- Follow OOCSS (Object Oriented CSS), and DRY (Don’t Repeat Yourself) principles
- Classes should not be named with the actual style it aims to display. That defeats the purpose of using separating HTML for content and CSS for look and feel. You will have tied the HTML to a specific look & feel.
- Eg. class = ‘Blue-button’, or class = ‘width100’ are bad.
- It should be something like class = ‘button’, or class = ‘primary-button’, and the colors and widths are put into the CSS.
- The class should be used to specify the type of element it is.
- Eg. Class = ‘search-result-row’ - all search result rows in the entire site has this class.
- Objects or Identifiable Elements should be identified with an ID, which differentiates them from the elements with the same class.
- Eg. ID = hotel-results or ID = flight-schedule-results, is the container that differentiates the different elements of class search-result-row
Dynamic Search Conditions in T-SQL
Version for SQL 2008 (SP1 CU5 and later)
An SQL text by Erland Sommarskog, SQL Server MVP. Most recent update 2011-08-26.Introduction
There are two ways to attack this problem: dynamic SQL and static SQL. Up to SQL 2005, it was difficult to find solutions for static SQL that were simple to write and maintain and yet performed well, and the recommendation was to use dynamic SQL. In SQL 2008, things changed. Microsoft changed the hint OPTION(RECOMPILE) so it now works as you would expect. However, there was a serious bug in the original implementation, and you need at least CU5 of SQL 2008 SP1 or SQL 2008 SP2 to benefit from this feature.
Although, as we shall see, a solution with static SQL is in one sense more dynamic than dynamic SQL itself. There are still some performance implications, and a properly written solution with dynamic SQL can still be the best choice when you expect many concurrent searches. Dynamic SQL also remains the best choice when you need to support very complex search options.
This article exists in two versions. This version is for SQL 2008 SP1 CU5 and later. The other version is for SQL 2005 and earlier as well for SQL 2008 SP1 up to CU5. That version includes various tricks to deal with the performance problems of static SQL solutions that no longer are an issue with SQL 2008. Therefore, I have not included these tricks in this version.
In this text, I first look at a fairly common simple case of dynamic search conditions, that I've called "alternate key lookup" where the more general methods shoot over the target. I then introduce a typical problem of general dynamic search conditions that serves as a case study when I later discuss the solutions for static and dynamic SQL in detail....
Link to full article
ON THE FLY COMPRESSION IS EASY ON UNIX, BUT IT IS ALSO EASY ON WINDOWS
There are a number of situations where the output results of a program become the input data for other program (for example you may want to compress your backup file with gzip tool and the compressed file be encrypted with Rijndael algorithm using GNU aes tool)
When both programs support stdin and stdout as a mechanism for input output, you can easily pipe the output of the first program to the input of the second program at the command line. For example
gzip –c mybackupfile.bkp | aes –e -p mypass -o mybackupfile.bkp.gz.enc
Unfortunately, this is not always the case and some programs don’t accept stdin and stdout for data input output (this is the case of Oracle import/export tools or Microsoft bcp tool).
On Unix environments these cases have been typically solved using mknod tool to create an OS file pipe. Once the pipe is created, the first program is able to write its output results to the pipe as if it was a normal file and the second program is able to read data from that pipe as if it was a normal file.
As an example, here you can find a largely used script by Oracle DBA to perform on the fly compression of an export operation
# Make a pipe
mknod expdat.dmp p
# Start compress the pipe in background
gzip -c < expdat.dmp > expdat.dmp.gz &
# Wait start the export
sleep 5
# Start the export
exp scott/tiger file=expdat.dmp
As far as I know, there is no similar native way to perform this operation on Microsoft Windows operating system.
I started thinking on it and finally I got a simple solution using Microsoft Windows pipes, zlib library (http://www.zlib.net/zlib123-dll.zip ) and a couple of small tools (less than 100 lines of code each of them) I wrote: ZipPipe.exe and UnZipPipe.exe.
In point 1, I will show several uses of these tools, basically how to perform on the fly compression using Oracle imp and exp tools.
To get the necessary bin files (ZipPipe.exe, UnZipPipe.exe and zlib1.dll I would suggest to read point 2 and 3 of this document, but if you have any problem to obtain these files, just drop me an e-mail at jcarlossaez1@hotmail.com
Note: You can obtain a compiled version of these tools from http://cid-b3378f057444b65c.skydrive.live.com/self.aspx/P%c3%bablico/ZipPipe/zippipe.zip You don´t need anything more than these to run the tools.
