text
stringlengths
8
5.77M
THE STAR WARS Last Jedi teaser trailer revealed that Luke wants the Jedi to end. Is this proof he is a Grey Jedi or turning into a Sith in the footsteps of Darth Plagueis? Either way, surely this makes him the Chosen One? Explosive first stills of Star Wars: The Last Jedi It seems like that the ancient tome shown in the teaser is The Journal of The Whills, which holds the history of the Force. A famous passage was used in the Force Awakens novelisation. It says: "First comes the day, the comes the night. After the Darkness shines through the Light. The difference, they say, is only made right by the resolving of Grey through refined Jedi sight." The Grey Jedi believed that the Jedi Order was too limited and closed to other parts of the Force. DISNEY Did The Last Jedi teaser show the Journal of the Whills? DISNEY Lor San Tekka in The Force Awakens The teaser also featured the voice of Yoda whispering what sounds like a reference to the Force: "Surrounds us, binds us." This links to another passage in the Journal of the Whills which says: "The Force binds us all from a certai point of view." We also know that Luke was helped by Lor San Tekka, who we saw meet Poe before being killed by Kylo Ren in the opening scenes of The Force Awakens. Lor was a member of the Church of the Force and was helping Luke discover about the origins of the Jedi. Carrie Fisher in pictures Tue, April 18, 2017 Carrie Fisher, best known for her role as Princess Leia in the original Star Wars trilogy, died suddenly in December 2016 aged 60. Celebrate her life in pictures. What he has doubtlessly discovered is that the Jedi are just as big an obstacle as the Sith to restoring balance to the Force. Worryingly, this is also what Palpatine's master had also come to believe. Star Wars Reading Club says: "Plagueis had come to view the Jedi as no longer as servants of the will of the Force but rather as servants to the Republic and their own dogma. The Jedi had become corrupted by themselves and perverted the the Force by being so singularly focussed on only the Light and so closed-minded about the Dark." Luke' study of the ancient Church, plus the Journal of the Whills, combined with his own history and that of his father can only lead him to one conclusion. To restore balance to the Force, the Jedi must end. A new (or ancient) way of using The Force must be found.
Characteristics of Triatomine infestation and natural Trypanosoma cruzi infection in the State of Rio Grande do Norte, Brazil. INTRODUCTION Natural and artificial ecotope infestation by the kissing bug triatomines and their colonization and infection by Trypanosoma cruzi , the Chagas disease agent, were evaluated in nine municipalities of the State of Rio Grande do Norte, Brazil. METHODS Following identification, triatomine intestinal contents were analyzed by direct microscopic examination, xenoculture, and polymerase chain reaction (PCR) for parasite detection. Trypanosoma cruzi isolates were genotyped using three different markers. RESULTS Of 842 triatomines captured, 65% were Triatoma brasiliensis , 17.8% Triatoma pseudomaculata , 12.5% Panstrongylus lutzi , and 4.7% Rhodnius nasutus . Triatoma brasiliensis and P. lutzi adults were found in the intradomicile. T. brasiliensis, T. pseudomaculata , and R. nasutus nymphs and adults were found in the peridomicile and wild environment. Intradomiciliary and peridomiciliary infestation indexes were 5.6% and 33.7%, respectively. In the peridomicile, chicken coops were the most infested ecotope. The T. cruzi triatomine infection rate was 30.2%, of which PCR detected 29%. P . lutzi (78.1%), T . brasiliensis (24.5%), and T . pseudomaculata (22.7%) were the most infected species. TcII and III genotypes were detected in T. brasiliensis and TcIII in P. lutzi . CONCLUSIONS T. brasiliensis was found in all environments and most ecotopes with high T. cruzi infection rates. High infection rates were also detected in T . pseudomaculata and P. lutzi , suggesting their role in the interchange between the wild and peridomestic transmission cycles. The combination of PCR, microscopic examination, and xenoculture contributed to improving T. cruzi infection evaluation in triatomine bugs. The TcII and TcIII genotypes were predominant in the study area.
Montreal, CA – The city council of Montreal recently voted to ban ownership of pit bulls, causing outrage from dog lovers everywhere. By: John Vibes This article first appeared at FreeThoughtProject The measure was voted by a 37-23 majority, in response to controversy caused by a random dog attack, which was an isolated incident. Mayor Denis Coderre issued a statement after the vote saying, “My duty as mayor of Montreal is making sure I am working for all Montrealers. And I am there to make sure they feel safe and that they are safe.” The new law will go into effect starting on October 3rd, and will effectively ban new ownership of any pit bull or “pit bull type dogs.” The law says that the following breeds will be marked as “pit bull type dogs.” -Staffordshire bull terriers. -American pit bull terriers. -American Staffordshire terriers. -Any mix with these breeds. -Any dog that presents characteristics of one of those breeds. There is a court appeal planned by those who are objecting to the new measure. The Montreal SPCA is among the groups pushing a court challenge of the law, saying that this could lead to the deaths of countless innocent animals. “If the city of Montreal truly wanted to ensure public safety, it would not have forced a rushed adoption of controversial legislation which is unfair, unenforceable, and, most importantly, ineffective,” the agency said in a statement. According to the CBC, those who now own a dog of those breeds in Montreal will have to acquire a special permit in order to keep their pet by Dec. 31, 2016. Those who fail to acquire a permit will have their dog taken and killed after the law goes into effect. The fine print of the law even says that a pit bull must be automatically euthanized when their owner dies. While there has traditionally been heavy debate over larger breeds of dogs, in recent years, the debate has died down. An overwhelming majority of people now agree that like humans, a dog’s temperament and personality are largely based on their upbringing and life experiences. In fact, a recent study conducted at the University of Bristol’s School of Veterinary Sciences showed that a dog’s upbringing, not its breed, is responsible for aggression. The study was published in the journal Applied Animal Behaviour Science in 2014, and was called Human directed aggression in domestic dogs (Canis familiaris): Occurrence in different contexts and risk factors.” The study surveyed 14,000 dog owners in the U.K and found that the dog’s environment was entirely responsible for its aggressive tenancies. This article first appeared at FreeThoughtProject
An image sensor includes an array of pixels to generate their respective charges in response to incidence of light and is configured to output electric signals according to amounts of the charges generated in the respective pixels. An intraoral sensor is one of such image sensors. This intraoral sensor is configured to transmit the electric signals according to amounts of charges through a cable (about two to three meters) to the main body part. The main body part connected to the intraoral sensor operates to display an image generated on the basis of the transmitted electric signals, on a display device or print the image by a printer. The cable connecting the intraoral sensor to the main body part is also used to feed clock signals to order transfer of the charges generated in the respective pixels, and to output bias voltages to the intraoral sensor. The presence of the cable connecting the intraoral sensor to the main body part can cause such an accident that the cable is accidentally caught on something during use of the intraoral sensor, so as to result in breaking the intraoral sensor. This is also the case with the image sensors connected through the cable to the main body part, as well as the intraoral sensors. There were thus proposals on techniques of eliminating the need for the cable connecting the image sensor to the main body part. For example, Japanese Patent Applications Laid-Open No. 11-104128 and No. 2001-252266 disclose the image sensor incorporating a battery and others and configured to perform radio communication with the main body part, and the imaging system using the image sensor. The techniques disclosed in these Applications obviate the need for the cable connecting the image sensor to the main body part.
What if person receiving stimulus check passes away of covid before cashing it.My spouse filed for 2019 but did not use direct deposit.I checked the get my payment.For security reasons, the IRS will mail a letter to your last known address approximately 15 days after the agency deposits your stimulus money or mails your paper check.Is that a “yes” to my question ? … “Do medicaid recipients qualify for the Coronavirus stimulus package ?”.Sarah and Tom filed jointly in 2018, and have 2 kids.Would I have to update anything or will I just automatically receive a paper check?. The Stimulus Payment Calculator Tells You How Much Money ... As of May 3, $188 billion of this extra funding has already been used across over two million loans.If you’re legally allowed to be independent in 2020, you can file and get your stimulus check for 2020.The IRS processed payments for Social Security disability recipients who have not filed tax returns on April 29.Here’s how to track your stimulus payment before it arrives.One response I saw from someone at the IRS was “we didn’t think this would be a problem”.Of the 100 cases, 55 have tested positive for Covid-19 or have the antibodies against the disease, suggesting they previously had the coronavirus and recovered, de Blasio said. Coronavirus Stimulus Package F.A.Q.: Checks, Unemployment ... Will I still get a stimulus check since I filed my 2019 taxes and made under $75k? I read on some of the bills kids over 16 or 18 would get $.If I didn’t file my taxes yet dis year but I’ve done so last year do I qualify.So, what if you fall in between this upper bound where payouts stop and the lower bound where the coronavirus relief payment is maximized? The simple answer is you remove $5 in payout for every $100 in AGI.This is a big loophole in the law: Many college students and young adults will not qualify for these payments.However districts will not enter into any new summer contracts for transportation. Coronavirus Stimulus Check Qualifications: Who Would Get ... The fourth was in late April; it gave $484 billion to initiatives to save small businesses, a coronavirus testing program and hospitals.Because all of the check information comes from data that the IRS collects, people without direct deposit will be sent their checks to the current address, as recorded by the agency.Customers whose trips were canceled had the option to request a refund or receive a 125% credit toward a future cruise.These loans are available for up to $2 million to businesses with fewer than 500 employees, nonprofits, sole proprietors, independent contractors, tribal businesses and more. CA Coronavirus Stimulus Checks: Who Gets Money, Who Doesn ... I hope I get one this year.The IRS plans to start issuing those next week.Market Data provided by Interactive Data (Terms & Conditions).My question is 1.In a press conference leading up to negotiations, Treasury Secretary Steve Mnuchin confirmed that the Trump administration explicitly wanted coronavirus stimulus checks to be sent in the immediate future, within three weeks of the passing of the stimulus package.This may be the case for many senior citizens, Social Security recipients and railroad retirees.What are the rules fo people on SSI &SSDI?. Coronavirus Stimulus Package: What You Need To Know Additionally, the new law provides for cash advances of up $10,000.Another $500 would be given on a per-child basis up to three children.Keep up to date with the latest Coronavirus-related scams at signing up to get these consumer alerts.The IRS reversed an earlier decision and now says it will look at “1099” benefit statements (Form SSA-1099 and Form RRB-1099) to get the information it needs to send out the $1,200 payments automatically in the same manner monthly benefits are received.>>MORE: Need to call the IRS? Here’s a list of IRS phone numbers.“I think the president said that he would have it out by April 6,” he said on CNN.
Predominant HLA-class II bound self-peptides of a hematopoietic progenitor cell line are derived from intracellular proteins. Human myeloid progenitor cells temporarily express HLA class II molecules during the differentiation pathway to granulocytes and macrophages. The significance of major histocompatibility complex (MHC) class II molecules at this stage of development is unknown. As a first stop of inquiry into their function, we have characterized the profile of major self-peptides bound to the HLA-DR molecules expressed by KG-1 cells, a line that shares many of the phenotypic characteristics of colony-forming unit-granulocyte-macrophage progenitors. Searches of protein data bases showed that all matching peptides bound to the HLA-DR molecules of KG-1 cells corresponded to intracellular, rather than exogenous or transmembrane, precursor proteins. Because the absence of a conventional self-peptide repertoire could be related to altered trafficking of class II molecules, the biosynthesis of HLA-DR and the invariant chain proteins was determined. The MHC class II associated invariant chain protein is synthesized normally in KG-1 cells, but processed fragments of invariant chain, class II-associated invariant chain peptides (CLIPs), occupy the antigen-binding groove of KG-1 class II molecules at a much lower frequency compared with that of mature antigen-presenting cells. Low CLIP occupancy of HLA-DR is a characteristic shared by KG-1 cells, normal CD34+ progenitor cells, and HLA-DR+ breast carcinoma cells. The unusual profile of MHC class II bound peptides and the low level of CLIP bound to HLA-DR suggest that the antigen-processing pathway of KG-1 is different from that characterized in professional antigen-presenting cells and that exogenous antigen-processing may be a developmentally acquired characteristic in the myeloid lineage.
The broken mental health system The mental health system in America is in terrible shape, and unless something is done to fix the problem, it’s going to get a lot worse. School shootings, gunmen in malls, “suicide by cop” and other violent acts continue to dominate the headlines and the news cycle with no end in sight. The problems are many, with a severe shortage of mental health care professionals and inpatient facilities, combined with the continual decline of insurance reimbursement rates and increasing bureaucratic hurdles leading more than half of psychiatric providers to stop accepting insurance. This creates an even greater lack of resources — especially for those patients in socioeconomic groups who are not able to pay out of pocket. These patients typically see non-psychiatric physicians, nurse practitioners, physician assistants and other extended-care providers, who handle more than 90 percent of psychiatric care in the United States, yet only receive six to 12 weeks of training in psychiatry over their entire medical school and training careers. All this leads to misdiagnosis and underdiagnoses of mental health conditions. For example, studies have estimated that only 20 percent of patients with bipolar disorder are correctly diagnosed. In a third of bipolar patients, it takes an average of 10 years to get the correct diagnosis. The focus for every provider needs to be on diagnostic accuracy, and this will only come by increased training in mental health care within the entire medical establishment. Training through MOOCs (massive open online courses) is becoming more widely accepted as a means of continuing medical education. These online courses give physicians access to the best teachers in the country. A similar and very simple solution is more online medical education resources that provide timely, unbiased, evidence-based medical education and information from renowned medical experts, researchers and clinicians in the field available on-the-go on all digital devices. We need to make sure there is more emphasis on the detection and treatment of psychiatric illnesses in the early stages. The sooner a patient receives the correct diagnosis, and the quicker treatment is initiated, the better the outcome. Screening for common psychiatric illnesses like mood and anxiety disorders in primary care practices should be part of the initial differential diagnosis, along with other medical illnesses, rather than an afterthought like it currently is for patients who do not respond to medical treatments or in whom the myriad of unnecessary tests are negative. Too many patients are bounced around the system until they receive a proper diagnosis. Educating non-psychiatric providers to be extra vigilant in patients who suffer from depression, anxiety or substance abuse, or who have red flags for certain conditions is one such way to ensure a proper diagnosis the first time. These simple messages presented to every clinician can markedly improve diagnostic accuracy. Subscribe to Breaking News * I understand and agree that registration on or use of this site constitutes agreement to its user agreement and privacy policy. We need to reprioritize the payment structure of the new insurance policies. Reimbursement for psychiatric care should be commensurate with higher reimbursements for providing evidence based care. There should be no expectation that dwindling payments will produce better results. We need to reorganize and strengthen the infrastructure of the mental health field. We need more inpatient psychiatric beds so that the mentally ill are not housed in jails or the streets. The government needs to stop subsidizing organizations and advocacy groups that “help” the mentally ill refuse treatment. The standard for inpatient commitment should be broader than the “imminent danger to self and others” standard. Involuntary outpatient commitment laws like Kendra’s law need to be adopted nationwide. Mental health is the key to our overall health. As a society, we are more aware than ever that staying mentally fit is just as important as maintaining our physical health. Yet, overall, the mental healthcare field has been neglected, which is unacceptable. The costs involved in maintaining the resources needed to support an adequate system are insignificant when compared to the dividends that will be returned to us in productivity, safety, and a better quality of life. Dr. Prakash Masand is a former consulting professor of psychiatry and behavioral sciences at Duke University Medical Center and is CEO of Global Medical Education. gmeded.com Subscribe to Breaking News * I understand and agree that registration on or use of this site constitutes agreement to its user agreement and privacy policy. Watch this discussion.Stop watching this discussion. (0) comments Welcome to the discussion. Keep it Clean. Please avoid obscene, vulgar, lewd, racist or sexually-oriented language.PLEASE TURN OFF YOUR CAPS LOCK.Don't Threaten. Threats of harming another person will not be tolerated.Be Truthful. Don't knowingly lie about anyone or anything.Be Nice. No racism, sexism or any sort of -ism that is degrading to another person.Be Proactive. Use the 'Report' link on each comment to let us know of abusive posts.Share with Us. We'd love to hear eyewitness accounts, the history behind an article.
Q: Is it a bad idea to put the logo in the top-right corner and the navigation in the top-left? Firstly I would like to say that I don't think there is a concrete rule about where the logo on a website should be – but intuitively I think it should be in the top left at least for continuities sake. Is it bad UX to have the navigation placed before a company logo and why? A: This article might also help: Jakob Nielsen: Horizontal Attention Leans Left Extract: People spent more than twice as much time looking at the left side of the page as they did the right: Left half of screen: 69% of viewing time Right half of screen: 30% of viewing time Simply put: Stick to the conventional layout, because it works perfectly with how people look at Web pages: Keep navigation all the way to the left. This is where people look to find a list of current options. Keep the main content a bit further in from the left. The most important stuff should be showcased between one-third and halfway across the page. This is where users focus their attention the most. Keep secondary content to the right. It won't be seen as much here, but that's okay — not everything can get top billing, and you need a place to put less-important material. A: You have to decide what is more important for a company and then what is more representative for that company's website: the logo or the navigation. The positioning of the logo in the top left corner is not a rule set in stone, it's a result of the research that tells us that the eye movement on a website usually starts from the left side. You need to read more on eye movement patters, especially about the F-pattern which is relevant in this case. The bottom line is that if you want the logo to be viewed first, then it would be a good idea to place it on the left side. But, if you acknowledge this and still want to do something else, to be a little different, you could try to change things. I am sure the visitors will still see the logo.
