0 Comments
If the queue is full, it throws an IllegalStateException.Java Queue Interface Tutorial with Examples Rajeev Singh Java Ap1 mins readĪ Queue is a First In First Out (FIFO) data structure. The add() method is used to add an element to the queue, returning true upon success. The Queue interface provides several methods for adding elements to a queue, including add() and offer(). The most basic operation you can perform on a queue is adding elements to it. Queues provide several useful methods for managing them, let’s see some examples. This makes it a good choice for use in multi-threaded environments where multiple threads need to access the queue at the same time.Īdditionally, the ConcurrentLinkedQueue uses a lock-free algorithm, which means that it does not use locks to synchronize the access to the queue, leading to better performance in high-concurrency scenarios. Unlike a regular LinkedList, which is not thread-safe and can lead to data inconsistencies when used in a multi-threaded environment, a ConcurrentLinkedQueue ensures that all operations are atomic and that no thread is blocked during the execution of an operation. It is a linked-list based implementation of a queue that allows for concurrent operations, such as multiple threads inserting or removing elements from the queue at the same time. ConcurrentLinkedQueueĪ ConcurrentLinkedQueue is a thread-safe implementation of the Queue interface. PriorityQueue is useful when it’s important that the element with the highest priority is always processed first, such as in the case of scheduling tasks or handling events in a computer program. If the elements are not comparable, a runtime exception will be thrown. The elements in the PriorityQueue are ordered either by natural ordering or by a comparator provided at the time of creation. The implementation of the PriorityQueue is typically based on a heap data structure, which allows for efficient insertion, deletion and retrieval of the highest-priority element. The elements are ordered in such a way that the element with the highest priority is always at the head of the queue, while elements with lower priorities are at the tail. PriorityQueueĪ PriorityQueue is a special type of queue that orders its elements according to their natural order or according to a provided comparator. It is useful when you need to frequently add or remove elements from the beginning or end of the list and less so when you need to access elements at a specific position in the list. LinkedList allows for O(1) insertions and deletions at the beginning and end of the list, while the lookup time is O(n) as it needs to iterate through the elements. In addition to implementing Queue, it also implements List interface and provides a doubly-linked list, meaning that each node has a reference to the next node as well as the previous node. LinkedListĪ LinkedList is a data structure that consists of a sequence of elements, each element referred as node. Each class has its own advantages and disadvantages, and the choice of which to use will depend on the specific requirements of your application. There are several classes that implement the Queue interface, including LinkedList, PriorityQueue, and ConcurrentLinkedQueue. Thread Safe: Some Queue implementations, such as the ConcurrentLinkedQueue, are thread-safe, meaning that they can be used in multi-threaded environments without the need for additional synchronization.This is useful when you need to process elements in a specific order. Priority Queue: Some Queue implementations, such as the PriorityQueue, allow elements to be sorted based on their natural order or a custom comparator.Iterable: Queues implement the Iterable interface, which means that you can iterate over the elements in the queue using a for-each loop.Dynamic Size: Queues can grow and shrink dynamically, depending on the number of elements added and removed from the queue.This ensures that the elements are processed in the order they were received.
SB combined with PPV may not be an efficacious approach to reduce the risk of post-vitrectomy RD. Intraoperatively, endolaser photocoagulation is preferred to a laser indirect ophthalmoscope, as it improves surgeon ergonomics and prevents direct iris damage. However, the application of a low-intensity, nearly confluent laser to the vitreous base should reduce the risks. Higher laser power has the potential to create retinal breaks at the laser edges, formation of proliferative vitreoretinopathy, and pupillary abnormalities due to ciliary nerve damage. 22 Thus, adjunct or prophylactic 360° laser retinopexy appears to be advantageous in the prevention of postoperative RD. 20,21 In particular, prophylactic extended vitreous base laser significantly reduces the risk of RD in patients with Stickler syndrome. 19 Additionally, there is a threefold reduction in the incidence of postoperative RD with the use of prophylactic 360° laser retinopexy. 18 A large series in Japan noted a significant risk reduction of post-PPV RD with 360° laser retinopexy at the vitreous base. The use of prophylactic 360° laser retinopexy versus localized laser retinopexy around identified retinal breaks to reduce the risk of post-PPV RD is an area of debate. 15,16 Further, SBs induce significant tenons and conjunctival scarring, thereby creating challenges for and limiting the efficacy of potential future glaucoma filtering procedures. 