1 HOW TO USE ZipPipe AND UnZipPipe TOOLS
1.1 On the Fly compression with Oracle Exp and Imp tools
On Unix environments, it has been largely used scripts allowing on the fly compression of the dump file generated by exp utility.
In the same way, on the fly decompression can be achieved to perform import operations reading directly from a compressed file.
A typical script to perform on the fly compression for the data generated by exp utility is
# Make a pipe
mknod expdat.dmp p
# Start compress the pipe in background
gzip -c < expdat.dmp > expdat.dmp.gz &
# Wait start the export
sleep 5
# Start the export
A typical script to execute an import operation reading directly from a compressed file is
# Make a pipe
mknod expdat.dmp p
# Start decompress to the pipe in background
gzip -c < expdat.dmp.gz > expdat.dmp > &
# Wait start the import
sleep 5
# Start the import
There is no way to accomplish this work in the same way on Windows platforms. When exporting you first export to a normal file and then, you can compress it (except using NTFS built-in compression capabilities, but this is not what we are looking for)
When importing, you need first decompress the file and then you can import the file.
However, whit the ZipPipe and UnZipPipe tools, you can achieve the same behaviour as you have on Unix.
How to perform on the fly compression while exporting on Windows platforms?
Until now, your bat scripts looks something similar to this
exp scott/tiger file=expdat.dmp
gzip expdat.dmp expdat.dmp.gz
Only when exp tool finishes its job, you can start compressing the file. This way needs more disk space and in most of the cases more time.
Look how you can export and compress without any intermediate file
start /MIN ZipPipe EXPPIPE expdat.dmp.gz 9
exp scott/tiger file= \\.\pipe\EXPPIPE
The first line starts our “compressor engine” that listens on named pipe \\.\pipe\EXPPIPE and writes the compressed information to the file expdat.dmp.gz with a compression level of 9 (compression level can be in the range 1 to 9)
When export tool completes the export operation, ZipPipe process detects it and ends
How to perform on the fly decompression while importing on Windows platforms?
Until now, your bat scripts looks something similar to this
gzip –d expdat.dmp.gz expdat.dmp
imp scott/tiger file=expdat.dmp
Only when decompressor tool finishes its job, you can start importing the file. This way needs more disk space and in most of the cases more time.
Look how you can import and decompress without any intermediate file
start /MIN UnZipPipe IMPPIPE expdat.dmp.gz
imp scott/tiger file= \\.\pipe\IMPIPE
The first line starts our “decompressor engine” that listens that reads from the compressed file expdat.dmp.gz and writes the decompressed information to named pipe \\.\pipe\IMPPIPE
When import tool completes the import operation, UnZipPipe process detects it and ends.
You can think on ZipPipe and UnZipPipe as the equivalent tool to mknod plus gzip in the Unix environment.
Of course, you can make many remarks to this solution, but it allows you to achieve the same functionality you have on Unix, saving lot of space in Disks and most of the times reducing import/export duration.
One more thing: it is a pity these tools don’t work with new expdp and impdp tools available in Oracle10g. But don’t blame to Microsoft Windows or to these tools themselves. You won’t be able to perform on the fly compression with these new tools on Unix environments too. It is due to a change in the design of these tools. (And don’t get wrong with the COMPRESS parameter of these new tools. This parameter only compresses metadata).
1.2 On the Fly compression with Microsoft bcp tool
What a terrible pity! I have been able to use these tools only to on the fly compress the output of the bcp in native format.I can not use them for on the fly decompression when using bcp to import or even when downloading data in no native format.
Perhaps someone can make them work.
How do you use bcp to export pubs..authors table to an uncompressed file and then compress?
Typically, at the command prompt in the source SQL Server you only need to type:
bcp pubs..authors out authors.txt -T –n
gzip authors.txt authors.txt.gz
The first command exports the data and the second one compress the generated file using gzip tool
Note that during the process you need enough space to store authors.txt and authors.txt.gz simultaneously provided that at the end you can delete the uncompressed file.
How can you use bcp and ZipPipe to export pubs..authors table directly to a compressed file?
At the command prompt in the source SQL Server you only need to type:
start /MIN ZipPipe authors_pipe authors.txt.gz 9
bcp pubs..authors out \\.\pipe\authors_pipe -T -n
The first command starts our compressor tool (you can think this step is similar to create a pipe and start the background compressor in the Unix environment all in one step).