Cardiovascular and renal function of angiotensin II type-2 receptors. While all of the well-known cardiovascular and renal effects of angiotensin II (ANG) are attributed to the ANG type-1 (AT(1)) receptor, much less is known about the function of ANG type-2 (AT(2)) receptors. This review focuses on progress made in AT(2) receptor research over the past 10 years mainly enabled by the availability of AT(2) receptor-deficient mice. Two general mechanisms regarding AT(2) receptor-mediated actions emerge from recent experiments. Firstly, AT(2) receptor stimulation inhibits growth and promotes apoptosis, an important mechanism during development and tissue remodeling. Secondly, ANG stimulates the release of nitric oxide (NO)/cGMP via AT(2) receptor activation, as described in the aorta, heart, and kidney. This effect appears to be indirectly mediated by the modulation of bradykinin release. Thus, activation of AT(2) receptors may be potentially protective and appears to oppose the effects mediated by AT(1) receptors. The question whether AT(2) receptors are activated in patients with elevated ANG levels when treated with AT(1) receptor antagonists and whether these effects are relevant awaits further clarification.
Image use policy TORC Unique ID:LEIC-544574 Object type certainty: Probably Workflow status: Awaiting validation Iron Age copper alloy beaded Torc fragment? 20mm in length, 12mm wide and 7mm thick with a weight of 3.5g. The object is rectangular in form with a V shaped cross section. The upper surface is formed of two sub spherical projections which are separated by a rectangular shaped recess. The objects underside has a V shaped recess. The fragment is very small and badly damaged but its possibly part of a two part beaded Torc, similar examples include
Three bird species, two frogs, a shark, a famous snail and one of the world’s largest freshwater fish were among those declared extinct this year. We lost a lot of species in 2019. The year started with the extinction of a tiny Hawaiian snail and ended with the loss of one of the world’s largest freshwater fishes. Along the way we also said goodbye to three bird species, a shark, two frogs, several plants, and a whole lot more. About two dozen species were declared extinct (or nearly so) in 2019, although the total number of species lost this year probably numbers in the thousands. Scientists typically wait years or even decades before declaring a species well and truly extinct, and even then only after conducting extensive searches. Of course, you can only count what you know exists. Most extinctions, sadly, occur among species that have never been officially observed or named. These plants and animals often live in extremely narrow habitats, making them particularly vulnerable to habitat destruction, pollution, extreme weather events, invasive species or other threats. That doesn’t mean they’ll never be identified — several recently reported extinctions represent species that were discovered among museum samples long after the plants or animals were gone — but you can’t save what you don’t know needs saving in the first place. Although it may take some time to truly understand this year’s effect on the world’s biodiversity, here are the species that scientists and the conservation community declared lost during 2019, culled from the IUCN Red List, scientific publications, a handful of media articles and my own reporting. Only one of these extinctions was observed in real time, when an endling (the last of its kind) died in public view. Most haven’t been seen in decades and were finally added to the list of extinct species. A few represent local extinctions where a species has disappeared from a major part of its range, an important thing to watch since habitat loss and fragmentation are often the first steps toward a species vanishing. Finally, some of these extinctions are tentative, with scientists still looking for the species — an indication that hope remains. Achatinella apexfulva — The last individual of this Hawaiian tree snail, known as “Lonesome George,” died in captivity on New Year’s Day. Disease and invasive predators drove it to extinction. This tiny creature’s disappearance probably generated the most media attention of any lost species in 2019. Alagoas foliage-gleaner (Philydor novaesi) — Known from just two sites in Brazil, this bird was last seen in 2011 and was declared extinct in 2019 following the destruction of its habitats by logging, charcoal production and conversion to agriculture. Boulenger’s speckled skink (Oligosoma infrapunctatum) — A “complete enigma,” unseen for more than 130 years. Scientists hope the announcement of its possible extinction will jumpstart efforts to relocate it and conserve its endangered relatives. Bramble Cay melomys (Melomys rubicola) — Last seen in 2009 when rising oceans lapped at its tiny islet habitat, the melomys was officially declared extinct in 2019, making it the first mammal extinction caused by climate change and sea-level rise. Catarina pupfish (Megupsilon aporus) — This Mexican freshwater fish was known from one spring, which was destroyed by groundwater extraction. The fish was last seen in the wild in 1994, and the last captive population died out in 2012. Chinese paddlefish (Psephurus gladius) — One of the world’s largest freshwater fish, native to the Yangtze River, the paddlefish probably died out between 2005 and 2010 due to overfishing and habitat fragmentation. The IUCN still lists it as “critically endangered,” but a paper published Dec. 23, 2019, declared it extinct after several surveys failed to locate the species. Corquin robber frog (Craugastor anciano) — Last seen in 1990. Native to two sites in Honduras, it was probably killed off by habitat loss and the chytrid fungus. Cryptic treehunter (Cichlocolaptes mazarbarnetti) — A Brazilian bird species last seen alive in 2007 — seven years before scientists officially described it. Its forest habitat has been extensively logged and converted to agriculture. Cunning silverside (Atherinella callida) — This Mexican freshwater fish hasn’t been seen since 1957. The IUCN declared it extinct in 2019. Etlingera heyneana — A plant species collected just one time in 1921 near Jakarta, on Java, the world’s most populous island. The IUCN listed it as extinct in 2019, noting that “practically all natural land in Jakarta has been developed.” Fissidens microstictus — This Portuguese plant species lived in what is now a highly urbanized area and was last seen in 1982. (Scientists declared it extinct back in 1992, but the IUCN didn’t list it as such until this year.) Indochinese tigers (Panthera tigris tigris) in Laos — A local extinction (known as an extirpation) and a major loss for this big cat. Lake Oku puddle frog (Phrynobatrachus njiomock) — Known from one location in Cameroon and unseen since 2010, the IUCN this year declared the recently discovered species “critically endangered (possibly extinct).” “Lost shark” (Carcharhinus obsolerus) — Described from museum samples in 2019, the species hasn’t been seen since the 1930s. It was probably wiped out by overfishing. Miss Waldron’s red colobus (Piliocolobus waldronae) — Unseen for more than four decades, researchers haven’t given up that the rare monkey might still exist but they’ve still declared it “possibly extinct.” Nobregaea latinervis — A moss species last seen in Portugal in 1946 and declared extinct in 2019 (based on a 2014 survey). Poo-uli (Melamprosops phaeosoma) — Invasive species and diseases wiped out this Hawaiian bird, which was last seen in 2004 and declared extinct in 2019. Pycnandra micrantha — A plant species from New Caledonia collected just once in 1901. Its only home on tiny Art Island has been extensively mined and subject to brushfires. Sierra de Omoa streamside frog (Craugastor omoaensis) — Another frog from Honduras. Unseen since 1974, it was probably a victim of habitat loss and the chytrid fungus. Sumatran rhinoceros (Dicerorhinus sumatrensis) in Malaysia — Another extirpation, although the species still exists (on tenuous footing) in Indonesia. Vachellia bolei — A rare legume tree possibly driven extinct by sand mining and other habitat destruction. Victorian grasslands earless dragon (Tympanocryptis pinguicolla) — Last seen in 1969. Again, conservationists haven’t given up hope of finding it, but if it’s really gone it would represent Australia’s first known reptile extinction. Villa Lopez pupfish (Cyprinodon ceciliae) — This Mexican fish’s only habitat, a 2-acre spring system, dried up in 1991 and it hasn’t been seen since. The IUCN declared it extinct in 2019. Yangtze giant softshell turtle (Rafetus swinhoei) — The last known female of this species died in China in April during an artificial insemination procedure, making the species effectively extinct. In addition to these extinctions, the IUCN last year declared several species “extinct in the wild,” meaning they now only exist in captivity. They include the Spix’s Macaw (Cyanopsitta spixii), Ameca shiner (Notropis amecae), banded allotoca (Allotoca goslinei), marbled swordtail (Xiphophorus meyeri), Charo Palma pupfish (Cyprinodon veronicae), kunimasu (Oncorhynchus kawamurae) and Monterrey platyfish (Xiphophorus couchianus). What will the future hold for these and other lost species? Some could be rediscovered (the Miss Waldron’s red colobus seems the most likely candidate), but the rest should serve as a stark reminder of what we’re losing all around us every day — and a clarion call to save what’s left. Main image photo credits: Alagoas Foliage-gleaner © Ciro Albano, courtesy IUCN. Poo-uli © Paul E. Baker, U.S. Fish and Wildlife Service (Public Domain). A relative of the Victorian grasslands earless dragon, photographed in 1991 by John Wombey/CSIRO (CC BY 3.0). Bramble Cay melomys via State of Queensland, Environmental Protection Agency (uncredited).
Emergency response training for gas and oil field industry not new to Ohio Ohio is a trendsetter when it comes to training for gas and oil field emergencies. The "Responding to Oil Field Emergencies Training Workshop" by the Ohio Oil and Gas Energy Education Program has been going for more than a dozen years -- longer than the topic raised by the boom in Utica shale mining in the region. "Ohio was one of the first states in the country to create emergency response training for the gas and oil field industry," said Rhonda Reda, executive director of the Ohio Oil and Gas Emergency Education Program. "Seven other states have participated in the training here in Ohio because it is the one of the flagship programs for such training." To date, more than 800 firefighters representing 227 fire departments and 40 Ohio counties have participated in the safety training that is fully funded by donations from natural gas and crude oil producers across the state. Reda said 203 cities, villages and townships have also participated in the training. "More than $1 million has been spend on this training, but no tax dollars have been used to pay for the program," said Reda. "It is fully funded by donations and as a result, there is no cost for the fire departments and firefighters that participate in the training." The proactive training makes emergency responders more aware of the risks of a gas or oil field emergency and how to handle such an emergency. "A lot of firefighters in this area have never been exposed to incidents in a gas or oil field," said New Concord Fire Chief Brent Gates, an instructor for the Ohio Oil and Gas Energy Education Program. "This training makes firefighters aware of what can happen. It makes firefighters more familiar and comfortable with what is going on out there in the fields. "Fighting an outside fire is totally different than fighting a structure fire. You have to develop different techniques and methods to fight these fires," Gates added. The probability an emergency will arise is slim, according to Gates, but incidents such as lightening strikes and oil or gas line ruptures will occur. "The training gives firefighters the confidence to handle these situations," said Gates. According to Reda, the training also educates emergency responders how to recognize real emergencies so they are not tied up evaluating equipment in non-emergency situations and as a result, are unable to respond to an actual emergency. "The training is one of the reasons why you don't hear about a lot of emergencies," said Reda. "This is a well trained industry." The training program meets state and national fire safety standards and is endorsed by the Ohio Fire Chiefs Association. The curriculum was developed with the assistance of emergency responders from all around the state. "It was a collaborative effort," said Reda. "As a result, it's a very good training program. Without the partnership with the fire departments, we would not have a training program."
Q: findViewById returns NULL when using Fragment I'm new to Android developing and of course on Fragments. I want to access the controls of my fragment in main activity but 'findViewById' returns null. without fragment the code works fine. Here's part of my code: The fragment: <?xml version="1.0" encoding="utf-8"?> <LinearLayout xmlns:android="http://schemas.android.com/apk/res/android" xmlns:tools="http://schemas.android.com/tools" android:layout_width="match_parent" android:layout_height="wrap_content" android:orientation="vertical" tools:ignore="HardcodedText" > <EditText android:id="@+id/txtXML" android:layout_width="fill_parent" android:layout_height="fill_parent" android:ems="10" android:scrollbars="vertical"> </EditText> </LinearLayout> the onCreate of MainActivity: @Override public void onCreate(Bundle savedInstanceState) { super.onCreate(savedInstanceState); super.setContentView(R.layout.main); this.initialisePaging(); EditText txtXML = (EditText) findViewById(R.id.txtXML);} on this point the txtXML is null. What's Missing in my code or what should I do? A: Try like this on your fragments on onCreateView public View onCreateView(LayoutInflater inflater, ViewGroup container, Bundle savedInstanceState) { if (container == null) { return null; } LinearLayout ll = (LinearLayout )inflater.inflate(R.layout.tab_frag1_layout, container, false); EditText txtXML = (EditText) ll.findViewById(R.id.txtXML); return ll; } A: You should inflate the layout of the fragment on onCreateView method of the Fragment then you can simply access it's elements with findViewById on your Activity. In this Example my fragment layout is a LinearLayout so I Cast the inflate result to LinearLayout. public class FrgResults extends Fragment { public View onCreateView(LayoutInflater inflater, ViewGroup container, Bundle savedInstanceState) { //some code LinearLayout ll = (LinearLayout)inflater.inflate(R.layout.frg_result, container, false); //some code return ll; } } A: I'm late, but for anyone else having this issue. You should be inflating your view in the onCreateView method. Then override the onCreateActivity method and you can use getView().findViewById there. @Override public View onCreateView(LayoutInflater inflater, ViewGroup container, Bundle savedInstanceState) { return inflater.inflate(R.layout.fragment, container, false); }
Micelles with Sheddable Dendritic Polyglycerol Sulfate Shells Show Extraordinary Tumor Targetability and Chemotherapy in Vivo. Cancer nanomedicines are typically stealthed by a poly(ethylene glycol) layer that is important to obtain extended blood circulation and elevated tumor accumulation. PEG stealth, however, also leads to poor tumor cell selectivity and uptake thereby reducing treatment efficacy. Here, we report that biodegradable micelles with sheddable dendritic polyglycerol sulfate (dPGS) shells show an unusual tumor targetability and chemotherapy in vivo. The self-assembly of dPGS-SS-poly(ε-caprolactone) amphiphilic block copolymer with an Mn of 4.8-3.7 kg mol-1 affords negatively charged and small sized micelles (dPGS-SS-PCL Ms). dPGS-SS-PCL Ms reveal a low cytotoxicity, decent doxorubicin (DOX) loading, and accelerated drug release under a reductive condition. Notably, DOX-loaded dPGS-SS-PCL Ms exhibit a high tolerable dosage of more than 40 mg kg-1, a long plasma half-life of ca. 2.8 h, and an extraordinary tumor accumulation. Intriguingly, therapeutic results demonstrate that DOX-loaded dPGS-SS-PCL Ms induce complete tumor suppression, significantly improved survival rate, and diminishing adverse effects as compared to free drug (DOX·HCl) in MCF-7 human mammary carcinoma models. Dendritic polyglycerol sulfate with a superior tumor homing ability appears to be an attractive alternative to PEG in formulating targeted cancer nanomedicines.
Pages Thursday, October 10, 2013 India's "Abused Goddesses" Campaign Opens Eyes Buzzfeed had a post not too long ago about a deeply moving and fascinating PSA campaign about domestic violence in India. The organization "Save our Sisters" is working to bring awareness to domestic violence and help the victims. More than 68% of women in India are victims of domestic violence. To put that in perspective, in the United States, the rate is 25%. The ads say, “Pray that we never see this day. Today, more than 68% of women in India are victims of domestic violence. Tomorrow, it seems like no woman shall be spared. Not even the ones we pray to.” The advertisements themselves are incredibly striking and beautiful in a painful and sad way. The advertising company took traditional images of the goddesses and made a real-life recreation. They cover the goddess in bruises and cuts. The props in the pictures are either real or painted on. The posters feature a phone number to report abuse. As the Buzzfeed writer points out, this advertisement campaign directly addresses a contradiction in Indian society. They revere many goddesses, but the country remains unsafe for mortal women. This contradiction can be found in other religious traditions as well. Speaking as a Catholic, I can point out the Catholic devotion to Mary and the Church's long history of social justice. Yet, domestic violence still occurs in some Catholic households. Here are some of the ads: Saraswati is the goddess of knowledge, music, the arts, and science. Lakshmi is the goddess of wealth. Knowing the subject of this ad, this is perhaps the most striking of all. Durga is a warrior goddess. She is representative of the victory of good over evil. I have a statue of her in my room (because I like to keep pieces of every part of my religious history). May she give the people of India strength to defeat the evils of domestic violence. For a better view of these ads, including close-ups of some of the details, visit the original Buzzfeed article.