10,13,14 The practical arguments for PPV alone are that there is no induced myopia or strabismus, and there are fewer ocular surface disorders due to minimal conjunctival and epithelial disruption. SBs are associated with 2.75 D of induced myopia, diplopia, infection, and extrusion. 5 In Brazitikos et al, a series of vitrectomies without SB produced better RD outcomes than the PRO series of PPV outcomes, which included SBs. 4 Additionally, a large meta-analysis comparing PPV, SB, and pneumatic retinopexy found similar outcomes with PPV and SB with no added benefit of combined PPV/SB. 3 Further, a Cochrane review comparing SBs with PPV found low-certainty evidence favoring PPV. For example, in a meta-analysis comparing PPV with PPV/SB, there is similar single-surgery anatomic success between the approaches. Other studies have compared SB, PPV, and PPV/SB, and the data suggest that combining PPV with SB doesn’t add any benefit. 2 However, an argument can be made that it is the degree of retinopexy that provides the benefit. 2 Advocates of PPV/SB believe that the buckle reduces postoperative PPV RD compared with vitrectomy alone. Some surgeons suggest using an SB or combined SB/PPV at the time of RD surgery. 10Įyes with a low risk of postoperative RD are those in which a prior PVD has occurred without RD, retinal break, or lattice degeneration eyes with diabetic tractional RDs and post-PPV eyes with sufficient vitreous removal accompanied by 360° scleral depression. 9 The interaction with the superior aspect of perfluorocarbon liquid in cases of medium-term PFO may cause new superior retinal breaks. 6-8 The interaction between residual vitreous and the air, gas, or silicone bubbles may lead to new inferior retinal breaks. This can include macular hole repair, non-PVD associated detachments (young myopes with round holes), vitreomacular traction, vitreomacular schisis, and inherited collagenopathies, such as Stickler syndrome and Wagner syndrome. Eyes at the highest risk of developing post-PPV RD are those in which a posterior vitreous detachment (PVD) is created during vitrectomy. There are several factors that lead to the development of postoperative RD. 3-5 In this article, we discuss risk factors for post-PPV RD and address the growing controversy regarding the best treatment approach for patients at high risk for this postoperative complication. 2 However, studies suggest that PPV/SB may not be efficacious. 1 Others advocate for using a SB or combining SB and PPV. The evolution of vitrectomy technology (25- and 27-gauge, high cutting rates, advanced fluidics, and endolaser photocoagulation) has led to additional treatment options and opportunities for improved patient outcomes.Ĭurrently, many surgeons prefer to perform PPV over scleral buckle (SB) procedures for RDs. Reducing the development of retinal detachments (RDs) after pars plana vitrectomy (PPV) to treat a variety of vitreoretinal disorders is an ongoing, ever-changing endeavor. It uses a Windows Icon, Menu, and Pointer (WIMP) interface much like the one you probably already know and love. Mint with several desktop environments like Cinnamon looks a lot like XP or Windows 7. And my current favorite desktop operating system is Linux Mint 20.2. What's a Windows 10 user to do? They should turn to Linux Mint, in particular, the version using the Cinnamon interface. Linux Mint features: Price: Free | Core code: GNOME 2.x | Open source? Yes If you see inaccuracies in our content, please report the mistake via this form. If we have made an error or published misleading information, we will correct or clarify the article. Our editors thoroughly review and fact-check every article to ensure that our content meets the highest standards. Our goal is to deliver the most accurate information and the most knowledgeable advice possible in order to help you make smarter buying decisions on tech gear and a wide array of products and services. ZDNET's editorial team writes on behalf of you, our reader. Indeed, we follow strict guidelines that ensure our editorial content is never influenced by advertisers. Neither ZDNET nor the author are compensated for these independent reviews. This helps support our work, but does not affect what we cover or how, and it does not affect the price you pay. When you click through from our site to a retailer and buy a product or service, we may earn affiliate commissions. And we pore over customer reviews to find out what matters to real people who already own and use the products and services we’re assessing. We gather data from the best available sources, including vendor and retailer listings as well as other relevant and independent reviews sites. ZDNET's recommendations are based on many hours of testing, research, and comparison shopping. Ubuntu 15.10 was released in the 10th month (October) of the year 2015. The XX is the year of the release and YY is the month of the release. So, we get Ubuntu 16.04 in the 4th month (April) of the year 2016. An Ubuntu release has version number of the format XX.YY. The month and year of the release play a vital role in the version number of an Ubuntu release. The first mailing list for the Ubuntu team was called “warthogs“, and the team used to hang out on #warthogs on. In the above discussion, lifeless is Robert Collins and sabdfl is