Second, you only need to start bcp tool, but giving the pipe \\.pipe\ authors_pipe as the file name where bcp has to write.
Another process is launched. This background process is our compressor tool that creates and listens on named pipe \\.pipe\ authors_pipe and saves the data once compressed in the file authors.txt.gz. This process automatically ends when bcp completes export operation.
And you can see how file authors.txt.gz is the only file generated in one step.
Rest of the article where you can find how to build these tools
http://spaces.msn.com/members/jcarlossaez/Blog/cns!1phQKLZOcIUsN9Tj5QObzgdw!112.entry
Problem:
Create one bottle rocket that will fly straight and remain aloft for a maximum amount of time.
Materials- Two 2-liter bottles
- One small plastic cone (athletic)
- Duct Tape
- Scissors
- String
- Manila Folder
- Large Plastic Trash Bag
- Masking Tape or Avery Paper reinforcement labels (you'll need 32/chute.)
- Hole punch
Cut the top and the bottom off of one bottle, so that the center portion or a cylinder remains. | |
Tape the cylinder to another bottle to create a fuselage (a place to store the parachute). | |
Get the manila folder; fins will be made from it. Cut three shapes out of the folded bottom in the shape that the diagram shows. Your fins will be triangular. | |
The next drawing indicates how the fin should look once folded. | |
Mark straight lines on the bottle by putting the bottle in the door frame or a right angle and trace a line on the bottle with a marker. Use these lines as guides to place the fins on the bottles. | |
Make three fins and tape them on the rocket. Be sure that the fins are spaced equally around the rocket body. This can be achieved by using a piece of string and wrapping it around the bottle and marking the string where it meets the end. Mark the string and lay it flat on a meter-stick or ruler. Find the circumference of the bottle by measuring the length of the string to the mark. Once you know the circumference, then you can divide it by three to find the distances the fins should be separated. | |
Use the athletic cone to make your nose cone. Use fairly rigid scissors and cut the bottom square off of the cone. Depending upon your project's mass limitations, place a golf ball sized piece of clay in the tip of the cone. This will add mass to the cone and give the rocket/cone more inertia. Then, using scissors, trim the cone to make it symmetrical. (Hint: the diameter of the bottom of the cone should be a little wider than the diameter of a 2-liter bottle. | |
Attach the cone with string to the top of the other two-liter bottles so that it looks like the diagram. Tie a knot in the end of each piece of string to give it more friction and tape it using a piece of duct tape to the inside of the cone and to the inside of the rocket body. | |
Many students have trouble with their nosecone getting stuck on the top of the rocket and not coming off. This can be prevented by making a pedestal for the cone to sit on. It should be high enough up so that there is space between the cone and the top of the parachute compartment. You can make a pedestal out of the same material you will make the fins, the manila folder. Make three mini-fins, invert them and tape them on the rocket where the cone should sit. |
Making the Parachute
Don't forget a good parachute has shroud lines that are at least as long as the diameter of the canopy. Lay your garbage bag out flat. Cut off the closed end. It should look like a large rectangle and be open at both ends. Lay down the bag on a flat surface and smooth it out. | |
The bag has a long side and a short side and is open at both ends. Fold it in two so that the short side is half as long as it was originally. | |
Make sure the edges are perfectly lined up during each fold. Now fold it in half along the long axis. | |
Make a triangle with the base of the triangle being the closed end of the previous fold. | |
Now fold it again. Fold the hypotenuse so that it lines up with the right side of the triangle in the above drawing. | |
Examine the base of the triangle and find the shortest length from the tip to the base. This is the limiting factor for chute size. The most pointed end will end up being the middle of the canopy. For an example; if you want the diameter of the chute to be 34 inches then measure 17 inches from the center of the canopy (the most pointed side of the parachute) along each side, mark it and then cut it. | |
After cutting it, unfold it. If you have been successful there should be two canopies. | |
Fold the canopy in half, then into quarters, then into eighths. Carefully crease the folds each time. Crease it well and fold it again. Now the canopy is divided into 16ths. Unfold the parachute. Notice the crease marks. Get masking tape and put a piece around the edge at each fold mark. You may also use Avery reinforcement tabs. Place one on both the inside and outside of every crease, making sure that they are overlaid on top of each other. Punch holes through every piece of masking tape or Avery tab pairs and use these to attach the kite-string shroud lines. As mentioned earlier the minimum length of the shroud line should be the same length as the diameter of the canopy. After punching the holes fold the canopy in half. Pick four holes and tie the shroud lines to the holes. After doing this tie the four lines together at the end most distant from the canopy. Repeat this four times until the chute is completed. | |
Once you have it complete attach it inside the fuselage. Generally a couple of pieces of duct tape will hold the parachute to the rocket. Pack the parachute loosely and put the nosecone on the rocket. You are now ready to launch your rocket. | |
Carefully read the safety instructions. Fill the rocket half full of water, place on the launch pad, pressurize, and launch. | |
Be safe, and have fun! |
Click here for full article....
