. 2. John and Duncan Thomas (1998): Health. Vol. 67-88 Sender. pp. in: Australian Economic Review. Ashenfelter and D. 9. CD-ROM. Vol.): Handbook of Labor Economics. Amsterdam UNESCO (1960): L’enseignement dans le monde. L. A. 66. Washington 32 . C. Vol. Card (eds. pp. 4. 696-703 World Bank (1999): World Development Indicators 1999. and J. in: Review of Economics and Statistics. Santiago Weiss. North-Holland. in: O.Topel. l’enseignement du premier degré. (1995): Human Capital versus Signaling Explanations of Wages. Behrman (1984): Determinants of Women’s Health Status and Health Care Utilization in a Developing Country: A Latent Variable Approach. B. No. Paris UNESCO-Santiago (1998): Primer Estudio Internacional Comparativo. 133-154 Wolfe. Vol. II. Robert (1999): Labor Markets and Economic Growth. R. Paris UNESCO (1998): ’98 Statistical Yearbook. in: Journal of Economic Perspectives. No. 4. 3C. pp.
https://www.scribd.com/document/202308642/Education
CC-MAIN-2018-43
refinedweb
13,167
50.73
- Overview of the DNS Naming Hierarchy - Planning Your Domain Name - Your Domain Name and the Internet - A Warning About DNS Servers - Summary The first major step to begin the actual planning of your environment's Active Directory infrastructure is to determine your Active Directory DNS namespace. A namespace is an area that can be resolved. A phone book is a good example of a namespace. It is organized by city, a person's last and first name, and address; you can resolve that name to a phone number. DNS uses the namespace to resolve a fully qualified domain name to an IP address. Because Active Directory names are DNS names, you must carefully plan your DNS namespace implementation. This article shows you how to plan your Active Directory name in a manner that is effective and meets the needs of your organization. Overview of the DNS Naming Hierarchy Before planning your DNS namespace for the Active Directory, you need to make certain that you understand some fundamental DNS concepts. If you have worked with DNS in the past or have previously studied DNS, you can skip to the next section. If not, this section serves as a primer or a good review. Domain Name System (DNS) is an industry standard for resolving hostnames to IP addresses. DNS is implemented in Windows 2000 as the naming standard of choice due to its wide usage, reliability, and extensibility. Every time you use the Internet, you are accessing Web sites using DNS. DNS enables us to use a friendly domain name (for example,) to contact a Web site instead of having to remember its IP address (for example, 131.107.2.200). DNS takes care of the resolution process. It is important to understand the DNS hierarchy because it is implemented in the Active Directory. DNS Hierarchy DNS names are made up of a hierarchy structure, consisting of a tree of unique domain names. Each domain contains information about that segment of the DNS namespace. The hierarchy is made up of the Internet root, first-level domains, second-level domains, child domains, grandchild domains, and so forth, as shown in Figure 1. Figure 1 The DNS hierarchy. The Internet root is represented by a ".", and it is the very top of the tree structure. The next level in the tree are first-level domains—such as com, net, edu, org, mil, gov, and so forth. The second-level domains provide the business or organization name in the hierarchy. Child and grandchild domains can exist down the tree for each second-level domain. Within the second-level, child, or grandchild domain, a particular "host" or computer can be contacted, as shown in Figure 2. Figure 2 Resolution to a host computer. When the resolution reaches a host, the name is called a Fully Qualified Domain Name (FQDN). It shows the full relationship of a host computer to the domain, as shown in Figure 3. Figure 3 Fully Qualified Domain Name (FQDN). DNS Zones A DNS zone is a unit established for administrative purposes that contains a discreet and contiguous portion of the namespace. Because a large domain can be difficult to administer, they are often broken into zones so that different administrators can control different zones. Each zone contains at least one name server that contains the portion of the DNS database for that zone. The name server holds the domain name to IP address mappings for that particular zone. One name server holds the primary zone database file, and can make updates or changes to that file. Other name servers in that zone can contain a copy of the primary zone database file—called a secondary zone database file (see Figure 4). The name server with the primary zone database file is referred to as "authoritative" because it can make changes. The name servers that hold the secondary zone database file cannot make changes to the zone database file, but the primary name server can send updates to them through a process known as zone transfer. This process ensures that all name servers within a zone have an exact copy of the zone database file and can resolve DNS requests from client computers. Figure 4 Zones contain name servers that hold the zone database file for that zone. How DNS Name Resolution Works As mentioned previously, the purpose of DNS is to resolve a fully qualified domain name to an IP address. Computers in a TCP/IP network must have this IP address in order to communicate with the desired computer. DNS resolves FQDNs by using a forward lookup query. In a forward lookup query, the following process occurs: A client computer makes a name resolution request to a DNS name server. For example, a client computer in the learnad.com domain requests a resolution for server1.knowad.com. If the name server has authority over that domain, it can return the request. If not, the name server queries a number of other servers to resolve the name. In this example, the name server in learnad.com does not have authority over knowad.com, so the name server sends a request to a DNS root server. The DNS root server returns the address of a com name server, and the learnad.com name server queries that server for the resolution. The com name server checks its database file for knowad. If it finds knowad, it returns the name server for knowad to learnad. The name server in learnad.com queries the name server in knowad.com for the resolution. Then, knowad.com checks its database file and finds Server1. It then passes the IP address for server1.knowad.com back to the name server at learnad.com, which returns the IP address to the client. The client now can establish a TCP/IP connection with server1 and communication with server1, and the requesting client can take place. In most circumstances, DNS resolutions require a number of name servers that have authority over their particular domains or zones. This entire process is invisible to the user.
http://www.informit.com/articles/article.aspx?p=21475&amp;seqNum=5
CC-MAIN-2017-09
refinedweb
1,012
64.51
[ ] Eric Wout van der Steen commented on XALANJ-2409: ------------------------------------------------- We've just switched to Xalan 2.7.1 (from Xalan 2.7.0 with Xerces 2.7.1) and see the same effect. > LSSerializerImpl adds redundant xmlns:xml namespace bindings. > ------------------------------------------------------------- > > Key: XALANJ-2409 > URL: > Project: XalanJ2 > Issue Type: Bug > Components: Serialization > Reporter: Chris Simmons > Attachments: boundxmlprefix.xml, patch3092.txt, TestSerializer.java > > > We switched over when the xerces serializers were deprecated but found tha the xalan serializer insists on adding bindings for the xml namespace. I (and the xerces serializer) believe that this is not necessary - the xml namespace is built-in. > This resulted in our XML being littered with thousands of needless xmlns:xml=... attributes. We've worked around this by making sure we put one on the document root. I'd like to see these attributes not serialized. > I'll attach a test showing this behviour shortly. It shows that xerces didn't add them but xalan does. --
http://mail-archives.apache.org/mod_mbox/xml-xalan-dev/200911.mbox/%3C642624748.1258705360899.JavaMail.jira@brutus%3E
CC-MAIN-2015-22
refinedweb
159
60.51
Red Hat Bugzilla – Bug 469160 Sugar crashes at ru_RU.UTF-8 Last modified: 2013-04-02 00:22:14 EDT Description of problem: Sugar crashes every time when I run sugar or sugar-shell. I think this is a translation problem: Traceback (most recent call last): File "/usr/bin/sugar-shell", line 30, in <module> from main import main File "/usr/share/sugar/shell/main.py", line 30, in <module> from sugar.profile import get_profile File "/usr/lib/python2.5/site-packages/sugar/profile.py", line 24, in <module> from sugar import util File "/usr/lib/python2.5/site-packages/sugar/util.py", line 183, in <module> AND = _(' and ') File "/usr/lib/python2.5/site-packages/sugar/util.py", line 26, in <lambda> _ = lambda msg: gettext.dgettext('sugar-toolkit', msg) File "/usr/lib64/python2.5/gettext.py", line 532, in dgettext codeset=_localecodesets.get(domain)) File "/usr/lib64/python2.5/gettext.py", line 480, in translation t = _translations.setdefault(key, class_(open(mofile, 'rb'))) File "/usr/lib64/python2.5/gettext.py", line 180, in __init__ self._parse(fp) File "/usr/lib64/python2.5/gettext.py", line 317, in _parse self.plural = c2py(plural) File "/usr/lib64/python2.5/gettext.py", line 93, in c2py raise ValueError, 'plural forms expression could be dangerous' ValueError: plural forms expression could be dangerous I think this is gettexts bug, not sugar. but i can be wrong. It's a Python bug. It chokes on parsing plural spec '(n%10==1 && n%100!=11 ? 0 : n%10>=2 && n%10< =4 && (n%100<10 or n%100>=20) ? 1 : 2)' Apparently python gettext doesn't support that complex plural specs. IMHO that could be a valid feature request, but the short time workaround would probably be to make sugar catch and ignore the exception somehow - or to fix the translation. More specifically, the problem is the "or" in the plural spec. It has to be more c-ish "||". seems to be the "definition" of valid plural specs. It mentions the following russion plural spec: Plural-Forms: nplurals=3; \ plural=n%10==1 && n%100!=11 ? 0 : \ n%10>=2 && n%10<=4 && (n%100<10 || n%100>=20) ? 1 : 2; Alright, so not a Python bug then. So the problem was in the po file, someone added a line break in the plural form equation. Making sugar not choke here is an interesting subject which we need to look at more closely. As far as i understood it, if we catch the error we would need to change our initial gettext imports to not result in unpredictable behaviour. For now Sayamindu fixed the ru.po:;a=commit;h=856c84b523aaeafdda80e7969636ebd9fe029dff I have a built a new sugar-toolkit with the fixed po No I have: Traceback (most recent call last): File "/usr/bin/sugar-shell", line 30, in <module> from main import main File "/usr/share/sugar/shell/main.py", line 32, in <module> import view.Shell File "/usr/share/sugar/shell/view/Shell.py", line 38, in <module> from view.frame import frame File "/usr/share/sugar/shell/view/frame/frame.py", line 29, in <module> from view.frame.activitiestray import ActivitiesTray File "/usr/share/sugar/shell/view/frame/activitiestray.py", line 33, in <module> from model import shellmodel File "/usr/share/sugar/shell/model/shellmodel.py", line 24, in <module> from model.devices.devicesmodel import DevicesModel File "/usr/share/sugar/shell/model/devices/devicesmodel.py", line 25, in <module> from model import network File "/usr/share/sugar/shell/model/network.py", line 23, in <module> from sugar import dispatch ImportError: cannot import name dispatch That is not related to the first bug. It seems to be a bug in the sugar package or one of its dependencies. I suggest you file another bug and include the stacktrace and the output of rpm -qa 'sugar*' $ rpm -qa 'sugar*' sugar-datastore-0.8.3-2.fc10.noarch sugar-artwork-0.82.3-1.fc10.i386 sugar-terminal-16-2.fc10.noarch sugar-emulator-0.82.9-4.fc10.x86_64 sugar-write-59-1.fc10.noarch sugar-artwork-0.82.3-1.fc10.x86_64 sugar-presence-service-0.82.2-1.fc10.noarch sugar-calculator-23-2.fc10.noarch sugar-toolkit-0.82.11-2.fc10.x86_64 sugar-journal-99-3.fc10.noarch sugar-base-0.82.2-2.fc10.x86_64 sugar-browse-99-1.fc10.noarch sugar-log-16-1.fc10.noarch sugar-moon-8-2.fc10.noarch sugar-chat-47-1.fc10.noarch sugar-0.82.9-4.fc10.x86_64 Yeah the sugar-base package is faulty. I rebuilt it - can you have a look if that fixes it for you? [sugar-base-0.82.2-4] Thanks Actually please use #472472 from now for the import error described above - nothing to do with the original po file bug. This bug appears to have been reported against 'rawhide' during the Fedora 10 development cycle. Changing version to '10'. More information and reason for this action is here: Fixed in F10.
https://bugzilla.redhat.com/show_bug.cgi?id=469160
CC-MAIN-2018-30
refinedweb
837
52.36
by Jamie Kyle Setting up Flow when you’ve already got Babel in place Flow is a static type checker for JavaScript. It makes you more productive by providing feedback as you write code. Flow gives you warnings in real-time that point out when you’ve made a mistake. If you would like to know more, check out flowtype.org. Rather than trying to build it’s own entirely separate ecosystem, Flow hooks into the existing JavaScript ecosystem. Using Babel to compile your code is one of the easiest ways to integrate Flow into a project. After two years of hard work, Babel works pretty much everywhere, just take a look at the setup page with integrations for every build tool you can imagine. If you don’t have Babel set up yet, you can use that guide to get set up. You also might want to checkout my handbook on Babel. Setting up Flow on top of Babel Once you have Babel set up, it’s easy to get going with Flow. First lets install two dependencies: $ npm install --save-dev babel-plugin-transform-flow-strip-types$ npm install --global flow-bin The Babel plugin is there in order to strip Flow types away so that your program runs. flow-bin is how you use Flow from the command line. Next, let’s add the Babel plugin to your .babelrc (or where-ever you are configuring Babel with options): { presets: [...], plugins: [..., "transform-flow-strip-types"]} Note: I’m assuming you are using Babel 6 for this tutorial. It is recommended that you upgrade if you have not already. Finally we’ll run flow init in our directory, which will create a .flowconfig file that should look like this: [ignore] [include] [libs] [options] Awesome! Now we have Flow all set up in your project. How about we start making it run on some files? Getting Flow running Flow is designed to be introduced to your repo incrementally. That means that you don’t have to add it to your whole codebase all at once. Instead, you can add it file-by-file as you go. Let’s start with something simple to get you going. First, try to find a file that doesn’t have a lot of complexity or external dependencies. Something with just a handful of plain functions to get started with. import {getNumberFromString} from "string-math-lib"; export function multiplyStrings(a, b) { return getNumberFromString(a) * getNumberFromString(b);} In order to get Flow running on this file, we need to add a “flow pragma” comment at the top like this: // @flow import {getNumberFromString} from "string-math-lib"; export function multiplyStrings(a, b) { return getNumberFromString(a) * getNumberFromString(b);} This little comment at the top of the file tells Flow “Okay, I want you to type-check this file”. Now we need to actually run Flow for the first time. In order to do that, you’ll need to switch back to your terminal and run the following command: $ flow Note: This command is an alias of flow status. What this command does is start up a Flow server and asks it for the “status” of your repo, which will most likely return some errors for you to fix. The most common errors that you’re gonna see in a new file are: - “Missing annotation” - “Required module not found” These errors are related to imports and exports. The reason they come up is a result of how Flow works. In order to check types across files, Flow looks directly at the imports and exports of each file. “Missing annotation” You’ll see an error like this from Flow because it relates somehow to an export of your file. Other than that Flow won’t complain about missing type annotations. So in order to fix that, we can start adding some types to your file. For a detailed guide on how to do that see the user guide. What you should end up is with some types like this: import {getNumberFromString} from "string-math-lib"; export function multiplyStrings(a: string, b: string): number { return getNumberFromString(a) * getNumberFromString(b);} Keep running flow as you add your types to see the effects of what you are doing. Eventually you should be able to clear out all the “Missing annotation” errors. “Required module not found” You’ll get these errors whenever you an import/require that can’t be resolved using Node’s normal module algorithm or if you have ignored it with your .flowconfig. This can be caused by a lot of things, maybe you’re using a special webpack resolver, maybe you forgot to install something. Whatever the reason, Flow needs to be able to find the module you are importing to do its job correctly. You have a couple options on how to solve this: - module.name_mapper — specify a regular expression to match against module names, and a replacement pattern. - Create a library definition for the missing module We’ll focus on creating a library definition for the module, if you need to use module.name_mapper you can see more about it in the documentation. Creating a library definition Having library definitions is useful for giving types to the packages you have installed that don’t have types. Let’s set one up for our string-math-lib library from the previous example. First create a flow-typed directory in your root directory (the directory where you put your .flowconfig). You can use other directory names using the [lib] section of your .flowconfig. However, using flow-typed will work out of the box. Now we’ll create a flow-typed/string-math-lib.js file to hold our “libdef” and start it off like this: declare module "string-math-lib" { // ...} Next we just need to write definitions for exports of that module. declare module "string-math-lib" { declare function getNumberFromString(str: string): number} Note: If you need to document the “default” or primary export, you can do that with declare module.exports: or declare export default There’s a lot more to library definitions so you should read through the documentation and read this blog post on how to create high-quality libdefs. Installing a libdef from flow-typed Because libdefs can consume a lot of time, we maintain an official repository of high-quality libdefs for all sorts of packages called flow-typed. To get started with flow-typed, install the command line interface (CLI) globally: $ npm install --global flow-typed Now you can look within flow-typed/definitions/npm to see if there’s an existing libdef for a package you want to use, if there is you can install it like this: $ flow-typed install chalk@1.0.0 --flowVersion 0.30 This tells flow-typed that you want to install the chalk package at the 1.0.0 version when you are running Flow 0.30. The flow-typed CLI is still in beta and there is a lot of improvements planned for it, so expect this to improve a lot in the near future. Be sure to contribute back to the flow-typed libdefs. It’s a community effort, and the more people that contribute, the better it gets. Other errors you might run into: Hopefully, we’ve covered just about everything that you will run into while getting started with Flow. However, you also might run into some errors like this: - Package inside of node_modules is reporting errors - Reading node_modules is taking a really long time - Malformed JSON inside node_modules is causing errors There’s a handful of reasons for these types of errors that I won’t get into in this post (I’m working on detailed documentation for each individual error). For now, in order to keep yourself moving, you can just [ignore] the files that are causing these errors. This means adding file paths to your [ignore] section in your .flowconfig like this: [ignore]./node_modules/package-name/*./node_modules/other-package/tests/*.json [include] [libs] [options] There is generally better options than this, but this should give you a good place to start. For some examples of how to better handle errors within node_modules see this Stack Overflow answer about fbjs. Pro tip: Checking to see how well you’re covered If you’re ever wondering how well a file is covered by Flow, you can use the following command to see a coverage report: $ flow coverage path/to/file.js --color Additional Resources and Support There’s lots that was not covered by this article. So here are some links to resources that can help you out. The Flow team is committed to making sure that everyone has an excellent experience using Flow. If that is ever not true, we’d love to hear from you about how to improve. Follow James Kyle on twitter. Follow Flow on twitter too.