Mark Shuttleworth. Sabdfl: so we’ll have to nickname it the warty warthog release. Lifeless: six months! thats not a lot of time for polish. Lifeless: how long before we make a first release? Mark Shuttleworth and Robert Collins were discussing about the first version of Ubuntu. There is an interesting story behind this naming convention. One of the most popular Linux distribution, Ubuntu follows a biannual release cycle with one release coming in April and other in October. Sit tight, this is going to be a fun ride :) Ubuntu version numbering and codenaming I am going to tell you about the logic behind code naming of some of the most popular Linux distributions. After all, the code name is an integral part of a release and the dev team puts an effort for that as well, isn’t it? Yet, as a curious Linux user, you might want to know the logic behind codename of a release. It doesn’t make any difference to how a particular Linux distribution function. The question about the code-names is really trivial. Ubuntu 16.04 will be called Xenial Xerus. The upcoming Linux Mint 18 has been codenamed Sarah. Have you ever wondered about the code name of the latest release of your favorite Linux distribution? When logged in on the 192.168.1.1 web-interface of the stock firmware, upload the openwrt-18.06.2-ar71xx-tiny-tl-wr841-v7-squashfs-factory.bin file to the router. Pick the tiny verion of OpenWrt due to its 4MB flash size memory limitations. The TP-Link WR841ND relies on the Atheros AR7241 chipset. I downloaded the firmware binary via the latest official OpenWRT repository which is sorted by chipset platform. Lets download the latest version of OpenWrt so we can replace the stock firmware on the router. Figure 1 shows this process:įigure 1: OpenWrt 802.1X authentication overview Flashing the firmware The eduroam or Ziggo 8021.X authenticator server will eventually verify and approve or deny authentication based on username, password and certificate. The OpenWrt router authenticates with 802.1X to an open AP such as eduroam or Ziggo HotSpots. Technical overviewĬlients can connect over RJ45 or WPA2 to the bridged TP-link OpenWrt router. You are only able to attach external high gain directional antennas to the D-models. Note that the D in TP-Link TL-WR841N D standsfor Detachable antenna(s). We will use a TP-Link TL-WR841ND v7.1 and a Yagi RP-SMA 2.4 GHz High Gain 16 DBi antenna. This blog post will eleborate on how you can leverage your wireless router to connect to any wireless access point into your home network. We picked OpenWrt for this project since DD-WRT is updated less frequently than OpenWrt plus OpenWrt is more mainline in terms of its Linux kernel. Alternative router firmware such as DD-WRT and OpenWrt are typically more secure. Many stock router firmware are consistently plagued by exploits due to bad quality control and are no longer being updated after the routers reach their end-of-life (EOL). Throughout the years it has been known that many SOHO wireless routers are prone to security vulnerabilities. Starbucks has been struck with another bit of bad news.Cryptsus Blog | We craft cyber security solutions. CNN Business reports that the chain will be permanently closing 16 locations due to safety concerns. "After careful consideration, we are closing some stores in locations that have experienced a high volume of challenging incidents that make it unsafe to continue to operate," a spokesperson for Starbucks told CNN. The stores that will be closing at the end of July are located in Seattle, Los Angeles, Philadelphia, Washington, D.C., and Portland. To help cool you off, Starbucks is highlighting five delicious grande (16 fl oz) cold coffee beverages (which continue to be popular with customers year-round), all under 150 calories. 19 categories in total 4032 food items Calories in Starbucks. Workers in those locations will reportedly be moved to neighboring stores.ĭebbie Stroud and Denise Nelson, senior vice presidents of U.S. Iced Caff Latte customized with Sugar Free Vanilla Syrup (130 calories) Starbucks dark, rich espresso combined with 2 milk and served over ice. A Starbucks barista and Reddit user shared a photo online revealing how she messes with. Browse all the foods and products from Starbucks and get their nutritional information. See ingredients, nutrition and other product information here. operations, shared a letter with partners on July 11 providing additional details on the closures. Sadly, the growing mental health crisis, rising drug use, and racism were all cited in the letter. "You’re also seeing firsthand the challenges facing our communities – personal safety, racism, lack of access to healthcare, a growing mental health crisis, rising drug use, and more," the letter reads. Here you will find the allergen and nutrition information for all the Starbucks food and beverages you love. "With stores in thousands of communities across the country, we know these challenges can, at times, play out within our stores too. We read every incident report you file – it’s a lot." Beverage Nutritional Information This guide contains nutritional information on many of our classic beverages you enjoy at Starbucks. Stroud and Nelson did share a good deal of optimism, along with a plan of action in the letter. The company intends to keep Starbucks workers safe both physically and mentally. Any further instructions?” The person on the other end of the line will freak out in epic proportions. Dial a random number and say, “I’ve acquired the target and dumped the body at the address. This prank is sure to scare a lot of people. After they agree, ask them ridiculous questions like, “why aren’t strawberries blue?” or “why is the sun pink?” Target Acquired Most people would say yes due to the promise of a prize. As such, that is what you are going to do.