text
stringlengths 8
5.77M
|
---|
Q:
how to use postThreadMessage to pass a struct
I want to use windows's message queue facilities to send a struct to another thread.
But I find out that the postthreadmessage function only provide two integer parameters, lparam and wparam for me to pass arguments.So I decide to put the address of the struct in lparam. Is this the correct way windows use to pass struct?
And I intend to use boost::shared_ptr to hold the address of struct in both the receiver thread and sender thread. I doubt that when the two shared_ptrs goes out of scope, will the struct be freed twice? I can not figure out a way to ensure the struct allocated on heap will be 100% freed, Any ideas?
A:
To the first question, yes, LPARAM is intended to be used as an integer or a pointer. That is clear from the definition:
typedef LONG_PTR LPARAM;
That is an integer long enough to hold a pointer.
About the shared_ptr thing, you are right, if you pass the raw pointer and wrap it into another shared_ptr you will free it twice:
shared_ptr<Thing> a;
PostThreadMessage(x, 0, (LPARAM)a.get());
...
LRESULT OnMessage(int msg, WPARAM wp, LPARAM lp)
{
shared_ptr<Thing> p((Thing*)lp); //Bad!!!
}
But you can try this workaround instead:
shared_ptr<Thing> a;
PostThreadMessage(x, 0, new shared_ptr<Thing>(a)); //pointer to smart-pointer
...
LRESULT OnMessage(int msg, WPARAM wp, LPARAM lp)
{
shared_ptr<Thing> *pp = (shared_ptr<Thing>*)lp;
shared_ptr<Thing> p(*pp);
delete pp; //no leak
}
AFTERTHOUGHT: Note that PostThreadMessage may fail... and you don't want to leak a shared_ptr.
In my experience it is generally better to use a std::deque to hold the data and use the PostThreadMessage to notify that there is data there. In this way you'll never lose an object! YMMV
|
Trouble logging in?If you can't remember your password or are having trouble logging in, you will have to reset your password. If you have trouble resetting your password (for example, if you lost access to the original email address), please do not start posting with a new account, as this is against the forum rules. If you create a temporary account, please contact us right away via Forum Support, and send us any information you can about your original account, such as the account name and any email address that may have been associated with it.
Well, with all the metaphysical talk happening in the episode 3 disscussion thread and the little bit in the Suzumiya Haruhi thread itself, I suggest a Metaphysics of Suzumiya Haruhi thread so these suprisingly interesting discussions have a home.
Maids! x3 had the better title I feel... The Ontology of Suzumiya Haruhi.
It gives you a wider breath of topics to discuss, rather than limiting yourself simply to the Metaphysics. In theory, not only could it contain the metaphysical discussions that have been bandied about in the ep3 thread, but it could also contain the description of the formulae from the OP... as well as potential future disussions as we learn more about the backgrounds/workings of the other characters in the show.
I mostly add this here because quite a lot of the ep3 discussion will fall into the shadows once the ep4 discussion opens. Technically the difference between Metaphysics and Ontology is some people won't have to hit the dictionary to get a definition of the former ^^
It seems to me that my earlier request for a "metaphysical/philosophical" thread (that later got morphed into the "speculation" section of the Future Episode Synopses/Series Predictions/General Speculation thread) has come up again in a different form. As such I feel duty bound to add my voice to the others above requesting for an Ontology of Suzumiya Haruhi thread.
__________________
"Every man has two countries, his own and France" - Attributed to Thomas Jefferson
The discussion was drifting from philosophy to physics, and we all know where that leads: mathematics. I thought, "these people are going start solving equations." It's an appropriate topic for the subforum, I think. It was a little off-topic for the Episode Three thread. Without their own thread, the same thing will happen with Episode Four. Or is it Seven?
See? We had an Episode One that may in fact be Episode Zero, and now, apparently, we are about to get an Episode Four that might be Episode Seven. Sooner or later, someone is going to detect a pattern! And patterns inevitably lead to places. Places like Copenhagen. If Copenhagen comes up again in the Episode Four (which might be Episode Seven) thread, I'll have to start drinking very heavily. Which also leads to places. Uncertain places. And uncertainty will only lead us to Heisenberg, whom I believe was a student of Neils Bohr, and Bohr just brings us back to Copenhagen. And more heavy drinking.
It's a viscious cycle. So please give the physicists and philosophers their own thread.
Maids! x3 had the better title I feel... The Ontology of Suzumiya Haruhi.
It gives you a wider breath of topics to discuss, rather than limiting yourself simply to the Metaphysics. In theory, not only could it contain the metaphysical discussions that have been bandied about in the ep3 thread, but it could also contain the description of the formulae from the OP... as well as potential future disussions as we learn more about the backgrounds/workings of the other characters in the show.
I mostly add this here because quite a lot of the ep3 discussion will fall into the shadows once the ep4 discussion opens. Technically the difference between Metaphysics and Ontology is some people won't have to hit the dictionary to get a definition of the former ^^
Good point and I agree that the new thread should be The Ontology of Suzumiya Haruhi.
On this idea of an Ontology of Suzumiya Haruhi thread...can you tell me where the discussion starts in the Episode 3 thread? Which post was the genesis of the discussion? I'd like the read up on what you guys are talking about without having to sift through 15 pages. Thanks.
Maids! x3 had the better title I feel... The Ontology of Suzumiya Haruhi.
All right...I created this thread and moved over a batch of posts. If there's a post of yours (or anyone’s) that you feel belongs in that thread, let me know or just re-post the information. I'm not so sure about the word "Ontology". I know what it means and use it on a daily basis, but I'm not so sure others will, soooo, if you see future "Metaphysical" post crop up by people that don't know what that words means, be a pal and nicely point them to that thread.
This new thread should be a good test to see if off topic chat in the Episode threads has legs beyond the Episode thread and is worthy of a separate discussion of its own. Props to melange for originally proposing the idea awhile ago.
See? We had an Episode One that may in fact be Episode Zero, and now, apparently, we are about to get an Episode Four that might be Episode Seven. Sooner or later, someone is going to detect a pattern! And patterns inevitably lead to places. Places like Copenhagen. If Copenhagen comes up again in the Episode Four (which might be Episode Seven) thread, I'll have to start drinking very heavily. Which also leads to places. Uncertain places. And uncertainty will only lead us to Heisenberg, whom I believe was a student of Neils Bohr, and Bohr just brings us back to Copenhagen. And more heavy drinking.
I forget which blog had a good discussion going about this, with answers like: Haruhi, Mikuru, mass hysteria, good animation, Kyon's voiceover, self-reflexiveness, leaving gaps that suck people in, etc. We haven't really started talking about it here, I don't think, but I certainly don't know why the show has become so viral.
I posted something about Marshall Mcluhan's media theories (this being a "cool" show in that it leaves a lot out and requires the audience to participate by filling in the blanks) and it was suggested that further discussion along those lines belongs in the Ontology thread, but I think it belongs more in a thread like the one I suggest.
I forget which blog had a good discussion going about this, with answers like: Haruhi, Mikuru, mass hysteria, good animation, Kyon's voiceover, self-reflexiveness, leaving gaps that suck people in, etc. We haven't really started talking about it here, I don't think, but I certainly don't know why the show has become so viral.
I posted something about Marshall Mcluhan's media theories (this being a "cool" show in that it leaves a lot out and requires the audience to participate by filling in the blanks) and it was suggested that further discussion along those lines belongs in the Ontology thread, but I think it belongs more in a thread like the one I suggest.
I've attempted to spark some discussion about that in the original Suzumiya Haruhi Thread but it never caught much steam, my guess is that most people throw away all reason and simply enjoy the show
But it certainly would be fun to analyse what makes the show reminiscent of an epidemic
I forget which blog had a good discussion going about this, with answers like: Haruhi, Mikuru, mass hysteria, good animation, Kyon's voiceover, self-reflexiveness, leaving gaps that suck people in, etc. We haven't really started talking about it here, I don't think, but I certainly don't know why the show has become so viral.
I posted something about Marshall Mcluhan's media theories (this being a "cool" show in that it leaves a lot out and requires the audience to participate by filling in the blanks) and it was suggested that further discussion along those lines belongs in the Ontology thread, but I think it belongs more in a thread like the one I suggest.
I don't have any hypothesis' to add at the moment (need sleep) but I do think it should be something to be looked into. A new thread would keep things nice and streamlined (since 'ontology' seems to be more scientific/metaphysic and not media studies like this would be) but I don't mind if it ends up in an existing thread. |
Mulan Garden
Company Name:Mulan GardenStatus:WorkState:CaliforniaPost:92507-3691County:RiversideCity:RiversideAddress:3375 Iowa Avenue # K Phone:(951)686-7139Fax:unknownEmail:unknownContact Owner:Sinh TuWeb site:unknownSIC code:581208 Industry group: Eating and Drinking Places, Business category: Eating Places, Subcategory: Steak and barbecue restaurants Employees:2Gross Annual Sales (Revenue):80,000Description:Mulan Garden is a business categorized under steak and barbecue restaurants, which is part of the larger category eating places. Mulan Garden is located at the address 3375 Iowa Avenue # K in Riverside, California 92507-3691. The Owner is Sinh Tu who can be contacted at (951)686-7139.
Was this page helpful? Yes -0 No -0Click here to Inform about a mistake1 Rating: |
Women scared off Boris Bikes by traffic and getting sweaty
Minority: only a quarter of registered Boris bike users are women, says City Hall
Women are shunning Boris Bikes because they are afraid of London's traffic and they have nowhere to change if they get hot and sweaty riding them, it was claimed today.
Only a quarter of the scheme's 92,000 registered users are women, according to the first City Hall figures to be broken down by gender.
Another problem is the weight of the bikes. At about 23kg, Boris Bikes are about twice the weight of most road cycles, making many riders work up a sweat.
Since the launch of the £140 million scheme in July more than 1.5 million trips have been made on the bikes.
London Assembly member Murad Qureshi uncovered the gender divide in a written question to Mayor Boris Johnson.
Mr Qureshi said: "In my local pubs and among some friends I had heard remarks about the bikes being for women but it seems it is a real boy's toy. Men, and young professionals in particular, have embraced this scheme, while women seem less sure.
"It seems men are less worried about using the bikes in central London and its very busy roads. TfL has to deal with these concerns to ensure more women use the scheme."
This month the Mayor announced an extension of the scheme to the edge of the Olympic Parking time for the 2012 Games. This will bring an extra 2,000 bikes and 4,200 docking bays on top of the 6,000 bikes and 10,200 bays set to be in place by March.
Boris Bikes can only be used by registered users at the moment but from next month casual users should be able to swipe a credit or debit card at a docking station and ride away.
A TfL spokesman said today: "We are doing everything possible to encourage women to cycle. We know women's main concerns are safety and changing facilities. Our Cycle Safety Strategy initiatives include signing a memorandum of understanding with the Freight Transport Association to get lorry drivers and cyclists sharing the road safely and adult cycle training to improve confidence and skill on the road.
"We are also working directly with businesses across the capital to help them provide better cycling facilities for employees." |
A discussion about what lead up to the West Coast port closures, and how supply chains were affected
Introduction Printer Friendly PDFEvery six years, the U.S. West Coast ports negotiate and renew their labor contract with the International Longshore and Warehouse Union (ILWU). In 2002, a dispute caused major delays and port shutdowns. Again in 2014, protracted labor negotiations caused slowdowns and shutdowns throughout the West Coast. However, additional external factors in effect in 2014 caused a ripple effect of delays, congestion, and even loss of product to the entire U.S. supply chain.
With approximately 45 percent of all U.S. imports passing through the 29 West Coast ports and representing 12.5 percent4 of the GPD, the congestion had a crippling effect on retailers during the holiday season. Early estimates place the national cost of the congestion at as much as $7 billion in 20152 alone.
Third-party logistics provider MD Logistics mobilized to help its clients stay apprised of port conditions and choose the best course of action, taking cost and type of cargo into consideration. As the crisis comes to a close, MD Logistics reflects on ongoing industry factors that will continue to cause delays and how importers can anticipate and prepare for future congestion scenarios.
The IssueAt midnight on July 30, 2014, the ILWU and Pacific Maritime Association (PMA) labor contract expired without resolution. As peak season began in July and extended into the fall and winter, ILWU members instituted slowdowns at the ports of Los Angeles and Long Beach, the nation’s busiest seaport. The two ports serve as a hub for West Coast imports, transferring $1 billion worth of cargo each day, primarily goods from Asia5. While ports utilized overtime hours to meet the demand and many believed the crisis would resolve by the holiday season, congestion quickly grew.
Negotiations continued through the winter. In February 2015, the crisis peaked as all 29 West Coast ports instituted multi-day shutdowns before negotiators finally reached a deal on February 20.
Los Angeles and Long Beach handle 70 percent of the commodities that come into the U.S. from Asia. Imports from Asia to these ports typically require two to three days to be unloaded and transferred inland. At the peak of the labor crisis, transfer inland was taking up to four weeks, with backlogged container ships sitting idle off the coast. Total transit time from Asia to the U.S. across the Pacific increased from 16-18 days to 28-35 days.
The Ripple EffectTo work around the Los Angeles and Long Beach congestion, some freight forwarders began sending cargo to alternative ports including Seattle, Tacoma, Prince Rupert, Vancouver, and Oakland. As a result, congestion and transit time ballooned in these areas as well. In August 2014, Prince Rupert port in British Columbia announced that it would turn away any U.S.-bound cargo, causing additional transit time for cargo that had been redirected there and causing further congestion in nearby Seattle and Tacoma.
In congested ports, predominantly Los Angeles and Long Beach, temporary labor that was brought in to service the backlog was unskilled and ineffective at operating the cranes. Whether an importer decided to stay put or reroute its cargo, all incurred extra costs in storage, demurrage, port congestion fees, and more.
When cargo finally reached shore, Midwest importers needed to determine how to make up the time that they had already lost in the remaining transit. Some chose trucks, as opposed to rail, to send commodities to the Midwest, as the rail system was congested as well.
During the slowdowns and shutdowns, terminals such as Chicago had thinned their operations, staff, and equipment due to the slow influx of cargo. When the dispute ended in February, the container yards needed to regain capacity very quickly, and soon began receiving 75-100 percent more cargo than normal as the commodities waiting in the Pacific began coming in quickly. Normally, during the spring-time, transit time from Chicago to Midwest inland points takes two days. However, in the early spring of 2015, transit times along that route increased to four or five days. Overall, Midwest transit times increased by approximately 40 percent during the nine-month crisis period.
Guiding Clients through the Port DelaysAs MD Logistics, a third-party logistics provider based in Plainfield, Ind. saw the early warning signs of the delays in the summer of 2014, they began discussions with each of their clients who might be affected by the congestion and advised them to ship as early as possible, or redirect to alternative ports. MD Logistics provided direct updates from the ports to its clients and walked them through various scenarios and alternatives available to them. The options for clients were:
Redirect to alternative West Coast ports. Importers redirect shipments to West Coast ports other than Los Angeles and Long Beach. Due to the backlog, congestion grew at these ports as well.
Redirect to the East Coast. Importers redirect shipments through the Panama Canal to unload cargo at ports on the East Coast. Costs for redirecting to the East Coast are typically 30-40% higher, and reliability was uncertain as some East Coast labor unions threatened to honor the strike for cargo redirected from the West Coast.
Redirect to the Gulf Coast. Importers redirect shipments to Gulf Coast ports such as Houston. On top of the increased costs of going through the Panama Canal, Gulf Coast ports are often tied up with congestion from the oil and gas industries in the area.
Use Air Freight. Importers use air freight to import high-priority cargo. Airfreight can often times cost upwards of three to four times the amount of ocean freight, so this option is in most cases cost-prohibitive.
Wait it Out. Importers keep their shipments berthed in the Pacific until the congestion clears.
Although MD Logistics did assist several clients in redirecting high-priority cargo into alternate ports including Baltimore, Norfolk, and Seattle, for most clients it found that staying put and waiting out the congestion on the West Coast was the best option in terms of reliability and cost.
In one case, a client had 150 crates with specific labeling requirements for retail distribution. MD Logistics was able to implement a plan to bring the crates into Seattle, unload the products and utilize truck / Intermodal carriers to avoid the ocean container rail congestion. The time savings were substantial for the client and costs for the change in process only increased 5 – 10%. MD Logistics provided weekly condition updates on the ports and provided the client guidance and recommendations on the go. The move provided an immediate benefit to the client’s supply chain.
Unlike smaller logistics providers, MD Logistics was able to effectively support clients through its many locations and partners throughout the country, with the flexibility to bring imports into smaller ports and adjust quickly to the port delays and closures with transportation alternatives.
“We kept our clients informed and apprised of every option available to them so they could make the most educated decision,” said Matt Collins, Director of Freight Forwarding Sales. “What differentiates us from our competition is our ability to over-communicate with our clients and to walk alongside them.”
Compounding FactorsOutside of the labor dispute, additional factors compounded the overall congestion, and will continue to be an issue even as delays from the labor dispute wind down.
Container Chassis Shortage. For broader economic reasons, many ocean carriers and steamship lines phased out their container chassis service lines by 2014. During the recession, 40 percent of the U.S. trucking capacity left the market, of which only half has returned. Without this convenient service of provided container chassis, port truckers must now either rent or buy their own6. As companies scrambled to catch up with the backlogged orders, there was a shortage of container chassis to rent.
Appointment Delays. One new movement in the transportation market is that terminals now require an appointment to retrieve shipments. During the west coast port closure crisis, some port truckers would wait all day for an appointment, only to find that there was no equipment available and that they needed to return the next day. Although the appointment system was instituted to alleviate delays, it ended up having the opposite effect.
ConclusionAlthough the labor dispute is formally resolved until the next labor contract negotiation period in 2020, delays are still in place from the nine-month saga. The East Coast labor contract is up for renewal in 2017, which could lead to additional congestion.
The newly-created appointment system and chassis shortage for truckers will continue to cause delays as capacity within the transportation industry has not returned to its pre-recession levels.
Most mid- and large-sized companies affected by the crisis had the inventory size and budgets to weather the crisis, but many small companies did not have the expertise to navigate freight forwarding on their own, relying heavily on third-party logistics providers such as MD Logistics. Retailers with delayed holiday shipments and perishable products were hardest-hit by the crisis.
Experts estimate that the congestion from West Coast port closures will be alleviated by June 2015—just in time for peak season to begin again in July. The economic impact and operational ramifications of the port slowdowns and closures will continue to ripple throughout the logistics industry through 2015. |
Filipe Anunciação
Filipe Alexandre Dias Anunciação (born 27 May 1979) is a Portuguese retired footballer who played as a midfielder, and the assistant manager of C.S. Marítimo.
Club career
Anunciação was born in Matosinhos. During his early career he played mostly in the Portuguese second division, and represented C.D. Feirense, F.C. Paços de Ferreira, C.D. Aves, Boavista F.C. and Moreirense FC.
In 2007, Anunciação returned to Paços for a second spell, going on to spend several seasons in the Primeira Liga, mainly as a starter. Towards the end of his career, in the 2012–13 campaign, the 33-year-old still appeared in 17 games – four starts, 464 minutes of action – as the team finished a best-ever third and qualified to the UEFA Champions League; he was also the undisputed team captain when available.
Anunciação retired in November 2014, being immediately appointed his main club's assistant coach. He amassed top flight totals of 244 matches and six goals, over the course of 13 seasons.
References
External links
National team data
Category:1979 births
Category:Living people
Category:People from Matosinhos
Category:Portuguese footballers
Category:Association football midfielders
Category:Primeira Liga players
Category:LigaPro players
Category:C.D. Feirense players
Category:F.C. Paços de Ferreira players
Category:C.D. Aves players
Category:Boavista F.C. players
Category:Moreirense F.C. players
Category:Portugal youth international footballers
Category:Portugal under-21 international footballers |
Q:
Is there any support for mass link editing?
My old blog is no more. Existing links will (slowly) give a 404. I'm working on getting a new domain structure which I control, so that in the future I can put my own redirects in place etc, but I can't do that retroactively with the old posts.
When my new blog is up and running and I'm confident in the new structure, it would be really helpful if I could provide Stack Exchange with a map of old URL to new URL, and the fix-up be done automatically for all posts and comments, regardless of who made them. I could write a tool using the Stack Exchange API to do this for posts, but it feels like the kind of thing that would be best done by the Stack Exchange team, potentially without changing the last-modified date and edit record (as it's not a useful semantic edit, just a change of navigation). Additionally, that would allow for changes in comments and deleted posts which I couldn't otherwise edit.
Is there any facility for this already?
A:
We don't have a way to do this, but as luck happens we're software developers.
Jon, you've given a metric crap ton of knowledge here and it's supplemented by blog links all over the place. We don't want that to be harmed, so on something of this scale we'll just make it happen.
Send me a URL mapping to craver at stackoverflow; I'll make it happen.
|
Q:
Android error, failed to set top app changed
Can somebody please throw some light on the arcane error "Failed to
set top app changed", by the activity manager?
I'm wondering what causes this error. In one of my application I'm
making a view fullscreen and then switching back. For the first time
things are ok but then if i try to make the view full screen again, I
get a crash and the error mentioned above is found on logcat.
Any help is greatly appreciated.
Reagrds,
M
A:
I just encountered this problem today myself.. let me tell you what did the trick for me... maybe it will help you too.
anyway in my case it crashed because i overrided onActivityResult and inside that event i tried to do this:
Bundle extra = data.getExtras();
String albumId = extra.getString("id");
this is old code that got left in the application.. after deleting this everything worked as expected.
hope this helps in some way.
|
Our beautiful Sahara dress is the perfect trans-seasonal style, super flattering and can be dressed up with a pair of killer heels or dressed down with our boots or white runners, features - Fabric - 100% polyester georgette Tie secured at back that can be tied , front, back or...
Our beautiful Sahara dress is the perfect trans-seasonal style, super flattering and can be dressed up with a pair of killer heels or dressed down with our boots or white runners, features - Fabric - 100% polyester georgette Tie secured at back that can be tied , front, back or...
$89.00
or make 4 interest-free payments of
$22.25 AUD
fortnightly with
More info |
22 23 Mathers has also appeared on The Playboy Morning Show and had a role in a 2014 short film titled Thrilling Contradictions. 26 Mathers says of her upbringing, "I'm from a big Jewish-Italian family. I was brought up playing in the mud, cheer leading. |
977 F.2d 583
NOTICE: Sixth Circuit Rule 24(c) states that citation of unpublished dispositions is disfavored except for establishing res judicata, estoppel, or the law of the case and requires service of copies of cited unpublished dispositions of the Sixth Circuit.UNITED STATES of America, Plaintiff-Appellee,v.Anthony IRBY, Marvin Cammack, Defendants-Appellants.
Nos. 91-3998, 91-3999.
United States Court of Appeals, Sixth Circuit.
Oct. 6, 1992.
Before KEITH and BATCHELDER, Circuit Judges, and WELLFORD, Senior Circuit Judge.
PER CURIAM.
1
Both defendant-appellants, Anthony Irby and Marvin Cammack, were convicted after a jury trial for conspiracy to commit a drug offense, possession with intent to distribute cocaine base, and the use and carrying of a firearm during and in relation to a drug trafficking offense in violation of 18 U.S.C. § 924(c). Irby was also convicted of distribution of cocaine base. Irby appeals only his sentence, and Cammack appeals his convictions and his sentence.
2
Both Irby and Cammack raise the question of whether it was foreseeable to them that all of the cocaine base that was seized and used in their prosecution would be part of the conspiracy. Irby also contends that he should have been granted a two-point reduction for acceptance of responsibility. Cammack challenges the sufficiency of the evidence for each of the counts of which he was convicted. None of these arguments has merit, and the convictions and sentences will be affirmed.
3
As to Irby's claim that he was entitled to a two-point reduction for acceptance of responsibility, Irby concedes that he did not accept responsibility for all the actions of his co-conspirators for which Irby was legally responsible. Sentencing Guideline § 3E1.1(a) provides that the defendant must demonstrate clearly both recognition of and acceptance of responsibility for his criminal conduct. Irby's concession alone is sufficient to justify the district court's denial of the reduction. See United States v. Nelson, 922 F.2d 311, 316-17 (6th Cir.1990), cert. denied, 111 S.Ct. 1635 (1991).
4
With respect to Cammack's claims of insufficient evidence, the record abundantly demonstrates the existence of a conspiracy in which Irby, Cammack, and the other co-conspirators were engaged in a joint operation of selling crack cocaine, and the use of firearms as part of that operation. In addition, Cammack's connection to the conspiracy was sufficiently established. See United States v. Christian, 786 F.2d 203, 211 (6th Cir.1986). Having established Cammack's liability for the conspiracy count, his liability for the substantive counts is easily satisfied under a Pinkerton theory. See Pinkerton v. United States, 328 U.S. 640 (1946); United States v. Christian, 942 F.2d 363 (6th Cir.1991), cert. denied, 112 S.Ct. 905 (1992).
5
Finally, we reject the argument put forth by both Irby and Cammack that the full amount of crack cocaine that was seized was not foreseeable to them, and thus should not have been used to set their base offense levels for sentencing. The prosecution need only prove quantity by a preponderance of the evidence at sentencing, e.g., United States v. Gonzales, 929 F.2d 213, 216 (6th Cir.1991), and we review the district court's determination of the quantity of drugs only to determine if it is clearly erroneous. United States v. Walton, 908 F.2d 1289, 1300-01 (6th Cir.), cert. denied, 111 S.Ct. 532 (1990). The evidence presented at trial showed that both Irby and Cammack were present at the crack house on numerous occasions when crack sales were being made, and were observed selling crack; the record further supports the trial judge's finding that the crack sold in the bar originated from the crack house. The amount of crack counted as part of the conspiracy was foreseeable to both, and there is certainly no clear error in the district court's quantity determination in this case.
6
AFFIRMED.
|
// Concord
//
// Copyright (c) 2018-2020 VMware, Inc. All Rights Reserved.
//
// This product is licensed to you under the Apache 2.0 license (the "License"). You may not use this product except in
// compliance with the Apache 2.0 License.
//
// This product may include a number of subcomponents with separate copyright notices and license terms. Your use of
// these subcomponents is subject to the terms and conditions of the subcomponent's license, as noted in the LICENSE
// file.
#include "gtest/gtest.h"
#include <tuple>
#include "helper.hpp"
#include "DigestType.h"
#include "ViewsManager.hpp"
#include "ReplicasInfo.hpp"
#include "SigManager.hpp"
#include "messages/MsgCode.hpp"
#include "messages/ViewChangeMsg.hpp"
#include "bftengine/ClientMsgs.hpp"
#include "bftengine/ReplicaConfig.hpp"
using namespace bftEngine;
using namespace bftEngine::impl;
TEST(ViewChangeMsg, base_methods) {
auto config = createReplicaConfig();
ReplicaId senderId = 1u;
ViewNum viewNum = 2u;
SeqNum seqNum = 3u;
const char rawSpanContext[] = {"span_\0context"};
const std::string spanContext{rawSpanContext, sizeof(rawSpanContext)};
ReplicasInfo replicaInfo(config, true, true);
SigManager sigManager(config.replicaId,
config.numReplicas + config.numOfClientProxies,
config.replicaPrivateKey,
config.publicKeysOfReplicas);
ViewsManager manager(&replicaInfo, &sigManager, CryptoManager::instance().thresholdVerifierForSlowPathCommit());
ViewChangeMsg msg(senderId, viewNum, seqNum, concordUtils::SpanContext{spanContext});
EXPECT_EQ(msg.idOfGeneratedReplica(), senderId);
EXPECT_EQ(msg.newView(), viewNum);
EXPECT_EQ(msg.lastStable(), seqNum);
EXPECT_EQ(msg.numberOfElements(), 0u);
viewNum++;
msg.setNewViewNumber(viewNum);
EXPECT_EQ(msg.newView(), viewNum);
testMessageBaseMethods(msg, MsgCode::ViewChange, senderId, spanContext);
typedef std::tuple<SeqNum, Digest, ViewNum, bool, ViewNum, size_t, char*> InputTuple;
std::vector<InputTuple> inputData;
Digest digest1(1);
auto originalViewNum1 = viewNum;
auto viewNum1 = ++viewNum;
char certificate1[DIGEST_SIZE] = {1};
auto seqNum1 = ++seqNum;
inputData.push_back(
std::make_tuple(seqNum1, digest1, viewNum1, true, originalViewNum1, sizeof(certificate1), certificate1));
msg.addElement(seqNum1, digest1, viewNum1, true, originalViewNum1, sizeof(certificate1), certificate1);
Digest digest2(2);
auto originalViewNum2 = viewNum;
auto viewNum2 = ++viewNum;
char certificate2[DIGEST_SIZE] = {2};
auto seqNum2 = ++seqNum;
inputData.push_back(
std::make_tuple(seqNum2, digest2, viewNum2, true, originalViewNum2, sizeof(certificate2), certificate2));
msg.addElement(seqNum2, digest2, viewNum2, true, originalViewNum2, sizeof(certificate2), certificate2);
EXPECT_EQ(msg.numberOfElements(), 2);
msg.setNewViewNumber(++viewNum);
msg.finalizeMessage();
EXPECT_EQ(msg.numberOfElements(), 2);
EXPECT_NO_THROW(msg.validate(replicaInfo));
testMessageBaseMethods(msg, MsgCode::ViewChange, senderId, spanContext);
{
ViewChangeMsg::ElementsIterator iter(&msg);
for (size_t i = 0; !iter.end(); ++i) {
ViewChangeMsg::Element* currentElement = nullptr;
iter.getCurrent(currentElement);
ViewChangeMsg::Element* element = nullptr;
EXPECT_TRUE(iter.getAndGoToNext(element));
EXPECT_EQ(element, currentElement);
EXPECT_EQ(element->hasPreparedCertificate, true);
EXPECT_EQ(element->originView, std::get<2>(inputData[i]));
EXPECT_EQ(element->hasPreparedCertificate, std::get<3>(inputData[i]));
EXPECT_EQ(element->prePrepareDigest, std::get<1>(inputData[i]));
EXPECT_EQ(element->seqNum, std::get<0>(inputData[i]));
}
}
{
ViewChangeMsg::ElementsIterator iter(&msg);
size_t i = 0;
for (; !iter.end(); ++i) {
iter.gotoNext();
}
EXPECT_EQ(i, msg.numberOfElements());
}
{
ViewChangeMsg::ElementsIterator iter(&msg);
ViewChangeMsg::Element* element = nullptr;
iter.getCurrent(element);
}
{
ViewChangeMsg::ElementsIterator iter(&msg);
for (const auto& t : inputData) {
EXPECT_TRUE(iter.goToAtLeast(std::get<0>(t)));
ViewChangeMsg::Element* element = nullptr;
iter.getCurrent(element);
EXPECT_EQ(element->hasPreparedCertificate, true);
EXPECT_EQ(element->originView, std::get<2>(t));
EXPECT_EQ(element->hasPreparedCertificate, std::get<3>(t));
EXPECT_EQ(element->prePrepareDigest, std::get<1>(t));
EXPECT_EQ(element->seqNum, std::get<0>(t));
}
}
{
ViewChangeMsg::ElementsIterator iter(&msg);
EXPECT_FALSE(iter.goToAtLeast(0xFFFF));
}
}
int main(int argc, char** argv) {
::testing::InitGoogleTest(&argc, argv);
return RUN_ALL_TESTS();
}
|
The announcement of the eagering awaited details concerning Argentina and Super Rugby are less than a week away. Being revealed will be everything – the name of the team, uniform, venue and coaching staff. Also being made official will be the test schedule for Los Pumas and the ‘A’ side, the Argentina XV.
Team Name
One of the worst kept secrets is that Argentina’s Super Rugby franchise will play under the name of Los Jaguares. While it is yet to be confirmed the logo displayed below has been circulating on social media. Speculation implies that it is to be the official emblem of the franchise and will appear on the uniforms.
Coaches
The coaching staff for both Los Pumas and Super Rugby will be reaffirmed. At the present point in time no official announcement has been made concerning Super Rugby. Daniel Hourcade, though, will retain the position of Head Coach of Los Pumas.
His right hand man at the World Cup, Raúl Pérez will be the main coach of the Super Rugby franchise with Felipe Contepomi to be his assistant. Plans had been in place for Contepomi to be the Head Coach but, upon greater reflection, the UAR believes a more experienced coach to be better at this point in time.
Hourcade’s coaching staff will also consist of Pablo Bouza, Emiliano Bergamaschi and Germán Fernández, of whom all were involved in the World Cup. Joining Pérez and Contepomi at Los Jaguares will be Martín Gaitán and José Pellicena.
Jaguares Roster
The already confirmed 30 members of the Super Rugby roster will be joined by additional athletes. Certain positions do not yet have enough players per position, specifically hooker, prop and scrum half. Completing the list will not be players based abroad but, rather, developmental players based at home.
These players will form the Pumas roster for international duty throughout 2016, thereby preventing those playing in Europe from further international honors. Missing will therefore be World Cup Pumas Horacio Agulla, Marcos Ayerza, Marcelo Bosch, Juan Martín Fernández Lobbe, Mariano Galarza, Juan Figallo, Juan Imhoff and Juan Pablo Socino.
In order for such players to be capped again they will need to depart Europe to play for the Argentine franchise or for a rival. It is for this reason that Tomás Cubelli will remain eligible for international duty. The scrum half will be playing for the Brumbies. His spot on the Jaguares roster is expected to go to Felipe Ezcurra.
The current 30-man roster is as follows:
Hooker Agustín Creevy Hooker Julián Montoya Prop Santiago García Botta Prop Ramiro Herrera Prop Lucas Noguera Paz Prop Nahuel Tetaz Chaparro Second-row Matías Alemanno Second-row Juan Cruz Guilemaín Second-row Guido Petti Second-row Tomás Lavanini Back-row Rodrigo Báez Back-row Facundo Isa Back-row Juan Manuel Leguizamón Back-Row Tomás Lezana Back-row Pablo Matera Back-row Javier Ortega Desio Back-row Leonardo Senatore Scrumhalf Martín Landajo Fly half Juan Martín Hernández Fly half Nicolás Sánchez Center Gabriel Ascárate Center Emiliano Boffelli Center Jerónimo De la Fuente Center Santiago González Iglesias Center Matías Moroni Center Matías Orlando Wing Santiago Cordero Wing Manuel Montero Fullback Ramiro Moyano Fullback Joaquín Tuculet
Jaguares Home Ground
Home matches will all be played in Buenos Aires at Vélez Sarsfield stadium. The large, 50,000 capacity stadium was chosen after previous efforts to play at a smaller venue in a rugby-specific neighborhood were unsuccessful.
Vélez Sarsfield is a stadium that the UAR has rented on numerous occasions in the past. The venue played host to 28 test matches from 1986-2015 with Tier 1 rivals Australia, England, France, Ireland, Italy, New Zealand, Scotland, South Africa and Wales all playing at the ground.
Argentina International Calendar
The Argentina XV will play in the Americas Rugby Championship against the USA on February 02 and subsequently play Canada, Uruguay, Brazil and Chile. The five matches will be followed by three or four home games in June with Romania playing on June 11 and France doing so on June 18 and 25. Romania’s visit is yet to be determined as is a test against Italy on June 04.
Venues for the June internationals are to be Tucumán and a yet to be determined location in the south. Carlos Araujo previously commented that the UAR is seeking to play a test in Patagonia in 2006. Talk is that either Italy or Romania will be doing so in June 2016.
From August to October Argentina six matches in the Rugby Championship. As has been the case in previous tournaments venues for the matches are to be spread. South Africa will play in Salta while Australia and New Zealand will face Los Pumas in different, yet to be determined, cities.
The traditional end of year tour will be unique for Argentina in 2016 as the South Americans will play exclusively in the U.K. The three-match tour will see Argentina playing against Wales on November 12, Scotland on November 19 and England on November 26.
Confirmation
Complete details of the above will be made official by the UAR on Wednesday, December 16. In addition Los Jaguares playing uniforms will be revealed.
Source: Olé |
Introduction {#S0001}
============
Upside-down stomach is an extreme form of paraoesophageal hiatal hernia where the entire stomach is dislocated into the thoracic cavity \[[@CIT0001], [@CIT0002]\]. Other abdominal organs may be present in the large hernial sac, most often the spleen or part of the large intestine \[[@CIT0003]\]. In patients diagnosed with upside-down stomach, there is a high risk of developing severe complications, which may have a fatal outcome for the patient. Surgical treatment is the only curative therapy and at the same time prevents the development of complications.
Our work presents elective surgical laparoscopic therapy in a set of patients diagnosed with upside-down stomach. Over a period of 10 years, perioperative and postoperative results were retrospectively evaluated, and one year following the operation, long-term results of surgical therapy were evaluated.
Material and methods {#S0002}
====================
From 1998 to 2008, a total of 27 patients diagnosed with upside-down stomach were surgically treated at the 1st Department of Surgery, University Hospital Olomouc. The patient set included only patients with a chronic course of the disease and where the entire stomach was localized in the mediastinum, based on the X-ray barium swallow. The patient set consisted of 16 males (60%) and 11 females (40%). The age of the patients ranged from 43 years to 77 years; the average age was 63 years. The reported duration of symptoms ranged from 7 months to 4 years; the average duration was 26 months. Dominating symptoms included postprandial chest pressure and breathlessness, which were described in 21 cases (77%). Typical symptoms of oesophageal reflux disease such as pyrosis, epigastric pain and regurgitation, along with the aforementioned symptoms, were present in 11 patients (40%).
Diagnosis of the disease was based on endoscopic examination and barium swallow ([Figure 1](#F0001){ref-type="fig"}). To exclude a cardiac aetiology of chest pain, a cardiologic examination was performed.
{#F0001}
Patients were operated on under general endotracheal anaesthesia. Patients were placed in a supine, anti-Trendelenburg position with abducted lower limbs. The operator stood between the lower limbs of the patient, first assistance to the left and second assistance to the right. Capnoperitoneum was introduced by way of a Veress needle; during the operation the pressure was set to 10 mmHg with a maximum of 12 mmHg. The operation was performed from five entries; the standard four 10 mm ports and one 5 mm port were used. A port introduced 10 cm below the xiphoid process was used to introduce the laparoscope with 30-degree optics. The operator used a 10 mm port left of the middle axial line, using the right hand to operate the dissector with monopolar coagulation, scissors and harmonic scalpel. The left hand worked with the Endoclinch in a 5 mm port, which was located below the right ribcage 5 cm from the linea alba. Another 10 mm port was introduced below the xiphoid process for the liver retractor to elevate the left liver lobe. The last 10 mm port was introduced below the left ribcage in the anterior axial line for the atraumatic Babcock. After introduction of the instruments, careful reposition of the stomach from the mediastinum back into the abdominal cavity was performed ([Figure 2](#F0002){ref-type="fig"}). Discision of the pars flaccida of the lesser omentum using the harmonic scalpel with interruption of the Leimer membrane followed. The next step included resection of the large hernial sac, which in some patients was difficult due to adherence to the parietal pleura. A nasogastric tube was always introduced into the stomach by the anaesthesiologist for better orientation of the oesophagus position and to prevent its injury. After isolation of the right and left crus of the diaphragm, the distal oesophagus was mobilized approximately 6 cm above the cardia ([Figure 3](#F0003){ref-type="fig"}). A Collis gastroplasty for short oesophagus was never performed; in all cases, it was possible to sufficiently mobilize the oesophagus below the diaphragm. The hiatoplasty was performed in all patients by individual Z stitches using the Endostitch with suture strength 0; on average 3 stitches were used. During construction of the hiatoplasty, a calibration probe of 42 F was introduced into the stomach. In 12 patients (44%) without reflux symptomatology, a fundopexy by three individual U stitches to the ventral peritoneum with suture strength 0 was performed. In 15 patients (56%) with reported reflux symptoms or with endoscopic findings of reflux oesophagitis a Nissen fundoplication was indicated. Construction of the fundoplication was done using four individual stitches with Endostitch 2-0 suture material. The last stitch was fixed to the distal oesophagus to prevent the telescopic phenomenon. Drainage was introduced individually in 13 patients (48%) based on blood loss during the operating procedure.
{#F0002}
{#F0003}
Results {#S0003}
=======
In all 27 patients (100%) the operation was performed laparoscopically; conversion to a classical operation from laparotomy was never necessary. All the patients were operated on by surgeons with many years' experience in mini-invasive surgical treatment of oesophageal reflux disease. The average operation time was 135 min; the range in operation time was 107 min to 182 min. In 3 cases (11%), during preparation of the stomach in the mediastinum, the left thoracic cavity was iatrogenically opened with development of pneumothorax, which was treated by chest drainage. No other severe perioperative complication was seen. Blood loss during the procedure ranged from 20 ml to 85 ml; the average was 51 ml. Drainage of the abdominal cavity was removed on the 2nd postoperative day at the latest; the secretion never surpassed 50 ml. Postoperative pain was treated by analgesic therapy. No serious complications were observed immediately following the operation. Mortality in our set of patients was zero, morbidity 11%. On average, patients were released from the surgery department into the care of their general practitioners 5.4 days postoperatively.
To evaluate long-term results of the surgical treatment, patients were invited for follow-up one year following the operation. A total of 21 patients (77%) attended the follow-up. Upon endoscopy and barium swallow, no patients showed recurrence of hiatal hernia or other pathology of the oesophagus or stomach. Subjectively, 16 patients (76%) evaluated their condition as very favourable, without presence of preoperative symptoms or other problems. In 2 patients (9%), minimal intermittent dysphagia without weight loss was present. Three patients (14%) reported postprandial dyspepsia; after administration of prokinetics their condition partially improved. In 1 case (4%), dislocation of the fundoplication into the mediastinum occurred 17 months following the operation, which was confirmed endoscopically and by barium swallow. Reoperation was performed in this patient laparoscopically; the fundoplication was repositioned back into the abdominal cavity with a new hiatoplasty.
######
Results of surgical therapy in patients diagnosed with upside-down stomach
----------------------------- ------------------------------------
**Patients** (*n* = 27)
**Sex (males: females)** 16 (60%): 11 (40%)
**Mini-invasive procedure** 27 (100%)
**Average operation time** 135 min
**Morbidity** 3 (11%) -- left-sided pneumothorax
**Mortality** 0
**Reoperation** 1 (4%) -- hernia recurrence
----------------------------- ------------------------------------
Discussion {#S0004}
==========
Upside-down stomach is an extreme form of hiatal hernia with organoaxial torsion of the stomach and its localization in the thoracic cavity; the hernial sac may also contain other abdominal organs \[[@CIT0004]\]. The diagnosis of upside-down stomach was first described by Berti during autopsy in 1866, the first mention of surgical therapy in 1896 by Berg \[[@CIT0005]\].
Major symptoms of the disease include postprandial chest discomfort, breathlessness, dysphagia, vomiting and anaemia \[[@CIT0005]\]. Typical symptoms of oesophageal reflux disease may not be present \[[@CIT0006]\]. In most cases, the course of the disease is chronic. It is manifested acutely in case of complications, which include strangulation, stomach obstruction, and acute bleeding from ulceration \[[@CIT0003], [@CIT0007]\]. Strangulation may even lead to stomach gangrene with subsequent perforation and the development of mediastinitis. In cases of obstruction, aspiration of stomach contents into the respiratory tract may occur \[[@CIT0004], [@CIT0008]\]. All of these cases are severe complications, which if not diagnosed in time and immediately treated may be life-threatening for the patient \[[@CIT0004], [@CIT0009]\].
Diagnosis is established based on X-ray examination (barium swallow) and endoscopic examination. The radiological image shows the entire stomach in the chest and the GE junction is in close proximity to the oesophageal hiatus \[[@CIT0003]\].
All patients with upside-down stomach are indicated for surgical treatment \[[@CIT0001], [@CIT0003]\]. In patients with acute symptoms of the disease, an urgent surgical procedure is indicated; the type of procedure is modified based on perioperative findings \[[@CIT0003], [@CIT0007], [@CIT0010]\]. In the remaining patients, an elective procedure is performed. Laparoscopic operation of paraoesophageal hernia was first described by Cushieri in 1992 \[[@CIT0005]\]. Works published in the last decade regarding large paraoesophageal hernias clearly prefer the elective mini-invasive surgical approach \[[@CIT0005], [@CIT0008], [@CIT0011], [@CIT0012]\]. Works published in the last three years mention using the robotic system during operations of paraoesophageal hernias. Hartman reports on operations of upside-down stomach using the Da Vinci robotic system. Oesophageal preparation around the hiatus is considered to be the primary advantage; the cost of the procedure and educating time of the operation team are disadvantages \[[@CIT0013]\]. Individual authors all agree on the principle of the surgical procedure (stomach reposition back into the abdominal cavity, resection of the hernia sac, hiatoplasty and fundoplication) \[[@CIT0006], [@CIT0011], [@CIT0014], [@CIT0015]\]. A short oesophagus may present a problem, and is defined as being at least 5 cm distant from the GE junction above the diaphragm. Swanstrom reports this finding in 14% of patients, and in 30% of these patients the oesophagus was mobilized laparoscopically without complications. In the remaining cases where the oesophagus could not be mobilized, a Collis gastroplasty was performed, where 20-70% of patients report its benefit in minimal incidence of postoperative dysphagia, acid reflux to the oesophagus and hernia recurrence \[[@CIT0016]\]. The literature reports performance of a Collis gastroplasty for short oesophagus ranging from 0% (Ponsky) to 20% (Yano) \[[@CIT0011], [@CIT0012], [@CIT0017]\]. In our set of patients, it was always possible to mobilize the distal oesophagus to a sufficient extent with placement of the GE junction below the diaphragm. Hiatoplasty is always part of the surgical procedure. Gantert prefers its performance without using a mesh, while Zehetner and Oelschlanger report a lower percentage of hernia recurrence after implantation of a mesh into the oesophageal hiatus \[[@CIT0001], [@CIT0014], [@CIT0018]\]. In our set of patients, hiatoplasty was performed using individual cross stitches with Endostitch. Fundoplication is included in the procedure for low percentage of hernia recurrence and optimal prevention of acid reflux into the oesophagus in the postoperative period \[[@CIT0019]\]. In over 90% of cases, fundoplication is performed in the Nissen modification \[[@CIT0004], [@CIT0006], [@CIT0012], [@CIT0020]\]. Other presented possibilities include Toupet or Dorr plasty \[[@CIT0005], [@CIT0008], [@CIT0020]\]. Gastropexy is reported as another possibility to prevent hiatal hernia recurrence \[[@CIT0007], [@CIT0021]\]. In our set of patients, we preferred gastropexy in patients without reflux symptomatology with a promising endoscopic finding without reflux oesophagitis. Perioperative complications of mini-invasive therapy for upside-down stomach are comparable to the incidence of complications in patients operated for gastroesophageal reflux disease (bleeding, injury to the liver, spleen, stomach and oesophagus). Operation conversion is most often due to injury to the oesophagus, bleeding, or unclear operating field \[[@CIT0001], [@CIT0005], [@CIT0012], [@CIT0022]\]. When comparing with results of patients with other types of hiatal hernia, there is a higher incidence of injury to the pleura and opening of the thoracic cavity with development of pneumothorax during preparation of the large hernial sac \[[@CIT0005], [@CIT0023]\]. In terms of long-term results, the most common complication is hernia recurrence, which in large patient sets is reported as being up to 10% \[[@CIT0011], [@CIT0014], [@CIT0021]\]. Reoperations are indicated for symptomatic hernia recurrence or return of reflux symptoms; Gantert and Andujar report a rate of 4% to 6% \[[@CIT0011], [@CIT0014]\].
Conclusions {#S0005}
===========
Surgical treatment is the only curative therapy in patients with upside-down stomach. Operation is preferred even in patients with minimal symptoms of the disease to prevent the development of serious complications of the disease. An elective laparoscopic operation in the hands of an experienced surgeon is a safe procedure which brings the patient all the benefits of a minimally invasive procedure with a minimal number of perioperative and postoperative complications and promising long-term results \[[@CIT0024]--[@CIT0027]\].
|
This isn't a good comparison because BitCoin isn't a single business, it is a monetary platform that can be used by all businesses. If the United States government had to run on the market cap of Skype, it would grind to a halt. The order that these things operate in are the Trillions, not billions.
I don't think that $15,000 per bitcoin will happen within the year (barring the outside chance of some hyperinflationary event), but it is easily attainable in the long term.
Well, I see your point as currency markets are like the ocean and not the fish. But what percentage of cash balances do you think world population will keep in BTC? Why? What is your 'long term' horizon?
If Bitcoin had 663m users like Skype and if each user kept $700 in cash balances and it were 2016 with 15m bitcoins then that would result in $31,000 per bitcoin. And that does not factor in the bitcoins in circulation that have been destroyed (private keys lost, sent to unrecoverable addresses, etc.).
I am slightly sceptical about the scalability issues even in the long term. Storage space or IO throughput aren't even the most crucial limits, network bandwidth is going to be the first real bottleneck Bitcoin is going to hit.
Yeah, seriously. Each node must be able to handle 8Gbps if bitcoin ever operates at VISA levels.
Every full node. Only pool operators and solo miners need to be full nodes.
Running a full node will eventually become specialized service/business.
This isn't a good comparison because BitCoin isn't a single business, it is a monetary platform that can be used by all businesses. If the United States government had to run on the market cap of Skype, it would grind to a halt. The order that these things operate in are the Trillions, not billions.
I don't think that $15,000 per bitcoin will happen within the year (barring the outside chance of some hyperinflationary event), but it is easily attainable in the long term.
Well, I see your point as currency markets are like the ocean and not the fish. But what percentage of cash balances do you think world population will keep in BTC? Why? What is your 'long term' horizon?
If Bitcoin had 663m users like Skype and if each user kept $700 in cash balances and it were 2016 with 15m bitcoins then that would result in $31,000 per bitcoin. And that does not factor in the bitcoins in circulation that have been destroyed (private keys lost, sent to unrecoverable addresses, etc.).
If Bitcoin had 663m users like Skype and if each user kept $700 in cash balances
I consider myself an optimist concerning Bitcoin. But this is too optimistic even for me. You can't compare with Skype like that. It's pretty easy to create a Skype account, and most important, there's no commitment in doing so: you don't have to spend a penny.Putting ~$700 on this "weird new technology" though, it's a whole different thing.
If Bitcoin had 663m users like Skype and if each user kept $700 in cash balances
I consider myself an optimist concerning Bitcoin. But this is too optimistic even for me. You can't compare with Skype like that. It's pretty easy to create a Skype account, and most important, there's no commitment in doing so: you don't have to spend a penny.Putting ~$700 on this "weird new technology" though, it's a whole different thing.
It would probably take more than a decade to get that kind of penetration with bitcoin, and I think that's being overly optimistic. Also, I expect by that time the bitcoin idea will have evolved a better system.
Rather then think that BTC is going to outcompete all these technologies with their advertising dollars I think you futurists should really ask yourselves what markets BTC offers a clear advantage in.
With international wire transfer fees at about $45 bucks (BOA), and currency conversion on top, BTC provides a clear advantage for small international business. Small is where it really shines because its possible to hold foreign currency either by carrying a $1M balance in a swiss act or opening foreign bank accounts in the country whose currency you need to hold. The BTC advantage is especially large if the business is international in both the supply and sales side. For example, getting components made in China, adding some kind of value in Europe (even just a brand name), and then reselling to the USA. The full money cycle in one supply cycle involves 2 currency conversions: USD->Euros (sale) Euros->Yuan (rebuy inventory). And of course if you are doing this via paypal, the full cycle is 2 paypal txns or 6% -- add currency conversion on top of that and I'll bet it pushes 10%! That's a LOT of overhead compared to what BTC can offer.
Another niche is non-local purchases for people who do not qualify for debt-based instruments (i.e. paypal, credit card).
Once Bitcoin reaches VISA levels, the technology will be there - it is as easy as that.
I think that's a too simplistic attitude. Bandwidth doesn't follow Moore's law; instead it often regresses to where many people now suffer severe bandwidth limitations, peering partners start arguing about money, and powerful companies fight network neutrality. Instead of sitting back and waiting for bandwidth to become ubiquitous and limitless, Bitcoin development must be focused on scaleability.
Well before we reach VISA levels, bitcoin will hit $100 a piece and there will be much more incentive to tackle the issue. The closer we get to the scaling problems the more resources we will have to tackle them. I'm not worried.
Do the Dev's have an actual plan? You know -- with projected growth estimates, and various deadlines and coding milestones to achieve based on that? And where can I dig around for such info?
There is not plan of that detail that I'm aware of. If you're so worried, make one. That's how open source works. We have a wiki and a mailing list. Lay out a basic schedule and ask the bitcoin-dev list for feedback.
It would probably take more than a decade to get that kind of penetration with bitcoin, and I think that's being overly optimistic. Also, I expect by that time the bitcoin idea will have evolved a better system.
It will probably take a long time before a 'better' system takes over as long as the recognized primary dev team remains composed of people who are several cuts above the mid-tier user base in terms of their motivations and engineering effectiveness. I conjecture that Bitcoin will _be capable of_ evolving to overcome most of the problems that could crop up although it will lose some of the features that were enjoyed in it's early existence.
I have had a few HNWIs and UHNWIs whose only reservation with moving $500k or $1m into BitCoin is the lack of liquidity and scalability of investment so they settle with puny amounts like $25k or $50k, etc.
It's funny: some types of investor won't invest into bitcoin because the market is too thin to suck up their currency. They will probably invest their millions of USD when bitcoin trades around $100 saying: "finally this market has matured enough so we can invest, even using our comfy brokerage account". Had they just invested $100,000 now and blown $900,000 on drugs and women.. they would have the same amount of coins in the end.
I have had a few HNWIs and UHNWIs whose only reservation with moving $500k or $1m into BitCoin is the lack of liquidity and scalability of investment so they settle with puny amounts like $25k or $50k, etc.
It's funny: some types of investor won't invest into bitcoin because the market is too thin to suck up their currency. They will probably invest their millions of USD when bitcoin trades around $100 saying: "finally this market has matured enough so we can invest, even using our comfy brokerage account". Had they just invested $100,000 now and blown $900,000 on drugs and women.. they would have the same amount of coins in the end.
this is actually a good point. for that however, one requires visionary thinking. not everyone has that even when they are a UHNWI.
That is probably the most deluded thing I've read around these parts. 1% of world GDP is 700 billion US dollars.
Sorry, I mistyped and put the decimal point in the wrong place. I believe .01% of GWP within a year is possible. This is still $7 Billion.
Bitcoin seems to be be one of the "stickiest" of World GDP currencies, ie, the kind that doesn't strengthen in value the more it is used (as others would expect it to). Basically, to put it in economic terms, our M3 is too high, no one trusts the currency enough to leave any significant value in it, especially the black market dealers which probably make up more of Bitcoin than we are willing to admit. I do think we could represent .01% of World GDP, but it will be with a currency that has such a high turn-over rate that we wouldn't enjoy the price we'd expect from it. Volume-wise I think the network can handle $7 billion per year's worth of transactions, though.
That is probably the most deluded thing I've read around these parts. 1% of world GDP is 700 billion US dollars.
Sorry, I mistyped and put the decimal point in the wrong place. I believe .01% of GWP within a year is possible. This is still $7 Billion.
Bitcoin seems to be be one of the "stickiest" of World GDP currencies, ie, the kind that doesn't strengthen in value the more it is used (as others would expect it to). Basically, to put it in economic terms, our M3 is too high, no one trusts the currency enough to leave any significant value in it, especially the black market dealers which probably make up more of Bitcoin than we are willing to admit. I do think we could represent .01% of World GDP, but it will be with a currency that has such a high turn-over rate that we wouldn't enjoy the price we'd expect from it. Volume-wise I think the network can handle $7 billion per year's worth of transactions, though.
I am very new to Bitcoin and I am already seeing this thing as the new gold. I couldn't trust anything more than a currency backed by the internet. Ever since the 90s Dotcom bubble, I knew things were changing and money is only next in line.
So what's not to trust?
Many people my age don't trust new technology. They like things to be traditional. People should be free to go backwards but I am moving forward. Go Bitcoin!
Once Bitcoin reaches VISA levels, the technology will be there - it is as easy as that.
I think that's a too simplistic attitude. Bandwidth doesn't follow Moore's law; instead it often regresses to where many people now suffer severe bandwidth limitations, peering partners start arguing about money, and powerful companies fight network neutrality. Instead of sitting back and waiting for bandwidth to become ubiquitous and limitless, Bitcoin development must be focused on scaleability.
Well before we reach VISA levels, bitcoin will hit $100 a piece and there will be much more incentive to tackle the issue. The closer we get to the scaling problems the more resources we will have to tackle them. I'm not worried.
Do the Dev's have an actual plan? You know -- with projected growth estimates, and various deadlines and coding milestones to achieve based on that? And where can I dig around for such info?
There is not plan of that detail that I'm aware of. If you're so worried, make one. That's how open source works. We have a wiki and a mailing list. Lay out a basic schedule and ask the bitcoin-dev list for feedback.
Bitcoin seems to be be one of the "stickiest" of World GDP currencies, ie, the kind that doesn't strengthen in value the more it is used (as others would expect it to). Basically, to put it in economic terms, our M3 is too high
But of course putting numbers and measurements to these subjective values is nonsense. As Ludwig von Mises wrote, "The attempts to determine in money the wealth of a nation or of the whole of mankind are as childish as the mystic efforts to solve the riddles of the universe by worrying about the dimensions of the pyramid of Cheops."
I am very new to Bitcoin and I am already seeing this thing as the new gold. I couldn't trust anything more than a currency backed by the internet. Ever since the 90s Dotcom bubble, I knew things were changing and money is only next in line.
So what's not to trust?
Many people my age don't trust new technology. They like things to be traditional. People should be free to go backwards but I am moving forward. Go Bitcoin!
Mike, you seem to get it. Gold, like the FRN or Euros, is merely the blood while banks, credit cards, Paypal, etc. are the veins. Bitcoin is both the blood and the veins. This makes Bitcoin, in several ways, the ultimate offshore account.
One thing we know for sure is that the stuff we use as currency, like FRN, Euros, Yen, etc. are not going to be used as currency much longer. The system is completely FUBARed. What replaces it remains to be seen. Will it be Bitcoin? Perhaps. Perhaps not.
But you are right that monetary evolution is coming and it doesn't matter what anyone tries to do to stop it. Change is not mandatory; you can go extinct.
Eh, I used to think so too. And being from the Austrian school-of-thought I would agree with what Mises says, but when considering the productive output of the world, it is (at the very least) a measure of transactions. This can be handy when you have a government that provides a currency that gets inflated, but it becomes kind of useless when said government quits recording M3 so you can see its impact, so I digress.
I am very new to Bitcoin and I am already seeing this thing as the new gold. I couldn't trust anything more than a currency backed by the internet. Ever since the 90s Dotcom bubble, I knew things were changing and money is only next in line.
So what's not to trust?
Many people my age don't trust new technology. They like things to be traditional. People should be free to go backwards but I am moving forward. Go Bitcoin!
Yes, not trusting new technology can be problematic because it puts one at a competitive disadvantage to those who do trust new technology. Digging holes with shovels instead of backhoes.
The wealth transfer from holders of other stuff to holders of bitcoins is accelerating.
The wealth transfer from holders of other stuff to holders of bitcoins is accelerating.
Figured I would let people know that the next 2-3 months are going to be extremely exciting with the bitcoin price. You may be tempted to sell but that may not be a very good idea and you will likely be regretting that decision six months from today. There is going to be a ton of funds flowing into Bitcoin.
Currently, there are a bunch of Silicon Valley VCs and Wall Streeters, at least 5-6 I am personally aware of, who are fighting over each other to establish multi-million dollar positions. But that amount of capital is going to look tiny compared to what is scheduled in about 2-3 months. The Bitcoin market, at current prices, is simply far far too small for these amounts of fund flows and why they are melting up the price by buying anything that appears for sale.