In this article, the term "connection" refers to a single logged-on session of the database. Each connection appears as a Session ID (SPID). Each of these SPIDs is often referred to as a process, although it is not a separate process context in the usual sense. Rather, each SPID consists of the server resources and data structures necessary to service the requests of a single connection from a given client. A single client application may have one or more connections. From the perspective of SQL Server, there is no difference between multiple connections from a single client application on a single client computer and multiple connections from multiple client applications or multiple client computers. One connection can block another connection, regardless of whether they emanate from the same application or separate applications on two different client computers.
Blocking is an unavoidable characteristic of any relational database management system (RDBMS) with lock-based concurrency. On SQL Server, blocking occurs when one SPID holds a lock on a specific resource and a second SPID attempts to acquire a conflicting lock type on the same resource. Typically, the time frame for which the first SPID locks the resource is very small. When it releases the lock, the second connection is free to acquire its own lock on the resource and continue processing. This is normal behavior and may happen many times throughout the course of a day with no noticeable effect on system performance.
The duration and transaction context of a query determine how long its locks are held and, thereby, their impact on other queries. If the query is not executed within a transaction (and no lock hints are used), the locks for SELECT statements will only be held on a resource at the time it is actually being read, not for the duration of the query. For INSERT, UPDATE, and DELETE statements, the locks are held for the duration of the query, both for data consistency and to allow the query to be rolled back if necessary.
For queries executed within a transaction, the duration for which the locks are held are determined by the type of query, the transaction isolation level, and whether or not lock hints are used in the query. For a description of locking, lock hints, and transaction isolation levels, see the following topics in SQL Server Books Online:
- Locking in the Database Engine
- Customizing Locking and Row Versioning
- Lock Modes
- Lock Compatibility
- Row Versioning-based Isolation Levels in the Database Engine
- Controlling Transactions (Database Engine)
- A SPID holds locks on a set of resources for an extended period of time before releasing them. This type of blocking resolves itself over time, but can cause performance degradation.
- A SPID holds locks on a set of resources and never releases them. This type of blocking does not resolve itself and prevents access to the affected resources indefinitely.
Blog on various SQL tuning and internals topics.
@echo off cd /d %~dp0 echo ----------------------------- GETTING IP ----------------------------- wget "http://myip.dtdns.com" -o getip.log type getip.log del getip.log if exist index.html ( set /p MYIP=<index.html echo MYIP=%MYIP% del index.html echo ----------------------------- SETTING IP ----------------------------- wget "http://www.dtdns.com/api/autodns.cfm?id={domain}&pw={password}&ip=%MYIP%" -o setip.log if exist "autodns.cfm*" del autodns.cfm* type setip.log del setip.log )
07/05/11, practice, 6:00 to 8:00 at EHS