ĭial a random number and ask them if they’d like to do an exciting survey that comes with prizes. As we all know, everyone hates phone operators that try to convince you to take a survey. This prank is one of the most annoying on this list. They might even vibe to the song you play, and you could make a new friend. The person on the call will be instantly annoyed and hang up. All you need to do is dial a random number and play some music over your speaker without saying a word. If they say “milk”, tell them “sorry, the answer is water,” then hang up.Īlternatively, if they say “water,” tell them that you were referring to baby cows who drink their mother’s milk, then hang up. Tell them to say the word “milk” twenty times. Tell them that to claim the tickets, they have to answer a question. Call a random person and say you’re calling from a radio station, and they’ve won tickets to an upcoming concert. This prank is one of the oldest tricks in the book. This way, you get to hear the hilarious tale of the worker warning all their colleagues to stay off the exploding phone lines. This prank will work best if you know the person. Please stay off the phone lines throughout the afternoon.” We would be passing heavy current through the lines to overhaul the system. Say something ridiculous like, “My company has slated a phone line overhaul for today. Call a random office and tell them that you’re coming from the phone repair company. This trick is a bit unconventional, but if you pull it off properly, you’re sure to score a couple of laughs. They’d be so confused that they wouldn’t even know what to say. After a while, call them back and say that you’re Mr Jim and ask them if there are any messages for you. Repeat this a couple of times throughout the day. Call any random number but store the number, as you will be calling the person multiple times.Īsk for Mr Jim, then when the person says it isn’t him, tell them “Wrong number,” and hang up the phone. This trick will work if you have the patience to pull it off. Try getting a pizza from Krispy Kreme or a box of tacos from Dominos, and wait for the shock in their responses. Call up any restaurant or food outlet and request food that they don’t serve. It works so well because food outlets have no choice but to engage you in conversation. This prank is one of the most comical tricks in the book. If they say yes, tell them, “You better go catch it!” Tacos from Krispy Kreme? Call a random person and ask if their refrigerator is running. In all honesty, this joke probably won’t work on many people, but that’s what makes it more hilarious. To spice things up, you could add statements like, “how could you forget about me?” or “has it been that long?” Is Your Refrigerator Running? They will eventually get annoyed and hang up. They will probably ask you for your identity and how you got their number but ignore those questions and continue the conversation casually. Call a random number and ask them how they are doing. This is another prank that is sure to ruffle some feathers. Make sure you get in a proper giggle before the person hangs up. The person will probably deny it multiple times and eventually get annoyed. Dial-up a random number and ask the person why they called you. This trick is one of the oldest and most hilarious in the book. If you haven’t noticed yet, this article is dedicated to one of the best ways to spread laughter and joy: hilarious prank calls! Without further ado, here are eighty of some of the most creative and comical prank call ideas. He added that only the antics of practical jokes could expose this façade. He opined that under this “façade” of orderliness, there lies laughter, joy, and disorder. In the sublime words of Mac Barnett, “Not only is a good prank harmless, but, like a good story, it reveals an essential truth that would otherwise be hidden.” Mac Barnett is a firm believer that a good prank can spread laughter and joy as far as the eye can see. The joy that you’re responsible for the happiness of another and the feeling that you’re spreading happiness, the entirety of it, is truly delightful. For as long as I can remember, there hasn’t been any greater joy than that warm feeling that emanates from your heart when you put a smile on someone’s face. var stringnamenew String ('hello javascript string') document.write (stringname) . Let's see the example of creating string in JavaScript by new keyword. Here, as a source object, we will take a string, and as a destination object, we will use the empty array. The syntax of creating string object using new keyword is given below: var stringnamenew String ('string literal') Here, new keyword is used to create instance of string. It copies the content from the source object to the destination object. To get the full Unicode code point at the given index, use (). charCodeAt () always indexes the string as a sequence of UTF-16 code units, so