I really hope the Bitcoin community gets to benefit from this massive upcoming wealth transfer. To do so merely (1) hold onto your bitcoins, (2) restrict supply as much as you can (this is very important) and (3) make any of these newcomers pay dearly for whatever trickle of bitcoins you do choose to sell or spend.
So, who wants to be like the Litecoin trader with seller's remorse? One guy wrote a sad tale about how in January he bought 80,000 litecoins at $0.068 and sold them at $0.20. Litecoins are selling for about $5 today. So he took a 194% return, or $10,560, but missed out on a 7,250% return, or $394,560. and is feeling seller's remorse. |
2018 Odlum Brown Vancouver Open
The 2018 Odlum Brown Vancouver Open was a professional tennis tournament played on outdoor hard courts. It was the thirteenth (ATP) and sixteenth (ITF) editions of the tournament and was part of the 2018 ATP Challenger Tour and the 2018 ITF Women's Circuit. It took place in Vancouver, British Columbia, Canada, on 13–19 August 2018.
Men's singles main draw entrants
Seeds
1 Rankings as of 6 August 2018.
Other entrants
The following players received a wildcard into the singles main draw:
Ruben Bemelmans
Vasek Pospisil
Brayden Schnur
Benjamin Sigouin
The following players received entry into the singles main draw using protected rankings:
Santiago Giraldo
Illya Marchenko
The following players received entry into the singles main draw as special exempts:
Christopher Eubanks
Lloyd Harris
The following players received entry from the qualifying draw:
JC Aragone
Dan Evans
Borna Gojo
Thai-Son Kwiatkowski
Women's singles main draw entrants
Seeds
1 Rankings as of 6 August 2018.
Other entrants
The following players received a wildcard into the singles main draw:
Françoise Abanda
Gabriela Dabrowski
Rebecca Marino
Katherine Sebov
The following players received entry from the qualifying draw:
Misaki Doi
Julia Glushko
Giuliana Olmos
Martina Trevisan
The following player received entry as a lucky loser:
Maryna Zanevska
Champions
Men's Singles
Dan Evans def. Jason Kubler 4–6, 7–5, 7–6(7–3)
Women's Singles
Misaki Doi def. Heather Watson 6–7(4–7), 6–1, 6–4
Men's Doubles
Luke Bambridge / Neal Skupski def. Marc Polmans / Max Purcell 4–6, 6–3, [10–6].
Women's Doubles
Desirae Krawczyk / Giuliana Olmos def. Kateryna Kozlova / Arantxa Rus, 6–2, 7–5
External links
Official Website
2018 Odlum Brown Vancouver Open at ITFtennis.com
Category:2018 ITF Women's Circuit
Category:2018 ATP Challenger Tour
Category:2018 in Canadian sports
Category:Tennis tournaments in Canada
Category:Vancouver Open |
Update:
According to our sources, Pedroso move to #FCDallas is in the processing/paperwork stages.
A reminder: deals can fall apart at this stage. https://t.co/gBbROccGSH — 3rd Degree (@3rdDegreeNet) July 2, 2018
It was first reported on Thursday (June 28) by multiple South American press that 24-year-old Brazilian left-back Marquinhos Pedroso was potentially joining to FC Dallas. On Sunday those reports became much more concrete as Pedroso checked in on his Instagram account in Dallas.
Marquinhos Pedroso checked in twice as being in Dallas, Texas, on July 1, 2018. (Marquinhos Pedroso Instagram)
Marquinhos Pedroso is currently owned by Figueirense in Brazil, where he played 71 senior games after his youth career there, but has been sent out four times on loan since 2013 to Guarani (Brazil), Grêmio (Brazil), Gaziantepspor (Turkey), and Ferencváros (Hungary).
It seems most probable a Pedroso deal, if it comes to pass, would be a loan with an FC Dallas option to buy. FC Dallas is in need of a left back after the sale of Anton Nedyalkov Ludogorets in Bulgaria.
Here are two highlight videos of the Pedroso. |
Detection and quantification of vitamin K(1) quinol in leaf tissues.
Phylloquinone (2-methyl-3-phytyl-1,4-naphthoquinone; vitamin K(1)) is vital to plants. It is responsible for the one-electron transfer at the A(1) site of photosystem I, a process that involves turnover between the quinone and semi-quinone forms of phylloquinone. Using HPLC coupled with fluorometric detection to analyze Arabidopsis leaf extracts, we detected a third redox form of phylloquinone corresponding to its fully reduced - quinol-naphthoquinone ring (PhQH(2)). A method was developed to quantify PhQH(2) and its corresponding oxidized quinone (PhQ) counterpart in a single HPLC run. PhQH(2) was found in leaves of all dicotyledonous and monocotyledonous species tested, but not in fruits or in tubers. Its level correlated with that of PhQ, and represented 5-10% of total leaf phylloquinone. Analysis of purified pea chloroplasts showed that these organelles accounted for the bulk of PhQH(2). The respective pool sizes of PhQH(2) and PhQ were remarkably stable throughout the development of Arabidopsis green leaves. On the other hand, in Arabidopsis and tomato senescing leaves, PhQH(2) was found to increase at the expense of PhQ, and represented 25-35% of the total pool of phylloquinone. Arabidopsis leaves exposed to light contained lower level of PhQH(2) than those kept in the dark. These data indicate that PhQH(2) does not originate from the photochemical reduction of PhQ, and point to a hitherto unsuspected function of phylloquinone in plants. The putative origin of PhQH(2) and its recycling into PhQ are discussed. |
Council Stops "Y" Redevelopment
Ann Arbor, MI – The plan to redevelop the site of Ann Arbor's old Y-M-C-A building has fallen apart. On a six to five vote Monday night, city council refused to grant another extension to the developer. Click on the audio icon to hear more on the story from WEMU's Andrew Cluley |
1. Field of the Invention
The present invention relates to a determination of communication application.
2. Description of the Related Art
Conventionally, when transmitting image data from a personal computer (PC), which is a communication apparatus, to a printer and printing the image data, a user specifies the image data using a user interface (UI) of the PC and instructs the PC to print the image data. The PC starts a transmission application for printing according to the print instruction from the user, and transmits image data to the printer. When transmitting image data from the PC to a memory card and storing the image data, the user specifies the image data using the UI of the PC and instructs the PC to store the image data. The PC starts a transmission application for storing the data according to the storing instruction from the user, and transmits the image data to the memory card.
On the other hand, there are communication methods such as contactless integrated circuit (IC) card wireless communication and near field communication (NFC) which use electromagnetic induction, and TransferJet (registered trademark) which uses an induced electric field. In these communication methods, when a communication apparatus approaches another communication apparatus, communication can be established.
When performing communication using electromagnetic induction or an induced electric field, a user is to bring a communication apparatus close to a communication partner to establish communication. For example, when printing with a printer, a user brings a communication apparatus close to the printer to establish communication. However, when a conventional technique is employed, the user gives an instruction to print the data by using the UI, and thereafter the user brings the communication apparatus close to the printer to establish communication. As described above, to transmit the data to the communication partner and cause the communication partner to perform predetermined processing, the user is to input an instruction of the predetermined processing on the UI of the communication apparatus, and then bring the communication apparatus close to the communication partner. Therefore, the user's operation has been cumbersome. |
Why we love it
A great-value piece for your cold-weather wardrobe, this must-buy seam-detail sweater has a flattering swing shape. Made from a soft cotton-modal-wool blend, the sweater is easy to care for and feels lightweight yet warm. |
The project supports the Data Coordinating Center (DCC) to the National NeuroAIDS Tissue Consortium (NNTC). The NNTC is a resource for investigators conducting NeuroAIDS research to identify the neuropathogenic mechanisms involved In HIV disease of the central and peripheral nervous systems. The consortium is composed of four NNTC Clinical Sites and one DCC that work cooperatively as a resource for the research community, providing HIV/AIDS Investigators with clinically annotated datasets of antemortem Information and associated postmortem tissue and fluids. The DCC provides the NNTC with scientific leadership, management expertise, bioinformatics and Information systems infrastructure, statistical and epidemiology expertise, and serves as a voting member of the NNTC Steering Committee. The DCC works cooperatively with the NNTC Clinical Sites to provide (1) management and database capabilities to ensure effective clinical and brain banking operations and (2) scientific expertise in biostatistics and HIV epidemiology to support broad analyses of the NNTC clinical database and analyses that support the recruitment and retention goals for the cohort. The NNTC has produced over 380 peer-reviewed publications, over 175 abstracts/book chapters/presentations, as well as supporting the work on numerous researchers' grants. The DCC serves as the point of contact for users of the resource (tissue and/or data requests) and services the requests from the time they are submitted through fulfillment of the request and follow up with the requestor to provide the results of their researc. The NNTC website is used extensively for dissemination of resource Information (query tools, reports, request applications) and management tasks such as resource tracking, document libraries, and communication activities. An inventory of all specimens housed at each NNTC Clinical Site will be maintained, as will be databases generated with additional research data beyond clinical assessments such as bioinformatics datasets by the users of the resource. The DCC promotes the NNTC through public relations materials including a comprehensive website and meeting presentations. RELEVANCE (See instructions): The NNTC has served as a valuable resource to the NeuroAIDS research community since 1998. Its continuation is critical given the need for quality CNS tissues and related antemortem clinical data. Investigators using these resources examine emerging research topics in the NeuroAIDS field such as: a) eradication of HIV from persistent CNS reservoirs; b) pathogenic mechanisms of HIV-associated neurocognitive disorders (HAND) in setting of long term HAART; and c) HIV and aging. |
Involvement of ERK1/2/NF-κB signal transduction pathway in TF/FVIIa/PAR2-induced proliferation and migration of colon cancer cell SW620.
Our previous study has demonstrated that TF/FVIIa and protease-activated receptor 2 (PAR2) are closely related to the proliferation and migration of colon cancer cell line SW620. However, the detailed signaling cascades and underlying molecular mechanisms remain unclear. This study has investigated whether extracellular signal-regulated kinase 1 and 2 (ERK1/2) and nuclear factor kappaB (NF-κB) signaling pathways are involved in the events. The results revealed that PAR2-activating peptide (PAR2-AP) or FVIIa elicited time-dependent upregulation of ERK1/2 phosphorylation in SW620 cells, and the effect of FVIIa was significantly attenuated by anti-TF antibody. PAR2-AP or FVIIa also increased NF-κB (p65/RelA) levels among cell nuclear proteins and simultaneously decreased IκB-α levels in the cytoplasmic proteins. Such effects of FVIIa can be inhibited with anti-PAR2 or anti-TF antibodies. While ERK1/2 inhibitor (U0126) intervened with the regulatory effects of PAR2-AP and FVIIa on IκB-α/NF-κB (p65/Rel) expression in the cells, NF-κB inhibitor (PDTC) partially blocked the enhancing effects of PAR2-AP and FVIIa on the proliferating and migratory ability of SW620 cells. Furthermore, the regulatory effects of PAR2-AP and FVIIa on expressions of certain proteins (IL-8, caspase-7, and TF) were also significantly abolished by PDTC. Collectively, the data in this study suggest that the interaction between FVIIa and TF induces PAR2 activation, thereby triggers the ERK1/2 and IκB-α/NF-κB signal transduction pathway to regulate the gene expression of IL-8, TF, and caspase-7, and ultimately promotes SW620 cell proliferation and migration. |
DCEngine 16U System
The DCEngine’s 16U System is pre-integrated and configured with compute, network and storage resources, enabling rapid installation and commissioning – delivering near instant capacity increases for the network. Fully compatible with NFV and SDN principles and open source software. The same compute and storage sleds fit in the DCEngine 42U System and the 16U System for optimum flexibility and no stranding of resources. |
NASA’ New Horizons spacecraft is a mere one million kilometres away from Pluto, as it approaches the dwarf planet and its moon Charon for the historic flyby tomorrow, it’s constantly sending back images to earth, and the last one is the sharpest and most stunning image yet of the mysterious icy world.
On July 11, 2015, the probe captured this spectacular image, which suggests some geological details of both Pluto and its largest moon Charon. The photo was taken by the on-board Long Range Reconnaissance Imager (LORRI) from a distance of about 3.9 million kilometers (2.4 million miles ) and its clear and sharp enough to made the team excited.
We’re close enough now that we’re just starting to see Pluto’s geology, it’s a unique transition region with a lot of dynamic processes interacting, which makes it of particular scientific interest.
Curt Niebur said.
Based on these images, astronomers start identifying traces of Pluto’ geology like some linear features, sharp terrain drops and surface details, features that could be cliffs or even an impact crater. Meanwhile, Pluto’s largest moon, Charon, is revealing itself as a world of chasms and craters. The most pronounced gash, located in the southern hemisphere, is longer and miles deeper than Earth’s Grand Canyon, according to William McKinnon.
This is the first clear evidence of faulting and surface disruption on Charon,
Said McKinnon.
New Horizons has transformed our view of this distant moon from a nearly featureless ball of ice to a world displaying all kinds of geologic activity.
NASA wrote.
The New Horizons spacecraft is now approaching a milestone – only one million miles to Pluto – which will occur at 11:23 p.m. EDT tonight, Sunday, July 12. It’s approaching Pluto after a more than nine-year, three-billion mile journey. At 7:49 AM EDT on Tuesday, July 14 the unmanned spacecraft will zip past Pluto at 30,800 miles per hour (49,600 kilometers per hour), with a suite of seven science instruments busily gathering data. The mission will complete the initial reconnaissance of the solar system with the first-ever look at the icy dwarf planet.
★ ★ ★
Source: NASA.
Featured image: © NASA/JHUAPL/SWRI.
.
© Content from this site must be hyperlinked when used. |
/*
* Copyright (c) 2011-2020, Peter Abeles. All Rights Reserved.
*
* This file is part of BoofCV (http://boofcv.org).
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package boofcv.alg.sfm.structure2;
import boofcv.struct.feature.AssociatedIndex;
import boofcv.struct.image.ImageDimension;
import georegression.struct.point.Point2D_F64;
import org.ddogleg.struct.FastQueue;
import java.util.List;
/**
* Interface for finding images with a similar appearance by some metric.
*
* @author Peter Abeles
*/
public interface LookupSimilarImages {
List<String> getImageIDs();
/**
* @param target ID of target image
* @param similar Storage for IDs of similar images. Cleared upon each call
*/
void findSimilar( String target, List<String> similar );
/**
* Looks up pixel observations of features in the specified view.
*
* @param target ID of target image
* @param features Storage for pixel observations. Cleared upon each call
*/
void lookupPixelFeats( String target, FastQueue<Point2D_F64> features );
/**
* Looks up associated features between the two views. Which view
*
* @param viewA name of view A
* @param viewB name of view B
* @param pairs Storage for associated features. Cleared upon each call
* @return true if views are similar and have known associations. False if not and results should be ignored
*/
boolean lookupMatches( String viewA, String viewB, FastQueue<AssociatedIndex> pairs );
/**
* Looks up the original images width and height
*
* @param target (Input) the image to retrieve from
* @param shape (Output) storage for width and height
*/
void lookupShape( String target, ImageDimension shape );
}
|
Q:
How to debug Ubuntu/Cisco VPN issues
I'm trying to connect an Ubuntu laptop (9.10) with some kind of Cisco VPN device; I don't know what's on the other end, and I'm not likely to find out exactly what. I know my company allows VPN from Linux clients because they provide one that I cannot get to install (it fails to compile). I've had the most luck with the network-manager-vpnc package, however I can't figure out what's failing. When I try to connect, I get this message from libnotify:
The VPN connection 'XXX' failed.
which is not very helpful. I've scoured the system logs and all I can find is this:
Dec 27 12:57:45 jcasadon-lap NetworkManager: <info> Starting VPN service 'org.freedesktop.NetworkManager.vpnc'...
Dec 27 12:57:45 jcasadon-lap NetworkManager: <info> VPN service 'org.freedesktop.NetworkManager.vpnc' started (org.freedesktop.NetworkManager.vpnc), PID 2672
Dec 27 12:57:45 jcasadon-lap NetworkManager: <info> VPN service 'org.freedesktop.NetworkManager.vpnc' just appeared, activating connections
Dec 27 12:58:00 jcasadon-lap NetworkManager: <info> VPN plugin state changed: 3
Dec 27 12:58:00 jcasadon-lap NetworkManager: <info> VPN connection 'AmericasEast' (Connect) reply received.
Dec 27 12:58:00 jcasadon-lap NetworkManager: SCPlugin-Ifupdown: devices added (path: /sys/devices/virtual/net/tun0, iface: tun0)
Dec 27 12:58:00 jcasadon-lap kernel: [ 6144.529002] tun0: Disabled Privacy Extensions
Dec 27 12:58:00 jcasadon-lap NetworkManager: SCPlugin-Ifupdown: device added (path: /sys/devices/virtual/net/tun0, iface: tun0): no ifupdown configuration found.
Dec 27 12:58:15 jcasadon-lap NetworkManager: SCPlugin-Ifupdown: devices removed (path: /sys/devices/virtual/net/tun0, iface: tun0)
Dec 27 12:58:15 jcasadon-lap NetworkManager: <info> VPN plugin failed: 1
Dec 27 12:58:15 jcasadon-lap NetworkManager: <info> VPN plugin state changed: 6
Dec 27 12:58:15 jcasadon-lap NetworkManager: <info> VPN plugin state change reason: 0
Dec 27 12:58:15 jcasadon-lap NetworkManager: <WARN> connection_state_changed(): Could not process the request because no VPN connection was active.
Dec 27 12:58:15 jcasadon-lap NetworkManager: <info> (wlan0): writing resolv.conf to /sbin/resolvconf
Dec 27 12:58:15 jcasadon-lap NetworkManager: <info> Policy set 'Northbound Train' (wlan0) as default for routing and DNS.
Dec 27 12:58:27 jcasadon-lap NetworkManager: <debug> [1261936707.002971] ensure_killed(): waiting for vpn service pid 2672 to exit
Dec 27 12:58:27 jcasadon-lap NetworkManager: <debug> [1261936707.003175] ensure_killed(): vpn service pid 2672 cleaned up
I have no idea where to go from here. Tomorrow I'll ask the IT/IS guys if there's anything they can tell me from their end, but I don't know if they'll be able to tell me anything. Any ideas? Thanks!
A:
It turns out that we have client-side certificates that needed to be installed, but VPNC can't deal with them (yet)
|
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<dict>
<key>IDECodeSnippetCompletionPrefix</key>
<string>swift-prop</string>
<key>IDECodeSnippetCompletionScopes</key>
<array>
<string>ClassImplementation</string>
</array>
<key>IDECodeSnippetContents</key>
<string> var <# name #> : <# type #> {
get { return <# varName #> }
set { <# varName #> = value }
}</string>
<key>IDECodeSnippetIdentifier</key>
<string>3759C0E1-EAE1-4321-88CD-54F1EEF38E90</string>
<key>IDECodeSnippetLanguage</key>
<string>Xcode.SourceCodeLanguage.Swift</string>
<key>IDECodeSnippetTitle</key>
<key>IDECodeSnippetSummary</key>
<string>Auto-Create property stub</string>
<string>AutoProperty</string>
<key>IDECodeSnippetUserSnippet</key>
<true/>
<key>IDECodeSnippetVersion</key>
<integer>2</integer>
</dict>
</plist>
|
The Jellybean Autumn Welcome rug is a perfect addition to your home or porch to welcome the brisk Autumn weather! The Jellybean Collection is handmade out of 50% polypropylene and 50% acrylic with polypropylene backing. 35% of the material in a Jellybean rug is recycled! Easy to clean -- just machine wash cold with like colors, no bleach and line dry. Some styles available with matching indoor/outdoor pillows. Forget those boring, plain mats that somehow seem to attract all the dirt in your house. When something is spilled on a Jellybean it lives up to it's famous tagline; "washes better than your jeans"! Throw your Jellybean in the wash and watch it come out good as new! |
Movement of DNA across the chloroplast envelope: Implications for the transfer of promiscuous DNA.
Little is known about the mechanistic basis for the movement of promiscuous nucleic acids across cell membranes. To address this problem we sought conditions that would permit the entry of plasmid DNA into isolated, intact pea chloroplasts. DNA uptake did not occur normally, but was induced by hypotonic treatments, by incubation with millimolar levels of Mg(2+), or by heat shock at 42 °C. These results are consistent with DNA movement being permitted by conditions that transiently alter the permeability of the chloroplast envelope. Plant cells are subject to osmotic tensions and/or conditions inducing polymorphic changes in the membranes, such as those used in the present study, under several environmental stresses. In an evolutionary time frame, these phenomena may provide a mechanism for the transfer of promiscuous nucleic acids between organelles. |
Orientation: Postcard
Whether you’re sending a charming hello, a heartfelt thanks or a special announcement, Zazzle’s custom postcards are the perfect way to keep in touch. Add your favourite picture or pick a customizable design and make someone’s day with a simple “Hello”!
My Classic Traditional Photos Collage3 Postcard
New version with Instagram designed postcard- featuring my own artwork that I made now comes in the instagram effects- Great for teachers, students, and many more! New of few of my scribble drawings/collage from these unique of a diary pages called 'scribble diary' that I did |
///////////////////////////////////////////////////////////////////////////////
// Copyright Christopher Kormanyos 2007 - 2020.
// Distributed under the Boost Software License,
// Version 1.0. (See accompanying file LICENSE_1_0.txt
// or copy at http://www.boost.org/LICENSE_1_0.txt)
//
#include <mcal_port.h>
#include <mcal_reg.h>
void mcal::port::init(const config_type*)
{
// Power management: Enable power for I/O ports : portb.
mcal::reg::reg_access_static<std::uint32_t,
std::uint32_t,
mcal::reg::rcc_ahbenr,
UINT32_C(0x00000002)>::reg_or();
}
|
On October 11, 1973, one day after Spiro Agnew resigned as vice president, of the United States, the following conversation took place between Secretary of State Henry Kissinger and Brent Scowcroft, the deputy national security advisor.
“The switchboard just got a call from 10 Downing Street to inquire whether the President would be available for a call within 30 minutes from the Prime Minister,” Scowcroft said during his phone conversation with the secretary of state. “The subject would be the Middle East.”
Kissinger answered Scowcroft’s question with another question. “Can we tell them no?” he asked. “When I talked to the President he was loaded.”
At the time of their conversation, the Yom Kippur War between Israel and an alliance of Arab nations led by Egypt and Syria was less than a week old. The president, of course, was Richard Nixon, whose second term would end 10 months later in August 1974, less than halfway through his second term.
Again and again, Nixon suffers from exhaustion, insomnia, and drunkenness, enhanced and exacerbated by a lifelong low threshold for alcohol and constant fatigue.
Tim Weiner, a former New York Times reporter, has sifted through a trove of newly released tapes and documents to expand on earlier accounts of Nixon’s doomed presidency. Weiner previously wrote well-received books detailing the histories of the CIA and the FBI – an ideal foundation for delving into the endless rabbit hole of Watergate, secret White House tapes, and the numerous episodes of illegal wiretapping and political tricks employed by (sorry, had to say it) all the president’s men.
One Man Against the World is one of two significant additions to the Nixon library this summer. Evan Thomas’ “Being Nixon: A Man Divided” (reviewed by The Monitor in July) considered the 37th president through the lens of his warring selves: the reckless, corrupt, win-at-all costs paranoid politician versus the erudite global strategist with a penchant for scrawling noble goals on legal pads in the wee hours of the morning.
Thomas at times gives Nixon too much benefit of the doubt, deploring the anti-Semitic, racist, and other crude remarks found on the White House tapes while often dismissing them as bluster. Weiner goes to the opposite extreme, always ascribing the worst possible motives to Nixon’s character.
What makes the argument against Weiner’s condemnation difficult to rebut are the many transcripts and documents the author uses to make his case. For those younger than the Baby Boomers, who either didn’t live through these dark days or were too young to remember or recognize those tumultuous events, the sheer lunacy of those years is sobering.
Attorneys general coming and going like NFL coaches; a Saturday Night Massacre that finds the president illegally dumping the Watergate special prosecutor and top Justice Department officials; and, among many other self-incriminating revelations, taped conversations ordered by Nixon himself that include the president openly discussing slush funds, cover-ups and perjury. Read enough of this and one might long for more presidential debates with Donald Trump.
The sheer tonnage of bad news and crippling controversies beginning in 1972 – the break-in at the Watergate headquarters of the Democratic party headquarters occurred in June – snowballed after Nixon won re-election in November. FBI deputy Mark Felt, the man revealed decades later to be the secret government source known as “Deep Throat” in Washington Post stories by Carl Bernstein and Bob Woodward, was among those in the federal government so repulsed by the White House that he was willing to take on a president.
Throughout the ordeal, Nixon raged at perceived enemies in Congress, in the media, and in the federal government. He went to China, yes, but he also presided over ultimately failed summits with the Soviets, signing arms-reduction treaties that, in fact, spurred the arms race. With Kissinger, Nixon tried and failed for years to end the Vietnam War, presiding over fruitless negotiations while overseeing illegal bombings in Cambodia.
When, at last, Nixon managed to secure the release of 591 prisoners of war, he hosted them and their families on the White House lawn in May of 1973.
Even then, he gave in to baser instincts, telling the POWs in his remarks, “And let me say, I think it is time in this country to quit making national heroes out of those who steal secrets and publish them in the newspapers.”
Get the Monitor Stories you care about delivered to your inbox. By signing up, you agree to our Privacy Policy
Fourteen months later, he resigned in disgrace. He lived 20 more years, publishing lengthy books on diplomacy and geopolitical strategy and scrambling to recover some sense of dignity. If the more favorable but still damning portrait by Thomas represents the best chance for Nixon’s rehabilitation, Weiner’s book is, no doubt, the portrait Nixon hoped to avoid.
The tragedy of Richard Nixon, all these years later, remains sad and disturbing. |
unless defined?(Motion::Project::Config)
raise "The sugarcube gem must be required within a RubyMotion project Rakefile."
end
require 'sugarcube'
SugarCube.ios_only!('modal')
Motion::Project::App.pre_setup do |app|
SugarCube.add_app_files(app, 'sugarcube-modal')
end
|
Characteristics of gonads and oviducts in hatchlings and young of Chelydra serpentina resulting from three incubation temperatures.
Eggs of Chelydra serpentina were incubated at 30 degrees C and 26 degrees C. In addition, incubation was done at 20 degree C during the temperature-sensitive period for sex determination. Incubation at 20 degrees C and 30 degrees C resulted in females; incubation at 26 degrees C resulted in males in 99% of the cases. The average gonadal length was less in the males. The average length of the 20 degree C ovaries did not vary significantly from that of the 30 degrees C ovaries. The condition of the oviducts was correlated with histology of the gonads in hatchlings and in 3-month-old animals. When at least one of the oviducts was obvious and intact, ovaries were present. If the oviducts were absent or interrupted, testes were present. Histological characteristics of the gonads resulting from the three incubation temperatures are described. In the 26 degree C testes, cellular infiltrations occurred frequently. The ovaries of 20 degrees C hatchlings tended to have a less developed germinal epithelium than that of the 30 degrees C animals. Also, epithelial cysts occurred frequently in the 20 degrees C ovaries. The incidence of follicles at 3 months was not differential. |
1991 – Zef VI: Pawn’s Game
The Great Sword of Wer is broken and the only hope to repair it lies in the ancient land of Nippon. The swordsmith Bong tells you that the gifts of the Dragons will be required to fix the blade, but the Dragons of Nippon don’t give their gifts easily. |
Trail of Tears State Park - Serving in part as a memorial to the Cherokee Indians who lost their lives on the Trail of Tears, this Missouri State Park offers camping, fishing, picnicking, swimming, and hiking options. Littering is not an activity that this park offers.
Southeast Missouri State University - Originally touted as the Southeast Missouri State Normal School, SEMO has since realized there’s nothing normal about its fine university. In fact, with an ever-expanding student population and athletic program, the Southeast Missouri State Exceptional School might serve as a more appropriate title.
Bollinger Mill State Historic Site - Just outside Cape Girardeau sits the fine town of Burfordville. In the fine town of Burfordville sits a mill and a covered bridge. These two overlooked, man-made innovations (the mill and the bridge) come together rather brilliantly in Burfordville to form the Bollinger Mill Historic Site. As if there could be more to offer, it also overlooks a river in which you can fish if fishing suits you. And we reckon it just might suit you after a day of mill and bridge admiring. |
In the current cinematic era, the Car Film is most often a glossy, vacuous entertainment that wallows in fast and furious absurdity and juvenile conceptions of masculinity. It was not always so. The New Hollywood upheaval of the 1960s and 70s—and in particular the galvanizing effect of "Bonnie and Clyde" and "Easy Rider" on the road movie form—paved the way for a brief but vital zenith for the Car Film. The apogee of this moment, and arguably the finest film ever made about the act of driving, is Monte Hellman’s 1971 road picture "Two-Lane Blacktop."
In the current cinematic era, the Car Film is most often a glossy, vacuous entertainment that wallows in fast and furious absurdity and juvenile conceptions of masculinity. It was not always so. The New Hollywood upheaval of the 1960s and 70s—and in particular the galvanizing effect of Bonnie and Clyde (1967) and Easy Rider (1969) on the road movie form—paved the way for a brief but vital zenith for the Car Film. Several mainstream crime thrillers from this era, such as Bullitt (1968), The Italian Job (1969), and The French Connection (1971), are justifiably renowned for their consummate car chase sequences. However, the Car Film found its most unadulterated expression in those features that embraced the shameless automotive worship and scuzzy outlaw ethos of exploitation cinema and wedded it to New Hollywood’s maverick streak.
The films of this cinematic moment were united in spirit but diverse in form: Richard Sarafian’s socially and spiritually pointed Vanishing Point (1971); John Hough’s stripped-down crime spree romance Dirty Mary, Crazy Larry (1974); Paul Bartel’s indie dystopian schlockfest Death Race 2000 (1975); and H.B. Halicki’s homebrewed “crash-gasm” Gone in 60 Seconds (1974). By the late 1970s, the daring and grit of such films would be brushed away by the more classical zaniness of Hal Needham’s paeans to automotive mayhem, such as Smokey and the Bandit (1977). For a fleeting period, however, the American Car Film was a bracing cinematic object, whose form and enthusiast zeal could be as heady as the odor of burnt rubber.
The apogee of this moment, and arguably the finest film ever made about the act of driving, is Monte Hellman’s 1971 road picture Two-Lane Blacktop. This weekend, The Webster University Film Series will screen Blacktop as the featured film of its May-June-July programming. In the past decade, both Anchor Bay and Criterion have given this enthralling, confounding slice of cult cinema a proper treatment on DVD, but aficionados of film and cars alike should not miss the opportunity to savor Blacktop on the big screen.
In 1970, a time when Hellman was known primarily for a pair of trippy Jack Nicholson neo-Westerns, Ride in the Whirlwind (1965) and The Shooting (1968), he persuaded Universal to give him final cut on a road movie originally scripted Will Corry and wholly reworked by alt-novelist Rudolph Wurlitzer. Forty years later, what impresses most about Two-Lane Blacktop’s screenplay is its nimble blend of unfussy realism and symbolic profundity, resulting in the rare work that is rich in meaning and yet free of preening self-regard.
Setting out east from southern California in a modified 1955 Chevy 150, a nameless Driver (folk rock singer-songwriter James Taylor) and Mechanic (Beach Boys drummer Dennis Wilson) pick up a skinny drifter Girl (Laurie Bird). Prowling the drag race scene along Route 66, the trio is eventually drawn into a cross-country, high-stakes race with the twitchy driver of a 1970 Pontiac GTO (Peckinpah mainstay Warren Oates). The film’s premise might seem designed for the blunt satisfactions of high-speed excitement and spectacular stunt driving, but what emerges is a thing far more challenging and memorable than a mere cinematic thrill ride.
For a film about a 2,400-mile race, Blacktop spends a startling amount of time sitting still. Bound to speed eastward, the characters’ agitation finds expression in a succession of detours: pit stops for vital repairs and greasy food; drag races for quick cash; bizarre encounters with hitchhikers; and ambiguous quarrels that have drivers and riders swapping vehicles. The Driver, Mechanic, and Girl are each reserved and slippery in differing ways, but GTO is the clear outsider, a fulsome bundle of bourgeois anxiety who relates a dozen different personal histories with the ease of a seasoned con-man. Even as they barrel towards Washington, D.C., the characters relentlessly make and revise their future plans, always in terms of destinations: Miami—no, New York—no, Chicago—no, Mexico.
Hellman’s affectionate depiction of gearhead culture relies upon a vérité style that echoes John Cassavetes. When non-actor Taylor flubs a line here and there, it doesn’t break the film’s spell, but deepens the aura of rambling realism that clings to even the most surreal scenes. Despite the grease-streaked naturalism that defines the look and rhythm of Blacktop, however, the film’s absorptions run deeper than the visceral pleasures of a roaring engine. The urgency and significance of the cross-country race seems to diminish as the film progresses, revealing Hellman’s stratagem: the automobile and the road itself as expressions of the conflicted and faintly crazed American character.
The myriad facets of that character—ambition, restlessness, greed, optimism, pride, self-destruction, dissatisfaction—jostle within the frame of the film. That Blacktop conveys this conflicting cacophony of psychological vibrations, all while maintaining a mood that is somehow both feverish and laconic, is thoroughly remarkable. Hellman establishes the Car Film as a form that can reckon with the stickiest thematic matters, exploiting genre conventions even as it shatters the viewer’s expectations. Long before its mutinous conclusion and searing final shot, it is apparent that Blacktop is an extraordinary make and model of American film.
Two-Lane Blacktop screens nightly at 7:30 p.m. on Friday July 1, Saturday July 2, and Sunday July 3 at the Webster University Moore Auditorium. Admission is $6 (cash only). For a complete schedule of the Webster University Film Series programming, visit the series’ website.
St. Louis native Andrew Wyatt is the founder of the film aficionado website Gateway Cinephiles, where he has been an editor and contributor since 2007, authoring reviews, essays, and coverage of the St. Louis International Film Festival and Webster Film Series.
Best Doctors, Inc. is transforming and improving health care by bringing together the best medical minds in the world to help identify the right diagnosis and treatment. The company’s innovative, peer-to-peer consultation service offers a new way for physicians to collaborate with other physicians to ensure patients receive the best care.
Headquartered in Boston, MA, the global company seamlessly integrates its services with employers’ other health-related benefits, to serve more than 30 million members in every major region of the world.
More than a traditional second opinion, Best Doctors delivers a comprehensive evaluation of a patient’s medical condition—providing value to both patients and treating physicians. By utilizing Best Doctors, members have access to the brightest minds in medicine to ensure the right diagnosis and treatment plan.
Best Doctors’ team of researchers conducts a biennial poll using the methodology that mimics the informal peer-to-peer process doctors themselves use to identify the right specialists for their patients. Using a polling method and balloting software that Gallup® has audited and certified, they gather the insight and experience of tens of thousands of leading specialists all over the country, while confirming their credentials and specific areas of expertise.
The result is The Best Doctors in America® List, which includes the nation’s most respected specialists and outstanding primary care physicians in the nation. These are the doctors that other doctors recognize as the best in their fields. They cannot pay a fee and are not paid to be listed and cannot nominate or vote for themselves. It is a list that is truly unbiased and respected by the medical profession and patients alike as the source of top quality medical information.
Gallup® has audited and certified Best Doctors, Inc.’s database of physicians, and its companion The Best Doctors in America® List, as using the highest industry standards of survey methodology and processes.
These lists are excerpted from The Best Doctors in America® 2014 database, which includes over 45,000 U.S. doctors in more than 40 medical specialties and 400 subspecialties.
The Best Doctors in America database is compiled and maintained by Best Doctors, Inc. For more information, visit www.bestdoctors.com or contact Best Doctors by telephone at 800-675-1199 or by e-mail at [email protected]. Please note that lists of doctors are not available on the Best Doctors Web site.
Best Doctors, Inc., has used its best efforts in assembling material for this list, but does not warrant that the information contained herein is complete or accurate, and does not assume, and hereby disclaims, any liability to any person or other party for any loss or damage caused by errors or omissions herein, whether such errors or omissions result from negligence, accident, or any other cause.
Copyright 2014, Best Doctors, Inc. Used under license, all rights reserved. This list, or any parts thereof, must not be reproduced in any form without written permission from Best Doctors, Inc. No commercial use of the information in this list may be made without the permission of Best Doctors, Inc. No fees may be charged, directly or indirectly, for the use of the information in this list without permission.
BEST DOCTORS, THE BEST DOCTORS IN AMERICA, and the Star-in-Cross Logo are trademarks of Best Doctors, Inc., registered in the U.S. and other countries, and are used under license. |
If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.
Re: ♦ Custom Jutsu Submission ♦
raiton: seiteki dansu ( static dance )
type: attack
rank: B
range: short range
chakra cost: 25
damage points: 40
description: the user focus his chakra on his feet, making an electrical field in his feet, when he moves a field of electricity is following him. shocking the enemy when he/ she get close to the user.
Re: ♦ Custom Jutsu Submission ♦
(Mokuton:Hageshii kaze no misairu)-Wood release:Fierce wind missiles-
Rank: S
Type:Attack
Range: Short-Long
Chakra cost:40
Damage:80
Description: This is a useful mokuton jutsu in which the user starts to spin on his heels simultaneously releasing, from every part of the users body mokuton spears.The spears are pointed at both ends and are about 1 and a half feet long feet long,these are infused with fuuton chakra of the user and travel and very high velocities towards the opponent piercing him all the way through and inflicting a large amount of damage,as the attack covers a full 360 degrees it also covers all the blind spots making it a jutsu of choice for the user.
~can be used thrice per battle
~no mokuton jutsus next turn due to overuse of mokuton chakra
~can only be taught/used by Jinbei
~no handseals required
~ I don't think it's viable to release wood from anywhere other than your hands. ~
(Mokuton:Hikari no ki tsubasa)-Wood release:Light wood wings-
Rank: A
Type:Supplementary/Attack
Range: Short (the spikes from the wood can travel long range)
Chakra cost:30
Damage:5 for each spike hit
Description:In this jutsu the user forms one handseal and wings of the lightest wood i.e the balsa wood appear on the users back.This wood is special as it is lighter than the hollow wing bones of a bird and is used in making gliders due to its lightweight.With these wings the user can fly in the air unrestricted upto 30 meters without any problems.Also the user can form wooden senbons from their wings at an additional cost of 20 chakra.These senbons are your average senbons,they are just made of wood instead of metal.
~can be used twice per battle
~can be used/taught by Jinbei
~the wings can be shed at any times by forming a single ram seal by the user
~the senbons can be used thrice
~the wings last for 4 turns
~ Approved ~
(Mokuton:Mokusei āmu)-Wood release:Wooden arms-
Rank:B
Type:Supplementary
Range: Short
Chakra cost:30(+5 to taijutsu)
Damage:N/A
Description: In this jutsu the user manipulates wood to grow two arms made from the heartwood of the snakeood tree which can be used along with the users helping the user in taijutsu as the heartwood of the snakewood tree is one of the strongest wood in the world with a specific gravity of around 1.2,hence increasing the strength of the user.And providing the user with an advantage over the opponent.the hands cannot use jutsus but are able to throw kunais,tags and other weaponry.
~can be used twice per battle
~the hands can be dropped at any time with a single Bird seal by the user
~no handseals required
~can be used/taught by Jinbei
~ Arms of that weight would slow you down ~
(Fuuton:Kaze no ningen no barūn)-Wind style:Wind human balloon-
Rank:S
Type:Attack
Range: Short
Chakra cost:40
Damage:80
Description: This is a very difficult jutsu to employ and requires uttermost concentration of the user.In this jutsu the user has too make physical contact with the opponent and when he has achieved that the user streams his fuuton chakra into the user and in a matter of 2 seconds the blood vessels of the user is filled with air or air bubbles to be precise. which then causes extreme internal injuries due to the fact that air bubbles can cause major impact too the heart and other internal organs,damaging the opponent internally leaving him unable too battle.
~can be used once per battle
~no B rank and above fuuton jutsu the next turn due to severe exhaustion and concentration
~can be used/taught by Jinbei
Re: ♦ Custom Jutsu Submission ♦
Freestyle art the sad tiger = Furīāto kanashii tora
Rank: B
Type: Attack
Range: Short
Chakra Cost: N/A
Damage Points: 25
Description: A Taijutsu attack where the user goes down on all four and sprints towards the opponent, when in range, the user moves his/her balance over to his hands, and spins in a 180 degrees angle so his/her legs are in front of him/her, and then does an upwards kick with both legs.
Freestyle art the worried wolf = Furīāto shinpai ōkami
Rank: B
Type: Attack
Range: Short
Chakra Cost: N/A
Damage Points: 20
Description: A Taijutsu attack where the user bends himself/herself forward, and sprints towards the opponent, when in range the user lets himself/herself fall backwards, while stretching one of his/her legs upwards, kicking the opponent in either the head or crutch.
Re: ♦ Custom Jutsu Submission ♦
(Kuchiyose no Jutsu: Kiba Buta Joutei)- Summoning: Tusk Boar Lord
Type: Summon
Rank: S
Range: Short
Chakra Cost: 40
Damage Points: N/A
Description: User bites there finger drawing blood then preforms a row of 15 handseals then slams their hand to the ground summoning the Boars Tusk Lord from where ever he maybe. The Tusk Boar Lord is a huge boar standing 10'4"ft (just over 3.4 meters i think) from huff to arch in his back. the Tusk Boar Lord is a master of Genjutsu and Earth jutsu's he can preform up to S-Rank and down Genjutsu with little effort. Tusk Boar can only use Earth jutsu A-Rank and down more effort than his Genjutsu. The Tusk Boars Lord has a thick hide capable of blocking C-Rank and down elemantal jutsus, along with having a strong mind due to extensive training with Genjutsu capable of blocking Genjutsu B-Rank and down. Note: Tusk Boar Lords Genjutsu counts as a move.Note: Tusk Boar Lords Earth jutsu's count as a move.Note: Tusk Boar Lord summon only lasts 3 rounds.Note: Can only be summoned twice per battle.Note: No other summon can be done in the same battle.Note: Only Orange-Hokage can summon/teach Tusk Boar Lord.
(Looks like this)
~ Too much ~
(Kage Kobushi Sentou)- Shadow Fist Punch
Type: Attack
Rank: A
Range: Short-Mid
Chakra Cost: 30
Damage Points: 60 (if holding kunai +5)
Description: The user will focus chakra into there shadow, their shadow then exteneds from their feet then molds it into 10 fists which then begin to pumel the opponent. The fists can also hold kunai and throw shuriken, if the fists hold kunai then they begin to slash ths opponent countless times.Note: Must have finished Shadow training.Note: Must be a member of the Nara clan to use this jutsu or had Nara clan training.Note: Only Orange-Hokage can teach this jutsu.
Re: ♦ Custom Jutsu Submission ♦
(Genjutsu:Migi ushiro)Illusion technique:Right behind you
Rank:S
Range:Short-long
Type:Attack/Supplementary
Chakra cost:40
Damage:N/A
Description:This jutsu is one of the most advanced non-sharingan illusion technique.The genjutsu is activated only if and when the user can see the opponent's body.Then the illusion is cast and the opponent views the user vanish from sight,apparently nothing appears to be amiss but then the user feels a kunai on his neck(part of the illusion)and feels the hand and presence of the user behind him,the said 'apparition' is tangible to the opponent and he doesnt realise that he is in a genjutsu.The opponent is then in shock by the sudden disappearence and appearence of the user and also in fear of his life due to the kunai on his neck.
The fear and shock is aggravated by subtle manipulation of the opponents brain which leaves the opponent in shock and dismay and they loose hope and their will wavers seeing the might of their opponent.They are unable too use S rank and above techs for the following two turns.While the whole time the user is invisible to the opponent and can prepare for another attack.
Restrictions
*can be performed twice per battle
*given the nature of this genjutsu it is very difficult for non doujutsu users too realise they are in an illusion and is hence difficult or impossible to break
*a 3 tomoe sharingan and higher can break the genjutsu
*the genjutsu lasts for 2 turn only
*if the user attacks the opponent while he is caught in the Genjutsu, the resulting pain will knock the opponent out of the illusion
*can be used and taught only by Gaara of konoha
(Genjutsu:Tōku hanarete) Illusion technique:Far away
Rank:A
Range:Short-long
Type:Supplementary
Chakra cost:30
Damage:N/A
Description:This genjutsu is a basic yet a very effective non-sharingan illusion.This genjutsu is activated by pointing a finger towards the opponent hence it requires the user to know the location of the user.So basically this genjutsu effects the sense of distance of the opponent. What happens is the user sense of distance is disturbed and everything seems to be 'far away' to the user (long range). So everytime he attacks the user the opponent believes the user and his attacks are coming from long range even when the user is in short or mid range too the opponent.
This genjutsu hence effectively illusions the opponent in believng that the user is in long range and thus preventing him from using any short or short mid range attacks,but since the actual location of the user can be mid or short it doesnt bars the user from using jutsus of long and mid range.
Restrictions
*can be used twice per battle
*lasts four turns
*due to the nature of the genjutsu opponents with no dojutsu cannot realise that they are in a genjutsu which makes it difficult or impossible to break the genjutsu
*if the user attacks the opponent while he is caught in the Genjutsu, the resulting pain will knock the opponent out of the illusion
*a 3 tomoe sharingan and above can break through the genjutsu
*can be used and taught only by Gaara of konoha
~ OP ~
(Suiton/Fuuton:Suichū hikō)Water/Wind style:Underwater flight
Rank:S
Range:Short(self effecting)
Type:Supplementary
Chakra cost:40
Damage:N/A
Description:This is the most effective way too travel underwater and makes the user invincible when he is in water.So basically in this jutsu the user when enters a water source,the user immediately starts too release dense fuuton chakra(matching the density of water too prevent the rise of air bubble) from every pore of his body creating a massive air bubble(lens shaped due to buoyancy) around him.Due too the massive release of fuuton chakra the bubble forms around the user so that he can travel unrestricted in water (supply of oxygen and protection from raiton techniques).
But due to buoyant forces the user is unable too delve deep down underwater and hence can only travel at high speeds up to a depth of 10 metres underwater and too counterbalance the buoyant force the user uses suiton chakra too increase the viscosity to a high level of the water around the air bubble,too counteract the buoyant forces(as the rise of water bubble is slower in a highly viscous fluid) and hence is able too travel underwater at a depth of 10-15 metres unrestricted with speeds upto 30 km/hr or 8.3 m/s.
Restrictions
*the user is unable to use katon and raiton techniques
*lasts for three turns or untill the user releases the jutsu with a single monkey seal
*can be performed twice per battle
*gives immunity from electrocution in water and also provides a source of oxygen
*a single handseal is required to start the jutsu
*can be used/taught by Gaara of konoha
Explanation:
So basically since river and sea water is not pure and distilled hence the bubble motion is surfactant Contaminated Bubble type and hence it further reduces the drag and buoyancy preventing the bubble from rising too the surface.
Re: ♦ Custom Jutsu Submission ♦
Originally Posted by s06p
summoning jutsu secretary bird : yuki the goddess of wind
Rank:Forbidden
type: Summoning.
Range:Short-Long(she can be summoned anywhere on the field.)
Chakra cost:40
Damage points:80
Description:Yuki is also known as the queen of wind due to her affinity towards wind.Her chakra control towards wind is incredible and she can utilise wind jutsus upto A rank using minimal chakra.She can also send a S ranked blast of wind once per battle.The blasts she sends can be decided by her if its concentrated chakra or if its a blast of wind which can blow away the opponent. She can also mould wind infront of her to make her flight faster.She is the fastest secretary bird and can cover distances from short range to long range in a matter of 3 seconds.She is the fastest secretary bird alive.Pros & Cons:
-Can only be summoned by Ragerok and s06p-
-Can be summoned once per battle and lasts 5 turns-
-Wind attacks are useless against her as she absorbs the wind jutsus but she is weak against
fire jutsus-
-The blast of wind can only be used twice per battle.-
-She can be the only summon on the battle field.-
-Wind jutsu can only be used 5 times per battle.-
-Can be the only summon on the field.-
Note:I edited the speed from half a second to 3 seconds.
~ Using minimal chakra ? Explain that. ~
Mizu the water Phoenix (Kuchiyose no Jutsu : Mizu sono Fenikkusu)
Rank: S
Type: Attack/Defense
Range: Short-long
Chakra:40
Damage points :80
Description:The user uses the summoning technique to summon Mizu, who is half the size of Gamabunta. Mizu has immense water moulding capabilities, as her affinity is Water. Mizu's body is surrounded by water chakra and her body gets covered in water if she comes in contact with even a drop however her face doesnt get covered by the water and her speed doesnt slow down due to her water moulding capabilities.If Mizu is heavily damaged (hit by 2 or more S-ranked jutsus) she can repelnish herself by diving into water. Mizu can use up to S-Rank Water jutsu's and can perform the jutsus using no handsigns at all.Water attacks are useless against her as her body absorbs the water based chakra from the jutsu.Note:
-This summoning lasts up to 4 turns-
-Can only be summoned once per battle-
-Must have signed the Secretary Bird Summoning contract.
-Mizu's Jutsu attacks are considered as a move and she can only use water jutsu's four times per battle.
-Mizu can only replenish once per battle.
-Can be the only summon on the user can have on the field.
note:Edited the suigetsu ability part.
~ Purple part is impossible. ~
summoning jutsu secretary bird : yuki the goddess of wind
Rank:Forbidden
type: Summoning.
Range:Short-Long(she can be summoned anywhere on the field.)
Chakra cost:40
Damage points:80
Description:Yuki is also known as the queen of wind due to her affinity towards wind.Her chakra control towards wind is incredible and she can utilise wind jutsus upto A rank .She can also send a S ranked blast of wind once per battle.The blasts she sends can be decided by her if its concentrated chakra or if its a blast of wind which can blow away the opponent. She can also mould wind infront of her to make her flight faster.She is the fastest secretary bird and can cover distances from short range to long range in a matter of 3 seconds.She is the fastest secretary bird alive.Pros & Cons:
-Can only be summoned by Ragerok and s06p-
-Can be summoned once per battle and lasts 5 turns-
-Wind attacks are useless against her as she absorbs the wind jutsus but she is weak against
fire jutsus-
-The blast of wind can only be used twice per battle.-
-She can be the only summon on the battle field.-
-Wind jutsu can only be used 5 times per battle.-
-Can be the only summon on the field.-Note:The psrt you made purple was useless so I removed it.
~ You contradict yourself within the jutsu o_O ~
Mizu the water Phoenix (Kuchiyose no Jutsu : Mizu sono Fenikkusu)
Rank: S
Type: Attack/Defense
Range: Short-long
Chakra:40
Damage points :80
Description:The user uses the summoning technique to summon Mizu, who is half the size of Gamabunta. Mizu has immense water moulding capabilities, as her affinity is Water. Mizu's body is surrounded by water chakra and alot of water is all around her body but her face and head dont get covered and her speed does not reduece due to her water moulding capabilities.If Mizu is heavily damaged (hit by 2 or more S-ranked jutsus) she can repelnish herself by diving into water. Mizu can use up to S-Rank Water jutsu's and can perform the jutsus using no handsigns at all.Water attacks are useless against her as her body absorbs the water based chakra from the jutsu.Note:
-This summoning lasts up to 4 turns-
-Can only be summoned once per battle-
-Must have signed the Secretary Bird Summoning contract.
-Mizu's Jutsu attacks are considered as a move and she can only use water jutsu's four times per battle.
-Mizu can only replenish once per battle.
-Can be the only summon on the user can have on the field.
~ Similar technique to the purple part exists ~
wind release:cutting wind.(fuuton:Katto kaze)
type:attack
rank: A
range:short-long
chakra cost:30
damage points:60
description:The user starts manipulating the air around their opponent by sending wind
chakra to the air.After this is done some air around the opponent becomes rasor sharp and
starts spinning slowly around the opponent.The opponent doesnt notice this and thinks
that it is just normal breeze blowing around him.The user then manipulates the air to cut
through the vital organs of the opponent.Note:
-Can only be used by s06p-
-Can only be used twice per battle-
-If the opponent stays anywhere near mid range of the location this attack is done the user can still manipulate the blades to cut him.-
-If the opponent stays anywhere near mid range of the location this attack is for more than 3 turns the opponent will die.-~ Similar techniques exist ~
Re: ♦ Custom Jutsu Submission ♦
Originally Posted by Nnoitra-Sama
( Katon: Furesshufaia kumo ) - Fire release: Freshfire cloud
Rank: A
Type: Offensive - Defensive
Range: Close - Short ( Becomes inaccurate when it reaches Mid range )
Chakra cost: 30
Damage points: 50 ( + 15 if used with oil )
Description: User first takes deep breath and focuses fire chakra into his/her mouth. Then as user breathes out he/she creates steady stream of fire that isn't accurate like Uchiha style fireballs. The fire expands into cloud-ish wave of fire that becomes in accurate when it reaches mid range.
Note:
- Can be used twice per battle
- No water techniques can be used on the same turn.
Rank: S
Type: Supplementary
Range: Self
Chakra cost: 40 ( - 20 per turn )
Damage points: N/A ( - 10 per turn )
Description: Fighter's Phenomenon is a special jutsu that only appears in Hand to Hand combat and Sword techniques. It's a technique that takes no time to activate in a Kenjutsu/Taijutsu fight between user and opponent(s). In the jutsu user uses chakra to stretch his/her senses to their limits, causing the time to 'slow up' from the user's point of view and his reaction time increases. This doesn't exactly make user faster but gives him/her more time to react. After this jutsu runs out user will become sluggish and slow in his/her movements. This jutsu doesn't work against Elemental attacks.
Note.
- Lasts four turns
- Is useless against elemental attacks
- Can be used only once per battle.
Rank: S
Type: Offensive - Supplementary
Range: Short - Mid ( Depends on the type of Genjutsu )
Chakra cost: 40 ( - 20 per turn )
Damage points: N/A ( - 10 to user per Genjutsu type )
Description: User makes Boar → Snake → Bird → Dragon → Rat handseals and focuses earth based chakra in ground. Once the last handseal is completed three monkey statues raise from ground and the statues are identical to the Three Wise Monkeys. Once the statues are completed user can infuse chakra into one of them and activate a special genjutsu that depends on the statue that chakra was being infused.Left Statue - Mizaru:
Once the user guides chakra into the left statue and has eye contact with opponent. He/she will activate a genjutsu that causes opponent to immediately close/cover his/her eyes and go blind.Middle Statue - Iwazaru:
Once user guides chakra into the middle statue and says 'Kai' ( Release ) opponent will immediately stop speaking and goes mute. This prevents opponent from communicating by using mouth and language.Right Statue - Kikazaru:
Once user guides chakra into the right statue and says 'Kakeru' ( Lock, suspend ) opponent goes deaf and cannot hear. This prevents hearing and using ears.
Note:
- A Doujutsu can easily figure out the trick of genjutsu and destroy statues
- Upon statues being destroyed the Genjutsu ends
- The Statues after third turn revert back to ground
- Genjutsu type ( monkey ) can be changed only once from another
- Can be used only once
- No Genjutsu for five turns after statues crumble
- No Doton at the same turn.
Re: ♦ Custom Jutsu Submission ♦
Resubmitting
Summoning Technique: Kaijin (Grand Cotta Summoning)
Rank: S
Type: Supplementary
Range: N/A
Chakra Cost: 60
Damage points: N/A
Description: After doing the necessary hand seals and wiping blood across the tattoo on Oraan's left arm, Oraan summons Grand Cotta. Grand Cotta is the largest Hyena of them all. He is the same size as Gamabunta. He is the only Hyena capable of using Jutsu other then GenJutsu, consisting primarily of Fire and Lightning. Because Grand Cotta has a very thick hide if attacked with Lightning, only an S Ranked or above Lightning jutsu can kill him. Grand Cotta has a helmet made of Manganin, which is a metal that is very resistant to lightning. The helmet, and the hide, are why it is so hard to kill Grand Cotta with Lightning abilities.
Note: Can only be summoned once per battle.
Note: Lasts for a Maximum of 4 turns.
Note: Can use all Lightning Techniques that the User knows.
Note: Can use all Fire Techniques that the User knows up to S Rank
Note: Must have signed the Hyena Contract to use.
Kaijin (Hyena Mode)
Type: Supplementary
Rank: S
Range: Short
Chakra Cost: 80
Damage Points: N/A
Description: User is coated in an armor of thick Hyena hide, belonging to Grand Cotta. The User gains a helmet made of Manganin, the same metal used as Grand Cotta's protective headgear. The Transformation into Kaijin (Hyena Mod) happens instanteously. While this is active, Hyena mode has these effects.
*Decrease all Lightning Jutsu damage by 20.
*Lightning jutsu that hit the user does not cause Paralyzation due to the hide of the Hyena.
*User's Peripheral vision is impaired due to Helmet.
*User cannot use Kage Bunshin while in this mode.
*Must have signed the Hyena Contract to use.
*Lasts for 5 turns
*Can only be used 2x per battle
Summoning Technique: Kami no Hidari-te Akuma no Migi-te (God's Left Hand, Devil's Right Hand)
Rank: S
Type: Supplementary
Range: N/A
Chakra Cost: 80
Damage points: N/A
Description: User, while in Kaijin (Hyena Mode), summons what appears to be two clones of the user. The only difference between the three is that one has A yellow Manganin helmet, while the other has a red Manganin helmet, and the user's helmet is brown. The God's left hand(Kami) has all Lightning Abilities and is capable of using all the Lightning Techs that the user knows. The Devil's Right Hand(Akuma) has all Fire Abilities, and is capable of using all the Fire Techs that the user knows.
Note: Usable only in Kaijin (Hyena Mode)
Note: Must have signed the Hyena Contract to use.
*Vision impairment still applies for Each Summoned "clone".
*Each Summoned "Clone" is immune to attacks of their element S Rank and Below.
*User cannot use any Lightning or Fire Techs while each respective Summoning Clone is on the field and for 1 turn after they are destroyed.
(Kami/Akuma: Kurama Bushuugi)- God's Left Hand/Devil's Right Hand: Wheel of Misfortune
Type: Attack
Rank: S
Range: Short - Long
Chakra cost: 60
Damage Points: 80
Desription: A combination of Kami's and Akuma's natural elements. They stand back to back and shoot a fireball and lightning ring, which combine and travel toward the opponent, gaining speed as it goes.
Note: Can only be used 2x per battle
Note: Must have signed the Hyena Contract to use.
Note: Can only be used in Kaijin (Hyena Mode.
Earth Style: Chakra Sensing Bear Trap
Type: Attack
Rank: S
Range: Short/Mid/Long
Chakra Cost: 40 (+10 per turn)
Damage: 80
Description: From the earth, the user forms a large bear traps that rise from the earth. The bear trap seeks out the chakra of anything that is touching the ground, including the chakra of the user. When an opponent, ally or the user, becomes trapped, the bear trap then drags them under the ground and will not stop until they reach the earths core. As it is earth based, the bear trap can easily travel along earth, to include vertically.
Note: Users feet MUST be touching earth in order to use this technique.
Note: Can only be used 2x per battle.
Note: Only Oraan may teach
Re: ♦ Custom Jutsu Submission ♦
Doton: Mahoutsukais Chesu Makanai | Earth Style: Wizard’s Chess Board
Rank: Forbidden
Type: Offensive/Defensive/Supplementary
Range: The entire field
Chakra cost: 50
Damage: N/A, [30 for each hit by the chess pieces]
Description: The user focuses Earth chakra throughout the entire battlefield, causing the earth to take the form of a chess board, including coloured squares.
Then, from the earth, chess pieces rise up from the board, ten pieces on each side. All pieces are identical, except for the colour. On one side, the pieces are white, on the other they are black. The pieces are man-high and wield swords made out of earth. Even though these swords are made out of Earth, they still do a high amount of damage if they hit anything due to the blunt force.
Both of the fighters gain control over all the pieces of one colour and are able to manipulate one each turn. The pieces can move anywhere, but only in one direction. The pieces are very slow, though, so evading them is easy unless one is in an extremely close range.