772 F.Supp.2d 1352 (2011) James B. BOUCHARD, Plaintiff, v. Denver Police Officer M. WHETSTONE, Denver Police Officer K. Jimenez, and City of Denver, Defendants. Civil Case No. 09-cv-01884-REB-BNB. United States District Court, D. Colorado. February 24, 2011. *1354 Arthur S. Bowman, Jr., Bowman & Bowman, LLC, Denver, CO, for Plaintiff. *1355 Cathy Havener Greer, Wells, Anderson & Race, LLC, Michael Turner Lowe, Bruno, Colin, Jewell & Lowe, P.C., Denver, CO, for Defendants. ORDER CONCERNING DEFENDANTS' MOTION FOR SUMMARY JUDGMENT BLACKBURN, District Judge. This matter comes before me on the Defendants' Motion for Summary Judgment and Brief in Support [# 66][1] filed May 3, 2010. The plaintiff filed a response [# 77] and the defendant filed a reply [#83]. I grant the motion in part and deny it in part.[2] I. JURISDICTION I have jurisdiction over this case under 28 U.S.C. § 1331 (federal question) and 28 U.S.C. § 1367 (supplemental jurisdiction). II. STANDARD OF REVIEW Summary judgment is proper when there is no genuine issue as to any material fact and the movant is entitled to judgment as a matter of law. FED.R.CIV.P. 56(c); Celotex Corp. v. Catrett, 477 U.S. 317, 322, 106 S.Ct. 2548, 91 L.Ed.2d 265 (1986). A dispute is "genuine" if the issue could be resolved in favor of either party. Matsushita Electric Industrial Co., Ltd. v. Zenith Radio Corp., 475 U.S. 574, 586, 106 S.Ct. 1348, 89 L.Ed.2d 538 (1986); Farthing v. City of Shawnee, 39 F.3d 1131, 1135 (10th Cir.1994). A fact is "material" if it might reasonably affect the outcome of the case. Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 248, 106 S.Ct. 2505, 91 L.Ed.2d 202 (1986); Farthing, 39 F.3d at 1134. A party who does not have the burden of proof at trial must show the absence of a genuine fact issue. Concrete Works, Inc. v. City & County of Denver, 36 F.3d 1513, 1517 (10th Cir.1994), cert. denied, 514 U.S. 1004, 115 S.Ct. 1315, 131 L.Ed.2d 196 (1995). Once the motion has been properly supported, the burden shifts to the nonmovant to show, by tendering depositions, affidavits, and other competent evidence, that summary judgment is not proper. Concrete Works, 36 F.3d at 1518. All the evidence must be viewed in the light most favorable to the party opposing the motion. Simms v. Oklahoma ex rel Department of Mental Health and Substance Abuse Services, 165 F.3d 1321, 1326 (10th Cir.), cert. denied, 528 U.S. 815, 120 S.Ct. 53, 145 L.Ed.2d 46 (1999). However, conclusory statements and testimony based merely on conjecture or subjective belief are not competent summary judgment evidence. Rice v. United States, 166 F.3d 1088, 1092 (10th Cir.), cert. denied, 528 U.S. 933, 120 S.Ct. 334, 145 L.Ed.2d 260 (1999); Nutting v. RAM Southwest, Inc., 106 F.Supp.2d 1121, 1123 (D.Colo. 2000). The individual defendants, officers M. Whetstone and K. Jimenez, assert the *1356 defense of qualified immunity, and they raise that defense as one of the bases for their motion for summary judgment. A motion for summary judgment asserting qualified immunity must be reviewed differently from other summary judgment motions. See Saucier v. Katz, 533 U.S. 194, 201, 121 S.Ct. 2151, 150 L.Ed.2d 272 (2001), overruled in part, Pearson v. Callahan, 555 U.S. 223, 129 S.Ct. 808, 172 L.Ed.2d 565 (2009); Holland v. Harrington, 268 F.3d 1179, 1185 (10th Cir.2001), cert. denied, 535 U.S. 1056, 122 S.Ct. 1914, 152 L.Ed.2d 824 (2002). After a defendant asserts qualified immunity, the burden shifts to the plaintiff. Scull v. New Mexico, 236 F.3d 588, 595 (10th Cir.2000). To overcome a claim of qualified immunity, the plaintiff first must establish "that the defendant's actions violated a constitutional or statutory right." Albright v. Rodriguez, 51 F.3d 1531, 1534 (10th Cir. 1995); Wilson v. Layne, 526 U.S. 603, 609, 119 S.Ct. 1692, 143 L.Ed.2d 818 (1999) (noting the court must first decide whether the plaintiff has alleged deprivation of a constitutional right). This burden means coming forward with specific facts establishing the violation. Taylor v. Meacham, 82 F.3d 1556, 1559 (10th Cir.1996). If the plaintiff establishes a violation of a constitutional or statutory right, then he must demonstrate that the right at issue was clearly established at the time of the defendant's alleged unlawful conduct. Albright, 51 F.3d at 1534. To demonstrate clearly established law, "there must be a Supreme Court or Tenth Circuit decision on point, or the clearly established weight of authority from other courts," which find the law to be as the plaintiff maintains. Medina v. City and County of Denver, 960 F.2d 1493, 1498 (10th Cir.1992), overruled in part, Williams v. City & County of Denver, 99 F.3d 1009, 1014-1015 (10th Cir. 1996). The plaintiff must demonstrate a substantial correspondence between the conduct in question and prior law establishing that the defendant's actions clearly were prohibited. Hilliard v. City and County of Denver, 930 F.2d 1516, 1518 (10th Cir.1991) (citing Hannula v. City of Lakewood, 907 F.2d 129, 131 (10th Cir. 1990)). In determining whether the right was "clearly established," the court assesses the objective legal reasonableness of the action at the time and asks whether "the right [was] sufficiently clear that a reasonable officer would understand that what he is doing violates that right." Wilson v. Layne, 526 U.S. at 615, 119 S.Ct. 1692. However, the plaintiff need not establish a "`precise factual correlation between the then-existing law and the case at hand....'" Patrick v. Miller, 953 F.2d 1240, 1249 (10th Cir.1992), (quoting Snell v. Tunnell, 920 F.2d 673, 699 (10th Cir. 1990)). "[W]hether an official protected by qualified immunity may be held personally liable for an allegedly unlawful official action generally turns on the `objective legal reasonableness' of the action ... assessed in light of the legal rules that were `clearly established' at the time it was taken." Anderson v. Creighton, 483 U.S. 635, 639, 107 S.Ct. 3034, 97 L.Ed.2d 523 (1987) (quotations and citations omitted). If the plaintiff satisfies both of these elements, then the burden shifts to the defendant. Unless the defendant demonstrates that there is no disputed issue of material fact relevant to the immunity analysis, a motion for summary judgment based on qualified immunity must be denied. Salmon v. Schwarz, 948 F.2d 1131, 1136 (10th Cir.1991). If the plaintiff fails to satisfy either part of the two-pronged inquiry, then the court must grant qualified *1357 immunity. Albright, 51 F.3d at 1535. In short, although the court must review the evidence in the light most favorable to the plaintiff, a defendant's assertion of qualified immunity may be overcome only when the record demonstrates clearly that the plaintiff has satisfied his heavy two-part burden. In civil rights cases, a defendant's unlawful conduct must be demonstrated with specificity. Davis v. Gracey, 111 F.3d 1472, 1478 (10th Cir.1997). In a recent opinion, the United States Supreme Court altered somewhat the analytical process that may be used when a defendant claims the protection of qualified immunity. Pearson v. Callahan, 555 U.S. 223, 129 S.Ct. 808, 172 L.Ed.2d 565 (2009). Under Saucier v. Katz, a court addressing a claim of qualified immunity first must determine whether the plaintiff has adduced facts sufficient to make out a constitutional or statutory violation. Saucier, 533 U.S. at 201, 121 S.Ct. 2151. Under Saucier, a court must address and resolve this first question before proceeding to the second step of the analysis, a determination of whether the claimed constitutional or statutory right was established clearly at the time of the alleged violation. Id. In Pearson, the Supreme Court held that the sequential two step analysis mandated in Saucier should no longer be regarded as mandatory. The judges of the district courts and the courts of appeals should be permitted to exercise their sound discretion in deciding which of the two prongs of the qualified immunity analysis should be addressed first in light of the circumstances in the particular case at hand. Pearson, 555 U.S. 223, 236, 129 S.Ct. 808, 818 (2009). The Supreme Court noted, however, that the sequence set forth in Saucier often is the appropriate analytical sequence. Id. III. UNDISPUTED MATERIAL FACTS I have reviewed the defendants' statement of undisputed facts, as stated in their motion for summary judgment [# 66]. In his response [# 77], the plaintiff addresses each of the paragraphs in the defendants' statement of undisputed material facts. Based my review and comparison of the motion for summary judgment and the plaintiff's response, I find that the facts described in this section are undisputed, except as noted otherwise. On August 9, 2008, the defendant Denver police officers, M. Whetstone and K. Jimenez, responded to a request for a civil assist lodged by Jana Smith. Smith sought assistance at the residence of the plaintiff, James Bouchard. Bouchard and Smith had been dating for several months and Smith frequently had stayed overnight at Bouchard's residence. A short time before Smith called the police for a civil assist, Smith told Bouchard that she was ending their relationship. Smith had clothes, toiletries, medications, and other personal property in Smith's residence. Smith sought the assistance of the police to retrieve her personal property from Bouchard's house. Smith told officers Whetstone and Jimenez that she was afraid of Bouchard and that he had firearms in his house. In her initial call to police, she reported that she had been living in the house for three weeks and that Bouchard was not being loud. After arriving at Bouchard's house, Smith told officer Whetstone that she had a key to Bouchard's house. Motion for summary judgment [#66], Exhibit A (Whetstone depo.), 64:1-64:11. Smith knocked on the door to the house while officers Whetstone and Jimenez stood by. Bouchard opened to door to talk to the *1358 trio, closed the door, and then returned to the door with one or two bags of items that he said belonged to Smith. Bouchard gave the bags to Smith or the police officers at his door. Smith told the officers that the bag or bags did not contain all of her belongings and that she had medications in the house that were not in the bag or bags. At this point, Bouchard became hostile and agitated as the officers tried to speak calmly with him and to encourage him to allow Smith to obtain the rest of her belongings. Smith asked Officer Whetstone if Bouchard could prevent her from entering the house if Smith had a key to the house. Smith showed Whetstone a key. I note that Bouchard contends that Smith once had a key to his house but that she had returned the key to him before this incident. Bouchard then was told to keep the door to the house open, but Bouchard attempted to close the door. Whetstone says he held the door open when Bouchard tried to close it because, based on the fact that Smith said she had a key to the house and permission and consent to enter Bouchard's house, Whetstone concluded that he had the right to enter the house with Smith's consent. Id., pp. 68:18-69:3. Officer Whetstone says Bouchard attempted to push Officer Whetstone away from the door as Bouchard tried to close the door. As the defendants note, Bouchard says in his affidavit that he "never touched the officer." Response, Exhibit D. Both officers then entered the house and grabbed Bouchard's arms in an attempt to control him. Bouchard physically resisted these efforts. Motion for summary judgment [# 66], Exhibit A (Whetstone depo.), 68:1-68:15. The officers subdued Bouchard and handcuffed him. After Bouchard was restrained, Smith and a friend entered the house and gathered Smith's other personal property. Based on this incident, Bouchard asserts four claims against the defendants. First, Bouchard asserts a claim under 42 U.S.C. § 1983 based on "violations of his Constitutional rights which were perpetrated by Officers Whetstone and Jimenez under color of law." Complaint [# 1], ¶ 12. Bouchard does not specify any particular constitutional rights which he alleges were violated. I read this claim as a Fourth Amendment claim for unreasonable seizure of Bouchard and for use of excessive force against Bouchard. Second, Bouchard asserts a claim for assault and battery, alleging that officers Whetstone and Jimenez intended to cause offensive and harmful contact, and made offensive and harmful contact on Bouchard, resulting in physical injury to Bouchard. This is a claim under state law. Third, Bouchard asserts a claim for false arrest and illegal imprisonment, alleging that officers Whetstone and Jimenez arrested and imprisoned him without lawful authority. This is a claim under state law. Fourth, Bouchard asserts a municipal liability claim against the City of Denver, alleging that Denver developed and maintained policies or customs that exhibit deliberate indifference to the constitutional rights of persons in Denver, including a custom and policy "to inadequately and improperly investigate citizen complaints of police misconduct" and to "inadequately supervise and train its police officers." Complaint, ¶¶ 23-24. IV. QUALIFIED IMMUNITY Officers Whetstone and Jimenez assert the defense of qualified immunity. *1359 Under the doctrine of qualified immunity, government officials performing discretionary functions are shielded from liability for civil damages if their conduct does not violate clearly established statutory or constitutional rights of which a reasonable person would know. Harlow v. Fitzgerald, 457 U.S. 800, 818, 102 S.Ct. 2727, 73 L.Ed.2d 396 (1982). To overcome this defense, the plaintiff must establish facts showing that the defendants' actions violated a constitutional or statutory right of the plaintiff, and that the right at issue was clearly established at the time of the defendant's alleged unlawful conduct. In his response to the motion for summary judgment, Bouchard argues that the evidence in the record demonstrates a violation of his constitutional rights which precludes the entry of summary judgment on his claims and that the rights in question are clearly established. I agree with the defendants that the Bouchard's Fourth Amendment claim must be analyzed in two stages. First, the court must address the entry into Bouchard's residence and the seizure of Bouchard. No search was conducted, so I view these events as seizures subject to a Fourth Amendment analysis. Second, the court must address the use of force against Bouchard. A. Violation of Constitutional or Statutory Right Citing Georgia v. Randolph, the defendants argue that a police officer properly may enter a dwelling "to give a complaining tenant the opportunity to collect belongings and get out safely ..." 547 U.S. 103, 118, 126 S.Ct. 1515, 164 L.Ed.2d 208 (2006). Viewing the undisputed facts in the record in the light most favorable to Bouchard, I conclude that there remain one or more disputed issues of fact about whether or not Smith properly could be viewed as a tenant simply because she had a key to Bouchard's house. Even if I assume that Smith properly was viewed as a tenant, and even if I view the facts in the record in the light most favorable to Bouchard, I note that Smith's consent for police officers to enter the house was not sufficient, by itself, to justify entry. "We... hold that a warrantless search of a shared dwelling for evidence over the express refusal of consent by a physically present resident cannot be justified as reasonable as to him on the basis of consent given to the police by another resident." Georgia v. Randolph, 547 U.S. 103, 120, 126 S.Ct. 1515, 164 L.Ed.2d 208 (2006). The present case involves a seizure via the entry into Bouchard's home by the defendant police officers, rather than a search. In the context of the evidence in the record of this case, however, the difference between a seizure and a search does not alter the applicable Fourth Amendment standard. Disputed issues of fact preclude the entry of summary judgment on Bouchard's unlawful seizure claim under § 1983. There also are disputed issues of material fact relevant to the propriety of the use of force at issue here. To prevail on his Fourth Amendment use of force claim, Bouchard must show (1) that a seizure occurred; and (2) that the force used in making the seizure was unreasonable. See, e.g., Brower v. County of Inyo, 489 U.S. 593, 599, 109 S.Ct. 1378, 103 L.Ed.2d 628 (1989). The reasonableness of a particular use of force must be judged from the perspective of a reasonable officer on the scene, rather than with the 20/20 vision of hindsight. Id. (citing Graham v. Connor, 490 U.S. 386, 396, 109 S.Ct. 1865, 104 L.Ed.2d 443 (1989)). Because police officers often are forced to make split-second *1360 judgments about the amount of force that is necessary in circumstances that are tense, uncertain, and rapidly evolving, the reasonableness of the officer's belief as to the appropriate level of force should be judged from an on-scene perspective. Id. at 1259-60 (quoting Saucier, 533 U.S. at 205, 121 S.Ct. 2151 and Graham, 490 U.S. at 397, 109 S.Ct. 1865). Ultimately, the objective reasonableness of an officer's use of force should be assessed on whether the totality of the circumstances justified the use of force, paying careful attention to the facts and circumstances of a particular case. Id. (citing Sevier v. Lawrence, 60 F.3d 695, 699 (10th Cir.1995)). If, ultimately, a fact finder determines that the seizures, the entry into Bouchard's house and the restraint of Bouchard, were not proper, then the justifications for the police officers' use of force against Bouchard also come into question. If there is no lawful basis for a seizure, then use of force in executing the seizure mostly likely is unreasonable. As the defendants acknowledge, there is a disputed issue of fact about whether or not Bouchard pushed one of the officers as Bouchard attempted to close the door. In the context of the evidence in the record of this case, such disputed issues of fact preclude the entry of summary judgment on Bouchard's § 1983 claim concerning the defendants' use of force against Bouchard. B. Clearly Established Law I conclude that the law cited above demonstrates that the rights at issue in Bouchard's § 1983 claim were clearly established at the time of the defendants' alleged unlawful conduct. C. Conclusion Viewing the evidence in the record in the light most favorable to Bouchard, in the context of the applicable law, I conclude that a reasonable fact finder could find in favor of Bouchard on his unlawful seizure and excessive force claims under § 1983. I conclude further that the constitutional rights at issue in Bouchard's Fourth Amendment seizure and excessive force claims were established clearly on August 9, 2008, the date on which the incident at issue occurred. Bouchard has met the two part