it may return lone surrogates. The same also happens when the separator is not present in the string. The charCodeAt () method of String values returns an integer between 5 representing the UTF-16 code unit at the given index. If the separator is unspecified then the entire string becomes one single array element. split (splitCommands, 3 ) ) // Specifications SpecificationĮCMAScript Language Specification # īCD tables only load in the browser with JavaScript enabled. The third method to convert the string to a character array is by using the Object.assign () method. Syntax: str.split (separator, limit) separator: It is used to specify the character, or the regular expression, to use for splitting the string. Js function splitString ( stringToSplit, separator ) const commands = "light on brightness up brightness up brightness up light on brightness down brightness down light off" Ĭonsole. console.log(omCharCode(65)) So here's how you can convert C3 into a number and, optionally, into a character. var uint8array TextEncoder (encoding).encode (string) var string TextDecoder (encoding).decode (uint8array) If I recall, 'utf-8' is the encoding you need, and of course you'll need to wrap your buffer: var uint8array new Uint8Array (utf8buffer) Hope it works as well for you as it has for me. Object.prototype._lookupSetter_() Deprecated omCharCode will take a character code and convert it to the matching string.e.g., omCharCode( asciiKeys0, asciiKeys1, asciiKeys2, asciiKeys3. Object.prototype._lookupGetter_() Deprecated fromCharCode is a static function on String.So, this will do what you need, without the need for the loop: reconstituted (null, asciiKeys) The apply function is how one sends an array of items to a function as if you had typed in each argument manually.The split() method is the most popular way to do this. You might need to convert those strings into an array in some cases. A string stores characters, while an array creates list-like objects due to its ability to hold more than one value. As you can see, strings and arrays serve two different purposes. Object.prototype._defineSetter_() Deprecated Converting Strings to Arrays in JavaScript.Object.prototype._defineGetter_() Deprecated. In the current implementation, we use it for the backend deployment. You need to have the sftp subsystem enabled on the remote host. We recommend using machines with 2+ cores, 4GB+ of RAM, and 5GB+ of disk space. The Linux platform has any recent Linux AMD64 distribution such as Ubuntu 16.04+, RHEL/Centos 7+, and so on. It will also run on any glibc-based Docker image (that is, not on Alpine). The server part is self-contained, so no special dependencies should be installed. You have installed a compatible SSH server on the Linux platform. Since JetBrains Client is a thin client lightweight application, the requirements for disk space and computer resources are lower than for a host. Remote machine (a target for an IDE) meets the minimum recommended requirements that can be found in IDEs articles. Prerequisitesīefore you start developing on the remote machine, make sure you have the following: The stable channel includes only stable versions.You can connect to a remote server using the SSH connection to develop, run and deploy your project.īefore you start developing, make sure the System Requirements are met. On Ubuntu 16.04 LTS and later, this service is pre-installed.ĭataGrip is distributed via two channels: To use snaps, install and run the snapd service as described in the installation guide. Since snaps update automatically, your DataGrip installation will always be up-to-date. You can install DataGrip as a self-contained snap package. However, it will still create a shortcut in the Start menu under JetBrains. Without the silent configuration file, the installer will ignore all additional options: it will not create desktop shortcuts, add associations, or update the PATH variable. In this case, omit the /CONFIG switch and run the installer as an administrator. It is possible to perform silent installation without the configuration file. You can modify it to enable or disable various installation options as necessary. The default silent configuration file is unique for each JetBrains product. If you want to install DataGrip for all users, change the value of the installation mode option to mode=admin and run the installer as an administrator. With the default options, silent installation is performed only for the current user: mode=user. The silent configuration file defines the options for installing DataGrip. You can download the default silent configuration file for DataGrip at This parameter must be the last in the command line, and it should not contain any quotes even if the path contains blank spaces.ĭatagrip.exe /S /CONFIG=d:\temp\nfig /LOG=d:\JetBrains\DataGrip\install.log /D=d:\IDE\DataGrip Silent configuration file D: Specify the path to the installation directory CONFIG: Specify the path to the silent configuration file To perform silent install, run the installer with the following switches: It can be used by network administrators to install DataGrip on a number of machines and avoid interrupting other users. Silent installation is performed without any user interface. When you run DataGrip for the first time, you can take several steps to complete the installation, customize your instance, and start working with the IDE.