07/06/11, practice game, 6:30 to 8:30 at EHS
07/07/11, practice, 6:00 to 8:00 at EHS
ELL Green/Red Wolves
Visitor | Home | Date | Day | Time | Field |
---|---|---|---|---|---|
RED-BLAST | EAST-RED | 4/9 | SAT | 12:00 PM | EHSV |
RED-HEAT | EAST-GREEN | 4/12 | TUE | 545 PM | EHSV |
EAST-RED | BELL EAST | 4/16 | SAT | 2:00 PM | RN1 |
EAST-GREEN | BELL THUNDER-A | 4/17 | SUN | 4:00 PM | NHS |
EAST-RED | ISS/SAM | 4/20 | WED | 545 PM | PCMS |
EAST-GREEN | BELL WEST-MERCER | 4/21 | THU | 6:00 PM | HOM |
BELL THUNDER-A | EAST-RED | 4/23 | SAT | 9:00 AM | EHSV |
EAST-RED | EAST-GREEN | 4/25 | MON | 545 PM | EHSV |
EAST-GREEN | KA/KN-SUNBIRDS | 4/27 | WED | 6:00 PM | EVTC |
EAST-GREEN | FALLS | 4/29 | FRI | 6:00 PM | FCES |
KA/KN-SUNBIRDS | EAST-RED | 4/30 | SAT | 6:00 PM | EHSV |
EAST-GREEN | BELL THUNDER-A | 5/1 | SUN | 1:00 PM | NHS |
RED-HEAT | EAST-RED | 5/3 | TUE | 6:00 PM | EHSV |
FALLS | EAST-RED | 5/4 | WED | 6:00 PM | EHSV |
BELL EAST | EAST-GREEN | 5/7 | SAT | 9:00 AM | EHSV |
ISS/SAM | EAST-GREEN | 5/10 | TUE | 6:00 PM | EHSV |
BELL EAST | EAST-RED | 5/11 | WED | 6:00 PM | EHSV |
EAST-GREEN | KA/KN-SUNBIRDS | 5/12 | THU | 6:00 PM | EVTC |
EAST-RED | BELL THUNDER-B | 5/15 | SUN | 1:00 PM | NHS |
EAST-GREEN | SNO/SVN | 5/17 | TUE | 6:00 PM | CENT2 |
EAST-GREEN | EAST-RED | 5/18 | WED | 6:00 PM | EHSV |
EAST-RED | RED-BLAST | 5/20 | FRI | 6:00 PM | HART4 |
RED-HEAT | EAST-GREEN | 5/21 | SAT | 9:00 AM | EHSV |
EAST-RED | SNO/SVN | 5/24 | TUE | 6:00 PM | CENT2 |
EAST-GREEN | EAST-RED | 5/25 | WED | 6:00 PM | EHSV |
RED-BLAST | EAST-GREEN | 5/31 | TUE | 6:00 PM | EHSV |
EAST-RED | ISS/SAM | 6/1 | WED | 6:00 PM | PCMS |
EAST-GREEN | BELL THUNDER-B | 6/2 | THU | 6:00 PM | HV2 |
BELL THUNDER-B | EAST-GREEN | 6/7 | TUE | 6:00 PM | EHSV |
BELL WEST-MERCER | EAST-RED | 6/8 | WED | 6:00 PM | EHSV |
EAST-RED | FALLS | 6/10 | FRI | 6:00 PM | FCES |
RED-BLAST | EAST-GREEN | 6/11 | SAT | 12:00 PM | EHSV |
Stealth
Tournament | League | Date | Location | Notes |
---|---|---|---|---|
March Maddness | NSA | March 12-13 | Marysville | Rained out |
Practice Game - March 20 | March 19-20 | Woodinville | ||
Monroe Invite | NSA | March 26-27 | Monroe | Need to pickup 2 players |
The AXE | USSSA | April 9-10 | Federal Way | |
Pair-A-Dice | ASA | April 16-17 | Vegas | |
Kent Bash | USSSA | April 23 one day | Kent | Saturday only |
Memorial Day Tournament | ASA | May 28-29-30 | Seattle | Wenatchee |
FW SLAM Imvitational | ASA | June 4-5 | Seattle | |
Father's Day Invite | USSSA | June 18-19 | Kent | |
July Classic | July 16-17 | Seattle | Not Signed up-June decision | |
WA State Championship | July 23-24 | Kent | Not Signed up-June decision | |
Bend Showdown | ASA | Aug 12-13-14 | Bend |
- Have an adult member of your family read and sign the Parent Guide in the front of the Webelos Scout Book.
- Be an active member of your Webelos den for 3 months.
- Know and explain the meaning of the Webelos badge.
- Point out and explain the three parts of the Webelos Scout uniform. Tell when to wear the uniform and when not to wear it.
- Earn the Fitness and Citizen activity badges and one other activity badge from a different activity badge group.
- Plan and lead a flag ceremony in your den that includes the U.S. flag.
- Show that you know and understand the requirements to be a Boy Scout.
- Demonstrate the Scout salute, Scout sign, and Scout handshake. Explain when you would use them.
- Explain the Scout Oath, Scout Law, Scout motto, and Scout slogan.
- Explain and agree to follow the Outdoor Code.