https://www.freecodecamp.org/news/using-flow-with-babel-c04fdca8d14d/
CC-MAIN-2021-49
refinedweb
1,479
62.17
Testing Testing is not the best-loved part of programming. Writing tests is an exacting and sometimes dreary job, and it can feel like a distraction from the task of building out your code’s functionality. At first blush, OCaml’s type-system makes testing seem even less appealing, since the type system’s ability to squash many kinds of bugs at compile time catches lots of mistakes that you would otherwise need to write tests to protect against. But make no mistake, clever types notwithstanding, testing is essential for developing and evolving reliable software systems. And OCaml’s type system, viewed properly, is an aid to testing, not a reason to avoid it. The goal of this chapter is to teach you more about how to write effective tests in OCaml, and to teach you some of the best tools for the job. Tooling is especially important in the context of testing because one of the things that prevents people from doing as much testing as they should is the sheer tedium of it. But with the right tools in hand, writing tests can be lightweight and fun. And when testing is fun, a lot more testing gets done. Before talking about the testing tools that are available in OCaml, let’s discuss at a high level what we want out of our tests and our testing tools. What makes for good tests? Here are some of the properties that characterize well-written tests in a good testing environment. - Easy to write and run. Tests should require a minimum of boilerplate to create and to hook into your development process. Ideally, you should set things up so that tests are run automatically on every proposed change, preventing people from accidentally breaking the build. - Easy to update. Tests that are hard to adjust in the face of code changes can become their own form of technical debt. - Fast, so they don’t slow down your development process. - Deterministic. It’s hard to take test failures seriously if there’s a decent chance that the failure is a random glitch. You want your test failures to be believable indications of a problem, which requires determinism. - Understandable. Good tests should be easy to read, and their failures should be localized and specific, so it’s easy to find and fix the problem flagged by a failing test. No testing framework can ensure that your tests satisfy these properties. But the tools you choose can help or hinder on all these fronts. As we go through the rest of this chapter and introduce you to some of the available tooling, you should be able to see how each tool can help advance these goals. Inline tests The first step towards a good testing environment is making it easy to set up and and run a test. To that end, we’ll show you how to write tests with ppx_inline_test, which lets you add tests to any module in a library with a specially annotated let binding. To use inline tests in a library, we need to do two things: - Tell Dune to expect inline tests to show up in the library, and - enable ppx_inline_testas a preprocessor. The first of these is achieved by adding an (inline_tests) declaration, and the second is achieved by adding ppx_jane to the set of preprocessors. ( ppx_jane bundles together ppx_inline_test with a collection of other useful preprocessors.) Here’s the resulting dune file. (library (name foo) (libraries base stdio) (inline_tests) (preprocess (pps ppx_jane))) With this done, any module in this library can host a test. We’ll demonstrate this by creating a file called test.ml, containing one test. open! Base let%test "rev" = List.equal Int.equal (List.rev [3;2;1]) [1;2;3] The test passes if the expression on the right-hand side of the equals-sign evaluates to true. Inline tests are not automatically run with the instantiation of the module, but are instead registered for running via the test runner. dune runtest No output is generated because the test passed successfully. But if we break the test, open! Base let%test "rev" = List.equal Int.equal (List.rev [3;2;1]) [3;2;1] we’ll see an error when we run it. dune runtest >File "test.ml", line 3, characters 0-66: rev is false. > >FAILED 1 / 1 tests [1] More readable errors with test_eq One problem with the test output we just saw is that it doesn’t show the data associated with the failed test, thus making it harder to diagnose and fix the problem when it occurs. We can fix this if we signal a test failure by throwing an exception, rather than by returning false. That exception can then be used to report the details of what went wrong. To do this, we’ll change our test declaration to use let%test_unit instead of let%test, so that the test no longer expects a body that returns a bool. We’re also going to use the [%test_eq] syntax, which, given a type, generates code to test for equality and throw a meaningful exception if the arguments are unequal. Here’s what our new test looks like. You’ll notice that it’s a little more concise, mostly because this is a more concise way to express the comparison function. open! Base let%test_unit "rev" = [%test_eq: int list] (List.rev [3;2;1]) [3;2;1] Here’s what it looks like when we run the test. dune runtest >File "test.ml", line 3, characters 0-71: rev threw >(duniverse/ppx_assert/runtime-lib/runtime.ml.E "comparison failed" > ((1 2 3) vs (3 2 1) (Loc test.ml:4:13))). >] As you can see, the data that caused the comparison to fail is printed out, along with the stacktrace. Note that in this case the stacktrace is mostly a distraction, which is a downside of using exceptions to report test failures. Where should tests go? The inline test framework lets you put tests into any .ml file that’s part of a library. But just because you can do something doesn’t mean you should. Putting tests directly in the library you’re building certainly has some benefits. For one thing, it lets you put a test for a given function directly after the definition of that function, which in some cases can be good for readability. This approach also lets you test aspects of your code that aren’t exposed by its external interface. While this sounds appealing at first glance, putting tests in libraries has several downsides. Readability. Including all of your tests directly in your application code can make that code itself harder to read. This can lead to people writing too few tests in an effort to keep their application code uncluttered. Bloat. When your tests are written as a part of your library, it means that every user of your library has to link in that testing code in their production application. Even though that code won’t be run, it still adds to the size of the executable. It can also require dependencies on libraries that you don’t need in production, which can reduce the portability of your code. Testing mindset. Writing tests on the inside of your libraries lets you write tests against any part of your implementation, rather than just the exposed API. This freedom is useful, but can also put you in the wrong testing mindset. Testing that’s phrased in terms of the public API often does a better job of testing what’s fundamental about your code, and will better survive refactoring of the implementation. Also, the discipline of keeping tests outside of requires you to write code that can be tested that way, which pushes towards better designs. For all of these reasons, our recommendation is to put the bulk of your tests in test-only libraries created for that purpose. There are some legitimate reasons to want to put some test directly in your production library, e.g., when you need access to some functionality to do the test that’s important but is really awkward to expose. But such cases are very much the exception. Why can’t inline tests go in executables? We’ve only talked about putting tests into libraries. What about executables? It turns out you can’t do this directly, because Dune doesn’t support the inline_tests declaration in source files that are directly part of an executable. There’s a good reason for this: the ppx_inline_test test runner needs to instantiate the modules that contain the tests. If those modules have toplevel side-effects, that’s a recipe for disaster, since you don’t want those top-level effects to be triggered by the test framework. So, how do we test code that’s part of an executable? The solution is to break up your program in to two pieces: a directory containing a library that contains the logic of your program, but no dangerous top-level effects; and a directory for the executable that links in the library, and is responsible for launching the code. Expect Tests The tests we’ve shown so far have been mostly about checking some specific properties in a given scenario. Sometimes, though, what you want is not to test this or that property, but to capture and make visible your code’s behavior. Expect tests let you do just that. Basic mechanics With expect tests, your source file specifies both the code to be executed and the expected output. Upon running an expect test, any discrepancy between the expected output and what was actually generated is reported as a test failure. Here’s a simple example of a test written in this style. While the test generates output (though a call to print_endline), that output isn’t captured in the source, at least, not yet. open! Base open! Stdio let%expect_test "trivial" = print_endline "Hello World!" If we run the test, we’ll be presented with a diff between what we wrote, and a corrected version of the source file that now has an [%expect] clause containing the output. dune runtest > patdiff (internal) (exit 1) ... >------ test.ml >++++++ test.ml.corrected >File "test.ml", line 5, characters 0-1: > |open! Base > |open! Stdio > | > |let%expect_test "trivial" = >-| print_endline "Hello World!" >+| print_endline "Hello World!"; >+| [%expect {| Hello World! |}] [1] The expect test runner also creates a version of the file with the captured output, with .corrected appended to the end of the filename. If this new output looks correct, we can promote it by copying the corrected file it over the original source. The dune promote command does just this, leaving our source as follows. open! Base open! Stdio let%expect_test "trivial" = print_endline "Hello World!"; [%expect {| Hello World! |}] Now, if we run the test again, we’ll see that it passes. dune runtest We only have one expect block in this example, but the system supports having multiple expect blocks: open! Base open! Stdio let%expect_test "multi-block" = print_endline "Hello"; [%expect{| Hello |}]; print_endline "World!"; [%expect{| World! |}] What are expect tests good for? It’s not obvious why one would want to use expect tests in the first place. Why should this: open! Base open! Stdio let%expect_test _ = print_s [%sexp (List.rev [3;2;1] : int list)]; [%expect {| (1 2 3) |}] be preferable to this? open! Base let%test "rev" = List.equal Int.equal (List.rev [3;2;1]) [1;2;3] Indeed, for examples like this, expect tests aren’t better: simple example-based tests like the one above work fine when it’s easy and convenient to write out specific examples in full. And, as we’ll discuss later in the chapter, property tests are your best bet when you have a clear set of predicates that you want to test, and examples can be naturally generated at random. Where expect tests shine is where you want to make visible some aspect of the behavior of your system that’s hard to capture in a predicate. This is more useful than it might seem at first. Let’s consider a few different example use-cases to see why. Exploratory programming Expect tests can be especially helpful when you’re in exploration mode, and have no clear specification in advance. A routine programming task of this type is web-scraping. The goal is to extract some useful information from a web page, and figuring out the right way to do so often involves trial and error. Here’s some code that does this kind of data extraction, using the lambdasoup package to traverse a chunk of HTML and spit out some data embedded within it. In particular, the function aims to produce the set of hosts that show up in links within a document. open! Base open! Stdio let get_href_hosts soup = Soup.select "a[href]" soup |> Soup.to_list |> List.map ~f:(Soup.R.attribute "href") |> Set.of_list (module String) We can use an expect test to demonstrate what this function does on an example page.)] If we run the test, we’ll see that the output isn’t exactly what was intended. dune runtest > patdiff (internal) (exit 1) ... >------ test.ml >++++++ test.ml.corrected >File "test.ml", line 24, characters 0-1: > | |> List.map ~f:(Soup.R.attribute "href") > | |>)] >+| print_s [%sexp (hrefs : Set.M(String).t)]; >+| [%expect {| () |}] [1] The problem here is that we failed to extract the host from the URI string. I.e., we ended up with instead of github.com. We can fix that by using the uri library to parse the string and extract the host. Here’s the modified code. let get_href_hosts soup = Soup.select "a[href]" soup |> Soup.to_list |> List.map ~f:(Soup.R.attribute "href") |> List.filter_map ~f:(fun uri -> Uri.host (Uri.of_string uri)) |> Set.of_list (module String) And if we run the test again, we’ll see that the output is now as it should be. dune runtest > patdiff (internal) (exit 1) ... >------ test.ml >++++++ test.ml.corrected >File "test.ml", line 26, characters 0-1: > | |>)]; >-| [%expect {| () |}] >+| [%expect {| (github.com ocaml.org) |}] [1] One nice aspect of this exploratory workflow is that once you’ve gotten things working, you can leave the examples you used to develop the code as permanent tests. Visualizing complex behavior Expect tests can be used to examine the dynamic behavior of a system. Let’s walk through a simple example: a rate limiter. The job of a rate limiter is to bound the rate at which a system consumes a particular resource. The following is the mli for a library that specifies the logic of a simple rolling-window-style rate limiter. open! Core type t val create : now:Time_ns.t -> period:Time_ns.Span.t -> rate:int -> t val maybe_consume : t -> now:Time_ns.t -> [ `Consumed | `No_capacity ] We can demonstrate the behavior of the system by running through some examples. First, we’ll write some helper functions to make the examples shorter and easier to read. open! Core let start_time = Time_ns.of_string "2021-06-01 7:00:00" let limiter () = Rate_limiter.create ~now:start_time ~period:(Time_ns.Span.of_sec 1.) ~rate:2 let consume lim offset = let result = Rate_limiter.maybe_consume lim ~now:(Time_ns.add start_time (Time_ns.Span.of_sec offset)) in printf "%4.2f: %s\n" offset (match result with | `Consumed -> "C" | `No_capacity -> "N") Here, we define three values: start_time, which is just a point in time at which to begin our examples; limiter, which is a function for constructing a fresh Limiter.t object, with some reasonable defaults; and consume, which attempts to consume a resource. Notably, consume doesn’t just update the limiter, it also prints out a marker of the result, i.e., whether the consumption succeeded or failed. Now we can use these helpers to see how the rate limiter would behave in a simple scenario. First, we’re going to try to consume three times at time zero; then we’re going to wait a half-second and consume again, and then we’ll wait one more half-second, and try again. let%expect_test _ = let lim = limiter () in let consume offset = consume lim offset in (* Exhaust the rate limit, without advancing the clock. *) for _ = 1 to 3 do consume 0. done; [%expect {| |}]; (* Wait until a half-second has elapsed, try again *) consume 0.5; [%expect {| |}]; (* Wait until a full second has elapsed, try again *) consume 1.; [%expect {| |}] Running the tests will produce a corrected file that includes the execution traces. $ dune runtest ------ test.ml ++++++ test.ml.corrected File "test.ml", line 32, characters 0-1: | "%4.2f: %s\n" | offset | (match result with | | `Consumed -> "C" | | `No_capacity -> "N") | | |[@@@part "2"];; | |let%expect_test _ = | let lim = limiter () in | let consume offset = consume lim offset in | (* Exhaust the rate limit, without advancing the clock. *) | for _ = 1 to 3 do | consume 0. | done; -| [%expect {| |}]; +| [%expect {| +| 0.00: C +| 0.00: C +| 0.00: C |}]; | (* Wait until a half-second has elapsed, try again *) | consume 0.5; -| [%expect {| |}]; +| [%expect {| 0.50: C |}]; | (* Wait until a full second has elapsed, try again *) | consume 1.; -| [%expect {| |}] +| [%expect {| 1.00: C |}] [1] Running dune promote will accept the corrected file, leaving our test looking like this: let%expect_test _ = let lim = limiter () in let consume offset = consume lim offset in (* Exhaust the rate limit, without advancing the clock. *) for _ = 1 to 3 do consume 0. done; [%expect {| 0.00: C 0.00: C 0.00: C |}]; (* Wait until a half-second has elapsed, try again *) consume 0.5; [%expect {| 0.50: C |}]; (* Wait until a full second has elapsed, try again *) consume 1.; [%expect {| 1.00: C |}] The above, however, is not the expected outcome! In particular, all of our calls to consume succeeded, despite us violating the 2-per-second rate limit. That’s because there was a bug in our implementation. The implementation has a queue of times where consume events occurred, and we use this function to drain the queue. let rec drain_old_events t = match Queue.peek t.events with | None -> () | Some time -> if Time_ns.Span.( < ) (Time_ns.diff t.now time) t.period then ( ignore (Queue.dequeue_exn t.events : Time_ns.t); drain_old_events t) But the comparison goes the wrong way: we should discard events that are older than the limit-period, not younger. If we fix that, we’ll see that the trace behaves as we’d expect. let%expect_test _ = let lim = limiter () in let consume offset = consume lim offset in (* Exhaust the rate limit, without advancing the clock. *) for _ = 1 to 3 do consume 0. done; [%expect {| 0.00: C 0.00: C 0.00: N |}]; (* Wait until a half-second has elapsed, try again *) consume 0.5; [%expect {| 0.50: N |}]; (* Wait until a full second has elapsed, try again *) consume 1.; [%expect {| 1.00: C |}] One of the things that makes this test readable is that we went to some trouble to make the example concise. Some of this was about creating some simple helpers, and some of it was about having a concise and noise-free format for the data captured by the expect blocks. End-to-end tests The expect tests we’ve seen so far have been self-contained, not doing any IO or interacting with system resources. As a result, these tests are fast to run and entirely deterministic. That’s a great ideal, but it’s not always achievable, especially when you want to run more end-to-end tests of your program. But expect tests are still a useful tool for such tests. To see how such tests can be build, we’ll write some tests for the echo server we developed in Chapter 15, Concurrent Programming with Async. We’ll start by creating a new test directory with a dune file next to our echo-server implementation. (library (name echo_test) (libraries core async) (preprocess (pps ppx_jane)) (inline_tests (deps ../bin/echo.exe))) The important line is the last one, where in the inline_tests declaration, we declare a dependency on the echo-server binary. That done, our next step is to write some helper functions. We won’t show the implementation, but here’s the signature for our Helpers module. Note that there’s an argument in the launch function that lets you enable the feature in the echo server that causes it to uppercase the text it receives. open! Core open! Async (** Launches the echo server *) val launch : port:int -> uppercase:bool -> Process.t Deferred.t (** Connects to the echo server, returning a reader and writer for communicating with the server. *) val connect : port:int -> (Reader.t * Writer.t) Deferred.t (** Sends data to the server, printing out the result *) val send_data : Reader.t -> Writer.t -> string -> unit Deferred.t (** Kills the echo server, and waits until it exits *) val cleanup : Process.t -> unit Deferred.t With the above, we can now write a test that launches the server, connects to it over TCP, and then sends some data and displays the results. () = send_data r w "one 2 three\n" in let%bind () = [%expect] in return ()) ~finally:(fun () -> cleanup process) Note that we put in some expect annotations where we want to see data, but we haven’t filled them in. We can now run the test to see what happens. The results, however, are not what you might hope for. $ dune runtest ------ test/test.ml ++++++ test/test.ml.corrected File "test/test.ml", line 11, characters 0-1: () = [%expect.unreachable] in | let%bind () = send_data r w "one 2 three\n" in -| let%bind () = [%expect] in +| let%bind () = [%expect.unreachable] in | return ()) | ~finally:(fun () -> cleanup process) +|[@@expect.uncaught_exn {| +| (* CR expect_test_collector: This test expectation appears to contain a backtrace. +| This is strongly discouraged as backtraces are fragile. +| Please change this test to not include a backtrace. *) +| +| (monitor.ml.Error +| (Unix.Unix_error "Connection refused" connect 127.0.0.1:8081) +| ("<backtrace elided in test>" "Caught by monitor Tcp.close_sock_on_error")) +| Raised at file "duniverse/base/src/result.ml", line 201, characters 17-26 +| Called from file "duniverse/ppx_expect/collector/expect_test_collector.ml", line 244, characters 12-19 |}] [1] What went wrong here? The issue is that the connect fails, because at the time of the connection, the echo server hasn’t finished setting up the server. We can fix this by adding a one second delay before connecting, using Async’s Clock.after. With this change, the test now passes, with the expected results. open! Core open! Async open Helpers let%expect_test "test uppercase echo" = let port = 8081 in let%bind process = launch ~port ~uppercase:true in Monitor.protect (fun () -> let%bind () = Clock.after (Time.Span.of_sec 1.) in let%bind (r,w) = connect ~port in let%bind () = send_data r w "one two three\n" in let%bind () = [%expect{| ONE TWO THREE |}] in let%bind () = send_data r w "one 2 three\n" in let%bind () = [%expect{| ONE 2 THREE |}] in return ()) ~finally:(fun () -> cleanup process) We fixed the problem, but solution should make you uncomfortable. For one thing, why is one second the right timeout, rather than a half a second, or ten? The time we wait is some balance between reducing the likelihood of a non-deterministic failure versus preserving performance of the test, which is a bit of an awkward tradeoff to have to meke. We can improve on this by removing the Clock.after call, and instead adding a retry loop to the connect test helper let rec connect ~port = match%bind Monitor.try_with (fun () -> Tcp.connect (Tcp.Where_to_connect.of_host_and_port {host="localhost";port})) with | Ok (_,r,w) -> return (r,w) | Error _ -> let%bind () = Clock.after (Time.Span.of_sec 0.01) in connect ~port There’s still a timeout in this code, in that we wait a bit before retrying. But that timeout is quite aggressive, so you never waste more than 10 milliseconds waiting unnecessarily. That means tests will typically run fast, but if they do run slowly (maybe because your machine is heavily loaded during a big build), the test will still pass. The lesson here is that keeping tests deterministic in the context of running programs doing real I/O gets messy fast. When possible, you should write your code in a way that allows most of it to be tested without having to connect to real running servers. But when you do need to do it, you can still use expect tests for this purpose. How to make a good expect tests Taken together, these examples suggest some guidelines for building good expect tests: Write helper functions to help you set up your test scenarios more concisely. Write custom pretty-printers that surface just the information that you need to see in the test. This makes your tests easier to read, and also minimizes unnecessary churn when details that are irrelevant to your test change. Aim for determinism, ideally by organizing your code so you can put it through its paces without directly interacting with the outside world, which is generally the source of non-determinism. But if you must, be careful to avoid timeouts and other stopgaps that will fall apart under performance pressure. Property testing with Quickcheck Many tests amount to little more than individual examples decorated with simple assertions to check this or that property. Property testing is a useful extension of this approach, which lets you explore a much larger portion of your code’s behavior with only a small amount of extra code. The basic idea is simple enough. A property test requires two things: a function that takes an example input and checks that a given property holds on that example; and a way of generating random examples. The test then checks whether the predicate holds over many randomly generated examples. We can write a property test using only the tools we’ve learned so far. In this example, we’ll check an obvious-seeming invariant connecting three operations: Int.sign, which computes a Sign.trepresenting the sign of an integer, either Positive, Negative, or Zero Int.neg, which negates a number Sign.flip, which, flips a Sign.t, i.e., mapping Positiveto Negativeand vice-versa. The invariant we want to check is that the sign of the negation of any integer x is the flip of the sign of x. Here’s a simple implementation of this test. open! Base let%test_unit "negation flips the sign" = for _ = 0 to 100_000 do let x = Random.int_incl Int.min_value Int.max_value in [%test_eq: Sign.t] (Int.sign (Int.neg x)) (Sign.flip (Int.sign x)) done As you might expect, the test passes. dune runtest One choice we had to make in our implementation is which probability distribution to use for selecting examples. This may seem like an unimportant question, but when it comes to testing, not all probability distributions are created equal. Indeed, the choice we made, which was to pick integers uniformly and at random from the full set of integers, is problematic, since it picks interesting special cases, like zero and one, with the same probability as everything else. Given the number of integers, the chance of testing any of those special cases is rather low, which seems like a problem. This is a place where Quickcheck can help. Quickcheck is a library to help automate the construction of testing distributions. Let’s try rewriting the above example using it. Note that we open Core here because Core has nicely integrated support for Quickcheck, with helper functions already integrated into most common modules. There’s also a standalone Base_quickcheck library that can be used without Core. open Core let%test_unit "negation flips the sign" = Quickcheck.test ~sexp_of:[%sexp_of: int] (Int.gen_incl Int.min_value Int.max_value) ~f:(fun x -> [%test_eq: Sign.t] (Int.sign (Int.neg x)) (Sign.flip (Int.sign x))) Note that we didn’t explicitly state how many examples should be tested. Quickcheck has a built in default which can be overridden by way of an optional argument. Running the test uncovers the fact that the property we’ve been testing doesn’t actually hold on all outputs, as you can see below. dune runtest >File "test.ml", line 3, characters 0-244: negation flips the sign threw >("Base_quickcheck.Test.run: test failed" (input -4611686018427387904) > (error > ((duniverse/ppx_assert/runtime-lib/runtime.ml.E "comparison failed" > (Neg vs Pos (Loc test.ml:7:19))) > "Raised at Ppx_assert_lib__Runtime.failwith in file \"duniverse/ppx_assert/runtime-lib/runtime.ml\", line 28, characters 28-53\ > \nCalled from Base__Or_error.try_with in file \"duniverse/base/src/or_error.ml\", line 76, characters 9-15\ > \n"))). >] The example that triggers the exception is -4611686018427387904, also known as Int.min_value, which is the smallest value of type Int.t. This uncovers something about integers which may not have been obvious, which is that the largest int, Int.max_value, is smaller in absolute value than Int.max_value. Int.min_value ;; >- : int = -4611686018427387904 Int.max_value ;; >- : int = 4611686018427387903 That means there’s no natural choice for the negation of min_value. It turns out that the standard behavior here (not just for OCaml) is for the negation of min_value to be equal to itself. Int.neg Int.min_value ;; >- : int = -4611686018427387904 Quickcheck’s insistence on tracking and testing special cases is what allowed it to find this error. Handling complex types Tests can’t subsist on simple atomic types alone, which is why you’ll often want to build probability distributions over more complex types. Here’s a simple example, where we want to test the behavior of List.rev_append. For this test, we’re going to use a probability distribution for generating pairs of lists of integers. The following example shows how that can be done using Quickcheck’s combinators. open Core let gen_int_list_pair = let int_list_gen = List.gen_non_empty (Int.gen_incl Int.min_value Int.max_value) in Quickcheck.Generator.both int_list_gen int_list_gen let%test_unit "List.rev_append is List.append of List.rev" = Quickcheck.test ~sexp_of:[%sexp_of: int list * int list] gen_int_list_pair ~f:(fun (l1,l2) -> [%test_eq: int list] (List.rev_append l1 l2) (List.append (List.rev l1) l2)) Here, we made use of Quickcheck.Generator.both, which is useful for creating a generator for pairs from two generators for the constituent types. open Core ;; Quickcheck.Generator.both ;; >- : 'a Base_quickcheck.Generator.t -> > 'b Base_quickcheck.Generator.t -> ('a * 'b) Base_quickcheck.Generator.t >= <fun> The declaration of the generator is pretty simple, but it’s also tedious. Happily, Quickcheck ships with a PPX that can automate creation of the generator given just the type declaration. We can use that to simplify our code, as shown below. open Core let%test_unit "List.rev_append is List.append of List.rev" = Quickcheck.test ~sexp_of:[%sexp_of: int list * int list] [%quickcheck.generator: int list * int list] ~f:(fun (l1,l2) -> [%test_eq: int list] (List.rev_append l1 l2) (List.append (List.rev l1) l2)) This also works with other, more complex data-types, like variants. Here’s a simple example. type shape = | Circle of { radius: float } |> This will make a bunch of reasonable default decisions, like picking Circle, Rect, and Poly with equal probability. We can use annotations to adjust this, for example, by specifying the weight on a particular variant. type shape = | Circle of { radius: float } [@quickcheck.weight 0.5] |> Note that the default weight on each case is 1, so now Circle will be generated with probability 0.5 / 2.5 or 0.2, instead of the 1/3rd probability that it would have natively. More control with let-syntax If the annotations associated with ppx_quickcheck don’t let you do precisely what you want, you can get more control by taking advantage of the fact that Quickcheck’s generators form a monad. That means it supports operators like bind and map, which we first presented in an error handling context in Chapter 7, Error Handling. In combination with Let_syntax, the generator monad gives us a convenient way to specify generators for custom types. Imagine we wanted to construct a generator for the shape type defined above. Here’s an example generator where we make sure that the radius, height, and width of the shape in question can’t be negative. let gen_shape = let open Quickcheck.Generator.Let_syntax in let module G = Base_quickcheck.Generator in let circle = let%map radius = G.float_positive_or_zero in Circle { radius } in let rect = let%map height = G.float_positive_or_zero and width = G.float_positive_or_zero in Rect { height; width } in let poly = let%map points = List.gen_non_empty (G.both G.float_positive_or_zero G.float_positive_or_zero) in Poly points in G.union [circle; rect; poly] ;; >val gen_shape : shape Base_quickcheck.Generator.t = <abstr> Throughout this function we’re making choices about the probability distribution. For example, the use of the union operator means that circles, rectangles and polygons will be equally likely. We could have used weighted_union to pick a different distribution. The full API for building generators is beyond the scope of this chapter, but it’s worth digging in to the API docs if you want more control over the distribution of your test examples. Other testing tools The testing tools we’ve described in this chapter cover a lot of ground, but there are other tools that are worth knowing about. Other tools to do (mostly) the same things Here are some notable tools that do more or less the same things as the testing tools we’ve featured in this chapter. - Alcotest, which is another system for registering and running tests. - qcheck, an alternative implementation of quickcheck. - Dune’s cram tests, which are expect-like tests that are written in a shell-like syntax. These are great for testing command-line utilities, and are inspired by Mercurial’s testing framework. Which of these you might end up preferring is to some degree a matter of taste. Fuzzing There’s one other kind of testing tool that we haven’t covered in this chapter, but is worth knowing about: instrumentation-guided fuzzing. You can think of this as another take on property testing, with a very different approach to generating random examples. Traditional fuzzing just throws randomly mutated data at a program, and looks for some indication of failure, often simply the program crashing with a segfault. This kind of fuzzing has been surprisingly effective at finding bugs, especially security bugs, in production software. But blind randomization is still quite limited in terms of how much program behavior it can effectively explore. Instrumentation-guided fuzzing improves on this by instrumenting the program, and then using that instrumentation to guide the randomization in the direction of more code coverage. By far the most successful tool in this space is American Fuzzy Lop, or AFL, and OCaml has support for the necessary instrumentation. AFL can have eerily good results, and can with no guidance do things like constructing nearly-parseable text when fuzzing a parser, just by iteratively randomzing inputs in the direction of more coverage of the program being exercised. If you’re interested in AFL, there are some related tools worth knowing about.
http://dev.realworldocaml.org/testing.html
CC-MAIN-2021-39
refinedweb
5,824
66.13
debug-trace-var You do not have to write variable names twice in Debug.Trace See all snapshots debug-trace-var appears in debug-trace-var When writing print debug, we often write. import Debug.Trace main :: IO () main = do let a = 1 traceIO $ "a = " ++ show a This is troublesome to describe the name of the variable twice. With debug-trace-var you write variables only once. {-# LANGUAGE QuasiQuotes #-} import Debug.Trace.Var main :: IO () main = do let a = 1 [traceVarIO|a|] or {-# LANGUAGE TemplateHaskell #-} import Debug.Trace.Var main :: IO () main = let a = 1 :: Int in $(traceMTH 'a) You may avoid name quotes that are confusing with character literals, Or often it may be to avoid the QuasiQuotes to destroy the syntax highlight of the text editor. Example {-# LANGUAGE QuasiQuotes #-} {-# LANGUAGE TemplateHaskell #-} import Debug.Trace.Var -- > a -- n = 1 -- s = "あ" a :: IO () a = let n = 1 s = "あ" in [traceVar|n|] ([traceVar|s|] return ()) -- > b -- "n = 1 -- n = 1" b :: String b = let n = 1 in [traceVarId|n|] -- > c -- n = 344 c :: IO () c = let n = 344 in [traceStackVar|n|] (return ()) -- > d -- n = 344 -- n = 344 d :: IO () d = do let n = 344 [traceVarIO|n|] [traceVarIO|n|] -- > e -- n = 344 e :: IO () e = do let n = 344 [traceVarM|n|] -- > f -- n = 344 f :: IO () f = let n = 344 in $(traceMTH 'n) Motivation I wanted to use Template Haskell. One point advice You can use ndmitchell/debug: Haskell library for debugging Changes Changelog for debug-trace-var Unreleased changes 0.2.0 - added: traceMTH, see Add function to trace without QuasiQuote by igrep · Pull Request #2 · ncaq/debug-trace-var 0.1.0 - added: first release
https://www.stackage.org/lts-12.17/package/debug-trace-var-0.2.0
CC-MAIN-2019-04
refinedweb
277
67.79
I few days ago, I was somewhat surprised to find that one of my Tweets had been used as a citation in Wikipedia! I began to wonder - how often are Tweets used in citations? It's possible to search for your own Tweets using this (somewhat obscure) link: Just edit the end of it to see if you, or your friends, have been cited. Note - the username is case sensitive, so "Edent" isn't the same as "edent". For example, we can see where Cory Doctorow is cited: Aha! The page on the New Zealand Internet Blackout references: Success! I'm blacked out in solidarity with Kiwis whose net has been pwned by American entertainment giants: — son of an asylum seeker, father of an immigrant (@doctorow) February 19, 2009 Ok, so which Twitter user has been cited the most? TO THE API, ROBIN! Wikipedia's own help pages are a little lacking, so I went to the help pages of the software which runs Wikipedia - MediaWiki. We want to search for external URLs which point to Twitter and have a namespace of 0 (that means they're articles, not talk pages). We can grab a maximum of 500 results at a time, using JSON, and we want to include "" and "twitter.com". Here's what we use.? action=query& list=exturlusage& eunamespace=0& eulimit=500& format=json& euquery=*.twitter.com Run it yourself to see the results. Limitations - This only gets 500 results at a time - to paginate through, we add euoffset= - This only searches the English Wikipedia. - There are roughly 17,800 links to Twitter from English Wikipedia returned by the API. - The majority of citations just point to a Twitter user's page - not to a specific Tweet. - Some of the returned Tweets use the obsolete HashBang URls (e.g..) - Some Tweets have been deleted. Crappy Python! import urllib2 import json from collections import Counter #euoffset=17800 api = "*.twitter.com" euoffset = 0 words = [] while euoffset < 17500: try: site_data = json.load(urllib2.urlopen(api + "&euoffset=" + str(euoffset))) # Itterate through for element in site_data['query']['exturlusage']: # Remove HashBangs #! # Lowercase everything twitterURL = element['url'].replace("/#!","").lower() twitterUser = twitterURL.replace("","") twitterUser = twitterUser.replace("","") twitterUser = twitterUser.replace("@","") slash = twitterUser.find("/") if slash > 0: twitterUser = twitterUser[:slash] print twitterURL # print twitterUser words.append(twitterUser) except urllib2.URLError: print "Unable to retreive data" sys.exit() euoffset += 500 # Most cited user word_counts = Counter(words) print word_counts The Results... The most cited Twitter users are... - LaLiga A Spanish Football competition - 105 - Lea Michele An American singer / TV actor - 54 - Guldbaggen The Swedish equivalent of the Oscars - 35 - Kevin Tancharoen An American movie director - 12 - PRESTO card Ottawa's public transit smartcard - 10 - ICE T An American rapper - 10 - Northern Pride RLFC A British rugby team - 10 - 穴井勇輝(勇吹輝) A Japanese Actor - 9 - NICKI MINAJ An American singer - 8 - Counting Crows An American band - 8 And the most cited individual Tweet? Linked to from lots of Lost Girl pages. What Have We Learned Today? Wikipedia does have a large amount of pop-culture (do we need hundreds of words on My Little Pony Characters?) Twitter, unsurprisingly, has limited utility as an encyclopædic source - it's great for breaking news and ephemeral events, but it's fragile and lacks depth. There are very few occasions where Twitter would be the sole, and canonical, source of information [Citation needed]. 3 thoughts on “Which Twitter User Receives The Most Citations on Wikipedia?” Citation needed? That would be You're welcome. As a result of your post, I've arranged for hashbangs to be removed from Twitter URLs in Wikipedia; see here, for example . Brilliant! Thanks Andy.
https://shkspr.mobi/blog/2016/01/which-twitter-user-receives-the-most-citations-on-wikipedia/
CC-MAIN-2019-09
refinedweb
605
66.13
kstars #include <imageviewer.h> Detailed Description Image viewer window for KStars. - Version - 1.1 This image-viewer automatically resizes the picture. The output works with kio-slaves and not directly with the QImage save-routines because normally the image-files are in GIF-format and QT does not save these files. For other formats, like PNG, this is not so important because they can directly saved by QImage. The download-slave works asynchron so the parent-widget can be used at this time. The save-slave works synchronously, but this is not important because the files are at this time local saved and this works not so long. Definition at line 67 of file imageviewer.h. Constructor & Destructor Documentation Creates empty viewer. Definition at line 90 of file imageviewer.cpp. Create image viewer from URL with caption. Definition at line 97 of file imageviewer.cpp. Destructor. If there is a partially downloaded image file, delete it. Definition at line 181 of file imageviewer.cpp. Member Function Documentation loadImage Load image from local file and display it - Parameters - - Returns - True if opened and displayed, false otherwise Definition at line 247 of file imageviewer.cpp. Definition at line 380 of file imageviewer.
https://api.kde.org/extragear-api/edu-apidocs/kstars/html/classImageViewer.html
CC-MAIN-2020-10
refinedweb
200
51.24
Getting Started with AWS Boosting MySQL database performance with Amazon ElastiCache for Redis Module 4: Caching and Best Practices Connect to Redis and learn two techniques for storing and retrieving data. What You Will Learn - Two techniques for storing and retreiving data (When choosing which method to use in your application, select the one that simplifies your architecture based on your data access patterns.) Time to Complete 60 minutes Services Used Implementation - Test your connection to Redis Back at the ElastiCache Dashboard: 4.1 — Select “Redis” on the left pane. 4.2 — Select the Redis Cluster you created for this tutorial. 4.3 — Copy the Primary Endpoint. In the examples, each time an endpoint is mentioned you should use the hostname of your Configuration Endpoint. 4.4 — From your EC2 instance, enter the Python interactive interpreter: syntax: shell $ python 4.5 — Now run these commands to test the connection to your Redis node. If the commands hang, please see the note following the example. syntax: python syntax: python >>> import redis >>> client = redis.Redis.from_url('redis://endpoint:6379') >>> client.ping() True Note:. - Configure the environment In the repository you will find some Python code that you can run in your EC2 instance. But first you need to configure some environment variables: syntax: shell $ export REDIS_URL=redis://your_redis_endpoint:6379/ $ export DB_HOST=your_mysql_endpoint $ export DB_USER=admin $ export DB_PASS=your_admin_password $ export DB_NAME=tutorial Note that the values for mysql_endpoint, redis_endpoint, and password are those that you saved in the previous steps. - Cache the result of a SQL query The first of the two methods implemented in the code sample works by caching a serialized representation of the SQL query result. The following Python snippet illustrates the logic: syntax: python def fetch(sql): result = cache.get(sql) if result: return deserialize(result) else: result = db.query(sql) cache.setex(sql, ttl, serialize(result)) return result First, the SQL statement is used as a key in Redis, and the cache is examined to see if a value is present. If a value is not present, the SQL statement is used to query the database. The result of the database query is stored in Redis. The ttl variable must be set to a sensible value, dependent on the nature of your application. When the ttl expires, Redis evicts the key and frees the associated memory. This code is available in the tutorial repository and you can run it as is, but feel free to add print statements here and there if you want to see the value of a variable at a certain point in time. In terms of strategy, the drawback of this approach is that when data is modified in the database, the changes won’t be reflected automatically to the user if a previous result was cached and its ttl has not elapsed yet. An example of how you would use the fetch function: syntax: python print(fetch("SELECT * FROM planet")) The result would be: syntax: python [{'id': 10, 'name': 'Mercury'}, {'id': 11, 'name': 'Venus'}, {'id': 12, 'name': 'Earth'}, {'id': 13, 'name': 'Mars'}, {'id': 14, 'name': 'Jupiter'}, {'id': 15, 'name': 'Saturn'}, {'id': 16, 'name': 'Uranus'}, {'id': 17, 'name': 'Neptune'}] Of course, this is a very basic example, but your application can benefit a great deal by implementing this caching pattern where there’s no difference between a result coming from the cache and a result coming straight from the database. - Cache a record as a Redis hash The second example you will implement maps a database record to a Redis hash: syntax: python def planet(id): key = "planet:" + str(id) result = cache.hgetall(key) if result: return result else: sql = "SELECT `id`, `name` FROM `planet` WHERE `id`=%s" result = db_record(sql, (id,)) if result: cache.hmset(key, result) cache.expire(key, ttl) return result The keyspace in Redis is flat, but there’s a convention for simulating structure by using colon separated strings. In the example, the key for the record with ID 1 will be with “planet:1”. While this snippet is good enough for exhibiting a common pattern, more abstraction is possible: one module could be in charge of generating the keys, another could take care of building the SQL string, etc. Furthermore, chances are there are tools built for that purpose in the programming language you use. The example retrieves records either from the cache or from the database, and similarly there could be a function in charge of persisting an object to the database. - Expire content In the two examples you used a Time To Live or ttl, after which Redis evicts the key. While this is good enough in most cases, you may want to remove stale data from the cache as soon as possible. If that’s your use case, make sure you check other options like the write-through caching strategy. Links for more information are provided at the end of this tutorial. Worth mentioning in case you are curious: while the examples use the EXPIRE command, Redis also provides the EXPIREAT, which lets you specify a precise date and time when a key should be evicted. It takes as a parameter an absolute Unix timestamp (i.e., seconds elapsed since January 1, 1970). - Configure Redis as a cache When the amount of data exceeds the configured maxmemory setting, Redis has different ways of responding depending on the selected eviction policy. By default, ElastiCache for Redis is configured to remove from memory the least recently used keys with a ttl set. The eviction policy parameter is called maxmemory-policy, and the default value in ElastiCache is volatile-lru. Another interesting option for this use case is the volatile-ttl policy, which instructs Redis to reclaim memory by removing those keys with the shortest ttl. - Test Once you have implemented this strategy, make sure to test your application to find the best value for the ttl and the best eviction strategy. Check the performance of your application with an empty cache and with a full cache.
https://aws.amazon.com/getting-started/hands-on/boosting-mysql-database-performance-with-amazon-elasticache-for-redis/module-four/
CC-MAIN-2022-27
refinedweb
998
59.03
We have already plotted some basic graphs. Now it’s time to plot some more graphs:- Line Histogram Now let’s create a line histogram with some random data import matplotlib.pyplot as plt import numpy as np import scipy.stats as stats noise = np.random.normal(0, 1, (1000, )) density = stats.gaussian_kde(noise) n, x, _ = plt.hist(noise, bins=np.linspace(-3, 3, 50),histtype=u’step’, density=True) plt.plot(x, density(x)) plt.show() Graph 13 – A line histogram Variable Width histogram This is how a variable column width histogram looks like Let’s create one with our dataset import numpy as np import matplotlib.pyplot as plt freqs = np.array([2, 7, 21, 15, 12]) bins = np.array([65, 75, 80, 90, 105, 110]) widths = bins[1:] – bins[:-1] heights = freqs.astype(np.float)/widths plt.fill_between(bins.repeat(2)[1:-1], heights.repeat(2), facecolor=’orange’) plt.show() Graph 14 – A variable width histogram One more example belowimport numpy as np import matplotlib.pyplot as plt x = np.sort(np.random.rand(6)) y = np.random.rand(5) plt.bar(x[:-1], y, width=x[1:] – x[:-1]) plt.show() Graph 15 – Variable width histogram Area Chart Below is how an area chart looks like: Let’s create a basic area chart with some dummy data Import numpy as np import matplotlib.pyplot as plt import seaborn as sns # Data x=range(1,6) y=[ [1,4,6,8,9], [2,2,7,10,12], [2,8,5,10,6] ] # Plot plt.stackplot(x,y, labels=[‘A’,’B’,’C’]) plt.legend(loc=’upper left’) plt.show() Graph 16 – A basic area chart You already know how to add x-labels, y-labels, title, etc. Go ahead and add these in the graph above. Box plot is one of the most common The end of the boxes represents seed(123) a = random.sample(range(1,100),20) b = random.sample(range(1,100),20) c = random.sample(range(1,100),20) d = random.sample(range(1,100),20) list_Ex = [a,b,c,d] plt.boxplot(list_Ex) Graph 17 – A basic Box-Whisker graph Now we will try to make the graph look better by adding color to the plot. The box-plot shows median, 25th and 75th percentile, and outliers. You should try to give different color to these points to make the plot more appealing. When you plot a boxplot, you can use the following 5 attributes of the plot:- a. box – To modify the color, line width, etc. of the central box b. whisker – To modify the color and line width of the line which connects the box to the cap i.e. the horizontal end of the box plot c. cap – The horizontal end of the box d. median – The center of the box e. flier The box denotes the 1st and 3rd Quartile and it is called IQR i.e. the Inter Quartile Range. The lower fence is at Q1 – 1.5*IQR and the upper fence is at Q3 + 1.5*IQR. Any point which falls above or below it is called fliers or outliers Following is the code with some fancy colors to help you understand each term individually. bp=plt.boxplot(list_Ex,patch_artist = True) for box in bp[‘boxes’]: box.set(color=’orange’,linewidth=2 for whisker in bp[‘whiskers’]: whisker.set(color = ‘red’,linewidth=2) for cap in bp[‘caps’]: cap.set(color=’green’,linewidth=2) for median in bp[‘medians’]: median.set(color=’blue’,linewidth=2) for flier in bp[‘fliers’]: flier.set(marker=’o’,color = ‘black’, alpha=0.5) Graph 18 – Box-plot practice Following is one more code with the help of which you can replicate a Gaussian distribution from numpy.random import seed from numpy.random import randn from matplotlib import pyplot seed(1) # random numbers drawn from a Gaussian distribution x = [randn(1000), 5 * randn(1000), 10 * randn(1000)] # create box and whisker plot pyplot.boxplot(x) # show line plot pyplot.show() Graph 19 – A Box-Whisker Plot Scatter plot Scatter plot is an easy to make but interesting visualization which gives a clear picture of how the data is distributed. Let’s take example of 10 innings played by Sachin, Dhoni, and Kohli and see how their scores are distributed. The code is fairly easy to understand sachin = [89, 90, 70, 89, 100, 80, 90, 100, 80, 34] kohli = [30, 29, 49, 48, 100, 48, 38, 45, 20, 30] dhoni = [23,45,67,76,65,45,100,12,34,65] run = [10, 20, 30, 40, 50, 60, 70, 80, 90, 100] plt.scatter(run, sachin, color=’red’) plt.scatter(run, kohli, color=’green’) plt.scatter(run,dhoni,color=’blue’) plt.xlabel(‘Score Range’) plt.ylabel(‘Run scored’) plt.show() You can also add legend = [‘sachin’,’kohli’,’dhoni’] plt.legend(legend) The plot will now look like this Graph 20 – A scatter plot Below is one more scatter plot where you give weighted area and the size of the circle will be on the basis of the circle import numpy as np np.random.seed(123) x = random.sample(range(1,100),40) y = random.sample(range(1,100),40) colors = np.random.rand(N) area = (30*np.random.rand(N))**2 plt.scatter(x,y,s=area,c=colors,alpha=0.5) plt.show() Graph 21 – A scatter plot with area of bubble denoting the volume Pie Chart Create a pie chart for the number of centuries scored by Sachin, Dhoni, Dravid, and Kohli. labels = ‘Sachin’,’Dhoni’,’Kohli’,’Dravid’ size = [100,25,70,50] colors = [‘pink’,’blue’,’red’,’orange’] explode = (0.1,0,0,0) plt.pie(size,explode=explode,labels=labels,colors=colors,autopct=’%1.1f%%’,shadow=True,startangle=140) plt.axis(‘equal’) plt.show() explode is used to set apart the first part of the pie chart. Everything else in the code is self explanatory. Below is the plot Graph 22 – Pie chart showing performance of cricketers Some cool Visualizations Create a stacked chart to demonstrate the number of people voting for either Python or Java in 5 countries, namely, India, USA, England, S.A., Nepal import numpy as np import matplotlib.pyplot as plt Python = (20, 35, 30, 35, 27) Java = (25, 32, 34, 20, 25) width = 0.35 # the width of the bars: can also be len(x) sequence p1 = plt.bar(ind, Python, width) p2 = plt.bar(ind, Java, width,bottom=Python) plt.ylabel(‘Votes’) plt.title(‘Number of people using Python or Java’) plt.xticks(ind, (‘India’, ‘USA’, ‘England’, ‘S.A.’, ‘Nepal’)) plt.yticks(np.arange(0, 81, 10)) plt.legend((p1[0], p2[0]), (‘Python’, ‘Java’)) plt.show() xticks is used to give labels to the x-axis and yticks give labels to the y-axis. Graph 23 – Stacked Bar graph A cool area graph import numpy as np import matplotlib.pyplot as plt # create data x=range(1,15) y=[1,4,6,8,4,5,3,2,4,1,5,6,8,7] # Change the color and its transparency plt.fill_between( x, y, color=”red”, alpha=0.4) plt.show() # Same, but add a stronger line on top (edge) plt.fill_between( x, y, color=”red”, alpha=0.2) plt.plot(x, y, color=”red”, alpha=0.6) The parameter alpha is used to give weight age to the density of color. 0.4 is given to the edge and 0.2 is given to the fill Graph 24 – An area graph One of the most important There are four types of information which we can display using any plot:- 1. Distribution 2. Comparison 3. Relationship 4. Composition 1. How many people are from which state of the country? a Histogram – If you have few data point b. Line Histogram – When you have a lot of data points c. Scatter plot – When you have to show the distribution of 2-3 variables 2. Comparison – When you have to compare something over 2 or more categories a. Variable width chart – When you have to compare two variables per item b. Tables with embedded charts – When there are many categories, basically a matrix of charts c. Horizontal or Vertical Histogram – When there are few categories in a data set d. If you want to compare something over time i. Line iii. Many categories line chart 3. Relationship Charts – When you want to see the relationship between two or more variables then you have to use relationship charts a. Scatter Plot b. Scatter plot bubble chart 4. Composition Charts – When you have to show a percentage or composition of variables. a. Pie Chart – Very basic plot when there are 3-6 categories b. Stacked 100% bar chart with sub component – When you have to show components of components c. Stacked 100% bar chart – When you have to look into the contribution of each component. d. Stacked area chart – When relative and absolute difference matters
http://thedatamonk.com/day-29-visualization-in-python-cont/
CC-MAIN-2020-05
refinedweb
1,488
68.97
=== version history of XML::Compile::SOAP version 3.07: Thu Jan 15 14:36:54 CET 2015 Fixes: - FAQ: how to set the HTTP timeout. - silence rpc-encoded without namespace. rt.cpan.org#101383 [Breno G. de Oliveira] Improvements: - lower http "received status" messages from 'info' to 'trace' - ::SOAPHTTP new method defaultUserAgent() - force people to upgrade LWP version 3.06: Mon Dec 22 08:43:11 CET 2014 Fixes: - accept multiple rpc name-spaces. Improvements: - typo in generated daemon example [Cs Metsys] - new method ::SOAP::Operation::longName() - remove soap-env-patch: not needed anymore - remove overrule of *form_default on standard schemas: not needed anymore. - rpc-encoding partially supported version 3.05: Wed May 28 09:29:16 CEST 2014 Fixes: - support rpc-literal fault parts based on type, not only element. reported by [Rob De Langhe] - handle returned XOP objects. Patch by [Christopher Taranto] Improvements: - use File::Slurp::Tiny to replace File::Slurp rt.cpan.org#92920 [Karen Etheridge] - do not include ::Daemon in META.yml rt.cpan.org#95507 [Nikolay Martynov] version 3.04: Thu Feb 6 17:05:32 CET 2014 Improvements: - change documentation style. - move ::SOAP11::Operation::parsedWSDL() to base-class version 3.03: Fri Jan 10 15:42:22 CET 2014 Fixes: - remove dependency to WSDL again, because CPAN.pm cannot handle cyclic dependencies. - revert unintended change in 2.36 which croaks when the Fault/details contains elements which are not understood. Detected by [Steffen Winkler] Improvements: - add server schemas, currently for BEA, SharePoint, and XML::Compile::Daemon servers. version 3.02: Wed Jan 8 01:04:45 CET 2014 Fixes: - auto check whether WSDL11 must be upgraded. [Caleb Cushing] version 3.01: Mon Jan 6 23:19:14 CET 2014 Improvements: - upgrade daemon if installed. - drop support for very old Perl's version 3.00: Mon Jan 6 00:55:08 CET 2014 Changes: - split-off WSDL11 into own distribution. - default mime-type for SOAP 1.1 is text/xml - removed SOAP10 Fixes: - headers and body elements which appear more than once will be put in an ARRAY. Improvements: - check that all XML::Compile::SOAP* modules are loaded [Chase Whitener] - and one more check [Reiber Christian] - example how to add BasicAuthentication headers - added examples/temperature, based on answer to request of [fort_d] - moved WSDL11 initialization from ::Operation to ::SOAP11 - moved module registration from ::Operation to ::SOAP - ::Extensions can now register soap12 routines. - add examples/salesforce/, contribute by [Ciaran Deignan] - ::Operation:addHeader() now also accepts ELEMENTs in prefixed form version 2.38: Thu Aug 22 16:20:29 CEST 2013 Fixes: - soaphttp: do not reuse HTTP::Request object; we need fresh headers. rt.cpan.org#88019 [Bret Lambert] Improvements: - use ::Cache::addPrefixes() - one set of operations should not include ops with the same name: tell user to be more specific when sets overlap. - clean error when ::WSDL11::compileCalls() would select overlapping operation names - remove trick to first generate body and the headers. - example of changing ::WSDL::endPoint, with help of [Bret] - ::WSDL::compileCall() now also works with an operation by name, not only as object. version 2.37: Tue Jul 9 17:53:13 CEST 2013 Fixes: - wsdl: compileClient now also respects declare(OPERATION) - wsdl: SOAP12 operations became SOAP11 ports Improvements: - wsdl: new compileCall($operation), helping [Caleb Cushing] - soaphttp: docs improvement about own user_agent. [Edward Savage] version 2.36: Fri May 3 10:04:52 CEST 2013 Changes: - error when Fault/details contains elements which are not understood. Fixes: - writer rpc: do not ignore empty message parts [Henrik Tougaard] Improvements: - spell fixes. rt.cpan.org#83835 [Joenio Marques de Costa] - remove dependency for Test::Deep - moved ::WSDL11::_learn_prefixes to ::Cache - doc: OODoc improvements produce nices DETAILS sections version 2.35: Mon Jan 14 11:45:07 CET 2013 Fixes: - fix collection of errors, even better. [Lars Thegler] version 2.34: Fri Dec 21 12:21:00 CET 2012 Fixes: - correct collection of errors in ::Client [Roman Daniel] version 2.33: Fri Nov 30 19:18:22 CET 2012 Improvements: - ::SOAP11::Operation::addHeader() now supports mustUnderstand and destination. version 2.32: Mon Oct 22 21:38:04 CEST 2012 Fixes: - ::Trace errors is ARRAY, not HASH. version 2.31: Tue Oct 16 16:28:52 CEST 2012 Changes: - writer: first create the Body, then the Header, so fields in the header (for instance Security) do know what the body will be. - writer: rpc operation will have xmlns, not Envelope Fixes: - transport: capture XML and protocol errors in exceptions. - ::Operation::addHeader() will silently ignore adding the same header again. Improvements: - trace object may capture multiple errors. New method: errors() version 2.30: Sat Oct 6 13:35:21 CEST 2012 Fixes: - handle XOP decoding where there is no start-id is mentioned. Reported by [Ciaran Deignan] - explain of operation sometimes missed a name-space declaration. rt.cpan.org#79786 [David Tindall Mcmath] - ::WSDL::new(wsdl) was documented to accept multiple WSDLs, but only the first was taken. [Karen Etheridge] Improvements: - more reuse of the default LWP::UserAgent. - explain show prefixed type for faults. version 2.29: Thu Aug 16 00:17:22 CEST 2012 Fixes: - deprecated XML::LibXML::parse_string() must be replaced by XML::LibXML::load_xml(string). rt.cpan.org#78946 [chernomyrdin] - treat XOP mime-type multipart/related case-insensitive [Ciaran Deignan] Improvements: - add ::SOAP11::Operation::parsedWSDL() version 2.28: Fri Jun 22 20:19:53 CEST 2012 Fixes: - handling single string fault details. [ZP Gu] version 2.27: Fri Jun 22 08:54:08 CEST 2012 Fixes: - disable attempts of the XML::LibXML parser to dynamically load DTDs for ::Trace::*(pretty_print) [Michael Ludwig] Improvements: - take hint by [Boris Jakubaschk] about how simpel it is to get basic authentication included in the HTTP headers. - add parsed response DOM-tree to the ::Trace. On request by [Michael Ludwig] version 2.26: Wed Feb 8 20:19:15 CET 2012 Fixes: - fix and improve ::Trace::pretty_print() [Michael Ludwig] Improvements: - avoid warnings in ::Trace::printTimings() when the message exchange was incomplete. - added example how to get low-level control over the HTTP messages to the ::FAQ. Based on an example from [Michael Ludwig] - added a way to load all imported xsd files to your local disk via wget, after a question from [Gary Kennedy] - documentation generation problems. - add transporter object as parameter to the hook call. - ::Tansport::compileClient() gets xml_format options to improve readability. version 2.25: Thu Sep 22 10:56:11 CEST 2011 Fixes: - do not silently continue when there are decoding errors. - two missing __x() in ::SOAP::Server errors. [Patrick Powell] - one-way message error-handling and explain [Patrick Powell] - examples/rpc-literal/element.pl failed. Reported by rt.cpan.org#70349 [Caleb Cushing] Improvements: - new method XML::Compile::SOAP::Trace::printErrors() - explain how to use transport_hook to implement transporter tricks without fully extending ::Transport [Patrick Powell] - handler callbacks pass additional session object around. [Patrick Powell] - extended ::Trace::printResponse() with 'pretty_print' options, as suggested by [Caleb Cushin] - remove example/wssecurity from the distribution: we now have XML::Compile:WSS. version 2.24: Mon Jun 20 14:27:15 CEST 2011 Fixes: - cleanly catch more errors in trace object. Improvements: - allow instantiation of WSDL11 object with ARRAY of wsdl filenames. - template: also show headers in explain() Hinted by [Patrick Powell] version 2.23: Tue Feb 15 08:56:35 CET 2011 Fixes: - check whether reading from XOP file succeeds. - ahhh... debug warning was left-in. rt.cpan.org #65720 [Boris Zentner] version 2.22: Sat Feb 5 20:41:13 CET 2011 Fixes: - endpoint parameter got broken in 2.20 [Daniel Stini] Improvements: - make explain() output well-formed, syntax correct. [Patrick Powell] - $op->compileClient now also accepts parameters for the transporter which is created internally [Robin V.] version 2.21: Sat Dec 25 12:01:30 CET 2010 Fixes: - various tests fail with newer Test::More version 2.20: Wed Dec 22 16:40:56 CET 2010 Fixes: - load soap11 schemas, even when WSDL defines a SOAP-ENV. rt.cpan.org#63439 - fix server faults even further :( Good test-env by [Patrick Powell] is half the work Improvements: - call caching, with new methods compileCalls() and call(). Simplifies application, as shown by [Bernd Web] - new ::endPoint() - add fault structures to ::Operation::explain() on request by [Patrick Powell] version 2.19: Tue Nov 9 13:23:05 CET 2010 Fixes: - pass async flag of ::Operation::compileClient [Aleksey Mashanov] Improvements: - documentation fixes by [Patrick Powell] version 2.18: Mon Nov 1 17:10:17 CET 2010 Changes: - extra "action" parameter for faultMessageNotRecognized(). [Patrick Powell] - renamed XML::Compile::Operation to XML::Compile::SOAP::Operation Improvements: - also Faults which do not contain additional details will get decoded for convenience. Found by [Patrick Powell] - promote soapAction() from ::SOAP11::Operation into ::Operation - document availability of ::Operation::wsaAction() for ::WSA - produce error when binding of operation is missing. - XML::Compile::Transport becomes an ::Extension - added ::Extension::soap11ServerWrapper() - explain how to use ANY elements in SOAP messages. - ::SOAP::compileClient() can now be used with async transfer protocols. [Aleksey Mashanov] - document existence of ::Transfer::SOAPHTTP_AnyEvent - ::SOAP::messageStructure() also shows wsa_action. - remove dependency on Test::Pod - started with XML::Compile::SOAP::FAQ version 2.17: Thu Sep 30 17:05:42 CEST 2010 Fixes: - when the WSDL does not contain a soapAction, there will not be such field in the mime-header (because SharePoint gets confused) [Pete Groff] - when no namespace is defined in RPC, it should be interpreted as undefined, not produce an error. [Tapio Niva] - repaired WSDL interpretation problem with faults. Improvements: - received header and body elements which are not understood (hence cannot be decoded) will be included as XML::LibXML node in the result. Question by [Lars Thegler] - WSDL elements like service-name do now also accept prefixed names, not only qnames and local names. - explain will prefer to show types in prefixed form, which is shorter than the qname version. - do also cleanup server generated (out-of WSDL) faults and describe how to use them. version 2.16: Wed Aug 11 16:13:14 CEST 2010 Fixes: - rpc without parameters should create empty procedure element [Oliver Gorwit] - do not crash with http-get and http-post bindings in the WSDL. [Morad Igmir] A real-life server and examples are needed to be able to implement these protocols. Improvements: - accept FILEHANDLE argument in XML::Compile::SOAP::print*() Requested by [Max Cohan] - add XML::Compile::Cache version to the HTTP headers. - add 'Accept' HTTP line to request for SOAP answer (SOAP1.2) - $wsdl->printIndex() shows SOAP version with port name. - load wsdl-http.xsd in SOAP10, not WSDL11 version 2.15: Tue Jun 15 15:22:30 CEST 2010 Improvements: - add ways to extend SOAP11 operation definitions, to support extensions which are not in the WSDL. - add XML::Compile::SOAP::Extension for XML::Compile::SOAP::WSA version 2.14: Mon May 17 13:12:39 CEST 2010 Changes: - using WSDL with RPC/type, the values must not be labeled with the type, but the part name. Fixes: - ::WSDL11::explain() should pass options to operation search. version 2.13: Mon Apr 26 10:07:11 CEST 2010 Fixes: - crash when the data structure returned in a server handler does not match the expected structure. [Robin V.] - role keywords were not translated into URIs. Improvements: - SOAP11::Operation::compileHandler() new option "selector" - test the server side production of wsdl defined faults. version 2.12: Tue Mar 2 15:58:48 CET 2010 Fixes: - rpc return decoding. version 2.11: Tue Mar 2 09:27:40 CET 2010 Fixes: - syntax error caused by change in Log::Report. rt.cpan.org#55095 [Leandro Hermida] - rpc with part types was not processed correctly [Tapio.Niva] version 2.10: Mon Feb 8 19:43:42 CET 2010 Fixes: - action parameter of XML::Compile::Transport::SOAPHTTP::new() was ignored. [Titi Ala'ilima] - ::SOAP11::Server::faultNotImplemented() should only produce a fault structure, not a message. Improvements: - ::SOAP11::Server::compileHandler() _RETURN_CODE and _RETURN_TEXT in produced answer will be used in the HTTP header. - ::SOAP11::Server shows some client error messages in the server logs. version 2.09: Thu Jan 28 14:24:40 CET 2010 Fixes: - explicitly require XML::Compile in ::SOAPHTTP [Joel B] - good error handling when 'use XML::Compile::SOAP11' is missing. Improvements: - re-added /examples/wssecurity/security.pm to distribution. version 2.08: Thu Jun 18 10:29:13 CEST 2009 Fixes: - Fault's did not decoded since v2.05, reported by [Gert Doering] Improvements: - new method XML::Compile::SOAP::Trace::error() version 2.07: Tue Jun 2 15:52:20 CEST 2009 Fixes: - remove debug print statement version 2.06: Tue Jun 2 11:11:27 CEST 2009 Fixes: - removed XML::Compile::SOAP::Tester from t/01use.t [cpantesters] and rt.cpan.org#46588 [Dagfinn Ilmari Mannsaker] - repair call structure when not running with test server. Reported by [Luong Truong] - require 'namespace' attribute when SOAP RPC. Decided together with [Daniel Ruoso] - removed more references to the "fakeServer" implementation which never got around. There is a nice way to create "server stubs" to be able to test the clients without the need for a remote server. See the docs in XML::Compile::Transport version 2.05: Thu May 28 12:31:46 CEST 2009 Fixes: - remove XML::Compile::SOAP::Tester, because it was not completely developed. Signaled by [Georg Oechsler] - use 'namespace' parameter (if available) in SOAP RPC Reported by [Daniel Ruoso] - rpc-literal one-way fix (hopefully). Reported by [Daniel Ruoso] Improvements: - support MTOM and XOP in new modules XML::Compile::XOP(::Include) tests in t/60xop.t Needed by [Luong Truong] - trace which message top-nodes are being skipped. version 2.04: Mon Apr 13 19:01:15 CEST 2009 Fixes: - RPC/literal was seriously broken. Extended example by [Daniel Ruoso]. - address operation by port-name [Georg Oechsler] Improvements: - add filters on operations(), proposed by [Georg Oechsler] - added to ::Operation the accessors serviceName(), portName() bindingName(), portTypeName(). - added ::WSDL11::printIndex() - require LWP to be at least 5.825, because Perl 5.10 comes with a version which breaks on unicode [Anton Berezin] version 2.03: Wed Mar 25 15:44:10 CET 2009 Fixes: - auto-generate service block when missing and only one portType and binding defined. Used by Exchange. Reported by [Anton Berezin] - fix wsdl11 when "parts" is used. [Anton Berezin] - do not enforce an endpoint parameter. - do not let HTTP error codes confuse the transporter: sometimes they are produced by the SOAP handler. [Gert Doering] Improvements: - namespace work-around for unqualified Fault structure in SOAP11 envelope was implemented twice. Removed one. - accept 'server' option to compileClient, which does only replace the server name in the WSDL service location string, not the whole endpoint. version 2.02: Sun Feb 15 23:24:14 CET 2009 Changes: - ::Server::compileHandler() now returns a pair: contains a status code as well. Fixes: - restore accidentally removed ::Server::faultValidationFailed() - repair handling of server processing errors. - add clean handling of ::Server::faultResponseInvalid() - reuse created Server::faultWriter() - required XML::Compile::Cache 0.91 [cpantesters] Improvements: - trace the returned faults version 2.01: Thu Feb 12 09:48:17 CET 2009 Changes: - require XML::Compile v1.00 for element_form_default parameter rename. - SOAP::version not configurable, but class constant. Fixes: - crash on server errors, when throw() is called. rt.cpan.org#42528 [Piotr Roszatycki] - do not use /bin/pwd in t/99pod.t - do not prefix the user's keys without explicit user request via key_rewrite => 'PREFIXED'. Requires XML::Compile 1.01 Improvements: - lookup SOAP protocol via envelope namespace as well. - also *::Operation now shows protocol version(). - added serverClass() and clientClass() for ::Operation. version 2.00_01: Mon Dec 29 11:13:05 CET 2008 ************** MAJOR REWRITE!!! ******************* . WSDL11 based on XML::Compile::Cache, with much simpler code as result. . many classes and methods have been renamed or removed. . split-off SOAP12 into distribution XML::Compile::SOAP12 . the "document" style soap interface unchanged. . rpc-literal is much better now, like document style . rpc-encoded not yet supported. . pluggable back-ends for message structures (SOAP1.1, SOAP1.2,..) and transporters (SOAPHTTP, XMPP, ...) Changes: - Too many changes in internals to detail. - you have to explicitly load XML::Compile::SOAP11 yourself, to have those definitions understood by the WSDL. Fixes: - fixed t/30charset.t, with double encode of utf-8. Improvements: - port to Perl pre-5.8.3, working around broken or non-existing encode() [Toby Corkindale] - report cause on client error which is produced in LWP [Tom] - removed the [new in 0.78] added elementFormDefault="qualified" in favor of the new XML::Compile::Schema::importDefinitions() options which do the same. - more trace messages. - new examples for rpc-literal, based on Daniel Ruoso's example. version 0.78: Fri Oct 10 15:55:39 CEST 2008 Fixes: - improved understanding of top-level elements in XML::Compile 0.95 broke this module: . some schema lack elementFormDefault="qualified" changed in soap-encoding.xsd, wsdl-soap.xsd . some problems in the RPC encoder/decoder . disable t/51wsdl11enc.t Improvements: - do not use (big)float in test of t/15rpclit11.t version 0.77: Fri Aug 15 07:48:22 CEST 2008 Fixes: - Changes in XML::Compile 0.93 broke group processing in WSDL rt.cpan.org#38483 [John LoVerso] version 0.76: Fri Aug 1 13:18:21 CEST 2008 Fixes: - Correcting fault handling. Code and tests(!) contributed by [Jamie Lentin] - Requires XML::Compile 0.91, just because it is much better. version 0.75: Mon Jul 21 09:17:10 CEST 2008 Fixes: - Requires XML::Compile 0.90. Cpantesters [Martin Kutter] version 0.74: Fri Jul 18 22:01:24 CEST 2008 Fixes: - Reading SOAP failed, because improved strictness of XML::Compile [Jason Tang] Changes: - require XML::Compile 0.87, which renames option output_namespaces into prefixes. Improvements: - rename encoder option namespaces into prefixes. Old name still available. version 0.73: Tue Apr 29 18:59:42 CEST 2008 Changes: - require Log::Report 0.17, to fulfil promisses of the doc (was 0.11) - require XML::Compile::Tester - require XML::Compile 0.78 -> 0.81 Improvements: - example how to use WS-Security, contributed by [Alan Wind] - refer to mailinglist and IRC, set-up by [Matt S Trout] - Test scripts converted to use XML::Compile::Tester. Cleaned-out t/TestTools.t version 0.72: Wed Apr 16 13:03:26 CEST 2008 Fixes: - WSDL schemata passed to new() got parsed twice. - schema sources were offered for compilation twice, but ignored the last time. - schema mix-up with more than one WSDL object. [Kaare Rasmussen] - WSDL11->compileClient did not pass parameters to ::Schema::compile() as was documented [Allan Wind] Changes: - requires XML::Compile 0.73 -> 0.78 Improvements: - new option WSDL11(schemas). - only complain about limitation to SOAPHTTP protocol if no explicit transporter was defined. [Daniel Ruoso] version 0.71: Sat Apr 12 09:58:05 CEST 2008 Fixes: - Support XML which uses a non-utf8 encoding. Patch by [Gert Doering] The related test needs to be updated (print cannot handle byte- streams) - Client does not add Content-Length field. Patch [Drew Taylor] - headers were missing, since XML::Compile "reader in list-context" fix. Reported by [Gert Doering] version 0.70: Wed Apr 9 15:09:43 CEST 2008 Fixes: - Math::BigInt with GMP caused t/14dec11.t to fail [CPANTesters, Slaven Rezic] version 0.69: Tue Apr 8 23:48:31 CEST 2008 Fixes: - Trace returned on error was not transformed into an object, and resulted in unwanted undefs. - ::Trace->printTimings() did not handle undefs well. - Document that SOAPHTTP::compileClient(action) is optional, not required - ::SOAPHTTP will use LWP::UserAgent with Keep-Alive on. Changes: - require XML::Compile 0.69 -> 0.73 - ::WSDL11::Operation canTransport() implementation was broken, and therefore needed a change of behavior. Probably invisible for end-users. Improvements: - Automatic reuse of transport connections for all WSDL operations with the same endpoint(s). - New method ::SOAP::messageStructure() - New facility method ::SOAP::importDefinitions() - Added ::Util::MSEXT constant (MicroSoft Extension Framework) - Make XML::Compile::SOAP::Daemon work by extending ::SOAP::Server and ::SOAP11::Server implementations. Implementation completed. - Added TODO file. version 0.68: Fri Mar 14 17:56:37 CET 2008 Fixes: - sender/receiver compile options where not passed to ::Schema::compile() - use of ::Transport::SOAPHTTP was not correctly described in its SYNOPSIS [Marc Sebastian Pelzer] - SOAP.pm did not use hires-timings Improvements: - XML::Compile::SOAP::Trace added for simplified debugging. This also simplifies example/namesservice/has_wsdl.pl version 0.67: Fri Feb 8 09:16:15 CET 2008 Fixes: - WSDL types were compiled twice. - problems with specifying your own transporter when creating SOAP calls based on a WSDL. - upgrade requirement XML::Compile to 0.68 - ::Encoding::dec() [decode RPC] tries harder. with help of [Philippe B.] Improvements: - Pass information about location of type definitions to XML::Compile, for debugging and tracing. - ::Encoding::array new option array_type version 0.66: Thu Jan 31 09:30:18 CET 2008 Fixes: - the SOAP message is a document, not an element. This way, we get the right output encoding for free. Problem spotted by [Gert Doering] - more encoding/decoding character-set issues. Test script in t/30charset.t Improvements: - details about client-side soap moved from ::SOAP into ::SOAP::Client - ::SOAP::compileClient() moved to ::SOAP::Client:: - example for $wsdl->compileClient() by [Allen Wind] - updated the docs, wrt non-existing SOAP1.2 support, triggered by [Allen Wind] - initial implementation of XML::Compile::SOAP::Server - return multiple elements in RPC-encoded constructor. Needed by [Philippe B.] version 0.65: Mon Jan 7 11:58:52 CET 2008 Improvements: - do not fail in ::Operation::collectMessageParts() if the input or output part description is missing. [Kaare Rasmussen] - support for one-way (WSDL) messages, pushed by [Kaare Rasmussen] version 0.64: Tue Nov 27 11:42:45 CET 2007 Changes: - various improvements in the output of Encode::decSimplify(), the automatic decoded rpc-encoded messages. - depends on XML::Compile 0.61 Fixes: - ::Encoding::_dec_typed() confused URI and prefix. - rpc-encoded now tests that user's constructed question has a name-space. Improvements: - updated examples in example/namesservice/ WSDL example is now called: has_wsdl.pl - added new example/namesservices examples: New pure Schema example: has_schema.pl RPC-literal example: rpc-literal.pl RPC-Encoded example: rpc-encoded.pl and 4 related simplifications, named xxxx2.pl - added for convenience: Encoding::encAddNamespace() [without s] version 0.63: Sat Nov 24 00:14:07 CET 2007 Changes: - requires XML::Compile 0.60 - ::Encode::typed() now uses selected schemaNS as default, so simplifies the type parameter. - ::Encode::element() now also has the 'type' as first parameter, like ::typed(). Fixes: - detection of operation type, where WSDL used prefixes. - some improvements and changes where not listed in the changelog for version 0.62 - fixed ::Encode::typed() when value is already an element - WSDL11 headers parsed wrongly. [Gert Doering] Improvements: - added t/51wsdl11enc.t - added ::Encoding::nil() - test for ::Encoding::struct(); version 0.62: Mon Nov 19 12:55:42 CET 2007 Changes: - XML::Compile::SOAP::HTTPClient renamed into XML::Compile::Transport::SOAPHTTP. It is reworked to extend the new XML::Compile::Transport. Change invisible to WSDL users, but very visible to people who create their own messages. Some of the trace records changed name as well. - swapped arguments of ::Encoding::typed() from (name, type, value) to (type, name, value); - WSDL11(::Operation)::prepareClient() renamed into ::compileClient() Improvements: - moved README.todo text to XML::Compile::SOAP man-page, because people often use pre-packaged modules and therefore may not see the README files. - extended the documentation a lot. - implemented XML::Compile::SOAP::compileClient(), which was documented but not present. - added transport base class XML::Compile::Transport. - compileMessage() accepts pre-compiled READER and WRITERs, not only element types. - implemented (and documented/tested) literal and encoded RPC. - added Encoding::encAddNamespaces() - added Encoding::struct() - use fake_server to t/wsdl11.t version 0.61: Tue Nov 6 13:56:54 CET 2007 Fixes: - expected installation problmes due to version number. version 0.60: Tue Nov 6 13:52:45 CET 2007 Changes: - requires XML::Compile 0.58 - Empty parameter list at operation will be passed to a single body element. Improvements: - XML::Compile::SOAP::Encoding::decSimplify() - Working(!) example included. version 0.59: Mon Nov 5 15:57:30 CET 2007 Changes: - requires XML::Compile 0.57 Improvements: - added XML::Compile::SOAP::Util, where all often-used URIs are now defined. - added XML::Compile::SOAP::Encoding, for XML-RPC. tests in t/13enc11.t and t/14dec11.t version 0.58: Mon Oct 22 10:53:30 CEST 2007 Fixes: - XML::Compile::SOAP::Server was missing from the MANIFEST. Cpan-testers, [Slaven Rezic] version 0.57: Thu Oct 18 09:33:10 CEST 2007 SOAP11 might be working, partially. No tests with real HTTP connection yet. Fixes: - XML::Compile::SOAP1[12]::Client's were missing from the MANIFEST Changes: - roleAbbreviations() became roleURI(), and new roleAbbrevations() which does the reverse of the old one. Improvements: - producing and decoding faults, with tests in t/11fault11.t - implemented XML::Compile::SOAP::compileCall() - moved description of missing implementation features from XML::Compile::SOAP manual page to README.todo version 0.56: Fri Oct 12 14:54:25 CEST 2007 Massive changes and extensions, but still not functioning. - split-off XML::Compile::SOAP::Daemon and all its needs into a seperate distribution. - implements XML::Compile::SOAP::Tester - implements XML::Compile::SOAP11::Server - implements XML::Compile::SOAP12::Server - moved parts of XML::Compile::SOAP1[12] into XML::Compile::SOAP1[12]::Client, and reworked examples. - translated some die's and warn's into Log::Report - use "5.008" in Makefile.PL, to replace "use 5.8" which is not understood by Perl 5.5 [Slaven Rezic] version 0.55: Wed Oct 3 22:57:24 CEST 2007 - first attempt on a full implementation. Quite some interface changes were made; old docs are useless. - fork from XML::Compile - renamed XML::Compile::WSDL into XML::Compile::WSDL11 - renamed XML::Compile::SOAP::SOAP11 into XML::Compile::SOAP11 - renamed XML::Compile::SOAP::SOAP12 into XML::Compile::SOAP12 - install xsd's automatically, grouped in directories XML/Compile/{SOAP11,SOAP12,WSDL11}/xsd/ - added wsdl11soap12.xsd - Log::Report (translation) namespace xml-compile-soap - depend on LWP - renamed XML::Compile::SOAP::Operation into XML::Compile::WSDL11::Operation. - Added XML::Compile::SOAP::Client and ::Server - Added XML::Compile::SOAP::HTTPClient and ::Server
https://metacpan.org/changes/distribution/XML-Compile-SOAP
CC-MAIN-2015-11
refinedweb
4,353
51.14
Socialwg/2016-10-25-minutes Contents Social Web Working Group Teleconference 25 Oct 2016 Attendees - Present - eprodrom, aaronpk, wilkie, akuckartz, ben_thatmustbeme, rhiaro, sandro, cwebber, tantek, bengo - Regrets - - Chair - Evan - Scribe - ben_thatmustbeme Contents - Topics - Summary of Action Items - Summary of Resolutions <rhiaro> I can hear but break-up-y. Won't be able to scribe today <rhiaro> Probably my wifi <eprodrom> scribe? I haven't in a while <scribe> scribenick: ben_thatmustbeme <cwebber2> I heard "I'm going to ____" <akuckartz> ben_thatmustbeme++ <Loqi> ben_thatmustbeme has 176 karma (57 in this channel) approval of minutes from last meeting <eprodrom> PROPOSAL: approve as minutes for 2016 Oct 18 meeting <rhiaro> +1 <akuckartz> +0 (was not present) eprodrom: if you have not already reviewed those, please review them <cwebber2> +1 <sandro> +1 <wilkie> ben_thatmustbeme: last week was a killer too but you haven't lived until you've scribed a F2F tho +1 <wilkie> +1 <eprodrom> +1 RESOLUTION: approve as minutes for 2016 Oct 18 meeting <wilkie> ben_thatmustbeme: then you've lived a good and fulfilling life! :) <eprodrom> <Loqi> Social Web WG Face to Face Meeting at MIT (F2F8) eprodrom: we do have our F2F coming up in november, 3 weeks away, if you have not yet signed up please do so, so we can plan logistics ... link in IRC ... it will likely be one of our last F2F meetings, if not our last and we have a lot of talk about there ... sando, do we have anything else to discuss there? sandro: not unless anyone has questions AS2 eprodrom: we had a lot of discussion of AS2 going to CR last week ... we have a few bugs to fix, and some other items <cwebber2> eprodrom, I should be able to get implementation reports in, though I might need to be pinged eprodrom: i did not have much time to work on it this week but i will be pushing it this week ... mostly its editorial issues, a few normative issues that we resolved that i just need to close, and we need implementation reports ... i would really like to have our first implmentation of pump.io by F2F ... i'll also be doing an implementation report for the validator and hopefully james will have one too ... there was a question about twitter using AS2. i reached out last week, but I am still waiting for a response back ... are there any questions for me or james on AS2? <rhiaro> I just want to raise for myself mostly that a human readable version of the AS2 namespace is still on my TODO list eprodrom: if not i'm good moving along for now <rhiaro> (and adding the extensions section with AP terms, etc) eprodrom: <<repeats rhiaro comments from chat>> ActivityPub <cwebber2> shoot <cwebber2> my phone disconnected eprodrom: lets hold off on that while cwebber2 reconnects PubSub aaronpk: I did apparently volunteer last week to create the test suite, so far i have a plan of the list of tests to write but i plan to make progress on that this week. <cwebber2> reconnected aaronpk: over the last 24 hours or so there have been a whole bunch of issues opened on pubsub ... i would love to get more eyes on them <sandro> aaronpk: i tackled half of them already this morning to try and get some resolved if possible ... link in IRC eprodrom: any in here you find needs discussion today? or are we not ready for that yet? <Loqi> [@jirikuncar] Welcome PubSub protocol standard on W3C 🎉 () aaronpk: there were some suggestions to rename it... again sandro: lets leave that to the thread <tantek> oh dear really?!? aaronpk: i think most of these are fine to allow to continue to talk on the threads <wilkie> if that's the biggest issue that doesn't seem so bad haha <Loqi> awesome <aaronpk> new name issue: eprodrom: i really hope we don't persue that much further, the name took enough effort <tantek> FWIW I can live with "PubSub" and have yet to hear anything even remotely more palatable eprodrom: on the test suite, do you have an intention to do an online test server similar to the web webmention works? aaronpk: yes, similar to webmention and micropub, a tool that acts as the other end for you and will track what features are available and build the implementation report from that eprodrom: have you had a chance to look, are there normative issues here? aaronpk: there are some around timing and retrying ... some are editorial, some are tightening up language ... like defining that a time in seconds must be positive integers, things like that eprodrom: so some are normative, okay ... anything else on this agenda topic? sandro: can i ask one big question? ... when we first talked about it, i raised the issue of payload type. have we thought more about what we are doing there? <aaronpk> sandro: i haven't seen any discussion, but maybe it happened... aaronpk: no, we haven't. There is one issue around diffing versions. I don't think its going to be possible to actually specify that around that ... i think this is going to be around notifiying and not around the actual content delivery sandro: so there is going to need to be another spec? aaronpk: i think there will need to be a profile of the spec, similar to oauth2 sandro: so for me to use this to syndicate blog posts, this isn't going to tell me how to do it? <aaronpk> <Loqi> [Julien Genestoux] PubSub aaronpk: you will need this spec and the documentation from the hub you are using sandro: that seems sub-optimal <tantek> does anyone actually use the payload in practice? aaronpk: i agree, also the publishing section is empty, which is a seperate issue, but similar sandro: that leaves me confused as to what the use of this spec is aaronpk: it provides interop on some aspects tantek: the flip side is that we have real world experience where it is working sandro: but thats not via this spec tantek: i don't think you are asking the right question sandro: i think there is clearly something that works, but what works is not being specified by this spec tantek: i'm hoping that we can fill that in based on experience aaronpk: one of the issues there is that the spec tries to be content type neutral ... to do that, it can't specify that with diffing types ... the most interoperable way to do that, is to use XML feeds, specifically RSS and ATOM ... one way is to put those in to the spec ... but then its not really content type neutral sandro: one way is to put what you just said in to the spec and then give people links to where they can handle those tantek: i feel a little uncomfortable with that, i feel like some of it will have to be in the spec ... i think its a reasonable approach to document "heres the content-types that we have found to work as of today" and then give people some idea of how to make their own types work ... i guess from an implementor perspective, i'd rather document what works now, rather than dance around it for now ... as for right now i believe we have interop with RSS, ATOM, and h-feed aaronpk: yes tantek: and then it becomes a list for people to get into the party with sandro: i guess it becomes a question of where we put that? normative, as another note? ... i'm guessing that h-feed is maintained in the same way as mf2? tantek: yes, the individual format specs (RSS, Atom, h-feed) already document how to parse the formats, what we can do is specify what to do with that parse result, which tends to be very similar in each of those cases at least <tantek> no I said the format specs document the parsing of the formats sandro: I'm trying to picture how that text is, for RSS i feel that would be a paragraph <aaronpk> <Loqi> Subscribers tantek, can you document that better you spoke fast aaronpk: let me link to the documentation for superfeedr, (in irc), let me say that content type is also only important for fat-pings ... with thin pings there is no content in the notification, then its outside of the spec for the subscriber to actually fetch the original URL, and then its all outside of this mechanism eprodrom: it sounds like we could get a lot of use out of getting like 4 content types in there and that would get the 80/20 ... it sounds like sandro needs to make an issue in the issue tracker tantek: one of the nice effects of this is that we can treat each of these as somewhat orthoganally, and when we find one we can make tests based on that content type ... and we can just put any others at-risk ... i'll just be direct, i don't think anyone is publishing as2 with pubsub, we could put it at-risk and if we need to get through CR and we don't see any implmentations, we can also spin it off in to a note and then that note can be maintained by the community group or whatever eprodrom: its been a while, but its things like "do you send the entry or the feed with one item in it" literally that can be solved with one sentence, and that would help a lot with interop tantek: the only part i had on that was the different was the diffing vs the fat-ping <eprodrom> No more pings! tantek: the thin-ping is to send the URL only and then the diffing is seperate, if we use the fat-ping method, we have to specify what goes in to that body ... we would have to consider those two approaches independently as well eprodrom: anything more to discuss on pubsub? tantek: whats the next step? eprodrom: sounds like the next step is to address the issue queue, i count around 17, with considerable discussion ... sounds like we'll be having some next steps ActivityPub <cwebber2> <cwebber2> cwebber2: hello, last week we talked about bringing AP to CR this week. We had some really involved issues that we ended up having to go through. They are all now marked as 'waiting for commentor', the 4 that were filed by bengo. I don't know what the process is on this, i have answered them with i htink an acceptable response, with the exceptions of 162. I am not quite sure what was being asked <tantek> hmm, we should get bengo here to discuss cwebber2: we are waiting on those 4 issues, hopefully bengo will respond within the next week ... there are some other issues, but they seem like they will be easier ... there are 2 issues i feel should be discussed in the group <tantek> !tell bengo can you join us in the telcon 2016-11-01? we need your help resolving some ActivityPub issues interactively so we can get move it along toward PR! <Loqi> Ok, I'll tell them that when I see them next eprodrom: so you have 2 issues that you need to be addressed by the group, lets try that now ... lets get those 2 first we'll then go on to SWP and we'll come back and see what time we have for additional ones <cwebber2> cwebber2: 155 is potentially thorny. Someone has asked to have a history to show old revisions of an item ... i don't think that would be trivial method unless we do it in a history entry ... i feel its a bit late to add to AP core ... i think it makes sense as an extension eprodrom: i think it makes more sense to have a collection of activities like lifecycle, here is its creation, its edits, comments, here's its delete ... so using the activities to show the history ... that said, if you wanted to have a history property, then it would make sense that way <tantek> has anyone implemented this a all? cwebber2: i would be okay to add that with marking it at-risk, but i feel like its likely not something thought through well enough ... do you think we should put it as "for later version" and leave it as an extension for now eprodrom: i htink that makes sense <Zakim> tantek, you wanted to note stage of an idea / proposal vs stage of a spec <tantek> yes, for "later version" would be appropriate cwebber2: is it okay to mark it as later version and close it or leave it open eprodrom: i would leave it open tantek: the general concern here is that activity pub is basically like trying to be in CR, even though we aren't. That means we really don't get to add new features unless its a major blocker for implementation ... once we recognize that, what level of maturity is it? is it an idea? prototyped? already working for people? technically we can add anything to the spec thats within the scope of the charter, but generally we have been trying to push for people to incubate them before putting them in a working draft ... from my understanding no one has even prototyped this cwebber2: thats my understanding too ... great, i will respond to the issue as such tantek: and encourage them and even possibly help with incubation cwebber2: i'm reasonably optimistic that we will be able to go to CR next week <akuckartz> cwebber2++ <Loqi> cwebber2 has 76 karma SocialWebProtocols <eprodrom> rhiaro: ? <tantek> cwebber2++ thanks for your diligence with the flood of ActivityPub issues. My goodness. <Loqi> cwebber2 has 77 karma rhiaro: there was a request for me to update SWP with new doc status, we haven't had the transition calls for LDN or PubSub so i didn't know if we wanted to wait tantek: i think its worth it for FPWD of PubSub ... we don't actually have the transition called scheduled yet do we? sandro: we're working on it ... we may not need it tantek: there are two things we need on that call rhiaro: we are aiming to get them published next tuesday one way or another eprodrom: are we ready to go to another WD with an update of FPWD of pubsub? <cwebber2> tantek, thank you :) eprodrom: if we do a resolution, you would be able to publish it <rhiaro> eprodrom: is there any reason not to do that, is there anything else we want in there? <rhiaro> (that fragment is broken, willf ix) <eprodrom> PROPOSED: publish a new working draft of Social Web Protocols <cwebber2> +1 +1 <rhiaro> +1 <eprodrom> +1 eprodrom: amy is that ok? <tantek> +1 <wilkie> +1 <rhiaro> There's a bunch of stuff that needs to go in there still, but if we're not waiting for other document status updates, there's no need to wati for that <akuckartz> +1 RESOLUTION: publish a new working draft of Social Web Protocols <tantek> I like this rhythm of updating our overview document when we update the individual documents. eprodrom: you have the resolution you need <tantek> I think it helps the outside confidence in our overview document, which is pretty important for understanding our work as a whole. eprodrom: we are near the end of our agenda, i believe we have webmention next <aaronpk> sandro, let me know if this captures it for you Webmention <aaronpk> aaronpk: the only thing i wanted to talk about today, we that in webmention we need to change a reference to the WHATWG spec instead ... its a more up to date spec of what a URL is, especially for hte purposes of webmention ... its technically a normative change, but it won't effect any implmeentations tantek: its my understanding that this is the kind of change we can make between CR and PR sandro: its a change in reference between what and what? aaronpk: from RFC3986 to the WHATWG URL spec sandro: whats the difference between them? i'd have to run it by ralph ... if you want to just send me a draft and CC chairs tantek: i've seen the webapp grounps switch as well, so i think this makes sense, we're not the first group or spec doing this ... we can provide citations for that sandro: and there is no intended difference? <cwebber2> lol tantek: it should not effect implmentations, but its a more up to date reference eprodrom: is there enough of a difference here that its worth this effort? ... can we just gloss over this and move on? tantek: i think its a due dilligence kind of detail, we're getting close to PR and this is crossing your T's and dotting your I's ... the intent was to cite what a URL was, not to specifically reference an RFC ... i think thats a good detail to fix before we go to PR ... its good that we're only talking about this kind of detail at this point eprodrom: it makes sense to me, i just don't want to spend a lot of cycles on this unless its a worthwhile change, and it sounds like this is something everyone will be doing anyway ... do we have other discussions on webmention? tantek: do we want a group resolution on that issue pending ralphs approval? ... we might as well get it out of the way so we don't have to talk about it again <eprodrom> PROPOSED: adopt as URL standard reference for Webmention <tantek> +1 <eprodrom> +1 <cwebber2> +0 I'm not informed enough on the issue to really know, but seems fine by me eprodrom: aaronpk does that make sense to you? aaronpk: yes +1 <aaronpk> +1 <bengo> +0 <Loqi> bengo: tantek left you a message 22 minutes ago: can you join us in the telcon 2016-11-01? we need your help resolving some ActivityPub issues interactively so we can get move it along toward PR! <akuckartz> +0 <wilkie> +0 <sandro> +1 assuming we can do it <bengo> Time zone fail, I showed up an hour late eprodrom: any objections? <cwebber2> bengo, basically we wanted feedback on the things you filed in ActivityPub RESOLUTION: adopt as URL standard reference for Webmention <cwebber2> bengo, they are all now Waiting for Commenter :) <bengo> cwebber2 ya we can just work via github eprodrom: we are now at 5 minutes past and we are now at the end of the agenda ... i do want to come back to AP, since we were waiting for bengo. would it be woth bringing that up now? cwebber2: bengo said we can work on github as long as he can help get quick turn-around to get these done by next week bengo: i will do it right now <tantek> great! eprodrom: okay, anything else we need to discuss then? ... thanks for coming everyone <wilkie> thanks <eprodrom> Thanks everyone <tantek> ben_thatmustbeme++ for minuting <Loqi> ben_thatmustbeme has 177 karma (58 in this channel) <eprodrom> trackbot, end meeting
https://www.w3.org/wiki/Socialwg/2016-10-25-minutes
CC-MAIN-2017-13
refinedweb
3,197
61.6
Aggregate Roll Present: Cisco: Raj Nair Ericsson: Nilo Mitra Fujitsu Limited: Kazunori Iwasa Hewlett Packard: Stuart Williams (scribe) IBM: Dug Davis IBM: John Ibbotson IBM: David Fallside (chair) Idokorro Mobile (Planetfred): Mark Baker IONA Technologies: Oisin Hurley Lotus Development: Noah Mendelsohn Macromedia: Glen Daniels Microsoft Corporation: Henrik Nielsen Microsoft Corporation: Paul Cotton Oracle: Jeff Mischkinsky Rogue Wave: Murali Janakiraman SAP AG: Gerd Hoelzing SAP AG: Volker Wiechers Sun Microsystems: Chris Ferris Sun Microsystems: Marc Hadley Systinet (IDOOX): Jacek Kopecky Present (partial): Active Data Exchange: Richard Martin Mitre: Paul Denning Mitre: Marwan Sabbouh Oracle: Anish Karmarkar W3C: Hugo Haas Present (remote): Canon: Jean-Jacques Moreau Canon: Herve Ruellan DevelopMentor: Martin Gudgin Intel: Highland Mountain Software AG: Michael Champion W3C: Yves Lafon Excused: Active Data Exchange: Shane Sesta Cisco: Krishna Sankar DevelopMentor: Don Box Fujitsu Limited: Masahiko Narita Intel: Brad Lund IONA Technologies: Eric Newcomer Macromedia: Simeon Simeonov Rogue Wave: Patrick Thompson Software AG: Dietmar Gaertner Systinet (IDOOX): Miroslav Simek Regrets: Akamai Technologies: Mark Nottingham AT&T: Mark Jones BEA Systems: Jags Ramnaryan BEA Systems: David Orchard Compaq: Yin-Leng Husband DaimlerChrysler R. & Tech: Mario Jeckle Data Research Associates: Mark Needleman Matsushita Electric: Ryuji Inoue Philips Research: Yasser alSafadi Philips Research: Amr Yassin Tibco: Frank DeRose Unisys: Lynne Thompson WebMethods: Asir Vedamuthu Xerox: Ugo Corda Absent: AT&T: Michah Lerner Compaq: Kevin Perkins DaimlerChrysler R. & Tech: Andreas Riegg Interwoven: Ron Daniel Interwoven: Mark Hale Library of Congress: Ray Denenberg Library of Congress: Rich Greenfield Martsoft: Jin Yu Netscape: Ray Whitmer Netscape: Vidur Apparao Novell: Winston Bumpus Novell: Scott Isaacson Tibco: Don Mullen Unisys: Nick Smilonich WebMethods: Camilo Arbelaez 09:00 Introductions: 09:10 Scribe: Stuart volunteers. Agenda Review: DF: Walks through agenda 09:15 Schedule (discussion preview) DF: Previously expected to go from this meeting to last-call within a week. That won't happen. There are a bunch of documents that need to be completed. We aren't going to manage that in a couple of days AOB Call: None from Burlington; None from Rennes None from Zakim audio 09:20 Approval of minutes from Telcon of 21st Novembers 2001 DF: Issues/corrections to minutes? Silence DF: Approved as posted. Action Items: MB: Issue 54 resolution text submitted. Done! HFN: Rewrite of R309... still pending MB: Issue 40 resolution text. Henrik had offlist concern with 2nd paragraph. Minor concern... DF: Do we have final text for 40. Please coordinate (MB, Marwan, HFN?) to finalise this text. HH: Yves reports that he has completed AI with Winston. Mail sent, no reply... mark pending. SKW: Isse 32 resolution text... done. MH: Issue 172 text... done SKW: Issue 146 text... done Gudge: Issue 130 text... pending Editors: Fault dot notation removal... pending HFN: New issue on fault codes... pending. PC: Question re resolution of issues related to Base64 (i97) and possible dependancy on XML Schema. DF: This is an ETF flagged issue. 09:30 Schedule: DF: Couple of slides... apologies to remote particpants for not being able to present these remotely. Will make best efforts to describe. DF: Scenario 1: Previous schedule... [Ref David's slides] scenario2 scenario3 New schedule: LC WD early Feb 2002 PR WD late Apr REC Mid July Assumes we resolve issues and test cases by end of Jan.. the LC end Jan/early Feb. One of the things that makes this scenario less attractive is the 'hanging' F2F at the end of Feb. Not great wrt schedule. We have spoken about F2F at the end of April for F2F prior to PR. DF: Scenario 2 (Green triangle). LC WD end Feb (take advantage of Cannes F2F prior to going LC) PR WD end May REC mid Aug. NM: Quiet period in August? DF/PC: Need to assume publication will occur more slowly in August. MB: What happened to CR? DF: Due to widespread implementation W3C has advised that we can dispense with CR period. The LC period is slightly extended. RM: Some question of combining with a Web Services activity.... any impact? DF: Don't think this will impact us. CFerris: What would it take to get some commitment to doubling up on the number of telcons? DF: Given TBTF and ETF commitments... I think that it is difficult to schedule. NM: How many folks have read both the specs from cover to cover recently...? No response. NM: I think that there are a bunch of things that we need to address that are not evident in the issues list. Some things need serious wordsmithing... eg. issue of defaulted attributes. If we got to LC by early to mid-Jan we should be substantially done. Propose, with some nervousness, that we go for second option. HFN: ...so how do we do this? NM: Basically have to encourage everybody to read the specs. Generate review commentary for a team including the editors to consolidate, and present back to the WG to ensure that all issues are captured... CF: NM: Editorial team needs to get to comfort level that the document 'reads well'.... DF: Can see this forming as an action to the editors to propose back to the group how to achieve this... MH: Partially this is due to our resolution text and the reluctance of the editors to massage carefully worded text and not destroy meaning. Jeff: back to discussion of schedule... what if even the green triangles don't work out... what's the fallback? DF: We can't go to last call with open issues. It is under our control what we accept as issues. We could impose a timelimit on when we are open to accept issues (W3C may have an issue with us doing that). What happens if we're not done... theres the hard approach which is that we just don't let it go past that mark... HFN: Concern that we are not as good at resolving issues as we might be. Encourage that we do more on the issues on email so that we can be more efficient on email. "How many issues have I helped resolve this week" NM: ...so reality is that we will get push back when we go to LC. Want to go for good 80/20 cut on Issue resolution. We don't want issues that are not adequately resolved will bite at a possibly inconvenient time. PaulC: Hard for a WG to push for a change in status without a F2F. So support 2nd option. Need to ensure that the LC draft is available well ahead of that F2F. Wanted to publically put on the table frustration with issues going undiscussed on email. So when it comes to crunch time you have make sure that you've done due diligence on to the discussion ahead of the telcons/meeting. Dug: Another WD for public viewing? DF: When...? DF: I'm assuming that we will prepare a new draft after this meeting... our heartbeat (due 2nd Jan). Something substantive... needed for heartbeat. Anish: How does new schedule affect new charter proposal? DF: This is currently SOAP without attachments. Schedule is based on what we already have on our plate. Still intent to recharter inclusive of SwA... still a chair's todo. PaulC: Point of Information: There are 18 substantial issues that none of the TF's own. Suggest that we assign all issues to bodies or groups of bodies. DF: These substantive issues are on the agenda for discussion... PC: Clustering...? DF: There is some clustering..... PC: So this is about upping the meeting/resolution rate. The ETF will be done in a couple of weeks and more people may become available. CF: We have had a recent tendancy to close one issue and generate 3 more... DF: Need to be careful about that. eg. Resolution of 135 did identify that there were two different issues. NM: The angle to drill on Paul's concern is more parallelism. We've had some pretty chunk TFs. I think that we can do better with smaller 'TF'lets working some of the issues. DF: Just to further address the parallelism and assignment... went through entire list checking on activity and assignment. If they are not on the agenda, they are 6 postponed and ... 