The pieces themselves will smash each other if they encounter and will attack the opposing team’s leader, being the shinobi that moves the pieces, and any supporters he has, as well.
~The user cannot use any Earth jutsu for 3 turns after the use of this jutsu.
~Every time a piece is moved, the player moving a piece will lose 10 chakra.
~The user will lose a lot of earth chakra, resulting in the unability to use Forbidden and S-ranked Earth jutsu for the remainder of the battle.
~The jutsu lasts until all pieces of one player have been destroyed.
~This jutsu only targets one person. The players are that person and the user. If this is used in a battle with multiple people, the others are still able to fight freely.
~Once a battle, not usable again by other bodies, allies or opponents [As this affects both sides both positively and negatively, this is not more than reasonable]
~A chess piece can be destroyed by either one hit from any B-rank elemental jutsu, excluding Suiton, or a hit from another piece.
Re: ♦ Custom Jutsu Submission ♦
A blade shining but also a furious bluster of flames as it strikes down. The blade Andúril, mighty as it is name.
Andúril was created by an ancient blacksmith, broken in a huge war and later remade and in the progress of being remade, Andúril gained the attribute of indestructibility as it was the work of the blacksmith. This does not mean the sword can destroy everything.
Effects:
Gives +10 damage to every Fire jutsu the user performs
Each Fire jutsu the opponent performs loses -10 of its damage through the sword absorbing the heat of the opponent's fire jutsu.
The user focuses Katon chakra into Andúril, which then releases a bright flash after which a huge burst of fire is sent outwards, covering 180 degrees in front of the user. The flame exerted by the blade seems white, due to the reflection of the light exerted by Andúril before.
By making a downwards slash with the sword, the user can release a bow of fire, that scatters into multiple shots.
-Even though the sword is indestructible, it cannot destroy everything-
-All active abilities can only be used twice a battle-
-Focusing Fire chakra in Andúril will cause little burns on the user, as she cannot keep all the heat away. The Fire chakra focused in Andúril lasts for two turns-
-When the user uses Andúril in battle, he/she cannot use another Custom Weapon during the entire battle-
Sonic- and Chiryoku are allowed to use the above as part of a agreement.
To answer Emperor's question of "Since when does fire chakra negate fire chakra?" :The sword absorbs the heat of the opponent's attack..
To answer Ragnaroc's question of "How does heat absorption reduce the damage?": Basically, Less heat = less burns = less damage.
~ Theoretically speaking then, the sword would be able to absorb only what touched its blade, and since there are not many jutsus that are so focused they touch only a small area, the remaining fire would still blast you at full strength ~
Re: ♦ Custom Jutsu Submission ♦
Wind Release: Cutting Leafs (Fuiton: Katto Ha)
Rank: A
Type: Attack
Range: Short-Long
Chackra cost: 30
Damage points: 60
Description: After the user performs a single hand seal, he can use the surrounding leafs to change their sharpness by releasing his wind chakra into them. Then he can send them against the enemies. If strike, the leafs create countless deap wounds. As the leafs are realy fast they could be used almost at the same time as the previous jutsu.
Note: Can only be taught by PowerOfDarkness
Note: Can only be used 3 times per Battle.
~ Wot ? Plant Style ? ~
Fire Release: Flame of Death (Koton: Honoo Oujou)
Rank: S
Type: attack/deffense
Range: Short - Long
Chakra cost 40
Damage points: 80
Description: After the user performs the Tiger handseal he mold Koton chakra in his hands. After releasing the chakra he has gathered, the user is able to create an intense fire that can be manipulated and send at the wanted direction or use it to surround the user thus protecting him from attacks.
Note: Can only be taught by PowerOfDarkness
Note: Can only be used 3 times per Battle.
Note: No Forbidden rank Fire techniques for the next turn.
~ Similar techniques exist ~
(Koton: Ho Fenikkusu) - Fire Release: Fire Phoenix
Rank: S
Type: Offense
Range: Short - Long
Chakra Cost: 40
Damage Points: 80
Description: The user molds his Koton chakra to his dominant hand and then release it making it a Phoenix shaped stream of fire which stays attached to the users hand through little streams of fire. The Phoenix can be manipulated trough the little steams of fire and send at the wanted direction.
Note: Can only be taught by PowerOfDarkness
Note: Can only be used 3 times per Battle.
Note: No Forbidden rank Fire techniques for the next turn.
~ Similar techniques exist ~
Fire/Wind Combo: Fire Bomb (Koton/Fuiton Konbo: Ho Bakudan)
Rank: S
Type: Offense
Range: Short - Middle
Chakra Cost: 40
Damage Points: 80
Description: The user gathers his wind chakra into his mouth and then as he breaths out he releases the Fuiton chakra he has gathered, thus creating an invisible layer of wind that approaches the enemy rapidly. At the same time he releases some Fire chakra from his hand and send it at the wind layer, thus the wind ignites creating a huge explosion that destroys everything around within 12m.
Note: Can only be taught by PowerOfDarkness
Note: Can only be used 3 times per Battle.
~ OP ~
P.S I know the fire jutsus are s rank. I will use them when I reach S-class ninja (if they get ur approval)
Re: ♦ Custom Jutsu Submission ♦
Ousama: Gammy (King: Gammy)
Type: Summon
Range: N/A
Rank: S
Chakra: 50
Damage: N/A
Description: The user bites down on their thumb and wipes the blood across a a summoing tattoo on
the users forearm. Gammy is the Polecat king, feared for killing cites at a time with secretions so
horrible they burn through the nostils and dry out the skin causing bacterial infections over long
periods of time gammy is a noble leader who is feared on the battle but revered by his subjects.
Kan Taicho: Dono Enamatio (Lead Summon: Sir Enamatio)
Type: Summon
Range: N/A
Rank: S
Chakra: 50
Damage: N/A
Description: the user bites down on their thumb and wipes blood across a tattoo located on the users forearm. sir enamatio is unlike most other polecats in his clan because he is capable of secreting foul stenches from the pores of his skin instead of just his secretion glands. and his secretions are light and evaporate slowly creating misty clouds of stench that float around him and can be sprayed a few feet in any direction around him
Description:This jutsu is one of the most advanced non-sharingan illusion technique.The genjutsu is activated only if and when the user can see the opponent's body.Then the illusion is cast and the opponent views the user vanish from sight,apparently nothing appears to be amiss but then the user feels a kunai on his neck(part of the illusion)and feels the hand and presence of the user behind him,the said 'apparition' is tangible to the opponent and he doesnt realise that he is in a genjutsu.The opponent is then in shock by the sudden disappearence and appearence of the user and also in fear of his life due to the kunai on his neck.
The fear and shock is aggravated by subtle manipulation of the opponents brain which leaves the opponent in shock and dismay and they loose hope and their will wavers seeing the might of their opponent.They are unable too use S rank and above techs for the following two turns.While the whole time the user is invisible to the opponent and can prepare for another attack.
Restrictions
*can be performed once per battle
*given the nature of this genjutsu it is very difficult for non doujutsu users too realise they are in an illusion and is hence difficult or impossible to break
*a 3 tomoe sharingan and higher can break the genjutsu
*the genjutsu lasts for 2 turns only
*if the user attacks the opponent while he is caught in the Genjutsu, the resulting pain will knock the opponent out of the illusion
*can be used and taught only by Gaara of konoha
Changed the range too short-mid,made it forbidden and restricted use too once per battle
(Genjutsu:Tōku hanarete) Illusion technique:Far away
Rank:S
Range:Short-Mid
Type:Supplementary
Chakra cost:40
Damage:N/A
Description:This genjutsu is a basic yet a very effective non-sharingan illusion.This genjutsu is activated by pointing a finger towards the opponent hence it requires the user to know the location of the user.So basically this genjutsu effects the sense of distance of the opponent. What happens is the user sense of distance is disturbed and everything seems to be 'far away' to the user (long range). So everytime he attacks the user the opponent believes the user and his attacks are coming from long range even when the user is in short or mid range too the opponent.
This genjutsu hence effectively illusions the opponent in believng that the user is in long range and thus preventing him from using any short or short mid range attacks,but since the actual location of the user can be mid or short it doesnt bars the user from using jutsus of long and mid range.
Restrictions
*can be used once per battle
*lasts three turns
*due to the nature of the genjutsu opponents with no dojutsu cannot realise that they are in a genjutsu which makes it difficult or impossible to break the genjutsu
*if the user attacks the opponent while he is caught in the Genjutsu, the resulting pain will knock the opponent out of the illusion
*a 3 tomoe sharingan and above can break through the genjutsu
*can be used and taught only by Gaara of konoha
Changed rank to S,changed range too short-mid,restricted use too once per battle and reduced the turns till which the genjutsu lasts.
Re: ♦ Custom Jutsu Submission ♦
Originally Posted by Jinbei
(Mokuton:Hageshii kaze no misairu)-Wood release:Fierce wind missiles-
Rank: S
Type:Attack
Range: Short-Long
Chakra cost:40
Damage:80
Description: This is a useful mokuton jutsu in which the user starts to spin on his heels simultaneously releasing, from every part of the users body mokuton spears.The spears are pointed at both ends and are about 1 and a half feet long feet long,these are infused with fuuton chakra of the user and travel and very high velocities towards the opponent piercing him all the way through and inflicting a large amount of damage,as the attack covers a full 360 degrees it also covers all the blind spots making it a jutsu of choice for the user.
~can be used thrice per battle
~no mokuton jutsus next turn due to overuse of mokuton chakra
~can only be taught/used by Jinbei
~no handseals required
~ I don't think it's viable to release wood from anywhere other than your hands. ~
(Mokuton:Hikari no ki tsubasa)-Wood release:Light wood wings-
Rank: A
Type:Supplementary/Attack
Range: Short (the spikes from the wood can travel long range)
Chakra cost:30
Damage:5 for each spike hit
Description:In this jutsu the user forms one handseal and wings of the lightest wood i.e the balsa wood appear on the users back.This wood is special as it is lighter than the hollow wing bones of a bird and is used in making gliders due to its lightweight.With these wings the user can fly in the air unrestricted upto 30 meters without any problems.Also the user can form wooden senbons from their wings at an additional cost of 20 chakra.These senbons are your average senbons,they are just made of wood instead of metal.
~can be used twice per battle
~can be used/taught by Jinbei
~the wings can be shed at any times by forming a single ram seal by the user
~the senbons can be used thrice
~the wings last for 4 turns
~ Approved ~
(Mokuton:Mokusei āmu)-Wood release:Wooden arms-
Rank:B
Type:Supplementary
Range: Short
Chakra cost:30(+5 to taijutsu)
Damage:N/A
Description: In this jutsu the user manipulates wood to grow two arms made from the heartwood of the snakeood tree which can be used along with the users helping the user in taijutsu as the heartwood of the snakewood tree is one of the strongest wood in the world with a specific gravity of around 1.2,hence increasing the strength of the user.And providing the user with an advantage over the opponent.the hands cannot use jutsus but are able to throw kunais,tags and other weaponry.
~can be used twice per battle
~the hands can be dropped at any time with a single Bird seal by the user
~no handseals required
~can be used/taught by Jinbei
~ Arms of that weight would slow you down ~
(Fuuton:Kaze no ningen no barūn)-Wind style:Wind human balloon-
Rank:S
Type:Attack
Range: Short
Chakra cost:40
Damage:80
Description: This is a very difficult jutsu to employ and requires uttermost concentration of the user.In this jutsu the user has too make physical contact with the opponent and when he has achieved that the user streams his fuuton chakra into the user and in a matter of 2 seconds the blood vessels of the user is filled with air or air bubbles to be precise. which then causes extreme internal injuries due to the fact that air bubbles can cause major impact too the heart and other internal organs,damaging the opponent internally leaving him unable too battle.
~can be used once per battle
~no B rank and above fuuton jutsu the next turn due to severe exhaustion and concentration
~can be used/taught by Jinbei
~ Similar techniques exist ~
(Mokuton:Hageshii kaze no misairu)-Wood release:Fierce wind missiles-
Rank: S
Type:Attack
Range: Short-Long
Chakra cost:40
Damage:80
Description: This is a useful mokuton jutsu in which the user starts to spin on his heels simultaneously releasing, from every part of the users body mokuton spears.The spears are pointed at both ends and are about 1 and a half feet long feet long,these are infused with fuuton chakra of the user and travel and very high velocities towards the opponent piercing him all the way through and inflicting a large amount of damage,as the attack covers a full 360 degrees it also covers all the blind spots making it a jutsu of choice for the user.
~can be used thrice per battle
~no mokuton jutsus next turn due to overuse of mokuton chakra
~can only be taught/used by Jinbei
~no handseals required
We have proof that mokuton can grow from other places than the hands as shown here:
Rank:B
Type:Supplementary
Range: Short
Chakra cost:30(+5 to taijutsu)
Damage:N/A
Description: In this jutsu the user manipulates wood to grow two arms made from normal wood which can be used along with the users helping the user in taijutsu as the heartwood of the snakewood tree is one of the strongest wood in the world with a specific gravity of around 1.2,hence increasing the strength of the user.And providing the user with an advantage over the opponent.the hands cannot use jutsus but are able to throw kunais,tags and other weaponry.
~can be used twice per battle
~the hands can be dropped at any time with a single Bird seal by the user
~no handseals required
~can be used/taught by Jinbei
Freestyle art feet crunch and one punch = Furīāto ashi kuranchi to ichi-hatsu
Rank: A
Type: Attack
Range: Short
Chakra Cost: N/A
Damage Points: 25
Description: A Taijutsu attack where the user stands in hand stand, out of nowhere smashes both his/her feet down unto both the targets feet, crushing them, then the user does a single powerful punch with both his/her hands.
~Declined~
Freestyle art tornado swings = Furīātotorunēdosuingu
Rank: S
Type: Attack
Range: Short
Chakra Cost: 15
Damage Points: 40
Description: A Taijutsu attack where the user stands in hand stand, focuses wind chakra in his/her legs, and begins to swing them in incredibly fast unpredictable movements, the sweeps are so fast that to the untrained eye it will look like a wind sphere. Each sweep is strong enough to break the bones of a grown man, and because of the speed and power, it can deflect up to (also including) C-ranked wind attacks, but because of the power it takes, the technique leaves the user completely exhausted after use.
Notes:
• Can only be taught by ZeroGarra.
• Can only be used twice per match.
• No A-ranked techniques or above next turn.
• Causes dizziness for 3 seconds.
~Approved~
Freestyle art defensive kicks = Furīāto bōei no kikku
Rank: B
Type: Defense
Range: Short
Chakra Cost: N/A
Damage Points: 15
Description: A Taijutsu move where the user stands in hand stand, swings his/her legs around in a protective pattern, these sweeps are made as a protective technique, and are able to block Taijutsu up to (and including) C-rank.
~Declined~
Freestyle art up is down = Furīāto ga daun shite iru
Rank: Forbidden
Type: Supplementary
Range: Self
Chakra Cost: 70
Damage Points: N/A (10 damage to the user each turn this jutsu is active.)
Description: After intense the training, the user has perfected the art of battling with the legs, the user is able to use his legs as his arms and vice versa. This mode allows the user to enter a state, where his legs practically work as another pair of arms. The user focuses an intense amount of wind chakra, and surrounds his body with it, creating a fine layer of constantly moving wind chakra, that allows the user to increase his balance and speed even further. When this mode is active, the user moves with speed equal to Lee with the 3 gate opened, and without weights. With this mode active, the user is also able to form handseals with his feet. The layer of wind surrounding the user, is extremely durable, and will deflect most ninja tools, Taijutsu up to (also including) S-ranked, and Wind jutsus and lightning jutsus up to (also including) A-ranked. This mode also gives a 10+ damage to all Freestyle art Taijutsu. This mode has some major drawbacks though, when it wears of the user will be completely exhausted, and the wind chakra surrounding the users body, is sharp inwards, so the user will take damage over time, as long as this jutsu is active.
Notes:
• Can only be taught by ZeroGarra.
• Can only be used once.
• Lasts for three turns.
• No B-ranked or higher nin gen and taijutsu for the rest of the battle, once this jutsu ends.
• Once active, this jutsu cannot be stopped.
Re: ♦ Custom Jutsu Submission ♦
Naruyari-ryu : Hoshoku Chiyari | Thundering Spear Style : Predatory Earth Spears
Type: Attack
Rank: A
Range: Short - Mid
Chakra Cost: 30
Damage: 60
Description: The user charges his/her spear/s with Earth chakra, this allows them to move underground towards the enemy or wherever the user wants to place them. After using 2 handseals, they pop out of the ground piercing the enemy and pinning them in place (if the enemy is nearby).
-The earth chakra lasts for 2 turns then the spear/s will turn back to normal.
-Only twice per battle
-Can only be taught by Ragerok.~Declined~ Too similar to existing techniques
----------------------
Naruyari-ryu : Poseidon's Gyoushi | Thundering Spear Style : Poseidon's Gaze
Type: Attack
Rank: A
Range: Short - Mid
Chakra Cost: 30
Damage: 60
Description: Using the tip of his spear as "pointer", the user can fire a small, but powerful jet of water that goes in a straight line. It is powerful enough to cut through normal rock (at short range). The user must keep both hands on the spear to channel the water chakra and fire the beam.
-Thrice per battle
-Lasts 1 turn (or less, if the user removes a hand)
-Must be taught by Ragerok~Approved~Inuzuka Puredetā Bijon | Inuzuka Predator Vision
Type: Supplementary
Rank: S
Range: Short - Long
Chakra Cost: 40
Damage: N/A
Description: The Inuzuka clan are known for having traits from their canine companions (most notably in their sense of smell and hearing), this jutsu gives the user Canine vision, by sending chakra to their eyes and altering them. The user and his dog sync their eyes together and the user gains the same vision as his dog (they don't share vision, just the same qualities.) The users eyes gain bigger pupils, increased density in the rod cells (giving more emphasis on motion sensing), increased flicker rate and a Tapetum Lucidum (this gives the user the ability to see greatly in near dark places, this also causes their eyes to "shine" when coming into contact with Light).
The user can see movement up to a mile away, and gains a 270 degree field of vision They can see well in near dark places (but not in pitch black areas). The users vision acuity (clearness) is reduced from 20/20 vision to 20/75, but makes up for it with motion detection.
Note:
-Must be from the Inuzuka clan
-Must have a Dog Companion
-Lasts for 3 turns
-Must be taught by Ragerok or Gatsndshanks.
-Can only use twice per battle.
-Must be in short range of your dog in order to keep in sync.
Re: ♦ Custom Jutsu Submission ♦
Girochin Kazaguruma · Guillotine Windmill
Rank: S
Type: Weapon
Range: Short - Long
Chakra Cost: 15 p/turn
Damage Points: N/A
Description: This weapon is made from a lightweight metal that allows it to easily glide through the air however it is capable of decapitating someone's head clean off. Although this seems like an ordinary windmill shuriken, it has been attached with chimes on the blades edges; once they chime, they can release genjutsu-inducing sound waves that can put the foe in a variety of weak illusions for instance, making the shuriken vanish or create a separate distraction (equivalent to B-rank).
- The illusions don't count as a jutsu
- Only a total of four illusions can be made in a fight
Re: ♦ Custom Jutsu Submission ♦
Originally Posted by Mugen-sama
Summoning: Elder Kyu (Kchuysei: Kyu-sama )
Rank: A
Type: Attack
Range:N/A
Chakra Cost: 40
Damage: N/A
Description: After wiping blood on his tattoo the user will summon one of the 3 chimpanzee elders- Kyu.Kyu has the the ability of advanced speed.Unlike many chimpanzees his age he is small,he is only the height of a human arm.Like all of the elders he has the ability to merge with the summoner,he merges with the users legs, for the rest of the battle. Once merged the user has the ability to have speed of lee without weights.(although he gets a -2 damage each turn)
*May only be summoned once and merged once per battle
~ How fast are we talking here ? ~
I thought it wouldn't be approved cause I aint a med nin but meh doesnt hurt to try :p Anyway I changed from med to speed. Summoning: Elder Uky (Kchuysei: Uky-sama )
Rank: A
Type: Attack
Range: N/A
Chakra Cost: 40
Damage: N/A
Description: After wiping blood on his tattoo the user will summon one of the 3 chimpanzee elders- Uky.Uky has the the ability to absorb anything.Unlike many chimpanzees his age he is small,he is only the height of a human arm.Like all of the elders he has the ability to merge with the summoner, he merges with the users chest with hands sticking out of it, for the rest of he battle. Once merged Uky can absorb 2 incoming jutsus(2 A rank or 1 forbidden or 1 S rank and no more)
*May only be summoned once and merged once per battle
Summoning: Elder Oku (Kchuysei: Oku-sama )
Rank: A
Type: Attack
Range: N/A
Chakra Cost: 40
Damage: N/A
Description: After wiping blood on his tattoo the user will summon one of the 3 chimpanzee elders- Oku.Oku has the the ability of super human strength.Unlike many chimpanzees his age he is small,he is only the height of a human arm.Like all of the elders he has the ability to merge with the summoner, he merges with the users hands with only eyes visible on the arms, for the rest of he battle. Once merged Oku gives the users hands super human strength (+10 to tai/ken with hands)
*May only be summoned once and merged once per battle
Rank: Forbidden
Type: Supplementary
Range: N/A
Chakra Cost: 50
Damage: N/A
Description: After the user has has summoned and merged with all 3 elders- Kyu-Uky-Oku (which forms the name) the user will enter the chimpanzees ultimate ancient form that increases the users chakra flow and enhances it.The users hair will instantly grow long,spiky,solid and turn silver.While in this form the user will gain the speed faster of lee without weights and tremendous strength (+15 to tai/ken).Though if the user didnt used the elders abilities before activating this than he loses them because you can not use the abilities in this form as the elders are focused on enhancement of the users chakra.
*mUst be a chimpanzee user and taught ONLY by mugen
*Must be merged with all 3 elders that are summoned individually at a individual cost of chakra.(in all to preform this it will be 40+40+40+50=170 chakra) + each elder must be summoned on a individual turn making a total of 4 turns to activate this.(3 turns to summon and 1 to activate,unless delayed even more)
*May only be activated once and last for 4 turns.If the user does not win on the 4rth turn,then the battle will end automatically with the user drained out of energy.
Rank: S
Type: Defense/attack
Range: short
Chakra Cost: 40
Damage: N/A
Description: The user will concentrate chakra to his arm and sword while in a drawing position,then by increasing his chakra flow in the arm he drastically increases his arm speed thus making his arm draw the sword at the speed of sound also leaving a afterimage which confuses the enemy.Only a 3 tomoe sharingan user can see the actual attack
*can only be used once per battle and causes the users arm muscles to tense up to the point where he cant use any taijutsu/kenjutsu moves for 3 turns and receives a -30 damage.Also the users handseal speed will drop to very slow.
made for this bio however can be taught to other but they will receive a -40 damage when usedhttp://www.narutobase.net/forums/showthread.php?t=56755
~ Well, first off, Hiten-Mitsurugi Ryu doesn't translate to Ultrasonic sword style. It's Flying Heaven Honourable Sword Style. Second, someone already uses that name, so you have to change it before this is even checked. ~
Note: I am only resubmiting Elder Kyu because I presume since you never had any problems with the other 2 that those are approved. Summoning: Elder Kyu (Kchuysei: Kyu-sama )
Rank: A
Type: Attack
Range:N/A
Chakra Cost: 40
Damage: N/A
Description: After wiping blood on his tattoo the user will summon one of the 3 chimpanzee elders- Kyu.Kyu has the the ability of advanced speed which is equivalent to the speed of lee without weights.Unlike many chimpanzees his age he is small,he is only the height of a human arm.Like all of the elders he has the ability to merge with the summoner,he merges with the users legs, for the rest of the battle. Once merged the user has the ability to have speed of lee without weights.(although he gets a -2 damage each turn)
*May only be summoned once and merged once per battle
Rank: Forbidden
Type: Supplementary
Range: N/A
Chakra Cost: 50
Damage: N/A
Description: After the user has has summoned and merged with all 3 elders- Kyu-Uky-Oku (which forms the name) the user will enter the chimpanzees ultimate ancient form that increases the users chakra flow and enhances it.The users hair will instantly grow long,spiky,solid and turn silver.While in this form the user will gain the speed faster of lee without weights and tremendous strength (+15 to tai/ken).Though if the user didnt used the elders abilities before activating this than he loses them because you can not use the abilities in this form as the elders are focused on enhancement of the users chakra.
*mUst be a chimpanzee user and taught ONLY by mugen
*Must be merged with all 3 elders that are summoned individually at a individual cost of chakra.(in all to preform this it will be 40+40+40+50=170 chakra) + each elder must be summoned on a individual turn making a total of 4 turns to activate this.(3 turns to summon and 1 to activate,unless delayed even more)
*May only be activated once and last for 4 turns.If the user does not win on the 4rth turn,then the battle will end automatically with the user drained out of energy.
~Declined~ Extremely OP Manslayer style (Battossai ryu)
Rank: A
Type: Supplementary
Range: short
Chakra Cost: N/A
Damage: N/A
Description: The user will convince himself that his life is meaningless and not important.After that his eyes will become sharp and he will see everyone who is in his way as a enemy.This is dangerous style and can not be used around allies.This needs one full turn to activate.During that turn the user must only make offensive moves so that he rises his aggression.
*lasts 5 turns once activated
*Must be taught by Mugen
~Declined~ Manslayer style: three blade attack (Battossai ryu: sa)
Rank: B
Type: attack
Range: short-mid
Chakra Cost: 25
Damage: N/A
Description: the user once activates the man slayer style will put chakra in his sword and draw his sword at great speed,and also doing 2 slashes after that making 3 chakra blades attack the opponent.However 2 of them will attack him at both his sides and one to the front.
*Must be taught by Mugen
Manslayer style: shadow sword (Battossai ryu: kage katana)
Rank: B
Type: attack
Range: short
Chakra Cost: 25
Damage: N/A
Description: the user once activates the man slayer style will put chakra in his sword and than create a image to his opponent as if he was slashing and while the opponent is blocking that one the user attacks in the blind spot with his real sword and hands.
*Must be taught by Mugen
Re: ♦ Custom Jutsu Submission ♦
(Kuro Nokogiri)- Black Saws
Rank: S
Type: Attack/Defence/Supplementary
Range: Short-Long
Chakra Cost: 40
Damage Points: 80
Description: After performing a string of 8 handseals the user creates up to 12 black saw blades of made of chakra that can be controlled to spin and quickly orbit the user. They are 3 ft in diameter and can be turned vertically to block attacks or sent at the opponent like a shuriken. They can also be used as a platform to stand on.
-Usable once per battle
-It takes 4 of them to block an attack of the same rank.
-Lasts as long as the user doesn't use another jutsu.
-Can only be taught by Katonpwnz |
Dr. Ahmed G. Abo-Khalil
Electrical Engineering Department
Computer vision
Computer vision is a field that includes methods for
acquiring, processing, analysing, and understanding images and, in
general, high-dimensional data from the real world in order to produce
numerical or symbolic information, e.g., in the forms of decisions. A theme in the development of this field has been to duplicate the
abilities of human vision by electronically perceiving and understanding
an image. This image understanding can be seen as the disentangling of symbolic
information from image data using models constructed with the aid of
geometry, physics, statistics, and learning theory. Computer vision has also been described as the enterprise of automating
and integrating a wide range of processes and representations for
vision perception.
Applications range from tasks such as industrial machine vision systems which, say, inspect bottles speeding by on a production line,
to research into artificial intelligence and computers or robots that
can comprehend the world around them. The computer vision and machine
vision fields have significant overlap. Computer vision covers the core
technology of automated image analysis which is used in many fields.
Machine vision usually refers to a process of combining automated image
analysis with other methods and technologies to provide automated
inspection and robot guidance in industrial applications. |
Q:
Greasemonkey get names of all open tabs
My ultimate goal is to have an autocompleting list that displays all open tabs (in Firefox), which I can reduce to the tab I want to switch to next.
I can do the completion / combobox etc, but I don't know how to get the list of all names (and favicons wold be a huge bonus). Would be grateful for any pointers.
A:
Doesn't GreaseMonkey run in the context of a single web page? I don't think it can access the other tabs.
If you make a normal extension, you can call window.getBrowser().browsers as is described here:
Detecting tab closed (after closed) from firefox extension
Aside from learning a little XUL, your extension might be easy to port.
How to build a FireFox Extension
If you just want the functionality, here's an add-on that does what you want already
https://addons.mozilla.org/en-us/firefox/addon/list-all-tabs-menu/
|
Apply to Present
Each year, the NREL Industry Growth Forum recruits the most innovative, emerging clean energy start-up companies from across the globe to apply to present. We accept applicants ranging from prototype-stage to commercially ready with a renewable energy or energy efficiency technology solution.
Application Process
The application window for the 2015 Applications will be submitted through the online application system. Follow these steps to apply to present at the Industry Growth Forum. The application window for the 2015 Industry Growth Forum is now closed.
Download and read the Application Instructions, which provide instructions and details about how the application will be evaluated.
Pay the $150 application fee. If you are a Colorado company, please contact an application team member prior to submitting your fee.
Submit your application. After paying your application fee, you will be directed to the online application system to complete your application form.
Why Apply?
The Industry Growth Forum provides many opportunities to accelerate your company's growth. As a startup applicant, you will have the following opportunities to:
Expert Review & Selection
100 leading investors and national incubators review startup applications and provide valuable, direct feedback to applicants
30 companies are ultimately invited to present at the Forum
Applicants receive one discounted registration ($300) to attend the Forum
Finalists receive pre-Forum mentoring by leading investors and incubators to help them refine their strategy & pitch
Networking Opportunities
Get early access to sign up for One-on-One networking meetings with investors, strategic partners, and government agencies
Expand your network through hundreds of the world's leading clean energy investors, executives, and technologists.
Thank You to Our 2015 Channel Partners
Industry Growth Forum Channel Partners consist of leading national incubators, accelerators, and entrepreneur support organizations. Channel partners assist in sourcing top-tier startups to apply to present at the Forum by referring current or alumni portfolio companies. To become an Industry Growth Forum Channel Partner, please contact [email protected]. |
Frequently asked questions
ACRONIS BACKUP STANDART - INTERNAL ERROR
we're getting more and more often an error arises, when the backup ends with an internal error (to see „log in supplement“). Unfortunately, it helps only to remove the entire backup plan and create a new plan and new first backup. If this problem arises, I would like to try to solve this situation another better way than before. It looks like the backup is broken in some way.
Thank you for providing these logs. However, they are not enough to analyze the nature of this issue. Please go to C:\ProgramData\Acronis\BackupAndRecovery\MMS\ folder on the server where this error arises. Please archive the 'MMS' folder with pcs.0.log.gz ... pcs.N.log.gz files.
Then please upload this archive on the Acronis FTP server. I have sent you an FTP link in a Private Message.
To access a private message click on My account at the top of a forum page and then to Dialogs |
MOSCOW—The Kremlin said Friday it is still trying to prevent a Western military strike against the regime of Syrian President Bashar al-Assad, but Moscow appears to be running out of cards to play to protect its longtime ally.
From the start, the Kremlin has ruled out direct military intervention, not wanting to risk a broader confrontation with the West. Moscow has supplied weapons and financial backing, but not enough to turn the tide in the fighting. Regular Russian vetoes of United Nations Security Council resolutions... |
I recently jumped back into frontend development for the first time in months, and I was immediately struck by one thing: everything had changed.
When I was more active in the frontend community, the changes seemed minor. We’d occasionally make switches in packaging (RequireJS → Browserify), or frameworks (Backbone → Components). And sometimes we’d take advantage of new Node/v8 features. But for the most part, the updates were all incremental.
It’s only after taking a step back and then getting back into it that I realized how much Javascript fatigue there really is.
Years ago, a friend and I discussed choosing the ‘right’ module system for his company. At the time, he was leaning towards going with RequireJS–and I urged him to look at Browserify or Component (having just abandoned RequireJS ourselves).
We talked again last night, and he said that he’d chosen RequireJS. By now, his company had built a massive codebase around it –- “I guess we bet on the wrong horse there.”
But that got me thinking, with all the Javascript churn there’s really no right horse to bet on. You either have to continually change your tech stack to keep up with the times, or be content with the horse you’ve got. And as a developer who’s trying to build things for people, it’s difficult to know when it makes sense to invest in new tech.
Like it or not, Javascript is evolving at a faster rate than any widespread language in the history of computing.
Most of the tools we use today didn’t even really exist a year ago: React, JSX, Flux, Redux, ES6, Babel, etc. Even setting up a ‘modern’ project requires installing a swath of dependencies and build tools that are all new. No other language does anything remotely resembling that kind of thing. It’s enough to even warrant a “State of the Art” post so everyone knows what to use.
So, why does Javascript change so much__?
A long strange journey
To answer that question, let’s take a step back through history. The exact relationship between ECMAScript and Javascript is a bit complex, but it sets the stage for a lot of today’s changes.
As it turns out, there are a ton of interesting dynamics at play: corporate self-interest, cries for open standards, Mozilla pushing language development, lagging IE releases that dominate the market, and tools that pave over a lot of the fragmentation.
The Browser Wars
Javascript first appeared as part of Netscape Navigator in March, 1996. The creation story is now the stuff of legend, where Brendan Eich was tasked with creating a language to run in the browser as a one-man-dev-team. And in just ten days, he delivered the first working version of Javascript for Navigator.
To make sure they weren’t missing the boat, Microsoft then implemented their own version of Javascript, dubbed JScript to avoid trademark issues (they would continue calling the language “JScript” until 2009). It was a reverse-engineered version of Javascript, designed to be compatible with Netscape’s implementation.
After the initial release in November of 1996, Eich pushed Javascript to be designed as a formal standard and spec with the ECMA commmittee, so that it would gain even broader adoption. The Netscape team submitted it for official review in 1997.
Despite the submission to become an ECMA defined language, Javascript continued iterating as part of its own versions, adding new features and extensions to the language.
As Eich moved from Netscape to Mozilla, the Firefox teams owned Javascript development, consistently releasing additional specs for developers willing to work with experimental features. Many of those features have since made into later versions of ECMAScript-driving mainstream adoption.
ES.start
ECMAScript has a weird and fascinating history of its own, largely broken up into different ‘major’ editions.
ECMA is an international standards organization (originally the European Computer Manufacturers Association), and they handle a number of specs, including C#, JSON, and Dart.
When choosing a name for this new browser language, ECMA had to decide between Javascript, Jscript, or an entirely new name altogether. So they took the diplomatic route, and adopted the name ECMAScript as the ‘least common denominator’ between the two.
The first edition of ECMA-262 (262 is the id number given to the language spec) was then released in June 1997, to bridge the gap between Javascript and Jscript and establish a plan for standardizing updates going forward. It was designed to be compatible with Javascript 1.3, which had added call , apply , and various Date functions.
ES2 was released one year later in June 1998, but the changes were purely cosmetic. They had been added to comply with a corresponding ISO version of the spec without changing the specification for the language itself, so it’s typically omitted from compatibility tables.
ES3, released in December 1999, marked the first major additions to the language. It added support for regexes, .bind , and try/catch error handling. ES3 became the “standard” for what the majority of browsers would support, underscored by the popularity of older IE browsers. Even in February 2012 (13 years after the ES3 release!!), ES3 IE browsers still had over 20% of the browser market.
Then work began on ES4, a version that was designed to revolutionize Javascript. Ideas for classes, generators, modules, and many of the features that ended up in ES6 were introduced in what was dubbed the ‘harmony’ spec. The committee first published a draft of the spec in October 2007, aiming to have a final release the following year. It was supposed to be the modernized “Javascript 2.0” that would reduce a lot of the cruft of the first implementation.
But just as the spec was nearing completion, trouble struck! On the one hand Microsoft’s IE platform architect Chris Wilson, argued that the changes would effectively “break the web”. He stated that the ES4 changes were so backwards incompatible that they would significantly hurt adoption.
On the other hand, Brendan Eich, now the Mozilla CTO, argued for the changes. In an open letter to Chris Wilson, he objected to the fact that Microsoft was just now withdrawing support for a spec which had been in the works for years.
After a lot of internal friction, the committee finally set aside its differences. They actually abandoned ES4 altogether and skipped straight to creating ES5 as an extension the language features found in ES3! They added specifications for many of the features already added to Javascript 1.x by Mozilla and planned to release later that year. There was no ES4 release.
After meeting in Oslo, Brendan Eich sent a message to es-discuss (still the primary point for language development) outlining a plan for a near-term incremental release, along with a bigger reform to the language spec that would be known as ‘harmony’.. ES5 was finalized and published in December 2009.
With ES5 finally out the door, the committee started moving full-speed ahead on the next set of language extensions which they’d hoped to start incoporating nearly a decade earlier.
By now, browser-makers and committee members alike had seen the danger of adding a giant release without testing the features. So drafts of ES6 have been published frequently since 2011, and available behind flags ( --harmony ) in Node and many of the major browsers. Additionally transpilers had become a part of the modern build chain (more on that later), allowing developers to use the bleeding-edge of the spec, without worrying about breaking old browsers. It was eventually released in June 2015.
So we have:
Javascript versions driven by Netscape and then Mozilla (championed by Eich)
ECMAScript versions driven by the planning committee to standardize the language
JScript versions released by Microsoft which effectively mimicked Javascript and added its own extensions
With experiments and language additions to each dialect pushing the ES standard ahead.
Browsers
Of course, we can’t talk just about the full history of JS without mentioning the platform it’s running on: browsers.
-W3Counter
Javascript is the only language in history that has so many dominant runtimes, all fighting for their piece of the market share. And it makes total sense, given how ‘bundled’ browsers are. If you build an alternative Python runtime, it’s hard to profit unless you add some sort of proprietary add-ons. But with browsers, the sky is the limit: tracking usage statistics, the ability to set default search engines, email defaults, and even advertising.
And the Javascript arms race certainly wasn’t helped by the collapse of the ES4 spec, or IE6-8’s longstanding vicegrip on the market. Though most of the 2000’s, Javascript runtimes remained non-standard and stagnant.
-W3Counter
But an interesting thing happened when Chrome first emerged onto the scene in December, 2008. While Chrome had numerous features that made it technically interesting (tabs as processes, a new fast js runtime, and others), perhaps the thing that made it most revolutionary was its release schedule.
Chrome shipped from day-1 with auto-updates, first tested from a widespread number of early adopters using the dev and beta channels. If you wanted to use the bleeding edge, you could easily do so. Nowadays, updates to the stable channel happen every six weeks, with thousands of users testing and automatically reporting bugs they encounter on the dev and beta channels.
It meant that Chrome was able to ship updates far more frequently than its competitors. Where the other browsers would tell users to update every 6-12 months, Chrome updated the three channels weekly, monthly, and released updates on the stable channel every six weeks.
This put enormous pressure on the other browser makers to follow suit, causing a rapid increase to iterate and release new language features. Gone are the days of the not-to-spec IE Javascript implementations. As the ES6 drafts started to finalize, browsers have steadily been adding those features and fixing bugs with their implementations.
Most of the features are still not “safe” to use and hidden behind flags, but the fact that browsers will continue to auto-update means that the velocity of new JS features as increased dramatically in the last few years.
Builders and Shims
Imagine now that you’re a developer just learning JS, and knowing none of that history. It’d be pretty much impossible to keep track of which features are supported in what browsers, what’s to spec and what’s not, and what parts of the language should even be used.
There’s an entire book on just the ‘good parts’ of Javascript, borne of it’s convoluted past. And before MDN, the predominant resources for getting an intro to Javascript just barely scratched the surface.
Realizing this was a problem, John Resig released the first version of JQuery in 2006. It was a drop-in library designed to pave over a lot of the inconsistencies between the different browsers. And for the most part, developers became comfortable with always bundling jQuery into their projects. It became the de facto library for DOM manipulation, AJAX requests, and more.
But working with many different scripts was tedious. They had to be loaded in a certain order, or else bundle duplicated dependencies many times over. Individual libraries would overwrite the global scope, causing conflicts and monkey-patching default implementations.
So James Burke created RequireJS in 2009, spawned out of his work with Dojo. He created a module loader designed to specify dependencies, and load them asynchonously in the browser. It was one of the first frameworks that actually introduced the idea of a “module system” for isolating pieces of code and loading them asynchronously–dubbed AMD (Asynchronous Module Definition).
While AMD was easy to load on the fly, it was also verbose. It essentially added dependency injection for every single library you’d want to load:
The simplicity had the benefit that the browser could load libraries on-the-fly, but it was a lot of overhead for the programmer to really understand.
In 2009, Ryan Dahl started working on a project to run Javascript as a server. He liked the simplicity of working in a single-threaded environment, and leveraged the non-blocking I/O of v8. That project became Node.js.
Since Node ran on the server, making requests for additional scripts was cheap. The scripts were cached, so it was as easy as reading and parsing an additional file.
Instead of using AMD modules, Node popularized the CommonJS format (the competing module format at the time), using synchronous require statements for loading dependencies. It mirrored the same way that other languages worked, grabbing dependencies synchronously and then caching them. Isaac Schuetler built npm around it as the de facto way to manage and install dependencies in Node. Soon, everyone was writing node scripts that looked like this:
Yet the frontend still lagged. Developers wanted to require and manage Javascript dependencies with the same sort of first class CommonJS support we were getting in Node. The TC39 committee heard these complaints, but a fully-baked module system would take time to develop.
So a new set of tools appeared on the frontend developer’s toolchain. Bower for pure dependency management, Browserify and Component/Duo for actually building scripts and bundling them together. Webpack promised a new build system that also handled CSS, and Grunt and Gulp for actually orchestrating them all and making them play nicely together.
Transpilers
Builders didn’t quite take it far enough on their own. Once people were comfortable with the idea of adding convenience shims and libraries, they started exploring compiling other languages down to Javascript.
After all, there are hundreds of programming languages that can run on the server, but there’s only one widely-supported language for the browser.
Coffeescript was the first major player, created by Jeremy Ashkenas in 2009. Prompted by the surge of programmers building Ruby on Rails apps, Coffeescript provided a way to program in Javascript that looked like Ruby. It compiled down to Javascript, and using our handy build tools, could remove many of the gotchas around vanilla js.
But it didn’t end there.
Once transpilers became a standard a part of the build chain, we had opened the Pandora’s box of what could be compiled to Javascript.
We started with existing languages that compiled to JS. Google’s Inbox was built with GWT (Google Web Toolkit)–a toolkit that compiled Java down to Javascript. Clojurescript compiled Clojure to Javascript. Emscripten took C/C++ code and compiled it down to a much more efficent browser runtime using asm.js.
And now, there’s even entirely separate languages–built with compilation to Javascript as a first-class citizen. Dart and Typescript both allow users to run code in the browser both natively and compiled to JS. Elm was a new take on Javascript designed to compile down both visual elements and execute Javascript code.
Perhaps most interesting, transpilers provided a way to use tomorrow’s ES versions, today! Using tools like Babel, Gnode, and Regenerator, we could transform our ES6 features for the existing browser ecosystem. JSX allowed us to write HTML in a way that combined DOM composition and Javascript a bit more naturally–with all the complexity hidden behind a straightforward transpiler.
Nearly 10 years after Chris Wilson first thought that ES4 would break the web–Babel and other transpilers have acted as the “missing link” to provide backwards compatibility. Babel has worked it’s way into the standard Javascript toolchain, and now most builders include it as a first-class plugin.
Betting on the Right Horse
The history of the language should indicate that, above all, one thing is clear: there’s an enormously high rate of change in the Javascript world.
I didn’t even go into changes in frameworks (Ember, Backbone, Angular, React) or how we structure asynchronous programming (Callbacks, Promises, Iterators, Async/Await). But those have all churned relatively regularly over the years.
The most interesting thing about having a language where everyone is comfortable with build tools, transpilers, and syntax additions is that the language can advance at an astonishing rate. Really the only thing holding back new language features is consensus. As quickly as people agree and implement the spec, there’s code to support it.
It makes me wonder whether there will ever be another language like Javascript. It’s such a unique environment, where the implementations in the wild lag so far behind the spec, that it just invites new specs as quickly as the community can think of them. Some of them even become first-class citizens, and are adopted by browsers.
Javascript development doesn’t show any signs of stopping either. And why would it? There’s never been a time with more tooling and first-class JS support.
I predict we’ll continue to see the cycle of rapid iteration for the next few years at least. Companies will be forced to update their codebase, or be happy with the horse they have. |
Experts: Safety concerns at storm culverts after teen dies
After the body of 17-year-old Logan Blake was pulled out of Cedar Lake on Tuesday, safety at storm culverts is at the forefront of many peoples' minds.
Larry Smith with the City of Waterloo said most storm sewers aren't a risk to the public.
However, Smith said in his 26 years with the City of Waterloo, there is one place he calls an "area of concern."
He said the box culvert inlets at Liberty Park have no screen or grate, and when it rains a swift current could easily force someone inside.
But he also said there's no grate or screen because having one would likely clog up more debris at the inlet and cause more severe flooding in the neighborhood that already deals with flooding during heavy rain.
Marcia Courbat has lived across the street from Liberty Park since the 1950s.
"I can see where it would be dangerous," she said.
Experts with the National Association of Flood and Stormwater Management Agencies (NAFSMA) say they recommend a safety grate or fencing in all cases except when the entrance to the conduit meets all three of the following conditions:
1.) You can see daylight from the entrance to the exit (i.e., the conduit is short and straight),
2.) The conduit can safely pass a 48 inch diameter object, and
3.) There is no hazardous condition at the exit of the conduit (e.g., jagged rocks or a cliff).
If the culvert or storm drain does not meet all three of these criteria, Ken MacKenzie -- a committee chair with NAFSMA, told KWWL a safety grate or fencing is recommended.
He said in order to minimize the risk of someone being pinned to the grate, it should have an open area that is at least four times the area of the conduit opening.
"It is a community decision," he said.
MacKenzie also pointed out NAFSMA itself does not have an official policy about safety grates and/or fences, and that a number of factors go into deciding whether to install a safety grate or fence. |
BRICKS
The tracking brick cladding system is a great innovation.My low poly scene consists of a concrete wall on which some steel rails are nailed .Afterwards some bricks are placed on this steel rail.Hope you like it and can use it in your own scenes. |
[S]ince everyone is quoting the "terrible, terrible pick" line, I guess it’s worth going back to that post to emphasize that that my objection was not personal. I have no reason to believe that she’s anything but the smart, tough, and experienced woman that her friends and supporters have described. My criticism was rooted in one thing: that she had no evident experience or background in what I consider to be a vital part of an effective foreign policy apparatus. …
I didn’t think it was so controversial to suggest that, say, heart surgery should be done by a heart surgeon and not by a smart guy who used to watch ER. But clearly not everyone considers public diplomacy to be heart surgery…
So what do I think now that she’s been nominated? I want her to be confirmed, and quickly. After watching the position stand empty for months, just like so many other important foreign policy positions, we need an Under-Secretary to take the job and get started. The President and the good folks at the NSC have been exemplary on the public diplomacy front thus far, but they can’t do it alone — they need the kind of sustained, ongoing engagement across all levels which the appropriate State Department agencies can and must provide. |
Uniform 1 k2 polytope
{{DISPLAYTITLE:Uniform 1 k2 polytope}}
In geometry, 1k2 polytope is a uniform polytope in n-dimensions (n = k+4) constructed from the En Coxeter group. The family was named by their Coxeter symbol 1k2 by its bifurcating Coxeter-Dynkin diagram, with a single ring on the end of the 1-node sequence. It can be named by an extended Schläfli symbol {3,3k,2}.
Family members
The family starts uniquely as 6-polytopes, but can be extended backwards to include the 5-demicube (demipenteract) in 5-dimensions, and the 4-simplex (5-cell) in 4-dimensions.
Each polytope is constructed from 1k-1,2 and (n-1)-demicube facets. Each has a vertex figure of a {31,n-2,2} polytope is a birectified n-simplex, t2{3n}.
The sequence ends with k=6 (n=10), as an infinite tessellation of 9-dimensional hyperbolic space.
The complete family of 1k2 polytope polytopes are:
5-cell: 102, (5 tetrahedral cells)
112 polytope, (16 5-cell, and 10 16-cell facets)
122 polytope, (54 demipenteract facets)
132 polytope, (56 122 and 126 demihexeract facets)
142 polytope, (240 132 and 2160 demihepteract facets)
152 honeycomb, tessellates Euclidean 8-space (∞ 142 and ∞ demiocteract facets)
162 honeycomb, tessellates hyperbolic 9-space (∞ 152 and ∞ demienneract facets)
Elements
See also
k21 polytope family
2k1 polytope family
References
Alicia Boole Stott Geometrical deduction of semiregular from regular polytopes and space fillings, Verhandelingen of the Koninklijke academy van Wetenschappen width unit Amsterdam, Eerste Sectie 11,1, Amsterdam, 1910
Stott, A. B. "Geometrical Deduction of Semiregular from Regular Polytopes and Space Fillings." Verhandelingen der Koninklijke Akad. Wetenschappen Amsterdam 11, 3-24, 1910.
Alicia Boole Stott, "Geometrical deduction of semiregular from regular polytopes and space fillings," Verhandelingen der Koninklijke Akademie van Wetenschappen te Amsterdam, (eerste sectie), Vol. 11, No. 1, pp. 1–24 plus 3 plates, 1910.
Stott, A. B. 1910. "Geometrical Deduction of Semiregular from Regular Polytopes and Space Fillings." Verhandelingen der Koninklijke Akad. Wetenschappen Amsterdam
Schoute, P. H., Analytical treatment of the polytopes regularly derived from the regular polytopes, Ver. der Koninklijke Akad. van Wetenschappen te Amsterdam (eerstie sectie), vol 11.5, 1913.
H. S. M. Coxeter: Regular and Semi-Regular Polytopes, Part I, Mathematische Zeitschrift, Springer, Berlin, 1940
N.W. Johnson: The Theory of Uniform Polytopes and Honeycombs, Ph.D. Dissertation, University of Toronto, 1966
H.S.M. Coxeter: Regular and Semi-Regular Polytopes, Part II, Mathematische Zeitschrift, Springer, Berlin, 1985
H.S.M. Coxeter: Regular and Semi-Regular Polytopes, Part III, Mathematische Zeitschrift, Springer, Berlin, 1988
External links
PolyGloss v0.05: Gosset figures (Gossetododecatope)
Category:Multi-dimensional geometry
Category:Polytopes |
1. Field of the Invention
The invention relates to methods of inhibiting tumor cell proliferation by inhibiting FoxM1B activity. Specifically, the invention relates to methods and compositions for inhibiting tumor cell proliferation by inhibiting FoxM1B activity, expression, or nuclear localization in a tumor cell.
2. Background of the Related Art
The Forkhead box transcription factors have been implicated in regulating cellular longevity and proliferative capacity. Such studies include a finding of increased longevity in C. elegans bearing a mutant daf-2 gene, which encodes the worm homolog of the insulin/Insulin-like Growth Factor 1 (IGF1) receptor (Lin et al., 1997, Science 278: 1319-1322; Ogg et al., 1997, Nature 389: 994-999). Disruption of the daf-2 gene abolishes insulin-mediated activation of the phosphatidylinositol 3-kinase (PI3K)-protein kinase B/Akt (Akt) signal transduction pathway and prevents inhibition of the forkhead transcription factor daf-16 (corresponding to mammalian homologs FoxO1 or Fkhr) (Paradis and Ruvkun, 1998, Genes Dev. 12: 2488-2498). Activation of the PI3K/Akt pathway phosphorylates the C-terminus of the Daf-16 (FoxO1; Fkhr) gene product and mediates its nuclear export into the cytoplasm, thus preventing FoxO1 transcriptional activation of target genes (Biggs et al., 1999, Proc. Natl. Acad. Sci. USA 96: 7421-7426; Brunet et al., 1999, Cell 96: 857-68; Guo et al., 1999, J. Biol. Chem. 274: 17184-17192).
Studies of Daf-2− C. elegans mutants have demonstrated that Daf-16 stimulates expression of genes that limit oxidative stress (Barsyte et al., 2001, FASEB J. 15: 627-634; Honda et al., 1999, FASEB J. 13: 1385-1393; Wolkow et al., 2000, Science 290: 147-150) and that the mammalian FoxO1 gene could functionally replace the Daf-16 gene in C. elegans (Lee et al., 2001, Curr. Biol. 11: 1950-1957). In proliferating mammalian cells, the PI3K/Akt signal transduction pathway is essential for G1 to S-phase progression because it prevents transcriptional activity of the FoxO1 and FoxO3 proteins, which stimulate expression of the CDK inhibitor p27kip1 gene (Medema et al., 2000, Nature 404: 782-787). Moreover, genetic studies in budding yeast demonstrated that forkhead Fkh1 and Fkh2 proteins are components of a transcription factor complex that regulates expression of genes critical for progression into mitosis (Hollenhorst et al., 2001, Genes Dev. 15: 2445-2456; Koranda et al., 2000, Nature 406: 94-98; Kumar et al., 2000, Curr. Biol. 10: 896-906; Pic et al., 2000, EMBO J. 19: 3750-3761).
Forkhead Box M1B (FoxM1B) transcription factor (also known as Trident and HFH-11B) is a proliferation-specific transcription factor that shares 39% amino acid homology with the HNF-3 winged helix DNA binding domain. The molecule also contains a potent C-terminal transcriptional activation domain that possesses several phosphorylation sites for M-phase specific kinases as well as PEST sequences that mediate rapid protein degradation (Korver et al., 1997, Nucleic Acids Res. 25: 1715-1719; Korver et al., 1997, Genomics 46: 435-442; Yao et al., 1997, J. Biol. Chem. 272: 19827-19836; Ye et al., 1997, Mol. Cell Biol. 17: 1626-1641).
In situ hybridization studies have shown that FoxM1B is expressed in embryonic liver, intestine, lung, and renal pelvis (Ye et al., 1997, Mol. Cell Biol. 17: 1626-1641). In adult tissue, however, FoxM1B is not expressed in postmitotic, differentiated cells of the liver and lung, although it is expressed in proliferating cells of the thymus, testis, small intestine, and colon (Id). FoxM1B expression is reactivated in the liver prior to hepatocyte DNA replication following regeneration induced by partial hepatectomy (Id).
FoxM1B is expressed in several tumor-derived epithelial cell lines and its expression is induced by serum prior to the G1/S transition (Korver et al., 1997, Nucleic Acids Res. 25: 1715-1719; Korver et al., 1997, Genomics 46: 435-442; Yao et al., 1997, J. Biol. Chem. 272: 19827-19836; Ye et al., 1997, Mol. Cell Biol. 17: 1626-1641). Consistent with the role of FoxM1B in cell cycle progression, elevated FoxM1B levels are found in numerous actively-proliferating tumor cell lines (Korver et al., 1997, Nucleic Acids Res. 25: 1715-1719; Yao et al., 1997, J. Biol. Chem. 272: 19827-36; Ye et al., 1997, Mol. Cell Biol. 17: 1626-1641). Increased nuclear staining of FoxM1B was also found in human basal cell carcinomas (Teh et al., 2002, Cancer Res. 62: 4773-80), suggesting that FoxM1B is required for cellular proliferation in human cancers.
FOXM1B facilitates development of cancers in several ways. First, it transcriptionally activates genes involved in cell-proliferation, and promotes progression through G1-S and G2-M phases of the cell cycle (Wang, et al., 2005, Mol Cell Biol, 25: 10875-10894; Laoukili et al., 2005, Nat Cell Biol. 7: 126-136). It stimulates expression of DNA repair genes, ensuring chromosome stability (Tan et al., 2007, Mol Cell Biol. 27: 1007-1016; Wonsey & Follettie, 2005, Cancer Res. 65: 5181-5189). In addition, FoxM1 has been implicated in alleviating oxidative stress in tumor cells by activating ROS scavenger proteins (Park et al., 2009, Embo J. 28: 2908-2918) and mediating resistance to Herceptin and paclitaxel (Carr et al., 2010, Cancer Res, 70: 5054-5063; Kwok, et al., 2010, Mol Cancer Res, 8: 24-34). One study in a mouse hepatocellular carcinoma (HCC) model demonstrated that FOXM1 also functions as a potent activator of tumor metastasis through promoting the epithelial-to-mesenchymal transition (EMT), increased motility of the tumor cells, and establishment of pre-metastatic niches in the distal target organ (Park et al., 2011, EMBO Mol Med, 3: 21-34; Raychaudhuri & Park, 2011, Cancer Res. 71: 4329-4333). Two studies in neuroblastoma and embryonic carcinoma cells indicated a role of FOXM1 in the maintenance of the undifferentiated state of the tumor cells by activating pluripotency-associated genes (Wang et al., 2011, Cancer Res, 71: 4292-4302; Xie et al., 2010, Nucleic Acids Res. 38: 8027-8038).
FOXM1 is a proliferative-specific transcriptional factor whose expression is unique to the proliferating cells (Korver et al., 1997, Nucleic Acids Res, 25: 1715-1719; Ye et al., 1999, Mol Cell Biol, 19: 8570-8580). Several strategies have been developed to target FoxM1 in cancer cells. Based on the fact that FoxM1 is an inhibitory target of mouse ARF tumor suppressor, a cell penetrating ARF 26-44 peptide which consists of 9 N-terminal D-arginine (D69 Arg) residues and amino acid residues 26-44 of the mouse ARF protein was synthesized (Kalinichenko et al., Genes Dev. 2004, 18: 830-850). The ARF 26-44 peptide, which inhibits FOXM1 by sequestering it to the nucleolus, was effective in diminishing tumor size in HCC by reducing tumor cell proliferation and inducing apoptosis (Gusarova et al., 2007, J Clin Invest, 117: 99-111). That ARF peptide also effectively prevented pulmonary metastasis of HCC cells (Park et al., 2011, EMBO Mol Med. 3: 21-34). In addition, thiazole antibiotics have been shown to down-regulate FOXM1 and induce apoptosis in various cancer cells (Bhat et al., 2009, PLoS One, 4: e5592; Radhakrishnan et al., 2006, Cancer Res, 66: 9731-9735). |
[Antibiotic treatment of pyelonephritis in adults].
The diagnostic criteria of acute pyelonephritis are well determined, but this is not the case with the drugs used in the initial treatment and the duration of therapy, notably since not all cases of this disease have the same severity. The antibiotics which fulfill the requirements for effectiveness and good tolerance include aminopenicillins alone or combined with clavulanic acid, aminosides alone or combined with aminopenicillins, carbapenems, 2nd and 3rd generation cephalosporins, cotrimoxazole and fluoroquinolones. Patients with severe pyelonephritis should be hospitalized and treated initially by the parenteral route later followed by the oral route. Patients whose pyelonephritis shows no sign of severity can be treated at home by the oral route. The duration of treatment (10 to 20 days) depends on the initial severity and course of the disease, on laboratory reports and, sometimes, on urinary tract imaging. |
California police will soon be barred from arresting crime victims or witnesses just because of actual or suspected immigration violations under a new law.
The law Democratic Gov. Jerry Brown signed Friday will take effect Jan. 1, 2018.
The measure is one of several authored by state lawmakers to ensure people living in the country illegally who otherwise follow the law are not deterred from reporting crimes or serving as witnesses.
Police are already prohibited from detaining people who report or are assisting with investigations of hate crimes for immigration violations. The new law will extend the protection to victims and witnesses of all crimes. |
Q:
Is there a shortcut for clearing .Rhistory in Visual Studio
I am starting to prefer Visual Studio with RTVS over RStudio because of Visual Studio's great find-and-replace facilities. My only gripe is that it often finds things in my .Rhistory file when I'm trying to search through my code.
Is there a shortcut key for deleting the contents of .Rhistory when using R Tools for Visual Studio?
I am using RTVS v1.0.30321.1407 with Visual Studio 2015.
A:
You can tell RTVS not to keep your history around by going to R Tools -> Options -> Always save history -> set to FALSE.