burden he must meet in response to the defendants' claim of qualified immunity. Therefore, I conclude that the defendants' motion for summary judgment must be denied as to Bouchard's first claim for relief, his § 1983 claim. V. STATE TORT CLAIMS Under the Colorado Governmental Immunity Act, §§ 24-10-101-24-10-120, C.R.S., a public employee, including a police officer, is immune from liability for any claim which lies in tort arising out of an act or omission of such employee occurring during the performance of his duties and within the scope of his employment, unless the act or omission was willful and wanton or occurred in a circumstance for which immunity has been waived. §§ 24-10-118(2)(a), 24-10-106(1), C.R.S. No waiver of immunity under the CGIA is applicable in this case. The defendants argue that the plaintiff has not alleged willful and wanton action in his state law claims, his second and third claims for relief, and that there is no evidence to support an allegation of willful and wanton conduct. In his second claim for relief, a claim for assault and battery, Bouchard incorporates all of the previous paragraphs in his complaint and he alleges that the defendant police officers "intended to cause offensive and harmful contact and place Plaintiff in apprehension of an assault *1361 and resulting battery...." Complaint, ¶ 14. He alleges further that the officers "made offensive and harmful contact upon Plaintiff with knowledge that the resulting contact would and did cause harm to Plaintiff." Id., ¶ 15. In his third claim for relief, a claim for false arrest and "illegal imprisonment," the plaintiff incorporates all previous paragraphs in his complaint and alleges that the defendant police officers illegally arrested and imprisoned him. Under Colorado law, willful and wanton conduct includes an act or omission purposefully committed by a person "who must have realized that the conduct was dangerous, and which conduct was done heedlessly and recklessly, either without regard to the consequences, or without regard to the rights and safety of others, particularly the plaintiff." CJI-Civ. 4th 9:30 and the concomitant Notes on Use and Source and Authority. I conclude that the plaintiff's allegations, although thin on this issue, sufficiently allege conduct by the defendant police officers that arguably falls within the applicable definition of willful and wanton conduct. Further, I conclude that there are genuine issues of material fact relevant to Bouchard's second and third claims for relief, which issues preclude the entry of summary judgment on these claims. VI. MUNICIPAL LIABILITY CLAIM A plaintiff suing a municipality under § 1983 for the actions of one of its police officers must prove: (1) that a municipal employee committed a constitutional violation; and (2) that a municipal policy or custom was the moving force behind the constitutional deprivation. Jiron v. City of Lakewood, 392 F.3d 410, 419 (10th Cir.2004). A municipality or other local government unit is liable for constitutional torts only if the alleged unconstitutional acts implement a policy, ordinance or custom of the local government. Monell v. Department of Social Services, 436 U.S. 658, 690, 694, 98 S.Ct. 2018, 56 L.Ed.2d 611 (1978); Garcia v. Salt Lake County, 768 F.2d 303, 308 & n. 4 (10th Cir.1985). A municipality is responsible under § 1983 only when the execution of a government policy or custom actually causes an injury of constitutional dimensions. Monell, 436 U.S. at 694, 98 S.Ct. 2018; see also D.T. v. Independent School District, 894 F.2d 1176, 1187 (10th Cir.1990) (plaintiff must prove direct nexus between constitutional tort and municipality's authorization or approval thereof, either expressly or otherwise, by the adoption of any plan or policy). "Proof of a single incident of unconstitutional activity is not sufficient to impose liability under Monell, unless proof of the incident includes proof that it was caused by an existing, unconstitutional municipal policy, which policy can be attributed to a municipal policymaker." Oklahoma City v. Tuttle, 471 U.S. 808, 823, 105 S.Ct. 2427, 85 L.Ed.2d 791 (1985). The City of Denver argues in the motion for summary judgment that the plaintiff has not come forward with any evidence that Denver's police use of force policy is unconstitutional, or any evidence that Bouchard was injured as a result of a custom and policy of the City of Denver inadequately and improperly to investigate citizen complaints of police misconduct and inadequately to supervise and train its police officers. In his response to the motion for summary judgment, Bouchard does not cite any evidence in support of these contentions. Further, he attempts improperly to shift the burden of proof on this claim away from himself and onto the City of *1362 Denver. In his response, Bouchard argues "(t)here was no evidence that the City attempted in any way through its officers and agents in the Denver Police Department to train or properly supervise these officers...." Response, p. 14. Bouchard has not cited any evidence that demonstrates the existence of a genuine issue of material fact concerning his fourth claim for relief, his Monell claim against the City of Denver. Viewing the evidence in the record in the light most favorable to Bouchard, no reasonable fact finder could find in favor of Bouchard on his fourth claim. The City of Denver is entitled to summary judgment on this claim. VII. CONCLUSION & ORDERS I conclude that Bouchard has met the two part burden he must meet in response to the individual defendants' claim of qualified immunity. Therefore, I conclude that the individual defendants' motion for summary judgment must be denied as to Bouchard's first claim for relief, his § 1983 claim. I conclude also that, while thin, Bouchard's factual allegations and the evidence in the record are sufficient to sustain his second and third claims for relief. Finally, viewing the evidence in the record in the light most favorable to Bouchard, no reasonable fact finder could find in favor of Bouchard on his fourth claim for relief, his Monell claim against the City of Denver. The City of Denver is entitled to summary judgment on this claim. THEREFORE, IT IS ORDERED as follows: 1. That the Defendants' Motion for Summary Judgment and Brief in Support [# 66] filed May 3, 2010, is GRANTED as to the plaintiff's fourth claim for relief, his Monell claim against the City of Denver; 2. That the defendant's fourth claim for relief is DISMISSED with prejudice; 3. That otherwise, the Defendants' Motion for Summary Judgment and Brief in Support [# 66] filed May 3, 2010, is DENIED; and 4. That the City of Denver is DROPPED as a defendant in this case, and the caption of this case is AMENDED accordingly. NOTES [1] "[# 66]" is an example of the convention I use to identify the docket number assigned to a specific paper by the court's electronic case filing and management system (CM/ECF). I use this convention throughout this order. [2] The issues raised by and inherent to the motion for summary judgment are fully briefed, obviating the necessity for evidentiary hearing or oral argument. Thus, the motion stands submitted on the briefs. Cf. FED. R.CIV.P. 56(c) and (d). Geear v. Boulder Cmty. Hosp., 844 F.2d 764, 766 (10th Cir.1988) (holding that hearing requirement for summary judgment motions is satisfied by court's review of documents submitted by parties).
Freitag, 28. Februar 2014 Patina compass challenge and Mojo- "Just fly!" "Just fly!" Yes, I know, I am late... not too late looking at my clock but still... To be honest I am glad I made it at all. Not because of the work itself but of getting some decent pictures. I really should make a decision what new camera to buy (but a new laptop has priority... sighs) because with no day light my digi cam is just defeated. I love my digi but finally it is in it's last moments. You know this moments when you would love just to crash the camera *put any technical device in her insteadt if you want*.. throw it against the wall? But enough of my rambling! Kathy invited us for a little challenge, she send us a compass rose and wanted us to create a patina on top with whatever we have at hand. Therefore I overcame my desire to buy vintage patinas right now (I need another motivation/excuse). Back to my compass. Somehow I wanted to go a teeny wee bit over the top and combine the compass with a wing bead (you can bead it = it is a bead) I made from polymer clay (fimo). I tried a lot with different colours on the metall compass but they all didn't come together with the wing. Until I pressed some clay against the back of the compass (I just love stamped metall findings!) like a mold and made a new compass. Trust me you can't see any of the original colour anymore. I used the dye oxides from Christi Friesens swellegant in different blue shades and acrylic paint (Reeves) in paynes grey and white. A little closer look at the wing... and the facetted beads are czech glass beads from "The curious bead shop" and the other beads including the white stringed beads are all from recycled jewelery. I also added some patina on other findings... whereever I could. White acrylic paint and blue swellegant dye oxide. Actually I may have to rearrange it because the white stringed beads are from an old necklace and it loves to turn around... but I really love the white against the other elements! Any idea how to solve this? The piece above the compass is a brass finding I glued on some paper, sanded the edges off and sealed it. The little dangle on top is again made out of polymer clay and covered with bronze swellegant paint. So... if you are still with me I hope you have also the energy to jump over and have a look at Kathys at BayMoon and all the over participants of the challenge! :) And speaking of challenges: This is also for Heather's "Jewelery Making Mojo Challenge", week 2 "Bead soup". After having my two main parts I really just grabbed what where lying around on my table and tried to make it fit! This is where the old stringed beads as well as my new curious beads came in... and why I put some paper on the brass finding in the middle because otherwise I was not fitting for me (I put a lot of different colours on top and sanded them all off again ^^). Kommentare: Wow wow wow. It is oh so wonderful! The wing is a marvelous creation, and I am in awe of the whole feeling and mood of this gorgeous necklace! I went to see the other creations, many lovely versions. It's always exciting to see how different artists interpret the same thing. (p.s. your is my favorite one, though) Wunderschon! I hope that means wonderful because I think what you did is beautiful! I like the dyes you used. Patina is a new technique for me & my colors didn't quite turn out as vivid as I wanted. You have given me more ideas. Wow! You took all sorts of different things and wove them together in such a great way. The colors are perfect and it's such a cool piece. I'm a little late to the hop, but love seeing all the different results. Christie What a great piece. I love the wing bead with it. And your colors are very bright and wonderful. I like the white strung beads with it and think it all goes together very well. Finally got the pictures reloaded on my blog post/reveal for my compass. LinkWithin Recent Posts Tentacles and co... This site is all about making stuff. There is a thin line between art and stuff and I am not sure at which time this line is crossed. All I can say is that I love my work starting from the idea going all the way of the creational progress to the end, mixed up with doubt, frustration of missing perfections and a desire for growing.
increasing order. -297, -4, -2, 4, 205 Put 7964, -5, 4 in decreasing order. 7964, 4, -5 Put 0.4, 7, -3.9, 12.9 in descending order. 12.9, 7, 0.4, -3.9 Sort -41, -2096, -1/2 in decreasing order. -1/2, -41, -2096 Put -36, 2, -2, -3/4, -17/5, 6/5 in increasing order. -36, -17/5, -2, -3/4, 6/5, 2 Sort -12/85, 14.9, -4 in increasing order. -4, -12/85, 14.9 Sort -2, -790, -147. -790, -147, -2 Sort 3, -2, 5, -1, 1, 466 in descending order. 466, 5, 3, 1, -1, -2 Sort 5, -5, 3, 25617. -5, 3, 5, 25617 Put 12, 4, -5, -1949 in ascending order. -1949, -5, 4, 12 Put 0.05, -31, -1145, -5 in descending order. 0.05, -5, -31, -1145 Put 258, 5, -4, 4, 1 in decreasing order. 258, 5, 4, 1, -4 Sort -2, 1166, -18. -18, -2, 1166 Put -4, 6, 14558, -1 in decreasing order. 14558, 6, -1, -4 Put 7, -2, -48, -5, 9 in decreasing order. 9, 7, -2, -5, -48 Sort 4, -1/8, 3, -20.52 in increasing order. -20.52, -1/8, 3, 4 Sort -18, -16, -1 in descending order. -1, -16, -18 Put 16, 0.02, 0.3, -11, -2 in decreasing order. 16, 0.3, 0.02, -2, -11 Sort 0.1, 1, 4, -2/3, -2, 10. -2, -2/3, 0.1, 1, 4, 10 Sort 6, 2, -10, 61 in ascending order. -10, 2, 6, 61 Put -5, 916, -0.688, -1/4 in decreasing order. 916, -1/4, -0.688, -5 Put 11, 63, -1.9 in ascending order. -1.9, 11, 63 Put 134, 129, 4 in descending order. 134, 129, 4 Sort -3, 6, -25857, 5, -1 in descending order. 6, 5, -1, -3, -25857 Sort 10, -3/77, 8 in decreasing order. 10, 8, -3/77 Put 4, 1, 5, -2077 in increasing order. -2077, 1, 4, 5 Put 953, 2, 4/7 in descending order. 953, 2, 4/7 Put -4/5, 1/6, -3.147 in increasing order. -3.147, -4/5, 1/6 Sort -1, -52.26, -4 in descending order. -1, -4, -52.26 Put -16, 6, 95 in decreasing order. 95, 6, -16 Sort 76, 12602, -3, 5. -3, 5, 76, 12602 Sort 1/4, 3.72, 0.1, -4, 4, -5. -5, -4, 0.1, 1/4, 3.72, 4 Put 10/89, 3, -528 in decreasing order. 3, 10/89, -528 Sort 2/11, 2/5, -91 in descending order. 2/5, 2/11, -91 Sort -1, 2, -9, -429, 5 in decreasing order. 5, 2, -1, -9, -429 Sort -54, 1, -4, -2, 1047 in descending order. 1047, 1, -2, -4, -54 Sort -5, 1, -14, -20 in descending order. 1, -5, -14, -20 Sort 4, -1, 3, -16622 in increasing order. -16622, -1, 3, 4 Sort -208, 189, 2, 3, 5 in ascending order. -208, 2, 3, 5, 189 Put 4, -3, -0.4, 5, -653/7 in increasing order. -653/7, -3, -0.4, 4, 5 Sort -17, 7, 3, 2, -10, -8 in descending order. 7, 3, 2, -8, -10, -17 Put -6, 914, 15 in increasing order. -6, 15, 914 Sort 2/11, 4236, 0.5, -0.2 in increasing order. -0.2, 2/11, 0.5, 4236 Sort 0, -10, -3380, -2, -3. -3380, -10, -3, -2, 0 Put -56, 275, 0 in ascending order. -56, 0, 275 Sort -21, -0.3, 1766/13, 0.3 in increasing order. -21, -0.3, 0.3, 1766/13 Put -4, 4, -9, -1, 26 in descending order. 26, 4, -1, -4, -9 Put 1, 19, -3, -860 in descending order. 19, 1, -3, -860 Sort 1, -5, 43, -4, 6, 3 in ascending order. -5, -4, 1, 3, 6, 43 Sort 0.1, 0.2, -9, 7/1544. -9, 7/1544, 0.1, 0.2 Sort -3, 0, -15, -4070. -4070, -15, -3, 0 Put 0.1, -2/57, 2/9, -14/3 in ascending order. -14/3, -2/57, 0.1, 2/9 Sort -730, -5, -17. -730, -17, -5 Sort -3, -51, -17, -4, 28, 3 in decreasing order. 28, 3, -3, -4, -17, -51 Put -3, -40, -0.54, -9/5 in descending order. -0.54, -9/5, -3, -40 Put 3, 5, 1/5, 1, -12/19 in increasing order. -12/19, 1/5, 1, 3, 5 Put -17, -1, 0, -115 in ascending order. -115, -17, -1, 0 Sort 1, 1687, 36, 0 in increasing order. 0, 1, 36, 1687 Sort 0, 5, 34436. 0, 5, 34436 Put -5, -39293, 2/15 in decreasing order. 2/15, -5, -39293 Put -1930/7, 2, 1/7, 0.3, 3 in descending order. 3, 2, 0.3, 1/7, -1930/7 Sort 2, -29, -2, -3, -5, 0 in decreasing order. 2, 0, -2, -3, -5, -29 Put 4, 5, -3, -7, -4, 6 in decreasing order. 6, 5, 4, -3, -4, -7 Sort 0.2, 574468, -0.1 in increasing order. -0.1, 0.2, 574468 Sort 2190, -3/4, -3/5 in ascending order. -3/4, -3/5, 2190 Sort 35, 6, -10 in descending order. 35, 6, -10 Put -0.6, 13, 3/5, -2/19, -63/4 in descending order. 13, 3/5, -2/19, -0.6, -63/4 Sort 97, -142, -6. -142, -6, 97 Put 1/2, 2/7, -16, 2 in decreasing order. 2, 1/2, 2/7, -16 Sort 1, -3, -0.6, 3 in descending order. 3, 1, -0.6, -3 Put -232/3, -3, -5, -4, -1/3, -2/9 in descending order. -2/9, -1/3, -3, -4, -5, -232/3 Put 4, 23, 67, 3, -1 in descending order. 67, 23, 4, 3, -1 Put -1/4, 2, -12559/4, -3/4 in decreasing order. 2, -1/4, -3/4, -12559/4 Sort 46, -1/4, -55/4, 2/9 in ascending order. -55/4, -1/4, 2/9, 46 Sort -0.08, -0.268, 4 in decreasing order. 4, -0.08, -0.268 Sort -4, -3, 54174 in increasing order. -4, -3, 54174 Put 2/3, -4094, -0.2, 3/8 in descending order. 2/3, 3/8, -0.2, -4094 Sort 1, 4, 652. 1, 4, 652 Put 1, -1, -133, 0, 5, -5 in descending order. 5, 1, 0, -1, -5, -133 Put 58, 175, 0 in descending order. 175, 58, 0 Sort -0.1, -3, -6, 0.01586 in decreasing order. 0.01586, -0.1, -3, -6 Put 22, -1, 2, 3, 5, 0 in decreasing order. 22, 5, 3, 2, 0, -1 Put 54, -7, -30, 5 in descending order. 54, 5, -7, -30 Put -33, -17, -3, 1, 2/11, -0.4 in descending order. 1, 2/11, -0.4, -3, -17, -33 Sort 2/7, -1, -45/8, 0.3 in descending order. 0.3, 2/7, -1, -45/8 Sort 5, 1, 242, 902 in descending order. 902, 242, 5, 1 Put -3, 1, -20, -4, 2 in decreasing order. 2, 1, -3, -4, -20 Put 2488, 1.22, -1 in ascending order. -1, 1.22, 2488 Sort -4, 16, 37, 3, 4 in descending order. 37, 16, 4, 3, -4 Put 1288, 7, 19, -2 in decreasing order. 1288, 19, 7, -2 Sort -7, 3, -1, -4, -12, -5. -12, -7, -5, -4, -1, 3 Put -1.6, 0.14, -4/25, 5, -2 in descending order. 5, 0.14, -4/25, -1.6, -2 Put 6, -2, -7, -3, 16 in ascending order. -7, -3, -2, 6, 16 Sort -14, 2/47, 2/13, -0.5 in decreasing order. 2/13, 2/47, -0.5, -14 Put 23, 1, 1/16, -3, -1/4 in decreasing order. 23, 1, 1/16, -1/4, -3 Put 5, -2/3, 0, -1/12 in increasing order. -2/3, -1/12, 0, 5 Sort -21, -41, -7, -73 in descending order. -7, -21, -41, -73 Sort -5, 3, -335696, 4. -335696, -5, 3, 4 Sort 0.4, -2/137, -11, 5 in increasing order. -11, -2/137, 0.4, 5 Sort 2, 2.83, -0.07, -3 in decreasing order. 2.83, 2, -0.07, -3 Put -3, 161, 96, -5 in descending order. 161, 96, -3, -5 Put -5, -11, 9, 2, -4 in increasing order. -11, -5, -4, 2, 9 Sort -3, -4, 19, -0.16. -4, -3, -0.16, 19 Sort -3, 459, 38, 0, 5 in increasing order. -3, 0, 5, 38, 459 Put 0, -61, 0.12, 134 in descending order. 134, 0.12, 0, -61 Sort -2, -4954, -17 in descending order. -2, -17, -4954 Put -4, 1, 31446 in increasing order. -4, 1, 31446 Sort -5, -14, 7, 4, 5, -6 in ascending order. -14, -6, -5, 4, 5, 7 Sort 5, -8, 35, -4, 7 in decreasing order. 35, 7, 5, -4, -8 Put 8, 51, 4, 3, 0 in descending order. 51, 8, 4, 3, 0 Sort -4, 48, -149/8 in descending order. 48, -4, -149/8 Put 5558, -5, -4 in descending order. 5558, -4, -5 Put 76, 1, 10, -6 in descending order. 76, 10, 1, -6 Put 1888, 0.3, 121/3 in ascending order. 0.3, 121/3, 1888 Sort 5.5, 14, 3/8 in ascending order. 3/8, 5.5, 14 Sort -5, -24, -34, 71 in descending order. 71, -5, -24, -34 Put 2, 1, 26, 4, -4, 15 in descending order. 26, 15, 4, 2, 1, -4 Sort 1, -432, 85, 5, 2 in decreasing order. 85, 5, 2, 1, -432 Sort -6, -1033, 3, 8 in descending order. 8, 3, -6, -1033 Sort 45988, 0.5, 2/33. 2/33, 0.5, 45988 Put -4, -316/25, -28/9, 2 in decreasing order. 2, -28/9, -4, -316/25 Sort 0.2306, 3/2, 2 in increasing order. 0.2306, 3/2, 2 Put -1/12, 0.2, -0.0271, 58 in decreasing order. 58, 0.2, -0.0271, -1/12 Sort 106, -4, 1, 3 in increasing order. -4, 1, 3, 106 Sort 6, 945, 3 in decreasing order. 945, 6, 3 Put -5, -10, 190, -14 in increasing order. -14, -10, -5, 190 Put -173, -2, -57, -18 in descending order. -2, -18, -57, -173 Sort 3, -10, -5, -83336 in ascending order. -83336, -10, -5, 3 Put -4, -1/6, -11.16, 4, 3/4 in descending order. 4, 3/4, -1/6, -4, -11.16 Sort -2/5, 2/3, -4, -89 in decreasing order. 2/3, -2/5, -4, -89 Sort -2/9, 4/7, -2/7, 1830, -5, 1. -5, -2/7, -2/9, 4/7, 1, 1830 Sort -1159, -4, 0, 3, -39 in increasing order. -1159, -39, -4, 0, 3 Sort 89, 10, 0 in ascending order. 0, 10, 89 Put -1268, 0.6, -66, -1, 5 in decreasing order. 5, 0.6, -1, -66, -1268 Put 3973, 1/10, 1 in descending order. 3973, 1, 1/10 Sort 5, -106306, -5. -106306, -5, 5 Put -92, 162, -5 in descending order. 162, -5, -92 Sort -1, -4, 40, 228 in decreasing order. 228, 40, -1, -4 Put -3.7, 0.11, 10, 0 in descending order. 10, 0.11, 0, -3.7 Sort 0.2, -61, 4/33 in decreasing order. 0.2, 4/33,
Jawaan Taylor Jawaan Taylor (born November 25, 1997) is an American football offensive tackle for the Jacksonville Jaguars of the National Football League (NFL). He played college football at Florida. Early years Taylor attended Cocoa High School in Cocoa, Florida. He was originally committed to the University of Miami to play college football before switching to the University of Florida. College career Taylor became a starter at Florida his true freshman year in 2016. After his junior season in 2018, he decided to forego his senior year and enter the 2019 NFL Draft. Professional career Taylor was drafted by the Jacksonville Jaguars in the second round (35th overall) of the 2019 NFL Draft. References External links Florida Gators bio Category:1997 births Category:Living people Category:People from Cocoa, Florida Category:Players of American football from Florida Category:American football offensive tackles Category:Florida Gators football players Category:Jacksonville Jaguars players
Chester Roman Amphitheatre Chester Amphitheatre is a Roman amphitheatre in Chester, Cheshire. The site is managed by English Heritage; it is designated as a Grade I listed building, and a scheduled monument. The ruins currently exposed are those of a large stone amphitheatre, similar to those found in Continental Europe, and although it was long believed that a smaller wooden amphitheatre existed on the site beforehand, excavations since 1999 have shown that the wooden grillage is the base of the seating. Today, only the northern half of the structure is exposed; the southern half is covered by buildings, some of which are themselves listed. The amphitheatre is the largest so far uncovered in Britain, and dates from the 1st century, when the Roman fort of Deva Victrix was founded. It is a peculiarly English myth that the amphitheatre would have been primarily for military training and drill; all the evidence recovered from excavation shows that it was used for cock fighting, bull baiting and combat sports, including classical boxing, wrestling and, probably most importantly, gladiatorial combat. The poet Oppian wrote that the Romans inherited the Greek passion for the cockfight, which was held "on anniversaries . . . as a solemn rite", a consecration, in effect a sacred cockfight, to remind men that they should be "perpetual imitators of the cock". In use through much of the Roman occupation of Britain, the amphitheatre fell into disuse around the year 350. The amphitheatre was only rediscovered in 1929, when one of the pit walls was discovered during construction work. Between 2000 and 2006, excavation of the amphitheatre took place for Chester City Council and, after 2004, English Heritage. Construction The first amphitheatre is believed to have been a simple structure built by Legio II Adiutrix during their brief posting in Chester at some point in the late 70s, but was soon rebuilt by Legio XX Valeria Victrix when Legio II Adiutrix were reposted to the Danube region in 86. This amphitheatre fell into disuse when Legio XX were assigned to the construction of Hadrian's Wall, and upon their return around 275, the amphitheatre was once again rebuilt. The newer structure consisted of a high stone ellipse, along the major axis by along the minor. The major axis lines up approximately along the north-south line, and exits are placed at all four points of the compass; in keeping with most Roman forts of the era, the amphitheatre was placed at the south east corner of the fort. The amphitheatre could easily seat 8,000 people, and around it, a sprawling complex of dungeons, stables and food stands were built to support the contests, while a shrine to Nemesis, goddess of retribution, was built at the north entrance to the arena. The unusually large and developed amphitheatre complex has led historians to speculate that Chester would have become capital of Roman Britain had the Romans successfully captured Ireland. Dereliction Following the Roman departure from Britain, the amphitheatre once again fell derelict, and the masonry was scavenged from the site leaving only a small depression at the centre of the site, which was used to stage bear fights and public executions, and was eventually completely filled in by erosion and refuse dumping. A Georgian house complex known as "Dee House" were built over the south end of the arena, while a Georgian townhouse called "St. John's House" was built over the north end. Although all records of the amphitheatre were lost, the unfavourable contours of the filled-in amphitheatre prevented roads from passing through the site, preserving the underground remains and allowing the site to later be excavated without the need for extensive demolition. Rediscovery Although the existence of an amphitheatre in Chester had been speculated for years, the first evidence for it was discovered in 1929 when gardening works at Dee House revealed a long curved wall. Further works revealed that the structure was largely intact underneath the ground. However, the site of the amphitheatre was covered by buildings and lay in the way of a new planned road, designed to bypass the narrow curved lane which skirted the perimeter. Nevertheless, the Chester Archaeological Society agreed to raise enough money to divert the new road and excavate the arena. Progress was initially slow; the council refused to change the course of the road unless money was raised to fund the substantial demolition work that would be required, and it was not until 1933 that the route of the road was finally changed. In order to fund the excavations, Chester Archaeological Society purchased St. John's House and leased it to the council to fund the dig. The dig was initially scheduled for 1939, but was postponed indefinitely with the outbreak of World War II. Work resumed in 1957, when the council vacated St. John's House and the Ministry of Works offered a substantial subsidy for excavation. As Dee House was still in use, only the northern half could be excavated. A small area was dug up, and the rest redeveloped as a short-lived park, which was quickly removed to allow further excavation. The badly pillaged and damaged supporting walls were removed and marked with concrete trim and the arena wall was propped up with concrete panels. The amphitheatre remained in this state until 2000, when archaeological work was resumed on the site. Among the finds were the remains of the earlier amphitheatres and of an even older Roman building existing on the site. A number of cooked animal bones and cheaply made Roman pots showing images of gladiator combat were also found, leading a number of historians to suggest that the site was one of the first places to develop souvenirs for spectators to buy. The amphitheatre's central, river-side location is very valuable. Cheshire County Council purchased an area to the south of the exposed area for Chester's new County Court, the northern wing and car park of which were built over the south western corner of the arena. Despite the council's insistence that the court cover as little of the arena as possible, the work was widely unpopular with residents and the press, especially following the Council's previous support of excavation projects. In 2007 the southern half of the amphitheatre remained covered by Dee House and the County Court. Chester Amphitheatre Project In January 2004 the Chester Amphitheatre Project was launched, jointly owned, funded and supported by Chester City Council and English Heritage. Its aims were to conduct new excavation and survey, to create a Chester amphitheatre and research centre and to hold an international amphitheatre conference (February 2007). During the summers of 2004 to 2006 excavation was co-directed by Dan Garner (Chester City Council) and Tony Wilmott (English Heritage). Three areas were tackled: Area A: on the north-west quadrant of the amphitheatre's seating bank, partially excavated in the 1960s by Thompson; Area B: south of the eastern entrance in an unexcavated area of the southeastern quadrant of the seating bank; Area C: in the centre of the unexcavated area of the arena. The work was the subject of an episode of the BBC Four series Timewatch and revealed that, contrary to the conclusion drawn by Thompson that a wooden amphitheatre had preceded the stone construction, two separate stone amphitheatres had been built. In the decades around 200AD the amphitheatre appeared to have been largely rebuilt, producing roughly a doubling of the seating capacity. The new massive outer wall sat in a deep foundation trench 2.7m wide penetrating the sandstone bedrock to a depth of over 1.3m. During the excavations, finds included a coin from the time of Vespasian, the bone hilt of a Gladius and Samian ware bearing images of hunting and combat. Following further discoveries at the site in 2010, some writers suggested that the amphitheatre was the prototype for King Arthur's Round Table, but English Heritage, acting as consultants to a History Channel documentary in which the claim was made, declared that there was no archaeological basis to the story. Amphitheatre mural A trompe l'oeil mural was commissioned in August 2010 by Chester Renaissance to enable visitors to experience the illusion of a complete amphitheatre as well as showing how the original structure may have looked. Archaeologists advised artist Gary Drostle on the original construction and found artefacts from the site. The artist designed an image that spanned the 50 metre walkway wall, starting with a continuation of the current amphitheatre edges that merged seamlessly into the recreation of the original walls and seating towards the centre. The painted ellipsis of the sand covered ground and depiction of the central tethering stone allow a viewer to experience a full immersion in the amphitheatre that was not possible with the previous, blank wall. Details such as the red, marble covered arena wall, position of the doorways and vomitoriums and outside walls were all carefully recreated as the evidence suggested. Taking over 6 weeks to complete with two, six metre scaffolding towers and five painters, the public and tourist groups could watch the progression of the mural and interact with the artist and his assistants, the British weather dictating working hours. The mural will be a permanent feature of the amphitheatre. The artist used Keim Mineral Paints, invented in 1878. The system is a liquid silicate paint which comprises a potassium silicate binder with inorganic fillers (feldspar) and natural earth oxide colour pigments. When applied onto a mineral substrate the binder is absorbed and forms a micro-crystalline silicate structure. This crystalline structure allows the substrate to breathe but prevents the ingress of driven rain. See also List of Scheduled Monuments in Cheshire dated to before 1066 References External links Official website The Roman amphitheatre at Chester The amphitheatre on 'Chester: a Virtual Stroll Around the Walls' Category:Buildings and structures completed in the 1st century Category:English Heritage sites in Cheshire Category:Roman sites in Cheshire Category:Archaeological sites in Cheshire Category:Grade I listed buildings in Chester Category:Ruins in Cheshire Category:Roman amphitheatres in the United Kingdom Category:History of Chester Category:Scheduled Ancient Monuments in Cheshire
Q: Laravel Auth::attempt() returns false I am a home hobbyist and am studying Laravel, currently in version 5.3. I am using a Mac, neither homestead nor vagrant. I'm currently working on a website that uses a login and a register system to create users. I've used php artisan migrate to manipulate my database locally. As listed below, it has three fields, namely: Email Username Password I have a User model (users.php): <?php namespace blog; use Illuminate\Notifications\Notifiable; use Illuminate\Database\Eloquent\Model; use Illuminate\Contracts\Auth\Authenticatable; class User extends Model implements Authenticatable { use \Illuminate\Auth\Authenticatable; use Notifiable; protected $fillable = [ 'username', 'email', 'password', ]; } And also, a UserController class (UserController.php): <?php namespace blog\Http\Controllers; use Auth; use blog\User; use Illuminate\Http\Request; class UserController extends Controller { public function postRegister(Request $request) { $username = $request['username']; $email = $request['email']; $password = bcrypt($request['password']); $user = new User(); $user->email = $email; $user->username = $username; $user->password = $password; $user->save(); return redirect()->route('login'); } public function postLogin(Request $request) { $credentials = [ 'username' => $request['username'], 'password' => $request['password'], ]; if(Auth::attempt($credentials)) { return redirect()->route('dashboard'); } return 'Failure'; } } ?> As you can see, I am using bcrypt() as my hashing method. However, this problem is, it will always result to a failure. I have checked the following links: Why is Auth::attempt always returns false Laravel authattempt return false P.S. These links seem very hard to follow as I do not utilize the Input class. A: The problem is with the way you're redirecting the user to login route after the registration. You're falsely assuming that the $request data will be accompanied with the redirect. Let's assume this scenario: A request gets dispatched to the postRegister method with name, email and password fields. The controller creates the user and saves it into the database. Then it redirects the user, who is not yet authenticated, to the login route. The postLogin method gets triggered, but this time with no request data. As a result, Auth::attempt($credentials) fails and you get that nasty Failure on screen. If you add a dd($credentials) right after you create the array, you'll see that it has no values: public function postLogin(Request $request) { $credentials = [ 'username' => $request['username'], 'password' => $request['password'], ]; // Dump data dd($credentials); if (Auth::attempt($credentials)) { return redirect()->route('dashboard'); } return 'Failure'; } It will return something like this: array:2 [ "username" => null "password" => null ] You cannot redirect with custom request data (unless with querystring which is part of the URL), not matter what. It's not how HTTP works. Request data aside, you can't even redirect with custom headers. Now that you know what's the root of your problem, let's see what are the options to fix it. 1. Redirect with flashed data In case you want to preserve this structure, you need to flash the request data of postRegister() into the session (which is persistent between requests) and then retrieve it in the postLogin() method using Session facade, session() helper or the actual Illuminate\Session\SessionManager class. Here's what I mean: (I slightly modified your code; dropped extra variables, made it a lil bit cleaner, etc.) public function postRegister(Request $request) { // Retrieve all request data including username, email & password. // I assume that the data IS validated. $input = $request->all(); // Hash the password $input['password'] = bcrypt($input['password']); // Create the user User::create($input); // Redirect return redirect() // To the route named `login` ->route('login') // And flash the request data into the session, // if you flash the `$input` into the session, you'll // get a "Failure" message again. That's because the // password in the $input array is already hashed and // the attempt() method requires user's password, not // the hashed copy of it. // ->with($request->only('username', 'password')); } public function postLogin(Request $request) { // Create the array using the values from the session $credentials = [ 'username' => session('username'), 'password' => session('password'), ]; // Attempt to login the user if (Auth::attempt($credentials)) { return redirect()->route('dashboard'); } return 'Failure'; } I strongly recommend you against using this approach. This way the implementation of postLogin() method which is supposed to be responsible to login users gets coupled with session data which is not good. This way, you're not able to use postLogin independently from the postRegister. 2. Login the user right after the registration This is a slightly better solution; If you decided that you need to log in the user right after the registration, why not just doing that? Note that Laravel's own authentication controller does it automatically. By the way, here's what I mean: (Ideally this should be broken down into multiple methods, just like Laravel's own authentication controller. But it's just an example to get you started.) public function postRegister(Request $request) { $input = $request->all(); $input['password'] = bcrypt($input['password']); User::create($input); // event(UserWasCreated::class); if (Auth::attempt($request->only('username', 'password'))) { return redirect() ->route('dashboard') ->with('Welcome! Your account has been successfully created!'); } // Redirect return redirect() // To the previous page (probably the one generated by a `getRegister` method) ->back() // And with the input data (so that the form will get populated again) ->withInput(); } But still, it's far from perfect! There are many other ways to tackle this. One could be using events, throwing exceptions on failure and redirecting using custom exceptions. But I'm not gonna explore them as there's already a solution perfectly designed for this. If you want to write your own authentication controller, that's fine. You'll learn a lot along the way. But I strongly suggest reading Laravel's own authentication code, especially RegistersUsers and AuthenticatesUsers traits in order to learn from it. And one more note; you don't need that Illuminate\Auth\Authenticatable trait in your User model as it's already extending Authenticatable which use that trait.
The present invention relates to delivery flow rate control apparatus that control the delivery flow rate of pumps installed in process piping systems such as a fossil fuel, nuclear and other types of power generation plants. In general, many pumps are installed in process piping systems at power generation plants (hereinafter termed simply "plants") so as to send the process liquids under pressure. These pumps usually control the flow rate so that the flow describes those operation limit conditions that relate to the pump delivery flow rate (or the suction flow rate). a) Maximum allowable flow rate: This is the flow rate for which when a delivery flow rate (or a suction flow rate) greater than this flow rate flows through a pump, air bubbles are formed in the process liquid on the suction side of the pump and cause cavitation which may possibly destroy the pump and cause other problems such as a dramatic lowering of the pump delivery head (delivery pressure). b) Minimum allowable flow rate: This is the flow rate for which when there is operation of the pump at a delivery flow rate lower than this, there is the possibility of a sharp increase in the temperature of the process liquid inside the pump and of the occurrence of trouble in the pump. The present invention relates particularly to a) above, and controls the delivery flow rate of the pump while monitoring the maximum allowable flow rate. FIG. 36 is a view of a conventional pump delivery flow control apparatus. In the Figure, 1 represents a tank for the temporary storage of the process liquid, and the pressure of the process liquid that is stored in this tank is increased by two pumps 2.sub.-1, 2.sub.-2 which are arranged in parallel and which are respectively provided with drive apparatus 3.1, 3-2, and is sent to the process piping system via a flow rate adjuster valve 4 that controls the total delivery flow of the two pumps 2.sub.-1, 2.sub.-2. The pump delivery flow rate control apparatus is provided with a flow rate meter 5 that detects the total delivery flow of the two pumps 2.sub.-1, 2.sub.-2, a flow rate adjuster 15e, an electro-pneumatic converter 13, and a flow rate adjuster valve 4 that is driven by pneumatic signals. Here, the flow rate adjuster 15e is configured from a flow rate deviation calculation portion 17 that outputs the deviation between the measured value (available flow rate value) from the flow rate meter 5 and the required flow rate value "a" from the side of the plant or the like, a PID calculation portion 8 that performs integral and differential calculation, a signal converter portion 12 that converts a valve degree of opening of the flow rate adjuster valve 4 into a predetermined fixed degree of opening value when one of the two pumps 2.sub.-1, 2.sub.-2 has failed and stopped. Since it can be generally said that the pump delivery flow rate is equal to the pump suction flow rate, the flow rate meter 5 can be disposed on either the delivery side or the suction side of the two pumps 2.sub.-1, 2.sub.-2 but here, the description will be given in terms of when it is disposed on the delivery side of the pumps 2.sub.-1, 2.sub.-2. The following is a description of the operation of a pump delivery flow rate control apparatus having the configuration described above. The flow rate adjuster 15e has as its input the required flow rate set value "a" and the available flow rate value b measured by the flow rate meter 5 for the process liquid that is actually sent to the plant by the two pumps 2.sub.-1, 2.sub.-2. In the flow rate adjuster 15e, the flow rate deviation calculation portion 7 calculates the deviation between the available flow rate value b to the plant and the required flow rate set value "a" from the plant, and the PID calculation portion 8 outputs signals that have been given proportional, integral and differential calculation processing. When there is normal operation, the required flow rate set value "a" from the plant is set so that it is smaller than the total value for the maximum allowable flow rate for the two pumps 2.sub.-1, 2.sub.-2, and in this case, the signals output from the PID calculation portion 8 are output as output signals from the flow rate adjuster 15e and via the signal converter portion 12. These output signals that are output from the flow rate adjuster 15e are converted into pneumatic signals at the electro-pneumatic converter 13 and are then input to the flow rate adjuster valve 4. In this manner, the flow rate adjuster valve 4 performs open and close control by the pneumatic signals from the electro-pneumatic converter 13 so that the available flow rate of the process liquid to the plant is in agreement with the required flow rate set value "a" from the plant. However, when there is this normal operation and either one (pump 2.sub.-2 for example) of the two pumps 2.sub.-1, 2.sub.-2 that are operating fails, the required flow rate set value "a" from the plant stays at that for two pumps and so the degree of opening of the flow rate adjuster valve 4 is maintained at the former degree of opening. Because of this, the delivery flow rate value of the pump that did not fail and stop (pump 2.sub.-1) increases to exceed the maximum allowable flow rate for that pump (pump 2.sub.-1) and generate trouble. In addition, when the available flow rate value "b" to the plant, that is, the actual flow rate value for the pump (pump 2.sub.-1) does not become more than the required flow rate set value "a" from the plant (i.e. a&gt;b), the flow rate adjuster valve 4 operates so that the degree of opening of the flow rate adjuster valve 4 is further increased and there is the further likelihood of the occurrence of the trouble described above. Also, depending upon the plant, when one of two operating pumps has failed and stopped, the method generally used to prevent the above described problems such as the generation of cavitation, the lowering of the pump delivery pressure and the like from occurring is to output a fixed value from the adjustment valve degree of opening setting portion 11 by the signal converter portion 12 and to monitor the required flow rate set value "a" from the plant so that the flow rate adjuster valve 4 is closed to a fixed, rated degree of opening that has been set before so that the delivery flow rate of the pump is brought to within the maximum allowable flow rate. Furthermore, with this conventional technology, when one of two pumps that are operating fails and stops, the degree of opening of the flow rate adjuster valve 4 provided on the delivery side of the two pumps 2.sub.-1, 2.sub.-2 is decreased to a rated degree of opening set beforehand but another known method involves controlling the speed of one of the pumps that is operating (pump 2.sub.-1) so that the pump delivery flow rate is controlled. In this case, the degree of opening of the flow rate adjuster valve 4 is not necessarily decreased but a flow rate adjuster 15e (the same as described earlier for the conventional technology) is used so that it is possible to change the speed of the pump that did not fail (pump 2.sub.-1 for example), to a rated speed that has been set beforehand. In addition, the description for this conventional technology has been for when the objective value for the speed of the pump or the objective value for the degree of opening of the flow rate adjuster valve 4 when one of the pumps has failed and stopped is a fixed value and for when there is immediately changed to this value when one of the pumps fails and stops. However, in certain cases, the general practice is to gradually change the value in steps so that it is ultimately made the predetermined fixed objective value for the speed of the pump or the objective value for the degree of opening of the flow rate adjuster valve 4. Also, the above description for the conventional technology was for when there are two pumps disposed in parallel but when there are three or N number of pumps disposed in parallel, the number of operating pumps is detected and there is switching to the objective value for the speed of the pump or the objective value for the degree of opening of the flow rate adjuster valve and that is predetermined in accordance with that number (N-1, N-1 ,,, 2, 1) of pumps. However, in this conventional case, even if a pump flow rate control apparatus is used as described above, it is not always possible to prevent the generation of trouble such as cavitation and in cases such as this, the general practice to prevent cavitation and the like is as described below. More specifically, when the generation of cavitation commences, the suction pressure or the delivery pressure of the pump that is operating normally drops, and this is used to calculate beforehand the total delivery pressure or the total suction pressure (but the delivery pressure will be used for the description of the conventional technology) of the pumps 2.sub.-1, 2.sub.-2 in the status immediately prior to the status for which there is the possibility of the generation of trouble such as cavitation, and this value is the set value (fixed value) of a pump delivery pressure switch 9 provided to the side of the two pumps 2.sub.-1, 2.sub.-2 as shown in FIG. 36. Then, in the unlikely event that the total delivery pressure for the pumps 2.sub.-1, 2.sub.-2 drops below this set value, this pressure drop is detected by the pump delivery pressure switch 9 and the signal S that expresses that the total delivery pressure of the pumps 2.sub.-1, 2.sub.-2 has dropped below the set value is output. Then, this signal S that is output from the pump delivery pressure switch 9 forcedly stops one of the pumps (pump 2.sub.-2 that is operating) that has continued operating without being stopped by failure, and prevents the occurrence of cavitation and other trouble due to the continued operation of the pump (pump 2.sub.-1) that continues operating. However, when there is the pump delivery flow rate control apparatus of the conventional technology and there is control for either the degree of opening of the flow rate adjuster valve 4 or for the speed of the pump, the ultimate objective value for the degree of opening of the flow rate adjuster valve 4 or the ultimate objective value for the pump speed so that a delivery flow rate greater than the maximum allowable flow rate does not flow in the pump (pump 2.sub.-1) that did not fail when the pump (pump 2.sub.-2 for example) has failed, is a predetermined fixed value. Here, the determination of this fixed value beforehand must be performed by this so that for all operating statuses of the pump that did not fail and stop (pump 2.sub.-1), trouble such as destruction due to cavitation and rapid lowering of the delivery head (delivery pressure) of this pump due to cavitation do not occur. Because of this, the objective value for the degree of opening and the objective value for the speed must be determined to allow a sufficient surplus in consideration of the many conditions involved. However, having such a surplus brings on problems of lowering of the operating efficiency of the pump (pump 2.sub.-1) by that amount. More specifically, for the two pumps 2.sub.-1, 2.sub.-2 shown in FIG. 36, the normal status of the process liquid and the normal operating status for the case where one of the pumps (pump 2.sub.-2, for example) has stopped, the delivery flow rate value for the other pump (pump 2.sub.-1) obtained from the objective value (the fixed value of the adjustment valve degree of opening setting portion 11) for the degree of opening of the flow rate adjuster valve 4 becomes a value that is much lower than the maximum allowable flow rate for that pump (pump 2.sub.-1) and there is therefore the disadvantage that the difference between these two values cannot be effectively utilized. Furthermore, this also means that the facility capacity that can be effectively used for each one pump (pump 2.sub.-1) is reduced by that amount. Therefore, when the pump (pump 2.sub.-2) has failed and stopped, the flow rate that can be sent by the pump (pump 2.sub.-1) that did not fail and stop and which is continuing operating is far less than is required for the amount of process liquid that is required by plant for power generation or for chemical processing. Accordingly, in order to eliminate this problem, the facility capacity of the pump can be further increased or the number of pumps in the facility can be increased, thereby causing further problems. In addition, problems such as the generation of cavitation in a pump occur not only when one pump that has been operating fails and stops so as to increase the delivery flow rate of the pump that did not fail and stop to greater than the maximum allowable flow rate, but also in the following cases. (1) When there is a valve along the process piping on the suction side of the pump and when, due to some reason, the degree of opening of this valve is greater than the maximum degree of opening so that the pumping resistance becomes large when the process liquid flows through this process piping so that the suction pressure of the pump falls below the rated value. (2) When the temperature of the process liquid on the suction side of the pump rises to above the rated value while the pump is operating. However, in each of these cases (1) and (2), even when a pump flow rate control apparatus according to the previously described conventional example is used, this does not mean that the pump will not fail and stop, and so suitable pump flow rate control is not performed, and it is not possible to prevent trouble such as the generation of cavitation. This is the current situation. Moreover, when there is a pump delivery pressure switch 9 (or a suction pressure switch) installed on the delivery side (or the suction side of the pump 2.sub.-1, 2.sub.-2, in the case (1) described above, the total delivery pressure (or the suction pressure) of the pumps 2.sub.-1, 2.sub.-2 falls below the set value and so this can be detected so that prior to the generation of cavitation, it is possible to forcedly stop a pump that is operating and therefore protect it. However, in the case (2) described above, the temperature of the process liquid on the suction side of the pump rises beforehand but the suction pressure (or the delivery pressure) does not always drop to below the set value and so even if this is done, it is not possible to prevent the generation of cavitation. However, the judgment for whether or not trouble such as pump cavitation or the like is occurring can be performed by determining whether or not the flowing equation (1) is established for the process liquid on the suction side of the pump. EQU Ha-hr&gt;0 (1) Where, Ha: pump available net suction head PA1 hr: pump required net suction head PA1 D: absolute pressure applied to the liquid surface of the process liquid on the suction side of the pump; PA1 ys: height from the liquid surface of the process liquid on the suction side of the pump to the pump suction portion (a positive value when the pump suction portion is lower than the liquid portion); PA1 Zs: loss head inside pump suction piping; PA1 Pv: saturation vapor pressure of the process liquid in pump suction portion; and PA1 .gamma.: specific gravity of the process liquid on suction side of pump. PA1 H.sub.1 : pressure of the process liquid at the point of measurement; and PA1 H.sub.2 : saturation steam pressure with respect to the temperature of the process liquid at the point of measurement. PA1 k.sub.1, k.sub.2 : positive constants PA1 a: first function generator signals PA1 b: second function generator signals Moreover, the pump available net suction head Ha described above is a value that is determined by the process piping system and the pump required net suction head hr is a value determined by the structural design of the pump and the operating conditions and the like. The pump available net suction head Ha described above is determined by the following equation. EQU Ha=D/.gamma.+ys-Zs-Pu/.gamma. (2) Where, Moreover, the loss head inside pump suction piping Zs is a value that is determined by the flow rate of the process liquid that flows in the piping, and the diameter, curvature and length of the piping. However, since there is no instrumentation to constantly and accurately measure in real time whether or not this pump available net suction head Ha can be withstood, the above equation (1) cannot be used to investigate the pump flow rate control apparatus, and so no such control apparatus exists. It is for this reason that the pump flow control apparatus that has been described above has been conventionally used. When the pump available net suction head can be determined by equation (2) that describes the Ha and the right hand side of this equation can be thought of as follows. EQU Ha=H.sub.1 -H.sub.2 EQU H.sub.1 =D/.gamma.+ys-Zs EQU H.sub.2 Pv/.gamma. Where, More specifically, the pressure difference between the saturation vapor pressure with respect to the temperature of the process liquid at the point of measurement, and the pressure of the process liquid at a point of measurement can be measured. Conventionally, an apparatus as shown in FIG. 37 is known as an apparatus for measuring this pressure difference. More specifically, in this figure, 50 is a pressure difference transmitter, and is installed at a position separate from the process piping 49 for the purpose of improving the maintainability of the pressure difference transmitter 50 and in order to protect it from thermal transmission and vibration from the process piping and the pump. In addition, the pressure difference sensor portion 54 of the pressure difference transmitter 50 is separated by the high-pressure side pressure-receiving portion 56 and the low-pressure side pressure-receiving portion 57. Then, the pressure of the process liquid .alpha. (alpha) inside the process piping 49 installed on the suction side of the pump, is led to the high-pressure side pressure-receiving portion 56 of the pressure difference transmitter 50 via the pressure pipe 51. On the other hand, the pressure inside the valve 52 that is inserted in the process liquid .alpha. on the suction side of the pump is lead to the low-pressure side portion side pressure-receiving portion 57 of the pressure difference transmitter 50 via a capillary tube 53. Moreover, the valve 52, the capillary tube 53 and the inside of the low-pressure side pressure-receiving portion 57 are maintained in a state of vacuum, and to the lower portion of the valve 52 is sealed the process liquid .alpha.. More specifically, the inside of the valve 52 and the low-pressure side pressure-receiving portion 57 is made a vacuum when the pressure difference transmitter 50 is assembled, and the process liquid .alpha. is sealed inside the lower portion of the valve 52 so that the pressure of the liquid in the upper portion of the valve 52, the capillary tube 53 and the low-pressure side pressure-receiving portion 57 becomes the saturation vapor pressure at the temperature of the required flow rate set value "a", that is sealed in the bottom portion of the valve 52. In addition, at the same time, electrical signals are also inserted to a force coil 63 and, because of this force coil 63, a force that applies a displacement of the same magnitude and the opposite direction to the previously described displacement is applied to a sensor diaphragm 55 and a force rod 60 via a mechanism 61, so that the sensor diaphragm 55 and the force rod 60 return once again to their original positions. More specifically, by this series of actions, a differential pressure is applied to the high-pressure side pressure-receiving portion 56 and the low-pressure side pressure-receiving portion 57 and there is no displacement of the sensor diaphragm 55 but electrical signals proportional to this differential pressure are output from the amplifier 64. Moreover, for the sake of reference, FIG. 38 shows the displacement of the saturation steam pressure with respect to each temperature for the case when the process liquid is water. Here, the valve 52 is inserted in the process liquid .alpha. on the suction side of the pump and so thermal transmission via the wall of the valve 52 causes the temperature of the process liquid .alpha. sealed in the lower portion of the valve 52 and the temperature of the process liquid .alpha. on the suction side of the pump in a status of thermal equilibrium to become the same. In this status, the pressure of the top portion of the valve 52, the capillary tube 53 and the low-pressure side pressure-receiving portion 57 is the saturation vapor pressure at the temperature of the process liquid on the suction side of the pump. On the other hand, the pressure of the process liquid on the suction side of the pump is led to the high-pressure side pressure-receiving portion 56 of the pressure difference transmitter 50 via the high-pressure side pressure-receiving portion 56 and the pressure difference (differential pressure) between this high-pressure side pressure-receiving portion 56 and the low-pressure side pressure-receiving portion 57 is equivalent to the pump available net suction head Ha. However, this apparatus has the following disadvantages. (1) The process liquid .alpha., sealed in the lower portion of the valve 52, transmits the saturation vapor pressure caused by that temperature to the low-pressure side pressure receiving portion 57; but for reasons already explained, the pressure difference transmitter 50 is installed at a position remote from the process piping 49 where the peripheral temperature is close to room temperature. Not only this, the internal diameter and the external diameter of the capillary tube 53 between the valve 52 and the low-pressure side pressure-receiving portion 57 is normally small when compared to the internal diameter of the valve 52 so as to improve the workability when the capillary tube 53 is installed so as to improve the measurement accuracy in the temperature measuring instrument where the liquid is sealed in the valve 52. Also, in this apparatus, the medium that transmits the saturation vapor pressure of the upper portion of the valve 52 is the saturated vapor inside the capillary tube 53 and the low-pressure side pressure-receiving portion 57. However, when the peripheral temperature of the low-pressure side pressure-receiving portion 57 and the capillary tube 53 installed at a position close to it is close to room temperature, the temperature of the saturated vapor in the low-pressure side pressure-receiving portion 57 and the capillary tube 53 also becomes close to room temperature and so the saturation vapor pressure in this portion also becomes the saturation vapor pressure for room temperature of the process liquid .alpha.. More specifically, there is a differential pressure in the saturation vapor which is the pressure medium in the upper portion of the valve 52, the capillary tube 53 and the low-pressure side pressure-receiving portion 57 and as a result, it is not possible to perform accurate measurements. (2) In addition, a pressure change must be transmitted from the portion where the relative volume is small (the upper portion of the valve 52) via the restricting portion that is the capillary tube 53, to a portion where there is a large volume (the low-pressure side pressure-receiving portion 57), so the measurement error becomes even larger. (3) As already described for (1), the process liquid .alpha., sealed in the lower portion of the valve 52, is heated by the process liquid .alpha. inside the process piping 49 and is vaporized after becoming a saturation vapor, but the portion close to the low-pressure side pressure-receiving portion 57 is near room temperature and so one portion is cooled, liquified and becomes the process liquid .alpha.. In this manner, the pressure inside the low-pressure side pressure-receiving portion 57 becomes the saturation vapor pressure of the process liquid .alpha. at a temperature close to room temperature and the pressure inside the low-pressure side pressure-receiving portion 57 is lower than the pressure in the upper portion of the valve 52, and so the saturation vapor of the process liquid supplied from the side of the valve 52 to the side of the low-pressure side pressure-receiving portion 57 always condenses inside the low-pressure side pressure-receiving portion 57 to become process liquid .alpha. and collect here. It therefore becomes impossible to apply the saturation vapor pressure with respect to the process liquid at room temperature, to the low-pressure side pressure-receiving portion 57 and ultimately, it becomes impossible to measure whether or not there is no process liquid in the bottom portion of the valve 52. (4) Also, when this apparatus is installed, then should the valve 52 be inadvertently turned upside down or inclined and installed, the process liquid inside the valve 52 enters into and collects inside the capillary tube 53 and flows into the low-pressure side pressure-receiving portion 57 so that measurement is again rendered impossible. Because of these disadvantages, the current situation is such that it is not possible to constantly and accurately measure in real time the degree to which the pump available net suction head can be withstood. With respect to this, there has been disclosed in Japanese Patent Application Laid-Open Publication No. 127993-1991 (Mitsubishi Electric Corporation), a pump facility that receives first water supply flow amount control signals corresponding to a negative load, that adjusts the supply flow rate to that negative load, that is provided with a pump suction flow rate meter provided on an intake side of a pump, a first function generator that receives these signals of the suction flow rate meter and calculates the required net pump suction head (N.P.S.H.), a second function generator that receives signals from the pressure meter and the water supply temperature meter and calculates the available N.P.S.H., a controller to which the signals of the first function generator are input and subtracted and to which the signals of the second function generator are input and added and which outputs second water supply flow rate control signals, and a low signal selector that receives the output of the controller and the first water supply flow rate control signals and that sends the weaker of the two signals to a means for adjusting the water supply flow rate, so that even if there is a change in the operating status, the adjustment of the water supply flow rate to the load enables the available N.P.S.H. to always be maintained at above the required N.P.S.H. so that it is possible to prevent cavitation of the pump. However, in the apparatus disclosed in Japanese Patent Application Laid-Open Publication No. 127993-1991, the controller performs either proportional or proportional+integral calculation so that EQU a-k.sub.1 b-k.sub.2 .gtoreq.0 Where, However, when there is only a proportional calculation, there is a remaining offset, so that for example, when there is control of the water supply flow rate by signals from the controller, the required N.P.S.H. actually becomes greater than the available N.P.S.H. Furthermore, when there is proportional+integral calculation, and the values of the control signals to make agreement with the required flow rate value are slightly larger than the values of the signals from the controller, the signals from the controller are saturated by integration. In this status, then even if the required N.P.S.H. is greater than the available N.P.S.H., there is no corrected signal output until the controller output due to integration becomes zero and so the required N.P.S.H. continues to be greater than the available N.P.S.H. for a long time, and as a result, it is possible that cavitation may occur.
<http://example.com/> <relative/iri#prop> "value" . <http://example.com/> <relative/uri#prop> "value" .
.grid { display: -webkit-flex; -webkit-flex-flow: row wrap; display: -ms-flexbox; -ms-flex-flow: row wrap; } .col { display: inline-block; *display: inline; /* IE < 8: fake inline-block */ zoom: 1; vertical-align: top; } .col-1, .col-1-1, .col-1-2, .col-1-3, .col-2-3, .col-1-4, .col-3-4, .col-1-6, .col-5-6, .col-1-12, .col-2-12, .col-3-12, .col-4-12, .col-5-12, .col-6-12, .col-7-12, .col-8-12, .col-9-12, .col-10-12, .col-11-12, .col-12-12 { display: inline-block; *display: inline; zoom: 1; letter-spacing: normal; word-spacing: normal; vertical-align: top; text-rendering: auto; } .col-1-12 { width: 8.3333%; *width: 8.3023%; } .col-1-6, .col-2-12 { width: 16.6667%; *width: 16.6357%; } .col-1-4, .col-3-12 { width: 25%; *width: 24.9690%; } .col-1-3, .col-4-12 { width: 33.3333%; *width: 33.3023%; } .col-5-12 { width: 41.6667%; *width: 41.6357%; } .col-1-2, .col-6-12 { width: 50%; *width: 49.9690%; } .col-7-12 { width: 58.3333%; *width: 58.3023%; } .col-2-3, .col-8-12 { width: 66.6667%; *width: 66.6357%; } .col-3-4, .col-9-12 { width: 75%; *width: 74.9690%; } .col-5-6, .col-10-12 { width: 83.3333%; *width: 83.3023%; } .col-11-12 { width: 91.6667%; *width: 91.6357%; } .col-1, .col-1-1, .col-12-12 { width: 100%; } @media screen and (min-width: 35.5em) { .col-sm-1, .col-sm-1-1, .col-sm-1-2, .col-sm-1-3, .col-sm-2-3, .col-sm-1-4, .col-sm-3-4, .col-sm-1-6, .col-sm-5-6, .col-sm-1-12, .col-sm-2-12, .col-sm-3-12, .col-sm-4-12, .col-sm-5-12, .col-sm-6-12, .col-sm-7-12, .col-sm-8-12, .col-sm-9-12, .col-sm-10-12, .col-sm-11-12, .col-sm-12-12 { display: inline-block; *display: inline; zoom: 1; letter-spacing: normal; word-spacing: normal; vertical-align: top; text-rendering: auto; } .col-sm-1-12 { width: 8.3333%; *width: 8.3023%; } .col-sm-1-6, .col-sm-2-12 { width: 16.6667%; *width: 16.6357%; } .col-sm-1-4, .col-sm-3-12 { width: 25%; *width: 24.9690%; } .col-sm-1-3, .col-sm-4-12 { width: 33.3333%; *width: 33.3023%; } .col-sm-5-12 { width: 41.6667%; *width: 41.6357%; } .col-sm-1-2, .col-sm-6-12 { width: 50%; *width: 49.9690%; } .col-sm-7-12 { width: 58.3333%; *width: 58.3023%; } .col-sm-2-3, .col-sm-8-12 { width: 66.6667%; *width: 66.6357%; } .col-sm-3-4, .col-sm-9-12 { width: 75%; *width: 74.9690%; } .col-sm-5-6, .col-sm-10-12 { width: 83.3333%; *width: 83.3023%; } .col-sm-11-12 { width: 91.6667%; *width: 91.6357%; } .col-sm-1, .col-sm-1-1, .col-sm-12-12 { width: 100%; } } @media screen and (min-width: 48em) { .col-md-1, .col-md-1-1, .col-md-1-2, .col-md-1-3, .col-md-2-3, .col-md-1-4, .col-md-3-4, .col-md-1-6, .col-md-5-6, .col-md-1-12, .col-md-2-12, .col-md-3-12, .col-md-4-12, .col-md-5-12, .col-md-6-12, .col-md-7-12, .col-md-8-12, .col-md-9-12, .col-md-10-12, .col-md-11-12, .col-md-12-12 { display: inline-block; *display: inline; zoom: 1; letter-spacing: normal; word-spacing: normal; vertical-align: top; text-rendering: auto; } .col-md-1-12 { width: 8.3333%; *width: 8.3023%; } .col-md-1-6, .col-md-2-12 { width: 16.6667%; *width: 16.6357%; } .col-md-1-4, .col-md-3-12 { width: 25%; *width: 24.9690%; } .col-md-1-3, .col-md-4-12 { width: 33.3333%; *width: 33.3023%; } .col-md-5-12 { width: 41.6667%; *width: 41.6357%; } .col-md-1-2, .col-md-6-12 { width: 50%; *width: 49.9690%; } .col-md-7-12 { width: 58.3333%; *width: 58.3023%; } .col-md-2-3, .col-md-8-12 { width: 66.6667%; *width: 66.6357%; } .col-md-3-4, .col-md-9-12 { width: 75%; *width: 74.9690%; } .col-md-5-6, .col-md-10-12 { width: 83.3333%; *width: 83.3023%; } .col-md-11-12 { width: 91.6667%; *width: 91.6357%; } .col-md-1, .col-md-1-1, .col-md-12-12 { width: 100%; } } @media screen and (min-width: 64em) { .col-lg-1, .col-lg-1-1, .col-lg-1-2, .col-lg-1-3, .col-lg-2-3, .col-lg-1-4, .col-lg-3-4, .col-lg-1-6, .col-lg-5-6, .col-lg-1-12, .col-lg-2-12, .col-lg-3-12, .col-lg-4-12, .col-lg-5-12, .col-lg-6-12, .col-lg-7-12, .col-lg-8-12, .col-lg-9-12, .col-lg-10-12, .col-lg-11-12, .col-lg-12-12 { display: inline-block; *display: inline; zoom: 1; letter-spacing: normal; word-spacing: normal; vertical-align: top; text-rendering: auto; } .col-lg-1-12 { width: 8.3333%; *width: 8.3023%; } .col-lg-1-6, .col-lg-2-12 { width: 16.6667%; *width: 16.6357%; } .col-lg-1-4, .col-lg-3-12 { width: 25%; *width: 24.9690%; } .col-lg-1-3, .col-lg-4-12 { width: 33.3333%; *width: 33.3023%; } .col-lg-5-12 { width: 41.6667%; *width: 41.6357%; } .col-lg-1-2, .col-lg-6-12 { width: 50%; *width: 49.9690%; } .col-lg-7-12 { width: 58.3333%; *width: 58.3023%; } .col-lg-2-3, .col-lg-8-12 { width: 66.6667%; *width: 66.6357%; } .col-lg-3-4, .col-lg-9-12 { width: 75%; *width: 74.9690%; } .col-lg-5-6, .col-lg-10-12 { width: 83.3333%; *width: 83.3023%; } .col-lg-11-12 { width: 91.6667%; *width: 91.6357%; } .col-lg-1, .col-lg-1-1, .col-lg-12-12 { width: 100%; } } @media screen and (min-width: 80em) { .col-xl-1, .col-xl-1-1, .col-xl-1-2, .col-xl-1-3, .col-xl-2-3, .col-xl-1-4, .col-xl-3-4, .col-xl-1-6, .col-xl-5-6, .col-xl-1-12, .col-xl-2-12, .col-xl-3-12, .col-xl-4-12, .col-xl-5-12, .col-xl-6-12, .col-xl-7-12, .col-xl-8-12, .col-xl-9-12, .col-xl-10-12, .col-xl-11-12, .col-xl-12-12 { display: inline-block; *display: inline; zoom: 1; letter-spacing: normal; word-spacing: normal; vertical-align: top; text-rendering: auto; } .col-xl-1-12 { width: 8.3333%; *width: 8.3023%; } .col-xl-1-6, .col-xl-2-12 { width: 16.6667%; *width: 16.6357%; } .col-xl-1-4, .col-xl-3-12 { width: 25%; *width: 24.9690%; } .col-xl-1-3, .col-xl-4-12 { width: 33.3333%; *width: 33.3023%; } .col-xl-5-12 { width: 41.6667%; *width: 41.6357%; } .col-xl-1-2, .col-xl-6-12 { width: 50%; *width: 49.9690%; } .col-xl-7-12 { width: 58.3333%; *width: 58.3023%; } .col-xl-2-3, .col-xl-8-12 { width: 66.6667%; *width: 66.6357%; } .col-xl-3-4, .col-xl-9-12 { width: 75%; *width: 74.9690%; } .col-xl-5-6, .col-xl-10-12 { width: 83.3333%; *width: 83.3023%; } .col-xl-11-12 { width: 91.6667%; *width: 91.6357%; } .col-xl-1, .col-xl-1-1, .col-xl-12-12 { width: 100%; } } div.grey{ background: #EDEDEB; } div.white{ background: #F4F5F0; } div.dark-grey{ background: #4C4D4B; } div.green{ background: #5CB86E; } .pure-img { max-width: 100%; height: auto; display: block; } button { cursor: pointer; margin: 10px; border-radius: 5px; text-decoration: none; padding: 10px; font-size: 22px; transition: .3s; -webkit-transition: .3s; -moz-transition: .3s; -o-transition: .3s; display: inline-block; color: #666666; border: 2px #666666 solid; outline: none; } button:hover{ color: #ffffff; background-color: #666666; } .blue { color: #55acee; border: 2px #55acee solid; } .blue:hover { background-color: #55acee; } .green { color: #2ecc71; border: 2px #2ecc71 solid; } .green:hover { background-color: #2ecc71; } .red { color: #e74c3c; border: 2px #e74c3c solid; } .red:hover { background-color: #e74c3c; } .purple { color: #9b59b6; border: 2px #9b59b6 solid; } .purple:hover { background-color: #9b59b6; } .orange { color: #e67e22; border: 2px #e67e22 solid; } .orange:hover { background-color: #e67e22; } .yellow { color: #f1c40f; border: 2px #f1c40f solid; } .yellow:hover { background-color: #f1c40f; } .twitter{ color: #00aced; border: 2px solid#00aced; } .twitter:hover{ background-color: #00aced; } .facebook{ color: #3b5998; border: 2px solid #3b5998; } .facebook:hover{ background-color: #3b5998; } .google{ color: #dd4b39; border: 2px solid #dd4b39; } .google:hover{ background-color: #dd4b39; } .pinterest{ color: #cb2027; border: 2px solid #cb2027; } .pinterest:hover{ background-color: #cb2027; } .linkedin{ color: #007bb6; border: 2px solid #007bb6; } .linkedin:hover{ background-color: #007bb6; } .youtube{ color: #bb0000; border: 2px solid #bb0000; } .youtube:hover{ background-color: #bb0000; } .vimeo{ color: #aad450; border: 2px solid #aad450; } .vimeo:hover{ background-color: #aad450; } .tumblr{ color: #32506d; border: 2px solid #32506d; } .tumblr:hover{ background-color: #32506d; } .instagram{ color: #517fa4; border: 2px solid #517fa4; } .instagram:hover{ background-color: #517fa4; } .flickr{ color: #ff0084; border: 