- Faith
After completing the rest of requirement 8, do these (a, b, and c):
- Know: Tell what you have learned about faith.
- Commit: Tell how these faith experiences help you live your duty to God. Name one faith practice that you will continue to do in the future.
- Practice: After doing these requirements, tell what you have learned about your beliefs.
- Earn the religious emblem of your faith*
- Do two of these: (Use this Worksheet to track activity)
- Attend the mosque, church, synagogue, temple, or other religious organization of your choice, talk with your religious leader about your beliefs. Tell your family and your Webelos den leader what you learned.
- Discuss with your family and Webelos den leader how your religious beliefs fit in with the Scout Oath and Scout Law, and what character-building traits your religious beliefs have in common with the Scout Oath and Scout Law.
- With your religious leader, discuss and make a plan to do two things you think will help you draw nearer to God. Do these things for a month.
- For at least a month, pray or meditate reverently each day as taught by your family, and by your church, temple, mosque, synagogue, or religious group.
- Under the direction of your religious leader, do an act of service for someone else. Talk about your service with your family and Webelos den leader. Tell them how it made you feel.
- List at least two ways you believe you have lived according to your religious beliefs.
Arrow of Light Requirements
The highest award in Cub Scouts is earned by Webelos that have been active participants in their den and are ready to join a Boy Scout troop. Many of the requirements for the Arrow of Light are intended to familiarize the scout with a local troop and hopefully show him that crossing over into a troop is the next step to take in scouting. A scout that earns his Arrow of Light patch has also completed nearly all the requirements to earn the Scout badge in the troop so he has already begun his Boy Scout trail.
- Be active in your Webelos den for at least six months since completing the fourth grade (or for at least six months since becoming 10 years old), and earn the Webelos badge.
- Show your knowledge of the requirements to become a Boy Scout by doing all of these:
- Repeat from memory and explain in your own words the Scout Oath or Promise and the 12 points of the Scout Law. Tell how you have practiced them in your everyday life.
- Give and explain the Scout motto, slogan, sign, salute, and handshake.
- Understand the significance of the First Class Scout badge. Describe its parts and tell what each stands for.
- Tell how a Boy Scout uniform is different from a Webelos Scout uniform.
- Tie the joining knot (square knot)
Use this handy Memorization Wheel to learn and review the Scout Oath, Law, Motto, Slogan, and Outdoor Code. - Earn five more activity badges in addition to the three you already earned for the Webelos badge. These must include:
- Fitness (already earned for the Webelos badge)
- Citizen (already earned for the Webelos badge)
- Readyman
- Outdoorsman
- At least one from the Mental Skills Group
- At least one from the Technology Group
- Two more of your choice
- With your Webelos den, visit at least
- one Boy Scout troop meeting
- one Boy Scout-oriented outdoor activity. (If you have already done this when you earned your Outdoorsman activity badge, you may not use it to fulfill requirements for your Arrow of Light Award.)
- Participate in a Webelos overnight campout or day hike. (If you have already done this when you earned your Outdoorsman activity badge, you may not use it to fulfill requirements for your Arrow of Light Award requirements.)
- After you have completed all five of the above requirements, and after a talk with your Webelos den leader, arrange to visit, with your parent or guardian, a meeting of a Boy Scout troop you think you might like to join. Have a conference with the Scoutmaster.
- Complete the Honesty Character Connection.
- Know: Say the Cub Scout Promise to your family. Discuss these questions with them. What is a promise? What does it mean to keep your word? What does it mean to be trustworthy? What does honesty mean?
- Commit: Discuss these questions with your family. Why is a promise important? Why is it important for people to trust you when you give your word? When might it be difficult to be truthful? List examples.
- Practice: Discuss with a family member why it is important to be trustworthy and honest. How can you do your best to be honest even when it is difficult?
Webelos Scout Activity Badges
- Activities to earn the Webelos badge and Arrow of Light award
PHYSICAL | AQUANAUT, ATHLETE, FITNESS, SPORTSMAN |
---|---|
MENTAL | ARTIST, SCHOLAR, SHOWMAN, TRAVELER |
COMMUNITY | CITIZEN, COMMUNICATOR, FAMILY MEMBER, READYMAN |
TECHNOLOGY | CRAFTSMAN, ENGINEER, HANDYMAN, SCIENTIST |
OUTDOOR | FORESTER, GEOLOGIST , NATURALIST, OUTDOORSMAN |
Categories
- Android (2)
- Backpacking (5)
- BBQ (3)
- Bikes (3)
- Boy Scouts (6)
- Breakfast (2)
- Cars (1)
- Chinese (2)
- CMD (8)
- eBooks (1)
- ELL (1)
- Family (13)
- Favorite Poetry (6)
- Flame (1)
- Fun (29)
- Instructables (4)
- Joannie (38)
- LDS Church (12)
- Men's Health Lists (2)
- Oracle (2)
- Pixar (1)
- PowerShell (4)
- Productivity (1)
- Projects (8)
- Recipe (46)
- Reign (2)
- RV (1)
- Scouting (7)
- Security (1)
- Shopping (7)
- Smoking (3)
- Softball (7)
- Sports (6)
- SQL Server (61)
- Stealth (1)
- Tools (58)
- Video (23)
- Visual Studio (5)
- Webelos (2)
Recent Posts
Archives
-
►
2014
(2)
- ► 04/20 - 04/27 (1)
- ► 03/30 - 04/06 (1)
-
►
2013
(9)
- ► 11/24 - 12/01 (3)
- ► 10/06 - 10/13 (1)
- ► 09/08 - 09/15 (1)
- ► 08/18 - 08/25 (2)
- ► 06/09 - 06/16 (1)
- ► 04/28 - 05/05 (1)
-
►
2012
(12)
- ► 06/24 - 07/01 (1)
- ► 06/03 - 06/10 (3)
- ► 05/27 - 06/03 (1)
- ► 05/20 - 05/27 (2)
- ► 04/22 - 04/29 (1)
- ► 03/18 - 03/25 (3)
- ► 03/04 - 03/11 (1)
-
▼
2011
(84)
- ► 10/30 - 11/06 (2)
- ► 07/10 - 07/17 (4)
- ► 06/26 - 07/03 (6)
- ► 06/12 - 06/19 (2)
- ► 05/29 - 06/05 (1)
- ► 04/17 - 04/24 (1)
- ► 04/10 - 04/17 (2)
- ► 04/03 - 04/10 (2)
- ► 03/13 - 03/20 (1)
- ► 03/06 - 03/13 (1)
- ► 02/27 - 03/06 (1)
- ► 02/20 - 02/27 (1)
- ► 02/13 - 02/20 (5)
- ► 02/06 - 02/13 (1)
- ► 01/30 - 02/06 (41)
- ► 01/23 - 01/30 (4)
- ► 01/09 - 01/16 (1)
- ► 01/02 - 01/09 (1)
-
►
2010
(56)
- ► 12/26 - 01/02 (1)
- ► 12/12 - 12/19 (4)
- ► 12/05 - 12/12 (2)
- ► 11/28 - 12/05 (1)
- ► 11/14 - 11/21 (6)
- ► 10/31 - 11/07 (4)
- ► 10/24 - 10/31 (4)
- ► 10/17 - 10/24 (1)
- ► 10/10 - 10/17 (2)
- ► 10/03 - 10/10 (4)
- ► 09/26 - 10/03 (3)
- ► 09/19 - 09/26 (1)
- ► 09/12 - 09/19 (9)
- ► 08/08 - 08/15 (1)
- ► 06/20 - 06/27 (1)
- ► 04/04 - 04/11 (1)
- ► 03/14 - 03/21 (1)
- ► 02/21 - 02/28 (3)
- ► 02/07 - 02/14 (3)
- ► 01/31 - 02/07 (2)
- ► 01/03 - 01/10 (2)
-
►
2009
(58)
- ► 12/20 - 12/27 (1)
- ► 09/20 - 09/27 (7)
- ► 09/06 - 09/13 (1)
- ► 07/26 - 08/02 (1)
- ► 07/12 - 07/19 (1)
- ► 06/14 - 06/21 (1)
- ► 06/07 - 06/14 (4)
- ► 05/31 - 06/07 (2)
- ► 05/24 - 05/31 (4)
- ► 05/17 - 05/24 (5)
- ► 05/10 - 05/17 (9)
- ► 05/03 - 05/10 (12)
- ► 04/26 - 05/03 (10)
Favorite Links
Favorite Tunes
Pronounced
of or pertaining to the period in which a fisherman must leave to go fishing. |
of or pertaining to applications in which the computer must respond as rapidly as required by the user or necessitated by the process being controlled. |