text
stringlengths 8
5.77M
|
---|
Q:
Make tabs in SlidingTabLayout not slide
I recently made an app using SlidingTabLayout with two tabs. I referred this link
However I had to modify it slightly. I had to add a button which locks the sliding of the tabs. And unlock it when it is clicked again. So I just can't get the tabs to not slide.
I checked out this question Disable swiping between tabs. But he is using some other library to do it and it's no longer supported. I'm using the default one. And in that question the CustomViewPager extends android.support.v4.view.ViewPager. In my project ViewPagerAdapter extends FragmentStatePagerAdapter.
Any help would be very useful. Thank you.
A:
You can just make a custom ViewPager which extends the ViewPager and set a method that disables and enables the swiping.
You can do that by adding a class like the one below to your code. Then instead of using ViewPager just use CustomViewPager in your code:
public class CustomViewPager extends ViewPager {
private boolean enabled;
public CustomViewPager(Context context, AttributeSet attrs) {
super(context, attrs);
this.enabled = true;
}
@Override
public boolean onTouchEvent(MotionEvent event) {
if (this.enabled) {
return super.onTouchEvent(event);
}
return false;
}
@Override
public boolean onInterceptTouchEvent(MotionEvent event) {
if (this.enabled) {
return super.onInterceptTouchEvent(event);
}
return false;
}
public void setPagingEnabled(boolean enabled) {
this.enabled = enabled;
}
}
You can disable/enable swiping by calling: setPagingEnabled(boolean enabled).
|
Carrier, a subsidiary of Farmington, Conn.-based industrial conglomerate United Technologies, had planned to eliminate about 1,400 positions. Instead, the company will continue to build furnaces at its Indianapolis plant. Including engineers and headquarters staff, more than 1,000 employees will remain in the city, according to the statement.
AD
AD
Neither Carrier nor the Trump-Pence transition team released details about what financial incentives the company will receive. The Indiana Economic Development Corp., a state agency, will grant Carrier a tax break in exchange for keeping the plant open, said John Mutz, a member of the corporation's board and a former lieutenant governor.
Trump's running mate, Vice President-elect Mike Pence, is the governor of Indiana.
Carrier has built a new plant outside of Monterrey, Mexico. The mayor of Santa Catarina, the suburb where the plant is located, said he expects the factory to open.
“Carrier announced an important investment, to generate 2,000 jobs, and I expect the Carrier plant to continue working in a normal manner, and I hope soon to see some official communication from the company,” Mayor Hector Castillo Olivares told The Washington Post.
AD
AD
The deal does not affect another United Technologies facility in Huntington, Ind., which also is scheduled to close as production shifts to Mexico. That plant has about 700 employees.
Mutz said he had not reviewed the final terms of the agreement and could not provide details about how much money the company would receive or over what period.
“One of the key questions is how long will they be here,” he said.
Mutz said that the economic development agency offered United Technologies a similar deal this year, which the company rejected.
Although Mutz does not know why managers at United Technologies changed their minds, he suggested that the firm may be concerned about maintaining good relations with the new administration because of the company’s business with the federal government. Military contracts for aircraft components account for about 10 percent of the firm’s annual sales, company filings show.
AD
AD
“The dynamics of the situation changed,” Mutz said. “The government is a major customer of United Technologies. They have a bigger incentive to stay in a favorable situation with them.”
Observers have said that those federal contracts probably would be secure regardless of what happened at the Indianapolis plant. United Technologies is a crucial supplier for the Pentagon. In the years to come, however, a positive relationship with the new administration could have benefits for United Technologies that are difficult to predict.
“Goodwill is an asset,” said Jeff Schott, an expert on trade at the Peterson Institute for International Economics. “Companies all the time want to build goodwill with their governments.”
AD
One of Trump's chief goals is to protect American workers in the manufacturing sector from international competition. He has promised to revise trade agreements with foreign countries and threatened punitive tariffs on imports, insisting that U.S. interests should come before the global economy.
AD
In its public statement, Carrier said the deal with Trump did not signal a change in the company's views on free trade.
“This agreement in no way diminishes our belief in the benefits of free trade and that the forces of globalization will continue to require solutions for the long-term competitiveness of the U.S. and of American workers moving forward,” the statement read.
AD
Still, economists in Mexico said the deal was alarming if it augured greater obstacles to Mexico's manufacturing sector during the Trump administration.
“This is worrying, without a doubt,” said Juan Carlos Moreno-Brid, an economist at the National Autonomous University of Mexico. “This suggests a very aggressive policy of the new government.”
He said the arrangement seemed to contradict the spirit of the North American Free Trade Agreement, which was intended to promote commercial integration across the continent.
AD
“Now the rules of the game have changed. This is the first sign, and it's very worrying,” he said.
Although there was confusion as to what the deal would mean for the local economy in the Mexican town where Carrier's new facility stands, Castillo Olivares expressed optimism.
AD
“You can’t forget that we are already a globalized world,” the mayor said. “I have received visitors from countries in Europe and Asia who are interested in investing here: Korea, Great Britain.”
Luigi Zingales, an economist at the University of Chicago, predicted that Trump’s economic policies would be “pro-business” rather than “pro-market,” offering favors to a few established firms but without encouraging competition and dynamism in ways that would improve the economy for everyone.
“Donald Trump has always emphasized the fact that he’s good at deals,” Zingales said. “Doing deals like this is clearly favoring existing business, but is not creating a better market environment.”
|
Q:
RavenDB Transformer Include List of documents
I am kind of stuck on using the include with a RavenDB Transformer. Say I have the following document classes:
public class Processor
{
public string Id { get; set; }
// other properties
}
public class Job
{
public string Id { get; set; }
public string ProcessorId { get; set; }
// other properties
}
Hers is my view model:
public class ProcessorStatsViewModel
{
public string Id { get; set; }
public int JobCount { get; set; }
// other properties
}
In my tranformer I would like to query the Processors Document Store and do an include on the Jobs Store looking for every job with a matching Processor ID. All of the search results I found describe how to do this when the Processor class has the list of JobId's. Is there a way to do this in RavenDB?
The transformer I would like could look something like:
public Processors_StatsViewModel()
{
TransformerResults = procs =>
from p in procs
let jobs = Include<Jobs>(p.Id) // how can i specify something like where p.Id == j.ProcessorId ?
select new
{
p.Id
JobCount = jobs.Count
// other stuff
}
}
All of the Transformer LoadDocument, Include, and Recurse methods expect the class being queried to have a list reference ID's but in my case in need the opposite.
Is this something I can even do in RavenDB or am I missing something?
A:
You can not do what you want to do with only a transformer and your current domain model. If the processors did indeed know about its jobs you could do this with a transformer kind of like the one you have.
However, you can achieve something similar with a Map/Reduce index and then a Transformer over the result of the Map/Reduce index. It all depends on what "other stuff" you want to present, but this is a way to get all Processes and its job count and then adding more information with a transformer:
Map/Reduce index to get job count by processor:
public class Jobs_ByProcessor : AbstractIndexCreationTask<Job, Jobs_ByProcessor.ReduceResult>
{
public class ReduceResult
{
public string ProcessorId { get; set; }
public int JobCount { get; set; }
}
public Jobs_ByProcessor()
{
Map = jobs => from job in jobs
select new ReduceResult
{
ProcessorId = job.ProcessorId,
JobCount = 1
};
Reduce = results => from result in results
group result by result.ProcessorId
into g
select new
{
ProcessorId = g.Key,
JobCount = g.Sum(x => x.JobCount)
};
}
}
Transformer:
public class ProcessorJobTransformer : AbstractTransformerCreationTask<Jobs_ByProcessor.ReduceResult>
{
public ProcessorJobTransformer()
{
TransformResults = results => from result in results
let processor = LoadDocument<Processor>(result.ProcessorId)
select new
{
Id = result.ProcessorId,
Name = processor.Name,
JobCount = result.JobCount
};
}
}
This would give you a result like this:
Id and JobCount comes from the Reduce result of the index and the Name comes from the Transformer (via LoadDocument).
However, if you need this results but more information from the Job document, you might have to go a different route entirely.
Hope this helps!
|
<vector xmlns:android="http://schemas.android.com/apk/res/android"
android:width="24dp"
android:height="24dp"
android:viewportWidth="24"
android:viewportHeight="24">
<path
android:fillColor="@android:color/white"
android:pathData="M17,3L7,3c-1.1,0 -1.99,0.9 -1.99,2L5,21l7,-3 7,3L19,5c0,-1.1 -0.9,-2 -2,-2zM17,18l-5,-2.18L7,18L7,5h10v13z" />
</vector>
|
Suicide attempts in hospital-treated epilepsy patients.
Persons suffering from epilepsy are in the group of patients at an increased suicide risk. The basis of every suicidal behavior, including patients suffering from epilepsy, is depression, and to explore the causes of suicidal behavior in epileptics it is necessary to find the causes responsible for the development of depression. Depression is caused by numerous factors divided into psychosocial factors, factors of the illness, and antiepileptic medication factors. The aim of the study was to identify the causes of suicidal behavior in epileptics treated in our hospital. The study included patients suffering from epilepsy treated at our Department from January 1 to December 31, 2009. Based on medical history, patients having attempted suicide were allocated to the experimental group and those without a history of suicidal attempt in the control group. Characteristics of the groups in relation to age and sex were defined first, followed by defining variables used in both groups, i.e. psychosocial factors (marital status, employment status, family environment, psychiatric comorbidity) and disease factors (etiology, type of seizures, duration of the disease, attitude towards treatment, attitude towards illness). Statistical significance was recorded in two psychosocial variables, i.e. family environment, which was significantly better in control group, and psychiatric comorbidity, which was more frequently present in patients having attempted suicide. Study results showed even 14.6% of epilepsy patients to have attempted suicide. Poor family atmosphere and psychiatric comorbidity had a significant role in suicidal behavior. In our study, the variables associated with the disease had no effect on suicidal behavior in epilepsy patients.
|
French President Francois Hollande has been confronted by the glaring light of reality -- sort of.
On New Year's Day, as his massive tax increases began taking effect, Hollande, a member of the Socialist Party, admitted that taxes in France have become "too heavy, much too heavy."
Indeed, as of Jan. 1, French households now must contend with a new value added tax on many goods and services and, writes International Business Times, "French companies will be required to pay 50 percent tax on all employee salaries in excess of 1 million euros. ... The effective tax rate will amount to 75 percent." Unemployment, which Hollande promised to reduce, has risen to nearly 11 percent. Some companies and wealthy people have left France in search of business-friendly environments. More will surely follow unless Hollande's rhetoric is followed by actual tax reductions.
Hollande's head-on collision with reality is reminiscent of President Bill Clinton's remarks in 1995 at a campaign fundraiser in Houston: "Probably there are people in this room still mad at me ... because you think I raised your taxes too much. It might surprise you to know that I think I raised them too much, too."
Neither Hollande (so far), nor Clinton, followed up on their remarks by cutting taxes. Like many other politicians, these men tried to have it both ways.
The next political leader who will be forced to adjust his left-wing ideology to reality is the new mayor of New York City, Bill de Blasio, who has proposed a tax on the wealthy to fund universal pre-K education. He, too, thinks raising taxes on the successful is the way to prosperity for the poor. He should pick up the phone and ask Hollande how that is working for him, as Hollande's approval ratings are sinking faster than President Obama's. Even better, he might recall Calvin Coolidge's remark: "Don't expect to build up the weak by pulling down the strong."
Penalize success and prosperity and you get less of it. Subsidize bad decision-making by giving taxpayer money to the poor, and you may well undermine initiative and personal responsibility and create new generations of poor people.
The left in America and France have gained political power by appealing to voters' emotions, but when they achieve power their ideology harms the very people who voted for them when these well-intentioned programs prove unworkable. This presents conservatives and Republicans with an opportunity, as well as risks.
Liberals are allowed to be as ideological as they wish, and the major media and too many among the unfocused public will mostly support them. The left is never told they must compromise their ideology when reality proves them wrong, or "work with Republicans and conservatives" to achieve common goals. That is the trap liberals set for conservatives, who are repeatedly told they must compromise their principles if they hope to win elections, but whose squishy politics then become as unappealing as cold oatmeal.
Here is the path Republicans and conservatives must take if they not only want to win, but bring positive change to the country. Instead of debating feelings and ideology with the left (territory on which they almost always lose -- recall "compassionate conservative"), conservatives should hold their opponents accountable. Are their policies producing the results they claim? Is the record debt good for the country? Are agencies performing as their charter demands, and should their budgets be reduced or the agency eliminated if it can't show results? Every government agency and program should be regularly required to justify, not only its budget, but its very existence.
Americans typically hate waste. It is why as children most of us were told to clean our plates because somewhere in the world there were hungry people. Requiring the left to prove their programs and policies are producing outcomes at reasonable cost would shift the debate from ideology and good intentions to reality. This is where conservatives have a distinct advantage if they will embrace it.
|
Contact dermatitis from metallic palladium in patients reacting to palladium chloride.
1307 consecutive patients were patch tested with PdCl2 1% pet. 32 patients were positive; 29 also showed a reaction to NiSO4. 470 patients were additionally tested with a metallic palladium disc. 3 had a positive reaction, and none of them reacted to PdCl2 or NiSO4 pet. A positive patch test to PdCl2 pet. is in most cases probably due to a cross-reaction with nickel in nickel-sensitive subjects. Patients positive to PdCl2 tolerate skin contact with metallic palladium.
|
We’re pleased to announce the availability of RethinkDB 2.3.6, the first release since RethinkDB transitioned to community governance. This update includes a range of bugfixes and stability improvements. For a complete list of changes in this update, you can refer to the release notes.
After the company behind RethinkDB shut down last year, a group of community members and former employees devised a transition plan to ensure that the database would live on as an open source software project. That effort culminated earlier this year when we officially joined the Linux Foundation and relicensed RethinkDB under the permissive ASLv2.
Today’s update is an important milestone, as it is the first fully community-driven RethinkDB release. Version 2.3.6 is also the first release that we’ve issued under our new license. Although development on RethinkDB never really halted, it took some time to spin up the infrastructure and processes that we needed to facilitate new releases. Now that we’re back in action, we’re looking forward to rolling out more regular updates.
We are already working towards the release of RethinkDB 2.4, our next major version. We have several new features already implemented for version 2.4, including support for table modifier functions. A modifier function lets you provide an arbitrary ReQL expression for the database to execute on every write operation that affects a table’s contents. You can use modifier functions for performing validation or automatically adding fields to new documents.
Please note that we’re using a new signing key for the packages in our APT repository. Before you upgrade to the latest packages on Debian or Ubuntu, you will need to fetch the new public key (0742918E5C8DA04A): $ wget -qO- https://download.rethinkdb.com/apt/pubkey.gpg | sudo apt-key add -v -"
Get involved
As an open source project that is developed and financially supported by its users, RethinkDB welcomes your participation. If there’s a feature or improvement that you would like to see, you can help us make it a reality. If you’d like to join us, there are many ways that you can get involved:
For more details about the project’s status and roadmap, you can watch the recordings of our latest community meetings on the RethinkDB YouTube channel. You can also keep an eye out for our upcoming appearance on the The Changelog podcast.
|
Bioprocessing of glycerol into glyceric Acid for use in bioplastic monomer.
Utilization of excess glycerol supplies derived from the burgeoning biodiesel industry has recently become very important. Glyceric acid (GA) is one of the most promising glycerol derivatives, and it is abundantly obtained from glycerol by a bioprocess using acetic acid bacteria. In this study, a novel branched-type poly(lactic acid) (PLA) was synthesized by polycondensation of lactide in the presence of GA. The resulting branched PLA had lower crystallinity and glass transition temperatures than the conventional linear PLA, and the peak associated with the melting point of the branched PLA disappeared. Moreover, in a blend of the branched polymer, the crystallization of the linear PLA occurred at a lower temperature. Thus, the branched PLA containing GA synthesized in this study could potentially be used as a novel bio-based modifier for PLA.
|
Q:
Python while loop to keep adding the squares until the sum is greater or equal to 10000
I would like to write a while loop to keep adding the squares of consecutive integers starting from 1 (inclusive) until the sum is greater or equal to 10000 in python.Then print the integer and the sum when the condition is satisfied for the first time. Here is what I have but the code does not work.
total = 10000
i = 0
ger = 0
while i <= total:
ger += i**2
print(ger)
print(i)
A:
You forgot to increment i in each loop iteration. Also, your condition is not correct: you need to compare ger (the sum of squares) to total.
while ger <= total:
ger += i**2
i += 1
|
Q:
How to make Guest OS follow symlinks from shared folder
I have Ubuntu Desktop as my main OS and Ubuntu Server as my Guest OS in VirtualBox 4.2.16.
I created a shared folder called /shared and put in it several symlinks to different folders across my main OS. Of course, my guest OS sees only broken symlinks - because these locations exist only in the main OS.
How can I make my Guest OS see the actual content of them?
Creating another shared folder is not an option.
A:
It is a problem in virtualBox and has to do with security. Before 4.1.8 symlinks worked but was seriously flawed. And the discision was made to remove symlink support.
See this comment:
Symbolic link creation from within a guest has been disabled in VirtualBox 4.1.8 for security reasons. A guest could create symbolic links which point outside the assigned host directory. This has nothing to do with any ext3/ext4 bug. And the guest is still able to read symlinks which are created on the host.
Sorry for the late statement.
If you do
VBoxManage setextradata VM_NAME VBoxInternal2/SharedFoldersEnableSymlinksCreate/SHARE_NAME 1
Then your guest will be able to create symlinks again. But for security reasons (see above) this is disabled by default. The fix to prevent dangerous symlinks from the guest is very complicated, therefore we decided to not allow any guest to create any symlink to work around the security problem.
(I took the liberty to fix a bug in the comment ;) )
and also take note that you need to restart vBox for the change to activate.
|
A survivor's guide to teenage parenting involving rabbit feet, four leaf clovers and going to Church on Sunday.
Saturday, 28 September 2013
Mojo Fallin'
I am in danger of losing my Daddy mojo, my Iggy lust for life, my animo, my wait for a pop art 15 minutes of fame that is still not quite here and I confess I am in fear of it not coming. I am apparently neither over the moon or over the rainbow and its autumn of my life..... I am getting on a bit.
I have an elbow that kickstarts a day with a crick that is reached by achieving warp factor one-ish, by movement measured in degress of motion that saps the energy and challenges the mental bravery. Bending is becoming a sort of torture of the soul. Once cricked, the elbow can flex kinda normally for a good 12 hours before resettting itself to frozen during the night as if by some black magic voodoo doll curse. I am no doctor, but I suspect this is not good.
I have kids that beat me at things, it gets worst, its happening lots of time, my superiority in height was over months ago, my superiority in general knowledge is down to historical events over twenty years ago, my superiority in being clever is losing out to Master Clever and Miss Cleverest, my top comic genius is being is reduced to being the lowest form of wit.
I have diseases that my father had.
I have growths that have suddenely metamorphasised to launch acting careers and are auditioning for parts in a Hobbit movie.
I have a girth that proverbs about belt and braces was made for.
I have glasses that either see far away or see near up, my eyes appear to see a very strict radius of focus that makes reading uncomfortable or at the other extreme bloody dangerous for passengers and pedestrians alike.
My kids now doing the screwing of screws, and the unscrewing of bottle caps that have been factory closed to be middle age proof, as a revenge for those days as a functioning adult I was called upon to flex the non crickety elbow to open the child proof tops.
My kids put tunes on my ipod as if the electronical digital world is beyond my IQ range or at least below my enthusiasm level
I am becoming more feeble that weeble that wobbles and does fall down.
2 comments:
You might think you're falling apart but your ability to write is as sharp as ever.If it helps to feel you're not alone I can tell you I have a knee which crackles when I go up and down the stairs and when University Challenge comes on the TV I pretend I'm reading a book.
Perhaps we should record a dub-step, trip hop, drum and base, mega hit featuring your crackle and my crick.
You may need to run up and down stairs often and, for me, to fall asleep and wake up often exercising my elbow, on my part it may involve drinking alcohol, obviously for artistic and pain relief reasons.
|
package com.hubspot.singularity.executor;
import static java.nio.charset.StandardCharsets.UTF_8;
import com.fasterxml.jackson.databind.ObjectMapper;
import com.google.inject.Inject;
import com.hubspot.singularity.SingularityFrameworkMessage;
import com.hubspot.singularity.SingularityTaskDestroyFrameworkMessage;
import com.hubspot.singularity.SingularityTaskShellCommandRequest;
import com.hubspot.singularity.SingularityTaskShellCommandUpdate.UpdateType;
import com.hubspot.singularity.executor.SingularityExecutorMonitor.KillState;
import com.hubspot.singularity.executor.config.SingularityExecutorConfiguration;
import com.hubspot.singularity.executor.shells.SingularityExecutorShellCommandRunner;
import com.hubspot.singularity.executor.shells.SingularityExecutorShellCommandUpdater;
import com.hubspot.singularity.executor.task.SingularityExecutorTask;
import com.hubspot.singularity.executor.task.SingularityExecutorTaskProcessCallable;
import java.io.IOException;
import java.util.Optional;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
public class SingularityExecutorMesosFrameworkMessageHandler {
private static final Logger LOG = LoggerFactory.getLogger(
SingularityExecutorMesosFrameworkMessageHandler.class
);
private final SingularityExecutorMonitor monitor;
private final SingularityExecutorConfiguration executorConfiguration;
private final ObjectMapper objectMapper;
@Inject
public SingularityExecutorMesosFrameworkMessageHandler(
ObjectMapper objectMapper,
SingularityExecutorMonitor monitor,
SingularityExecutorConfiguration executorConfiguration
) {
this.objectMapper = objectMapper;
this.monitor = monitor;
this.executorConfiguration = executorConfiguration;
}
public void handleMessage(byte[] data) {
try {
SingularityFrameworkMessage message = objectMapper.readValue(
data,
SingularityFrameworkMessage.class
);
if (message.getClass().equals(SingularityTaskShellCommandRequest.class)) {
handleShellRequest((SingularityTaskShellCommandRequest) message);
} else if (
message.getClass().equals(SingularityTaskDestroyFrameworkMessage.class)
) {
handleTaskDestroyMessage((SingularityTaskDestroyFrameworkMessage) message);
} else {
throw new IOException(
String.format(
"Do not know how to handle framework message of class %s",
message.getClass()
)
);
}
} catch (IOException e) {
LOG.error(
"Do not know how to handle framework message {}",
new String(data, UTF_8),
e
);
}
}
private void handleTaskDestroyMessage(
SingularityTaskDestroyFrameworkMessage taskDestroyMessage
) {
KillState killState = monitor.requestKill(
taskDestroyMessage.getTaskId().getId(),
taskDestroyMessage.getUser(),
true
);
switch (killState) {
case DIDNT_EXIST:
case INCONSISTENT_STATE:
LOG.warn(
"Couldn't destroy task {} due to killState {}",
taskDestroyMessage.getTaskId(),
killState
);
break;
case DESTROYING_PROCESS:
case INTERRUPTING_PRE_PROCESS:
case KILLING_PROCESS:
LOG.info(
"Requested destroy of task {} with killState {}",
taskDestroyMessage.getTaskId(),
killState
);
break;
}
}
private void handleShellRequest(SingularityTaskShellCommandRequest shellRequest) {
Optional<SingularityExecutorTask> matchingTask = monitor.getTask(
shellRequest.getTaskId().getId()
);
if (!matchingTask.isPresent()) {
LOG.warn("Missing task for {}, ignoring shell request", shellRequest.getTaskId());
return;
}
matchingTask.get().getLog().info("Received shell request {}", shellRequest);
SingularityExecutorShellCommandUpdater updater = new SingularityExecutorShellCommandUpdater(
objectMapper,
shellRequest,
matchingTask.get()
);
Optional<SingularityExecutorTaskProcessCallable> taskProcess = monitor.getTaskProcess(
shellRequest.getTaskId().getId()
);
if (!taskProcess.isPresent()) {
updater.sendUpdate(
UpdateType.INVALID,
Optional.of("No task process found"),
Optional.<String>empty()
);
return;
}
SingularityExecutorShellCommandRunner shellRunner = new SingularityExecutorShellCommandRunner(
shellRequest,
executorConfiguration,
matchingTask.get(),
taskProcess.get(),
monitor.getShellCommandExecutorServiceForTask(shellRequest.getTaskId().getId()),
updater
);
shellRunner.start();
}
}
|
A video showing emergency services in action inside the Kemerovo shopping mall has been released. The building was ravaged by a deadly blaze on Sunday, leaving more than 60 people dead.
READ MORE: 64 dead, bodies remain trapped under rubble after shopping mall fire in Russia’s Kemerovo
The video was made public by Russia’s Emergencies Ministry (EMERCOM) and shows the aftermath of the inferno. Rescuers continued to work in the unsecure building despite the fact its roof and some floors had partially collapsed. The blaze has been confirmed as one of the deadliest in 100 years. As of Monday afternoon, the death toll was 64, including children.
READ MORE: ‘Tell mom I loved her’: Heart-breaking texts from kids trapped in Siberia mall where scores died
|
Breaking up is hard to do
Annulling a marriage in the Roman Catholic Church can be a lengthy and painful process for those who wish to remarry, writes Patrick Weir
Friday 5 January 1996 00:02 BST
Click to followIndy Lifestyle Online
"I have to admit that I do feel let down by the church," says Gina. "I'm making an honest request and simply want to get on with my life with the man I love."
Considered by the diocesan tribunals of the Roman Catholic Church, annulment of marriage involves an exhaustive and often lengthy process, taking on average two to three years before a decision is made. Indeed, the Pope has instructed that the process be speeded up - without compromising its principles - because of the time petitioners have been required to wait.
Monsignor Edward Walker, vicar judicial of the diocesan tribunal in Nottingham, says that waiting time is caused "because of the question of manpower, as an awful lot of people are applying for annulments". Tribunals are dealt with by parish priests with heavy workloads who simply can't deal with cases as quickly as they would like.
Dr Michael Ashdown, administrator of Westminster metropolitan tribunal, says that in any 20 cases, two-thirds will have sufficiently strong grounds to be further examined. Of these, around 50 per cent usually prove to be relatively straightforward, with annulments being granted. On balance, the other half will warrant more detailed consideration, but generally, "success in terms of granting an annulment exceeds those that fail".
Many people don't persist as the process is demanding. "Over the past three years, applications have levelled out - Westminster receives 400 a year, of which 150 to 200 are proceeded with - and more women than men are still applying."
Gina, now 37, was divorced from her husband six years ago, and five years later is still waiting for the marriage to be annulled. "Barely six months after we were married, he started hitting me and drinking heavily. I couldn't believe it. He was hell to live with. From being the most gentle man I'd ever met, I suddenly didn't know him.
"He'd always liked a drink but it was never a problem between us. My family thought the world of him and friends told me how lucky I was. We were very much in love and as Catholics, getting married was the obvious next step.
"After three years of marriage I'd honestly had enough. When my family realised what was happening, they were astonished. I finally broke down and told them everything. I felt shame, anger, humiliation, you name it."
Gina insists her husband "made a mockery" of their marriage vows and could not have considered them seriously on their wedding day. A devout Catholic, she maintains that the service was invalidated by her husband's attitude. "I don't know why he married me. He obviously didn't mean a word of anything he said at the altar."
Gina and her boyfriend have been together for five years and want to get married. "I applied for an annulment before I met James because I knew that if I wanted to remarry in the church and have children, I had no option. However, we have both become so frustrated with waiting that we're now considering marrying outside the church."
Monsignor Walker says that he hopes cases such as Gina's are the exception rather than the rule. "Sometimes things can go wrong and complications can cause delays. But we have to look very closely at the facts before deciding whether a marriage was a true union or not."
Gina sees no such complications, citing "incapacity" as her grounds. This means someone is unfit for marriage and cannot share his or her life with another person. Such grounds are one of two recent developments in the processing of annulments; the second is a "lack of canonical discretion", whereby a person is deemed to have been incapable of the logical decision to marry at the time. Though less clear-cut, and harder to assess, such grounds are required criteria, as the former three of "impediment" (someone being too young, or forced to marry), "form" (absence of authorised celebrant and two witnesses) and "consent" (one partner doesn't want children) hardly circumscribe the causes of marital breakdown.
"I've examined my conscience and don't feel I've done anything wrong," says Gina. "My ex-husband never contested my claims, and by now James and I should have been married. We've given the situation a lot of thought and our patience is running out. I'm very disappointed."
Lindsay, too, is bitter. Divorced for seven years, she applied for an annulment four years ago. She wants to remarry in the church and raise a family. During her four-and-a-half-year marriage, her husband had several affairs.
"Clearly, the vows we took weren't that important to him, so the wedding was meaningless," says Lindsay, 29. "When I first discovered he'd been unfaithful I was devastated. But we talked things through and I was determined to keep the marriage together. When I found out a year later that he'd been with two other women, I couldn't cope.
"Waiting all this time for an annulment has been just as upsetting. I am a strong Catholic and want to marry in the church. I've been honest in the eyes of God and can't understand why my case is taking so long to settle.
"I know that more people are now applying for annulments and that they must be very carefully considered by the church, but I feel my case is clear enough. Four years of waiting just doesn't make any sense."
Lindsay and her partner are also considering marrying outside the church and have the backing of their families. "My mother wants to see me happy and appreciates that marrying elsewhere must now be an option. It wouldn't be ideal because I'm very committed to my faith, but what else can I be expected to do?
"Getting divorced was traumatic. I tried to keep it together but the marriage was beyond repair. Declaring my love for my partner before God in the Catholic Church is important to me and, without sounding sanctimonious, I shouldn't be deprived of this. Coping hasn't been easy, but I didn't expect such intransigence from the church.
"My parish priest has been very understanding and appreciates how I feel. But he can't really do much to help in terms of my annulment and says that it must take its course. I just can't work out what needs such examination. If the sanctity of marriage means anything, I shouldn't be thinking about marrying elsewhere."
For very different reasons Michael, 36, feels equally aggrieved. Divorced a year ago following his wife's infidelity, he has learned that she is seeking an annulment of their marriage. As yet, he does not know what grounds she is citing.
"I was a good husband. And while I don't claim to be the best Catholic in the world, the wedding vows I took meant an awful lot to me. Of course, people fall out of love, but if my ex-wife is successful and they are annulled, I'll have to think long and hard about going to Mass again. My wife and I were in love when we got married, and the vows were just as important to her. That the church might suggest otherwise more than seven years later came as a great shock to me."
Having conducted his own research into the working of the diocesan tribunals, Michael is concerned that should his ex-wife's ground be incapacity or lack of canonical discretion, he will have to appear before a tribunal and present his own case. In such circumstances, when establishing grounds is particularly hard and grounds are contested by one party, psychiatrists can be asked to examine the evidence, and interview the couple.
"How can it be determined, for example, that my wife was emotionally unfit to take her vows on our wedding day? I'm amazed that the church can deliberate about something so vague and possibly invalidate vows that we both took in good faith. I appreciate that the annulment may not be granted, but I don't relish having to argue that my marriage was actually valid. Essentially, it will depend on which of us is believed.
"I can't help but think this is a touch farcical, but I'm worried that the tribunal might rule in my ex-wife's favour."
Monsignor Walker understands Michael's bitterness. "The tribunal would very carefully explain the details to him," he says. "All the facts are studied, and working on the assumption that both parties are telling the truth, we eventually come to a decision."
Michael is unconvinced. "The church is providing a get-out clause for people who find themselves unhappy or dissatisfied. This can't be right. I accept the marriage is finished in the eyes of the law, but not that it may possibly have never taken place in the eyes of the church. If the tribunal decides this was the case, I will feel very betrayed."
|
FREQUENTLY ASKED QUESTIONS:
What is the Circulating Shuttle?
The Circulating Shuttle is a FREE service connecting the citizens of Kent to their community.
The shuttle travels in several loops to reach the city's many shopping areas, banks, medical facilities, and senior housing.
Every bus is equipped for wheelchairs and bikes.
Shuttles can take reservations to leave its route (DART) [external link] to make special pick-ups.
How do I Ride the Circulating Shuttle?
Buses arrive each half-hour in the downtown area and each hour on the East Hill, from approximately 9 a.m. to 5 p.m. Monday through Saturday.
Originally called the Shopper Shuttle, some bus stops still display the colorful Shopper Shuttle Frog logo, inviting riders to "Hop Aboard". Traditional King County Metro Signs are used where other buses stop. The 914 and 916 are the route numbers for the Circulating Shuttle.
The Shuttle goes right to the front door of most of its destinations.
Drivers are trained to help passengers with their bags, wheelchairs, or other accessories.
Drivers can also assist you with any questions you may have in order to help you get to your destination.
Who offers this service?
Kent's circulating shuttle is the joint effort of King County Metro Transit, the City of Kent, and Hopelink.
King County manages the program with assistance from the city, and pays most operating costs.
The City of Kent reimburses King County for the amount normally expected in the farebox, in order to keep the shuttle as a free service for its citizens and businesses.
King County then contracts with Hopelink to provide the service.
Why does the City support the all-day circulating shuttle?
The City of Kent and its citizens designed the circulating shuttle to provide better mobility to its downtown seniors, and support local business.
While the shuttle is free to all riders, it is designed to meet the needs of Kent's senior population and other citizens with limited travel options.
|
1. Field of the Invention
The present invention relates to improved methods, systems and devices for producing electrical power from metal-air fuel cell battery (FCB) systems and devices.
2. Description of the Prior Art
In U.S application Ser. No. 08/944,507, now U.S. Pat. No. 6,296,960, Applicant discloses several types of novel metal-air fuel cell battery (FCB) systems. During power generation, metal-fuel tape is transported over a stationary cathode structure in the presence of an ionically-conducting medium, such as an electrolyte-impregnated gel. In accordance with well known principles of electrochemistry, the transported metal-fuel tape is oxidized as electrical power is produced from the system.
Metal-air FCB systems of the type disclosed in U.S. Pat. No. 6,296,960 have numerous advantages over prior art electro-chemical discharging devices. For example, one advantage is the generation of electrical power over a range of output voltage levels required by particular electrical load conditions. Another advantage is that oxidized metal-fuel tape can be repeatedly reconditioned (i.e. recharged) during battery recharging cycles carried out during electrical discharging operation, as well as separately therefrom.
In U.S. Pat. No. 5,250,370, Applicant discloses an improved system and method for recharging oxidized metal-fuel tape used in prior art metal-air FCB systems. By integrating a recharging head within a metal-air FCB discharging system, this technological improvement theoretically enables quicker recharging of metal-fuel tape for reuse in FCB discharging operations. In practice, however, there are many contemplated applications where metal-fuel in the form of tape may not be desirable by virtue of the fact that special mechanisms are typically required to transport the metal-fuel tape through the system, during discharging and recharging modes of operation.
Thus there is a great need in the art for an improved method and apparatus for producing electrical power using metal-fuel FCB technology while overcoming the shortcomings and limitations of prior art technologies.
Accordingly, a primary object of the present invention is to provide an improved method of and apparatus for producing electrical power from metal-air fuel cell batteries (FCB) in a manner which avoids the shortcomings and drawbacks of prior art technologies.
Another object of the present invention is to provide such a system, wherein a supply of metal-fuel cards or plates are discharged during the power generation process.
Another object of the present invention is to provide a metal-air FCB power generation module of compact construction for providing electrical power to a host system having a battery storage compartment.
Another object of the present invention is to provide such a power generation module comprising a module housing of compact construction, a discharging head enclosed within the module housing and into which a metal-fuel card can be slide for discharging, and wherein the module housing has a pair of electrical terminals for contacting the power terminals of a host system when the module housing is loaded into the battery storage compartment of the host system.
Another object of the present invention is to provide such a FCB power generation module, wherein hosts system can be any appliance, electronic device, system or instrument requiring electrical power for its operation.
Another object of the present invention is to provide a metal-air FCB power generation module adapted for insertion within the battery storage compartment of a conventional consumer electronic device, battery-powered toy, electronic instrument, or any other battery-powered device requiring DC electrical power for its operation.
Another object of the present invention is to provide such a FCB power generating module having the form factor of virtually any conventional battery power source (e.g. two AA batteries, four AAAA batteries, one 9 volt battery, two C batteries, etc.)
Another object of the present invention is to provide a storage case for displaying a plurality of metal-fuel cards (and possibly a replacement cathode cartridge) in a store during sale, and for storing such components in a shirt pocket, brief case, purse or other carrying device for subsequent use when additional metal-fuel is required for the continuous production of electrical power from the FCB power generation module.
Another object of the present invention is to provide such a FCB power generation module, wherein a double-sided metal-fuel card is disposed between a pair of cathode structures within an ultra-compact module housing having a form factor of a conventional battery type.
Another object of the present invention is to provide a rechargeable metal-air FCB power generation module for use in diverse types of systems and devices.
Another object of the present invention is to provide such a FCB power generation module, wherein a plurality of cathode/anode structures are arranged within a module housing having a hingedly or slidably connected cover designed to allow air to pass to the cathode structures.
Another object of the present invention is to provide such a FCB power generation module, wherein the output power voltage is user-selectable by way of a switch located in the exterior of the module housing.
Another object of the present invention is to provide such a system, wherein the metal-fuel cards to be discharged comprises multiple metal-fuel tracks for use in generating different output voltages from a metal-air FCB subsystem.
These and other objects of the present invention will become apparent hereinafter.
|
Overview [ edit ]
Jos "Ret" de Kroon is a Dutch Zerg player who currently resides in the Netherlands. Formerly a part of ToT and ESC, Ret chose to move to Korea and join Team eSTRO to pursue his dreams of becoming a pro gamer. Ret used to offrace as Terran versus Zerg opponents, but just before moving to Korea he switched to ZvZ, as the Korean leagues do not allow race selection. Ret was one of the first players to use live stream and record his FPV and conversations over Ventrilo, which displayed his high level play.
Biography [ edit ]
In 10-2009, Ret was invited to try out in the eSTRO team, following in the footsteps of IdrA (CJ Entus) and NonY (eSTRO). [1] Since moving to Korea, Ret joined team eSTRO and has participated in three Courage tournaments to this date. In his first attempt at Courage, Ret started off with a first round bye. In round 2, Ret faced a Terran who was a Woongjin Stars practice partner. Ret played a hard series, but eventually lost 2-1 and was knocked out by the eventual winner of that Courage. A month later, Ret took another shot at Courage, this time facing a Zerg in the first round. Ret played well in his weakest match up, but was eventually defeated by a score of 2-1 and was knocked out in the first round. The player who defeated Ret was defeated in the second round of the tournament. Ret's third and final attempt at winning Courage met greater fortune than his previous attempts. He made it to the Ro8 before being eliminated. All of his opponents were Zerg, largely to be considered his weakest match-up. However, Ret was not eliminated before himself eliminating a previous Courage finalist.
Facts [ edit ]
Was invited Korea to the Korean pro-gaming team eSTRO in the fall of 2009. On October 16 2009 he traveled to Korea and joined the team.
Played Terran when facing Zerg for a long time, but once he was invited to eSTRO he started playing ZvZ because of the Courage-tournament rules only allowing players to play one race.
Lost to Jaedong on the WCG 2008 Grand Finals main stage
Trivia [ edit ]
When the first Ansadi Starleague started, he was supposedly paid to stream his FPview during ladder stage, to increase the popularity of the league.
Got monstrously drunk at BlizzCon 2009 and shouted at the CJ team while they were presenting gifts for trivia answers.
Beat IdrA at BlizzCon 2009.
Took a game from NaDa at BlizzCon 2009 (although lost 2-1).
When NaDa was asked about ret's skill later on, he said "Not bad."
Finished last place in his WCG 2003 group.
In the Ro64 at his third attempt of winning Courage Tournament, Ret defeated Kim Hyeong Joon, fellow Zerg player, Korean celebrity and popstar from the group SS501. The score was 2-0.
Rivalries [ edit ]
IdrA [ edit ]
Ever since arriving in Korea, IdrA has been considered a favorite in most foreign tournaments. During 2009, he started dominating them, and only IdrA was able to keep up to some extent. They met in the finals of the ESL Major Series Season 4 on the 2nd of August 2009. Ret, coming from the lower bracket, had to win two Bo5 matches. He claimed the first one 3-2, but lost the second 1-3. At Blizzcon, he knocked out IdrA 2-1 in the lower bracket, after both lost to Korean players. In his interview about going to Korea, he replied, asked what excited him most about his new life :
I can’t wait to beat IdrA in every foreign tournament he ever participates in once I will be able to practice as much as he has [1]
Achievements [ edit ]
Notable Events/Leagues [ edit ]
Courage Experiences [ edit ]
Interviews [ edit ]
Notable Games [ edit ]
|
243 Cal.App.2d 324 (1966)
THE PEOPLE, Plaintiff and Appellant,
v.
JAMES M. JENNINGS et al., Defendants and Respondents.
Crim. No. 2504.
California Court of Appeals. Fourth Dist., Div. Two.
July 5, 1966.
Thomas C. Lynch, Attorney General, William E. James, Assistant Attorney General, Kenneth Williams, District Attorney, and Robert E. Law, Deputy District Attorney, for Plaintiff and Appellant.
No appearance for Defendants and Respondents.
KERRIGAN, J.
The People appeal from an order setting aside and dismissing count I of an information charging the defendants with the crime of murder (Pen. Code, 187). The defendants were also charged with the crimes of arson (Pen. Code, 447a) and conspiracy to commit arson (Pen. Code, *326 182), but the arson and conspiracy counts are not involved in this appeal.
A review of the evidence, as contained in the transcript of the preliminary examination, indicates that the defendants James M. Jennings and Clarence Homer Hurst and one Arthur Clifford Bockstahler formed a partnership in April 1964 for the purpose of organizing and operating a rest home and rehabilitation center for post-cardiac patients. The copartners leased a motel operation known as Laguna Village Motel, Laguna Beach, California, for the purpose of converting it into a combination rest home-clinic for heart convalescents. Because some of the units were still leased to private tenants at the time the copartnership took over the operation of the motel, the conversion of the business into a medical center could not be immediately effected, although items of medical and clinical equipment were installed by the copartners in some of the apartments as vacancies occurred. Apartment No. 43, in September 1964, was equipped in the fashion of a doctor's office and contained two patients' examination tables, a desk, filing cabinets, an electro-cardiogram machine, a day bed, a medical supply cabinet, and other miscellaneous medical fixtures. Apartment No. 42 was adjacent to Apartment No. 43 and was occupied by a family whose lease had apparently not expired.
The members of the partnership took out insurance in the sum of $50,000 on the furniture, furnishings and equipment which they had purchased and installed in the various units of Laguna Village, and also secured fire coverage of $150,000-$200,000 on the permanent buildings and improvements.
On or about September 7, 1964, the three partners conspired to set fire to the premises for the purpose of collecting the insurance. An accomplice, Lester Gustav Jaeger, was employed to burn the premises, and the defendant Jennings paid Jaeger a certain sum of money on September 9, 1964, to commit arson. It was understood that the defendants Hurst and Jennings would be absent from Laguna Village during the early morning hours of September 10, 1964, when Jaeger ignited the premises. Bockstahler was to remain in his Apartment No. 47 while Jaeger was making the preparations to ignite the buildings.
Jaeger slept in Bockstahler's apartment until 3-3:30 a.m., whereupon he arose and left the apartment for an hour. During this period of time he poured gasoline on the floor and walls of Apartment No. 43 and also splattered some on the ceiling of said unit. Traces of gasoline were later discovered in *327 eight other vacant apartments located in the Village area. He returned to Bockstahler's apartment and advised that he had spilled some "juice" (gasoline) on his shirt, and was admonished to be careful. After leaving Bockstahler, Jaeger returned to Apartment No. 43 and negligently ignited the gasoline, resulting in a flash fire. He was horribly burned in the process, struggled outside, rolled on the ground to extinguish the flames on his clothing, and found his way back to Bockstahler's apartment. Bockstahler noted the serious burns, furnished Jaeger with a double shot of whiskey at the latter's request, observed the secretion of fluid from the burned areas of Jaeger's torso, and prepared a cold bath in which Jaeger immersed after being undressed by Bockstahler.
In the interim, the fire department had arrived and extinguished the blaze in Apartment No. 43, and the police began an investigation. Jaeger was experiencing excruciating pain and Bockstahler transported him to the Veterans Administration Hospital at Long Beach for care and treatment. Subsequently Jaeger died, after making a dying declaration to police authorities in which he confessed to the crime and admitted that he had been employed by the three partners to commit arson for insurance purposes. These criminal proceedings were then initiated against two of the three partners. Bockstahler testified on behalf of the prosecution.
The issue to be determined is whether conspirators engaged in a plot to commit arson may be charged with murder of an accomplice who accidentally burns himself to death.
"Murder is the unlawful killing of a human being with malice aforethought." (Pen. Code, 187.)
"All murder ... which is committed in the perpetration ... (of) arson, rape, robbery, burglary, mayhem ... is murder of the first degree; and all other kinds of murder are of the second degree." (Pen. Code, 189.)
[1] An essential element of murder, except when the common law felony-murder doctrine is applicable, is an intent to kill or an intent with conscious disregard of life to commit acts likely to kill. (People v. Washington, 62 Cal.2d 777 [44 Cal.Rptr. 442, 402 P.2d 130].) [2] The felony-murder doctrine imputes malice aforethought to the felon who kills another in the commission of one of the felonies enumerated in Penal Code, section 189. (People v. Washington, supra. [3] Malice aforethought may not be implied under Penal Code, section 189, to make a killing murder, unless the defendant or his accomplice commits the killing in the perpetration *328 of an inherently dangerous felony. (People v. Gilbert, 63 Cal.2d 690, 705 [47 Cal.Rptr. 909, 408 P.2d 365].) [4] Thus, unintentional killings are first degree murders when committed by felons while perpetrating any of the crimes denounced in the said section. (People v. Coefield, 37 Cal.2d 865 [236 P.2d 570].) [5] If the unlawful killing occurs in the perpetration of one of the serious felonies listed in Penal Code, section 189, it is first degree murder. (People v. Pulley, 225 Cal.App.2d 366 [37 Cal.Rptr. 376].) [6] The purpose of the felony-murder rule is to deter felons from killing negligently or accidentally by holding them strictly responsible for killings they may commit. The felony-murder rule has been criticized upon the grounds that in almost all cases in which it is applied it erodes the relation between criminal liability and moral culpability. (People v. Washington, supra, 62 Cal.2d 777.) [See 30 So.Cal.L.Rev. 357; 71 Harv.L.Rev. 1565.] Nevertheless, it is the law of this state, as defined in Penal Code, section 189, but should not be extended beyond any rational function that it is designed to serve. (People v. Washington, supra.) [7] The felony-murder doctrine was enacted for protection of the community and its residents, not for the benefit of the lawbreaker, and obviates rather than requires necessity of technical inquiry as to whether there has been completion, abandonment, or desistance of the felony before homicide was completed. (People v. Chavez, 37 Cal.2d 656, 669 [234 P.2d 632].)
In People v. Washington, supra, 62 Cal.2d 777, the Supreme Court of California recently held in a factual situation where a defendant and his accomplice were in the act of robbing a gas station and the victim resisted and killed the defendant's accomplice, that the defendant could not be held responsible for the death of the accomplice. The court based its ruling on the principle that the act of killing must be committed by the defendant or by his accomplice acting in furtherance of their common design. (See People v. Gilbert, supra, 63 Cal.2d 690.)
In People v. Ferlin, 203 Cal. 587 [265 P. 230], a case which is almost identical with the factual situation presented herein, the defendant retained "X" to set fire to certain commercial property owned by defendant for the purpose of collecting the insurance proceeds on the premises. "X" was reluctant to proceed with the arson plot and retained "Y" to set the fire. Defendant purchased the gasoline. "Y" was careless in igniting the inflammatory substance and caused an explosion. The third-degree burns sustained in the holocaust resulted in his death. The California Supreme Court held that when an accomplice *329 in a conspiracy to commit arson for the purpose of collecting insurance is accidentally burned to death, his coconspirators cannot be charged with his murder inasmuch as the death was not in furtherance of the conspiracy but was entirely opposed to it, and that under such circumstances, it could not be said that the defendant and the deceased had a common design that the deceased should accidentally kill himself. Further, the Supreme Court noted that it could not be seriously contended that one accidentally killing himself while engaged in the commission of a felony could be charged with murder, and that if the deceased coconspirator was not guilty of murder, then his accomplice could likewise not be guilty of the crime. [fn. 1]
Likewise, in Woodruff v. Superior Court, 237 Cal.App.2d 749 [47 Cal.Rptr. 291], the Second District Court of Appeal granted an accused's petition for writ of prohibition to restrain further proceedings in a criminal prosecution for murder under circumstances bearing a startling resemblance to the facts involved in the case now under review. The accused was the owner of a cafe which had been operating at a financial loss and which was insured against loss by fire. A fire of incendiary origin occurred in the cafe at a time when the accused was not present. Defendant purchased the inflammable liquid utilized in setting the fire, and hired a friend to start the fire with the purchased gasoline. The friend inadvertently set himself afire during the commission of the crime and sustained fatal burns. The court held that People v. Ferlin, supra, 203 Cal. 587, constituted valid authority for the proposition that Penal Code, section 189, is inapplicable to a situation where an accomplice accidentally kills himself while engaged in the act of arson.
[8] We hold that it is not murder for an accomplice to kill himself accidentally while engaged in the commission of the crime of arson, and consequently his principal may not be charged with such offense inasmuch as the act of accidentally killing one's self does not constitute an "unlawful killing" within the meaning of Penal Code, section 187, particularly in view of the rule that the felony-murder doctrine was enacted for the protection of the public, and not for the benefit of the lawbreaker.
Order affirmed.
McCabe, P. J., and Tamura, J., concurred.
NOTES
[fn. 1] 1. The Supreme Court cited the Ferlin case with approval in its recent decision in the case of People v. Washington, 62 Cal.2d 777 [44 Cal.Rptr. 442, 402 P.2d 130].
|
Q:
JAGQL - Why do I need an id for a post call?
I'm using JAGQL to build a JSON API compatible express server. My database behind it is MongoDB (jsonapi-store-mongodb). I posted my question here as well: https://github.com/holidayextras/jsonapi-store-mongodb/issues/59
According to the JAGQL documentation, https://jagql.github.io/pages/project_setup/resources.html#generateid,
I am told that
generateId
By default, the server autogenerates a UUID for resources which are created without specifying an ID. To disable this behavior (for example, if the database generates an ID by auto-incrementing), set generateId to false. If the resource's ID is not a UUID, it is also necessary to specify an id attribute with the correct type. See /examples/resorces/autoincrement.js for an example of such a resource.
But when I send a POST request to one of my resources, I get this:
"jsonapi": {
"version": "1.0"
},
"meta": {},
"links": {
"self": "/myresource"
},
"errors": [
{
"status": "403",
"code": "EFORBIDDEN",
"title": "Param validation failed",
"detail": [
{
"message": "\"id\" is required",
"path": [
"id"
],
"type": "any.required",
"context": {
"key": "id",
"label": "id"
}
}
]
}
]
What am I missing?
A:
See here for more details: https://github.com/jagql/framework/issues/106
In your resource definition, you want to add primaryKey: 'uuid':
{
resource: 'things',
handlers,
primaryKey: 'uuid',
attributes: {
...
}
}
|
# Copyright (c) 2019 NVIDIA CORPORATION. All rights reserved.
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
import hashlib
import os
import urllib.request
import zipfile
class GooglePretrainedWeightDownloader:
def __init__(self, save_path):
self.save_path = save_path + '/google_pretrained_weights'
if not os.path.exists(self.save_path):
os.makedirs(self.save_path)
# Download urls
self.model_urls = {
'bert_base_uncased': ('https://storage.googleapis.com/bert_models/2018_10_18/uncased_L-12_H-768_A-12.zip', 'uncased_L-12_H-768_A-12.zip'),
'bert_large_uncased': ('https://storage.googleapis.com/bert_models/2018_10_18/uncased_L-24_H-1024_A-16.zip', 'uncased_L-24_H-1024_A-16.zip'),
'bert_base_cased': ('https://storage.googleapis.com/bert_models/2018_10_18/cased_L-12_H-768_A-12.zip', 'cased_L-12_H-768_A-12.zip'),
'bert_large_cased': ('https://storage.googleapis.com/bert_models/2018_10_18/cased_L-24_H-1024_A-16.zip', 'cased_L-24_H-1024_A-16.zip'),
'bert_base_multilingual_cased': ('https://storage.googleapis.com/bert_models/2018_11_23/multi_cased_L-12_H-768_A-12.zip', 'multi_cased_L-12_H-768_A-12.zip'),
'bert_large_multilingual_uncased': ('https://storage.googleapis.com/bert_models/2018_11_03/multilingual_L-12_H-768_A-12.zip', 'multilingual_L-12_H-768_A-12.zip'),
'bert_base_chinese': ('https://storage.googleapis.com/bert_models/2018_11_03/chinese_L-12_H-768_A-12.zip', 'chinese_L-12_H-768_A-12.zip')
}
# SHA256sum verification for file download integrity (and checking for changes from the download source over time)
self.bert_base_uncased_sha = {
'bert_config.json': '7b4e5f53efbd058c67cda0aacfafb340113ea1b5797d9ce6ee411704ba21fcbc',
'bert_model.ckpt.data-00000-of-00001': '58580dc5e0bf0ae0d2efd51d0e8272b2f808857f0a43a88aaf7549da6d7a8a84',
'bert_model.ckpt.index': '04c1323086e2f1c5b7c0759d8d3e484afbb0ab45f51793daab9f647113a0117b',
'bert_model.ckpt.meta': 'dd5682170a10c3ea0280c2e9b9a45fee894eb62da649bbdea37b38b0ded5f60e',
'vocab.txt': '07eced375cec144d27c900241f3e339478dec958f92fddbc551f295c992038a3',
}
self.bert_large_uncased_sha = {
'bert_config.json': 'bfa42236d269e2aeb3a6d30412a33d15dbe8ea597e2b01dc9518c63cc6efafcb',
'bert_model.ckpt.data-00000-of-00001': 'bc6b3363e3be458c99ecf64b7f472d2b7c67534fd8f564c0556a678f90f4eea1',
'bert_model.ckpt.index': '68b52f2205ffc64dc627d1120cf399c1ef1cbc35ea5021d1afc889ffe2ce2093',
'bert_model.ckpt.meta': '6fcce8ff7628f229a885a593625e3d5ff9687542d5ef128d9beb1b0c05edc4a1',
'vocab.txt': '07eced375cec144d27c900241f3e339478dec958f92fddbc551f295c992038a3',
}
self.bert_base_cased_sha = {
'bert_config.json': 'f11dfb757bea16339a33e1bf327b0aade6e57fd9c29dc6b84f7ddb20682f48bc',
'bert_model.ckpt.data-00000-of-00001': '734d5a1b68bf98d4e9cb6b6692725d00842a1937af73902e51776905d8f760ea',
'bert_model.ckpt.index': '517d6ef5c41fc2ca1f595276d6fccf5521810d57f5a74e32616151557790f7b1',
'bert_model.ckpt.meta': '5f8a9771ff25dadd61582abb4e3a748215a10a6b55947cbb66d0f0ba1694be98',
'vocab.txt': 'eeaa9875b23b04b4c54ef759d03db9d1ba1554838f8fb26c5d96fa551df93d02',
}
self.bert_large_cased_sha = {
'bert_config.json': '7adb2125c8225da495656c982fd1c5f64ba8f20ad020838571a3f8a954c2df57',
'bert_model.ckpt.data-00000-of-00001': '6ff33640f40d472f7a16af0c17b1179ca9dcc0373155fb05335b6a4dd1657ef0',
'bert_model.ckpt.index': 'ef42a53f577fbe07381f4161b13c7cab4f4fc3b167cec6a9ae382c53d18049cf',
'bert_model.ckpt.meta': 'd2ddff3ed33b80091eac95171e94149736ea74eb645e575d942ec4a5e01a40a1',
'vocab.txt': 'eeaa9875b23b04b4c54ef759d03db9d1ba1554838f8fb26c5d96fa551df93d02',
}
self.bert_base_multilingual_cased_sha = {
'bert_config.json': 'e76c3964bc14a8bb37a5530cdc802699d2f4a6fddfab0611e153aa2528f234f0',
'bert_model.ckpt.data-00000-of-00001': '55b8a2df41f69c60c5180e50a7c31b7cdf6238909390c4ddf05fbc0d37aa1ac5',
'bert_model.ckpt.index': '7d8509c2a62b4e300feb55f8e5f1eef41638f4998dd4d887736f42d4f6a34b37',
'bert_model.ckpt.meta': '95e5f1997e8831f1c31e5cf530f1a2e99f121e9cd20887f2dce6fe9e3343e3fa',
'vocab.txt': 'fe0fda7c425b48c516fc8f160d594c8022a0808447475c1a7c6d6479763f310c',
}
self.bert_large_multilingual_uncased_sha = {
'bert_config.json': '49063bb061390211d2fdd108cada1ed86faa5f90b80c8f6fdddf406afa4c4624',
'bert_model.ckpt.data-00000-of-00001': '3cd83912ebeb0efe2abf35c9f1d5a515d8e80295e61c49b75c8853f756658429',
'bert_model.ckpt.index': '87c372c1a3b1dc7effaaa9103c80a81b3cbab04c7933ced224eec3b8ad2cc8e7',
'bert_model.ckpt.meta': '27f504f34f02acaa6b0f60d65195ec3e3f9505ac14601c6a32b421d0c8413a29',
'vocab.txt': '87b44292b452f6c05afa49b2e488e7eedf79ea4f4c39db6f2f4b37764228ef3f',
}
self.bert_base_chinese_sha = {
'bert_config.json': '7aaad0335058e2640bcb2c2e9a932b1cd9da200c46ea7b8957d54431f201c015',
'bert_model.ckpt.data-00000-of-00001': '756699356b78ad0ef1ca9ba6528297bcb3dd1aef5feadd31f4775d7c7fc989ba',
'bert_model.ckpt.index': '46315546e05ce62327b3e2cd1bed22836adcb2ff29735ec87721396edb21b82e',
'bert_model.ckpt.meta': 'c0f8d51e1ab986604bc2b25d6ec0af7fd21ff94cf67081996ec3f3bf5d823047',
'vocab.txt': '45bbac6b341c319adc98a532532882e91a9cefc0329aa57bac9ae761c27b291c',
}
# Relate SHA to urls for loop below
self.model_sha = {
'bert_base_uncased': self.bert_base_uncased_sha,
'bert_large_uncased': self.bert_large_uncased_sha,
'bert_base_cased': self.bert_base_cased_sha,
'bert_large_cased': self.bert_large_cased_sha,
'bert_base_multilingual_cased': self.bert_base_multilingual_cased_sha,
'bert_large_multilingual_uncased': self.bert_large_multilingual_uncased_sha,
'bert_base_chinese': self.bert_base_chinese_sha
}
# Helper to get sha256sum of a file
def sha256sum(self, filename):
h = hashlib.sha256()
b = bytearray(128*1024)
mv = memoryview(b)
with open(filename, 'rb', buffering=0) as f:
for n in iter(lambda : f.readinto(mv), 0):
h.update(mv[:n])
return h.hexdigest()
def download(self):
# Iterate over urls: download, unzip, verify sha256sum
found_mismatch_sha = False
for model in self.model_urls:
url = self.model_urls[model][0]
file = self.save_path + '/' + self.model_urls[model][1]
print('Downloading', url)
response = urllib.request.urlopen(url)
with open(file, 'wb') as handle:
handle.write(response.read())
print('Unzipping', file)
zip = zipfile.ZipFile(file, 'r')
zip.extractall(self.save_path)
zip.close()
sha_dict = self.model_sha[model]
for extracted_file in sha_dict:
sha = sha_dict[extracted_file]
if sha != self.sha256sum(file[:-4] + '/' + extracted_file):
found_mismatch_sha = True
print('SHA256sum does not match on file:', extracted_file, 'from download url:', url)
else:
print(file[:-4] + '/' + extracted_file, '\t', 'verified')
if not found_mismatch_sha:
print("All downloads pass sha256sum verification.")
def serialize(self):
pass
def deserialize(self):
pass
def listAvailableWeights(self):
print("Available Weight Datasets")
for item in self.model_urls:
print(item)
def listLocallyStoredWeights(self):
pass
|
Many thanks to Anne Aronson, with Digital Story Makers, for producing this amazing video of the bond between her Fa… https://t.co/NaTGx7Wqhy
via @StPaulSaints
Saints Games To Be Broadcast on Club 1220 KLBB, Home Games Watched At Saintsbaseball.com
ST. PAUL, MNMay 7, 2012
Saints Games To Be Broadcast on Club 1220 KLBB, Home Games Watched At Saintsbaseball.com
May 07, 2012 at 10:48 AM
ST. PAUL, MN (May 7, 2012) – It’s official the St. Paul Saints are moving…down the radio dial in 2012. Along with catching all 100 Saints games on a new radio station all 50 games can be watched on line at saintsbaseball.com.
Club 1220 KLBB is the new home of Saints Baseball with nearly every home and road games broadcast live by the voice of the Saints, Sean Aronson. Aronson enters his sixth season with the Saints and his 12th season broadcasting minor league baseball. Prior to the Saints he spent four seasons (2003-06) broadcasting the Fort Myers Miracle, Single-A affiliate of the Minnesota Twins, and two seasons (2001-02) with the Allenton Ambassadors (Independent, Northeast League). Joining the broadcast team this season are Greg Caserta, who recently worked at MSG Varsity in New Jersey and spent last season broadcasting North Adams SteepleCats games in the New England Collegiate Baseball League and Declan Goff, a student at St. Cloud State. They will rotate between producing/studio host and the number two broadcaster on home games.
KLBB Radio is located out of Stillwater, MN and is the Twin Cities home for America’s Best Music and the Green Bay Packers. Whether it’s the Green Bay Packers, or America’s Best Music from Frank Sinatra, Ella Fitzgerald, Willie Nelson and Michael Buble, KLBB Listeners are known for their passion for this unique programming.
Each Saints game will be preceded by a 20 minute pre-game show and following every game there will be a 15 minute post-game wrap up show.
“We are very excited to partner with KLBB for the 2012 season,” said Saints Director of Broadcasting/Media Relations Aronson. “Saints fans are some of the most invested and passionate fans and having our games on KLBB will give them a chance to follow the club as we celebrate our 20th season.”
Along with the new radio station Saints fans who can’t make it out to every game at Midway Stadium will have the chance to watch all 50 home games on line at saintsbaseball.com courtesy of Minnesota Sports Broadcast Network (MSBN). The Saints will offer a three camera view, with a high home, center field and roving fan camera look. The radio broadcast feed will coincide with the video of the game.
“Of course there’s nothing quite like an evening at a Saints game” said Saints Executive Vice President/General Manager Derek Sharrer. “but if for some reason you’re unable to make it to Midway, we’re excited to be able to provide you with a way to enjoy the experience from wherever you have access to the internet. ”
The radio broadcast of all Saints games, home and road, are streamed on line at saintsbaseball.com courtesy of MSBN. In addition Saints games can also be listened to on a smartphone or tablet via the Saints app. The Saints app can be found at the Android Marketplace or on an iPhone via the App Store. Saints fans can also use their tablets to watch all home games.
The Saints first broadcast is the regular season opener at home on Thursday, May 17 at 7:05 p.m. Tickets for all Saints exhibition and regular season home games are available now in person at the Saints Box Office, by phone at 651-644-6659 or online at saintsbaseball.com.
Tickets for all Saints home games are $5 for general admission, $8 for outfield reserved and $12 for infield reserved. Tickets purchased on the Day of the Game are an additional $1 per ticket. Children under the age of 14 and seniors 65 and older receive $1 off the admission price. Children under 2 that don't require a seat are free.
|
The Walking Dead Quick Links
Despite reports to the contrary ever since 'Fear' started, the shows will soon be coming together.
'The Walking Dead' is for many one of the best shows on television. When it was announced a sister show would be coming in the form of 'Fear The Walking Dead', expectation was high and, for the majority of those watching, the new series impressed just as much as the original.
Colman Domingo as Victor Strand in 'Fear The Walking Dead' season 3
Ever since the prequel series was revealed, fans mused over the possibility of a crossover, but all of the head honchos behind-the-scenes have repeatedly shot the idea down and said it would prove too difficult to ever pull off.
The Marvel series will make its debut on Netflix before the end of the year.
When 'The Walking Dead' first made its way to the small screen, Jon Bernthal was one of the integral pieces of making the show a success, playing Rick Grimes' (Andrew Lincoln) best friend Shane Walsh. Unfortunately, his character wasn't long for the zombie-infested world, but Bernthal has since continued to make a name for himself in a number of big projects.
Gale Anne Hurd has always been a fan of The Punisher
His latest is in Marvel's newest collaboration with Netflix on a solo series based on Marvel Comics character Frank Castle, aka The Punisher. First introduced in the second season of 'Daredevil', Castle is somebody who has a 'take no prisoners' approach to life, first seeking vengeance following the murder of his loved ones, and now fighting to make the streets of New York a safer place for everybody.
With just under a month until we get the premiere for 'The Walking Dead' season 8, talk is turning towards exactly what we should expect from the upcoming episodes, especially so after the season's trailer debuted back at San Diego Comic Con a little earlier this year.
Danai Gurira stars as Michonne, seen here in 'The Walking Dead' season 6
Whilst 'All Out War' - a fan-favourite comic book arc - is set to be the main focus of the season, there was one particular scene in the trailer that caught everybody's attention.
When it comes to 'The Walking Dead', we think it's fair to say that anything is really possible. Through seven seasons now, the zombie apocalypse has rained down on the band of survivors the show follows, with twists and turns around every corner.
Rick Grimes is on a mission to bring Negan's rule to an end in 'The Walking Dead' S8
Though it's based on Robert Kirkman's comic series of the same name, and the author works very closely with the show in its US home of AMC, there are some changes that have been made and surprised everybody watching.
When 'The Walking Dead' makes its return for its eighth season next month, fans will be expecting a huge shift of tone when it comes to comparing the new episodes to those that made up season 7.
Norman Reedus makes his return in 'The Walking Dead' as Daryl Dixon
The last season saw a lot of criticism for being incredibly dark and violent, but when it came to the finale, lines were drawn and the foundations were laid out for the infamous comic book story arc known as 'All Out War'.
The series will return for the second half of its third season this month.
Though it may not be as popular as the show that spawned it, 'Fear The Walking Dead' has found a loyal audience at AMC and will return for the second half of its third season in the US tomorrow (September 10).
Dave Erickson returns as executive producer
Season 3 kicked off with a tragedy, with Cliff Curtis' character Travis being killed off, forcing the rest of the survivors the show follows to find a new place to call home. There, they met Jeremiah Otto (Dayton Callie), but he turned out to be more of a hinderance to the group than anything else, leading to Nick (Frank Dillane) taking his life so that he was no longer an obstacle in their way.
It's been almost a week since the death of Glenn in the first episode of 'The Walking Dead' season seven and people have been expressing their (often genuine) grief in various ways. One person even took out an obituary in Arkansas newspaper The Batesville Daily Guard. Now that's true fandom.
A columnist named Andrea Bruner described how she was 'too depressed' to write her usual column following Glenn's bloody death in last Sunday's (October 23rd 2016) episode of 'The Walking Dead'. Instead, she enlisted the help of her friend Frank Vaughn to write an obituary for the character, dubbing him: 'Glenn Rhee, husband, father-to-be, warrior and friend'.
'The Walking Dead' has left us feeling a little silly with the mid-season 6 premiere 'No Way Out'. We were feeling pretty tense after the 4-minute clip released prior to the showing which saw Abraham, Sasha and Daryl confronted by some armed bandits, but we can finally breathe a sigh of relief having seen that moment's unlikely resolution.
Daryl saves the day in 'The Walking Dead' mid-season 6 premiere
If you didn't see the clip, here's a quick recap. Daryl (Norman Reedus), Abraham (Michael Cudlitz) and Sasha (Sonequa Martin-Green) are on their way to Alexandria when a bunch of bikers known as The Saviors intercept them and demand they hand over their weapons - and, indeed, any other supplies they may have - claiming that everything now belongs to the mysterious Negan. They truly looked defeated but, as usual, Daryl had some tricks up his sleeve.
Unsure of how to celebrate Valentine's Day this year? How about cuddling up on the sofa to the season 6 mid-season premiere of 'The Walking Dead'? Be warned though, it's pretty intense. And if you don't believe us, AMC have just launched a clip with the first four minutes of the opening scene for all you eager beavers.
Things go from bad to worse when Abraham steps in
The weekend literally can't come soon enough now we've seen this. Ahead of the upcoming season 6 episode, fans can get a generous glimpse of the events to come before Sunday (February 14th 2016). The clip features bits you've probably already seen from the 'hidden scene' of the mid-season finale.
The spin-off series promises to offer fans something different to 'The Walking Dead'.
'Fear The Walking Dead', the spin-off to AMC’s hit zombie series 'The Walking Dead', has been given a premiere date of August 23rd at 9 p.m, with a special 90 minute episode. The announcement was made during AMC’s panel at this year’s San Diego Comic Con, where a special series trailer was also shown to the audience.
The series is being billed as a prequel/spin off to 'The Walking Dead' and stars Gone Girl’s Kim Dickens as well as Cliff Curtis, Frank Dillane and Alycia Debnam-Carey. In the trailer shown at SDCC, Dickens is seen as guidance counsellor Madison and shows the time before the zombie apocalypse hits.
Chad Coleman, an actor who has starred on ‘The Walking Dead’ and ‘The Wire’ has been filmed ranting a passengers on a New York subway, during a ride on the Downtown 4 express train.
Coleman starred as Tyreese on the AMC series.
“I wanna know where my humanitarians are!” Coleman is seen yelling while walking up and down the carriage. The actor then tells passengers, “Yes, I am Chad L. Coleman. I am on ‘The Wire,’ ‘The Walking Dead,’ I’m not trying to play no f---ing games with you! Yes, I’m an actor! You want me on TMZ, record it.’
Dickens will play a guidance counsellor in the as yet untitled spin off series.
Fresh off interrogating Ben Affleck on the big screen, Kim Dickens will soon be battling zombies, in the as yet untitled 'Walking Dead' companion series. The 49 year old actress, who starred in Gone Girl earlier this year, is also known for playing Joanie Stubbs in the HBO series 'Deadwood' and for her recurring role in 'Sons of Anarchy's' final season.
Sunday's episode of The Walking Dead featured one of the most gruesome scenes of the entire series so far. Twitter sparked into life after Gareth (Andrew J. West), leader of Terminus, forced Lawrence Gilliard Jr's Bob to watch as he took a bite out of his newly amputated, charred leg.
Remember The Walking Dead season 4? Well, things just got weirder
"We didn't want to hurt you before," Gareth tells Bob, who had woken up chained to a post. "We didn't want to pull you away from your group or scare you. These are not things that we wanted to do," he added.
The Walking Dead just got renewed for a sixth season, but plans for its spin-off are in full swing, too.
The upcoming spin-off for The Walking Dead keeps getting more alive by the day. After AMC announced a pilot order back in September, character descriptions for the cast have now surfaced. Are they as intriguing as the ones we know and love on The Walking Dead? Let’s take a look.
Prepare yourselves: a Walking Dead spin-off is happening
According to TVLine, the series will apparently follow two families and an additional survivor: Sean Cabrera and his son Cody, Nancy Tompkins and her two children Nick and Ashley, and a lone wolf by the name of Andrea (don't worry: it's a different Andrea). Sean is described as a Latino male in his 40’s “trying to do right by everyone in his life,” while his teenage son, Cody, is full of rebellion. The Tompkins, on the other hand, seem like they’ll add a bit of dysfunction. Nancy looks like “the girl next door” with an edge, and her children are opposites from each other in the sense that the son Nick doesn’t want to flee, but the daughter Ashley wants to “get out of dodge.” As far as Andrea goes, she has “retreated to the outskirts of the city to recover after a horrible marriage.”
Lincoln, Reedus and Cohen are all in agreement: season 5 is big. Also, some season 4 spoilers follow
After four seasons of some pretty intense zombie action, The Walking Dead enters its fifth this October. And according to some of the stars of the show, The Walking Dead Season 5 opens with some NSFTV stuff.
For those of you who don't remember what happened at the end of The Walking Dead season 4
"This episode is so disturbing," said actress Lauren Cohan whose character Maggie Greene spent the majority of season 4 fighting to find her husband, Glen. "Some of the the stuff they shot yesterday, I don't know if it'll make it to TV,” she added.
'The Walking Dead' producers say that the show could go on until season 12, but can its ratings keep improving like they have been?
There’s nothing better than your favorite show being in its fourth season and hearing from its creators that they already have plans for season number twelve. It’s exactly what fans of 'The Walking Dead' got when showrunner Scott Gimple and producer David Alpert revealed the info. Gimple started it all when he said the show could go on for ten seasons a few months back, but Alpert recently backed him up stating that, whether 'The Walking Dead' makes it to season 12 or not, they already know where they’re going to take the hit zombie series.
The Walking Dead could last till season 12?
"I happen to love working from source material, specifically because we have a pretty good idea of what season 10 is gonna be," Aplert said at an appearance at the Produced By conference this week. "We know where Season 11 and 12...we have benchmarks and milestones for those seasons if we're lucky enough to get there." The ones involved with the show aren’t the only ones who feel this way. Robert Kirkman, the creator of 'The Walking Dead' comic, has said that he knows where he’ll be taking the comic for issue number 200, and he even knows how it’s going to end. Started in October 2003, the book is currently at issue 128.
Take a look at Rick looking all angry below. And there are major spoilers for various Walking Dead properties all over the place.
The Walking Dead season 4 ended in high-octane fashion: Rick, Daryl, Michonne and Carl found Terminus but were soon wise to eerie feeling that surrounded it. A gun fight followed, and the subsequent dance that ensued saw the gang reunited, albeit locked up in a metal box.
In the photo, it looks as though Rick might be opening said metal box with a view to following through with his end-of-season words: “They’re screwing with the wrong people.” It was a solid end to a weird season, but one can’t help but thinking the whole ‘Rick’s back’ storyline has been done before, when he recovered from the loss of his wife.
There are spoilers ahead. If you haven't watched 'The Walking Dead' season 4, then what are you doing?
Walking Dead’s fourth season was a fractured affair, and one that got better with age. Once we’d recovered from Hershal’s death and the attack on the prison, our survivors were dispersed into groups as AMC’s zombie drama explored some of the darkest themes of its hugely popular run.
The season’s finale offered up a beautifully poised cliffhanger to lead us into season 5. Although cliffhanger might not be the right word, given we know the people of Terminus aren’t friendly, and we know Rick’s going to go all out to survive, especially considering what he’s done to get to this point.
For those of you that watched the season 4 finale of The Walking Dead on Sunday night (Sunday, March 30) will know that Rick will do almost anything to survive, and that includes biting a man’s neck off. And survival is a motif continued by the first poster for season 5, which features Rick crouching solemnly, holding a gun; the word “survive” emblazoned above him. You can view it right here on AMC's Walking Dead Facebook page.
"Where did you get the watch!?" bellows Rick as he tries to get to the bottom of what's happening at Terminus
It brings us back full circle to the pilot episode and the first season in general, when ideas on the zombie apocalypse were first forming and the walkers seemed like a genuine threat, even attacking alone or in pairs. Nowadays, a single walker doesn’t represent much of a problem for our survivors, but Rick’s goals were simple: find his family, keep them alive. Survival was key.
Spoilers ahead. There's literally no point in playing Episode 1 after reading this.
It feels like an eternity since the season two of Telltale’s excellent Walking Dead game kicked off with its first episode. Now, finally, the trailer for episode two has been released, bringing with it an imminent release date and major hype for the next instalment in Clem’s story.
In the trailer, we are confronted with a new character; a man hell bent on finding the group Clem came to loggerheads with in the first episode. It’s pretty obvious why he wants to find them: Rebecca and the baby. Clem seems stuck in the middle, talking to the enigmatic man while still travelling with her new group. With this new trailer for A House Divided, we edge closer to the actual release, which should have a date soon enough if Telltale’s previous patters are repeated.
Spoilers ahead. Anyone who reads this without watching S04E09: 'After', will have it ruined for them. That much should be obvious...
AMC’s ratings behemoth The Walking Dead returned to American TV screens on Sunday night (Feb 9th) and last night on FOX for British viewers. We re-join zombie dystopia after the devastating battle that left the prison decimated, our beloved survivors scattered, and a few key characters dead or missing.
Let's just kill Carl off and be done with it
The mid-season premiere focused on Rick Grimes and his son Carl as they scavenge for supplies in a dilapidated town, which, surprisingly – considering it’s walking distance from the prison - is full of nourishing goodies like a 112-ounce can of chocolate pudding. This is as good a time as any for me to list the reasons why The Walking Dead isn’t very good any more:
Ahead of tonight's return, the stars warn these 8 episodes aren't for the faint-hearted
For fans of The Walking Dead, season 4’s hiatus has felt like a lifetime. So tonight’s mid-season premiere will come as a welcome relief. There won’t be long to bathe in the sweet sunlight, though, as things are getting serious…
Danai Gurira is Michonne, and she walks about like this
“Keep the lights on and stay near a loved one,” says Danai Gurira, who plays grump samurai sword weilding Michonne on the AMC zombie drama.
With the midseason opener set to hit screens this Sunday (Feb 8), The Walking Dead’s Lauren Cohen – who plays Maggie on the hit zombie drama – has spoken up about what we can expect: loneliness and gore. Lots and lots of gore.
Lauren Cohen's Maggie has survived the zombie apocalypse so far
The first eight episodes were weirdly paced, but gathered momentum in the last two as The Governor executed his plan to revert back to his killing ways.
The Walking Dead is back this Sunday, so we’ll be able to see Rick Grimes stab zombies in the head with a shiv once more while his son walks about, looking moody, constantly trying to prove himself.
Chandler Riggs' Carl is not really fussed by zombies any more - not even looking
To celebrate this (market this), AMC have put some zombies under a subway grate to scare the bejeezus out of unsuspecting New Yorkers. Manhattan's Union Square was infested with zombie extras, reaching out to grab the ankles of commuters, tourists, homeless people and joggers.
The Walking Dead has always been a ratings winner for AMC. Seasons 1-3 have been a great success for the network, which has boasted Breaking Bad and Mad Men over the past fix years, but season 4’s premiere has topped it all with 16.1 million fans tuning in to see how Rick Grimes can protect his even larger group.
Rick Grimes had plenty to think about in the opening episode of season 4
If Nielsen are to be believed – and they are – The Walking Dead received the highest rating across all U.S programing on Sunday night. This includes NBC's NFL "Sunday Night Football" game, which usually draws the largest viewership in the 18-49 demographic.
The Walking Dead season 4 episode 1 began with calm, though quickly moved into chaos.
All was calm in the prison community during The Walking Dead season 4, episode 1, which aired on AMC on Sunday night (October 14, 2013) to fill the Breaking Bad sized hole in the networks' schedule.
Rick Grimes Takes Time Out From His Gardening To Chat With The Walkers
The long struggle between the suvivor's of the Governor's Woodbury and Rick's hastily put together prison community is now over and the survivors are trying to create structure. There's a nice little garden, a decision making council, some farm animals and communal meals.
Andrew Lincoln was a surprise casting as Rick Grimes, though he's more than proved his worth.
The Walking Dead'sAndrew Lincoln was living a pretty stress free life in Britain. After graduating from the super-competitive Royal Academy of Dramatic Art, he landed a part in the BBC series This is Life before going on to split his time between television, theater and movies.
Andrew Lincoln Beat 100 Rivals To 'The Walking Dead' Lead
After the success of Channel 4's Teachers, Lincoln had a solid reputation - in British acting circles at least - and a handful of movies followed, including the smash hit romantic comedy Love Actually. Though the 40-year-old was in work, he'd hardly set the screen alight.
Having kicked off as an all-out zombie drama, where survival was key at all costs and the most enjoyable scenes featured at least a mauling or two, if not the death of a main character,The Walking Dead has evolved into a fully fledged character drama over three seasons.
What should I do to them? Grimes thinks, and probably should say
And ahead of season four, which premieres this Sunday (Oct13) on AMC, the character responsible for the biggest arc – a certain Rick Grimes – is set to herd his sheep through a maze of greedy, barbaric humans and non-sentient zombies looking for their next meal of human flesh.
The Walking Dead finally returns this week (Oct13) to AMC. With the network’s keynote show, Breaking Bad, having culminated in its fantastic finale not so long ago, TV lovers will welcome the return of Robert Kirkman’s high-octane zombie drama to fill their winter Sunday nights.
Of course, binging on seasons one, two and three to catch up on all the action is one option. But that would mean some serious time off between now and Sunday night. No, to get up to speed on the action gone by, and hints of action to come, this comprehensive preview should satisfy all your needs.
Fear not, grieving Breaking Bad fan, because there’s nothing like saying goodbye to your favorite TV show then welcoming the new one you really quite like. Flesh-guzzling zombies, The Governor and the must-talked-about ‘new threat' loom in season four of The Walking Dead: take a look at this sneak peak now.
The guys are back to thrill and shock us - not Andrea or Lori or T, though: they're all dead.
In a world in which HBO are the darlings of the boxset generation, AMC represent the plucky underdog. They’ve got Breaking Bad and The Walking Dead up their sleeve, and they’re not afraid to milk them. First came Better Call Saul, now we’ll have a whole new wave of Zombie survivors as a Walking Dead spin off series has been confirmed.
With season four ready to return in October, we’ll finally get to see how the new prison inhabitants settle in, and just what The Governor has planned now that he’s gone ‘full on crazy’ and ‘mental’. So far, Robert Kirkman’s creation has included many of the characters brought to life by his comic book series, although it’s unclear if any of those characters – or indeed the ones we know and love – are set to feature in the spin off.
Enroll in 'The Walking Dead' course now, and make it one day longer in hell.
How many days could you survive a zombie apocalypse? Seven? ‘Forty three’? No – you’re wrong. You all think you could survive for ages, but that’s because never been attacked by something intent on ripping your brain out and throating it whole – no sautéing or anything.
Yeah, books sold at a ridiculous a markup on some geek site might claim to have all the tools you need for survival - cut your hair so it can’t get grabbed (thanks Lee), for example – but what you really need is an official course.
We all thought The Governor would die at the end of season three of The Walking Dead – we just did. Then he went berserk and killed a load of people – people, not zombies – and disappeared in a big scary truck. He’s not dead, and now we can’t wait for his return in season 4.
The excellent Morrissey is turning into AMC's main man
But there’s a caveat to all this; you see, when we find out about actors getting work in real life, we, as humans, do sums in our little heads – the cogs start turning and then someone goes, ‘hang on?’ David Morrissey is leading a new pilot for AMC’s Line of Sight, so, doesn’t that mean the Governor is going to be killed off early doors?
There’s a lot of brilliant TV hitting our screens very soon; we’re a lucky bunch. With Breaking Bad, Boardwalk Empire and The Walking Dead all returning in August, September and October, it promises to be a monumental Fall for TV dramas.
The latter – the zombie thriller spearheaded by Andrew Lincoln – provides something a little different. As well as the high drama, sometimes expertly written in to the show, the pure visceral thrill of the apocalypse has given a real edge to ACM’s programming, not to mention ‘Sundays’.
Fan's wait patiently for the new season, and this 4.5 min trailer should keep them happy.
In the extended Walking Dead Season 4 trailer, let loose at Comic-Con 2013, we see a more hardened version of the survivors we’ve come to know and love. And as David Morrissey explained to io9, there’s a whole new threat to be wary of. From the trailer, we can deduce that the group (or probably Rick) decided that staying at the prison was best; they’ve built a farm and even have little piglets.
The opening scene sees Daryl using all his experience. “Just give it another second,” he says knowingly, presumably drawing walkers to him so they can loot wherever they’re residing. But how long can this last? Eventually, and we can only assume this is The Governor’s work, the group’s safety is compromised by someone feeding walkers near the gates, and attacking cell blocks.
The hit AMC zombie series was one of the stand-out panels at this weekend's San Diego Comic-Con International
The Walking Dead will return to AMC on Sunday 13 October at 9 p.m. - the shows crew and cast revealed to a packed out Hall H at this weekend's San Diego Comic-Con International. The show's panel was one of the most popular throughout the whole weekend and with a host of treats lined up for fans, including the official release date of the much-anticipated four season, it also proved to be one of the most enjoyable panels of the weekend too.
The stars revealed more in San Diego than they did at the New York Comic Con
New showrunner Scott M. Gimple made his debut appearance with the rest of the Walking Dead crew on the panel, which included the comic book series creator Robert Kirkman, executive producers Gale Anne Hurd and Sarah Wayne Callies as well as stars Andrew Lincoln, Lennie James, David Morrissey, Norman Reedus and more. Whilst there, the panel discussed the divisive season three, the complexities of their characters and where the next season might be heading, but made sure not to give away too much information about the zombie drama's next steps.
For many, season three of The Walking Dead ended disappointingly. Early threats of ‘war is coming’ died down and with a damp squib, the run petered out with many of the conflicts and plot lines intact. Perfect for those who enjoy the moody exchanges between Rick and The Governor, but the season’s denouement did little for the show’s progression.
It wouldn’t be fair to judge season three entirely on its own merits, though – season four is looking like it’ll have a profound effect on peoples’ opinions on the last.
The Walking Dead is readying itself for series 3, which will hit screens later this month, and one thing is for sure is that there wont be any shortage of gore, guts and glory. So, for those who still can't wait any longer even though the airing date is looming ever closer, here's a few mini-spoilers of what can be expected for season 3.
First off the bat, will be the introduction of Michonne, who was first brought in to the show during the shocking finale of series 2. Michonne, played by Danai Gurira, will have her character dissected and background laid out for all to see, and whether she will prove to be an ally to Jack and the rest of the survivors from series 1 will have to be seen.
Also on offer to potentially hinder the advances of Jack, played by Andrew Lincoln, and his band of merry men and women will be the mysterious Governor David Morrissey.
Despite noticeable similarities between 'The Walking Dead' and '28 Days Later', series creator, Robert Kirkman, has gone about setting the record straight - neither are based on one-another.
AMC's post-apocalyptic zombie drama, 'The Walking Dead', made its television debut on 31st October, 2010, to tremendous praise. The series, staring Andrew Lincoln, is based on the graphic novel series of the same name by writer Robert Kirkman, who has been disputing claims that he based a lot of his series on the movie '28 Days Later' - yet he puts those rumours to bed, by explaining how 'The Walking Dead' came first.
'The Walking Dead''s 90-minute pilot episode features an incredibly similar opening to '28 Days Later', with both featuring the main character entering into a coma before the start of a zombie apocalypse, and waking after the world has all but ended. Kirkman, however, insists on playing-down the similarities, saying: "Yeah. It was a little annoying. But great minds think alike, right".
|
Direct correlation of electrochemical behaviors with anti-thrombogenicity of semiconducting titanium oxide films.
Biomaterials-associated thrombosis is dependent critically upon electrochemical response of fibrinogen on material surface. The relationship between the response and anti-thrombogenicity of biomaterials is not well-established. Titanium oxide appears to have good anti-thrombogenicity and little is known about its underlying essential chemistry. We correlate their anti-thrombogenicity directly to electrochemical behaviors in fibrinogen containing buffer solution. High degree of inherent n-type doping was noted to contribute the impedance preventing charge transfer from fibrinogen into film (namely its activation) and consequently reduced degree of anti-thrombogenicity. The impedance was the result of high donor carrier density as well as negative flat band potential.
|
Q:
sklearn tfidfvectorizer: how to intersect a tfidf frame on a column?
In R, I can extract rows (documents) which contain a particular term, say 'toyota' by intersecting a document term matrix (dtm) with required column name like so:
dtm <- DocumentTermMatrix(mycorpus, control = list(tokenize = TrigramTokenizer))
x.df<-as.matrix(dtm[1:ncorpus, intersect(colnames(dtm), "toyota"),drop=FALSE])
The problem is that I can't find an equivalent method in Python sklearn package. so I go about it in a roundabout way:
first i get index values of rows where the relevant column ("toyota") in the tfidf frame is not null;columns names are feature names.
then I slice the main pandas dataframe on identified row indices.
Now I have a dataframe where each row contains "toyota".
MVP here:
rows_to_keep=tfidf_df[tfidf_df.toyota.notnull()].index
data=my_df.loc[rows_to_keep,:]
print(data.shape)
This works. Problem is how do I pass an iterator to this statement?
car_make=['toyota','ford','nissan','gmotor','honda','suzuki']
Then for zentity in car_make:
rows_to_keep=tfidf_df[tfidf_df.zentity.notnull()].index
does not work.
AttributeError: 'SparseDataFrame' object has no attribute 'zentity'
I purposefully chose zentity to avoid equivalence with any column name in the tfidf.
Is there a clean way to make the intersection and extract only rows where column is not null (NaN)? Any help will be appreciated.
A:
Rather than
rows_to_keep=tfidf_df[tfidf_df.zentity.notnull()].index
You should use something like
rows_to_keep=tfidf_df[tfidf_df[zentity].notnull()].index
Using a variable like zentity, even if it stores a string, to attribute access the column of tfidf_df seems like it will always fail. I'm not sure why right now (I think it has to do with how the DataFrame treats column names when you create it, and how class object attribute access generally works), but I'll look it up.
|
If you want a friend in Washington, get a dog!
“If you want a friend in Washington, get a dog!”
This discerning commentary by President Harry Truman is one of many historical insights offered by FIRST PET, a retrospective of U.S. presidents and the more than 400 “first pets” that have taken up residence at the White House. Beyond man’s best friend, the menagerie of presidential pets includes: alligator, bear, blue macaw, coyote, horses, hyena, kangaroo rat, raccoons, sheep, snakes, wildcat, and many, many more.
Chuck Zoeller, Director of Creative Services at Associated Press, culled the vast AP photo library to present renowned, rare and never before seen color photographs of first pets and their presidential masters, as well as surprising fun facts. Did you know…?
Under President Calvin Coolidge and first lady Grace, a virtual zoo passed through the White House at various times, including numerous dogs, cats, two raccoons, a bobcat, a goose, a cow, and two lion cubs – a gift from the mayor of Johannesburg, South Africa.
At a 1964 photo op, President Lyndon Johnson raised the ire of some dog lovers when he lifted his beagle Her by the ears, as captured in a famous Associated Press photo.
Laddie Boy, President Warren G. Harding’s Airedale, had his own seat at Cabinet meetings.
And following is a list of Presidential pet “firsts”:
First Pet to gain national attention and celebrity status – Lara (President James Buchanan)
First Pet to be photographed – Fido (President Abraham Lincoln)
First Pet to be murdered – Fido (President Abraham Lincoln)
First Pet to become addicted to chewing tobacco – Old Ike (President Woodrow Wilson)
First Pet to become a YouTube sensation – Barney (President George W. Bush)
First Pet to author best-selling book – Millie (President George H.W. Bush)
This entry was posted
on Monday, May 10th, 2010 at 5:04 pm and is filed under Dog News.
You can follow any responses to this entry through the RSS 2.0 feed.
You can leave a response, or trackback from your own site.
|
Film, Verify, Share
Propaganda war clouds view of Syria conflict
Become an Observer
A Syrian activist is filmed asking a woman, who seems to be dying, who attacked her.
A year and nine months after the start of the Syrian uprising, reliable information from inside the country is harder than ever to come by. Propaganda techniques used by the government have been adopted by the opposition, making it increasingly difficult for journalists to report on the situation, whether from on the ground or working online.
The Syrian regime's manipulation
According to the Syrian government, there is no popular uprising in its country. In March 2011, when the first protests took place in Deraa in southern Syria, the government was already calling them the work of “troublemakers”.
The communications battle began right away. Protesters posted their amateur videos of demonstrations on social media networks, while state-controlled media outlets claimed these videos were filmed in Iraq or in Lebanon. This technique was in fact used by Syrian government officials themselves when they promoted their “fight against terrorism”. During a press conference held in November 2011, Syria’s foreign minister, Walid al-Mouallem, showed videos filmed in Lebanon as proof of “crimes committed by terrorist groups [in Syria]”.
It appears that President Bashar al-Assad’s supporters have taken things even further recently by circulating a video purporting to show an American journalist being kidnapped by a jihadist group with links to al Qaeda. However, numerous details in this video seem to indicate that it was staged.
Activists become less and less independent
While some members of the opposition also staged videos at the start of the uprising – for example, to lead people to believe that there were mass desertions in the Syrian army’s ranks – these incidents were quite rare in comparison to the number of videos coming out of the country. At that time most activists were independent, going out on their own to film protests and the violent repression by the authorities. Some of them even went so far as to help foreign journalists verify these videos by filming details that helped prove the date and location of the events.
Lockdown on social media networks
As the fighting worsened, however, the opposition’s communication strategy changed. This past summer, “military communications bureaus” were created to handle the opposition’s public relations. These bureaus oversee activists who are embedded with the Free Syrian Army and film the rebel fighters’ operations. Foreign journalists are no longer allowed to come into direct contact with these cameramen; they are only allowed to speak with the bureaus’ spokespeople.
Revolutionary committees, which are groups of lay activists present in many cities, now also have spokespeople. These days, most people in Syria who are still active on the Internet are part of these groups, writing up daily reports on what’s happening in their cities. They each have a Facebook page, a YouTube page, and a chatroom on Skype, where journalists are invited to ask their questions. The answers they receive are meticulously prepared and given in paragraph form; real conversations are hard to come by.
Houla hospital on December 11 after the death of several Alawite civilians, which rebels attributed to militas working for the government.
Video content has changed as well. At first, activists did not hesitate to feature in their own videos. They would speak directly to the camera and give their version of events. Some of them even questioned victims, some of whom appeared to be on the verge of death.
This video was filmed after several Alawite civilians, including women and children, were killed in Akrab, near Houla in western Syria. The activist explains that the victims were used as human shields by pro-government militias before being freed by rebels from the Free Syrian Army. He then talks to a survivor, whose voice is barely audible. At 25 seconds into the video he asks her last name, then asks: "Who killed you?" She answers: "Our own clan."
“When 10 people die, the opposition says 100 and the state media doesn’t talk about them at all”
This change in communications techniques has made the job of international organisations working on the Syrian conflict more difficult. One of these organisations is the Syrian Observatory for Human Rights, based in the United Kingdom, which provides foreign media with daily death tolls from the conflict. FRANCE 24 spoke with Rami Abderrahmane, the Observatory’s president:
When 10 people die, the opposition says 100, and the state media doesn’t talk about them at all. Revolutionary committees don’t realise that by exaggerating their figures they are giving themselves a reputation for being just as unreliable as the regime.
The Syrian Observatory for Human Rights existed well before the start of the conflict. We have over 200 activists in Syria, who have been working with us since 2006. These are reliable people who have been tested. When incidents happen in places where we don’t have any of our activists, we cross-check all the information that we gather before we publish our reports. As for the number of victims, we ask for names and, whenever possible, video proof. If we’re not able to verify information, we don’t publish it.
While it is impossible to know the exact number of victims, the Syrian Observatory for Human Rights estimates that in all, more than 43,000 people from both sides have died since the start of the conflict.
“On the ground, we’re completely dependant on rebels”
In light of these difficulties, it might seem like reporting from the ground in Syria would be the only way to obtain accurate, objective information. However, since the start of the conflict, the Syrian government has refused to let most foreign journalists into the country. This means that journalists have to rely on the Free Syrian Army to smuggle them in.
Because of the highly dangerous situation on the ground, we are completely dependant on the rebels to drive us around, to protect us and to help us meet people. It’s impossible to go anywhere without the authorisation and support of the Free Syrian Army. When we interviewed civilians, there was always a rebel fighter by our side. Their presence made some people trust us more, but we can’t work independently, which I made a point of explaining in the reports I filmed there. I would have liked to film people who were pro-Assad, too, but this was impossible. The government refused to grant us visas.
In this context, journalists must try to go around these highly organised communication networks to find independent sources in Syria.
|
Product Highlights
The Weighmaster Slim Pre-Inked Stamp is one of the best stamps to own. The Slim Pre-Inked Weighmaster Stamp is pre-inked and works in a Press and Print manner. Because of the sleek, compact design it can fit easily in a purse, pocket or briefcase. The Slim Pre-Inked Weighmaster Stamp will make about 10,000 stamp impressions and can be re-inked when it starts running low. Available ink colors are Red, Blue, Black, Green and Purple. All Weighmaster pre-inked stamps are made to your state specifications which can vary from 1-5/8” diameter to a 2” inch diameter impression area.
|
Tyrosine phosphorylation of caveolin 1 by oxidative stress is reversible and dependent on the c-src tyrosine kinase but not mitogen-activated protein kinase pathways in placental artery endothelial cells.
Acute H(2)O(2) exposure to placental artery endothelial cells induced an array of tyrosine-phosphorylated proteins, including caveolin 1 (CAV1) rapid and transient tyr(14) phosphorylated in a time- and concentration-dependent manner. Basal tyr(14) phosphorylated CAV1 was primarily located at the edges of cells and associated with actin filaments. Phosphorylated CAV1 was markedly increased and diffused with the disorganization of actin filaments at 20 min, disappeared at 120 min treatment with 0.2 mM H(2)O(2). Treatment with H(2)O(2) also disorganized actin filaments and changed cell shape in a time-dependent manner. Pretreatment with antioxidants catalase completely, whereas the other tested superoxide dismutase, N-acetyl-l-cysteine and sodium formate partially attenuated H(2)O(2)-induced CAV1 phosphorylation in a concentration-dependent manner. Acute treatment with H(2)O(2) activated multiple signaling pathways, including the mitogen-activated protein kinases (MAPK) members (MAPK3/1-ERK2/1, MAPK8/9-JNK1/2, and MAPK11-p38(mapk)) and the c-src tyrosine kinase (CSK). Pharmacological studies demonstrated that, among these pathways, only the blockade of CSK activation abolished H(2)O(2)-induced CAV1 phosphorylation. Additionally, H(2)O(2)-induced CAV1 phosphorylation was reversible rapidly (<10 min) upon H(2)O(2) withdrawal. Because maternal and fetal endothelia must make dynamic adaptations to oxidative stress resulting from enhanced pregnancy-specific oxygen metabolism favoring prooxidant production, which is emerging as one of the leading causes of the dysfunctional activated endothelium during pregnancy, these unique features of CAV1 phosphorylation on oxidative stress observed implicate an important role of CAV1 in placental endothelial cell biology during pregnancy.
|
var assign = Object.assign.bind(Object)
function g() {
return assign
}
Object.defineProperties(g(), {
implementation: { get: g },
shim: { value: g },
getPolyfill: { value: g },
})
module.exports = g()
|
This is archived information. It may contain outdated contact names, telephone numbers, Web links, or other information. For up-to-date information visit GSA.gov pages by topic or contact our Office of Public Affairs at [email protected]. For a list of public affairs officers by beat, visit the GSA Newsroom.
GSA Presents FY 2010 Budget Request to Senate
WASHINGTON – Reflecting its expanded role in the Obama Administration’s environmental, economic recovery and transparency reform efforts, the General Services Administration testified before a Senate appropriations subcommittee today for the first time in recent history. Acting GSA Administrator Paul Prouty detailed the $645 million fiscal 2010 budget request.
“The President has clearly identified his support of the unique role GSA plays in the recovery of our nation’s economy,” said Prouty before the Senate Appropriations Subcommittee on Financial Services and General Government. “The funds requested are essential to the agency’s plans to modernize and repair federal buildings, make energy-efficiency improvements, and advance transparency in government, a key administration priority.”
GSA’s request includes $375 million for the Federal Buildings Fund and $270 million for its operating appropriations. “Our budget request is an integral part of GSA’s commitment to fulfill its mission and its responsibilities effectively, with a 21st century focus that supports transparency, accountability, and acquiring the best value for taxpayers and our federal customers,” said Kathleen Turco, GSA Chief Financial Officer.
Though GSA makes an annual budget request, the majority of its funding actually comes through reimbursements from federal customers. These reimbursements may be for purchases of goods and services, and for rent paid for space in federally owned and leased buildings under GSA jurisdiction, custody or control.
###
GSA provides a centralized delivery system of products and services to the federal government, leveraging its enormous buying power to get the best value for taxpayers.
Founded in 1949, GSA manages more than 11 percent of the government’s total procurement dollars and $24 billion in federal assets, including 8,600 government-owned or leased buildings and 213,000 vehicles.
GSA helps preserve our past and define our future, as a steward of more than 480 historic properties, and as manager of USA.gov, the official portal to federal government information and services.
|
Walsall Council leader apologises over traveller comments Published duration 11 August 2018
image caption Mike Bird said travellers "run around on motorbikes shouting abuse"
A council leader has apologised for saying travellers are a "lawless society" who "run around on motorbikes shouting abuse".
Mike Bird, the leader of the controlling Conservative group at Walsall Metropolitan Borough Council, made the comments during a phone-in on BBC WM
A travellers charity previously said it was disgusted by Mr Bird's "hate".
Mr Bird said he did not intend to cause offence.
He told the BBC: "I would like to express my sincere regret and apologies to anyone who was offended by the use of this deeply unpleasant word in relation to any community.
"I respect every community and individual equally and that is something I firmly believe in.
"I deeply regret any offence caused, it was certainly not intended or meant."
image copyright Google image caption Mike Bird is leader at Walsall Metropolitan Borough Council
Mr Bird drew distinction between "their" and "our" culture and also accused travellers of thefts in the borough during a phone-in on Danny Kelly's mid-morning show on Thursday.
One caller labelled travellers "parasitic" during a long complaint to which Mr Bird responded: "The gentleman is absolutely 100% right."
Mr Bird had said: "The ones that I've come across, they are a lawless society, they have no respect whatsoever for our community."
A spokesperson for charity Friends, Families and Travellers, which "seeks to end racism and discrimination against Gypsies, travellers and Roma", said it was "disgusted" by Mr Bird's comments which were filled with "hate and based upon generalisations".
Phien O'Reachtagian, chairman of the Gypsy and Traveller Coalition, said previously: "His suggestion that communities are lawless is cause for concern from someone in his position.
"We'd be looking to make a formal complaint and liaise with police to see if a crime has been committed."
Related Topics Travellers
Walsall
|
error: macro expansion ignores token `;` and any following
--> $DIR/macro-context.rs:3:15
|
LL | () => ( i ; typeof );
| ^
...
LL | let a: m!();
| ---- caused by the macro expansion here
|
= note: the usage of `m!` is likely invalid in type context
error: macro expansion ignores token `typeof` and any following
--> $DIR/macro-context.rs:3:17
|
LL | () => ( i ; typeof );
| ^^^^^^
...
LL | let i = m!();
| ---- caused by the macro expansion here
|
= note: the usage of `m!` is likely invalid in expression context
error: macro expansion ignores token `;` and any following
--> $DIR/macro-context.rs:3:15
|
LL | () => ( i ; typeof );
| ^
...
LL | m!() => {}
| ---- caused by the macro expansion here
|
= note: the usage of `m!` is likely invalid in pattern context
error: expected expression, found reserved keyword `typeof`
--> $DIR/macro-context.rs:3:17
|
LL | () => ( i ; typeof );
| ^^^^^^ expected expression
...
LL | m!();
| ----- in this macro invocation
|
= note: this error originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info)
error[E0412]: cannot find type `i` in this scope
--> $DIR/macro-context.rs:3:13
|
LL | () => ( i ; typeof );
| ^ help: a builtin type with a similar name exists: `i8`
...
LL | let a: m!();
| ---- in this macro invocation
|
= note: this error originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info)
error[E0425]: cannot find value `i` in this scope
--> $DIR/macro-context.rs:3:13
|
LL | () => ( i ; typeof );
| ^ help: a local variable with a similar name exists: `a`
...
LL | let i = m!();
| ---- in this macro invocation
|
= note: this error originates in a macro (in Nightly builds, run with -Z macro-backtrace for more info)
error: aborting due to 6 previous errors
Some errors have detailed explanations: E0412, E0425.
For more information about an error, try `rustc --explain E0412`.
|
Q:
Duality in Electromagnetic Spectrum
Is visible light the only portion of the electromagnetic spectrum that exhibits particle/wave duality? If so, how/why do other frequencies (i.e. radio) behave as waves?
A:
Photons of any energy are subject are described by quantum mechanical laws. As a quick example off the top of my head, UV photons participate in the photoelectric effect, which is commonly used to illustrate the classical vs quantum view of light.
Radio waves are constructed of photons as well. This is difficult to directly or indirectly observe because of both their low energy. See this related question here on Physics.SE.
For more info, see this Wikipedia page.
|
Q:
Modal Grid not displaying properly, maybe because ::before and ::after
I am trying to do a simple modal in C# & ASP.NET MVC; I added 2 text boxes in a col-6 layout so they would be side by side I tried quiet a few different techniques and the only way I got it to work was if I did a table with a row and 2 cols in the row but they don’t came out the exact same size. So I'm trying to do the col-6 with bootstrap grid so they will be the same. In my Dev tools I see ::before and ::after maybe this has something to do with messing up the layout.
Here the 2 text boxes are in block layout 1 on top of each other
<div class="container-fluid mx-auto">
<div class="row d-inline">
<div class="col-6 d-inline">
<div class="form-group">
@Html.LabelFor(x => x.PartVM.PartNumber, htmlAttributes: new { @class = "control-label" })
<div class="">
@Html.TextBoxFor(x => x.PartVM.PartNumber, new { @class = "form-control", @readonly = "readonly" })
@Html.ValidationMessageFor(x => x.PartVM.PartNumber, "", new { @class = "text-danger" })
</div>
</div>
</div>
<div class="col-6 d-inline">
<div class="form-group">
@Html.LabelFor(x => x.PartVM.DateEntered, htmlAttributes: new { @class = "control-label" })
<div class="">
@Html.TextBoxFor(x => x.PartVM.DateEntered, new { @class = "form-control", @readonly = "readonly" })
@Html.ValidationMessageFor(x => x.PartVM.DateEntered, "", new { @class = "text-danger" })
</div>
</div>
</div>
</div>
</div>
How can I use the bootstrap grid so they come out the same size and on the same row?
A:
You should just be able to use col instead of col-6. Also, using the form-inline might help. There are a lot of things you can do to format your form how you want it using Bootstrap . Also, Bootstrap uses @media breakpoints, which changes the layout based on the screen size.
<form class="form-inline">
<div class="container-fluid mx-auto">
<div class="row d-inline">
<div class="col d-inline">
<div class="form-group">
@Html.LabelFor(x => x.PartVM.PartNumber, htmlAttributes: new { @class = "control-label" })
<div class="">
@Html.TextBoxFor(x => x.PartVM.PartNumber, new { @class = "form-control", @readonly = "readonly" })
@Html.ValidationMessageFor(x => x.PartVM.PartNumber, "", new { @class = "text-danger" })
</div>
</div>
</div>
<div class="col d-inline">
<div class="form-group">
@Html.LabelFor(x => x.PartVM.DateEntered, htmlAttributes: new { @class = "control-label" })
<div class="">
@Html.TextBoxFor(x => x.PartVM.DateEntered, new { @class = "form-control", @readonly = "readonly" })
@Html.ValidationMessageFor(x => x.PartVM.DateEntered, "", new { @class = "text-danger" })
</div>
</div>
</div>
</div>
</div>
</form>
|
{{!-- Layout --}}
{{!< default}}
{{!-- {{#contentFor "mapache_class_site_main"}}page-hero-wrap{{/contentFor}} --}}
{{!-- Page Header - partials/page/page-hero-header.hbs --}}
{{> "page/page-hero-header"}}
<div class="topic u-container extreme-container u-paddingTop30">
{{#get "tags" limit="18" include="count.posts" order="count.posts desc"}}
<div class="row">
{{#foreach tags}}
<div class="col col-s12 s6 l4 u-marginBottom30">
<article class="topic-card u-relative u-textColorWhite u-flexCenter u-flexColumn u-overflowHidden u-bgGray">
{{#if feature_image}}
<img class="topic-img u-absolute0 u-image u-block lazyload blur-up"
src="{{img_url feature_image size="l"}}"
srcset="{{img_url feature_image size="xxs"}}"
data-srcset="{{img_url feature_image size="s"}} 300w, {{img_url feature_image size="m"}} 600w, {{img_url feature_image size="l"}} 1000w"
data-sizes="(max-width: 1000px) 600px, 1000px"
alt="{{name}}"
/>
{{/if}}
<div class="topic-bg u-bgOpacity u-absolute0 zindex2"></div>
<div class="u-relative zindex2 u-textAlignCenter">
<h3 class="topic-title u-fontSizeLarger u-textUppercase u-fontWeightNormal u-md-fontSize22"><a href="{{url}}">{{name}}</a></h3>
<div class="u-fontSizeSmall u-block u-marginTop20">{{plural count.posts empty='post' singular='% post' plural='% posts'}}</div>
</div>
{{!-- Link --}}
<a href="{{url}}" aria-label="{{name}}" class="u-absolute0 zindex3"></a>
</article>
</div>
{{/foreach}}
</div>
{{/get}}
</div>
|
Q:
Does the equation $5{\sqrt{6x^2-19x-20}}+\frac{1}{4}{\sqrt{4(x^2+1)-17x}}=0$ have any real solutions?
For all value of $x$, ${\sqrt{6x^2-19x-20}}>0$ and ${\sqrt{4(x^2+1)-17x}}>0$. Does the equation $5{\sqrt{6x^2-19x-20}}+\frac{1}{4}{\sqrt{4(x^2+1)-17x}}=0$ have any real solutions? Any how to obtain the solutions?
A:
Notice that $6x^2-19x-20=(x-4)(6x+5)$ and $4(x^2+1)-17x=(x-4)(4x-1)$.
Hence $x=4$ is the only real solution.
|
//
// Generated by class-dump 3.5 (64 bit).
//
// class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2013 by Steve Nygard.
//
#import "WXPBGeneratedMessage.h"
@class NSString;
@interface KVItem : WXPBGeneratedMessage
{
}
+ (void)initialize;
// Remaining properties
@property(retain, nonatomic) NSString *key; // @dynamic key;
@property(retain, nonatomic) NSString *value; // @dynamic value;
@end
|
<!DOCTYPE html>
<html>
<head>
<title>Fonction BITET</title>
<meta charset="utf-8" />
<meta name="description" content="" />
<link type="text/css" rel="stylesheet" href="../editor.css" />
<script type="text/javascript" src="../callback.js"></script>
<script type="text/javascript" src="../search/js/page-search.js"></script>
</head>
<body>
<div class="mainpart">
<div class="search-field">
<input id="search" class="searchBar" placeholder="Recherche" type="text" onkeypress="doSearch(event)">
</div>
<h1>Fonction BITET</h1>
<p>La fonction <b>BITET</b> est l'une des fonctions d'ingénierie. Elle est utilisée pour renvoyer le ET bit-à-bit de deux nombres.</p>
<p>La syntaxe de la fonction <b>BITET</b> est :</p>
<p style="text-indent: 150px;"><b><em>BITET(number1, number2)</em></b></p>
<p><em>où</em></p>
<p style="text-indent: 50px;"><b><em>number1</em></b> est une valeur numérique sous forme décimale supérieure ou égale à 0,</p>
<p style="text-indent: 50px;"><b><em>number2</em></b> est une valeur numérique sous forme décimale supérieure ou égale à 0.</p>
<p>Les valeurs numériques peuvent être saisies à la main ou incluses dans les cellules auxquelles il est fait référence.</p>
<p>La valeur de chaque position de bit n'est comptée que si les bits des deux paramètres à cette position sont 1.</p>
<p>Pour appliquer la fonction <b>BITET</b>,</p>
<ol>
<li>sélectionnez la cellule où vous souhaitez afficher le résultat,</li>
<li>cliquez sur l'icône <b>Insérer une fonction</b> <img alt="Icône Insérer une fonction" src="../images/insertfunction.png" /> située sur la barre d'outils supérieure, <br />ou cliquez avec le bouton droit sur la cellule sélectionnée et sélectionnez l'option <b>Insérer une fonction</b> depuis le menu, <br />ou cliquez sur l'icône <img alt="Icône Fonction" src="../images/function.png" /> située sur la barre de formule,</li>
<li>sélectionnez le groupe de fonctions <b>Ingénierie</b> depuis la liste,</li>
<li>cliquez sur la fonction <b>BITET</b>,</li>
<li>insérez les arguments nécessaires en les séparant par des virgules,</li>
<li>appuyez sur la touche <b>Entrée</b>.</li>
</ol>
<p>Le résultat sera affiché dans la cellule sélectionnée.</p>
<p style="text-indent: 150px;"><img alt="Fonction BITET" src="../images/bitand.png" /></p>
</div>
</body>
</html>
|
// RUN: clang -fsyntax-only -Xclang -verify %s
int f0(void) {} // expected-warning {{control reaches end of non-void function}}
|
Modeling languages may be used as meta-languages to describe and execute underlying processes, such as business processes. For example, process modeling languages allow an enterprise to describe tasks of a process, and to automate performance of those tasks in a desired order to achieve a desired result. For instance, the enterprise may implement a number of business software applications, and process modeling may allow coordination of functionalities of these applications, including communications (e.g., messages) between the applications, to achieve a desired result. Further, such process modeling generally relies on language that is common to, and/or interoperable with, many types of software applications and/or development platforms. As a result, process modeling may be used to provide integration of business applications both within and across enterprise organizations.
Thus, such modeling languages allow a flow of activities or tasks to be graphically captured and executed, thereby enabling resources responsible for the activities to be coordinated efficiently and effectively. The flow of work in a process is captured through routing (e.g., control flow) constructs, which allow the tasks in the process to be arranged into the required execution order through sequencing, choices (e.g., decision points allowing alternative branches), parallelism (e.g., tasks running in different branches which execute concurrently), iteration (e.g., looping in branches) and synchronization (e.g., the coming together of different branches).
In the context of such processes, it may occur that an activity of a process may require (or may benefit from) multiple executions thereof. For example, an activity may be required to perform some repetitive or iterative task, such as checking availability for sale of a list of inventory items and/or requesting re-order of any unavailable inventory items. Existing techniques for handling such situations, additional examples of which are provided herein, include performing “for each” execution of the activity (e.g., performing multiple activations of the activity for each data item to be processed), or spawning/executing multiple instances of the activity to be executed substantially in parallel with one another (again, with each instance processing one or more of the data items to be processed).
Thus, it may occur that a plurality of data items may need to be processed (e.g., read and/or generated) by an activity of a process model (e.g., during execution of the activity). In practice, existing techniques for performing such processing may be inefficient, unsuitable, inflexible, or unfeasible for many scenarios. For example, activating the activity multiple times, once for each data item to be processed, may be inefficient. As another example, the activity may require (or benefit from) a high level of flexibility in the manner(s) in which the activity processes the data items, including, for example, processing some desired subset of the data items, or having the ability to forgo processing any of the data items, if the circumstances warrant. Consequently, existing solutions for processing multiple data items of a list may not be sufficient to achieve a desired result in a desired manner.
|
let Magix = require('magix');
let $ = require('$');
Magix.applyStyle('@../mx-calendar/index.less');
let parseTime = time => {
if (!time) {
let d = new Date();
time = d.getHours() + ':' + d.getMinutes() + ':' + d.getSeconds();
}
let ts = time.split(':');
if (ts.length != 3) {
throw new Error('bad time:' + time);
}
return {
'@{hour}': parseInt(ts[0], 10) || 0,
'@{minute}': parseInt(ts[1], 10) || 0,
'@{second}': parseInt(ts[2], 10) || 0
};
};
let parseType = type => {
if (!type) {
type = 'all';
}
let enables = {
'@{hour}': true,
'@{minute}': true,
'@{second}': true
};
let keysMap = {
hour: '@{hour}',
minute: '@{minute}',
second: '@{second}'
};
if (type != 'all') {
for (let p in keysMap) {
if (type.indexOf(p) === -1) {
delete enables[keysMap[p]];
}
}
}
return enables;
};
let format = t => {
if (t < 10) return '0' + t;
return t;
};
module.exports = Magix.View.extend({
tmpl: '@content.html',
init(extra) {
let that = this;
//初始化时保存一份当前数据的快照
that.updater.snapshot();
//该处是否可以由magix自动调用
that.assign(extra);
},
assign(extra) {
let that = this;
//赋值前先进行数据变化的检测,首次assign是在init方法中调用,后续的调用是magix自动调用,这个检测主要用于在首次调用后,magix自动调用前有没有进行数据的更新
let altered = that.updater.altered();
//你可以在这里对数据data进行加工,然后通过set方法放入到updater中
let time = parseTime(extra.time);
let types = parseType(extra.types);
that.updater.set({
format,
time,
types
});
//如果数据没变化,则设置新的数据后再次检测
if (!altered) {
altered = that.updater.altered();
}
//如果有变化,则再保存当前的快照,然后返回true告诉magix当前view需要更新
if (altered) {
that.updater.snapshot();
return true;
}
//如果数据没变化,则告诉magix当前view不用更新
return false;
},
render() {
this.updater.digest();
},
val(v) {
let updater = this.updater;
if (v) {
updater.digest({
time: parseTime(v)
});
}
let time = updater.get('time');
return format(time['@{hour}']) + ':' + format(time['@{minute}']) + ':' + format(time['@{second}']);
},
'@{change.time.by.type}' (type, increase) {
let me = this;
let time = me.updater.get('time');
let max = type == '@{hour}' ? 23 : 59;
if (increase) {
time[type]++;
} else {
time[type]--;
}
if (time[type] > max) {
time[type] = 0;
} else if (time[type] < 0) {
time[type] = max;
}
me.updater.digest({
time
});
},
'@{fire.event}' () {
let me = this;
let node = $('#' + me.id);
let time = me.updater.get('time');
node.trigger({
type: 'change',
time: format(time['@{hour}']) + ':' + format(time['@{minute}']) + ':' + format(time['@{second}'])
});
},
'@{change}<click>' (e) {
let me = this;
if (!me['@{fast.change.start}']) {
let params = e.params;
me['@{change.time.by.type}'](params.type, params.inc);
me['@{fire.event}']();
}
},
'@{set}<change>' (e) {
e.stopPropagation();
let type = e.params.type;
let max = type == '@{hour}' ? 23 : 59;
let target = e.eventTarget;
let value = target.value;
let v = parseInt(value, 10);
let time = this.updater.get('time');
if (v || v === 0) {
if (v < 0) v = 0;
else if (v > max) v = max;
if (v !== time[type]) {
time[type] = v;
this.updater.digest({
time
});
this['@{fire.event}']();
} else {
target.value = format(v);
}
} else {
target.value = format(time[type]);
}
},
'@{fast.start}<mousedown>' (e) {
let me = this;
let params = e.params;
me['@{long.tap.timer}'] = setTimeout(me.wrapAsync(() => {
me['@{interval.timer}'] = setInterval(me.wrapAsync(() => {
me['@{fast.change.start}'] = true;
me['@{change.time.by.type}'](params.type, params.inc);
}), 50);
}), 250);
},
'@{press.check}<keydown>' (e) {
if (e.keyCode == 38 || e.keyCode == 40) {
e.preventDefault();
let me = this;
me['@{change.time.by.type}'](e.params.type, e.keyCode == 38);
clearTimeout(me['@{event.dealy.timer}']);
me['@{event.dealy.timer}'] = setTimeout(me.wrapAsync(() => {
me['@{fire.event}']();
}), 100);
}
},
'$doc<mouseup>' () {
let me = this;
clearTimeout(me['@{long.tap.timer}']);
clearInterval(me['@{interval.timer}']);
setTimeout(me.wrapAsync(() => {
if (me['@{fast.change.start}']) {
me['@{fire.event}']();
}
delete me['@{fast.change.start}'];
}), 0);
}
});
|
Trace species detection in the near infrared using Fourier transform broadband cavity enhanced absorption spectroscopy: initial studies on potential breath analytes.
Cavity enhanced absorption measurements have been made of several species that absorb light between 1.5 and 1.7 µm using both a supercontinuum source and superluminescent light emitting diodes. A system based upon an optical enhancement cavity of relatively high finesse, consisting of mirrors of reflectivity ∼99.98%, and a Fourier transform spectrometer, is demonstrated. Spectra are recorded of isoprene, butadiene, acetone and methane, highlighting problems with spectral interference and unambiguous concentration determinations. Initial results are presented of acetone within a breath-like matrix indicating ppm precision at <∼10 ppm acetone levels. Instrument sensitivities are sufficiently enhanced to enable the detection of atmospheric levels of methane. Higher detection sensitivities are achieved using the supercontinuum source, with a minimum detectable absorption coefficient of ∼4 × 10(-9) cm(-1) reported within a 4 min acquisition time. Finally, two superluminescent light emitting diodes are coupled together to increase the wavelength coverage, and measurements are made simultaneously on acetylene, CO(2), and butadiene. The absorption cross-sections for acetone and isoprene have been measured with an instrumental resolution of 4 cm(-1) and are found to be 1.3 ± 0.1 × 10(-21) cm(2) at a wavelength of 1671.9 nm and 3.6 ± 0.2 × 10(-21) cm(2) at 1624.7 nm, respectively.
|
Q:
node.js express app jade templates not rendering
I'm trying to create a cluster server with socket.io and express.js I'm following various tutorials on the internet as well on youtube.
What I have at the moment is this code in my app.js:
var cluster = require('cluster');
if (cluster.isMaster) {
var cpuCount = require('os').cpus().length;
var workers = [];
for (var i = 0; i < cpuCount; i++) {
workers[i] = cluster.fork();
}
cluster.on('exit', function (worker){
for (var i = 0; i < workers.length; i++) {
if (worker.process.pid === workers[i].process.pid) {
workers.splice(i, 1);
}
}
for (var i = 0; i < cpuCount - workers.length; i++) {
workers.push(cluster.fork());
}
});
} else {
/**
* Module dependencies.
*/
var express = require('express');
var routes = require('./routes');
var http = require('http');
var path = require('path');
var app = express();
app.set('port', process.env.PORT || 3000);
app.set('views', __dirname + '/views');
app.set('view engine', 'jade');
app.use(express.favicon());
app.use(express.logger('dev'));
app.use(express.bodyParser());
app.use(express.methodOverride());
app.use(app.router);
app.use(express.static(path.join(__dirname, 'public')));
// development only
if ('development' == app.get('env')) {
app.use(express.errorHandler());
}
app.get('/', routes.index);
var server = http.createServer(app);
var io = require('socket.io').listen(app.get('port'));
}
When I go to http://localhost:3000/ I get the response:
Welcome to socket.io.
In my previous test scripts I didnt have this issue and my jade templates were being rendered fine. Could someone explain why is this happenning?
Furthermore in my routes directory I have the script: index.js with this code:
/*
* GET home page.
*/
exports.index = function(req, res){
res.render('index', { title: 'Express' });
};
Finally in my views folder I have layout.jade with:
doctype 5
html
head
title= title
link(rel='stylesheet', href='/stylesheets/style.css')
body
block content
and index.jade with:
extends layout
block content
h1= title
p Welcome to #{title}
A:
It seems that the problem was in the final lines of app.js
this fixes the issue:
var server = http.createServer(app);
var io = require('socket.io').listen(server);
server.listen(app.get('port'));
Sorry for any inconvenience.
|
Meet the Teacher: A Donor-Funded Gift to Kids
A philanthropic gift made to Riley Children’s Foundation is making an enormous impact on children. Thanks to the gift made by John and Marianne Hart, the Riley School Program was able to hire an additional teacher to serve outpatients. Today, we’re pleased to introduce you to Amy Boggess, the Riley School Program teacher (and former Riley patient) who has recently moved into this new donor-funded position.
Q: What are your thoughts about the donors who made your new position possible?A: I’m beyond grateful to the donors who made this position possible. It’s truly an act of grace and their kindness is reaching great lengths. Through their donation they are impacting a child’s future and are making an impact that will last a lifetime.
Q: What are the most rewarding parts of your work?A: It’s hard to narrow down one thing that makes my job rewarding, but I would say the most fulfilling parts of my job is to be able to provide relief to a patient/student and family and inform families about special education law; accommodations their child can receive, and rights they have as a student and parent. Being able to advocate for a child’s education is very purposeful for me and it allows me to bring something to the table that is normal to a child; I get to talk to them about school, classes, and their peers instead of procedures, diagnosis, tests, etc.
Q: During The Gift of Hope Happens Here holiday season campaign, thousands of community members and Riley staff members are stepping up to donate to Riley. What is your message to those who give in support of the hospital?A: Every single child/student/patient I’ve met, has truly impacted who I am today. They inspire me every day with the smile they keep on their face during a difficult or challenging time or obstacle they’ve been given. I just always think of them and what they’ve unknowingly done for me, so I encourage everyone to even just give a little because a little goes a long way and together we can truly make a difference for the children we see here at Riley. We often see the red wagon buckets out in the community at grocery stores and gas stations. This year, instead of passing it by or thinking someone else will contribute, throw in your spare change or a dollar because you are truly making a difference. You are giving to research to hopefully find more cures, you are giving to provide equipment so doctors can successfully do their jobs, you are giving to provide enough staff so we can efficiently provide great care for our patients, and most of all you are giving them hope.
Q: Tell us about your background—what drew you to teaching, and to Riley Hospital?A: I went to Ball State University and received my teaching license in Special Education- Deaf Education/Mild Disabilities. Through a couple college courses I found a love for sign language and special education, which then drew me to teaching. As I finished my teaching degree, I discovered as an educator I didn’t want to be teaching in the typical classroom environment, but I wasn’t sure what that meant for me. My path to Riley took place at one of my last pediatric cardiology appointments I had at Riley (25 years old I'm now 33) before moving to adult cardiology. Yes, I myself am a Riley patient, so working here at Riley isn’t just a job for me. I was diagnosed a few weeks after birth with a bicuspid valve defect and a narrowing in my aortic valve, my parents drove me down to Riley from Fort Wayne yearly to see a pediatric cardiologist. I was never inpatient, but always seen in the ROC cardiology clinic. During my appointment my cardiologist, Dr. Girod, mentioned he thought Riley had a school program, but wasn’t sure the details about the program, so of course I did some investigating. I ended up turning my resume to the supervisor of the program, but the Riley School Program didn’t have any open teaching positions at that time. Almost nine months later I got a phone call from the supervisor of the program saying they still had my resume on file and they wanted to know if I was still interested in a teaching position as one had just opened up. I came in to interview and I haven’t left since. I’ve been here for eight years and I can’t imagine ever teaching anywhere else!
Q: Can you explain your new role with outpatients, and some of the services you provide? Why was this new position needed?A: I’m really excited about my new role within some of our outpatient clinics because this is a huge need for our families and patients! School is such an important part of a child’s life, so when their life gets interrupted because of an illness, new diagnosis, or trauma, it’s important to make sure there is someone by their side advocating for their educational needs. As a teacher in an outpatient setting, I will be able to assist families with their child’s IEP or 504 Plan, set up homebound if the child will miss more than 20 days of school, educate schools on a child’s illness/diagnosis, assist with transitioning back into school, coordinate the Speedway Bear in the Chair program, and provide as much normalcy to allow a child to continue their education alongside their peers. This position is needed because our school program has evolved and grown over the years, which has heightened the awareness not only within the hospital but outside in the community, so we started receiving more school consults and referrals when patients were coming to appointments, including families and patients we had never even met before. We also tracked the number of families who we had met during an inpatient stay and were coming to outpatient clinic appointments with school issues, questions, or concerns. Our department never had funding for a full time outpatient teacher position, so all of the teachers were full time serving our inpatient populations while also trying to fulfill the needs that were arising outpatient. I know all of the teachers within our school program are grateful for the opportunity to continue to grow our school program because growing our program allows us to reach more patients and families! Being a teacher in a hospital setting is such a unique and important role, because our work goes beyond the walls of Riley Hospital for Children. I will only be able to be present in a couple outpatient clinics, so my hope someday is that we will have more outpatient teachers to provide this service to more of our patients and families.
Q: Can you share a moment when you could tell your work made a difference?A: I recently had the opportunity to help a student who was newly diagnosed with a brain tumor. The student underwent proton radiation for six weeks in Chicago and then started chemotherapy at Riley this fall. It was a goal for this student to try to go back to school before chemotherapy started. Before going back into school, I was able to go to this student's classroom to educate her third grade peers about the new diagnosis and what this school year would look for their friend. I provided a Bear delivery with the help of the Riley Children’s Foundation and Speedway as this student will most likely not be attending school regularly while undergoing treatment. This Bear sits in the student’s chair as a reminder to her peers that she is still a part of the classroom even though she might not be physically present at school. I was also able to set up homebound services for this student and provide medical information to the student’s school and teachers. I can't imagine as a parent to have to worry about a child’s health let alone figure out all the necessary details to make sure there is a school plan set in place, so I’m thankful for the opportunity to help this student and family.
Q: Any fun facts you’d like to share about yourself?A: I’ve been married to my husband for six years and have a sweet and fun loving 7-month-old baby boy. In my spare time I enjoy being outside, relaxing, and surrounding myself with my family and friends.
Riley Blogger
The Riley Blog is written and/or edited by members of the Riley Children's Foundation Communications Staff.
|
Sunshine's Friends
sunshine's Page
Sunshine's Blog
to project onto her.This insight is consistent with Time s description of her as a latter-day Mona Lisa Short Formal Wedding Dresses Without Trains , always smiling mysteriously but known for keeping mum.Certainly, there have been stumbles along the young woman s road to influence, from photos painting her as a party girl to the recent incident in France.But Bell…
ong darker green skirt.Nansi's had thin straps and Katie's was strapless.We took a chance ordering these dresses as we didn't get to see what they would look like before they arrived ivory tulle flower girl dresses , but they were beautiful and everybody commented on how beautiful the bridesmaids looked.About my wedding day: I…
hford owes us Holocaust survivors an apology.Nathan Leipciger purple evening dresses for women , Toronto.Bad gun laws not unique to CanadaRe: The Thomas De Quincey School Of Canadian Gun Control, Rex Murphy, Feb.I am saddened to read about the authorities’ abuse of power in relation to Ian Thomson, who was charged with unsafe…
present her work at the Congress of the Humanities and Social Sciences conference in Kitchener-Waterloo next week.She spoke with the Post’s Sarah Boesveld.RelatedBible’s love might not be as chaste as we thoughtQ: What do these more traditionalist Christians mean when they talk about preserving purity?A: What we’re seeing today is a fairly narrow interpretation of the idea of purity and that it’s applied only to sexuality and sex.Historically…
|
Cross-links in cell walls of Bacillus subtilis by rotational-echo double-resonance 15N NMR.
The cross-link index of peptidoglycan of intact cell walls of Bacillus subtilis grown in media containing L-[2-13C,15N]aspartic acid has been determined by rotational-echo double-resonance 15N NMR. A cross-link index of 72% decreased to 47% when the bacteria were exposed to the antibiotic cephalosporin C. The fraction of 15N label routed from aspartic acid in the media to glutamic acid in the peptidoglycan peptide stems more than doubled for the cephalosporin-exposed cells, indicating interference with general cell wall nitrogen metabolism by the antibiotic.
|
Act * Inspire * Achieve
Ireland’s Climate Ambassadors are volunteers from across the country communicating within their localities about Climate Change and also collaborating locally on related projects to make a real difference through Climate Action.
Host a Climate Conversation
Hosting a climate conversation with family, friends, colleagues and classmates can be a great way to bring up a topic that is often avoided. Come together with others for a chat and a cuppa (and cake!) to explore how we can take action collectively on climate change. We can help guide you through the facilitation of such a discussion. Connecting and showing support to each other is a great first step in taking climate action together. These discussions can help you identify what are the best suited actions for your local environment.
Give a Climate Presentation
Giving a presentation can be a daunting task, but fear not, we will guide you through the best practises and give you training to help your presentation connect with your audience. You will learn how to give an engaging presentation and how to inspire your audience to take Climate Action. Having a Q&A afterwards allows your audience to participate and voice their opinions – another great way of identifying what Climate Actions are best suited to your locality.
Communicate through the media
By communicating with the media you are reaching out to a wider audience to inform and engage with. By using your local voice, you can connect with local issues related to climate change, and from a local viewpoint on the national and global climate change issues. You can also use this opportunity to advertise climate actions you are planning and to recruit interested people into local climate action projects. The media to connect with would include local and national newspapers, newsletters, TV and Radio. Climate Ambassadors will be provided with support and templates on how best to communicate with the media.
Communicate through social media
There are a whole host of ways to use social media to communicate climate change issues, publicise climate actions you are planning and to also share events that have been carried out. This can be done through uploading written content, pictures and videos onto social media or writing a blog.
You can also develop video content as your climate action work progresses. You could create video content for a vlog and we can upload your material onto the Climate Ambassador social media channels in Facebook, Twitter and Instagram.
Check out these links for more info & ideas;
Meet Your Politicians
By communicating with your local representatives and sharing with them your concerns related to climate change, you’re letting the political leaders know that you want to see climate action carried out at all levels of Ireland. Requests such as: introduce a fair payment for solar electricity, to kick-start community ownership; divest taxpayers’ money from fossil fuels and increase investment in cycling, walking and clean public transport are some suggestions that organisations have recently made to TD’s and Senators. Your local councillors are also a great group who can effect real change locally. To find out who your local TD’s are, go to here: https://www.whoismytd.com/ To find your local councillors, go to: http://www.gov.ie/tag/local-authorities/
Host a film screening in your community
Watching an environmental movie or documentary can be a fun and engaging way to bring your community together to collectively learn about climate change. By holding a Q&A discussion afterwards it can help identify local issues and galvanise the community into taking climate actions. Venues such as libraries and communities halls will usually offer free use of their facilities. Invite people to bring and share snacks.
Good movie suggestions include: An Inconvenient Truth; Chasing Ice; Mission Blue (all available on Netflix); An Inconvenient Sequel; The Island President; Before The Flood
Check out these links for more info & ideas;
Carry out a local questionnaire
Questionnaires can be carried out to better understand what the current knowledge-base and opinions are of environmental issues are within your community, which can then inform future climate actions, depending on what the outcomes of the surveys are. This information may also prove helpful when looking for assistance from local government, as the data gathered can support justification of certain actions to be taken. Climate Ambassadors will be provided with support on questions for your survey.
|
Southern California Business Leaders Offer Advice to College’s Students
On Sunday two prominent Southern California business leaders visited Thomas Aquinas College to share their acumen, their stories, and their insights with the College’s students. In two simultaneous, 90-minute sessions, students had their choice of meeting with Jim Partridge, owner and president of Smith-Emery Co.[1], a construction engineering firm in Los Angeles; or Jerry Deitchle, chairman and CEO of BJ’s Restaurants, Inc.[2]
“It was a terrific experience for our students to get to speak with these accomplished businessman and to get a glimpse of some of the ways they may put their liberal education to use upon graduation,” says Mark Kretschmer, the College’s career counselor. “Mr. Partridge and Mr. Deitchle were very generous with their time and counsel, answering our students’ questions about the nature of their work and industries.”
An engineer by training, Mr. Partridge discussed the ways that the College’s students could employ their four years of mathematical and scientific training to pursue an engineering career. He also shared details about work his company is doing for the Bay Bridge, which connects San Francisco and Oakland, and invited them to tour the company’s laboratories.
Meanwhile, Mr. Deitchle, who additionally has held executive positions with Long John Silver’s and The Cheesecake Factory, spoke about how he rose through the ranks of the food-and-beverage industry. He further told the students about BJ’s management-training program, encouraging them to apply as they approach graduation.
“In the classroom, our students are blessed to develop the problem-solving and analytical skills that will serve them well in any line of work,” says Director of Development Robert Bagdazian, who arranged the visits. “But when it comes to starting a career, the wisdom of someone who has been there before is invaluable. We are honored and grateful that Mr. Deitchle and Mr. Partridge would share this wisdom with our students, who will no doubt benefit greatly from the experience.”
|
Wideawakesradio : Amazing Kitchen Photos Ideas
7 Inch Cake Pan Tags
Cute Baking Pan Sizes
By Conrad Fiedler. Dishes. Published at Wednesday, February 28th, 2018 22:50:35 PM.
Plants: Plant a few flowers (preferably with a bluish hue) by the windows. Hanging plants are also nice for quick kitchen improvements. Or you can purchase a dry floral arrangement that has bluish hues to use as a centerpiece in your kitchen.
Exquisite Cooking Knives
By Conrad Fiedler. Knives. Published at Tuesday, February 27th, 2018 01:58:27 AM.
“The MAC knife is one of my favorites,” Brownstein told us. “The weight/balance is perfect for me. It’s wide enough to keep your food together and it keeps a great edge.” Tate agrees that the MAC is good for smaller hands and for people who want to make thin cuts....
Amusing Chef Knife Set
By Conrad Fiedler. Knives. Published at Tuesday, February 27th, 2018 01:58:24 AM.
The Shun Classic Chef Knife was another testing room favorite. The packaging was so beautiful it caught our eye before we even took it out of the box: the Shun seems designed to elevate dinner prep to an artistic event....
Classy Knife Block
By Conrad Fiedler. Knives. Published at Tuesday, February 27th, 2018 01:24:22 AM.
If there’s a professional knife sharpener in your area, you can outsource the task. If not, MAC, Shun, and Wusthof all offer mail-in sharpening for a small fee. (Note that Victorinox and Global do not offer this service.) You can also learn to sharpen your knife yourself, but Wusthof notes:...
Dazzling Bread Knife
By Conrad Fiedler. Knives. Published at Tuesday, February 27th, 2018 01:58:30 AM.
A knife honing rod, or honing steel, is designed keep your knife functioning well between sharpenings. Honing straightens the edge of a knife, while sharpening literally grinds away part of the steel to produce a sharper edge....
Elegant Kitchen Knife Set
By Conrad Fiedler. Knives. Published at Tuesday, February 27th, 2018 01:24:50 AM.
The Wusthof Classic 8, a full-bolstered, European-style knife weighing in at 9.1 ounces, was favored by our large-handed testers: “The edge of the bolster has a nice gentle slope and sits wonderfully in my hand,” one participant noted. Testers praised the knife’s good blade control, even when chopping mint, and...
Interesting Boning Knife
By Conrad Fiedler. Knives. Published at Tuesday, February 27th, 2018 01:58:39 AM.
We considered one other budget knife during hands-on testing, the Zwilling J.A. Henckels Forged Razor Series 8″ Chef’s Knife, which retails for about $40. It looks more impressive than the Victorinox, with a smooth, contoured handle that testers loved. But we were less impressed once we hit the kitchen. One...
Stylish Steak Knives
By Conrad Fiedler. Knives. Published at Tuesday, February 27th, 2018 01:24:20 AM.
But in the process, we learned that no single feature makes a knife objectively better. Rather, they’re indicators of how the knife is designed to perform. Take the bolster (the band of metal separating handle from blade): A bolster can help you maintain a safe grip. It also allows you...
|
Q:
Text File processing - using java
Need a help. I have a big text file which has location data (represented numerically) and needs to be replaced with its corresponding location. These two files are separate text files.
Could you help with the java utility on how to replace the numeric values in one file using location values for the other.
Below is an example of the contents of file 1 and file 2. File 1 has numeric data and text. The numeric data in the first column needs to be replaced with the corresponding entry from file2. Thus, the file 1 needs to be looped for each entry in file 2.
Text File1: 19922973 @Uniquehope was good
Test File2: 19922973 Chicago, IL
Need to replace 19922973 with Chciago, IL.
Please provide your inputs.
Thanks
Saurabh
A:
You would have two loops. First read in the "big" text file and split each line into a HashMap entry with the number as the key and the remainder as the value, and the second loop would read the File1, split it into an array with two elements, look up the number in your HashMap, and replace the number with the value from the HashMap, and write out the results to a new file.
http://docs.oracle.com/javase/8/docs/api/java/lang/String.html#split-java.lang.String-int-
http://docs.oracle.com/javase/8/docs/api/java/util/HashMap.html
|
Members receive access to a range of exclusive benefits such as events at the UN and across the United States, as well as opportunities to advocate, host Model UN conferences, and connect young professionals to UN experts.
Last week, UNA-USA’s Leo Nevas Human Rights Task Force submitted recommendations to newly-appointed U.S. Secretary of State John Kerry regarding bold initiatives that the U.S. should pursue during its second term on the United Nations Human Rights Council. The Task Force developed the recommendations at a workshop on Feb. 11, where members discussed recent Council developments and opportunities for U.S. leadership on the organization.
Overall, The Task Force’s recommendations for the second U.S. term on the Council encompassed three broad categories: country-specific, thematic, and Council reform. They included a call for the Council to establish a Commission of Inquiry on rights violations in North Korea; a new special rapporteur on lesbian, gay, bisexual, and transgender (LGBT) rights; and for the prioritization of competitive regional slates where more countries run for the number of seats available for the 2013 Human Rights Council election.
At the core of each recommendation is a fundamental belief that U.S. leadership on the Council can not only ensure the advancement and protection of universal human rights, but also help ensure the body and its membership build upon the progress made since the U.S. joined the body three years ago. During this relatively short span of time, the Council was able to establish commissions of inquiry on Syria and Libya; pass the first resolution on Internet Freedom; and appoint special rapporteurs to track and report on rights violations in Iran, Belarus, and Eritrea. Nevertheless, it is important the Council and its members continue to address these and other pressing human rights situations and issues.
The Task Force also took notice of a special window of opportunity on the Council. This is because a few countries known habitually to complicate the work of the UN’s premier intergovernmental human rights organ—including China, Cuba, and Russian—recently lost their seats due to term limits. Moreover, the U.S. is beginning its second term fresh from a resounding victory within the UN General Assembly, which elects UN member states to the Council, where it won the most affirmative votes within its regional group. Both offer multiple and diverse opportunities for U.S. leadership on the Council.
The Human Rights Council is currently holding its 22nd session in Geneva, Switzerland, which is expected to conclude at the end of March.
|
78 N.W.2d 36 (1956)
STATE of Iowa, Appellee,
v.
W. L. HAESEMEYER, Appellant.
No. 48851.
Supreme Court of Iowa.
July 26, 1956.
Rehearing Denied September 21, 1956.
Donnelly, Lynch, Lynch & Dallas, Cedar Rapids, John L. Mowry, Marshalltown, and Carl Smedal, Ames, for appellant.
Dayton Countryman, Atty. Gen. of Iowa, Raphael R. R. Dvorak, Asst. Atty. Gen., Kent Emery, Asst. Atty. Gen., Charles King, Marshall County Atty., and J. D. Robertson, Special Prosecutor, Marshalltown, for appellee.
SMITH, Justice.
The indictment, returned October 8, 1954, and amended May 2, 1955, charged defendant, president of the Central State Bank of State Center, Iowa, with the statutory (code section 528.84) offense of exhibiting with intent to deceive on May 29, 1952, to Edward B. Wilkinson, a state bank examiner, two false chattel notes of Martin Schaper, viz.: One dated October 10, 1951, for $45,000, purporting to be secured upon "300 Head Choice Steer Calves"; the other, dated February 1, 1952, for $15,180 upon "93 head of choice Hereford heifers." The bank was payee in each and each described the security as located upon Schaper's farm near State Center.
By way of amendment or bill of particulars the falsity was alleged to be that the described "security did not exist and the defendant knew it was false at the time it was so exhibited."
There was a plea of not guilty and a verdict and judgment from which defendant appeals. It is conceded that when the respective notes were signed and until the last week of April, 1952, none of the security therein described was in Iowa, and that when exhibited to the examiner only part was at the designated location.
It also appears without question the notes, though signed by Schaper alone, were in fact obligations of a then unrevealed partnership ("Aurora Cattle Account") consisting of defendant and Schaper; and defendant contends it owned cattle at the respective dates of execution *37 which in each case would fit the description of security in the note and were to be brought to Iowa.
The 300 cattle in the larger note (exhibit B) are described as branded with a "bell" brand and as averaging "345#together with feed and care to fatten for market together with all increase and issue thereof and all additions thereto" and as given "to secure purchase price." Schaper testifies the description of security was not in the note when he signed and he never knew of its insertion until in June, 1952. That point is in factual dispute.
Defendant claims that when exhibit B was executed the partnership actually owned 305 head of that "bell" brand and description in the yards of a cattle company from which they had been purchased near Clovis, New Mexico, that they "were thereafter taken to Aurora, Nebraska, where they were kept until the last week in April, 1952, at which time they were removed" to Iowa, and on May 29, when the bank was being examined, 68 were on Schaper's farm and the rest in other Iowa pastures rented by the partnership.
The claim as to the 93 head of Hereford heifers in exhibit I is similar. It describes the cattle as "weighing 436 pounds average together with sufficient pasture, silage, hay, and corn to fatten for market." They were part of 203 head of that same description and among the 987 bought at Clovis. They were at Aurora, Nebraska, on February 1, 1952, when exhibit I was executed, and were also moved to Iowa the last week in April. It seems undisputed that on May 29, 1952, the partnership owned 300 head of "bell" brand and 93 head of Hereford heifers that fit the descriptions in the two notes.
The obvious illegality of the president becoming secret debtor of the bank for these and other amounts (see code sections 528.6 and 528.7) was only incidental to proof of the State's alleged theory of "falsity." Nor is reliance placed by the State on the misdescription of location of the cattle except as a part of the proof of the non-existence of real security.
The State contends these papers were false and unsecured when executed and were not originally intended to cover any particular animals; that the partnership never owned but two bunches, viz.: 308 head of Texas cattle branded "A B" purchased in Nebraska of Roe Black of Aurora (not involved in this case); and the 987 head bought from various ranches around Clovis, New Mexico, among them the 305 "bell" brand and the 203 Hereford heifers.
These 987 head were bought by Schaper while in New Mexico, probably the latter part of September, 1951. The down payment of $15,000 was paid by check drawn by him down there and honored by the Bank under arrangement with the defendant. The cattle were transferred by various shipments to Aurora, Nebraska, and eventually covered by separate notes and mortgages until refinanced by the $49,285 paper (exhibit C) hereinafter referred to. The 305 head of Choice Steer Calves, weighing 365 pounds each, branded with the "bell" brand * * *," according to Schaper's undisputed testimony were the only "bell" brand cattle the partnership ever owned and were covered by chattel note exhibit C, dated November 1, 1951, due in one year, payable to defendant's Bank in the amount of $49,285.
This exhibit C recites it was given "to secure the money advanced to purchase the within described cattle"; it also recites "free from encumbrance, and now in the undersigned's possession on F. E. Edgerton feed yards at Aurora, Nebraska (technical land description inserted) being the `Roe Black Ranch.'" Schaper testifies it was returned to him "in its present form * * * at the time the whole Aurora Cattle Account was refinanced in June, 1952."
This instrument also shows it was acknowledged before a notary public in defendant's bank and endorsed "without recourse" *38 to a Chicago bank. It was later returned to Schaper with his signature torn off and also a part of the filing stamp dated "November 5, C.E. Scov...." Schaper says it was so returned in June, 1952. There is later testimony tending to show the torn name on the filing mark was "C.R. Scoville County Clerk" in Nebraska, and that an identical copy was on file out there in that county.
Exhibit D, apparently covering the same cattle, is described as a "promissory note." It is for the same amount as exhibit C ($49,285) and is stamp-dated October 19, 1951, crossed through with pencil and Nov. 5 written in and the name of payee blank. Schaper's signature is torn off. The form of the instrument is the same as that of exhibit B. He says it was returned to him with exhibit C.
Much time and argument were spent at the trial on the admissibility of exhibits C and D and other somewhat similar instruments related to the cattle described in the $15,180 note also here involved.
The arguments made by attorneys for the State for their admission are difficult to summarize. They probably come to this: There was never any herd of "300" head of "bell" branded cattle, and none that were not otherwise mortgaged to cover their purchase price. The 305 head were so mortgaged for $49,285 by exhibits C and D, the mortgage was transferred "without recourse" and eventually paid.
As said in oral argument in the trial court: It is not a case of two liens on the same lot of cattle because there never was any cattle there at the place described in exhibit "B".
To all of which defendant's attorney in trial court argument responds: "In other words, that would go to show that Martin Schaper did in effect have 305 head of bell brand cattle out of which a mortgage lien could attach to 300 of them."
Without further quotation it remains to be said exhibits C and D, and somewhat similar instruments relating to cattle described in the other instrument (exhibit I), were admitted upon the professional statement of attorneys for the State that they would connect with other evidence tending to show there was in fact no security in existence for the two notes.
This controversy and other errors assigned in argument will be disposed of as we proceed without following the order adopted in the exhaustive briefs and arguments. Defendant assigns and argues eighteen alleged errors in ten divisions of his brief, involving nine "brief points" and a total of 233 printed pages.
While we have tried to set out and perhaps clarify the contentions on each side as to the real "falsity" charged we are conscious that in face of a motion by defendant to direct verdict and similar motions, we must look to the State's evidence alone to determine its sufficiency to sustain verdict.
I. Code section 528.84 so far as involved here, provides: "Any * * * officer * * * of any bank who shall knowingly * * * exhibit false papers with intent to deceive any person authorized to examine its condition * * * shall be punished * * *." The penalty runs as high as a fine of $10,000, and permits imprisonment in the penitentiary and complete disqualification for ever holding any office created by the chapter which is denominated "General Provisions Relating to Banks and Trust Companies".
We have held that an indictment under it which charges the making of a false statement (instead of exhibiting a false paper) must describe the alleged false statement and the person to whom made with such particularity as to individuate the offense charged and enable the defendant to know what is intended to be charged. State v. Henderson, 135 Iowa 499, 113 N. W. 328.
*39 In that case we said that "Aside from the ordinary rule which exacts a strict construction of criminal statutes, it is to be observed that the penalty imposed is extremely severe" and in effect that the State must be held to a strict construction for that additional reason. 135 Iowa 504, 113 N.W. 330.
The admonition is useful here because of the complicated situation necessarily shown to demonstrate the falsity of the papers involved; and also because of possible prejudice due to their practically conceded falsity in a particular not alleged. It is a criminal case and the procedural rules are not as elastic as in civil cases.
We can only uphold the verdict and judgment if there be substantial evidence to show the papers, exhibited to State Bank Examiner Wilkinson, were false in that the described security did not exist as such security when so exhibited. That is the "falsity" charged in the indictment, and the time stated in the statute. In the determination here there is involved also the possibility of a change in situation as to the existence of security between the dates of execution and the time the notes were shown to the examiner.
II. Much time has been spent in argument as to the meaning of the word "exist" in the amended indictment. We think the key word there is "security." The physical "cattle," under the evidence, existed both at times of execution and time of exhibition of the instruments. But were they available as security for these notes, exhibits B and I?
We construe the indictment as charging non-existence of the cattle as securitythe security, not the physical cattle, was alleged not to exist. The trial court perhaps made the meaning of the charge as clear as possible by instructing: "The word `exist' * * * would be an actual good faith existence as it related directly to the security described in said notes, as distinguished from a mere sham or make-believe security * * *." (Emphasis supplied.) Under that construction the State met its burden as of the dates of execution of the papers. It produced evidence of their original falsity in that regard sufficient to go to the jury.
But that situation may have changed and the State's burden was to produce evidence from which the jury could find it was the situation on May 29, the date the papers were shown to the bank examiner as assets of the Bank.
III. We are unable to find such evidence in the record sufficient to sustain the verdict. The State narrowed its charge of falsity within very narrow limitspossibly narrower than was necessary as now appears.
The value of the papers as assets at the time the Bank was being examined is not the issue. Their actual collectibility is not the issue unless as affected by the falsity, alleged in the indictment, as of May 29, 1952. There is no substantial evidence to sustain a verdict that they were "false" then.
We are mindful of the weight of the burden we are placing on the State. But this is not a civil suit nor one between the Bank and the maker of the notes or the Bank and a third person, in an effort to collect. It is a criminal action upon a penal statute designed to help safeguard the efficiency of bank examinations for the protection of the public. It must be tried as such, strictly upon the charge of the indictment.
IV. We have vainly examined cited cases and sought authority on our own initiative for light on the question whether intervening time and events may render true something that was originally false, or bring to life security that did not originally exist.
*40 The printed briefs have cited a wealth of cases on various other propositions. Defendant perhaps comes nearest in his contention that misdescription of the situs of physical security is not fatal to the right of recovery on an instrument. There is cited Aultman & Taylor Machinery Co. v. Kennedy, 114 Iowa 444, 87 N.W. 435 and other cases, to the proposition that a chattel mortgage describing the cattle as located in one place when they were really in another nevertheless created a valid lien between the Bank payee and the maker. This would be true because the situs is only incidental to the security and may change.
And here the location of the cattle was only incidental as part of the proof the papers were in fact unsecured when executed notwithstanding they named existing cattle (existing but not available) as security. Logically their condition in that respect could change. The State's burden was to show falsity of the papers on May 29, 1952. Reluctantly we conclude it has not met that burden.
V. Other alleged errors are argued at length but we need not discuss them in view of our conclusion already stated. The case was carefully and ably tried by the court under the difficulties inherent in the facts and those incident to the presence of able and aggressive counsel on each side.
We have probably said enough to avoid any suspicion of judicial sympathy with, or approval of the conduct of, defendant in the transactions involved. The ancient truth "No man can serve two masters" still prevails and defendant has not proved himself any exception to the rule.
The decision is reversed.
Reversed.
THOMPSON, C. J., and BLISS, HAYS, LARSON, OLIVER, WENNERSTRUM, GARFIELD and PETERSON, JJ., concur.
|
Introduction {#Sec1}
============
T cells play a central role in regulating immune responses. Following antigen stimulation, naive CD4^+^ T cells differentiate into distinct T helper (Th) subsets (e.g., Th1, Th2, Th9, and Th17 cells), with characteristic patterns of cytokine expression and specific functions. Unbalanced Th cell responses result in susceptibility to infectious, allergic, and autoimmune diseases, as well as cancer^[@CR1]--[@CR3]^. Moreover, after exposure to an infectious agent or stimulus, individual differences in Th cell responses can influence disease susceptibility and outcome. For example, after *Leishmania* infection, some individuals have a silent infection, whereas others develop non-healing chronic lesions depending on the relative potency of the Th1 versus Th2 response^[@CR4]^. The quantitative and/or qualitative variations in these responses in different individuals indicate that Th cell differentiation is under complex genetic control. Although the basic molecular mechanisms that initiate Th cell differentiation have been defined, genetic factors that modulate Th cell responses are incompletely understood. To further identify the factor(s) involved, we used haplotype-based computational genetic mapping (HBCGM)^[@CR5],[@CR6]^ to analyze Th1 differentiation data from multiple mouse strains. From this analysis, we identified a p53 family member, [T]{.ul}ransformation [r]{.ul}elated [p]{.ul}rotein 73 gene (*Trp73*)^[@CR7]^, as a regulator of Th1 differentiation.
p73 regulates many important cellular functions, including cell cycle progression, apoptosis, genome stability, and metabolism^[@CR8]--[@CR11]^. Abnormal p73 expression is often associated with the development of solid tumors and hematological malignancies, including lymphoma^[@CR12]--[@CR15]^. Although the role of p73 in cancer has been extensively studied, its role in immune modulation is less well studied. Interestingly, *Trp73*^−/−^ mice develop chronic inflammation, including rhinitis, otitis, periorbital edema, and conjunctivitis^[@CR16]^, consistent with dysregulated immune responses.
Here we identify p73 as a negative regulator of Th1 differentiation and interferon-γ (IFNγ) production. Moreover, in experimental allergic encephalitis, a mouse model of multiple sclerosis (MS), we find augmented IFNγ expression by cells from *Trp73*^−/−^ mice and show that these animals have decreased disease severity, whereas in a model of adoptive transfer inflammatory bowel disease, *Rag2*^−/−^ hosts receiving of p73-deficient naive CD4^+^ T cells as opposed to wild-type (WT) T cells have augmented Th1 responses as well as greater disease.
Results {#Sec2}
=======
Identification of p73 as a Th1-related gene {#Sec3}
-------------------------------------------
To identify novel genetic factor(s) that modulate T helper cell differentiation, we differentiated naive splenic CD4^+^ T cells from 16 inbred mice strains^[@CR17]^ into Th1 cells and assessed the extent of Th1 differentiation by measuring mRNA encoding the Th1 signature cytokine, IFNγ, at six time points. There was a substantial difference in the basal mRNA level of *Ifng* and the extent of Th1 differentiation among these 16 strains. For example, SM/J, 129S, and NZB splenocytes had relatively high *Ifng* mRNA expression compared to the other strains at most time points (Supplementary Fig. [1](#MOESM1){ref-type="media"}), with strong and significant inter-strain differences in *Ifng* mRNA expression (*P* values were \<1E−50, 1E−7, 9E−12, 2E−15, 1E−11, and 3E−6 at 0, 4, 16, 24, 48, and 72 h of Th1 differentiation, respectively), indicating that the observed variations resulted from genetic differences.
To identify the genetic basis for these differences, HBCGM^[@CR17],[@CR18]^ was used to compare the measured *Ifng* mRNA levels with the pattern of genetic variation across the 16 strains analyzed. This analysis identified a broad range of genes (Supplementary Data [1](#MOESM4){ref-type="media"}), including 32 transcription factors, 12 transcription cofactors, and 5 chromatin remodeling proteins with a correlated allelic pattern that could potentially affect *Ifng* mRNA expression (*P* \< 0.001; Table [1](#Tab1){ref-type="table"} and Supplementary Table [1](#MOESM1){ref-type="media"}), and these 49 genes included several that are known Th1-associated transcription factors (*Stat1*, *Stat4*, and *Irf4)* (Table [1](#Tab1){ref-type="table"}). Of the 49 genes, only 3 (*Rora*, *Stat1*, and *Trp73)* had allelic patterns that were significantly associated with *Ifng* expression at 3 different time points during Th1 differentiation (Supplementary Table [1](#MOESM1){ref-type="media"}). *Stat1* is well known to contribute to Th1 differentiation, and *Rora* was previously reported to contribute to Th17 differentiation^[@CR19]^. *Trp73* was not previously known to play a role in Th cell differentiation, but based on its important roles in the development and progression of cancer, we investigated whether this transcription factor also plays a role in Th1 differentiation. The *Trp73* allelic pattern (i.e., haplotype blocks) significantly correlated with *Ifng* expression at 0, 4, and 24 h during Th1 differentiation (Supplementary Table [1](#MOESM1){ref-type="media"}).Table 1Transcription factors, cofactors, and chromatin remodeling proteins with allelic patterns that are correlated with *Ifng* expression in Th1.Gene categoryGenes (*P* \< 0.001)Transcription factors (*n* = 32)*Dlx2*, *Ebf1*, *Esr1*, *Etv2*, *Foxd3*, *Foxj2*, *Foxm1*, *Foxo3*, *Glis3*, *Hif1a*, *Irf4*, *Junb*, *Mef2c*, *Myt1l*, *Npas2*, *Npas3*, *Nr3c2*, *Nr6a1*, *Olig3*, *Pbx1*, *Rora*^a^, *Runx2*, *Runx3*, *Satb2*, *Stat1*^a^, *Stat4*, *Tcf12*, *Tcf4*, *Trp73*^a^, *Uncx*, *Vdr*, *Zbtb17*Transcription cofactors (*n* = 12)*Csrp1*, *Dcc*, *Greb1*, *Ifi203*, *Lmcd1*, *Mybbp1a*, *Pdlim1*, *Rbbp9*, *Rbpms*, *Sap130*, *Spen*, *Yaf2*Chromatin remodeling proteins (*n* = 5)*Cbx7*, *Hdac1*, *Hdac9*, *Itgb3bp*, *Jmjd1c*Genes were identified by haplotype-based computational genetic mapping, with the pattern of genetic variation significantly correlated with *Ifng* mRNA in Th1 (*P* \< 0.001). Genes from category transcription factors, transcription cofactors and chromatin remodeling proteins are shown in this table. *P* values were calculated using analysis of variance (ANOVA)-based statistical modeling. Exact *P* values for each gene are listed in Supplementary Table [1](#MOESM1){ref-type="media"}.^a^Genes with allelic patterns that were correlated with *Ifng* expression at three time points.
p73 negatively affects Th1 differentiation {#Sec4}
------------------------------------------
p73 has a complex role in tumorigenesis, with two functionally distinct classes of isoforms in humans. TAp73 isoforms that contain the N-terminal transactivation (TA) domain function as tumor suppressors, whereas N-terminally truncated isoforms (DNp73) lack the TA domain and act as oncogenes that inhibit TAp73 and p53 in a dominant-negative fashion. The balance between TAp73 and DNp73 determines the overall effect of p73 on tumorigenesis^[@CR14],[@CR20]^. To assess the potential effect of p73 on Th1 differentiation, we used retroviral transduction to overexpress TAp73, DNp73, or p53 in mouse Th1 cells. Whereas p53 had no effect, cells transduced with either p73 isoform had significantly reduced IFNγ protein as assessed by intracellular staining (Fig. [1a](#Fig1){ref-type="fig"}), a lower percentage of IFNγ^+^ cells (Fig. [1b](#Fig1){ref-type="fig"}), and diminished *Ifng* mRNA expression (Fig. [1c](#Fig1){ref-type="fig"}). These results indicated that the p73 effect on IFNγ was independent of the presence or absence of its TA domain. We confirmed expression of both p73 and p53 by quantitative reverse transcription polymerase chain reaction (qRT-PCR; Fig. [1d](#Fig1){ref-type="fig"}) and of p73 protein by western blotting (Fig. [1e](#Fig1){ref-type="fig"}). DNp73 tended to be more highly expressed than TAp73 (Fig. [1e](#Fig1){ref-type="fig"}), but relatively similar levels of inhibition of *Ifng* mRNA and IFNγ protein expression were observed with both isoforms (Fig. [1a--c](#Fig1){ref-type="fig"}); thus TAp73 might be more potent, but it is also possible that even the lower level of the expressed protein was simply above the threshold required for efficient inhibition. The decrease in IFNγ was not due to either increased apoptosis (Supplementary Fig. [2a, b](#MOESM1){ref-type="media"}) or impaired proliferation (Supplementary Fig. [2c](#MOESM1){ref-type="media"}) of the transduced Th1 cells.Fig. 1p73 expression level negatively correlated with IFNγ expression during Th1 differentiation.**a**--**e** Empty vector, p53, TAp73, and DNp73 were overexpressed in Th1 cells via retroviral transduction. Transduced cells were identified by GFP^+^ and enriched by FACS sorting. IFNγ protein was assayed by flow cytometric staining (**a**, **b**) and mRNA expression of *Ifng* (**c**), *Trp73* (**d**, left panel), and *Trp53* (**d**, right panel) were assessed by qRT-PCR. All data shown in **a**--**d** are mean values of two biological replicates. **e** p73 protein and control actin levels were detected by western blotting. Lanes 1--2, 3--4, and 5--6 are duplicates for empty vector, TAp73, and DNp73, respectively. A full scan blot image is provided in Supplementary Fig. [9a](#MOESM1){ref-type="media"}. **f**--**i** Th1 cells were transduced with constructs containing different shRNAs against *Trp73* or non-targeting control, and the effects of shRNA knockdown on *Trp73* (**f**) and *Ifng* (**g**) mRNA levels were assessed by qRT-PCR. Intracellular IFNγ levels were measured by FACS staining (**h**) and secreted IFNγ levels were assessed by ELISA (**i**). **j** The empty vector, TAp73, and DNp73 were overexpressed in Th1 cells derived from WT or *Stat1*^−/−^ littermate mice (*n* = 3 animals per group). IFNγ expression levels were assayed by intracellular staining followed by flow cytometric analysis. The effects of p73 overexpression on IFNγ protein expression levels are shown as a bar graph of mean values ± SEM. **k** Similar experiments to those in **j** were performed in Th1 cells derived from WT or *Stat4*^−/−^ littermate mice (*n* = 3 animals per group). Experiments **a**--**d** were repeated *n* ≥ 20 times and all other experiments (**e**--**k**) were repeated *n* = 3 times, and representative results are shown. *P* values between specified groups were determined by a two-tailed unpaired Student's *t* test. \*\**P* \< 0.01; \*\*\**P* \< 0.001. Source data for **a**--**k** are provided in Source Data Files.
To further investigate the role of p73 in Th1 differentiation, endogenous p73 gene expression was determined by RNA sequencing (RNA-Seq). Although its expression level was relatively low, p73 was induced after 3 days of Th1 differentiation as compared to naive CD4^+^ T cells (Supplementary Fig. [2d](#MOESM1){ref-type="media"}). We next reduced p73 gene expression by retroviral transduction of short hairpin RNA (shRNA) into Th1 cells generated from C57BL/6 splenic T cells (Fig. [1f](#Fig1){ref-type="fig"}). This significantly increased *Ifng* mRNA levels (Fig. [1g](#Fig1){ref-type="fig"}), the percentage of IFNγ^+^ cells (Fig. [1h](#Fig1){ref-type="fig"}), and amount of secreted IFNγ protein (Fig. [1i](#Fig1){ref-type="fig"}) in Th1 cells. Collectively, these results indicate that p73 is a negative regulator of Th1 differentiation.
Signal transducer and activator of transcription factor 1 (STAT1) and STAT4 are key transcription factors that are required for normal Th1 differentiation^[@CR1],[@CR21]^ and were both identified as potential factors that affect *Ifng* mRNA expression in our computational genetics analysis (Table [1](#Tab1){ref-type="table"}). STAT1 was reported to physically associate with TAp73, and *Stat1* gene expression is downregulated in *p73*^−/−^ mouse embryonic fibroblasts^[@CR22]^. Therefore, we investigated whether p73 inhibition of Th1 differentiation is independent of STAT1 or STAT4. As expected, the extent of Th1 differentiation of the *Stat1*^−/−^ or *Stat4*^−/−^ cells was significantly lower than in cells from WT littermates (Fig. [1j, k](#Fig1){ref-type="fig"}); however, interestingly, overexpression of either p73 isoform in *Stat1*^−/−^ or *Stat4*^−/−^ T cells further reduced IFNγ^+^ T cells (Fig. [1j, k](#Fig1){ref-type="fig"}), indicating that neither STAT1 nor STAT4 by itself was essential for inhibition by p73.
p73 DNA-binding domain (DBD) is required for Th1 inhibition {#Sec5}
-----------------------------------------------------------
Because both TAp73 and DNp73 inhibited IFNγ expression (Fig. [1a, b](#Fig1){ref-type="fig"}), we inferred that the inhibitory effect of p73 on IFNγ production does not require its TA domain. Rather, it depends upon intrinsic properties that are shared by both isoforms, and we therefore investigated the role of DBD. The p73 DBD contains two zinc-binding sites, one of which is in α-helix H1 (Zn-A) and the other is in loop L3 (Zn-B)^[@CR23]^, and zinc binding is crucial for the DNA-binding ability of p73^[@CR24]^. We constructed p73 DBD mutants with either point mutations in both zinc-binding sites in TAp73 (TA-Zn) or internal deletion of the Zn-B region in DNp73 (DN-DelZnB), as well as a mutant containing only the DBD (Fig. [2a](#Fig2){ref-type="fig"}). When we transduced WT TAp73, DNp73, and each of these mutant constructs into Th1 cells and gated on the transduced cells, only the TAp73 and DNp73 parental constructs could inhibit IFNγ expression or Th1 differentiation (Fig. [2b](#Fig2){ref-type="fig"}), indicating that the DNA-binding activity of p73 is required for its inhibition of Th1 differentiation.Fig. 2DNA-binding activity of p73 is required for its inhibitory effect on Th1 differentiation.**a** Schematic of the domain structure of WT and mutant p73 proteins. The transactivation (TA) domain, DNA-binding domain (DBD), oligomerization domain (OD), and sterile α motif (SAM) are indicated. Mutations in two zinc-binding sites (Zn-A\* and Zn-B\*) are marked as indicated. **b** Empty vector or different p73 constructs were overexpressed in Th1 cells via retroviral transduction. IFNγ expression levels were determined by intracellular staining and flow cytometric analysis and expressed as the percentage of IFNγ^+^ cells from different p73 mutant-transduced cells (GFP^+^). Data represent mean ± S.D. from a total of *n* = 12 biological replicates over four independent experiments. *P* values of mutant p73 compared to empty vector were determined by two-tailed unpaired *t* test. \*\*\**P* \< 0.001. Source data for **b** are provided in a Source Data File.
Identifying p73 target genes in Th1 cells {#Sec6}
-----------------------------------------
To elucidate the mechanism underlying p73-mediated inhibition of IFNγ expression, we used RNA-Seq to compare the gene expression profiles of control (vector transduced) Th1 cells with Th1 cells overexpressing TAp73 or DNp73 (Supplementary Data [2](#MOESM5){ref-type="media"}). In cells in which TAp73 was overexpressed, 133 genes were upregulated and 56 genes were downregulated (\>2-fold; false discovery rate (FDR) \< 0.05) (Fig. [3a](#Fig3){ref-type="fig"}, Supplementary Data [3](#MOESM6){ref-type="media"}), whereas overexpression of DNp73 increased the expression of 46 genes and reduced the expression of 23 genes (Fig. [3a](#Fig3){ref-type="fig"}, Supplementary Data [4](#MOESM7){ref-type="media"}). Thus TAp73 overexpression seems to have a more potent effect. There were a total of 206 differentially expressed genes. Of these, 52 genes were regulated by both TAp73 and DNp73 overexpression (Fig. [3b](#Fig3){ref-type="fig"}), and the other genes were distinctively affected by TAp73 versus DNp73. Corresponding to our RT-PCR results (Fig. [1c](#Fig1){ref-type="fig"}), both TAp73 and DNp73 decreased the expression of *Ifng* by RNA-Seq (Fig. [3c](#Fig3){ref-type="fig"}, Supplementary Data [2](#MOESM5){ref-type="media"}). Analysis of other Th1-related genes revealed that p73 also inhibited *Il12rb1* and *Il12rb2* mRNA expression but had little effect on *Tbx21* mRNA expression; p73 also decreased *Il2ra* mRNA expression (Supplementary Data [2](#MOESM5){ref-type="media"}). qRT-PCR analysis confirmed that both TAp73 and DNp73 significantly reduced the expression of *Ifng*, *Il12rb1*, *Il12rb2*, and *Il2ra* but not *Tbx21* mRNA (Fig. [3d](#Fig3){ref-type="fig"}).Fig. 3Gene expression analysis of Th1 cells transduced with TAp73 or DNp73 constructs.**a**--**d** Empty vector (Vector), TAp73, or DNp73 were expressed in Th1 cells via retroviral transduction. Transduced cells were identified as GFP^+^ and enriched by cell sorting. mRNA was isolated from GFP^+^ cells and analyzed by RNA-Seq. **a** Number of differentially expressed genes (fold change ≥2 and FDR \< 0.05) in TAp73 versus vector and DNp73 versus vector. Upregulated genes are in red and downregulated genes are in blue. **b** Venn diagram showing genes differentially expressed by TAp73 or DNp73 versus vector control, with 52 genes in the intersection area, of which 37 were induced by both TAp73 and DNp73, 14 were repressed by both, and *Lmo2* was inhibited by TAp73 but induced by DNp73. **c** Genes induced and repressed (≥2-fold difference; FDR \< 0.05) in TAp73 or DNp73 transduced Th1 cells compared to vector alone. The Log~2~(RPKM + 1) values were plotted and shown as scatter plots. Differentially expressed genes (≥2-fold difference; FDR \< 0.05) are shown as open circles in red (higher expression) or blue (lower expression) with TAp73 (left panel) or DNp73 (right panel). **d** Experiments were performed as in **a**--**c**; shown are mRNA expression levels of *Trp73*, *Ifng*, *Il12rb1*, *Il12rb2*, *Tbx21*, and *Il2ra* normalized to *Rpl7* in cells transduced with TAp73 or DNp73. mRNA levels were measured by qRT-PCR from three independent experiments, and representative results are shown. Source data for **d** are provided in a Source Data File.
We next performed chromatin immunoprecipitation--sequencing (ChIP-Seq) analysis on Th1 cells to determine whether p73 could directly bind to the genes identified in the RNA-Seq analysis. Because the p73 antibodies we tested did not work for ChIP-Seq, we instead used an anti-FLAG monoclonal antibody (M2) and Th1 cells in which N-terminally FLAG-tagged TAp73 or DNp73 was transduced. We confirmed that FLAG-TAp73 and FLAG-DNp73 inhibited IFNγ expression, analogous to what we had observed with the native versions of these proteins (Supplementary Fig. [3a](#MOESM1){ref-type="media"}), and that both FLAG-TAp73 and FLAG-DNp73 constructs had relatively similar transduction efficiency and expression compared to that of the control vector (Supplementary Fig. [3b, c](#MOESM1){ref-type="media"}). We identified a total of 11,075 p73-binding sites using ChIP-Seq analysis, including 4022 TAp73- and 9765 DNp73-binding peaks (Fig. [4a](#Fig4){ref-type="fig"}, Supplementary Data [5](#MOESM8){ref-type="media"}). Nearly all (\>98%) of the top 500 TAp73- or DNp73-binding sites had a canonical p73 recognition motif (Fig. [4b](#Fig4){ref-type="fig"}). Thirty-three percent of the p73-binding sites were in intergenic regions, but 67% of the binding sites were in promoter, intron, or exon/untranslated gene body regions (Fig. [4c](#Fig4){ref-type="fig"}), and we assigned these gene body p73-binding peaks to the nearest transcription start site, thereby identifying 4171 p73 putative target genes. Fifty percent of the 206 differentially expressed genes identified in the RNA-Seq analysis were bound by p73 (Fig. [4d](#Fig4){ref-type="fig"}), suggesting that they may be direct p73 targets. These include *Mdm2*, a known p73 target gene, as well as *Ifng*, *Il12rb2*, and *Il2ra*, which we show can bind p73 (Fig. [4e](#Fig4){ref-type="fig"}) and whose expression was regulated by p73 (Fig. [3d](#Fig3){ref-type="fig"}). Although *Tbx21* gene expression was not significantly inhibited by p73 (Fig. [3d](#Fig3){ref-type="fig"}), we found a p73-binding peak 12 kb upstream from its gene body (Fig. [4e](#Fig4){ref-type="fig"}).Fig. 4Discovery of p73 direct target genes.**a**--**e** p73-specific binding sites were found via ChIP-Seq analysis from Th1 cells in which FLAG-tagged TAp73 or FLAG-tagged DNp73 was expressed. **a** Each column represents p73 binding in empty vector (EV), FLAG-tagged TAp73, or FLAG-tagged DNp73 within a 10-kb window \[−5k, 0, +5k\], centered on the p73-binding summits (indicated as position "0"). The intensity of p73-binding peaks is indicated by the intensity of cyan color, whereas "white" represents no binding. **b** The consensus motif for p73 was derived from the top 500 p73-binding summits using MEME. **c** Shown is genome-wide distribution of p73-binding sites at introns, intergenic regions (defined according to RefSeq), promoter regions (15 kb 5′ of the transcription start site), and exons/UTRs regions. **d** Venn diagram of genes differentially expressed upon p73 overexpression and/or directly bound by either TAp73 or DNp73. **e** The gene tracks represent TAp73- and DNp73-binding sites found by ChIP-Seq analysis using anti-FLAG at the *Mdm2*, *Ifng*, *Il12rb2*, *Il2ra*, and *Tbx21* loci. For each peak, the *P* value was calculated using a dynamic Poisson distribution to capture local biases in read background. Three independent ChIP-Seq experiments were performed; representative results are shown.
Although our p73 antibody did not work well for ChIP-Seq, we were able to use it in ChIP-PCR experiments to confirm endogenous p73 binding at these loci. p73 was indeed immunoprecipitated from WT Th1 cells (Fig. [5a](#Fig5){ref-type="fig"}), and p73 binding was significantly enriched at the *Mdm2*, *Ifng*, *Il12rb2* (peaks A and B), *Il2ra*, and *Tbx21* loci but not at a non-specific site (Fig. [5b](#Fig5){ref-type="fig"}). To determine whether p73 binding could affect the expression of these genes, we generated WT or p73-binding motif deletion reporter constructs (Fig. [5c](#Fig5){ref-type="fig"}; deleted regions are indicated). There are two p73-binding motifs (motifs a and b) near the *Ifng* gene (−22 kb region) (Fig. [5c](#Fig5){ref-type="fig"}), and deletion of either motif increased reporter activity (Fig. [5d](#Fig5){ref-type="fig"}). Similarly, deletion of the p73-binding motif at peak B in the *Il12rb2* locus or the motif at the *Il2ra* locus (Fig. [4e](#Fig4){ref-type="fig"}) also significantly increased reporter activity (Fig. [5d](#Fig5){ref-type="fig"}), suggesting a negative regulatory role for p73 on these genes. In contrast, little if any effect was seen when the p73 motif in the *Tbx21* reporter construct was deleted (Fig. [5d](#Fig5){ref-type="fig"}), consistent with our not having found a significant effect of p73 on expression of this gene (Fig. [3d](#Fig3){ref-type="fig"}). Analogous to the repression of *Ifng* expression by p73 in Th1 cells (Fig. [1c](#Fig1){ref-type="fig"}), expression of interleukin (IL)-12Rβ2 and IL-2Rα (CD25) were also significantly reduced when p73 was overexpressed (Fig. [5e](#Fig5){ref-type="fig"}) although the effect on the percentage of T-bet^+^ cells was relatively modest (Fig. [5e](#Fig5){ref-type="fig"}). Thus there are multiple potential p73 target genes that might affect Th1 differentiation.Fig. 5p73 binding regulates target gene expression.**a**, **b** p73 binding at the indicated loci in Th1 cells were assayed by ChIP using anti-p73 antibody versus IgG as a control. p73 protein was immunoprecipitated from Th1 cells and visualized by western blotting with anti-p73 (**a**). A full scan blot image is provided in Supplementary Fig. [9b](#MOESM1){ref-type="media"}. The binding was quantified by qPCR (primers to amplify the sites are in Supplementary Table [7](#MOESM1){ref-type="media"}; the nonspecific site is from the *Il9* gene). Shown is the percentage of total input (**b**). In **b**, the experiment was performed *n* = 3 times *n* = 2 replicates in each experiment, and representative results are shown. **c** Schematic of the domain structure of WT and p73-binding motif deletion reporter mutations in the *Ifng*, *Il12rb2*, *Il2ra*, and *Tbx21* loci. p73-binding regions from the indicated chromosomal locations were inserted upstream of minimal promoter (minP) and nano-luciferase gene (*Nluc*). WT reporter constructs retained the indicated p73-binding motifs, whereas the constructs with deletion mutants lacked the indicated nucleotide sequences. For *Ifng*, two deletion mutants were generated---one lacking the a motif and the other lacking the b motif. For *Il12rb2*, we tested a deletion mutant corresponding to the peak B motif. **d** The indicated reporter constructs containing WT or p73-binding motif deletion mutants were transfected into Th1 cells. Reporter activity was normalized against co-transfected control luciferase reporter construct activity and shown as relative activity. **e** The level of IL-12Rβ2, IL-2Rα (CD25), and T-bet in Th1 cells expressing control vector, TAp73, or DNp73 was measured by flow cytometric staining and shown as MFI. In **d**, **e**, experiments were repeated *n* = 3 times. In the experiment shown in **d**, the number of replicates was *n* = 4 for *Ifng*, *Il12rb2*-B, and *Il2ra* and *n* = 3 for *Tbx21*. In the experiment shown in **e**, the number of replicates was *n* = 3 for IL-12Rβ2 and T-bet and *n* = 6 for IL-2Rα. Representative results are shown. All data are shown as mean value ± SD and analyzed by a two-tailed unpaired *t* test. The *P* values are indicated (\*\**P* \< 0.01; \*\*\**P* \< 0.001; \*\*\*\**P* \< 0.0001). Source data for **a**, **b**, **d**, and **e** are provided in Source Data Files.
Trp73 gene deletion reduces disease severity in EAE mice {#Sec7}
--------------------------------------------------------
The above data demonstrated that p73 negatively regulates IFNγ production in vitro. To investigate the importance of this repressive effect in vivo, we used experimental autoimmune encephalomyelitis (EAE), a mouse model of MS in which disease severity is mainly driven by Th1 and Th17 cells^[@CR25]^. We used *Trp73*^−/−^ mice, which have previously been reported to have relatively normal T cell development^[@CR16],[@CR26],[@CR27]^, and indeed basic phenotypic profiling of *Trp73*^−/−^ mouse thymus and spleen revealed only a small increase in the percentage of double positive thymocytes, with similar overall T cell populations to WT mice (Supplementary Fig. [4](#MOESM1){ref-type="media"}). *Trp73*^−/−^ mice and WT or heterozygous (Het) littermates were immunized with MOG~35--55~ to induce EAE, and disease severity was monitored for 27 days. While there was no significant difference in the time required for disease onset, *Trp73*^−/−^ mice had significantly reduced disease severity (*P* \< 0.05) and better recovery than was observed in littermate controls (Fig. [6a](#Fig6){ref-type="fig"}). We next examined the immune cells present in spinal cord at the end of the experiment (day 27) and found that there tended to be fewer infiltrating lymphocytes in the *Trp73*^−/−^ mouse spinal cords (Fig. [6b](#Fig6){ref-type="fig"}) than in heterozygous *Trp73*^*+/−*^ or WT mice, but there was an increase in the percentage of CD4^+^ cells in the spinal cords of *Trp73*^−/−^ mice (Fig. [6c](#Fig6){ref-type="fig"}). In contrast, there was no significant difference in the cellularity of draining lymph nodes (dLNs; Supplementary Fig. [5a](#MOESM1){ref-type="media"}) nor in the percentages of CD4^+^ T cells (Supplementary Fig. [5b](#MOESM1){ref-type="media"}) or IFNγ, IL-17A, and FoxP3 producing CD4^+^ T cells in the dLNs (Supplementary Fig. [5c](#MOESM1){ref-type="media"}). In the spinal cord, however, after MOG~35--55~ stimulation, although not statistically significant, there was a possible trend toward an increase in the IL-17A^+^ and FoxP3^+^ CD4^+^ T cells infiltrating the spinal cord in *Trp73*^−/−^ mice, a nearly significant increase in the percentage of IFNγ-producing CD4^+^ cells, and increased CD25 expression (Fig. [6d](#Fig6){ref-type="fig"}), consistent with p73 negatively regulating *Il2ra* expression (Figs. [3e](#Fig3){ref-type="fig"} and [5e](#Fig5){ref-type="fig"}). There tended to be more IL-17A and granulocyte macrophages colony-stimulating factor and there was an increase in IL-6, tumor necrosis factor, and IFNγ in the supernatant of the infiltrating cells from *Trp73*^−/−^ mice (Fig. [6e](#Fig6){ref-type="fig"}). Thus, in the context of EAE, *Trp73*^−/−^ mice had a lower clinical score and higher IFNγ production by T cells infiltrating into the spinal cord.Fig. 6*Trp73* gene deletion reduces disease severity in EAE mice.**a** Clinical scores for groups of *Trp73*^−/−^ mice and wild-type/heterozygous (WT/Het) littermates after immunization with MOG~35--55~ are shown as mean values ± S.E.M. Data were analyzed by a two-tailed unpaired *t* test; *P* values are indicated (\**P* \< 0.05). **b**--**e** Total lymphocytes were isolated from the spinal cords from WT/Het (*n* = 4) or *Trp73*^−/−^ (*n* = 5) mice 27 days after EAE induction. **b** Total recovered cell numbers. **c** Infiltrating lymphocytes from the spinal cord were analyzed by flow cytometry and the percentage of CD4^+^ T cells is shown. **d**, **e** Total cells from the spinal cord were stimulated with MOG~35--55~ for 48 h, and then the percentage of IL-17A^+^CD4^+^, FoxP3^+^CD4^+^, and IFNγ^+^CD4^+^ cells and CD25 expression (MFI) were determined by flow cytometry and shown as indicated. **e** IL-17A, GM-CSF, IL-6, TNF, and IFNγ levels in culture supernatant after MOG~35--55~ stimulation were determined using a LEGENDplex Multi-Analyte assay. The results were normalized against total cell numbers. All data are presented as scatter dot plots with mean values indicated and analyzed by a two-tailed unpaired *t* test using mean ± SEM values; *P* values are indicated (ns *P* ≥ 0.05; \**P* \< 0.05). Data are from one representative of three experiments with *n* = 5 mice per group in each experiment. Source data for **a**--**e** are provided in a Source Data File.
Trp73 deletion enhances IFNγ response in a colitis model {#Sec8}
--------------------------------------------------------
To further investigate the role of *Trp73* in a different T cell-mediated disease model, we crossed *Trp73*^fl/fl^ mice to CD4^Cre^ mice to delete *Trp73* in CD4^+^ T cells (*Trp73* cKO). Like the complete *Trp73*^−/−^ mice, there was no significant effect on thymic or splenic lymphoid development in these animals (Supplementary Fig. [6](#MOESM1){ref-type="media"}). We therefore compared Th1 differentiation in WT versus *Trp73* cKO T cells. Upon in vitro differentiation in the presence of IL-12 and anti-IL-4, we confirmed that *Trp73* mRNA expression was indeed significantly lower in *Trp73* cKO than in WT CD4^+^ T cells (Fig. [7a](#Fig7){ref-type="fig"}), and while the percentage of IFNγ-positive cells measured by intracellular staining tended to be higher in *Trp73* cKO T cells but did not reach statistical significance (Fig. [7b](#Fig7){ref-type="fig"}), *Trp73* cKO T cells secreted significantly higher levels of IFNγ compared to WT cells (Fig. [7c](#Fig7){ref-type="fig"}). We therefore further analyzed the impact of *Trp73* deletion in vivo by assessing disease development in a T cell adoptive transfer model of experimental colitis that is characterized by intestinal inflammation driven by an unrestrained Th1/Th17 CD4^+^ T cell response to commensal microbial, and possibly self-antigens, resembling human Crohn's disease^[@CR28],[@CR29]^. In this model, transfer of naive CD4^+^CD45RB^hi^ T cells from WT mice into *Rag2*^−/−^ mice results in frank colitis development 8--10 weeks after transfer in our animal facilities. Transfer of CD4^+^CD45RB^hi^ T cells from *Trp73* cKO mice into *Rag2*^−/−^ mice resulted in accelerated colitis development compared to mice that received WT CD4^+^CD45RB^hi^ T cells from littermate controls. As early as 4 weeks after T cell transfer, mice transferred *Trp73*-KO T cells had more inflamed colons by histology (Fig. [7d](#Fig7){ref-type="fig"}). Although there was no significant change in total lamina propria mononuclear cell (LPMC) numbers at this early time point (Fig. [7e](#Fig7){ref-type="fig"}), a higher accumulation of total as well as pathogenic IFNγ-producing CD4^+^ T cells in the colon was evident (Fig. [7f](#Fig7){ref-type="fig"}). Moreover, although total IL-17A^+^ CD4^+^ T cells were not increased, there were increased IFNγ^+^IL-17A^+^ double-producing CD4^+^ T cells (Supplementary Fig. [7a](#MOESM1){ref-type="media"}). Furthermore, at week 7 post T cell transfer, while there was no significant difference in body weights, which is not unexpected at this still early time point in disease development (Supplementary Fig. [7b](#MOESM1){ref-type="media"}), *Rag2*^−/−^ mice receiving *Trp73* cKO T cells developed symptoms of colitis including diarrhea, as compared to mice receiving T cells from WT littermates, which displayed no symptoms of colitis. The *Rag2*^−/−^ mice receiving *Trp73* cKO T cells also had increased tissue inflammation reflected in higher histology scores (Fig. [7d](#Fig7){ref-type="fig"}), total numbers of LPMC (Fig. [7e](#Fig7){ref-type="fig"}), and IFNγ-producing CD4^+^ T cells (Fig. [7f](#Fig7){ref-type="fig"}). Together, these data demonstrate an accelerated disease course and increased colitis severity following adoptive transfer of *Trp73* cKO compared to WT CD4^+^CD45RB^hi^ T cells to *Rag2*^−/−^ recipients, and are consistent with the ability of *Trp73* to restrain pathogenic Th1 differentiation, particularly at an early stage in disease development.Fig. 7Augmented IFNγ production following in vitro differentiation and enhanced pathogenic IFNγ-producing T cell induction and disease mediated by *Trp73*-deficient T cells in an adoptive T cell transfer model of colitis.**a**--**c** Naive CD4^+^ cells from WT and *Trp73* conditional knockout (cKO) mice were differentiated into Th1 cells for 2 days. **a** mRNA expression of *Trp73* were assessed by qRT-PCR. Data are pooled results from two independent experiments with *n* = 9 mice per group in total. **b** Intracellular IFNγ levels were measured by flow cytometric staining; a representative FACS plot is shown on the left and summarized IFNγ expression data are shown on the right. **c** Secreted IFNγ levels (right panel) were measured by LEGENDplex^TM^ assay. Data for **b**, **c** are pooled results from three independent experiments with *n* = 13 mice per group in total. All data from **a**--**c** are presented as scatter dot plots with mean value indicated and *P* values were calculated using mean ± SEM by two-tailed unpaired Student's *t* test. **d**--**f** CD4^+^CD45RB^hi^ T cells from WT or *Trp73* cKO mice were adoptively transferred into *Rag2*^−/−^ recipients to induce colitis. Colonic histology scores at weeks 4 and 7 post-transfer are shown in **d**. Total colonic lamina propria mononuclear cell (LPMC) counts from the indicated time points are shown in **e**. **f** Infiltrating CD4^+^ T cells in the colon were measured by flow cytometry and the percentage and number of CD4^+^ T cells are shown. IFNγ-producing CD4^+^ T cells in the colon were determined by intracellular staining, and the percentage and number of IFNγ^+^ CD4^+^ T cells are indicated. Data for **d**--**f** are combined from two experiments with 9--10 mice per group in each experiment. In total, *n* = 7 mice per group were analyzed at week 4, and *n* = 13 (WT) and *n* = 12 (*Trp73* cKO) mice per group were analyzed at week 7. All data from **d**--**f** are presented as scatter dot plots with mean ± SD indicated and analyzed by two-tailed unpaired Student's *t* test with Welch's correction, and the *P* values are indicated (ns *P* ≥ 0.05; \**P* \< 0.05; \*\**P* \< 0.01). Source data for **a**--**f** are provided in Source Data Files.
Discussion {#Sec9}
==========
T helper cell differentiation is programmed by master regulators and is further fine-tuned by a complex gene network that is not yet fully understood. Using HBCGM analysis and cells from 16 strains of mice, we identified transcription factor p73 as a potential regulator of Th1 differentiation. Here we have provided multiple lines of evidence that p73 negatively regulates IFNγ production by Th1 cells. Interestingly, our data indicate that p73 expression is very low in naive CD4^+^ T cells and that its expression is upregulated in differentiated Th1. This expression pattern is consistent with the possibility that it acts as part of a negative feedback loop that regulates Th1 differentiation, which is consistent with the results obtained in the shRNA experiments.
Interestingly, it has been reported that p73 directly interacts with STAT1^[@CR22]^. Our results indicate that, although *Ifng* expression was lower in the absence of STAT1, p73 could still decrease *Ifng* expression, with similar findings in the absence of STAT4. In fact, we show direct binding of p73 to the *Ifng* gene and that mutation of this p73 site results in augmented activity of a reporter construct containing the site, with analogous results for *Il12rb2*, which also is important for Th1 differentiation. This suggests potential direct inhibitory effects of p73 on the expression of these genes. Interestingly, p73 also bound to the *Il2ra* gene (encoding the IL-2 receptor α chain) and its expression was also inhibited by p73. Because IL-2 can augment the expression of IL-12Rβ1 and IL-12Rβ2^[@CR30],[@CR31]^, the inhibition of IL-2Rα by p73 might inhibit IL-2-induced IL-12 receptor expression and thus Th1 differentiation^[@CR32]^, providing another mechanism for the effect of p73 on *Ifng* expression.
In EAE, we found that IFNγ expression was increased in the absence of p73, consistent with the ability of p73 to inhibit IFNγ expression. Interestingly, however, disease severity was reduced. While IFNγ plays a pathogenic role during the induction phase of EAE, accumulating evidence indicates that IFNγ production plays a protective role during the chronic phase of MS in humans and EAE in mice^[@CR33]^. The improved recovery of *Trp73*^−/−^ mice from EAE and their elevated production of IFNγ by spinal cord infiltrating cells are consistent with IFNγ playing a protective role during the chronic phase of this disease. However, in the T cell transfer model of inflammatory bowel disease, we found accelerated and more severe colitis in *Rag2*^−/−^ mice transferred CD4^+^CD45RB^hi^ naive T cells lacking *Trp*73 compared to cells from WT littermates, together with the early and sustained development of pathogenic Th1 T cells in the colon tissues, consistent with the ability of *Trp*73 to restrain IFNγ production and Th1 development in a T cell-intrinsic manner.
Our data thus define a novel function for p73 in immune regulation, which affects the IFNγ response and is relevant to autoimmune disease. While p73 has not yet been reported to have a role in a human inflammatory or autoimmune disease, there is a human single-nucleotide polymorphism (SNP) within a *TP73* intron (dbSNP: rs12027041) with modest association (*P* = 1.1E−5) to rheumatoid arthritis based on the HGVST10 GWAS database^[@CR34]^. Thus our identification of p73 as a negative regulator of Th1 differentiation based on higher IFNγ production may help to elucidate the mechanism(s) underlying inter-individual differences in immune responses that contribute to disease susceptibility. Moreover, because abnormal p73 expression is highly correlated with tumor grade and clinical outcome, especially in hematological malignancies^[@CR15]^, it is possible that altered p73 expression might affect tumor development and progression based on its modulation of IFNγ production. Furthermore, the discovery of a role for p73 in Th cells suggests possible crosstalk between inflammatory responses and tumorigenesis, with possible therapeutic ramifications.
Methods {#Sec10}
=======
Mouse strains {#Sec11}
-------------
Different inbred strains of mice (C57BL/6J, 129S1/SvImJ, A/J, AKR/J, C3H/HeJ, DBA/2J, NOD/LtJ, BALB/cJ, CBA/J, LP/J, SJL/J, MRL/MpJ, NZB/BlnJ, NZW/LacJ, SM/J, FVB/NJ), *Stat1*^*−/+*^ (*Stat1*^tm1Dlv^), and *Stat4*^*−/+*^ (*Stat4*^*em3Adiuj*^) mice were purchased from the Jackson Laboratory. The stock numbers for these mouse strains are provided in Supplementary Table [2](#MOESM1){ref-type="media"}. *Trp73*^−/−^ (*Trp73*^*tm1a(KOMP)Wtsi*^) embryonic stem (ES) cells were purchased from the knockout consortium. The details of knockout strategy can be found at KOMP repository website (<http://www.Komp.org>) with the project ID: CSD89710. *Trp73*^−/−^ mice were then generated from ES cells in the NHLBI transgenic core facility. *Trp73*^f/f^ floxed mice (exon 5 was flanked with *loxP* sites) were generated by Flp recombination from *Trp73*^−/−^ mice. Then *Trp73* conditional knockout mice (*Trp73* cKO) were generated by crossing *Trp73*^f/f^ mice with CD4-*Cre* mice. All *Trp73*^−/−^ and *Trp73* cKO were further backcrossed at least four generations to the C57BL/6 background. All mice were co-housed in a specific pathogen-free animal facility and euthanized by carbon dioxide inhalation. Animal protocols were approved by the NHLBI Animal Care and Use Committee and followed the NIH Guidelines "Using Animals in Intramural Research".
Haplotype-based computational genetic mapping {#Sec12}
---------------------------------------------
Genetic factors were identified using the HBCGM methods^[@CR17],[@CR35],^. In brief, HBCGM utilizes bi-allelic SNPs that are polymorphic among the analyzed strains. These SNPs usually display a limited degree of variation locally among the strains. Haplotype blocks were constructed, and the pattern of genetic variation within each block was correlated with the distribution of trait values among the strains analyzed by using analysis of variance (ANOVA)-based statistical modeling^[@CR18],[@CR35]^. *P* values from the ANOVA model and the corresponding genetic effect size were calculated for each block. The blocks were then ranked by their *P* values, and those below an input threshold were used as candidate predictions.
Mouse *Trp73* constructs {#Sec13}
------------------------
A cDNA clone corresponding to mouse DNp73 (accession number: [BC066045.1](https://www.ncbi.nlm.nih.gov/nuccore/BC066045.1)) was purchased from Mammalian Gene Collection. The cDNA fragment corresponding to the coding region of mouse TAp73 (accession number: [NM_011642](https://www.ncbi.nlm.nih.gov/nuccore/NM_011642)) was synthesized by Eurofins Genomics and cloned into pBluescriptSKII by restriction enzyme cutting. The cDNA encoding mouse p53 (accession number: [NM_011640](https://www.ncbi.nlm.nih.gov/nuccore/NM_011640)) was obtained by PCR from a cDNA pool of CD4^+^ T cells from C57BL/6J mice and then cloned into pBluescriptSKII. All cDNA constructs were verified by sequencing and then subcloned into retroviral expression vector pRV-GFP, which contains an IRES element 5' of the green fluorescent protein (GFP) gene. All p73 mutants were generated by PCR and verified by sequencing.
Th1 polarization {#Sec14}
----------------
Naive CD4^+^ T cells were purified from the spleens of 7--8-week-old female mice using a CD4^+^CD62^+^ T cell Isolation Kit II (Miltenyi). Mouse naive CD4^+^ T cells were cultured at 10^6^/ml in RPMI 1640 medium containing 10 mM Hepes, 10% fetal bovine serum, 2 mM L-glutamine, and antibiotics, including 50 μM 2-ME, and polarized under Th1 conditions for 3 days with plate-bound anti-CD3 (2 µg/ml), soluble anti-CD28 (1 µg/ml, PharMingen), 10 ng/ml mouse IL-12 (PeproTech), and 10 μg/ml of anti-mIL-4 antibody^[@CR36]^.
Quantitative RT-PCR {#Sec15}
-------------------
RT-PCR was performed by standard methods according to the manufacturer's instructions. Primers and probes were from ABI. Data were collected and quantified using the CFX Manager v3.1 (BioRad) software. Expression levels were normalized to *Rpl7*^[@CR36]^.
Cell staining and flow cytometric analyses {#Sec16}
------------------------------------------
Cells were stained with surface marker antibodies in fluorescence-activated cell sorting (FACS) buffer (phosphate-buffered saline (PBS) + 0.5% bovine serum albumin (BSA)), PerCP/Cy5.5 anti-CD25 (Biolegend, Clone PC61) or phycoerythrin anti-IL12Rb2 (Miltenyi Biotec, Clone REA200). For intracellular staining, cells were fixed and permeabilized by Cytofix/Cytoperm Buffer (BD Biosciences) after they were re-stimulated with 100 nM of phorbol myristate acetate (PMA), 500 ng/ml of ionomycin, and BD GolgiPlug (BD Bioscience) for 4 h. Cells were then stained with isotype control antibodies or allophycocyanin anti-IFNγ (Biolegend, CloneXMG1.2) or BV421 anti-T-bet (Biolegend, Clone 4B10). Stained cells were analyzed on a LSRFortessa^TM^ flow cytometer (Becton Dickinson) using BD FACS Diva v8.0.1 for data collection and FlowJo software v10 (Tree Star, Inc.) for analysis.
Retroviral transduction experiments {#Sec17}
-----------------------------------
cDNAs corresponding to different *Trp73* isoforms and truncated mutants were cloned into pRV, a GFP-expressing retroviral vector, and transfected with the pCl-Eco packaging plasmid into 293T cells. Retroviral supernatant was mixed with 8 μg/ml polybrene and virus was introduced by centrifugation at 3500 rpm for 45 min at 30 °C into mouse CD4^+^CD62L^+^ T cells, which had been pre-activated under Th1 differentiation conditions. The supernatant was replaced with new medium, and cells were cultured as indicated for 3 days and then harvested for intracellular cytokine staining or transduced cells (GFP^+^) were sorted by FACS and harvested for RNA preparation.
Retroviral *Trp73*-shRNA knockdown {#Sec18}
----------------------------------
shRNAs to *Trp73* in a retroviral vector pSIREN-RetroQ-ZsGreen1 were purchased from Clontech Laboratories and transfected into 293T cells with packing plasmid (pCl-Eco). Retrovirus in the supernatant was introduced into mouse CD4^+^CD62L^+^ T cells that had been pre-activated under Th1 differentiation conditions by spin infection. Supernatant was replaced with new medium; cells were cultured under Th1 conditions for 3 days and then assayed with intracellular cytokine staining; or transduced cells (GFP^+^) were sorted out by FACS and harvested for RNA preparation.
Western blotting {#Sec19}
----------------
Whole-cell lysates were prepared with RIPA buffer, then Protein Sample Loading Buffer (Li-COR Biosciences) was added. Samples were heated for 5 min at 95 °C, loaded onto NuPAGE Bis-Tris Gels for sodium dodecyl sulfate-polyacrylamide gel electrophoresis (ThermoFisher), and then transferred onto Immobilon-FL PVDF Membranes (Millipore Sigma). Membranes were blocked in PBS containing 5% BSA and then incubated with primary antibody and fluorescent-conjugated secondary antibodies. The image data were acquired with an Odyssey CLx system (LI-COR) and processed with the ImageStudio Lite (LI-COR) software.
RNA-Seq analysis {#Sec20}
----------------
*Trp73*-overexpressed Th1 cells were isolated by FACS sorting as GFP^+^ cells 3 days after retroviral transduction, and total RNA was then extracted. RNA-Seq libraries were prepared from mRNA (isolated from 2 μg total RNA) using the KAPA Kit (Kapa Biosystems, Wilmington, MA) per the manufacturer's protocol. PCR products were "barcoded" (indexed) and sequenced on an Illumina Hi-Seq 2000. To analyze RNA-Seq data, sequenced reads (50 bp, single end) were mapped to the mouse genome (mm10, December 2011 Assembly) using Tophat v2.2.1, and the gene expression was calculated using RSEM v1.2 with the following parameters (--forward-prob 0--bowtie-n 1--bowtie-m 100--seed-length 28)^[@CR36],[@CR37]^. The differentially expressed genes were identified using edgeR^[@CR38]^ and visualized using R packages (gglot2 v3.2.1 and pheatmap v1.0.12). The negative binomial distribution was used to calculate the exact *P* values for differential expression, and FDR was calculated using the Benjamini--Hochberg correction.
ChIP-Seq and ChIP analysis {#Sec21}
--------------------------
Th1 cells transduced with either the vector control or *Trp73* were cross-linked with 1% formaldehyde (methanol-free, Pierce, Rockford, IL) at room temperature for 10 min. They were then subjected to sonication and fragmented chromatin equivalent to 10 million cells was immunoprecipitated using 5 μg of normal mouse IgG as a control or anti-FLAG (M2) antibody (Sigma) and Magna ChIP^TM^ Protein A+G Magnetic Beads (Millipore, Billerica MA). ChIP-Seq DNA libraries were generated using the KAPA LTP Library Preparation Kit (Kapa Biosystems, Wilmington, MA) and indexed using primers (BIOO Scientific, Austin, TX). Libraries were then sequenced using an Illumina HiSeq 3000 platform. All sequenced reads (50 bp, single end) were mapped to the mouse genome (mm10, December 2011 Assembly) using bowtie v.1.0.1 using parameter (-m 1)^[@CR39]^. The peaks were identified using MACS v1.4^[@CR40]^. For each peak, the *P* value was calculated using a dynamic Poisson distribution to capture local biases in read background levels, and FDR values were calculated using the Benjamini--Hochberg correction. The mapped reads were converted to the tiled data file format using igvtools (--z 5 --w 5 --e 100 --minMapQuality 30) and displayed as custom tracks on the IGV genome browser^[@CR41]^. The peaks were annotated using the HOMER software^[@CR42]^. All ChIP-Seq and RNA-Seq samples were sequenced in the NHLBI Sequencing core. ChIP-qPCR from WT Th1 cells using anti-p73 antibody (EP436Y, Abcam) was performed in a similar way as described above and analyzed by qPCR using the primers listed (Supplementary Table [3](#MOESM1){ref-type="media"}).
p73-binding site reporter assay {#Sec22}
-------------------------------
PCR-generated p73-binding region (\~1 kb) fragments were cloned into pNL3.1 (Promega) 5' of the Nanoluc luciferase gene to generate reporter constructs (Fig. [5c](#Fig5){ref-type="fig"}). Both WT constructs or deletion mutants lacking the p73 motifs indicated in Fig. [5c](#Fig5){ref-type="fig"} were generated. For each reporter construct, 0.8 μg of the reporter plasmid was mixed with 0.2 μg of control reporter pGL4.54 (Promega) plasmid and then co-transfected into 2 × 10^6^ mouse CD4^+^ T cells that had been cultured under Th1 conditions for 2 days by using the P3 Primary Cell 4D-Nucleofector X Kit (Lonza, V4XP-3032) according to the Amaxa 4D-Nucleofector protocol for mouse T cells (Lonza). Post-transfection, cells were cultured overnight under Th1 conditions and analyzed for Nanoluc luciferase activity using Nano-Glo® Dual-luciferase® reporter assay system (Promega) according to the manufacturer's instructions.
EAE induction with MOG~35--55~ {#Sec23}
------------------------------
Ten-to-12-week-old female and male *Trp73*^−/−^ mice and WT/Het littermates were immunized subcutaneously with MOG~35--55~ peptide in emulsion with complete Freund's adjuvant (Hooke Laboratories), and injected intraperitoneally (i.p.) with 200 ng of pertussis toxin (Hooke Laboratories) 2 and 24 h after immunization. Animals were monitored daily and clinically scored in a blinded fashion as follows: grade 1, limp tail or isolated weakness of gait without limp tail; grade 2, limp tail and weakness of hind legs or poor balance; grade 3, total hind leg paralysis or severe head tilting; grade 4, total hind leg and partial front leg paralysis; and grade 5, moribund or dead animal.
Adoptive T cell transfer colitis experiments {#Sec24}
--------------------------------------------
Total CD4^+^ splenic T cells were isolated from 6- to 8-week-old female *Trp73* cKO and WT littermates via negative selection using the MACS CD4 T-cell Isolation Kit (Miltenyi Biotec Inc. USA, Auburn, CA). Naive (CD4^+^CD25^−^CD45RB^hi^) T cells were subsequently sorted using a FACSAria^TM^ cell sorter (BD Biosciences, San Jose, CA), and gating strategy for sorting is provided in Supplementary Fig. [8f](#MOESM1){ref-type="media"}. In all, 3 × 10^5^ naive T cells were transferred i.p. to 6--8-week-old female C57BL/6 *Rag2*^−/−^ recipient mice (purchased from Taconic Biosciences). Development of intestinal inflammation was monitored by weight loss, which correlates with histological evidence of colitis. Two time points were used to assess the colitis development: 4 weeks after T cell transfer to detect early colitis development and at 7 weeks after T cell transfer to assess colitis severity, when \~20% weight loss (from initial body weight) or other symptoms of colitis such as diarrhea were reported in some but not all mice. Proximal, middle, and distal sections of mouse colons were fixed in 10% formalin, stained with hematoxylin and eosin, and scored blindly for evidence of inflammation according to well-established criteria that include grading for lamina propria cellularity/inflammatory infiltrates (0--3), epithelial hyperplasia and goblet cell depletion (0--3), percentage of tissue involvement (0--3), and markers of severe inflammation including submucosal inflammation and the presence and numbers of crypt abscesses (0--3)^[@CR43],[@CR44]^. LPMCs were isolated from colon tissue by established techniques^[@CR44]^. Briefly, colon tissue was rinsed with Hank's Balanced Salt Solution (HBSS) to remove feces and debris, followed by removal of epithelial cells by incubation and vigorous shaking for 15 min at 37 ° C in HBSS supplemented with 15 mM HEPES, 5 mM EDTA (Invitrogen, Carlsbad, CA), 10% fetal calf serum (Gemini Bio-Products, West Sacramento, CA), and 1 mM dithiothreitol (Sigma-Aldrich, St. Louis, MO). After rinsing to remove epithelial cells, the remaining tissue was digested in complete Iscove's modified Dulbecco's modified Eagle's medium containing 0.17 mg/ml liberase TL and 30 μg/ml DNase I (both from Roche Applied Science, Indianapolis, IN) for 1 h at 37 ° C. Single-cell suspensions were made by passing digested tissue through 100- and 40-μm strainers (BD Biosciences, San Jose, CA). LPMCs were collected from individual mice, counted, and analyzed by flow cytometry for the percentage of CD4^+^ T cells and for T cell cytokine production by intracellular staining following PMA/ionomycin stimulation, as described above. Antibodies to CD4, CD25, CD45RB, TCRβ, IFNγ, and IL-17A were from ThermoFisher-eBioscience.
Statistical analysis {#Sec25}
--------------------
Two-tailed paired *t* tests were performed using Prism 7 (GraphPad software) to evaluate whether the difference between the means of two groups was statistically significant. To compare inter-strain difference versus intra-strain difference, an ANOVA model was applied evaluating the strain-specific effect (SAS, Version 9.4, Cary, NC). The correlation of IFNγ production levels at different time points were evaluated using Spearman's correlation coefficient using the R software ([www.r-project.org](http://www.r-project.org)).
Reporting summary {#Sec26}
-----------------
Further information on research design is available in the [Nature Research Reporting Summary](#MOESM2){ref-type="media"} linked to this article.
Supplementary information
=========================
{#Sec27}
Supplementary Information Reporting Summary Description of Additional Supplementary Files Supplementary Data 1 Supplementary Data 2 Supplementary Data 3 Supplementary Data 4 Supplementary Data 5
Source data {#Sec28}
===========
Source Data
**Peer review information** *Nature Communications* thanks Richard Flavell and the other, anonymous, reviewer(s) for their contribution to the peer review of this work.
**Publisher's note** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Supplementary information
=========================
**Supplementary information** is available for this paper at 10.1038/s41467-020-15172-5.
We thank Dr. Rosanne Spolski, Dr. Jian-Xin Lin, and Dr. Claudia Kemper (all NHLBI) and Dr. Jinfang Zhu (NIAID) for critical comments. This work was supported by the Division of Intramural Research, NHLBI (to M.R., M.K., W.L., P.L., J.L., J.R., and W.J.L.), an award from NHLBI (5K22HL125593; to M.K.), the Division of Intramural Research, NIAID (to J.H. and B.L.K), and by an award from NIDA (5U01DA04439902; to M.Z. and G.P.). Next generation sequencing was performed in the NHLBI DNA Sequencing and Genomic Core, cell sorting was performed in the NHLBI Flow Cytometry Core, and knock-out mice were generated by NHLBI transgenic core.
M.R., M.K., M.Z., J.H., P.L., B.L.K., G.P., and W.J.L. designed the experiments; M.R., M.K., M.Z., J.H., P.L., J.O., W.L., J.L., and J.R. performed the experiments; M.R., M.K., M.Z., J.H., P.L., B.L.K., G.P., and W.J.L. analyzed data and wrote the manuscript.
All relevant data are available from the authors. ChIP-Seq and RNA-Seq data sets have been deposited in the Gene Expression Omnibus under accession number [GSE144496](https://www.ncbi.nlm.nih.gov/geo/query/acc.cgi?acc=GSE144496). All other source data have been provided in a Source Data File ("Source Data Files.zip"). All the statistics source data for Figs. [1](#MOESM9){ref-type="media"}, [2b](#MOESM9){ref-type="media"}, [3d](#MOESM9){ref-type="media"}, [5a, b, d, e](#MOESM9){ref-type="media"}, [6](#MOESM9){ref-type="media"}, and [7](#MOESM9){ref-type="media"} and Supplementary Figs. [1](#MOESM9){ref-type="media"}, [2b, d](#MOESM9){ref-type="media"}, [3b](#MOESM9){ref-type="media"}, [4](#MOESM9){ref-type="media"}, [5](#MOESM9){ref-type="media"}, [6](#MOESM9){ref-type="media"}, and [7](#MOESM9){ref-type="media"} are provided as Statistic Source Data as an Excel (xlsx) file. The original flow cytometric data for Figs. [1a](#MOESM9){ref-type="media"} and [7b, f](#MOESM9){ref-type="media"} and Supplementary Figs. [2a, c](#MOESM9){ref-type="media"} and [3a](#MOESM6){ref-type="media"} are provided in corresponding folders as Flow Cytometry Standard (FCS) files and gating strategies are provided in Supplementary Fig. [8](#MOESM9){ref-type="media"}. Unprocessed western images for Figs. [1e](#MOESM9){ref-type="media"} and [5a](#MOESM9){ref-type="media"} and Supplementary Fig. [3c](#MOESM9){ref-type="media"} are provided in Supplementary Fig. [9](#MOESM9){ref-type="media"}.
The authors declare no competing interests.
|
<?php // Vars: $articlePager
echo $dmUserPager->renderNavigationTop();
echo _open('ul.elements');
foreach ($dmUserPager as $dmUser)
{
echo _open('li.element');
echo £link($dmUser);
echo _close('li');
}
echo _close('ul');
echo $dmUserPager->renderNavigationBottom();
|
Home » Store » Family planners can look into the future — What contraceptive options are in the pipeline?
Family planners can look into the future — What contraceptive options are in the pipeline?
Our Price:$8.00
Product Details
Purchase access to this article; published in Contraceptive Technology Update Single Article.
Contraceptive Technology Update provides you with objective analysis of the latest research and news on existing and emerging contraceptives so you can immediately apply what you've learned to patient care and counseling. You will receive practical, concise, and authoritative coverage on the issues impacting you most, such as:
new research and educational tips on oral contraceptives, intrauterine contraception, and other existing contraceptives;
cutting-edge reports on emerging and returning contraceptives, including emergency contraception, and the sponge;
|
1. Introduction {#sec0005}
===============
Since their introduction in the 1960s, silicone prosthetics have been a mainstay in breast augmentation and reconstruction procedures. These devices carry the potential complication of rupture from either trauma or time-related decay. Silicone liquid can escape as the prosthetic shell weakens affecting the surrounding breast tissue. It has a tendency to spread and migrate due to its high fat solubility. The exact prevalence of rupture is unknown, but is likely underestimated as it can be asymptomatic \[[@bib0005]\]. Silicone granuloma (or siliconoma) describes the inflammatory physiological response to free liquid silicone that occurs in some patients. Winer et al. first described the histopathology of a siliconoma as \[[@bib0010]\]:""degenerated anuclear stroma resembling necrobiosis of fibrous connective tissue surrounded by many irregular, oval, clear spaces or cavities. In other areas, this intervening stroma is invaded by a dense infiltrate consisting of lymphocytes, plasma cells, and histiocytes. Some of the clear spaces are lined by a single layer of nucleated cells, which are syncytial giant cells. Other clear spaces contain foreign body giant cells.""
This description came from a patient who received cosmetic injections of liquid silicone. Legitimate medical providers abandoned this practice shortly after its complications came to light, though cosmetic injection is still performed illicitly in some countries. While silicone prosthetics are much safer, the pathological response following implant rupture is identical. Siliconomas can occur locally, manifest as lymphadenopathy, or present at a distant site due to migration of free. If neglected, siliconomas can create a firm mass, cause local tissue destruction, ulceration, scarring, and nerve damage \[[@bib0005]\].
This reaction to free silicone has been described in various types of prosthetic devices. However, involvement of breast implants brings up significant concern due to the burden of breast cancer in the modern healthcare environment. Any new breast mass causes modest to severe concern for cancer depending on the clinical context. While silicone granulomas have characteristic diagnostic features on imaging, their appearance may also mimic malignancy \[[@bib0015], [@bib0020], [@bib0025], [@bib0030], [@bib0035], [@bib0040]\].
We present a case report of a large breast siliconoma and perform a comprehensive review of the English literature. We highlight the diagnostic challenges related to this uncommon presentation.
The work has been done in line with the SCARE criteria \[[@bib0045]\].
2. Case report {#sec0010}
==============
In 2012, a 66-year-old female presented for mammographic evaluation of a left breast mass that had been growing and hardening over years. She described a history of breast augmentation with silicone implants in the 1980s as well as bilateral re-implantation with saline prosthetics years later due to previous implant rupture. Her mammogram revealed an abnormal density superior to her left breast implant, but the study was limited due to motion. A concurrent ultrasound exam was inconclusive, and a follow up MRI study was recommended to the patient.
The patient received a non-contrast MRI about 9 months later due to concern for implant rupture ([Fig. 1](#fig0005){ref-type="fig"}). This study showed an 11 × 12 × 13 cm mass in the outer half of her left breast that displaced her implant medially. Both implants appeared intact. She also had left axillary lymphadenopathy. The radiologist interpreted this exam as BI-RADS category 5, highly suggestive of malignancy. An ultrasound-guided biopsy of her left breast done several days later showed only benign fibrinous debris. Due to concern over discordant imaging and biopsy results, she had a repeat MRI done about a month later. This study was performed with contrast to better evaluate the presence of malignancy and need for a repeat biopsy.Fig. 1Noncontract MRI of the breast on initial presentation.Fig. 1
The second MRI again showed the 13 cm encapsulated complex mass in the outer half of the left breast ([Fig. 2](#fig0010){ref-type="fig"}). The mass predominantly did not enhance, suggesting a large component to be hematoma. However, the posteroinferior periphery of the mass demonstrated extensive frond-like contrast enhancement highly concerning for malignancy (also BI-RADS 5). Her previously seen left axillary node was re-visualized. A re-biopsy of her left breast lesion was again recommended, however, the patient was lost to follow up for several years.Fig. 2Contrast enhanced MRI of the breast.Fig. 2
The patient presented again 5 years later to our institution, now 71 years of age. She described continued growth of her left breast over the past year with significant associated pain. She also stated that her left implant "fell out" on its own. On exam, a fungating mass with extensive ulceration occupied her medial left breast. The mass was large, firm and malodourous ([Fig. 3](#fig0015){ref-type="fig"}). With a presumptive diagnosis of neglected breast cancer, she received several studies while hospitalized. A chest, abdomen, and pelvis CT with contrast showed her left breast mass to now measure 23 × 15 cm ([Fig. 4](#fig0020){ref-type="fig"}). The mass was partially calcified with ulceration along its medial margin. It appeared to invade her pectoralis muscle, several intercostal muscles, and her 4th and 5th ribs. She had several prominent axillary lymph nodes on the left side. The remaining CT was largely unremarkable with no convincing evidence of distant metastases. She also had a bone scan and brain MRI around this time, neither of which had evidence of metastasis. A biopsy of her left breast yielded amorphous, acellular eosinophilic material with dystrophic calcifications interpreted as possible old necrosis or fibrin deposition. Another biopsy done about a week later had similar results, also without definitive evidence of cancer.Fig. 3Presentation prior to surgery.Fig. 3Fig. 4Current CT scan. The implant has been extruded and a large heterogeneous mass is seen.Fig. 4
With both active infection of her breast as well as continued pain, she needed the mass removed regardless of its etiology. An extensive modified radical mastectomy with axillary lymph node dissection was performed with final closure of the wound several days later. The final pathology of her breast mass (23.0 × 21.3 x 10.8 cm) demonstrated gross and microscopic changes consistent with ruptured silicone implant and subsequent hematoma, abscess, and skin ulceration; negative for malignancy ([Fig. 5](#fig0025){ref-type="fig"}). Her nine dissected lymph nodes were reactive with additional soft tissue nodules and changes of silicone involvement; also negative for malignancy. The patient tolerated the procedure well and had an uneventful recovery.Fig. 5Final specimen showing a predominately well-organized hematoma and a foreign body reaction.Fig. 5
3. Discussion {#sec0015}
=============
This patient's clinical course was convoluted by her presentation to multiple providers over the years, lack of follow up, and diagnostic uncertainty towards her lesion. The mass was fungating and ulcerated with active infection resembling an advanced neglected tumor. Because fibrosis and hematoma comprised much of her breast lesion, the siliconoma aspect was missed until the final pathology results came back after surgery. The absence of metastases despite the size of the lesion and the 5-year delay in treatment makes malignancy less likely but it should not be excluded. Nevertheless, this case provides a prime example of how neglected silicone granuloma can mimic breast cancer, sparking an extensive workup with eventual surgery.
It is essential to understand the utility and limitations of various imaging studies for evaluating siliconomas. Implant rupture may appear on mammography, however, dynamic contrast-enhanced MRI is the optimal modality to assess for rupture and siliconoma formation. An MRI should be done for every patient with implants who presents with a breast or axillary mass ^(6,\ 10)^. Typical MRI findings for siliconomas include evidence of implant collapse with free silicone particles outside the prosthetic shell and in the tissue surrounding the fibrous shell that forms around the implant. These findings in the context of rupture can reliably diagnose siliconoma and exclude malignancy \[[@bib0050],[@bib0055]\]. Contrast enhancement of siliconomas on MRI is atypical but occurred in our patient and another reported by Grubstein et al. \[[@bib0030]\]. Sonographic evaluation of siliconomas may reveal echogenic lesions with a "snowstorm" appearance, however, findings may be nonspecific. The use of PET CT for oncological surveillance in patients with siliconomas may yield false-positive results; the inflammatory cells of silicone granulomas have increased FDG uptake from avid glycolysis ^(3,\ 5,\ and\ 8)^.
Pathological tissue specimens remain the gold standard for diagnosis of siliconomas. Biopsy was the final diagnostic step for many patients in our literature review. However, sampling error is always a concern. Multiple biopsies were not sufficient to rule out cancer in our patient given her imaging results. A personal history of breast cancer may also warrant further workup for patients with a negative biopsy \[[@bib0060]\].
There are no established guidelines for management of silicone granuloma, though excluding malignancy is paramount. What to do afterwards depends on severity of symptoms and patient preferences. Surgical removal is the only definitive method of relieving symptoms and avoiding future complications. Patients may prefer to forgo surgery for minimally or asymptomatic lesions \[[@bib0065]\]. However, surgical removal of siliconomas also prevents their obfuscation of future cancer screening and workup \[[@bib0050]\]. Thus, a patient's risk for developing breast cancer should factor into their decision. Previous literature raised the question of whether siliconomas promote carcinogenesis or other systemic inflammatory diseases, however, not enough evidence exists to conclusively address the issue \[[@bib0055]\]. While diagnosis of siliconoma requires a high index of suspicion, greater awareness of their presentations and complications may prevent unnecessary tests and interventions in appropriate patients.
A comprehensive literature review was performed using PubMed and MEDLINE to include all cases of siliconomas mimicking breast cancer ([Table 1](#tbl0005){ref-type="table"}). 13 cases were identified including this one \[[@bib0020],[@bib0030], [@bib0035], [@bib0040],[@bib0055], [@bib0060], [@bib0065], [@bib0070], [@bib0075], [@bib0080]\]. Siliconomas developed 4 weeks to 16 years following rupture. The most common presentation was a breast or axillary mass (9 patients, 69.2%). The remaining patients presented with pain or were diagnosed during surveillance imaging studies. A core needle biopsy was attempted in most cases but was only successful in obtaining a histologic diagnosis two-thirds of the time. Four patients underwent a PET scan and all 4 were falsely positive.Table 1xxx.Table 1AuthorYearNumber of patientsAgeTime since implantation (years)Time since rupture (years)PresentationWorkupProceduresSuspicion for malignancyFinal PathologyCommentsAlduk et al \[[@bib0020]\]2015156Unknown13Patient with history of silicone implant rupture and removal 13 years prior presents with a palpable lump at the time of screening mammographyMammography- BIRADS 5 spiculated lesion. MRI- suggestive of malignancy. Biopsy showed only inflammatory changesMass resectionVery HighSGAppearance of SG on mammogram classic for breast malignancyAli et al \[[@bib0065]\]20121663016Patient with significant smoking history presents with left breast mass fixed to chest wall and weight loss.CXR had lesion concerning for lung cancer. CT thorax, US, and mammogram revealed 2 breast lesions resembling SG, but could not exclude cancer. Core biopsy showed only SGNoneHighSGPatient declined resection upon learning benign nature of massesGrubstein et al \[[@bib0030]\]201135118\>2Patient had left mastectomy with reconstruction for carcinoma and right sided augmentation 18 years prior. Her implants were replaced 2 years prior due to leak. She presents for a PET CT for oncological follow up.PET CT showed bilateral LAD and soft tissue mass in breast with FDG uptake. US indicated silicone infiltration. MRI unremarkable.2 FNAs had only benign findings consistent with SGHighSGPositive PET CT concerning for cancer recurrence or lymphoma67UnknownUnknownSimilar history as previous patient from this article who presents for oncological follow up with PET CT.PET CT had pathological FDG uptake from breast masses as well as axillary, mediastinal, and internal mammary chain lymph nodes. US-guided FNA revealed benign pathology consistent with SG.NoneHighSGPositive PET CT interpreted as "a suspicious malignant process."5672 yearsPatient with history of breast augmentation and implant replacement due to rupture presents with a palpable mass.Mammography nonspecific. US supported SG. MRI revealed nonspecific enhancing masses around implant. US-guided core biopsy revealed SG.NoneHighSGEl-Charnoubi et al \[[@bib0070]\]201116013UnknownPainful mass with growth over 7-8 years. Patient presents again 3 months after initial workup/surgery with new tumor and erosion of overlying breast tissue.Biopsy confirmed SG. US and MRI confirmed implant rupture. Biopsy again showed SG in recurrent lesion 3 months later.Capsulectomy/mass excision.\
Mass excision and reconstructionHighSG -- both initial and recurrent lesionShepard et al \[[@bib0040]\]2010167UnknownUnknownPatient with history of bilateral breast augmentation, known rupture, and stable SGs developed DCC near a SG in her left breast. She had a left mastectomy and radiation therapy. She presents for surveillance PET CT.PET CT showed active lesions in her right breast. Mammogram and US supported SG. Biopsy consistent with SG, no evidence of cancer.NoneModerateSGAdams et al \[[@bib0055]\]20091355UnknownPalpable lump with clinically intact implants. Axillary mass also appeared during the workup of her initial lesion.US and mammography suspicious for intracapsular rupture. MRI confirmed rupture.Excisional biopsy of axillary node and re-implantation of ruptured prosthesisModerateSGIsmael et a~l.~ \[[@bib0075]\]20051505UnknownAxillary LAD 5 years after surgical excision of breast cancer with reconstruction.none discussed in articleSurgical excision of axillary mass and replacement of expander prosthesisHighSGAxillary mass concerning for cancer recurrenceKao et al \[[@bib0060]\]19971564Implant intactPatient had bilateral breast cancer treated with mastectomies and axillary lymph node dissections 5 years prior and reconstruction a year later. She presented with parasternal pain.New masses seen on CXR. CT thorax showed enlarged internal mammary chain lymph nodes. MRI nonspecific for the LAD, and implants appeared intact. CT-guided aspiration consistent with SG, no cancer. Subsequent PET CT was positive.Thoracoscopic procedure done to remove suspicious lymph nodes.HighSGStrong concern for cancer recurrence. Another case of false positive PET CT.Rivero et al \[[@bib0035]\]199414011Implant intactThe patient had a strong FH of breast cancer and underwent bilateral prophylactic mastectomies 11 years prior. She had numerous complications with her implants requiring two replacement surgeries. She presents at age 40 with a palpable breast mass.Mammogram showed residual breast tissue and 2 solid-appearing lesions. US showed solid lesions without typical features of lymph nodes.Both masses excisedHighSGThe masses grossly resembled lymph nodes. Path consistent with SG. First reported case of intramammary silicone LAD.Savrin et al \[[@bib0080]\]197912854 weeksPatient with history of trauma to breasts 4 weeks prior presents with bilateral capsular contractures and palpable breast lump.FNA yielded no fluid aspirate, inconclusive.Surgical excision of breast mass and replacement of both implantsLowSGIntraoperative findings indicated rupture of implant in breast with mass.[^1]
4. Conclusion {#sec0020}
=============
Siliconomas develop as a result of implant rupture and present with many of the signs and symptoms of breast cancer. The majority of patients will develop a painless breast or axillary mass. Others will have pain or be diagnosed incidentally during surveillance imaging. MRI is the preferred study for diagnosis and to rule out cancer although this is frequently very difficult. PET scans can be falsely positive and core needle biopsies can be inconclusive. The majority of patients should undergo surgery due to symptoms or the inability to rule out cancer.
Conflicts of interest {#sec0025}
=====================
None of the Authors have any conflicts of interest to disclose.
Funding {#sec0030}
=======
None
Ethical approval {#sec0035}
================
Approval has been given by the University of Texas Northeast ethics committee.
Consent {#sec0040}
=======
Written consent has been given.
Author contribution {#sec0045}
===================
Bryce Carson -- Writing the paper.
Steven Cox MD -- Data review and editing.
Hishaam Ismael MD -- Study concept, literature review and helping in writing the article.
Registration of research studies {#sec0050}
================================
None.
Guarantor {#sec0055}
=========
Hishaam Ismael MD.
[^1]: CXR -- Chest X-ray, LAD -- Lymphadenopathy, SG -- Silicone Granuloma, US -- Ultrasound, MRI -- Magnetic Resonance Imaging.
|
Thursday, November 03, 2011
"The Growthbusters"
by contributor Megan Podeszwa
“GrowthBusters” held its world premiere at The West End Cinema with filmmaker Dave Gardner in tow. Naturally, as most filmmakers do, he offered some words of wisdom in his opening remarks. “I’m standing here tonight because I feel like the people of the world need someone to tell them the truth.”
Photo credit Yoonjeong Oh
"Everything we thought we knew is wrong! Okay, maybe not everything. But what if some of our core beliefs about how the world works turn out to be myths?"
The film examines the growth that was taking place in Gardner’s hometown and what he tried to do to stop it. Gardner believes that the world that we live in is expanding too fast.
While many people believe that economic and population growth is good for our society, Gardner is trying to show us that this isn’t necessarily a good thing and how in our finite world, we are running out of room for expansion.
He shows how through all the expansion, in business, family and spending money, we are not only contributing to our carbon footprint, but we also aren’t helping our country in any other way.
Through his film, Gardner wants to show the world that by being content with what we have, it may benefit us in the long run. The rate at which our country is expanding is currently too rapid and we can take control of our economy and our businesses by working with what we already have.
Memorable quotes:
“If the entire world consumed as much as the average American does, then we would need nine planets in order to … sustain everyone.” Raj Patel, author Stuffed and Starving
“In an empty world, it was a safe bet that growth was making us richer, but we no longer live in an empty world. We live in a full world.” Herman Daly, former Sr. Economist, The World Bank
“As a businessman and a proud capitalist to be actually talking about restraining growth is…uh…it’s almost blasphemous.” Dick Smith, author Dick Smith’s Population Crisis
|
855 P.2d 481 (1993)
124 Idaho 20
DIET CENTER, INC., Applicant-Appellant on Appeal,
v.
Carol BASFORD; Jack F. Gibson; Jacquie and Frank Rogers; Karen Mannes; Marylen Wilkins Melgaard, Respondents-Respondents on Appeal.
No. 20106.
Court of Appeals of Idaho.
June 30, 1993.
*482 Rigby, Thatcher, Andrus, Rigby & Kam, Chtd., Rexburg, for appellant.
Hansen, Beard, Martin, St. Clair, Peterson & Sullivan, Idaho Falls, for respondents.
WALTERS, Chief Justice.
This is an appeal from an order dismissing a declaratory action on the ground that there is an action pending between the parties in another court. For the reasons explained below, we affirm.
The facts relevant to the instant appeal may be stated briefly. The appellant, Diet Centers, Inc. ("Diet Center"), an Idaho corporation, is a defendant in a class-action lawsuit currently pending in California Superior Court in San Francisco ("the California court"). The six respondents Carol Basford, Jack Gibson, Karen Mannes, Marylen Wilkins Melgaard, and Frank and Jacquie Rogers are among the approximately two hundred Diet Center, Inc. franchisees and sub-franchisees who, in March 1989, filed the class action challenging Diet Center's decision to raise its weekly continuing franchise license fee. Their claims against Diet Center include breach of contract, breach of duty under the U.C.C., misrepresentation, violation of the California Franchise Investment Law, and requests for declaratory relief and an accounting.
The license agreements between Diet Center and fifty-two of these plaintiffs the respondents among them contained clauses providing for arbitration of all disputes arising out of or relating to the franchise agreement. These agreements further provided that the arbitrations would take place in Rexburg, Idaho,[1] and that the Idaho Uniform Arbitration Act would apply.[2] Thus, in June, 1989, Diet Center filed an application for declaratory relief in the District Court of the Seventh Judicial District in the State of Idaho, Madison County, (the "Idaho district court"), seeking to compel these fifty-two franchisees and sub-franchisees to submit their controversies to arbitration. In consideration of the class action pending in the California court, however, the Idaho district court refused to exercise jurisdiction over these fifty-two plaintiff-franchisees and dismissed Diet Center's application. No appeal was taken from that order. Diet Center then petitioned the California court to compel arbitration. Granting Diet Center's petition, the California court stayed the class action proceedings and ordered the fifty-two plaintiffs to arbitrate their disputes with Diet Center.
Diet Center then sent demands for arbitration to six of the fifty-two arbitrating plaintiffs (the respondents herein), and, by the method provided in the arbitration agreements, the parties selected a panel of arbitrators. However, the arbitration process came to a standstill when the parties failed to agree upon the authority of the arbitrators to determine which of the franchisees would be the first to arbitrate. The panel of arbitrators suspended the arbitration *483 proceedings pending a "final and authoritative decision" identifying the first arbitrating plaintiff. Diet Center then filed a new application in the Idaho district court seeking an order confirming the power of the arbitrators to determine the sequence of the arbitrations. The respondents moved to dismiss the application on grounds of lack of personal jurisdiction, res judicata, forum non conveniens, and the ground that there is another action pending between the parties. Although the court concluded it had jurisdiction over the dispute, the court refused to consider the action on its merits on the ground that there is another action pending between the same parties, for the same cause, in another court.[3]See I.R.C.P. 12(b)(8). Diet Center filed this appeal.
The dispositive issue on appeal is whether the district court properly granted the respondent's motion for dismissal on the ground that an action between the parties is pending in another court. The defense of pendency of another action is explained as follows:
Where two actions between the same parties, on the same subject, and to test the same rights, are brought in different courts having concurrent jurisdiction, the court which first acquires jurisdiction, its power being adequate to the administration of complete justice, retains its jurisdiction and may dispose of the whole controversy, and no court of coordinate power is at liberty to interfere with its action.
This rule rests on comity and the necessity of avoiding conflict in the execution of judgments by independent courts, and is a necessary one because any other rule would unavoidably lead to perpetual collision and be productive of most calamitous results.
21 C.J.S. Courts § 188, at 222 (1990). See also 20 AM.JUR. Courts §§ 128-138 (1965) (discussing the "priority principle" as controlling the exercising of concurrent jurisdiction).
The determination of whether to proceed with an action where a similar case is pending elsewhere is committed to the trial court's sound discretion. This determination will not be overturned unless discretion has been abused. Wing v. Amalgamated Sugar Co., 106 Idaho 905, 684 P.2d 307 (Ct.App.1984). When an exercise of discretion is reviewed on appeal, the appellate court conducts a multi-tiered inquiry. The sequence of this inquiry is (1) whether the lower court correctly perceived the issue as one of discretion; (2) whether the court acted within the boundaries of such discretion and consistently with any legal standards applicable to specific choices; and (3) whether the court reached its decision by an exercise of reason. Sun Valley Shopping Center, Inc. v. Idaho Power Co., 119 Idaho 87, 803 P.2d 993 (1991); Associates Northwest, Inc. v. Beets, 112 Idaho 603, 733 P.2d 824 (Ct.App. 1987). Here, the district court properly identified its decision as involving the exercise of discretion. Thus, we next consider whether the judge's discretionary alternatives were governed by particular legal standards, and whether the judge reached his decision consistent with such standards.
In deciding whether to exercise jurisdiction over a case when there is another action pending between the same parties for the same cause, a trial court must evaluate the identity of the real parties in interest and the degree to which the claims or issues are similar. Wing, at 106 Idaho at 908, 684 P.2d at 310. The trial court is to consider whether the court in which the matter already is pending is in a position to determine the whole controversy and to settle all the rights of the parties. See 21 C.J.S. Courts, supra, § 188, at 222.[4] Additionally, the court may take into account the occasionally competing objectives of judicial economy, minimizing costs and delay *484 to litigants, obtaining prompt and orderly disposition of each claim or issue, and avoiding potentially inconsistent judgments. Wing, 106 Idaho at 908, 684 P.2d at 310.
Here, the parties concede that the California court has jurisdiction over the parties and jurisdiction to enforce their arbitration agreements.[5] Furthermore, the record establishes that the California court exercised its jurisdiction over the case including its order that the fifty-two plaintiffs submit their disputes to arbitration before Diet Center filed its application for declaratory relief with the Idaho district court. In refusing to inject itself into the controversy, the Idaho district court stated its concern for the efficient resolution of controversies. The judge observed that the arbitration issues in this case had volleyed between the California and Idaho courts for several years, and that it was difficult, if not impossible, for either court to know the basis for the other's rulings or the policies the other is trying to further. The district court then recognized the benefit of having one court "in charge" of complex litigation such as that underlying the parties' dispute. Finally, the district court rejected Diet Center's argument that Idaho's interest in interpreting and applying its own laws required that the Idaho district court exercise jurisdiction over the matter. The district judge concluded that the state had very little interest in adjudicating the dispute, as none of the parties resided in Idaho, and concluded that having a hand in the application of its laws was a negligible consideration.
Based upon these facts and the entire record before us, we conclude that the district court's decision to decline jurisdiction on the ground that another action was pending was consistent with the applicable legal standards, and that its decision was reasonable. Finding no abuse of discretion, we will not disturb that decision on appeal.
The order granting the respondents' motion to dismiss Diet Center's application for declaratory relief is affirmed. Costs to the respondents, Basford, Gibson, Mannes, Melgaard, and the Rogers. No attorney fees on appeal.
LANSING and SWANSTROM, JJ., concur.
NOTES
[1] At the time of the franchise agreements, Diet Center's headquarters were located in Rexburg. Although Diet Center has since moved its headquarters to another state, it remains an Idaho corporation.
[2] See Idaho Code § 7-901 et seq.
[3] Because we find this issue to be dispositive, we need not address the district court's alternative grounds for declining to exercise its jurisdiction.
[4] If by reason of the limited jurisdiction or mode of proceedings of the other court these results cannot be accomplished, then the trial court may properly exercise jurisdiction. 21 C.J.S. Courts § 188, at 222 (1990).
[5] It is well established that parties may not by consent divest a court of its jurisdiction. See 21 C.J.S. Courts § 71, at 89 (1990). Thus, the three franchise agreements providing for venue in Idaho does not operate to deprive the California court of its jurisdiction over the matter.
|
A picture is worth a thousand words.
Spring in Singapore
My mother took a pic of this rare, pretty sight during her morning walk around the estate and sent it over to the family group chat in WhatsApp. These trees, according to her are called 风铃木, and have been flowering all over Singapore the past week or so. Coinciding with the cherry blossom season in Japan this year, it seems (albeit at a sweltering 33 degrees) like spring has arrived in Singapore too.
|
Belgium national team coach Roberto Martinez has revealed he was interviewed for the Celtic managerial job in 2009 after Gordon Strachan stepped down.
Martinez, who had spells managing Wigan and Everton before taking charge of the Red Devils, played in Scotland with Motherwell, and ahead of tonight’s clash with Scotland at Hampden, talked about the Hoops’ approach.
Roberto Martinez revealed he had been interviewed for the Celtic job but felt it wasn't the right time. Picture: Getty Images
The Spaniard was in charge at Swansea City when the Celtic job came up, but admitted that the timing was wrong.
“I had conversations and I was always very impressed with the need to bring silverware,” he said, as reported by the Evening Times.
“There was also the prospect of getting to the Champions League through the qualifying rounds and it was always a club that people are attracted to because of the intensity of the fans and what it means.
|
Q:
Is there a way to have an onload callback after changing window.location.href?
Essentially what I'd like to do is something to the effect of this:
window.location.href = "some_location";
window.onload = function() {
alert("I'm the new location and I'm loaded!");
};
Is there any way to have a callback when the window's new location is loaded? (The above code doesn't work.)
A:
No, you cannot do it the way you want. Loading a new page closes the current document and starts loading a new document. Any code in your current document will no longer be active when the new page starts to load.
To have an event handler when the new document loads, you would either need to insert code into the new page's document or load the new document into an iframe and monitor the loading of the iframe from your current document.
A:
Setting window.location.href to a new value tells the browser to simply go to the next page.
Like so:
window.location.href = "http://www.google.com/";
Once the browser goes to google.com, that's it, your Javascript is no longer executing, and there is no way for you to have any sort of callback, because the browser is no longer running your page.
So, the answer is no.
|
/*
* See the NOTICE file distributed with this work for additional
* information regarding copyright ownership.
*
* This is free software; you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as
* published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* This software is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this software; if not, write to the Free
* Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA
* 02110-1301 USA, or see the FSF site: http://www.fsf.org.
*/
package com.xpn.xwiki.store;
import java.util.List;
import org.xwiki.component.annotation.Role;
import org.xwiki.model.reference.DocumentReference;
import org.xwiki.query.QueryManager;
import org.xwiki.stability.Unstable;
import com.xpn.xwiki.XWikiContext;
import com.xpn.xwiki.XWikiException;
import com.xpn.xwiki.doc.XWikiDocument;
import com.xpn.xwiki.doc.XWikiLink;
import com.xpn.xwiki.doc.XWikiLock;
import com.xpn.xwiki.objects.classes.BaseClass;
@Role
public interface XWikiStoreInterface
{
void saveXWikiDoc(XWikiDocument doc, XWikiContext context) throws XWikiException;
/**
* Atomic operation for renaming a document.
* This operation will rename the document in DB by performing updates in all tables the document name is used.
*
* @param doc the actual document instance to rename.
* @param newReference the new reference to use for renaming.
* @param context the current context.
* @throws XWikiException in case of problem during the rename.
* @since 12.5RC1
*/
@Unstable
default void renameXWikiDoc(XWikiDocument doc, DocumentReference newReference, XWikiContext context)
throws XWikiException
{
// Avoid breaking backward compatibility.
throw new UnsupportedOperationException("Not yet implemented.");
}
void saveXWikiDoc(XWikiDocument doc, XWikiContext context, boolean bTransaction) throws XWikiException;
XWikiDocument loadXWikiDoc(XWikiDocument doc, XWikiContext context) throws XWikiException;
void deleteXWikiDoc(XWikiDocument doc, XWikiContext context) throws XWikiException;
List<String> getClassList(XWikiContext context) throws XWikiException;
/**
* API allowing to count the total number of documents that would be returned by a query.
*
* @param wheresql Query to use, similar to the ones accepted by {@link #searchDocuments(String, XWikiContext)}. It
* should not contain {@code order by} or {@code group} clauses, since this kind of queries are not
* portable.
* @param context The current request context.
* @return The number of documents that matched the query.
* @throws XWikiException if there was a problem executing the query.
*/
int countDocuments(String wheresql, XWikiContext context) throws XWikiException;
/**
* @since 2.2M2
*/
List<DocumentReference> searchDocumentReferences(String wheresql, XWikiContext context) throws XWikiException;
/**
* @deprecated since 2.2M2 use {@link #searchDocumentReferences(String, com.xpn.xwiki.XWikiContext)}
*/
@Deprecated
List<String> searchDocumentsNames(String wheresql, XWikiContext context) throws XWikiException;
/**
* @since 2.2M2
*/
List<DocumentReference> searchDocumentReferences(String wheresql, int nb, int start, XWikiContext context)
throws XWikiException;
/**
* @deprecated since 2.2M2 use {@link #searchDocumentReferences(String, int, int, com.xpn.xwiki.XWikiContext)}
*/
@Deprecated
List<String> searchDocumentsNames(String wheresql, int nb, int start, XWikiContext context) throws XWikiException;
/**
* @since 2.2M2
*/
List<DocumentReference> searchDocumentReferences(String wheresql, int nb, int start, String selectColumns,
XWikiContext context) throws XWikiException;
/**
* @deprecated since 2.2M2 use {@link #searchDocumentReferences(String, int, int, String, XWikiContext)}
*/
@Deprecated
List<String> searchDocumentsNames(String wheresql, int nb, int start, String selectColumns, XWikiContext context)
throws XWikiException;
/**
* Search documents by passing HQL where clause values as parameters. This allows generating a Named HQL query which
* will automatically encode the passed values (like escaping single quotes). This API is recommended to be used
* over the other similar methods where the values are passed inside the where clause and for which you'll need to
* do the encoding/escaping yourself before calling them.
* <p>
* Example:
*
* <pre>
* {@code
* #set($orphans = $xwiki.searchDocuments(" where doc.fullName <> ?1 and (doc.parent = ?2 or "
* + "(doc.parent = ?3 and doc.space = ?4))",
* ["${doc.fullName}as", ${doc.fullName}, ${doc.name}, ${doc.space}]))
* }
* </pre>
*
* @param parametrizedSqlClause the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param nb the number of rows to return. If 0 then all rows are returned
* @param start the number of rows to skip. If 0 don't skip any row
* @param parameterValues the where clause values that replace the question marks (?)
* @param context the XWiki context required for getting information about the execution context
* @return a list of document references
* @throws XWikiException in case of error while performing the query
* @since 2.2M1
*/
List<DocumentReference> searchDocumentReferences(String parametrizedSqlClause, int nb, int start,
List<?> parameterValues, XWikiContext context) throws XWikiException;
/**
* @deprecated since 2.2M2 use {@link #searchDocumentReferences(String, int, int, List, XWikiContext)}
*/
@Deprecated
List<String> searchDocumentsNames(String parametrizedSqlClause, int nb, int start, List<?> parameterValues,
XWikiContext context) throws XWikiException;
/**
* Same as {@link #searchDocumentReferences(String, int, int, List, XWikiContext)} but returns all rows.
*
* @see #searchDocumentReferences(String, int, int, java.util.List, com.xpn.xwiki.XWikiContext)
* @since 2.2M2
*/
List<DocumentReference> searchDocumentReferences(String parametrizedSqlClause, List<?> parameterValues,
XWikiContext context) throws XWikiException;
/**
* @deprecated since 2.2M2 use {@link #searchDocumentReferences(String, List, XWikiContext)}
*/
@Deprecated
List<String> searchDocumentsNames(String parametrizedSqlClause, List<?> parameterValues, XWikiContext context)
throws XWikiException;
/**
* API allowing to count the total number of documents that would be returned by a parameterized query.
*
* @param parametrizedSqlClause Parameterized query to use, similar to the ones accepted by
* {@link #searchDocuments(String, List, XWikiContext)}. It should not contain {@code order by} or
* {@code group} clauses, since this kind of queries are not portable.
* @param parameterValues The parameter values that replace the question marks.
* @return The number of documents that matched the query.
* @param context The current request context.
* @throws XWikiException if there was a problem executing the query.
*/
int countDocuments(String parametrizedSqlClause, List<?> parameterValues, XWikiContext context)
throws XWikiException;
/**
* Search documents in the storing system.
*
* @param wheresql the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param distinctbylanguage when a document has multiple version for each language it is returned as one document a
* language.
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
*/
List<XWikiDocument> searchDocuments(String wheresql, boolean distinctbylanguage, XWikiContext context)
throws XWikiException;
/**
* Search documents in the storing system.
*
* @param wheresql the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param nb the number of rows to return. If 0 then all rows are returned.
* @param start the number of rows to skip. If 0 don't skip any row.
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
*/
List<XWikiDocument> searchDocuments(String wheresql, int nb, int start, XWikiContext context) throws XWikiException;
/**
* Search documents in the storing system.
*
* @param wheresql the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param distinctbylanguage when a document has multiple version for each language it is returned as one document a
* language.
* @param customMapping inject custom mapping in session.
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
*/
List<XWikiDocument> searchDocuments(String wheresql, boolean distinctbylanguage, boolean customMapping,
XWikiContext context) throws XWikiException;
/**
* Search documents in the storing system.
*
* @param wheresql the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param distinctbylanguage when a document has multiple version for each language it is returned as one document a
* language.
* @param nb the number of rows to return. If 0 then all rows are returned.
* @param start the number of rows to skip. If 0 don't skip any row.
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
*/
List<XWikiDocument> searchDocuments(String wheresql, boolean distinctbylanguage, int nb, int start,
XWikiContext context) throws XWikiException;
/**
* Search documents in the storing system.
*
* @param wheresql the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param distinctbylanguage when a document has multiple version for each language it is returned as one document a
* language.
* @param nb the number of rows to return. If 0 then all rows are returned.
* @param start the number of rows to skip. If 0 don't skip any row.
* @param parameterValues the where clause values that replace the question marks (?).
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
* @since 1.1.2
* @since 1.2M2
*/
List<XWikiDocument> searchDocuments(String wheresql, boolean distinctbylanguage, int nb, int start,
List<?> parameterValues, XWikiContext context) throws XWikiException;
/**
* Search documents in the storing system.
*
* @param wheresql the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param distinctbylanguage when a document has multiple version for each language it is returned as one document a
* language.
* @param customMapping inject custom mapping in session.
* @param nb the number of rows to return. If 0 then all rows are returned.
* @param start the number of rows to skip. If 0 don't skip any row.
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
*/
List<XWikiDocument> searchDocuments(String wheresql, boolean distinctbylanguage, boolean customMapping, int nb,
int start, XWikiContext context) throws XWikiException;
/**
* Search documents in the storing system.
*
* @param wheresql the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
*/
List<XWikiDocument> searchDocuments(String wheresql, XWikiContext context) throws XWikiException;
/**
* Search documents in the storing system.
*
* @param wheresql the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param distinctbylanguage when a document has multiple version for each language it is returned as one document a
* language.
* @param customMapping inject custom mapping in session.
* @param checkRight if true check for each found document if context's user has "view" rights for it.
* @param nb the number of rows to return. If 0 then all rows are returned.
* @param start the number of rows to skip. If 0 don't skip any row.
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
*/
List<XWikiDocument> searchDocuments(String wheresql, boolean distinctbylanguage, boolean customMapping,
boolean checkRight, int nb, int start, XWikiContext context) throws XWikiException;
/**
* Search documents in the storing system.
* <p>
* Search documents by passing HQL where clause values as parameters. This allows generating a Named HQL query which
* will automatically encode the passed values (like escaping single quotes). This API is recommended to be used
* over the other similar methods where the values are passed inside the where clause and for which you'll need to
* do the encoding/escpaing yourself before calling them.
*
* @param wheresql the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param parameterValues the where clause values that replace the question marks (?).
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
* @since 1.1.2
* @since 1.2M2
*/
List<XWikiDocument> searchDocuments(String wheresql, List<?> parameterValues, XWikiContext context)
throws XWikiException;
/**
* Search documents in the storing system.
* <p>
* Search documents by passing HQL where clause values as parameters. This allows generating a Named HQL query which
* will automatically encode the passed values (like escaping single quotes). This API is recommended to be used
* over the other similar methods where the values are passed inside the where clause and for which you'll need to
* do the encoding/escpaing yourself before calling them.
*
* @param wheresql the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param distinctbylanguage when a document has multiple version for each language it is returned as one document a
* language.
* @param customMapping inject custom mapping in session.
* @param nb the number of rows to return. If 0 then all rows are returned.
* @param start the number of rows to skip. If 0 don't skip any row.
* @param parameterValues the where clause values that replace the question marks (?).
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
* @since 1.1.2
* @since 1.2M2
*/
List<XWikiDocument> searchDocuments(String wheresql, boolean distinctbylanguage, boolean customMapping, int nb,
int start, List<?> parameterValues, XWikiContext context) throws XWikiException;
/**
* Search documents in the storing system.
* <p>
* Search documents by passing HQL where clause values as parameters. This allows generating a Named HQL query which
* will automatically encode the passed values (like escaping single quotes). This API is recommended to be used
* over the other similar methods where the values are passed inside the where clause and for which you'll need to
* do the encoding/escpaing yourself before calling them.
*
* @param wheresql the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param nb the number of rows to return. If 0 then all rows are returned.
* @param start the number of rows to skip. If 0 don't skip any row.
* @param parameterValues the where clause values that replace the question marks (?).
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
* @since 1.1.2
* @since 1.2M2
*/
List<XWikiDocument> searchDocuments(String wheresql, int nb, int start, List<?> parameterValues,
XWikiContext context) throws XWikiException;
/**
* Search documents in the storing system.
* <p>
* Search documents by passing HQL where clause values as parameters. This allows generating a Named HQL query which
* will automatically encode the passed values (like escaping single quotes). This API is recommended to be used
* over the other similar methods where the values are passed inside the where clause and for which you'll need to
* do the encoding/escpaing yourself before calling them.
*
* @param wheresql the HQL where clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param distinctbylanguage when a document has multiple version for each language it is returned as one document a
* language.
* @param customMapping inject custom mapping in session.
* @param checkRight if true check for each found document if context's user has "view" rights for it.
* @param nb the number of rows to return. If 0 then all rows are returned.
* @param start the number of rows to skip. If 0 don't skip any row.
* @param parameterValues the where clause values that replace the question marks (?).
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
* @since 1.1.2
* @since 1.2M2
*/
List<XWikiDocument> searchDocuments(String wheresql, boolean distinctbylanguage, boolean customMapping,
boolean checkRight, int nb, int start, List<?> parameterValues, XWikiContext context) throws XWikiException;
XWikiLock loadLock(long docId, XWikiContext context, boolean bTransaction) throws XWikiException;
void saveLock(XWikiLock lock, XWikiContext context, boolean bTransaction) throws XWikiException;
void deleteLock(XWikiLock lock, XWikiContext context, boolean bTransaction) throws XWikiException;
List<XWikiLink> loadLinks(long docId, XWikiContext context, boolean bTransaction) throws XWikiException;
/**
* @since 2.2M2
*/
List<DocumentReference> loadBacklinks(DocumentReference documentReference, boolean bTransaction,
XWikiContext context) throws XWikiException;
/**
* @deprecated since 2.2M2 use {@link #loadBacklinks(DocumentReference, boolean, XWikiContext)}
*/
@Deprecated
List<String> loadBacklinks(String fullName, XWikiContext context, boolean bTransaction) throws XWikiException;
void saveLinks(XWikiDocument doc, XWikiContext context, boolean bTransaction) throws XWikiException;
void deleteLinks(long docId, XWikiContext context, boolean bTransaction) throws XWikiException;
/**
* Execute a reading request and return result.
*
* @param sql the HQL request clause. For example: {@code where doc.fullName
* <> ?1 and (doc.parent = ?2 or (doc.parent = ?3 and doc.space = ?4))}
* @param nb the number of rows to return. If 0 then all rows are returned.
* @param start the number of rows to skip. If 0 don't skip any row.
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
*/
<T> List<T> search(String sql, int nb, int start, XWikiContext context) throws XWikiException;
/**
* Execute a reading request with parameters and return result.
* <p>
* Execute query by passing HQL request values as parameters. This allows generating a Named HQL query which will
* automatically encode the passed values (like escaping single quotes). This API is recommended to be used over the
* other similar methods where the values are passed inside the where clause and for which you'll need to do the
* encoding/escaping yourself before calling them.
*
* @param sql the HQL request.
* @param nb the number of rows to return. If 0 then all rows are returned.
* @param start the number of rows to skip. If 0 don't skip any row.
* @param parameterValues the where clause values that replace the question marks (?).
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
* @since 1.1.2
* @since 1.2M2
*/
<T> List<T> search(String sql, int nb, int start, List<?> parameterValues, XWikiContext context)
throws XWikiException;
/**
* Execute a reading request and return result.
*
* @param sql the HQL request.
* @param nb the number of rows to return. If 0 then all rows are returned.
* @param start the number of rows to skip. If 0 don't skip any row.
* @param whereParams if not null add to {@code sql} a where clause based on a table of table containing field name,
* field value and compared symbol ({@code =}, {@code >}, etc.).
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
*/
<T> List<T> search(String sql, int nb, int start, Object[][] whereParams, XWikiContext context)
throws XWikiException;
/**
* Execute a reading request with parameters and return result.
* <p>
* Execute query by passing HQL request values as parameters. This allows generating a Named HQL query which will
* automatically encode the passed values (like escaping single quotes). This API is recommended to be used over the
* other similar methods where the values are passed inside the where clause and for which you'll need to do the
* encoding/escaping yourself before calling them.
*
* @param sql the HQL request.
* @param nb the number of rows to return. If 0 then all rows are returned.
* @param start the number of rows to skip. If 0 don't skip any row.
* @param whereParams if not null add to {@code sql} a where clause based on a table of table containing field name,
* field value and compared symbol ({@code =}, {@code >}, etc.).
* @param parameterValues the where clause values that replace the question marks (?).
* @param context the XWiki context required for getting information about the execution context.
* @return a list of XWikiDocument.
* @throws XWikiException in case of error while performing the query.
* @since 1.1.2
* @since 1.2M2
*/
<T> List<T> search(String sql, int nb, int start, Object[][] whereParams, List<?> parameterValues,
XWikiContext context) throws XWikiException;
void cleanUp(XWikiContext context);
/**
* Indicate if the provided wiki name could be used to create a new wiki.
*
* @param wikiName the name of the wiki.
* @param context the XWiki context.
* @return true if the name is already used, false otherwise.
* @throws XWikiException error when looking if wiki name already used.
*/
boolean isWikiNameAvailable(String wikiName, XWikiContext context) throws XWikiException;
/**
* Allows to create a new wiki database and initialize the default tables.
*
* @param wikiName the name of the new wiki.
* @param context the XWiki context.
* @throws XWikiException error when creating new wiki.
*/
void createWiki(String wikiName, XWikiContext context) throws XWikiException;
/**
* Delete a wiki database.
*
* @param wikiName the name of the wiki.
* @param context the XWiki context.
* @throws XWikiException error when deleting wiki database.
*/
void deleteWiki(String wikiName, XWikiContext context) throws XWikiException;
boolean exists(XWikiDocument doc, XWikiContext context) throws XWikiException;
/**
* @deprecated since 11.5RC1, use {@link #isCustomMappingValid(BaseClass, String)}
*/
@Deprecated
boolean isCustomMappingValid(BaseClass bclass, String custommapping1, XWikiContext context) throws XWikiException;
/**
* @since 11.5RC1
*/
default boolean isCustomMappingValid(BaseClass bclass, String custommapping1)
{
return isCustomMappingValid(bclass, custommapping1);
}
/**
* @deprecated since 11.5RC1, use {@link #injectCustomMapping(BaseClass)} instead
*/
@Deprecated
boolean injectCustomMapping(BaseClass doc1class, XWikiContext xWikiContext) throws XWikiException;
/**
* @since 11.5RC1
*/
default boolean injectCustomMapping(BaseClass doc1class) throws XWikiException
{
return injectCustomMapping(doc1class, null);
}
boolean injectCustomMappings(XWikiDocument doc, XWikiContext context) throws XWikiException;
List<String> getCustomMappingPropertyList(BaseClass bclass);
void injectCustomMappings(XWikiContext context) throws XWikiException;
void injectUpdatedCustomMappings(XWikiContext context) throws XWikiException;
List<String> getTranslationList(XWikiDocument doc, XWikiContext context) throws XWikiException;
/**
* @return QueryManager used for creating queries to store. Use QueryManager instead of #search* methods because it
* is more abstract from store implementation and support multiple query languages.
*/
QueryManager getQueryManager();
/**
* Get the limit size of a property.
*
* @param entityType the entityType where the property is located.
* @param property the property on which we want the limit size.
* @param context the context of the wiki to retrieve the property
* @return an integer representing the limit size.
* @since 11.4RC1
*/
@Unstable
int getLimitSize(XWikiContext context, Class<?> entityType, String property);
}
|
[Results of left heart catheterization study in 64 patients with nocturnal disorders of respiratory control (sleep apnea)].
Sleep apnea (SA) is associated with increased morbidity of the cardiovascular system, the interaction between the disordering of respiratory coordination and cardiovascular regulation being largely unknown. In 64 patients (age: mean = 54.1; range: 35-67 years) with an increased apnea index (AI greater than 10), a cardiac catheterisation investigation was performed to exclude coronary heart disease (CHD) or cardiomyopathy. CHD was excluded in 39 patients, 6 patients had coronary single-vessel disease, 9 patients coronary two-vessel, and 10 three vessel disease. In 10 patients, cardiomyopathy was detected, while high-grade impairment of the left ventricular ejection fraction (greater than 30%) was observed in five patients. With the exception of a single patient, CHD was observed only in patients in the over-fifty age group. Arterial hypertension was seen in 84% of the patients with, and in 69% of the patients without, CHD. The patient groups with and without coronary heart disease did not differ with respect to apnea index, ten minute index, or the average duration of the 30 longest apneic episodes. Anginal complaints, observed in a total of 72% of the patients, were one of the major indications for coronary angiography. These results do not support the assumption that SA is primarily a consequence of underlying cardiac disease, but do indicate that SA must be considered a cardiac risk factor, especially in view of the fact that pronounced nocturnal changes in blood gases and haemodynamics, together with malignant arrhythmias, are found in conjunction with this disturbance of breathing.
|
Tag: 10th BRICS summit
On a crisp sunny winter day in the land of Madiba and Mahatma, leaders of BRICScountries clasped their hands together at the Sandton Convention Centre, Johannesburg and decided to sculpt a new edifice of reformed multilateral order as a bulwark against rising tides of unilateralism and parochialism. This joint intent to re-shape the global order was telescoped in the imparting of virtual hand impressions at the Cradle of Humankind at Maropeng by leaders of BRICS countries.
|
An unlikely pairing of a gas giant exoplanet and a tiny red dwarf star has scientists rethinking everything they know about how planets form — and whether there’s a whole population of large planets orbiting tiny stars that is yet to be discovered.
A team of astronomers at the Institute of Space Studies of Catalonia (IEEC) made a rare observation of a large, Jupiter-like planet orbiting around a host star that looked unusually tiny for a planet of its size. The red dwarf GJ 3512, located around 30 light-years away from Earth, is a little more than one-10th the size of our sun. Its exoplanet, on the other hand, is nearly half the mass of Jupiter, and it orbits around the dwarf star once every 204 days.
Out of the 4,000 exoplanets discovered so far in the universe, only about 10 percent of them orbit red dwarf stars. Red dwarfs are the most common type of stars, typically measuring less than 60 percent of the mass of our sun, but they are hard to see in the vast night sky due to their dimness.
The study on GJ 3512, published in Science on Thursday, shows that this particular red dwarf was exhibiting some odd behavior, moving at a faster rate than normal, which indicated that it had a rather large companion attached to it.
When the odd pair was first observed, Juan Carlos Morales, Ph.D., an astrophysicist at IEEC and lead author of the study, recalls believing that it was a case of a binary star system because of the large signals that the planetary system was giving off.
“We were very surprised,” Morales tells Inverse. “This planet is rare because theoretical formation models suggest that low-mass stars typically host small planets, similar to Earth or small Neptunes.”
The improbable case of a gas giant orbiting such a small star challenges existing models of planet formation.
The widely accepted ‘core accretion theory’ hypothesizes that planets form from smaller particles that come together by the force of gravity, forming larger and larger particles into one massive body.
GJ 3512, a red dwarf, is host to an improbably large gas giant. © CARMENES/RENDERAREA/J. BOLLAÍN/C. GALLEGO
This theory explains the formation of planets like Earth, but it falls short when it comes to the formation of gaseous giants, which would need to form a lot faster to be able to contain the gases found in their atmospheres. A more recent theory, ‘disk instability,’ states that planets form when a massive disk is broken up due to instability of gravity and forms clumps of gas.
Scientists continue to debate the two theories, observing exoplanets to see which one makes more sense.
The newly discovered exoplanet GJ 5312b was likely formed when an unstable disk around the tiny star broke up into clumps.
“These clumps can grow until they form a planet,” Morales says. “This process is much faster, and larger planets can be formed. Therefore, the planet we have discovered is the first to prove that this mechanism may also work.”
The planet may not even be the only one around this tiny, tiny star. The team of astronomers also found an indication of a second planet in this unusual system, with a mass that’s three to four times that of Neptune.
“We will continue monitoring this system to characterize the second planet candidate and even look for more signals,” Morales says.
The team is also surveying around 300 other dwarf stars, hoping to find more odd pairs of giant exoplanets orbiting tiny dwarf stars.
Abstract: Surveys have shown that super-Earth and Neptune-mass exoplanets are more frequent than gas giants around low-mass stars, as predicted by the core accretion theory of planet formation. We report the discovery of a giant planet around the very-low-mass star GJ 3512, as determined by optical and near-infrared radial-velocity observations. The planet has a minimum mass of 0.46 Jupiter masses, very high for such a small host star, and an eccentric 204-day orbit. Dynamical models show that the high eccentricity is most likely due to planet-planet interactions. We use simulations to demonstrate that the GJ 3512 planetary system challenges generally accepted formation theories, and that it puts constraints on the planet accretion and migration rates. Disk instabilities may be more efficient in forming planets than previously thought.
|
Token Sale Distribution Model
Token sale structure
UNIC token Presale allocation
1st ICO round allocation
2nd and 3rd ICO rounds allocation
The cycle of UNIC token circulation
UNIC Token stability
Considering general cryptocurrency market’s tendency to grow, Unic Advertising Network expects to develop at least 2% of the global advertising market in ICO niche with big sureness. According to preliminary estimates, market share will provide to Unic Advertising Network rev in excess of 2000 ETH per month and quarterly gross profit of not less than 1500 ETH.
In the 2-nd and 3-rd ICO rounds 30% of funds allocated for buyback UNIC tokens from the exchanges avoid fall of UNIT token’s market value. For buyback program 30% of the profit based on the results of each financial year, starting from the second year of the Unic Advertising Network activity is allocated. Unic Advertising Network can annually send up to 30% of the profit from previous financial year to buyback tokens from holders at actual cost at the exchanges.
Roadmap
Team
Vladimir Tsyplyayev
CEO
Vladimir has 14 years experience in web development and IT manegement, 10 years in SEO.
Evgeniy Schukin
Designer
Evgeniy has 14 years experience in design.
Andrey Sudiev
CTO
Experience in development of projects with large data.
Philip Drobinov
Social Media Manager, Lawyer, Writer
Philip has experience in SMM, writing books and ligitation at High Court of Justice of England and Wales.
Juan Otero is a serial tech entrepreneur & innovation advocate with over 15 years experience in building, scaling and leading disruptive technology companies. After beginning his career at Sun Microsystems (acquired by Oracle for $7.4B), Juan joined the Project Management Team at Booking.com. Part of Priceline (PCLN) with a current market cap of $84B.
IN MEDIA
COMMUNITY
Frequently Asked Questions
Why do you need the ICO? Where will the money go to?
We need the ICO to accelerate the development process, as well as the development of our product.The funds will be used to attract additional specialists, maintain the infrastructure, and conduct advertising and marketing campaigns.
Who distributes tokens and how quickly will I receive them after the end of the initial offering?
During the pre-ICO, the distribution of tokens will be made in manual mode.Tokens purchased at the ICO will be charged automatically using smart contracts. Enrollment takes place immediately after your funds are credited to our account.
Is there a bounty campaign? What bounty activities are tokens offered for?
We are launching a Bounty campaign for the community and hope for your help in spreading information about our product. The announcement will be posted on Bitcointalk and on our Bounty page. Details of the Bounty campaign, the token distribution and the stakes can be seen in the announcement.
Where can I see the progress of the ICO and how many funds have been already collected?
The fundraising process will be displayed on the main page of our website in real time.
What is your minimum entry threshold?
There is no minimum entry threshold.
Where can I see the smart contract code?
The smart contracts code will be posted on GitHub.
Is there a hard cap of the funds raised?
The maximum amount of UNIC tokens for sale are limited in smart-contract at value 180,000,000 UNIC tokens.
What does your token provide?
The token has a utility value providing platform users with the possibility to sell and buy traffic.
When will I receive my UNIC tokens?
They will appear instantly in a personal account. They can be used either after the product is released or the tokens will enter the exchange.
How can I buy UNIC tokens?
Tokens can be bought with the biggest discount on the pre-ICO and with smaller discounts during the ICO. Other cryptocurrencies can be exchanged for UNIC tokens during the contribution period. If you miss the Token Sale you will be able to exchange other crypto-currencies to UNIC tokens later on the Exchange.
Where and how do I store UNIC tokens?
UNIC token can be stored in ETH wallet.
Will additional UNIC tokens be produced after the ICO?
No additional token emission is planned.
Will UNIC tokens be available on exchanges after the ICO?
Yes, this will be announced at a later date.
Do UNIC tokens accept the ERC-20 standard? Can I transfer them to a third-party ETH wallet?
Yes, UNIC tokens are fully compatible with the ERC-20 standard and they can be transferred to a third-party ETH wallet.
How many UNIC tokens will be sold during the ICO?
A total of 250,000,000 UNIC tokens are produced. 180,000,000 of these tokens will be available for sale.
YOU ARE ONLY ALLOWED TO PURCHASE UNIC TOKENS IF AND BY BUYING UNIC TOKENS YOU
COVENANT, REPRESENT, AND WARRANT THAT YOU ARE NEITHER A CITIZEN OR PERMANENT
RESIDENT OF THE UNITED STATES OF AMERICA, INCLUDING PUERTO RICO, THE U.S. VIRGIN
ISLANDS, AND ANY OTHER POSSESSIONS OF THE UNITED STATES, PEOPLE’S REPUBLIC OF CHINA,
SINGAPORE, SOUTH KOREA, OR GIBRALTAR, NOR DO YOU HAVE A PRIMARY RESIDENCE OR
DOMICILE IN THESE COUNTRIES.
YOU COVENANT, REPRESENT, AND WARRANT THAT NONE OF THE OWNERS OF THE COMPANY, OF
WHICH YOU ARE AN AUTHORIZED OFFICER, ARE CITIZENS OR PERMANENT RESIDENTS OF THE
UNITED STATES OF AMERICA, INCLUDING PUERTO RICO, THE U.S. VIRGIN ISLANDS, AND ANY
OTHER POSSESSIONS OF THE UNITED STATES, PEOPLE’S REPUBLIC OF CHINA, SINGAPORE,
SOUTH KOREA, AND GIBRALTAR, NOR DO YOU HAVE A PRIMARY RESIDENCE OR DOMICILE IN THE
UNITED STATES OF AMERICA, INCLUDING PUERTO RICO, THE U.S. VIRGIN ISLANDS, AND ANY
OTHER POSSESSIONS OF THE UNITED STATES, PEOPLE’S REPUBLIC OF CHINA, SINGAPORE,
SOUTH KOREA, AND GIBRALTAR. SHOULD THIS CHANGE AT ANY TIME, YOU SHALL IMMEDIATELY
NOTIFY UNIC ADVERTISING NETORK (the “COMPANY”).
Tokens sold in connection with this Token Sale are offered only outside of the United States to non-U.S. persons, pursuant to the provisions of Regulation S of the U.S. Securities Act of 1933, as amended. These Tokens have not been and will not be registered under the Securities Act, and may not be offered or sold in the United States or to U.S. persons absent registration or under an applicable exemption from the registration requirements and the purchasers should not assume they will be able to resell their Tokens in the United States. Neither the Securities and Exchange Commission nor any state regulator has passed upon the merits of or given its approval to the Tokens, the terms of the Token Sale, or the accuracy or completeness of any associated materials. Buying Tokens involves risks, and purchasers should be able to bear the loss of their entire purchase. All purchasers should make their own determination of whether or not to make any purchase, based on their own independent evaluation and analysis.
UNIC Advertising Network website uses cookies to improve user experience and collect anonymous visitor statistics using Google Analytics. If you continue browsing the website without changing your browser settings, it will be accepted that you are happy to receive all cookies at website.
|
Q:
How to set URL in selenium script that is set up to run Selenium Tests (C#) based on environment during CI/CD
I have a Selenium Nunit Script which is set up to run whenever a build is deployed to VSTS.
I am unable to figure out a way on how to pass the URL of the environment to the selenium script based on the environment that the code has been deployed to.
Example:
When Code is deployed to QA env, selenium script should select QA url and run the tests.
Similarly, when code is deployed to UAT env, url inside the script should set to UAT specific url and run the tests.
How do i achieve this?
Thanks in advance for your time and help.
A:
Try to specify the parameter in setting file, then override the value by specifying in Override test run parameters box of visual studio test task.
How do I pass parameters to my test code from a build or release pipeline?
On the other hand, you can define multiple variables with the same name and different scopes (environment) in release definition, then just read that variable's value from environment variable in the code.
|
Q:
Rails selector which has options a set of numbers
I want to make a form in which the user can select a number between 1 and 30. I am trying to do something like this:
<%= f.select("@currency.neural_network", "prediction_days", [1..30]) %>
However, I am getting the below error.
Failure/Error: click_link 'Show'
ActionView::Template::Error:
undefined method `merge' for [1..30]:Array
The code for the entire form is:
<%= form_for @currency.neural_network do |f| %>
<%= f.label "Days" %><br />
<%= f.select("@currency.neural_network", "prediction_days", [1..30]) %>
<%= f.submit "Predict", class: "btn btn-primary" %>
<% end %>
A:
Take a look at the documentation for select. Assuming you want prediction_days to be passed to your controller as a value between 1 and 30, and prediction_days is an attribute of a neural_network object, then the following should work for you:
<%= f.select(:prediction_days, options_for_select(1..30)) %>
|
Q:
How can I pass multiple elements from a collection into a function with one or more of the elements being mutable?
When passing two elements from the same vector to a function, the borrow checker will not allow one of the elements to be mutable.
struct Point {
x: i32,
y: i32,
}
fn main() {
let mut vec: Vec<Point> = Vec::new();
foo(&mut vec[0], &vec[1]);
}
fn foo(pnt_1: &mut Point, pnt_2: &Point) {
}
error: cannot borrow vec as immutable because it is also borrowed as mutable
vec is never borrowed by foo though, vec[0] is borrowed and vec[0] is a Point.
How can I pass multiple elements from the same collection into a function with one or more of the elements being mutable?
A:
How can I pass multiple elements from the same collection into a function with one or more of the elements being mutable?
The short answer is that you cannot, at least not without support from the collection itself.
Rust disallows mutable aliases - multiple names for the same thing, one of which allows mutation.
It would be far too complicated (with the current state of programming languages) to verify that (&mut vec[0], &vec[1]) does not introduce aliasing but (&mut vec[0], &vec[0]) does. Adding to the complexity is the fact that the [] operator can be overloaded, which allows creating a type such that foo[0] and foo[1] actually point at the same thing.
So, how can a collection help out? Each collection will have (or not have) a specific way of subdivision in an aliasing-safe manner.
There can be methods like slice::split_at_mut which verify that that two halves cannot overlap and thus no aliasing can occur.
Unfortunately, there's no HashMap::get_two_things(&a, &b) that I'm aware of. It would be pretty niche, but that doesn't mean it couldn't exist.
vec is never borrowed by foo though
It most certainly is. When you index a Vec, you are getting a reference to some chunk of memory inside the Vec. If the Vec were to change underneath you, such as when someone adds or removes a value, then the underlying memory may need to be reallocated, invalidating the reference. This is a prime example of why mutable aliasing is a bad thing.
|
Czinege and Golden Claim Back-to-Back Player of the Week Awards
Tourists Have Been Named League Player of the Week Five Times
By Doug Maurer / Asheville Tourists | August 28, 2018 5:02 PM
ASHEVILLE- The Asheville Tourists are one of the top offensive teams in the South Atlantic League and the individual honors continue to come their way. From August 13-19, Casey Golden was named the SAL Player of the Week. Todd Czinege continued the Tourists' reign by winning his first Player of the Week Award during the week of August 20-26.
Golden, who was named the South Atlantic League MVP, hit .458 during the week of August 13-19. Casey went 11-for-24 with three doubles, one triple, and two Home Runs. Asheville's outfielder recorded eight RBI and scored six runs while also adding a walk and a stolen base to the mix.
Czinege, the former Villanova Wildcat, received the recognition for his performance last week. Czinege has done nothing but hit since he arrived in Asheville at the beginning of July. Todd is batting .325 in 42 games with the Tourists and has hit 12 Home Runs, 11 doubles, and a pair of triples.
During the week of August 20-26, the right-handed hitter went 8-for-23, a .348 batting average, hit four Home Runs, drove in eight, and scored six times. Czinege is batting .417 over his last nine games and has six Home Runs during that stretch.
Previous Player of the Week Asheville award winners in 2018 include Bret Boswell and Chad Spanberger (twice). The Asheville Tourists finish out the regular season at home with a four-game series that begins on Friday, August 31.
|
Mosinet Geremew
Mosinet Geremew (born 12 February 1992) is an Ethiopian middle-distance and long-distance runner.
Geremews career started in cross country running. He ran in the junior category at the 2010 IAAF World Cross Country Championships and placed 16th overall – he was not a point-scoring runner for the Ethiopian team. He returned to the same venue (Bydgoszcz) as a senior competitor at the 2013 IAAF World Cross Country Championships, though his 24th-place finish again left him out of the team point scoring.
In 2012 he won the 10k Paderborner Osterlauf in Germany in 27:53 min.
He became the first person to win twice at the Yangzhou Jianzhen International Half Marathon, taking back-to-back wins in 2015 to 2016, which included a course record of 59:52 minutes – the fastest achieved in a Chinese race.
He won this race again in 2017 and 2018.
In 2015 he was the winner of the Ras Al Khaimah Half Marathon.
He achieved bigger popularity in 2018 by winning the Dubai Marathon as well as a second place in the Chicago Marathon.
At the 2019 London Marathon, he finished in second place behind Eliud Kipchoge with a time of 2:02:55, the third-fastest time in history.
International competitions
Circuit wins
Dubai Marathon: 2018 (2:04:00)
Yangzhou Jianzhen International Half Marathon: 2015–2018
Ras Al Khaimah Half Marathon: 2015
Peachtree Road Race: 2013
Great Ethiopian Run: 2011
References
External links
Category:1992 births
Category:Living people
Category:Ethiopian male long-distance runners
Category:Ethiopian male middle-distance runners
Category:World Athletics Championships athletes for Ethiopia
Category:Place of birth missing (living people)
Category:World Athletics Championships medalists
|
<?xml version='1.0' encoding='utf-8'?>
<section xmlns="https://code.dccouncil.us/schemas/dc-library" xmlns:codified="https://code.dccouncil.us/schemas/codified" xmlns:codify="https://code.dccouncil.us/schemas/codify" xmlns:xi="http://www.w3.org/2001/XInclude" containing-doc="D.C. Code">
<num>31-2231.14</num>
<heading>Interlocking ownerships, management.</heading>
<para>
<num>(a)</num>
<text>An insurer may retain, invest in, or acquire the whole or any part of the capital stock of any other insurer, or have a common management with another insurer, unless the retention, investment, acquisition, or common management is inconsistent with another provision of law, or, by reason thereof, the business of the insurers with the public is conducted in a manner which substantially lessens competition generally in the insurance business or tends to create a monopoly.</text>
</para>
<para>
<num>(b)</num>
<text>A person otherwise qualified may be a director of 2 or more insurers which are competitors unless the effect is to lessen substantially competition between insurers generally or tends materially to create a monopoly.</text>
</para>
<annotations>
<annotation doc="D.C. Law 13-265" type="History" path="§114">Apr. 3, 2001, D.C. Law 13-265, § 114, 48 DCR 1225</annotation>
</annotations>
</section>
|
[Overlap syndrome of systemic lupus erythematosus and dermatomyositis presented a large demyelinating subcortical lesion mimicking brain tumor and high level of CSF antineuronal and serum anti-ribosomal P antibodies].
We reported a 50-year-old man with an overlap syndrome of dermatomyositis and SLE, whose magnetic resonance image of the brain showed a rapidly increasing large tumor-like focal lesion unequally enhanced by Gd-DTPA in the left frontal lobe. Its pathological finding by the brain biopsy was fibrinoid necrosis, inflammatory cell aggregation around blood vessels and many myelin-laden macrophages with central necrosis. Although many cases of blood vessel injury are reported in CNS lupus, in this case the brain lesion partly took reversible course and neural symptoms such as paresis were slight and the lesion well responded to steroid. Moreover we considered that the measurement of serum anti-ribosomal P and CSF antineuronal antibodies are useful to diagnose cases as CNS lupus.
|
---
description: 编译器错误 CS0524
title: 编译器错误 CS0524
ms.date: 07/20/2015
f1_keywords:
- CS0524
helpviewer_keywords:
- CS0524
ms.assetid: a5cd8fb0-f5df-4580-9116-a6be4dffd1cb
ms.openlocfilehash: ebf17ceaa9c829e58e57debe7e84dec23be44e3c
ms.sourcegitcommit: 5b475c1855b32cf78d2d1bbb4295e4c236f39464
ms.translationtype: MT
ms.contentlocale: zh-CN
ms.lasthandoff: 09/24/2020
ms.locfileid: "91191380"
---
# <a name="compiler-error-cs0524"></a>编译器错误 CS0524
“type”:接口不能声明类型
[接口](../language-reference/keywords/interface.md) 不能包含用户定义的类型;它应仅包含方法和属性。
## <a name="example"></a>示例
下面的示例生成 CS0524:
```csharp
// CS0524.cs
public interface Clx
{
public class Cly // CS0524, delete user-defined type
{
}
}
```
|
Cholinergic stimulants and excess potassium ion increase the fluidity of plasma membranes isolated from adrenal chromaffin cells.
Chromaffin cell membranes from the bovine adrenal medulla were labelled with the hydrophobic fluorescent probe 1,6-diphenyl-1,3,5-hexatriene, and the fluorescence polarization (P) of the membrane suspensions was measured as a function of temperature. The P versus t profiles, between 20 and 37 degrees C, showed two linear regions separated by a break in the vicinity of 30 degrees C, reflecting a change in the phase behaviour of the constitutent lipids. Decreases in P values at higher temperature indicated progressive fluidization of the lipid bilayer. Previous incubation with either acetylcholine (0.5 mM) or nicotine (50 microM) produced further fluidization, the extent of which depended on the presence of added Ca2+ (2.2 mM). Thus, the flow activation energy, delta E, between approx. 30 and 37 degrees C was 9.1 kcal/mol for acetylcholine and 8.8 kcal/mol for acetylcholine plus Ca2+, as compared to 7.9 kcal/mol in the absence of acetylcholine and Ca2+. In the presence of nicotine, delta E was 11.4 kcal/mol when Ca2+ was absent and 9.5 kcal/mol when it was present. The cholinergic blocker, hexamethonium (0.5 mM), abolished the acetylcholine- or nicotine-induced changes. 65 mM K+ produced a similar fluidization, which was reversed by addition of Ca2+. An additive effect was observed when the membranes were incubated with both nicotine and K+, with delta E = 16.6 kcal/mol in the presence of Cas2+. These results indicate a receptor-mediated modulation of the lipid distribution between rigid and fluid regions in the membrane, which could be of importance for stimulated catecholamine secretion in the intact cell.
|
Conventionally, an outdoor unit in which a reactor for executing inverter control of a compressor is installed in a machine room in which the compressor is installed is known (see Patent Literature 1, for example). In the prior-art outdoor unit, a screw hole or the like for mounting the reactor is formed in a partition plate (separator) partitioning a space into the machine room and an air-sending device room, and the reactor is directly mounted on the partition plate.
|
"1939., USSR and Germany concluded nonaggression pact." "After only a week ago started the Second World War." "1940, the Soviet Union annexed Estonia." "55000 Estonian citizens were mobilized the Red Army." "1941 ve years, Germany is occupied Estonia." "72000 Estonian citizens were mobilized the German armed forces." "In 1944, the Soviet army appeared on the borders of Estonia." "The gate was open." "In the courtyard stood a truck." "Father, mother and Kadri was made ?" "into a truck." "As it's the most normal thing in the world." "27 th July Line Sinimad-Tannenberg" "What happened to them?" "They sent them to Siberia." "Could not you have something to preduzmeš?" "Treci Online!" "Saaresto on the phone!" "Twentieth Estonian division Waffen-SS." "47-mi Regiment, Third Battalion, Ninth armies, the third line ..." "They captured the Children's hill." "The third line ..." "Shit!" "The line went dead!" "Tamika, back!" "Carl!" "The third line ..." "I get it!" "We will make such a task!" "Let's go!" "Karl!" "How are you?" "I'm fine." "Let's go!" "Three years have passed." "Three years and 43 days" "I can not help feeling that I I was to blame for everything that happened to them." "I try to remember their faces, movements, voice ..." "Memories of them slowly fade and my guilt is increasing day by day." "This is my cross, and I'll have to wear it for life." "Charge!" "Infantry at 800 meters from us!" "That's why you're here?" "Fire!" "Swap!" "Bring the ammo!" "Karl!" "Medic!" "Sjajnas, over here!" "Pir, come on!" "Radik, cover us!" "I got him!" "Fire!" "Are you from the same village?" "We did not." "Talu chosen me to be his assistant." "Steady!" "Who are you two?" "SS Rows Kjaer." "Hit the deck!" "Leave it!" "Dismissed!" "Staffing?" "Yes." "They promised to send 10 and only two in." "And the twins." "What is your name?" "Skin." " Anton." "Karl Tamika." "Relatives?" "Brac." "I immediately noticed that his face." "Radik." "I arrived this spring." "Sjajnas, a paramedic." "Kamenski, snipers." "Powder, commander of the department." "Pir, only that." "Saaresto is our commander." "Taking care of you as Jesus." "These rods will not serve anything on the front." "Put it there!" "And a gas mask, you can throw it away." "Now here you can put something what is more necessary." "Letters of girls, tobacco, condoms ..." "Sit down!" "Take this!" "This is a reliable weapon." "In the First World War were fought my two brothers." "Both were killed by the same missile." "Horrible smells." "les." "We can not bury them until the shooting outside." "This goes here." "Needs an assistant to me." "I will." "Can I do." "Radik, show him the position!" "Let's go!" "I will look at it." "The machine gun was always the first to be affected." "Then take me." "I promised my mother I'd take care of his brother." "I'm older than him." "How much?" "Half an hour." "You'll be my assistant." "I want you and me." "Next time." "This put here ..." "You're all I have left." "It's not easy to admit" "I'm hiding from you the real truth." "After the deportation of parents I walked as in a dream." "I saw only one way out:" "On the front." "You made ?" "me discouraged ..." "Who do you keep writing?" "The girl?" "Parents?" "What is wrong with you?" "I can not sleep." "The boys first day on the front line and you're talking about their tales." "It is a strange feeling." "As if I knew them." "It's like ..." "I see myself in their place." "Nasty feeling." "Hands in the air!" "I forgot to take off the lid." "Saaresto ordered to wake the boys." "The Russians entered the adjacent trench." "Do not you hear?" "You're a lucky man." "Here we are, here Russians." "Here are our trapped." "Eighth troop attacks here." "We charge here." "Here is a minefield." "There is a passage." "It is used to force the Russians into a trap." "Any questions?" "How many Russians there?" "Well, there's a little something." "July 28" "The first mine is about 10 meters." "Keep up that tree." "Do not shoot!" "We Estonians!" "Put your head down!" "The Russians are!" "Where is your commander?" "Died in combat is." "We are from Nordlandske Division." "How many are you?" "4 Soldiers and two machine guns." "Oberšarfirer (rank in the German army) Saaresto." "Taking command." "We will attack with your position." "Giving fire!" "I get it!" "We have some more ammunition?" "We do not have." "We start at exactly 4:00 in the morning." "Got it!" "Thank you." "What's your name?" "Carl." "Me too." "I am Charlemagne." "Then I called Karl-XXII." "I'm Karl Madsen of Roskilde." "It is 30 kilometers from Copenhagen." "Karl Tamika." "On the farm Tamika." "Three kilometers from Vinimajzea." "The Germans!" "The Germans, the Germans in the trenches!" "Let's go, or we're done!" "Retreat!" "Dragging quickly!" "Get down!" "Bomb!" "Are you okay?" "Powder, blow the door!" "15 seconds!" "Sjajnas, Pyrrhus was wounded!" "They ran to the other exit." "Do not shoot!" "Do not shoot, we surrender!" "Do not shoot ... 18th August" "Steady!" "Hi, guys!" "I see here a wash." "There can be war." "Estonian soldiers." "Fuhrer pointed our people a lot of confidence." "He confided in us is the most difficult task:" "Tanenburšku line." "And we, the local Estonian authorities, do not sit idly by." "After years of research" "We have proved that we belong Aryan race." "It is an indisputable fact." "Under the auspices of the Greater German state bright future awaits us in a joint family and European nations." "Heil Hitler!" "I do not think so." "Why?" "Heil Hitler!" "I thought we'd get Gvozd one baptism and not this." "What do I do with this?" "Can her to wipe my ass." "Paper Is too thick." "And you're condition." "You can replace the tobacco." "Adolf, what I've been reduced to?" "Kjaer, have a drink!" "No, I'm going to replace my brother." "Guys, let's have a drink." "Take it!" "With Hitler's autograph." "I have my Fuhrer." "Once, a woman?" "Well ..." "Yes." "So That's it." "And she had a mustache?" "No." "You said she's your firer." "That does not necessarily mean that he has a mustache." "Fuhrer has a mustache." "She does not have them." "What is it called?" "Erik." "No lower part?" "No." "Donji Part, bottom part ..." "Here's the bottom part." "Get away!" "Nosi Up!" "What are you thinking?" "Nothing." "Let's ..." "For fallen comrades!" "The Dane has driven me." "They have toilet paper you want." "He gave me a pack of cigarettes." "From Narva remained only a pile of stones." "Dom ..." "Maid ..." "All is forgotten." "Every day I forget something." "This is all I have left from my father." "He received this baptism in the First World War." "In the war for independence is fought against the Reds." "1940, after the June coup he was convicted." "What are we doing here?" "This is not our war." "You bet realms?" "We did not start." "Hitler Attacked Russia." "And when he attacked Finland?" "Who occupied the Baltic states?" "When occupied Poland?" "The devil took them!" "Poland was attacked by both." "You know what happens?" "Red Estonians will return home." "Some return." "There are not many." "A handful." "There are thousands of them!" "It's a Soviet propaganda." "What will you do if you meet Red Estonians?" "His compatriots." "Red Page will be desirable." "Do not you understand?" "There are millions of them!" "It was an avalanche." "The red plague." "You seem not understand anything!" "Calm down!" "Where are you going?" "Yes amen brother." "Let him be quiet." "Shut up!" "Powder, get down!" "Kjaer, your old shift." "What's up here?" "Everything is quiet." "She told me:" "Do not go." "I could not." "Uncle said that that night be arrested in Tallinn." "My message is to inform parents." "I did not believe him." "What arrest?" "Karl, get the gun!" "Get ready, we're leaving." "We are consequently driving." "The trucks are waiting." "Where?" "In Germany." "That's an order." "I'm staying here." "You think you will return from your Siberia if you stay?" "I do not think." "And what do you think?" "Do you know what I saw, such as you?" "They endured a week, a month or two ..." "and that's it." "What is the purpose of residue?" "Will it bring us freedom?" "If what you want Stay here." "19th September." "Operation "Aster"." "The withdrawal of the German army." "Guys do not want to go to Germany." "Melt can go by boat to Sweden." "I have a connection." "Just do not go in Tartu." "Then we're done." "Shut up!" "Do not come home!" "Back!" "That's an order!" "Good day!" "Do you have a Russian ammunition?" "My flee." "Who are you?" "Another troop battalion Virumanskog National militia." "More specifically ... what's left of it." "Guys, let them Spoil!" "Guys ..." "August, Kaupo, Willem ..." "No bullets, This is useful as a button on his shirt." "Heil Hitler!" "Wait a minute!" "And where are you going, the Fair?" "What are you saying?" "Help cho century." "Acting like a cow and not as men." "This is a real firer." "Mom, look!" "Flights!" "Attention!" "Attention!" "Take cover!" "Airplanes!" "Run to the forest!" "Faster!" "Faster!" "Run to the forest!" "Get down!" "Sjajnas, get down!" "Burn up truck!" "You bastards!" "Help!" "Damn!" "Start the truck and pick up the wounded." "Let's quickly in Tallinn." "Red will arrive at any moment." "My sister has the same kind of doll." "It can not have the same kind!" "Why is that?" "This is my Kati." "Of course." "And where is she?" "My sister was away." "No one but her Katie?" "Let's go!" "Help people to fit inside the truck." "Women, children, girls, on the truck." "Scroll." "Wounded to the hospital and refugees in Tallinn." "You may still be able to fetch a boat." "What do I do next?" "Damn life!" "Again I have all I have to solve." "Do you know where my mother is?" "I know." "Kati wants to tell you something." "Kati will explain everything to you later." "Put in Avinurme." "No further." "We'll dig in." "Guys, you know what will become of us?" "Today, the 19th of September, this forest is ours." "Tomorrow, the 20th of September will come Russians and they will drive us out of here." "And the next day, the 21st of September, we will drive the Russians out of the woods." "And the 22 of September there will be a forester and they will drive us all." "Fritz took my daughter to the city" "She went back to her out of there like a whore" "During that time I shed blood on the Eastern Front" "A Adolf deceived us" "A Adolf, bastard, deceived us ..." "It is time for our last dinner!" "Take potatoes CUNKO, bread ..." "It's nice to sit die." "You know who said that?" "No." "Erich Maria Remarque." "What this woman knows about the war?" "This is a man." "He wrote a book "In the West is nothing new."" "It's a shame to get a shot at a full stomach." "Take, guys!" "If you find it a little bit, I'll get more." "Are you guys going to get out of here?" "And where to go?" "Who to leave the cattle?" "Don't Be afraid of the Red?" "Not all to drive in Siberia." "While we are preparing for war, Frico will board a boat and flee." "Tallinn will be released, a brave Estonian will set the tricolor flag on the tallest building and 1,918 years old." "If someone does not trip over." "Do not talk like that." "I thought then:" "What's arrest ... and remained in the city." "When I heard you guys talking about it, I rushed to the train station." "The last train had already left." "I stopped at an intersection and thought." "Perhaps it is better that it was so." "I returned home." "20-September" "Here foresters." "Pig dreams of mud and the sheep of warm water ..." "Hitler dreamed of East where there is a lot of food ..." "The withdrawal of the woods!" "Listen to my command." "Retreating to the print mind !" "Estonians, do not shoot!" "That's an order!" "Do not shoot." "Eight Estonian Corps Soviet Army 249 th Division, 917 th Regiment, n the second battalion, sixth troop" "Why did you let them go?" "When ordered to cease the fire?" "Yeah." "Fascists to be destroyed." "We do not have time to chase every guy shooting at us." "These are not children." "These are the fascists." "Captain Vijres, report to the report." "Rid the capital of Soviet Estonia Tallinn until the 22 September." "That is an order of comrade Stalin." "I'm not ready to go to court martial." "Maybe you are." "We'll see which of the two of us court-martialed." ""The Kremlin" seems no balls." "Jegi I call you in command of the detachment." "Got it!" "Bury killed and hurry to finish before they reach the NKVD." "I'll leave the truck." "And walk in it for us when you're done." "Let's go!" "Yuri, what do we do with these?" "Sahranite Them all." "Guys, what's wrong?" "Bury fascists together with our?" "For them the war is over." "What are you up to, Jurka?" "Do you know how he killed ours?" "His name was Karl Tamika." "It's my countryman." "Did you know him?" "I did not." "Lord have mercy on him and save him." "Let us go then, Jurka." "31 killed a soldier of the Soviet Army" "We heard that you had a fierce fight." "Bravo!" "These savages are getting what they deserve." "Guys, come to eat something." "Do not hesitate." "Where are you from?" "I'm from Sirve." "So far?" "Does it this far?" "Prohor comes from afar." "From Siberia." "His grandmother was Estonka." "Marija." "Yesterday, there were other m OMCI." "Where are they?" "They were sent to another location." "I participated in the war for independence." "Which unit?" "From the Estonian Corps." "Estonskog Corps?" "I did not hear you." "You can not remember all that." "Give the boys smoked meat!" "We have enough meat." "Abram!" "It is immediately obvious." "Germany." "Thank you, Grandma." "How long will all this take?" "Let's go!" "Feel sorry for them." "Why is that?" "I met so taiga hunters." "And they are Raskulacili in camp." "This is my mother." "And this father." "Now he'll show his grandfather ..." "Grandfather." "Uncle Jakob." "Uncle Jakob." "And this?" "It Zara, my sister." "Before the war, in Perm." "Now will you cry." "22-gi September Tallinn" "What are you sad?" "Come on, have a nice trip." "It is not a sin a little fun." "Sergeant Yuri Jegi." "Good evening." "Good evening." "Gradanin A. Tamika live here?" "Yes, that's me." "Aino Tamika." "Then, you ask." "Come on in!" "This is probably for you." "I ran and asked God to all This is not true." "A truck was already standing in the yard." "Mom held at Kadri hands." "She did not cry." "Mom whispered something in his ear." "My father was crazy." "I never saw him like this." "I watched from the bushes when they were completed." "Now you know everything." "Can I help you?" "As this letter has reached to you?" "I am one of those who buried your husband." "Karl is my brother." "I'm not married." "How did he die?" "Died in combat in battle." "How do you know?" "I saw it." "He died before my eyes." "Current death." "Karl was fun, talkative, jolly ..." "When we took a family ..." "In Siberia?" "... Something in him snapped." "It says why." "He thought it was his fault for having happened to mom, father and sister." "And you?" "1939 and invited me to join the army." "In June 1940 I saw when the Red Army arrived." "Why do not you fight?" "We probably were too disciplined and we waited for the order." "Or are we simply scared." "After a few months they themselves did not know how we became Red Army." "Then the war started ..." "What about your family?" "Rudy, however, Oskar, Abram, Prohor ..." "They are my family." "There are less and less." "You're very similar." "With who?" "With my brother." "The innocent feel guilty, and do not feel guilty." "Probably you are hungry?" "This is my uncle's house." "They escaped by boat to Sweden two weeks ago." "The Soviet Army, 9th March ..." "And they told us that they are The Germans did." "In the city there were only women, children and the elderly." "The men were at the front." "Most sorry children." "With us they brought a sympathy icnu girl." "I work there as a teacher." "She drew a funny sketch." "I'll show you." "Where it has gotten lost?" "It's open." "Are you staying here long?" "Or are you going next?" "Where?" "They tell us to go to the island Sarima." "We're alone here." "I think I forgave him." "Who?" "One who betrayed our family." "Someone from the family Jegi." "My brother wrote." "What is it?" "I remembered how good we are lived before the war." "Yuri, I do not know your last name." "Tul." "Juri Tul." "Comrade Jegi, come with me!" "Good day, Comrade Captain." "Together we went through the war." "From large meadow to Tallinn." "In our ranks there are still nationalists and enemies of the people." "And I know it." "You're young, energetic ..." "All have arrived." "Even a walk around the city at night." "Who is she?" "Who?" "She boulevard with Estonia." "My sister." "I visited my sister." "I looked at your file." "There is no reference to a sister." "I probably did not read carefully." "I think that we agreed." "Obaveštavaceš me as soon as you notice and the smallest anti-Soviet facts from ordinary soldier to the highest officers." "You can go!" "17th November Saremaa" "Prohor, leave!" "Less out of the barn!" "But he returned." "The boy returned home." "Here is born." "He came straight home." "My grandmother used to say that the country is small, but it's just so small ..." "Juri, go with it!" "Well, hosts, saves j bathroom, prepare food ..." "Not a soul." "And barn is empty." "Immediately'll look for something to eat." "She arrived filling." "Three of the soldiers." "Wait in front of the door." "Let them come." "Got it!" "Comrade Senior Sergeant, let go!" "I am your commander, Yuri Jegi." "Dismissed!" "Admit when you served in the German army?" "I fought in Sinimaea." "I ran home when the Germans began to retreat." "There we were captured by the Russians." "And me too." "I deserted." "Forget the past." "There will survive Only the one who knows how to keep his mouth shut." "Is that clear?" "Of Course!" "But!" "Tul Red Army!" "But where have you gone?" "Pekala The guys potatoes." "Feed them, Hungry." "Eat As you like." "The basement has a potato you want." "Do not leave anything rats." "But!" "Did you find out something about your family?" "All farms in Sirvaste are destroyed." "The people taken to Germany." "The war will end quickly." "All will return." "My house was intact, and I'm alive." "Here, on this farm, We will be attacking Fritz." "Before us, this place will shoot our artillery." "Frico are here set minefield." "We will pass through here in our tanks." "And why do we go forward?" "Komandir Troops wants to go first." "Frico have prepared ships on the coast." "You must destroy them." "Where is our invincible Red Fleet?" "Cesa Eggs in Kronstadt." "Stalin 100 grams." "Let's drink!" "Hell, Juri, completely forgot." ""The Kremlin" and called." "Yes!" "Sergeant Yuri Jegi the appears on your orders." "Close the door!" "Sit down!" "To victory!" "Did you arrived filling?" "Yes." "Three." "Have you checked?" "I did." "You're a good family." "You always make the right decisions." "As your father in his time." "You're still not a party member?" "I did not." "Maybe it's better that way." "Ulivaš confidence." "Far you have gone." "I'll send you to the course." "You'll get a star." "You will become a company commander." "Well we get along." "We already have a company commander." "Captain Vijres." "Daikon." "Outside red, inside white." "Such as Vijres be good to watch." "Do not spoil your life, Juri." "19-November" "The last line of defense of the German Army on the peninsula Sirve" "The minefield is on both sides!" "Get behind the tanks!" "Get up and go for a tank!" "Come on, move on!" "Do not go there!" "There is a minefield!" "Take cover behind a stone wall!" "Prohor!" "Oskar!" "Abram, Kjaer, for me!" "Prohor, Abram, for me!" "Oskar, for Ali!" "But ..." "Get out!" "With your hands up!" "Get out!" "With your hands up!" "You think it will return Sara?" "What is it?" "Not sleeping?" "I can not forget this guy." "I took his last letter ..." "his sister." "Jes tell her the truth?" "You could not?" "So you're in a bad mood?" "Do not worry, Jurka." "You did not kill her." "He was killed by war." "God will forgive you." "It will help you and goodbye." "22-gi November." "Just a little more and Estonia is ours." "Come on, let's go!" "Yuri, the Political Department interested in you." "We're in shit up to his neck." "We will not wait for old age." "I just wanted to bring the boys back home, and where I have to bring?" "Stop!" "Hooks up!" "Do not shoot, we are Estonians!" "Silence!" "Do not shoot!" "Get out!" "With your hands up." "Easy!" "Name?" "Hard Hirv." "How old are you?" "16." "Volunteer?" "No." "The Germans picked us up." "At the airport." "They wanted to send us to Germany and we wanted the house." "Juri, get your people!" "Fire at enemies." "Comrade Captain ..." "These are children." "Soviet citizens who cross on the side of the enemy are punishable by firing squad on the spot." "Sergeant Major Jegi, complete the order!" "Mobilisali Them." "Juri, fulfill orders!" "I can not shoot them." "Shoot!" "Shoot, and all your will end up in the camp." "You're afraid of?" "Right." "Soviet authorities feared." "Captain Vijres, complete the order!" "Another platoon, forward!" "Guys, go home!" "Have you heard?" "Take off your uniforms and go home." "One thought does not give me peace." "What if you did not bring this letter?" "Would you happen to be met?" "After the war." "Maybe even in the church." "Good afternoon." "Good afternoon." "A live here, Tamika?" "Yes, I'm Aino Tamika." "Then, you ask." "Good day!" "Come in." "Who knows, maybe we'll meet again." "How did you sleep?" "Good." "If I could look into her eyes, I have to tell the truth." "It should start from the beginning." "It says it Juri Jegi, soldier of the Soviet Army who was killed in fighting your brother." "I did not have the courage to I tell you this in person." "Now I have only you in the world." "Forgive me if you can ..." "Dedicated to all those who fought and died for independence" "Slavorkc-Keresturi 02.05.2015."
|
Labels:
Just want share about tattoos rosary. Tattoos design on foot which can make the girls very beautifull. Looks simple rosary tattoos design on foot above , may be you will make this tattoos design pemanently. But if you want to create it permanently you should think before because not easy to remove tattoo from your body althought use tattoos removal :)
Labels:
In this world you never fell " love " , now if you can show your love to someone and want to create tatto for do it, you can find ideas from this tattoos design. Tattoos design for girls and men which simple but enaought for show your love to someone. now you can save this tattoo quotes about love to your PC , i hope this very usefull for you.
Labels:
with a permanent tattoo, it is important that you select just the right kind of tattoo design for yourself, one that fulfills the following very important requirements.
The tattoos design that you select should be - exactly and only - the one that you were looking for. See that you do not compromise on the shape, size and pattern of the tattoo design, due to any reason at all, for then you are bound to regret getting it done in the first place.
Apart from the pattern of the tattoo design, the colors and hues that you want your tattoo to display should also be the ones of your choice, and preferably ones that suit your skin tone.
It is extremely important that you remember the main reason behind getting the tattoo, and hence, also see that the tattoo design you select portrays the emotions behind it correctly. If it is for mere fashion, you could choose a trendy tribal tattoo design, or a symbolic and stunningly exquisite butterfly tattoo design.
Other than the requirements of the tattoo design that you choose, there are some that you as a purchaser need to consider, while looking for the perfect one. Here are the steps that you need to follow:
First, see that you look through all the available tattoo designs based on your chosen concept, present in various galleries on the internet, or with professional tattoo artists, and only then make your choice. If you want to bear a unique tattoo design, you could ask an artist to create one for you. Also keep in mind where exactly you you’re your tattoo to be situated on your body, and pick accordingly. Remember to keep the budget in mind too.
Next, you ought to find just the right tattoo artist, who will imprint the design onto your skin. You need to be careful while choosing one; see that he or she is a legitimate and expert flash artist.
Make sure that the needles and instruments used by the artist are sterile, you don’t want to end up with any kind of troubles due to it.
Once you have had your spectacular flash art inked into your skin, you will be ready to show it off to jealous viewers, and look gorgeous altogether. However, do remember to be absolutely certain that you want the tattoo, first of all, and also of the design that you select, for the simple reason that if you regret it later, the process of removal will not only be painful, but also very expensive. So choose wisely.
Labels:
Tattoo fonts style on back and side body for men is very good design. i like this tattoos design, are you like it ? you can try draw tattoo by your own but for example your tattoo you can follow this tattoo fonts style.
Labels:
Just want share about tattoo fonts script , hand tattoos design ideas for you all. before ypu create tattoos design on your body , you should where the tattoos will see beautifull. now you can find ideas in this site, Tattoos design ideas in this site is free , please save this pictures hand tattoo fonts script above if you like it.
Labels:
Tattoo flash collection for you all. i have best tattoo flash , tattoo ideas for make tattoos design on our body. Very simple design ideas , but i think very beautifull. are you like tattoo flash ?? this flash tattoo collection for you. i hope this very help you to get ideas.
Labels:
Tattoo lettering ideas, Tattoos design on back which can give me ideas how to make good tattoo lettering on my body. are you girls ?? tattoo lettering on back above is one ideas for girls , if yoiu the girls may be this tattoo design can give you ideas. i like share information and ideas to other people , now you can save this tattoo lettering to your pc. Thanks find my site :)
Labels:
Brian Littrell is an American singer-songwriter, known as a member of the music group Backstreet Boys, and for albums such as Millennium and Black & Blue.
Brian Littrell has been spotted with a couple of tattoos, including a religious masterpiece on his left shoulder which contains a cross with clouds and sunbeams, the saying "Rock of Ages", along with an angel head and wings.
His other tattoo is an armband of lyrics reading "It was the 15th of June when she walked in my life, it was the first time someone said hello with her eyes".
Labels:
Just share about lil wayne face tattoos 2010 , tattoos ideas on face for you all. Simple face tattoos design ideas which can you follow. Share this lil wayne tattoos on face to other people which like with this artist. Please give me comment, thanks before . . .
Labels:
Kat Von D tattoos design have know many people in the worlds. Star Tattoo on face kat von d may be will follow many people in the world particularly is the girls. Star tattoos on face indeed very match for girls , this tattoos design can make the girls very beautifull. But not all the girls like face tattoos , some girls just like tattoos on foot or tattoos on wrist.
|
Each advance in electronic components can cause increases in heat generation in a smaller package size. Due to these factors, there is a need for dissipation of the heat generated by these components. For example, there is a current need to dissipate heat from personal computer Central Processing Units (CPUs) in the range of 50 to 150 W.
Forced and natural convection air cooling methods, used in conjunction with heat sinks and heat pipes, currently serve as the predominant method of cooling electronics. The current conventional air cooling systems that use aluminum extruded or die-casting fin heat sinks are not sufficient for cooling the high heat flux of chip-surfaces or for large heat dissipation with low thermal resistance and compact size. Further, these air-cooled heat sinks require a substantial surface area to effectively function. To be able to transfer the increased heat load, the air-cooled heat sinks have become even larger. This requires the use of larger fans to overcome back-pressures caused by the large heat sinks. In other words, current air-cooled heat sinks require substantial space on the one hand, while blocking airflow entry and escape paths on the other. Thus, current cooling methods are unequal to the task of removing heat.
Moreover, the use of progressively larger fans increases the amount of acoustic noise generated by the cooling system and also increases the amount of electric power drawn by the system. For example, conventional solutions include use of multiple heat pipes to carry the heat to large heat sinks via high airflow. This leads to solution with high noise levels, which are undesirable.
Furthermore, a shortcoming of current traditional fan based heat dissipation methods is that heat is transferred in only one direction because a fan is placed to blow air in one direction over the heat sink. This limitation causes non-uniform temperature gradients across the heat sink and correspondingly, across the electronic component.
Due to these factors, and other shortcomings, there is a need for a more efficient and effective cooling system.
|
a) 0 (b) -3 (c) s
c
Let n(z) = -z**2 - 16*z + 16. Let r be n(-17). Let m = -1176 + 4701/4. Which is the closest to 3? (a) r (b) 0.5 (c) m
b
Let v(o) = o**3 + o**2 - 4*o - 4. Let t be v(-3). Let f = 33813 - 33811. What is the closest to f in -0.1, t, 2/5?
2/5
Let j = -443 + 319. Let h = j - -493/4. What is the closest to h in -0.05, -2, 3?
-0.05
Let i = -2678 + 2678. What is the closest to -4 in i, 37/5, 4?
i
Let l be 0/((-1)/(0 - 1)). Let i = 73 + -78.1. Let g = i + 0.1. What is the nearest to 2/3 in l, g, 1?
1
Let k = 0.042 + -0.042. Let o = -0.03 - 0.97. What is the closest to k in -4/3, -0.3, o?
-0.3
Let k = 1369 - 940. What is the closest to 1/3 in k, 0.4, -0.2?
0.4
Let v be 576/20664*14/8. Which is the nearest to 1? (a) 3/4 (b) 3/5 (c) v (d) 0
a
Let i = -19184 + 19183.98. Which is the nearest to i? (a) -2/5 (b) 5 (c) -0.1 (d) -9
c
Let v = -1715 + 1715.4. Which is the nearest to 1? (a) -0.2 (b) v (c) 1 (d) -11/5
c
Let n = 4966/3 - 1656. Let t = 0 - -2. Let h be -7*1 + (-176)/(-22). What is the nearest to h in -2.6, n, t?
t
Let z = -461 + 457. Which is the nearest to -0.4? (a) -0.32 (b) -0.3 (c) z (d) 0.4
a
Let r = -5.0846 - -0.0846. Let w = -50 + 46. Which is the nearest to -3? (a) w (b) 0.1 (c) r
a
Let s = -104951/13 + 8073. What is the closest to 0 in -0.06, s, 79, 6/7?
-0.06
Let w = -3.478 + 3.078. Which is the closest to -2? (a) 4 (b) -0.89 (c) w
b
Let z = 7/515 + -316/515. What is the closest to 8 in z, 0, -1/2, 3?
3
Let u be ((-6)/(-20))/((-1467)/(-6520)). Let h = 6 - 4. Which is the nearest to 1/5? (a) h (b) u (c) 4
b
Let v = -1 + 0.8. Let k be -4 + 3/15*-97. Let p = k + 219/10. Which is the nearest to v? (a) 1 (b) p (c) 2/13
c
Let z = -1.879 + -0.121. Which is the closest to -0.2? (a) -0.4 (b) 5/44 (c) z
a
Let l = 1.1 + -0.1. Let r = -1244.2 + 1247.2. What is the nearest to l in -2/7, -2, r?
-2/7
Suppose -4*s = 5*v - 9, -6*v + 15 = -3*v. Let g be ((-5)/s)/(10/12). Which is the nearest to g? (a) -3 (b) -4 (c) 1
c
Let l be ((-3)/8)/(4/(-288)) + 0. What is the nearest to l in -1/3, -5, -6, 0.3?
0.3
Let a = 3/5285 - 15879/42280. What is the closest to 10 in -4, 12, -1/3, a?
12
Let y be (-6)/90 + ((-42)/(-9))/7. Which is the closest to 9? (a) 2/5 (b) -1/12 (c) y
c
Let g = -0.18 - -3.18. Let j be (57/60)/19*(-165)/(-22). Which is the closest to -0.1? (a) 0 (b) g (c) j
a
Let g = 101.9 + -102. Let r(x) = x**2 - 10*x + 12. Let u be r(2). Which is the closest to 2.6? (a) -1 (b) u (c) 0.3 (d) g
c
Let z = -1.3 - -0.8. Let x = -0.233 - 218.767. Let f = -219.1 - x. Which is the nearest to 1/2? (a) f (b) -3/8 (c) z
a
Let y = 0.0966 + 558.9034. Let l = y - 558.9. What is the nearest to l in 0.4, -4, -11, -2?
0.4
Let j = 2928 + -2927. What is the nearest to 20 in -4, j, 5, -3?
5
Let m = -2 + 3. Let i be (-1)/(-4) + m/(-2). Let g = 626.3 - 631.3. Which is the closest to -1/2? (a) g (b) 9 (c) i
c
Let k = 1.2939 - -2.7061. What is the nearest to 0.1 in 2, -7, -5, k?
2
Let q = -4111 - -4105. What is the nearest to q in -4, -1/4, 0, -34?
-4
Let i = -243.5 + -77.5. Let j = i + 321.3. Which is the nearest to -0.1? (a) 17 (b) 5 (c) j
c
Let k = -0.08 + -0.57. Let s = -1.65 - k. Let o be (1 + -7)*(-3)/171. What is the nearest to s in 5, -5, o?
o
Let s = -18.393 + 0.193. Let u = 24.2 - 6.2. Let r = s + u. Which is the closest to -0.3? (a) -0.3 (b) r (c) 1/2
a
Let w = -8 - -6. Let o be (-272)/10 + ((-56)/(-5))/(-14). Let l be (-2 - (5 + -6))/(o/(-4)). Which is the closest to w? (a) -1/4 (b) -2/7 (c) l
b
Let t = -0.16141 - 53.83859. Which is the nearest to 3? (a) 0 (b) 0.2 (c) t (d) 0.3
d
Let g = 0.1 + -0.2. Let x = -5.3 + 649.3. Let i = x + -642. Which is the nearest to g? (a) i (b) 3/8 (c) -3
b
Let x = 0.2 + 0.1. Suppose 492 = 4*n - 1036. Let o = -383 + n. What is the closest to o in 5, x, -2?
-2
Let u = -81 - -741. Let v = u + -659.8. Which is the closest to v? (a) -3/5 (b) 2 (c) 1/4 (d) -0.1
c
Let q = 38/7 - 660/119. Let g(f) = 2*f**3 + 58*f**2 - 60*f - 4. Let h be g(-30). Let i = -134 - -131. Which is the closest to 0.2? (a) h (b) i (c) q
c
Suppose -7 = -2*v + u - 11, v + u = 4. Suppose 2*p + 26 = -4*x + 8, v = -3*p - 3. Which is the closest to x? (a) 0 (b) 0.03 (c) -5/2
c
Let l = -83.2 + 56. Let r = l + 26.8. What is the nearest to 0.2 in -3, r, -2.9?
r
Let t = -0.12557 - -0.06557. Which is the closest to -2/3? (a) t (b) 1/7 (c) 1/25 (d) 1/4
a
Let m = 10427 + -41711/4. What is the closest to -0.4 in -0.3, -0.4, m, 9?
-0.4
Let r(n) = n**2 + 5*n - 5. Suppose 0*j - 6 = j. Let k be r(j). Suppose 34 = 136*t - 116 + 14. Which is the closest to k? (a) 0.5 (b) 0 (c) t
c
Suppose 16 = -3*j + 5*j + 2*b, -16 = -5*j + b. Suppose -3*g + 4 = z - 6, 18 = j*z + g. Let w be (-9)/z + -6 + 9. What is the nearest to w in -5, 1, 2/3?
2/3
Let f = 3212 - 22483/7. Which is the nearest to 1? (a) -0.12 (b) 5/2 (c) 7 (d) f
d
Let j be (-184)/10*(434/(-77) + -3). Let l = j - 159. Which is the nearest to 3? (a) l (b) 2/11 (c) 3
c
Let k = 99.9 - 100. Let h = -0.42 + -3.38. Let w = 3.79 + h. What is the closest to w in k, 5, 3?
k
Let u be -1 - (10/(-3))/2. Let p be ((-73 - -73)/(-37))/(2/(-2)). What is the nearest to p in 3, u, 48?
u
Let w be (-3536)/(-572) + -2*(-6)/(-2). Let d be (-4)/5 - (-28)/70. Which is the nearest to d? (a) -1 (b) w (c) -2
b
Let w = 14546.2 + -14546. Which is the closest to w? (a) -0.037 (b) 1/6 (c) -0.3 (d) 0
b
Let h be (13373974*(-2)/(-99))/(8 - 9). Let k = -270186 - h. Let w = k - -44/9. What is the closest to -1 in -1/5, 0.5, w?
-1/5
Let r be (3*(-3 - (-28)/10))/(12/(-4)). What is the nearest to 0 in 2/21, r, -14?
2/21
Let j(a) = -a**3 + 6*a**2 + 6*a + 12. Let d be j(5). Suppose 6*h + d = 91. What is the closest to -3 in 1.8, h, -3?
-3
Let i = 119/55 + -15/11. Let p = -735.18 - -729. Let x = p + 5.98. Which is the closest to x? (a) -0.4 (b) i (c) 0.1
a
Let r = 8 + -7.6. Let v = -10.3 + 10.8. Let y = 0.1 - 0.2. Which is the nearest to y? (a) r (b) v (c) -0.04
c
Let f = -1118 - -986.9. Let m = 131 + f. Let j(g) = -g**3 - 7*g**2 + 9*g + 12. Let x be j(-8). Which is the closest to m? (a) -0.4 (b) x (c) 0.03
c
Let y = -541 + 540. Which is the nearest to y? (a) -0.1 (b) -2/15 (c) 0.3 (d) 203
b
Let h(x) = -3*x**3 - 101*x**2 + 22*x + 33. Let t be h(-34). Let o = 449 - t. What is the nearest to o in 1, 0, 2/13, 0.1?
1
Let y be 8/(-10) - 4/20 - 3. Let l = 28 - 23. Suppose 2*h - l*j + 0*j = -26, -4*h = 4*j - 4. What is the nearest to 0 in h, y, 1/7?
1/7
Let s be ((-1)/(-2))/((-430)/172). Let t be 2/11 - (-192)/(-88). What is the closest to 2/3 in 2/17, t, s?
2/17
Let l = 3 - 5. Let f = -84156 + 84155.6. Which is the nearest to -1/2? (a) l (b) -0.035 (c) f
c
Let c = -68364 - -68367. Let a = 2 + -1. Let w = -6 - -3. What is the closest to -8 in c, a, w?
w
Let u = 8049 + -8047. What is the closest to u in 0.11, -0.07, -3/5, 3?
3
Let n = -17474 - -17435. What is the nearest to -1/4 in 0, 0.4, n, 1?
0
Let b be (682/93 - 6)*9/(-174). What is the nearest to 1 in 142, b, 1?
1
Let q = -1702 + 1701. What is the closest to -2 in q, 4/5, 0.2, 3?
q
Let i be (-1)/((-11)/(-24)) - -2. Let v be -1*(-24)/18*-2*(-6)/(-56). Which is the closest to v? (a) 2/9 (b) i (c) 2 (d) 2/11
b
Let i = -11.9 + 13. Let k = 5.1 - i. Let l be (6 - 116)/(-11) + 13/(104/(-88)). What is the nearest to 6 in 5, k, l?
5
Let i = 4 - 5. Let u(c) = -2*c**2 + c + 28. Let o be u(4). What is the closest to o in -3, -1/12, i?
-1/12
Suppose -l = 3*l - 940. Let s = l - 2113/9. What is the nearest to -2 in s, 5, 6?
s
Let u = 104.1 - 105.1. Let l = -5 + 4. What is the closest to l in u, -0.2, -0.06?
u
Let z = 10 - 14. Let x = 953156 - 953153. What is the nearest to 11 in x, -2, -3, z?
x
Let o be 112/24 + (-8)/3 + 3. Suppose 8*v = o*v - 2*f + 1, 0 = -5*v + 4*f + 9. Let u be 3*1/9*-1. Which is the closest to 0.2? (a) u (b) -0.4 (c) v
a
Let q(f) = -17*f + 18. Let r be q(0). Let b be 5/(-7) - (r/(-14))/3. Let k = -0.1 - 0. What is the nearest to k in 2, b, -1/2?
b
Let h = -0.1275 - -0.0575. Which is the closest to h? (a) 3 (b) 0.1 (c) -3
b
Let w(d) be the third derivative of d**5/12 - d**4/24 + d**2. Let l be w(-1). Let m = 171837 + -171840. What is the nearest to l in 5, 1/3, m?
5
Let r be (0 - 1
|
1. Field of the Invention
The present invention relates to a wear detection probe of a braking element and to a braking element using the same.
2. Description of the Prior Art
A wear detection probe for detecting the wear of a brake pad of an automotive vehicle to the degree that it cannot be used any longer or to an operating limit has been conventionally developed. This prior art wear detection probe is, as shown in FIG. 10, comprised of a detection wire 3 turned in U-shape and a holding member 2 for holding the detection wire 3 such that a turned portion 3a of the detection wire 3 is exposed from a leading end surface 2a. The wear detection probe 1 is mounted on a mount plate 5 of a brake pad (not shown) in such a manner that the turned portion 3a faces a disk rotor 4.
When the wear of the brake pad progresses, the wear detection probe 1 is exposed at the surface of the brake pad. If the brake pad is further worn, the turned portion 3a of the detection wire 3 also starts being worn. When the brake pad is worn to an operating limit, the detection wire 3 is broken. When an unillustrated detecting circuit connected with the detection wire 3 detects the broken wire, a warning lamp for notifying that the brake pad has been worn to the operating limit is turned on.
In this wear detection probe, as a means for holding the detection wire 3 in the holding member 2, two straight through paths 2b extending along forward and backward directions are formed in the holding member 2b; the opposite sides of the folded detection wire 3 are inserted into the through paths 2b from front; and the detection wire 3 is held by a retainer 6 at the rear end surface of the holding member 2.
The above prior art probe has the straight through paths 2b as the arrangement paths for the detection wire 3 in the holding member 2. Accordingly, when the turned portion 3a comes into contact with the disk rotor 4 and the detection wire 3 is strongly pulled forward, the detection wire 3 may be displaced in withdrawal direction against the holding force of the retainer 6.
In view of the above problem, an object of the present invention is to prevent a displacement of a detection wire.
|
[Mitochondrial DNA4568 deletions in guinea-pig associated with presbycusis].
To determine weather or not the mtDNA(4568) deletions in guinea-pig contribute to the development of presbycusis. Forty-four guinea-pigs were divided into 2 groups: group A (young control group, normal hearing, 22 guineas) and group B (aged group). The group B was subdivided into group B(1) (old normal hearing, 6 guineas) and group B(2) (old hearing loss, 16 guineas). First the guineas were tested by auditory brainstem response (ABR), and then the Cortis's tissues, auditory nerve tissues, brain and blood were harvested and the total DNA was extracted. The mtDNA(4568) deletion was analyzed by PCR. Hearing loss was occurred with age. The mtDNA(4568) deletion incidence of aged group in all tissues was significant higher than that of young control group (P< 0.05). The incidence of mtDNA deletion in Cortis's and auditory nerve with presbycusis (B(2) group) were significant higher than that of aged normal hearing group (B(1) group) (P< 0.05). The incidence of mtDNA deletion in brain and blood was not significantly different between presbycusis and aged normal hearing group (P> 0.05). mtDNA(4568) deletion of guinea-pig possibly contributes to aging and mtDNA(4568) deletion in Cortis's and auditory nerve tissues of guinea-pig may be associated with presbycusis. There is no enough evidence to prove that the mtDNA(4568) deletions in brain and blood are related with presbycusis.
|
Q:
Get tablename from function
I am creating tables. The tablenames are created dynamically.
Now the analysts say they need a field called 'dataset' that contains the name of the table.
Long story why they want it, apparently it is a deal killer if it's not in there.
So I was thinking of adding a computed column along the lines of
create table test
(
id int identity(1,1),
field1 nvarchar(256) null,
dataset as table_name() --<-- this is what I am looking for
)
I know of the functions DB_USER(), @@SERVERNAME and so on, is there something like that for the table? For example CURRENT_TABLE()?
Since I create the tables dynamically it is quite easy to add the column and fill it during creation but this question popped up and it keeps bugging me.
A:
Not surprisingly, it seems there is no function that returns a table_name.
So I did what I normally do in such a case, create the tabel dynamically using sp_executesql and a string that I build, including c2 = @varTable_name.
declare @table_name as nvarchar(1000) = 'mytable'
declare @sql as nvarchar(1000) = 'create table ' + @table_name + '(
c1 INT NOT NULL IDENTITY(1,1),
c2 AS ''' + @table_name +''');'
exec sp_executesql @sql
I was just wondering if there was a function that I could use instead of the var @table_name
|
package com.sanshengshui.iot;
import lombok.extern.slf4j.Slf4j;
import org.junit.Test;
import org.junit.runner.RunWith;
import org.springframework.beans.factory.annotation.Autowired;
import org.springframework.boot.test.context.SpringBootTest;
import org.springframework.data.redis.core.StringRedisTemplate;
import org.springframework.test.context.junit4.SpringRunner;
@RunWith(SpringRunner.class)
@SpringBootTest
@Slf4j
public class RedisTests {
@Autowired
private StringRedisTemplate redisTemplate;
@Test
public void HyperLogLogTest(){
for (int i = 0;i<100000;i++){
redisTemplate.opsForHyperLogLog().add("codehole","user"+i);
}
}
}
|
Introduction
============
This survey sought to evaluate differences in the understanding and management of shunt-dependent hydrocephalus among the senior North American Pediatric Neurosurgery membership.
Methods
=======
Surveys were sent to all active American Society of Pediatric Neurosurgeons (ASPN) members from September to November 2014. A total of 204 surveys were sent from which 130 responses were recorded, representing 64% of active ASPN membership. Respondents were asked 13 multiple choice and free response questions focusing on four problems encountered in shunted hydrocephalus management: Shunt malfunction, cerebrospinal fluid (CSF) overdrainage, chronic headaches and slit ventricle syndrome (SVS). Qualtrics® online survey software was used to distribute and collect response data.
Results
=======
ASPN surgeons prefer three varieties of shunt valves: 41% differential pressure, 29% differential with anti-siphon device (ASD), and 27% programmable. Respondents agree shunt obstruction occurs most often at the ventricular catheter due to either in-growth of the choroid plexus (67%), CSF debris (18%), ventricular collapse (8%), or other reasons (9%). Underlying causes of obstruction were attributed to small ventricular size, catheter position, choroid plexus migration, build-up of cellular debris, inflammatory processes, or CSF overdrainage. The majority of respondents (\>85%) consider chronic overdrainage a rare complication. These cases are most often managed with ASDs or programmable valves. Chronic headaches are most often attributed to medical reasons (e.g. migraines, tension) and managed with patient reassurance. The most popular treatments for SVS include shunt revision (88%), cranial expansion (57%) and placement of an ASD (53%). SVS etiology was most often linked to early onset of shunting, chronic overdrainage and/or loss of brain compliance.
Conclusions
===========
This survey shows discrepancies in shunt-dependent hydrocephalus understanding and management style among a representative group of experienced North American pediatric neurosurgeons. In particular, there are differing opinions regarding the primary cause of ventricular shunt obstructions and the origins of SVS. However, there appears to be general consensus in approach and management of overdrainage and chronic headaches. These results provide impetus for better studies evaluating the pathophysiology and prevention of shunt obstruction and SVS.
|
# The rhn-client-tools Makefiles might not be set up in the smartest way. This
# Makefile doesn't worry about anything outside of this directory even if these
# files need them, such as the glade files. Be sure to run make in
# rhn-client-tools and not here.
PYCHECKER := /usr/bin/pychecker
BIN_DIR := $(PREFIX)/usr/bin
SBIN_DIR := $(PREFIX)/usr/sbin
INSTALL := install -p --verbose
INSTALL_DIR = $(INSTALL) -m 755 -d
INSTALL_BIN := $(INSTALL) -m 755
DIRS = $(BIN_DIR) $(SBIN_DIR)
$(DIRS):
@$(INSTALL_DIR) $@
all:
echo "Nothing to do"
install:: all $(DIRS)
$(INSTALL_BIN) rhnreg_ks.py $(SBIN_DIR)/rhnreg_ks-$(PYTHONVERSION)
$(INSTALL_BIN) rhn_register.py $(SBIN_DIR)/rhn_register-$(PYTHONVERSION)
$(INSTALL_BIN) rhn-profile-sync.py $(SBIN_DIR)/rhn-profile-sync-$(PYTHONVERSION)
$(INSTALL_BIN) rhn_check.py $(SBIN_DIR)/rhn_check-$(PYTHONVERSION)
$(INSTALL_BIN) spacewalk-channel.py $(SBIN_DIR)/spacewalk-channel-$(PYTHONVERSION)
$(INSTALL_BIN) spacewalk-update-status.py $(SBIN_DIR)/spacewalk-update-status
# OTHER targets for internal use
pychecker::
@$(PYCHECKER) $(PYFILES) || exit 0
graphviz::
@$(PYCHECKER) -Z $(PYFILES) || exit 0
clean::
@rm -fv *.pyc *~ .*~
|
{
"name": "kleinfreund.de",
"url": "https://kleinfreund.de/",
"description": "The personal web site of Philipp, a web developer from Weimar, Germany.",
"source_url": "https://github.com/kleinfreund/kleinfreund.de",
"twitter": "kleinfreund"
}
|
Q:
Is there any way to speedup be32 encoding in C?
Is there any way to speedup be32enc in C? Here's an example of what I do for uint32_t:
for (int i=0; i < 19; i++) {
be32enc(&endiandata[i], pdata[i]);
}
And the function itself:
static inline void be32enc(void *pp, uint32_t x)
{
uint8_t *p = (uint8_t *)pp;
p[3] = x & 0xff;
p[2] = (x >> 8) & 0xff;
p[1] = (x >> 16) & 0xff;
p[0] = (x >> 24) & 0xff;
}
I've googled hard, but haven't found anything - this topic is not so popular. Target CPU for this would be i3-7350k and I use msvc2017. May use MIT/GPL libs as well.
A:
There are two modifications that are likely to improve the performance of your be32inc function. First get rid of the pointer magic and make it a function from uint32_t to uint32_t. Second, if you don't need to be portable to other architectures than x86, implement it using the _bswap-intrinsic.
|
Q:
Python/Rest. Check if entry already exists and do something
im new to python and would like to do the following:
I recieve a json via requests.get. I want to iterate over it and print all entries which do not have 'name' : 'xyz'.
I do:
s = requests.get(instrItemList, verify=False, auth=auth)
j = s.json()
Now i would like to iterate over j and say: print only those names of items which are NOT 'name' : 'xyz'. Something like:
for entry in j:
...
print entry ['name']
Thanks.
Kind regards
Edit:
i would like to specify my question:
I want to add an item only if it does not exist in j. Therefore i need to check the "name" Field, which looks like this:
[ {
"uri" : "/item/12947",
"version" : 1,
"tracker" : {
"uri" : "/category/73718",
"name" : "Instructions"
},
"priority" : {
"id" : 2,
"name" : "High",
"flags" : 0
},
"name" : "Testitem",
"status" : {
"id" : 1,
"name" : "New",
"flags" : 0
How can i manage to say:
if "Testitem" not in j: ... here i need to say that only the "name:" value needs to be checked....
print "Item does not exist and has been created"
else: print "Item already exists"
A:
for entry in j:
if 'xyz' not in str(entry):
print(entry)
|
Nucor Corporation
U.S. stocks staged a late recovery Thursday and finished mostly higher, led by technology and metals companies. Energy companies continued to fall with the price of oil.
In early trading, the Dow Jones industrial average lost as much as 105 points. But those losses faded midday and stocks finished more or less where they started. Banks and utility companies slipped, and energy companies took losses as oil prices fell for the fourth day in a row.
It has been almost two months since the stock market last made a big move. The market recorded a tiny loss in August after an extraordinarily quiet month.
Benchmark U.S. crude is down more than 9% this week, but it has stayed...
Related "Nucor Corporation" Articles
U.S. stocks staged a late recovery Thursday and finished mostly higher, led by technology and metals companies. Energy companies continued to fall with the price of oil.
In early trading, the Dow Jones industrial average lost as much as 105 points. But...
|
FILED
United States Court of Appeals
Tenth Circuit
UNITED STATES COURT OF APPEALS October 16, 2019
Elisabeth A. Shumaker
TENTH CIRCUIT Clerk of Court
WILLIAM HENDERSON,
Plaintiff - Appellant,
v. No. 19-3120
(D.C. No. 6:18-CV-01253-JTM-GEB)
CARGILL PACKING PLANT, (D. Kan. )
Defendant - Appellee.
ORDER AND JUDGMENT *
Before CARSON, BALDOCK, and MURPHY, Circuit Judges.
After examining Appellant’s brief and appellate record, this panel has
unanimously concluded that oral argument would not materially assist the
determination of this appeal. See Fed. R. App. P. 34(a)(2); 10th Cir. R. 34.1(G).
The case is therefore ordered submitted without oral argument.
Proceeding pro se, William Henderson appeals the district court’s dismissal
of the civil action he brought against defendant Cargill Packing Plant (“Cargill”).
*
This order and judgment is not binding precedent except under the
doctrines of law of the case, res judicata, and collateral estoppel. It may be cited,
however, for its persuasive value consistent with Fed. R. App. P. 32.1 and 10th
Cir. R. 32.1.
In his original complaint, Henderson seemingly alleged that Cargill’s failure to
hire him violated Title VII of the Civil Rights Act of 1964 and the Age
Discrimination in Employment Act of 1967. Because the complaint contained
insufficient factual allegations to discern Henderson’s specific claims for relief,
he was ordered to file an amended complaint. See Fed. R. Civ. P. 8(a). After
Henderson filed an amended complaint, a United States magistrate judge
recommended dismissing it without prejudice because it still failed to comply
with Rule 8 of the Federal Rules of Civil Procedure. In a comprehensive Report
and Recommendation, the magistrate judge concluded the amended complaint
stated grounds for federal jurisdiction, named three defendants, and sought $2.8
million in damages, but still failed to provide Defendants with sufficient notice of
Henderson’s claims. 1 Id. at 8(a)(2) (requiring all civil complaints to contain “a
short and plain statement of the claim showing that the pleader is entitled to
relief”).
A copy of the Report and Recommendation was mailed to Henderson by
certified and regular mail. In it, Henderson was specifically advised of his right
to file written objections within fourteen days and also advised that his failure to
make such objections would waive appellate review of the factual and legal issues
1
For example, Henderson’s amended complaint alleges that defendant
Flores is an “HR person” who called him on June 20, 2017, and told him he “as
person [r]ejected deposited.”
-2-
addressed in the Report. Nevertheless, Henderson failed to file a timely response
to the Report and Recommendation.
The district court adopted the Report and Recommendation in its entirety.
Accordingly, it dismissed Henderson’s amended complaint without prejudice for
failure to comply with Rule 8 of the Federal Rules of Civil Procedure. Judgment
was entered on May 20, 2019. Henderson filed a timely notice of appeal.
This court has “adopted a firm waiver rule when a party fails to object to
the findings and recommendations of the magistrate.” Moore v. United States,
950 F.2d 656, 659 (10th Cir. 1991). “Our waiver rule provides that the failure to
make timely objection to the magistrate’s findings or recommendations waives
appellate review of both factual and legal questions.” Id. “This rule does not
apply, however, when (1) a pro se litigant has not been informed of the time
period for objecting and the consequences of failing to object, or when (2) the
interests of justice require review.” Morales-Fernandez v. INS, 418 F.3d 1116,
1119 (10th Cir. 2005) (quotation omitted). Neither exception to the firm waiver
rule applies in this case. First, it is clear from the record that Henderson was
expressly advised of the fourteen-day time period and the consequences of his
failure to file timely objections to the magistrate judge’s Report and
Recommendation. Further, the interests of justice do not require appellate review.
See Wirsching v. Colorado, 360 F.3d 1191, 1197-98 (10th Cir. 2004) (discussing
-3-
the interests of justice exception to the firm waiver rule). We consider several
factors in determining whether to apply the interests of justice exception,
including “a pro se litigant’s effort to comply, the force and plausibility of the
explanation for his failure to comply, and the importance of the issues raised.”
Morales-Fernandez, 418 F.3d at 1120. Here, Henderson made no effort to
comply, has offered no explanation for his lack of compliance, and his appellate
brief does not raise any issues of sufficient importance to overcome the waiver.
See Duffield v. Jackson, 545 F.3d 1234, 1238 (10th Cir. 2008) (“[T]he interests
of justice analysis . . . is similar to reviewing for plain error.” (quotation
omitted)).
For the foregoing reasons, the district court’s order dismissing
Henderson’s amended complaint is affirmed.
ENTERED FOR THE COURT
Michael R. Murphy
Circuit Judge
-4-
|
367 N.W.2d 119 (1985)
David William SWEDZINSKI, petitioner, Respondent,
v.
COMMISSIONER OF PUBLIC SAFETY, Appellant.
No. C1-84-2011.
Court of Appeals of Minnesota.
May 7, 1985.
Harry P. Schoen, Hastings, for respondent.
Hubert H. Humphrey, III, Atty. Gen., Joel A. Watne, Linda F. Close, Sp. Asst. Atty. Gen., St. Paul, for appellant.
Heard, considered and decided by POPOVICH, C.J., and SEDGWICK and RANDALL, JJ.
OPINION
RANDALL, Judge.
The Commissioner of Public Safety appeals from an order of the trial court rescinding the revocation of David Swedzinski's driving privileges. The trial court determined Swedzinski had reasonable grounds for refusing to submit to testing. We reverse.
FACTS
David Swedzinski was arrested for D.W.I. and agreed to take a breath test. He was taken to the Dakota County Sheriff's Office. On the first attempt at administering the test, at 1:28 a.m., the intoxilyzer machine kicked out the test record because of radio frequency interference. Swedzinski was aware of the faulty test. No adjustments were made to the machine after the machine invalidated the initial test. A second test record was inserted at 1:30 a.m. and this time no problems were encountered.
An "air blank" test gave a reading of room air at the desired .000. Instead of blowing into the machine, Swedzinski left the room and said he wouldn't take the test. He indicated he did not trust the machine to be accurate. He was brought back and refused to blow into the machine within the required four minutes.
Swedzinski was given another chance and was again instructed on how to provide a sample. He placed the mouth piece in his mouth for about two seconds. He testified that he did try to blow into the machine but the attending officer testified that it did not appear that he made an attempt to blow before taking out the mouth piece. The intoxilyzer operator testified that the machine appeared to be working properly.
After his license was revoked for refusing to submit to testing, Swedzinski's *120 counsel argued at the implied consent hearing that Swedzinski was not allowed to take the test. Counsel argued that Swedzinski made a good faith attempt to blow into the machine and that the officer was wrong in testifying that he had not. The trial court rescinded the revocation, not on the grounds that Swedzinski had been refused a good faith attempt to take the test, but on the grounds that Swedzinski reasonably refused testing.
ISSUE
May a driver reasonably refuse testing because of suspicions about the reliability of the testing machine?
ANALYSIS
The trial court found that Swedzinski's "suspicions" about the intoxilyzer machine (following the initial rejected test) justified his refusal to provide the requested breath sample. A driver who distrusts the intoxilyzer machine may not reasonably refuse to submit to testing. City of Madison v. Bardwell, 83 Wis.2d 891, 266 N.W.2d 618 (1978); see Carlson v. Commissioner of Public Safety, 357 N.W.2d 391 (Minn.Ct. App.1984), pet. for rev. denied, (Minn., Mar. 6, 1985). The trial court's reasoning could render ineffective our statute authorizing the intoxilyzer, Minn.Stat. § 169.123, subd. 2b (1984). It is reasonable to project that if appellant's position is upheld, automobile drivers would quickly learn to voice an automatic suspicion about the reliability of the intoxilyzer when requested to take the test. We do not hold that there will never be any grounds to have a valid suspicion about a machine. On these facts we hold that even though the machine itself rejected the first test, the operator's testimony that the machine was working properly after the rejection, along with the recording of a proper air blank sample, placed on Swedzinski the burden to take the test or risk the loss of his license. If he had a good faith doubt about the reliability of the machine, he could have had an additional blood test performed at his own expense under Minn.Stat. § 169.123, subd. 3 (1984).
DECISION
The order of the trial court rescinding the revocation of respondent's driving privileges is reversed.
REVERSED.
|
What is Open Humans to me?
I’m Steph, I’ve just started as a software developer at Open Humans, and in this post I want to describe what the organisation means to me.
I feel like the value of Open Humans can be split into three main categories, perhaps of increasing fuzziness in terms of concrete assets, but also, in my opinion, of increasing importance and rarity. Open Humans is a technological platform; it’s a vibrant community; and it’s a paradigm shift.
At its very core, Open Humans is a technological platform.People are increasingly finding themselves in possession of their own personal data. Whether this be from fitness tracking devices; commercial genome sequencing services; or internet search history, we are, somewhat inadvertently, gathering more and more data about ourselves.
Fig1: people are gathering data about themselves
The Open Humans platform allows members to upload and store these data privately, to choose whether to share some publicly, and to use their data to contribute to research projects and learn more about themselves.
Fig2: people can upload their data easily using data tools
For researchers and citizen scientists, the platform enables painless and efficient data collection from engaged research participants. It is a seamless pipeline for human subjects research, which puts the individual participants in charge of how their data is used, avoiding a one-size-fits-all ethics approach which is common in traditional research protocols.
Fig3: data can be used to further human subjects research
Open Humans is defined by its vibrant community. In recent years there has been a sharp rise in production and use of personal tracking systems: wearable devices; smart scales; lifestyle logging apps (including diet, exercise, and sleep); and commercial genetic and ancestry tools. People are intrigued by their own data. For this reason, there is no single user profile: we are researchers; patients; data scientists; citizen scientists; any and all people who want to learn more about themselves. The Open Humans community have written 19 data transfer tools enabling data from external projects to be added to Open Humans by users at the touch of a button. They have contributed 9 projects to the site, where research can be done on participants’ shared data. And they have continued to be enthusiastic, motivated, and truly engaged in the work of the organisation.
Open Humans is a paradigm shift: a totally new way to do humans subjects research. For me this is the most exciting way to look at Open Humans. Personal data can be sensitive: sharing can cause embarrassment, expose health concerns leading to discrimination, or lead to identity theft. Historically in the medical world, this has been handled by keeping health and human subjects research data anonymous. However as data becomes richer and more descriptive (for example, a genome, or internet search history), it is becoming easier to identify the original subject. So now we have more data than ever, and keeping it private when using it in research is becoming harder than ever.
Fig4: the traditional human subjects research pipeline: data is handed over to scientists and generally not returned, subjects do not learn about the results and don’t get a say in how they are shared
Open Humans turns the traditional research pipeline on its head. It puts individual subjects at the centre of the sharing process, and in full control of how their own data is used in research. People are unique, and each will have their own reasons for wanting to keep some data private. These diverse sharing preferences call for a new system for human subjects research, that focuses on the subjects themselves, and meets their own personal privacy requirements.
Fig5: the Open Humans research pipeline: participants have autonomy over their data and can choose which studies they share their data with
Giving research subjects the autonomy they deserve and at the same time increasing the efficiency of the research pipeline seems like a great idea, but the project is ambitious. Large scale open projects do have the ability to change the world (think Wikipedia), but changing the status quo in a system that has been around for a long time will always come with a lot of friction. However the vast amount of data being generated these days means that we are in new territory. This is a great time for change. Making sure that people are empowered to make their own decisions about how their data is used is an important endeavor. Working closely with our community, we hope to reach a critical mass of membership such that personal data sharing in this way becomes the standard approach. I am excited and optimistic about how Open Humans can revolutionise human subjects research, and I’m very grateful to be a part of this exciting movement.
|
---
last_modified_at:
tag:
- getting-started
- testing
- deploy
- code-signing
title: Getting started with Expo apps
redirect_from: []
description: In this guide we discuss how to set up, test, code sign and deploy your
React Native project built with the Expo CLI.
menu:
getting-started-main:
weight: 36
---
You can generate React Native projects [with the React Native CLI or with the Expo CLI](https://facebook.github.io/react-native/docs/getting-started.html). [Expo](https://docs.expo.io/versions/latest/) is a toolchain that allows you to quickly get a React Native app up and running without having to use native code in Xcode or Android Studio.
In this guide we discuss how to set up, test, code sign and deploy your React Native project built with the [Expo CLI](https://docs.expo.io/versions/latest/introduction/installation/#local-development-tool-expo-cli).
Whether you've been using ExpoKit or not with your project, Bitrise project scanner detects the necessary configuration and adds the **\[BETA\] Expo Eject** Step to your deploy workflow. If you've been using ExpoKit with your React Native app, Bitrise project scanner adds the necessary platform-specific dependency manager Steps to your workflow as well.
## Adding an Expo app to bitrise.io
First, let's see how to add a React Native Expo app to [bitrise.io](https://www.bitrise.io/).
{% include message_box.html type="info" title="Do you have a Bitrise account?" content=" Make sure you have signed up to [bitrise.io](https://www.bitrise.io/) and can access your Bitrise account. Here are [4 ways](https://devcenter.bitrise.io/getting-started/index#signing-up-to-bitrise) on how to connect your Bitrise account to your account found on a Git service provider. "%}
1. Log into [bitrise.io](https://www.bitrise.io/).
2. Click the **+** sign on the top menu bar and select **Add app**, which takes you to the [**Create New App**](https://app.bitrise.io/apps/add) page.
3. Select the privacy setting of your app: **private** and [**public**](/getting-started/adding-a-new-app/public-apps/).
4. Select the Git hosting service that hosts your repository, then find and select your own repository that hosts the project. Read more about [connecting your repository](/getting-started/adding-a-new-app/connecting-a-repository/).
5. When prompted to set up repository access, click **No, auto-add SSH key**. Read more about [SSH keys](/getting-started/adding-a-new-app/setting-up-ssh-keys/).
6. Type the name of the branch that includes your project’s configuration - master, for example, - then click **Next**.
7. At **Validating repository**, Bitrise runs an automatic repository scanner to set up the best configuration for your project.
8. At **Project build configuration**, the React Native project type gets automatically selected. If the scanner fails and the project type is not selected automatically, you can [configure your project manually](https://devcenter.bitrise.io/getting-started/adding-a-new-app/setting-up-configuration#manual-project-configuration). Bitrise also detects the **Module** and the **Variant** based on your project.
Now let's have a look at the fields you manually have to fill out:
* To generate an iOS app from your React Native project, enter your iOS Development team ID at the **Specify iOS Development team** field.
* In **Select ipa export method**, select the export method of your .ipa file: ad-hoc, app-store, development or enterprise method.
* In **Specify Expo username**, enter your username and hit **Next**.
* In **Specify Expo password**, enter your password and hit **Next**. You only need to provide your Expo credentials if you've been using [ExpoKit](https://docs.expo.io/versions/v32.0.0/expokit/overview/) with your project.
* Confirm your project build configuration.
9. [Upload an app icon](/getting-started/adding-a-new-app/setting-up-configuration/#adding-an-app-icon-with-the-project-scanner).
10. At **Webhook setup**, [register a Webhook](/webhooks/index/) so that Bitrise can automatically start a build every time you push code into your repository.
You have successfully set up your React Native project on [bitrise.io](https://www.bitrise.io/)! Your first build gets kicked off automatically using the primary workflow. You can check the generated reports of the first build on the **APPS & ARTIFACTS** tab on your Build’s page.
## Installing dependencies
### JavaScript dependencies
If Bitrise scanner has successfully scanned your app, depending on your project configuration, **Run npm command** or **Run yarn command** Step will be included in your workflow.
The default value of the **Run npm command** Step is `install` in the **npm command with arguments to run** input field. This way the Step can add JavaScript dependencies to your project.
### Ejecting your app
React Native apps built with Expo do not come with native modules. Since our build Steps are platform-specific, Bitrise has to eject your app, add and configure the necessary native templates. Then our native dependency installer Steps take care of installing any missing native dependencies so that your project is ready for building and shipping.
The Bitrise project scanner automatically inserts the **\[BETA\] Expo Eject** Step right after the **Run npm command** or **Run yarn command** Steps in your deploy workflow.

Let's see which fields you have to fill out when clicking **\[BETA\] Expo Eject** Step!
* **Working directory input field:** Provide the path of your project directory.
* **Expo CLI version:** Provide the Expo CLI version you used for your project.
* **Username for Expo** and **Password for your Expo account:** Provide your Expo credentials (username and password). If your project uses an Expo SDK, you must provide the username and password for your Expo account. Without the account, the Expo CLI will choose the plain `--eject-method` and the Expo SDK imports will stop working.
If your project does not use an Expo SDK then you don’t need to do anything.
Just add the step after the `git-clone` step and you are done.
### Native dependencies
The **Install missing Android SDK components** Step installs the missing native dependencies for your Android project. This Step is by default included in your deploy workflow.
If you've been using the ExpoKit to develop your app, the **Run CocoaPods install** Step is automatically added to your deploy workflow to take care of any missing iOS dependencies.
## Testing your app
You can use React Native’s built in testing method, called jest, to perform unit tests on your app.
1. Add another Run npm command step to your workflow right after the first **Run npm command** Step.
2. Type `test` in the **npm command with arguments to run** input field.

3. [Start a build](/builds/Starting-builds-manually/).
You can view the test artifacts on the **APPS & ARTIFACTS** tab of your Build's page.
## Code signing
A React Native app consists of two projects; an Android and an iOS - both must be properly code signed. If you click on the Code Signing tab of your project’s Workflow Editor, all iOS and Android code signing fields are displayed in one page for you.
Let’s see how to fill them out!
### Signing your Android app
1. Select the deploy workflow at the **WORKFLOW** dropdown menu in the top left corner of your app's Workflow Editor.
2. Go to the **Code Signing** tab.
3. Drag-and-drop your keystore file to the **ANDROID KEYSTORE FILE** field.
4. Fill out the **Keystore password**, **Keystore alias**, and **Private key password** fields and click Save metadata.
You should have these already at hand as these are included in your keystore file which is generated in Android Studio prior to uploading your app to Bitrise. For more information on keystore file, click [here](https://developer.android.com/studio/publish/app-signing). With this information added to your **Code Signing** tab, our **Sign APK** step (by default included in your Android **deploy** workflow) will take care of signing your APK so that it’s ready for distribution!
{% include message_box.html type="info" title="More information on Android code signing" content=" Head over to our [Android code signing guide](https://devcenter.bitrise.io/code-signing/android-code-signing/android-code-signing-procedures/) to learn more about your code signing options! "%}

The Android chunk of code signing is done. Let's continue with iOS!
### Signing and exporting your iOS app for deployment
To deploy to Testflight and to the App Store, you will need the following code signing files:
* an iOS **Distribution** certificate.
* an **App Store** type provisioning profile.
1. Open the **Workflow** tab of your project on [bitrise.io](https://www.bitrise.io).
2. Click on **Code Signing** tab.
3. Click or drag and drop the App Store type provisioning profile in the **PROVISIONING PROFILE** field and the iOS Distribution certificate in the **CODE SIGNING IDENTITY** field.
4. Click on the **Workflows** tab and select your deploy Workflow.
5. Set the **Select method for export** input field of the **Xcode Archive & Export for iOS** Step to **app-store**.
6. Select **Xcode Archive & Export for iOS** Step and scroll down to the **Force Build Settings** input group.
7. Fill out the following input fields based on your uploaded code signing files:
**Force code signing with Development Team**: Add the team ID.
 **Force code signing with Code Signing Identity:** Add the Code Signing Identity as a full ID or as a code signing group.
 **Force code signing with Provisioning Profile**: Add the provisioning profile's UDID (and not the file name).

8. If the code signing files are manually generated on the Apple Developer Portal, you have to specify to use manual code signing settings since the ejected React Native project have Xcode managed code signing turned on. Click the **Debug** input group and add `CODE_SIGN_STYLE="Manual"` to the **Additional options for xcodebuild call input** field.
## Deploying to Bitrise
The **Deploy to bitrise.io** Step uploads all the artifacts related to your build into the [**APPS & ARTIFACTS**](/builds/build-artifacts-online/) tab on your Build’s page.
You can share the generated APK/.ipa file with your team members using the build’s URL. You can also notify user groups or individual users that your APK/.ipa file has been built.
1. Go to the **Deploy to bitrise.io** Step.
2. In the **Notify: User Roles** input field, add the role so that only those get notified who have been granted with this role. Or fill out the **Notify: Emails** field with email addresses of the users you want to notify. Make sure you set those email addresses as [secret env vars](/builds/env-vars-secret-env-vars/)! These details can be also modified under **Notifications** if you click the eye icon next to your generated APK/.ipa file in the **APPS & ARTIFACTS** tab.
## Deploying to an app store
If you wish to deploy your iOS app, follow the steps in [Signing and exporting your iOS app for deployment](/getting-started/getting-started-with-react-native-apps/#sign-and-export-your-ios-project-for-deployment).
### Deploying your iOS app to Testflight and iTunes Connect
{% include message_box.html type="important" title="Have you exported an app-store .ipa file yet" content=" Make sure that you have exported an app-store .ipa file before starting the deployment procedure to a native marketplace! "%}
1. Modify the **Xcode Archive & Export for iOS** Step's input fields to the force options and upload the app store profile and distribution certificate **manually**.
2. Add the **Deploy to iTunes Connect - Application Loader** Step to your workflow.
Put the Step after the **Xcode Archive & Export for iOS** Step but preferably before the **Deploy to Bitrise.io** Step.
3. Provide your Apple credentials in the **Deploy to iTunes Connect - Application Loader** Step.
The Step will need your:
* Apple ID.
* password or, if you use two-factor authentication on iTunes Connect, your app-specific password.
Don’t worry, the password will not be visible in the logs or exposed - [that’s why it is marked SENSITIVE](/builds/env-vars-secret-env-vars#about-secrets).
4. [Start a build](/builds/Starting-builds-manually/).
If everything went well, you should see your app on Testflight. From there, you can distribute it to external testers or release it to the App Store.
### Deploying your Android app to Google Play Store
{% include message_box.html type="important" title="Have you uploaded keystore file yet" content=" Make sure that you have uploaded the keystore file to the **ANDROID KEYSTORE FILE** field before starting the deployment procedure to the marketplace! "%}
Before you'd use the **Deploy to Google Play** Step, make sure you have performed the following tasks:
1. Upload the first APK manually to Google Play [using the Google Play Console](https://support.google.com/googleplay/android-developer/answer/113469?hl=en).
2. [Link](https://developers.google.com/android-publisher/getting_started) your Google Play Developer Console to an API project.
3. [Set up API Access Clients using a service account](https://developers.google.com/android-publisher/getting_started): Please note when you create your service account on the Google Developer Console, you have to choose `json` as **Key Type**.
4. Grant the necessary rights to the service account with your [Google Play Console](https://play.google.com/apps/publish). Go to **Settings**, then **Users & permissions**, then **Invite new user**. Due to the way the Google Play Publisher API works, you have to grant at least the following permissions to the service account:
* Access level: View app information.
* Release management: Manage production releases, manage testing track releases.
* Store presence: Edit store listing, pricing & distribution.
5. As an optional step, you can add translations to your Store Listing. To allow the **Deploy to Google Play** Step to assign your `whatsnew` files to the uploaded APK version, visit the [Translate & localize your app](https://support.google.com/googleplay/android-developer/answer/3125566?hl=en) guide and add translations to your Store Listing section.
Now let's head back to Bitrise and finish off the deploy configuration!
1. In your Bitrise Dashboard, go to **Code Signing** tab and upload the service account JSON key into the **GENERIC FILE STORAGE**.
2. Copy the env key which stores your uploaded file’s url.
For example: `BITRISEIO_SERVICE_ACCOUNT_JSON_KEY_URL`.
3. Add the **Deploy to Google Play** Step after the **Sign APK** Step in your deploy workflow.
4. In the **Service Account JSON key file path** input, paste the Environment Variable which was generated when you uploaded the service account JSON key in the **GENERIC FILE STORAGE**. Note this input is marked as sensitive in the Step, meaning any Env Var you insert here will become a secret and won't be printed out in a build log. Besides the generated Env Var, you can also add a file path right in the Step's input field where the file path can be local or remote too:
* For remote JSON key file you can provide any download location as value, for example, `https://URL/TO/key.json`.
* For local JSON key file you can provide a file path url as value, for example, `file://PATH/TO/key.json`.
5. **Package name**: the package name of your Android app.
6. **Track**: the track where you want to deploy your APK (for example, alpha/beta/rollout/production or any custom track you set).
And that’s it! Start a build and release your app to the Google Play Store.
{% include banner.html banner_text="Let's add an Expo app" url="https://app.bitrise.io/apps/add" button_text="Go to Bitrise now" %}
|
[Cephalometric measurements of nasopharyngeal and palatal flow in cleft palate children by comparison with hearing impairment].
The comparison of the audiological results (audiometry, tympanometry 226 Hz and multifrequency tympanometry) and cephalometric measurements of the nasopharynx in cleft palate children was presented. A group of 85 children 7-15 years old, operated because of cleft lip and palate during early childhood were considered for the purpose of this study. With the results of the audiological examination, as the base, the children were divided on three subgroups: the first characterized by pathological audiogram and tympanogram, the second with normal audiograms and pathological tympanograms, the third with normal audiograms and tympanograms. On the radiological pictures (lateral tele-radiograms) the linear measurements of certain were introduced as follows: the nasopharyngeal airflow (PN) and the palatal airflow (PP). In order to obtain the radiological coefficients (PN/A) and (PP/A), the linear measurements mentioned above in relation to the adenoid size were used. The results of measurements obtained for the first and second subgroup were significant different to the relevant results in the third subgroup and controls but the best correlation obtained between audiological parameters and radiographic nasopharyngeal airway. This results prove the existence of certain relation between measured quantities and audiological examination in cleft palate children.
|
Trends in the pathophysiology and pharmacotherapy of spasticity.
Spasticity develops after supraspinal or spinal lesions of descending motor systems, with obligate involvement of the corticospinal tract. Spasticity is characterized by an increase in muscle tone, which, in contrast to many other types of enhanced muscle tone, shows a marked velocity-dependent increase when the muscle is passively stretched. The pathophysiological mechanisms underlying this spastic muscle tone remain obscure. Three major causes are currently considered possible: (1) changes in the excitability of spinal interneurones; (2) receptor hypersensitivity; (3) formation of new synapses by sprouting. The latter mechanism could account for the long time course over which spastic muscle tone develops in hemiplegic or paraplegic patients, but there is no experimental evidence for this hypothesis. The electromyographic (EMG) gait analysis of patients with spasticity has thrown doubt on the common belief that the velocity-dependent increase in spastic muscle tone is evoked by stretch reflex activity and has led to the idea that spastic muscle tone resides in the muscle fibres themselves. While such a mechanism may contribute to the slowness of active movements in spastic patients, recent experiments on patients with spastic arm paresis have confirmed the classical view that the spastic muscle tone is related to the EMG activity evoked in the passively stretched muscle. This pathological EMG activity is seen during the entire range of the dynamic phase of the stretch, during which a normal muscle exhibits only an early, phasic burst at the highest stretch velocities employed. For the pharmacological treatment of spasticity, substances with different central or peripheral actions are available. Their assumed receptor actions are described, together with their main indications and side-effects.(ABSTRACT TRUNCATED AT 250 WORDS)
|
We know that England is under attack, and from its own ruling class. Before we can speak of defense, we need to understand the reasons for the attack.
This is not an attack on tradition in itself, but the unfolding of an alternative tradition.
Part of what defines a nation is the relationship between its ruling class and the people at large. Our historic self-perception as English is based on the relationship between rulers and ruled that existed before 1914, and, though to a fading degree, for a couple of generations thereafter.
The English people in 1914 were capable of fully democratic self-government. They had the necessary cultural and genetic cohesiveness for a democratic system not to descend into chaos or majoritarian tyranny.
Democracy, however, was not necessary, as the oligarchy of hereditary landlords who ruled England had absolutely identified itself with the nation. Every interest group had its place within the nation, and there was a place for all.
After 1914, the old ruling class was destroyed—the heavy casualties of both World Wars, high taxes on static wealth, demands for a fraudulent kind of democracy, and so forth. The old ruling class went down before all this, because it never tried to evade the duties that came with national identification.
The new ruling class is a coalition of politicians, bureaucrats, educators, lawyers, media people, and associated business interests that draws income and status from an enlarged and activist state. It does not own the means of production but is content merely to control them. Its general desire is to avoid the entanglements that destroyed the old ruling class. It wishes to avoid more than token identification with the English people at large.
“Conservatives, after all, should not wish to copy the mistakes of the French revolutionaries.”
The present—and so far the most successful—scheme of liberation is to make power opaque and unaccountable by shifting it upwards to various multinational treaty organizations—e.g., the EU, WTO, NATO, etc.—and to Balkanize England into groupings more suspicious of each other than willing to combine against the ruling class.
State-sponsored mass immigration has been the most obvious evidence of this desire. Filling the country with people of different colors and with different ways, which do not like each other, and do not like and are not liked by the natives, is ideal Balkanization. But one of the purposes of political correctness is also to divide the native population—women against men, homosexuals against Christians, and so forth.
The final desire is for the mass of ordinary people to be dispossessed and impoverished and unable to challenge structures of exploitation that channel fantastic wealth to a free-floating class of masters.
If we want to avoid this, we must destroy the ruling class now. Its weakness is its reliance on the state as source or enabler of its income. Conservatives, therefore, must seize control of the state and disestablish the ruling class.
If we want to win the battle for this country, we need to take advice from the Marxists. These are people whose ends were evil where not impossible. But they were experts in the means to their ends. They knew more than we have ever thought about the seizure and retention of power. If, therefore, we ever achieve a government of conservatives and seek to bring about the irreversible transfer of power to ordinary people, we should take to heart what Marx said in 1871 after the failure of the Paris Commune:
…the next attempt of the French Revolution will be no longer, as before, to transfer the bureaucratic-military machine from one hand to another, but to smash it, and this is the precondition for every real people’s revolution….
The meaning of this is that we should not try to work with the ruling class. We should not try to jolly it along. We should not try fighting it on narrow fronts. We must regard it as the enemy, and we must smash it.
On the first day of our government of conservatives, we should close down the BBC. We should take it off the air. We should disclaim its copyrights. We should throw all its staff into the street and cancel their pensions. We should not try to privatize the BBC. This would simply be to transfer the voice of our enemy from the public to the private sector, where it might be more effective in its opposition. We must shut it down—and shut it down at once.
|
Photo: Ralf-Finn Hestoft/Corbis
Sam Tanenhaus’s historical essay in the latest edition of the New Republic, on how the GOP is unalterably the party of white America, runs along many of the same lines as my story in last week’s issue of New York. Tanenhaus even discusses in depth the theories of John C. Calhoun, which I mentioned briefly, as did Frank Rich in an essay in the same issue as mine. (For any New York readers surprised at the double citations in a single issue, the explanation is simple: Subscriber surveys have found that our readers want more coverage of mid-priced restaurants south of 50th Street and also much more discussion of the philosophy of John C. Calhoun.)
Tanenhaus’s piece is a great read and provides a lot of depth in areas I only touched upon, such as the deep and conscious influence of Calhoun on the twentieth-century thinkers who founded the conservative movement. But I think it also loses the thread of its argument toward the end, and in so doing, misses what’s really important and alarming about the current moment of the Republican Party.
Tanenhaus consistently runs together white racial panic and the tactics of minority rule; the two have often been linked. My piece mentions the electoral college and the three-fifths clause, which represented the successful effort by the South to turn its slaves into extra representation for the slaveowners. The attacks on the franchise at the end of the nineteenth century reflected, in different forms, the same sense of racial unease. Calhoun represented the fears of the slave-owning agrarian South being outnumbered by the growing North. But the same style applies to other elites maneuvering to retain their power in the face of diminishing numbers. Michael Lind, in a Salon essay on the white South, adds a fascinating detail I wish I’d found: After the 1920 census, Congress refused to reapportion itself — the only time in American history it failed to do so. Why? Because the 1920 census recorded vast increases in urban population, and retaining the 1910-era boundaries gave rural areas disproportionate representation.
In Tanenhaus’s account, the two things are not merely linked but essentially interchangeable. This leads to a confusing passage in which Tanenhaus described Richard Nixon’s Southern Strategy as a “realignment, based on the politics of nullification” but then, in the next paragraph, asserts that after Nixon’s reelection, “Calhounism went into remission.”
I would argue that Nixon shows how Tanenhaus is running two different things together. Starting in the mid-sixties, the Democratic majority that had existed since the New Deal started to crack up, and the Republicans created a majority in its place based on the general belief among most whites that “big government” meant taking things away from them and giving them to lazy, criminal, or otherwise less deserving minorities. The time period from Nixon through George H. W. Bush was a time when the GOP most openly embraced racial politics — busing, welfare queens, Willie Horton, quotas, among others, were major elements of the party’s appeal.
That started to fade out with the election of Bill Clinton, who inoculated the party on racial issues by breaking as conspicuously as possible with his party on welfare and crime. George W. Bush reaffirmed Clinton’s political achievement by abhorring the sort of racial appeals politicians like his father employed. And in recent years, the minority population has grown to the point that Democrats can win Dukakis-esque levels of white support and still carry the national vote; therefore, a racialized politics that could beat Michael Dukakis can’t beat Barack Obama.
But the key thing is that the Republican Party has now rejected its Southern Strategy and is embracing Calhounism instead. The high period of the Republican Party’s most explicit racial appeals was also the time when it had the least use for Calhounian methods of minority rule. The Southern Strategy, as a political method, was not based on Calhounism. It was closer to the opposite of Calhounism.
Why? Because Republicans were winning. They didn’t need to block the majority from working its will because they usually were the majority.
It’s only since about 2008 that Republicans have turned to the methods I describe — massively expanding the power of the Senate minority, widespread voter suppression and other schemes to rig the vote, obstructing nominees to block laws they can’t overturn, using the Courts to enforce economic policies they can’t win through legislative channels. Republicans have turned to these techniques because the party’s identity as that of white people, once the cornerstone of its political dominance, has turned into a trap from which it is wriggling to escape.
|
Luis Giannattasio
Luis Giannattasio Finocchietti (19 November 1894 – 7 February 1965) was a Uruguayan political figure.
Background
Giannattasio was an engineer by profession and a leading member of the Uruguayan Blanco (National) Party.
From 1959 to 1963, he served as Minister of Public Works. In this capacity, Giannattasio was particularly identified with a significant road-building program.
President of Uruguay
1964
In 1962 he was elected a member of the National Council of Government. He became President of the body in 1964, succeeding his National Party colleague Daniel Fernández Crespo. Prominent members of his Administration included Health minister Aparicio Méndez, who later served as President of Uruguay.
1965: Death in office
In 1965 Giannattasio died in office shortly after attending in official capacity the funeral in London, England, of Winston Churchill.
He was succeeded as President of the National Council of Government by Washington Beltrán, also of the Blanco (National) Party.
Legacy
A road in Canelones Department is named after Giannattasio.
Among the prominent Uruguayan buildings for which Giannattassio's engineering company (Giannattasio & Berta, afterwards Ingeniería Civil) was responsible is the main building of The British Schools of Montevideo, Carrasco, opened 1964, as well as the main branch of Banco de la República, Av. 18 de Julio, downtown Montevideo.
See also
Politics of Uruguay
The British Schools of Montevideo#History
List of political families#Uruguay
References
Category:Presidents of the Uruguayan National Council of Government
Category:People from Montevideo
Category:Uruguayan civil engineers
Category:Uruguayan people of Italian descent
Category:1894 births
Category:1965 deaths
Category:Place of birth missing
Category:National Party (Uruguay) politicians
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.