įor more information, refer to Run DataGrip for the first time.įor more information about the location of the default IDE directories with user-specific files, refer to Directories used by the IDE. On the Welcome screen, click Configure | Create Desktop Entryįrom the main menu, click Tools | Create Desktop Entry To create a desktop entry, do one of the following: Always extract it to a clean directory.Įxecute the datagrip.sh script from the extracted directory to run DataGrip. The Toolbox App maintains a list of all your projects to quickly open any project in the right IDE and version.ĭo not extract the tarball over an existing installation to avoid conflicts. Use it to install and manage different products or several versions of the same product, including Early Access Program (EAP) and Nightly releases, update and roll back when necessary, and easily remove any tool. The JetBrains Toolbox App is the recommended tool to install JetBrains products. You do not need to install Java to run DataGrip because JetBrains Runtime is bundled with the IDE (based on JRE 17). Latest 64-bit version of Windows, macOS, or Linux (for example, Debian, Ubuntu, or RHEL) Officially released 64-bit versions of the following:Īny Linux distribution that supports Gnome, KDE, or Unity DE.ĭataGrip is not available for the Linux distributions that do not include GLIBC 2.27 or later. SSD drive with at least 5 GB of free space DataGrip supports multithreading for different operations and processes making it faster the more CPU cores it can use. Groups prepare their own meals in the fully-equipped kitchen. Sleeping is dormitory style on couches or on the carpeted floors. The largest room can comfortably seat 45 people on living room furniture or 90 people by adding folding chairs. Each room has individual heating controls. Spiritual functions and retreats are held in comfortable, carpeted living room settings. The building is equipped with panic hardware on all exterior doors, exit lights and central fire and burglary protection. Harvest House has an elevator providing access to all rooms except the gymnasium. The building has 13 toilets, 18 sinks, and 10 private showers. Please share memories, photographs and online condolences with the family.Harvest House Retreat Center is located in the beautifully restored former South Presbyterian Church and Sunday school building.Ī gymnasium fully equipped kitchen dining room seating 90 a conference room with a table that seats 18 people a game room with air hockey, Skee ball, pool table, pin ball, Foosball, two video games and a juke box - all free a main sanctuary seating 300 people with an Austin 17 rank, 1,544 pipe organ and a grand piano an intimate second floor chapel with free spiritual library five carpeted living room style meeting rooms in various sizes holding from 15-90 people. Harvest House International Church: 10089 N Kitchen Rd. A donation box will be at the funeral home at time of services. Checks can be made out to Harvest House Church. In lieu of flowers, Jackie requested monetary donations be made to her church, Harvest House International Church in Mooresville, IN. She will be laid to rest at Forest Lawn Memory Gardens. Funeral Service will be conducted on Monday, Septemat 9:00 AM. Herrmann Greenwood Funeral Home at The Gardens of Olive Branch, 1605 S. Visitation will be on Sunday, Septemfrom 4:00 PM - 6:00 PM at G. Sons: Michael Chad (Ashley), Jacob Duke (Alyssa) grandchildren: Everly Grace, Nora Elizabeth Brothers: Gary Houser, Alan (Shirley) Houser Sister: Jill Roberts Mother: Betty J. She was a member of Harvest House International Church where she was baptized in September of 2022. She enjoyed playing volleyball and reading suspense novels. Jackie then transferred to Community Hospital where she retired after 41 years. Then she started her career at Henry Memorial Hospital in Medical Records. She started working at Lee’s Famous Recipe Chicken before starting Ball State. She attended 2 years to Ball State University. Jackie graduated Blue River Highschool in Henry County in 1976, where she was awarded Henry County Athlete of the Year. She was born on Jin New Castle, Indiana to Donald L. McGathey, 65, of Martinsville, passed away on September 19, 2023. Mooresville, IN 46158Please share memories, photographs and online condolences with the family. A donation box will be at the funeral home at time of services.Harvest House International Church: 10089 N Kitchen Rd. She will be laid to rest at Forest Lawn Memory Gardens.In lieu of flowers, Jackie requested monetary donations be made to her church, Harvest House International Church in Mooresville, IN. Houser (Father)Visitation will be on Sunday, Septemfrom 4:00 PM - 6:00 PM at G. She enjoyed playing volleyball and reading suspense novels.She was a member of Harvest House International Church where she was baptized in September of 2022.Survivors include her husband Michael S. Jackie then transferred to Community Hospital where she retired after 41 years.Jackie loved to do gardening at home. She attended 2 years to Ball State University.She started working at Lee’s Famous Recipe Chicken before starting Ball State. Houser.Jackie graduated Blue River Highschool in Henry County in 1976, where she was awarded Henry County Athlete of the Year. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |