Next Page: 10000

          Vectors - Various Tattoo Set 21      Cache   Translate Page   Web Page Cache   

          Vectors - Birthday Backgrounds 42      Cache   Translate Page   Web Page Cache   

          Vectors - Cartoon Children Mix 42      Cache   Translate Page   Web Page Cache   

          228位:バレンシアガ BALENCIAGA ペーパー ミニ ウォレット 三つ折り財布 391446 黒ブラック ブランド古着ベクトル 中古☆AA★180805 0150 メンズ レディース 【中古】【ベクトル 古着】 180805 プリマベーラ      Cache   Translate Page   Web Page Cache   
バレンシアガ BALENCIAGA ペーパー ミニ ウォレット 三つ折り財布 391446 黒ブラック ブランド古着ベクトル 中古☆AA★180805 0150 メンズ レディース 【中古】【ベクトル 古着】 180805 プリマベーラ
ベクトル プリマベーラ店

36,720円

このランキングの最新情報は総合ランキングをご覧ください。
          Layette ancienne d'horloger bijoutier.Petit meuble ancien de métier avec tiroirs      Cache   Translate Page   Web Page Cache   
190,00 EUR
Date de fin: samedi août-11-2018 18:59:50 CEST
Achat immédiat pour seulement: 190,00 EUR
Achat immédiat | Ajouter à vos Affaires à suivre

          Ancien Meuble de métier - Tri postal       Cache   Translate Page   Web Page Cache   
20,00 EUR (0 Enchères)
Date de fin: vendredi août-17-2018 11:34:15 CEST
Enchérir | Ajouter à vos Affaires à suivre

          Ancienne layette d' horloger bijoutier à 24 tiroirs. Meuble de métier      Cache   Translate Page   Web Page Cache   
230,00 EUR
Date de fin: mercredi sept.-5-2018 18:55:54 CEST
Achat immédiat pour seulement: 230,00 EUR
Achat immédiat | Ajouter à vos Affaires à suivre

          ancenne etageres murales modulables tout metal meuble metier vintage design loft      Cache   Translate Page   Web Page Cache   
80,00 EUR (0 Enchères)
Date de fin: lundi août-13-2018 14:33:47 CEST
Enchérir | Ajouter à vos Affaires à suivre

          CASIER METALLIQUE MEUBLE DE METIER      Cache   Translate Page   Web Page Cache   
40,00 EUR
Date de fin: samedi août-18-2018 17:46:11 CEST
Achat immédiat pour seulement: 40,00 EUR
Achat immédiat | Ajouter à vos Affaires à suivre

          ancien petit coffre fort boite metal epais vintage meuble metier atelier loft      Cache   Translate Page   Web Page Cache   
15,00 EUR (0 Enchères)
Date de fin: jeudi août-9-2018 14:14:37 CEST
Enchérir | Ajouter à vos Affaires à suivre

          Vestiaires métalliques design industriel, meuble de métier, vintage      Cache   Translate Page   Web Page Cache   
80,00 EUR (0 Enchères)
Date de fin: samedi août-11-2018 20:31:16 CEST
Enchérir | Ajouter à vos Affaires à suivre

          meuble de métier,mercerie art déco livraison dans toute la france       Cache   Translate Page   Web Page Cache   
775,00 EUR
Date de fin: samedi sept.-8-2018 0:05:20 CEST
Achat immédiat pour seulement: 775,00 EUR
Achat immédiat | Ajouter à vos Affaires à suivre

          Ancien meuble de métier métal industriel Flambo année 50 15 et 6 tiroirs      Cache   Translate Page   Web Page Cache   
400,00 EUR (0 Enchères)
Date de fin: samedi août-11-2018 11:28:32 CEST
Enchérir | Ajouter à vos Affaires à suivre

          Meuble industriel de métier Ancien Michelin pour cartes routières Haut173cm       Cache   Translate Page   Web Page Cache   
62,00 EUR
Date de fin: mardi sept.-4-2018 8:27:12 CEST
Achat immédiat pour seulement: 62,00 EUR
Achat immédiat | Ajouter à vos Affaires à suivre

          Classeur 4 tiroirs chêne meuble de mètier       Cache   Translate Page   Web Page Cache   
420,00 EUR
Date de fin: lundi sept.-3-2018 22:07:43 CEST
Achat immédiat pour seulement: 420,00 EUR
Achat immédiat | Ajouter à vos Affaires à suivre

          Tiroir d'imprimeur , meuble de métier ,       Cache   Translate Page   Web Page Cache   
17,90 EUR
Date de fin: mercredi sept.-5-2018 18:06:51 CEST
Achat immédiat pour seulement: 17,90 EUR
Achat immédiat | Ajouter à vos Affaires à suivre

          MEUBLE A TIROIRS DOUBLE COLONNE DE METIER      Cache   Translate Page   Web Page Cache   
1.450,00 EUR
Date de fin: jeudi août-16-2018 11:47:48 CEST
Achat immédiat pour seulement: 1.450,00 EUR
Achat immédiat | Ajouter à vos Affaires à suivre

          SVG 图像入门教程      Cache   Translate Page   Web Page Cache   

 一、概述

  SVG 是一种基于 XML 语法的图像格式,全称是可缩放矢量图(Scalable Vector Graphics)。其他图像格式都是基于像素处理的,SVG 则是属于对图像的形状描述,所以它本质上是文本文件,体积较小,且不管放大多少倍都不会失真。

  SVG 文件可以直接插入网页,成为 DOM 的一部分,然后用 JavaScript 和 CSS 进行操作。


<!DOCTYPE html>
<html>
<head></head>
<body>
<svg
  id="mysvg"
  xmlns="http://www.w3.org/2000/svg"
  viewBox="0 0 800 600"
  preserveAspectRatio="xMidYMid meet"
>
  <circle id="mycircle" cx="400" cy="300" r="50" />
<svg>
</body>
</html>

  上面是 SVG 代码直接插入网页的例子。

  SVG 代码也可以写在一个独立文件中,然后用<img>、<object>、<embed>、<iframe>等标签插入网页。


<img src="circle.svg">
<object id="object" data="circle.svg" type="image/svg+xml"></object>
<embed id="embed" src="icon.svg" type="image/svg+xml">
<iframe id="iframe" src="icon.svg"></iframe>

  CSS 也可以使用 SVG 文件。


.logo {
  background: url(icon.svg);
}

  SVG 文件还可以转为 BASE64 编码,然后作为 Data URI 写入网页。


<img src="data:image/svg+xml;base64,[data]">

 二、语法

  2.1 <svg>标签

  SVG 代码都放在顶层标签<svg>之中。下面是一个例子。


<svg width="100%" height="100%">
  <circle id="mycircle" cx="50" cy="50" r="50" />
</svg>

  <svg>的width属性和height属性,指定了 SVG 图像在 HTML 元素中所占据的宽度和高度。除了相对单位,也可以采用绝对单位(单位:像素)。如果不指定这两个属性,SVG 图像默认大小是300像素(宽) x 150像素(高)。

  如果只想展示 SVG 图像的一部分,就要指定viewBox属性。


<svg width="100" height="100" viewBox="50 50 50 50">
  <circle id="mycircle" cx="50" cy="50" r="50" />
</svg>

  <viewBox>属性的值有四个数字,分别是左上角的横坐标和纵坐标、视口的宽度和高度。上面代码中,SVG 图像是100像素宽 x 100像素高,viewBox属性指定视口从(50, 50)这个点开始。所以,实际看到的是右下角的四分之一圆。

  注意,视口必须适配所在的空间。上面代码中,视口的大小是 50 x 50,由于 SVG 图像的大小是 100 x 100,所以视口会放大去适配 SVG 图像的大小,即放大了四倍。

  如果不指定width属性和height属性,只指定viewBox属性,则相当于只给定 SVG 图像的长宽比。这时,SVG 图像的默认大小将等于所在的 HTML 元素的大小。

  2.2 <circle>标签

  <circle>标签代表圆形。


<svg width="300" height="180">
  <circle cx="30"  cy="50" r="25" />
  <circle cx="90"  cy="50" r="25" class="red" />
  <circle cx="150" cy="50" r="25" class="fancy" />
</svg>

  上面的代码定义了三个圆。<circle>标签的cx、cy、r属性分别为横坐标、纵坐标和半径,单位为像素。坐标都是相对于<svg>画布的左上角原点。

  class属性用来指定对应的 CSS 类。


.red {
  fill: red;
}

.fancy {
  fill: none;
  stroke: black;
  stroke-width: 3pt;
}

  SVG 的 CSS 属性与网页元素有所不同。

  • fill:填充色
  • stroke:描边色
  • stroke-width:边框宽度

  2.3 <line>标签

  <line>标签用来绘制直线。


<svg width="300" height="180">
  <line x1="0" y1="0" x2="200" y2="0" style="stroke:rgb(0,0,0);stroke-width:5" />
</svg>

  上面代码中,<line>标签的x1属性和y1属性,表示线段起点的横坐标和纵坐标;x2属性和y2属性,表示线段终点的横坐标和纵坐标;style属性表示线段的样式。

  2.4 <polyline>标签

  <polyline>标签用于绘制一根折线。


<svg width="300" height="180">
  <polyline points="3,3 30,28 3,53" fill="none" stroke="black" />
</svg>

  <polyline>的points属性指定了每个端点的坐标,横坐标与纵坐标之间与逗号分隔,点与点之间用空格分隔。

  2.5 <rect>标签

  <rect>标签用于绘制矩形。


<svg width="300" height="180">
  <rect x="0" y="0" height="100" width="200" style="stroke: #70d5dd; fill: #dd524b" />
</svg>

  <rect>的x属性和y属性,指定了矩形左上角端点的横坐标和纵坐标;width属性和height属性指定了矩形的宽度和高度(单位像素)。

  2.6 <ellipse>标签

  <ellipse>标签用于绘制椭圆。


<svg width="300" height="180">
  <ellipse cx="60" cy="60" ry="40" rx="20" stroke="black" stroke-width="5" fill="silver"/>
</svg>

  <ellipse>的cx属性和cy属性,指定了椭圆中心的横坐标和纵坐标(单位像素);rx属性和ry属性,指定了椭圆横向轴和纵向轴的半径(单位像素)。

  2.7 <polygon>标签

  <polygon>标签用于绘制多边形。


<svg width="300" height="180">
  <polygon fill="green" stroke="orange" stroke-width="1" points="0,0 100,0 100,100 0,100 0,0"/>
</svg>

  <polygon>的points属性指定了每个端点的坐标,横坐标与纵坐标之间与逗号分隔,点与点之间用空格分隔。

  2.8 <path>标签

  <path>标签用于制路径。


<svg width="300" height="180">
<path d="
  M 18,3
  L 46,3
  L 46,40
  L 61,40
  L 32,68
  L 3,40
  L 18,40
  Z
"></path>
</svg>

  <path>的d属性表示绘制顺序,它的值是一个长字符串,每个字母表示一个绘制动作,后面跟着坐标。

  • M:移动到(moveto)
  • L:画直线到(lineto)
  • Z:闭合路径

  2.9 <text>标签

  <text>标签用于绘制文本。


<svg width="300" height="180">
  <text x="50" y="25">Hello World</text>
</svg>

  <text>的x属性和y属性,表示文本区块基线(baseline)起点的横坐标和纵坐标。文字的样式可以用class或style属性指定。

  2.10 <use>标签

  <use>标签用于复制一个形状。


<svg viewBox="0 0 30 10" xmlns="http://www.w3.org/2000/svg">
  <circle id="myCircle" cx="5" cy="5" r="4"/>

  <use href="#myCircle" x="10" y="0" fill="blue" />
  <use href="#myCircle" x="20" y="0" fill="white" stroke="blue" />
</svg>

  <use>的href属性指定所要复制的节点,x属性和y属性是<use>左上角的坐标。另外,还可以指定width和height坐标。

  2.11 <g>标签

  <g>标签用于将多个形状组成一个组(group),方便复用。


<svg width="300" height="100">
  <g id="myCircle">
    <text x="25" y="20">圆形</text>
    <circle cx="50" cy="50" r="20"/>
  </g>

  <use href="#myCircle" x="100" y="0" fill="blue" />
  <use href="#myCircle" x="200" y="0" fill="white" stroke="blue" />
</svg>

  2.12 <defs>标签

  <defs>标签用于自定义形状,它内部的代码不会显示,仅供引用。


<svg width="300" height="100">
  <defs>
    <g id="myCircle">
      <text x="25" y="20">圆形</text>
      <circle cx="50" cy="50" r="20"/>
    </g>
  </defs>

  <use href="#myCircle" x="0" y="0" />
  <use href="#myCircle" x="100" y="0" fill="blue" />
  <use href="#myCircle" x="200" y="0" fill="white" stroke="blue" />
</svg>

  2.13 <pattern>标签

  <pattern>标签用于自定义一个形状,该形状可以被引用来平铺一个区域。


<svg width="500" height="500">
  <defs>
    <pattern id="dots" x="0" y="0" width="100" height="100" patternUnits="userSpaceOnUse">
      <circle fill="#bee9e8" cx="50" cy="50" r="35" />
    </pattern>
  </defs>
  <rect x="0" y="0" width="100%" height="100%" fill="url(#dots)" />
</svg>

  上面代码中,<pattern>标签将一个圆形定义为dots模式。patternUnits="userSpaceOnUse"表示<pattern>的宽度和长度是实际的像素值。然后,指定这个模式去填充下面的矩形。

  2.14 <image>标签

  <image>标签用于插入图片文件。


<svg viewBox="0 0 100 100" width="100" height="100">
  <image xlink:href="path/to/image.jpg"
    width="50%" height="50%"/>
</svg>

  上面代码中,<image>的xlink:href属性表示图像的来源。

  2.15 <animate>标签

  <animate>标签用于产生动画效果。


<svg width="500px" height="500px">
  <rect x="0" y="0" width="100" height="100" fill="#feac5e">
    <animate attributeName="x" from="0" to="500" dur="2s" repeatCount="indefinite" />
  </rect>
</svg>

  上面代码中,矩形会不断移动,产生动画效果。

  <animate>的属性含义如下。

  • attributeName:发生动画效果的属性名。
  • from:单次动画的初始值。
  • to:单次动画的结束值。
  • dur:单次动画的持续时间。
  • repeatCount:动画的循环模式。

  可以在多个属性上面定义动画。


<animate attributeName="x" from="0" to="500" dur="2s" repeatCount="indefinite" />
<animate attributeName="width" to="500" dur="2s" repeatCount="indefinite" />

  2.16 <animateTransform>标签

  <animate>标签对 CSS 的transform属性不起作用,如果需要变形,就要使用<animateTransform>标签。


<svg width="500px" height="500px">
  <rect x="250" y="250" width="50" height="50" fill="#4bc0c8">
    <animateTransform attributeName="transform" type="rotate" begin="0s" dur="10s" from="0 200 200" to="360 400 400" repeatCount="indefinite" />
  </rect>
</svg>

  上面代码中,<animateTransform>的效果为旋转(rotate),这时from和to属性值有三个数字,第一个数字是角度值,第二个值和第三个值是旋转中心的坐标。from="0 200 200"表示开始时,角度为0,围绕(200, 200)开始旋转;to="360 400 400"表示结束时,角度为360,围绕(400, 400)旋转。

 三、JavaScript 操作

  3.1 DOM 操作

  如果 SVG 代码直接写在 HTML 网页之中,它就成为网页 DOM 的一部分,可以直接用 DOM 操作。


<svg
  id="mysvg"
  xmlns="http://www.w3.org/2000/svg"
  viewBox="0 0 800 600"
  preserveAspectRatio="xMidYMid meet"
>
  <circle id="mycircle" cx="400" cy="300" r="50" />
<svg>

  上面代码插入网页之后,就可以用 CSS 定制样式。


circle {
  stroke-width: 5;
  stroke: #f00;
  fill: #ff0;
}

circle:hover {
  stroke: #090;
  fill: #fff;
}

  然后,可以用 JavaScript 代码操作 SVG。


var mycircle = document.getElementById('mycircle');

mycircle.addEventListener('click', function(e) {
  console.log('circle clicked - enlarging');
  mycircle.setAttribute('r', 60);
}, false);

  上面代码指定,如果点击图形,就改写circle元素的r属性。

  3.2 获取 SVG DOM

  使用<object>、<iframe>、<embed>标签插入 SVG 文件,可以获取 SVG DOM。


var svgObject = document.getElementById('object').contentDocument;
var svgIframe = document.getElementById('iframe').contentDocument;
var svgEmbed = document.getElementById('embed').getSVGDocument();

  注意,如果使用<img>标签插入 SVG 文件,就无法获取 SVG DOM。

  3.3 读取 SVG 源码

  由于 SVG 文件就是一段 XML 文本,因此可以通过读取 XML 代码的方式,读取 SVG 源码。


<div id="svg-container">
  <svg
    xmlns="http://www.w3.org/2000/svg"
    xmlns:xlink="http://www.w3.org/1999/xlink"
    xml:space="preserve" width="500" height="440"
  >
    <!-- svg code -->
  </svg>
</div>

  使用XMLSerializer实例的serializeToString()方法,获取 SVG 元素的代码。


var svgString = new XMLSerializer()
  .serializeToString(document.querySelector('svg'));

  3.4 SVG 图像转为 Canvas 图像

  首先,需要新建一个Image对象,将 SVG 图像指定到该Image对象的src属性。


var img = new Image();
var svg = new Blob([svgString], {type: "image/svg+xml;charset=utf-8"});

var DOMURL = self.URL || self.webkitURL || self;
var url = DOMURL.createObjectURL(svg);

img.src = url;

  然后,当图像加载完成后,再将它绘制到<canvas>元素。


img.onload = function () {
  var canvas = document.getElementById('canvas');
  var ctx = canvas.getContext('2d');
  ctx.drawImage(img, 0, 0);
};

 四、实例:折线图

  下面将一张数据表格画成折线图。


Date |Amount
-----|------
2014-01-01 | $10
2014-02-01 | $20
2014-03-01 | $40
2014-04-01 | $80

  上面的图形,可以画成一个坐标系,Date作为横轴,Amount作为纵轴,四行数据画成一个数据点。


<svg width="350" height="160">
  <g class="layer" transform="translate(60,10)">
    <circle r="5" cx="0"   cy="105" />
    <circle r="5" cx="90"  cy="90"  />
    <circle r="5" cx="180" cy="60"  />
    <circle r="5" cx="270" cy="0"   />

    <g class="y axis">
      <line x1="0" y1="0" x2="0" y2="120" />
      <text x="-40" y="105" dy="5">$10</text>
      <text x="-40" y="0"   dy="5">$80</text>
    </g>
    <g class="x axis" transform="translate(0, 120)">
      <line x1="0" y1="0" x2="270" y2="0" />
      <text x="-30"   y="20">January 2014</text>
      <text x="240" y="20">April</text>
    </g>
  </g>
</svg>

 五、参考链接


          New home robot could spark mass adoption of robotic helpers      Cache   Translate Page   Web Page Cache   
Anki’s new robot Vector is designed to be a combination of virtual assistant and high-spirited friend that sparks the mass adoption of home robots.
          Comment on Chronic Lyme, Stealth Organisms, And You by Kenn_32      Cache   Translate Page   Web Page Cache   
While Lyme disease is currently the most reported and discussed tick vectored health issue, very little information is available on health problems that might be caused by more common ticks like wood ticks or dog ticks that have become quite prevalent in northern States such as my area of northeast Michigan. Although I try to protect myself from tick exposure, it's been impossible to prevent an occasional attachment. I don't believe the current version of removal within 24 hours will prevent any infection. If I find an attached tick and remove it properly and quickly, the bite site will still throw up a reaction with itching that will continue for a week or more. It's been my wonder whether body aches that may be attributable to normal aging or perhaps overexertion when doing farm chores, may actually be from a tick vectored virus. More research needs to be done and reported on all tick species as to diseases they may carry and health problems they may cause, as well as ways to resolve infections.
          An efficient CRISPR vector toolbox for engineering large deletions in Arabidopsis thaliana.      Cache   Translate Page   Web Page Cache   
Related Articles

An efficient CRISPR vector toolbox for engineering large deletions in Arabidopsis thaliana.

Plant Methods. 2018;14:65

Authors: Wu R, Lucke M, Jang YT, Zhu W, Symeonidi E, Wang C, Fitz J, Xi W, Schwab R, Weigel D

Abstract
Background: Our knowledge of natural genetic variation is increasing at an extremely rapid pace, affording an opportunity to come to a much richer understanding of how effects of specific genes are dependent on the genetic background. To achieve a systematic understanding of such GxG interactions, it is desirable to develop genome editing tools that can be rapidly deployed across many different genetic varieties.
Results: We present an efficient CRISPR/Cas9 toolbox of super module (SM) vectors. These vectors are based on a previously described fluorescence protein marker expressed in seeds allowing identification of transgene-free mutants. We have used this vector series to delete genomic regions ranging from 1.7 to 13 kb in different natural accessions of the wild plant Arabidopsis thaliana. Based on results from 53 pairs of sgRNAs targeting individual nucleotide binding site leucine-rich repeat (NLR) genes, we provide a comprehensive overview of obtaining heritable deletions.
Conclusions: The SM series of CRISPR/Cas9 vectors enables the rapid generation of transgene-free, genome edited plants for a diversity of functional studies.

PMID: 30083222 [PubMed]


          49636082_ml      Cache   Translate Page   Web Page Cache   

mghresearchinstitute posted a photo:

49636082_ml

49636082 - hand drawn science beautiful vintage lab icons sketch set . vector illustration. back to school. doodle lab equipment.biology, geology alchemy, chemistry, magic, tattoo elements.


          36567839_ml      Cache   Translate Page   Web Page Cache   

mghresearchinstitute posted a photo:

36567839_ml

36567839 - vector icons research flat infographic with a laboratory microscope surrounded by icons depicting pharmaceutical, chemistry, medical and genetics


          45654890_ml      Cache   Translate Page   Web Page Cache   

mghresearchinstitute posted a photo:

45654890_ml

45654890 - abstract network, gray background, technology communication, molecule structure. vector illustration. eps 10


          44359838_ml      Cache   Translate Page   Web Page Cache   

mghresearchinstitute posted a photo:

44359838_ml

44359838 - back to school: science learning symbols from bulb. education concept. vector illustration.


          New Jersey SVG, state svg, silhouette, heart svg, and dotted lines INSTANT DOWNLOAD vector files for cutting machines - svg, png, dxf, eps by MeanRightHookDesigns      Cache   Translate Page   Web Page Cache   

1.50 USD

Long distance relationships are hard. Tell the one you love how much you're thinking about them by making them something awesome!

This listing is for an instant digital download of:
• The state of New Jersey
• A heart
• Two different dotted lines

These can be used in your cutting machine that accepts:
• SVG
• PNG
• DXF or
• EPS file types

All of these files will be in 1 zipped folder. You must unzip, extract, or expand the zipped file folder before attempting to use the files.

Please ensure that your machine takes the above format prior to purchase. These are design files. This is NOT the finished product or an embroidery design.

There is no guarantee the quality of the designs once they are altered, edited or converted.

There will be no refunds due to incompatibility issues so please be sure you have a machine that works with these file types.

Can't find the state or place you're looking for? Send us a message and we can create that for you!


          Could I Transfer into UW Seattle's Computer Science Program?      Cache   Translate Page   Web Page Cache   
Hey all! CC student here from North Seattle College. I have a 3.7 college GPA, but my lowest grades by far are in Calculus (2.9 Calc I, 3.7 Calc II, 3.2 Calc III). 4.0 in Engineering Physics I. 4.0 in all 3 of the Chem sequence. 4.0 in Comp Prog I. 4.0 in a bunch of liberal arts classes. A few questions: 1) Clearly I'm a B math student. Do I even have a shot when it's obvious I'm not great with math? I'm continuing with Vector Calc, Linear Algebra and Diff EQ regardless. 2) Surprise! I'm actually going to be a geology major (once I transfer next year), but am considering tacking on Computer Science as a double major if I'm qualified. I've been told than many geologists/geophysicists spend a large chunk of their postbac work learning how to program and that it's helpful have a background in comp sci. I want to get into a good grad school with a head start. Too ambitious? I'm applying for Fall 2019, and I haven't even been admitted to the UW Earth Science program. (*hopefully* I get admitted. I got 4.0s in every Geo course you can take in CC...still nervous!). 3) For all of the UW CSE students out there, if I were to get admitted, what classes should I target if I want to do scientific modeling and prediction? For geology, my focus is on the physics of natural disasters (volcanos, earthquakes, general plate tectonics) and I want to research and model what's happening beneath the earth's surface in greater detail than what's available now to offer predictions for narrower timetables for events like eruptions, plate faulting etc. (I know this is HARD to do, but no progress will ever be made if no one tries, right?!) My ultimate goal is to get a geology degree and get into a really good grad school for geophysics. I've always dreamed of Stanford, but although I'm a hard worker, I'm not a super brilliant mind. Any advice? I'm 33, and I can take feedback :)
          Anki Vector Robot      Cache   Translate Page   Web Page Cache   
none
          Voice-Enabled AI Robots - Vector by Anki is an Assistive Home Robot That Hears, Sees, Feels & Reacts (TrendHunter.com)      Cache   Translate Page   Web Page Cache   
(TrendHunter.com) By revenue, Cozmo by Anki was recognized as one of the top-selling toys on Amazon across various countries in 2017 and now, a next-gen robot toy is being introduced as Vector by Anki. Vector...
          INSTANT DOWNLOAD - Holiday Mini Session template - Photoshop template - E932 by birdesign      Cache   Translate Page   Web Page Cache   

8.00 USD

INSTANT DOWNLOAD
Digital Marketing Board: Perfect to use as flyer, postcard, photo newsletter, mini session announcement, promo or blog board.

DETAILS:
•5x7" Layout @300dpi
•Layered Photoshop PSD file
•Fully customizable (colors and text)
•Free and standard fonts used
•Design elements are vectors and can be enlarged
• Photoshop and Elements compatibility

You will need basic knowledge of Adobe Photoshop to make changes in templates.
Our products are created for professional photographic uses. It is prohibited to share or resell the digital purchased templates. By purchasing any file from this shop you accept the terms and conditions.

If you have questions or need support please contact me, it will be a pleasure to help you! :)
Pictures courtesy of Heather Barta
SKU: E932


          INSTANT DOWNLOAD - Photoshop Photography Senior Marketing boards - Newsletter templates - E773 by birdesign      Cache   Translate Page   Web Page Cache   

18.00 USD

INSTANT DOWNLOAD

Digital Marketing Board: Perfect to use as flyer, postcard, photo newsletter, mini session announcement, promo or blog board.

DETAILS:
•5x5" & 5x7" @300dpi marketing board designs
•Layered Photoshop PSD files
•Fully customizable (colors and text)
•Free and standard fonts used
•Design elements are vectors and can be enlarged
•Photoshop and Elements compatibility


You will need basic knowledge of Adobe Photoshop to make changes in templates.
Our products are created for professional photographic uses. It is prohibited to share or resell the digital purchased templates. By purchasing any file from this shop you accept the terms and conditions.

If you have questions or need support please contact me, it will be a pleasure to help you! :)
Pictures courtesy of Alyssia Baird
SKU: E773


          INSTANT DOWNLOAD - Photography Marketing board - Newsletter template -E497-2 by birdesign      Cache   Translate Page   Web Page Cache   

8.00 USD

INSTANT DOWNLOAD
Digital Marketing Board: Perfect to use as flyer, postcard, photo newsletter, mini session announcement, promo or blog board.

DETAILS:
•Each design is 1000 px wide and lengthy
•Layered Photoshop PSD files
•Fully customizable (colors and text)
•Free and standard fonts used
•Design elements are vectors and can be enlarged
• Photoshop and Elements compatibility

You will need basic knowledge of Adobe Photoshop to make changes in templates.
Our products are created for professional photographic uses. It is prohibited to share or resell the digital purchased templates. By purchasing any file from this shop you accept the terms and conditions.

If you have questions or need support please contact me, it will be a pleasure to help you! :)
Pictures courtesy of Jenny Esterbrook | www.jennyesterbrook.com

SKU: E497-2


          Matlab mph functions calling a selection      Cache   Translate Page   Web Page Cache   

Hi everyone,

I get into a problem, that I cant fix after half a day trying. I created a matlab instance of a comsol simulation, which I then manipulated. Now I want to access the model after I run it:

mod1 = model; mphviewselection(mod2,"geom1_csel2_dom")

but then i get the error:

"SWITCH expression must be a scalar or character vector constant."

to check that I really used the right selection tag i checked:

mod1.selection

what gives me:

"Type: List Tag: selection Child nodes: geom1_csel1_pnt, geom1_csel1_bnd, geom1_csel1_dom, geom1_csel2_pnt, geom1_csel2_bnd, geom1_csel2_dom"

so the reference does exist, but somehow it cant access it... I tried many things, but can't find a solution. I hope you can help me out of this?

Best, Joel


          meuble de metier ancien ,notaire en chene ,livraison dans toute la france       Cache   Translate Page   Web Page Cache   
590,00 EUR
Date de fin: samedi sept.-8-2018 0:08:05 CEST
Achat immédiat pour seulement: 590,00 EUR
Achat immédiat | Ajouter à vos Affaires à suivre

          COMUNICADO: Ziften incorpora un antivirus avanzado a su plataforma de protección de puntos de conexión Zenith      Cache   Translate Page   Web Page Cache   
- Ziften incorpora un antivirus avanzado a su plataforma de protección de puntos de conexión Zenith para parar los ataques cibernéticos antes de que se produzcan daños o pérdidas El antivirus avanzado detecta múltiples vectores de ataque para evitar ataques con y sin archivos y dentro de la memoria empleando inteligencia artificial (IA) y a la nube LAS VEGAS, 8 de agosto de 2018 /PRNewswire/ -- CONGRESO BLACKHAT -- Ziften, líder en protección de puntos de conexión, visibilidad y endurecimiento (hardening), ha anunciado hoy que su plataforma de protección de puntos de conexión Zenith incorpora ahora un antivirus avanzado que protege todos los puntos de conexión corporativos de los modernos ataques dirigidos conocidos y desconocidos.
          【ニュース】 システムズナカシマ、PDF図面をCADデータに変換できるソフトを発売      Cache   Translate Page   Web Page Cache   
 システムズナカシマは8月6日、PDF化された図面をCADデータに変換できるWindowsソフトウェア「VectorMasterPremium」を発売した。価格は、1ライセンスが9万8000円(税別)。  本ソフトウェアでは、紙の図面などをスキャンして作成された「ラスタPDF」や、CADからPDF生成ソフトを利用して作成された「ベクタPDF」などをCADデータに変換できる。PDFの種類を問わず1つのシステムでCADデータに変換できるため、図面の種類に応じてシステムを使い分ける必要がなく、システムの導入コストを抑えられる。  PDFデータの上で右クリックすることで容易に変換を行える。複数のC…>>続きを読む
           Hands-on with Vector, Anki's new emotive home assistant robot       Cache   Translate Page   Web Page Cache   

New Atlas went hands-on with Vector, a new robot from Anki that's basically a cross between ...#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000

Sci-fi has long promised that robots would be living in our houses someday, helping us out and basically becoming a member of the family. But that hasn't really happened yet – after all, it's hard to really get attached to your Roomba or Alexa. Now robotics company Anki is unveiling Vector, an emotive little fella who's basically a cross between a smart home assistant and a pet. New Atlas got a hands-on demo, and found Vector to be a versatile home robot that's a real charmer and might actually chip in around the house.

.. Continue Reading Hands-on with Vector, Anki's new emotive home assistant robot

Category: Robotics

Tags:
          ASSISTANT PROFESSOR - INSECT VECTOR BIOLOGIST / INSECT PHYSIOLOGIST - University of Wisconsin–Madison - Madison, WI      Cache   Translate Page   Web Page Cache   
Assistant Professor - Insect Vector Biologist / Insect Physiologist. Position Vacancy ID:....
From University of Wisconsin–Madison - Mon, 30 Apr 2018 06:48:38 GMT - View all Madison, WI jobs
          Sports Logo      Cache   Translate Page   Web Page Cache   
I am looking for a designer to complete a Sporting Logo design. I am interested to hear from reasonably priced designer to complete this in vector file in the next few days. I am looking at spending... (Budget: $30 - $250 AUD, Jobs: Graphic Design, Illustrator, Logo Design, Photoshop)
          Plaid free seamless vector pattern      Cache   Translate Page   Web Page Cache   


This is an abstract vibrant plaid seamless vector pattern set. The free pattern comes in 5 unique colours to choose from to use in your design art work. The set also comes in two different vector formats EPS and AI. I hope you like the patterns, as always any feedback and thought are always appreciated. […]


          New home robot could spark mass adoption of robotic helpers      Cache   Translate Page   Web Page Cache   
Anki’s new robot Vector is designed to be a combination of virtual assistant and high-spirited friend that sparks the mass adoption of home robots.
          Sports Logo      Cache   Translate Page   Web Page Cache   
I am looking for a designer to complete a Sporting Logo design. I am interested to hear from reasonably priced designer to complete this in vector file in the next few days. I am looking at spending... (Budget: $30 - $250 AUD, Jobs: Graphic Design, Illustrator, Logo Design, Photoshop)
          The Danger of using Vector Drawables      Cache   Translate Page   Web Page Cache   
none
          New home robot could spark mass adoption of robotic helpers      Cache   Translate Page   Web Page Cache   
Anki’s new robot Vector is designed to be a combination of virtual assistant and high-spirited friend that sparks the mass adoption of home robots.
          Vinyl Graphic Installer - Vector Media - Providence, RI      Cache   Translate Page   Web Page Cache   
Vinyl Graphic Installer (Part Time, 20-25 hrs/week). The primary role of the Installer is to complete the installation, maintenance and removal of advertising...
From Indeed - Fri, 20 Jul 2018 19:05:38 GMT - View all Providence, RI jobs
          01FU0.jpg      Cache   Translate Page   Web Page Cache   

ngatran4689 posted a photo:

01FU0.jpg

Protection background. Technology security, encode and decrypt, techno scheme, vector illustration


          Data structures 1 - Bitmasks from Research Software Engineering at Warwick by Christopher Brady      Cache   Translate Page   Web Page Cache   

This month we're going to start an occasional series on data structures. Data structures are one of the core foundations of computer science, but are often underappreciated by general academic programmers. A large part of this is simply that data structures are usually chosen early in development of a code and are only rarely changed as the code evolves. Since most people don't start a code themselves, but simply work with an existing one, you only need to know how to work with a given data structure rather than why it was chosen or why it's a good choice. To try and remedy this we are going to create a few blog posts on common data structures, why they are chosen and how to implement them.

The first one is definitely one from the archives, being a trick that was more useful when computers only had a few kB of memory available to them, but is still used in modern codes because of it's simplicity. This month, we're going to be talking about bitmasks.

Bitmasks

Bitmasks are solutions to the problem of you having a large number of simple logical flags that you want to keep track of and keep together. The common uses are things like status flags (what state is this object in), capability flags (what can this object do) and error flags (which errors have occured). The answer seems obvious:

LOGICAL, DIMENSION(N) :: flags !Fortran
std::vector<bool> flags; // C++
char[N] flags; /*C*/

In fact, none of these are guaranteed to use as little memory as is needed to store your data.

In fact, since all that you are storing is a single true/false state all that you need is a single bit for each state, so you can store 8 states in a byte. So how do you do it? Unsurprisingly, you need to use bitwise Boolean logic. In particular you will probably find uses for bitwise OR, bitwise AND and bitwise XOR. The syntax for these varies between languages but almost every language has them

Bitwise operators in different languages
  C/C++/Python Fortran (95 or later)
Bitwise OR A | B IOR(A, B)
Bitwise AND A & B IAND(A, B)
Bitwise XOR A ^ B IEOR(A, B)

Bitwise operators are exactly the same as logical operators but they operates on each bit individually. So you go through each bit in the two values and operate as if each was a logical flag. As an example, imagine 15 OR 24

Bit/Number 1 2 4 8 16 32 64 128
15 1 1 1 1 0 0 0 0
24 0 0 0 1 1 0 0 0
Result = 31 1 1 1 1 1 0 0 0

Every bit that was set in either of the two sources is set in the result. To make practical use of this, define named flags for each bit that you want to use. In this example I'm going to assume that I want my bitmask to represent error states based off a real code that I've worked with.

/*NOTE these values must be powers of two since they correspond to individual bits. Bitmasks don't work
for other values*/
char c_err_none = 0; //No error state is all bits zero
char c_err_unparsable_value = 1; //Value that can't be converted to integer
char c_err_bad_value = 2; //Value can be converted to integer, but integer is not valid in context
char c_err_missing_feature = 4; //Code has not been compiled with needed feature
char c_err_terminate = 8; //Error is fatal. Code should terminate

You can do the same in Fortran or Python, although Fortran still doesn't have a portable "char" equivalent so you'll have to use integers. Once you have your list of constants, you can write code to use them for error values. For example

/*Set errcode to c_err_none to start*/
char errcode = c_err_none;
if (value == c_feature_tracking) {
if (!tracking_enabled){
errcode = errcode | c_err_missing_feature; /*Feature is missing so or with c_err_missing_feature flag*/
errcode = errcode | c_err_terminate; /*Code should not continue to run so or with c_err_terminate*/
} else { ... }

}

This code tests for value being a value that the code hasn't been compiled with and sets two error state bits by combining the errcode variable with the constants c_err_missing_feature and c_err_terminate. This sets the correct two bits and errcode now has the error state stored safely in it. But how do you read it back? By using AND. If I want to test for a state, I simply AND the errcode variable with that state. To demonstrate

Bit/Number 1 2 4 8 16 32 64 128
errcode 0 0 1 1 0 0 0 0
c_err_terminate 0 0 0 1 0 0 0 0
Result = 8 0 0 0 1 0 0 0 0

Since the value c_err_terminate has been set, the result is just the value of the bit corresponding to c_err_terminate. But what if I test a bit that isn't set?

Bit/Number 1 2 4 8 16 32 64 128
errcode 0 0 1 1 0 0 0 0
c_err_bad_value 0 1 0 0 0 0 0 0
Result = 0 0 0 0 0 0 0 0 0

The result of the AND operation is just zero. So to test for a bit being set, simply AND your error variable with the flag being tested and test if the result is zero or not. In languages like C or C++ where conditionals can just test for a value being zero or not, this is as simple as

if (errcode & c_err_terminate) { ... }

But in Fortran where the IF statement needs to take a logical, you have to explicitly test against zero

IF (IAND(errcode, c_err_terminate) /= 0)

The other common task with arrays of logicals is to flip the state of a bit. So if it is set, unset it and if it's unset, set it. You do this using the XOR operator. XOR is a little less common than AND or OR, so I'll explain it briefly.

XOR is exclusive OR and it has this truth table


0 1
0 0 1
1 1 0

So if either, BUT NOT BOTHof the inputs is 1 then the output is 1. Otherwise the output is zero. You can see what that does to a bitmask simply enough by considering if I want to flip the state of the c_err_terminate bit in my previous bitmask

Bit/Number 1 2 4 8 16 32 64 128
errcode = 12 0 0 1 1 0 0 0 0
c_err_terminate 0 0 0 1 0 0 0 0
Result = 4 0 0 1 0 0 0 0 0

You can see immediately that by performing the same operation again I'll just set the c_err_terminate bit back.

So by combining the values with XOR I simply flip the state of the bit that I am interested in while leaving everything else alone. In code this is very simple

errcode = IEOR(errcode, c_err_terminate) !Fortran
errcode = errcode ^ c_err_terminate /* C/ C++ or Python */


          Hello there!      Cache   Translate Page   Web Page Cache   
Hello ;)
Weve created a free library of vector maps (cities and countries) in (.AI) Adobe Illustrator and PDF, ready for printing or using in some presentations. Where can I post a link here in this forum?
Street city plans, vector maps of countries (with state borders in case of US) enjoy!
Thanx!

Topic Replies: 1
          Prevalence of pSCFS7-like vectors among cfr-positive staphylococcal population in Spain      Cache   Translate Page   Web Page Cache   
Nguyen L.T.T., Román F., Morikawa K., Trincado P., Marcos C., Rojo-Martín M.D., Cafini F.
[In Process] International Journal of Antimicrobial Agents 2018 52:2 (305-306)
Embase

No abstract available


          Global Yeast Expression Vector Market Analysis 2018 | Growth by Top Companies: Thermo Fisher Scientific, Inc. U.S., Promega Corporation U.S., Sigma-Aldrich Corporation U.S., Agilent Technologies U.S., Bio-Rad Laboratories U.S., New England Biolabs U.S., M      Cache   Translate Page   Web Page Cache   
(EMAILWIRE.COM, August 08, 2018 ) The global market size of Yeast Expression Vector is $XX million in 2017 with XX CAGR from 2013 to 2017, and it is expected to reach $XX million by the end of 2023 with a CAGR of XX% from 2018 to 2023. Download Free Sample at. https://www.researchreportsinc.com/sample-request?id=66391...
          Logo design      Cache   Translate Page   Web Page Cache   
Already have an idea for my logo just need it copied in vector format and creativity is welcomed. The name of the company is Highland and Main it’s real estate investment company. (Budget: $30 - $250 USD, Jobs: Graphic Design, Illustrator, Logo Design, Photoshop)
          Calculate 3D Vertex Coordinates as skin along polygons (3 Vertex Vectors) – Math (C#/VB.NET/C++)      Cache   Translate Page   Web Page Cache   
This is for a VB.NET project, but a C# solution or .NET C++ DLL solution will be fine. Understanding of multi-threading, randomization, 3D coordinates in either XYZ/XZY systems and vectors is essential; you will need to move coordinates along in direction of another... (Budget: £30 - £60 GBP, Jobs: C# Programming, C++ Programming, Mathematics, VB.NET, Visual Basic)
          Principal Software Engineer - Wabtec - Germantown, MD      Cache   Translate Page   Web Page Cache   
Code Warrior, IAR Systems, Vector (CAN bus), AVR Studio, GNU, Cosmic, Visual C/C++, Borland C/C++ Builder. Responsible for design, development and maintenance...
From Wabtec - Tue, 10 Apr 2018 16:01:55 GMT - View all Germantown, MD jobs
          Logo design      Cache   Translate Page   Web Page Cache   
Already have an idea for my logo just need it copied in vector format and creativity is welcomed. The name of the company is Highland and Main it’s real estate investment company. (Budget: $30 - $250 USD, Jobs: Graphic Design, Illustrator, Logo Design, Photoshop)
          Calculate 3D Vertex Coordinates as skin along polygons (3 Vertex Vectors) – Math (C#/VB.NET/C++)      Cache   Translate Page   Web Page Cache   
This is for a VB.NET project, but a C# solution or .NET C++ DLL solution will be fine. Understanding of multi-threading, randomization, 3D coordinates in either XYZ/XZY systems and vectors is essential; you will need to move coordinates along in direction of another... (Budget: £30 - £60 GBP, Jobs: C# Programming, C++ Programming, Mathematics, VB.NET, Visual Basic)
          Re: Oh Wow, was für ein Ausbau      Cache   Translate Page   Web Page Cache   
Fördergebiete: Telekom schaltet Vectoring für 405.000 Haushalte frei
          Hand drawn sketch of Bastone bread      Cache   Translate Page   Web Page Cache   

Hebstreits posted a photo:

Hand drawn sketch of Bastone bread

#Hand drawn sketch of Bastone bread #Food, #Images

bit.ly/2MutlQl

#Art, #Authentic, #Baked, #Bakery, #Bastone, #Black, #Bred, #Cane, #Cooked, #Cute, #Delicious, #Design, #Dorothy, #Drawing, #Dry, #Food, #French, #Fresh, #Hand, #Healthy, #Icon, #Illustration, #Ingredients, #Italian, #ItalianStick, #Italy, #Line, #Loaves, #Made, #Outline, #Pen, #Regional, #Rolls, #Rustic, #Semolina, #Served, #Sesame, #Sicilian, #Sketch, #Slice, #Staff, #Vector, #YeastBread


          TNJFM.jpg      Cache   Translate Page   Web Page Cache   

ngatran4689 posted a photo:

TNJFM.jpg

Vector of Data System


          Vector Group (VGR) Passes Through 9% Yield Mark      Cache   Translate Page   Web Page Cache   
Looking at the universe of stocks we cover at Dividend Channel in trading on Tuesday shares of Vector Group Ltd Symbol VGR were yielding above the 9 mark based on its quarterly dividend annualized to 1 6 with the stock changing hands as low as 17 26 on the day Dividends
          New home robot could spark mass adoption of robotic helpers      Cache   Translate Page   Web Page Cache   
Anki’s new robot Vector is designed to be a combination of virtual assistant and high-spirited friend that sparks the mass adoption of home robots.
          New home robot could spark mass adoption of robotic helpers      Cache   Translate Page   Web Page Cache   
Anki’s new robot Vector is designed to be a combination of virtual assistant and high-spirited friend that sparks the mass adoption of home robots.
          UBS Group AG Has $343,000 Position in VanEck Vectors Mortgage REIT Income ETF (MORT)      Cache   Translate Page   Web Page Cache   
UBS Group AG reduced its stake in shares of VanEck Vectors Mortgage REIT Income ETF (NYSEARCA:MORT) by 41.0% during the 1st quarter, according to the company in its most recent 13F filing with the SEC. The firm owned 14,910 shares of the company’s stock after selling 10,356 shares during the quarter. UBS Group AG owned […]
          Principal Software Engineer - Wabtec - Germantown, MD      Cache   Translate Page   Web Page Cache   
Code Warrior, IAR Systems, Vector (CAN bus), AVR Studio, GNU, Cosmic, Visual C/C++, Borland C/C++ Builder. Responsible for design, development and maintenance...
From Wabtec - Tue, 10 Apr 2018 16:01:55 GMT - View all Germantown, MD jobs
          Vinyl Graphic Installer - Vector Media - Providence, RI      Cache   Translate Page   Web Page Cache   
Vinyl Graphic Installer (Part Time, 20-25 hrs/week). The primary role of the Installer is to complete the installation, maintenance and removal of advertising...
From Indeed - Fri, 20 Jul 2018 19:05:38 GMT - View all Providence, RI jobs
          Anki's Vector Is a Little AI-Powered Robot Now on Kickstarter for $200      Cache   Translate Page   Web Page Cache   
Is this the personal home robot we've been waiting for? No, but Vector will make you smile
          Vinyl Graphic Installer - Vector Media - Providence, RI      Cache   Translate Page   Web Page Cache   
Vinyl Graphic Installer (Part Time, 20-25 hrs/week). The primary role of the Installer is to complete the installation, maintenance and removal of advertising...
From Indeed - Fri, 20 Jul 2018 19:05:38 GMT - View all Providence, RI jobs
          More work on Bolder      Cache   Translate Page   Web Page Cache   

This is a mirror of a post on my blog.

After the birds of a feather session Richard Fairhurst lead at State of the Map, I was motivated to continue some work on bolder, a client-side style I've been working on.

While I was working at the Wikimedia Foundation, I developed brighmed, a CartoCSS style using vector tiles. Wikimedia decided not to flip the switch to deploy the style, but the style is open source, so I can use it elsewhere. Making this decision, I spent a day implementing most of it in Tangram.

Bolder example image

What's next?

I've got some missing features like service roads and some railway values to add, then I can look at new stuff like POIs. For that I'll need to look at icons and where to fit them into colourspace.

There's a bunch of label work that needs to be done, what I have is just a first pass, and some things like motorway names have big issues, and ref tags still need rendering. Label quality is of course a unending quest, but I should be able to get some big gains without much work.

Richard is planning to do some work on writing a schema, and if it works, I'd like to adopt it. At the same time, I don't want to tie myself to an external schema which may have different cartographic aims, so I'll have to see how that works out. Looking at past OpenStreetMap Carto changes to project.mml, I found that what would be breaking schema changes on a vector tile project are less common than I thought, happening about once every 4-6 months. Most of the schema changes that would have happened were compatible and could be handled by regenerating tiles in the background.


          New home robot could spark mass adoption of robotic helpers      Cache   Translate Page   Web Page Cache   
Anki’s new robot Vector is designed to be a combination of virtual assistant and high-spirited friend that sparks the mass adoption of home robots.
          Illustrator - art showing in preview but not when file opened      Cache   Translate Page   Web Page Cache   

I created a file in AI CC, which I installed recently.  Saved periodically for a couple of days.  Now when I open that file, the content visiible in AI is what I saved from the early in the creation process.  What's weird is if I look at the file using preview - the thumbnail that shows which file to open - I can see all the recent work.  I can also see the 6 artboards with the objects & text  I expect when I preview with Mac Finder, or in Acrobat.  But when I open the file in AI, only 3 artboards have objects and they are not the current work.

 

I have tried:

  • Checking that all layers and sublayers are visible
  • Saving the stunted open file to a new name, when I open that same thing not newest version. But then the preview matches only 3 artboards.
  • File, Place
  • Closing AI and restarting it
  • Shutting down my Mac an restarting it
  • Opening the file in Photoshop - this DOES show me all 6 "pages" and I can open, but of course they are converted to bitmap not editable vector
  • Opening the file in AI CS6 - still only 3 artboards visible
  • Giving the file to a colleague to open with their installation of AI CC; they get the same - not the current artwork only 3 artboards
  • Restoring from backups Time Machine and also Dropbox Version History.  Earlier files have the same problem even though they too show more recent changes in preview.
  • Following all the steps in Adobe's advice on corrupt files with the exception of changing all fills & strokes to one color and all text to one font because then what's the use?

 

What else should I try?

Anyone else experienced this and did anything work or did you just have to recreate the file?

 

Having to create all that work is a problem, but a bigger problem would be if this is a bug and it happens again.  If something about AI CC is going to be unreliable, not sure I can use it.

 

I would appreciate any assist, thank you!


          Auto word wrapping a text to fit before a backdrop pane in Mixed Reality apps      Cache   Translate Page   Web Page Cache   

Intro

As Mixed Reality in general and HoloLens apps in particular become more mainstream, so they become ever more complex, and this reflects in their interfaces. And if, in those user interfaces, we need to communicate something more complex to user, text is in most cases still the most efficient way of doing that.

Now a floating text by itself may not be very readable, so you might want to use some kind of backdrop. I usually take a kind of blueish background with white text, as that turns out the most readable. And yeah, I know, it feels a bit 2D Windows-ish – but until someone comes up with a better paradigm, it will have to do.

A TextMesh in Unity does not have a clue about word wrapping or fitting into a specific 'box' – you need to do that yourself. There is some of that in the Mixed Reality Toolkit dialog system – but that wraps based on the maximum of characters. If you change the font size, or the size of the backdrop – you will need to start testing again if you message fits. No need for that here.

The actual text wrapping

public static class TextUtilities
{
    public static void WordWrap(this TextMesh mesh, float maxLength)
    {
        var oldQ = mesh.gameObject.transform.rotation;
        mesh.gameObject.transform.rotation = Quaternion.identity;
        var renderer = mesh.GetComponent<Renderer>();
        var parts = mesh.text.Split(' ');
        mesh.text = "";
        foreach (var t in parts)
        {
            var builder = new StringBuilder(mesh.text);

            mesh.text = string.Concat(mesh.text, t, " ");
            if (renderer.bounds.size.x > maxLength)
            {
                builder.AppendFormat("{0}{1} ", Environment.NewLine, t);
                mesh.text = builder.ToString();
            }
        }

        mesh.text = mesh.text.TrimEnd();
        mesh.gameObject.transform.rotation = oldQ;
    }
}

This sits in an extension method in the class TextUtilities.It assumes the text has already been applied to the text mesh. What is basically does is:

  • Rotate the text mesh to Identity so it can measure width in one plane
  • Split the text in words
  • For each word:
    • Make a StringBuilder for the text so far
    • Add the word to the mesh
    • Calculate the width of the resulting mesh
    • If the mesh is wider than allowed:
      • Add the word to the StringBuilder with a newline prepending it
      • Set mesh to the StringBuilder’s contents

Now I did not make that up myself, I nicked it from here in the Unity Forums but I kind of simplified and optimized it a bit – a thing I am prone to doing as my colleague knows ;)

Calculating the size

As I have written in a previous post, you can calculate an object's size by getting the Render's size. But I also shown what you get is the size after rotation. So what you need to do is to calculate the unrotated size. I put the same trick as used in the way to measure the text width in an extension method:

public static class GameObjectExtensions
{
    public static Vector3 GetRenderedSize( this GameObject obj)
    {
        var oldQ = obj.transform.rotation;
        obj.transform.rotation = Quaternion.identity;
        var result = obj.GetComponent<Renderer>().bounds.size;
        obj.transform.rotation = oldQ;
        return result;
    }
}

Rotate the object to identity, get it's render's size, return the object back, then return the result. A rather crude way to get to the size, but it seems to work. I stuck this method into my GameObjectExtensions class.

Connecting all the dots

The only thing now missing is a behaviour that will be using all this:

public class SimpleTextDialogController : MonoBehaviour
{
    private TextMesh _textMesh;

    [SerializeField]
    public GameObject _backPlate;

    [SerializeField]
    public float _margin = 0.05f;

    void Start()
    {
        _textMesh = GetComponentInChildren<TextMesh>();
        gameObject.SetActive(false);
    }

    public void ShowDialog(string text)
    {
        gameObject.SetActive(true);
        StartCoroutine(SetTextDelayed(text));
    }

    private IEnumerator SetTextDelayed(string msg)
    {
        yield return new WaitForSeconds(0.05f);
        _textMesh.text = msg;
        var sizeBackplate = _backPlate.GetRenderedSize();
        var textWidth = sizeBackplate.x - _margin * 2f;
        _textMesh.WordWrap(textWidth);
        _textMesh.GetComponent<Transform>().position -= new Vector3(textWidth/2f, 0,0);
    }
}

So the start method immediately renders the game object invisible. Calling the ShowDialog makes the 'dialog' visible and actually sets the text, by calling the ShowTextDelayed coroutine, where the stuff is actually happening. First we get the size of the 'backplate', then we calculate the desired width of the text. After that the text is wordwrapped, and then it's moved half the calculated width to the left.

So why the delay? This is because the complete dialog looks like this:

image

I reuse the AdvancedKeepInViewController from my previous post. But if you use the AppearInView property (as I do), that places the dialog's center exactly on the gaze cursor when it's activated. And you will see that it tends to appear on the left of the center, then quickly move to the center.

That is because when the text is rendered without the word wrap, it looks like this

image

So Unity calculates the horizontal component of the center of all the objects in the combined game object, that end up a little left of the center of the text. But what we want to see is this:

image

The text is nicely wrapped and fits before the box. So hence the little delay, to allow AdvancedKeepInViewController to calculate and place the object in the center, before we start messing with the text.

Finally there's a simple behaviour called DialogLauncher but basically all that does is calling the ShowDialog method with some text I got from "Startupsum", a kind of Lorum Ipsum generator that uses words from your average Silicon Valley startup marketing manager's BS jargon.

The fun thing is that when you make the dialog bigger and run the app again, it will automatically word wrap to the new size:

image

And when you increase the font size:

image

Requirements and limitations

There are four requirements to the text:

  • The text needs to be placed in the horizontal center of the backdrop plate.
  • Vertically it needs to be in the position where you want to the text to start flow down from
  • imageIt needs to have it's Anchor upper left
  • The Alignment needs to be left

Limitations

  • If you have a single word in your text that's so long it takes up more space than available, you are out of luck. Germans need to be especially careful ;)
  • As you can see a little in the last image: if the text is so long it takes up more vertical space than available, Unity will render the rest 'in thin air' under the backdrop.

It's actually possible to fix that too, but you might wonder how efficiently you are communicating if you need to write large texts in what is in essence an immersive experience. How much people read an entire six-paragraph text in zoo or a museum? "Brevity is the soul of wit", as The Bard said, so keep texts short and concise.

Conclusion

Thank to Shopguy on the Unity Forums for the original word wrapping code. The code for this article can be found here.


          LEAD INFORMATION SECURITY ANALYST - VeriSign - Reston, VA      Cache   Translate Page   Web Page Cache   
Recognizing common attack vectors such as, recon scans, botnet, malware, command and control activity (C2), worms, trojans, and viruses....
From VeriSign - Sat, 21 Apr 2018 15:19:02 GMT - View all Reston, VA jobs
          Tier II SOC Analyst - Lunarline - Arlington, VA      Cache   Translate Page   Web Page Cache   
The SOC Analyst must have high-level knowledge of common attack vectors such as port scans, man-in-the-middle, DoS, DDoS, Trojans, viruses, and web application...
From Lunarline - Fri, 27 Jul 2018 21:23:31 GMT - View all Arlington, VA jobs
          Comment on How To Prepare Your Data For Machine Learning in Python with Scikit-Learn by Jason Brownlee      Cache   Translate Page   Web Page Cache   
Normalizer is normalizing the vector length I believe. Use the MinMax scaler instead.
          Adobe Animate Cc 2018 v18.0.2 + Crack CracksMind-3DMSOFT Torrent Free Download      Cache   Translate Page   Web Page Cache   
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ 
Adobe Animate Cc 2018 v18.0.2 + Crack 
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ 
Adobe Animate CC 2018 , which replaced Flash Professional - is a powerful environment for creating animations and multimedia content. Allows you to create expressive interactive projects that are displayed in excellent quality on desktop computers and various devices, including tablet PCs and smartphones, as well as on TV screens. Adobe Animate CC 2018 also allows you to work with raster, vector and also with 3D graphics while using the GPU. Also supports bi-directional streaming of audio and video. 

▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ 
Installation Instructions 
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ 
1. Download & Unpack 
2. Follow instructions given in "Readme.txt file 
3. That's all, Enjoy! 

Torrent Free Download Here

           3 Ways to Protect Outdoor Security Equipment From Severe Weather       Cache   Translate Page   Web Page Cache   
Severe weather can damage and even destroy home security equipment. Learn three ways to protect your devices from outdoor conditions. ...
      

          ilogic search iproperties for special characters      Cache   Translate Page   Web Page Cache   

Hi

 

I have this script that collects and combine the filename+description+date+revision and export it to a pdf file.

So far so good. Now sometime the user type in special characters in the description which cause the script to fail because windows not allowed special characters in the filename...

 

So I want to stop the scrip and show the user a message that special characters in the description are not allowed. But I can not find a method to search the description string for these illegal characters 

 < (less than)
> (greater than)
: (colon)
" (double quote)
/ (forward slash)
\ (backslash)
| (vertical bar or pipe)
? (question mark)
* (asterisk)

 

I have marked below in the code where I think the code should be inserted 

 

SyntaxEditor Code Snippet

Sub Main()
	
	'Get document file name
'	docname = ThisDoc.FileName(False)
	'Get the model which the drawing is referencing (1st view)
	oModelDoc = IO.Path.GetFileName(ThisDrawing.ModelDocument.FullFileName)
	oDesc = iProperties.Value(oModelDoc, "Project", "Description")
	
	If oDesc = "" Then
		MessageBox.Show("The Description iproperty cannot be empty. Go to the Part/Assembly and type a Description. NO PDF WILL BE GENERATED", "Warning")
=============>  INSERT THE CODE HERE
Exit Sub End If If oDesc = "" Then MessageBox.Show("The Description iproperty cannot be empty. Go to the Part/Assembly and type a Description. NO PDF WILL BE GENERATED", "Warning") Exit Sub End If ' Get the PDF translator Add-In. Dim PDFAddIn As TranslatorAddIn PDFAddIn = ThisApplication.ApplicationAddIns.ItemById("{0AC6FD96-2F4D-42CE-8BE0-8AEA580399E4}") 'Set a reference to the active document (the document to be published). Dim oDocument As Document oDocument = ThisApplication.ActiveDocument Dim oContext As TranslationContext oContext = ThisApplication.TransientObjects.CreateTranslationContext oContext.Type = kFileBrowseIOMechanism ' Create a NameValueMap object Dim oOptions As NameValueMap oOptions = ThisApplication.TransientObjects.CreateNameValueMap ' Create a DataMedium object Dim oDataMedium As DataMedium oDataMedium = ThisApplication.TransientObjects.CreateDataMedium ' Check whether the translator has 'SaveCopyAs' options If PDFAddIn.HasSaveCopyAsOptions(oDocument, oContext, oOptions) Then ' Options for drawings... oOptions.Value("All_Color_AS_Black") = 0 oOptions.Value("Remove_Line_Weights") = 0 oOptions.Value("Vector_Resolution") = 400 oOptions.Value("Sheet_Range") = Inventor.PrintRangeEnum.kPrintAllSheets 'oOptions.Value("Custom_Begin_Sheet") = 2 'oOptions.Value("Custom_End_Sheet") = 4 End If 'get PDF target folder path oPath = "C:\Users\user\Desktop\test" 'oFolder = Left(oPath, InStrRev(oPath, "\")) & "PDF" oFileName = ThisDoc.FileName(False) 'without extension oRevNum = iProperties.Value("Project", "Revision Number") oDate = DateTime.Now.ToString("_yyMMdd") If oDesc = "" Then MessageBox.Show("Warning", "Description iproperties is empty") End If If oRevNum = "-" Or oRevNum = "" Then oPathCom = oPath & "\" & oFileName & " - " & oDesc & oDate &".pdf" Else oPathCom = oPath & "\" & oFileName & "-" & oRevNum & " - " & oDesc & oDate & ".pdf" End If oDataMedium.FileName = oPathCom 'Publish document. Call PDFAddIn.SaveCopyAs(oDocument, oContext, oOptions, oDataMedium) ' End Sub

 


          【社交机器人难获市场 便宜实用的Vector能被接受吗】      Cache   Translate Page   Web Page Cache   
【社交机器人难获市场 便宜实用的Vector能被接受吗】Anki公司推出了一款小巧便宜的交互式机器人Vecto […]
          Free Walker Professional Handheld Magnifier Glasses only $16.99      Cache   Translate Page   Web Page Cache   
Free Walker Professional Handheld Magnifier Glasses
Get Free Walker Professional Handheld Magnifier Glasses from Amazon.com (via Free Walker).

Compare: eBay.com ($25.17) | Fishpond.com ($35.86)

Tagged as: 7098865972 | Binocular

Click here for complete deal detail and steps on how to get it.

Share this deal with your friend/family by sending them this URL: https://www.edealinfo.com/d/00709886597269/Free-Walker-Professional-Handheld-Magnifier-Glasses

Checkout eDealPC.com to find best deals on Laptop, Desktop, All-in-One & Sever configurations that YOU select directly from Dell, HP, Lenovo, Acer and Apple. Click here to check it out.
          Design for textile printing in digital form       Cache   Translate Page   Web Page Cache   
I need someone to design for my textile printing . The file should be in digital form vector file with more than 350 dpi. As a reference of what am looking for please see https://www.lillypulitzer.com ... (Budget: $10 - $30 USD, Jobs: Graphic Design)
          School vector image - 2      Cache   Translate Page   Web Page Cache   
 School vector image - 2

School vector image - 2
37 EPS, 37 JPG + preview / 208 mb

          New home robot could spark mass adoption of robotic helpers      Cache   Translate Page   Web Page Cache   
Anki’s new robot Vector is designed to be a combination of virtual assistant and high-spirited friend that sparks the mass adoption of home robots.
          Here’s how I recreated theory11’s login form — how would you do it?      Cache   Translate Page   Web Page Cache   

I ran across a super cool design for a login form over on the website theory11.com. Actually, the whole site and the products they make are incredibly well designed, there's just something about the clean and classy form that really got me. Plus, it just so happened that the CodePen Challenge that coming week was based on forms, so I took a few minutes and tried slapping it together.

Fadeout vector pattern

One of the things I thought …

The post Here’s how I recreated theory11’s login form — how would you do it? appeared first on CSS-Tricks.


          Intellijel Metropolis eurorack synthesizer modular sequencer with programmer      Cache   Translate Page   Web Page Cache   
$500.00
End Date: Friday Sep-7-2018 14:51:48 PDT
Buy It Now for only: $500.00
Buy It Now | Add to watch list

          Auxren Trips Quad 4x Waveshaper Eurorack module      Cache   Translate Page   Web Page Cache   
$75.00 (0 Bids)
End Date: Wednesday Aug-15-2018 18:14:13 PDT
Buy It Now for only: $100.00
Buy It Now | Bid now | Add to watch list

          Division 6 - Dual Mini Sequencer Kit - Eurorack Module Kit      Cache   Translate Page   Web Page Cache   
$90.00
End Date: Friday Sep-7-2018 15:40:43 PDT
Buy It Now for only: $90.00
Buy It Now | Add to watch list

          Erica Synths Pico DSP Eurorack Multi Effects Module w/Box Reverb Delay Bit Reduc      Cache   Translate Page   Web Page Cache   
$57.00 (5 Bids)
End Date: Wednesday Aug-15-2018 18:07:41 PDT
Bid now | Add to watch list

          Pittsburgh Modular Passive Multi Eurorack Module Multiple 6 in/out Utility      Cache   Translate Page   Web Page Cache   
$0.99 (1 Bid)
End Date: Wednesday Aug-15-2018 18:19:13 PDT
Bid now | Add to watch list

          Erica Synths Pico VCF3 Eurorack VCF Filter Ladder Filter Moog w/Box      Cache   Translate Page   Web Page Cache   
$0.99 (1 Bid)
End Date: Wednesday Aug-15-2018 18:12:35 PDT
Bid now | Add to watch list

          TipTop Audio Happy Ending Eurorack Module Kit - Black      Cache   Translate Page   Web Page Cache   
$107.50 (4 Bids)
End Date: Tuesday Aug-14-2018 18:47:12 PDT
Bid now | Add to watch list

          WMD Phase Displacement Oscillator PDO mk1 Analog Eurorack VCO      Cache   Translate Page   Web Page Cache   
$210.00 (0 Bids)
End Date: Wednesday Aug-15-2018 18:00:01 PDT
Buy It Now for only: $275.00
Buy It Now | Bid now | Add to watch list

          Music Thing Modular Thonk Turing Machine /w All Expansions-Eurorack      Cache   Translate Page   Web Page Cache   
$200.00 (0 Bids)
End Date: Wednesday Aug-15-2018 17:38:52 PDT
Bid now | Add to watch list

          Make Noise FXDf : Eurorack Module : NEW : [DETROIT MODULAR]      Cache   Translate Page   Web Page Cache   
$119.00
End Date: Friday Sep-7-2018 17:58:25 PDT
Buy It Now for only: $119.00
Buy It Now | Add to watch list

          Division 6 - Dual Mini Sequencer - Eurorack Module      Cache   Translate Page   Web Page Cache   
$200.00
End Date: Friday Sep-7-2018 15:41:03 PDT
Buy It Now for only: $200.00
Buy It Now | Add to watch list

          Takaab 2LPG - Dual Passive Low-pass Gate Eurorack Synthesizer Module (3HP)       Cache   Translate Page   Web Page Cache   
$26.49
End Date: Sunday Sep-2-2018 12:20:55 PDT
Buy It Now for only: $26.49
Buy It Now | Add to watch list

          bubblesound 141 EG/VCA/LFO eurorack envelope generator      Cache   Translate Page   Web Page Cache   
$170.00
End Date: Tuesday Sep-4-2018 19:55:12 PDT
Buy It Now for only: $170.00
Buy It Now | Add to watch list

          Livewire Chaos Computer Eurorack Random Voltage Probability      Cache   Translate Page   Web Page Cache   
$695.00
End Date: Saturday Aug-11-2018 15:55:19 PDT
Buy It Now for only: $695.00
Buy It Now | Add to watch list

          Mutable Instruments Warps : Eurorack Module : NEW : [DETROIT MODULAR]      Cache   Translate Page   Web Page Cache   
$259.00
End Date: Friday Sep-7-2018 17:58:28 PDT
Buy It Now for only: $259.00
Buy It Now | Add to watch list

          micro Ornament and Crime eurorack module uOC      Cache   Translate Page   Web Page Cache   
$270.00
End Date: Thursday Sep-6-2018 20:09:20 PDT
Buy It Now for only: $270.00
Buy It Now | Add to watch list

          TWiG 468: Extra Stolen Privacy      Cache   Translate Page   Web Page Cache   

This Week in Google (Video LO)

  • Android Pie hits Pixels and Essential Phone.
  • New Pixel 3 images and video leak.
  • Google's China dillema
  • Should Leo buy the Magic Leap?
  • Does Facebook want your bank info?
  • Silicon Valley's war on Alex Jones.
  • Is Ajit Pai still evil?
  • Stacey's Things: June Oven and Anki Vector
  • Jeff's Number: Your baby's first wordsa could be "OK Google."

Hosts: Leo Laporte, Jeff Jarvis, and Stacey Higginbotham

Download or subscribe to this show at https://twit.tv/shows/this-week-in-google.

Sponsors:


          How I gained commit access to Homebrew in 30 minutes      Cache   Translate Page   Web Page Cache   

This issue was publicly disclosed on the Homebrew blog at https://brew.sh/2018/08/05/security-incident-disclosure/

Since the recent NPM, RubyGems, and Gentoo incidents, I’ve become increasingly interested, and concerned, with the potential for package managers to be used in supply chain attacks to distribute malicious software. Specifically with how the maintainers and infrastructure of these projects can be targeted as an attack vector.

On Jun 31st, I went in with the intention of seeing if I could gain access to Homebrew’s GitHub repositories. About 30 minutes later, I made my first commit to Homebrew/homebrew-core.

Let’s get leaky

My initial strategy going in was based on credential theft; find if there were any credentials leaked by members of the Homebrew GitHub org.

An OSSINT tool from Michael Henriksen called gitrob makes automating this search really easy. I ran it across the Homebrew organization, but ultimately didn’t come up with anything interesting.

Next, I took a look at previously disclosed issues on https://hackerone.com/Homebrew. From there, I found that Homebrew runs a Jenkins instance that’s (intentionally) publicly exposed at https://jenkins.brew.sh.

After some digging, I noticed something interesting; builds in the “Homebrew Bottles” project were making authenticated pushes to the BrewTestBot/homebrew-core repo:

This got me thinking, “where are the credentials stored?”. I noticed the “Environment Variables” link on the left, which led to an exposed GitHub API token:

I tested it locally to see what scopes the token had:

$ curl https://api.github.com/user/repos -u $GITHUB_API_TOKEN:x-oauth-basic | jq '.[] | {repo: .full_name, permissions: .permissions}'
{
  "repo": "BrewTestBot/homebrew-core",
  "permissions": {
    "admin": true,
    "push": true,
    "pull": true
  }
}
{
  "repo": "Homebrew/brew",
  "permissions": {
    "admin": false,
    "push": true,
    "pull": true
  }
}
{
  "repo": "Homebrew/formulae.brew.sh",
  "permissions": {
    "admin": false,
    "push": true,
    "pull": true
  }
}
{
  "repo": "Homebrew/homebrew-core",
  "permissions": {
    "admin": false,
    "push": true,
    "pull": true
  }
}

Which suggested that I had commit access to these core Homebrew repos:

  • Homebrew/brew
  • Homebrew/homebrew-core
  • Homebrew/formulae.brew.sh

Just to make sure, I tested this by creating a blob in the Homebrew/homebrew-core repo:

$ curl https://api.github.com/repos/Homebrew/homebrew-core/git/blobs -u $GITHUB_API_TOKEN:x-oauth-basic -d '{"content":"test"}' -H "Content-Type: application/json"
{
  "sha": "30d74d258442c7c65512eafab474568dd706c430",
  "url": "https://api.github.com/repos/Homebrew/homebrew-core/git/blobs/30d74d258442c7c65512eafab474568dd706c430"
}

And then subsequently reported the issue to the Homebrew maintainers.

What this means

Let me put this in perspective:

  • Hundreds of thousands of people use Homebrew, including employees at some of the biggest companies in Silicon Valley.
  • The most frequently installed package in the last 30 days is openssl, which was installed over 500k times: https://formulae.brew.sh/analytics/install/30d/
  • I had direct commit access to the Homebrew/homebrew-core repo. At the time, this repo did not have a protected master branch, meaning I would have been able to make a fast-forward change to refs/heads/master. Anyone that freshly installed Homebrew, or ran brew update would have my malicious formulae.

If I were a malicious actor, I could have made a small, likely unnoticed change to the openssl formulae, placing a backdoor on any machine that installed it.

If I can gain access to commit in 30 minutes, what could a nation-state with dedicated resources achieve against a team of 17 volunteers? How many private company networks could be accessed? How many of these could be used to escalate to large-scale data breaches? What other package management systems have similar weaknesses?

This is my growing concern, and it’s been proven time and time again that package managers, and credential leaks, are a weak point in the security of the internet, and that supply chain attacks are a real and persistent threat. This is not a weakness in Homebrew, but rather a systemic problem in the industry, and one where we need more security research.

What’s being done

Homebrew has publicly disclosed the issue on the blog at https://brew.sh/2018/08/05/security-incident-disclosure/. The Homebrew team worked with GitHub to audit and ensured that the given access token wasn’t used maliciously, and didn’t make any unexpected commits to the core Homebrew repos. I want to give special thanks to Mike McQuaid for his quick and professional handling of my report while on his paternity leave.

It’s clear that there’s a lot of work that could be done to improve the security of the Homebrew project. If you use Homebrew at your place of work, consider asking them to donate to the project. As an industry, we need to invest in the well being of core OSS software that we all use and depend on.


          Anki’s new house robotic is like Alexa with wheels, eyes, and a character      Cache   Translate Page   Web Page Cache   

Anybody who has ever watched Brief Circuit or WALL-E has certainly dreamed about having a robotic buddy come reside with them. Lastly, that dream is now a actuality — and it is identify is Vector. The submit Anki’s new residence robotic is like Alexa with wheels, eyes, and a character appeared first on Digital Tendencies. […]
          Anki’s next robot: Vector – coming to Australia in October      Cache   Translate Page   Web Page Cache   

Anki love their toys, they love robotics and from the look of all the things they do, they love having fun.  Enter their next little robot – Vector. Vector will hit Aussie stores in October (13th) at around $450 (limited time pre-orders are going now for $399). They describe Vector as a “home robot with […]

The post Anki’s next robot: Vector – coming to Australia in October appeared first on EFTM.


          Nie kupię już Amazon Echo ani Google Home, bo ten uroczy robocik skradł moje serce. Oto Vector      Cache   Translate Page   Web Page Cache   
Tabletowo.pl Nie kupię już Amazon Echo ani Google Home, bo ten uroczy robocik skradł moje serce. Oto Vector Asystenci głosowi Humor Sprzęt   Jasne, że roboty domowe pokroju inteligentnych odkurzaczy czy kosiarek są przydatne, ale wielu z nas marzy przecież o robocie, z którym można by wejść w jakąś większą interakcję. Żeby przypominał te, które znamy z Gwiezdnych Wojen albo innych filmów sci-fi. I tu właśnie pojawia się Vector – mały, sympatyczny robocik, z oczami i o ciekawskiej […]

Przeczytaj pełny artykuł tutaj: Nie kupię już Amazon Echo ani Google Home, bo ten uroczy robocik skradł moje serce. Oto Vector


          Global Yeast Expression Vector Market Analysis 2018 | Growth by Top Companies: Thermo Fisher Scientific, Inc. U.S., Promega Corporation U.S., Sigma-Aldrich Corporation U.S., Agilent Technologies U.S., Bio-Rad Laboratories U.S., New England Biolabs U.S., M      Cache   Translate Page   Web Page Cache   
(EMAILWIRE.COM, August 08, 2018 ) The global market size of Yeast Expression Vector is $XX million in 2017 with XX CAGR from 2013 to 2017, and it is expected to reach $XX million by the end of 2023 with a … Continue reading
          44358825_ml      Cache   Translate Page   Web Page Cache   

mghresearchinstitute posted a photo:

44358825_ml

44358825 - back to school: e-learning technology concept with computer with science lab objects sketchy composition, vector illustration isolated on white.


          36567839_ml      Cache   Translate Page   Web Page Cache   

mghresearchinstitute posted a photo:

36567839_ml

36567839 - vector icons research flat infographic with a laboratory microscope surrounded by icons depicting pharmaceutical, chemistry, medical and genetics


          Principal Software Engineer - Wabtec - Germantown, MD      Cache   Translate Page   Web Page Cache   
Code Warrior, IAR Systems, Vector (CAN bus), AVR Studio, GNU, Cosmic, Visual C/C++, Borland C/C++ Builder. Responsible for design, development and maintenance...
From Wabtec - Tue, 10 Apr 2018 16:01:55 GMT - View all Germantown, MD jobs
          ancien Chaise école bois métal vintage industriel deco loft vintage tolix mullca      Cache   Translate Page   Web Page Cache   
37,99 EUR
Date de fin: samedi août-18-2018 19:45:56 CEST
Achat immédiat pour seulement: 37,99 EUR
Achat immédiat | Ajouter à vos Affaires à suivre

          Changing motor angles/vector in adrupilot      Cache   Translate Page   Web Page Cache   

Hi, I am building a quadplane where the front and rear motors sit at offset forward and aft angles. Is there a parameter I can change so the flight controller knows these angles?


          Premium Wood wallet, White ash wood, Slim Minimal Wallet, Wooden wallet, Credit card holder, boyfriend gift, Personalized wallet insert card by TwinsWoodCompany      Cache   Translate Page   Web Page Cache   

29.00 USD

White ash Wood wallet, Slim Minimalist Wallet, Minimalist wallet, Wooden wallet, Credit card holder, boyfriend gift, Add any engraving and Personalized wallet insert card.

Hand-crafted wood wallet. Exotic wood, refined design. Slightly larger than your card, slim and elegant.

★★★★★
Only five-star ratings and review!
Editor's choice on ETSY - best men gift!
The best offer on the market.
★★★★★

Size and Specifications:
Siberian White Ash hard wood
The wallet is made of two pieces of solid wood
Very Slim model / Hold 1-10 cards / Few folded bills
Size: little bit bigger than credit card
Include 1 black rubber band + 1 black extra rubber
Finish: hand polishing, wax and natural oil

Without any doubt it is a wooden piece of art. Style created by the nature itself.
Every item is a genuine masterpiece. No picture can show the beauty of these wood wallet. One touch is all you need to feel the bond with the nature.

- This slim wallet won't puffs out you pocket.
- It's a lot more pleasant to hold in your hand than normal wallet.
- It can contain 1-10 cards and 2-6 cash, but it's so slim that you can put in almost every pocket.
- The more it rubs in you pocket the more solid the color becomes.
- Hold your cards straight. Won't crook and damage them like other minimalist leather wallets.

★ Looking for something creative and rare for the people dear to you? Or for yourself ? ★

We designed a perfect present! The best gift:
■ For a birthday
■ Christmas and New Year.
■ For You Boyfriend.
■ A wonderful gift for a groomsman.
■ An ideal present for Father’s day.
■ Any Anniversary.
■ Wedding day or Wooden wedding anniversary.

Customization:
Your accessory should be personal.
1) Add any engraving (a text or a logo) one or two sides of your wood wallet to make it one-of-a-kind.
2) Add Wood Wallet Insert engraving card / gift card
Write a comment to the order if you need an engraving. Specify the name of the font when ordering, our designer will provide sketches for you. Did not find the right font, let us know and we will find the right one for you.
(All engraving on the photo is shown for an example, see more ready engraving work www.instagram.com/twinswallet )
Note: logo only vector based no gradient B&W images.

Package:
All the items are shipped in a corrugated cardboard pack. This reliable and firm package prevents contents from damage.

Payment and shipping:
All the packages are ready for shipping in 2-5 days after payment. Standard international shipping takes 2-3 business weeks. Expedited shipping takes 7-14 days, costs extra and differs for each country. Contact us to order expedited shipping.

Additional information:
Color of every item may differ (a bit darker or lighter than in the picture). It depends on the wood texture and the season of timber harvesting. Each piece is unique, because it is made of solid wood and the grain is never the same. Every wooden block’s grain is created by the nature, and our craftsmen skillfully handmade a stylish accessory of it within a few hours. Every wood part is made to accentuate individuality of its owner.

Look at all our wood wallets with the possibility of personal engraving: https://www.etsy.com/shop/TwinsWoodCompany?ref=seller-platform-mcnav§ion_id=17816500

We are ready to receive CUSTOM ORDERS. We love doing custom orders, so contact us and we will do our best to get you exactly what you need.

Made deep in the heart of Russia in Wild Siberia (jokes aside) since 2013.

Stay informed, daily updates on Instagram. - @TwinsWood / @TwinsWatch / @TwinsWallet / @TwinsBowTies // @TwinsCuffLinks
Got questions? Contact us via feedback or contact form.


          Wooden tie Clip Cufflinks Set Wedding Hexagon Cufflinks. Wood Tie Clip Cufflinks Set. Mens Wood Cuff Links | Groomsmen Cufflinks set. by TwinsWoodCompany      Cache   Translate Page   Web Page Cache   

25.00 USD

Wooden tie Clip Cufflinks Set Wedding Hexagon Cufflinks. Wood Tie Clip Cufflinks Set. Mens Wood Cuff Links, Groomsmen Cufflinks set. Personalization gift, boyfriend gift, father day gift.

Every item is a genuine masterpiece. No picture can show the beauty of these set. One touch is all you need to feel the bond with the nature.

★★★★★ Looking for something creative and rare for the people dear to you?

We designed a perfect present! The best gift for any celebration:
■ For a birthday
■ Christmas and New Year.
■ For You Boyfriend.
■ A wonderful gift for a groomsman.
■ An ideal present for Father’s day.
■ Any Anniversary.
■ Wedding or Wooden wedding anniversary.

Advantages:
■ Minimalistic stylish design
■ 10 different types of wood
■ 4 different types of steel base
■ Handmade of exotic wood
■ Finish Oiled and waxed
■ Wonderful (wooderful ☺) masterpiece of genuine wood
■ Custom engraving, several fonts to choose from
■ Rapturous glances from your friends


Specifications:
- The set is made of Real Red Padauk hard wood

Cufflinks:
- Wood Cuff Links Shape - Hexagon
- Length: 20 mm (.78")
- Width: 18 mm (.70")
- Thickness: 5,5 mm (.20")
- Polished gun metal stainless steel body

Tie Clip:
- Base: Stainless steel backing
- Width: 10.5 mm
- Length: 57 mm
- Thickness: 3-4 mm

Set are delivered in a original craft cardboard box 60х60х45 mm is ready to gift.

Customization:
Your accessory should be personal. Add an engraving (a text, initials, or a logo) on the face to make it one-of-a-kind. Write a comment to the order if you need an engraving. You will be offered several options of customization by our designer.
Note: logo only vector based no gradient B&W images.

Package:
All the items are shipped in a corrugated cardboard pack. This reliable and firm package prevents contents from damage.

Payment and shipping:
All the packages are ready for shipping in 2-5 days after payment. Standard international shipping takes 3-4 business weeks. Expedited shipping takes 10-14 days, costs extra ( usually USD 20-25 ) and differs for each country. Contact us to order expedited shipping.

Additional information:
Color of every item may differ (a bit darker or lighter than in the picture). It depends on the wood texture and the season of timber harvesting. Each piece is unique, because it is made of solid wood and the grain is never the same. Every wooden block’s grain is created by the nature, and our craftsmen skillfully handmade a stylish accessory of it within a few hours. Every single wood cuff links is made to accentuate individuality of its owner.

Made deep in the heart of Russia in Wild Siberia (jokes aside) since 2014.
Check out the engravings and our new products on Instagram - @TwinsWood / @TwinsWatch / @TwinsBowTies
Got questions? Contact us via feedback or contact form.


          Logotipo SexoSentido.pe      Cache   Translate Page   Web Page Cache   
En SexoSentido.pe estamos en la búsqueda de un logo para un nuevo sexshop online. El público al cual nos dirigimos es de todas las edades que usen actualmente páginas de comercio online. Algunas características que buscamos: -Lúdico -Divertido -Amigable -Debe tener una mascota o personaje -Que genere recordación en el cliente Adjuntamos logo previo, sin embargo, buscamos una mascota o personaje NUEVO. Requerimos los derechos totales del trabajo entregado y el archivo final en vectores de illustrator. (Prize: 60)
          Changing motor angles/vector in adrupilot      Cache   Translate Page   Web Page Cache   

@Worgzie83 wrote:

Hi, I am building a quadplane where the front and rear motors sit at offset forward and aft angles. Is there a parameter I can change so the flight controller knows these angles?

Posts: 1

Participants: 1

Read full topic


          Home robot Vector to be available in New Zealand stores      Cache   Translate Page   Web Page Cache   
Vector is a robot who’s alive with personality, highly-intelligent, and aware of his surroundings through touch, sight and sound.


          This cute new robot from Anki is definitely the droid you’re looking for      Cache   Translate Page   Web Page Cache   
Who among us isn't a sucker for a cute robot you can play games with, that you can ask questions and that beeps like a pint-sized R2D2? Robotics startup Anki is certainly betting a large number of people fall in that category -- and, indeed, will fall in love with the company's new home robot companion Vector, a sibling of sorts to Anki's previous Cozmo robot. Anki has sold more than 1.5 million to date of the latter, remarkable considering Cozmo is an adorable $180 toy comparable to a real-world Wall-E with limited functionality. Here's how Anki president and co-founder Hanns Tappeiner describes Vector, which will cost about $250 and ship in October.

"Vector is a sophisticated product featuring top-notch technology," he writes in a blog post announcing Vector. "With Qualcomm Technologies’ connectivity, an ultra-wide field of view HD camera, infrared emitters for added sensitivity, and capacitive touch, Vector is the full package. In addition to cutting-edge tech, we’ve equipped Vector with a friendly, life-like personality because we believe the future of robots is more than just the best technology. The future of accessible home robots hinges on EQ (emotional quotient) as much as IQ." https://www.youtube.com/watch?v=u_l-YpcRCqE Anki is kicking off a 30-day Kickstarter today that runs through Sept. 6. Backers, among other things, will get a Vector unit at a discounted price, in addition to getting the opportunity to help shape Vector's future development. In terms of what Vector can do, you "wake" him up with a "Hey, Vector." At that point, he listens for any number of simple prompts from you, like asking about the weather, questions about things like the time or the news, taking a photo or playing simple games with you. He has touch sensors and an accelerometer, so he'll know when he's being touched and can "respond" to that, he can identify people and remember faces, and he sports a four-microphone array for directional hearing. Vector also has a high-res color IPS display, and his tech is rounded out by a 6-Axis IMU and a WiFi connection. "Vector’s integrated HD camera has 120-degree ultra-wide field of view, which he uses to see the room he’s in, identify people and objects, and detect motion," the Kickstarter page explains. "Vector also uses an infrared laser scanner to track distance between objects and map his environment as he explores, and a four-microphone array that can pinpoint positional audio. These and other sensors provide the inputs that drive Vector’s emotion engine, with each data point influencing whether he is happy, sad, curious, or any other emotion." When he detects his owner, for example, Vector shows excitement. When he detects a sound behind him, he’ll whirl around to check it out. If his owner pets his backpack, which is where the capacitive touch sensor is positioned, he’ll relax. "And if his drop sensors detect the table’s edge, he’ll be momentarily surprised -- then remember that area as a boundary before he moves to another area to explore. This system of movement, exploration, and emotional stimuli form a foundation that we apply Vector’s personality to." Here's a link to Vector's Kickstarter page. And here's the tweet Anki used to announce him to the world today: https://twitter.com/anki/status/1027177769971662848  
          Free Walker Professional Handheld Magnifier Glasses only $16.99      Cache   Translate Page   Web Page Cache   
Free Walker Professional Handheld Magnifier Glasses
Get Free Walker Professional Handheld Magnifier Glasses from Amazon.com (via Free Walker).

Compare: eBay.com ($25.17) | Fishpond.com ($35.86)

Tagged as: 7098865972 | Binocular

Click here for complete deal detail and steps on how to get it.

Share this deal with your friend/family by sending them this URL: https://www.edealinfo.com/d/00709886597269/Free-Walker-Professional-Handheld-Magnifier-Glasses

Checkout eDealPC.com to find best deals on Laptop, Desktop, All-in-One & Sever configurations that YOU select directly from Dell, HP, Lenovo, Acer and Apple. Click here to check it out.
          New home robot could spark mass adoption of robotic helpers      Cache   Translate Page   Web Page Cache   
Anki’s new robot Vector is designed to be a combination of virtual assistant and high-spirited friend that sparks the mass adoption of home robots.
          EILEEN GRAY ANCIENNE LAMPE DE BUREAU EDITION JUMO       Cache   Translate Page   Web Page Cache   
299,00 EUR (0 Enchères)
Date de fin: lundi août-13-2018 22:27:04 CEST
Enchérir | Ajouter à vos Affaires à suivre

          468: Extra Stolen Privacy      Cache   Translate Page   Web Page Cache   
Android Pie hits Pixels and Essential Phone. New Pixel 3 images and video leak. Google's China dillema Should Leo buy the Magic Leap? Does Facebook want your bank info? Silicon Valley's war on Alex Jones. Is Ajit Pai still evil? Stacey's Things: June Oven and Anki Vector Jeff's Number: Your baby's first wordsa could be "OK Google." Hosts: Leo Laporte, Jeff Jarvis, and Stacey Higginbotham Download or subscribe to this show at https://twit.tv/shows/this-week-in-google. Sponsors: WordPress.com/twig RocketMortgage.com/Twig
          Design project      Cache   Translate Page   Web Page Cache   
I need some graphic design. Hello I am looking for a digital designer or graphic designer who can help me turn my hand drawn logos into vectors. (Budget: $30 - $250 USD, Jobs: Graphic Design)
          Alien Place [Repost]      Cache   Translate Page   Web Page Cache   
Alien Place [Repost]
Alien Place [Repost] Alien capsules give an unusual effect – the ground and stones are colored violet, blue luminescent fungi grow around capsules, the surrounding plants change their color and glow at night. There are two preloads in this set – Day and Night. In the night preload, some objects glow. This scene includes different groups of objects. You can quickly and easily turn off/on plants and mushrooms or move them quickly in the scene by selecting the main group node and moving that! *Repost! https://www.daz3d.com/catalog/product/view/id/45925
          Adobe Illustrator cc 2018 Crack + Setup      Cache   Translate Page   Web Page Cache   

Adobe Illustrator cc 2018 Crack Full Version Free Download Adobe Illustrator cc 2018 Crack Free download and it might be acquired direct download link within our website Raj Pc. The Adobe Illustrator cc 2018 Full Crack could be a professional design software operated by Adobe. This effective design software draws on the progression of vector graphics. Adobe Illustrator cc 2018 Crack Download Free enables you to definitely create icons, logos, digital images, sketches, typography in addition to illustrations for print, web, video additionally to mobile. The approval provides you with the tools, presets featuring you have to improve from web icons and

The post Adobe Illustrator cc 2018 Crack + Setup appeared first on Raj PC.


          JE cases on the rise in Lakhimpur       Cache   Translate Page   Web Page Cache   
NORTH LAKHIMPUR, Aug 8 - Japanese Encephalitis (JE) cases are on the rise in Lakhimpur with deaths of six persons since January this year. JE is a deadly disease characterized by inflammation of brain and high fever and is a type of acute encephalitis syndrome (ASE). The vector-borne disease is transmitted by culex mosquitoes.
          Vodafone Germany launches super vectoring VDSL tariff      Cache   Translate Page   Web Page Cache   
(Telecompaper) From 07 August, Vodafone Germany is making super-vectoring broadband connections, supporting speeds up to 250 Mbps, available to 6 million households nationwide...
          (IT) Penetration Tester      Cache   Translate Page   Web Page Cache   

Rate: £500 - £650 per day   Location: Hampshire   

Penetration Tester - Reverse Engineering - Contract - Hampshire Square One are searching for a Penetration Tester to work with one of our clients in Hampshire on a 3 month contract. Responsibilities * Hands on server-side pen testing * Hands on device-side pen testing (desirable) * Documentation of knowledge and findings in the form of guidelines, checklists and examples to be used by remedial teams Required experience * Strong experience as an ethical hacker, testing web applications, operating systems, databases etc * Strong knowledge of debuggers, de-compilers, dis-assemblers and de-obfuscators * Experience with static and dynamic binary analysis and binary injection * Experience with packet sniffers * Excellent analytical skills * Experience with both Linux and Windows OS Desirable experience * Experience as a device-side ethical hacker, testing mobiles, tablets, routers, industrial equipment etc * Anti-tamper tools and techniques * Hardware/software attack vectors * Malware analysis * Cryptography (RSA, SHA-1, AES) * Networking protocols * Experience with reverse engineering tools and techniques Penetration Tester - Reverse Engineering - Contract - Hampshire If you are interested in this opportunity, please apply now with your updated CV in word/PDF format. Notwithstanding any guidelines given to level of experience sought, we will consider candidates from outside this range if they can demonstrate the necessary competencies. Square One is acting as both an employment agency and an employment business, and is an equal opportunities recruitment business. Square One embraces diversity and will treat everyone equally: Please see our website for our full diversity statement.
 
Rate: £500 - £650 per day
Type: Contract
Location: Hampshire
Country: UK
Contact: David Meikle
Advertiser: Square One Resources
Start Date: 20/08/2018
Reference: JS-102708

          Gene mutation in children with microcephaly reveals an essential ingredient for brain development      Cache   Translate Page   Web Page Cache   

In 2012, researchers in the Boston Children’s Hospital lab of Christopher Walsh, MD, PhD, reported a study of three unrelated families that had children with microcephaly. All had smaller-than-normal brains — both the cerebrum and the cerebellum were reduced in size— and all had mutations that knocked out the function of a gene called CHMP1A....

The post Gene mutation in children with microcephaly reveals an essential ingredient for brain development appeared first on Vector.


          Photography logo, script logo design, logos and watermarks, simple design, affordable logos, Small business logo by StyleGraphicDesign      Cache   Translate Page   Web Page Cache   

6.00 USD

Script logo design and watermark!

This logo will be resold but with your business name and colors it is going to looks yours!

~ Personalization:
-Name (and tagline if there is) will be change to your business name!
-Also colors can change !
Of course my watermarks and the background photo is just for proof and will be removed!

*Please with your order let me know the color you prefer your business name and the tag line if there is !

* The logo has a transparent background the background photo in the preview is just for proof!

After 1-2 days from your order you receive in your mail the design for print and web resolution!

~The files you receive to your mail are:
.jpg ( for web) , web resolution, for general use on web (2 sizes for web use like sites/avatars)
.gif ( for web) , web resolution, for general use on web (2 sizes for web use like sites/avatars)
.png (for web), with transparent background for web use (2 sizes)
.png (for web), your logo black & white color with transparent background for web use (2 sizes)
.eps ( for print), high resolution. The original format, vector editable and resizable file in 300 dpi (CMYK color system)
.psd (for print) the photoshop file flattened
.jpg ( for print), high resolution (the file is about 25cmx25cm - 300 dpi CMYK color system)
.abr (watermark) photoshop brush

*This logo will be resold!

-More logos here:
http://www.etsy.com/shop/StyleGraphicDesign

If you have any questions please let me know!
*I can send you a preview file with your business name before your order!


          Anki dévoile Vector, le successeur du petit robot Cozmo      Cache   Translate Page   Web Page Cache   
Le petit robot mignon d’Anki va bientôt avoir un successeur; Vector est bien sûr plus puissant que Cozmo (il bénéficiera d’un processeur Snapdragon 200) et dispose de nombreuses améliorations techniques : 4 micros pour capter les sons environnants, 4 capteurs anti-chutes, une caméra désormais HD et avec un …

Lire la suite

Aimez KultureGeek sur Facebook, et suivez-nous sur Twitter



          School vector image designer graphics professional      Cache   Translate Page   Web Page Cache   
School vector image designer graphics

School vector image designer graphics professional
37 EPS, 37 JPG + Example included/ 208 mb

          On C++ Operator Patterns      Cache   Translate Page   Web Page Cache   

Originally posted on: http://maxblogson.net/archive/2014/01/13/on-c-operator-patterns.aspx

By Terje Sandstrøm and Syver Enstad

This article was originally written in 2003 and used internally within our company and for clients of our company.  The text is as it was at that time, and – given the general nature of this topic - should still be useful.

Introduction

There has been a lot of talk about design patterns, but not so much about code patterns, also referred to as idioms. A code pattern describes typical general code for common operations. This article focuses on operator patterns in C++. Not all classes need their own operators, but small classes which often represents some kind of value, will very often need a set of operators. Further, classes that use dynamic memory (heap allocation) must implement a copy constructor and an assignment operator (in addition to a destructor) if they are going to be copy able. (ref. The Big Three Law (B3L(see C++ FAQ).

In this article, we will make a catalogue of the typical operator patterns. Many of the patterns are due to other authors, the references can be found at the end. We have put all of them together and also elaborated on some of their implications.

The patterns are shown as combined declarations and implementations, as both are equally important. In many cases the operators are so small that they can safely be implemented in the header file, thus one can make them inline.

The challenge with operators is that they should be implemented as efficiently as possible, concerning both design time and runtime. Bugs caused by errors in operators can be harder to find than normal bugs, because when you use the classes in a program, you don’t see the difference between calling an internal operator or a user defined operator, so you tend to overlook them. We often find these bugs when single stepping through the program and then, very much to our surprise, we step into an operator implementation which existence was forgotten.

It is also important to note that custom class operators should conform to the interface used by the built-in types. In some cases, the compiler will transfer your definition to one compatible with the internal built-in types. Be aware of this. See for example the operator== below.

A good advice: Use operator overloading for syntactic sugar, and please do not stray from accepted semantics for an operator.

A general pattern observation

Several operators do nearly the same thing, only slightly different. As each piece of code can introduce a bug, it is good advice to only write an “algorithm” once, and then reuse it. It is similar with operator implementation – implement one operator in terms of another. This can in fact go quite a long way, as we show in this article, and it is a powerful technique. You get one more function call, but if speed optimization is highly demanded, you should make the operator methods inline, and the compiler will “remove” your function call anyway. Further, the golden rule we follow is to first make it work, then make it right, and at last make it fast.

As is the case with the Boolean and arithmetic operators below it’s often useful to implement all similar operators in terms of another member function. The Boolean operators are implemented in terms of a compare member function and the arithmetic functions in terms of their corresponding @= (+=, -=, /=) and so on.

Operator patterns table

Table 1 shows the operators discussed, and which of these is implemented directly and which one is implemented in terms of another.

Operator name

Must be member function

Operator short signature

Implementation

Assignment operator

Yes

Op=

Directly

Copy constructor[1]

Yes

 

Maybe in terms of assignment operator[2]

operator +=

No, but it probably should

Op+=

Directly

Prefix increment

No, but it probably should

Op++()

In terms of op+=

Postfix increment

No, but it probably should

Op++(int)

In terms of prefix increment

Addition operator

No, cannot be

Op+

In terms of Op+=

Subscript operators

Yes

Op[]

Directly, or member func

Stream operators

No, cannot be.

Op<< and Op>>

Directly, or member func in a class hierarchy

Equal operator

No, cannot be

Op==

Directly,

Non-equal operator

No, cannot be

Op!=

In terms of op== or member func

Less than

No, cannot be

op<

In terms of member function

Less than or equal

No, cannot be

op<=

“”

Greater than or equal

No, cannot be

op>=

“”

Greater than

No, cannot be

op>

“”

dereferencing operator

Yes

op*

Directly

dereferencing member selection operator

Yes

op->

Directly

Conversion operator

Yes

operator T

Directly

Function call operator

Yes

operator()

Directly

The operator patterns

Introduction

All patterns are described with pseudo code. The term C denotes the Class name of your class. The term X may denote a secondary class, which also may be equal to C. Member variables are just denoted as m_x. You should substitute your own members wherever you see this. We have kept the explanations rather short, so that this is more like a reference guide than a tutorial. For further discussions, you should look up the references.

We describe the patterns with the non-dependent operator first, and then follow with the operators that depend on the former.

Member or non member

Generally, operators that don’t modify any of its arguments should be implemented as free functions instead of member functions. Operators that modify the first argument often makes for shorter and more readable code if implemented as member functions and in some cases, like operator= it’s not possible to implement it as a non-member. Some operators have to be implemented as non-members. An example is the streaming operators, where it’s the second parameter that decides which operator to use, and you generally don’t want to modify the iostream classes each time you want a new implementation of the streaming operators, which is the only alternative if you’re going to implement it as a member function. All operators that can be used associatively, that is, a op b can also be called as b op a, must be implemented as non-members. This holds for many of the arithmetic operators and the comparison operators. You must be able to say bool b = 5>a ; This is valid, and should be allowed, but demands a non-member operator for the operator()>..

Difference in signature between member and non-member versions:

The non-member version of an operator will have an extra left-most parameter since it is not connected to any object.

Two typical binary operator signatures:

Member binary operator:

RetType C::operatorX(const ParamType& other);

Non-member binary operator:

RetType operatorX(const ParamType& lhs, const ParamType& rhs);

Operators for value types

The following operators do generally make most sense to implement for value types, or concrete types as they are also referred to (Str97). These types are generally very close to the built-in types of the language, and are implemented as classes where the concept of identity is generally irrelevant. Inheritance and virtual functions are seldom used in implementing such classes. This is in the contrast to reference types , objects of these classes are generally heap allocated and operated on through virtual functions.

The assignment operator, Op=

The assignment operator pattern is first shown for a single class, that is:

No inheritance
C& C::operator=(const C& other)
{
   if (this!=&other)
   {
       // copy members
       x = other.x; // and so on
   }
   return *this;
}

The assignment operator should always return a reference. That way it is possible to write code like a=b=c;

The first check is to verify that if we’re doing a=a, which is perfectly legal and which in fact happens when programmers use arrays, typedefs and other mechanism which obscure the simple fact that they are doing an a=a operation. In that case, we skip the rest of the assignment procedure.

Also, note that if the class contains dynamic memory, we have some options regarding deep or shallow copying of those blocks, which is not discussed in this article.

Inheritance

If class C inherits from class Base, then the pattern is as follows:

C& C::operator=(const C& other)
{
   if (this!=&other)
   { 
      // copy base
      Base::operator=(other);
      // copy members
      x = other.x; // and so of
   }
   return *this;
}

Note that the only change is the addition of the call to the base class assignment operator just before we start copying our own member variables. Note also that in this case we use the operator= function name of the assignment operator for the base class.

Diversion

Observe that the parameter is declared const. This has a special effect on any class that aggregates an instance of your class.

Assume you declare a class A like this:

class A
{
   private:
   C c;
   Public:
   // a lot of methods ......
}

In addition, in your code elsewhere you have something like

A a1,a2;

.... lots of code

a1 = a2;

Now when the compiler sees the assignment of a2 to a1 it will generate a default assignment operator for class A. Then comes the trap. When doing so, it will look at the member variables, and look at their assignment operators. If they ALL have assignment operators following the pattern above, with a const parameter, it will generate a similar assignment operator. If, however, one of the members (f.e. your class A) has an assignment operator where the parameter is NOT declared const, the assignment operator for class A will have a non-const parameter too.

If you think this is no big deal, just try to make a vector of A, like in

std::vector<A> va;

And look at all the nice error messages popping up from deep inside the vector template code. The reason is that the vector template demands that all members have assignment operators with const parameters because the vector must own the content.

Copy Constructor

Although this is not an operator, we have included this special constructor here, because it is part of the B3L (Big Three Law), and with some caveats, it may be implemented in terms of the assignment operator. Lets start with what a copy constructor should do. What we need for the implementation of the copy constructor is first default construction and then assignment. This is illustrated by the following example:

void Func(B& b)
{
   Obj a;
   a = b;
}

should mean the same as:

void Func(B& b)
{
   Obj a(b);
}

What is crucial here is that the precondition for calling the assignment operator is a fully constructed object, like one created by the default constructor. Following this line of thought, the ideal thing would be to implement the copy ctor something like this (pseudo code):

Obj(const Obj& other)
{
   CallDefaultCtor();  
   *this = other;
}

It is not possible to call the default ctor like this in C++, so we will have to settle for less. The first idea might be to put all initialization code into a member function, but functions cannot be called from the initializer list so this will not work for members who have to be initialized there (members with no default ctor). The general solution is therefore to duplicate the code from the default ctor to ensure that the object is in a valid state before calling the assignment operator. The class below illustrates this case:

 

class C
{
   private:
   int X;       
   const int Y;
   public:
   C() : X(0), Y(0) {};
   C(int Y) : X(0), Y(Y) {};
   C& operator=(const C& other)
   {
     if (this!=&other)
     {
        X = other.X;
     }
     return *this;
   }
   C(const C& other) : Y(other.Y) 
   { 
      *this=other; 
   }
};

In many cases the benefit gained from sharing implementation between operator= and copy ctor will be so little, and/or efficiency constraints will preclude it, so that it may be better to just implement the copy ctor directly.

NB: No matter how you define your copy ctor, remember this: It should always have the same result as default construction followed by assignment.

Arithmetic operators

The arithmetic operators are all implemented in terms of each other. We show the addition operators, but the patterns are similar for the subtraction, multiplication and division operators. They follow the same pattern, and have the same dependencies. For the sake of saving some space, we only show the addition operator patterns here. For example, for the subtraction patterns, just replace the +’s with –‘s and you should be doing fine.

Operator +=

This operator is the workhorse when it comes to arithmetic operators, and should always be implemented first when you need to do arithmetic on a class.

The pattern is:

C& C::operator+=(const X& other)
{
   x += other.x;
   return *this;
}
Addition operator

The addition operator should be implemented in terms of the op+=. The pattern for addition of an element is shown below.

const C operator+(const C& a, const X& b)
{
   C result = a; // more efficient than copy constr
   result += b;
   return result; // Note result value optimization[3]
}

The pattern is declared as a free function rather than a member of C. This is necessary in order to do operations on const values, like f.e. c = 4+a; where the number 4 no way can have a method called operator+.

The const return value stops you from writing

code like :

(a+b)=c;

Also, observe that the internal construction of the result object will have reduced negative effect due to the return value optimisation C++ compilers do. The compiler will optimise away this construction while looking at the calling code. (See Scott Meyer, item 20 in ref.2) If your code is

C a = 4;

C b = 6;

C x = a+b;

Then the compiler will combine the internal construction in the operator+ and the construction in the calling code, of x, leaving you with only one construction.

Also, note that we use an empty construction together with the assignment operator instead of a copy constructor, because the copy constructor is implemented in terms of an assignment operator. Since we know this, the assignment above is more efficient, and just as clear.

Prefix increment operator

There are two increment operators, one for prefix operations and another for postfix operations. We start with the prefix operator pattern, which is implemented in terms of the op+=. The postfix operator is implemented in terms of the prefix operator.

C& operator++()
{
   *this += 1; // Implemented in terms of op+=() 
   return *this;
}

It is natural to implement this in terms of the op+= because it is only a special case of that, which increments by one. The op+= increments by any value given.

Postfix increment operator

The postfix operator pattern has a strange signature. The pattern is:

C operator++(int)
{
   C old = *this; // more efficient than copy constr
   ++(*this); // Inc in terms of prefix oper++
   return old;
}

Note that a parameter with only the type int is used. This is a speciality just for telling the compiler that this signature is a postfix operator, and not a prefix operator. Without the int, there would be no differences between the two signatures. One can wonder why the standard committee choose this rather than make an explicit keyword that would be clearer to read like

C operator++() postfix

But I assume some old C guys are still present (pun indented!).

Also, observe that the postfix increment operator will return a copy of the old value. This is the reason why you should opt for the prefix increment operator, and only use the postfix if you need this behaviour. If you use the postfix inadvertently, you will have a useless object construction on your conscience.

A typical efficiency “error” many people make, especially old C-coders who are more used to the postfix than the prefix is in loops:

for (C i=0; i<N; i++)
{
   …..
}

Now for each iteration of the loop, a copy of ‘i’ is created and thrown away. The better way is thus:

for (C i=0; i<N; ++i)
{
   …..
}

Actually, this only holds true for user defined types. For built-in’s postfix is as efficient as prefix. But it’s a good rule anyway.

Equal operator

The equal operator has a binary and symmetrical form, and is thus defined as a function or a friend function if it needs access to the private representation. Both operands should preferably, or normally, be of the same type. You may of course define operator== with different types, which has been done in the STL for the string class, where three overloaded operator==’s exist. If you do that, implement two of those in terms of the first. If you also have an operator== it is important that the result of applying operator= to an object makes operator== return true for the two objects afterwards, or it will get people very confused.

class C
{
   public:
   friend bool operator==(const C& c1,const C& c2)
}

and implemented as

bool operator==( const C& c1,const C& c2)
{
   return c1.x==c2.x;
}
Equal operator for STL vector of pointers

If you have made yourself a vector of pointers, and you would like to use the find template algorithm on that vector, you will need a special operator== in your class.

class C
{
   public:
   friend bool operator==(const C* pc1,const C& c2)
}

and implemented as

bool operator==( const C* pc1,const C& c2)
{
   return pc1->x==c2.x;
}

and you call the find template as

vector<C*> v;
// code to fill the vector
C c; // object to look for
vector<C*>::iterator iter = find(v.begin(),v.end(),c)

Note that the find call uses the object to find as a reference argument, not a pointer as one could assume. The call is in fact equal to the call used for vector of objects (vector<C>), but a vector of objects uses only the standard operator==.

Non-equal operator

The non-equal operator follows the same rule as the equal operator, and is also implemented in terms of that operator.

class C
{
   public:
   friend bool operator!=(const C& c1,const C& c2)
}

and should be implemented as

bool operator!=( const C& c1,const C& c2)
{
   return !(c1==c2);
}

When you have only one member, this may seem a waste, but with multiple members, you save a lot of typing, and also a lot of possibilities for making errors.

A compare method and all the Boolean operators

If you need to implement all the Boolean operators it is often best to implement them in terms of a function compare that returns 0 for equality, < 0 for less and > 0 for greater.

class C {
   public:
   // Compare probably needs access to the representation of C
   virtual int compare(const C& other);.....
};

The reason for the compare method to be virtual is that in case of derivations, you won’t need to make new Boolean operators for the derived classes. All you need to do is to implement the new compare method in the derived class.

bool operator==(const C& lhs, const C& rhs)
{
   return lhs.compare(rhs) == 0;
}

bool operator!=(const C& lhs, const C& rhs)
{
   return lhs.compare(rhs) != 0;
}

bool operator<(const C& lhs, const C& rhs)
{
   return lhs.compare(rhs) < 0;
}

bool operator>(const C& lhs, const C& rhs)
{
   return lhs.compare(rhs) > 0;
}

bool operator<=(const C& lhs, const C& rhs)
{
   return lhs.compare(rhs) <= 0;
}

bool operator>=(const C& lhs, const C& rhs)
{
   return lhs.compare(rhs) >= 0;
}
Array operators

The array operator, or subscript operator, should always be defined as both a const and a non-const version. This operator can be found at both the left and the right side of an assignment.

When you need code for:

C c;
c[5] = 8;

The following operator should be implemented

c& C::operator[](int position)

{

return m_data[position];

}

However, when you only need to read out the value,

C c;

X = c[5];

The following operator pattern should be used:

const C& C::operator[](int position) const
{
   return m_data[position];
}

Conversion operators

class Rational
{ 
   public:
   Rational(int num=0,int denom=1);
   operator double() const
   {
      return double(num)/double(denom);
   }
}

Conversion operators are very often a problem, because they are often being called implicitly, and often when you don’t want them to be called. They are especially deadly in combination with a one argument non-explicit constructor for the same type. The result from implementing conversion operators is often that the programmer must explicitly cast and jump through hoops to get the wanted behaviour, so most times it’s better to just make a member function that returns the required representation. Note also that the example above don’t check for a possible zero value of denom. This might be handled by the runtime system by throwing a division-by-zero exception, at least for Win32.

Tip: Observe that the conversion operator does not declare a return type, much like a constructor.[SE1]

A special case for the conversion operator is if you want the object to signify if it is in a good or bad state for use in f.e. Boolean statements. To implement this as an operator bool conversion would seem the obvious way to implement this but it should rather be implemented like the below:

class C {
   public:
   operator const void*() const
   {
      return this->valid() ? this : 0
   }
   ....
};

If this had been implemented as a bool conversion operator the result could be used in other constructs than checking the objects state. The code above can only be used for checking the validity of the object by comparing the result to 0. [4]

Miscellaneous operators

Streaming operators

You should at least implement the put to operator (“<<”) for your classes, as it at the least is very helpful for printing debug messages.

Stream out
friend ostream& operator<<(ostream& out, const C& c)
{
   out << c.m_n1 << c.m_n2; 
   return out;
}
Stream in
friend istream& operator>>(istream& in, C& c)
{
   in >> c.m_n1 >> c.m_n2;
   return in;
}

These two operators should be declared friend of the class they work on if they need access to the representation of the object, parameter C above.

Streaming a class hierarchy:

Define a virtual function print in the base class of the hierarchy:

class Base {
   public:
   virtual ostream& print(ostream& os) = 0;
   ....
};

Implement the ostream operator in terms of the print member function

ostream& operator<<(ostream& os, const Base& object)
{
   return object.print(os);
}

It does not seem particularly useful to implement a similar scheme for the get from operator.

Dereference and member selection operator

The dereference and member selection operators are typically used to implement classes whose instances behave like pointers.

class Obj {
   public:
   void doIt();
   .....
};

class PtrToObj 
{
   private:
   Obj* pObj;
   public:
   ........
   Obj& operator*()
   {
      return *pObj;
   }
   Obj* operator->()
   {
      return pObj;
   }
}; 

This enables clients to use an instance of PtrToObj like it actually was an Obj pointer.

Obj* pObj = new ......

PtrToObj p(pObj);

p->doIt();

(*p).doIt();

Be aware that there are many ways in which to implement so called smart pointers, some are designed to be passed by value (value objects), where you write the copy constructor, assignment operator and destructor for the smart pointer to cater for features such as ownership transfer and reference counting. Another way is to disallow copying, and rely on passing by reference down the stack. See the article by B. Milewski in the references, for details of design and use of smart pointers.

You need to implement the const versions if you are going to pass the Ptr object by const reference. Like this:

void func(const PtrToObj& ptr)
{
   ptr->doIt(); // compile error if the const version of Ptr::operator-> is not defined.
}

Here are the implementations of the const versions of the dereferencing operators:

class PtrToObj
{
   ……..
   const Obj& operator*() const
   {
      return *m_pObj;
   }
   const Obj* operator->() const
   {
      return m_pObj;
   }
   ……
};

AddressOf operator

Also sometimes used with a smart pointer, implemented like this:

class PtrToObj 
{
   public:
   Obj** operator&()
   {
      return &m_pObj;
   }
   .....
}; 

Be aware that overloading the address operator breaks the identity check in the assignment operator (operator=). This may or may not be a pro

          Ziften adds AV to the Zenith endpoint protection platform to stop attacks      Cache   Translate Page   Web Page Cache   

Ziften announced its Zenith endpoint protection platform now includes AV protecting all enterprise endpoints from known and unknown targeted attacks. Ziften helps enterprises simplify endpoint protection plus visibility. Zenith is the cyber security platform that provides one agent for all endpoints – laptops, desktops, servers, and cloud – preventing multi-vector attacks with advanced AV, detection and response, plus visibility and hardening. Attackers have created a criminal industry by attacking vulnerable enterprise endpoints. And traditional AV … More

The post Ziften adds AV to the Zenith endpoint protection platform to stop attacks appeared first on Help Net Security.


          Comment on Anki Vector: The new Rosie by Pepee63      Cache   Translate Page   Web Page Cache   
Wait what. You ask it questions and you don't get any answers. Did I miss something ? Sounds like my ex.
          Heinle, Wischer und Partner, Freie Architekten +++ Architekt/in für Wettbewerbe +++ Berlin      Cache   Translate Page   Web Page Cache   
08.08.2018
Berlin >>> Architekt/in für Wettbewerbe
Unser Büro arbeitet seit über 50 Jahren national und international an anspruchsvollen Projekten mit dem Schwerpunkt Gesundheit und Forschung. Vom Wettbewerb bis zur Bauleitung - gemeinsam sichern unser qualifizierter Nachwuchs und die langjährigen Mitarbeiter das gesamte Leistungsspektrum der Architektentätigkeit ab.

Für unser Büro in Berlin suchen wir eine/n engagierte/n Architekt/in für Wettbewerbe.

Sie bringen mit:

  • die Leidenschaft für den Entwurf: von der ersten Inspiration bis ins Detail
  • eine selbstständige und qualitätsbewusste Arbeitsweise
  • einen professionellen Umgang mit CAD-Programmen (vorzugsweise Vectorworks), 3D-Software, MS Office und Adobe CS.

Wir sind:
  • ein Büro mit architektonisch und funktional anspruchsvollen Projekten
  • ein aufgeschlossenes und internationales Team
  • Wir fördern Sie mit internen und externen Weiterbildungen.
  • In unserem Büro nebenan des Tiergartens pflegen wir flexible Arbeitszeiten und ein kollegiales Miteinander.

Wir freuen uns auf Ihre aussagekräftige Bewerbung per Post oder per E-Mail an: berlin@heinlewischerpartner.de (max. 5 MB). Bitte geben Sie das Kennwort WBW/2018 an. Ihr Ansprechpartner ist Edzard Schultz.



>>> Alle Informationen / Details >>>



          REALACE GmbH +++ Architekt/in für alle Leistungsphasen, Schwerpunkt 1-4 +++ Berlin      Cache   Translate Page   Web Page Cache   
07.08.2018
Berlin >>> Architekt/in für alle Leistungsphasen, Schwerpunkt 1-4
Wen wir suchen:

Wir suchen eine/n Architekten/in (alle Leistungsphasen, Schwerpunkt 1-4) für eine unbefristete Festanstellung in Vollzeit. Als Architekt/in mit Berufserfahrung bieten wir Ihnen die Möglichkeit der Projektleitung, aber auch Bewerbungen von Berufsanfängern/innen sind willkommen.

Zu Ihren Aufgaben gehören:
  • Entwicklung von Nutzungsprogrammen für Gebäude und Standorte sowie deren entwurfliche und bauplanerische Umsetzung
  • Planung von Bauwerken unter gestalterischen, technischen, energetischen, wirtschaftlichen, ökologischen und sozialen Gesichtspunkten
  • Erarbeitung von Entwurfs- und Genehmigungsplanung (Bauanträge etc.)
  • Abstimmung und planerische Zusammenarbeit mit Fachingenieuren
  • Projektmanagement
  • Erarbeitung und Prüfung von Ausführungsplanung
  • Erstellung von Präsentationen/ Bildbearbeitung

Wichtig sind uns:
  • abgeschlossenes Studium mit (Diplom oder Master Arch.)
  • gute Deutsch- und Englischkenntnisse in Wort und Schrift
  • sehr gute entwurfliche und darstellerische Fähigkeiten
  • sicherer Umgang mit CAD: Vectorworks
  • individuelles Engagement in der Gestaltung team- und lösungsorientierter Prozesse innerhalb unseres interdisziplinär arbeitenden Teams
  • die Fähigkeit, unsere vieldimensionalen Projekte stets mit dem Blick auf die Gesamtheit zu kontextualisieren

Wünschenswert sind:
  • Interesse an atmosphärischen/szenographischen Darstellungen
  • gute Kenntnisse im Bereich Bildbearbeitung/Layout: InDesign, ggf. Photoshop/3D-Visualisierungs-Programm SketchUp
  • mehrjährige Berufserfahrung, idealerweise im Bereich Bestandsimmobilien

Was wir erreichen wollen:
Seit zehn Jahren wird das Team von REALACE beauftragt, das Zusammenwirken von Kommunikation, Design, Produktentwicklung, Architektur und Kunst auf Orte anzuwenden, um deren volles Potential zu entfalten. In all unseren Tätigkeitsfeldern – in der Architektur wie in der Entwicklung, im Brand Development wie in der Kommunikation und Vermarktung – nehmen wir stets die Nutzerperspektive ein, um begeisternde Geschichten zu kreieren. Sämtliche Dimensionen und Disziplinen – kulturelle, bauliche, soziale, rechtliche, wirtschaftliche – nicht einzeln, sondern als originelles Gefüge zu gestalten und zu überzeugenden, eindrucksvollen Gesamterfahrungen werden zu lassen, ist unsere Kompetenz und bleibt unser Antrieb.

In unseren (bis zu 100.000 m2 großen) Projekten wie u.a. Ullsteinhaus Berlin, Bikini Berlin, Upper West, Geisberg Berlin, Innovationszentrum Urban Tech Republic, MarinaMarina setzten und setzen wir unseren Anspruch, konsequent vordenkerisch zu sein, in hoher Qualität und entlang agiler und kollaborativer Prozesse um.


Wie wir miteinander arbeiten:

AUSGEFALLEN — Gute Orte und neue Möglichkeitsräume zu schaffen, erfordert innovative Denk- und originelle Herangehensweisen. Für die sind wir bekannt.

KOLLABORATIV — Agil strukturierte, kollaborative Prozesse sind der alles entscheidende Team-Modus für unsere Art von Projekten und Partnerschaften.

WANDLUNGSFÄHIG — Seit es REALACE gibt, erkunden wir ungewöhnliche Gebiete und Veränderungen im Terrain. Auf diese Weise bleiben wir erfolgreich und orientieren unsere Bewegung.

INITIATIV — Zu befördern, was für die individuelle und gemeinsame Entfaltung und Entwicklung im Team-Alltag nötig und gewünscht ist, gehört bei REALACE unbedingt dazu.

OFFENHERZIG — Wir begegnen uns auf Augenhöhe und lernen gerne voneinander, sind aufmerksam und haben Spaß, schließlich verbringen wir viel Zeit miteinander.

ATMOSPHÄRISCH — Unsere Räumlichkeiten in Kreuzberg (am Tempelhofer Ufer) und in der Rummelsburger Bucht (in der MarinaMarina) sind uns innovative und inspirierende Arbeitsumgebungen.

Als Architekt/in sind Sie fester Bestandteil unseres interdisziplinären, internationalen Teams. Wir freuen uns über Ihre Sicht- und Herangehensweisen, Ihre Ideen und Impulse! Bitte senden Sie Ihre vollständigen Bewerbungsunterlagen per Mail an: work@realace.de, z. Hd. Moritz Theden.



>>> Alle Informationen / Details >>>



          Comments not showing & “Some of field value is invalid”      Cache   Translate Page   Web Page Cache   

Replies: 0

Hello,

I’m willing to use wpDiscuz, but I’m facing some problems. I installed the plug-in and immediately noticed that none of the existing comments showed up — neither on posts or pages. I can see everthing else, but not the comments. Here‘s a post for you to check. When I click on newest, oldest or most voted, I’m able to see them (but they’re not supposed to show up only after clicking, right?). And there’s another problem: When I try to reply, it doesn’t work. This is the message I get:

https://i.imgur.com/VFCEk8v.png

“Some of field value is invalid” (in English).

I followed every step from here and wpDiscuz is now my only active plug-in, plus I already deleted and reinstalled it, all the needed options are checked ([1], [2], [3], [4]) and the theme I’m using have the comments_template on posts and pages:

https://i.imgur.com/FXVVywv.png

Also, I already switched to the default theme for testing and nothing changed.

I don’t know what else to do. Looking forward for your help.

Thank you,
Lucas.

  • This topic was modified 26 minutes ago by Lucas Kich.

          'Vector' is SF Startup's New Home Robot With Feelings      Cache   Translate Page   Web Page Cache   

<br /><img src="https://media.nbcbayarea.com/images/213*120/Little+Robot+THUMB.png" align="left" hspace="5" /><br /><p>There are robots for all sorts of tasks, and virtual assistants to answer all sorts of questions.</p><p>Now, San Francisco startup <a href="https://www.anki.com/en-us" mce_href="https://www.anki.com/en-us" ti


          GIS Specialist - SNC-Lavalin - Saskatoon, SK      Cache   Translate Page   Web Page Cache   
Performing analysis on vector, raster, and tabular datasets. Creating and maintaining vector, raster, and tabular data and databases....
From SNC-Lavalin - Sun, 05 Aug 2018 09:23:16 GMT - View all Saskatoon, SK jobs
          Full Stack Developer - Thales Group - Saint-Urbain, QC      Cache   Translate Page   Web Page Cache   
Led by Thales, cortAIx, in collaboration with the MILA (Artificial Intelligence Institute of Quebec), the IVADO (Institute of Data Valorization) and the Vector...
From Thales - Wed, 08 Aug 2018 10:20:12 GMT - View all Saint-Urbain, QC jobs
          RF Design Engineer - Ciena - Québec City, QC      Cache   Translate Page   Web Page Cache   
Hands-on experience with RF test instruments such as Vector Network Analyser Spectrum Analyser and High-speed Oscilloscope. We believe in the power of people....
From Ciena - Thu, 12 Jul 2018 08:14:20 GMT - View all Québec City, QC jobs
          Riggers / Technical Animators - Beenox - Activision - Québec City, QC      Cache   Translate Page   Web Page Cache   
A knowledge of the 3D-related mathematics (matrix, vectors, etc.). Beenox is a video game development studio created in 2000....
From Activision - Sun, 08 Jul 2018 05:29:43 GMT - View all Québec City, QC jobs
          PROGRAMMEUR(EUSE) DE JEUX CONSOLE / CONSOLE GAME PROGRAMMER - Frima Studio - Québec City, QC      Cache   Translate Page   Web Page Cache   
Familiar with mathematical concepts applied to videogames (trigonometry, vector algebra, matrix calculus, etc);...
From Frima Studio - Thu, 07 Jun 2018 10:10:26 GMT - View all Québec City, QC jobs
          Ingénieur Conception Électronique - Electronic Design Engineer - Ciena - Québec City, QC      Cache   Translate Page   Web Page Cache   
Hands-on experience with RF test instruments such as Vector Network Analyser Spectrum Analyser and High-speed Oscilloscope strongly desired....
From Ciena - Fri, 18 May 2018 20:15:09 GMT - View all Québec City, QC jobs
          Ingénieur électrique - Lion - Saint-Jérôme, QC      Cache   Translate Page   Web Page Cache   
Posséder des connaissances sur les notions CAN bus et logiciel CANalyzer (suite Vector). Nous sommes présentement à la recherche d’un Ingénieur électrique afin...
From LION - Sat, 21 Apr 2018 07:30:16 GMT - View all Saint-Jérôme, QC jobs
          Ingénieur électrique - Technologie Hypertronic Inc - Blainville, QC      Cache   Translate Page   Web Page Cache   
Posséder des connaissances sur les notions CAN bus et logiciel CANalyzer (suite Vector). Nous sommes présentement à la recherche d’un ingénieur électrique afin...
From Indeed - Fri, 22 Jun 2018 15:44:26 GMT - View all Blainville, QC jobs
          Illustrateur (trice) / Illustrator - Woozworld - Montréal, QC      Cache   Translate Page   Web Page Cache   
Skill to optimize vector visual elements. Mastering 2D vector graphic production with Adobe Animate. Working at Woozworld....
From Woozworld - Wed, 08 Aug 2018 22:25:40 GMT - View all Montréal, QC jobs
          Lab Operations Specialist - enGene - Montréal, QC      Cache   Translate Page   Web Page Cache   
Viral vector platform to deliver genes to mucosal cells lining the gut and other mucosal. The vector system can be administered to the intestine via the oral or...
From enGene - Fri, 03 Aug 2018 22:09:40 GMT - View all Montréal, QC jobs
          Senior Scientist Oral Dosage - enGene Inc. - Montréal, QC      Cache   Translate Page   Web Page Cache   
The vector system can be administered to the intestine via the oral or enema route. Is a high growth biotechnology company developing a robust, proprietary non...
From Indeed - Tue, 24 Jul 2018 11:58:43 GMT - View all Montréal, QC jobs
          3D Artist (Modeler / Animator) - Budge Studios - Montréal, QC      Cache   Translate Page   Web Page Cache   
Optimize the assets of art (graphic vectors); We are looking for a creative and passionate individual to fill the position of Artist / Animator 3D....
From Indeed - Mon, 23 Jul 2018 18:32:06 GMT - View all Montréal, QC jobs
          Ing nieur Mat riel - NexGedia Enterprise Inc. - Montréal, QC      Cache   Translate Page   Web Page Cache   
Posséder des connaissances sur les notions CAN bus et logiciel CANalyzer (suite Vector). Relevant du directeur du département, le titulaire du poste participera...
From NexGedia Enterprise Inc. - Mon, 23 Jul 2018 17:18:56 GMT - View all Montréal, QC jobs
          Senior Software Developer - Chemical Computing Group - Montréal, QC      Cache   Translate Page   Web Page Cache   
Plan to become an expert in SVL, the scientific vector language, and to also acquire knowledge of computational and medicinal chemistry and biologics....
From Chemical Computing Group - Sat, 14 Jul 2018 09:14:18 GMT - View all Montréal, QC jobs
          Scientific Software Developer - Chemical Computing Group - Montréal, QC      Cache   Translate Page   Web Page Cache   
Plan to become an expert in SVL, the scientific vector language, and to deepen or acquire expertise across the domains of computational and medicinal chemistry...
From Chemical Computing Group - Sat, 14 Jul 2018 09:14:16 GMT - View all Montréal, QC jobs
          Lead - Cyber Security - SNC-LAVALIN INFRASTRUCTURE - Montréal, QC      Cache   Translate Page   Web Page Cache   
Knowledge of the profiles of the actors and the vectors of threats as well as the mechanisms of attack eg. Chez SNC-Lavalin, groupe transports collectifs et...
From SNC-LAVALIN INFRASTRUCTURE - Fri, 15 Jun 2018 23:16:00 GMT - View all Montréal, QC jobs
          Meet Vector, the little robot that could be your companion      Cache   Translate Page   Web Page Cache   

US based robotics company, Anki, has launched a Kickstarter campaign to raise $US0.5m ahead of plans to launch a robot companion for the home, dubbed Vector, and has promised it will go on sale in Australia for $A450 in October. Vector, which resembles a miniature bulldozer, is billed as “a robot who’s alive with personality, […]

The post Meet Vector, the little robot that could be your companion appeared first on Tracking The Internet of Things.


          Este robô de estimação pode ser o predecessor dos droides de 'Star Wars'      Cache   Translate Page   Web Page Cache   
Vector, o robô de estimação (Foto: Anki)
Na franquia "Star Wars", droides são robôs-assistentes cheios de personalidade que acompanham os protagonistas por toda parte, como o RD-D2, o BB-8 e o C3-PO. No mundo real, uma empresa parece estar disposta a trazer o conceito à vida.

Vector é o nome do novo robô doméstico produzido pela empresa norte-americana Anki, que também fez o infantil Cozmo em 2016. O Vector é uma versão adulta e para toda a família do Cozmo, com mais recursos e uma complexa inteligência artificial.


Dois pares de rodas e uma esteira permitem que o Vector se movimente por toda a casa de forma autônoma. Ele ainda vem com um sintetizador de voz, câmeras, sensores 3D e microfone para não só reconhecer o ambiente e os donos, mas também para falar com eles.

Ao contrário do Cozmo, o Vector não precisa ser controlado por um smartphone. Ele se mantém constantemente conectado a um servidor na nuvem e responde a comandos de voz. Como a Siri ou o Google Assistente, ele pode gravar lembretes e checar a previsão do tempo, por exemplo.

Um conjunto de animações em seu display dá um toque de personalidade ao robô. Ele até lembra o nome dos donos, de modo que, quando eles voltam para casa após um longo dia fora, Vector os recebe dizendo "olá" e os chamando pelo nome.


Além disso, Vector reage com frustração ao ser retirado do chão ou quando algo ou alguém bloqueia o seu caminho. Ele também se lembra de onde fica o carregador: quando sua bateria começa a se esgotar, ele vai até a estação de recarga sozinho.

Vector é equipado com um processador quad-core APQ8009, da Qualcomm, que possui suporte às suas funções de inteligência artificial. O robô ainda tem uma câmera de ângulo bem aberto que filma em HD e em 120 graus e quatro sensores infravermelhos que o impedem de tropeçar em degraus.

Boris Sofman, fundador e CEO da Anki, diz que a ideia por trás do Vector é naturalizar a relação entre homem e máquina. Seu objetivo, segundo o site Engadget, é colocar um robô em cada lar dos EUA, que como os droides de "Star Wars", cheios de personalidade, acompanhem o dono aonde ele for.

O Vector começará a ser vendido nos EUA em outubro por US$ 249, que equivale a R$ 930 em conversão direta, na cotação atual do dólar. Isto se a sua campanha de financiamento coletivo tiver sucesso. A empresa espera arrecadar US$ 500 mil para produzir o robô em massa.

Por Lucas Carvalho | Olhar Digital
          Parabolic Perspective      Cache   Translate Page   Web Page Cache   

Most of this audio was recorded when trying to decrypt and downlink a pay per view fight at work. It was coming in RF on a Ku2 satellite and was heavily biss encrypted. Each element of the biss. code that was put in the audio would change and get different bands from that same bird.

I found that interesting as well as the video feeding back scopes for some reason. much of the green lines that you may see going across the screen periodically are vector scope and waveform monitor lines which I still cannot figure out why they fed back the way they did. At any rate this was one of my first attempts at audio ad this was just something fun to play around with.

(turns out I had the parabolic function disabled on the satellite dish hence the name).

Cast: russ chartier

Tags: russell j chartier, russell chartier, paul botelho, videoart, russ chartier and video artist


          Школа, ученики, школьные и канцелярские принадлежности - коллекция в векторе | Vector School      Cache   Translate Page   Web Page Cache   
Школа, ученики, школьные и канцелярские принадлежности - коллекция в векторе | Vector School
Школа, ученики, школьные и канцелярские принадлежности - коллекция в векторе | Vector School
Vector 50 | Ai Files+Jpg Preview | Архив: RAR Размер: 115.47 MB

          Стеклянные бутылки, стаканы с пивом - красочные 3D иллюстрации в векторе | Attractive glass bottle wheat beer in 3d vector illustration      Cache   Translate Page   Web Page Cache   
Стеклянные бутылки, стаканы с пивом - красочные 3D иллюстрации в векторе | Attractive glass bottle wheat beer in 3d vector illustration

Стеклянные бутылки, стаканы с пивом - красочные 3D иллюстрации в векторе | Attractive glass bottle wheat beer in 3d vector illustration
7 files | EPS + preview | 129 Mb

          Декоративные рамки - векторная коллекция | Vector Frames Collection      Cache   Translate Page   Web Page Cache   
Декоративные рамки - векторная коллекция | Vector Frames Collection
Декоративные рамки - векторная коллекция | Vector Frames Collection
Vector 50 | Ai Files+Jpg Preview | Архив: RAR Размер: 107.92 MB

          Летний отдых, вечеринки, скидки - постеры, эмблемы в векторе | Summer special offer discount and sale banner vector      Cache   Translate Page   Web Page Cache   
Летний отдых, вечеринки, скидки - постеры, эмблемы в векторе | Summer special offer discount and sale banner vector

Летний отдых, вечеринки, скидки - постеры, эмблемы в векторе | Summer special offer discount and sale banner vector
6 eps, ai + 6 jpeg, tif / prew / 57 Mb

          Фруктовые йогурты и свежие соки - 3D иллюстрации для рекламы в векторе | Yogurt ads and fresh juice 3d vector illustration for web or magazine      Cache   Translate Page   Web Page Cache   
Фруктовые йогурты и свежие соки - 3D иллюстрации для рекламы в векторе | Yogurt ads and fresh juice 3d vector illustration for web or magazine

Фруктовые йогурты и свежие соки - 3D иллюстрации для рекламы в векторе | Yogurt ads and fresh juice 3d vector illustration for web or magazine
9 files | EPS + preview | 113 Mb

          Профессиональные сертификаты - векторные шаблоны | Professional vector certificate of appreciation template      Cache   Translate Page   Web Page Cache   
Профессиональные сертификаты - векторные шаблоны | Professional vector certificate of appreciation template

Профессиональные сертификаты - векторные шаблоны | Professional vector certificate of appreciation template
15 files | EPS + preview | 53 Mb

          Рамадан - приглашения, поздравительные открытки, баннеры с едой - векторная подборка | Eid Mubarak party invitations greeting card and banner with food background, Ramadan Kareem vector illustration      Cache   Translate Page   Web Page Cache   
Рамадан - приглашения, поздравительные открытки, баннеры с едой - векторная подборка | Eid Mubarak party invitations greeting card and banner with food background, Ramadan Kareem vector illustration

Рамадан - приглашения, поздравительные открытки, баннеры с едой - векторная подборка | Eid Mubarak party invitations greeting card and banner with food background, Ramadan Kareem vector illustration
5 files | EPS + preview | 45 Mb

          Мороженое - в векторе 3D постеры с неоновыми иллюстрациями и надписями | Poster with ice cream and neon lettering, vector 3d illustrator      Cache   Translate Page   Web Page Cache   
Мороженое - в векторе 3D постеры с неоновыми иллюстрациями и надписями | Poster with ice cream and neon lettering, vector 3d illustrator

Мороженое - в векторе 3D постеры с неоновыми иллюстрациями и надписями | Poster with ice cream and neon lettering, vector 3d illustrator
9 files | EPS + preview | 173 Mb

          Юбилейные золотые логотипы с цифрами и цветочными завитушками - векторный клипарт | Anniversary vector logo with gold color years anniversary celebration      Cache   Translate Page   Web Page Cache   
Юбилейные золотые логотипы с цифрами и цветочными завитушками - векторный клипарт | Anniversary vector logo with gold color years anniversary celebration

Юбилейные золотые логотипы с цифрами и цветочными завитушками - векторный клипарт | Anniversary vector logo with gold color years anniversary celebration
9 files | EPS + preview | 59 Mb

          Бутылки с фруктовыми питьевыми йогуртами - иллюстрации для рекламы в векторе | Set of drink yogurt bottle with fruit and berry flavor, vector advertising mock-up illustration      Cache   Translate Page   Web Page Cache   
Бутылки с фруктовыми питьевыми йогуртами - иллюстрации для рекламы в векторе | Set of drink yogurt bottle with fruit and berry flavor, vector advertising mock-up illustration

Бутылки с фруктовыми питьевыми йогуртами - иллюстрации для рекламы в векторе | Set of drink yogurt bottle with fruit and berry flavor, vector advertising mock-up illustration
6 files | EPS + preview | 43 Mb

          Футболки для молодежи с креативными рисунками и надписями - шаблоны в векторе | T-Shirt mockup vector template      Cache   Translate Page   Web Page Cache   
Футболки для молодежи с креативными рисунками и надписями - шаблоны в векторе | T-Shirt mockup vector template

Футболки для молодежи с креативными рисунками и надписями - шаблоны в векторе | T-Shirt mockup vector template
7 files | EPS + preview | 70 Mb

          Натуральная косметика для ухода за кожей - векторные 3D иллюстрации | Natural skin care products ad, sunscreen spray in 3d vector illustration, summer advertising      Cache   Translate Page   Web Page Cache   
Натуральная косметика для ухода за кожей - векторные 3D иллюстрации | Natural skin care products ad, sunscreen spray in 3d vector illustration, summer advertising

Натуральная косметика для ухода за кожей - векторные 3D иллюстрации | Natural skin care products ad, sunscreen spray in 3d vector illustration, summer advertising
6 files | EPS + preview | 85 Mb

          Йогурты - в векторе 3D иллюстрации с молочными всплесками, ягодами, шоколадом | Yogurt ad with splashing ingredients behind commercial vector in 3d illustration      Cache   Translate Page   Web Page Cache   
Йогурты - в векторе 3D иллюстрации с молочными всплесками, ягодами, шоколадом | Yogurt ad with splashing ingredients behind commercial vector  in 3d illustration

Йогурты - в векторе 3D иллюстрации с молочными всплесками, ягодами, шоколадом | Yogurt ad with splashing ingredients behind commercial vector in 3d illustration
6 files | EPS + preview | 54 Mb

          Энергетические напитки в банках - рекламные баннеры в векторе | Energy drink in metal with ice and juice splash advertising vector banner      Cache   Translate Page   Web Page Cache   
Энергетические напитки в банках - рекламные баннеры в векторе | Energy drink in metal with ice and juice splash advertising vector banner

Энергетические напитки в банках - рекламные баннеры в векторе | Energy drink in metal with ice and juice splash advertising vector banner
6 files | EPS + preview | 60 Mb

          Питьевые йогурты с ягодами и фруктами - рекламные 3D иллюстрации - векторная подборка | Drink yogurt ads commercial vector mockup 3d illustration      Cache   Translate Page   Web Page Cache   
Питьевые йогурты с ягодами и фруктами - рекламные 3D иллюстрации - векторная подборка | Drink yogurt ads commercial vector mockup 3d illustration

Питьевые йогурты с ягодами и фруктами - рекламные 3D иллюстрации - векторная подборка | Drink yogurt ads commercial vector mockup 3d illustration
5 files | EPS + preview | 47 Mb

          Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set      Cache   Translate Page   Web Page Cache   
Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set

Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set
9 files | EPS + preview | 44 Mb

          Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 2      Cache   Translate Page   Web Page Cache   
Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 2

Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 2
9 files | EPS + preview | 69 Mb

          Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 3      Cache   Translate Page   Web Page Cache   
Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 3

Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 3
9 files | EPS + preview | 58 Mb

          Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 4      Cache   Translate Page   Web Page Cache   
Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 4

Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 4
9 files | EPS + preview | 42 Mb

          Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 5      Cache   Translate Page   Web Page Cache   
Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 5

Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 5
9 files | EPS + preview | 50 Mb

          Рамадан - в векторе праздничные мусульманские фоны | Ramadan Kareem vector calligraphy design with decorative floral pattern, mosque silhouette, crescent and glittering islamic background      Cache   Translate Page   Web Page Cache   
Рамадан - в векторе праздничные мусульманские фоны | Ramadan Kareem vector calligraphy design with decorative floral pattern, mosque silhouette, crescent and glittering islamic background

Рамадан - в векторе праздничные мусульманские фоны | Ramadan Kareem vector calligraphy design with decorative floral pattern, mosque silhouette, crescent and glittering islamic background
9 files | EPS + preview | 142 Mb

          Рамадан - в векторе праздничные мусульманские фоны | Ramadan Kareem vector calligraphy design with decorative floral pattern, mosque silhouette, crescent and glittering islamic background 2      Cache   Translate Page   Web Page Cache   
Рамадан - в векторе праздничные мусульманские фоны | Ramadan Kareem vector calligraphy design with decorative floral pattern, mosque silhouette, crescent and glittering islamic background 2

Рамадан - в векторе праздничные мусульманские фоны | Ramadan Kareem vector calligraphy design with decorative floral pattern, mosque silhouette, crescent and glittering islamic background 2
9 files | EPS + preview | 112 Mb

          Упаковка для парфюмерии - векторная подборка | Perfume packaging vector design template      Cache   Translate Page   Web Page Cache   
Упаковка для парфюмерии - векторная подборка | Perfume packaging vector design template

Упаковка для парфюмерии - векторная подборка | Perfume packaging vector design template
11 files | EPS + preview | 90 Mb

          Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 6      Cache   Translate Page   Web Page Cache   
Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 6

Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 6
9 files | EPS + preview | 46 Mb

          Инфографика - векторные шаблоны для бизнес презентаций | Infographics vector template for business presentations or information banner      Cache   Translate Page   Web Page Cache   
Инфографика - векторные шаблоны для бизнес презентаций | Infographics vector template for business presentations or information banner

Инфографика - векторные шаблоны для бизнес презентаций | Infographics vector template for business presentations or information banner
9 files | EPS + preview | 94 Mb

          Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 7      Cache   Translate Page   Web Page Cache   
Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 7

Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 7
9 files | EPS + preview | 70 Mb

          Бизнес брошюры - шаблоны в векторе | Brochure template vector layout design, corporate business annual report, magazine, flyer mockup      Cache   Translate Page   Web Page Cache   
Бизнес брошюры - шаблоны в векторе | Brochure template vector layout design, corporate business annual report, magazine, flyer mockup

Бизнес брошюры - шаблоны в векторе | Brochure template vector layout design, corporate business annual report, magazine, flyer mockup
9 files | AI + preview | 225 Mb

          Бизнес визитки с роскошным дизайном - векторная подборка | Luxury golden business card vector design      Cache   Translate Page   Web Page Cache   
Бизнес визитки с роскошным дизайном - векторная подборка | Luxury golden business card  vector design

Бизнес визитки с роскошным дизайном - векторная подборка | Luxury golden business card vector design
9 files | EPS + preview | 86 Mb

          Скидки - черно-золотые рекламные ролл ап баннеры в векторе | Gold and black roll up banner, billboard design template vector      Cache   Translate Page   Web Page Cache   
Скидки - черно-золотые рекламные ролл ап баннеры в векторе | Gold and black roll up banner, billboard design template vector

Скидки - черно-золотые рекламные ролл ап баннеры в векторе | Gold and black roll up banner, billboard design template vector
15 files | EPS + preview | 73 Mb

          Слайды для бизнес презентации - векторные шаблоны | Vector slide presentation templates background, infographic business elements      Cache   Translate Page   Web Page Cache   
Слайды для бизнес презентации - векторные шаблоны | Vector slide presentation templates background, infographic business elements

Слайды для бизнес презентации - векторные шаблоны | Vector slide presentation templates background, infographic business elements
6 files | EPS + preview | 102 Mb

          Летние скидки - векторные фоны с цветами, листьями, фруктами | Vector illustration sale design template      Cache   Translate Page   Web Page Cache   
Летние скидки - векторные фоны с цветами, листьями, фруктами | Vector illustration sale design template

Летние скидки - векторные фоны с цветами, листьями, фруктами | Vector illustration sale design template
9 files | EPS + preview | 103 Mb

          Бизнес визитки с роскошным дизайном - векторная подборка | Luxury golden business card vector design 2      Cache   Translate Page   Web Page Cache   
Бизнес визитки с роскошным дизайном - векторная подборка | Luxury golden business card  vector design 2

Бизнес визитки с роскошным дизайном - векторная подборка | Luxury golden business card vector design 2
9 files | EPS + preview | 90 Mb

          Сладкие десерты, фаст фуд, чемоданы, космонавт, ракеты, скидка - иллюстрации, иконки в векторе | Vector illustration sketch of style icons set      Cache   Translate Page   Web Page Cache   
Сладкие десерты, фаст фуд, чемоданы, космонавт, ракеты, скидка - иллюстрации, иконки в векторе | Vector illustration sketch of style icons set

Сладкие десерты, фаст фуд, чемоданы, космонавт, ракеты, скидка - иллюстрации, иконки в векторе | Vector illustration sketch of style icons set
9 files | EPS + preview | 101 Mb

          Боулинг - красочные фоны, баннеры в векторе | Bowling vector design template      Cache   Translate Page   Web Page Cache   
Боулинг - красочные фоны, баннеры в векторе | Bowling vector design template

Боулинг - красочные фоны, баннеры в векторе | Bowling vector design template
9 files | EPS + preview | 72 Mb

          Инфографика - векторные шаблоны для бизнес презентаций | Infographics vector template for business presentations or information banner 2      Cache   Translate Page   Web Page Cache   
Инфографика - векторные шаблоны для бизнес презентаций | Infographics vector template for business presentations or information banner 2

Инфографика - векторные шаблоны для бизнес презентаций | Infographics vector template for business presentations or information banner 2
9 files | EPS + preview | 114 Mb

          Изометрические концептуальные бизнес композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 8      Cache   Translate Page   Web Page Cache   
Изометрические концептуальные бизнес композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 8

Изометрические концептуальные бизнес композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 8
9 files | EPS + preview | 39 Mb

          Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 9      Cache   Translate Page   Web Page Cache   
Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 9

Изометрические концептуальные композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 9
9 files | EPS + preview | 81 Mb

          Изометрические концептуальные бизнес композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 10      Cache   Translate Page   Web Page Cache   
Изометрические концептуальные бизнес композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 10

Изометрические концептуальные бизнес композиции - подборка в векторе | Isometric conceptual vector composition, infographics template, horizontal banners set 10
9 files | EPS + preview | 67 Mb

          Крофейные зерна - ретро реклама - 3D иллюстрации в векторе | Retro coffee beans ads in 3d vector illustration      Cache   Translate Page   Web Page Cache   
Крофейные зерна - ретро реклама - 3D иллюстрации в векторе | Retro coffee beans ads in 3d vector illustration

Крофейные зерна - ретро реклама - 3D иллюстрации в векторе | Retro coffee beans ads in 3d vector illustration
5 files | EPS + preview | 93 Mb

          Гранатовый сок в бутылках - векторные 3D иллюстрации | Pomegranates bottled juice ads in 3d vector illustration      Cache   Translate Page   Web Page Cache   
Гранатовый сок в бутылках - векторные 3D иллюстрации | Pomegranates bottled juice ads in 3d vector illustration

Гранатовый сок в бутылках - векторные 3D иллюстрации | Pomegranates bottled juice ads in 3d vector illustration
4 files | EPS + preview | 59 Mb

          Питьевой йогурт - рекламные баннеры, фоны - векторный клипарт | Bottled probiotic or yogurt drink in 3d vector illustration      Cache   Translate Page   Web Page Cache   
Питьевой йогурт - рекламные баннеры, фоны - векторный клипарт | Bottled probiotic or yogurt drink in 3d vector illustration

Питьевой йогурт - рекламные баннеры, фоны - векторный клипарт | Bottled probiotic or yogurt drink in 3d vector illustration
8 files | EPS + preview | 78 Mb

          Арахисовое масло, вафли с ягодами - 3D иллюстрации в векторе | Peanut butter spread ads and waffle ads with fruit in 3d vector illustration      Cache   Translate Page   Web Page Cache   
Арахисовое масло, вафли с ягодами - 3D иллюстрации в векторе | Peanut butter spread ads and waffle ads with fruit in 3d vector illustration

Арахисовое масло, вафли с ягодами - 3D иллюстрации в векторе | Peanut butter spread ads and waffle ads with fruit in 3d vector illustration
7 files | EPS + preview | 115 Mb

          Бутылки с виноградным соком - 3D иллюстрации в векторе | Grape bottled juice on wooden table in 3d vector illustration      Cache   Translate Page   Web Page Cache   
Бутылки с виноградным соком - 3D иллюстрации в векторе | Grape bottled juice on wooden table in 3d vector illustration

Бутылки с виноградным соком - 3D иллюстрации в векторе | Grape bottled juice on wooden table in 3d vector illustration
7 files | EPS + preview | 76 Mb

          Ледяной латте - векторные 3D иллюстрации для рекламы | Iced latte ads in 3d vector illustration      Cache   Translate Page   Web Page Cache   
Ледяной латте - векторные 3D иллюстрации для рекламы | Iced latte ads in 3d vector illustration

Ледяной латте - векторные 3D иллюстрации для рекламы | Iced latte ads in 3d vector illustration
4 files | EPS + preview | 73 Mb

          Консервированная кукуруза - 3D иллюстрации - векторный клипарт | Organic canned corn ads in 3d vector illustration      Cache   Translate Page   Web Page Cache   
Консервированная кукуруза - 3D иллюстрации - векторный клипарт | Organic canned corn ads in 3d vector illustration

Консервированная кукуруза - 3D иллюстрации - векторный клипарт | Organic canned corn ads in 3d vector illustration
7 files | EPS + preview | 103 Mb

          Луговая трава, цветы - коллекция бесшовных фонов | Meadow - 50 Vector Seamless Patterns      Cache   Translate Page   Web Page Cache   
Луговая трава, цветы - коллекция бесшовных фонов | Meadow - 50 Vector Seamless Patterns

Луговая трава, цветы - коллекция бесшовных фонов | Meadow - 50 Vector Seamless Patterns

JPG | 5000x5000 | 480 mb

          รวมภาพ การ์ดวันแม่ แบบสวยๆ ไอเดียทำการ์ดวันแม่      Cache   Translate Page   Web Page Cache   

รวมภาพ การ์ดวันแม่ แบบสวยๆ ไอเดียการ์ดวันแม่ ไอเดียทำของขวัญให้แม่ การเขียนการ์ดวันแม่บอกความรู้สึกถึงแม่ ในวันแม่แห่งชาติ มอบการ์แทนความรู้สึกดีเขียนบรรยายความรู้สึกจากใจถึงแม่ เรียงความวันแม่, การ์ดวันแม่,กลอนวันแม่ ,คำขวัญวันแม่,วันแม่แห่งชาติ   รวมภาพ การ์ดวันแม่ แบบสวยๆ Vector illustration credit: Vecteezy source : pinterest   source : pinterest   ไอเดียทำการ์ดวันแม่ การ์ดป๊อปอัพบอกรักแม่ ข้อความ I ♥ U source : pinterest การ์ดป๊อปอัพบอกรักแม่ I Love You เป็นรูปมือเปิดมาเจอข้อความ so much source : pinterest เพียงแค่ใช้กระดาษ พับครึ่ง เอามือมาทาบ แล้วนำมือดินสอมาร่าง ตัดกระดาษตามรอย ข้อความตรงกลางตัดกระดาษยาวพับไปมา ติดกาวหัวท้าย เพียงแค่นี้บอกรักแม่ source : pinterest การ์ดป๊อปอัพดอกไม้ที่ซ้อนกันสีสันสวยงาม […]

The post รวมภาพ การ์ดวันแม่ แบบสวยๆ ไอเดียทำการ์ดวันแม่ appeared first on TCAS61 gat pat 61 รับตรง 61 แนวข้อสอบ กพ..


          A Comparative Study on Discrete Shmaliy Moments and Their Texture-Based Applications      Cache   Translate Page   Web Page Cache   
In recent years, discrete orthogonal moments have attracted the attention of the scientific community because they are a suitable tool for feature extraction. However, the numerical instability that arises because of the computation of high-order moments is the main drawback that limits their wider application. In this article, we propose an image classification method that avoids numerical errors based on discrete Shmaliy moments, which are a new family of moments derived from Shmaliy polynomials. Shmaliy polynomials have two important characteristics: one-parameter definition that implies a simpler definition than popular polynomial bases such as Krawtchouk, Hahn, and Racah; a linear weight function that eases the computation of the polynomial coefficients. We use IICBU-2008 database to validate our proposal and include Tchebichef and Krawtchouk moments for comparison purposes. The experiments are carried out through 5-fold cross-validation, and the results are computed using random forest, support vector machines, naïve Bayes, and k-nearest neighbors classifiers.
          Identifying e-Commerce in Enterprises by means of Text Mining and Classification Algorithms      Cache   Translate Page   Web Page Cache   
Monitoring specific features of the enterprises, for example, the adoption of e-commerce, is an important and basic task for several economic activities. This type of information is usually obtained by means of surveys, which are costly due to the amount of personnel involved in the task. An automatic detection of this information would allow consistent savings. This can actually be performed by relying on computer engineering, since in general this information is publicly available on-line through the corporate websites. This work describes how to convert the detection of e-commerce into a supervised classification problem, where each record is obtained from the automatic analysis of one corporate website, and the class is the presence or the absence of e-commerce facilities. The automatic generation of similar data records requires the use of several Text Mining phases; in particular we compare six strategies based on the selection of best words and best n-grams. After this, we classify the obtained dataset by means of four classification algorithms: Support Vector Machines; Random Forest; Statistical and Logical Analysis of Data; Logistic Classifier. This turns out to be a difficult case of classification problem. However, after a careful design and set-up of the whole procedure, the results on a practical case of Italian enterprises are encouraging.
          Anki's Vector Is a Little AI-Powered Robot Now on Kickstarter for $200      Cache   Translate Page   Web Page Cache   
Is this the personal home robot we've been waiting for? No, but Vector will make you smile
          Power Reduction In A Constrained World      Cache   Translate Page   Web Page Cache   
Why it's critical to make power a key vector for design convergence.
          Expand/collapse cards with figure cut text      Cache   Translate Page   Web Page Cache   

See the Code - See it Full Page - See Details

Expand/collapse cards with text cut according to the shape of the label. Using CSS clip-path to create a reveal effect on the text hidden behind vintage labels. Labels from freepik.com - “Logo vector created by Freepik”

This Pen uses: HTML, CSS, JavaScript, and


          BEZA ANTARA NATURAL PRODUK, ORGANIC PRODUK & KIMIA SINTETIK PRODUK      Cache   Translate Page   Web Page Cache   
BEZA ANTARA NATURAL PRODUK, ORGANIC PRODUK & KIMIA SINTETIK PRODUK. Sekarang ni produk produk kecantikkan memang bersepah. Masing masing mengaku produk depa natural & oranic. ramai elak mengaku produk depa sebenarnya base dari kimia sentetik sebab mentaliti masyarakat sekarang kimia tu bahaya sedangkan bukan semua produk yang ada kimia tu bahaya. Selagi dalam dos yang di benarkan & dalam kawalan.. Tak jadi bahaya. Sebab dalam kehidupan kita memang sentiasa berkaitan dengan kimia pun...


Ramai yang salah faham dalam membezakan antara natural produk, organik produk & kimia sintetik produk. Dia main hentam je claim produk dia natural la.. organic la.. Dia bukan tau pun sebenarnya produk dia tu kimia sintetik. Ada yang tau produk dia bukan natural pun.. Tapi biasa la marketing. Cakap natural je berpusu pusu orang beli. Konon kalau natural ni selamat.

Hari ni saya nak share hasil pembacaan saya tentang perbezaan antara natural produk, organic produk & kimia sintetik produk.

NATURAL PRODUK

Produk yang dikategorikan sebagai semulajadi (Natural) dirumus menggunakan bahan-bahan semulajadi atau berasaskan tumbuh-tumbuhan misalnya minyak zaitun (olive oil), pati minyak lavender (lavender essential oil), shea butter, aloe vera, dan lain-lain.

Contoh label bahan produk Natural :

aqua, caprylic/capric triglyceride (coconut derived), stearic acid (vegetable derived), dicaprylyl ether (vegetable derived), Helianthus annuus (sunflower) seed oil, Eucalyptus globules (eucalyptus) essential oil, sorbitan stearate (vegetable derived), menthol, isostearyl hydroxystearate (vegetable derived), tapioca starch, Origanum vulgare (oregano) leaf extract, menthe viridis (spearmint) extract, Melissa officinalis (Lemon balm), xanthan gum, glyceryl caprylate (coconut, palm and glycerine derived), Anisic acid (anise seed derived), phytic acid (rice bran derived), farnesol, linalool.

PRODUK ORGANIK

Produk yang dikategorikan sebagai organik (Organic) dirumus menggunakan bahan-bahan yang diiktiraf organik misalnya minyak zaitun organik (organic olive oil), pati minyak lavender organik (organic lavender essential oil), aloe vera organik (organic Aloe Barbadensis), dan sebagainya. Biasanya produk sebegini telah mendapat pengiktirafan organik oleh badan antarabangsa (contohnya USDA Organic atau Australian Organic Certification) dan lambang badan pengiktirafan tersebut dicetak pada label produk.

Contoh label pada produk krim tangan organik :

Certified Organic Butyrospermum Parkii (Shea) Fruit Butter, Certified Organic Aloe Barbadensis (Aloe Vera) Leaf Juice, Aqua, Certified Organic Ethanol (Sugar Cane Alcohol), Non-Gmo Lecithin, Sclerotium Rolfsii, Citrus Aurantium Amara (Bitter Orange) Fruit Extract, Certified Organic Pelargonium Graveolens (Geranium) Essential Oil, Certified Organic Olea Europaea (Olive) Juice Extract, Certified Organic Rosa Damascena (Rose) Essential Oil.

PRODUK KIMIA SINTETIK

Manakala produk penjagaan kulit konvensional pula biasanya dirumus menggunakan pelbagai bahan kimia sintetik.

Contoh label krim tangan produk berasaskan kimia sintetik :

Water, Glycerin, Cetearyl Alcohol, Stearic Acid, Sodium Cetearyl Sulfate, Methylparaben, Propylparaben, Dilauryl Thiodipropionate, Sodium Sulfate, Fragrance

Sumber : ‘Organic’, ‘Natural’ dan ‘Synthetic Chemical’

Pengalaman saya menggunakan natural produk dari jenama Garden Of eden.. Natural produk ni memang tak ada bau wangi (perfume). Bau dia memang natural.. Macam tak ada bau sangat. Cleanser dia pun tak berbuih.. Kalau ada yang claim produk dia natural tapi bau maha pontianak harum sundal malam (wangi) saya akan jadi curiga hahahaha. Dah nama natural so bau dia confirm la natural je. Kalau dah wangi macam perfume.kalau bau bunga.. dia tak sama macam pewangi ni. hehehe. Natural ke? . Entah la.. kekekeke

Apapun semoga perkongsian ni memberi manafaat kepada semua. Kalau ada salah silap mohon betulkan yer..

Moral of the story.. Jika anda seorang pengeluar, penjual atau pengedar sesuatu produk.. sila bersikap jujur. Jangan menipu ingredient produk semata mata untuk melariskan jualan. Walau produk anda bebas bahan terlarang sekalipun kalau ada unsur penipuan seperti overclaim.. Pun di kira menipu jugak ok! Apa??? Tipu sunat? takde istilah tipu sunat.. sunat kang baru tau!!!

          ANCIENNE LAMPE CHEVET JUMO N71 ANNEE ENVIRON 1960      Cache   Translate Page   Web Page Cache   
200,00 EUR (0 Enchères)
Date de fin: dimanche août-19-2018 9:43:23 CEST
Enchérir | Ajouter à vos Affaires à suivre

          Vodafone Germany launches super vectoring VDSL tariff      Cache   Translate Page   Web Page Cache   
(Telecompaper) From 07 August, Vodafone Germany is making super-vectoring broadband connections, supporting speeds up to 250 Mbps, available to 6 million households nationwide...
          UASLP vector logo      Cache   Translate Page   Web Page Cache   
UASLP vector logo

UASLP vector logo in (.EPS, .AI, .CDR) format. Free download UASLP current logo in vector format. Direct link and Totally FREE!

The post UASLP vector logo appeared first on Vector logos and Logotypes free download - LogoEPS.com.


          Ministers not paid enough; harder to attract people to government in the future: Emeritus Senior Minister Goh Chok Tong      Cache   Translate Page   Web Page Cache   
ESM Goh responds to 'heated reactions' to remarks on ministerial pay, says salaries not starting point in talent hunt
He welcomes feedback, says key factors such as character, selflessness matter too
By Elgin Toh, Deputy Political Editor, The Straits Times, 9 Aug 2018

Emeritus Senior Minister Goh Chok Tong has acknowledged the "heated reactions" from Singaporeans to his comments on ministerial salaries last week.

Mr Goh had said at a forum with residents from the South East District last Thursday that Cabinet ministers are not paid enough, and that it would become harder to attract good people to join the Government in the future.

His words have attracted mainly critical feedback online from Singaporeans.


Some said high salaries may attract people for the wrong reasons. Others noted that the salaries of ministers are already among the highest in the world.


Responding through a Facebook post yesterday, Mr Goh said he saw a silver lining in the comments: "It shows Singaporeans care deeply and hold leaders to account for their words and performance."


"I welcome diverse and dissenting views. I hope to engage them, perhaps through a forum in due course," he added.




On his point about ministerial salaries, Mr Goh stuck to his guns, explaining in his latest post why he sees pay as important.

"In times of prolonged crisis and upheaval, I have no doubt that Singaporeans will step forward to serve. Money would not be a key vector.


"In peace and prosperity, however, there are no dragons to slay. Personal aspirations, freedom, privacy and lifestyle take precedence," he said.


Singaporeans, he added, "know quality costs money - from durians to clothes to football players to military weapons".

He said: "Having run Singapore for 14 years as prime minister, my main concern remains how to bring Singapore forward. Leadership is key."



Mr Goh also addressed another remark that some people have taken issue with, in which he appeared to say that those who are not able to command a high salary are "very, very mediocre" people.

In his post yesterday, he said: "I do not mean nor believe that Singaporeans at whatever level of income are mediocre. Those who have worked with me know people matter the most to me. That is what I am in politics for."

He said some Singaporeans have written to him directly to express their views.

He published an excerpt of his reply to a final-year medical student in an overseas university, in which he argued that a person's abilities, competence and performance are reflected in his salary.

But other attributes not reflected in the salary matter too, Mr Goh also said in the reply.

He wrote: "Salaries are not our starting point in looking for ministers. Character, motivation, commitment, selflessness, practical abilities, competence and proven performance are the main attributes we look for. The first four attributes are veto factors."

The student "seemed to be persuaded by my response", and has offered to volunteer at Mr Goh's Meet-the-People Session in Marine Parade GRC, he noted.

"I hope more Singaporeans will think deeply about how to ensure Singapore succeeds," he concluded, adding: "Singapore deserves the best. Happy National Day! "





















Cut pay for ministers? Singapore will pay price: ESM Goh
Doing so would be popular, but will make it harder for Government to attract good people
By Elgin Toh, Deputy Political Editor, The Straits Times, 8 Aug 2018

Emeritus Senior Minister Goh Chok Tong has sounded a warning that Cabinet ministers are not paid enough and that down the road, Singapore will be confronted with the problem of getting competent people to join the Government.

Speaking at a dialogue with South East District residents last week, he disclosed that MP Edwin Tong, a lawyer, took a 75 per cent pay cut when he became a senior minister of state on July 1. Mr Tong previously earned more than $2 million a year as senior counsel and now makes about $500,000, Mr Goh said.



He made the point last Thursday in response to Braddell Heights resident Abdul Aziz, 70, who asked if ministerial salaries could be cut to fund pensions for elderly people.

The idea of helping the elderly more is not wrong - "we must do something for them", Mr Goh said.

But he dismissed the idea of cutting ministers' pay, calling it populist. If ministers are not paid well, "very, very mediocre" people will be ministers in the long run, he said. "Think about that. Is it good for you, or is it worse for us in the end?"

Giving an example of the impact of inadequate ministerial salaries, he related the difficulty he faced in drawing talented people to politics.



Mr Goh, who was prime minister from 1990 to 2004, said he tried but failed to persuade two from the private sector to stand in the 2015 General Election. One earned $10 million, and the other, $5 million, a year, he said.

Mr Tong, 48, who was a partner at leading law firm Allen and Gledhill, is an exception, because he wants to serve, Mr Goh added.

Mr Goh said that after Prime Minister Lee Hsien Loong approached Mr Tong to be a senior minister of state, Mr Tong went to see Mr Goh. They are fellow MPs for Marine Parade GRC.

Mr Goh recalled their conversation: "He said, at this stage of his life, he has got a house, he has got a mother-in-law to support, a father-in-law to support, his own parents and so on, what should he do?

"So I asked him, 'Edwin, what are you in politics for?' He said, 'Here to serve.' So I said, 'Well, you know, between $2 million and perhaps half a million, later on you hopefully become a full minister, $1 million, you have to decide which is more important.'

"He said, 'Yes, I will take it on.' And he felt very strongly that he could do the job."

Mr Goh added: "We dare not pay ministers a good wage."

When asked, Mr Tong told The Straits Times that he prefers not to comment.

Mr Tong entered politics in 2011 when he was elected an MP in the general election. The issue of ministerial salaries was hotly debated during the election, and in the aftermath, an independent committee was formed to review the salaries of office-holders.

The Government later accepted the committee's recommendation of an across-the-board reduction in ministerial salaries. The starting pay of entry-level ministers was cut by more than a third, to $935,000.



Last year, an independent committee that reviewed the salaries recommended an increase for salaries to keep pace with market developments. But the Government decided against it, saying that the economy was still in transition.

Mr Goh's remarks were first reported by The Online Citizen on Sunday, based on a transcript of the exchange obtained from Mr Goh's press secretary.

At the dialogue, Mr Goh also disagreed with Mr Abdul Aziz's other suggestion: cut defence spending to fund pensions for the elderly.

He said Singapore's unique geographical situation requires it to pay for expensive advance warning systems, as hostile planes can reach Singapore within minutes.

He added that investors will not put their money here if defence were inadequate - a situation that will result in unemployment.














 





Transcript of Remarks by ESM Goh Chok Tong During the Southeast CDC District Conference on 2nd August 2018

Abdul Aziz (from Braddell Heights RC): I am 70 years old, so I am really concerned about issues that are about the elderly. Unfortunately, I would say that the bad picture which has been painted is that the elderly have been forced to work, cleaning toilets, serving tables, just to survive. And the example that Dr Maliki said (of a senior working just because she wants to, not because she needs to), perhaps it is the exception rather than the whole.

I think not many people will believe you if you say that elderly work because they want to mix, because they want to do exercise. Perhaps they work because they need to work. So in this case, may I just suggest that perhaps can we have some sort of an elderly pension fund, for the elderly. We will have an appropriate means test and all that, to make sure it is not being abused.

And Mayor will ask me how do we fund this fund? Perhaps, maybe can I say we cut a bit on the defence, one F-15 maybe can pay for the whole fund. Or perhaps even the Ministers with the million-dollar salaries, can we perhaps cut by 10 per cent in order to fund this fund? These are just my suggestions. Thank you very much.


Grassroots Adviser Lim Biow Chuan: Firstly, there is Silver Support. I think you know there is Silver Support, and Silver Support does help quite a number of our seniors. I am really unsure that we should be too hard on elderly who want to work. To me, if Singaporeans, if you are low-income, the Government does take quite good care of you. There are actually many many schemes to help look after those who are poor.

Now if you are not poor, and you want to work, I personally think it is a good thing, because if not, then what do you expect the elderly to do at home? I always tell seniors whom I meet, go and do something, whether it is volunteer work, whatever. Because if you stay at home, the chances of you getting dementia is quite high.

When my father was alive, he was running a fruit stall. Now he runs it in a very poor manner and he loses money every month. So then he decided one day that he would sublet it out and take some rental income. And so he went home and then he stayed at home. After a few months I looked at my father and I thought his situation was deteriorating.

So I told him why don’t you take back the fruit stall, I will pay for your every month losses, because to me it is cheaper to pay for your every month losses than eventually pay for the dementia medical expenses. So he runs the stall, he just sits there and the fruits rot after a while. I was happy because he meets people, he talks to people, and it keeps him going. He doesn’t have to go and collect cardboard boxes, but the reality is that if he does nothing, I am more worried.

My sense is always that we shouldn’t always look to the government to solve the issues of the elderly. It is every child’s responsibility to look after their parents, because your parents looked after you when you are young. To all those who are getting elderly, I hope that you don’t think that your children should not look after you. These are their responsibilities. And this is what filial piety is all about. Now, if for whatever reason your children can’t look after you, come and talk to us.

We have many schemes where we will be able to help to those who are lower income to look after themselves. But if you look at people and they are working, whether as a cleaner and all that, don’t feel embarrassed about that.

My mum, about 10 years ago, worked in a coffeeshop as a cleaner. Because she is bored at home. And she asked me, would it embarrass you? I said no, I mean it is a decent job, you want to go and work, I won’t stop you from working. Because if you think it is a decent job, so be it. She is not robbing someone, she is not relying on charity, she wants to work as a coffeeshop cleaner because she gets to do something, she mixes with people, she is happy and I am happy.

So now that she is older, she is retired. But I honestly feel let’s not be too harsh or too judgmental on elderly who need to work. So if you do meet people whom you think need help, come and talk to us. We will be able to assess them and we will be able to render assistance. Whether we should fund that through 10 per cent cut from MINDEF, I think we better let the Senior Minister of State (referring to SMS Maliki Osman) answer.


SMS Maliki Osman: We will get ESM to share his perspective first.

(ESM asks for the mic to be passed to Abdul Aziz)





ESM Goh: I want to ask you, first of all, if the old lady and old men do not clean the tables, who are going to clean the tables?


Abdul Aziz: We have maybe youngsters or students who want to earn.

(ESM Goh turns to young people in the audience: “Do any of you want to stop education to clean tables? Any of you? Please put up your hands.”)


ESM Goh: This is a very populist kind of question, which will get you votes and make you President of Singapore! So it is a serious populist question which I want to debunk. Who is going to clean the table for you? Students won’t do it. Shall we have foreign workers to clean the tables?


Abdul Aziz: May I suggest, maybe we have to ask ourselves, why is it that nobody wants to clean tables? That is because the pay is so measly. Minimum wage pay, perhaps we can get people to clean the tables.


ESM Goh: Ok, how much should we pay a cleaner to clean the tables? $1,000?

(ESM Goh turns to audience: “Will you clean tables for $1,000? Please put up your hands.”)


ESM Goh: No, I am serious, $1,000, who is going to clean the tables? Somebody must clean the tables. I am not suggesting old folks should clean the tables. I say give it to contractors, who will then employ people to clean the tables.

Contractors, who do they look for? First and foremost, they want foreign workers. If you give them foreign workers, we end up with foreign workers cleaning tables, they don’t want old people. But are you going to allow more foreign workers in Singapore, just to clean tables? Those who are in support, please put up your hands, then you end up with another 100,000 foreign workers to clean tables. If you are from India, Bangladesh, $1,000 to clean tables, thank you very much, please let me clean more tables.

So contractors have no choice but to employ older ones. We feel sorry for that. How do we help them? Well, we have this income supplement. If the cleaners who clean the table are paid a standard market wage, a bit low from our point of view, there is this wage supplement to up their salary.

If you feel sorry for them, we can have a minimum wage for old people, we can do that. Does it work? How much is the minimum wage?

Well, we do that, your hawker price will go up, please don’t complain. Are you going to complain that the hawker prices are going up because they are paying more to the workers? That is my point.

The second point which Mr Lim has addressed, to some of these people, a job is very important, not just the pay. If you say please give them a pension, that is again a very popular idea, and there are some societies which actually do that, when you reach a certain age, you get pension for life.

Somebody must pay for the pension. And you got it right. Take it from somewhere else. Had you suggested to up GST by 2 per cent and give them the pension, I would have applauded you.

Seriously. Because you are then taxing the whole society to support older ones. But you did not. You said cut from defence, 1 per cent is enough. And on top of that, you said cut Ministers’ salaries. That is very populist.

I am telling you the Ministers are not paid enough, and down the road, we are going to get a problem with getting people to join the government, because civil servants now earn more than Ministers.

Are you aware of that? And where do we get our future office holders from? From the private sector? I have tried for the last election. Two of them, earning $5 million per month, $10 million per month (sic – ESM meant per year).

To be a Minister for $1 million? No, no, my family is not happy with (unclear). Those approached say money is not the issue. But if you earn $5 million, $10 million, and you pay at least $1 million, many people would come, but not from the private sector.

But maybe some you can get. Edwin Tong, he is a Senior Counsel, he earns more than $2 million. PM asked him to be a Minister of State – one quarter (salary). He came to see me. He said, at this stage of his life, he has got a house, he has got a mother-in-law to support, a father-in-law to support, his own parents and so on, what should he do?

So I asked him, Edwin, what were you in politics for? (He said) Here to serve. So I said you’ve got to serve, well, you know between $2 million and perhaps half a million, later on you hopefully become a full Minister, $1 million, you have to decide which is more important. So Edwin told me his job in politics is to serve. He said yes, I will take on, and he felt very strongly that he could do the job.

But now we dare not pay Ministers a good wage. To anyone of us here, $1 million is a lot of money.

So where do you want to get your Ministers from? From people who earn only $500,000 a year, whose capacity is $500,000 a year?

So (when) I look for Ministers, anybody who wants to be paid more than half a million, I won’t take him. You are going to end up with very very mediocre people, who can’t even earn a million dollars outside to be our Minister.

Think about that. Is it good for you, or is it worse for us in the end?

Then you said take from MINDEF. Well, MINDEF we cap it at 6 per cent, we don’t spend 6 per cent of GDP. Take it from MINDEF. Do we take it from national servicemen, pay them less? Or we buy less weapons, your weapons?

So you think through. If you say you know National Service, don’t pay National Servicemen that well, take from there to pay your older people. Yeah, maybe that is doable, because we are taking from the young to pay them.

But if I say cut, don’t buy a submarine, ok maybe we do that. Don’t buy your F-16, F-35, don’t buy your radar.

You have done National Service, you know that defending Singapore is defending a point. You are not defending a territory of 300 square miles, 3,000 square miles, 10,000 square miles, you are defending a point.

If you defend a point, you need to have advanced radar. Our neighbours don’t need it. But a plane from a neighbouring country can come to Singapore within two to three minutes to drop a bomb here, if we are fighting one another.

Have you got time to run to the nearest stronghouse, bomb shelter? Have you got time to run? By the time the siren comes up, before you can run, the plane is already here. We need an advanced warning system. That costs money.

Well in the end you say why, we are so small anyway, we can’t defend ourselves, why defend, just spend the money on all these.

If you can’t defend yourselves, are you going to get the investors over here? I put money over here, there is no guarantee about my investments, I won’t put money here. Are you going to get the economic growth? You are going to have unemployment. You won’t get growth.

Where do you get your money from to pay old folks like you and me? Think about that.

So there is a whole system. So the point I am making is, don’t just ask populist questions.

Before you ask such populist questions – just take from here and there to help old people – where would the money come from? If it is from the younger generation for the older ones, yes, we are prepared to do it.

Your idea is not wrong, we must do something for the older ones. Silver Support, some kind of a scheme that we can work on later on. But how to fund it?

That is what I am hitting at. It is not the idea of supporting older ones. I think that is correct. There are many retirees, they haven’t got funds, they need to be supported.

But how do you fund it, you see. That is key. How to fund it for the future? Make it sustainable? Once you have a scheme to pay anybody over 65 a certain minimum wage, you can’t take it away, you’ve got to think of how to raise taxes to pay that.

Ok so one part of your question is very good, but your suggestion is very bad on how to solve the problem.



          L-Shapley and C-Shapley: Efficient Model Interpretation for Structured Data. (arXiv:1808.02610v1 [cs.LG])      Cache   Translate Page   Web Page Cache   

Authors: Jianbo Chen, Le Song, Martin J. Wainwright, Michael I. Jordan

We study instancewise feature importance scoring as a method for model interpretation. Any such method yields, for each predicted instance, a vector of importance scores associated with the feature vector. Methods based on the Shapley score have been proposed as a fair way of computing feature attributions of this kind, but incur an exponential complexity in the number of features. This combinatorial explosion arises from the definition of the Shapley value and prevents these methods from being scalable to large data sets and complex models. We focus on settings in which the data have a graph structure, and the contribution of features to the target variable is well-approximated by a graph-structured factorization. In such settings, we develop two algorithms with linear complexity for instancewise feature importance scoring. We establish the relationship of our methods to the Shapley value and another closely related concept known as the Myerson value from cooperative game theory. We demonstrate on both language and image data that our algorithms compare favorably with other methods for model interpretation.


          Incrementally and inductively constructing basis of multiplicative dependence lattice of non-zero algebraic numbers. (arXiv:1808.02712v1 [cs.SC])      Cache   Translate Page   Web Page Cache   

Authors: Tao Zheng

Let $x=(x_1,x_2,\cdots,x_n)^T$ be a vector of non-zero algebraic numbers, the set $\mathcal{R}_x:=\{(k_1,k_2,\cdots,k_n)^T\in\mathbb{Z}^n\;|\;x_1^{k_1}x_2^{k_2}\cdots x_n^{k_n}=1\}$ is called \emph{the multiplicative dependence lattice} of $x$. This paper develops an efficient incremental algorithm to compute a basis of $\mathcal{R}_x$. This algorithm constructs inductively a basis of the lattice as the dimension increases. This is the very first algorithm for computing the basis of the lattice, although a lot of efforts have been made to understand this lattice. In this paper we propose the conception of the \emph{rank} of a finite sequence of non-zero algebraic numbers, which turns out to be closely related to the rank of the lattice, and as well as to the complexity. The complexity of the algorithm depends not mainly on the dimension $n$ but on the rank of the sequence $x_1,x_2,\cdots,x_n$, which can be much smaller than $n$.


          Unsupervised Total Variation Loss for Semi-supervised Deep Learning of Semantic Segmentation. (arXiv:1605.01368v3 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Mehran Javanmardi, Mehdi Sajjadi, Ting Liu, Tolga Tasdizen

We introduce a novel unsupervised loss function for learning semantic segmentation with deep convolutional neural nets (ConvNet) when densely labeled training images are not available. More specifically, the proposed loss function penalizes the L1-norm of the gradient of the label probability vector image , i.e. total variation, produced by the ConvNet. This can be seen as a regularization term that promotes piecewise smoothness of the label probability vector image produced by the ConvNet during learning. The unsupervised loss function is combined with a supervised loss in a semi-supervised setting to learn ConvNets that can achieve high semantic segmentation accuracy even when only a tiny percentage of the pixels in the training images are labeled. We demonstrate significant improvements over the purely supervised setting in the Weizmann horse, Stanford background and Sift Flow datasets. Furthermore, we show that using the proposed piecewise smoothness constraint in the learning phase significantly outperforms post-processing results from a purely supervised approach with Markov Random Fields (MRF). Finally, we note that the framework we introduce is general and can be used to learn to label other types of structures such as curvilinear structures by modifying the unsupervised loss function accordingly.


          Robust Photometric Stereo via Dictionary Learning. (arXiv:1710.08873v3 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Andrew J. Wagenmaker, Brian E. Moore, Raj Rao Nadakuditi

Photometric stereo is a method that seeks to reconstruct the normal vectors of an object from a set of images of the object illuminated under different light sources. While effective in some situations, classical photometric stereo relies on a diffuse surface model that cannot handle objects with complex reflectance patterns, and it is sensitive to non-idealities in the images. In this work, we propose a novel approach to photometric stereo that relies on dictionary learning to produce robust normal vector reconstructions. Specifically, we develop two formulations for applying dictionary learning to photometric stereo. We propose a model that applies dictionary learning to regularize and reconstruct the normal vectors from the images under the classic Lambertian reflectance model. We then generalize this model to explicitly model non-Lambertian objects. We investigate both approaches through extensive experimentation on synthetic and real benchmark datasets and observe state-of-the-art performance compared to existing robust photometric stereo methods.


          The steerable graph Laplacian and its application to filtering image data-sets. (arXiv:1802.01894v2 [cs.CV] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Boris Landa, Yoel Shkolnisky

In recent years, improvements in various image acquisition techniques gave rise to the need for adaptive processing methods, aimed particularly for large datasets corrupted by noise and deformations. In this work, we consider datasets of images sampled from a low-dimensional manifold (i.e. an image-valued manifold), where the images can assume arbitrary planar rotations. To derive an adaptive and rotation-invariant framework for processing such datasets, we introduce a graph Laplacian (GL)-like operator over the dataset, termed ${\textit{steerable graph Laplacian}}$. Essentially, the steerable GL extends the standard GL by accounting for all (infinitely-many) planar rotations of all images. As it turns out, similarly to the standard GL, a properly normalized steerable GL converges to the Laplace-Beltrami operator on the low-dimensional manifold. However, the steerable GL admits an improved convergence rate compared to the GL, where the improved convergence behaves as if the intrinsic dimension of the underlying manifold is lower by one. Moreover, it is shown that the steerable GL admits eigenfunctions of the form of Fourier modes (along the orbits of the images' rotations) multiplied by eigenvectors of certain matrices, which can be computed efficiently by the FFT. For image datasets corrupted by noise, we employ a subset of these eigenfunctions to "filter" the dataset via a Fourier-like filtering scheme, essentially using all images and their rotations simultaneously. We demonstrate our filtering framework by de-noising simulated single-particle cryo-EM image datasets.


          Dynamic Effective Resistances and Approximate Schur Complement on Separable Graphs. (arXiv:1802.09111v2 [cs.DS] UPDATED)      Cache   Translate Page   Web Page Cache   

Authors: Gramoz Goranci, Monika Henzinger, Pan Peng

We consider the problem of dynamically maintaining (approximate) all-pairs effective resistances in separable graphs, which are those that admit an $n^{c}$-separator theorem for some $c<1$. We give a fully dynamic algorithm that maintains $(1+\varepsilon)$-approximations of the all-pairs effective resistances of an $n$-vertex graph $G$ undergoing edge insertions and deletions with $\tilde{O}(\sqrt{n}/\varepsilon^2)$ worst-case update time and $\tilde{O}(\sqrt{n}/\varepsilon^2)$ worst-case query time, if $G$ is guaranteed to be $\sqrt{n}$-separable (i.e., it is taken from a class satisfying a $\sqrt{n}$-separator theorem) and its separator can be computed in $\tilde{O}(n)$ time. Our algorithm is built upon a dynamic algorithm for maintaining \emph{approximate Schur complement} that approximately preserves pairwise effective resistances among a set of terminals for separable graphs, which might be of independent interest.

We complement our result by proving that for any two fixed vertices $s$ and $t$, no incremental or decremental algorithm can maintain the $s-t$ effective resistance for $\sqrt{n}$-separable graphs with worst-case update time $O(n^{1/2-\delta})$ and query time $O(n^{1-\delta})$ for any $\delta>0$, unless the Online Matrix Vector Multiplication (OMv) conjecture is false.

We further show that for \emph{general} graphs, no incremental or decremental algorithm can maintain the $s-t$ effective resistance problem with worst-case update time $O(n^{1-\delta})$ and query-time $O(n^{2-\delta})$ for any $\delta >0$, unless the OMv conjecture is false.


          ASSISTANT PROFESSOR - INSECT VECTOR BIOLOGIST / INSECT PHYSIOLOGIST - University of Wisconsin–Madison - Madison, WI      Cache   Translate Page   Web Page Cache   
Assistant Professor - Insect Vector Biologist / Insect Physiologist. Position Vacancy ID:....
From University of Wisconsin–Madison - Mon, 30 Apr 2018 06:48:38 GMT - View all Madison, WI jobs
          Anki presenta il nuovo robot Vector      Cache   Translate Page   Web Page Cache   
none
          Vector è il nuovo piccolo robot di Anki      Cache   Translate Page   Web Page Cache   
none
          Anki's Vector Is a Little AI-Powered Robot Now on Kickstarter for $200      Cache   Translate Page   Web Page Cache   
Is this the personal home robot we've been waiting for? No, but Vector will make you smile
          vector is an anki’s AI-powered desktop robot and the future of home droids      Cache   Translate Page   Web Page Cache   

the mini bot can detect the user's face, answer your questions and play games too.

The post vector is an anki’s AI-powered desktop robot and the future of home droids appeared first on designboom | architecture & design magazine.


          ربات اسباب بازی Vector، رویای دیرینه طرفداران استار وارز را برآورده می کند      Cache   Translate Page   Web Page Cache   

کمپانی Anki که احتمالاً بیشترین شهرت خود را مدیون ساخت ربات دوست داشتنی Cozmo برای کودکان است، اخیراً از رباتی دیگر به نام Vector رونمایی کرده که نه تنها تمام قابلیت های Cozmo را بهبود می بخشد، بلکه دیگر نیازی ...

The post ربات اسباب بازی Vector، رویای دیرینه طرفداران استار وارز را برآورده می کند appeared first on دیجیاتو.


          Ziften adds AV to the Zenith endpoint protection platform to stop attacks      Cache   Translate Page   Web Page Cache   

Ziften announced its Zenith endpoint protection platform now includes AV protecting all enterprise endpoints from known and unknown targeted attacks. Ziften helps enterprises simplify endpoint protection plus visibility. Zenith is the cyber security platform that provides one agent for all endpoints – laptops, desktops, servers, and cloud – preventing multi-vector attacks with advanced AV, detection and response, plus visibility and hardening. Attackers have created a criminal industry by attacking vulnerable enterprise endpoints. And traditional AV … More

The post Ziften adds AV to the Zenith endpoint protection platform to stop attacks appeared first on Help Net Security.


          Anki unveils Vector home robot that can detect your face, answer questions, and play games, shipping in October for $249.99, says it has sold 1.5M robots (Sean Captain/Fast Company)      Cache   Translate Page   Web Page Cache   

Sean Captain / Fast Company:
Anki unveils Vector home robot that can detect your face, answer questions, and play games, shipping in October for $249.99, says it has sold 1.5M robots  —  If there's a robot uprising anytime soon, it seems unlikely to start in our living rooms.  Robotic vacuums like Roomba sell well because they are so handy.


          Larvicides Market - Positive Outlook for Industry Opportunities & Trends for Expansion in 2018-2028      Cache   Translate Page   Web Page Cache   

Albany, NY -- (SBWIRE) -- 08/08/2018 -- Global Larvicides Market Outlook

According to WHO, approximately 40% of the population mostly those living in the world's poorest countries face the risk of suffering from some of the dreadful diseases like malaria. Every year more than 500 million people fall prey to malaria and dengue diseases. Most cases and deaths are in sub-Saharan Africa regions.

Environmental, socio-economic, and climatic factors (temperature, humidity and rainfall) affect disease infection and influence transmission patterns of these diseases. Government and several concerned organization have been taking preventive measures to control malaria diseases. Larvicides is one critical solution to these kind of problems. Larvicides prevents larvae from developing into adult mosquitoes. Larvicides can either be contact poisons, stomach poisons, growth regulators or biological control agents.

Request For Report Brochure For Latest Industry Insights @ https://www.transparencymarketresearch.com/sample/sample.php?flag=B&rep_id=45867

Global Larvicides Market: Key Developments

In the year 2015, Sumitomo Chemical, developed SumiLarv® 2 MR, a novel, long-lasting larvicide formulation that is effective in preventing dengue fever..
In the year 2014, Syngenta, initiated the second phase expansion of its Innovation Center in Triangle Park. The $94 million expansion will include 200,000 square feet of specially designed laboratories, office areas and meeting spaces connected to the Advanced Crop Lab.
In the year 2017, Russell IPM launched Optiroll Super plus, in the USA market during the Biocontrol East exhibition.

Opportunities for Larvicides Market Participants

Asia, Latin America, the Middle East, sub-Saharan Africa and several parts of Europe are major malaria prone regions. Owing to the rising concerns over figuring out on reducing the number of malaria and dengue cases paves a critical opportunity for Larvicides market in these target regions.

Global Larvicides Market: Reasons for Covering this Title

Dengue and malaria are vector-borne diseases and is being considered as the major public health causing problems worldwide. Both diseases poses a major threat in many tropical countries causing infections in more than 100 million people each year. Asia, Latin America, the Middle East, sub-Saharan Africa and several parts of Europe are the regions affected by malaria and dengue. Hence there tenacity in concerns over controlling the rise in number of cases of these kind of diseases. Owing to this factor, several major chemical solution manufacturers and concerned international organizations have been taking steps and coming up with products such as Larvicides which plays an important role in controlling the production of larvaes.

Global Larvicides: Market Segmentation

On the basis of control method, the global Larvicides market has been segmented as –

Biocontrol Agents
Chemical Agents
Insect Growth Regulator

Global Larvicides Market: Key Takeaway

Asia Pacific and MEA is being considered as the dominant region for global larvicide market due to rise in number of malaria and dengue cases among its population.

Obtain Report Details @ https://www.transparencymarketresearch.com/larvicides-market.html

Global Larvicides Market: Key Players

Some of the key players operating in the global Larvicides market are Sumitomo Chemical, Nufarm, Certis, Summit Chemical, Syngenta, Adama, Eli Lily and Company, Russell IPM, Central Garden & Pet Co., BASF, Bayer among others

Key Trends: Global Larvicides Market

Major shareholding companies for Larvicides have been strategizing on coming up with innovative products catering to the varying needs and

For more information on this press release visit: http://www.sbwire.com/press-releases/larvicides-market/global-larvicides-market/release-1025639.htm

Media Relations Contact

Rohit
Marketing Head
Transparency Market Research
Telephone: 1-518-618-1030
Email: Click to Email Rohit
Web: https://www.transparencymarketresearch.com/

#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000


          Tái chế rác thải để bảo vệ môi trường      Cache   Translate Page   Web Page Cache   

@sinhvienamthuc wrote:

1. Mua đồ cũ nếu có thể.

Bằng việc mua lại những đồ dùng đã qua sử dụng, bạn sẽ góp phần làm giảm nhu cầu sử dụng nguyên liệu mới để tạo ra sản phẩm mới. Bạn cũng sẽ tiết kiệm được tiền nữa. Hãy ghé thăm các cửa hàng bán đồ cũ, cửa hàng nội thất và đồ gia dụng cũ, và các tấm biển quảng cáo gần nhà để tìm mua đồ đã qua sử dụng.

Xem thêm: Các vụ gây ô nhiễm môi trường

green_leaf_background_vector_448024253

2. Mua đồ dùng có thể tái sử dụng.

Các loại cốc, đĩa, thìa, dĩa, và hộp đựng thực phẩm dùng một lần tạo ra rất nhiều rác thải. Thay vì góp phần gia tăng lượng rác thải khi dùng các sản phẩm này, bạn nên sử dụng những vật dụng có thể tái sử dụng nhiều lần.

3. Chọn mua đồ ít bao bì.

Bao bì đóng gói thực phẩm thường tốn nhiều nguyên liệu và năng lượng để sản xuất. Do đó, bạn nên mua thực phẩm với ít bao bì nhất có thể, chẳng hạn như mua số lượng lớn hoặc mua đồ không có bao bì đóng gói. Nếu phải mua đồ được đóng gói, hãy cố gắng tìm mua những sản phẩm với ít bao bì nhất có thể.
Tránh mua các sản phẩm đóng gói bằng xốp. Xốp là loại nguyên liệu đóng gói phổ biến nhưng tạo ra rất nhiều rác thải vì khó tái chế. Việc sản xuất xốp cũng góp phần làm ô nhiễm môi trường do thải ra rất nhiều khí hydro các bon.

4. Tái chế tất cả những gì có thể.

Hầu hết mọi thứ đều có thể tái chế. Cố gắng tránh những sản phẩm không có biểu tượng tái chế trên bao bì hoặc được làm từ những nguyên vật liệu pha trộn và khó tái chế.
Kiểm tra xem công ty quản lý rác thải khu nhà bạn có cung cấp dịch vụ thu gom đồ tái chế không. Nếu không, bạn có thể mang các vật dụng có thể tái chế đến trung tâm tái chế gần nhất.

5. Mua vật dụng được làm từ vật liệu tái chế.

Bằng cách mua những sản phẩm này, bạn sẽ góp phần làm giảm nhu cầu đối với nguyên vật liệu mới.
Tìm kiếm những vật dụng có thuật ngữ: “sản phẩm chứa thành phần tái chế” hoặc “có chứa thành phần sau tiêu thụ”.
Vật dụng làm từ nguyên vật liệu tái chế cũng thường nêu rõ bao nhiêu phần trăm được làm từ vật liệu tái chế. Hãy tìm những vật dụng có tỉ lệ nguyên vật liệu tái chế cao.

6. Hạn chế sử dụng hóa chất.

Hóa chất mà chúng ta sử dụng để lau nhà, rửa xe, và thậm chí là để tắm rửa đều theo đường ống chảy vào hệ thống cống, và cuối cùng hầu hết đều chảy vào nguồn nước. Những hóa chất này không tốt cho cây cối và động vật – những thành phần chính trong hệ sinh thái của chúng ta, và chúng còn không tốt cho chính con người. Do đó, nếu có thể, hãy sử dụng những sản phẩm thay thế với ít hóa chất và thân thiện với môi trường.
Ví dụ, thay vì sử dụng chất tẩy rửa nhà tắm, bếp phổ biến, bạn hãy sử dụng dung dịch giấm trắng và nước hoặc baking soda (muối nở) với muối. Những dung dịch tẩy rửa tự nhiên này vừa giúp tẩy sạch mà còn không làm ô nhiễm nguồn nước
Cố gắng tự làm bột giặt và nước rửa bát. Nếu không có thời gian, bạn có thể mua bột giặt làm từ các thành phần tự nhiên.
Nếu không thể tìm sản phẩm thay thế cho những hóa chất độc hại, hãy cố gắng sử dụng càng ít càng tốt mà vẫn đảm bảo yêu cầu làm sạch.

Xem thêm: Vấn nạn ô nhiễm môi trường ở nước ta

bao-ve-moi-truong%20(1)

7. Không dùng thuốc trừ sâu và thuốc diệt cỏ.

Những hóa chất mạnh này khi được xịt lên mặt đất sẽ theo nước mưa ngấm sâu vào lòng đất và chảy và hệ thống nước ngầm. Bạn có thể chỉ muốn ngăn bọ chét ăn cà chua. Nhưng nếu bạn dùng thuốc trừ sâu, tác động của chúng không chỉ dừng lại ở đó khi bị ngấm xuống mạch nước ngầm mà con người và các sinh vật khác sử dụng để tồn tại.

8. Không xả thuốc xuống bồn cầu.

Các loại thuốc với liều lượng lớn rất khó để tách khỏi nguồn nước, và cuối cùng sẽ ảnh hưởng đến tất cả mọi người. Mỗi loại thuốc trên thị trường đều có hướng dẫn cụ thể về việc xả thải. Nếu cần phải vứt bỏ thuốc không sử dụng, hãy tìm cách thích hợp thay vì vứt xuống bồn cầu.
Có một vài loại thuốc được kiểm soát nghiêm ngặt mà các nhà quản lý khuyến nghị nên vứt đi để tránh sử dụng sai mục đích. Đây là những trường hợp ngoại lệ vì hầu hết các loại thuốc đều được khuyến nghị không thải ra môi trường.

9. Xả rác thải độc hại một cách an toàn.

Không nên đổ một vài loại chất thải vào thùng rác vì chúng sẽ ngấm xuống và làm nguồn nước ngầm bị nhiễm độc. Nếu bạn có các loại hóa chất độc hại và không chắc làm thế nào để vứt chúng đi, hãy liên hệ với cơ quan quản lý vệ sinh của địa phương để tìm nơi đổ rác thải độc hại. Sau đó hãy mang chúng đến đúng nơi quy định để được xử lý một cách an toàn.
Cơ quan Bảo vệ Môi trường của Mỹ có một danh sách các loại rác thải độc hại khác nhau.
Luôn nhớ rằng bóng đèn huỳnh quanh, pin và các sản phẩm đặc biệt khác cần biện pháp tái chế đặc riêng. Ở một vài nơi, người ta yêu cầu phải tái chế các sản phẩm này để tránh thủy ngân nhiễm vào nước và đất. Hãy kiểm tra với công ty quản lý rác thải địa phương để tìm biện pháp tái chế thích hợp.

Xem thêm:vietbaiwebsite.net/details/mot-so-giai-phap-de-giu-gin-ve-sinh-moi-truong-o-nong-thon

10. Bảo vệ nguồn nước.

Việc bảo vệ và bảo tồn nguồn nước là rất quan trọng. Lãng phí nước sẽ làm nguồn nước nhanh cạn kiệt và dẫn đến tác hại nghiêm trọng đối với môi trường. Việc áp dụng các biện pháp để giảm thiểu lượng nước sử dụng hàng ngày và bảo vệ sự phát triển của hệ sinh thái trong vùng không phải là việc quá khó. Dưới đây là một số cách để tiết kiệm nước:
Sửa những chỗ bị rò rỉ nước.
Sử dụng thiết bị tiết kiệm nước ở vòi nước và nhà vệ sinh, chẳng hạn như vòi hoa sen chảy chậm.
Không rửa bát đĩa dưới vòi nước chảy liên tục.
Thay mới thiết bị vệ sinh bằng những thiết bị tiết kiệm nước.
Không tưới nước cho cỏ quá nhiều, nhất là nếu bạn sống ở vùng khí hậu khô.

Posts: 1

Participants: 1

Read full topic


          Re: Kein DSL buchbar      Cache   Translate Page   Web Page Cache   
Red Internet & Phone 250 DSL: SuperVectoring von Vodafone billiger als bei 1&1 und Telekom
          Vector (i.e. Mosquitoes) or Weed Problem      Cache   Translate Page   Web Page Cache   
Address: 805 7th Street Gallup, NM
Rating: 2

Resident at 805 S. 7th Street, Apt. B (located in the alley) requested the vendor for mosquito control spray in the alley way near their location.


          The lethal logic of the Monocultural National Us: Part Four – suggestions for a deeper democracy       Cache   Translate Page   Web Page Cache   

If democracy is to survive, there must be a step change to an empowerment which comes from government by the people.

lead Citizens Assembly on Brexit, 2017. Cade Hannan. All rights reserved.He who desires but acts not breeds pestilence.” William Blake’s Proverbs from Hell.

To hold different opinions and to be aware that other people think differently on the same issue shields us from Godlike certainty…Why Read Hannah Arendt Now?

So what could work? In all these cases, left out of the equation as ever is that ‘other people’ that Giorgio Agamben refers to, the excluded and underprivileged, waiting in the wings for even the slightest acknowledgement that we exist. Is there a way that we can fight back? To take one of my running threads, who and what could unify Brexit Britain?

Leavers and remainers – come together

Some citizens have tried. An enterprising group of young people in Wolverhampton who decided that it was unacceptable that no one had invited them to discuss their future under Brexit conditions, since the future is theirs, set up their own process of debate for mutual understanding, Q&A’s with politicians, opinion surveys, radio show etc. Venandah Madanhi and her fellow activists have an upbeat and ingenious approach to youth organizing. Check them out at OurBrexit.

Or spotted recently in the Guardian, Stratford4Europe’s public effort to bring both sides together is ‘Brexit Café’, a coffee-morning forum that’s been held twice at the Townhouse Cafe for Remainers and Leavers to air their views and bridge the divide “one cup at a time”.

Then there was a valiant group in Cambridge, which not only brought together Leavers and Remainers, but also town and gown, producing a report over a year ago now, the Cambridge Brexit report.

In the useful summary of their findings they threw down the following gauntlet:

We must ask ourselves why none of our main political parties, and neither side in the Brexit debate have ever thought to propose and enable this. If you raise the issue of Leaver and Remainer discussion groups in your local party branch, you are likely to be told, as I have been, that the relationship is too toxic. But isn’t the reverse the case? That it is the absence of contact coupled with the mounting enemy images that creates the toxicity? For political parties in particular, another factor must be the stranglehold on our political class of the first past the post, winner-take-all electoral system, and the seductions of the Monocultural National Us. But one day soon they will surely have to choose between this rusty management tool and the empowerment of people.

Then last September, in Manchester, thanks to a team put together by Anand Menon’s ‘UK in a Changing EU’, a Citizen’s Assembly brought Leavers and Remainers together by sortition from all over the UK, selected to reflect the Brexit vote, alongside social class, region, age, gender and ethnicity. For a few days, they were invited to engage in in-depth discussions on everything from the Single Market to migration policy and these citizens jumped at the chance. The more technical results are noted here:

A brief and compelling discussion of the event in openDemocracy touched on some more general results. Participants were delighted to have been chosen; glad to have access to careful, thoughtful discussion of the arguments for and against different options; and gladdest of all and relieved to realise that they could engage in discussion with fellow-Brits of an opposite persuasion without the ceiling falling in. It simply showed that, well away from the hyperboles and given a chance, people of very differing viewpoints can coexist and work towards constructive solutions to complex problems.

The exercise necessarily combined three of the lessons learned from conflict resolvers by the solutions journalist, Amanda Ripley; first, complicate the narrative; then, widen the lens: “TV news segments are dominated by a narrow focus... The narrow-lens nudges the public to hold individuals accountable for the ills of society rather than corporate leaders or government officials. We don’t connect the dots… By contrast, people who saw the wider-lens stories were more likely to blame government and society for the problems of poverty.” And lastly, encourage contact: ”The most powerful way to get people to stop demonizing each other, as decades of research into racial prejudice have shown, is to introduce them to one another.”

Freed from the solitary confinement of ideology, from the enemy images, bubbles burst. People may indeed cut each other down to size, but they listen to each other’s hopes and fears in the process. They change their minds. They compromise. They reach a liveable solution. For the duration, to steal Yanis Varoufakis’ profound phrase, they become ‘adults in the room’. You can read more about this Citizens’ Assembly here.

A deeper democracy

We are wrestling with a paradox when we try to identify the role of the Monocultural National Us in our societies today. We cannot quite believe in the spiralling authoritarianism that marks the apogee of market ‘liberalism’. Yet, paradoxically, 'free' markets require 'strong' states to suppress their socially anomic consequences.

The danger of the Monocultural National Us was clearer when war was more popular. It is noteworthy that two of the greatest recent challenges to the democratic status quo were launched from anti-war movements, anti-Vietnam and anti-Iraq. What we have failed to appreciate since then is the way that state coercion has taken over the field of governance that used to work through consent and filled it with enemy images on all sides – a major reason for the febrile selfishnesses and emotionalisms of our cultures. So much so that one could argue that ‘reason’ in our times, rather than moving from the particular to the general – doing as we would be done by and so forth – has now to include a good dose of conflict resolution before it can go ahead.

So bearing in mind our two case studies, I want to return to the debates with which I began, to draw a tentative conclusion. In particular I want to return to Edmund Fawcett’s acknowledgement that the “task of repair is daunting” for our liberal democracies, and his invitation to liberals and leftists alike to clarify our disagreements so that we may join forces to fight back. I take it that Andrew Gamble is accepting this invitation with this week's outline for us of an Open Left. What seems even more hopeful to me is that in Fawcett’s lucid account of the four things a liberal has to stand for, each of his four clauses appear indispensible in the task of repair that this debate has so far brought to the surface. All of them, if some more obviously than others, are threatened however, by the rise of the Monocultural National Us with which I have been concerned. Fawcett writes:

To be a liberal you have to stand for four things: resisting undue power whether the power of the state, wealth or oppressive social majorities; commitment to the improvability of human life; legal and social respect for everyone, whoever they are. You have also to accept that society is inevitably in conflict, materially and morally. Past unity or future brotherhood are, for liberals, fantasies. In today’s terms, you have to believe in diversity. Liberals don’t, as Barnett suggested, believe in “singular cohesion”. Theirs is a diverse, inclusive tent.

To this Edmund adds a fifth consideration for anyone who considers themselves to be a democrat. These are the commitments which have to be defended if democracy is going to survive.

“Democracy’s about who gets the protections and permissions liberalism offers, few or all. Democratic liberalism is liberalism for everyone. It’s an ideal, not a fantasy.”

And here we return to the problem of “decades of rising inequality” which Michael Sandel singles out as a prime failure of technocratic liberalism. If democracy is going to survive, this “democratic ideal” has to become more of a reality. But if current  conditions require a much more in depth response, what might this newly persuasive politics look like that could start by winning the support of democratic liberals and open leftists and then go on to the much harder task of winning over those who are currently profoundly unconvinced? I think there is a clue in the example Fawcett recommends to our attention of a moment after 1945 when western societies took “measurable steps towards the ideal.’ He cites the abortion referendum in Ireland that was taking place as he wrote this May – an astonishing success, much of which can be attributed to the formidable Citizens’ Assembly of Ireland which some of us on openDemocracy have been following with particular interest. Here was an inclusive process that empowered the many not the few.

I have cited a lot of rows in the course of this discussion: a great deal of rowing online and off is going on – much uncivil and generating far more heat than light. But perhaps even in this process, Agamben’s other people are finally becoming savvy.

This at least is the argument of Paul Burton-Cartledge, responding to Michael Sandel. He argues that only a deeper democracy – with everything we must suppose this means for our uncodified constitution, our institutions, education systems, our media and of course for power itself – can ultimately rise to this challenge:

“If empowering people to take charge of their lives is more than a feel-good phrase, or a strap line for corporate social responsibility, we need a politics that is serious about it… Never before in history are so many people educated, skilled, competent, tolerant, and connected... Treating people as voters, as passive consumers of politics, is a recipe for turning them off, deactivating them… The rejuvenation of democratic politics can only pass through more democracy, of loosening politics up so it becomes less about manoeuvring and position, of ending its exalted position as something separate to and apart from an increasingly connected and savvy populace, and letting them – us – take control. Only then can politics proper begin.”

Burton-Cartledge seems to me a little complacent about how this ‘politics proper’ will come about. Pointing to the service sector, as well as socialised and networked lives outside work, he argues that people in liberal democracies have been empowered by the increased opportunities for sociality, networking and cooperation that immaterial labour depends on. However, now that the “social commons is a strategic vector of capital accumulation”, capital cannot help but undermine the cooperation, critical thinking, soft skills and collaborative working that it needs, by “individuating and atomising its employees, denying them rights and expecting them to get by on episodic and insecure work.”

With capitalism in this latest bind, Burton-Cartledge seems to think that economic determinants will somehow bring about a more tolerant world, regardless of the “rise of authoritarian capitalisms, the threats to democracy in eastern Europe, and the challenge populist politics pose to the so-called mature democracies” that he earlier identifies.

What I see in this clash between cooperation and atomisation that he locates at the core of capital accumulation is yet another facet of the contradiction between community and conflict with which I opened this discussion. So my view of the world is more of a race to the finishing line between the forces of incivility and civility, incitement and empowerment, the proliferation of enemy images, and the cultivation of a mutually assured vulnerability which is the precondition for listening and changing our minds.

In this battle, the rapid rise of the Nationalist International seems much better prepared than the rest of us. Dominic Cummings’ warning to Tory MPs and donors on the “Brexit shambles” is chilling: “If revolution there is to be, better to undertake it than undergo it… Best wishes”.

The psychomachia I envisage may be the politics that I miss from Burton-Cartledge’s account. However, I cannot but agree with him on the end-result. If democracy is to survive, there must be a step change from élites no longer convincingly equipped with the ancient arts of ensuring consent, to an empowerment which comes from government by the people.

Sideboxes
Rights: 
CC by NC 4.0

          Design A Logo      Cache   Translate Page   Web Page Cache   
Front End Web Company CSS HTML requires a modern logo Design Solutions and or designsolution.com.au require multiple files jpd vector etc (Prize: 135)
          Record Label Logo Design      Cache   Translate Page   Web Page Cache   
We are launching a new record label, specialising in the release of US 70s and 80s dance music. The label will be called "New York 42" / "NY42". We are looking for a brand logo that can be included on digital and physical products. We will require the design to be supplied in vector format. (Prize: 20)
          より賢く、より可愛く。ピクサー感のあるロボット「Cozmo」の進化版「Vector」がKickstarterに登場      Cache   Translate Page   Web Page Cache   
ライバルはペットというAI搭載ロボット「Cozmo」を開発したAnki社が、新たなロボット「Vector」をKickstarterにて発表しています。どうやら「Cozmo」の進化版みたいな感じのようで、いろんな面で賢くなってるみたいですよ。
          1,5 milyon satan minik robot!      Cache   Translate Page   Web Page Cache   
Anki'nin yeni robotu Vector, şaşırtan bir başarı haberiyle birlikte geldi!
          SWAM Engine Flutes 2.8.1 (x64)      Cache   Translate Page   Web Page Cache   

SWAM Engine Flutes 2.8.1 (x64)#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
SWAM Engine Flutes 2.8.1 (x64)
File size: 62.7 MB
Tired of Giga-sized pre-recorded libraries of flutes and of the objective limitations of traditional samplers? SWAM Flutes is the solution. Developed by Audio Modeling using the SWAM Technology (Synchronous Waves Acoustic Modeling) through a combination of innovative performance techniques and concepts of physical and behavioral modeling with the multi-vector/phase-synchronous sampling technique, the SWAM Flutes bundle includes four instruments: Flute, Alto Flute, Bass Flute and Piccolo.


          Audio Modelling SWAM Engine - SWAM Flutes v2.8.1      Cache   Translate Page   Web Page Cache   

Audio Modelling SWAM Engine - SWAM Flutes v2.8.1#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
Audio Modelling SWAM Engine - SWAM Flutes v2.8.1 WiN | 60 Mb

This collection is comprised of four instruments, the Flute, the Alto Flute, the Bass Flute and the Piccolo. Tired of Giga-sized pre-recorded libraries of flutes and of the objective limitations of traditional samplers? SWAM Flutes is the solution. Developed by Audio Modeling using the SWAM Technology (Synchronous Waves Acoustic Modeling) through a combination of innovative performance techniques and concepts of physical and behavioral modeling with the multi-vector/phase-synchronous sampling technique, the SWAM Flutes bundle includes four instruments: Flute, Alto Flute, Bass Flute and Piccolo.


          The lethal logic of the Monocultural National Us: Part Four – suggestions for a deeper democracy       Cache   Translate Page   Web Page Cache   

If democracy is to survive, there must be a step change to an empowerment which comes from government by the people.

lead Citizens Assembly on Brexit, 2017. Cade Hannan. All rights reserved.He who desires but acts not breeds pestilence.” William Blake’s Proverbs from Hell.

To hold different opinions and to be aware that other people think differently on the same issue shields us from Godlike certainty…Why Read Hannah Arendt Now?

So what could work? In all these cases, left out of the equation as ever is that ‘other people’ that Giorgio Agamben refers to, the excluded and underprivileged, waiting in the wings for even the slightest acknowledgement that we exist. Is there a way that we can fight back? To take one of my running threads, who and what could unify Brexit Britain?

Leavers and remainers – come together

Some citizens have tried. An enterprising group of young people in Wolverhampton who decided that it was unacceptable that no one had invited them to discuss their future under Brexit conditions, since the future is theirs, set up their own process of debate for mutual understanding, Q&A’s with politicians, opinion surveys, radio show etc. Venandah Madanhi and her fellow activists have an upbeat and ingenious approach to youth organizing. Check them out at OurBrexit.

Or spotted recently in the Guardian, Stratford4Europe’s public effort to bring both sides together is ‘Brexit Café’, a coffee-morning forum that’s been held twice at the Townhouse Cafe for Remainers and Leavers to air their views and bridge the divide “one cup at a time”.

Then there was a valiant group in Cambridge, which not only brought together Leavers and Remainers, but also town and gown, producing a report over a year ago now, the Cambridge Brexit report.

In the useful summary of their findings they threw down the following gauntlet:

We must ask ourselves why none of our main political parties, and neither side in the Brexit debate have ever thought to propose and enable this. If you raise the issue of Leaver and Remainer discussion groups in your local party branch, you are likely to be told, as I have been, that the relationship is too toxic. But isn’t the reverse the case? That it is the absence of contact coupled with the mounting enemy images that creates the toxicity? For political parties in particular, another factor must be the stranglehold on our political class of the first past the post, winner-take-all electoral system, and the seductions of the Monocultural National Us. But one day soon they will surely have to choose between this rusty management tool and the empowerment of people.

Then last September, in Manchester, thanks to a team put together by Anand Menon’s ‘UK in a Changing EU’, a Citizen’s Assembly brought Leavers and Remainers together by sortition from all over the UK, selected to reflect the Brexit vote, alongside social class, region, age, gender and ethnicity. For a few days, they were invited to engage in in-depth discussions on everything from the Single Market to migration policy and these citizens jumped at the chance. The more technical results are noted here:

A brief and compelling discussion of the event in openDemocracy touched on some more general results. Participants were delighted to have been chosen; glad to have access to careful, thoughtful discussion of the arguments for and against different options; and gladdest of all and relieved to realise that they could engage in discussion with fellow-Brits of an opposite persuasion without the ceiling falling in. It simply showed that, well away from the hyperboles and given a chance, people of very differing viewpoints can coexist and work towards constructive solutions to complex problems.

The exercise necessarily combined three of the lessons learned from conflict resolvers by the solutions journalist, Amanda Ripley; first, complicate the narrative; then, widen the lens: “TV news segments are dominated by a narrow focus... The narrow-lens nudges the public to hold individuals accountable for the ills of society rather than corporate leaders or government officials. We don’t connect the dots… By contrast, people who saw the wider-lens stories were more likely to blame government and society for the problems of poverty.” And lastly, encourage contact: ”The most powerful way to get people to stop demonizing each other, as decades of research into racial prejudice have shown, is to introduce them to one another.”

Freed from the solitary confinement of ideology, from the enemy images, bubbles burst. People may indeed cut each other down to size, but they listen to each other’s hopes and fears in the process. They change their minds. They compromise. They reach a liveable solution. For the duration, to steal Yanis Varoufakis’ profound phrase, they become ‘adults in the room’. You can read more about this Citizens’ Assembly here.

A deeper democracy

We are wrestling with a paradox when we try to identify the role of the Monocultural National Us in our societies today. We cannot quite believe in the spiralling authoritarianism that marks the apogee of market ‘liberalism’. Yet, paradoxically, 'free' markets require 'strong' states to suppress their socially anomic consequences.

The danger of the Monocultural National Us was clearer when war was more popular. It is noteworthy that two of the greatest recent challenges to the democratic status quo were launched from anti-war movements, anti-Vietnam and anti-Iraq. What we have failed to appreciate since then is the way that state coercion has taken over the field of governance that used to work through consent and filled it with enemy images on all sides – a major reason for the febrile selfishnesses and emotionalisms of our cultures. So much so that one could argue that ‘reason’ in our times, rather than moving from the particular to the general – doing as we would be done by and so forth – has now to include a good dose of conflict resolution before it can go ahead.

So bearing in mind our two case studies, I want to return to the debates with which I began, to draw a tentative conclusion. In particular I want to return to Edmund Fawcett’s acknowledgement that the “task of repair is daunting” for our liberal democracies, and his invitation to liberals and leftists alike to clarify our disagreements so that we may join forces to fight back. I take it that Andrew Gamble is accepting this invitation with this week's outline for us of an Open Left. What seems even more hopeful to me is that in Fawcett’s lucid account of the four things a liberal has to stand for, each of his four clauses appear indispensible in the task of repair that this debate has so far brought to the surface. All of them, if some more obviously than others, are threatened however, by the rise of the Monocultural National Us with which I have been concerned. Fawcett writes:

To be a liberal you have to stand for four things: resisting undue power whether the power of the state, wealth or oppressive social majorities; commitment to the improvability of human life; legal and social respect for everyone, whoever they are. You have also to accept that society is inevitably in conflict, materially and morally. Past unity or future brotherhood are, for liberals, fantasies. In today’s terms, you have to believe in diversity. Liberals don’t, as Barnett suggested, believe in “singular cohesion”. Theirs is a diverse, inclusive tent.

To this Edmund adds a fifth consideration for anyone who considers themselves to be a democrat. These are the commitments which have to be defended if democracy is going to survive.

“Democracy’s about who gets the protections and permissions liberalism offers, few or all. Democratic liberalism is liberalism for everyone. It’s an ideal, not a fantasy.”

And here we return to the problem of “decades of rising inequality” which Michael Sandel singles out as a prime failure of technocratic liberalism. If democracy is going to survive, this “democratic ideal” has to become more of a reality. But if current  conditions require a much more in depth response, what might this newly persuasive politics look like that could start by winning the support of democratic liberals and open leftists and then go on to the much harder task of winning over those who are currently profoundly unconvinced? I think there is a clue in the example Fawcett recommends to our attention of a moment after 1945 when western societies took “measurable steps towards the ideal.’ He cites the abortion referendum in Ireland that was taking place as he wrote this May – an astonishing success, much of which can be attributed to the formidable Citizens’ Assembly of Ireland which some of us on openDemocracy have been following with particular interest. Here was an inclusive process that empowered the many not the few.

I have cited a lot of rows in the course of this discussion: a great deal of rowing online and off is going on – much uncivil and generating far more heat than light. But perhaps even in this process, Agamben’s other people are finally becoming savvy.

This at least is the argument of Paul Burton-Cartledge, responding to Michael Sandel. He argues that only a deeper democracy – with everything we must suppose this means for our uncodified constitution, our institutions, education systems, our media and of course for power itself – can ultimately rise to this challenge:

“If empowering people to take charge of their lives is more than a feel-good phrase, or a strap line for corporate social responsibility, we need a politics that is serious about it… Never before in history are so many people educated, skilled, competent, tolerant, and connected... Treating people as voters, as passive consumers of politics, is a recipe for turning them off, deactivating them… The rejuvenation of democratic politics can only pass through more democracy, of loosening politics up so it becomes less about manoeuvring and position, of ending its exalted position as something separate to and apart from an increasingly connected and savvy populace, and letting them – us – take control. Only then can politics proper begin.”

Burton-Cartledge seems to me a little complacent about how this ‘politics proper’ will come about. Pointing to the service sector, as well as socialised and networked lives outside work, he argues that people in liberal democracies have been empowered by the increased opportunities for sociality, networking and cooperation that immaterial labour depends on. However, now that the “social commons is a strategic vector of capital accumulation”, capital cannot help but undermine the cooperation, critical thinking, soft skills and collaborative working that it needs, by “individuating and atomising its employees, denying them rights and expecting them to get by on episodic and insecure work.”

With capitalism in this latest bind, Burton-Cartledge seems to think that economic determinants will somehow bring about a more tolerant world, regardless of the “rise of authoritarian capitalisms, the threats to democracy in eastern Europe, and the challenge populist politics pose to the so-called mature democracies” that he earlier identifies.

What I see in this clash between cooperation and atomisation that he locates at the core of capital accumulation is yet another facet of the contradiction between community and conflict with which I opened this discussion. So my view of the world is more of a race to the finishing line between the forces of incivility and civility, incitement and empowerment, the proliferation of enemy images, and the cultivation of a mutually assured vulnerability which is the precondition for listening and changing our minds.

In this battle, the rapid rise of the Nationalist International seems much better prepared than the rest of us. Dominic Cummings’ warning to Tory MPs and donors on the “Brexit shambles” is chilling: “If revolution there is to be, better to undertake it than undergo it… Best wishes”.

The psychomachia I envisage may be the politics that I miss from Burton-Cartledge’s account. However, I cannot but agree with him on the end-result. If democracy is to survive, there must be a step change from élites no longer convincingly equipped with the ancient arts of ensuring consent, to an empowerment which comes from government by the people.

Sideboxes
Rights: 
CC by NC 4.0

          Anki Vector: Der Roboter-Sidekick für jedermann      Cache   Translate Page   Web Page Cache   
Eine große Rolle vorwärts für die Roboterheit. So betitelt der Roboter-Spezialist Anki die neue Kickstarter-Kampagne für Vector, einen der bisher scheinbar nützlichsten und gleichzeitig sympathischsten Roboter.
          Vector: Diesen Smart-Home-Roboter steuert ihr per Sprache      Cache   Translate Page   Web Page Cache   
Konkurrenz für Amazon Echo, Apple HomePod und Google Home? Der kleine Roboter Vector von Anki kann sehen, hören, fühlen und sich bewegen.
          Anki Vector: Dieser Roboter toppt Cozmo um Längen!      Cache   Translate Page   Web Page Cache   
Die Firma Anki will Heimroboter salonfähig machen. Gelingen soll das mit einer stark weiterentwickelten Version des hauseigenen Androiden Cozmo.
          Best Practices for the Protection of Information Assets, Part 2      Cache   Translate Page   Web Page Cache   

In Part 1 of this article series , we discussed Information Security Management, or ISM. This second installment will cover the implementation and monitoring of security controls, including logical access controls, remote access controls, network security, controls/detection tools against information system attacks, security testing techniques and controls that prevent data leakage.

Implementation and Monitoring of Security Controls

Security controls should focus on the integrity of data, the data classification system, and the policies in places that ensure that data is handled properly.

Logical Access Controls

Ensure there are policies in place on access and access controls logical access controls at both operating system level and the application level are designed to protect information assets by sustaining policies and procedures. The management override is akin to a fail-safe mechanism. Overall, these controls manage the identification, authentication and restriction of users to authorized functions and data.

Types and Principles of Access

Types and principles of access include subject access (identification of individual having an ID), service access (data passing through an access point), least privilege, segregation of duties and split custody.

Example:Target may have avoided their notorious 2013 breach if they had not failed to follow the principle of least privilege. An HVAC contractor with a permission to upload executables broadens the attack surface for cybercriminals.

Example:As an example of Edward Snowden’s revelations, the NSA decided to apply the principle of least privilege and revoked higher-level powers from 90% of its employees.

Passwords

Ensure there are occasional or event-driven change and recovery policies reactivation with a new password so long as the user identity can be verified. People often use weak passwords, tend to share them or transmit/store them in cleartext; a succession of failed attempts to login with a password should result in locking out the account.

Biometrics can replace passwords in future by creating a system that can restrict access based on unique physical attributes or behavior. Issues with this approach include false reject rate (FRR), false accept rate (FAR) and crossover error rate (CER), and privacy.

Example:To unlock mobile devices, the scientist in Yahoo’s Research Labs are experimenting with utilizing ears, knuckles, and fingertips as biometric passwords.

Single Sign-On (SSO)

This technique consolidates access operations among various systems into one centralized administrative function. SSO interfaces with client servers (local and remote users) and distributed systems, mainframe systems and network security, including remote access mechanisms.

Access Control Lists

Access control lists (ACLs) are the equivalent of a register in which the system enlists users who have permission to access and use a given system resource. ACLs can store information on users’ type of access.

Example: To illustrate the usefulness of access control lists, consider a medical research experiment where the files that contain experimental results have an ACL that permits read-and-write access to all members of a research group except for one member, who is working on another experiment whose results should not be influenced by the results of the first one.

System Access Audit Logging

Almost all access control software automatically logs and report access attempts, which forms an audit trail to observe any suspicious activities and potential hacking attempts (e.g., brute-force attack on a specifically-targeted high-profile logon ID). Recording all activities may be useful in the context of digital investigations

Access to the logs should be restricted.

Tools for Log Analysis include, but are not limited to: audit reduction tools, trend/variance detection tools, attack-signature detection tools and SIEM systems.

Actions an Auditor Should Undertake When Evaluating Logical Access Controls

An auditor should identify sensitive data/systems, document, evaluate and test controls over potential access and access paths, and evaluate the adequacy of the security environment.

Controls and Risks Associated With Virtualization of Systems

Moving away from a physical medium towards a virtual one, there are many important aspects one should consider: physical and logical access validation (because many virtual machines may be running in one physical system), proper configuration and network segregation (no interference among various VMs).

A 2015 Kaspersky Labs survey proved that recovery costs in the wake of a cyberattack on a virtualized infrastructure are twice as high as an attack on a physical environment. Moreover, only 27% deployed defensive mechanisms specifically designed to protect virtual environments.

Configuration, Implementation, Operation and Maintenance of Network Security Controls

Perimeter security controls such as firewalls and IDS/IPS ward off most cyberattacks against the enterprise’s network. The auditor needs to know the effectiveness of these security controls and the policies and procedures that regulate network incidents.

Other important matters are network management, legal complications with respect to online activities, network administrator procedures and service legal agreements with third parties.

Internet use, remote access and networks will all require auditing. Network infrastructure security and general network controls will require additional attention.

LAN Security Issues

An auditor should identify and document LAN topology and network design, signs of segmentation, LAN administrator and LAN owner, groups of LAN users, applications used on the LAN, and procedures for network design, support, and data security.

Wireless Security Threats

Security requirements include: authenticity, non-repudiation, accountability and network availability.

There are many forms of malicious access to WLANs. These include but are not limited to: war driving/walking/chalking, passive attacks and sniffing.

Detection Tools and Control Techniques Malware

Countermeasures against various types of malware include but are not limited to: policies, education, patch management, anti-virus software, and procedural/technical controls.

Detection Tools

Antivirus software, regular updates, layered systems (e.g., inner, perimeter, and BOYD), and honeypots and are useful detection tools and deterrents against malware.

Employee education is equally important and should not be ignored. Simple common sense on the part of employees can close multiple attack vectors, such as email phishing attempts.

Ethical Hacking Training Resources (InfoSec)

Security Testing Techniques

Begin by knowing your tools. You’ll need tools to evaluate network security and possible risks, as well as suitable mitigation techniques. Be sure to check lists of known network vulnerabilities.

Third parties may be able to provide testing services such as penetration testing. Penetrating testing, also called intrusion testing or ethical hacking, is where outside pentesters use every technique or source a potential attacker could use (open-source gathering, searching for backdoors, guessing passwords, using known exploits) to test your security. This is especially good for testing firewalls.

You should also be aware of social engineering testing. This gives you a chance to see how your staff holds up in case of a social engineering attack, such as a phone scammer trying to get people’s passwords.

Controls and Risks Associated with Data Leakage

Data leakages occur when there is a risk of sensitive information becoming public, typically by accident. The IS auditor needs to ensure that there are effective data classification policies, security awareness training and periodic audits with respect to data leakage prevention.

Note that data leakage has a totally different meaning when it comes to machine learning. Information from outside the training set could corrupt the learning capabilities of the model because it may introduce something that the model otherwise would not know.

Encryption-Related Techniques

Anyone handling or testing encryption should be familiar with encryption algorithm techniques and key length: note that complex algorithms and large keys are somewhat impractical for everyday use. Be aware of cryptographic systems, such as AES 128/256-bit and old 64-bit DES.

Other areas of interest include encryption in communications; secure socket layer (SSL)/transport layer security (TLS); secure HTTP (HTTPS); IPSec Internet protocol security; Secure Shell (SSH);and secure multipurpose Internet mail extensions (S/MIME).

Public Key Infrastructure (PKI) Components and Digital Signature Techniques

PKI establishes a trusted communication channel where parties can exchange digital keys in a safe manner. It’s widely used in e-commerce and online banking.

PKI is based on digital certificates (public key and identifying information) that are issued and cryptographically signed by a certificate authority. Validation is through the certificate authority, while a registration authority ensures third-party validation. When dealing with PKI, watch for digital certificates’ expiration dates, and be certain to check the certificate revocation list (CRL).

Controls Associated with Peer-to-Peer Computing, Instant Messaging and Web-Based Technologies

P2P computing may result in fast dissemination of viruses, worms, Trojans, spyware and so on directly among computers, as there is no central server. Meanwhile, social media risks include inappropriate sharing of information about sensitive data, staffing issues and organizational data; URL spoofing; cyberstalking; using vulnerable applications; phishing; downloading malicious attachments and clicking on malicious links.

Example:In 2016, the Facebook “fake friend” phishing scam rose to prominence. Users received a Facebook message claiming that they had been mentioned by a friend in a comment, but upon clicking on this message, it would automatically download malware onto their computers in the form of a malicious Chrome browser extension. After the installation, this malware snatched users’ Facebook account so that it could steal their data and propagate further.

To control this, implement a P2P computing policy which includes social network use and instant messaging. Corporate messaging boards are more secure than Facebook. Promote monitoring, education and awareness, and ban some types of peer-to-peer communications to narrow the net.

Controls and Risks Associated with the Use of Mobile and Wireless Devices

When dealing with mobile and wireless devices, secure Wi-Fi is required, because most of these devices communicate via a Wi-Fi network.

Implement mobile device controls, including stringent data storage, remote wipes, and theft response procedures. Clarify your workplace’s policy regarding employees bringing their own devices to work.

Voice Communications Security (PBX, VoIP)

In these cases, voice communications have been translated to binary code. This means they are still digitally-based

Increasingly common these days is VoIP or Voice over IP. VoIP boasts lower costs compared to traditional phone services; however, they tend to have worse security than ordinary phones, and one needs to protect both the data and the voice. Wiretapping is a possibility. Security measures include encrypting communications and ensuring that all software is up-to-date and patched.

Alternately, private branch exchange or PBX is a phone system that can operate for both voice and data. It provides simultaneous calls through multiple telephone lines

Example:In 2014, cybercriminals broke into the phone network of Foreman Seeley Fountain Architecture and managed to steal $166,000 worth of calls from the firm via premium-rate telephone numbers in Gambia, Somalia and the Maldives. Typically, hackers pull off such a scheme over a weekend when nobody is at work, forwarding sometimes as many as 220 minutes’ worth of calls per minute to a premium line. The criminals withdraw their cuts usually through Western Union, moneygram or wire transfer.

Conclusion

This concludes our look at best practices for the implementation of monitoring and security controls. Some of our sources are listed below, for your perusal. Join us soon for Part 3, when we’ll be examining physical and environmental protection of information assets.

Sources

What is Least Privilege & Why Do you Need It ?, Beyond Trust

Data-drained Target hurries to adopt chip-and-PIN cards , Naked Security

Yahoo ‘Bodyprint’ Turns Smartphone Touchscreens Into Biometric Sensors , Gadgets 360

NSA to cut system administrators by 90 percent to limit data access , Reuters

Security of Virtual Infrastructure , Kaspersky Lab

Facebook ‘fake friend’ phishing scam uncovered watch for these red flags , Komando

IBM Security Services 2014, Cyber Security Intelligence Index , IBM Global Technology Services


          Blockchain bug hunters feature prominently at this year’s Pwnie Awards      Cache   Translate Page   Web Page Cache   

Researchers have been diligently prodding cryptocurrency and blockchain companies for kinks in their security and it seems some of them are finally getting recognition for their work.

Three researchers are up for Pwnie Awards this year an annual showcase of the best and worst in information security. Little toy ponies are given to the most deserving hackers and security researchers.

MIT Digital Currency Initiative director Neha Narula and Boston University researcher Ethan Heilman have been nominated for “Best Cryptographic Attack” after cracking a hash function in popular cryptocurrency IOTA. In addition to that, ConsenSys security engineer Bernard Mueller is also up for “Most Innovative Research” for his work on securing Ethereumsmart contracts.

Cracking IOTA’s hash function

Forging IOTA transactions was apparently achievable “in just a few minutes,” according to Narula and Heilman. The pair discovered a method that allowed funds to be stolen directly from users wallets. They attribute the security hole directly to IOTA’s implementation of its hashing algorithm.

The vulnerability was originally discovered last year, and IOTA has since addressed it in a series of blog posts . While Narula and Heilman are clear to state that the exploitable attack vectors have been plugged, they do note that the faulty hash function is still being used in some parts of the IOTA platform.

Keeping smart contracts secure

Muller is nominated for his extensive research on the security of Ethereum’s blockchain. His paper , titled Smashing Smart Contracts for Fun and Real Profit , introduces a new security analysis tool for smart contracts called Mythril.

He pokes fun at the tech community for not “learning much since 1996,” with a myriad of security vulnerabilities stemming from a reliance on older programming languages when creating smart contracts. Myrthil is Muller’s contribution to smart contract security, with an intention to remove bugs that may lead to money loss.

Muller’s research also celebrates the modern hacking infrastructure. He does note, though, that the dawn of Ethereum’s “world computer” and its constantsecurity concerns are eerily reminiscent of the early internet.

This time around there’s one crucial difference, though. In the early days, bug bounty programs didn’t exist, and zero-day vulnerabilities were dumped on mailing lists just for the so-called lulz, so unless you had rather dubious connections, the only profit to be made was gaining the respect of other security researchers. Hack a smart contract, however, and you see some actual money.

The awards are scheduled for later today, so we’ll update this piece with the official standings. The full list of nominations can be found here .

Published August 8, 2018 ― 16:35 UTC


          Arch之软件降级      Cache   Translate Page   Web Page Cache   

用Arch linux就是每天睡觉关机前滚一下,然而有时候有些软件升级滚出问题,比如 glibc-2.28 就导致了 R 安装包有问题,会抛出下面的错误:

terminate called after throwing an instance of 'std::runtime_error' what(): Mutex creation failed

用 blogdown 编译博客也同样会抛出这个错误。

然后 electron 也有问题,《 开源的macOS和linux版微信 》跑着跑着突然CPU就狂飙。

解决办法就是安装回老版本,但 pacman 永远是最新的,当然可以去git/svn仓库里找老版本的 PKGBUILD ,然后再 makepkg ,但经常会在 signature checking 这步报错,你还得到导入 keyring ,挺麻烦。

这时候我找到了 downgrade 脚本:

Bash script for downgrading one or more packages to a version in your cache or the A.L.A.

AUR有收录,安装非常简单:

~/github/PAM master yay -S downgrade [sudo] password for ygc: resolving dependencies... looking for conflicting packages... Packages (1) downgrade-6.0.0-2 Total Download Size: 0.01 MiB Total Installed Size: 0.12 MiB :: Proceed with installation? [Y/n] :: Retrieving packages... downgrade-6.0.0-2-any 9.0 KiB 242K/s 00:00 [###########] 100% (1/1) checking keys in keyring [###########] 100% (1/1) checking package integrity [###########] 100% (1/1) loading package files [###########] 100% (1/1) checking for file conflicts [###########] 100% (1/1) checking available disk space [###########] 100% :: Processing package changes... (1/1) installing downgrade [###########] 100% Optional dependencies for downgrade sudo: for installation via sudo [installed] :: Running post-transaction hooks... (1/1) Arming ConditionNeedsUpdate...

这时候,我就可以用它来降低 glibc 的版本了,运行会列出各种版本:

~/github/PAM master downgrade glibc Available packages: * 1) glibc-2.28-1-x86_64.pkg.tar.xz (remote) * 2) glibc-2.28-1-x86_64.pkg.tar.xz (local) 3) glibc-2.27-3-x86_64.pkg.tar.xz (remote) 4) glibc-2.27-2-x86_64.pkg.tar.xz (remote) 5) glibc-2.26-11-x86_64.pkg.tar.xz (remote) 6) glibc-2.26-10-x86_64.pkg.tar.xz (remote) 7) glibc-2.26-9-x86_64.pkg.tar.xz (remote) 8) glibc-2.26-8-x86_64.pkg.tar.xz (remote) 9) glibc-2.26-7-x86_64.pkg.tar.xz (remote) 10) glibc-2.26-6-x86_64.pkg.tar.xz (remote) 11) glibc-2.26-5-x86_64.pkg.tar.xz (remote) 12) glibc-2.26-4-x86_64.pkg.tar.xz (remote) 13) glibc-2.26-3-x86_64.pkg.tar.xz (remote) 14) glibc-2.26-2-x86_64.pkg.tar.xz (remote) 15) glibc-2.26-1-x86_64.pkg.tar.xz (remote) 16) glibc-2.25-7-x86_64.pkg.tar.xz (remote) 17) glibc-2.25-6-x86_64.pkg.tar.xz (remote) 18) glibc-2.25-5-x86_64.pkg.tar.xz (remote) 19) glibc-2.25-4-x86_64.pkg.tar.xz (remote) 20) glibc-2.25-3-x86_64.pkg.tar.xz (remote) 21) glibc-2.25-2-x86_64.pkg.tar.xz (remote) 22) glibc-2.25-1-x86_64.pkg.tar.xz (remote) 23) glibc-2.24-2-x86_64.pkg.tar.xz (remote) 24) glibc-2.24-1-x86_64.pkg.tar.xz (remote) 25) glibc-2.23-5-x86_64.pkg.tar.xz (remote) 26) glibc-2.23-4-x86_64.pkg.tar.xz (remote) 27) glibc-2.23-3-x86_64.pkg.tar.xz (remote) 28) glibc-2.23-2-x86_64.pkg.tar.xz (remote) 29) glibc-2.23-1-x86_64.pkg.tar.xz (remote) 30) glibc-2.22-4-x86_64.pkg.tar.xz (remote)

只需要选择其中某一个,就会自动下载安装:

select a package by number: 3 glibc-2.27-3-x86_64 9.1 MiB 4.68M/s 00:02 [#################################################] 100% glibc-2.27-3-x86_64.sig 310.0 B 0.00B/s 00:00 [#################################################] 100% loading packages... warning: downgrading package glibc (2.28-1 => 2.27-3) resolving dependencies... looking for conflicting packages... Packages (1) glibc-2.27-3 Total Installed Size: 41.40 MiB Net Upgrade Size: -4.15 MiB :: Proceed with installation? [Y/n] (1/1) checking keys in keyring [#################################################] 100% (1/1) checking package integrity [#################################################] 100% (1/1) loading package files [#################################################] 100% (1/1) checking for file conflicts [#################################################] 100% (1/1) checking available disk space [#################################################] 100% :: Processing package changes... (1/1) downgrading glibc [#################################################] 100% warning: /etc/locale.gen installed as /etc/locale.gen.pacnew Generating locales... en_US.UTF-8... done zh_CN.UTF-8... done Generation complete. :: Running post-transaction hooks... (1/4) Reloading system manager configuration... (2/4) Creating temporary files... (3/4) Arming ConditionNeedsUpdate... (4/4) Updating the info directory file... add glibc to IgnorePkg? [y/n] n ~/github/PAM master

于是升级带来的各自烦人的bug,就没有了。

往期精彩+ Support Vector Machine + 来香港读博其实是被逼的 + emojifont新功能(有视频哦) + 单篇引用超过500了,来了解一下 + 你们想要的: Linux装windows的二逼 + facet_plot: 加图层到特定的分面上 + 就是这么简单,你也能够纯代码生成六角贴! + 非模式基因GO富集分析:以玉米为例+使用OrgDb


          Android 8.1 启动篇(一) -- 深入研究 init(源码分析)      Cache   Translate Page   Web Page Cache   
前言

init进程,它是一个由内核启动的用户级进程,当linux内核启动之后,运行的第一个进程是init,这个进程是一个守护进程,确切的说,它是Linux系统中用户控件的第一个进程,所以它的进程号是1。它的生命周期贯穿整个linux 内核运行的始终, linux中所有其它的进程的共同始祖均为init进程。

开篇 Android系统启动过程

按下电源系统启动

当电源按下时引导芯片代码开始从预定义的地方(固化在ROM)开始执行,加载引导程序Bootloader到RAM,然后执行。

引导程序Bootloader

引导程序是在Android操作系统开始运行前的一个小程序,它的主要作用是把系统OS拉起来并运行。

linux内核启动

内核启动时,设置缓存、被保护存储器、计划列表,加载驱动。当内核完成系统设置,它首先在系统文件中寻找”init”文件,然后启动root进程或者系统的第一个进程。

init进程启动

:sparkles: 这就是我们接下来要讨论的内容 :sparkles:

Read The Fucking Code

Android init进程的入口文件在system/core/init/init.cpp中,由于init是命令行程序,所以分析init.cpp首先应从main函数开始:

第一阶段(内核态) 判断及增加环境变量 int main(int argc, char** argv) { /* ------------ 第一阶段 ------------ BEGIN------------ */ //根据参数,判断是否需要启动ueventd和watchdogd if (!strcmp(basename(argv[0]), "ueventd")) { // 启动ueventd return ueventd_main(argc, argv); } if (!strcmp(basename(argv[0]), "watchdogd")) { // 启动watchdogd return watchdogd_main(argc, argv); } if (REBOOT_BOOTLOADER_ON_PANIC) { InstallRebootSignalHandlers(); // 若紧急重启,则安装对应的消息处理器 } add_environment("PATH", _PATH_DEFPATH); // 添加环境变量 ... ... } 创建并挂载相关的文件系统 int main(int argc, char** argv) { /* 01. 判断及增加环境变量 */ bool is_first_stage = (getenv("INIT_SECOND_STAGE") == nullptr); if (is_first_stage) { // 判断是否是系统启动的第一阶段(第一次进入:true) boot_clock::time_point start_time = boot_clock::now(); // 用于记录启动时间 // Clear the umask. umask(0); // 清除屏蔽字(file mode creation mask),保证新建的目录的访问权限不受屏蔽字影响 // Get the basic filesystem setup we need put together in the initramdisk // on / and then we'll let the rc file figure out the rest. mount("tmpfs", "/dev", "tmpfs", MS_NOSUID, "mode=0755"); // 挂载tmpfs文件系统 mkdir("/dev/pts", 0755); mkdir("/dev/socket", 0755); mount("devpts", "/dev/pts", "devpts", 0, NULL); // 挂载devpts文件系统 #define MAKE_STR(x) __STRING(x) mount("proc", "/proc", "proc", 0, "hidepid=2,gid=" MAKE_STR(AID_READPROC)); // 挂载proc文件系统 // Don't expose the raw commandline to unprivileged processes. chmod("/proc/cmdline", 0440); // 8.0新增, 收紧了cmdline目录的权限 gid_t groups[] = { AID_READPROC }; // 8.0新增,增加了个用户组 setgroups(arraysize(groups), groups); mount("sysfs", "/sys", "sysfs", 0, NULL); // 挂载sysfs文件系统 mount("selinuxfs", "/sys/fs/selinux", "selinuxfs", 0, NULL); // 8.0新增 mknod("/dev/kmsg", S_IFCHR | 0600, makedev(1, 11)); // 提前创建了kmsg设备节点文件,用于输出log信息 mknod("/dev/random", S_IFCHR | 0666, makedev(1, 8)); mknod("/dev/urandom", S_IFCHR | 0666, makedev(1, 9)); ... ... }

如上所示,该部分主要用于创建和挂载启动所需的文件目录。需要注意的是,在编译Android系统源码时,在生成的根文件系统中, 并不存在这些目录,它们是系统运行时的目录,即当系统终止时,就会消失。

四类文件系统:

tmpfs:一种虚拟内存文件系统,它会将所有的文件存储在虚拟内存中,如果你将tmpfs文件系统卸载后,那么其下的所有的内容将不复存在。tmpfs既可以使用RAM,也可以使用交换分区,会根据你的实际需要而改变大小。tmpfs的速度非常惊人,毕竟它是驻留在RAM中的,即使用了交换分区,性能仍然非常卓越。由于tmpfs是驻留在RAM的,因此它的内容是不持久的。断电后,tmpfs的内容就消失了,这也是被称作tmpfs的根本原因。

devpts:为伪终端提供了一个标准接口,它的标准挂接点是/dev/ pts。只要pty的主复合设备/dev/ptmx被打开,就会在/dev/pts下动态的创建一个新的pty设备文件。

proc:一个非常重要的虚拟文件系统,它可以看作是内核内部数据结构的接口,通过它我们可以获得系统的信息,同时也能够在运行时修改特定的内核参数。

sysfs:与proc文件系统类似,也是一个不占有任何磁盘空间的虚拟文件系统。它通常被挂接在/sys目录下。sysfs文件系统是Linux2.6内核引入的,它把连接在系统上的设备和总线组织成为一个分级的文件,使得它们可以在用户空间存取。

重定向输入输出/内核Log系统 int main(int argc, char** argv) { /* ------------ 第一阶段 ------------ BEGIN------------ */ /* 01. 判断及增加环境变量 */ /* 02. 创建并挂载相关的文件系统 */ if (is_first_stage) { ... ... // Now that tmpfs is mounted on /dev and we have /dev/kmsg, we can actually // talk to the outside world... InitKernelLogging(argv); ... ... } ... ... 屏蔽标准的输入输出

跟踪InitKernelLogging(): system/core/init/log.cpp

void InitKernelLogging(char* argv[]) { // Make stdin/stdout/stderr all point to /dev/null. int fd = open("/sys/fs/selinux/null", O_RDWR); if (fd == -1) { // 若开启失败,则记录log int saved_errno = errno; android::base::InitLogging(argv, &android::base::KernelLogger); errno = saved_errno; PLOG(FATAL) << "Couldn't open /sys/fs/selinux/null"; } dup2(fd, 0); // dup2函数的作用是用来复制一个文件的描述符, 通常用来重定向进程的stdin、stdout和stderr dup2(fd, 1); // 它的函数原形是:int dup2(int oldfd, int targetfd),该函数执行后,targetfd将变成oldfd的复制品 dup2(fd, 2); // 因此这边的过程其实就是:创建出__null__设备后,将0、1、2绑定到__null__设备上 if (fd > 2) close(fd); // 所以init进程调用InitKernelLogging函数后,通过标准的输入输出无法输出信息 android::base::InitLogging(argv, &android::base::KernelLogger); } 设置kernel logger

跟踪InitLogging():system/core/base/logging.cpp

// 设置KernelLogger void InitLogging(char* argv[], LogFunction&& logger, AbortFunction&& aborter) { //设置logger SetLogger(std::forward<LogFunction>(logger)); SetAborter(std::forward<AbortFunction>(aborter)); if (gInitialized) { return; } gInitialized = true; // Stash the command line for later use. We can use /proc/self/cmdline on // Linux to recover this, but we don't have that luxury on the Mac/windows, // and there are a couple of argv[0] variants that are commonly used. if (argv != nullptr) { std::lock_guard<std::mutex> lock(LoggingLock()); ProgramInvocationName() = basename(argv[0]); } const char* tags = getenv("ANDROID_LOG_TAGS"); if (tags == nullptr) { return; } // 根据TAG决定最小记录等级 std::vector<std::string> specs = Split(tags, " "); for (size_t i = 0; i < specs.size(); ++i) { // "tag-pattern:[vdiwefs]" std::string spec(specs[i]); if (spec.size() == 3 && StartsWith(spec, "*:")) { switch (spec[2]) { case 'v': gMinimumLogSeverity = VERBOSE; continue; ... ... } } LOG(FATAL) << "unsupported '" << spec << "' in ANDROID_LOG_TAGS (" << tags << ")"; } }

当需要输出日志时,KernelLogger函数就会被调用:

#if defined(__linux__) void KernelLogger(android::base::LogId, android::base::LogSeverity severity, const char* tag, const char*, unsigned int, const char* msg) { ... ... // 打开log节点 static int klog_fd = TEMP_FAILURE_RETRY(open("/dev/kmsg", O_WRONLY | O_CLOEXEC)); if (klog_fd == -1) return; // 决定log等级 int level = kLogSeverityToKernelLogLevel[severity]; // The kernel's printk buffer is only 1024 bytes. // TODO: should we automatically break up long lines into multiple lines? // Or we could log but with something like "..." at the end? char buf[1024]; size_t size = snprintf(buf, sizeof(buf), "<%d>%s: %s\n", level, tag, msg); if (size > sizeof(buf)) { size = snprintf(buf, sizeof(buf), "<%d>%s: %zu-byte mes
          Download Logo business vector illustration template set 108 Nulled Php      Cache   Translate Page   Web Page Cache   

The post Download Logo business vector illustration template set 108 Nulled Php appeared first on Zerodollarthemes.com.

–>Logo business vector illustration template set 108 18 files | EPS | 79 Mb downloadhttps://uploaded.net/file/7x2vbg97http://www.share-online.biz/dl/B8OTB6DP0Phttp://turbobit.net/1a01g8ofnyq3.htmlhttps://rapidgator.net/file/23816c22c631a558255c070b8561b014https://nitroflare.com/view/AA1989E0A803908http://cloudyfiles.org/xilf54h9mu7chttps://userscloud.com/oaxnddyrjzq2 Direct Download : Logo business vector illustration template set 108 Logo business vector illustration template set 108 is available on a new fast direct download service with over 3,000,000 Files to choose from.Download anything with more then 1000+ Kb/s downloading ...

The post Download Logo business vector illustration template set 108 Nulled Php appeared first on Zerodollarthemes.com.


          SWAM Engine Flutes 2.8.1 (x64)      Cache   Translate Page   Web Page Cache   

SWAM Engine Flutes 2.8.1 (x64)
SWAM Engine Flutes 2.8.1 (x64)
File size: 62.7 MB
Tired of Giga-sized pre-recorded libraries of flutes and of the objective limitations of traditional samplers? SWAM Flutes is the solution. Developed by Audio Modeling using the SWAM Technology (Synchronous Waves Acoustic Modeling) through a combination of innovative performance techniques and concepts of physical and behavioral modeling with the multi-vector/phase-synchronous sampling technique, the SWAM Flutes bundle includes four instruments: Flute, Alto Flute, Bass Flute and Piccolo.


          Market Vector Gold Miners: Pivot points      Cache   Translate Page   Web Page Cache   
Market Vector Gold Miners: Pivot points
More
          より賢く、より可愛く。ピクサー感のあるロボット「Cozmo」の進化版「Vector」がKickstarterに登場      Cache   Translate Page   Web Page Cache   
180809vector_01#source%3Dgooglier%2Ecom#https%3A%2F%2Fgooglier%2Ecom%2Fpage%2F%2F10000
Image: Kickstarter より一家に一台感が出てきました。ライバルはペットというAI搭載ロボット「Cozmo」を開発したAnki社が、新たなロボット「Vector」をKickstarterにて発表しています。どうやら「Cozmo」の進化版みたいな感じのようで、いろんな面で賢くなってるみたいですよ。見た目はシックな色合いになったダークCozmoという感じ。ですがかなりIoT寄りに改良されたみたいで、「Hey Vector」から始まる音声認識を使った会話や、アラーム機能 全文
ギズモード・ジャパン 08月09日 19時00分


          ‘MOAT’ ETF Punching Above Its Tech Weight      Cache   Translate Page   Web Page Cache   
Nowadays, it seems like the miracle elixir to cure any ailing portfolio is to sprinkle in some technology FANG stocks–Facebook, Amazon, Netflix, Google–and all is well. However, ETFs like the VanEck Vectors Morningstar Wide Moat ETF (NYSEArca: MOAT) have managed to outperform the S&P 500 the past three months, punching well above its weighting in tech stocks. [...]
          calendar design vector 2015       Cache   Translate Page   Web Page Cache   
calendar design vector 2015

          ornament design elements vector set       Cache   Translate Page   Web Page Cache   
ornament design elements vector set

          baroque style floral design elements vector       Cache   Translate Page   Web Page Cache   
baroque style floral design elements vector

          vector pencil design elements       Cache   Translate Page   Web Page Cache   
vector pencil design elements

          web design elements vector set       Cache   Translate Page   Web Page Cache   
web design elements vector set

          ornate design elements vector       Cache   Translate Page   Web Page Cache   
ornate design elements vector

          8 Exciting New Kickstarter Projects This Week      Cache   Translate Page   Web Page Cache   

Reading Time: 1 minute From a cute new personal robot to a 3D printed analog camera, these new Kickstarter projects are exciting! Vector by Anki: A giant roll forward for robot kind. Just launched! The Anki team has packed a ton of personality into this bot. Revolutionize Macro Videography, Laowa 24mm f/14 Probe Lens A […]

Click through to read all of "8 Exciting New Kickstarter Projects This Week" at GeekMom.If you value content from GeekMom, please support us via Patreon or use this link to shop at Amazon. Thanks!


          Бесплатный клипарт на тропическую тему      Cache   Translate Page   Web Page Cache   
Бесплатный клипарт на тропическую тему
Лета осталось не очень много, но мы все равно поднимем тропическую тему. А все потому, что она актуальна не только в жаркое время года. Тропические мотивы часто используются в брендинге, это модный принт для текстиля и частые образы в печатной айдентике, причем независимо от сезона. А сегодня мы делимся бесплатным тропическим вектором!     Скачать [...]
          Deutsche Telekom posts 1.3% growth, raises guidance      Cache   Translate Page   Web Page Cache   
For the second quarter of 2018, Deutsche Telekom reported net revenue rose 1.3 percent year-on-year in organic terms, reaching 18.4 billion euros. Adjusted EBITDA rose 3.9 percent in organic terms to 5.9 billion euros. Adjusting for currency variation, revenue was down slightly, by 2.8 percent, while reported adjusted EBITDA was down 0.3 percent.

Citing the positive financial outlook for its U.S. subsidiary, Deutsche Telekom revised upward its full-year guidance for adjusted EBITDA for the second time this financial year.



Some highlights

Germany
  • Mobile service revenues rose 2.9 percent year-on-year in the second quarter, reaching 1.7 billion euros. 
  • 45 percent of mobile contract customers (consumers) under the Telekom brand name already use a product bundle from the MagentaEINS portfolio, compared with 38 percent a year earlier. 
  • At the end of the second quarter, there were 3.9 million MagentaEINS customers, about half a million more than in the second quarter of 2017.
  • Over the last twelve months, Telekom has put 1,000 new mobile sites into operation in order to close remaining gaps in coverage. 
  • 74 percent of households in Germany with a fixed line now have access to fiber-optic-based products (FTTH, VDSL/vectoring), compared with 67 percent a year ago.
  • With 624,000 additional customers opting for fiber-optic-based products, and the overall number rising to almost 11 million, the success of this strategy was once again evident. 
  • Deutsche Telekom added another 80,000 customers overall in the broadband market.
  • In the second quarter of 2018, the Germany operating segment posted a year-on-year increase of 1.9 percent in adjusted EBITDA to 2.1 billion euros. One factor in this growth was a reduced cost base, which fell 2.1 percent to 3.3 billion euros. Revenue decreased slightly, declining 0.9 percent to 5.3 billion euros.
United States
  • T-Mobile US second-quarter service revenues rose 6.1 percent year-on-year to reach 7.8 billion U.S. dollars. Adjusted EBITDA increased by 5.1 percent to 3.0 billion U.S. dollars.
  • The number of branded postpaid customers rose by more than one million in the second quarter. 
  • Overall, T-Mobile US reported 1.6 million new customers in the second quarter – its 21st consecutive quarter of million-plus growth. As of June 30, the customer base was 75.6 million.
Europe
  • Revenue in the Europe operating segment rose 1.3 percent to 2.9 billion euros. 
  • There was a year-on-year increase of 1.8 percent in mobile service revenues.
  • Magyar Telekom (Hungary) delivered the strongest growth in mobile business. 
  • The upward trend in new mobile contract customers (plus 336,000) and new broadband customers (plus 73,000) continued to hold in the second quarter. 
  • The number of customers opting for these convergent products rose 48.3 percent to 2.7 million. 
Systems Solutions
  • Systems Solutions’ total revenue decreased 0.8 percent to 1.7 billion euros. The decline in earnings indicators was accentuated by capital expenditure in areas promising future growth, with adjusted EBITDA falling 11 percent to 121 million euros compared with the prior-year quarter. T-Systems is thus on track for the full-year guidance for 2018.
  • At the end of June, T-Systems launched a transformation program under the motto Investing while Saving to get the company back on the path to growth. 

          Siemens NX PLM      Cache   Translate Page   Web Page Cache   
Logo of Siemens NX PLM

Adobe CC 2018 .ai vector file of SIEMENS NX PLM Software. For personal use use only.

Downloading this artwork you agree to the following:

The above logo design and the artwork you are about to download is the intellectual property of the copyright and/or trademark holder and is offered to you as a convenience for lawful use with proper permission from the copyright and/or trademark holder only. You hereby agree that you agree to the Terms of Use and that the artwork you download will be used for non-commercial use without infringing on the rights of the copyright and/or trademark holder and in compliance with the DMCA act of 1998. Before you use or reproduce this artwork in any manner, you agree to obtain the express permission of the copyright and/or trademark holder. Failure to obtain such permission is a violation of international copyright and trademark laws subject to specific financial and criminal penalties.

Engineering
          Dragan Grafix Logo Designers      Cache   Translate Page   Web Page Cache   

Downloading this artwork you agree to the following:

The above logo design and the artwork you are about to download is the intellectual property of the copyright and/or trademark holder and is offered to you as a convenience for lawful use with proper permission from the copyright and/or trademark holder only. You hereby agree that you agree to the Terms of Use and that the artwork you download will be used for non-commercial use without infringing on the rights of the copyright and/or trademark holder and in compliance with the DMCA act of 1998. Before you use or reproduce this artwork in any manner, you agree to obtain the express permission of the copyright and/or trademark holder. Failure to obtain such permission is a violation of international copyright and trademark laws subject to specific financial and criminal penalties.

Logo of Dragan Grafix Logo Designers

Dragan Grafix Logo Designers, original logo types creation, unique identity design ideas

abstract mark logos, advertising media, bespoke monograms, brand revamps, combination mark logos, customized branding, emblem logos, free design quotations, iconic logos, image vectorization, informative web graphics, logo design, laser cut letters, line art designs, mascot logos, motion picture movie titles, original logo types creation, personalized wall decor, pictorial mark logos, property entrance signs, raster to vector conversions, redesigned logos, retail store signage, scalable vector logos, sign graphics, shop signs, simple yet effective billboards, sticker decals, unique identity design ideas, vinyl cut graphics, website icons, website banner adverts, wordmark type logos

South Africa Design
          RISC-V Executive Director, Rick O’Connor, Interview and Booth Tour      Cache   Translate Page   Web Page Cache   
RISC-V Foundation booth at Embedded World 2018, includes a tour of the demos by GreenWaves Technologies, VectorBlox, UltraSoC and more. Rick O’Connor is the executive director of the RISC-V Foundation (http://riscv.org/risc-v-foundation), The video also includes Martin Croome, VP of Business Development at GreenWaves Technologies (http://greenwaves-technologies.com/en/gap8-product), Guy Lemieux, CEO of VectorBlox (http://vectorblox.com) and John MacDermott, VP […]
          Payment App Design      Cache   Translate Page   Web Page Cache   
Payment App Design

Friends,

Earlier, I have been searching for some free mobile app mockups to present my new mobile UI design and noticed that most of the demo mockups are paid. So, In order to solve that, I have created a mockup so that anyone can download and use it for presenting their designs FREE!

Provided is a free mockup used for mobile UI to showcase your works to the clients in Dribble/Behance.

Press ‘L’ to show your love for my new app design Download Free PSD Mockup

Follow me on Instagram | Behance
User Interface Designed for acodez


          Telekom: Viele Investitionen bei steigenden Cashflows      Cache   Translate Page   Web Page Cache   
Die Deutsche Telekom baut bis nächstes Jahr noch verstärkt FTTC (Vectoring), dann geht es gleitend mit FTTH/FTTB bis zum Haus und hinein.
          GIS Specialist - SNC-Lavalin - Saskatoon, SK      Cache   Translate Page   Web Page Cache   
Performing analysis on vector, raster, and tabular datasets. Creating and maintaining vector, raster, and tabular data and databases....
From SNC-Lavalin - Sun, 05 Aug 2018 09:23:16 GMT - View all Saskatoon, SK jobs
          RF Design Engineer - Ciena - Québec City, QC      Cache   Translate Page   Web Page Cache   
Hands-on experience with RF test instruments such as Vector Network Analyser Spectrum Analyser and High-speed Oscilloscope. We believe in the power of people....
From Ciena - Thu, 12 Jul 2018 08:14:20 GMT - View all Québec City, QC jobs
          Riggers / Technical Animators - Beenox - Activision - Québec City, QC      Cache   Translate Page   Web Page Cache   
A knowledge of the 3D-related mathematics (matrix, vectors, etc.). Beenox is a video game development studio created in 2000....
From Activision - Sun, 08 Jul 2018 05:29:43 GMT - View all Québec City, QC jobs
          PROGRAMMEUR(EUSE) DE JEUX CONSOLE / CONSOLE GAME PROGRAMMER - Frima Studio - Québec City, QC      Cache   Translate Page   Web Page Cache   
Familiar with mathematical concepts applied to videogames (trigonometry, vector algebra, matrix calculus, etc);...
From Frima Studio - Thu, 07 Jun 2018 10:10:26 GMT - View all Québec City, QC jobs
          Ingénieur Conception Électronique - Electronic Design Engineer - Ciena - Québec City, QC      Cache   Translate Page   Web Page Cache   
Hands-on experience with RF test instruments such as Vector Network Analyser Spectrum Analyser and High-speed Oscilloscope strongly desired....
From Ciena - Fri, 18 May 2018 20:15:09 GMT - View all Québec City, QC jobs
          Ingénieur électrique - Lion - Saint-Jérôme, QC      Cache   Translate Page   Web Page Cache   
Posséder des connaissances sur les notions CAN bus et logiciel CANalyzer (suite Vector). Nous sommes présentement à la recherche d’un Ingénieur électrique afin...
From LION - Sat, 21 Apr 2018 07:30:16 GMT - View all Saint-Jérôme, QC jobs
          Ingénieur électrique - Technologie Hypertronic Inc - Blainville, QC      Cache   Translate Page   Web Page Cache   
Posséder des connaissances sur les notions CAN bus et logiciel CANalyzer (suite Vector). Nous sommes présentement à la recherche d’un ingénieur électrique afin...
From Indeed - Fri, 22 Jun 2018 15:44:26 GMT - View all Blainville, QC jobs
          Illustrateur (trice) / Illustrator - Woozworld - Montréal, QC      Cache   Translate Page   Web Page Cache   
Skill to optimize vector visual elements. Mastering 2D vector graphic production with Adobe Animate. Working at Woozworld....
From Woozworld - Wed, 08 Aug 2018 22:25:40 GMT - View all Montréal, QC jobs
          Lab Operations Specialist - enGene - Montréal, QC      Cache   Translate Page   Web Page Cache   
Viral vector platform to deliver genes to mucosal cells lining the gut and other mucosal. The vector system can be administered to the intestine via the oral or...
From enGene - Fri, 03 Aug 2018 22:09:40 GMT - View all Montréal, QC jobs
          Senior Scientist Oral Dosage - enGene Inc. - Montréal, QC      Cache   Translate Page   Web Page Cache   
The vector system can be administered to the intestine via the oral or enema route. Is a high growth biotechnology company developing a robust, proprietary non...
From Indeed - Tue, 24 Jul 2018 11:58:43 GMT - View all Montréal, QC jobs
          3D Artist (Modeler / Animator) - Budge Studios - Montréal, QC      Cache   Translate Page   Web Page Cache   
Optimize the assets of art (graphic vectors); We are looking for a creative and passionate individual to fill the position of Artist / Animator 3D....
From Indeed - Mon, 23 Jul 2018 18:32:06 GMT - View all Montréal, QC jobs
          Ing nieur Mat riel - NexGedia Enterprise Inc. - Montréal, QC      Cache   Translate Page   Web Page Cache   
Posséder des connaissances sur les notions CAN bus et logiciel CANalyzer (suite Vector). Relevant du directeur du département, le titulaire du poste participera...
From NexGedia Enterprise Inc. - Mon, 23 Jul 2018 17:18:56 GMT - View all Montréal, QC jobs
          Senior Software Developer - Chemical Computing Group - Montréal, QC      Cache   Translate Page   Web Page Cache   
Plan to become an expert in SVL, the scientific vector language, and to also acquire knowledge of computational and medicinal chemistry and biologics....
From Chemical Computing Group - Sat, 14 Jul 2018 09:14:18 GMT - View all Montréal, QC jobs
          Scientific Software Developer - Chemical Computing Group - Montréal, QC      Cache   Translate Page   Web Page Cache   
Plan to become an expert in SVL, the scientific vector language, and to deepen or acquire expertise across the domains of computational and medicinal chemistry...
From Chemical Computing Group - Sat, 14 Jul 2018 09:14:16 GMT - View all Montréal, QC jobs
          Lead - Cyber Security - SNC-LAVALIN INFRASTRUCTURE - Montréal, QC      Cache   Translate Page   Web Page Cache   
Knowledge of the profiles of the actors and the vectors of threats as well as the mechanisms of attack eg. Chez SNC-Lavalin, groupe transports collectifs et...
From SNC-LAVALIN INFRASTRUCTURE - Fri, 15 Jun 2018 23:16:00 GMT - View all Montréal, QC jobs
          Senior Unity® / C# Developers - LVL Studio - Montréal, QC      Cache   Translate Page   Web Page Cache   
3D development (Unity 3D, OpenGL, maths, matrices, quaternions, vector, etc.). Senior Unity® / C# Developers....
From LVL Studio - Fri, 15 Jun 2018 01:17:11 GMT - View all Montréal, QC jobs
          Daniel García Moreno: libgepub + rust      Cache   Translate Page   Web Page Cache   

In 2010 I was working with evince, the gnome PDF document viewer, trying to add some accessibility to PDF files. That was really hard, not because GTK+ or ATK technology but because the PDF format itself. The PDF format is really cool for printing because you know that the piece of paper will look the same as the PDF doc, and because it's vector it scales and don't loose quality and files are smaller than image files, but almost all PDF files have not any metadata for sections, headings, tablets or so, this depends on the creation tool, but it's really hard to deal with PDF content text, because you don't know event if the text that you're reading is really in the same order that you read from the PDF.

After my fight against the PDF format hell and poppler, I discovered the epub format that's a really simple format for electronic books. An epub is a zip with some XML files describing the book index and every chapter is a xhtml and xhtml is a good format compared to PDF because you can parse easily with any XML lib and the content is tagged and well structured so you know what's a heading, what's a paragraph, etc.

So I started to write a simple C library to read epub files, thinking about add epub support to evince. That's how libgepub was born. I tried to integrate libgepub in evince, I've something working, rendering with webkit, but nothing really useful, because evince needs pages and it's not easy to split an xhtml file in pages with the same height, because xhtml is continuous text and it adapts to the page width, so I give up and leave this branch.

gnome-books

gnome-books

After some time, I discovered gnome-books, and the idea of epub support comes to me again. Books has an initial epub support, that consists only in showing in the collection, but when you click on the book, an error message was shown because there's no epub preview support.

I've libgepub with GIR support and books was written with gjs so it was easy for me to add an initial support for epub documents using libgepub and rendering with webkit.

So libgepub is used in a gnome app to render epub documents and for that reason gnome depends on libgepub now.

Rustifying everything

In 2017 I discover rust and fell in love with this language, so I wanted to write some code with rust and I started porting this epub library and I ended creating the epub crate, that's basically the same implementation but with rust instead of C, the API is really similar.

After that, I read somewhere that Federico was porting the librsvg code to rust, so I thought that I can do the same with libgepub and replace almost all the C code with this new rust crate.

I copied all the code for autotools to build using cargo and I've copied to the glue code from librsvg and adapt to my own lib. That worked really well and I was able to remove the core libgepub C code and replace with the new rust code.

But rust is really new and it was not full supported in all distributions, so release depending on rust will make the release people's live harder. That's the reason because I decided to leave the C version for now and wait a little to make the rust migration.

And here we're, the libgepub has changed a little, some fixes and small changes, but the main change is that now we're using meson to build instead of autotools, and it's not easy to integrate a rust+cargo lib in the meson desc. There's a PR in meson to support this but it seems that meson devs doesn't like the idea.

So yesterday I was playing around with meson to get back the rust code working in libgepub, and was not easy, but now I've a working build configuration that works. It's a hack with a custom script to build with cargo, but it's working so I'm really happy.

Show me the code

To integrate the rust epub crate in the libgepub C lib I needed to write a simple cargo project with the glue code that converts the rust types to glib/c types and expose that in a C lib, and that's the libgepub_internals, that's full of glue rust+glib code like:

#[no_mangle]
pub extern "C" fn epub_new(path: *const libc::c_char) -> *mut EpubDoc {
    let my_path = unsafe { &String::from_glib_none(path) };
    let doc = EpubDoc::new(my_path);
    let doc = doc.unwrap();
    Box::into_raw(Box::new(doc))
}

#[no_mangle]
pub unsafe extern "C" fn epub_destroy(raw_doc: *mut EpubDoc) {
    assert!(!raw_doc.is_null());
    let _ = Box::from_raw(raw_doc);
}

Then, in the gepub-doc.c, that's the glib object that expose the GIR API, I added calls to this functions, defining each function heading that'll be used from the rust static lib at link time:

// Rust
void      *epub_new(char *path);
void       epub_destroy(void *doc);
void      *epub_get_resource(void *doc, const char *path, int *size);
void      *epub_get_resource_by_id(void *doc, const char *id, int *size);
void      *epub_get_metadata(void *doc, const char *mdata);
void      *epub_get_resource_mime(void *doc, const char *path);
void      *epub_get_resource_mime_by_id(void *doc, const char *id);
void      *epub_get_current_mime(void *doc);
void      *epub_get_current(void *doc, int *size);
void      *epub_get_current_with_epub_uris(void *doc, int *size);
void       epub_set_page(void *doc, guint page);
guint      epub_get_num_pages(void *doc);
guint      epub_get_page(void *doc);
gboolean   epub_next_page(void *doc);
gboolean   epub_prev_page(void *doc);
void      *epub_get_cover(void *doc);
void      *epub_resource_path(void *doc, const char *id);
void      *epub_current_path(void *doc);
void      *epub_current_id(void *doc);
void      *epub_get_resources(void *doc);
guint      epub_resources_get_length(void *er);

gchar     *epub_resources_get_id(void *er, gint i);
gchar     *epub_resources_get_mime(void *er, gint i);
gchar     *epub_resources_get_path(void *er, gint i);

And then calling to this functions:

static gboolean
gepub_doc_initable_init (GInitable     *initable,
                         GCancellable  *cancellable,
                         GError       **error)
{
    GepubDoc *doc = GEPUB_DOC (initable);

    g_assert (doc->path != NULL);
    doc->rust_epub_doc = epub_new (doc->path);
    if (!doc->rust_epub_doc) {
        if (error != NULL) {
            g_set_error (error, gepub_error_quark (), GEPUB_ERROR_INVALID,
                         "Invalid epub file: %s", doc->path);
        }
        return FALSE;
    }

    return TRUE;
}

To make this work, I needed to add the libgepub_internals dependency to the libgepub meson.build like this:

gepub_deps = [
  dependency('gepub_internals', fallback: ['libgepub_internals', 'libgepub_internals_dep']),
  dependency('webkit2gtk-4.0'),
  dependency('libsoup-2.4'),
  dependency('glib-2.0'),
  dependency('gobject-2.0'),
  dependency('gio-2.0'),
  dependency('libxml-2.0'),
  dependency('libarchive')
]

This definition looks for the gepub_internals lib in the libgepub_internals subproject with this meson.build:

project(
  'libgepub_internals', 'rust',
  version: '3.29.6',
  license: 'GPLv3',
)

libgepub_internals_version = meson.project_version()
version_array = libgepub_internals_version.split('.')
libgepub_internals_major_version = version_array[0].to_int()
libgepub_internals_minor_version = version_array[1].to_int()
libgepub_internals_version_micro = version_array[2].to_int()

libgepub_internals_prefix = get_option('prefix')

cargo = find_program('cargo', required: true)
cargo_vendor = find_program('cargo-vendor', required: false)
cargo_script = find_program('scripts/cargo.sh')
grabber = find_program('scripts/grabber.sh')
cargo_release = find_program('scripts/release.sh')

c = run_command(grabber)
sources = c.stdout().strip().split('\n')

cargo_build = custom_target('cargo-build',
                        build_by_default: true,
                        input: sources,
                        output: ['libgepub_internals'],
                        install: false,
                        command: [cargo_script, '@CURRENT_SOURCE_DIR@', '@OUTPUT@'])

libgepub_internals_lib = static_library('gepub_internals', cargo_build)

cc = meson.get_compiler('c')
th = dependency('threads')
libdl = cc.find_library('dl')

libgepub_internals_dep = declare_dependency(
  link_with: libgepub_internals_lib,
  dependencies: [th, libdl],
  sources: cargo_build,
)

I'm using here a custom_target to build the lib using a custom script that simply calls to cargo and then copies the result lib to the correct place:

if [[ $DEBUG = true ]]
then
    echo "DEBUG MODE"
    cargo build --manifest-path $1/Cargo.toml && cp $1/target/debug/libgepub_internals.a $2.a
else
    echo "RELEASE MODE"
    cargo build --manifest-path $1/Cargo.toml --release && cp $1/target/release/libgepub_internals.a $2.a
fi

Then I declared the static_library and the dependency with declare_dependency. I need to add threads and dl because the epub crate depends on it and this works!

I'll need to vendor all dep crates with cargo-vendor for releasing, but I think that this is working and it's the way to go with libgepub.

The future of libgepub + rust

Currently, with the libgepub_internals lib, the gepub-doc.c code is basically to provide a gobject and GIR information to be able to work with epub docs, but the real work is done in Rust. The gnome-class provides a simple way to build this gobject with rust code, but currently it's not completed and there's no way to generate GIR, but in the future, it could be cool to remove the gepub-doc.c code and generate all with gnome-class. I can wait until Federico writes the piece of code that I need for this or maybe I should contribute to gnome-class to be able to do this.

Libgepub also provides a widget that inherits from WebkitWebView to render the book. That widget is written in C to provide GIR data also and we can try to do the same and use gnome-class to write this widget.

But for now, we're really far from this, we need to spend some time improving gnome-class to be able to write all the code in rust and expose the gobject GIR. Meantime we can start to use rust with this glue code, and that's great, because if you've a gobject library and you want to migrate to rust, you don't need to migrate all the code at once, you can do the same that librsvg is doing and migrate function by function and that's really cool.


          forums: ה-TD-W9980 של TP-LINK משווק בישראל (מודם VDSL משולב נתב) (עדכון)      Cache   Translate Page   Web Page Cache   
NewB : היי, סליחה שאני מעורר את הפוסט כאן,אבל לאחרונה בקו שלי החל לפעול vectoring ופעם בכמה ימים יש איבוד מוחלט של סנכרון ואני חייב להתקשר בכל פעם לספק על מנת לבטל את האפשרות,הבעיה :באופן אוטומטי זה כראה מו ...

          This cute new robot from Anki is definitely the droid you’re looking for      Cache   Translate Page   Web Page Cache   
Who among us isn't a sucker for a cute robot you can play games with, that you can ask questions and that beeps like a pint-sized R2D2? Robotics startup Anki is certainly betting a large number of people fall in that category -- and, indeed, will fall in love with the company's new home robot companion Vector, a sibling of sorts to Anki's previous Cozmo robot. Anki has sold more than 1.5 million to date of the latter, remarkable considering Cozmo is an adorable $180 toy comparable to a real-world Wall-E with limited functionality. Here's how Anki president and co-founder Hanns Tappeiner describes Vector, which will cost about $250 and ship in October.

"Vector is a sophisticated product featuring top-notch technology," he writes in a blog post announcing Vector. "With Qualcomm Technologies’ connectivity, an ultra-wide field of view HD camera, infrared emitters for added sensitivity, and capacitive touch, Vector is the full package. In addition to cutting-edge tech, we’ve equipped Vector with a friendly, life-like personality because we believe the future of robots is more than just the best technology. The future of accessible home robots hinges on EQ (emotional quotient) as much as IQ." https://www.youtube.com/watch?v=u_l-YpcRCqE Anki is kicking off a 30-day Kickstarter today that runs through Sept. 6. Backers, among other things, will get a Vector unit at a discounted price, in addition to getting the opportunity to help shape Vector's future development. In terms of what Vector can do, you "wake" him up with a "Hey, Vector." At that point, he listens for any number of simple prompts from you, like asking about the weather, questions about things like the time or the news, taking a photo or playing simple games with you. He has touch sensors and an accelerometer, so he'll know when he's being touched and can "respond" to that, he can identify people and remember faces, and he sports a four-microphone array for directional hearing. Vector also has a high-res color IPS display, and his tech is rounded out by a 6-Axis IMU and a WiFi connection. "Vector’s integrated HD camera has 120-degree ultra-wide field of view, which he uses to see the room he’s in, identify people and objects, and detect motion," the Kickstarter page explains. "Vector also uses an infrared laser scanner to track distance between objects and map his environment as he explores, and a four-microphone array that can pinpoint positional audio. These and other sensors provide the inputs that drive Vector’s emotion engine, with each data point influencing whether he is happy, sad, curious, or any other emotion." When he detects his owner, for example, Vector shows excitement. When he detects a sound behind him, he’ll whirl around to check it out. If his owner pets his backpack, which is where the capacitive touch sensor is positioned, he’ll relax. "And if his drop sensors detect the table’s edge, he’ll be momentarily surprised -- then remember that area as a boundary before he moves to another area to explore. This system of movement, exploration, and emotional stimuli form a foundation that we apply Vector’s personality to." Here's a link to Vector's Kickstarter page. And here's the tweet Anki used to announce him to the world today: https://twitter.com/anki/status/1027177769971662848  
          python osx ENET100      Cache   Translate Page   Web Page Cache   

hello-trying to setup a couple of instruments with LAN &  GPIB ports.  the instruments are a vector network analyzer (E8362B), Switch Unit (34970), a  chassis (NI 1062Q) with various cards.  the Switch Unit only has a gpib(address=10) port and via the ENET100 and a LAN switch connected to the PXI controller (NI PXIe 8133) which appear to be working ('*IDN?' - okay).  with the main computer(OSX), im trying to use python(3.5)  via the LAN switch and enet100 to send commands to the Switch Unit but have been unsuccessful.  the control of the VNA via LAN is fine, the control of the Switch Unit via a USB-GPIB-HS adapter is fine, using the OSX and enet100/ GPIB path via the LAN switch is the problem.  this is my first time using the national instrument  controller and ENET100, my apologies if this is a trivial ask.

 

visa log

dl=rm.open_resource('GPIB1::10::INSTR')

2018-08-08 17:47:00,072 - pyvisa - DEBUG - viParseRsrcEx(4097L, 'GPIB1::10::INSTR', 'c_ushort(1)', 'c_ushort(1)', <ctypes.c_char_Array_256 object at 0x11706bf80>, <ctypes.c_char_Array_256 object at 0x11706b950>, <ctypes.c_char_Array_256 object at 0x11706b8c0>) -> -1073807195


          BRITANIA 90CM RANGE COOKER WITH GUARANTEE EXCELLENT CONDITION⭐️🇬🇧£325🇬🇧⭐️- £325      Cache   Translate Page   Web Page Cache   
PERFECT WORKING ORDER - - 3 MONTHS GUARANTEE - - 90CM W - - FAN ASSISTED OVEN/GRILL - CONVECTOR OVEN/GRILL - CERAMIC HOB ... 
Used  >  Household  >  Appliances  >  Cookers

          Karrieremesse für IT, Ingenieure, Naturwissenschaft & Medizin - jobvector career day in Berlin      Cache   Translate Page   Web Page Cache   
image description
Die Karrieremesse jobvector career day findet am 28. September 2018 wieder in Berlin statt. Auf Absolventen und Berufserfahrene warten Jobs bei Top-Arbeitgebern sowie Informationen zu Karriere und Beruf. Die kostenfreie Messe richtet sich an Informatiker & IT-Spezialisten, Ingenieure, Naturwissensch...
          Anki presenta il nuovo robot Vector      Cache   Translate Page   Web Page Cache   

Piccolo, simpatico e intelligente: ecco Vector, il nuovo robot progettato da Anki e proposto inizialmente sulla piattaforma di crowdfunding Kickstarter.

The post Anki presenta il nuovo robot Vector appeared first on Webnews.


          Vector è il nuovo piccolo robot di Anki      Cache   Translate Page   Web Page Cache   

Vector è il nuovo, piccolo robot progettato da Anki: costantemente connesso al network WiFi domestico, è sempre pronto a interagire tramite comandi vocali.

The post Vector è il nuovo piccolo robot di Anki appeared first on Webnews.


          Weaker dollar hits DT’s Q2 revenue, EBITDA      Cache   Translate Page   Web Page Cache   
Germany’s Deutsche Telekom (DT) has reported net revenue of EUR18.37 billion (USD21.3 billion) for the three months ended 30 June 2018, a decrease of 2.8% from EUR18.89 billion in the year-ago quarter, as the US dollar was about 10% weaker year-on-year against the euro. Adjusted for exchange rate effects, net revenue rose 1.3% in organic terms. Group EBITDA totalled EUR5.56 billion in Q2 2018, down 7.2% from EUR5.99 billion twelve months previously, although adjusted EBITDA was flat at EUR5.93 billion. The Bonn-based telco said that reported net profit (including special factors) dropped 43.4% year-on-year from EUR874 million to EUR495 million, mainly due to the accounting effects of a settlement reached in the ‘Toll Collect’ arbitration proceedings, while adjusted net profit rose 3.3% to EUR1.2 billion in Q2 2018.*In its domestic market, DT generated total revenue of EUR5.32 billion in the second quarter of 2018, down by 0.9% from the year-ago period, while adjusted EBITDA grew 1.9% to EUR2.13 billion. The firm’s German mobile subscriber base reached 43.02 million at 30 June 2018 (an increase of 2.4% y-o-y), of which 24.96 million were post-paid customers. Domestic fixed broadband lines grew 3.1% y-o-y to 13.44 million (of which 6.56 million were fibre-based – VDSL, vectoring and FTTH – lines, up by 30.3%) and pay-TV accesses rose 7.1% to 3.24 million, while fixed network lines continued to slide, falling from 19.48 million at mid-2018 to 18.99 million twelve months later.*T-Mobile US continued to see rapid customer growth, recording more than one million net customer additions for the 21st consecutive quarter. The US cellco ended Q2 2018 with 75.62 million mobile subscribers, an increase of 8.7% from 69.56 million a year earlier, as the number of branded post-paid customers rose 10.9% y-o-y to 40.08 million. Revenue declined 4.5% to EUR8.82 billion, but in US dollars increased by 3.5% y-o-y to USD10.51 billion. Mobile customers across DT’s European operations increased by 4.6% to 49.89 million and retail broadband lines and TV customers grew by 5.1% to 5.67 million and 3.3% to 4.29 million, respectively. Revenue in the Europe segment grew by 1.3% to EUR2.89 billion in 2Q18 and adjusted EBITDA rose 0.6% to EUR953 million.
          Efficacy of Interceptor® G2, a new long-lasting insecticidal net against wild pyrethroid-resistant Anopheles gambiae s.s. from Côte d'Ivoire: a semi-field trial.      Cache   Translate Page   Web Page Cache   
Related Articles

Efficacy of Interceptor® G2, a new long-lasting insecticidal net against wild pyrethroid-resistant Anopheles gambiae s.s. from Côte d'Ivoire: a semi-field trial.

Parasite. 2018;25:42

Authors: Camara S, Ahoua Alou LP, Koffi AA, Clegban YCM, Kabran JP, Koffi FM, Koffi K, Pennetier C

Abstract
BACKGROUND: The widespread insecticide resistance in malaria vector populations is a serious threat to the efficacy of vector control tools. As a result, the World Health Organization (WHO) supports the development of alternative tools that combine several insecticides with the aim of improving vector control and the management of insecticide resistance. In the present study, a long-lasting insecticidal net treated with a mixture of chlorfenapyr and alphacypermethrin was evaluated against wild pyrethroid-resistant Anopheles gambiae s.s in M'bé, Côte d'Ivoire. Centers for Disease Control and Prevention (CDC) bottle tests were carried out with resistant An. gambiae s.s. of M'bé and the susceptible strain, to assess the resistance level to chlorfenapyr and alphacypermethrin.
RESULTS: CDC bottle bioassays revealed a high level of resistance of An. gambiae s.s. population from M'bé to alphacypermethrin, whereas they revealed low resistance to chlorfenapyr. In experimental huts, Interceptor® G2 that was unwashed or washed 20 times killed 87% and 82% of An. gambiae s.s., respectively, whereas Interceptor® LN that was either unwashed or washed 20 times killed only about 10% of the mosquitoes. The blood-feeding inhibition induced by Interceptor® was not significantly different compared to untreated nets, whereas Interceptor® G2 that was unwashed or washed 20 times induced 42% and 34% inhibition of blood-feeding, respectively.
CONCLUSION: Interceptor® G2 met the WHOPES criteria to undergo a phase III study. Investigation of its efficacy at a community level and the conduct of randomized controlled trials dealing with epidemiological outputs are warranted in order to study the potential of Interceptor® G2 to better protect communities.

PMID: 30088473 [PubMed - in process]


          ASSISTANT PROFESSOR - INSECT VECTOR BIOLOGIST / INSECT PHYSIOLOGIST - University of Wisconsin–Madison - Madison, WI      Cache   Translate Page   Web Page Cache   
Assistant Professor - Insect Vector Biologist / Insect Physiologist. Position Vacancy ID:....
From University of Wisconsin–Madison - Mon, 30 Apr 2018 06:48:38 GMT - View all Madison, WI jobs
          Karrieremesse für IT, Ingenieure, Naturwissenschaft & Medizin - jobvector career day in Berlin      Cache   Translate Page   Web Page Cache   
image description
Die Karrieremesse jobvector career day findet am 28. September 2018 wieder in Berlin statt. Auf Absolventen und Berufserfahrene warten Jobs bei Top-Arbeitgebern sowie Informationen zu Karriere und Beruf. Die kostenfreie Messe richtet sich an Informatiker & IT-Spezialisten, Ingenieure, Naturwissensch...
          FakesApp: A Vulnerability in WhatsApp      Cache   Translate Page   Web Page Cache   

Research By: Dikla Barda, Roman Zaikin and Oded Vanunu

As of early 2018, the Facebook-owned messaging application, WhatsApp, has over 1.5 billion users with over one billion groups and 65 billion messages sent every day. With so much chatter, the potential for online scams, rumours and fake news is huge. It doesn’t help then, if threat actors have an additional weapon in their arsenal to leverage the platform for their malicious intentions.

Check Point Research, however, recently unveiled new vulnerabilities in the popular messaging application that could allow threat actors to intercept and manipulate messages sent in both private and group conversations, giving attackers immense power to create and spread misinformation from what appear to be trusted sources.

Our team observed three possible methods of attack exploiting this vulnerability – all of which involve social engineering tactics to fool end-users. A threat actor can:

  1. Use the ‘quote’ feature in a group conversation to change the identity of the sender, even if that person is not a member of the group.
  2. Alter the text of someone else’s reply, essentially putting words in their mouth.
  3. Send a private message to another group participant that is disguised as a public message for all, so when the targeted individual responds, it’s visible to everyone in the conversation.

Following the process of Responsible Disclosure, Check Point Research informed WhatsApp of their findings. From Check Point Research’s view, we believe these vulnerabilities to be of the utmost importance and require attention.

Please read below for our full technical analysis.

[embedded content]

Demonstration Video of the Attacks in Action

Technical Analysis

As is well known, WhatsApp encrypts every message, picture, call, video or any other type of content you send so that only the recipient can see it. What’s more, not even WhatsApp has the ability to view those messages.

Figure 1: WhatsApp Encrypted Chat

These encryption processes caught our attention and we decided to try to reverse WhatsApp’s algorithm to decrypt the data. Indeed, after decrypting the WhatsApp communication we found that WhatsApp is using the “protobuf2 protocol” to do so.

By converting this protobuf2 data to Json we were able to see the actual parameters that are sent and manipulate them in order to check WhatsApp’s security.

The outcome of our research is a Burp Suit Extension and 3 Manipulation methods.
To start the manipulation, though, we first have to get the private and public key of our session and fill it in our burpsuit extension.

If you are interested in a detailed explanation about how the encryption actually works behind the scenes, please read the encryption paragraph at the end of this blog post.

Accessing the Keys

The keys can be obtained from the key generation phase from WhatsApp Web before the QR code is generated:

Figure 2: Public and Private Key of the Communication

After we take these keys we need to take the “secret” parameter which is sent by the mobile phone to WhatsApp Web while the user scans the QR code:

Figure 3: The Secret Key from the WebSocket

As a result of this, our extension will look like the below:

Figure 4: WhatsApp Decoder Burp Extension

After clicking on “Connect”, the extension connects to the extension’s local server, which will perform all the tasks required for the extension.

Manipulating WhatsApp

By decrypting the WhatsApp communication, we were able to see all the parameters that are actually sent between the mobile version of WhatsApp and the Web version. This allowed us to then be able to manipulate them and start looking for security issues.

This resulted in us being able to carry out a variety of attack types, which are described below.

Attack 1: Change the Identity of a Sender in a Group Chat, Even If They Are Not a Member of the Group

In this attack, it is possible to spoof a reply message to impersonate another group member and even a non-existing group member, for example, ‘Mickey Mouse’.

To impersonate someone from the group, all the attacker need do is catch the encrypted traffic:

Figure 5: Encrypted WhatsApp Communication

Once the traffic is captured, he can simply send it to an extension which will then decrypt the traffic:

Figure 6: Decrypting the WhatsApp Message
By Using Our Extension

The interesting parameters to note here are:

  • conversation – This is the actual content which is sent.
  • participant – This is the participant that actually sent the content.
  • fromMe – This parameter indicates if I sent the data or someone else in the group.
  • remoteJid – This parameter indicates to which group/contact the data is sent.
  • id – The id of the data. The same id will appear in the phone databases.

And this is the point where interesting things begin to happen…

For example, we can change the conversation to something else. The message with the content “Great!” sent by a member of a group, for instance, could be changed to something else like: “I’m going to die, in a hospital right now” and the participant parameter could also be changed to someone else from the group:

Figure 7: A Spoofed Reply Message

Note that we have to change the id to something else because it is already sent and appears in the database.

In order to make everyone see the new spoofed message the attacker needs to reply to the message he spoofed, quoting and changing that message (“Great”) in order for it be sent to everyone in the group.

As you can see in the below screenshot, we created a new group where no previous messages were sent, and by using the method from above we were able to create a fake reply.

Figure 8: The Original Conversation

The ‘participant’ parameter can also be a text or a phone number of someone that is not in the group, which would cause everyone in the group to believe that it actually is sent from this participant.

For example:

Figure 9: Changing The Content Of The Message
By Using Our Debugging Tool

…and the result will look like this:

This would again be sent to everyone in the group as before.

Figure 10: Reply To a Message That Sent From
Someone Outside of the Group

Attack 2: Changing a Correspondent’s Reply To Put Words in Their Mouth

In this attack, the attacker is able to manipulate the chat by sending a message back to himself on behalf of the other person, as if it had come from them. By doing so, it would be possible to incriminate a person, or close a fraudulent deal, for example.

In order to spoof the messages, we have to manipulate the ‘fromMe parameter in the message, which indicates who sent the message in the personal chat.

This time we will capture the outgoing message from WhatsApp Web before it is even sent to our Burp Suite. In order to do that we can put a break point on the aesCbcEncrypt function and take the data from the ‘a’ parameter:

Figure 11: OutGoing Message Manipulation

We will then copy this data to our Burp extension and select the outgoing direction. By pressing on “Decrypt”, our extension will decrypt the data:

Figure 12: Decryption of Outgoing Message

After changing it to false and encrypting it back we then get the below result:

Figure 13: Encryption of Outgoing Message

We have to then modify the ‘a’ parameter in our browser, and the result will be a push notification with the content. In this way it is even possible to spoof the entire chat.

Figure 14: Sending Messages To Myself
on Behalf of Someone Else.

The whole conversation will then look like this:

Figure 15: Sending Messages To Myself
on Behalf of Someone Else

Attack 3: Send a Private Message in a Chat Group But When The Recipient Replies, The Whole Group Sees It.

In this attack, it is possible to send a message in a group chat that only a specific person will see, though if he replies to this message, the entire group will see his reply.

In this way it is possible to manipulate a certain member of the group and ‘trip them up’ in order to have them reveal information to the group that they may otherwise not want them to know.

We found this attack vector while we reversed the Android mobile app. In this instance, we found that if the attacker manipulates a simple message in the group, such as “We are the team”, we will actually find this message in ‘/data/data/com.whatsapp/databases/msgstore.db’ database – as seen below.

Figure 16: Sending a Private Message in the Group Chat

We will find this message in ‘/data/data/com.whatsapp/databases/msgstore.db’ database

Then, if we open the conversation on a mobile phone by using the sqlite3 client and issue the following command:

SELECT * FROM messages;

We will see the following data:

Figure 17: Manipulation of the Database

In order to send a message to the group, but restrict it to only a specific group member, we have to set his number under the ‘remote_resourceparameter.

The trick here is to simply change the ‘key_from_me parameter from 0 to 1

Having done this, we will then run the following command and update the key_from_me and the data:

update messages set key_from_me=1,data=”We, all know what have you done!” where _id=2493;

The attacker needs to then close and reopen his WhatsApp to force the application to send the new message. After doing so, the result will be as below:

Notice that only the victim received the message?

If the victim writes something as a response, everybody in the group will get his response, but if he will reply to the message only he will see the replied content and all the others will see the original message…!!

WhatsApp Encryption Explained

Source code: https://github.com/romanzaikin/BurpExtension-WhatsApp-Decryption-CheckPoint

Let’s start with WhatsApp Web. Before generating the QR code, WhatsApp Web generates a Public and Private Key that is used for encryption and decryption.

Figure 23: Private and Public Key of the Conversation

Let’s call our private Key ‘priv_key_list’ and our public Key ‘pub_key_list.

These keys were created by using curve25519_donna by using random 32 bytes.

Figure 24: Encryption Process Curve25519

To decrypt the data we will start to create a decryption code. This will take the private key from WhatsApp Web instead of the random bytes because we need to have the same keys in order to decrypt the data:

self.conn_data[“private_key”] = curve25519.Private(“”.join([chr(x) for x in priv_key_list]))
self.conn_data[“public_key”]  = self.conn_data[“private_key”].get_public()

assert (self.conn_data[“public_key”].serialize() == “”.join([chr(x) for x in pub_key_list]))

Then, after the QR code is created, after scanning it with a phone we can send the following information to Whatsapp Web over a websocket:

Figure 25: The Secret Key From WebSocket

The most important parameter here is secret which then passes to set