6 against AM and some in a catch bucket. Believe has done due diligence on the entire list. DF: Suggest that editors take an action to proposal on how to figure out a plan for how to achieve a consistent narrative. PC: Would like to encourage that we assign two people to read over the entire spec. NM: Why not very one... PC: Well we need to have someone to take responsibility. DF: Ref charter... participation is expected to consume at least 1 day per week of each members time... contribution is expected/required. Returning to the point that Paul/Noah raised... should we assign at least two of the editors to read thorough entire spec. JI: Picking up on the point from Noah/Paul it would be good to include a none editor. John volunteer's. Action: JI to read through Part 0, 1 and 2 and generate Dug: Need to set a date by which the group has fully reviewed the spec. DF: There were some question marks on the timeline. DF will huddle with editors to clarify the timeline. ..: Good to have a date for a stable review copy. NM: Two sets of reviews... the pieces that we believe are near final and another capturing those pieces that we are much less certain about. DF: Commits to clarif schedule by Thursday. Want to keep us on track for this meeting. 10:25 Break 11:00 Review and Publication DF: We have a number of documents. We need to figure out what to do with a bunch of these. DF: Oisin can you talk about the test case document? OH: It's looking more complete... I could perhaps do some review and give a summary before the end of the meeting. DF: I was expecting Hugo... but... YL: Hugo has some problem that he has to resolve today... hopeful for Thursday. DF: Parts 1 and 2... part of the review of the spec is contained within our issues list. We've had some indication from Noah, that there are some other issues... any thing else? DF: Get the status of the Part 1/2 documents from the editors. Saw Marc Hadley's response: Part 1/Part 2 Editorial Issue Review: i145 still outstanding but possibly addressed by resolution of 10 NM: Would find it helpful to have a summary of the technical resolution. CF: i10 is about PI's and XML Decl. NM: The crux of the issue seems to be that the means by which an Infoset is transferred is binding specific. We're infoset based so we need an infoset based answer. DF: Volunteer to address the resoultion of Issue 10 and Issue 145. ACTION ITEM to Marc Hadley: i151 Defintion of a SOAP block. HFN: ...just to be clear we are just reviewing the status here... we're not trying to resolve them right now... DF: I want to check on the status of each of these issues. I think it is reasonable for folks to see the proposed/actual changes applied to the spec. Some discussion of the typing of SOAP blocks... element qnames for top level blocks denote block type. i152... done NM: Suggest a the addition of a reference to the SOAP processing model. The relevant sections do not declare themselves to be the "SOAP Processing Model" ACTION: Editors to consider addition of such a reference. i156... done i158... wording amendment... done. NM: Interaction between two sentences that require some further work through addition of the word 'targetted'. ACTION editors to revisit wording of these sentences to remove the interaction (ref Noah). i47 Assigned to ETF, not done, candidate text to dist-app, awaiting a response. i117, i125 ???? i162 change to BNF... done. Need a reference to BNF. i55... pending i10... XML Decl in whole messages. Dup of 145? NM: This uncovers that we need to say something in adjuncts about the relationship between infosets and serialised XML and that is explicit about the conventions used in the examples. CF: Rationale behind excluding DTD productions/PIs etc. is to get to interop...? NM: I believe that PIs, Internal DTD subsets et. al are included Infoset. CF:...??? NM: SOAP messages are formally Infosets and in all our examples we present serialisations, not infosets... HFN: Just at a sentence to the conventions. ACTION editors: develop a text to describe these conventions. .... i110: Normative/Non-normative granularity.... and conventions... not done i119: Versioning example... done... added example in Appendix A returning multiple version numbers... i120: Schema type changes ur-type to anyType... done... i125: SOAP acronym... done... text added that SOAP is not an acronymn... i143: pending i147: closed... references from part 1 to part 2. Removing enumeration of part 2 contents from within part 1. i148: ...done. i149: Goals text... done... i150: Section 1.3 wording... done.... infoset style wording adopted. i153: pending.... i157: Wording amendment... done. MH: has a list of issue resolutions that have been applied to the spec... DF: Change log in the spec should be enough. If folks in reviewing the specs, editorial etc... those should be sent in to xml-dist-app... there was a posting a couple of days ago... we need to look through these. HFN: From the point of view of Issues list its easier to have an email per issue. ACTION: Issue list maintainers to bring issues list upto date with current resolutions. DF: Question of what to publish as our next WD. Do we just pub what we have now or do we need to raise the bar? Eg. there are some more issues that have been resolved but not applied to the spec. Is there something that we want to get in: MH: XML Base support, i48 on data model (needs agreed text). SKW: What about material from TBTF? DF: So critical pieces seem like TBTF, XMLBase, ETF.... NM: MH: Urge some caution in introducing TBTF introduction in Part 1 without accompanying pieces for Part 2. Urge consistency between presentation of bindings in parts 1 and 2. DF: Didn't quite get the circularity concern. NM: ... really a sense that I'd be happy if you asked this question again mid-Thursday. DF: I'm interested in establish a criteria... what if we can agree on the TBTF materials... HFN: Agree with Marc that it 'would be nice' to have consistency between P1 and P2. If we have to choose I would prefer to have a draft made available ahead of the holidays. CF: Perhaps we can simply insert a note indicating that we are aware of the inconsistencies. Isn't that enough, and set expectation for the next WD. DF: Short circuit question... if we did nothing else that changed the content of the spec... would you be happy to put the current draft (editors copy) as the next WD. MH: Yes... DF: ...so anything else that you can get done is 'gravy on the turkey!' 11:55 Part 0: DF: Nilo, you have requested a formal review of the primer... Nilo: Used completely new examples. Previous version started with concepts, concerns that there need to be a gentle ramp up. Much more needs to be done in the area of encodings and intermediaies. Marwan: NM: Once again there's the infoset question... for most users don't be concerned about the difference. CF: Full treatment of the binding framework. DF: Need to make sure that concepts are introduced before they are used.... PaulD: References to the Usage scenarios.... DF: I think that's a long standing issue.... JI: need to establish what the role of the Usage scenario documents. NM: Explaination of the .../next behaviour. Need a simple way of discussing this... SKW: Possible question of taste... John Doe usage. DF: URL usages issues... mycompany.com etc. use example.com and example.org. SKW: Might be useful to say more about the rationale for choosing to put information in header or body blocks. Section 3: OH: Was a little surprised to see references to SMTP binding. Nilo: I do point out that this is not intended to present a normative SMTP binding... this is just an example. JK: Suggest renaming to SMTP to email binding.... DF: Question... apparent discomfort over SMTP binding. Do we need to make this name change in order to publish as a working draft. Marwan: I would prefer to stick with SMTP. Don't understand why more vague binding to email would be better. JK: Well there are a bunch of other protocols involved in transferring email. HFN: Could say that its and RFC822 binding... don't need to go into the intricate details of that mail protocols that we use. NM: I hear Nilo agree to the crux of what it takes to publish this. Would rather head down the road of making it clear how sketchy this is. Suggest that second (SMTP) is merely a sketch of how other protocols might be used... Nilo: Also indicate that there is a bunch of infrastructure pieces.... Marwan: All you need is SMTP.... JK: ... but the description does not say anything about the SMTP commands... HELO, etc... CF: Re: Section 1 point... we need to address this in terms of the binding framework, possibly with a single feature (eg. simple authentiation) rather than picking on a particular protocol. ie. show how to use the framework. DF: ...Jacek... there have been a number of framing caveats suggested... would these be ok. JK: I'd just like to see this renamed to email. Marwan: (to Jacek) I now understand your concern ACTION: Jacek, Nilo, joint action to develop mutually agreeable text for SMTP/email binding presentation. Nilo: On section ?? on alternative encodings... ....(missed discussion). JeanJacques: Do we have to show SOAP version transition in the Primer... should section 5.2 be in the primer. Nilo: Thought that a useful think to do was to include changes between 1.1 to 1.2 in section 5.1 Nilo: Section 5.2 was added because it had been asked for during a telcon. JJM: Assumption is that the main audience for the primer will be new to SOAP... DF: So... what is your proposal (to JJM). JJM: One proposal is to remove section 5 from primer. MH: There's a related question about change logs in the WDs propagating into the final specs... .... JI: ... so there is the question of the purpose of the primer... if the audience are new to SOAP then section 5.2 is necessary for those people. DF: Strawpoll on removing section 5 from primer. NM: Would the way to do this be to separately publish a W3C Note describing the 1.1->1.2 changes that can be referenced from the spec and the primer. Is the administrative burden too... much? Proposal: Take 5.2 and 5.1 and publish then as a non-normative W3C Note describing 1.1->1.2 changes. In the spec make non-normative reference to the said note. DF: Can we leave the primer as a temporary home for this material? CF: I think it makes some sense to move this material to an earlier point in the spec. We perhaps want to telegraph that much of SOAP 1.2 is not so radically different to SOAP 1.1. DF: Noah's proposal... general consent. DF: Foreshadow change part?.... general consent.... DF: With those changes in place do we want to promote the Primer to WD...? General consent... Boston, Renes, Zakim all yes. 12:30 Usage Scenarios: DF: Comments on Usage Scenarios... JI: Not received comments... would be useful to discuss the role of the documents. The usage scenarios arise from the requirements. Is this a due diligence document or should it be promoted as stand alone document for wider consumption. Own view is the fromer. RM: Are you thinking of merging the Usage Scenarios and the Primer. JI: That was discussed. Merging the two would change radically the style of the document. JK: Could the usage scenarios become an appendix to the primer. Nilo: I had hoped to take a few key examples from the Usage scenarios to strengthen the primer. Don't intent to put them all in. HFN: Does the output have to be a technical report as such, or is it a working document that can just stay in place on the W3C web site. DF: What did query do with their usage scenario? PC: We extracted the from the Query requirements and published them as a separated WD as Query matured and the scenarios became answers as well as questions. Expect that as query approaches closure, expect to archive Requirements/Scenarios as a Note. DF: General assent that we don't want to change the direction of the primer. The usage scenarios seem to be a large and important contribution that we advance the Usage scenarios toward being a W3C Note. DF: Proposes to advance Usage Scenatio on a W3C Note track. No dissent recorded. Boston, Renes, Zakim... 12:40 Abstract Model SKW: AM essentially unchanged since initial publication. Material is perhaps being reflected in the work of the TBTF. There are some outstanding editorial issues to be work, but the AM subgroup concluded around the publication of the WD pending further request from the WG. DF: Proposal that we postpone further discussion of AM until TBTF and part 1/2 are a little further along. No dissent recorded. 12:50: Requirements Documents Jeff?: Question of requirements from other W3C WGs. DF: P3P, XForms and RDF requirements all have the same sort of flavor... association of P3P profile with XMLP message... arbitrary bindary content and inclusion of RDF model in a message. We will have to show that we meet these. DF: With RDF we are addressing this through use cases. DF: Perhaps we can invite P3P and XForms to do likewise. PC: Suggest that we can send a message to the XForm and P3P WGs stating that we believe these things can be done and put the onus that these WGs indicate why they think that it might not be possible to meet their requirements. DF: Need to action somebody to contact P3P and XForms WGs... volunteers ACTION: Chris Ferris to liase with P3P and XForm WGs. DF: Maybe we need to add a couple of bullets to section 5 covering RDF and UML/MOF. PaulD: Whatever happened to XML Ecryption liason. DF: David Orchard took responsibility for this... don't know the current status. ACTION: Paul Denning to ping David Orchard on status of XML Encryption liason. DF: Should update requirements document: 309 change and update requirements from other W3C groups(RDF, UML/MOF (?), XML Encryption? P3P, XForms...). ACTION: Editors to update requirements document re 309 and other W3C WGs (other bodies). PC: The set of WGs that we've just listed need to be explicitly requested for comment as we go to last call. We should telegraph our intentions to the chairs of those WGs to ensure that they can provide a timely response. DF: Proposal that we republish the requirements document when we have made all the changes just actioned. No Dissent: Boston, Rennes, Zakim... 13:05 Lunch 14:00 TBTF Introduction Text (Glen's presentation ppt format, slide1, slide2) GD: Audience for Framework is folks that are writing binding specifications. Like to create a framework that allows the creators of binding specification to expose the functionality/features of the underlying protocol. - Intro's features. - Feature Example PC: Question... so you are not suggesting that the software is going to send a different SOAP message to different bindings. GD: ...Maybe. You can imagine a number of way HFN: A slightly different response is that it is up to the communicating parties to decide... NM: Paul's question goes directly to an issue that we have in an ed-note where there may be differences between the views of TBTF members. The only disagreement within TBTF is about the claim that a given binding supports a given feature when it's carried as SOAP blocks inside a SOAP envelope. GD: Does that answer your question Paul... PC: Well yes... but you are waving your hands very nicely... I think that this may work of some of the features you run up against, but I don't think that there are going to be that many features that reach that far down into a binding. GD: The binding framework is representing the system as a distributed state-machine. Dug: When you come up with text... features can be represented as SOAP blocks... this is just one choice.. right? GD: yes... HFN: ... NM: We can point to the text on this... there are some paragraphs (Noah quotes from Intro text). PaulD: Trying to picture intermediaries... how do these factor into this... Discusssion of End-2-End v hop-by-hop features... centred around authentication example. HFN: We have been discsussing this for a huge amount of time with a lot of 'blood, sweat and tears' on this. I think it is telling that with respect to the questions that have come up... we have been able to point at text. PaulD: Module... I don't see the term module in the text... .... (difficult to capture the question... and response). GD: Yes we have this model around exchange of named properties etc. For some folks specifying this this way was going too far. We are choosing to present our bindings that way, but we are not mandating that Marwan: Question: what happened to message exhange patterns. GD: We are treating message exchange patterns as features... Marwan: So do you have some common properties features etc. what this needs is an example of a binding that shows how to form a SOAP POST message. NM: Relating to some of the questions that have been asked. For a while we were carrying around a property based framework that named and typed properties etc. In the adjuct part of the spec is to provide an HTTP binding described using a property based convention. We are going to use this property based approach to spec.ing the HTTP binding. The use of the convention is none normative. Marwan: So I agree that this a good idea that this is not in the core. Marwan: If someone wants to create an HTTP binding that want's to use GET... does the framework allow such a binding to be created? GD/NM/CF: Yes... Discussion of bindings supporting different sets of features... PaulD: Will there be words in the transport binding framework about the reuse of the various features... More discussion.... PaulD: Also wondering what goes in the primer about bindings. HFN: Just a comment on where SwA comes in. SwA was written after SOAP and is an orthogonal sort of a thing. But there are certainly ways HFN: There are a variety of way to do this CF: There are certainly ways to augment the binding. If you look at the HTTP binding... the door is open to doing SOAP with attachments. GD: Just to quickly broach the primer question... I'd like to see some examples that illustrate how software can make use of this and specifically how the HTTP binding works. Marwan: Question about modules... GD: Refers to earlier work on module/binding templates. Marwan: Writing a SOAP service, is it easy to write interface descriptions that says what binding is being used. GD et. al: Yes... Marwan: Who writes a binding.... Discussion NM: Are you asking about bindings or binding specifications. PaulD: Message exchange patterns... does the RPC spec have to refer to these features... GD/NM:... well yes... that would be good. DF: The questions that you are asking suggest a degree of understanding with some depth... the question that I am circling toward is "Is this the text that we'd like to see headed into Section 5". PaulC: So where in this document are there going to be statements about testable assertions. We may be serving ourselves here or are we serving our public. NM: My view would be absolutely normative... not every W3C spec needs to have a set of testable assertions.... PaulC: So this is an infoset like thing... so to get out of CR you are going to need to show it's use in creation of binding specifications. NM: Yes... and we're going write and HTTP binding and maybe another. PC: ....Noah... you've answered my question. Some discussion of the other pieces, the concrete binding and feature pieces for the adjuncts pieces. Dug: Suggest drop using the word introduction. Agreed... PaulD: Message exchange pattern, is that going to be spec'd in part 2? GD: The currently drafted HTTP binding spec is written with a supporting description of a message exchange pattern - which is a great example of a feature. Dug: There are some features that may be outside the scope of a binding - correlation ID... GD: Feature set we have has a simple concept of request response. We don't say how that is transmitted. We can envisage a SOAP module that provides the functionality of a feature. Discussion of features centred around message correlation. Marwan: We see the word feature being used for both binding things and for module like things. I would prefer to see different words being used. HFN: I disagree... Discussion of the partitioning of functionality/features between binding and SOAP envelope/module. PaulD: Is this more of a SOAP Extensibility Framework. GD: .... PaulD: Features seems like a pretty important thing here. HFN: Yes... I think a key thing of SOAP is extensibility. So yes this is in part elaborating on an Extensibility Framework. DF: We have already committed to entire read throughs.... NM: I see this as related to the ednote that we have in place. I would prefer to use the word 'feature' in a broader sense and that has to be introduced more broadly outside of chapter 5. eg. reliable delivery is a feature regardless of how it is provided. HFN: Maybe we should take this offline. TBTF 5pm.... DF: Straw poll. General agreement to the Transport Binding Framework text, modulo standing ednote? If we give the group the thumbs up... generally then they can go away and work on resolving the ednote question: General assent... some questions: Anoush: If the intent of the framework to provide help to someone that is designing bindings to a particular protocol. What is more helpful is to look at the HTTP protocol binding example. However, this document is so abstract... it doesn't really help me address the goal of creating a binding. HFN: The SOAP Processing Model in section 2 is similarly abstract... it doesn't specifically address how to create a particular module. GD: That secondary section that describes a feature and then the HTTP binding gets you much closer to a concrete binding. John I: Want to clarify: Folks constantly appeal for an example of how to do it in HTTP. However, there's a bunch of inbuilt knowledge about HTTP.... This is a framework aimed at being more explicit about the things that are perhaps more implicitly understood. GD: NM: That's kind of what we're doing. The framework answers all sorts of interesting questions: relationship of the binding to the SOAP processing model; infosets and serialisation;... the framework is not a cookbook... and yes we may need some transport binding spec. writers primer. DF: Anoush does that answer your question... Dug: I don't think that this stuff is as useful as folks seem to think it is but I'm not going to vote against this. DF: We're doing a rather narrow thing here... we are focussing on the piece for part 1, we do have some of the other concrete stuff, but we're not focussing on that right now. MH: This bears on the issue I raised earlier that this shouldn't go into a published WD without the other adjunct pieces. PaulC: Concur. DF: Turning this into a proposal: That we accept this as the basis for part 1 section 5, but don't ship it in a WD until we have the other adjunct pieces near ready to go, and that the TBTF prepare a plan and time-line for getting adjunct pieces into shape. NM: I'd like to explore the with the TBTF what we could achieve in the very near future. DF: The TBTF seem to h#}ave picked up a to-do... to prepare a plan... General assent... on TBTF proposal. 