You can also delete an existing .RHistory file if you don't want to keep it around. It's just a regular file; if you have a project loaded, it'll be in your project directory.
Other than that, it's a good idea to specify a file type when doing a search through multiple files. That will stop .RHistory from showing up in the first place.
|
Q:
Why does "[[ '>' > '0' ]]" return false while "[ '>' \> '0' ]" returns true?
String comparison is ASCII comparison, so
[ '>' \> '0' ]
should have same result as
[[ '>' > '0' ]]
But why does the first return true(0) while the second returns false(1)?
A:
[[ uses the current locale for string comparisons, [ does not.
If you set LC_ALL to C, the [[ variant will also return true:
pax$ LC_ALL=; if [[ ">" > "0" ]] ; then echo yes; fi
pax$ LC_ALL=C; if [[ ">" > "0" ]] ; then echo yes; fi
yes
My default locale, en_US.UTF-8, has > sorting before 0, as per the chart here. Switching the local to C (collation based on raw byte values rather than culture-specific ordering), changes the behaviour.
If you're on Linux (this may also work on other UNIX brethren), the locale command should tell you what your current settings are, if you want to investigate/confirm:
pax$ locale
LANG=en_US.UTF-8
LC_CTYPE="en_US.UTF-8"
LC_NUMERIC="en_US.UTF-8"
LC_TIME="en_US.UTF-8"
LC_COLLATE="en_US.UTF-8"
LC_MONETARY="en_US.UTF-8"
LC_MESSAGES="en_US.UTF-8"
LC_ALL=
|
615 So.2d 735 (1993)
Richard T. NORRIS and Sandra M. Norris, Petitioners,
v.
James PAPS, Mary F. Paps, and James Ferry, Respondents.
No. 92-01376.
District Court of Appeal of Florida, Second District.
February 19, 1993.
Rehearing Denied March 31, 1993.
James F. McCollum, Sebring, for petitioners.
J. Davis Connor of Peterson, Myers, Craig, Crews, Brandon & Puterbaugh, P.A., Winter Haven, for respondents.
ALTENBERND, Judge.
The defendants in this mortgage foreclosure action, Richard and Sandra Norris, appeal two orders entered at the same hearing: an order severing compulsory counterclaims from the foreclosure, and a judgment of foreclosure. We conclude that the trial court improperly resolved disputed factual issues raised in the affirmative defenses when it entered a judgment on the pleadings. The trial court did not have the discretion to defer the jury trial on these factual issues by severing a counterclaim of fraud. See Adams v. Citizens Bank of Brevard, 248 So.2d 682 (Fla. 4th DCA 1971) (error to proceed with foreclosure action before jury trial on interrelated legal counterclaim).
Jack and Mary Paps and James Ferry (collectively referred to herein as "the Paps") owned a golf course and country club, including eighteen lakefront apartments in Sebring, Florida. In November 1988, they sold the property to Mr. and Mrs. Norris for $920,000. The Norrises paid $300,000 down and gave the Paps a promissory note and mortgage in the amount of $620,000.
The Paps filed this foreclosure action because the Norrises refused to make payments on the note after June 1990. The Norrises filed an answer admitting the execution *736 of the note and mortgage and their failure to make payments. As an affirmative defense, however, they alleged fraud in the inducement. This defense was supplemented by a lengthy multicount counterclaim, alleging that the Paps had concealed numerous problems with the golf course. The Norrises alleged that the Paps concealed evidence of structural damage by termites and water. The swimming pool allegedly had an undisclosed leak. The survey provided by the Paps allegedly overstated both the acreage of the property and the front footage on a lake. The Norrises claim the Paps were aware of these errors in the survey and failed to disclose them. The Norrises maintain that they stopped paying on the promissory note when they discovered these problems. Their counterclaim sought rescission and, in the alternative, requested monetary damages. They demanded a jury trial on the legal issues.
The Paps filed a motion for judgment on the pleadings and a motion to sever the counterclaim. In March 1992, the trial court granted the motion to sever because it concluded the allegations of fraud in the inducement constituted a permissive counterclaim, presenting factual issues distinct from the issues raised in the foreclosure action. It decided that these issues could be severed for subsequent jury trial. As a result of this decision and without any express order concerning the affirmative defense of fraud, the trial court granted foreclosure.
I. JURISDICTION
The Norrises filed this appeal pursuant to Florida Rule of Appellate Procedure 9.110, as an appeal from the final judgment of foreclosure. This was a logical decision. The judgment of foreclosure was sufficiently final to authorize a foreclosure sale. Indeed, the foreclosure sale was not stayed during this appellate proceeding, and the Paps purchased the property at that sale.
The Norrises' counterclaim, however, is still pending in the trial court. On a motion to dismiss filed earlier in this appeal, the Paps argued that this court could not review the final judgment of foreclosure until disposition of the counterclaim. The Paps relied on Taussig v. Insurance Co. of North America, 301 So.2d 21 (Fla. 2d DCA 1974). Taussig and other cases hold that where either the original claim or a compulsory counterclaim has been dismissed and the other claim remains pending, the appeal from the dismissal is not appealable until the remaining claim has been adjudicated. See City of Haines City v. Allen, 509 So.2d 982 (Fla. 2d DCA 1987); Del Castillo v. Ralor Pharmacy, 512 So.2d 315 (Fla. 3d DCA 1987). We note that Mendez v. West Flagler Family Ass'n, 303 So.2d 1 (Fla. 1974), and S.L.T. Warehouse Co. v. Webb, 304 So.2d 97 (Fla. 1974), which were decided after Taussig, also support the general rule preventing a final appeal before disposition of a compulsory counterclaim. See Key Credit, Inc. v. Espirito Santo Bank of Fla., 610 So.2d 568 (Fla. 3d DCA 1992) (fraudulent inducement of note is compulsory counterclaim in suit to foreclose note and therefore not appealable before judgment is entered on pending foreclosure).[1]
This court has decided to treat the appeal as a petition for writ of certiorari because the trial court's orders deny the Norrises their right to a jury trial on the counterclaims seeking monetary damages in fraud. See Dykes v. Trustbank Sav., F.S.B., 567 So.2d 958 (Fla. 2d DCA 1990). In so doing, however, we leave open the question of whether a severed counterclaim that is still pending in the trial court invokes the rule of Taussig when a final judgment has been signed expressly authorizing a foreclosure sale or collection by execution. See Fla. R.App.P. 9.110(k); cf. Duke v. Reed, 396 So.2d 1218 (Fla. 3d DCA 1981) (summary judgment of foreclosure in multicount complaint is reviewable nonfinal order).
II. THE SEVERANCE
For a brief time, the legislature attempted to require trial courts to sever counterclaims *737 against mortgagees in foreclosure actions. § 702.01, Fla. Stat. (1987). The Florida Supreme Court declared that statute unconstitutional as an infringement upon judicial power. Haven Fed. Sav. & Loan v. Kirian, 579 So.2d 730 (Fla. 1991). Thus, the primary issue in this case is whether the trial court abused its discretion when it granted a severance under Florida Rule of Civil Procedure 1.270(b).
It is well established that fraud can be a valid defense in a foreclosure action. Lake Region Hotel Co. v. Gollick, 110 Fla. 324, 149 So. 204 (1933) (misrepresentation of size of acreage). Fraud is also a legal action for damages that can be raised as a counterclaim. Spring v. Ronel Refining, Inc., 421 So.2d 46 (Fla. 3d DCA 1982). At least in some, if not all, cases, fraud in the inducement of a note or mortgage is a compulsory counterclaim to an action in foreclosure on the note or mortgage. Key Credit; Spring; Yost v. American Nat'l Bank, 570 So.2d 350 (Fla. 1st DCA 1990).
Although such fraud claims may be compulsory counterclaims for purposes of Florida Rule of Civil Procedure 1.170, this fact does not necessarily preclude a severance under rule 1.270(b). Cf. Pearlman v. National Bank of New York City, 600 So.2d 5 (Fla. 4th DCA 1992) (severing foreclosure complaint for bench trial prior to jury trial on compulsory counterclaim is permissible). Nevertheless, it is more likely that a severance will prejudice a party or cause inconvenience if the severed issues include a compulsory counterclaim. See Yost. Such prejudice is especially predictable when the legal issues must be tried by jury, or where the evidence supporting an affirmative defense and the severed counterclaim are interrelated.
A mortgage foreclosure proceeding is equitable in nature and does not afford the parties a right to a jury trial. See Adams. A party is entitled to a jury trial, however, on issues raised in a compulsory counterclaim that are common to the equitable claim. Hightower v. Bigoney, 156 So.2d 501 (Fla. 1963); Dykes; Spring. By severing the counterclaim in this case, the court either determined the factual issues of fraud without evidence and without a jury, or it entered a final judgment for the plaintiff before it resolved the affirmative defense of fraud. Either option would be error.
Since the trial court could not sever the affirmative defense of fraud from this foreclosure action, it is obvious that a judgment on the pleadings was not warranted. In reviewing such a judgment, all material allegations of the opposing party are taken as true, and all those of the moving party that have been denied are taken as false. Swim Indus. Corp. v. Cavalier Mfg. Co., 559 So.2d 301 (Fla. 2d DCA 1990). The court is not permitted to consider any matter outside the pleadings. Farag v. National Databank Subscriptions, 448 So.2d 1098 (Fla. 2d DCA 1984).
Accordingly, we reverse the judgment of foreclosure and remand for further proceedings in accordance with this opinion.
RYDER, A.C.J., and FRANK, J., concur.
NOTES
[1] It seems ironic that the Paps obtained the final judgment by convincing the trial court that the counterclaim was unrelated to the foreclosure and then sought dismissal in this court because the counterclaim was compulsory.
|
Expert organizer shares 23 nifty tricks to help organize your closet
With New Year’s approaching, many of us are probably already thinking about some potential resolutions. The common favorite is usually to exercise and get active. Others include eating more home-cooked meals rather than eating out. I remember one year my husband said his New Year resolution was to spend less time watching football and more time working out. Sadly, that did not work out as planned.
But for those of you who are like me, my New Year’s resolution is to get more organized.
Unlike my husband, I hope to fulfill and carry out this resolution. To do this, I have compiled a list of clever, creative DIY hacks that will help you stay better organized.
Please SHARE these tips on Facebook to help others get organized.
Hang bags on shower hooks.
Label storage boxes.
Use empty shoe boxes to section intimates.
Cut up pool noodles and use them to keep your boots upright. This prevents them from aging.
Put shirts in drawers vertically. Not horizontally.
Use this system to help you get rid of unused, old clothes.
Store your nail polish in a more effective manner.
Hang kid’s bath toys in a fruit basket.
Loop scarves around a hanger to keep them in place and prevent them from falling. |
594 S.E.2d 648 (2004)
277 Ga. 734
SHERMAN & HEMSTREET, INC.
v.
CINCINNATI INSURANCE CO.
No. S03G1190.
Supreme Court of Georgia.
March 29, 2004.
Reconsideration Denied April 13, 2004.
*649 Warlick, Tritt, Stebbins & Hall, Augusta, William B. Warlick, for Appellant.
Howard, Clark & Mercer, Douglasville, Glen W. Clark Jr., for Appellee.
Powell, Goldstein, Frazer & Murphy, Atlanta, Linda G. Birchall, for amicus curiae.
SEARS, Presiding Justice.
Certiorari was granted to consider whether the Court of Appeals correctly construed an insurance policy's provisions governing the limit of insurance applicable to coverage for employee dishonesty. Having reviewed the record in light of certain stipulations concerning the policy made by the parties before the trial court, we determine that the Court of Appeals' decision was correct. Therefore, we affirm.
Sherman & Hemstreet, Inc. ("Sherman"), purchased a commercial insurance policy issued by the Cincinnati Insurance Company ("Cincinnati") that provided coverage for, among other things, loss due to employee dishonesty. In their cross motions for summary judgment, the parties stipulated that the insurance policy had a three year term from September 1, 1997, to September 1, 2000, and that the policy was renewed for an additional three year term from September 1, 2000, to September 1, 2003. Otherwise, the parties stipulated, the provisions of the two policies were identical.
The policies provided that in cases of employee dishonesty, the "most [Cincinnati] will pay for loss in any one `occurrence' is the applicable Limit of Insurance shown in the Declarations." The Declarations, in turn, limited recovery for loss due to employee dishonesty to $50,000. Both policies defined an "occurrence" as "all loss caused by, or involving, one or more employees whether the result of a single act or a series of acts." Thus, for all losses due to the dishonest acts of employees (either a single employee or a group acting in concert), the policies limited Sherman's recovery to $50,000. The policies also included the following non-cumulation clause: "Regardless of the number of years this insurance remains in force or the number of premiums paid, no Limit of Insurance cumulates from year to year or period to period."
Four years after the original policy took effect, Sherman discovered that due to ongoing embezzlement by a single employee, it had sustained losses in each of the three years covered by the original policy and during the first year of the renewed policy. It submitted a claim to Cincinnati seeking to recover $160,670-$50,000 for each year of the original three-year policy and $10,670 for the first year of the renewed policy. Cincinnati paid Sherman $50,000, explaining that was the extent of Sherman's coverage for employee dishonesty. Sherman demanded the additional $110,670, and sued. The trial court granted Sherman's motion for summary judgment. On appeal, the Court of Appeals affirmed in part and reversed in *650 part,[1] concluding the policies' terms were ambiguous as to whether the renewed policy set a new $50,000 limit independent of the original policy. That ambiguity was construed in favor of the insured, and hence the Court of Appeals affirmed the ruling that Sherman could recover $10,670 under the renewed policy. The Court of Appeals concluded, however, that under the unambiguous terms of the original policy, Sherman's coverage for employee dishonesty was limited to $50,000 for the entire three year period. Therefore, it reversed the trial court's ruling that Sherman was entitled to recover an additional $100,000 under the original policy. This Court granted Sherman's petition for certiorari.
1. Cincinnati argues that the Court of Appeals erred in requiring it to pay $10,670 to Sherman under the renewed policy, because the non-cumulation clause limited Sherman's recovery to $50,000 "regardless of the number of years [the] insurance remains in force or the number of premiums paid."[2] As noted above, though, Cincinnati stipulated that there were two insurance policies, one of them an original and the other a renewal. We agree with the Court of Appeals that in light of that stipulation, the non-cumulation clause is ambiguous because it could be construed to mean either: (1) that Cincinnati's maximum aggregate liability, regardless of the number of policies that it issued, was limited to $50,000, or (2) that the liability limit for the original policy could not be "carried over" to increase the liability limit for the renewed policy, although both policies indemnified Sherman for up to $50,000. We must construe this ambiguity in favor of the insured,[3] and thus we agree with the Court of Appeals' judgment permitting Sherman to recover $10,670 under the renewed policy.
2. Sherman argues that the original policy was not for a term of three years, but rather was a series of separate, independent contracts, each for a term of one year. Thus, argues Sherman, it is entitled to recover up to the policy's $50,000 limit of liability for each of the three years in which a loss occurred. As noted above, however, Sherman stipulated before the trial court that the original policy was for a term of three years:
The initial policy had a three (3) year term from September 1, 1997, to September 1, 2000, and the policy was renewed for an additional three (3) year term from September 1, 2000, to September 1, 2003. Otherwise ... the provisions of the two policies were the same.
The parties are, of course, bound on appeal by the stipulations upon which their case was decided in the trial court.[4] Accordingly, Sherman is estopped from arguing on appeal that the policy was for anything other than a single term of three years.[5]
3. The Court of Appeals properly held that Sherman's recovery under the original policy was limited to $50,000. As with any contract, the terms of an insurance policy bear their usual and common meanings.[6] In construing an insurance policy, we strive for the construction that will uphold the policy *651 both as a whole and in every part.[7] In construing any part of a contract for insurance, the contract as a whole must be taken into consideration.[8]
As discussed above, the original policy was for a term of three years. The policy unambiguously stated that for that three year period, the most Cincinnati would pay for losses due to employee dishonesty was $50,000 per "occurrence." The policy defined an "occurrence" as "all loss caused by, or involving, one or more employees, whether the result of a single act or a series of acts." The employee dishonesty at issue in this case was a series of embezzlements committed by a single employee over the course of several years. Thus, the loss for which Sherman sought indemnification under the original policy fell within the policy's definition of a single "occurrence." By its plain terms, the three year policy capped Sherman's coverage at $50,000 for this single occurrence.
4. The original policy's non-cumulation clause also limits Sherman's recovery to $50,000. That clause states that: "Regardless of the number of years [the] insurance remains in force or the number of premiums paid, no Limit of Insurance cumulates from year to year or period to period." Sherman claims the clause was intended to prevent the insured from seeking to carry forward unused portions of insurance from one year to the next. Thus, argues Sherman by way of example, if an insured lost $150,000 in the policy's third year due to employee dishonesty, the non-cumulation clause would prevent it from seeking to recover its entire loss by carrying forward $50,000 in unused coverage from both the first and second year of the policy.
Sherman's argument, however, is based upon the erroneous assumption that there was a separate $50,000 coverage limit for each year the policy was in place. In Divisions 2 and 3, supra, we have already rejected that same proposition. As discussed above, without considering the non-cumulation clause at all, the rest of the policy unambiguously allows recovery of only one limit of insurance. There is no annual limit for employee dishonesty, as urged by Cincinnati.
As noted above, the non-cumulation clause must be construed consistently with the remainder of the policy.[9] Hence, we read the clause as unambiguously stating that payment of the premiums on an annual basis does not increase the single limit of insurance, regardless of whether the policy was written for a term of more than one year. Therefore, if (for example) Sherman had paid premiums for its three year policy on an annual basis, it could not argue that it necessarily follows there was an annual $50,000 limit of coverage.[10] The non-cumulation clause plainly foreclosed any claim that the scope of coverage was tied to the schedule of premium payments or the length of the policy.
Moreover, the very terms of the non-cumulation clause are inconsistent with Sherman's argument regarding how that clause should be construed. The clause provides that regardless of the number of years the policy stays in force, the $50,000 per occurrence limit of insurance shall not cumulate, i.e.: shall not accumulate.[11] In other words, the policy provided for only one coverage limit "per occurrence"$50,000.[12]
*652 5. Sherman argues that it paid an annual premium and it should not be denied annual coverage. In essence, Sherman argues, it received nothing in exchange for its payment of annual premiums. However, we note that where the policy intended for insurance limits to apply on an annual basis, it said so explicitly. For example, the policy's provisions for general commercial liability coverage state that the insurance limits for that particular coverage apply "separately to each consecutive annual period and to any remaining period of less than twelve months." Additionally, the policy's provisions for real estate agent error coverage state that if that particular coverage is in effect for more than one year, the insurance limits apply "separately to each consecutive annual period, and to any remaining period of less than twelve months."
In contrast to these forms of coverage, though, the policy states that for employee dishonesty coverage, Cincinnati will pay no more than $50,000 per occurrence. Obviously, if the parties had intended for the $50,000 limit to apply separately to each year the policy was in place, they would have expressly provided for it, as they did with regard to coverage for general commercial liability and real estate agent errors.
Judgment affirmed.
All the Justices concur, except HUNSTEIN and THOMPSON, JJ., who dissent.
HUNSTEIN, Justice, dissenting.
Contrary to the majority's opinion, Sherman & Hemstreet, Inc. (S & H) does not argue that the insurance policy in issue here was a series of separate one-year contracts. S & H has consistently stated before the Court of Appeals, in its petition for certiorari and in its brief in this Court that the insurance policy here was for a three-year term. Rather, S & H argues that due to ambiguous language in the policy, it is entitled to recover the $50,000 "employee dishonesty" coverage amount for each year of the three-year policy term. Because I agree with S & H that an ambiguity exists and because Georgia law requires that such ambiguities be construed in favor of the insured, Ryan v. State Farm Mut. Auto. Ins. Co., 261 Ga. 869, 413 S.E.2d 705 (1992), I respectfully dissent.
The non-cumulation clause at issue in this appeal has been the subject of considerable analysis by our sister courts over the past twenty-five years. See, e.g., Columbia Heights Motors v. Allstate Ins. Co., 275 N.W.2d 32 (Minn.1979). While most of the cases involved a series of one-year policies, a handful have addressed the situation present here, where one policy covered a multi-year period. See Cincinnati Ins. Co. v. Hopkins, 522 N.W.2d 837 (Iowa 1994); Columbia Heights Motors, supra. In Cincinnati Ins. Co., the Supreme Court of Iowa addressed whether the three-year policy issued by Cincinnati Insurance Company to its insured, with $15,000 coverage for employee dishonesty, "provided separate $15,000 protections for each of the three years of the policy, or was limited to a total of $15,000 for the entire three-year period." Id. at 838. In that case, as in this one, Cincinnati Insurance Company had a non-cumulation clause that barred accumulating the limits of liability from year to year or period to period regardless of the number of years the policy continued in force.[1] The Supreme Court of Iowa held that
[a]lthough Cincinnati claims otherwise, we think there is an ambiguity by reason of the policy's non-accumulation clause. That clause, especially the word "cumulatively," can be interpreted as supporting the position either of Cincinnati or [the insured]. Case authority supports both interpretations. Indeed courts have found similar or identical clauses: (1) unambiguous in supporting the position of Cincinnati, [cits.]; (2) unambiguous in supporting the position *653 of [the insured], [cits.]; and, finally, (3) ambiguous. [Cits.]
Id. at 839-840. The Iowa Supreme Court found the language to be ambiguous and ruled against Cincinnati in 1994. Rather than clarifying this litigious phrasing or eliminating it altogether in favor of language that insureds would have no difficulty understanding, Cincinnati retained the "cumulative" language in the policy it issued S & H in 1997. This litigation now results with yet another insured asserting claims based on this contested contractual language the insurer chose to use.
As the Supreme Court of Iowa carefully noted, an ambiguity in an insurance policy does not "necessarily appear[] merely because case authority can be found to support divergent interpretation of a policy's wording." Id. at 840. However, based on my review of the policy as a whole, the non-cumulation provision specifically, and the analyses employed by other courts in reviewing similar policies, I cannot agree with the majority's conclusory statement that Cincinnati's non-cumulation provision is unambiguous. Accordingly, I would affirm the trial court's grant of summary judgment in favor of S & H.
I am authorized to state that Justice THOMPSON joins in this dissent.
NOTES
[1] Cincinnati Ins. Co. v. Sherman & Hemstreet, Inc., 260 Ga.App. 870, 581 S.E.2d 613 (2003).
[2] Cincinnati raised this issue in its response to Sherman's petition for certiorari, and asked this Court to grant an appeal in order to consider its argument.
[3] Claussen v. Aetna Cas. & Surety Co., 259 Ga. 333, 334, 380 S.E.2d 686 (1989).
[4] Hawes v. Nashville, Chattanooga & St. Louis Ry. Co., 223 Ga. 527, 156 S.E.2d 455 (1967); Crawford v. Crump, 223 Ga.App. 119, 122, 476 S.E.2d 855 (1996); Milich, Georgia Rules of Evidence, § 4.1 (a stipulation estops a party from any position inconsistent therewith); 73 AmJur 2d, Stipulations, § 7 (stipulated facts are conclusive on appeal and a party may not argue that the facts are other than as stipulated to in the trial court).
[5] We note that the second page of both policies also clearly states that they both are for terms of three years. For this reason, the line of cases relied upon by Shermanin which several courts have construed similar multi-year policies as being composed of separate contracts for a term of one year eachhave no application to this appeal. See, e.g., ABS Clothing Collection v. Home Ins. Co., 34 Cal.App.4th 1470, 41 Cal. Rptr.2d 166 (1995).
[6] See Jefferson Pilot Life Ins. Co. v. Clark, 202 Ga.App. 385, 414 S.E.2d 521 (1991); OCGA § 13-2-2(2).
[7] See OCGA § 13-2-2(4).
[8] See OCGA § 13-2-2(5).
[9] OCGA § 13-2-2(4), (5).
[10] The record shows that the policy actually provided for Sherman's premium payments to be made on a quarterly basis.
[11] The American Heritage Dictionary of the English Language, p. 455 (Houghton Mifflin 1992).
[12] A number of other courts have held that an insured in Sherman's position may not rely upon the non-cumulation clause at issue when seeking to recover multiple limits where only one limit is set out in the relevant insurance policy. See, e.g., Shared Interest Mgmt. v. CNA Financial Ins. Group, 283 A.D.2d 136, 725 N.Y.S.2d 469 (2001); Reliance Ins. Co. v. Treasure Coast Travel Agency, 660 So.2d 1136 (Fla.App.1995); Diamond Transport System v. The Travelers Indemn. Co., 817 F.Supp. 710, 712 (N.D.Ill.1993). While several other courts have ruled differently, many of their opinions addressed policies with terms that are markedly different from those at issue here. See, e.g., Columbia Heights Motors v. Allstate Ins. Co., 275 N.W.2d 32, 34 (Minn.1979) (in which the policy expressly stated that any limits of the insurer's liability described therein as being "aggregate" were intended to apply "separately to each consecutive annual period.").
[1] "Regardless of the number of years this endorsement shall continue in force and the number of premiums which shall be payable or paid, the Company's total limit of liability shall not be cumulative from year to year or period to period." Id. at 838.
|
The urge to change appearance in different psychopathological categories.
In professional literature, mainly anecdotic descriptions can be found of striking, sometimes even bizarre manipulations of the appearance by psychiatric patients. In this study, it was examined whether the inclination to (drastically) change the appearance is related to (pre)psychotic symptoms. By means of a questionnaire, the frequency and nature of changing the appearance was studied among a sample of healthy volunteers (n = 38) and psychiatric patients (n = 61). The psychiatric group consisted of 1) patients with schizophrenia (n = 22), 2) patients with a borderline personality disorder (n = 20) and 3) patients with a depressive disorder (n = 19). In accordance with previous findings, self-reports of drastic changes of appearance were associated with scores on various schizotypy scales. Psychiatric patients reported more changes of appearance, compared with healthy volunteers. Patients with schizophrenia reported most changes, followed by the group of patients with borderline personality disordered. Perhaps, drastic changes of the appearance are a visible expression of the loss of ego boundaries and/or of the sense of reality. |
// !$*UTF8*$!
{
archiveVersion = 1;
classes = {
};
objectVersion = 46;
objects = {
/* Begin PBXBuildFile section */
269375577B805EC0C5D040D4 /* Pods.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = 49D5A836ADA56609D6D95912 /* Pods.framework */; settings = {ATTRIBUTES = (Weak, ); }; };
A722B806190A594E007DF168 /* Foundation.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = A722B805190A594E007DF168 /* Foundation.framework */; };
A722B808190A594E007DF168 /* CoreGraphics.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = A722B807190A594E007DF168 /* CoreGraphics.framework */; };
A722B80A190A594E007DF168 /* UIKit.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = A722B809190A594E007DF168 /* UIKit.framework */; };
A722B810190A594E007DF168 /* InfoPlist.strings in Resources */ = {isa = PBXBuildFile; fileRef = A722B80E190A594E007DF168 /* InfoPlist.strings */; };
A722B812190A594E007DF168 /* main.m in Sources */ = {isa = PBXBuildFile; fileRef = A722B811190A594E007DF168 /* main.m */; };
A722B816190A594E007DF168 /* FLWAppDelegate.m in Sources */ = {isa = PBXBuildFile; fileRef = A722B815190A594E007DF168 /* FLWAppDelegate.m */; };
A722B818190A594E007DF168 /* Images.xcassets in Resources */ = {isa = PBXBuildFile; fileRef = A722B817190A594E007DF168 /* Images.xcassets */; };
A722B81F190A594E007DF168 /* XCTest.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = A722B81E190A594E007DF168 /* XCTest.framework */; };
A722B820190A594E007DF168 /* Foundation.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = A722B805190A594E007DF168 /* Foundation.framework */; };
A722B821190A594E007DF168 /* UIKit.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = A722B809190A594E007DF168 /* UIKit.framework */; };
A722B829190A594E007DF168 /* InfoPlist.strings in Resources */ = {isa = PBXBuildFile; fileRef = A722B827190A594E007DF168 /* InfoPlist.strings */; };
A722B82B190A594E007DF168 /* FlowSampleTests.m in Sources */ = {isa = PBXBuildFile; fileRef = A722B82A190A594E007DF168 /* FlowSampleTests.m */; };
A722B86E190A59EE007DF168 /* FLWMainViewController.m in Sources */ = {isa = PBXBuildFile; fileRef = A722B86D190A59EE007DF168 /* FLWMainViewController.m */; };
A722B870190A5FE8007DF168 /* Hacks.m in Sources */ = {isa = PBXBuildFile; fileRef = A722B86F190A5FE8007DF168 /* Hacks.m */; };
A722B87B190A655B007DF168 /* AVFoundation.framework in Frameworks */ = {isa = PBXBuildFile; fileRef = A722B87A190A655B007DF168 /* AVFoundation.framework */; };
/* End PBXBuildFile section */
/* Begin PBXContainerItemProxy section */
A722B822190A594E007DF168 /* PBXContainerItemProxy */ = {
isa = PBXContainerItemProxy;
containerPortal = A722B7FA190A594E007DF168 /* Project object */;
proxyType = 1;
remoteGlobalIDString = A722B801190A594E007DF168;
remoteInfo = FlowSample;
};
/* End PBXContainerItemProxy section */
/* Begin PBXFileReference section */
49D5A836ADA56609D6D95912 /* Pods.framework */ = {isa = PBXFileReference; explicitFileType = wrapper.framework; includeInIndex = 0; path = Pods.framework; sourceTree = BUILT_PRODUCTS_DIR; };
69F7147AAB3AAD50F920D9B4 /* Pods.debug.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = Pods.debug.xcconfig; path = "../Pods/Target Support Files/Pods/Pods.debug.xcconfig"; sourceTree = "<group>"; };
90C4BAC967CD7C6D454F7801 /* Pods.release.xcconfig */ = {isa = PBXFileReference; includeInIndex = 1; lastKnownFileType = text.xcconfig; name = Pods.release.xcconfig; path = "../Pods/Target Support Files/Pods/Pods.release.xcconfig"; sourceTree = "<group>"; };
A722B802190A594E007DF168 /* FlowSample.app */ = {isa = PBXFileReference; explicitFileType = wrapper.application; includeInIndex = 0; path = FlowSample.app; sourceTree = BUILT_PRODUCTS_DIR; };
A722B805190A594E007DF168 /* Foundation.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = Foundation.framework; path = System/Library/Frameworks/Foundation.framework; sourceTree = SDKROOT; };
A722B807190A594E007DF168 /* CoreGraphics.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = CoreGraphics.framework; path = System/Library/Frameworks/CoreGraphics.framework; sourceTree = SDKROOT; };
A722B809190A594E007DF168 /* UIKit.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = UIKit.framework; path = System/Library/Frameworks/UIKit.framework; sourceTree = SDKROOT; };
A722B80D190A594E007DF168 /* FlowSample-Info.plist */ = {isa = PBXFileReference; lastKnownFileType = text.plist.xml; path = "FlowSample-Info.plist"; sourceTree = "<group>"; };
A722B80F190A594E007DF168 /* en */ = {isa = PBXFileReference; lastKnownFileType = text.plist.strings; name = en; path = en.lproj/InfoPlist.strings; sourceTree = "<group>"; };
A722B811190A594E007DF168 /* main.m */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.objc; path = main.m; sourceTree = "<group>"; };
A722B813190A594E007DF168 /* FlowSample-Prefix.pch */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; path = "FlowSample-Prefix.pch"; sourceTree = "<group>"; };
A722B814190A594E007DF168 /* FLWAppDelegate.h */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.h; path = FLWAppDelegate.h; sourceTree = "<group>"; };
A722B815190A594E007DF168 /* FLWAppDelegate.m */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.objc; path = FLWAppDelegate.m; sourceTree = "<group>"; };
A722B817190A594E007DF168 /* Images.xcassets */ = {isa = PBXFileReference; lastKnownFileType = folder.assetcatalog; path = Images.xcassets; sourceTree = "<group>"; };
A722B81D190A594E007DF168 /* FlowSampleTests.xctest */ = {isa = PBXFileReference; explicitFileType = wrapper.cfbundle; includeInIndex = 0; path = FlowSampleTests.xctest; sourceTree = BUILT_PRODUCTS_DIR; };
A722B81E190A594E007DF168 /* XCTest.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = XCTest.framework; path = Library/Frameworks/XCTest.framework; sourceTree = DEVELOPER_DIR; };
A722B826190A594E007DF168 /* FlowSampleTests-Info.plist */ = {isa = PBXFileReference; lastKnownFileType = text.plist.xml; path = "FlowSampleTests-Info.plist"; sourceTree = "<group>"; };
A722B828190A594E007DF168 /* en */ = {isa = PBXFileReference; lastKnownFileType = text.plist.strings; name = en; path = en.lproj/InfoPlist.strings; sourceTree = "<group>"; };
A722B82A190A594E007DF168 /* FlowSampleTests.m */ = {isa = PBXFileReference; lastKnownFileType = sourcecode.c.objc; path = FlowSampleTests.m; sourceTree = "<group>"; };
A722B86C190A59EE007DF168 /* FLWMainViewController.h */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.h; path = FLWMainViewController.h; sourceTree = "<group>"; };
A722B86D190A59EE007DF168 /* FLWMainViewController.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = FLWMainViewController.m; sourceTree = "<group>"; };
A722B86F190A5FE8007DF168 /* Hacks.m */ = {isa = PBXFileReference; fileEncoding = 4; lastKnownFileType = sourcecode.c.objc; path = Hacks.m; sourceTree = "<group>"; };
A722B87A190A655B007DF168 /* AVFoundation.framework */ = {isa = PBXFileReference; lastKnownFileType = wrapper.framework; name = AVFoundation.framework; path = System/Library/Frameworks/AVFoundation.framework; sourceTree = SDKROOT; };
/* End PBXFileReference section */
/* Begin PBXFrameworksBuildPhase section */
A722B7FF190A594E007DF168 /* Frameworks */ = {
isa = PBXFrameworksBuildPhase;
buildActionMask = 2147483647;
files = (
A722B87B190A655B007DF168 /* AVFoundation.framework in Frameworks */,
A722B808190A594E007DF168 /* CoreGraphics.framework in Frameworks */,
A722B80A190A594E007DF168 /* UIKit.framework in Frameworks */,
A722B806190A594E007DF168 /* Foundation.framework in Frameworks */,
269375577B805EC0C5D040D4 /* Pods.framework in Frameworks */,
);
runOnlyForDeploymentPostprocessing = 0;
};
A722B81A190A594E007DF168 /* Frameworks */ = {
isa = PBXFrameworksBuildPhase;
buildActionMask = 2147483647;
files = (
A722B81F190A594E007DF168 /* XCTest.framework in Frameworks */,
A722B821190A594E007DF168 /* UIKit.framework in Frameworks */,
A722B820190A594E007DF168 /* Foundation.framework in Frameworks */,
);
runOnlyForDeploymentPostprocessing = 0;
};
/* End PBXFrameworksBuildPhase section */
/* Begin PBXGroup section */
7E69C955A2952BDF8E05D1D6 /* Pods */ = {
isa = PBXGroup;
children = (
69F7147AAB3AAD50F920D9B4 /* Pods.debug.xcconfig */,
90C4BAC967CD7C6D454F7801 /* Pods.release.xcconfig */,
);
name = Pods;
sourceTree = "<group>";
};
A722B7F9190A594E007DF168 = {
isa = PBXGroup;
children = (
A722B80B190A594E007DF168 /* FlowSample */,
A722B824190A594E007DF168 /* FlowSampleTests */,
A722B804190A594E007DF168 /* Frameworks */,
A722B803190A594E007DF168 /* Products */,
7E69C955A2952BDF8E05D1D6 /* Pods */,
);
sourceTree = "<group>";
};
A722B803190A594E007DF168 /* Products */ = {
isa = PBXGroup;
children = (
A722B802190A594E007DF168 /* FlowSample.app */,
A722B81D190A594E007DF168 /* FlowSampleTests.xctest */,
);
name = Products;
sourceTree = "<group>";
};
A722B804190A594E007DF168 /* Frameworks */ = {
isa = PBXGroup;
children = (
A722B87A190A655B007DF168 /* AVFoundation.framework */,
A722B805190A594E007DF168 /* Foundation.framework */,
A722B807190A594E007DF168 /* CoreGraphics.framework */,
A722B809190A594E007DF168 /* UIKit.framework */,
A722B81E190A594E007DF168 /* XCTest.framework */,
49D5A836ADA56609D6D95912 /* Pods.framework */,
);
name = Frameworks;
sourceTree = "<group>";
};
A722B80B190A594E007DF168 /* FlowSample */ = {
isa = PBXGroup;
children = (
A722B86F190A5FE8007DF168 /* Hacks.m */,
A722B86C190A59EE007DF168 /* FLWMainViewController.h */,
A722B86D190A59EE007DF168 /* FLWMainViewController.m */,
A722B814190A594E007DF168 /* FLWAppDelegate.h */,
A722B815190A594E007DF168 /* FLWAppDelegate.m */,
A722B817190A594E007DF168 /* Images.xcassets */,
A722B80C190A594E007DF168 /* Supporting Files */,
);
path = FlowSample;
sourceTree = "<group>";
};
A722B80C190A594E007DF168 /* Supporting Files */ = {
isa = PBXGroup;
children = (
A722B80D190A594E007DF168 /* FlowSample-Info.plist */,
A722B80E190A594E007DF168 /* InfoPlist.strings */,
A722B811190A594E007DF168 /* main.m */,
A722B813190A594E007DF168 /* FlowSample-Prefix.pch */,
);
name = "Supporting Files";
sourceTree = "<group>";
};
A722B824190A594E007DF168 /* FlowSampleTests */ = {
isa = PBXGroup;
children = (
A722B82A190A594E007DF168 /* FlowSampleTests.m */,
A722B825190A594E007DF168 /* Supporting Files */,
);
path = FlowSampleTests;
sourceTree = "<group>";
};
A722B825190A594E007DF168 /* Supporting Files */ = {
isa = PBXGroup;
children = (
A722B826190A594E007DF168 /* FlowSampleTests-Info.plist */,
A722B827190A594E007DF168 /* InfoPlist.strings */,
);
name = "Supporting Files";
sourceTree = "<group>";
};
/* End PBXGroup section */
/* Begin PBXNativeTarget section */
A722B801190A594E007DF168 /* FlowSample */ = {
isa = PBXNativeTarget;
buildConfigurationList = A722B82E190A594E007DF168 /* Build configuration list for PBXNativeTarget "FlowSample" */;
buildPhases = (
E65114E5E1B5D7920DC6D305 /* Check Pods Manifest.lock */,
A722B7FE190A594E007DF168 /* Sources */,
A722B7FF190A594E007DF168 /* Frameworks */,
A722B800190A594E007DF168 /* Resources */,
7881014CA02135A10D0FF77E /* Embed Pods Frameworks */,
2773F6AE86C148B3FAE9C0B6 /* Copy Pods Resources */,
);
buildRules = (
);
dependencies = (
);
name = FlowSample;
productName = FlowSample;
productReference = A722B802190A594E007DF168 /* FlowSample.app */;
productType = "com.apple.product-type.application";
};
A722B81C190A594E007DF168 /* FlowSampleTests */ = {
isa = PBXNativeTarget;
buildConfigurationList = A722B831190A594E007DF168 /* Build configuration list for PBXNativeTarget "FlowSampleTests" */;
buildPhases = (
A722B819190A594E007DF168 /* Sources */,
A722B81A190A594E007DF168 /* Frameworks */,
A722B81B190A594E007DF168 /* Resources */,
);
buildRules = (
);
dependencies = (
A722B823190A594E007DF168 /* PBXTargetDependency */,
);
name = FlowSampleTests;
productName = FlowSampleTests;
productReference = A722B81D190A594E007DF168 /* FlowSampleTests.xctest */;
productType = "com.apple.product-type.bundle.unit-test";
};
/* End PBXNativeTarget section */
/* Begin PBXProject section */
A722B7FA190A594E007DF168 /* Project object */ = {
isa = PBXProject;
attributes = {
CLASSPREFIX = FLW;
LastUpgradeCheck = 0510;
ORGANIZATIONNAME = "Sparrow-Labs";
TargetAttributes = {
A722B81C190A594E007DF168 = {
TestTargetID = A722B801190A594E007DF168;
};
};
};
buildConfigurationList = A722B7FD190A594E007DF168 /* Build configuration list for PBXProject "FlowSample" */;
compatibilityVersion = "Xcode 3.2";
developmentRegion = English;
hasScannedForEncodings = 0;
knownRegions = (
en,
);
mainGroup = A722B7F9190A594E007DF168;
productRefGroup = A722B803190A594E007DF168 /* Products */;
projectDirPath = "";
projectRoot = "";
targets = (
A722B801190A594E007DF168 /* FlowSample */,
A722B81C190A594E007DF168 /* FlowSampleTests */,
);
};
/* End PBXProject section */
/* Begin PBXResourcesBuildPhase section */
A722B800190A594E007DF168 /* Resources */ = {
isa = PBXResourcesBuildPhase;
buildActionMask = 2147483647;
files = (
A722B810190A594E007DF168 /* InfoPlist.strings in Resources */,
A722B818190A594E007DF168 /* Images.xcassets in Resources */,
);
runOnlyForDeploymentPostprocessing = 0;
};
A722B81B190A594E007DF168 /* Resources */ = {
isa = PBXResourcesBuildPhase;
buildActionMask = 2147483647;
files = (
A722B829190A594E007DF168 /* InfoPlist.strings in Resources */,
);
runOnlyForDeploymentPostprocessing = 0;
};
/* End PBXResourcesBuildPhase section */
/* Begin PBXShellScriptBuildPhase section */
2773F6AE86C148B3FAE9C0B6 /* Copy Pods Resources */ = {
isa = PBXShellScriptBuildPhase;
buildActionMask = 2147483647;
files = (
);
inputPaths = (
);
name = "Copy Pods Resources";
outputPaths = (
);
runOnlyForDeploymentPostprocessing = 0;
shellPath = /bin/sh;
shellScript = "\"${SRCROOT}/../Pods/Target Support Files/Pods/Pods-resources.sh\"\n";
showEnvVarsInLog = 0;
};
7881014CA02135A10D0FF77E /* Embed Pods Frameworks */ = {
isa = PBXShellScriptBuildPhase;
buildActionMask = 2147483647;
files = (
);
inputPaths = (
);
name = "Embed Pods Frameworks";
outputPaths = (
);
runOnlyForDeploymentPostprocessing = 0;
shellPath = /bin/sh;
shellScript = "\"${SRCROOT}/../Pods/Target Support Files/Pods/Pods-frameworks.sh\"\n";
showEnvVarsInLog = 0;
};
E65114E5E1B5D7920DC6D305 /* Check Pods Manifest.lock */ = {
isa = PBXShellScriptBuildPhase;
buildActionMask = 2147483647;
files = (
);
inputPaths = (
);
name = "Check Pods Manifest.lock";
outputPaths = (
);
runOnlyForDeploymentPostprocessing = 0;
shellPath = /bin/sh;
shellScript = "diff \"${PODS_ROOT}/../Podfile.lock\" \"${PODS_ROOT}/Manifest.lock\" > /dev/null\nif [[ $? != 0 ]] ; then\n cat << EOM\nerror: The sandbox is not in sync with the Podfile.lock. Run 'pod install' or update your CocoaPods installation.\nEOM\n exit 1\nfi\n";
showEnvVarsInLog = 0;
};
/* End PBXShellScriptBuildPhase section */
/* Begin PBXSourcesBuildPhase section */
A722B7FE190A594E007DF168 /* Sources */ = {
isa = PBXSourcesBuildPhase;
buildActionMask = 2147483647;
files = (
A722B870190A5FE8007DF168 /* Hacks.m in Sources */,
A722B86E190A59EE007DF168 /* FLWMainViewController.m in Sources */,
A722B816190A594E007DF168 /* FLWAppDelegate.m in Sources */,
A722B812190A594E007DF168 /* main.m in Sources */,
);
runOnlyForDeploymentPostprocessing = 0;
};
A722B819190A594E007DF168 /* Sources */ = {
isa = PBXSourcesBuildPhase;
buildActionMask = 2147483647;
files = (
A722B82B190A594E007DF168 /* FlowSampleTests.m in Sources */,
);
runOnlyForDeploymentPostprocessing = 0;
};
/* End PBXSourcesBuildPhase section */
/* Begin PBXTargetDependency section */
A722B823190A594E007DF168 /* PBXTargetDependency */ = {
isa = PBXTargetDependency;
target = A722B801190A594E007DF168 /* FlowSample */;
targetProxy = A722B822190A594E007DF168 /* PBXContainerItemProxy */;
};
/* End PBXTargetDependency section */
/* Begin PBXVariantGroup section */
A722B80E190A594E007DF168 /* InfoPlist.strings */ = {
isa = PBXVariantGroup;
children = (
A722B80F190A594E007DF168 /* en */,
);
name = InfoPlist.strings;
sourceTree = "<group>";
};
A722B827190A594E007DF168 /* InfoPlist.strings */ = {
isa = PBXVariantGroup;
children = (
A722B828190A594E007DF168 /* en */,
);
name = InfoPlist.strings;
sourceTree = "<group>";
};
/* End PBXVariantGroup section */
/* Begin XCBuildConfiguration section */
A722B82C190A594E007DF168 /* Debug */ = {
isa = XCBuildConfiguration;
buildSettings = {
ALWAYS_SEARCH_USER_PATHS = NO;
CLANG_CXX_LANGUAGE_STANDARD = "gnu++0x";
CLANG_CXX_LIBRARY = "libc++";
CLANG_ENABLE_MODULES = YES;
CLANG_ENABLE_OBJC_ARC = YES;
CLANG_WARN_BOOL_CONVERSION = YES;
CLANG_WARN_CONSTANT_CONVERSION = YES;
CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES_ERROR;
CLANG_WARN_EMPTY_BODY = YES;
CLANG_WARN_ENUM_CONVERSION = YES;
CLANG_WARN_INT_CONVERSION = YES;
CLANG_WARN_OBJC_ROOT_CLASS = YES_ERROR;
CLANG_WARN__DUPLICATE_METHOD_MATCH = YES;
"CODE_SIGN_IDENTITY[sdk=iphoneos*]" = "iPhone Developer";
COPY_PHASE_STRIP = NO;
GCC_C_LANGUAGE_STANDARD = gnu99;
GCC_DYNAMIC_NO_PIC = NO;
GCC_OPTIMIZATION_LEVEL = 0;
GCC_PREPROCESSOR_DEFINITIONS = (
"DEBUG=1",
"$(inherited)",
);
GCC_SYMBOLS_PRIVATE_EXTERN = NO;
GCC_WARN_64_TO_32_BIT_CONVERSION = YES;
GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR;
GCC_WARN_UNDECLARED_SELECTOR = YES;
GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE;
GCC_WARN_UNUSED_FUNCTION = YES;
GCC_WARN_UNUSED_VARIABLE = YES;
IPHONEOS_DEPLOYMENT_TARGET = 8.0;
ONLY_ACTIVE_ARCH = YES;
OTHER_LDFLAGS = (
"-Objc",
"-all_load",
);
SDKROOT = iphoneos;
TARGETED_DEVICE_FAMILY = "1,2";
};
name = Debug;
};
A722B82D190A594E007DF168 /* Release */ = {
isa = XCBuildConfiguration;
buildSettings = {
ALWAYS_SEARCH_USER_PATHS = NO;
CLANG_CXX_LANGUAGE_STANDARD = "gnu++0x";
CLANG_CXX_LIBRARY = "libc++";
CLANG_ENABLE_MODULES = YES;
CLANG_ENABLE_OBJC_ARC = YES;
CLANG_WARN_BOOL_CONVERSION = YES;
CLANG_WARN_CONSTANT_CONVERSION = YES;
CLANG_WARN_DIRECT_OBJC_ISA_USAGE = YES_ERROR;
CLANG_WARN_EMPTY_BODY = YES;
CLANG_WARN_ENUM_CONVERSION = YES;
CLANG_WARN_INT_CONVERSION = YES;
CLANG_WARN_OBJC_ROOT_CLASS = YES_ERROR;
CLANG_WARN__DUPLICATE_METHOD_MATCH = YES;
"CODE_SIGN_IDENTITY[sdk=iphoneos*]" = "iPhone Developer";
COPY_PHASE_STRIP = YES;
ENABLE_NS_ASSERTIONS = NO;
GCC_C_LANGUAGE_STANDARD = gnu99;
GCC_WARN_64_TO_32_BIT_CONVERSION = YES;
GCC_WARN_ABOUT_RETURN_TYPE = YES_ERROR;
GCC_WARN_UNDECLARED_SELECTOR = YES;
GCC_WARN_UNINITIALIZED_AUTOS = YES_AGGRESSIVE;
GCC_WARN_UNUSED_FUNCTION = YES;
GCC_WARN_UNUSED_VARIABLE = YES;
IPHONEOS_DEPLOYMENT_TARGET = 8.0;
OTHER_LDFLAGS = (
"-Objc",
"-all_load",
);
SDKROOT = iphoneos;
TARGETED_DEVICE_FAMILY = "1,2";
VALIDATE_PRODUCT = YES;
};
name = Release;
};
A722B82F190A594E007DF168 /* Debug */ = {
isa = XCBuildConfiguration;
baseConfigurationReference = 69F7147AAB3AAD50F920D9B4 /* Pods.debug.xcconfig */;
buildSettings = {
ASSETCATALOG_COMPILER_APPICON_NAME = AppIcon;
ASSETCATALOG_COMPILER_LAUNCHIMAGE_NAME = LaunchImage;
GCC_PRECOMPILE_PREFIX_HEADER = YES;
GCC_PREFIX_HEADER = "FlowSample/FlowSample-Prefix.pch";
INFOPLIST_FILE = "FlowSample/FlowSample-Info.plist";
PRODUCT_NAME = "$(TARGET_NAME)";
WRAPPER_EXTENSION = app;
};
name = Debug;
};
A722B830190A594E007DF168 /* Release */ = {
isa = XCBuildConfiguration;
baseConfigurationReference = 90C4BAC967CD7C6D454F7801 /* Pods.release.xcconfig */;
buildSettings = {
ASSETCATALOG_COMPILER_APPICON_NAME = AppIcon;
ASSETCATALOG_COMPILER_LAUNCHIMAGE_NAME = LaunchImage;
GCC_PRECOMPILE_PREFIX_HEADER = YES;
GCC_PREFIX_HEADER = "FlowSample/FlowSample-Prefix.pch";
INFOPLIST_FILE = "FlowSample/FlowSample-Info.plist";
PRODUCT_NAME = "$(TARGET_NAME)";
WRAPPER_EXTENSION = app;
};
name = Release;
};
A722B832190A594E007DF168 /* Debug */ = {
isa = XCBuildConfiguration;
buildSettings = {
BUNDLE_LOADER = "$(BUILT_PRODUCTS_DIR)/FlowSample.app/FlowSample";
FRAMEWORK_SEARCH_PATHS = (
"$(SDKROOT)/Developer/Library/Frameworks",
"$(inherited)",
"$(DEVELOPER_FRAMEWORKS_DIR)",
);
GCC_PRECOMPILE_PREFIX_HEADER = YES;
GCC_PREFIX_HEADER = "FlowSample/FlowSample-Prefix.pch";
GCC_PREPROCESSOR_DEFINITIONS = (
"DEBUG=1",
"$(inherited)",
);
INFOPLIST_FILE = "FlowSampleTests/FlowSampleTests-Info.plist";
PRODUCT_NAME = "$(TARGET_NAME)";
TEST_HOST = "$(BUNDLE_LOADER)";
WRAPPER_EXTENSION = xctest;
};
name = Debug;
};
A722B833190A594E007DF168 /* Release */ = {
isa = XCBuildConfiguration;
buildSettings = {
BUNDLE_LOADER = "$(BUILT_PRODUCTS_DIR)/FlowSample.app/FlowSample";
FRAMEWORK_SEARCH_PATHS = (
"$(SDKROOT)/Developer/Library/Frameworks",
"$(inherited)",
"$(DEVELOPER_FRAMEWORKS_DIR)",
);
GCC_PRECOMPILE_PREFIX_HEADER = YES;
GCC_PREFIX_HEADER = "FlowSample/FlowSample-Prefix.pch";
INFOPLIST_FILE = "FlowSampleTests/FlowSampleTests-Info.plist";
PRODUCT_NAME = "$(TARGET_NAME)";
TEST_HOST = "$(BUNDLE_LOADER)";
WRAPPER_EXTENSION = xctest;
};
name = Release;
};
/* End XCBuildConfiguration section */
/* Begin XCConfigurationList section */
A722B7FD190A594E007DF168 /* Build configuration list for PBXProject "FlowSample" */ = {
isa = XCConfigurationList;
buildConfigurations = (
A722B82C190A594E007DF168 /* Debug */,
A722B82D190A594E007DF168 /* Release */,
);
defaultConfigurationIsVisible = 0;
defaultConfigurationName = Release;
};
A722B82E190A594E007DF168 /* Build configuration list for PBXNativeTarget "FlowSample" */ = {
isa = XCConfigurationList;
buildConfigurations = (
A722B82F190A594E007DF168 /* Debug */,
A722B830190A594E007DF168 /* Release */,
);
defaultConfigurationIsVisible = 0;
defaultConfigurationName = Release;
};
A722B831190A594E007DF168 /* Build configuration list for PBXNativeTarget "FlowSampleTests" */ = {
isa = XCConfigurationList;
buildConfigurations = (
A722B832190A594E007DF168 /* Debug */,
A722B833190A594E007DF168 /* Release */,
);
defaultConfigurationIsVisible = 0;
defaultConfigurationName = Release;
};
/* End XCConfigurationList section */
};
rootObject = A722B7FA190A594E007DF168 /* Project object */;
}
|
Exploring writing with & for writers and readers.
Video Games – Vintage vs. Modern
On October 29, 2017, I went to a special theatrical showing of a movie — 1986’s Little Shop of Horrors — I hadn’t seen on the big screen since I was a child. I thought seeing the film in this format would be a nice trip down memory lane. I wasn’t disappointed, even though it was a version of Little Shop of Horrors with an alternate ending in which the plant lives. There was something magical about seeing the actors’ performances and stellar musical numbers, such as “Skid Row” and “Suddenly Seymour,” in the theater again after thirty years.
What I wasn’t expecting was to find inspiration for a video game blog. But seeing a preview documentary prior to the movie about the film-making process of Little Shop of Horrors got my creative juices flowing. The film-maker’s talk about all the practical effects, as opposed to the digital effects of today, that went into the film raised an interesting question for me.
Have films — or video games for that matter — lost some of their magic because it takes less work to generate the effects for them?
I know it takes time to put together computer-generated imagery for today’s films or video games. But I feel there is less room for imagination on the movie\game designer’s part. Technology — specifically digital technology — has gotten so advanced that there seems to be no limit to what can be created for movie-going audiences or gaming enthusiasts. There have been times as of late where I’ve felt like some video games — not to mention films — have gotten too overblown and flashy because of the “sky’s the limit” mentality adopted by the production crews or studio execs.
In my opinion, what made the video games of the 1990s and early 2000s so much better was that there was a greater emphasis on story-telling and practical effects. I know of many game production companies from that time period that hired and filmed live actors for inclusion in a particular title, such as Command and Conquer: Tiberian Sun. I feel there was more creativity when it came to designing environments, creatures, and vehicles until digital technology became more prevalent. I’ve seen too many game designers nowadays re-use or modernize concepts of what came before rather than take time to come up with something new and innovative. The Dead Space trilogy would be a good example — all three of the main games in the series might as well be the same since there’s not much variation in the story, gameplay, or creature design.
That’s not to say that I don’t enjoy playing modern games. But it would be nice to see a resurgence of the production practices of yesteryear. |
RStudio Blog, and kindly contributed to Want to share your content on R-bloggers? [This article was first published on, and kindly contributed to R-bloggers ]. (You can report issue about the content on this page here Want to share your content on R-bloggers? click here if you have a blog, or here if you don't.
The final version of RStudio v0.95 is now available for download from our website (thanks to everyone who put the preview release through its paces over the last couple of weeks!). Highlights of the new release include:
Projects — A new system for managing R projects that enables easy switching between working directories and per-project contexts for source documents, workspaces, and history.
— A new system for managing R projects that enables easy switching between working directories and per-project contexts for source documents, workspaces, and history. Code Navigation — Typeahead navigation by file or function name (Ctrl+.) and the ability to navigate directly to the definition of any function (F2 or Ctrl+Click).
— Typeahead navigation by file or function name (Ctrl+.) and the ability to navigate directly to the definition of any function (F2 or Ctrl+Click). Version Control — Integrated support for Git and Subversion, including changelist management, diffing/staging, and project history.
Quite a bit has been added to RStudio since the initial v0.92 release a year ago. We’ve put together a new screencast that includes a quick tour of the product and also highlights some of the new features in v0.95:
There is also an interview with RStudio founder JJ Allaire over on DecisionStats that has a more in-depth discussion of the release and the RStudio project in general.
The evolution of RStudio is a direct result of the many in-depth conversations we’ve had with users at meetups, conferences, and on our support forum. We realize that there’s plenty more to do and hope we can keep up with all of the great feedback! In that spirit we hope to see lots of folks this Thursday night at the Chicago RUG meetup as well as in February in Houston and Los Angeles. |
Stam JM, Kos M, Dicke M, Poelman EH. Cross‐seasonal legacy effects of arthropod community on plant fitness in perennial plants. J Ecol. 2019;107:2451--2463. 10.1111/1365-2745.13231
1. INTRODUCTION {#jec13231-sec-0001}
===============
Although the presence of species or interactions among species in ecological communities may be brief, the effect of their presence or their interaction may be traced back over a much longer time course after the initial species or interaction has passed. Such legacy effects can have important consequences for later species interactions and community dynamics (Kostenko, Voorde, Mulder, Putten, & Bezemer, [2012](#jec13231-bib-0025){ref-type="ref"}; Ohgushi, [2016](#jec13231-bib-0034){ref-type="ref"}; Utsumi, Ando, & Miki, [2010](#jec13231-bib-0050){ref-type="ref"}; Wurst & Ohgushi, [2015](#jec13231-bib-0057){ref-type="ref"}). Long after they have left, individual species may have prominent influences on community organization when they have a long‐term effect on the phenotype of a basal resource that structures communities (Wurst & Ohgushi, [2015](#jec13231-bib-0057){ref-type="ref"}). For example, root exudates from a plant can influence the soil microbiome and subsequent succession of plant communities (De Deyn, Raaijmakers, & van der Putten, [2004](#jec13231-bib-0006){ref-type="ref"}; van der Putten, [2003](#jec13231-bib-0051){ref-type="ref"}). Earthworms may alter soil nutrient composition and favour late successional plant species in establishing in plant communities (Mudrák & Frouz, [2018](#jec13231-bib-0031){ref-type="ref"}), whereas the soil biome may also stabilize legacies in vegetation composition caused by herbivore feeding (Egelkraut, Kardol, De Long, & Olofsson, [2018](#jec13231-bib-0009){ref-type="ref"}). The legacy of species interactions may be extensive when the effects cascade across trophic levels. The legacy of plant‐soil feedback may not only affect plant community composition, but also plant trait composition such as resistance to insect herbivores (Heinen, Sluijs, Biere, Harvey, & Bezemer, [2018](#jec13231-bib-0020){ref-type="ref"}) and the legacy of herbivory on plant community composition may affect the composition of insect and bird species over a period of decades (Nuttle, Yerger, Stoleson, & Ristau, [2011](#jec13231-bib-0032){ref-type="ref"}).
In plant--insect communities, legacies of species interactions are well‐characterized for species assemblies within a single season (Hernandez‐Cumplido, Glauser, & Benrey, [2016](#jec13231-bib-0021){ref-type="ref"}; Poelman, van Loon, van Dam, Vet, & Dicke, [2010](#jec13231-bib-0039){ref-type="ref"}; Wurst & Ohgushi, [2015](#jec13231-bib-0057){ref-type="ref"}; van Zandt & Agrawal, [2004](#jec13231-bib-0052){ref-type="ref"}). Presumably to reduce costs of defence in the absence of herbivores, many plant species only invest in enhanced levels of defence in response to actual herbivore attack (Karban, [2011](#jec13231-bib-0022){ref-type="ref"}; Mithöfer & Boland, [2012](#jec13231-bib-0030){ref-type="ref"}; Stam et al., [2014](#jec13231-bib-0046){ref-type="ref"}). These induced plant responses provide plants with enhanced resistance to the current attacker, but at the same time the induced plant phenotype potentially affects interactions with other community members, resulting in so‐called indirect plant‐mediated species interactions (Ohgushi, [2005](#jec13231-bib-0033){ref-type="ref"}; Utsumi et al., [2010](#jec13231-bib-0050){ref-type="ref"}). Because plant responses to herbivory are often specific for the guild or even herbivore species that attacks the plant (Bidart‐Bouzat & Kliebenstein, [2011](#jec13231-bib-0003){ref-type="ref"}; de Vos et al., [2005](#jec13231-bib-0007){ref-type="ref"}), each herbivore species may differentially affect other community members (Mathur et al., [2013](#jec13231-bib-0027){ref-type="ref"}; Rodriguez‐Saona, Chalmers, Raj, & Thaler, [2005](#jec13231-bib-0040){ref-type="ref"}; Stam et al., [2014](#jec13231-bib-0046){ref-type="ref"}). Therefore, each herbivore species may have unique effects on the assembly of the community within the growing season of that plant (Poelman et al., [2010](#jec13231-bib-0039){ref-type="ref"}; Stam, Dicke, & Poelman, [2018](#jec13231-bib-0044){ref-type="ref"}; Viswanathan, Narwani, & Thaler, [2005](#jec13231-bib-0053){ref-type="ref"}; van Zandt & Agrawal, [2004](#jec13231-bib-0052){ref-type="ref"}). These legacy effects by indirect plant‐mediated species interactions have been found to also affect reproductive fitness of annual plants (McArt, Halitschke, Salminen, & Thaler, [2013](#jec13231-bib-0028){ref-type="ref"}; Rusman, Lucas‐Barbosa, & Poelman, [2018](#jec13231-bib-0041){ref-type="ref"}) and may thus be important components of plant defence trait evolution (Poelman & Kessler, [2016](#jec13231-bib-0036){ref-type="ref"}).
In contrast with annuals, perennial plants have multiple growing seasons that typically consist of a distinct vegetative growing season followed by one or multiple years during which the plants flower and reproduce. When legacies of insect--plant interactions in the vegetative season extend across years into reproductive seasons, this may have important consequences for plant fitness (Ehrlén, [2002](#jec13231-bib-0010){ref-type="ref"}; West & Louda, [2018](#jec13231-bib-0056){ref-type="ref"}; Wurst & Ohgushi, [2015](#jec13231-bib-0057){ref-type="ref"}). Although induced responses to single herbivores may have season‐long legacies on plant‐associated insect community composition (Hernandez‐Cumplido et al., [2016](#jec13231-bib-0021){ref-type="ref"}; Poelman et al., [2010](#jec13231-bib-0039){ref-type="ref"}; Viswanathan et al., [2005](#jec13231-bib-0053){ref-type="ref"}; van Zandt & Agrawal, [2004](#jec13231-bib-0052){ref-type="ref"}), little is known about how long it takes for the community legacy of induced plant responses to decay, especially in the context of multiple growing seasons of perennial herbs (Gomez, van Dijk, & Stuefer, [2010](#jec13231-bib-0013){ref-type="ref"}; Karban, [2011](#jec13231-bib-0022){ref-type="ref"}; Underwood, [1998](#jec13231-bib-0048){ref-type="ref"}, [2012](#jec13231-bib-0049){ref-type="ref"}). Several examples show that herbivore‐induced plant responses may persist throughout several growing seasons in perennial trees (Haukioja, [1990](#jec13231-bib-0017){ref-type="ref"}; Haukioja, Suomela, & Neuvonen, [1985](#jec13231-bib-0018){ref-type="ref"}; Miller‐Pierce & Preisser, [2012](#jec13231-bib-0029){ref-type="ref"}; Nuttle et al., [2011](#jec13231-bib-0032){ref-type="ref"}; Young & Okello, [1998](#jec13231-bib-0058){ref-type="ref"}). This implies that legacy effects of plant--herbivore interactions can extend beyond a single growth season. Thereby, also in temperate regions where winters may cause plant‐associated communities to re‐assemble each year, long‐lasting legacies may connect assemblies across years (Karban, [2011](#jec13231-bib-0022){ref-type="ref"}; Wurst & Ohgushi, [2015](#jec13231-bib-0057){ref-type="ref"}). It is, thus, important to know whether such long‐lasting legacies of early herbivores also exist for the insect community associated with perennial herbaceous plants, especially when effects of community composition in a vegetative year affect plant--insect interactions and plant reproduction in subsequent years (Wurst & Ohgushi, [2015](#jec13231-bib-0057){ref-type="ref"}).
Here, we studied 2‐year legacy effects of early season herbivory on arthropod community composition and the consequences for fitness of an herbaceous perennial plant. In a field experiment over two consecutive years, wild perennial *Brassica oleracea* plants were inoculated early in the season with either of two specialist insect herbivore species from different feeding guilds (aphid or caterpillar), or no herbivore (control), in a full‐factorial design across years. Arthropod community composition was monitored in the vegetative and following first reproductive season, and at the end of the second year seed set was quantified. Specifically, we addressed the following questions: (a) Does early‐season herbivory by aphids or caterpillars affect arthropod community composition and plant fitness, either within or across years? (b) Does variation in arthropod community composition as a whole cause legacy effects on community composition and plant fitness across years? and (c) Which insect species and which plant performance traits are involved in the above processes? We discuss the data in the context of insect‐plant ecology and evolution of plant defences.
2. MATERIALS AND METHODS {#jec13231-sec-0002}
========================
2.1. Field site {#jec13231-sec-0003}
---------------
Herbaceous wild perennial *B. oleracea* L. (Brassicaceae) plants, originating from Kimmeridge, Dorset, UK (50°36\'N, 2°07\'W) (Gols et al., [2008](#jec13231-bib-0012){ref-type="ref"}) were planted in a common garden in the vicinity of Wageningen University, The Netherlands. Seeds were sown in mid‐April 2012 and transplanted to peat soil cubes 11 days later. Seedlings were grown in a greenhouse until 4 w after sowing, after which they were placed outside to habituate them to field conditions. In week 21 (end of May) 2012, 72 plots of 12 plants each in a 4 × 4 square (omitting the central four plants to ensure equal plant neighbour effects) were established in the field (Stam et al., [2018](#jec13231-bib-0044){ref-type="ref"}). Within‐plot planting distance between plants was 1 m and plots were separated by a 4 m wide strip of a *Poa*/*Lolium* grass mixture. To ensure a uniform edge environment, two rows with plants of the annual *Brassica nigra* were planted at 4 m distance from the plots at the border of the field, 1 m between rows and 0.5 m between plants within rows. The seeds for these plants had been collected from wild *B. nigra* plants in the vicinity of Wageningen, the Netherlands, and were sown and treated similar to the *B. oleracea* plants as described above. Plots and edge were regularly manually weeded and grass strips were regularly mown. The plants were experimentally infested with herbivores early in the season of two subsequent years (2012 and 2013, see below) and exposed to naturally occurring arthropods during the rest of season. In the winter period (January 8--April 3 2013), plants were protected from severe freezing/dehydrating conditions by covering the whole *B. oleracea* field with a cloth (26 g/m^2^, AMEVO, the Netherlands). The *B. nigra* plants for the border were re‐sown and planted next spring, similar as described above (planting in the field in week 21, end of May 2013).
2.2. Legacy effects: Two‐year common garden experiment {#jec13231-sec-0004}
------------------------------------------------------
In order to study legacy effects of herbivore induction on community composition within and across seasons, as well as legacy effects of variation in the community as a whole across seasons, we manipulated the first herbivores arriving on the individual *B. oleracea* plants. In week 22 (end of May) of 2012, six days after the seedlings were planted, we infested all plants of the 72 plots with either five adult aphids (*Brevicoryne brassicae* L. (Hemiptera: Aphididae)) (A), three caterpillars in 2nd larval stage (*Plutella xylostella* L. (Lepidoptera: Yponomeutidae)) (C), or left plants uninfested (N). The insects were obtained from the stock rearing of Wageningen University, where they were reared on Brussels sprouts plants (*B. oleracea* var. *gemmifera* cv Cyrus) under greenhouse conditions (21 ± 1°C, 50%--70% relative humidity, 16L: 8D cycle). The two herbivore species are among the most common herbivores on *B. oleracea* and we selected an aphid and caterpillar species because they are known to induce widely different plant responses (Stam et al., [2018](#jec13231-bib-0044){ref-type="ref"}). All plants in a plot were infested with the same treatment by carefully introducing herbivores using a fine brush, yielding 24 plots for each herbivore treatment in 2012 (Table [1](#jec13231-tbl-0001){ref-type="table"}). In week 20 (mid May) of the second growth season (2013), the 24 plots that had received the same herbivore treatment in 2012 were assigned to three groups of eight plots, each receiving one of the three herbivore treatments (A, C, N). This resulted in a full factorial design of induction combinations across the two seasons and a total of nine unique treatments each replicated with eight plots (Table [1](#jec13231-tbl-0001){ref-type="table"}).
######
Early‐season herbivory treatments in two consecutive years, applied in a common‐garden field experiment on wild perennial *Brassica oleracea* plants. '**M**' indicates treatment plots that were monitored in both 2012 and 2013; the other plots were monitored in 2013 only
Early‐season herbivore year 1 (2012) Early‐season herbivore year 2 (2013) Abbreviation
-------------------------------------- -------------------------------------- --------------
Aphids *Brevicoryne brassicae* Aphids *B. brassicae* AA
Aphids *B. brassicae* Caterpillars *Plutella xylostella* AC
Aphids *B. brassicae*, **M** No early‐season herbivore AN
Caterpillars *P. xylostella* Aphids *B. brassicae* CA
Caterpillars *P. xylostella* Caterpillars *P. xylostella* CC
Caterpillars *P. xylostella*, **M** No early‐season herbivore CN
No early‐season herbivore Aphids *B. brassicae* NA
No early‐season herbivore Caterpillars *P. xylostella* NC
No early‐season herbivore, **M** No early‐season herbivore NN
John Wiley & Sons, Ltd
In 2012, we monitored eight plots of each of the three herbivore treatments (A, C, N). We had to restrict the number of observations in this year to allow for intensive monitoring of the within‐year effects of early season herbivory. We assumed that the subset of eight replicate plots within a treatment was representative for the full 24 replicates of early‐season herbivory treatments that were prepared in the first year to allow for the full factorial design of treatment interactions across years. In 2012, we collected data over 12 time points during the season on a weekly basis by repeatedly monitoring the same four plants of a plot for their arthropod community.
In 2013, the 72 plots representing all nine treatments were monitored to focus on across‐year effects of individual herbivore treatments as well as legacy effects of community composition across years. We selected four plants per plot that showed flower buds in week 20 (non‐flowering plants were excluded from monitoring) for monitoring of the arthropod community. Because a larger number of plots and thus plants was monitored in 2013 and plants were much larger than in 2012, the community on these plants could be monitored two times: during early season (week 21--25) and mid/late season (week 25--33). Within each of the two time periods, plots with different treatments were monitored in a random order to minimize time‐effects on in treatment comparisons. Since we covered the same weeks of monitoring in both years, we could asses presence and abundance of herbivores and predators across the full season for each treatment in both years despite the necessary compromise on sampling intensity in 2013.
Monitoring plants for arthropods in both years occurred through visually screening for all life stages of all living insects and other invertebrates such as spiders and slugs (because the community is arthropod dominated it is here collectively referred to as 'arthropod community') on the upper‐ and lower parts of each leaf and flower. Both herbivores and carnivores (predators plus parasitoids) were recorded. However, fast‐flying insects, such as adult parasitoids, butterflies and pollinators were not recorded as their presence could not be accurately assigned to a single plant. Parasitized aphids ('mummies') were identified as aphid parasitoids; parasitoids of caterpillars were identified by their cocoons once emerged from their caterpillar host in the field. The number of individuals per species was recorded per plant, taking all life stages together. See Table [S1](#jec13231-sup-0001){ref-type="supplementary-material"} for a list of observed arthropod species. To test which plant performance parameters corresponded with insect community assembly, we also recorded plant total height and number of leaves in both years at the same moments when plants were monitored for arthropods (12 times in 2012 and two times in 2013). In addition, in the reproductive season (2013) the number of flower racemes (unbranched stalks bearing flowers) was recorded. During the winter period between the 2 years (October 2012--March 2013), a few randomly selected plants in the field were screened for the presence of arthropods, but none were found.
2.3. Seed harvest {#jec13231-sec-0005}
-----------------
To test whether either early‐season herbivory treatments or total arthropod community composition exerted legacy effects on plant fitness, seeds of all monitored plants were harvested. Seeds formed during the first plant reproductive season (2013) were collected after the second period of monitoring, from week 34 to the beginning of week 39. Racemes with dry seed pods were cut and placed in a paper bag per plant. A cloth underneath the plant collected seeds falling during the harvesting process. Seeds were separated from remaining plant material and the full seed yield per plant was weighed. The number of seeds per plant was computed by dividing the total weight of the seed batch by the weight of 100 seeds of the same plant, and multiplied by 100.
2.4. Statistical analyses {#jec13231-sec-0006}
-------------------------
### 2.4.1. Early‐season herbivory effects on community composition {#jec13231-sec-0007}
We first tested the effects of early‐season herbivory treatments (aphids, caterpillars or none) on the herbivore or carnivore community composition within and across years on plot level, averaging the abundance of each species over the four plants per plot. For the first year (2012), abundance of each species was cumulated over all 12 monitored time points to obtain the community composition over the whole season for each plot. Only the 24 plots that were monitored that year were used for this ('M', Table [1](#jec13231-tbl-0001){ref-type="table"}). For the second year (2013), abundance of each species was similarly cumulated over the two time periods, and all 72 plots were used (Table [1](#jec13231-tbl-0001){ref-type="table"}), except for plots in which all plants had died over winter (*n* = 4). Redundancy analyses (RDAs) were used to test the effects of the early‐season herbivory treatment applied to a plot (aphid, caterpillar or none) in the first or second year, on the community composition per plot (cumulated species abundance) in the first or second year. Tests were performed with a Monte Carlo permutation test with 499 unrestricted permutations. A linear method was assumed valid as the length of species data gradient was \<3 turnover (*SD*) units long (Šmilauer & Lepš, [2014](#jec13231-bib-0043){ref-type="ref"}). Species numbers were log (*y* + 0.25) transformed prior to analyses to reach best model fit. In these analyses, abundances of *P. xylostella* and *B. brassicae* were made supplementary (excluding them from ordination analysis, but projecting them afterwards in biplots) to exclude effects of herbivores that were directly manipulated by our treatments.
### 2.4.2. Early‐season herbivory effects on plant fitness {#jec13231-sec-0008}
First, to test the plant fitness effects of the early‐season herbivory treatments applied in the first and second as well as the interaction between both years, the number of seeds per individual plant were analysed by two‐way ANOVA. Second, to assess in more detail which combinations of induction treatments in the first and second year specifically affected plant fitness, we conducted a one‐way ANOVA on all nine treatment combinations (Table [1](#jec13231-tbl-0001){ref-type="table"}). Third, we grouped treatments that had the same herbivore inoculation (aphid, caterpillar or none) in the first year, or the same herbivore inoculation in the second year to test whether first or last herbivore treatments were more predictive for plant fitness (Table [1](#jec13231-tbl-0001){ref-type="table"}). On each of these six groups we conducted a one‐way ANOVA, followed by an LSD post‐hoc test if effects were significant. For all tests, seed set of individual plants from all monitored plots in 2012 and 2013 were used (Table [1](#jec13231-tbl-0001){ref-type="table"}), except for plants that had died before they produced seeds (*n* = 52 of 288 monitored plants). Number of seeds per plant was double square‐root transformed to meet assumptions of normal distribution and homogeneity. ANOVA tests were carried out in SPSS Statistics for Windows, Version 22.0.0.1 (Armonk, NY, USA; IBM corp.).
### 2.4.3. Community legacy effects within and across years: Structural equation model {#jec13231-sec-0009}
To relate early season herbivory treatments, herbivore and carnivore community composition in either year to seed set of the perennial plants, we used structural equation modelling (SEM). SEM was used to address two questions: (a) whether early season herbivory treatments affected community ordination and plant fitness within and across two seasons, and (b) whether variation in the composition of the herbivore and carnivore community affected community composition and plant fitness within and across years.
To obtain one value per plot for each of the variables, arthropod community composition was represented by ordination scores of field plots on the first axis of a Principal Component Analysis (PCA; see [Supporting Information](#jec13231-sup-0001){ref-type="supplementary-material"} for additional note). For PCAs, herbivore and carnivore community data in 2012 and 2013 were similarly prepared as described above for RDAs, except that for all variables, only the 24 plots were used that were monitored for community composition in both 2012 and 2013 ('M' in Table [1](#jec13231-tbl-0001){ref-type="table"}). Two plots of which all plants had died in 2013 were excluded. Species data were log (*y* + 0.25) transformed prior to PCA, with abundance of *P. xylostella* and *B. brassicae* made supplementary. The resulting ordination score on the first principal component axis of each field plot was used as input for the SEM. Herbivory treatments per year were included as either aphid (A), caterpillar (C), or none (N) (Table [1](#jec13231-tbl-0001){ref-type="table"}). Average seed set per plot for SEM were square‐root transformed prior to analysis to meet assumptions of normality of SEM. The model best fitting the data was selected by removing non‐significant paths from the model. In SEM, the goodness of fit of the model is assessed by comparing the observed and model‐predicted covariances with a *χ* ^2^ test. The model is acceptable (there is reasonable fit between model and the data) when the *χ* ^2^ values have an associated *P* \> 0.05 (Grace, [2006](#jec13231-bib-0014){ref-type="ref"}). SEM analyses were carried out with 'sem' package in [r]{.smallcaps} (version 3.0.1, R Development Core Team 2013).
### 2.4.4. Ordination of species involved in legacy effects: Principal component analyses {#jec13231-sec-0010}
Species ordination plots were made to obtain more detailed information on which individual species were involved in legacy effects on community composition and plant fitness. For the two most interesting paths of the SEM described (see Section 3), scatterplots were made indicating which species likely occur in the same plot (e.g. long species‐arrows pointing in the same direction). First, to show the relationship of carnivore species occurrence in plots in the first and second year, two scatterplots of carnivore species in either year were made by PCA as described above, using the same data as was used for SEM input (for these original scatterplots, see Supplementary material). The two scatterplots were then overlaid, such that the carnivore species ordination of both years was depicted in one image (See [Supporting Information](#jec13231-sup-0001){ref-type="supplementary-material"} for justification of this method).
Second, to show the relationship of the herbivore species present in the first year with seed set of those plants in the following year, another PCA biplot was made depicting ordination of herbivore species in the vegetative season (2012) and seed set in the reproductive season (2013). Seed set in 2013 was a supplementary variable that did not influence species ordination. Afterwards an arrow indicating the direction of plots with increasing seed set was projected onto the herbivore species scatterplot. (The RDA biplots shown in the [Supporting Information](#jec13231-sup-0001){ref-type="supplementary-material"} for herbivore community 2012 + seed set; carnivore community 2012 + seed set; and carnivore community 2013 + seed set were similarly obtained.)
All ordination analyses (RDA, PCA) were executed with Canoco 5.04 for Windows (ter Braak & Šmilauer, [2012](#jec13231-bib-0047){ref-type="ref"}). See [Supporting Information](#jec13231-sup-0001){ref-type="supplementary-material"} for more details on interpretation of ordination plots using the biplot rule.
### 2.4.5. Plant performance traits involved in herbivore‐community legacy effect on plant fitness: Structural equation model {#jec13231-sec-0011}
We performed another SEM to investigate whether and how plant performance traits mediated first‐year herbivore community legacy effects on seed set in the second, reproductive year. Herbivore community in 2012 was represented by PCA scores similar to those in the first SEM. We used the plant traits 'height' and 'number of leaves' in both years as indicators of plant size, and 'number of flower racemes' in 2013 as indicator of the amount of reproductive tissue. For plant traits in 2012, measurements during the peak of the arthropod season (week 35; Stam et al., [2018](#jec13231-bib-0044){ref-type="ref"}) were taken as input. For plant traits in 2013 the situation was different due to a reduction of number of leaves while the plants started flowering and subsequently formed seeds as the season progressed. Therefore, in 2013 measurements when plant traits were on average at their maximum value were taken as input: early season (week 21--25) for number of leaves; mid/late season (week 25--33) for plant height and number of flower racemes. Number of leaves in 2013 was square‐root transformed to obtain normality. Similar as for the first SEM on community legacy effects, average seed set per plot in 2013 was used and data were square‐root transformed for normality.
3. RESULTS {#jec13231-sec-0012}
==========
3.1. Early‐season herbivory effects on community composition and plant fitness {#jec13231-sec-0013}
------------------------------------------------------------------------------
Early‐season herbivory treatments in the first and second season had no effect on herbivore or carnivore community composition either within the year or in the following year, although early season herbivory in the first year had a near‐significant effect on the carnivore community composition in the following year (*p* = 0.056, Table [2](#jec13231-tbl-0002){ref-type="table"}). Also, in the SEM on community legacy effects (see below, Figure [1](#jec13231-fig-0001){ref-type="fig"}), none of the paths significantly related early‐season herbivory treatments in the first year to herbivore or carnivore community in either year, nor to plant seed set.
######
Results of Redundancy Analysis (RDA) of the early season herbivory treatments (aphid, caterpillar or no herbivory) in either year on wild perennial *Brassica oleracea* plants, to the herbivore and carnivore community composition within and across years. Treatments applied early in the season in 2012 and 2013 were either *Brevicoryne brassicae* aphids, *Plutella xylostella* caterpillars or no herbivory. Percentages show the % cumulative explained variation by the first two RDA axes; *F*‐values are pseudo‐*F* values of Monte Carlo Permutation test with 499 unrestricted permutations. Degrees of freedom of the explanatory variable 'year of herbivory' was in all cases 2; *α* = 0.05
Year early herbivory Affected community \% *F* *p*
---------------------- -------------------- ------ ----- -------
2012 Herbivores 2012 6.82 0.8 0.758
2012 Carnivores 2012 8.94 1.0 0.422
2012 Herbivores 2013 2.00 0.7 0.814
2012 Carnivores 2013 6.02 2.1 0.056
2013 Herbivores 2013 3.29 1.1 0.374
2013 Carnivores 2013 1.40 0.5 0.828
John Wiley & Sons, Ltd
{#jec13231-fig-0001}
Although seed set of individual plants was not affected by the induction treatment of early‐season aphid, caterpillar or no‐herbivore feeding in either the first, vegetative year (ANOVA: *F* ~2~:0.317, *p* = 0.729), or in the following, reproductive year (ANOVA: *F* ~2~:1.068, *p* = 0.345), the interaction between herbivore treatments applied in the 2 years did significantly affect seed set (ANOVA: *F* ~4~:2.600, *p* = 0.037). Only when in the first year caterpillars had been placed on the plants, seed set of individual plants differed between treatments applied in the second year: plants sequentially induced with caterpillars in both years (CC) produced fewer seeds than plants that had received caterpillars in the first year and aphids in the next year (CA); while seed set of plants infested with caterpillars in year 1 followed by no early‐season herbivory treatment in year 2 was intermediate (CN) (Figure [2](#jec13231-fig-0002){ref-type="fig"}). Plant seed production was thus determined by an interaction of our treatment of early herbivore presence in the vegetative year and following first year of flowering, rather than determined by the early herbivore attack in the flowering year alone. It is important to note that after the induction treatments plants were exposed to natural arthropod colonization and thus plant fitness measured is an effect of the treatments interacting with two years of biotic and abiotic events.
{#jec13231-fig-0002}
3.2. Legacy of whole arthropod community across years {#jec13231-sec-0014}
-----------------------------------------------------
Although our early‐season herbivory treatments did not affect community composition in the same or next year (above), herbivore and carnivore community composition in both the vegetative year (2012) and first flowering year (2013) did reveal legacy effects of total communities across years. A SEM that included herbivore and carnivore community composition provided a good fit to the data, and showed that especially the carnivore community was shaped by legacy effects (whole‐model fit: $X_{10}^{2}$ = 6.531, *p* = 0.769). Carnivore composition in the first year had a significant effect on the carnivore composition in the following year (SEM, *z*: 3.43, *p* \< 0.001, Figure [1](#jec13231-fig-0001){ref-type="fig"}). This was not mediated by herbivore community within or across years, as none of those paths were significant (Figure [1](#jec13231-fig-0001){ref-type="fig"}). Also, the near‐significant effect of early‐season herbivory to carnivore community composition across years (Table [2](#jec13231-tbl-0002){ref-type="table"}) was not seen back in this SEM (Figure [1](#jec13231-fig-0001){ref-type="fig"}).
Second, herbivore community composition in the plants' vegetative season (2012) correlated with seed set in the following, reproductive season of the plants (2013) (SEM, *z*: −2.21, *p* = 0.027). Also this was not mediated by either herbivore or carnivore community composition within or across years, as none of the intermediate paths were significant (Figure [1](#jec13231-fig-0001){ref-type="fig"}). Thus, mainly across‐year effects, rather than within‐year effects, influenced carnivore community composition and plant fitness.
3.3. Arthropod species involved in community legacy effects {#jec13231-sec-0015}
-----------------------------------------------------------
Especially parasitoids were involved in the cross seasonal correlation between the first‐year carnivore community to the second‐year carnivore community (Figure [3](#jec13231-fig-0003){ref-type="fig"}a, Table [S1](#jec13231-sup-0001){ref-type="supplementary-material"} and Figure [S1](#jec13231-sup-0001){ref-type="supplementary-material"}). For example, parasitoids associated with the caterpillar *P. xylostella* occurred in high abundances on the same plots in both years (e.g. long arrows of the same species in either year pointing in the same direction in the PCA plot). The other way around, parasitoids of, for example, the aphid *B. brassicae* or the parasitoid *Cotesia rubecula* that is parasitizing *Pieris* caterpillars were abundant in one year, but low in abundance in the second year (or vice versa, e.g. long arrows pointing in opposite directions in the PCA plot). The abundances of predators belonging to, for example, the Neuroptera or Syrphidae larvae, however, did not show a strong correlation across years (e.g. arrows almost perpendicular to each other; Figure [3](#jec13231-fig-0003){ref-type="fig"}a). Spiders (Araneae) and ladybeetles (Coccinellidae) showed positive or negative relations across years, respectively, although for these species effect sizes were small.
\]](JEC-107-2451-g003){#jec13231-fig-0003}
Interestingly, the abundance of some specific herbivore species that were present in plots in the vegetative year corresponded with plant fitness a year later (Figure [3](#jec13231-fig-0003){ref-type="fig"}b), whereas no strong negative correlations between herbivores in 2013 and seed set were found (Figure [3](#jec13231-fig-0003){ref-type="fig"}c). Abundance of two flea beetle species (*Phyllotreta undulata* and *Pachygaster atra*) in the vegetative year corresponded with reduced seed set of plants. Plants that were less frequently attacked by these beetle species had higher numbers of other herbivore species such as the generalist caterpillar *Mamestra brassicae*, whiteflies (*Aleyrodes* spp.), and the specialist aphid *B. brassicae* (Figure [3](#jec13231-fig-0003){ref-type="fig"}b). Thus, mainly herbivore species present in the first vegetative growth season correlated with plant seed production in the second year when plants flowered for the first time, and these effects were more pronounced than the direct effect of herbivores colonizing plants in the first flowering year.
3.4. Community legacy to plant fitness mediated by plant performance traits {#jec13231-sec-0016}
---------------------------------------------------------------------------
Plant traits such as height and number of leaves were found to mediate the effects of the herbivore community in the vegetative season to plant fitness in the following reproductive season (Figure [4](#jec13231-fig-0004){ref-type="fig"}). The SEM had good data fit ($X_{15}^{2}$ = 21.988, *p* = 0.108) and revealed that herbivore community composition in the first year significantly correlated with plant height (SEM, *z*: −2.14, *p* = 0.032) and number of leaves (SEM, *z*: −3.23, *p* = 0.001) within the first year (2012). A near‐significant path was found for the first‐year herbivore community correlating with the number of flower racemes in the next year (SEM, *z*: −1.93, *p* = 0.054). Subsequently, the number of flower racemes in the second season was positively correlated with the number of seeds in the first reproductive season (SEM, *z*: 3.28, *p* = 0.001). However, plant performance traits (height, number of leaves) did not correlate with each other across the two years. In conclusion, herbivore community composition in 2012 affected seed set in 2013 indirectly through plant performance traits, although the connecting chain of mediating plant traits via flower racemes was just not significant.
{#jec13231-fig-0004}
4. DISCUSSION {#jec13231-sec-0017}
=============
Despite the absence of an early season herbivore effect on community assembly, our study indicates that insect community assembly on perennial plants is affected by cross‐seasonal legacy effects of community composition across years. The carnivore community in the first vegetative growing season correlated with carnivore community assembly after winter in the second year when plants flowered for the first time. Moreover, the identity of early‐season herbivores colonizing plants in both years interacted in an effect on plant fitness. We identified that especially the herbivore community in the vegetative year predicted plant fitness rather than the community that directly interacted with the plant in the reproductive season. Our data indicate that the mechanism behind this legacy effect on plant fitness lies in the effect of herbivores on plant traits. The herbivore community in the first year corresponded with plant performance traits such as leaf number and plant size that determine capacity to flower in the subsequent year. Here, we discuss the role of plant traits in mediating legacy effects of the arthropod community as well as the consequences for plant trait evolution in perennial plants.
4.1. Plant phenotypic plasticity to herbivory {#jec13231-sec-0018}
---------------------------------------------
Plant responses to herbivore feeding have been increasingly recognized to mediate community assembly within a growth season (Hernandez‐Cumplido et al., [2016](#jec13231-bib-0021){ref-type="ref"}; Poelman et al., [2010](#jec13231-bib-0039){ref-type="ref"}; Stam et al., [2018](#jec13231-bib-0044){ref-type="ref"}; Viswanathan et al., [2005](#jec13231-bib-0053){ref-type="ref"}; van Zandt & Agrawal, [2004](#jec13231-bib-0052){ref-type="ref"}). In our earlier work, we identified that the herbivore species introduced as early‐season herbivores on the seedlings in 2012 differentially affected arthropod community assembly within the vegetative growing season (Stam et al., [2018](#jec13231-bib-0044){ref-type="ref"}). Moreover, order of herbivore arrival further modulated community assembly within this vegetative season, resulting in variation in community composition at the end of the first season (Stam et al., [2018](#jec13231-bib-0044){ref-type="ref"}). The absence of effects in the current study may be due to the use of a smaller sample size, analysis of insect communities as average over a season and not in time series of repeated measurements as in our earlier work (Stam et al., [2018](#jec13231-bib-0044){ref-type="ref"}), or context dependency of priority effects depending on yearly variation in community context. Despite the absence of a treatment effect by early‐season herbivory on community assembly in our current study, our SEM analyses as well as the plant fitness analyses for herbivore treatments indicate that herbivore‐plant interactions play a role in cross‐seasonal legacies of arthropod community assembly on perennial plants. The composition of the predator community in 2012 predicted the predator community on plants in 2013, and these were largely determined by specialist parasitoids that are strongly connected to specific herbivore hosts. Moreover, SEM analyses revealed that the herbivore community in the vegetative season correlated with plant traits such as height and number of leaves that carried over to the next season, potentially mediating the legacy on community composition in the next reproductive season.
Herbivores in the first year affected the plant phenotype such as its biomass in the next year, and were marginally significantly predictive for the parasitoid community in the next year. This indicates that the legacy of plant‐herbivore interactions cascades across trophic levels by affecting parasitoid communities in a subsequent year (Hernandez‐Cumplido et al., [2016](#jec13231-bib-0021){ref-type="ref"}). Plant biomass (in terms of height and number of leaves) is well‐known to positively correlate with herbivore presence and to cascade on increased predator abundance (Begon, Howarth, & Townsend, [2014](#jec13231-bib-0001){ref-type="ref"}; Schmitz, Krivan, & Ovadia, [2004](#jec13231-bib-0042){ref-type="ref"}). However, since our SEM could not connect the full path of legacy effects of plant--herbivore interactions to predator communities in subsequent years and our treatments of early‐season herbivory did not significantly affect community composition, it remains speculative what caused the co‐variation of predator communities over years. For parasitoids, density dependent processes of higher parasitoid abundance by increase in host presence is likely to have contributed to cross seasonal legacy effects in predator communities (Bezemer & Mills, [2001](#jec13231-bib-0002){ref-type="ref"}; Kos et al., [2011](#jec13231-bib-0024){ref-type="ref"}; Waage, [1983](#jec13231-bib-0055){ref-type="ref"}). Alternatively, parasitoid abundance in our study was not herbivore‐density‐dependent (Heimpel & Casas, [2008](#jec13231-bib-0019){ref-type="ref"}), and for example caused by genotypic variation in plant traits such as herbivore‐induced plant volatiles that are used in host location (Poelman, Oduor, et al., [2009a](#jec13231-bib-0037){ref-type="ref"}). Although individual plants were randomly planted in plots, we cannot exclude that plots differed in genotypic makeup and traits that affect parasitoid abundance (Lannér‐Herrera, Gustafeson, Filt, & Bryngelsson, [1996](#jec13231-bib-0026){ref-type="ref"}). Moreover, the connection between predator communities across years may include effects by predator interactions such as intraguild predation or non‐consumptive interactions (Frago & Godfray, [2014](#jec13231-bib-0011){ref-type="ref"}). Nevertheless, our data hint that legacy processes known from other study fields such as plant--soil feedback (Heinen et al., [2018](#jec13231-bib-0020){ref-type="ref"}; Kostenko et al., [2012](#jec13231-bib-0025){ref-type="ref"}; Mudrák & Frouz, [2018](#jec13231-bib-0031){ref-type="ref"}), herbivore--plant community interactions (Dong et al., [2018](#jec13231-bib-0008){ref-type="ref"}) or legacies of land use (Cusser, Neff, & Jha, [2018](#jec13231-bib-0005){ref-type="ref"}; Hahn & Orrock, [2015](#jec13231-bib-0016){ref-type="ref"}), may also contribute to cross‐seasonal community assembly on perennial plants.
4.2. Fitness of perennial plants {#jec13231-sec-0019}
--------------------------------
Both our ANOVA analyses of plant fitness as well as SEM analyses revealed that presence of herbivores in the first and vegetative year is most predictive for plant fitness in the subsequent reproductive year. Herbivores in the vegetative year affected plant biomass (height and number of leaves) that corresponded with decreased production of flowers and seed production in the second year. We found that specific herbivore species in 2012 corresponded with decreased seed production in 2013, that is, flea beetles. The beetles are known to particularly colonize *B. oleracea* early in its growth and respond to induction of plants by caterpillar feeding (Poelman, van Loon, van Dam, Vet, & Dicke, [2009b](#jec13231-bib-0038){ref-type="ref"}; Poelman et al., [2010](#jec13231-bib-0039){ref-type="ref"}). Plant responses to caterpillar feeding increase beetle abundance on caterpillar‐induced plants (Poelman et al., [2010](#jec13231-bib-0039){ref-type="ref"}). This may explain the lowest seed production of plants that received caterpillar induction in both years and the correlation of beetle abundance in 2012 with plant fitness. Our data cannot provide causal support for the hypothesis and it remains to be identified if flea beetles are indeed among the most important agents that reduce fitness of perennial *B. oleracea* when particularly feeding on plants in the vegetative year. For perennial plants it has been debated whether events in the vegetative years before reproduction or events during reproductive years are most predictive for plant fitness (Boege & Marquis, [2005](#jec13231-bib-0004){ref-type="ref"}). Our data match emerging consensus that events during the vegetative year profoundly influence plant fitness in subsequent years (Boege & Marquis, [2005](#jec13231-bib-0004){ref-type="ref"}; Ehrlén, [2002](#jec13231-bib-0010){ref-type="ref"}). Herbivore feeding in the vegetative year may cause reduction in photosynthetic capacity and allocation of resources from growth into defence, resulting into effects on plant biomass and defence phenotype (reduction in plant height and number of leaves in our study). The biomass loss and investment in defence to herbivores, carries over to subsequent years in which plants have reduced capacity to form reproductive tissues. The cumulative herbivore load in both vegetative and flowering years has been identified to reduce growth compensation for flower damage in a perennial thistle (West & Louda, [2018](#jec13231-bib-0056){ref-type="ref"}). Thus, plant‐animal interactions during the vegetative year have lifetime consequences for perennial herbs (Ehrlén, [2002](#jec13231-bib-0010){ref-type="ref"}). These effects may be strengthened by legacy effects of plant--animal interactions in the vegetative year to plant‐animal interactions in reproductive years. This includes the likelihood of herbivore attack (McArt et al., [2013](#jec13231-bib-0028){ref-type="ref"}; Poelman et al., [2010](#jec13231-bib-0039){ref-type="ref"}; van Zandt & Agrawal, [2004](#jec13231-bib-0052){ref-type="ref"}), predator presence (Hernandez‐Cumplido et al., [2016](#jec13231-bib-0021){ref-type="ref"}; Utsumi et al., [2010](#jec13231-bib-0050){ref-type="ref"}) as well as interactions with pollinators (Kessler & Halitschke, [2009](#jec13231-bib-0023){ref-type="ref"}). Plant responses to herbivory in terms of growth form, defence and flower traits have been identified to affect pollinator visitation and result in effects on seed production (Rusman et al., [2018](#jec13231-bib-0041){ref-type="ref"}).
4.3. Future perspective {#jec13231-sec-0020}
-----------------------
The importance of herbivory in vegetative years for plant fitness as well as plant--animal legacy effects on community assembly across seasons suggests that these effects are also reflected in growth‐defence strategies of perennial plants. Costs of defence in vegetative years as well as legacies of plant‐mediated species interactions may prove to be explanatory factors in the evolution of plant ontogenetic trajectories of growth‐defence trade‐offs (Boege & Marquis, [2005](#jec13231-bib-0004){ref-type="ref"}). In this research, an important challenge is to identify whether communities as a whole or specific species drive plant‐mediated interactions and its fitness consequences (Guimarães et al., [2017](#jec13231-bib-0015){ref-type="ref"}; Poelman, [2015](#jec13231-bib-0035){ref-type="ref"}; Poelman & Kessler, [2016](#jec13231-bib-0036){ref-type="ref"}; Ohgushi, [2016](#jec13231-bib-0034){ref-type="ref"}). Investigating this is important for our understanding of the evolution of plant--insect communities.
AUTHORS\' CONTRIBUTIONS {#jec13231-sec-0021}
=======================
J.M.S., M.D. and E.H.P. conceived the ideas and designed methodology; J.M.S. collected the data; J.M.S. and M.K. analysed the data; E.H.P. and J.M.S. led the writing of the manuscript. All authors contributed critically to the drafts and gave final approval for publication.
Supporting information
======================
######
######
Click here for additional data file.
We thank the staff of Unifarm for maintaining the experimental fields and help with processing of the seeds; the insect rearing staff of the Laboratory of Entomology (Léon Westerd, André Gidding, Joop Woelke and Frans van Aggelen) for rearing of the insects. Berber de Wolff is acknowledged for her help with monitoring part of the plots. This study was supported by The Netherlands Organisation for Scientific Research (NWO) with a TOP GO grant (no. 854.10.010 to M.D.) and the European Research Council (ERC) under the European Union's Horizon 2020 Research and Innovation Programme (grant agreement no. 677139 to E.H.P.).
DATA AVAILABILITY STATEMENT {#jec13231-sec-0023}
===========================
Data deposited in the Dryad Digital Repository: [https://doi.org/10.5061/dryad.g8k7261](http://doi.org/10.5061/dryad.g8k7261) (Stam, Kos, Dicke, & Poelman, [2019](#jec13231-bib-0045){ref-type="ref"}).
|
Q:
Пространство до строки в JavaScript
У меня программа, которая должна делать все слова с большой буквы. Я написал версию, которая делает слова с заглавной после первого слова. Надо сделать так, чтобы еще первое слово было с большой :
var word = prompt('Какие слова вам сделать с большой буквы? ');
var wordEnd = '';
for(i = 0; i < word.length; i++){
wordEnd += (word[i - 1] == " " || word[i -1] == "") ? word[i].toUpperCase() : word[i];
}
alert(wordEnd);
Надо поставит условие, есть ли что-то вообще до буквы, вот я и думаю как обозначается пустота до строки.
Если предложите другие решения этой задачи, буду очень рад!
A:
При проверке нулевого символа строки, предыдущий индекс будет -1, а так как такого поля в строке нет, результат будет undefined.
Следовательно, нужно добавить проверку на равенство undefined: word[i-1] == undefined
Пример:
var word = prompt('Какие слова вам сделать с большой буквы? ');
var wordEnd = '';
for (i = 0; i < word.length; i++) {
wordEnd += (word[i - 1] == " " || word[i - 1] == "" || word[i - 1] == undefined) ? word[i].toUpperCase() : word[i];
}
console.log(wordEnd);
Кроме того можно воспользоваться простой регуляркой:
var word = prompt('Какие слова вам сделать с большой буквы? ');
var wordEnd = word.replace(/\b./g, $0 => $0.toUpperCase());
console.log(wordEnd);
|
Q:
Bootstrap nav bar list is stacked rather than alongside
I'm trying to execute a basic Bootstrap nav bar example:
<body>
<nav class="navbar navbar-default">
<div class="container-fluid">
<div class="navbar-header">
<a class="navbar-brand" href="#">WebSiteName</a>
</div>
<ul class="nav navbar-nav">
<li class="active"><a href="#">Home</a></li>
<li><a href="#">Page 1</a></li>
<li><a href="#">Page 2</a></li>
<li><a href="#">Page 3</a></li>
</ul>
</div>
</nav>
</body>
Look at what's happening in the CodePen (which has Bootstrap installed). Why are the items in the navbar stacking atop each other, and not sitting alongside each other?
A:
You're using Bootstrap 4 (in the Codepen) and the navbar has changed. If you want a simple horizontal (non collapsing) you need to include navbar-toggleable-xl since the navbar is stacked vertically by default..
Update for 4.0.0 navbar-toggleable-* has changed to navbar-expand-*
For original question:
<nav class="navbar navbar-light navbar-toggleable-xl bg-faded">
<a href="/" class="navbar-brand">Brand</a>
<ul class="navbar-nav">
<li class="nav-item active">
<a class="nav-link" href="#">Link <span class="sr-only">Home</span></a>
</li>
<li class="nav-item">
<a class="nav-link" href="#">Link</a>
</li>
<li class="nav-item">
<a class="nav-link" href="#">Link</a>
</li>
</ul>
</nav>
Demo: http://www.codeply.com/go/TVDW57B4SL
Read more in the docs
|
Roy Nelson has a really cool Vegas business
In a sport dominated by wrestling, boxing, and BJJ, Nelson started in Kung Fu, and still practices the art. In a sport dominated by the UFC, he has moved to Bellator. And in a sport where few fighters are using their income to plan ahead, Nelson is. And as he explains on Bellator 183 In Focus, one of his commercial efforts is like nothing else.
“One thing I’ve been blessed with, being a professional fighter, being a professional athlete, is that it’s allowed me to become a better businessman,” said Nelson. “Because it has allowed me to do things that I’ve always wanted to do.”
“For me, Hog Car Tours is really simple. It’s amazing tours, with food. It’s one of my many businesses that I have in my portfolio.”
(3:03 mark)
The next time you go to Vegas, to MUST do Hog Car Tours. It’s $135 per person to drive a pink open-air Hog Car on a guided, personalized tour of some of the most well-known—and not-so-well-known—sights on the Strip.
There are several tours including the night light tour, the old Vegas and mobster tour, Big Country’s fantasy tour, and the food tour which stops at joints like Rollin Smoke BBQ, rated the “best ‘dam’ barbecue in Las Vegas,” and chic locales like Jean-Phillipe Patisserie in the Bellagio Hotel, featuring the world’s largest chocolate fountain.
So once again, the next time you go to Vegas, to MUST DO Hog Car Tours.
And returning from pleasure to fighting, Nelson fights Javy Ayala at Bellator 183 on September 23, 2017!
“This is the official website of the Mixed Martial Arts llc. Commercial reproduction, distribution or transmission of any part or parts of this website or any information contained therein by any means whatsoever without the prior written permission is not permitted.” |
CEDAR RAPIDS — Vermont U.S./ Sen. Bernie Sanders will be joined by U.S. Rep. Alexandria Ocasio-Cortez at a Nov. 9 rally in Coralville.
The New York congresswoman, who traces her interest in serving in public office to Sanders’ unsuccessful bid for the 2016 Democratic nomination, will join Sanders for a rally at 6:30 p.m. at the Marriott Hotel and Conference Center at Iowa River Landing in Coralville.
They also will do rallies together Friday in Council Bluffs and at noon Nov. 9 at Drake University in Des Moines.
Like Sanders, Ocasio-Cortez is a champion of the Green New Deal, which Sanders said Saturday at a jobs and infrastructure forum in Cedar Rapids will create up to 20 million jobs, “transforming our energy system away from fossil fuels to efficiency and sustainable energy.”
She appeared with Sanders when he returned to the campaign trail after being hospitalized for a heart attack and has appeared in digital ads for the candidate.
Shuttle services between the University of Iowa and the Marriott will be available. Visit the events page at www.berniesanders.com for more information.
Comments: (319) 398-8375; [email protected] |
1. Introduction {#sec1-ijerph-16-05120}
===============
The global environment is increasingly recognised to be in peril, with alarming statistics on the state of the climate emerging almost daily. To give one prominent example, one of the latest reports by the authoritative Intergovernmental Panel on Climate Change \[[@B1-ijerph-16-05120]\] charts how glaciers and ice sheets worldwide are already melting rapidly, and argues that the world may only have until 2030 to keep global warming below 1.5 degrees (widely recognised as the threshold past which runaway climate change is likely to occur). Such developments have great existential significance for human beings. As such, the crisis---and our response to it---has a potent psychological dimension, as reflected in emergent concepts such as eco-anxiety \[[@B2-ijerph-16-05120]\]. As humans wrestle with this increasingly urgent predicament, various ways of appraising and addressing the situation can be found worldwide, from scientific analyses and technological fixes to moral arguments and public activism. For instance, aligning with the latter, the burgeoning Extinction Rebellion movement focuses on the role of government inaction in fomenting this state of affairs, and aims to compel their action through acts of civil disobedience \[[@B3-ijerph-16-05120]\].
Among these varied approaches, a report for the UK government's Committee on Climate Change argues that one important strategy will be to address how we think about our relationship to nature, psychologically and culturally \[[@B4-ijerph-16-05120]\]. Over recent centuries, industrialisation has seen the rise to global prominence and dominance of a mode of relationship that is fundamentally extractive and predatory. In this, nature is constructed as a resource to be exploited (rather than a commonwealth to be protected, for example). This mode of relationship is arguably a key reason why humans have damaged the environment to such an extent that our own survival is threatened, since this way of relating both encourages and justifies such behaviour. Thus, if we are to find more sustainable and adaptive ways of living on this planet, we will need to develop more harmonious and respectful modes of relationship. Crucially, such modes have been cultivated historically, and indeed can still be found, particularly in less-industrialised cultures, but also in industrialised ones (albeit generally in non-hegemonic ways). In that sense, studying and engaging with these modes has the potential to enhance our 'wellbeing literacy' \[[@B5-ijerph-16-05120]\] with respect to our relationship with nature. This includes helping people find new ways to conceptualise, articulate, rationalise and discuss this relationship. Wellbeing literacy can be broadly defined as "the vocabulary, knowledge and skills that may be intentionally used to maintain or improve the wellbeing of oneself or others" \[[@B6-ijerph-16-05120]\]. In that respect, the literacy central to the current paper is one where the 'others' in that definition is not restricted to humans, or even sentient beings, but the environment as a whole. Moreover, this literacy in turn may potentially have beneficial public health outcomes by improving the relationship itself.
As such, this paper explores more adaptive and sustainable modes of relationship between humans and the environment, modes which are referred to collectively here under the overarching rubric of 'eco-connection'. The paper explores these through the innovative device of studying 'untranslatable' words. By analysing such words, three main themes pertaining to eco-connection were identified, each with three sub-themes: sacrality (including animism, polytheism and pan(en)theism); bonding (including intertwining, rootedness and longing); and appreciation (including savouring, sensitivity and aesthetics). These themes shall be introduced and explained in depth below. Before that, the paper will elucidate the nature and significance of untranslatable words and outline the method deployed to identify and analyse these. First though, we begin by examining further the idea that recent centuries have been dominated by destructive modes of relationship between humans and nature.
1.1. Dominion and Disconnection {#sec1dot1-ijerph-16-05120}
-------------------------------
There are many possible ways for humans to be in relationship with the natural world, as we shall see below. However, over recent centuries, one particular mode of relationship has become dominant worldwide \[[@B7-ijerph-16-05120]\]. This is one characterised by a disconnected, extractive, predatory ethos, where nature is constructed as a resource to be exploited. Before delving into the origins and nature of this mode, a few preparatory remarks are in order.
First, this mode tends to be associated with industrialised nations, and often with Western ones in particular. However, given the complex dynamics of globalisation and cultural change, one can see signs of this mode worldwide, for instance in non-Western industrialised nations. Thus, neither this mode, nor industrialisation, can be characterised as exclusively 'Western' phenomena. Second, even if this mode is hegemonic in Western and/or industrialised nations, other modes can still be found within these places (as 'subcultures' or subaltern perspectives). Indeed, movements such as Extinction Rebellion are examples of environmental counter-perspectives that have emerged in the West \[[@B3-ijerph-16-05120]\]. As such, although some scholars have found value in assigning overarching characteristics to large-scale regions---for instance, Basáñez \[[@B8-ijerph-16-05120]\] identifies three 'hyper-clusters' of cultures, which focus respectively on honour (mainly African, Islamic, and Christian orthodox cultures), achievement (mainly Asian and Western), and joy (mainly Latin American and Caribbean)---the current study prefers to avoid such broad-brush cultural generalisations where possible. Indeed, many of the words included in the analysis hail from languages of Western and/or industrialised nations. Furthermore, it is precisely this heterogeneity and dynamism within cultures that provides some hope that this dominant mode of relationship can be altered for the better. Finally, it should be emphasised that the destruction of the environment is over-determined, and cannot be traced to single causal factors such as industrialisation or disconnection. For instance, another important factor is over-population, whose damaging effects are observed even in pre-industrial societies, such as Easter Island \[[@B9-ijerph-16-05120]\]. Thus, this study does not make any claims for a simple inverse relationship between eco-connection and industrialisation. It is possible that such a relationship does indeed obtain, but this would be an empirical question for future research, and is beyond the scope of this paper to answer.
With all that said, let's consider this predatory mode of relationship itself. It is also beyond the scope here to exhaustively consider its origins and complexity. However, we can make some relevant points to illustrate the general thesis here. In terms of its roots, many factors arguably contributed to its emergence and dominance. One key influence though is the perspective expressed in the Old Testament (in Genesis 1:26). This is rendered in English (King James Version) as, "And God said, let us make man in our image, after our likeness: and let them have dominion over the fish of the sea, and over the fowl of the air, and over the cattle, and over all the earth, and over every creeping thing that creepeth upon the earth." Much has been made of this passage by scholars, particularly in relation to the key word dominion, a translation of the Hebrew word radah. Some argue that in Hebrew, while radah can indeed convey a sense of 'ruling over', it can also be interpreted beneficently, as a just king may rule wisely over his kingdom \[[@B10-ijerph-16-05120]\]. From this latter perspective, the significance with which humans are endowed by God---as alluded to in the passage---confers a duty of care and responsibility towards nature. In that respect, certain movements within Judaism and Christianity have embraced this kind of 'stewardship' \[[@B11-ijerph-16-05120]\].
Indeed, such stewardship is a mode of eco-connection which has been an important element of many cultures worldwide, including in Western and/or industrialised nations (even if it has not been hegemonic or dominant in such places). This influence is reflected in, and captured by, a significant body of recent literature. For example, showing the presence of stewardship principles in a Western context, Raymond and colleagues interviewed UK farmers, and identified four types of stewardship framings \[[@B12-ijerph-16-05120]\]: environmental (farmers conserving or restoring wildlife); primary production (taking care of primary production assets); holistic (farmers as conservationists, primary producers, and managers of landscape values); and instrumental (focusing on financial benefits linked to compliance with agri-environmental schemes). Similarly, a qualitative systematic review by Enqvist et al. uncovered four distinct meanings of stewardship in the literature \[[@B13-ijerph-16-05120]\]: ethic, motivation, action and outcome. Mathevet, Bousquet, and Raymond also articulated four main types of stewardship \[[@B14-ijerph-16-05120]\]: reformist, adaptive, sustainability and transformative. These are differentiated according to: the role of science; the exploration and integration of the plurality of values; and the capacity to modify values, rules and decision-making system. Evidently then, modes of eco-connection like stewardship can be found both historically and presently, including in Western and/or industrialised contexts.
Historically however, such beneficent perspectives have often been outweighed or overshadowed by less generous interpretations of radah and dominion. These instead focus more on humankind standing apart from nature (rather than being 'of it'), subjugating it. It is of course a complex picture, given the many traditions and schools of thought in religions such as Judaism and Christianity, and moreover their evolution over time. For instance, Lea argues that, influenced by Judaic and Hellenic traditions, early Christianity upheld a non-exploitative attitude to nature, driven partly by the anti-materialist prescriptions of these influences \[[@B15-ijerph-16-05120]\]. However, in the wake of the Renaissance and the Reformation, the dynamic began to shift towards a more extractive relationship. These eras saw the emergence and then dominance of new forms of religious morality, emphasising concerns such as industriousness, instrumental engagement with the material world, and pursuit of personal prosperity and property. Moreover, so central was the Church to the cultural and intellectual climate of Europe at the time, these ideals soon became hegemonic. For instance, Max Weber argued influentially that the ideas, ethics, and practices of Protestantism were key factors in the emergence of capitalism in the West \[[@B16-ijerph-16-05120]\]. Relatedly, they helped shaped the burgeoning scientific revolution, which was likewise driven by a systematic focus on the material world \[[@B17-ijerph-16-05120]\]. As with capitalism, this was an engagement which tended to view nature as a resourced to be probed, manipulated, or harnessed to the benefit of humankind.
These influences have persisted in the West (and elsewhere), even as the hold of religious traditions themselves has waned. To give some context, in the most recent UK census, 59.3% of the population identified as Christian, a sharp decline from 71.7% in 2001 \[[@B18-ijerph-16-05120]\]. Moreover, of those affiliated to the Church, Collings-Mayo and colleagues suggest many see this identification more as a fading 'inherited cultural memory' than an 'active faith' \[[@B19-ijerph-16-05120]\]. However, as scholars such as Jordan Peterson have argued, such 'cultural memory' is still very important in shaping who people are \[[@B20-ijerph-16-05120]\]. Even if many in the West (and beyond) no longer have an active religious faith, our common mental frameworks---including ideologies, metaphysics, morals, and concepts---have been conditioned over the centuries by Judeo-Christian traditions. In that sense, these inherited ideas of dominion over nature are still operative, playing a key role in the disconnected, predatory, extractive mode of relationship that currently dominates in many Western and/or industrialised societies \[[@B21-ijerph-16-05120]\].
As emphasised above, this mode of relationship is implicated in the unfolding climate crisis. This point brings us to the question motivating this paper: what can be done to address this crisis? In that respect, one answer is to help people develop more adaptive modes of relationship. There are many possible elements to this endeavour, including political, technological, and economic ones. However, among the most foundational are the psychological and cultural dimensions---how people think about this relationship. In the terminology of this special issue, this means helping people cultivate better wellbeing literacy with respect to their relationship with nature. As noted above, if wellbeing literacy is "the vocabulary, knowledge and skills that may be intentionally used to maintain or improve the wellbeing of oneself or others" \[[@B6-ijerph-16-05120]\], this means a literacy where 'others' does not only mean humans, but the environment as a whole. To that end, this paper rests on the informed conjecture---based on the ongoing lexicographic project introduced below---that such literacy can be fostered through engaging with cultures who have developed and/or maintained more adaptive relationships. More specifically, this engagement here takes the form of cross-cultural linguistic enquiry, focusing on untranslatable words.
1.2. Exploring Untranslatability {#sec1dot2-ijerph-16-05120}
--------------------------------
Historically, cross-cultural research has tended to be undervalued within psychology, which over recent decades has been heavily Western-centric, and specifically American-centric. This bias was not always the case. Danziger suggests that prior to the Second World War were various centres of knowledge and practice, as well as peripheral locations where such knowledge/practice was reproduced \[[@B22-ijerph-16-05120]\]. However, the post-war dominance of the United States meant that American psychology was exported globally, effectively becoming the sole centre, with the adjective 'American' soon erased as superfluous. Of course, during that time, local ethnopsychologies \[[@B23-ijerph-16-05120]\]---sometimes referred to as 'indigenous' psychologies \[[@B24-ijerph-16-05120]\]---were and still are operational globally. However, American psychology came to dominate, meaning that its concepts, ideologies, priorities, and methods have shaped the international scene \[[@B25-ijerph-16-05120]\]. An example of this---with significance here---is that (American) English has become the default language for the field. This bias is an issue, as recognised by decades of research on the linguistic relativity hypothesis (LRH), popularly known as the Sapir--Whorf hypothesis, following the work of Sapir \[[@B26-ijerph-16-05120]\] and Whorf \[[@B27-ijerph-16-05120]\]. Central to the LRH is the claim that language shapes how people experience and understand the world. In that respect, if the field's ideas and theories are structured around the contours of English, its knowledge is therefore to an extent also provincial and culturally-specific \[[@B28-ijerph-16-05120]\].
However, the Western-centricity of psychology is becoming more widely recognised and moreover acknowledged as problematic. For instance, Henrich and colleagues \[[@B29-ijerph-16-05120]\] published an influential paper in Nature arguing that the bulk of the research in fields like psychology is conducted on and by people who are 'WEIRD' (from contexts that are Western, Educated, Industrialised, Rich, and Democratic). Yet the majority of the world do not fall into that category, which raises questions regarding the generalisability and validity of such research. In that light, there are increasing efforts across academia to promote and engage in cross-cultural scholarship. One such endeavour is my own recent initiative to create a lexicography of untranslatable words \[[@B30-ijerph-16-05120]\], on which the current paper is based.
While untranslatability is a contested phenomenon, it commonly refers to a word that lacks an exact equivalent in a given other language. The value of such words is manifold. First, they assist in understanding other cultures, offering insights into their values, traditions, philosophies, and ways of being. The theoretical context here is the aforementioned LRH, the stronger version of which is linguistic determinism, where language inextricably constitutes thought, whereas the milder relativistic version simply asserts that language shapes it. In relation to untranslatability, the stronger view suggests that only people from the culture that produced a given word can truly understand or experience the phenomenon it signifies \[[@B31-ijerph-16-05120]\]. However, the milder perspective holds that such words are accessible to people outside the culture to an extent, holding some universal relevance. This latter point highlights a second aspect of interest regarding untranslatable words: beyond being informative vis-à-vis the culture that created a given word, they enrich other lexica. Indeed, cultures 'borrowing' words from each other is central to language development. For instance, of the more than 600,000 lexemes in the OED (Oxford English Dictionary), the percentage of borrowed words---also known as loanwords---is estimated to be as high as 41% \[[@B32-ijerph-16-05120]\].
Of particular interest here is *why* words are borrowed. Haspelmath identifies two main reasons: core versus cultural borrowings \[[@B33-ijerph-16-05120]\]. The former is when a loanword replicates a word that already exists (i.e., with similar meaning) in the recipient language. This tends to happen for sociolinguistic reasons (e.g., cultural capital associated with using foreign words). This type of borrowing is not of concern here. However, the latter category is central. This occurs when the recipient language lacks its own word for a referent (e.g., if a new practice or idea is introduced to a culture). Thus, the loanword is adopted for pragmatic reasons: it is cognitive and socially useful, allowing speakers to articulate concepts they previously struggled to. In Lehrer's terminology, such words fill 'semantic gaps', i.e., "the lack of a convenient word to express what \[one\] wants to speak about" \[[@B34-ijerph-16-05120]\]. It is such gaps that makes words untranslatable, indicating phenomena that have been overlooked or undervalued by one's own culture, but which another culture has identified. Thus, a central premise of my lexicography is that such words can enrich the nomological network in psychology (and English more broadly). Such augmentation is desirable for many reasons, including as a means of redressing the Western-centricity of psychology. This goal therefore intersects with that of the present paper, namely developing an enriched lexicon---and hence wellbeing literacy---with respect to our engagement with nature. More specifically, this paper focuses on the following research question: what are the dimensions of 'eco-connection' (i.e., adaptive modes of relationship with the environment), as revealed by untranslatable words.
2. Methods {#sec2-ijerph-16-05120}
==========
In the paper establishing the lexicography \[[@B30-ijerph-16-05120]\], I identified 216 untranslatable words pertaining to wellbeing through a 'quasi-systematic' review of academic and grey literature (quasi in that there was insufficient material in academic journals to permit a conventional systematic review). Readers interested in the process are encouraged to consult this original paper; suffice to say that the search protocol had several elements (including examining the first 20 websites returned when entering "untranslatable words" into Google). Once the 216 words had been identified, robust definitions were sought though several sources, including on-line dictionaries, peer-reviewed academic sources, and bilingual colleagues. The words and their definitions were then analysed using grounded theory (GT), a methodology which allows theory to emerge inductively from the data via three main coding stages (open, axial and selective). In a process of open coding, the data---words and their definitions---were examined for emergent themes, assisted by other GT processes such as memoing and initial theorising. Axial coding then involved comparing themes through constant comparison, and grouping them into categories based on conceptual similarity. Six categories were produced, paired into three meta-categories: feelings (positive and ambivalent); relationships (love and pro-sociality); and development (character and spirituality). Finally, selective coding saw the identification of a 'core' category of wellbeing. Although applying GT in this way might be deemed unconventional, there is considerable heterogeneity in the studies purporting to use GT, and it is sufficiently aligned with GT principles to be considered one such example.
Following this initial paper, the lexicography has since expanded to over 1200 words, partly through crowd-sourced contributions to a website created to host the project ([www.drtimlomas.com/lexicography](www.drtimlomas.com/lexicography)), and partly through my own follow-up enquiries through 'conceptual snowballing'. The term snowballing derives from recruitment, where participants facilitate the involvement of additional people. This metaphor has been borrowed to reflect the way enquiries into an untranslatable word might lead one to encounter related concepts. For instance, although over 120 languages are currently represented in the lexicography, many words are taken from a select group that are especially well-studied in psychologically-oriented literature, including Chinese, French, German, Greek, Japanese, Pāli and Sanskrit. Thus, an enquiry into a word from these languages would often lead me to a text in which related words are discussed (which would then be added to the lexicography). In adding a word, the same checking procedures were followed as in the initial paper. Moreover, once words and their definitions had been added, they were accessible on the website for public inspection and feedback (with people sometimes suggesting a refined definition of a word), providing a further credibility check (which is valued in GT).
This subsequent phase of data collection cannot be regarded as systematic (not even in the 'quasi' sense of the original paper). Indeed, some 7000 languages exist worldwide, and it is unlikely that one research project could study them all and retrieve their relevant words. However, even if the lexicography is a work-in-progress, one may still usefully analyse its existing words and emergent themes, even if such analyses are incomplete and subject to revision. Indeed, with the addition of the new words, the thematic structure outlined in the original paper has been updated. The six categories initially identified are still present, and moreover have been enriched by the additional words, with thematic analyses published on each (positive feelings \[[@B35-ijerph-16-05120]\], ambivalent feelings \[[@B36-ijerph-16-05120]\], love \[[@B37-ijerph-16-05120]\], prosociality \[[@B38-ijerph-16-05120]\], character \[[@B39-ijerph-16-05120]\], and spirituality \[[@B40-ijerph-16-05120]\]), plus a theoretical paper \[[@B28-ijerph-16-05120]\] and monograph \[[@B41-ijerph-16-05120]\] on the lexicographic project itself. However, the additional words have also led to six new categories being identified. The meta-category of feelings now also includes sensations and cognition. The meta-category of development now also includes understanding and skills. Further, the meta-category of relationships now also includes aesthetics and eco-connection. It is of course this latter category that is the focus of the present paper.
This emergent category of eco-connection comprises over 150 words at present. For this paper, these words were analysed using the GT variation developed in my original paper \[[@B30-ijerph-16-05120]\]. The data again comprised the words and their definitions, which had been refined and checked in the ways outlined above (e.g., consulting dictionaries, peer-reviewed sources and bilingual speakers, together with website feedback). In the first stage of open coding, words and their definitions were examined for thematic content. Next, words were grouped together through constant comparison into nine thematic codes (referred to below as 'sub-themes'), and in turn aggregated into three themes. This process could be described as somewhat intuitive since, unlike factor analysis (with its recourse to statistical techniques), choosing which thematic structure provides the 'best fit' for the data mainly relies on the informed judgement of the researcher. Thus, it is acknowledged that this analytic process is somewhat idiosyncratic, shaped by my personal inclinations and perspectives; other researchers may have configured and labelled the themes differently, based on their own situatedness and reading of the data. Finally, a single 'core' category was generated, namely eco-connection (although this category had been in mind from the start, so cannot be deemed a truly inductively-derived core category).
3. Results and Discussion {#sec3-ijerph-16-05120}
=========================
The analysis generated three emergent themes---sacrality, connection and appreciation---each of which has three subthemes, as illustrated below in [Figure 1](#ijerph-16-05120-f001){ref-type="fig"}. These themes will be discussed in turn, illustrated using select examples from the lexicography (usually several per subtheme).
3.1. Sacrality {#sec3dot1-ijerph-16-05120}
--------------
The first theme captures the complex and plural idea that nature is 'sacred' in some way. The sacred is itself a contested, evolving idea. Etymologically, it entered English around the 12th century, derived (via French) from the Latin sacrare, which encompasses meanings such as to anoint, consecrate, dedicate, immortalize, and make holy \[[@B42-ijerph-16-05120]\]. In modern scholarship, many conceptualizations rest upon the pioneering work of Durkheim \[[@B43-ijerph-16-05120]\], who contrasted it with the profane: the latter pertains to ordinary everyday life, the former to "things set apart and forbidden". Thus, the sacred describes phenomena regarded as 'other' and non-ordinary. This can include divine beings, and places and objects connected to these \[[@B44-ijerph-16-05120]\]. It also encompasses phenomena simply deemed 'numinous' in some way \[[@B45-ijerph-16-05120]\]. That said, in Otto's original articulation of the numinous \[[@B46-ijerph-16-05120]\]---based on the Latin numen, meaning divine power or presence---this concept was generally interpreted in theistic terms \[[@B47-ijerph-16-05120]\]. There are many untranslatable terms in this space, including proper names (e.g., of deities). Names are not usually considered examples of untranslatable words, since one would not normally 'translate' a name. However, they are relevant in this context if there is no equivalent in English. For instance, it is significant to the analysis that there is seemingly no English equivalent of Poseidon (Greek god of the sea). Of the various words pertaining to sacrality, these can be organized into three subthemes, based on a conventional taxonomy of forms of religion: animism, polytheism, and pantheism/panentheism.
First, cross-culturally, many of the earliest conceptions of the sacred fall under the overarching label of animism, a term coined by nineteenth-century anthropologists from the Latin anima (meaning soul, breath, or life). The label reflects the belief that all natural phenomena individually---e.g., each tree or river---possess a unique spirit or soul. Indeed, animism was probably the dominant mode of cognition among the social groups that started to coalesce approximately sixty thousand years ago (or possibly earlier) \[[@B48-ijerph-16-05120]\]. It is perhaps understandable that early societies concluded that natural phenomena possessed some sort of consciousness and soul, given that humans themselves were just starting to acquire cognisance of their own thoughts, feelings, and volition. Their world was thus 'enchanted', as Weber put it, suffused with agency and significance \[[@B16-ijerph-16-05120]\]. Moreover, animism is not an exclusively ancient perspective, but continues to have force today. Norse mythology, for instance---millennia in the making---constitutes a living belief system for many people of the region. To give some examples, its taxonomy is populated by a multitude of vættir (nature spirits), including landvættir (land spirits), vatnavættir (water spirits), and sjövættir (sea spirits). Indeed, Iceland celebrates four landvættir on its coat of arms (Dreki the dragon in the east, Gammur the griffin to the north, Griðungur the bull in the west, and Bergrisi the giant of the south). Such spirits are connected to specific locales, which they guard and infuse with their presence. To reiterate the point about this mythology still having resonance, Icelandic officials have been known to assess the potential impact on vættir habitats when considering urban planning \[[@B49-ijerph-16-05120]\]. Many other animist mythologies have existed and continue to exist---all with lexica of relevant untranslatable words---but the Norse example is sufficient to illustrate this first form of nature sacrality. Indeed, many such words and mythologies are not yet included in the lexicography---which, as emphasised above, is a work-in-progress---and so could not be featured here in any case.
The second class of words relating to sacrality can broadly be termed polytheistic. One should be wary though of positioning specific mythologies as exclusively one class or another. After all, Norse mythology is not wholly animistic, but also has a pantheon of gods---including Odin, Thor, and Loki---which introduces a polytheistic element. Indeed, the distinction between animism and polytheism is not always clear cut. The main difference pertains to the level of abstraction, where in polytheism the deities are somewhat removed from the phenomena they represent or rule over, existing transcendently in another realm. As with animism, there are and have been numerous polytheistic taxonomies across cultures, many featuring gods that signify or relate to nature in some way. Take Greek mythology as an example. This envisaged three separate generations of divinities, spanning aeons, as detailed in epics such as Hesiod's Theogony (circa 700 [BCE]{.smallcaps}(before common era)), which outlined their genealogy \[[@B50-ijerph-16-05120]\]. First came the Prōtógonos ('first-born'), a primeval triad of creative forces that fashioned existence. In the beginning was Kháos, the void preceding the cosmos. The cosmos then came into being through the union of Gaia and Ouranus, deities of earth and heaven. Together they created a second generation of twelve Titânes, who were subsequently overthrown by the twelve Olympian gods. The latter were contemporary with the classical era, and conceived of as exerting a powerful influence on people's lives. Their names are legendary still, and include several pertaining to nature, including Poseidôn (god of the sea) and Dēmētēr (goddess of the harvest). Moreover, as with animism, some polytheistic deities continue to have meaning for people (even if not in the same way as for our ancestors). For instance, when Lovelock and Margulis \[[@B51-ijerph-16-05120]\] proposed their theory of 'atmospheric homeostasis by and for the biosphere'---describing the earth's dynamic ability to maintain viability as a living planet---they named it Gaia. Moreover, subsequently, people have been newly inspired by this theory---for instance within ecological movements---to regard the earth as sacred \[[@B52-ijerph-16-05120]\].
This latter use of Gaia shades into our third class of sacrality---reiterating the point that the distinction between the classes is not always clear-cut---namely, nature itself as sacred. There are two subtly different forms of this perspective, pantheism and panentheism. The former is arguably a form of monotheism (identifying one overarching divinity), one which views God and the cosmos as indivisible. This perspective is most closely associated with the philosopher Spinoza, who invoked the monist idea of substantia---something capable of self-subsistence---and argued that there was only one substance in the universe, namely God \[[@B53-ijerph-16-05120]\]. He then employed the Latin phrase natura naturans ('nature naturing') to reflect the idea that God is the dynamic process of creation itself, nature unfurling in all its glory. Subsequently, many modern thinkers have endorsed his perspective (without reference necessarily to a theistic being), where the cosmos itself is regarded as divine. For instance, asked whether he believed in God, Albert Einstein replied, "I believe in Spinoza's God, who reveals himself in the orderly harmony of what exists, not in a God who concerns himself with the fates and actions of human beings" \[[@B54-ijerph-16-05120]\]. In addition to pantheism is also a stance known as panentheism, coined in 1828 by Karl Krause using Greek roots to mean 'all in God'. Pantheism simply means 'all God', where the cosmos and the divine are one, so the divine is immanent (immersed in the cosmos) but not transcendent (it does not exist other than as the cosmos). By contrast, in panentheism, in addition to being immanent, the divine is also transcendent, thereby being both of the cosmos and outside it. An often-cited form of panentheism is the notion of Brahman, a central feature of the sacred vision expressed in the Upaniṣads (foundational works of what is now known as Hinduism, composed between 1500 and 500 BCE) \[[@B55-ijerph-16-05120]\]. That said, at the risk of complicating the picture, Hinduism can also be construed as polytheistic. However, the Upaniṣads do attempt to identify Brahman as a unifying force beneath the multiplicity and flux of life, hence it being viewed as one of the first panentheistic philosophies \[[@B56-ijerph-16-05120]\].
3.2. Bonding {#sec3dot2-ijerph-16-05120}
------------
With this second theme, human beings themselves enter the picture. People were of course implicit in the theme above, particularly in relation to pan(en)theism, in that they are part of the natural world regarded as sacred. But this second theme is more centrally about people's relationship to nature. Cross-culturally, there are many ways of constituting and understanding this bond, and this theme includes subtle variation in that regard. Overall, though, the uniting principle is people connecting with nature in various ways---physically, experientially, cognitively, emotionally, philosophically, and spiritually \[[@B57-ijerph-16-05120]\]. This naturally stands in contrast to the modes of disconnection noted in the introduction. Of course, in one sense, all three themes are about connection with nature (or 'eco-connection', per the title of the paper). But this theme in particular focuses on the quality and nature of the relationship between humans and the environment, and specifically on the ways such ties can be close, intimate, and significant. In that respect, three subthemes were identified: intertwining, rootedness, and longing.
The first subtheme of 'intertwining' reflects the notion that humans are inextricably part of nature, in all the multidimensional ways alluded to above. Salmón calls this type of perspective a 'kincentric ecology', in which people "view both themselves and nature as part of an extended ecological family that shares ancestry and origins" \[[@B58-ijerph-16-05120]\]. This stance is particularly evident in cultures often referred to as 'indigenous' or 'aboriginal'. Consider for instance the peoples native to Australia, who began developing culture---e.g., symbolic art---as early as 50,000 years ago \[[@B59-ijerph-16-05120]\]. During this long cultural evolution, modes of understanding began to emerge that were fundamentally characterised by this 'intertwining' perspective. One such example is known as Aljerre-nge, denoting the complex cultural--religious belief system of the Aranda (or Arrente) people. Other Aboriginal peoples have comparable knowledge systems known by different names, such as the Kija's Ngarrankarni. In English, Aljerre-nge and comparable terms are sometimes rendered as 'Dreamtime' or 'The Dreaming', terms coined by Stanner in the 1950s \[[@B60-ijerph-16-05120]\]. Although the terminology has been criticised for implying unreality, among other obfuscations \[[@B61-ijerph-16-05120]\], Stanner seemingly intended to highlight the epistemological significance of dreams as means of acquiring knowledge, including receiving guidance from ancestors. But Aljerre-nge and related concepts are about more than dreaming in the literal sense of the word (i.e., cognitive activity while asleep), signifying holistic, all-encompassing ways of perceiving all life as interconnected. Stanner also coined the term 'everywhen' to denote this mode of understanding, encompassing past, present and future. More than a synonym for timeless, it acknowledges the ongoing relevance in these cultures of the ancestral beings and powers that shaped the world. Moreover, such traditions and epistemologies are not confined to the past, but are vibrant, complex, living ways of engaging with the world that still resonate for many indigenous people today.
A related subtheme is 'rootedness'. If people recognise themselves as intertwined with the natural world, they are likely to identify with, and be invested in, specific regions of the earth to which they have historical connections. This notion of connection to a locale is reflected in the Māori term turangawaewae, meaning 'a place to stand', describing that portion of the planet one calls one's own \[[@B62-ijerph-16-05120]\]. It is also nicely articulated by Sale in relation to the Spanish term querencia \[[@B63-ijerph-16-05120]\], which reflects that "deep sense of inner well-being that comes from knowing a particular place on the Earth; its daily and seasonal patterns, its fruits and scents, its soils and bird-songs. A place where, whenever you return to it, your soul releases an inner sigh of recognition and realisation." Relatedly, some words celebrate the active act of 'earthing' or 'grounding' oneself in nature---investing time in the natural world, and connecting emotionally with it---like the Finnish maadoittuminen. An important aspect to this subtheme is that it often intersects with the notion of stewardship raised above, as does the first subtheme. After all, a corollary of being intertwined is people caring for this world of which they are part (assuming people have a vested interest in caring for themselves). In itself, stewardship has various aspects and forms in the words analysed here (in addition to the conceptual variation identified in the literature above). One may feel a general sense of stewardship towards the earth, as perhaps reflected in terms like Gaia. Often though, cultures speak of stewardship over specific regions to which they feel rooted. For instance, related to turangawaewae is the term mana whenua, which pertains to the mana---alluding to force, but usually also with moral or spiritual dimensions---exerted over a territory by a given people. It has thus been used in New Zealand to describe who exerts moral authority and guardianship over land. It has even had legal implications, being incorporated into legislation that deals with stewardship of natural resources \[[@B64-ijerph-16-05120]\].
The final subtheme is more melancholic, recognising that if people can bond to particular places, they can also suffer if those bonds are threatened. This issue is a specific place-based form of longing, which is a paradigmatic example of a 'mixed' emotion, being "a blend of the primary emotions of happiness and sadness" \[[@B65-ijerph-16-05120]\], or more evocatively, "an emotional state suffused with a melancholic sweetness" \[[@B66-ijerph-16-05120]\]. With respect to place, there is melancholy in people being separated---by choice or necessity---from the place they love. Yet, there is a redemptive possibility of being reunited; and even if reunion is not possible, the longed-for place may nevertheless always be central to a person's identity. Such sentiments are reflected in words tied to specific places, including hiraeth ("a Welsh cultural longing for Wales" \[[@B67-ijerph-16-05120]\]); saudade (a "key Portuguese emotion" \[[@B68-ijerph-16-05120]\], and "an emotional state that pervades Brazilian culture and thought" \[[@B66-ijerph-16-05120]\]), and toska ("one of the leitmotifs of Russian literature and Russian conversation" \[[@B23-ijerph-16-05120]\]). There are also more generic forms of longing---not tied to specific places---as reflected in terms like the German Fernweh. This combines pain (Weh) and far (fern) to capture the alluring "call of faraway places" \[[@B69-ijerph-16-05120]\]. This may be anywhere one misses (including one's homeland), but can also apply to lands unknown (thus being a counterpart to Heimweh, i.e., 'regular' homesickness). Fernweh is augmented by terms such as Wanderlust, which has already entered English as a loanword denoting longing for travel and adventure. As a final point, one can also express idealistic longing for lands that do not even exist---but may have previously, or may yet in the future---as reflected in terms such as the Greek Arkadíā, describing an idyllic, utopian pastoral realm, where humans live in harmony with nature.
3.3. Appreciation {#sec3dot3-ijerph-16-05120}
-----------------
The third theme takes us into the realm of appreciation. There were shades of this in other themes of course. In feeling rooted to a place, for instance, this would likely include elements of appreciation for it. However, appreciation is not necessarily integral to that subtheme, and could conceivably even be absent from it. Here though, appreciation comes to the fore. Once again three subthemes have been identified: savouring, sensitivity, and aesthetics.
The first subtheme relates to people actively engaging with and enjoying nature. There are many relevant words across cultures, each with their own particular nuances. Japan for instance has a tradition of shinrin yoku---'forest bathing'---drawing on Buddhism and Shintoism, which have a rich heritage of appreciative engagement with nature \[[@B70-ijerph-16-05120]\]. It refers to the act of spending quality time in forests, and alludes to the restorative benefits of luxuriating in these spaces, literally and metaphorically. After all, a wealth of research is now emerging pointing to the impact upon wellbeing of spending time in nature, as for instance shown in Gesler's work on 'therapeutic landscapes' \[[@B71-ijerph-16-05120]\]. It appears that forests may be particularly good at offering these benefits, due to factors such as air quality, quietness, and diverse stimuli. Indeed, this has long been widely recognised and moreover harnessed in Japanese clinical contexts, where shinrin yoku is offered for the treatment of physical or psychological ailments \[[@B72-ijerph-16-05120]\]. Moreover, the practice is beginning to filter into other cultures where it is also being used therapeutically \[[@B73-ijerph-16-05120]\]. Such receptivity is unsurprising given that many cultures have comparable ideas and practices. Consider for instance the Norwegian concept of friluftsliv---'free air life'---which describes a philosophy of open-air living and being in tune with nature \[[@B74-ijerph-16-05120]\]. This notion has long been valorised by Norwegians, and Nordic nations more broadly. It is reflected in parenting and schooling practices, for example, where children regularly spend portions of the school day outside, whatever the weather; hence the saying, 'There's no such thing as bad weather, just bad clothing'---which is the title for a popular Nordic parenting book \[[@B75-ijerph-16-05120]\].
The second subtheme is sensitivity: being attentive and receptive to the details of the natural world. This follows from the first subtheme, in that savouring nature includes playing close attention to it, and developing a fine-grained appreciation of its nuances. An example of this lexical granularity can be found in how cultures delineate the seasons. For instance, Japanese identifies 72 distinct kō (micro-seasons) lasting five days each, such as kōgan kitaru (wild geese return), from the 8th--12th October. A related case of cultural variation---yet also commonalities---is around the traditions that have emerged with respect to seasonal change. In late October, say, are a wealth of related occasions marking the autumnal transition from summer to winter, such as Samhain, a Gaelic festival with Celtic Pagan origins. Granularity can also be found regarding features of the environment. A well-known example is the notion that Eskimo--Aleut languages possess many different words relating to snow and ice, such as aqilokoq, an Inuktitut term denoting gently falling snow. The issue is complicated, since such languages are agglutinative, creating complex words by combining morphemes. Thus, some linguists argue they do not possess greater complexity than English (for instance), since the latter can use adjectives to the same effect \[[@B76-ijerph-16-05120]\]. However, pragmatically, Eskimo culture is influenced by an environment dominated by snow and ice in ways that most English-speaking cultures are not. As such, Eskimo--Aleut languages contain many more relevant words in common usage than English. Analysing the North Sami language, for instance, Magga points out that knowledge of snow and ice is a "necessity for subsistence and survival", and estimates over a thousand such lexemes in common usage \[[@B77-ijerph-16-05120]\].
The third subtheme brings an explicitly aesthetic dimension to the sensitivity above, focusing on the beauty and quality of the natural world. A good example is provided by Zen, a 'branch' of Buddhism that took root in China around the fifth century CE---when it mingled with the native Taoism---and flowered in Japan from the 12th century onwards \[[@B78-ijerph-16-05120]\]. While summarizing a tradition as rich as Zen is difficult, overall it constantly seeks to overcome the limitations of conceptual thought, and point directly into the 'suchness' (i.e., nature) of reality, enabling a "direct, intuitive experience" of it \[[@B79-ijerph-16-05120]\]. Central to this goal is the cultivated appreciation of certain aesthetic qualities regarded as pervading existence \[[@B80-ijerph-16-05120]\]. This includes perceiving these qualities in nature, and expressing them in art (as perfected by the nature-focused haiku of the 17th century poet Bashō, for example). An influential summary of these principles is provided by Hisamatsu in his classic Zen and the Fine Arts \[[@B81-ijerph-16-05120]\]. He identifies seven key principles: kanso (roughly defined as elegant simplicity, and absence of clutter and ornamentation); fukinsei (asymmetry or irregularity); koko (austere sublimity, or beauty in aged or weathered phenomena); shizen (spontaneous naturalness, and absence of premeditation); daisuzoku (freedom from routine); seijaku (tranquillity, stillness, and purity); and yūgen (profound grace, and obscure, ineffable depth). In Zen, these are all regarded as inherent qualities of nature, and of existence more broadly. Cultivating aesthetic sensitivity to these is therefore seen as a particularly efficacious route to the direct understanding of reality, and hence to wellbeing, and even farther to the ultimate goal of enlightenment itself \[[@B82-ijerph-16-05120]\].
4. Conclusions {#sec4-ijerph-16-05120}
==============
This paper has sought to enhance our vocabulary around engagement with the natural world by exploring relevant untranslatable words. The context is the contention that the climate crisis can be traced in part to the disconnected modes of interaction with nature that have become dominant worldwide, particularly in Western and/or industrialised countries. One response to this situation is to learn from cultures and subcultures that have cultivated less destructive modes (encompassed under the rubric 'eco-connection'), in this case by engaging with untranslatable words from their languages. As part of an ongoing project to identify such words, around 150 relevant terms were located. Three main themes were identified---each with three subthemes---as shown above in [Figure 1](#ijerph-16-05120-f001){ref-type="fig"}.
This tripartite framework is a promising start in enhancing our understanding of eco-connection. However, it cannot yet be regarded as a fully-fledged theory, since that would be beyond the remit of the analysis here. For a start, the lexical search undertaken remains partial and a work-in progress, given that the lexicography currently only features around 120 languages, out of some 7000 worldwide. There are thus likely to be many relevant terms missing from the analysis and the lexicography as it stands. Moreover, some cultures and traditions have been considered in more depth than others (e.g., Zen), reflecting my interests, which drove the conceptual snowballing in certain directions. As such, the analysis is not a complete account of all the potential words that exist pertaining to eco-connection. It is rather an imperfect snapshot of the current lexicography with respect to this emergent category, one that is partial and subject to revision. Thus, further research will be needed, both to develop the lexicography more generally, and also to substantiate and refine this analysis of eco-connection specifically. To that end, several avenues of research have been identified and are starting to be pursued. For instance, I have been awarded a grant to work with specialists in machine learning to use such methods to progress the lexicography (e.g., identifying and analysing relevant words). Plans are also underway to devise a research program of in-depth interviews with speakers across the world's languages (ideally covering at least one language per country). With such initiatives, it is possible that the analysis above will be refined and updated (e.g., new themes or subthemes relating to eco-connection may be identified). The presentation above also has other limitations too besides some cultures and languages not yet being included in the analysis. For instance, it would be possible to structure the thematic analysis in other ways. In fact, at earlier points in the analysis, other thematic solutions were identified. Consideration was initially given to an additional sub-theme of 'immersion' in nature, for example, but in the end, it was felt this could simply be enfolded within the subtheme of savouring. As a final point on limitations, the elucidation of the words here has been inevitably restricted by attempting an overarching comparative analysis within the constraints of a brief article. Translation is always a problematic exercise, so it will not have been possible to arrive at definitions that would satisfy all speakers of the donor language. Given the fluidity and complexity of language use, there are generally numerous ways of interpreting a given word. Thus, the descriptions here are merely one way of elucidating these terms, based on my interpretation of the source material. That said, dictionaries and scholarly sources were consulted in the aim of arriving at valid descriptions.
However, even with its limitations, the analysis above is still useful in providing a vocabulary with which to better understand and articulate this important notion of eco-connection. In turn, the development of such a vocabulary may hopefully play a role---however minor---in helping humankind develop more constructive relationships with nature. Indeed, I believe there to be an appetite for this kind of endeavour, and moreover evidence it can bear fruit, with benefits to public health. A case in point is the work of Robert Macfarlane. In his book Landmarks \[[@B83-ijerph-16-05120]\], he charts the wealth of nature-related words found in the various tongues of the British Isles (showing that we often overlook the lexical richness in our own backyard). These include, for instance, the Gaelic term èit---from the Isle of Lewis---which denotes the act of placing pieces of quartz in a stream so that they sparkle in the moonlight and attract salmon. He followed this up with an illustrated book, The Lost Words \[[@B84-ijerph-16-05120]\], with the premise that nature-related words have been disappearing from the languages of Britain, but that efforts can be made to reanimate this vocabulary. Of particular encouragement is the sheer enthusiasm of the public response. For instance, campaigns have unfolded organically to ensure schools have copies in their library, with children embracing the project \[[@B85-ijerph-16-05120]\]. An album has also been composed to complement the book, which has been received to considerable acclaim (<https://www.thelostwords.org/>). While just one example, it does demonstrate the potential---and indeed the public desire---for developing more adaptive relationships with nature. Moreover, it shows the value and promise of using language in service of this goal. It is hoped this paper may also contribute to this aim, and in doing so help improve our connection with the natural world upon which our wellbeing and indeed very survival depends.
This research received no external funding.
The author declares no conflict of interest.
{#ijerph-16-05120-f001}
|
The recent financial crises, alongside a dramatic rise in unemployment on both sides of the Atlantic, suggest that financial shocks do translate into the labor markets. In this paper we first document that financial recessions amplify labor market volatility and Okun's elasticity over the business cycle. Second, we highlight a key mechanism linking financial shocks to job destruction, presenting and solving a simple model of labor market search and endogenous finance. While finance increases job creation and net output in normal times, it also augments their aggregate response in the aftermath of a financial shock. Third, we present evidence coherent with the idea that more leveraged sectors experience larger employment volatility during financial recessions. Theoretically, the job destruction effect of finance works as follows. Leveraged firms may find themselves in a position in which their liquidity is suddenly called back by the lender. This has direct consequences on a firm ability to run and manage existing jobs. As a result, firms may be obliged to shut down part of their operations and destroy existing jobs. We argue that with well-developed capital markets, firms will have an incentive to rely more on liquidity, and in normal times deep capital markets lead to tight labor markets. After an adverse liquidity shock, firms that rely much on liquidity are hit disproportionally hard. This may explain why the unemployment rate in the US during the Great Recession increased more than in European countries experiencing larger output losses. Empirically, the paper uses a variety of datasets to test the implications of the model. At first we identify crises that, just like in the model, caused a sudden reduction of liquidity to firms. Next we draw on sector-level data on employment and leverage in a number of OECD countries at quarterly frequencies to assess whether highly leveraged equilibria originate more employment adjustment under financial recessions. We find that highly leveraged sectors and periods are associated with higher employment- to-output elasticities during banking crises and this effect explains the observation of higher Okun's elasticities during financial recessions. We also argue that the effect of leverage on employment adjustment can be interpreted as a causal effect, if our identification assumptions are considered plausible. All this amounts essentially for a test of the labor demand channel of adjustment. |
Introduction
============
Plants have the capacity to control both the number and position of axillary buds activated to form branches and how these branches grow. This self-regulation of axillary bud development is referred to as correlative control and includes the processes of both apical dominance and correlative inhibition. The latter includes both apical control, defined as the suppression of growth of an already growing branch imposed by the growth of a higher dominating branch or shoot (see [@bib9]), and the inhibitory influence of basal branches on distally located axillary buds and branches ([@bib4]; [@bib31]; [@bib15]; [@bib18]). There is strong evidence of an important role for the basipetal movement of auxin in the polar auxin transport stream from the shoot apical bud down the primary stem in the regulation of apical dominance ([@bib32]), but its influence on correlative inhibition is more debatable. For instance, whereas intra-plant transport of auxin was established as a causal factor in correlative inhibition in two-branched *Pisum sativum* ([@bib28]; [@bib25]), it was ruled out as a factor in *Ipomoea nil* ([@bib9]). Despite intensive study, the various pathways of auxin action in regulating the initiation and maintenance of axillary bud outgrowth have remained somewhat contentious, although very recently, following the identification of the inhibitory hormone, strigolactone ([@bib19]; [@bib52]), progress has been made in understanding the role of auxin--strigolactone interactions ([@bib7]; [@bib13], [@bib15]; [@bib18]; [@bib21]; [@bib10]; [@bib26]). The models presented by these authors are based on evidence suggesting that the polar flow of auxin from the shoot apical bud acts directly to down-regulate the AXR1/TIR1/cytokinin synthesis pathway in the region of the stem adjacent to an axillary bud, while at the same time it up-regulates the MAX/RMS/DAD pathway for strigolactone synthesis. Polar flow of auxin from axillary buds into the main stem then plays a role in facilitating their continued development ([@bib37]; [@bib7]). [@bib7] suggest a direct role for auxin in stimulating strigolactone synthesis in the vascular cambial cells through which auxin is transported ([@bib5], [@bib6]; [@bib43]) so that strigolactone functions downstream of auxin in a manner that supports the classical second messenger theory of apical dominance ([@bib41], [@bib42]). However, [@bib10] found that strigolactone was not capable of inhibiting isolated buds and required auxin flow in the associated stem to become an effective inhibitor. There is little controversy regarding the down-regulating effect auxin has on cytokinin synthesis ([@bib39]) and the importance of cytokinin synthesis in the region of a stem local to a bud for the stimulation of its outgrowth ([@bib30]; [@bib44]; [@bib15]; [@bib18]).
Comparatively recently, a further role for polar auxin transport in the regulation of axillary bud outgrowth has been described in a mechanism known as the auxin transport capacity theory ([@bib23]; [@bib2]; [@bib14]; [@bib32]; [@bib31]). This theory is based on the premise that there is competition between an axillary bud and the main stem apex in their ability to export auxin into the auxin transport stream of the main stem as the latter has limited capacity to transport auxin and a bud must be able to export auxin into it in order to grow ([@bib37], [@bib38]). [@bib31] have described in more detail the earlier work on which the theory is based, including that of [@bib25] relating the concept to correlative inhibition. However, recently, [@bib7] found for both pea and *Arabidopsis* that the main stems are capable of instantly transporting additional auxin in excess of endogenous levels and that direct application of the auxin transport inhibitor NPA (*N*-1-naphthylphthalamic acid) to the buds of strigolactone mutant pea plants fails to stop the initial outgrowth of buds, whereas outgrowth is completely prevented by the application of the synthetic strigolactone, G24. These findings indicate that auxin transport capacity is unlikely to have a strong controlling influence on the initiation of bud outgrowth but may influence the continued development of the bud. However, [@bib35] demonstrated that the mechanistic basis for an indirect action of auxin on bud inhibition could be the positive feedback between auxin flux and polarization of active auxin transport. Furthermore, these authors, based on an L-system modelling exercise, found that the assumption of saturation of auxin transport capacity in the main stem was not necessary for auxin transport inhibition of branching. In acknowledgement of this finding, the theory was renamed as the canalization hypothesis ([@bib24]). This hypothesis is based on auxin transport and canalization of auxin transport pathways from axillary buds into the main stem, which acts as a sink for auxin. If the sink strength in the main stem is strong, then canalization of the auxin efflux pathway from buds will occur and stimulate bud outgrowth, whereas weak sink strength prevents such canalization and growth is prevented. Additionally, [@bib26] found in chrysanthemum (*Dendranthema grandiflorum*) that strigolactones only effectively inhibited bud outgrowth when in the presence of a competing auxin source, which supports the hypothesis that strigolactones inhibit bud outgrowth by modulating auxin transport canalization. [@bib10] have since confirmed this finding and shown that strigolactones act by damping auxin transport, thereby enhancing competition between developing branches. Auxin was also found to mediate the feedback by strigolactone on strigolactone biosynthesis ([@bib26]).
The regulation of branching in white clover (*Trifolium repens* L.), a perennial nodally rooting prostrate-stemmed herb, differs from that of the annual erect-stemmed species of *Arabidopsis thaliana*, *Pisum sativum*, and *Petunia hybrida* in which apical dominance plays a major role. In contrast, in *T. repens* the regulatory processes are dominated by a net root-derived stimulatory signal (NRS) that is transported acropetally in the vascular tissues ([@bib47], [@bib48]). Sectorial responses in the shoot immediately distal to nodal roots, and the predominantly acropetal transport of NRS from them ([@bib46]), suggest that this transport initially occurs in the transpiration stream.
When a stem cutting of *T. repens* is rooted only at its base, it is unable to sustain continued branching along the stem, and the rate of development of successively produced axillary buds declines from node to node ([@bib49]). The primary factor driving this decline in bud outgrowth is hypothesized to be the decline in NRS availability throughout the shoot system distal to a nodal root concomitant with the continued development of the shoot ([@bib47]). It is suggested that this decline in NRS results because the increase in NRS production by roots does not match the increasing demand for it by the ever-enlarging shoot system and that this leads to the signal becoming increasingly scarce within the shoot. This decline in NRS availability is significant because the activation level (growth rate) of any particular axillary bud is related to the NRS available to it immediately following its emergence from its parent apical bud. This activation level is then retained for at least 6 weeks ([@bib46]).
Excision of any number of branches distal to a nodal root promotes the outgrowth of a corresponding number of buds further along the stem so that ultimately the same complement of branches is formed ([@bib50]). Thus it is the number of elongating intact branches intercalated between a nodal root and a distal axillary bud that determines the likelihood of outgrowth of that bud ([@bib50]; [@bib48]). The question is thus raised as to possible mechanisms by which previously formed basal branches inhibit the outgrowth of axillary buds distal to them.
The possibility that the excision of buds/branches precipitates a 'non-auxin fast decapitation signal' that primes axillary buds for growth as described for pea ([@bib29]; [@bib18]) seems unlikely. In *T. repens*, axillary buds are already 'primed for growth' when they emerge from their parent apical bud. At this stage they are actively producing leaf primordia at the same rate as the apical bud ([@bib45]) and this growth rate is then up- or down-regulated according to NRS availability ([@bib46]). Furthermore, during the frequent use of decapitation as a manipulative treatment of primary and branch stems ([@bib51]; [@bib46], [@bib47], [@bib48]), no response in basally positioned axillary buds well distanced from the decapitation site similar to that found in pea ([@bib29]; [@bib18]), or consistent with these treatments initiating outgrowth responses via their disturbances of the hydraulic conductivity of tissues ([@bib27]), has been observed.
The major possible mechanisms of control by basal branches can be simplified down to two distinctly different possibilities in which these branches either feed a basipetally transported inhibitory influence into the shoot system via the symplast or function as sinks for a stimulatory root-derived bud activation signal (NRS) transported via the apoplast. These possibilities in turn give rise to the following three hypotheses, or combinations thereof, as mechanisms of control: (I) the apical buds on branches produce a phloem-mobile inhibitory signal, such as the branch-derived feedback signal proposed by [@bib15], that is transported down the branch and then moderates the synthesis of branching signals for acropetal movement in the primary stem; (II) the polar flow of auxin from branches limits further branch development by moderating branching signals such as cytokinin and strigolactone synthesized within the root or stem system that in turn regulate bud outgrowth as suggested in the second messenger ([@bib42]) or the auxin transport canalization ([@bib24]; [@bib10]) theories; or (III) branches function as sinks for a root-derived stimulatory signal (NRS) thereby decreasing its availability to more distally located axillary buds. Experiments were designed to test the first two hypotheses and to determine whether responses were consistent with the third remaining as a possibility for further testing.
Materials and methods
=====================
Plant material
--------------
*Trifolium repens* L. (white clover) plants used in both experiments were derived from a greenhouse-grown stock clone of a single genotype selected from a Spanish ecotype collection (AgResearch Accession number C1067) as previously described (see [@bib50]; [@bib46], [@bib47]).
Hormone materials
-----------------
To produce the hydrous lanolin paste, anhydrous lanolin was melted before water was added in the ratio 3:2 (lanolin:water) by weight, and the mixture was vigorously stirred.
For the NAA lanolin paste, 1-naphthaleneacetic acid (NAA) dissolved in a drop of ethanol was added to the molten hydrated lanolin paste (10 mg of NAA g^−1^ hydrated lanolin) and stirred so as to mix thoroughly.
For the NPA lanolin paste, NPA dissolved in ethanol was added to the molten hydrated lanolin paste (10 mg of NPA g^−1^ hydrated lanolin) and stirred so as to mix thoroughly.
Culture of experimental plants
------------------------------
Plants were grown from stem tip cuttings planted on 1 July 2009 (Experiment 1) and 14 January 2010 (Experiment 2) in a commercially obtained potting mix ([@bib49]) in 1.8 l plastic pots. After ∼3 weeks, the two or three basalmost branches formed by this time were trimmed off each plant to leave a single stem axis growing away from its basal root system. All lateral branches that grew out subsequently from this main stem were retained. The oldest phytomer on the main stem that retained a branch at its node was termed phytomer 1 (P1) and later formed ones were termed P2, P3, etc. ([Fig. 1A](#fig1){ref-type="fig"}). Outgrowth of nodal roots was prevented by growing shoot systems out over a dry plastic mesh. Throughout both experiments, plants were grown in a heated greenhouse in natural photoperiods at average maximum/minimum temperatures of 25/12 °C.
{#fig1}
Methods
-------
### Experiment 1
This experiment was designed to test the validity of each of the three hypotheses proposed in the Introduction as mechanisms by which established branches might regulate the development of axillary buds distal to them.
When the branches at P1--P6 had formed ≥6 expanded leaves, the leaves and axillary buds at the oldest, basalmost, two nodes of each were excised to provide an unobstructed surface on which to apply the experimental treatments. Plants then were grown on until their main stems had 16--18 expanded leaves and 9 or 10 elongating primary branches ([Fig. 1A](#fig1){ref-type="fig"}), at which time, 15 October 2009, treatments were imposed. Plants were assigned to replicates such that uniformity within replicates was maximized and then randomly assigned to treatments within replicates.
Treatments were applied to the middle of the second internode (the internode distal to the first node) on each of the six primary branches formed at P1--P6 in the treatment zone of the primary stem (see [Fig. 1](#fig1){ref-type="fig"}), leaving the remainder of the plant untreated. The effects of these treatments on the development of axillary buds on the branches and on the main stem at and distal to P7 (the distal response zone) were then assessed over a 2 week period and the responses used to identify the most likely regulatory mechanism (see [Table 1](#tbl1){ref-type="table"}).
######
For Experiment 1, the suite of positive branching responses in the distal response zone of the shoot that is predicted to occur if Hypothesis I, II, or III is correct
Hypothesis Treatment
---------------------------------- ----------- --- ---- ---- ----
I. Phloem-mobile inhibitor -- √ √ √ --
II\. Auxin transport -- √ √ -- √
III\. Branches are sinks for NRS -- √ -- √ --
Treatments given were as follows ([Fig. 1B](#fig1){ref-type="fig"}).(1) Control: plants were untreated except for the application of hydrous lanolin paste to the second internode of each of the first six basal branches \[[Fig. 1B, (1)](#fig1){ref-type="fig"}\] as a control for treatment 5, below.(2) Debranched: the six oldest basal branches were each excised distal to their lowest node by cutting through the middle of their second internode \[[Fig. 1B](#fig1){ref-type="fig"}, [(2)](#fig2){ref-type="fig"}\]. Hydrous lanolin paste was applied to the ends of the remaining branch stumps as a control for treatment 4, below. This treatment prevented the possible export of phloem-mobile signals (Hypothesis I) and polar auxin flow (Hypothesis II) from them and it prevented the functioning of basal branches as sinks for transported NRS (Hypothesis III).(3) Girdled: molten candle wax heated to 110 °C was applied via a custom-built Perspex chamber to a 10 mm segment of the second internode on each of the six oldest basal branches ([Fig. 2](#fig2){ref-type="fig"}). Transmission electron microscopy (see [Supplementary Fig. S1](http://jxb.oxfordjournals.org/cgi/content/full/erq330/DC1) available at *JXB* online) verified that this treatment kills all living cells in the girdled stem segments, thereby preventing all symplastic transport out of the branches back into the primary stem (Hypotheses I and II) while leaving branches present to receive xylem-transported substances inclusive of NRS (Hypothesis III) ([@bib41]; [@bib11]; [@bib53]).(4) Debranched+auxin: the six basal branches were excised as in treatment 2 but NAA was applied in lanolin paste to the cut ends of the branch stumps \[[Fig. 1B, (4)](#fig1 fig4){ref-type="fig"}\]. This treatment prevented the possible export of phloem-mobile signals (Hypothesis I) and the possibility of basal branches receiving NRS (Hypothesis III), but allowed the possibility of polar flow of auxin from branch stumps back into the main stem (Hypothesis II) by substituting a source of auxin at their cut ends.(5) Auxin transport inhibitor: NPA was applied in lanolin paste around a 10 mm segment of the second internode of each of the six basal branches \[[Fig. 1B](#fig1){ref-type="fig"}, (5)\]. This treatment was expected to prevent the polar flow of auxin out of the branches (Hypothesis II) while allowing export of all other phloem-mobile compounds from them into the main stem (Hypothesis I) and the possibility for branches to function as sinks for NRS (Hypothesis III).
{#fig2}
In all treatments, the lanolin-based applications were reapplied twice weekly. A randomized block design was used for the experiment with the five treatments replicated eight times.
The developmental state of each plant at the time experimental treatments were imposed was assessed by measuring the lengths of all branches and main stems and counting the number of emerged leaves on each using the Carlson scale of leaf development ([@bib8]). Lengths and leaf numbers were then reassessed 7 d after treatment in the portion of the plant distal to the six treated branches (i.e. in the distal response zone from P7 onwards, [Fig. 1](#fig1){ref-type="fig"}), and again after 14 d in the whole plant. Shoots were then divided into three portions: the six branches in the basal treatment zone ([Fig. 1A](#fig1){ref-type="fig"}); all branches in the distal response zone from P7 onwards; and the whole of the main stem including its leaves. Dry weights of these portions were then determined after drying to constant weight for 4 d in a draught oven at 60 °C.
### Experiment 2
This experiment was designed (i) to test whether the auxin (NAA) and auxin transport inhibitor (NPA) treatments as applied in the previous experiment induced morphological responses consistent with them effectively altering auxin transport within *T. repens* and (ii) to assess their involvement in the responses to decapitation of stems.
The hormone pastes used in this experiment were prepared as for Experiment 1 and reapplied to plants twice weekly. Cuttings were grown on until their main stems had 12 fully expanded leaves, at which time (6 March 2010) the following treatments were applied to the internode distal to the 12th leaf.(1) Control: in which the main stem was left intact and lanolin paste was applied around a 10 mm section of the internode distal to leaf 12.(2) Decapitation: stem apical tissues were excised distal to the leaf and axillary bud at P12 and lanolin paste was applied to the cut surface of the stem.(3) Decapitation+NAA: decapitated as in treatment 2 and NAA supplied in lanolin paste applied to the cut stem surface.(4) NPA: the main stem remained intact and NPA in lanolin paste was applied to a 10 mm section of the internode distal to leaf 12.
Each plant was assessed at the time of treatment and again 7 d and 14 d after treatment by measuring the length of all buds/branches and counting the number of emerged leaves using the Carlson scale of leaf development ([@bib8]). Each treatment was replicated eight times and the trial finished on 1 April 2010.
Analysis of data
----------------
For Experiment 1, axillary buds and branches were identified by the position of their phytomer of origin on the main stem or on any other stem of higher branching order. Branches originating from the main stem were termed primary branches, those originating from them secondary, and those originating from secondary branches, tertiary.
The dry weight data in [Table 2](#tbl2){ref-type="table"} were analysed by one-way analysis of variance (ANOVA) within the Excel 2007 package. All other data relating to growth of branching stems were analysed in R software (R Development Core Team, 2009) by ANOVA using a generalized linear mixed model with treatment as a 'fixed effect' and replicate as a 'random effect' within the package 'nlme' ([@bib34]), except for the data set for stem length of secondary branches in the response zone which contained many zero values and lacked a normal distribution. This data set was analysed using the generalized linear mixed model with Poisson distribution in the package 'lme4' ([@bib1]). In all cases, the treatment means generated by the appropriate model along with the associated LSD~5%~ are presented in the tables and in [Fig. 3](#fig3){ref-type="fig"}.
######
Dry weights (g) of the three shoot portions (stem plus leaves) of plants of each treatment at the end of Experiment 1; *n*=8
Shoot portion Treatment
---------------------- ----------- ------ ------- ------ ------- ------- ------------
Six treated branches 17.32 -- 19.41 -- 17.94 4.230 0.59 NS
All distal branches 2.44 3.61 1.98 3.42 2.49 0.592 1.60\*\*\*
Main stem 1.56 1.71 1.42 1.62 1.53 0.203 2.47 NS
NS, not significant; \*\*\**P*\<0.001.
{#fig3}
For Experiment 2, the length of the axillary bud stems forming at phytomer positions 9--12 for all four treatments were separately analysed at each phytomer position for treatment differences by one-way ANOVA in GenStat ([@bib33]). At P13, as the lengths of the axillary bud stems in the control and NPA treatments were both approaching zero ([Fig. 4](#fig4){ref-type="fig"}), no tests were undertaken.
{#fig4}
Results
=======
Experiment 1: shoot dry weight
------------------------------
The control, girdled, and NPA treatments had similar dry weights for all three plant portions ([Table 2](#tbl2){ref-type="table"}). The distal branch dry weights in the debranched and debranched+auxin treatments were significantly (*P* \<0.05) greater than in the other three treatments. Dry weight of the main stem in the debranched treatment was greater (*P* \<0.05) than that of the girdled treatment.
Experiment 1: growth and branching of the six basalmost treated branches (treatment zone)
-----------------------------------------------------------------------------------------
Growth of the six girdled stems was slightly reduced relative to that in the control and NPA treatments. The increments of growth over the 14 d experimental period on the six treated basal primary branch stems of the control, girdled, and NPA treatments as assessed by the summed increase in length and total number of new leaves to emerge on them were 527, 313, and 436 mm (LSD~5%~ 153.0) and 20.4, 16.7, and 19.7 (LSD~5%~ 2.72), respectively.
The increase in number of secondary and tertiary branches developing on the six treated basal primary branch stems over the 14 d experimental period did not differ significantly among the control, girdled, and NPA treatments ([Table 3](#tbl3){ref-type="table"}). An apparent 30% decrease in elongation of girdled branches relative to control and NPA treatments was not statistically significant.
######
The increase on the six basalmost treated branches (at P1--P6) in total number and length of secondary branches (2°) and in the number of leaves on them over the 14 d experimental period, and the number and length of tertiary branches (3°) at the end of Experiment 1 in the control, girdled, and NPA treatments
Treatment
----------------- ----------- ------ ------ -------
**2° branches**
Number 15.6 16.4 17.1 4.64
Length (mm) 1399 1035 1283 373.7
No. of leaves 76.4 72.5 78.9 17.91
**3° branches**
Number 41.9 42.0 44.3 19.04
Length (mm) 254 197 289 204.3
Means are presented, *n*=8, along with the LSD~5%~ obtained from the appropriate ANOVA.
Experiment 1: growth and branching in the distal response zone tissues (P7 onwards)
-----------------------------------------------------------------------------------
### The main stem distal to the treated branches
Over the 14 d response period the main stem produced more leaves in the debranched and debranched+auxin treatments than in the control, girdled, and NPA treatments. Girdled plants produced fewer leaves than controls ([Table 4](#tbl4){ref-type="table"}). The increase in length of the main stem over the 14 d period in the debranched treatments, both with and without auxin, was approximately double that of the control, girdled, and NPA treatments. These trends were already evident after 7 d.
######
For Experiment 1, the increase in leaf number and stem length of the main stem and increase in number and length of primary branches and number of leaves on them in the distal response zone of plants from phytomer 7 onwards in response to treatments after 7 d and 14 d
Treatment
---------------------- ------ ----------- ------ ------ ------ ------ -------
**Main stem**
Number 7 d 1.12 1.54 0.77 1.52 0.91 0.453
14 d 2.72 3.46 1.86 3.59 2.35 0.672
Length (mm) 7 d 20 34 13 31 16 18.1
14 d 42 66 25 83 28 30.0
**Primary branches**
Number 7 d 1.12 2.38 0.75 2.75 0.50 1.090
14 d 2.12 4.75 1.50 5.38 1.88 1.389
Length (mm) 7 d 121 173 74 165 108 48.7
14 d 239 429 132 422 210 99.5
No. of leaves 7 d 7.0 13.0 5.5 12.4 7.3 2.13
14 d 15.7 27.7 12.1 29.0 16.9 3.10
Means are presented, *n*=8, along with the LSD~5%~ obtained from the appropriate ANOVA.
Outgrowth of axillary buds along the main stem to form primary branches was also stimulated by debranching. Both the number of new buds showing leaf emergence after 14 d and their length at that time were greater (*P* \<0.05) in debranched plants than in control, girdled, and NPA treatments. Bud outgrowth in response to NPA treatment was similar to that in control plants, but girdled plants gave a lower value than the control treatment ([Table 4](#tbl4){ref-type="table"}). This trend was also evident after 7 d of treatment.
Experiment 1: development of the distal primary branches (P7 onwards)
---------------------------------------------------------------------
The increases in the length of primary branch stems from P7 onwards, and in the total number of leaves on them, in the control, girdled, and NPA treatments were approximately half those of the debranched and debranched+auxin treatments after both 7 d and 14 d of treatment ([Table 4](#tbl4){ref-type="table"}). Values for the girdled treatment were significantly lower than those of the control treatment. The increase in number of secondary branches formed on these primary branches and in the number of leaves on them, and in their length over both 7 d and 14 d of treatment, were all similar in the control, girdled, and NPA treatments. These were approximately only one-third and 5%, respectively, of the values for the number and stem length recorded in the debranched and debranched+auxin treatments after 14 d, however ([Fig. 3](#fig3){ref-type="fig"}).
Experiment 2
------------
Decapitation relative to the control treatment increased bud stem length at all four of the youngest remaining phytomers (P9--P12), significantly so at P10--P12 ([Fig. 4](#fig4){ref-type="fig"}). Application of NAA to the decapitated stump decreased bud lengths at P11 and P12 relative to the decapitated treatment, so that they matched those of the untreated controls. No significant influence of NAA in reversing the effect of decapitation was apparent at P9 and P10, however. For phytomer positions 10, 11, and 12, but not at P9, there was a consistent trend for the NPA treatment to increase bud stem lengths relative to the control treatment.
Discussion
==========
The response pattern predicted by Hypotheses I and II for a regulatory influence on axillary bud outgrowth via translocation of either a phloem-mobile inhibitory signal or of auxin out of branches included a positive response to the girdled treatment ([Table 1](#tbl1){ref-type="table"}) as this would have prevented their efflux from branches by killing all living cells in the treated stem segment. This, however, was not observed; outgrowth of axillary buds to form secondary branches in the distal response zone in the girdled treatment did not differ significantly from that in the control treatment ([Table 4](#tbl4){ref-type="table"}; [Fig. 3](#fig3){ref-type="fig"}). The debranched+auxin and NPA treatments were included to distinguish between the possible action of auxin transport mechanisms and of a non-auxin phloem-mobile inhibitory signal should a positive response to the girdled treatment have been observed. The lack of any positive branching response to the girdled and NPA treatments, together with the failure of exogenously supplied auxin to down-regulate the large branching response to debranching in the debranched+auxin treatment, indicates that neither polar auxin flow nor phloem-mobile signal movement out of branches ([@bib15]) plays any significant part in the correlative inhibition of distal branching by established proximal branches in *T. repens*. It is most unlikely that the lack of responses to applications of NAA and NPA in Experiment 1 was caused by the failure of the lanolin pastes to deliver biologically meaningful quantities of hormone: the results of Experiment 2 ([Fig. 4](#fig4){ref-type="fig"}) suggest that both these treatments were effective in manipulating auxin flow within *T. repens* stems. That polar auxin flow did occur in Experiment 1 is indicated by a slight thickening of branch stems that was manifest immediately distal to their girdles ([Fig. 2](#fig2){ref-type="fig"}) in a similar way to that described by [@bib18] as a result of auxin accumulation in *Pisum*. An additional consequence of girdling was that the supply of carbon from the large basal branch systems back into the main stem and roots would also have been blocked. This probably accounted for the non-significant trends for increased dry weight of basal branches, the decreased distal branch dry weight, and the tendency for there to be reduced leaf appearance rates and lengths of the main stems and distal primary branches in the girdled as opposed to the untreated control plants ([Tables 2](#tbl2){ref-type="table"}, [4](#tbl4){ref-type="table"}). Thus even though these intra-plant adjustments to accommodate an altered carbon balance were occurring in girdled plants, they did not significantly influence the outgrowth of higher order branches either on the treated basal primary branches ([Table 3](#tbl3){ref-type="table"}) or in the distal response zone over the 14 d response period ([Table 4](#tbl4){ref-type="table"}; [Fig. 3](#fig3){ref-type="fig"}).
Two key findings were consistent in supporting the alternative hypothesis (Hypothesis III) that correlative inhibition of branching in distal plant parts results from existing branches functioning as sinks for a root-derived branching promoter (NRS). The first of these, that growth and branching on the girdled P1--P6 branches continued at rates approaching those in the control treatment ([Table 3](#tbl3){ref-type="table"}), indicates that delivery of NRS to them was sufficient for branch development and provides direct evidence that the transport of NRS into them occurs predominantly via the xylem ([@bib47]). This also demonstrates the continued functioning of xylem within the girdled zone ([@bib41]). Secondly, the strong branching response of the main stem and primary branches in the distal response zone to basal debranching ([Table 4](#tbl4){ref-type="table"}; [Fig. 3](#fig3){ref-type="fig"}), with or without applied auxin, is consistent with the distribution of NRS to the distal portion of the plant that would otherwise have been allocated to the P1--P6 basal branches ([@bib50]; [@bib46], [@bib47]).
The nature of the mechanism by which debranching stimulates bud outgrowth in distal regions of the shoot is uncertain. Bearing in mind the confirmation in Experiment 1 that long-distance transport of NRS in *T. repens* is via the xylem, one obvious possibility is that excision of basal branches led to increased availability of NRS in the distal region of the main stem as a result of this region now being the only remaining transpiring portion of the shoot. As frequently observed in other species ([@bib16]; [@bib40]), it is the rate of loading of solutes into the xylem in the root system, rather than the transpiration rate, that determines their rate of delivery to the shoot system. As a result, solute concentrations in xylem sap will vary with changes in transpiration rates. That being so, and assuming an unchanged rate of loading into the xylem, the decreased volume of xylem sap in the whole shoot consequent upon basal branch excision would be expected to lead to an increased concentration of NRS in the sap. Thus, all of the NRS loaded into the xylem would now be delivered to the distal region, very probably at an increased concentration that could lead to the observed boost to outgrowth of distal axillary buds.
The long-distance movement of NRS signal within the shoot might not always necessarily be solely via the xylem, however. This is indicated, for instance, by the results of an experiment designed to demonstrate the relationship between transpiration rate and axillary bud outgrowth in *T. repens* (see [Supplementary Table S1](http://jxb.oxfordjournals.org/cgi/content/full/erq330/DC1) at *JXB* online). In this experiment, in which basal branches were enclosed in clear plastic bags fastened so as to reduce transpiration severely, with the remainder of the plant left untreated, it was predicted that reduced transpiration of the basal bagged branches would restrict flow of xylem sap into them and reduce bud outgrowth on them by reducing delivery of NRS. As a result, bud outgrowth in the freely transpiring distal region of the shoot would be stimulated in response to its receipt of almost all the root-synthesized NRS loaded into the xylem. This did not happen; axillary bud outgrowth on the basal branches continued despite reduced transpiration and there was no increase in bud outgrowth in the distal shoot portion. This suggests relatively ready delivery of NRS to the buds of basal branches by mechanisms other than by movement in the transpiration stream. Significantly, in addition, when basal branches are 'disbudded' ([@bib50]) by removing just their actively growing axillary and apical buds, the large bud outgrowth response in the shoot distal to the 'disbudded' branches is very similar to that observed when whole branches are excised ([@bib50]). This is so despite the impact on branch transpiration being minimal and the delivery of NRS into branches via the xylem therefore being little affected. Results from Experiment 1 in this study indicate that this response was not driven by decapitation effects on the movement of auxin or any phloem-mobile signals from these branches. Thus another possibility is that the NRS delivered to the 'disbudded' basal branches, but not utilized in bud outgrowth, is returned to the main stem possibly in the phloem. Hence it would appear that NRS is synthesized in roots, where it is loaded into the xylem, and that initial transport from roots to the shoot is via the xylem in much the same way as mineral nutrients are initially transported via the xylem. However, once in the shoot, it appears that other transport mechanisms are available for its distribution. These possibilities remain to be tested.
The nature of the NRS signal is currently unknown. The known promoters of axillary bud outgrowth are cytokinin ([@bib18]) and a recently documented root-synthesized signal which was found when either the *CCD7/DAD3* or *CCD8/DAD1* genes were mutated in *Petunia* ([@bib12]; [@bib22]). Results from the present study are not able to distinguish between these possibilities. It is unlikely that nutrients are the NRS signal involved as additional nutrient supplied in a foliar spray to non-rooted shoot portions stimulates both the rate of growth and size of shoot organs but fails to restore axillary bud outgrowth in the non-branching shoot zone of *T. repens* plants ([@bib20]). A predicted reduction in supply of auxin to roots, brought about by girdling or auxin transport inhibition in the NPA treatment, did not increase axillary bud outgrowth even though such a reduction in auxin would have been expected to up-regulate the synthesis of root-derived cytokinin (reviewed by [@bib39]). However, an increase in root synthesis of xylem-transported cytokinin does not necessarily increase shoot branching ([@bib17]), and the importance of local shoot-synthesized cytokinin for axillary bud activation has recently been emphasized ([@bib30]; [@bib44]; [@bib13]; [@bib18]). It has been demonstrated recently in pea, however, that xylem sap cytokinin has a role in sustaining the outgrowth of buds after they have initiated growth but no role in the initiation of bud outgrowth ([@bib3]; [@bib15]). Thus given that in *T. repens* the axillary buds emerge from their parent apical buds already actively growing ([@bib45]; [@bib51]), the possibility for involvement of root-synthesized cytokinin in the NRS signal cannot be ruled out.
The results of the present study reaffirm the significance of a root-derived branching promoter signal in the regulation of branching in *T. repens* by centring on the mechanism by which the inhibitory influence of basal branches is asserted. They therefore lend strong support to the suggestion that a more comprehensive understanding of the regulation of branching in general might ensue following the characterization of a root-derived positive signal for branching ([@bib12]; [@bib22]).
Supplementary data
==================
[Supplementary data](http://jxb.oxfordjournals.org/cgi/content/full/erq330/DC1) are available at *JXB* online.
[**Figure S1**](http://jxb.oxfordjournals.org/cgi/content/full/erq330/DC1)**.** Light microscopy of cross-sections of control and girdled stems.
[**Table S1**](http://jxb.oxfordjournals.org/cgi/content/full/erq330/DC1)**.** The effect of manipulation of the rate of transpiration of basal branches on shoot branching.
###### Supplementary Data
We thank Paul Lovejoy for designing and constructing the purpose-built Perspex chamber used to apply molten candle wax to the stems of plants, Rachael Sheridan for technical assistance, John Koolaard and Dongwen Luo for statistical advice, and two anonymous referees for insightful and constructive comments on earlier drafts. This work was funded by the MeriNet programme, New Zealand Foundation for Research, Science and Technology, contract C10X0816.
|
Little Known Black History Fact: Bisa French
PLAY AUDIOBisa French was a single mother who became a cop at age 22. After years of struggling to provide her son with a good life, she is now the first African-American woman captain in the Richmond Police Department in Richmond, California and the youngest captain of any gender or ethnicity. On June 2, the 37-year-old took her position at the police department.
French’s life has changed since she first started in the force. She is now married to a police sergeant in Oakland and a mother of three children.
French is of African-American and Puerto Rican heritage. She attributes her work ethic to her parents. Her father, a carpenter, never missed a day of work. French was attending Napa Community College when she discovered she was pregnant. A recent high school graduate, French gave birth to her son and a week later returned to school for her final exams. |
Q:
php sort an object by two criteria?
Trying to sort this array of objects according to (1) depth and (2) weight, and am unsure how to modify the function I'm using to include this other level...
I'm using this function:
function cmp( $a, $b ) {
if( $a->weight == $b->weight ){
return 0 ;
}
return ($a->weight < $b->weight) ? -1 : 1;
}
And then doing this:
$menu = get_tree(4, $tid, -1, 2);
usort($menu, 'cmp');
And that will accurately sort the array according to weight, but I need to add in another level of sorting. So that the array is first sorted according to depth, and then by weight.
So that, if the original array looks like this:
Array
(
[0] => stdClass Object
(
[tid] => 24
[name] => Sample
[weight] => 3
[depth] => 0
)
[1] => stdClass Object
(
[tid] => 66
[name] => Sample Subcategory
[weight] => 0
[depth] => 1
)
[2] => stdClass Object
(
[tid] => 67
[name] => Another Example
[weight] => 1
[depth] => 0
)
[3] => stdClass Object
(
[tid] => 68
[name] => Subcategory for Another Example
[weight] => 1
[depth] => 1
)
[4] => stdClass Object
(
[tid] => 22
[name] => A third example master category
[weight] => 0
[depth] => 0
)
I can sort it first by depth, then by weight so that the result looks like this:
Array
(
[0] => stdClass Object
(
[tid] => 22
[name] => A third example master category
[weight] => 0
[depth] => 0
)
[1] => stdClass Object
(
[tid] => 67
[name] => Another Example
[weight] => 1
[depth] => 0
)
[2] => stdClass Object
(
[tid] => 24
[name] => Sample
[weight] => 3
[depth] => 0
)
[3] => stdClass Object
(
[tid] => 66
[name] => Sample Subcategory
[weight] => 0
[depth] => 1
)
[4] => stdClass Object
(
[tid] => 68
[name] => Subcategory for Another Example
[weight] => 1
[depth] => 1
)
A:
function cmp( $a, $b )
{
if ($a->depth == $b->depth)
{
if($a->weight == $b->weight) return 0 ;
return ($a->weight < $b->weight) ? -1 : 1;
}
else
return ($a->depth < $b->depth) ? -1 : 1;
}
A:
when comparing numbers, you can simply subtract them
function cmp($a, $b) {
$d = $a->depth - $b->depth;
return $d ? $d : $a->weight - $b->weight;
}
|
661 N.E.2d 823 (1996)
In the Matter of Duncan KINKEAD.
No. 53S00-9505-DI-508.
Supreme Court of Indiana.
February 16, 1996.
Duncan Kinkead, pro se.
Donald R. Lundberg, Executive Secretary, Robert C. Shook, Staff Attorney, Indianapolis, for the Indiana Supreme Court Disciplinary Commission.
PER CURIAM.
The Disciplinary Commission charges that the respondent, Duncan Kinkead, improperly handled a client's funds and failed to adequately communicate with that client, in violation of several provisions of the Rules of Professional Conduct for Attorneys at Law. The Commission and the respondent offer for our approval a Statement of Circumstances and Conditional Agreement for Discipline, entered pursuant to Ind.Admission and Discipline Rule 23, Section 11. In that agreement, the parties agree to facts underlying this matter and that a public reprimand is an appropriate disciplinary sanction. The respondent is subject to this Court's jurisdiction in disciplinary cases by virtue of his admission to this state's bar in 1990.
Pursuant to the tendered agreement, the parties agree that a client retained the respondent on October 8, 1993, to pursue a worker's compensation claim against the client's employer. The client had incurred various medical bills, including one for $1,861.19, which was paid by Medicaid and memorialized as a lien against any future worker's compensation settlement proceeds. In addition, she owed $528 for medical rehabilitation services. That amount was also memorialized as a lien against any future settlement.
On October 11, 1994, the respondent negotiated a $5,400 worker's compensation settlement with the client's employer. He deposited his client's settlement check into his client trust account on November 4, 1994. He then issued two drafts against that account: one *824 for $1,395.90 toward the Medicaid lien, and another for $2,502 to his client. Thereafter, the respondent drew several checks on his trust account to pay personal creditors, but did not issue any check in satisfaction of the $528 lien for medical rehabilitation services. Also on November 4, 1994, the respondent transferred $528 from his client trust account to his business checking account.
On January 23, 1995, the client contacted the respondent to determine whether he had paid the lien for the rehabilitation services. After apparently learning that it had not been paid, she demanded that the respondent disburse the $528 to her. The respondent informed her that he could not give her that money because he had spent it on office rent. The balance in the respondent's business checking account that day was greater than $528 and he had not in fact used the settlement proceeds for his office rent. The respondent later acknowledged that he contrived the statement in order to gain time to confirm with the rehabilitation creditor that the $528 was payable to it and not to his client. On February 1, 1995, the respondent paid the rehabilitation creditor $528 with a check drawn against his business checking account.
In its Verified Complaint for Disciplinary Action, the Commission charged the respondent with violating Rules 1.4(a), 1.5(c), 1.15(a), 1.15(b), and 8.4(c) of the Rules of Professional Conduct.[1] We find that the respondent violated Ind.Professional Conduct Rule 1.4(a) by failing to inform his client that the medical rehabilitation creditor had not been paid and by attributing the lack of such payment to a claim that he had used the settlement funds for another purpose. Those acts constitute a failure to keep his client reasonably informed about the status of the case. His failure to provide his client with a written settlement statement at the conclusion of the representation violated Prof. Cond.R. 1.5(c). By transferring $528 of the settlement proceeds into his business checking account, the respondent violated Prof. Cond.R. 1.15(a) by failing to hold a client's property separate from his own. He violated Prof.Cond.R. 1.15(b) by failing to promptly notify or deliver funds to the rehabilitation creditor after having received funds on behalf of that creditor. His false statement to his client that he had used a portion of the settlement proceeds to pay his office rent represents conduct involving misrepresentation and thus violated Prof.Cond.R. 8.4(c).
The parties agree that a public reprimand is an appropriate discipline in this case, noting that the respondent is remorseful for his misconduct and that he has recently attended a professional enhancement educational seminar *825 to assist him in better understanding the business aspects of the practice of law, and, specifically, the proper purpose, use and limitations of client trust accounts.
Well-recognized principles of client fund management require that lawyers treat client or third party money that comes into their custody with the care of a professional fiduciary. In re Norman, 659 N.E.2d 1046 (Ind.1996). See also Comment to Prof. Cond.R. 1.15. Failure to maintain a strict demarcation between a lawyer's property and that of a client or third party presents the appearance of impropriety, injects problems into the bookkeeping process, clouds the issue of who is entitled to the property, and makes safeguarding the property difficult or impossible. See, e.g., Black v. California State Bar, 57 Cal.2d 219, 18 Cal.Rptr. 518, 368 P.2d 118 (1962) (commingling subjects client funds to expenditure by the lawyer or attachment by the lawyer's creditors). In the present case, the respondent's transfer of a portion of the settlement proceeds into his business checking account brought with it some of the aforementioned risks. However, we are encouraged that the respondent has attended a professional enhancement seminar to bolster his understanding of client fund management. It is unfortunate that the seminar did not also focus on the importance of maintaining open channels of communication with clients and of maintaining truthfulness in such communications. However, given that the respondent's misconduct was an isolated occurrence and that he has taken steps to ensure that similar episodes of misconduct do not occur again, we approve this conditional agreement calling for a public reprimand. If not for the agreed resolution reached by the parties in this case, we may have been inclined to impose a more severe sanction.
It is, therefore, ordered that the respondent, Duncan Kinkead, is hereby reprimanded and admonished for the misconduct set out above.
Costs of this proceeding are assessed against the respondent.
NOTES
[1] Those rules provide:
Prof.Cond.R. 1.4(a): A lawyer shall keep a client reasonably informed about the status of a matter and promptly comply with reasonable requests for information.
Prof.Cond.R. 1.5(c): A fee may be contingent on the outcome of the matter for which the service is rendered, except in a matter in which a contingent fee is prohibited by paragraph (d) or other law. A contingent fee agreement shall be in writing and shall state the method by which the fee is to be determined, including the percentage or percentages that shall accrue to the lawyer in the event of settlement, trial or appeal, litigation and other expenses to be deducted from the recovery, and whether such expenses are to be deducted before or after the contingent fee is calculated. Upon conclusion of a contingent fee matter, the lawyer shall provide the client with a written statement stating the outcome of the matter and, if there is a recovery, showing the remittance to the client and the method of its determination.
Prof.Cond.R. 1.15(a): A lawyer shall hold property of clients or third persons that is in a lawyer's possession in connection with a representation separate from the lawyer's own property. Funds shall be kept in a separate account maintained in the state where the lawyer's office is situated, or elsewhere with the consent of the client or third person. Other property shall be identified as such and appropriately safeguarded. Complete records of such account funds and other property shall be kept by the lawyer and shall be preserved for a period of five years after termination of the representation.
(b) Upon receiving funds or other property in which the client or third person has an interest, a lawyer shall promptly notify the client or third person. Except as stated in this Rule or otherwise permitted by law or by agreement with the client, a lawyer shall promptly deliver to the client or third person any funds or other property that the client or third person is entitled to receive and, upon request by the client or third person, shall promptly render a full accounting regarding such property.
Prof.Cond.R. 8.4(c): It is professional misconduct for a lawyer to:
. . . . .
(c) engage in conduct involving dishonesty, fraud, deceit or misrepresentation.
|
Q:
Object containing arrays - is there a simpler way to write this common pattern
Often times I want to create a javascript object and insert items into an array at a certain index. I find myself writing this pattern a lot:
var obj = {}
for (let item of list) {
if (obj[condition] == undefined) {
obj[condition] = [item];
} else {
obj[condition].push(item);
}
}
I just find it frustrating to be constantly checking for undefined. Is there a better way to do this?
Edit: Thank to Nick for helping me find a solution I like
const list = [1, 2, 3, 4, 5];
var obj = {}
for (let item in list) {
obj[item%2] = [...obj[item%2] || [], item]
}
console.log(obj)
And the functional method:
const list = [1, 2, 3, 4, 5];
var obj = list.reduce((acc, item) => {
acc[item%2] = [...acc[item%2] || [], item]
return acc;
}, {});
console.log(obj)
A:
I tend to like using reduce for these kinds of cases. You still end up having to do a check to see if the array exists yet, but you might be able to condense the logic like in the following code.
const list = [{
type: "fruit",
item: "apple"
}, {
type: "veggie",
item: "corn"
}, {
type: "fruit",
item: "banana"
}];
const obj = list.reduce((acc, el) => {
acc[el.type] = [...acc[el.type] || [], el.item];
return acc;
}, {});
console.log(obj);
|
-----BEGIN PRIVATE KEY-----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-----END PRIVATE KEY-----
|
13-3144-cv
Sirob Imports, Inc. v. Peerless Ins. Co.
UNITED STATES COURT OF APPEALS
FOR THE SECOND CIRCUIT
SUMMARY ORDER
RULINGS BY SUMMARY ORDER DO NOT HAVE PRECEDENTIAL EFFECT. CITATION TO A
SUMMARY ORDER FILED ON OR AFTER JANUARY 1, 2007, IS PERMITTED AND IS GOVERNED BY
FEDERAL RULE OF APPELLATE PROCEDURE 32.1 AND THIS COURT=S LOCAL RULE 32.1.1. WHEN
CITING A SUMMARY ORDER IN A DOCUMENT FILED WITH THIS COURT, A PARTY MUST CITE
EITHER THE FEDERAL APPENDIX OR AN ELECTRONIC DATABASE (WITH THE NOTATION
ASUMMARY ORDER@). A PARTY CITING A SUMMARY ORDER MUST SERVE A COPY OF IT ON
ANY PARTY NOT REPRESENTED BY COUNSEL.
1 At a stated term of the United States Court of Appeals for the Second Circuit, held at
2 the Thurgood Marshall United States Courthouse, 40 Foley Square, in the City of New
3 York, on the 6th day of March, two thousand fourteen.
4
5 PRESENT: REENA RAGGI,
6 DENNY CHIN,
7 Circuit Judges,
8 MAE A. D’AGOSTINO,
9 District Judge.*
10 ----------------------------------------------------------------------
11 SIROB IMPORTS, INC.,
12 Plaintiff-Appellant,
13
14 v. No. 13-3144-cv
15
16 PEERLESS INSURANCE COMPANY,
17 Defendant-Appellee.
18 ----------------------------------------------------------------------
19 APPEARING FOR APPELLANT: MITCHELL J. WINN, Esq., Garden City,
20 New York.
21
22 APPEARING FOR APPELLEES: SCOTT D. STORM, Mura & Storm,
23 PLLC, Buffalo, New York.
24
*
The Honorable Mae A. D’Agostino, of the United States District Court for the Northern
District of New York, sitting by designation.
1
1 Appeal from a judgment of the United States District Court for the Eastern District
2 of New York (Arthur D. Spatt, Judge).
3 UPON DUE CONSIDERATION, IT IS HEREBY ORDERED, ADJUDGED,
4 AND DECREED that the judgment entered on August 2, 2013, is AFFIRMED.
5 The parties having agreed at oral argument that the case is now moot in light of
6 Executive Plaza, LLC v. Peerless Insurance Co., — N.Y.2d —, — N.Y.S.2d —, 2014 WL
7 551251, 2014 N.Y. Slip Op. 00898 (Feb. 13, 2014), the district court’s judgment of
8 dismissal without prejudice is AFFIRMED.
9 FOR THE COURT:
10 CATHERINE O’HAGAN WOLFE, Clerk of Court
11
2
|
Synthesis and secretion of bacterial alpha-amylase by the yeast Saccharomyces cerevisiae.
Alpha-amylase from Bacillus amyloliquefaciens, synthesized in yeast Saccharomyces cerevisiae without substitution of the signal sequence, is efficiently secreted from yeast cells: 60-70% of the overall amount of the enzyme is found in the culture fluid. In contrast to many yeast secretory proteins, which accumulate in the periplasmic space and in the cell wall, intracellular alpha-amylase is localized mainly in the cytoplasm. Obviously, transfer across the cell wall is not a rate-limiting step in alpha-amylase export from the cell. The glycosylated forms of proteins are predominantly found both inside the cell and in the culture medium. |
Modified combination chemotherapy of leukemia. An attempt to overcome drug resistance.
Vincristine and prednisolone are important drugs for induction therapy in acute lymphoblastic leukemia. In our experience quite a number of patients relapse during maintenance therapy after induction. At this stage some of the patients are resistant to vincristine and prednisolone. In the present study we attempted to explore whether vincristine could be used together with cytosine arabinoside. Vincristine being a phase-specific agent is known to synchronize the leukemic cells in vitro and a drug like cytosine arabinoside added after vincristine at the appropriate time is expected to have added cell kill. In vitro studies with leukemic cells confirmed the expected increase in cell kill with the addition of cytosine arabinoside 6 h after vincristine treatment. Simultaneously, the same approach was explored in the clinic. Acute lymphoblastic leukemia patients who were resistant to vincristine and prednisolone for reinduction, remitted with this strategy, i.e. with the addition of cytosine arabinoside 6 h after the vincristine treatment. |
27. Prayers by Indra, the King of Heaven
27 / Prayers by Indra, the King of Heaven
When Kṛṣṇa saved the inhabitants of Vṛndāvana from the wrath of Indra by lifting Govardhana Hill, a surabhi cow from Goloka Vṛndāvana, as well as King Indra from the heavenly planet, appeared before Him. Indra, the King of heaven, was conscious of his offense before Kṛṣṇa; therefore he stealthily appeared before Him from a secluded place. He immediately fell down at the lotus feet of Kṛṣṇa, although his own crown was dazzling like sunshine. Indra knew about the exalted position of Kṛṣṇa because Kṛṣṇa is the master of Indra, but he could not believe that Kṛṣṇa could come down and live in Vṛndāvana among the cowherd men. When Kṛṣṇa defied the authority of Indra, Indra became angry because he thought that he was all in all within this universe and that no one was as powerful as he. But after this incident, his false puffed up prestige was destroyed. Being conscious of his subordinate position, he appeared before Kṛṣṇa with folded hands and began to offer the following prayers.
King Indra, the King of Heaven, offers prayers to Krishna.
"My dear Lord," Indra said, "being puffed up by my false prestige, I thought that You had offended me by not allowing the cowherd men to perform the Indra-yaj�a, and I thought that You wanted to enjoy the offerings that were arranged for the sacrifice. I thought that in the name of a Govardhana sacrifice, You were taking my share of profit, and therefore I mistook Your position. Now by Your grace I can understand that You are the Supreme Lord, Personality of Godhead, and that You are transcendental to all the material qualities. Your transcendental position is viśuddha-sattvam, which is above the platform of the material mode of goodness, and Your transcendental abode is beyond the disturbance of the material qualities. Your name, fame, form, quality and pastimes are all beyond this material nature, and they are never disturbed by the three material modes. Your abode is accessible only for one who undergoes severe austerities and penances and who is completely freed from the onslaught of material qualities like passion and ignorance. If someone thinks that when You come within this material world You accept the modes of material nature, he is mistaken. The webs of the material qualities are never able to touch You, and You certainly do not accept them when You are present within this world. Your Lordship is never conditioned by the laws of material nature.
"My dear Lord, You are the original father of this cosmic manifestation. You are the supreme spiritual master of this cosmic world, and You are the original proprietor of everything. As eternal time, You are competent to chastise offenders. Within this material world there are many fools like myself who consider themselves to be the Supreme Lord or the all in all within the universe. You are so merciful that without punishing their offenses, You devise means so that their false prestige is subdued and they can know that You, and none else, are the Supreme Personality of Godhead.
"My dear Lord, You are the supreme father, the supreme spiritual master and supreme king. Therefore, You have the right to chastise all living entities whenever there is any discrepancy in their behavior. The father, the spiritual master, and the supreme executive officer of the state are always well-wishers of their sons, their students and their citizens respectively. As such, the well-wishers have the right to chastise their dependents. By Your own desire You appear auspiciously on the earth in Your eternal varieties of forms; You come to glorify the earthly planet and specifically to chastise persons who are falsely claiming to be God. In the material world there is regular competition between different types of living entities to become supreme leaders of society, and after being frustrated in achieving the supreme positions of leadership, foolish persons claim to be God, the Supreme Personality. There are many such foolish personalities in this world, like me, but in due course of time, when they come to their senses, they surrender unto You and again engage themselves properly by rendering service unto You. And that is the purpose of Your chastising persons envious of You.
"My dear Lord, I committed a great offense unto Your lotus feet, being falsely proud of my material opulences, not knowing Your unlimited power. Therefore, my Lord, kindly excuse me, because I am fool number one. Kindly give me Your blessings so that I may not act so foolishly again. If You think, my Lord, that the offense is very great and cannot be excused, then I appeal to You that I am Your eternal servant; Your appearance in this world is to give protection to Your eternal servants and to destroy the demons who maintain great military strength just to burden the very existence of the earth. As I am Your eternal servant, kindly excuse me.
"My dear Lord, You are the Supreme Personality of Godhead. I offer my respectful obeisances unto You because You are the Supreme Person and the Supreme Soul. You are the son of Vasudeva, and You are the Supreme Lord, Kṛṣṇa, the master of all pure devotees. Please accept my prostrated obeisances. You are the personification of supreme knowledge. You can appear anywhere according to Your desire in any one of Your eternal forms. You are the root of all creation and the Supreme Soul of all living entities. Due to my gross ignorance, I created great disturbance in Vṛndāvana by sending torrents of rain and heavy hailstorm. I acted out of severe anger caused by Your stopping the sacrifice which was to be held to satisfy me. But my dear Lord, You are so kind to me that You have bestowed Your mercy upon me by destroying all my false pride. I therefore take shelter unto Your lotus feet. My dear Lord, You are not only the supreme controller, but also the spiritual master of all living entities."
Thus praised by Indra, Lord Kṛṣṇa, the Supreme Personality of Godhead, smiling beautifully, said, "My dear Indra, I have stopped your sacrifice just to show My causeless mercy and to revive your memory that I am your eternal master. I am not only your master, but I am the master of all the other demigods as well. You should always remember that all your material opulences are due to My mercy. Everyone should always remember that I am the Supreme Lord. I can show anyone My favor, and I can chastise anyone, because no one is superior to Me. If I find someone overpowered by false pride, in order to show him My causeless mercy, I withdraw all his opulences."
It is noteworthy that Kṛṣṇa sometimes removes all opulences in order to facilitate a rich man's becoming a surrendered soul to Him. This is a special favor of the Lord's. Sometimes it is seen that a person is very opulent materially, but due to his devotional service to the Lord, he may be reduced to poverty. One should not think, however, that because he worshiped the Supreme Lord he became poverty-stricken. The real purport is that when a person is a pure devotee, but at the same time, by miscalculation, he wants to lord it over material nature, the Lord shows His special mercy by taking away all material opulences until at last he surrenders unto the Supreme Lord.
After instructing Indra, Lord Kṛṣṇa asked him to return to his kingdom in the heavenly planet and to remember always that he is never the supreme but is always subordinate to the Supreme Personality of Godhead. He also advised him to remain as King of heaven, but to be careful of false pride.
After this, the transcendental surabhi cow, who also come with Indra to see Kṛṣṇa, offered her respectful obeisances unto Him and worshiped Him. The surabhi offered her prayer as follows. "My dear Lord Kṛṣṇa, You are the most powerful of all mystic yogīs because You are the soul of the complete universe, and from You only all this cosmic manifestation has taken place. Therefore, although Indra tried his best to kill my descendant cows in Vṛndāvana, they remained under Your shelter, and You have protected them all so well. We do not know anyone else as the Supreme, nor do we go to any other god or demigods for protection. Therefore, You are our Indra, You are the Supreme Father of the whole cosmic manifestation, and You are the protector and elevator of all the cows, brāhmaṇas, demigods and others who are pure devotees of Your Lordship. O Supersoul of the universe, let us bathe You with our milk because You are our Indra. O Lord, You appear just to diminish the burden of impure activities on the earth."
In this way, Kṛṣṇa was bathed by the milk of the surabhi cows, and Indra was bathed by the water of the celestial Ganges through the trunk of his carrier elephant. After this, the heavenly king Indra, along with surabhi cows and all other demigods and their mothers, worshiped Lord Kṛṣṇa by bathing Him with Ganges water and the milk of the surabhis. Thus Govinda, Lord Kṛṣṇa, was pleased with all of them. The residents of all higher planetary systems, such as Gandharvaloka, Pitṛloka, Siddhaloka, and Cāraṇaloka, all combined and began to glorify the Lord by chanting His holy name. Their wives and damsels began to dance with great joy. They very much satisfied the Lord by incessantly pouring flowers from the sky. When everything was very nicely and joyfully settled, the cows overflooded the surface of the earth with their milk. The water of the rivers began to flow and give nourishment to the trees, producing fruits and flowers of different colors and tastes. The trees began to pour drops of honey. The hills and mountains began to produce potent medicinal plants and valuable stones. Because of Kṛṣṇa's presence, all these things happened very nicely, and the lower animals, who were generally envious, were envious no longer.
After satisfying Kṛṣṇa, who is the Lord of all the cows in Vṛndāvana, who is known as Govinda, King Indra took His permission to return to his heavenly kingdom. He was surrounded by all kinds of demigods who passed with him through cosmic space. This great incident is a powerful example of how Kṛṣṇa consciousness can benefit the world. Even the lower animals forget their envious nature and become elevated to the qualities of the demigods.
Thus ends the Bhaktivedanta purport of the Twenty-seventh Chapter of Kṛṣṇa, "Prayers by Indra, the King of Heaven." |
A farm north of Cortez in Montezuma County, Colorado. Parts of county are a patchwork of private and public land, increasing the impact of public land policy on residents. (Gates Frontiers Fund Colorado Collection within the Carol M. Highsmith Archive, Library of Congress, Prints and Photographs Division.)
Trump Likely to Stop New BLM Land Planning that Sought to Include Community Voices
President Trump appears ready to roll back Obama-administration regulations that sought to give local residents more of a voice in land-use planning at the Bureau of Land Management. Citizen groups say the change will benefit oil and gas companies at the expense of residents.
Share This:
When Chuck McAfee looks out the window of his Southwest Colorado home, he sees a patchwork of public and private holdings that characterize the landscape of much of the rural West. The private lands McAfee sees include the farm that his grandfather homesteaded more than 100 years ago. A bit farther afield are holdings owned by the U. S. Forest Service and the Bureau of Land Management (BLM).
McAfee is in the process of restoring perennial native grasses to his family’s farm, grasses more suited to the high and dry local ecology of the Colorado Plateau. He hopes that through a conservation-based approach, he can leave a legacy on his family’s land of improved forage and better wildlife habitat.
How those public lands adjacent to the McAfee place are managed, though, is a great concern to the former engineer. Now a self-described “community volunteer,” McAfee’s concerns have amplified due to President Trump’s likely signing of a Congressional Resolution that cancels the Obama Administration’s approach to BLM planning and public participation, known as BLM 2.0.
According to McAfee, BLM 2.0 “looked like a great way for the agency to gather early input on land management decisions. That’s input from the public, from local communities, from local people. Now we’re going to be back to the process from the early 1980s.”
McAfee explains how local citizens used the public input process to limit energy and mining development in his home Montezuma County. BLM had proposed a broader opening to extractive industries prior to local hearings on the plan. “That’s what the County Commissioners wanted, but then we had hearings, and the community spoke out 10 to 1 against the proposal. The people wanted protections.”
In this case, BLM decided to listen to the public and limit energy and mining to very specific areas of the region. Montezuma’s County Commissioners were furious. The way they see it, BLM 2.0 gave land management decisions to “bureaucrats in Washington,” shifting the authority away from the traditional process.
Opponents of BLM 2.0 have often used this rallying cry. U. S. Representative Liz Cheney (R-Wyoming) authored the resolution, leading the charge for passage in the House
The Bureau of Land Management conducted “listening sessions” to get input on how to design the new land-plan review process. If BLM 2.0 is dropped, planning will go back to the process used in the 1980s, supporters of BLM 2.0 said.
The resolution ending BLM 2.0 passed both the House of Representatives and Senate in nearly party-line votes. Republicans supported elimination of the process; Democrats supported the Obama administration’s changes.
Part of President Trump’s “regulatory rollback” effort, the resolution used the legislative tool known as the Congressional Review Act (CRA). The CRA allows a new president to cancel previous administrative actions that occur in the last 60 days of a former president’s term. The Trump administration used the CRA for other regulations, too, such as rules related to stream protections from coal mining and financial disclosure mandates for oil companies.
The Public Lands Council and National Cattlemen’s Beef Association were quick to hail Congressional action, urging a “third strike” to BLM 2.0 with the President’s signature. “This is a common-sense use of Congress’ authority,” said Ethan Lane, executive director of the Public Lands Council and director of federal land policy for the National Cattlemen’s Beef Association. “Planning 2.0 was finished hastily and pushed out the door over the objections of the local communities and stakeholders it will impact most. Hitting the reset button now will allow BLM the opportunity to update the planning process properly, with impacted stakeholders and communities at the table.”
Back in Montezuma County, Colorado, Chuck McAfee countered that BLM 2.0 was a big improvement. He says BLM 2.0 opponents are misguided. “The idea of this, that 2.0 would have moved all decision power and authority to Washington D.C., it’s just a red herring.”
Many groups, including a broad array of outdoor enthusiasts and conservationists, agree with McAfee. They point out that BLM 2.0’s approach was far from perfect, but that it was a vast improvement over previous BLM land management rules.
Joel Webster is a specialist on Western land issues for the Theodore Roosevelt Conservation Partnership (TRCP). He calls the criticism of BLM 2.0 “grossly out of proportion to the rule’s narrow reality.” Webster says, “BLM 2.0 would have increased transparency, giving the agency opportunity to vet ideas and get reactions from the public. It improved the BLM’s process all along the way.” Webster called it a shame that “all of this work, this effort, all of these public input improvements” are being tossed away.
The conservation partnership sees public access to public land for hunting, fishing and other forms of recreation as a key issue. “It’s harder and harder to get access to private lands,” Webster said. “Especially in the West, the average person needs public lands, they need public access if they’re going to have a place to hunt or fish.”
“All of the time, the effort, the money invested in 2.0 is now wasted. It was a big improvement, but there was a small, very vocal minority that hated it.”
Tania Lown-Hecht, Outdoors Alliance
Back Country Hunters and Anglers’ Tim Brass says that those who claim BLM 2.0 would have limited local voices “are 100% wrong.” Brass works to improve access to public lands for hunting and fishing in Colorado. He says that “there’s a broad-based effort from some groups to limit public opportunity for involvement in public lands issues. The goal of ‘no 2.0’ is to keep things the way they were. This meant that some interest groups, oil and gas for instance, have preferential access. Now,” with the cancelation of 2.0, “the cards are in their favor again.”
Tania Lown-Hecht is the communications director of the Outdoors Alliance. She says that BLM 2.0, while imperfect, was well-intentioned. “In all of this rhetoric and zeal for the rollback, there is some truth. It’s true that BLM sometimes can’t make decisions quickly or efficiently. The problem is, now we’re headed back to 1983, to pre-internet days.”
The Outdoor Alliance represents skiers, paddlers, hikers, bikers and others who utilize public lands for recreation. “Now, pressure on public land use is much more diverse,” Lown-Hecht said. “We are seeking a balanced approach.” The “bummer” of the BLM 2.0 cancellation, she said , is the lost investment in time and resources. “All of the time, the effort, the money invested in 2.0 is now wasted. It was a big improvement, but there was a small, very vocal minority that hated it.” |
I am curious to know the value of these. I've had th from day one as my mother collected them as part of a fuel promotion in the 80's. they were offered by esso corporation as part of a minimum 25 liter fuel up program |
Financial Peace Signup Form
Beginning January 21th on Sunday afternoons from 3:30-5pm. Come be a part of Dave Ramsey's course that teaches you wise financial management built on biblical principles. Paid childcare is available with advance notice required (details below).
Name(s) *
Email *
Registration Fee *
Please select below how you would like to purchase the course materials. You can order them yourself here: http://www.fpu.com/1055297 ($109), or use the kits New Song has ordered at a discounted price of $99. If you plan to use the church kit, your payment should be submitted as soon as possible to reserve your materials (supplies are limited). |
Q:
Syntax error for DIV in code behind
I am trying to impliment below :
eventListingPanel.Controls.Add(new LiteralControl("<div style="overflow :auto; width:200px; height:200px">"));
but i am getting an error :
") expected"
with the red underline for keywords overflow ,auto,200px, 200px in the above code
A:
try this:
eventListingPanel.Controls.Add(new LiteralControl("<div style=\"overflow :auto; width:200px; height:200px\"></div>"));
A:
You're not escaping your "
eventListingPanel.Controls.Add(new LiteralControl("<div style=\"overflow :auto; width:200px; height:200px\">"));
|
Game Instructions
Category:StrategyDescription: Sky Park is a construction and management simulation game where you design and operate a theme park in the sky!
You start with a single floating platform and limited rides and arcade games and have to build up your cash and skills to build the best theme park in the sky. Build your rides on the planet, upgrade it and put games around to gain cash. Then create more planets for more rides and games until you have a universe of planets.Instructions:Tags:build, cms, construction, en, sim, simulation, theme, theme parkLanguagesenGames Like This:Sky Park a Free Online GameEmbed Code: |
Monthly Archives : September 2018
Take a look at the label on Poethique’s Radiance Boosting Serum and you will quickly discover that it is an alpha hydroxy acid serum designed to make the skin look more radiant. But would that mean anything to you? Do you know what alpha hydroxy acids (AHAs) are and how your skin benefits from them? Many people do not.
Poethique and other skincare companies seek out ingredients rich in AHAs. The previously mentioned Radiance Boosting Serum features caviar limes as one of its active ingredients. Caviar limes are rich in AHAs as well as vitamins, minerals, and antioxidants. Poethique says caviar lime is an ingredient that “gently accelerates skin renewal to reveal brighter, softer skin.”
In order for you to determine whether that is true or not, you would have to buy and use the product yourself. But before you do that, let’s talk about alpha hydroxy acids. Let us discuss what they are, what they do, and why skincare companies love them so much.
What They Are
Alpha hydroxy acids are chemical compounds that consist of a carboxylic acid and a hydroxyl group. That may mean nothing to you unless you are a chemist. However, AHAs are rather important to you if you’re someone who practices regular exfoliation. Skincare products with AHAs are often associated with exfoliates and skin peels.
AHAs are both naturally occurring and synthetically produced. Examples include the following acids: citric, lactic, glycolic, malic, and tartaric. You likely recognize citric acid as it naturally exists in citrus fruits. That’s where caviar limes come into play for Poethique. As a citrus fruit, the acid found in the limes is an AHA.
What They Do
AHAs have a lot of different uses. In terms of skincare and cosmetics, they are primarily used as exfoliates. The acids are more than capable of breaking up dirt and debris while also lifting dead skin cells so that they can be pulled away by a wet cloth. That’s exactly what Poethique’s alpha hydroxy acid serum does.
From a chemical standpoint, AHAs work by dissolving the substances that bond dirt, debris, and dead skin cells to the surface of healthy skin. Skincare experts sometimes referred to this as ‘dissolving the cement’ that prevents proper exfoliation through mere cleansing alone.
A good way to think of AHAs is to consider them the ‘chemical’ equivalent of manual scrubbing. When you apply an AHA product to the skin, you don’t have to scrub your face to get the dead skin cells and debris off. It all wipes off with a cloth.
Why Skincare Companies Love Them
Everything you’ve learned thus far about AHAs should make it clear why they are good for the skin. As for companies like Poethique, they love AHAs as ingredients for a number of reasons. First, relying only on naturally occurring AHAs gives manufacturers a set of ingredients that have proven effective as exfoliates without having to rely on synthetic chemicals.
Next, skincare companies love AHAs because they are very effective. They know if they can make an all-natural exfoliate that works as well as, or better than, a synthetic product, they will do well in the marketplace.
Finally, skincare companies love AHAs because their customers love them too. When all else fails, that really is what drives skincare companies to do what they do. Their goal is to create products their customers love and want to use. So if AHAs are in demand, that’s what manufacturers will go with.
How about you? Do you use an alpha hydroxy acid serum to exfoliate? If not, it’s never too late to try one.
Go to your favorite sporting goods store and ask to see the sunglasses. You will see one brand after another designed to appeal to athletes. But don’t stop there. Go to your favorite big-box department store and compare the sunglasses in the fashion and jewelry department with those found in the sporting goods department. You will notice some significant differences. Functionally speaking though, they are all about the same.
So if sunglasses are functionally similar across all styles and brands, how do you sell sports sunglasses to athletes? By appealing to what makes them tick. It is no different than selling designer sunglasses to fashionistas and busy soccer moms. Give them what they want, and athletes will buy them.
Give Them Color
There are those athletes who are all about the sport and nothing else. They don’t care what they look like during their workouts and competitions as long as they perform well. Those kinds of athletes are not the ones being targeted. Rather, designers and distributors target athletes who care about their image. And what’s better for an athlete’s image than standing out in a crowd?
It’s pretty easy to make sports sunglasses that stand out. Just add color. For example, who would expect a rough-and-tumble football player to wear a pair of hot pink sunglasses with stainless steel hinges? It is the perfect design for someone who wants to be seen.
Bright colors tend to be very attractive to athletes for this very reason. That’s good because there are some athletes who just won’t wear hot pink. They will happily wear something in a neon green or hunter’s orange. Bright yellows, purples, and reds are also popular options.
Give Them Form
Another thing that athletes appreciate is good form. Athletes tend to be very conscious about their own physiques, so they are more likely to look for sunglasses that complement their facial features. They also want sunglasses that look the part. In other words, rugged and dependable.
Designers focus on form, or the lack thereof, when creating new models for athletes. A good example are frameless sunglasses. Frameless glasses are essentially one-peace lenses with arms and nose pieces attached with stainless steel screws. Having no frame presents a unique kind of form that plays well to the athlete’s no-nonsense nature. There is no fluff to get in the way. Just a great pair of lenses that protect against sunlight.
Give Them Function
When it actually comes to performance and competition, athletes cannot afford sunglasses that could prove to be a hindrance. That’s why cyclists look for aerodynamic sunglasses. It’s why baseball players want polarized lenses that help them see the ball more easily in flight.
Designing for function sometimes means sacrificing form and color. As such, it is not unusual for athletes to have multiple pairs of sunglasses. The ones they wear ‘at work’ are not necessarily the same sunglasses they wear out to play. That’s fine with designers and manufacturers. The more sunglasses athletes buy, the better it is for business.
Athletes Are a Specific Market
Olympic Eyewear, a Utah company that specializes in affordable designer sunglasses, makes a number of different models for athletes. They explain that athletes represent a very specific market unlike any other. Designing for athletes is a matter of understanding both their needs and their wants, then meeting both with as many high-quality choices as possible.
Of course, sports sunglasses are not just for athletes. Non-athletes buy them just because they like the looks. There’s nothing wrong with that, either. As long as a pair of sunglasses adequately protects the eyes, that’s all that matters.
Anyone who has or is going through the process of buying hair extensions will be faced with the choice of synthetic or Remy hair extensions.
Remy hair extensions, which are made with real human hair, are a better choice for a number of reasons. Not only do they last longer but they look more natural too.
Synthetic hair extensions might look great when you first purchase them but they’ll never blend well with your natural hair and you won’t even be able to dye or style them. While they may cost you less in the short term, they won’t last very long and you will need to replace them quite soon after buying them.
Over and above these factors, synthetic hair can also be very dangerous, here’s why.
Why synthetic hair can be dangerous
Low-quality materials can affect your skin
Most synthetic hair is made of monofilament fibers, acrylic and polyester, materials that can have harmful effects on your hair and skin. Remember that your extensions are in constant contact with your scalp so if you have sensitive skin, this could lead to irritations.
Quality can’t be determined
You never quite know how synthetic hair was manufactured so it’s hard to know what its real quality is too. While synthetic hair extensions might be priced at a premium, this in no way indicates that the hair is of good quality.EH Hair salons are specialised in tape in hair extensions that are made with 100% human hair, this means that the quality is guaranteed. Synthetic hair extensions are a much riskier buy and you could end up wasting a lot of money on a product that will end up in the bin a week later.
Synthetic extensions are highly flammable
Synthetic hair extensions are not resistant to heat and the fibres are highly flammable, which means that styling tools become particularly dangerous. When heat is applied to low-quality extensions, they can melt and burn, which could end up destroying your natural hair.
Synthetic extensions can lead to the growth of bacteria
When your scalp can’t breathe, bacteria and fungus can begin to grow. The synthetic fibres don’t move and breathe in the same way that your natural hair does, which means that the scalp can become warm and moist, the perfect breeding ground for fungus.
Synthetic hair tangles and matts very easily
Artificial extensions only have a few washes in them before they lose their shine and become matted and tangled. While you might be thinking that you can simply remove them if this happens, this isn’t always the case. If your natural hair becomes matted with the synthetic hair, you could have a hard time removing the extensions. This can ultimately end up damaging your natural hair.
Overall, it simply doesn’t make sense to waste your time and money purchasing synthetic hair extensions. If you don’t have the budget for Remy hair extensions, rather save some money until you can purchase the real deal.
Laser hair removal is the best way to deal with unwanted body hair permanently. Unlike shaving or waxing, laser treatments are not temporary. If done right, you don’t need to bother about hair growth again. While laser hair removal is safe and effective, the discomfort and pain associated with the procedure can be different for different people. That’s exactly where you will need a cream or product that can numb the targeted area ahead of the procedure. In this post, we will talk about selecting the best over the counter numbing cream for laser hair removal.
Do I need a numbing cream?
The laser hair removal process involves using beams of light that burns the hair follicles from the roots. Expectedly, there’s some heating involved, and that can cause pain. The extent of the pain can vary from one person to another, but if you don’t want to deal with all that, using a numbing cream is the best idea by all means. You can compare it with local anesthesia, but numbing creams are not extremely numbing. These just act fast and numb the area for the time required. The ingredients used in such products are easily absorbed in the skin.
Things to know
Most creams that are meant to be used for reducing pain caused during laser removal contain an ingredient known as lidocaine. Some may also include what is known as Benzocaine. Such creams are also used for other treatments and cosmetic procedures, such as tattooing and skin needling. The amount of lidocaine is about 4-5%, depending on the product you choose.
What are some of the best choices?
There are many numbing creams that can be specifically used for hair removal. Numb Master Topical Anesthetic Lidocaine Cream is a good choice, while you can also check HUSH Anesthetic Cream. TOPICAINE 5% Numbing Gel is also a popular name. The brand does make a difference, so you may want to check more details about the product and read between the labels. Most cost less than $50, but again it also depends on the numbing cream, brand and kind of effect it offers.
To find the best laser hair removal numbing cream, check online for reviews. There are a bunch of review sites that can help in comparing products. Make sure that you don’t settle for cheap products, which can be harmful to the skin. Check and make a shortlist now.
It is exciting for every parent to dress their kid with trendy and unique outfits every day. They want their kids to look even more adorable and cute. When it comes to kids clothing everyone has different preferences, some may choose an edgy style of kids clothing, whereas some may choose classically styled clothes. But the major concern is the comfort. Our little one deserves the most possible comfort Hence, Chaser has manufactured kids clothing with a safe and soft material. Chaser clothing is crafted with love and offers the luxurious items of clothing for your kid. You can also create a style statement for your kid so that he or she can express his uniqueness and individuality through his or her fashion sense. Every occasion demands a different look, and so Chaser kids offer a huge range of collection which your little one will love to wear. Experiment with new Apparels and make your kids look stunning. Excellent craftsmanship of Chaser makes them popular. Their main purpose is to style kids with contemporary clothes with the market demand. The designs are influenced by the past Era that creates a vintage look to make your little one look classier.
The Chaser is a Los Angeles based company and it is a well-known boutique for kid’s fashion. The designs are inspired by icons of past generation. They manufacture well-fitted clothes, and their Supreme fabrication makes them greatest brand of all time. They keep on experimenting with yarns and dye and focuses on uniqueness.
There is an extensive range of collection for kids, you can browse it online, and buy at the best prices. Chaser Clothing is a Unisex clothing brand and offers clothes that can be worn for everyday wear or for a perfect party looks. Cool soft and cozy leggings paired with glitter tank top or Aloha hoodie are perfect for outings.
The attractive print, unique colors, the material will be loved by your kids and they will never want to take them off. Chaser kids offer clothes that can be worn on any season, and make your kid look the best of all. |
Lama Drimed
Lama Drimed Norbuemail: [email protected]
Lama Padma Drimed Norbu, (Alwyn Fischel) met H.E. Chagdud Tulku Rinpoche 1986, and moved to Rigzdin Ling in 1998, when it was first established. In 1995 he was ordained by Chagdud Rinpoche and recognized as his Dzogchen Lineage holder.
In 2007 Lama Drimed completed a three year retreat. From 1995 until 2010, Lama Drimed was the lama in residence of Rigzdin Ling and served as Spiritual Director. He now resides and teaches in the Bay Area. |
The video will start in 8 Cancel
News, views and top stories in your inbox. Don't miss our must-read newsletter Sign up Thank you for subscribing We have more newsletters Show me See our privacy notice Invalid Email
Seven terrorists were arrested when soldiers stormed this jungle camp after paramilitaries took part in a bizarre drag performance.
Members of the Columbian Ejercito de Liberacion Nacional were partying dressed in bikinis in their jungle hideout when the it was raided.
Two Colombian intelligence officers had managed to infiltrate the ELN - also known as the National Liberation Army - and were partying with around 20 of them.
They recorded this footage, which has been released to local media, before things took a strange turn at midnight.
A bizarre beauty pageant started with several of the men dressing up in bikinis and bras.
(Image: CEN)
One man was photographed wearing a green dress and smiling.
After everyone gathered and got severely drunk, the intelligence officers alerted their army contacts who stormed the place and arrested seven senior rebel officials.
(Image: CEN)
The ELN is a guerrilla group in the country committed to the overthrow of the government.
Read more:
Like the better-known FARC rebels - The Revolutionary Armed Forces of Colombia - the ELN have bases in remote jungle areas and operate in small groups.
(Image: CEN) (Image: CEN)
But it funds itself in much the same way as its better known competitor - kidnappings, ransoms, extortion and drug trafficking.
Read more:
Branded a terrorist organisation by the US and EU, it has an estimated membership of somewhere between 1,300 and 3,000 members. |
Alastair Crooke: We Have No Clear Line Between Resistance and Terrorism
29.05.2017
Alastair Crooke, former British diplomat, founder and director of the Conflicts Forum, talks about armed radical groups in the Middle East and how it is difficult to solve regional issues when nearly all such groups are backed by state actors. |
package org.jcodec.common.io;
import java.io.FileNotFoundException;
import java.io.IOException;
import java.nio.ByteBuffer;
import java.nio.channels.FileChannel;
/**
* This class is part of JCodec ( www.jcodec.org ) This software is distributed
* under FreeBSD License
*
* @author The JCodec project
*
*/
public class FileChannelWrapper implements SeekableByteChannel {
private FileChannel ch;
public FileChannelWrapper(FileChannel ch) throws FileNotFoundException {
this.ch = ch;
}
@Override
public int read(ByteBuffer arg0) throws IOException {
return ch.read(arg0);
}
@Override
public void close() throws IOException {
ch.close();
}
@Override
public boolean isOpen() {
return ch.isOpen();
}
@Override
public int write(ByteBuffer arg0) throws IOException {
return ch.write(arg0);
}
@Override
public long position() throws IOException {
return ch.position();
}
@Override
public SeekableByteChannel setPosition(long newPosition) throws IOException {
ch.position(newPosition);
return this;
}
@Override
public long size() throws IOException {
return ch.size();
}
@Override
public SeekableByteChannel truncate(long size) throws IOException {
ch.truncate(size);
return this;
}
} |
Embed This Storyboard on Your Website
Copy This Code Snippet
Create a Folding Card!
Storyboard Description
Storyboard Text
"She kept writing in her book . And she kept working up the courage to show somebody. And the she just stopped(39)."
My Sister?!
WHITE LOVER!!
"My best friend just had become my worst enemy"(53).
"You can always go back to the rez school(54)."
Reardon
"No. I have to this(54)."
This quote shows the opposite of my theme statement. Junior's sister dreamed to write romantic novels but didn't make the risky choice to transfer to Reardon and one day she ran out of hope like the other kids.
This quote/picture represents when Junior tells Rowdy that he is transferring to Reardon. This shows how hard it was for him to make this decision to leave his friends for a better life.
This is showing how brave and determined Junior is to make his life better. If he would have turned around and gone back to the rez school there would be a very high chance that he would end up like the other kids with no hope. |
#
# OpenSSL/ssl/Makefile
#
DIR= ssl
TOP= ..
CC= cc
INCLUDES= -I../crypto -I$(TOP) -I../include $(KRB5_INCLUDES)
CFLAG=-g
MAKEFILE= Makefile
AR= ar r
# KRB5 stuff
KRB5_INCLUDES=
CFLAGS= $(INCLUDES) $(CFLAG)
GENERAL=Makefile README ssl-lib.com install.com
TEST=ssltest.c
APPS=
LIB=$(TOP)/libssl.a
SHARED_LIB= libssl$(SHLIB_EXT)
LIBSRC= \
s2_meth.c s2_srvr.c s2_clnt.c s2_lib.c s2_enc.c s2_pkt.c \
s3_meth.c s3_srvr.c s3_clnt.c s3_lib.c s3_enc.c s3_pkt.c s3_both.c \
s23_meth.c s23_srvr.c s23_clnt.c s23_lib.c s23_pkt.c \
t1_meth.c t1_srvr.c t1_clnt.c t1_lib.c t1_enc.c \
d1_meth.c d1_srvr.c d1_clnt.c d1_lib.c d1_pkt.c \
d1_both.c d1_enc.c \
ssl_lib.c ssl_err2.c ssl_cert.c ssl_sess.c \
ssl_ciph.c ssl_stat.c ssl_rsa.c \
ssl_asn1.c ssl_txt.c ssl_algs.c \
bio_ssl.c ssl_err.c kssl.c t1_reneg.c
LIBOBJ= \
s2_meth.o s2_srvr.o s2_clnt.o s2_lib.o s2_enc.o s2_pkt.o \
s3_meth.o s3_srvr.o s3_clnt.o s3_lib.o s3_enc.o s3_pkt.o s3_both.o \
s23_meth.o s23_srvr.o s23_clnt.o s23_lib.o s23_pkt.o \
t1_meth.o t1_srvr.o t1_clnt.o t1_lib.o t1_enc.o \
d1_meth.o d1_srvr.o d1_clnt.o d1_lib.o d1_pkt.o \
d1_both.o d1_enc.o \
ssl_lib.o ssl_err2.o ssl_cert.o ssl_sess.o \
ssl_ciph.o ssl_stat.o ssl_rsa.o \
ssl_asn1.o ssl_txt.o ssl_algs.o \
bio_ssl.o ssl_err.o kssl.o t1_reneg.o
SRC= $(LIBSRC)
EXHEADER= ssl.h ssl2.h ssl3.h ssl23.h tls1.h dtls1.h kssl.h
HEADER= $(EXHEADER) ssl_locl.h kssl_lcl.h
ALL= $(GENERAL) $(SRC) $(HEADER)
top:
(cd ..; $(MAKE) DIRS=$(DIR) all)
all: lib
lib: $(LIBOBJ)
$(AR) $(LIB) $(LIBOBJ)
$(RANLIB) $(LIB) || echo Never mind.
@touch lib
shared: lib
if [ -n "$(SHARED_LIBS)" ]; then \
(cd ..; $(MAKE) $(SHARED_LIB)); \
fi
files:
$(PERL) $(TOP)/util/files.pl Makefile >> $(TOP)/MINFO
links:
@$(PERL) $(TOP)/util/mklink.pl ../include/openssl $(EXHEADER)
@$(PERL) $(TOP)/util/mklink.pl ../test $(TEST)
@$(PERL) $(TOP)/util/mklink.pl ../apps $(APPS)
install:
@[ -n "$(INSTALLTOP)" ] # should be set by top Makefile...
@headerlist="$(EXHEADER)"; for i in $$headerlist ; \
do \
(cp $$i $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i; \
chmod 644 $(INSTALL_PREFIX)$(INSTALLTOP)/include/openssl/$$i ); \
done;
tags:
ctags $(SRC)
tests:
lint:
lint -DLINT $(INCLUDES) $(SRC)>fluff
depend:
@if [ -z "$(THIS)" ]; then \
$(MAKE) -f $(TOP)/Makefile reflect THIS=$@; \
else \
$(MAKEDEPEND) -- $(CFLAG) $(INCLUDES) $(DEPFLAG) -- $(PROGS) $(LIBSRC); \
fi
dclean:
$(PERL) -pe 'if (/^# DO NOT DELETE THIS LINE/) {print; exit(0);}' $(MAKEFILE) >Makefile.new
mv -f Makefile.new $(MAKEFILE)
clean:
rm -f *.o *.obj lib tags core .pure .nfs* *.old *.bak fluff
# DO NOT DELETE THIS LINE -- make depend depends on it.
bio_ssl.o: ../include/openssl/asn1.h ../include/openssl/bio.h
bio_ssl.o: ../include/openssl/bn.h ../include/openssl/buffer.h
bio_ssl.o: ../include/openssl/comp.h ../include/openssl/crypto.h
bio_ssl.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
bio_ssl.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
bio_ssl.o: ../include/openssl/ecdsa.h ../include/openssl/err.h
bio_ssl.o: ../include/openssl/evp.h ../include/openssl/fips.h
bio_ssl.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
bio_ssl.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
bio_ssl.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
bio_ssl.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
bio_ssl.o: ../include/openssl/pem.h ../include/openssl/pem2.h
bio_ssl.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
bio_ssl.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
bio_ssl.o: ../include/openssl/sha.h ../include/openssl/ssl.h
bio_ssl.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
bio_ssl.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
bio_ssl.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
bio_ssl.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h bio_ssl.c
d1_both.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
d1_both.o: ../include/openssl/bn.h ../include/openssl/buffer.h
d1_both.o: ../include/openssl/comp.h ../include/openssl/crypto.h
d1_both.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
d1_both.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
d1_both.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
d1_both.o: ../include/openssl/err.h ../include/openssl/evp.h
d1_both.o: ../include/openssl/fips.h ../include/openssl/hmac.h
d1_both.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
d1_both.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
d1_both.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
d1_both.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
d1_both.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
d1_both.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
d1_both.o: ../include/openssl/rand.h ../include/openssl/rsa.h
d1_both.o: ../include/openssl/safestack.h ../include/openssl/sha.h
d1_both.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
d1_both.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
d1_both.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
d1_both.o: ../include/openssl/tls1.h ../include/openssl/x509.h
d1_both.o: ../include/openssl/x509_vfy.h d1_both.c ssl_locl.h
d1_clnt.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
d1_clnt.o: ../include/openssl/bn.h ../include/openssl/buffer.h
d1_clnt.o: ../include/openssl/comp.h ../include/openssl/crypto.h
d1_clnt.o: ../include/openssl/dh.h ../include/openssl/dsa.h
d1_clnt.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
d1_clnt.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
d1_clnt.o: ../include/openssl/ecdsa.h ../include/openssl/err.h
d1_clnt.o: ../include/openssl/evp.h ../include/openssl/fips.h
d1_clnt.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
d1_clnt.o: ../include/openssl/lhash.h ../include/openssl/md5.h
d1_clnt.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
d1_clnt.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
d1_clnt.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
d1_clnt.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
d1_clnt.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
d1_clnt.o: ../include/openssl/rand.h ../include/openssl/rsa.h
d1_clnt.o: ../include/openssl/safestack.h ../include/openssl/sha.h
d1_clnt.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
d1_clnt.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
d1_clnt.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
d1_clnt.o: ../include/openssl/tls1.h ../include/openssl/x509.h
d1_clnt.o: ../include/openssl/x509_vfy.h d1_clnt.c kssl_lcl.h ssl_locl.h
d1_enc.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
d1_enc.o: ../include/openssl/bn.h ../include/openssl/buffer.h
d1_enc.o: ../include/openssl/comp.h ../include/openssl/crypto.h
d1_enc.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
d1_enc.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
d1_enc.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
d1_enc.o: ../include/openssl/err.h ../include/openssl/evp.h
d1_enc.o: ../include/openssl/fips.h ../include/openssl/hmac.h
d1_enc.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
d1_enc.o: ../include/openssl/md5.h ../include/openssl/obj_mac.h
d1_enc.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
d1_enc.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
d1_enc.o: ../include/openssl/pem.h ../include/openssl/pem2.h
d1_enc.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
d1_enc.o: ../include/openssl/pqueue.h ../include/openssl/rand.h
d1_enc.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
d1_enc.o: ../include/openssl/sha.h ../include/openssl/ssl.h
d1_enc.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
d1_enc.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
d1_enc.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
d1_enc.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h d1_enc.c
d1_enc.o: ssl_locl.h
d1_lib.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
d1_lib.o: ../include/openssl/bn.h ../include/openssl/buffer.h
d1_lib.o: ../include/openssl/comp.h ../include/openssl/crypto.h
d1_lib.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
d1_lib.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
d1_lib.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
d1_lib.o: ../include/openssl/err.h ../include/openssl/evp.h
d1_lib.o: ../include/openssl/fips.h ../include/openssl/hmac.h
d1_lib.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
d1_lib.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
d1_lib.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
d1_lib.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
d1_lib.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
d1_lib.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
d1_lib.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
d1_lib.o: ../include/openssl/sha.h ../include/openssl/ssl.h
d1_lib.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
d1_lib.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
d1_lib.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
d1_lib.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h d1_lib.c
d1_lib.o: ssl_locl.h
d1_meth.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
d1_meth.o: ../include/openssl/bn.h ../include/openssl/buffer.h
d1_meth.o: ../include/openssl/comp.h ../include/openssl/crypto.h
d1_meth.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
d1_meth.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
d1_meth.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
d1_meth.o: ../include/openssl/err.h ../include/openssl/evp.h
d1_meth.o: ../include/openssl/fips.h ../include/openssl/hmac.h
d1_meth.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
d1_meth.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
d1_meth.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
d1_meth.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
d1_meth.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
d1_meth.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
d1_meth.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
d1_meth.o: ../include/openssl/sha.h ../include/openssl/ssl.h
d1_meth.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
d1_meth.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
d1_meth.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
d1_meth.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h d1_meth.c
d1_meth.o: ssl_locl.h
d1_pkt.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
d1_pkt.o: ../include/openssl/bn.h ../include/openssl/buffer.h
d1_pkt.o: ../include/openssl/comp.h ../include/openssl/crypto.h
d1_pkt.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
d1_pkt.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
d1_pkt.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
d1_pkt.o: ../include/openssl/err.h ../include/openssl/evp.h
d1_pkt.o: ../include/openssl/fips.h ../include/openssl/hmac.h
d1_pkt.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
d1_pkt.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
d1_pkt.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
d1_pkt.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
d1_pkt.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
d1_pkt.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
d1_pkt.o: ../include/openssl/rand.h ../include/openssl/rsa.h
d1_pkt.o: ../include/openssl/safestack.h ../include/openssl/sha.h
d1_pkt.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
d1_pkt.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
d1_pkt.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
d1_pkt.o: ../include/openssl/tls1.h ../include/openssl/x509.h
d1_pkt.o: ../include/openssl/x509_vfy.h d1_pkt.c ssl_locl.h
d1_srvr.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
d1_srvr.o: ../include/openssl/bn.h ../include/openssl/buffer.h
d1_srvr.o: ../include/openssl/comp.h ../include/openssl/crypto.h
d1_srvr.o: ../include/openssl/dh.h ../include/openssl/dsa.h
d1_srvr.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
d1_srvr.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
d1_srvr.o: ../include/openssl/ecdsa.h ../include/openssl/err.h
d1_srvr.o: ../include/openssl/evp.h ../include/openssl/fips.h
d1_srvr.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
d1_srvr.o: ../include/openssl/lhash.h ../include/openssl/md5.h
d1_srvr.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
d1_srvr.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
d1_srvr.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
d1_srvr.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
d1_srvr.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
d1_srvr.o: ../include/openssl/rand.h ../include/openssl/rsa.h
d1_srvr.o: ../include/openssl/safestack.h ../include/openssl/sha.h
d1_srvr.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
d1_srvr.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
d1_srvr.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
d1_srvr.o: ../include/openssl/tls1.h ../include/openssl/x509.h
d1_srvr.o: ../include/openssl/x509_vfy.h d1_srvr.c ssl_locl.h
kssl.o: ../include/openssl/asn1.h ../include/openssl/bio.h
kssl.o: ../include/openssl/bn.h ../include/openssl/buffer.h
kssl.o: ../include/openssl/comp.h ../include/openssl/crypto.h
kssl.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
kssl.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
kssl.o: ../include/openssl/ecdsa.h ../include/openssl/evp.h
kssl.o: ../include/openssl/fips.h ../include/openssl/hmac.h
kssl.o: ../include/openssl/krb5_asn.h ../include/openssl/kssl.h
kssl.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
kssl.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
kssl.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
kssl.o: ../include/openssl/pem.h ../include/openssl/pem2.h
kssl.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
kssl.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
kssl.o: ../include/openssl/sha.h ../include/openssl/ssl.h
kssl.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
kssl.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
kssl.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
kssl.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h kssl.c
s23_clnt.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s23_clnt.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s23_clnt.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s23_clnt.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s23_clnt.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s23_clnt.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s23_clnt.o: ../include/openssl/err.h ../include/openssl/evp.h
s23_clnt.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s23_clnt.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s23_clnt.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s23_clnt.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s23_clnt.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s23_clnt.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s23_clnt.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s23_clnt.o: ../include/openssl/rand.h ../include/openssl/rsa.h
s23_clnt.o: ../include/openssl/safestack.h ../include/openssl/sha.h
s23_clnt.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
s23_clnt.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
s23_clnt.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
s23_clnt.o: ../include/openssl/tls1.h ../include/openssl/x509.h
s23_clnt.o: ../include/openssl/x509_vfy.h s23_clnt.c ssl_locl.h
s23_lib.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s23_lib.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s23_lib.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s23_lib.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s23_lib.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s23_lib.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s23_lib.o: ../include/openssl/err.h ../include/openssl/evp.h
s23_lib.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s23_lib.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s23_lib.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s23_lib.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s23_lib.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s23_lib.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s23_lib.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s23_lib.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
s23_lib.o: ../include/openssl/sha.h ../include/openssl/ssl.h
s23_lib.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
s23_lib.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
s23_lib.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
s23_lib.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h s23_lib.c
s23_lib.o: ssl_locl.h
s23_meth.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s23_meth.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s23_meth.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s23_meth.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s23_meth.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s23_meth.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s23_meth.o: ../include/openssl/err.h ../include/openssl/evp.h
s23_meth.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s23_meth.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s23_meth.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s23_meth.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s23_meth.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s23_meth.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s23_meth.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s23_meth.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
s23_meth.o: ../include/openssl/sha.h ../include/openssl/ssl.h
s23_meth.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
s23_meth.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
s23_meth.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
s23_meth.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h s23_meth.c
s23_meth.o: ssl_locl.h
s23_pkt.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s23_pkt.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s23_pkt.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s23_pkt.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s23_pkt.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s23_pkt.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s23_pkt.o: ../include/openssl/err.h ../include/openssl/evp.h
s23_pkt.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s23_pkt.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s23_pkt.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s23_pkt.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s23_pkt.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s23_pkt.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s23_pkt.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s23_pkt.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
s23_pkt.o: ../include/openssl/sha.h ../include/openssl/ssl.h
s23_pkt.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
s23_pkt.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
s23_pkt.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
s23_pkt.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h s23_pkt.c
s23_pkt.o: ssl_locl.h
s23_srvr.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s23_srvr.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s23_srvr.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s23_srvr.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s23_srvr.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s23_srvr.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s23_srvr.o: ../include/openssl/err.h ../include/openssl/evp.h
s23_srvr.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s23_srvr.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s23_srvr.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s23_srvr.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s23_srvr.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s23_srvr.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s23_srvr.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s23_srvr.o: ../include/openssl/rand.h ../include/openssl/rsa.h
s23_srvr.o: ../include/openssl/safestack.h ../include/openssl/sha.h
s23_srvr.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
s23_srvr.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
s23_srvr.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
s23_srvr.o: ../include/openssl/tls1.h ../include/openssl/x509.h
s23_srvr.o: ../include/openssl/x509_vfy.h s23_srvr.c ssl_locl.h
s2_clnt.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s2_clnt.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s2_clnt.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s2_clnt.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s2_clnt.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s2_clnt.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s2_clnt.o: ../include/openssl/err.h ../include/openssl/evp.h
s2_clnt.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s2_clnt.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s2_clnt.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s2_clnt.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s2_clnt.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s2_clnt.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s2_clnt.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s2_clnt.o: ../include/openssl/rand.h ../include/openssl/rsa.h
s2_clnt.o: ../include/openssl/safestack.h ../include/openssl/sha.h
s2_clnt.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
s2_clnt.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
s2_clnt.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
s2_clnt.o: ../include/openssl/tls1.h ../include/openssl/x509.h
s2_clnt.o: ../include/openssl/x509_vfy.h s2_clnt.c ssl_locl.h
s2_enc.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s2_enc.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s2_enc.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s2_enc.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s2_enc.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s2_enc.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s2_enc.o: ../include/openssl/err.h ../include/openssl/evp.h
s2_enc.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s2_enc.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s2_enc.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s2_enc.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s2_enc.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s2_enc.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s2_enc.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s2_enc.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
s2_enc.o: ../include/openssl/sha.h ../include/openssl/ssl.h
s2_enc.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
s2_enc.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
s2_enc.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
s2_enc.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h s2_enc.c
s2_enc.o: ssl_locl.h
s2_lib.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s2_lib.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s2_lib.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s2_lib.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s2_lib.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s2_lib.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s2_lib.o: ../include/openssl/err.h ../include/openssl/evp.h
s2_lib.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s2_lib.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s2_lib.o: ../include/openssl/md5.h ../include/openssl/obj_mac.h
s2_lib.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
s2_lib.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
s2_lib.o: ../include/openssl/pem.h ../include/openssl/pem2.h
s2_lib.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
s2_lib.o: ../include/openssl/pqueue.h ../include/openssl/rsa.h
s2_lib.o: ../include/openssl/safestack.h ../include/openssl/sha.h
s2_lib.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
s2_lib.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
s2_lib.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
s2_lib.o: ../include/openssl/tls1.h ../include/openssl/x509.h
s2_lib.o: ../include/openssl/x509_vfy.h s2_lib.c ssl_locl.h
s2_meth.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s2_meth.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s2_meth.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s2_meth.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s2_meth.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s2_meth.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s2_meth.o: ../include/openssl/err.h ../include/openssl/evp.h
s2_meth.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s2_meth.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s2_meth.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s2_meth.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s2_meth.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s2_meth.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s2_meth.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s2_meth.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
s2_meth.o: ../include/openssl/sha.h ../include/openssl/ssl.h
s2_meth.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
s2_meth.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
s2_meth.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
s2_meth.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h s2_meth.c
s2_meth.o: ssl_locl.h
s2_pkt.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s2_pkt.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s2_pkt.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s2_pkt.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s2_pkt.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s2_pkt.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s2_pkt.o: ../include/openssl/err.h ../include/openssl/evp.h
s2_pkt.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s2_pkt.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s2_pkt.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s2_pkt.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s2_pkt.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s2_pkt.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s2_pkt.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s2_pkt.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
s2_pkt.o: ../include/openssl/sha.h ../include/openssl/ssl.h
s2_pkt.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
s2_pkt.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
s2_pkt.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
s2_pkt.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h s2_pkt.c
s2_pkt.o: ssl_locl.h
s2_srvr.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s2_srvr.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s2_srvr.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s2_srvr.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s2_srvr.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s2_srvr.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s2_srvr.o: ../include/openssl/err.h ../include/openssl/evp.h
s2_srvr.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s2_srvr.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s2_srvr.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s2_srvr.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s2_srvr.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s2_srvr.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s2_srvr.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s2_srvr.o: ../include/openssl/rand.h ../include/openssl/rsa.h
s2_srvr.o: ../include/openssl/safestack.h ../include/openssl/sha.h
s2_srvr.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
s2_srvr.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
s2_srvr.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
s2_srvr.o: ../include/openssl/tls1.h ../include/openssl/x509.h
s2_srvr.o: ../include/openssl/x509_vfy.h s2_srvr.c ssl_locl.h
s3_both.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s3_both.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s3_both.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s3_both.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s3_both.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s3_both.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s3_both.o: ../include/openssl/err.h ../include/openssl/evp.h
s3_both.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s3_both.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s3_both.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s3_both.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s3_both.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s3_both.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s3_both.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s3_both.o: ../include/openssl/rand.h ../include/openssl/rsa.h
s3_both.o: ../include/openssl/safestack.h ../include/openssl/sha.h
s3_both.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
s3_both.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
s3_both.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
s3_both.o: ../include/openssl/tls1.h ../include/openssl/x509.h
s3_both.o: ../include/openssl/x509_vfy.h s3_both.c ssl_locl.h
s3_clnt.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s3_clnt.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s3_clnt.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s3_clnt.o: ../include/openssl/dh.h ../include/openssl/dsa.h
s3_clnt.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
s3_clnt.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
s3_clnt.o: ../include/openssl/ecdsa.h ../include/openssl/engine.h
s3_clnt.o: ../include/openssl/err.h ../include/openssl/evp.h
s3_clnt.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s3_clnt.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s3_clnt.o: ../include/openssl/md5.h ../include/openssl/obj_mac.h
s3_clnt.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
s3_clnt.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
s3_clnt.o: ../include/openssl/pem.h ../include/openssl/pem2.h
s3_clnt.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
s3_clnt.o: ../include/openssl/pqueue.h ../include/openssl/rand.h
s3_clnt.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
s3_clnt.o: ../include/openssl/sha.h ../include/openssl/ssl.h
s3_clnt.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
s3_clnt.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
s3_clnt.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
s3_clnt.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h kssl_lcl.h
s3_clnt.o: s3_clnt.c ssl_locl.h
s3_enc.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s3_enc.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s3_enc.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s3_enc.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s3_enc.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s3_enc.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s3_enc.o: ../include/openssl/err.h ../include/openssl/evp.h
s3_enc.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s3_enc.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s3_enc.o: ../include/openssl/md5.h ../include/openssl/obj_mac.h
s3_enc.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
s3_enc.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
s3_enc.o: ../include/openssl/pem.h ../include/openssl/pem2.h
s3_enc.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
s3_enc.o: ../include/openssl/pqueue.h ../include/openssl/rsa.h
s3_enc.o: ../include/openssl/safestack.h ../include/openssl/sha.h
s3_enc.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
s3_enc.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
s3_enc.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
s3_enc.o: ../include/openssl/tls1.h ../include/openssl/x509.h
s3_enc.o: ../include/openssl/x509_vfy.h s3_enc.c ssl_locl.h
s3_lib.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s3_lib.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s3_lib.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s3_lib.o: ../include/openssl/dh.h ../include/openssl/dsa.h
s3_lib.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
s3_lib.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
s3_lib.o: ../include/openssl/ecdsa.h ../include/openssl/err.h
s3_lib.o: ../include/openssl/evp.h ../include/openssl/fips.h
s3_lib.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
s3_lib.o: ../include/openssl/lhash.h ../include/openssl/md5.h
s3_lib.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s3_lib.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s3_lib.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s3_lib.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s3_lib.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s3_lib.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
s3_lib.o: ../include/openssl/sha.h ../include/openssl/ssl.h
s3_lib.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
s3_lib.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
s3_lib.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
s3_lib.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h kssl_lcl.h
s3_lib.o: s3_lib.c ssl_locl.h
s3_meth.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s3_meth.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s3_meth.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s3_meth.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s3_meth.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s3_meth.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s3_meth.o: ../include/openssl/err.h ../include/openssl/evp.h
s3_meth.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s3_meth.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s3_meth.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s3_meth.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s3_meth.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s3_meth.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s3_meth.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s3_meth.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
s3_meth.o: ../include/openssl/sha.h ../include/openssl/ssl.h
s3_meth.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
s3_meth.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
s3_meth.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
s3_meth.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h s3_meth.c
s3_meth.o: ssl_locl.h
s3_pkt.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s3_pkt.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s3_pkt.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s3_pkt.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
s3_pkt.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
s3_pkt.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
s3_pkt.o: ../include/openssl/err.h ../include/openssl/evp.h
s3_pkt.o: ../include/openssl/fips.h ../include/openssl/hmac.h
s3_pkt.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s3_pkt.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
s3_pkt.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
s3_pkt.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
s3_pkt.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
s3_pkt.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
s3_pkt.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
s3_pkt.o: ../include/openssl/sha.h ../include/openssl/ssl.h
s3_pkt.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
s3_pkt.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
s3_pkt.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
s3_pkt.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h s3_pkt.c
s3_pkt.o: ssl_locl.h
s3_srvr.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
s3_srvr.o: ../include/openssl/bn.h ../include/openssl/buffer.h
s3_srvr.o: ../include/openssl/comp.h ../include/openssl/crypto.h
s3_srvr.o: ../include/openssl/dh.h ../include/openssl/dsa.h
s3_srvr.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
s3_srvr.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
s3_srvr.o: ../include/openssl/ecdsa.h ../include/openssl/err.h
s3_srvr.o: ../include/openssl/evp.h ../include/openssl/fips.h
s3_srvr.o: ../include/openssl/hmac.h ../include/openssl/krb5_asn.h
s3_srvr.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
s3_srvr.o: ../include/openssl/md5.h ../include/openssl/obj_mac.h
s3_srvr.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
s3_srvr.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
s3_srvr.o: ../include/openssl/pem.h ../include/openssl/pem2.h
s3_srvr.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
s3_srvr.o: ../include/openssl/pqueue.h ../include/openssl/rand.h
s3_srvr.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
s3_srvr.o: ../include/openssl/sha.h ../include/openssl/ssl.h
s3_srvr.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
s3_srvr.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
s3_srvr.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
s3_srvr.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h kssl_lcl.h
s3_srvr.o: s3_srvr.c ssl_locl.h
ssl_algs.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
ssl_algs.o: ../include/openssl/bn.h ../include/openssl/buffer.h
ssl_algs.o: ../include/openssl/comp.h ../include/openssl/crypto.h
ssl_algs.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
ssl_algs.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
ssl_algs.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
ssl_algs.o: ../include/openssl/err.h ../include/openssl/evp.h
ssl_algs.o: ../include/openssl/fips.h ../include/openssl/hmac.h
ssl_algs.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
ssl_algs.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
ssl_algs.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
ssl_algs.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
ssl_algs.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
ssl_algs.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
ssl_algs.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
ssl_algs.o: ../include/openssl/sha.h ../include/openssl/ssl.h
ssl_algs.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
ssl_algs.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
ssl_algs.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
ssl_algs.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h ssl_algs.c
ssl_algs.o: ssl_locl.h
ssl_asn1.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/asn1_mac.h
ssl_asn1.o: ../include/openssl/bio.h ../include/openssl/bn.h
ssl_asn1.o: ../include/openssl/buffer.h ../include/openssl/comp.h
ssl_asn1.o: ../include/openssl/crypto.h ../include/openssl/dsa.h
ssl_asn1.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
ssl_asn1.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
ssl_asn1.o: ../include/openssl/ecdsa.h ../include/openssl/err.h
ssl_asn1.o: ../include/openssl/evp.h ../include/openssl/fips.h
ssl_asn1.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
ssl_asn1.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
ssl_asn1.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
ssl_asn1.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
ssl_asn1.o: ../include/openssl/pem.h ../include/openssl/pem2.h
ssl_asn1.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
ssl_asn1.o: ../include/openssl/pqueue.h ../include/openssl/rsa.h
ssl_asn1.o: ../include/openssl/safestack.h ../include/openssl/sha.h
ssl_asn1.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
ssl_asn1.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
ssl_asn1.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
ssl_asn1.o: ../include/openssl/tls1.h ../include/openssl/x509.h
ssl_asn1.o: ../include/openssl/x509_vfy.h ssl_asn1.c ssl_locl.h
ssl_cert.o: ../crypto/o_dir.h ../e_os.h ../include/openssl/asn1.h
ssl_cert.o: ../include/openssl/bio.h ../include/openssl/bn.h
ssl_cert.o: ../include/openssl/buffer.h ../include/openssl/comp.h
ssl_cert.o: ../include/openssl/conf.h ../include/openssl/crypto.h
ssl_cert.o: ../include/openssl/dh.h ../include/openssl/dsa.h
ssl_cert.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
ssl_cert.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
ssl_cert.o: ../include/openssl/ecdsa.h ../include/openssl/err.h
ssl_cert.o: ../include/openssl/evp.h ../include/openssl/fips.h
ssl_cert.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
ssl_cert.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
ssl_cert.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
ssl_cert.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
ssl_cert.o: ../include/openssl/pem.h ../include/openssl/pem2.h
ssl_cert.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
ssl_cert.o: ../include/openssl/pqueue.h ../include/openssl/rsa.h
ssl_cert.o: ../include/openssl/safestack.h ../include/openssl/sha.h
ssl_cert.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
ssl_cert.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
ssl_cert.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
ssl_cert.o: ../include/openssl/tls1.h ../include/openssl/x509.h
ssl_cert.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h
ssl_cert.o: ssl_cert.c ssl_locl.h
ssl_ciph.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
ssl_ciph.o: ../include/openssl/bn.h ../include/openssl/buffer.h
ssl_ciph.o: ../include/openssl/comp.h ../include/openssl/crypto.h
ssl_ciph.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
ssl_ciph.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
ssl_ciph.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
ssl_ciph.o: ../include/openssl/err.h ../include/openssl/evp.h
ssl_ciph.o: ../include/openssl/fips.h ../include/openssl/hmac.h
ssl_ciph.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
ssl_ciph.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
ssl_ciph.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
ssl_ciph.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
ssl_ciph.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
ssl_ciph.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
ssl_ciph.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
ssl_ciph.o: ../include/openssl/sha.h ../include/openssl/ssl.h
ssl_ciph.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
ssl_ciph.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
ssl_ciph.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
ssl_ciph.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h ssl_ciph.c
ssl_ciph.o: ssl_locl.h
ssl_err.o: ../include/openssl/asn1.h ../include/openssl/bio.h
ssl_err.o: ../include/openssl/bn.h ../include/openssl/buffer.h
ssl_err.o: ../include/openssl/comp.h ../include/openssl/crypto.h
ssl_err.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
ssl_err.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
ssl_err.o: ../include/openssl/ecdsa.h ../include/openssl/err.h
ssl_err.o: ../include/openssl/evp.h ../include/openssl/fips.h
ssl_err.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
ssl_err.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
ssl_err.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
ssl_err.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
ssl_err.o: ../include/openssl/pem.h ../include/openssl/pem2.h
ssl_err.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
ssl_err.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
ssl_err.o: ../include/openssl/sha.h ../include/openssl/ssl.h
ssl_err.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
ssl_err.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
ssl_err.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
ssl_err.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h ssl_err.c
ssl_err2.o: ../include/openssl/asn1.h ../include/openssl/bio.h
ssl_err2.o: ../include/openssl/bn.h ../include/openssl/buffer.h
ssl_err2.o: ../include/openssl/comp.h ../include/openssl/crypto.h
ssl_err2.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
ssl_err2.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
ssl_err2.o: ../include/openssl/ecdsa.h ../include/openssl/err.h
ssl_err2.o: ../include/openssl/evp.h ../include/openssl/fips.h
ssl_err2.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
ssl_err2.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
ssl_err2.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
ssl_err2.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
ssl_err2.o: ../include/openssl/pem.h ../include/openssl/pem2.h
ssl_err2.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
ssl_err2.o: ../include/openssl/pqueue.h ../include/openssl/safestack.h
ssl_err2.o: ../include/openssl/sha.h ../include/openssl/ssl.h
ssl_err2.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
ssl_err2.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
ssl_err2.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
ssl_err2.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h ssl_err2.c
ssl_lib.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
ssl_lib.o: ../include/openssl/bn.h ../include/openssl/buffer.h
ssl_lib.o: ../include/openssl/comp.h ../include/openssl/conf.h
ssl_lib.o: ../include/openssl/crypto.h ../include/openssl/dh.h
ssl_lib.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
ssl_lib.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
ssl_lib.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
ssl_lib.o: ../include/openssl/engine.h ../include/openssl/err.h
ssl_lib.o: ../include/openssl/evp.h ../include/openssl/fips.h
ssl_lib.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
ssl_lib.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
ssl_lib.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
ssl_lib.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
ssl_lib.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
ssl_lib.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
ssl_lib.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
ssl_lib.o: ../include/openssl/rand.h ../include/openssl/rsa.h
ssl_lib.o: ../include/openssl/safestack.h ../include/openssl/sha.h
ssl_lib.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
ssl_lib.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
ssl_lib.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
ssl_lib.o: ../include/openssl/tls1.h ../include/openssl/x509.h
ssl_lib.o: ../include/openssl/x509_vfy.h ../include/openssl/x509v3.h kssl_lcl.h
ssl_lib.o: ssl_lib.c ssl_locl.h
ssl_rsa.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
ssl_rsa.o: ../include/openssl/bn.h ../include/openssl/buffer.h
ssl_rsa.o: ../include/openssl/comp.h ../include/openssl/crypto.h
ssl_rsa.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
ssl_rsa.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
ssl_rsa.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
ssl_rsa.o: ../include/openssl/err.h ../include/openssl/evp.h
ssl_rsa.o: ../include/openssl/fips.h ../include/openssl/hmac.h
ssl_rsa.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
ssl_rsa.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
ssl_rsa.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
ssl_rsa.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
ssl_rsa.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
ssl_rsa.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
ssl_rsa.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
ssl_rsa.o: ../include/openssl/sha.h ../include/openssl/ssl.h
ssl_rsa.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
ssl_rsa.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
ssl_rsa.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
ssl_rsa.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h ssl_locl.h
ssl_rsa.o: ssl_rsa.c
ssl_sess.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
ssl_sess.o: ../include/openssl/bn.h ../include/openssl/buffer.h
ssl_sess.o: ../include/openssl/comp.h ../include/openssl/crypto.h
ssl_sess.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
ssl_sess.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
ssl_sess.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
ssl_sess.o: ../include/openssl/engine.h ../include/openssl/err.h
ssl_sess.o: ../include/openssl/evp.h ../include/openssl/fips.h
ssl_sess.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
ssl_sess.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
ssl_sess.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
ssl_sess.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
ssl_sess.o: ../include/openssl/pem.h ../include/openssl/pem2.h
ssl_sess.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
ssl_sess.o: ../include/openssl/pqueue.h ../include/openssl/rand.h
ssl_sess.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
ssl_sess.o: ../include/openssl/sha.h ../include/openssl/ssl.h
ssl_sess.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
ssl_sess.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
ssl_sess.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
ssl_sess.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h ssl_locl.h
ssl_sess.o: ssl_sess.c
ssl_stat.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
ssl_stat.o: ../include/openssl/bn.h ../include/openssl/buffer.h
ssl_stat.o: ../include/openssl/comp.h ../include/openssl/crypto.h
ssl_stat.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
ssl_stat.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
ssl_stat.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
ssl_stat.o: ../include/openssl/err.h ../include/openssl/evp.h
ssl_stat.o: ../include/openssl/fips.h ../include/openssl/hmac.h
ssl_stat.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
ssl_stat.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
ssl_stat.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
ssl_stat.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
ssl_stat.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
ssl_stat.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
ssl_stat.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
ssl_stat.o: ../include/openssl/sha.h ../include/openssl/ssl.h
ssl_stat.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
ssl_stat.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
ssl_stat.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
ssl_stat.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h ssl_locl.h
ssl_stat.o: ssl_stat.c
ssl_txt.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
ssl_txt.o: ../include/openssl/bn.h ../include/openssl/buffer.h
ssl_txt.o: ../include/openssl/comp.h ../include/openssl/crypto.h
ssl_txt.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
ssl_txt.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
ssl_txt.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
ssl_txt.o: ../include/openssl/err.h ../include/openssl/evp.h
ssl_txt.o: ../include/openssl/fips.h ../include/openssl/hmac.h
ssl_txt.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
ssl_txt.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
ssl_txt.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
ssl_txt.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
ssl_txt.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
ssl_txt.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
ssl_txt.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
ssl_txt.o: ../include/openssl/sha.h ../include/openssl/ssl.h
ssl_txt.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
ssl_txt.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
ssl_txt.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
ssl_txt.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h ssl_locl.h
ssl_txt.o: ssl_txt.c
t1_clnt.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
t1_clnt.o: ../include/openssl/bn.h ../include/openssl/buffer.h
t1_clnt.o: ../include/openssl/comp.h ../include/openssl/crypto.h
t1_clnt.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
t1_clnt.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
t1_clnt.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
t1_clnt.o: ../include/openssl/err.h ../include/openssl/evp.h
t1_clnt.o: ../include/openssl/fips.h ../include/openssl/hmac.h
t1_clnt.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
t1_clnt.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
t1_clnt.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
t1_clnt.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
t1_clnt.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
t1_clnt.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
t1_clnt.o: ../include/openssl/rand.h ../include/openssl/rsa.h
t1_clnt.o: ../include/openssl/safestack.h ../include/openssl/sha.h
t1_clnt.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
t1_clnt.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
t1_clnt.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
t1_clnt.o: ../include/openssl/tls1.h ../include/openssl/x509.h
t1_clnt.o: ../include/openssl/x509_vfy.h ssl_locl.h t1_clnt.c
t1_enc.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
t1_enc.o: ../include/openssl/bn.h ../include/openssl/buffer.h
t1_enc.o: ../include/openssl/comp.h ../include/openssl/crypto.h
t1_enc.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
t1_enc.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
t1_enc.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
t1_enc.o: ../include/openssl/err.h ../include/openssl/evp.h
t1_enc.o: ../include/openssl/fips.h ../include/openssl/hmac.h
t1_enc.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
t1_enc.o: ../include/openssl/md5.h ../include/openssl/obj_mac.h
t1_enc.o: ../include/openssl/objects.h ../include/openssl/opensslconf.h
t1_enc.o: ../include/openssl/opensslv.h ../include/openssl/ossl_typ.h
t1_enc.o: ../include/openssl/pem.h ../include/openssl/pem2.h
t1_enc.o: ../include/openssl/pkcs7.h ../include/openssl/pq_compat.h
t1_enc.o: ../include/openssl/pqueue.h ../include/openssl/rsa.h
t1_enc.o: ../include/openssl/safestack.h ../include/openssl/sha.h
t1_enc.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
t1_enc.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
t1_enc.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
t1_enc.o: ../include/openssl/tls1.h ../include/openssl/x509.h
t1_enc.o: ../include/openssl/x509_vfy.h ssl_locl.h t1_enc.c
t1_lib.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
t1_lib.o: ../include/openssl/bn.h ../include/openssl/buffer.h
t1_lib.o: ../include/openssl/comp.h ../include/openssl/conf.h
t1_lib.o: ../include/openssl/crypto.h ../include/openssl/dsa.h
t1_lib.o: ../include/openssl/dtls1.h ../include/openssl/e_os2.h
t1_lib.o: ../include/openssl/ec.h ../include/openssl/ecdh.h
t1_lib.o: ../include/openssl/ecdsa.h ../include/openssl/err.h
t1_lib.o: ../include/openssl/evp.h ../include/openssl/fips.h
t1_lib.o: ../include/openssl/hmac.h ../include/openssl/kssl.h
t1_lib.o: ../include/openssl/lhash.h ../include/openssl/obj_mac.h
t1_lib.o: ../include/openssl/objects.h ../include/openssl/ocsp.h
t1_lib.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
t1_lib.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
t1_lib.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
t1_lib.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
t1_lib.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
t1_lib.o: ../include/openssl/sha.h ../include/openssl/ssl.h
t1_lib.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
t1_lib.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
t1_lib.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
t1_lib.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h
t1_lib.o: ../include/openssl/x509v3.h ssl_locl.h t1_lib.c
t1_meth.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
t1_meth.o: ../include/openssl/bn.h ../include/openssl/buffer.h
t1_meth.o: ../include/openssl/comp.h ../include/openssl/crypto.h
t1_meth.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
t1_meth.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
t1_meth.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
t1_meth.o: ../include/openssl/err.h ../include/openssl/evp.h
t1_meth.o: ../include/openssl/fips.h ../include/openssl/hmac.h
t1_meth.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
t1_meth.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
t1_meth.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
t1_meth.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
t1_meth.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
t1_meth.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
t1_meth.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
t1_meth.o: ../include/openssl/sha.h ../include/openssl/ssl.h
t1_meth.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
t1_meth.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
t1_meth.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
t1_meth.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h ssl_locl.h
t1_meth.o: t1_meth.c
t1_reneg.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
t1_reneg.o: ../include/openssl/bn.h ../include/openssl/buffer.h
t1_reneg.o: ../include/openssl/comp.h ../include/openssl/crypto.h
t1_reneg.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
t1_reneg.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
t1_reneg.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
t1_reneg.o: ../include/openssl/err.h ../include/openssl/evp.h
t1_reneg.o: ../include/openssl/fips.h ../include/openssl/hmac.h
t1_reneg.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
t1_reneg.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
t1_reneg.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
t1_reneg.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
t1_reneg.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
t1_reneg.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
t1_reneg.o: ../include/openssl/rsa.h ../include/openssl/safestack.h
t1_reneg.o: ../include/openssl/sha.h ../include/openssl/ssl.h
t1_reneg.o: ../include/openssl/ssl2.h ../include/openssl/ssl23.h
t1_reneg.o: ../include/openssl/ssl3.h ../include/openssl/stack.h
t1_reneg.o: ../include/openssl/symhacks.h ../include/openssl/tls1.h
t1_reneg.o: ../include/openssl/x509.h ../include/openssl/x509_vfy.h ssl_locl.h
t1_reneg.o: t1_reneg.c
t1_srvr.o: ../e_os.h ../include/openssl/asn1.h ../include/openssl/bio.h
t1_srvr.o: ../include/openssl/bn.h ../include/openssl/buffer.h
t1_srvr.o: ../include/openssl/comp.h ../include/openssl/crypto.h
t1_srvr.o: ../include/openssl/dsa.h ../include/openssl/dtls1.h
t1_srvr.o: ../include/openssl/e_os2.h ../include/openssl/ec.h
t1_srvr.o: ../include/openssl/ecdh.h ../include/openssl/ecdsa.h
t1_srvr.o: ../include/openssl/err.h ../include/openssl/evp.h
t1_srvr.o: ../include/openssl/fips.h ../include/openssl/hmac.h
t1_srvr.o: ../include/openssl/kssl.h ../include/openssl/lhash.h
t1_srvr.o: ../include/openssl/obj_mac.h ../include/openssl/objects.h
t1_srvr.o: ../include/openssl/opensslconf.h ../include/openssl/opensslv.h
t1_srvr.o: ../include/openssl/ossl_typ.h ../include/openssl/pem.h
t1_srvr.o: ../include/openssl/pem2.h ../include/openssl/pkcs7.h
t1_srvr.o: ../include/openssl/pq_compat.h ../include/openssl/pqueue.h
t1_srvr.o: ../include/openssl/rand.h ../include/openssl/rsa.h
t1_srvr.o: ../include/openssl/safestack.h ../include/openssl/sha.h
t1_srvr.o: ../include/openssl/ssl.h ../include/openssl/ssl2.h
t1_srvr.o: ../include/openssl/ssl23.h ../include/openssl/ssl3.h
t1_srvr.o: ../include/openssl/stack.h ../include/openssl/symhacks.h
t1_srvr.o: ../include/openssl/tls1.h ../include/openssl/x509.h
t1_srvr.o: ../include/openssl/x509_vfy.h ssl_locl.h t1_srvr.c
|
Gronk cleared to play following concussion
Patriots tight end Rob Gronkowski, left, stretches during a practice Thursday in Minneapolis.
New England Patriots tight end Rob Gronkowski (87) warms up during a practice Thursday, Feb. 1, 2018, in Minneapolis. The Patriots are scheduled to face the Philadelphia Eagles in the NFL Super Bowl 52 football game Sunday, Feb. 4. (AP Photo/Mark Humphrey) Mark Humphrey
New England Patriots owner Robert Kraft, center, and his son, Daniel Kraft, right, talk with former Patriots defensive tackle Vince Wilfork, left, during a practice Thursday, Feb. 1, 2018, in Minneapolis. The Patriots are scheduled to face the Philadelphia Eagles in the NFL Super Bowl 52 football game Sunday, Feb. 4. (AP Photo/Mark Humphrey) Mark Humphrey
By KYLE HIGHTOWER Associated Press
Thursday, February 01, 2018
Print
BLOOMINGTON, Minn. — Patriots tight end Rob Gronkowski has been cleared from the concussion protocol and will play in Sunday’s Super Bowl against the Philadelphia Eagles.
Gronkowski participated fully in practice on Thursday. Defensive lineman Deatrich Wise also practiced after being cleared from the concussion protocol. Malcolm Butler (illness) and Brandon King (knee) also participated in the workout.
Gronk said he is “ready to roll” and has no limitations. He had been sidelined since taking a helmet-to-helmet hit from Jacksonville’s Barry Church in the first half of New England’s AFC championship game win.
The All-Pro tight end missed last year’s Super Bowl win over Atlanta after undergoing back surgery.
Gronkowski said he believes that the team doctors were just using the bye week to be as cautious with the injury as possible.
“We knew the whole time I was gonna be good to go,” he said. “I was progressing really good throughout the week. We just knew I’d be ready and we’ve been practicing like we always do.”
Gronkowski led the team in receiving during the regular season with 69 catches for 1,084 yards and eight touchdowns.
His return gives quarterback Tom Brady another key option against an Eagles defense that finished the regular season ranked fourth in the NFL in defense.
Philadelphia is giving up 229 yards per game through the air in the playoffs. New England comes in averaging 318 yards passing during the postseason.
“He’s a dynamic player. He means a ton to our offense. He really has since he got to our team. It’s always great when he’s out there,” Brady said.
“I’ve played with him a long time, I’ve thrown him a lot of footballs. He knows exactly what to do, he knows where to expect the ball, when to expect it. He’s just a tremendous player for our team.”
In addition to Gronk’s return to practice, the Patriots also got a visit from former defensive lineman Vince Wilfork, who won Super Bowls with New England during the 2004 and 2014 seasons.
Gronkowski said it was always nice to have “a great teammate” such as Wilfork around, but declined to say what words of motivation he offered the team.
“What he said was definitely inspiring — to just cherish the moment,” Gronkowski said. “But other than that, it was good for our team. And I’ll just keep it at that.” |
1. Introduction
===============
Osteosarcoma (OS) is the most common primary bone malignancy which is approximately 19% of all bone tumors. Treatments usually combine aggressive standard-of-care surgical techniques and alkylating agent-based chemotherapy regimens, as improved survival was reported in combined chemotherapy compared to surgical only treatment.^\[[@R1]\]^ However, sarcomas are usually diagnosed at an advanced stage, most primary therapeutic modalities including surgery, chemotherapy and biological therapies are not particularly effective. As one of the lowest survival rates among various cancers, although the 5-year survivorship of OS patients is 70% with localized disease, the survival rate drops to 30% for metastatic cases.^\[[@R2]--[@R4]\]^ And significant differences were observed on the treatment effect even from patients received same therapeutic modalities.^\[[@R5]\]^ Hence, it is of great clinical significance to explore the underlying mechanisms of disease development and progression.
Excision repair cross-complementation group 1 (ERCC1) and excision repair cross- complementation group 2 (ERCC2) are important enzymes in nucleotide excision repair (NER) pathway responsible for restoring cisplatin-induced DNA damages, such as intrastrand and interstrand crosslinks (ICLs). Germline polymorphisms in DNA damage repair genes, such as ERCC1 and ERCC2, could have an important impact on both survival rates and chemotherapy treatment-related toxicity.^\[[@R6]\]^ Therefore, the identification of predictive markers could lead to improved drug selection and treatment outcomes.^\[[@R7],[@R8]\]^
However, the published results from previous studies on the association of ERCC1 and ERCC2 polymorphism with prognosis in chemotherapy-treated osteosarcoma in China were inconsistent. For example, some studies showed that ERCC1 rs11615 is associated with OS survival treatment with cisplatin,^\[[@R9]\]^ and the ERCC1 rs11615CC genotype had a longer overall survival compared with the TT genotype.^\[[@R10]\]^ While there are also results suggested that the ERCC1 rs11615 TT genotype and ERCC2 rs1799793 AA genotype were associated with longer overall survival when compared with those with the wild-type genotype.^\[[@R11]\]^ The conclusions on ERCC2 polymorphism were also inconsistent. Some studies suggested no association between ERCC2 rs13181 polymorphisms and overall survival in patients with osteosarcoma under cisplatin-based chemotherapy.^\[[@R12]--[@R14]\]^ However, a recent meta-analysis found that the ERCC2 rs13181 polymorphisms might influence osteosarcoma prognosis.^\[[@R15]\]^
Thus, we performed a meta-analysis based on the most updated qualified studies trying to make an accurate estimation of such association in Chinese population.
2. Methods
==========
This study was performed based on the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) statements. All data were extracted from previous studies, and no direct patient contact or influence on patient care was involved in this research. Thus, ethical approval and informed patient consent were not required.
2.1. Search strategy and data collection
----------------------------------------
Literature search was carried out by 2 investigators (Dabiao Liu and Xuesong Liu) independently from the PubMed (1966--2015), Embase (1980--2015) and the Web of Science (1945--2015) using the search term based on a combination of Medical Subject Headings (MeSH) and text words relating to "ERCC1", "ERCC2", " osteosarcoma", and "chemotherapy". Dabiao Liu reviewed the literature and extract the data. Possible review author\'s bias, however, might exist due to limited literature resources.
The retrieved literature (up to November 11, 2015) was further screened based on the following criteria for inclusion in our analysis: ERCC1 and ERCC2 genetic polymorphisms and overall survival (OS), event-free survival (EFS), progression-free survival (PFS) and 5 years survival rate, the event at the end of follow-up time in osteosarcoma patients' treatment with chemotherapy in Chinese population. During this screening process, all included studies were also evaluated in terms of the selection bias in the clinical trials. All participants recruited in the related studies were randomly selected to allow random sequence generation. The groups, if applicable, were all randomly assigned without foreknowledge of the forthcoming allocations. Performance and detection bias was also reduced in all included studies by performing effective blinding during the monitoring period in the clinical trials. Both groups described in the included studies received similar treatment and interventions. Possible reporting bias might exist in those studies which might slightly affect the results from individual studies. Exclusion criteria were the following:
1. other treatment method such as surgery and radiotherapy;
2. the study population is not Chinese;
3. duplicates, review articles.
We collected the data of outcomes from all qualified studies for the construction of a 2 × 2 (dichotomous data) table, to assess the relationship between SNP of ERCC1 and ERCC2 and the prognosis in osteosarcoma patient from chemotherapy. All randomized controlled trials included in the manuscript were evaluated to meet the quality assurance of the meta-analysis based on the quality of reports of meta-analyses (QUORUM) guidelines.
2.2. Statistical methods
------------------------
Forest plots were constructed using STATA 12 software (STATA Corp LP, College Station, Texas, United States). Where appropriate, odds ratios (ORs) with 95% CIs were pooled for the survival rate in different osteosarcoma patients with ERCC1 and ERCC2 genetic polymorphisms. The heterogeneity of results across the studies was assessed using the I^2^ test. If statistical heterogeneity was small (I^2^ \< 50%) a Mantel--Haenszel fixed-effects model was used. For studies with moderate statistical heterogeneity (I^2^ \> 50%), the D-L random-effect model was applied. Potential publication bias of the datasets used in our analysis was assessed by Begg funnel plot and Egger linear regression test.
3. Result
=========
3.1. Study description
----------------------
Total 42 articles were retrieved from first round search, of which 35 studies were excluded after a careful review. Seven qualified studies with 1404 OS patients were included in this meta-analysis. The selection process and the reasons for exclusion were illustrated in Figure [1](#F1){ref-type="fig"}. The characteristics of included studies were summarized in Table [1](#T1){ref-type="table"}. Possible bias might exist in the included studies, however, full evaluations were performed on each included studies.
{#F1}
######
Characteristics of studies in the meta-analysis.

3.2. ERCC1 rs11615 SNP and prognosis of chemotherapy in OS patient
------------------------------------------------------------------
Total of 1284 OS patients from 6 studies were pooled to investigate the relationship between rs11615 and prognosis of chemotherapy. The D-L random-effect model was applied due to the obvious between-study heterogeneity (*P* \< .10 and I^2^ \> 50% under all models). We did not find significant association under either dominant \[TT+TC vs. CC: OR = 1.252, 95% CI:0.864--1.815, *P* = .235\], recessive \[TT vs. TC+CC: OR = 0.850 95% CI: 0.695--1.030, *P* = .095\] or allelic model \[T vs. C Allele: OR = 1.219, 95% CI: 0.922--1.612, *P* = .165\] (Table [2](#T2){ref-type="table"}, Fig. [2](#F2){ref-type="fig"}A). Begg funnel plots and Egger test were used to assessing the potential publication bias in included studies under all model. Begg funnel plot did not show asymmetry for all 3 models with *P* \> .05 (Fig. [2](#F2){ref-type="fig"}B--D, Table [2](#T2){ref-type="table"}). However, the *P* value of Egger linear regression test reveals evidence of obvious asymmetry (Table [2](#T2){ref-type="table"}, *P* \< .05).
######
Pooled data for the correlation between ERCC1 and ERCC2 SNP and the response rate of chemotherapy.

![A: Forest plots for association between ERCC1 rs11615 polymorphism and survival rate in OS patient treated with chemotherapy \[Dominant model (AA+AC vs. CC); Recessive model (AA vs. AC+CC); Allelic Model (A allele vs. C allele)\]; Funnel plots for B: Dominant model (AA+AC vs. CC); C: Recessive model (AA vs. AC+CC); D: Allelic Model (A allele vs. C allele). OS = osteosarcoma.](medi-97-e13358-g004){#F2}
3.3. Relation between response rate and ERCC2 SNP in OS patient
---------------------------------------------------------------
Seven studies were pooled to investigate the relationship between rs13181 and prognosis of chemotherapy with a total of 1398 OS patients. As no between-study heterogeneity was observed (*P* \> .10 and I^2^ \< 50% under all genetic models), the fix-effect model was used for all genetic models. No significant association was detected under either dominant \[AA+AC vs. CC: OR = 1.031, 95% CI: 0.800--1.329, *P* = .801\], recessive \[AA vs. AC+CC: OR = 1.005, 95% CI: 0.875--1.154, *P* = .944\] or allelic model \[A vs. C Allele: OR = 1.009, 95% CI: 0.903--1.128, *P* = .870\] (Table [2](#T2){ref-type="table"}, Fig. [3](#F3){ref-type="fig"} A). Begg funnel plots did not show asymmetry for all 3 models with *P* \> .05 (Fig. [3](#F3){ref-type="fig"} B--D, Table [2](#T2){ref-type="table"}). The *P* values of the Egger test were greater than .05 for the recessive and allelic model; while *P* = .012 in dominant model (Table [2](#T2){ref-type="table"}).
![A: Forest plots for association between ERCC2 rs13181 polymorphism and survival rate in OS patient treated with chemotherapy \[Dominant model (AA+AC vs. CC); Recessive model (AA vs. AC+CC); Allelic Model (A allele vs. C allele).\]; Funnel plots for B: Dominant model (AA+AC vs. CC); C: Recessive model (AA vs. AC+CC); D: Allelic Model (A allele vs. C allele). OS = osteosarcoma.](medi-97-e13358-g005){#F3}
![A: Forest plots for association between ERCC2 rs13181 polymorphism and survival rate in OS patient treated with chemotherapy \[Dominant model (AA+AC vs. CC); Recessive model (AA vs. AC+CC); Allelic Model (A allele vs. C allele).\]; Funnel plots for B: Dominant model (AA+AC vs. CC); C: Recessive model (AA vs. AC+CC); D: Allelic Model (A allele vs. C allele). OS = osteosarcoma.](medi-97-e13358-g006){#F4}
The relationship between rs1799793 and prognosis of chemotherapy was analyzed with a total of 1215 OS patients from 6 studies. Due to the obvious between-study heterogeneity (*P* \> .10 and I^2^ \< 50% under all genetic models), the fix-effect model was used for all genetic models. As shown in Figure [4](#F4){ref-type="fig"} A, no significant association was found under dominant \[GG+GA vs. AA: OR = 1.134, 95% CI: 0.884--1.454, *P* = .322, recessive \[GG vs. AG+AA: OR = 1.025, 95% CI: 0.881--1.192, *P* = .750\], or allelic model \[G vs. A Allele: OR = 1.046, 95% CI: 0.930--1.177, *P* = .450\] (Table [2](#T2){ref-type="table"}). All the Begg funnel plots under 3 models were symmetrical and *P* values of Egger test were all greater than .05 (Fig. [4](#F4){ref-type="fig"} B--D, Table [2](#T2){ref-type="table"}).
![A: Forest plots for association between ERCC2 rs1799793 polymorphism and survival rate in OS patient treated with chemotherapy \[Dominant model (GG+GA vs. AA); Recessive model (GG vs. AG+AA); Allelic Model (G allele vs. A allele).\]; Funnel plots for B: Dominant model (GG+GA vs. AA); C: Recessive model (GG vs. AG+AA); D: Allelic Model (G allele vs. A allele). OS = osteosarcoma.](medi-97-e13358-g007){#F5}
![A: Forest plots for association between ERCC2 rs1799793 polymorphism and survival rate in OS patient treated with chemotherapy \[Dominant model (GG+GA vs. AA); Recessive model (GG vs. AG+AA); Allelic Model (G allele vs. A allele).\]; Funnel plots for B: Dominant model (GG+GA vs. AA); C: Recessive model (GG vs. AG+AA); D: Allelic Model (G allele vs. A allele). OS = osteosarcoma.](medi-97-e13358-g008){#F6}
4. Discussion
=============
Currently, the multidisciplinary approach for osteosarcoma patients follows a neoadjuvant therapy, including 4 drugs: high-dose methotrexate, doxorubicin, cisplatin, and ifosfamide, followed by surgery.^\[[@R16]\]^ Studies showed that the outcome of neoadjuvant chemotherapy varies for patients with tumors show \>90% necrosis vs whose tumors do not respond to the chemotherapy.^\[[@R17]\]^ The identification and validation of surrogate biomarkers are of great clinical significance for personalized therapy and patients' quality of life in osteosarcoma treatment regimen. For those patients unlikely to respond to the alkylating agent-based chemotherapy, alternative therapy should be offered.
In the present meta-analysis, with the most updated sample size from 7 qualified studies of 1404 OS patients in the Chinese population, we tried to validate some ERCC1 and ERCC2 prognostic biomarkers for osteosarcoma after chemotherapy. Under all models tested, contrary to previous publications, our results could not find prominent association between 3 ERCC1 and ERCC2 polymorphisms (rs11614, rs13181, and rs1799793) and prognosis of OS patient treated with chemotherapy in the Chinese population. The discrepancy of our results from previous studies may be caused by different study design, tumor types and most likely the sample size. Our result suggested that rs11615, rs13181, and rs1799793 could not be used as surrogate markers for clinical outcome of osteosarcoma treatment with chemotherapy.
Similar to all other meta-analysis, our study might have some limitations. First of all, different source data may generate heterogeneity in the current meta-analysis. For example, moderate-high heterogeneity was detected by the I^2^ test in some data sets. Secondly, publication bias might be an issue. In this study, we used a funnel plot for the detection of potential publication bias or heterogeneity and further evaluated by Egger linear test. For some model, although no asymmetry was observed, but the *P* values of Egger are smaller than .05, suggesting publication bias might not be excluded. More studies should be included in the future to further confirm our result.
In conclusion, rs11615, rs13181, and rs1799793 are not prognostic markers for osteosarcoma patients. The developing of validated clinical prognostic biomarkers and treatments based on the individual molecular profile instead of general chemotherapy will open new avenues for osteosarcoma patient care.
Author contributions
====================
**Formal analysis:** Dabiao Liu.
**Methodology:** Dabiao Liu.
**Writing -- original draft:** Dabiao Liu.
**Writing -- review, and editing:** Dabiao Liu and Xuesong Liu.
Abbreviations: ERCC1 = excision repair cross-complementation group 1, ERCC2 = excision repair cross-complementation group 2, ICLs = intrastrand and interstrand crosslinks, MeSH = medical subject headings, NER = nucleotide excision repair, ORs = odd ratios, OS = osteosarcoma.
The authors have no conflicts of interest to disclose.
|
[Eosinophilic polypoid cystitis with flat carcinoma in situ of the overlying epithelium].
A case of eosinophilic polypoid cystitis with flat carcinoma in situ of the overlying epithelium is described. This is the first case with such an association encountered in our series comprised of 26 bladder surgical specimens and represents an incidence rate of 0.38%. The clinical case described herein is that of a 62-year-old male patient with a clinical picture of hematuria, frequency and urgency. Patient cystoscopic evaluation revealed a congestive and edematous mucosa at the level of the trigone and sessile polyps. Microscopic examination revealed flat urothelium with anisokaryosis, hyperchromatic nuclei, atypical mitosis, and loss of polarity; chorion with diffuse, dense inflammatory infiltrate comprised of eosinophils accounting for greater than 90% of the cell population, plasma cells, mastocytes, edema and vascular congestion. Epithelial erosion and capillary thrombosis were also observed. We discuss the etiology, clinical features and treatment reported elsewhere. |
BREADTALK Group is cutting between 10 and 50 per cent of salaries temporarily as part of a cost-saving exercise amid the coronavirus outbreak, the company said on Monday.
From March until June, senior management executives are taking a pay cut of between 30 and 50 per cent while middle... |
Microbial lipids and added value metabolites production by Yarrowia lipolytica from pork lard.
Yarrowia lipolytica is a suitable microbial platform to convert low-value hydrophobic substrates into microbial oils and other important metabolites. In this work, this yeast species was used to simultaneously synthetize ex novo lipids and produce citric acid and lipase from animal fat (pork lard) adding higher value to the low-cost fatty substrate. The effect of pH, lard concentration, arabic gum concentration and oxygen mass transfer rate (OTR) on lipids accumulation on Y. lipolytica batch cultures was assessed by an experimental design based on Taguchi method. OTR was by far the most influential parameter in the range of 96mgL-1h-1-480mgL-1h-1. A bio-modification of initial lipidic substrate was observed and, depending on the nutritional and operational conditions, specialty lipids with specific composition and high added-value were obtained. The unsaturated-to-saturated fatty acids ratio of these microbial lipids is higher than in initial substrate, which indicates that they are more suitable than animal fat for food additives. Moreover, the simultaneous induction of lipase and citric acid by Y. lipolytica growing in animal fat demonstrates that a biorefinery approach may be designed based on animal fat raw material. |
If you want to know which wellness fad will next break the internet, ask your grandmother. Everything she believes in is currently trending - By Parizaad Khan Sethi
Hands up if you rolled your eyes at your grandmother when she told you that nature’s remedies were the best beauty products. But she’s having the last laugh now, as the world slowly wakes up to the inherent goodness of ingredients like turmeric, neem and moringa.
Here’s a roundup of the wellness world’s current favourite nature cures. Give naani or daadi a hug for each one that sounds familiar.
[The irony of western audiences ‘discovering’ the health and beauty benefits of these ingredients is pretty funny, though. The current frontrunner for best Old-is-New Award is Golden Turmeric Latte. Haldi-doodh, anyone?]
Rose water
This distillate of rose petals has long-heralded in Ayurveda to have a balancing and calming effect. Our ancestors couldn’t do without it, and now it seems, neither can we. It’s crazy versatile and we use it to up skin’s hydration levels, soothe skin and control redness and inflammation. Also, spray it on bed sheets to sleep like a baby. Read more about the benefits of rose water here.
Celebrity lovers: Kim Kardashian and Eva Mendez
In: Forest Essentials Pure Rose Water, Kama Ayurveda Pure Rose Water
Coconut oil
The west has discovered the anti-bacterial, -fungal, -microbial and all-round cootie destroying-power of this oil. And the subcontinent’s naanis are saying a collective ‘I told you so’. Besides using cold pressed coconut oil for cleansing off stubborn makeup and moisturizing skin, celebrities and the wellness community has also woken up to oil-pulling, an Ayurvedic detox technique (which can cleanse better than few hundred green juices). Read more here.
Celebrity lovers: Gwyneth Paltrow and Suki Waterhouse
In: Kama Ayurveda Extra Virgin Organic Coconut Oil, Forest Essentials Organic Cold Pressed Virgin Oil Coconut
This ingredient is no stranger to India, having been used as a dye and medicine for centuries. In beauty, indigo has been most commonly used in India—in conjunction with henna—to colour hair. Now, luxury skincare brands are adding the distinctive purple-blue shrub to creams and moisturizers. Indigo has also been popular in other parts of Asia—Geishas have traditionally used it to soothe and repair skin.
In: Kama Ayurveda Bringadi Intensive Hair Treatment Oil (Indigo)
is a beauty and wellness editor based in New York. She was the former beauty editor at Vogue
India and now serves as a contributing editor for the magazine. At age 5, Parizaad fell in
love with an old cream blush she found in the back of her mother’s drawer, and has been in
awe of the transformative power of beauty ever since. When she’s not writing about beauty,
she researches advances in skincare as a hobby, and is constantly guinea-pigging herself in
the name of beauty.
Top Categories
Nykaa.com is a premier online beauty and wellness destination. It offers beauty and wellness products for men and women at best prices. The products are 100 percent genuine and authentic, sourced directly from the brands. Visit Nykaa for a hassle-free shopping experience, the virtual makeover tool, beauty advice and assistance on the phone, free expert advice and articles on beauty trends and tutorials and celebrity looks. You have the option of paying via Cash on Delivery, Debit Card, Credit Card and Net Banking processed through secure and trusted gateways. Now it.s easy to shop for makeup, skincare, hair, bath and body, fragrances, herbal, wellness, mom and baby, and gift products on Nykaa. Avail of some great offers on beauty and wellness products as well. Nykaa also offers free home delivery for many brands. |
header_title: Replacement Windows
Community Builders has beautiful replacement windows installed by our trained team of professionals in Tulsa, Oklahoma City, and Little Rock and the surrounding areas. Contact us today to get your perfect replacement window.
Replacement Windows for Tulsa, Oklahoma City, and Little Rock and the Surrounding Areas
Get rid of your old, drafty windows and get EnviroView windows from Community Builders! Our windows are energy efficient and most of our clients notice HUGE energy savings! With our Low-E coating and airtight installation these energy efficient replacement windows keep cold air in during the summer and out during the winter. Our replacement windows also help block out UV rays that damage carpet and other valuable furniture pieces.
Community Builders, Your Window Replacement Experts
With styles like bay, bow, double hung, casement and more, our replacement windows can fit any home! We can custom fit your new replacement windows to your home. Get beautiful new window replacements from Community Builders and not only save money on your energy bills, but increase your home’s value and curb appeal! Contact Community Builders in Tulsa, Oklahoma City, and Little Rock, and surrounding areas to see how we can get you beautiful, energy efficient replacement windows.
Site Links
What People Are Saying
"We wanted to "Thank You" for the excellent job on our vinyl siding! The installers did a great job and we were especially pleased how well they got along together. We will always have a good word to say about your business! Thank You."- Marius & Ann Fields Tulsa, OK |
//
// Generated by class-dump 3.5 (64 bit) (Debug version compiled Oct 15 2018 10:31:50).
//
// class-dump is Copyright (C) 1997-1998, 2000-2001, 2004-2015 by Steve Nygard.
//
#import <objc/NSObject.h>
@class EDReference, EDTable;
__attribute__((visibility("hidden")))
@interface EFTableData : NSObject
{
struct EFRefTok mRefTok;
EDTable *mTable;
EDReference *mReference;
int mMakeups;
}
- (void)makeup:(id)arg1 with:(int)arg2;
- (id)reference;
- (id)table;
- (unsigned short *)ptgData;
- (const struct EFRefTok *)refTok;
- (void)dealloc;
- (id)initWith:(struct EFStrTok *)arg1;
@end
|
Healthy Pumpkin Bread
There is something almost magical about pumpkin bread --- the wonderful aroma as it makes its way through the house. Of course I am also love the way that the heavenly spices of pumpkin pie spice (cinnamon, cloves, nutmeg and ginger) interact with it.
Now most pumpkin bread recipes only call for cinnamon and nutmeg (in addition to vanilla) but cloves and ginger partner so well with pumpkin and provide just enough additional flavor that these have become can’t miss spices when we make just about any pumpkin recipe.
There is something almost magical about pumpkin bread --- the wonderful aroma as it makes its way through the house. Of course I am also love the way that the heavenly spices of pumpkin pie spice (cinnamon, cloves, nutmeg and ginger) interact with it.
Now most pumpkin bread recipes only call for cinnamon and nutmeg (in addition to vanilla) but cloves and ginger partner so well with pumpkin and provide just enough additional flavor that these have become can’t miss spices when we make just about any pumpkin recipe. |
#region License
/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
#endregion
namespace Gremlin.Net.Structure.IO.GraphSON
{
internal class GraphSONTokens
{
public static string TypeKey = "@type";
public static string ValueKey = "@value";
public static string GremlinTypeNamespace = "g";
}
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.