15:30 Break 16:00 Issues Issue 101. DF: Recap where we had got to on the call. Asymmetric nature of header/body. JJM had a concern about whether we would allow more than one body block. Dug: I don't think there is anything in Noah's proposal that precludes more than one immediate child of the body container. That should address your concern. JJM: Yes... but there is also another proposal to allow only one body block DF: To be clear... there is only one body element, but there can be multiple immediate children of the body element. So does the ability to have more than one body block meet your needs. JJM: Yes and I can live with the proposal. SKW: HFN: Suggest we don't talks about body blocks, we don't speak about body blocks. NM: We used to have text that stated that the body is just a header. Required recognition of QNAME and had implied mustunderstand. HFN: I think we're giving some guidance on how to use the body. It's pointed out that it's not to be used for boxcarring in several places. NM: So take a simple body with one body block... do we say anything about it? HFN: Well we say that the ultimate recipient must process it, but we don't say that how you recognise that you understand it, only that you do... you don't have to make that choice through the qname of the immediate body child. GD: .... JK: Agree with Glen that the dispatch for body has already happened at the transport level. The body is just data.... agree with Glen and he said it better. NM: The RPC chapter makes it clear that the body is not just data... gives example. I'm suggesting that we agree that lack of understanding does not generate an mU fault. But... to process the body we have to understand the body. At present we are not saying how to behave if we don't understand it. HFN: We have to have a uniform way of saying that the whole message succeeded or failed. I also agree that we have to have a way for a recipient that signal that it got something it didn't understand. NM: So... the recipient must have rules for processing a body and if that body block is received in combination with other body blocks then I have to have rules about how to process those blocks in combinations... GD: So I've got an XSLT transform service, I just run the block through the transform and return the result. I don't have to understand the body to do that. NM: So I think that's consistent. JK: For headers the qname of the header block selects the code to process to header.... For the body, the application has know how to handle it. Treat the body as a well-known block... DF: So where do we stand with respect to the current proposal. HFN: I think the proposal is in the right direction.... we might want to decide whether we want to keep the term body block. HFN: The short version is it's sort of ok. GD: It needs a little tightening and there is a suggestion that we get rid of the term body block. DF: I want to have an AI about how to move this issue along. HFN:... NM: We need to have something that's crisp enough to describe what you do in processing body blocks. ACTION: Noah to clean up 101 proposal text incorporating discussion between Noah, Henrik and Jacek. GD: Related point... processing order. Can a header be processed after a body? eg. checksum. JK: Also are body blocks processed atomically... NM: Can header/body processing in some sense be interleaved etc. eg transactioning. NM: The proposal I would make is that all the header mU checking must occur first, but the processing of the blocks may be interleaved and the processing of headers may be interleaved with body processing. Dicussion.... NM: Dug: So after mU checking things are pretty much a free-for-all. JK: Atomicity of the processing of blocks.... (fast paced dicussion...)... Jacek concurs with Noah... non issue. Recap: All header mU checking must be done 1st and atomically. Understanding of the body which may have multiple parts is at discretion of Node. Problems result in application specific client faults. Body and header processing may be freely interleaved. MH: Seems to me that we're going backward. With headers we have a fine grain mechanism for reporting header faults. For the body we seem to be being less specific. CF: No... MH: I'm think of a SOAP node that understands NM: If we're restrict the body to a single body block then we can be as specific as we are with headers. If we have multiple body blocks the reduced specificity may be the price we have to pay for the flexibility. JK:... MH: ...I don't support weather reports and I don't understand weather reports for Boston. Fine grain/coarse grain. JK:... HFN: If you don't understand things in the body could define a specific fault. CF: It has been my feeling that header and body should be symmetric and there should just be blocks. If we're dispatching on body... but what are we dispatching to... my point is... we have a well defined mechnaism for headers, but we have no mechanism for doing this in the main body of the message. If we had we could just blocks we could have an attribute to mark out just one block as being the main purpose of the message. GD: So... could drop header container, just have blocks and then body which is the main purpose carried in the content of the body element. CF: I'm suggesting that we have blocks and a distinguishing attribute. CF: The way a lot of ways in which folks are using SOAP is to dispatch on qname of the first body child. GD: When you get to the end of your processing chain, you have to have worked out where you are going to dispatch the message to. JK: Glen just said it... you mentioned it with TCP/IP appplications can't all have IP addresses and port numbers. We're in the Web world and we use URI's to identify things like where to dispatch. HFN: This dicussion is probably a good thing... we have a pretty flexible framework, you can do a lot of things. Also, we have header and body... what does it mean to have to understand 5 things. It might be easier to achieve interop... we have this shopping basket that we can put things into. I think that this separation (?) gives us more interop. Dug: I'd be very open to making them all just blocks, *if* you can identify the point up to which I do streaming processing... NM: A few things have piled up... I think we have agreed to stick a SOAP like architecture. I think that if we open this up it will cost us a bunch of time. There are at least some circumstances when you want to dispatch on QNAME. You may know to dispatch in QNAME due to request URI... Re what Henrik called Dug's hack of treating the body element as a block... we could go there but the group needs to give me direction. Dug: I think I'd leave it alone... not do the hack... I could go either way. DF: So we should wrap this up... Noah to go away and write this up. By when... NM: Fighting chance during F2F... when is drop dead. DF: Noon Monday 3rd Dec Eastern ahead of telcon. 16:50 Issue 18: JK: Outine issue 18: Three new emails explaining what "top level" really meant... The issue is about clarifying top-level. We have two proposals. 1) clarifying top-level or 2) allowing multirefs and removing all references to top-level. HFN: By inlining do you mean the same thing that you can do for strings and byte arrays? JK: Yes... implementations have to be able to do this... DF: refers back to ETF minutes and ETF agreement to inlined multirefs and discussion of number of passes on serialising and deserialising. CF: The other aspect of this is that you can do this either way. Says that you can do in-line multirefs, but doesn't say that you have to do it. HFN: So a receiver has to be able to received both in-lined and out-of-line multirefs. JK: The receiver will not be affected. MH: Some receivers might not support both. HFN: Rather than in-line the fix is that we allow both. CF: So we can resolve reference by id, a uniform mechanism. HFN: Given that id's can be anywhere we can serialise these things anywhere. JK: Proposal is to remove a restriction. DF: The proposal we were putting forward to was to in-line multirefs. MH: We're not explaining that you can put these elements outside of the path of the main inline serialisation root. Concern that folks will not pick up that references by id may point outside of the in-line serialisation. CF: I think it's ok. HFN: So the change is that a multiref identified by an unqualified local id attribute and that we remove the top-level constraint. JK: Current spec restricts target of multiref to being a top-level in the serialisation. The proposal is to remove that constraint... DF: Are we ready to decide on this proposal? HFN: Clarification? Thread on SOAP builders was fairly small... is thing something that we should call out specifically. What was the feed back from SOAP builders. Responses were generally this is a good idea AND... the ANDs yielding three new issues. DF: Any objection to closing Issue 18 with the proposal as recorded in email. No dissent. ACTION: Jacek to generate resolution text to xmlp-comments and originator of the issue. DF: Editors note... more change coming down the pike... 17:08 Session Adjourns... Chris explains dinner plans and new location logistics. David presents TBTF schedule / master plan for integrating the framework into the Working Draft for December. The basic idea is based on sending a WD to the W3C on December 14th. To make the framework useful, as discussed yesterday, we need four pieces in the WD: 1) The framework text itself (sec 1) 2) The property/type conventions (sec 2) - description of the mechanism (infoset-style properties with qualified names and schema types) we use in the latter two pieces 3) MEP spec(s) (sec 2) - description of request/response MEP 4) HTTP binding (sec 2) - utilizes the MEP description All these pieces basically exist already, and need to be edited/cleaned up a bit. The necessary schedule for this to work is as follows : Review period needs to start today to reasonably acheive the goal. Email goes to dist app today which asks for people to begin to review the already-published MEP spec / HTTP binding / framework text, noting that if there are problems/issues, they need to be addressed ASAP. By next Tuesday (12/4), TBTF will publish revised/cleaned up pieces to dist-app. The WG telcon on 12/5 will have agenda space for discussing any issues/comments about the pieces. These pieces will then be linked into the editor's copy of the working draft (via hyperlinks) by EOB 12/5. Review period 12/5 - 12/7. Final text should be ready EOB 12/10 (Monday) - fully merged into the specs. Telcon on Wed 12/12 will contain the go/no-go decision about publication of this stuff. Need to publish the WD on this schedule to avoid a) holiday schedule problems, and b) the W3C's publication ban at the end of December. Paul : what about the rest of the changes (XMLbase, encoding, etc) David : this is TBTF-specific schedule, the rest will happen in parallel. Even if no other changes are actually made, though, the WG is prepared to publish a WD. Paul : does this assume the TBTF stuff is more important than the rest of the already-approved changes? Henrik : We're going to try to get as much in as possible by the 10th. We'll parallelize as much as possible Marc : The TBTF stuff won't be ready for a little while, so we'll work on other stuff up until that point. Paul : Given this, can the editors meet this schedule, considering the changes we've already approved (getting everything in) David : This is really the first part of the schedule - the "merged version" depends on the editors John : Will the WD which is published be the "complete set" which we talked about doing a full readthrough of yesterday? Marc & David : Yes, that seems right. David : let's move on to issues? Stuart : what if the WG rejects this contribution? David : business as usual - we resolve whatever issues are raised, and continue on. Issues, continued David : Marwan isn't here this AM, so let's postpone 40. Next issue is 169. Jacek explains the issue. Paul : FYI, the dissenter (Asir) is not here, we don't know how serious the objection is Paul : The technical problem, according to my developers, isn't serious (various others) : We've implemented it too, seems to work. David : proposal is to close issue 169 with the ETF recommendation (keep forward-references, no change) [NO DISSENT] David : 169 is closed ----- Jacek explains 170. Choices : a) be careful, no mandate. b) disallow refs between "serialization trees" (header blocks + bodies) c) data which might disappear MUST be serialized as separate Header blocks, targeted at "../none" ETF chose (b). Henrik : forward refs are nice so Header can point to Body. This disallows that use-case. The web fundamentally has one-way links, and they might break. That's life. Saying "you can use another encoding style" is a hack... Noah : agree with Henrik, driving ourselves crazy over dangling links seems fragile. There are deeper questions - why are we going to lengths to allow these refs across trees anyway? We can't preclude app-level stuff, but when we encourage it in our spec.... Basic question seems to be is it a good idea to have a single data graph which spans headers which are targeted at different places? Jacek : "serialization tree" is a graph of data which has been serialized, so how can it point to something else without increasing the scope of the graph? Doug : dangling refs can happen for an unlimited number of reasons. Option (a) is better. Chris : weird to say "you can't do that" in one part, then "you can do whatever you want" in another. (a) is better. Mark B : agree with Henrik. Restricting the ability of one header to refer to another severely restricts the extensibility model. Noah : will a header ever use sec-5? Jacek : headers will use data, but not nec. sec-5 Glen : seems silly to restrict sec-5 when we allow arbitrary stuff in other encodings Oisin : (a) is viable solution, but the real question is how do we fail in a predictable way when a ref is broken? Marc : we're off the point slightly. Real question is should you allow multirefs to be in different blocks? Seems bizzarre to allow that. Doug : do we want to disallow HREF -> attachments? Noah : We're overloading HREF attribute. Chapter 5 "hijacked" the interpretation of HREF - it's a graph edge. Makes me nervous we're using the same attribute - now we can use the same attribute within a graph to point to something that's outside the graph.... maybe there should be a different way to express this. "in-graph" links, and "general" links. Jacek : In soap encoding, referenced objects have xsi:type (explicit or implied). What's a web-reference (or MIME reference)'s type? It's totally different. If we go with (b), SOAP + Attachments will have to come up with another way to reference attachments. Henrik : slippery slope to define different link categories - we end up with lots of different types... Noah : at the web architecture level, yes, links are the same. As a practical matter, as a programmer it gets very complex when using this stuff for encoding RPC data graphs. The value of SOAP encoding is that helps people who want to send a certain kind of data (mapping well to programming languages). It's not every variation of link, but a clean subset. David : there seem to be two sides here. One says links are links, the other says we're delivering an ecoding scheme, and linking can be subsetted within that scheme. We can argue this forever. We need to agree where to draw the line, and get this resolved. Henrik : PROPOSAL - a general encoding where we don't say anything about links. Then in RPC convention, we say that you restrict links to the message. I.e. apply a convention to the encoding for RPC. David : is that another encoding? Henrik : maybe Marc : That's good, but we do need another encoding style. Noah : Don't need to tie this so tightly to RPC. There are two encoding styles, and RPC simply refers to the second one (more simple to deserialize, etc) Chris : we seem to be overloading HREF. PROPOSAL - let's make serialization stuff an IDREF, and HREFs are separate. Off-the-shelf XML parsers could consistency check IDREFs.... Stuart : do we have a means to carry around a link as a data value? xsi:type=ANYURI Jacek : we can use a special xsi:type for referenced things? PROPOSAL : take HREF out of the data model, replace it with another attribute ("GREF" for Graph REF?) Henrik : this goes the wrong way, as it restricts things. We wouldn't be able to serialize RDF, because it has resources as links.... Two RDF scenarios... Mark B : What about (d) rely on header designers to say what happens with broken ref? Various : that seems close to (a) Glen : what about the use-case for automatically deserializing an attachment? xsi:type + href seems to do this, but I'm not sure these proposals allow it... Noah : henrik's proposal seems to - there are two encoding styles, one of which is more restrictive, but they both have the same data model. (i.e. you can still do it with the general one, but the "RPC-graph-limited" one disallows it - you can use either) Paul : We need to fill in the blank "Data model" section. Noah + Marc : there's a proposal out on dist-app for that already Marc : if you can do either style, that doesn't make it any simpler? Noah : point wasn't to make it simpler, was to make the fast case fast. This helps you optimize, and perhaps we don't even mandate support for both Jacek : will most implementations implement both encodings? Noah : PROPOSAL - one encoding, but clarify that implementations are required to resolve links within the envelope, but may (but need not) resolve links outside. (note : this is when using the encoding) Glen : seems like we're moving toward (a) - in other words, we recognize the importance of linking to data which might not be there (either because it's missing from the envelope), so let's move on with it Henrik : PROPOSAL - let's vote, and assign AI to write clarifying text. Noah : does the proposal include defining the data model?. ------ Continuing on with ETF issues: 171 P1 : Proposal is to ignore other attributes on references aside from href, enc:position, and xml:base. P2 : Behavior should be mandated by XML schema, noting that xsi:type handling is particularly tricky Glen : what about typing attachments? Jacek : there's a separate issue for this... Henrik : how can they be separated? Doug : What if you ignore the type on the referent element instead? Stuart : why give a closed list of attributes which you should NOT ignore, instead of a closed list (i.e. xsi:type) which you SHOULD ignore? Jacek : there may be a lot of attributes which can affect the value from an XML POV. We don't want to modify the list with every spec the W3C produces.... this list seems more closed than the other one. Noah : this discussion leads to a slippery architectural slope... schema attributes like xsi:type are not under our control. "Of course, any namespace-qualified attribute which appears has the meaning of it's spec. Period, EODiscussion." Users should not use attributes which don't have the intended meaning. In particular xsi:type="int" can't have an href attribute. Henrik : agree, too much risk that the spec owners might change/say something that disagrees with what we say. Marc? : There could be another type "soap-enc:int" which does allow hrefs. Same problem... Stuart : Why can't we just disallow xsi:type on href elements entirely? Richard : let's get back to the basics, too deep into technical stuff. I classify these as implementation issues - i.e. perhaps not our problem. We're writing a spec, not an implementation. May be SOAP applications which never use this stuff. Glen : we're trying to write an interoperable spec which helps developers build things. Richard : yes, to a point. David : clearly there's a balance point between being helpful and trying to describe every legal XML usage... the trick is finding it. Jacek : both proposals try to limit what can legally be done. #1 is more comprehensible to developers, #2 is more "abstractly correct". David : #1 explicitly states an error. This error would also be invalid under #2, but that wouldn't be explictly specified. We could come up with hundreds of other cases of invalid schema stuff - should we specify all of them? Jacek : #2 is more correct. #1 is simpler/more understandable. However, I do understand 2, and would go for it. Chris : We could do this by defining our own type attribute "enc:type", which replaces "xsi:type", or our own types "enc:int", etc. Also, we should point to the child node ("#1/child::node()") - i.e. the value. Noah : this is an XML serialization of something. It's more appropriate to refer to the entire element "a", including the xsi:type and any other attributes. The original #1 is a link to a node in a graph which has both a value and a type - this example ("child::node") points to the text string "3", not a value. Anish : seems to me it should fault instead of ignoring the attribute in the original example Paul : The original example was much simpler... maybe we should discuss that? Noah : we have a graph model. Elements like a and b name edges. Both of which in the original point to a value "blah". Doug : feels odd that we do one thing for headers (use attributes on the original element, even if it's an href) and another for values (use attributes on the referenced element, not the href) Jacek : it's layered - the processing model says one thing, the encoding model says another. No conflict. Jeff : Noah, can you draw the "blah" graph? Jacek : I support P2 if it's phrased correctly, but I don't think I can write it myself. straw poll for P2 - unanimous ACTION ITEM : Murali will draft text for P2 by noon PST Monday. P2' (Glen's proposal for another attribute to help type hrefs which refer to external entities (i.e. attachments)) will be another issue. ----- 159 + 166 Options: P1: status quo, list, describe the explicit connection between listed styles better (all serializations in restricted style are valid in unrestricted style) P2: restrict encodingStyle to a single value Henrik : This morning we've discussed the idea of encodings like this (i.e."links inside message" vs. "generic links allowed"), so there's a use-case. Having a list enables avoiding tricky negotioation algorithms for figuring it out. Jacek : nobody uses this feature, and no one on soapbuilders indicated that they would be using it. Removing it makes the spec a little simpler as well. Doug : Does a tighter scoped encodingstyle replace or extend the list? group : replace PROPOSAL : Change type of encodingStyle to anyURI (instead of list), change text to indicate a single URI. [NO DISSENT : 166 is resolved] PROPSAL : Change "CAN" to "MUST" [NO DISSENT : 159 is resolved] ACTION ITEM : Jacek will send mail to xmlp-comments about issue resolution. ----- 97 PROPOSAL : Use XML schema's base64 (plus errata) re: line length. [NO DISSENT] ----- David : the plan is to tackle these next two, then approach the 14 issues that we haven't really touched yet at all. Planning to spend a max of 15 minutes on each issue [scribe's note: I'm dubious]. At the end of 15 mins, we will assign an action item to someone to deal with whatever the next step is. 144 / 161 Jacek : 161 will be dealt with by one of the potential resolutions to 144 (text goes away) Problem for 144 is that the app needs to parse the string (i.e. "xsd:int[2,3]") of the array attributes. (review Jacek's proposal) Stuart : looks like a huge thread on issue 144 - how did the proposal survive the discussion? Jacek : No objections to the general direction. The issue is whether we take the whole proposal or just half of it (i.e. no sparse arrays). P1 : Revamp attrs, clarify rules (as per archived proposal) P2 : Omit sparse/partially-transmitted arrays (i.e. omit attrs) Henrik brings up Q about nesting (array of arrays), we resolved that it's possible. Noah : what do we do with schema derived array types? Can we deal with them? Jacek : proposal deals with this. Arrays are typed soap:Array. Glen notes that this is a point of breakage with respect to backwards compatibility. STRAW POLL: P1? What say we? Paul abstains becuase he wasn't here for the debate. [NO DISSENT - P1 accepted] STRAW POLL: P2? Given that we've accepted 1, do we disallow sparse arrays? P3 - Leave it here (P1).............2 P2 - Remove sparseses...............7 P2' - Allow sparses, with marker....4 DF: We seem to be leaning towards P2. Paul : now SOAP 1.1 is broken for real, since there's a semantic difference. < lots of vigorous discussion, ending up with no clear decision > Glen : PROPOSAL : let's ask soapbuilders/developmentor soap list/apache soap lists who's actually using this stuff, what the scenarios are, and how painful it would be if sparse/p.t. arrays go away. Then we go on from there [NO DISSENT] ACTION ITEM : Glen will send the mail and collect the results by Wednesday (12/5). ----- 21 Issue seems to be "why use XML envelope instead of MIME?" Chris: Now that we have infoset, does this help? Don't need angle-brackets necessarily.... David : Someone should go tackle the note and tell Joe about the infoset stuff. ACTION ITEM: Chris will write up a response to Joe, in which he describes the wondrous infosetness of the new spec. By next Monday (12/10) ----- 102 Noah: Preferred resolution is to describe Fault handling as part of the MEP description as per the binding framework. Glen: +1 John : We need to be careful about not popping "too high up the stack" - i.e. TPAs, etc. PROPOSAL : Change ownership of this issue to the TBTF. Paul D: General features might have a use for determining what to do with faults, not just MEPs... for instance a feature might indicate send all faults to a third party? ----- 103 HFN Clarify what message path means. NH Has funny properties, post facto only... Lets not spend time now, leave this until we clean up spec. MEPs will help clear this up for us. HFN Not the MEPs we have. Noah: this was very confusing a year ago, we're making great progress. Henrik : It's more a distributed processing model than a message path model, although you can certainly build the latter. Noah: a little nervous that "message path" heads towards precluding multicast... Henrik : it's up to the application to do that stuff David : we can say this is largely done now, but when we get closer to the end, we can check to make sure there are no loose ends WRT MEPs and this issue. Defer to after TBTF? [NO DISSENT] ACTION ITEM : Issue list maintainer will defer 103 until post-TBTF. ----- 105 PROPOSAL : This will be closed with the description of MEPs. ----- 108 Henrik : Section 2.4 now states this explicitly. PROPOSAL : Close this, noting that its done. ACTION ITEM : Henrik to send mail to xmlp-comment, which is done. :) [NO DISSENT] ----- 142 Henrik: there's another issue coming up about fault extensibility, etc. It might be better to wait until that one is here. PROPOSAL : postpone this until the other issue comes out ACTION ITEM: Update Henrik's action item to note that 142 is referenced from the new issue ACTION ITEM: Assign this to WG [NO DISSENT] ----- 155 Doug: want the optionality. Noah: very nervous about that. Henrik : We don't preclude anyone from taking on a role. SOAP prescribes one way for doing explicit targeting - there may be, due to out of band communication or other mechanisms, other ways for deciding who does what. It's not always that the sender knows the full set of combinations. Noah : the anonymous actor is different. Since you must be consistent, if you do it for one thing, you have to do it for everything. If you do "soap processing" as the anonymous actor, you must process the body and the message must stop there. Any node can make decisions and do stuff as long as it's "outside the soap processing model". Intermediaries, for instance, can cache the whole message.... RESOLUTION: The optionality of "can" in the text is as to whether you can target, not as to whether you use actor as the targeting mechanism. ACTION ITEM : Doug will write up the proposed resolution for issue 155 based on the consensus as if sec 4 was sticking around, and send it out by EOB Monday ----- 160 Noah : why not just delete this, since it's covered in sec 2? Define lexical structure in sec 4, with a reference to section 2 for a description. PROPOSAL : Use section 4 to represent primarily the infoset description of the envelope. Where the interpretation of these things overlaps with chapter 2, put in a reference to chapter 2. [NO DISSENT] ACTION ITEM : Doug will send mail to xmlp-comment indicating the resolution by Friday. ----- 138 Paul : Has the group decided what to do? Chris : We've decided on application/soap[?? +xml?] Paul : How far down the + route do we go? +schema1 +schema2, etc. etc.? Paul : Thought we'd agreed we shouldn't use application/xml, should use something else. Had not decided about + yet. We'd done the research, and decided not to use application/xml. David : Hugo went to seek input from other WGs. John : Didn't Mark N take an action to get a MIME content type? (application/soap+xml) Henrik : AI was to ask xmime list what the status was. David : Assign an action to pick up loose ends? ACTION ITEM : Mark Baker will pick up loose ends re: content type with IANA and XMIME feedback, W3C WG feedback, etc. by 12/10. PROPOSAL : close 138, since we no longer use text/xml. [NO DISSENT] ACTION ITEM : Mark Baker will write up the resolution text, send to xmlp-comments, and Murata-san by EOB Monday. ----- Marc : Mark N was also looking into an HTTP status code (427) for SOAPAction-required. ACTION ITEM : Raj will follow through on the ed note in section 6.1.1 of the adjuncts doc, inquiring with IANA to see about the status by EOB 12/10. 09:10 Schedule Review/Publication Decisions DF: Presents Editors TODO list (major items) 101 Body/Header 130 Dot Notation for Fault Codes 134 XML Base 144 Array 146 Anoymous Actor 153 & 160 Section 2/4 duplication ----- 48 Optimal nature of encoding, data model.... Editor believe that the can address all above the broken line and TBTF materials next spec. WD publication. MH: Explains why 48 is below the line... absense of Data Model text. MRM: On 153 & 160 will be making some contribution to helping the editors as a consequence of working on 101 PC: Namespace... I assume that we'll be changing that. Are there any Schema changes? ...: No... but maybe we should ask Gudge. MH: ArrayType may/will require schema changes. PC: Assume that all below the line includes everything else that is outstanding.... MH: More examples from ETF, Usage scenarios, the encoding section mixes up encoding and schema to such an extent... DF: That's assigned within the ETF, plus there are a bunch of things that the editors have spotted and will take ownership of. DF: What number encoding examples? Answer 55. PC: The timeline you have suggests not publishing again between this forthcoming publication and the end of Februrary. DF: ...another thing implied by John Ibbotsons question is that this comming WD is the one that we will 'pound' on. That will obviously lead to further change. DF: So this is the proposal from the TBTF and the editors... we need to decide if this is how we are going to proceed. DF: Calls the question.... General Assent, no dissent (Boston, Zakim...) 09:20 DF:... Thank you... editors and TBTF are going to be busy... HH: We have to talk about skiping CR and going straight to LC... PC: I made this point on Tuesday and that it would be good to telegraph to the chairs of other WG. HH: I think that we should signal our intentions to the public... NM: Do we really want to provoke a process discussion... probably better to do with some well framed notes to the CG to consider... DF: Hugo, could you look at the suitability of the status section indicating intentions to skip CR. ACTION: Yves/Hugo to evaluate status section suitablity for CR skip notice. 09:25 Issues List Issue 137: Intermediaries relaying SOAP Messages without modification CF: Reads description of Issue 137 from Issues list. NM: Quotes some material from Section 2.5 PC: Can we word this such that any nodes subsequent nodes process the same infoset? NM: ...well not really. NM: If we look at option 4 (in 137 issue text). We already state that processing order is at the discretion of the node, however, we do allow header blocks to have semantics that allow the imposition of different processing order constraints. Its possible to define a header to say 'begin end-2-end encryption'. This would mean that th HFN: Short version is roughly changing MUST to SHOULD... I think this a reasonable thing to do. NM: These not quite the same thing to do... GD: Comments MRM: Difference is that my proposal requires the presense of a header before I do 'tricky' things. HFN: Counters... NM: So does that lead to interop... out of band agreements... JK: Re: Noahs proposal. The default order is unspecified. In constrast in processing model we are quite strict. In think MUST to SHOULD is ok... Dug: I think we should do MUST to SHOULD because it might not need to be triggered by an extension - eg encrypt every message. NM: Counter example... based on some encryption of alternate headers... If I have a contract then I think I need to have a header to say I'm ok with that. Every time I hit a SOAP node I have a contract. I have a big problem if you allow nodes to change messages in arbitrary ways without a contract that I am party to. CF: I like 2, persevation of the infoset? NM: With encryption the infoset is not preserved along the path... CF: I need to finish... the Infoset needs to be restorable. NM: So where are the keys... CF: DF: Chair reminds on rules of engagement... time bounded HFN: General model... intermediaries are 1st class object and you know that may be there... NM: I disagree... GD: We cannot prevent hidden proxy like things... we want to write a spec that makes these things a little out of spec. NM: Jeff: This preserve the infoset is kind of seductive, but is it testable... hard to enforce this... Timeout.... heading for email... DF: Would be useful to have an email to start a thread that presents both sides of this discussion. MH: Just a quick thought... are we at the distinction between a SOAP intermediary and an Application Intermediary... ie. NM: Among the reasons that we have all this actor, soap intermediary stuff is because we wanted to be able to do this at the SOAP level.... 09:45 Issue 154: Role invariance during processing. Dug: Original problem was the invariance role... I'm not so sure that I have a problem any more. NM: Explains invariance... that all headers targeted at actor B get or none must be processed at a given node. Discussion: Basically all headers targetted at a role must be processed at a node that assumes that role. PC: can't we add a sentence.... Jeff: Question on interleaving roles... dureing processing. NM: If a Node acts in role A it must consistently CF: Suggest, "a role assumed must be invariant through the processing of the message". NM: We have always tried to be declarative... CF: You can change roles between messages... point having assumed a role you must process the message consistent with that role. SKW: We're in danger of revisiting Issue 140 which addresses the determination of role by a SOAP node. NM: Some reluctance to touch the text because it has been carefully crafted... NM: Nodes are free to inspect any of all of the message MH: Last para of Section 2.2... NM: How dow we tie this together with the invariance piece. NM: resumes: Nodes are free to inspect any of all of the message in order to determine the roles they play in processing a message. NM: Requotes standing text.... NM: Issue hinges on the specific meaning of processing... Dug: Invariance seems to suggest that I change what roles NM: Quotes Section 2.5 (again)... including cavaets... I really don't want to mess with. GD: Sounds fine to me... Dug: I'm on the brink of saying drop this issue mark it closed. DF: Propose primer text... NM: Could add a sentence that says a node may inspect a message to determine role prior to processing.. ACTION: Dug... propose primer text addressing actor/determination/message processing by 7th Dec 2001. 10:05 Issue 41: No normative target URI. NM: Does anyone understand to issue... tempted to suggest we have nailed it in the binding. HFN: Could say that determining where to send a message is a feature.... GD: We where discussing what set of features is core... destination may be one of those things. HFN: yes... but don't want to make a decision about that right now.... NM: Want some freedom to denote destinations later... DF: Suggest that we go to email... CF: I think I understand his point... the URI on a hop by hop basis will be evident somewhere, however the actual endpoint, the intended recipient is never denoted in any consistent fashion. HFN: I think that calls out a decision that we have to make. We have 'gradually' been specify this over time in the TBTF... GD: I agree with that and this may be another thing for the primer... examples etc. DF: Clearly what Vidur is looking for is some standard/consistent way of denoting where to send a message. HFN: I don't think he's calling for a standard way of saying where to send a message in the envelope. The decision I think/thought that we are making is that we can do this by using our extension mechanism. CF: ...what I think Vidur is getting at is that while we can do this any number of ways, we need a consistent way of doing this. Addressing is kind of special... Nilo: Section 5 part 2 it says that SOAP relies on the binding to provide a mechanism for carrying the URI... SKW: Section 5, part is a little far in to be saying this. CF: Its more than just for RPC. CF: Didn't we talk about RPC being an MEP binding... in TBTF? NM: RR yes, RPC no... DF: The RPC task force quiessed an left a few issues still open... NM: We need to make sure that the binding framework etc is finished that it needs to be self consistent about where messages go. Is there an RPC idiom that we want to call out? Doing RPC, you need to know what binding you're going out over. My recommendations are not to do anything magical in core SOAP that we lock out the options. HFN; I think that we have a pretty robust answer. We know that there are may things that we can do in many different ways. We don't give you a postal service... we give you an envelope. NM: ...I think we need to take some care as we close the binding material... HFN: Proposal: Either revive the RPC TF or catch during read through... JK: Have already said that RPC will refer to a request/response feature... close the issue. NM: ...basically that RPC is layered on the RPC feature... and then clean up as dust settles. GD: Want to note that *if* you had a slot to put the URI. There is nothing in the processing/extensibility model to ensure that its not ignored. DF: Suggest that we postpone this to post TBTF/MEP... No dissent (Boston, Renes, Zakim). ACTION: Issue list editor i41 to reconstitued RPC TF. 10:30 Break 11:00 February F2F information. Issue 98: Content based routing... DF: This seems to be about routing on payload content and that without a normalised representation, routing may be problematic. JI: I think that this is outside our scope. This an application issue. DF: I think this is what we said to i18n... don't make us do this. PC: Not sure I understand the context for this... HFN: Have we had any response to our response on canonicalisation.... DF: May have suffered because David Clay who owned the action had to leave the group. Need someone to take an AI to track down the remanents of this thread. Suggest that there are folks that have yet to take an AI. ACTION: Paul Denning to pick up this thread with i18n, uodate by 14th December. 11:10 Issue 59: Mandate a particular character encoding. OH: Discussion from dawn of time on whether or not to mandate a particular character encoding for SOAP/XMLP. Some discussion with i18n, but not concencus developed and we've moved onto other things. No particular proposal than to maintain the status quo... ie. its XML. NM: So where we speak of infosets, we're entirely neutral, however this really goes with the bindings. CF: What we did in ebXML we called out what we expect is that you put the encoding in the XML decl... invites Iwasa to comment. Iwassa: I think it helpful to define some encoding. No specific proposal to define a mandatory encoding. CF: I thought that UTF-8 was not enough.... Iwasa: eg. some folks support UTF8 others UTF16, then we have PC: So what does XML say? NM: UTF8 and UTF16... PC: So why do we have to say anything? OH: Binding should have a default encoding and possibly some scope to support others. NM: Nearly agree... there are all sorts of representations that I could do that are not based on character encodings, eg DOM implementation over RMI... that would move an infoset. OH: On extensible bindings... is an an HTTP binding that specifies UTF8 the same binding as one that specs. UTF16. NM: Suggest... all implementations must be capable of generating one and accepting both.... CF: UTF8 and UTF16 are not always UTF8/16... this is not enough. You have to say what dialect of UTFxx, you have to know what character-set is applied to the encoding. NM: ...I thought that XML was intended to establish a level of interop... DF: Could flesh out this emerging proposal and seek feedback from a wider community. HH: Clarification of XML spec viz UTF8/16 encoding of UCS multi-octet character sets... DF: HFN: Push back on assumption that this is very much a binding issue. This binding is a hop-by-hop thing and I may not want to have to recode messages as they pass through an intermediary. There's a risk that we make bindings very specific to particular character sets... NM: I think that you raise an important point. The infoset is serving the spec. well... I think that folks will develop suites of binding specs that are intended to work together (multi-hop). It might be that I am building doms and reserialisating. I think this is largely an implementation issue... if you want to manipulate the serialised form. OH: Offers to take an AI to take propose resolution on email. HFN: Friendly ammendment. AI already on notation area of spec regarding infoset descriptions... DF: Suggest Oisin take a proposal to the list. ACTION: Oisin to generate initial proposal for email discussion, by end-of-week. 11:30 Test-Cases DF: Propose that HH and OH give status report on test cases... then break into groups, each assigned 1-2 sections of the spec. Look for testable assertions and then start generating tests... HH: Presents Test case document. Recap... on previous F2F. Extract testable assertions There was a draft... now in XML... Updated with latest version of spec. Structured into several parts... Assertion template... 49 Assertions... 2 currently have tests... 8 others covered by SOAPBuilders tests. Means for folks to contribute tests... but no test yet contributed that way. PC: Lawyer joke... HH: Questions... DF: Assigns groups... G1: Part 1, Section 2 and 3, G2: Part 1, Section 4 G3: Part 2, Section 4 G4: Part 2, Section 5 CF: For HTTP binding perhaps we should use TBTF draft...? GD: Yep... there is a possible problem using text that we're going to discard. PC: Encourage the groups to do a thin, narrative pass, then go back and develop the detail. Come out of today at least with narrative test... then address in parallel. HH: Just a note that the assertions as numbered appear in document order. DF: Division by first letter of surname: A-F G1 G-J G2 K-M G3 N-Z G4 12:00 DF: Run for 30mins, take an hour for lunch and then review whether this is going to work? DF: Work through on flip charts and do one assertion per page. 12:30 Mini plenary Discussion - More assertions that MUST and SHOULDs - Need for test harnesses - Vague assertions that are untestable. - Spec. issues. [maybe others that my memory has failed to retain] ACTION: Spec editors to investigate how to tie spec and tests together. Liase with SVG... 14:50 Wrap-up DF: Assuming that each group will summarise their various to xml-dist-app. Option to continue working... for a while if sufficent folks left... JK: wrt to encodings, it's pretty hard to generate test cases. Since it's an adjunct we may end-up without test cases for encoding. DF: ...Why's that? JK: Dependancies on schema etc... JI: I think some consideration of the test environment... CF: We were running into assertions that were essentially non-testable... eg. properly namespace qualification of generated messages... JK: Noah described how XML Schema describes conformance test for Schema processors (but not generators of Schema?). DF: Will need to reconsider the test cases in the context of what goes into the test collections document. 15:00 Revisit Schedule: DF: publication of the test schedule. Jeff: Seems to be an implicit idea of a conformance statement. I think that we should have a much clearer idea of what sort of conformance statements we are trying to make. HH: The QA activity suggested that we *not* publish as a WD. Could publish as a note... HFN: One factor is that this draft is not the goal, but a means to ensure interoperability. Part of a means to get through last call. Ultimately, do we have some minimum number (2) of implementations that cover all parts of the spec. Also the current document does not describe a test harness. GD: Well yes... but we're all making it (testing) happen... GD: I think that we're looking for some combined work with SOAP builders to do this. DF: To clarify... our creation of this document is intended as a tool to the community that the community can refer to and assert their utility in creating interoperable implementations. JI: There will be folks that will claim conformance with the test collection... GD: Are there W3 test suites in other areas? Dug: If this is to serve the SOAP community we need to publish early and often. DF: Hugo needs to go back to QA for clarification. HFN: Let's not loose sight of the fact that the reference point is our spec. Normative/non-normative nature of test collection gets discussed (GD/HFN). HFN: There's a difference between a spec for a set of test services and what it is that SOAP is. DF: Need some general clarification in our own minds on the purpose of this document. It's proving useful at the moment in reviewing and finding issues with the spec. ACTION: Hugo to ping QA about the publication of the test collection as a WD. 15:10 Schedule: DF: Scenario 2 is clearly more reasonable... Possible F2F prior to PR (West coast?) need a volunteer for a venue. Need to fix a date and coordinate with other XML WG meetings. WD Publication of Part 1, 2, Primer, Usage Scenarios...15:20 Adjourn.
http://www.w3.org/2000/xp/Group/1/11/2728-minutes.html
CC-MAIN-2016-30
refinedweb
13,869
75.91
In Socket Programming, how will a Unix thread receive a Socket CLOSE event from a client if connection is closed? Are there any API's which will notify the unix thread about the CLOSE event received? As in Windows we have WSAEnumNetworkEvents API which gets the event notification for a specified socket descriptor. What will be the equivalent API used in the Unix socket p I am layman to unix and sofar I using R in windows. For example I type following in my R session (in R gui). # this is a my funny example script X <- 1:10Y <- 21:30plot(X, Y)myfun <- function (x){ x1 <- x^0.2 return (x1) }myfun(X) How can I achieve this in unix This question is somewhat similar to my other question, So here is what am looking for with the below architecture.1. MY parent repository (bare and data) is on a UNIX machine.2. I can clone my repository in a UNIX machines.3. I can clone I am having one script need to add logic that if some one add file from winscp and do not convert into plain text while transfer. so some time we get some special character (^m) in some value, i wanted to remove them Here is my code. cd $HOME_DIRif [ $SHELL_STEP = 'step2' ]; thenif [ -s $DATA_DIR/$DATA_FILE.txt ]; then echo "The data file is present." cat -v ne I am beginner to UNIX,UNIX Shell Scripting.Can you please guide me through any excellent sites for unix(which are easy to understand),some study materials(tutorials),video tutorials.Please help!!Thanks! What ist the exactly difference between: uwsgi_pass unix:/foo/bar.sock and uwsgi_pass unix:///foo/bar.sock in a nginx cfg for a uwsgi pass ? What is the better choice for a django production environment ? I have 2 questions 1) how do I i invoke a unix shell from a java.runtime library to run a command like this Process p = Runtime.getRuntime().exec(commands); cat alias > bias 2) How can I read and write to a unix pipe a steady stream of data from java.Do i have to make all the system calls like open read write to a pipe I basic I need to install GIT on a UNIX IBM-AIX server OS. But when I went to the git website I could not find the download for UNIX OS. Where can i download the same. I'm quite pretty new to the concept of CVS. However, I want to start using CVS and thus need to 'check-in' some scripts. I'm using a UNIX server and I know that CVS is installed, since doing a cvs -v Gives me the correct version number installed. Now the problem I have in is finding documentation to use CVS. Is there an online tutorial/FAQ someone can recomm
http://bighow.org/tags/unix/1
CC-MAIN-2017-04
refinedweb
476
73.58