2px solid #ff0084; } .flickr:hover{ background-color: #ff0084; } .dribbble{ color: #ea4c89; border: 2px solid #ea4c89; } .dribbble:hover{ background-color: #ea4c89; } .quora{ color: #a82400; border: 2px solid #a82400; } .quora:hover{ background-color: #a82400; } .foursquare{ color: #0072b1; border: 2px solid #0072b1; } .foursquare:hover{ background-color: #0072b1; } .forrst{ color: #5B9A68; border: 2px solid #5B9A68; } .forrst:hover{ background-color: #5B9A68; } .vk{ color: #45668e; border: 2px solid #45668e; } .vk:hover{ background-color: #45668e; } .wordpress{ color: #21759b; border: 2px solid #21759b; } .wordpress:hover{ background-color: #21759b; } .stumbleupon{ color: #EB4823; border: 2px solid #EB4823; } .stumbleupon:hover{ background-color: #EB4823; } .yahoo{ color: #7B0099; border: 2px solid #7B0099; } .yahoo:hover{ background-color: #7B0099; } .blogger{ color: #fb8f3d; border: 2px solid #fb8f3d; } .blogger:hover{ background-color: #fb8f3d; } .soundcloud{ color: #ff3a00; border: 2px solid #ff3a00; } .soundcloud:hover{ background-color: #ff3a00; } /* BACKGROUND TRANSITIONS */ /* Fade */ .fade { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; overflow: hidden; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: color, background-color; transition-property: color, background-color; } .fade:hover, .fade:focus, .fade:active { background-color: #2098d1; color: white; } /* Sweep To Right */ .sweep-to-right { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; } .sweep-to-right:before { content: ""; position: absolute; z-index: -1; top: 0; left: 0; right: 0; bottom: 0; background: #2098d1; -webkit-transform: scaleX(0); transform: scaleX(0); -webkit-transform-origin: 0 50%; transform-origin: 0 50%; -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .sweep-to-right:hover, .sweep-to-right:focus, .sweep-to-right:active { color: white; } .sweep-to-right:hover:before, .sweep-to-right:focus:before, .sweep-to-right:active:before { -webkit-transform: scaleX(1); transform: scaleX(1); } /* Sweep To Left */ .sweep-to-left { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; } .sweep-to-left:before { content: ""; position: absolute; z-index: -1; top: 0; left: 0; right: 0; bottom: 0; background: #2098d1; -webkit-transform: scaleX(0); transform: scaleX(0); -webkit-transform-origin: 100% 50%; transform-origin: 100% 50%; -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .sweep-to-left:hover, .sweep-to-left:focus, .sweep-to-left:active { color: white; } .sweep-to-left:hover:before, .sweep-to-left:focus:before, .sweep-to-left:active:before { -webkit-transform: scaleX(1); transform: scaleX(1); } /* Sweep To Bottom */ .sweep-to-bottom { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; } .sweep-to-bottom:before { content: ""; position: absolute; z-index: -1; top: 0; left: 0; right: 0; bottom: 0; background: #2098d1; -webkit-transform: scaleY(0); transform: scaleY(0); -webkit-transform-origin: 50% 0; transform-origin: 50% 0; -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .sweep-to-bottom:hover, .sweep-to-bottom:focus, .sweep-to-bottom:active { color: white; } .sweep-to-bottom:hover:before, .sweep-to-bottom:focus:before, .sweep-to-bottom:active:before { -webkit-transform: scaleY(1); transform: scaleY(1); } /* Sweep To Top */ .sweep-to-top { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; } .sweep-to-top:before { content: ""; position: absolute; z-index: -1; top: 0; left: 0; right: 0; bottom: 0; background: #2098d1; -webkit-transform: scaleY(0); transform: scaleY(0); -webkit-transform-origin: 50% 100%; transform-origin: 50% 100%; -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .sweep-to-top:hover, .sweep-to-top:focus, .sweep-to-top:active { color: white; } .sweep-to-top:hover:before, .sweep-to-top:focus:before, .sweep-to-top:active:before { -webkit-transform: scaleY(1); transform: scaleY(1); } /* Bounce To Right */ .bounce-to-right { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.5s; transition-duration: 0.5s; } .bounce-to-right:before { content: ""; position: absolute; z-index: -1; top: 0; left: 0; right: 0; bottom: 0; background: #2098d1; -webkit-transform: scaleX(0); transform: scaleX(0); -webkit-transform-origin: 0 50%; transform-origin: 0 50%; -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.5s; transition-duration: 0.5s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .bounce-to-right:hover, .bounce-to-right:focus, .bounce-to-right:active { color: white; } .bounce-to-right:hover:before, .bounce-to-right:focus:before, .bounce-to-right:active:before { -webkit-transform: scaleX(1); transform: scaleX(1); -webkit-transition-timing-function: cubic-bezier(0.52, 1.64, 0.37, 0.66); transition-timing-function: cubic-bezier(0.52, 1.64, 0.37, 0.66); } /* Bounce To Left */ .bounce-to-left { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.5s; transition-duration: 0.5s; } .bounce-to-left:before { content: ""; position: absolute; z-index: -1; top: 0; left: 0; right: 0; bottom: 0; background: #2098d1; -webkit-transform: scaleX(0); transform: scaleX(0); -webkit-transform-origin: 100% 50%; transform-origin: 100% 50%; -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.5s; transition-duration: 0.5s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .bounce-to-left:hover, .bounce-to-left:focus, .bounce-to-left:active { color: white; } .bounce-to-left:hover:before, .bounce-to-left:focus:before, .bounce-to-left:active:before { -webkit-transform: scaleX(1); transform: scaleX(1); -webkit-transition-timing-function: cubic-bezier(0.52, 1.64, 0.37, 0.66); transition-timing-function: cubic-bezier(0.52, 1.64, 0.37, 0.66); } /* Bounce To Bottom */ .bounce-to-bottom { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.5s; transition-duration: 0.5s; } .bounce-to-bottom:before { content: ""; position: absolute; z-index: -1; top: 0; left: 0; right: 0; bottom: 0; background: #2098d1; -webkit-transform: scaleY(0); transform: scaleY(0); -webkit-transform-origin: 50% 0; transform-origin: 50% 0; -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.5s; transition-duration: 0.5s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .bounce-to-bottom:hover, .bounce-to-bottom:focus, .bounce-to-bottom:active { color: white; } .bounce-to-bottom:hover:before, .bounce-to-bottom:focus:before, .bounce-to-bottom:active:before { -webkit-transform: scaleY(1); transform: scaleY(1); -webkit-transition-timing-function: cubic-bezier(0.52, 1.64, 0.37, 0.66); transition-timing-function: cubic-bezier(0.52, 1.64, 0.37, 0.66); } /* Bounce To Top */ .bounce-to-top { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.5s; transition-duration: 0.5s; } .bounce-to-top:before { content: ""; position: absolute; z-index: -1; top: 0; left: 0; right: 0; bottom: 0; background: #2098d1; -webkit-transform: scaleY(0); transform: scaleY(0); -webkit-transform-origin: 50% 100%; transform-origin: 50% 100%; -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.5s; transition-duration: 0.5s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .bounce-to-top:hover, .bounce-to-top:focus, .bounce-to-top:active { color: white; } .bounce-to-top:hover:before, .bounce-to-top:focus:before, .bounce-to-top:active:before { -webkit-transform: scaleY(1); transform: scaleY(1); -webkit-transition-timing-function: cubic-bezier(0.52, 1.64, 0.37, 0.66); transition-timing-function: cubic-bezier(0.52, 1.64, 0.37, 0.66); } /* Radial Out */ .radial-out { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; overflow: hidden; background: #e1e1e1; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; } .radial-out:before { content: ""; position: absolute; z-index: -1; top: 0; left: 0; right: 0; bottom: 0; background: #2098d1; border-radius: 100%; -webkit-transform: scale(0); transform: scale(0); -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .radial-out:hover, .radial-out:focus, .radial-out:active { color: white; } .radial-out:hover:before, .radial-out:focus:before, .radial-out:active:before { -webkit-transform: scale(2); transform: scale(2); } /* Radial In */ .radial-in { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; overflow: hidden; background: #2098d1; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; } .radial-in:before { content: ""; position: absolute; z-index: -1; top: 0; left: 0; right: 0; bottom: 0; background: #e1e1e1; border-radius: 100%; -webkit-transform: scale(2); transform: scale(2); -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .radial-in:hover, .radial-in:focus, .radial-in:active { color: white; } .radial-in:hover:before, .radial-in:focus:before, .radial-in:active:before { -webkit-transform: scale(0); transform: scale(0); } /* Rectangle In */ .rectangle-in { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; background: #2098d1; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; } .rectangle-in:before { content: ""; position: absolute; z-index: -1; top: 0; left: 0; right: 0; bottom: 0; background: #e1e1e1; -webkit-transform: scale(1); transform: scale(1); -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .rectangle-in:hover, .rectangle-in:focus, .rectangle-in:active { color: white; } .rectangle-in:hover:before, .rectangle-in:focus:before, .rectangle-in:active:before { -webkit-transform: scale(0); transform: scale(0); } /* Rectangle Out */ .rectangle-out { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; background: #e1e1e1; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; } .rectangle-out:before { content: ""; position: absolute; z-index: -1; top: 0; left: 0; right: 0; bottom: 0; background: #2098d1; -webkit-transform: scale(0); transform: scale(0); -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .rectangle-out:hover, .rectangle-out:focus, .rectangle-out:active { color: white; } .rectangle-out:hover:before, .rectangle-out:focus:before, .rectangle-out:active:before { -webkit-transform: scale(1); transform: scale(1); } /* Shutter In Horizontal */ .shutter-in-horizontal { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; background: #2098d1; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; } .shutter-in-horizontal:before { content: ""; position: absolute; z-index: -1; top: 0; bottom: 0; left: 0; right: 0; background: #e1e1e1; -webkit-transform: scaleX(1); transform: scaleX(1); -webkit-transform-origin: 50%; transform-origin: 50%; -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .shutter-in-horizontal:hover, .shutter-in-horizontal:focus, .shutter-in-horizontal:active { color: white; } .shutter-in-horizontal:hover:before, .shutter-in-horizontal:focus:before, .shutter-in-horizontal:active:before { -webkit-transform: scaleX(0); transform: scaleX(0); } /* Shutter Out Horizontal */ .shutter-out-horizontal { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; background: #e1e1e1; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; } .shutter-out-horizontal:before { content: ""; position: absolute; z-index: -1; top: 0; bottom: 0; left: 0; right: 0; background: #2098d1; -webkit-transform: scaleX(0); transform: scaleX(0); -webkit-transform-origin: 50%; transform-origin: 50%; -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .shutter-out-horizontal:hover, .shutter-out-horizontal:focus, .shutter-out-horizontal:active { color: white; } .shutter-out-horizontal:hover:before, .shutter-out-horizontal:focus:before, .shutter-out-horizontal:active:before { -webkit-transform: scaleX(1); transform: scaleX(1); } /* Shutter In Vertical */ .shutter-in-vertical { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; background: #2098d1; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; } .shutter-in-vertical:before { content: ""; position: absolute; z-index: -1; top: 0; bottom: 0; left: 0; right: 0; background: #e1e1e1; -webkit-transform: scaleY(1); transform: scaleY(1); -webkit-transform-origin: 50%; transform-origin: 50%; -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .shutter-in-vertical:hover, .shutter-in-vertical:focus, .shutter-in-vertical:active { color: white; } .shutter-in-vertical:hover:before, .shutter-in-vertical:focus:before, .shutter-in-vertical:active:before { -webkit-transform: scaleY(0); transform: scaleY(0); } /* Shutter Out Vertical */ .shutter-out-vertical { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; background: #e1e1e1; -webkit-transition-property: color; transition-property: color; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; } .shutter-out-vertical:before { content: ""; position: absolute; z-index: -1; top: 0; bottom: 0; left: 0; right: 0; background: #2098d1; -webkit-transform: scaleY(0); transform: scaleY(0); -webkit-transform-origin: 50%; transform-origin: 50%; -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .shutter-out-vertical:hover, .shutter-out-vertical:focus, .shutter-out-vertical:active { color: white; } .shutter-out-vertical:hover:before, .shutter-out-vertical:focus:before, .shutter-out-vertical:active:before { -webkit-transform: scaleY(1); transform: scaleY(1); } /* BORDER TRANSITIONS */ /* Border Fade */ .border-fade { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: box-shadow; transition-property: box-shadow; box-shadow: inset 0 0 0 4px #e1e1e1, 0 0 1px rgba(0, 0, 0, 0); /* Hack to improve aliasing on mobile/tablet devices */ } .border-fade:hover, .border-fade:focus, .border-fade:active { box-shadow: inset 0 0 0 4px #2098d1, 0 0 1px rgba(0, 0, 0, 0); /* Hack to improve aliasing on mobile/tablet devices */ } /* Hollow */ .hollow { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: background; transition-property: background; box-shadow: inset 0 0 0 4px #e1e1e1, 0 0 1px rgba(0, 0, 0, 0); /* Hack to improve aliasing on mobile/tablet devices */ } .hollow:hover, .hollow:focus, .hollow:active { background: none; } /* Trim */ .trim { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; } .trim:before { content: ''; position: absolute; border: white solid 4px; top: 4px; left: 4px; right: 4px; bottom: 4px; opacity: 0; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: opacity; transition-property: opacity; } .trim:hover:before, .trim:focus:before, .trim:active:before { opacity: 1; } /* Ripple Out */ @-webkit-keyframes ripple-out { 100% { top: -12px; right: -12px; bottom: -12px; left: -12px; opacity: 0; } } @keyframes ripple-out { 100% { top: -12px; right: -12px; bottom: -12px; left: -12px; opacity: 0; } } .ripple-out { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; } .ripple-out:before { content: ''; position: absolute; border: #e1e1e1 solid 6px; top: 0; right: 0; bottom: 0; left: 0; -webkit-animation-duration: 1s; animation-duration: 1s; } .ripple-out:hover:before, .ripple-out:focus:before, .ripple-out:active:before { -webkit-animation-name: ripple-out; animation-name: ripple-out; } /* Ripple In */ @-webkit-keyframes ripple-in { 100% { top: 0; right: 0; bottom: 0; left: 0; opacity: 1; } } @keyframes ripple-in { 100% { top: 0; right: 0; bottom: 0; left: 0; opacity: 1; } } .ripple-in { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; } .ripple-in:before { content: ''; position: absolute; border: #e1e1e1 solid 4px; top: -12px; right: -12px; bottom: -12px; left: -12px; opacity: 0; -webkit-animation-duration: 1s; animation-duration: 1s; } .ripple-in:hover:before, .ripple-in:focus:before, .ripple-in:active:before { -webkit-animation-name: ripple-in; animation-name: ripple-in; } /* Outline Out */ .outline-out { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; } .outline-out:before { content: ''; position: absolute; border: #e1e1e1 solid 4px; top: 0; right: 0; bottom: 0; left: 0; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: top, right, bottom, left; transition-property: top, right, bottom, left; } .outline-out:hover:before, .outline-out:focus:before, .outline-out:active:before { top: -8px; right: -8px; bottom: -8px; left: -8px; } /* Outline In */ .outline-in { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; } .outline-in:before { pointer-events: none; content: ''; position: absolute; border: #e1e1e1 solid 4px; top: -16px; right: -16px; bottom: -16px; left: -16px; opacity: 0; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: top, right, bottom, left; transition-property: top, right, bottom, left; } .outline-in:hover:before, .outline-in:focus:before, .outline-in:active:before { top: -8px; right: -8px; bottom: -8px; left: -8px; opacity: 1; } /* Round Corners */ .round-corners { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: border-radius; transition-property: border-radius; } .round-corners:hover, .round-corners:focus, .round-corners:active { border-radius: 1em; } /* Underline From Left */ .underline-from-left { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; overflow: hidden; } .underline-from-left:before { content: ""; position: absolute; z-index: -1; left: 0; right: 100%; bottom: 0; background: #2098d1; height: 4px; -webkit-transition-property: right; transition-property: right; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .underline-from-left:hover:before, .underline-from-left:focus:before, .underline-from-left:active:before { right: 0; } /* Underline From Center */ .underline-from-center { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; overflow: hidden; } .underline-from-center:before { content: ""; position: absolute; z-index: -1; left: 50%; right: 50%; bottom: 0; background: #2098d1; height: 4px; -webkit-transition-property: left, right; transition-property: left, right; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .underline-from-center:hover:before, .underline-from-center:focus:before, .underline-from-center:active:before { left: 0; right: 0; } /* Underline From Right */ .underline-from-right { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; overflow: hidden; } .underline-from-right:before { content: ""; position: absolute; z-index: -1; left: 100%; right: 0; bottom: 0; background: #2098d1; height: 4px; -webkit-transition-property: left; transition-property: left; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .underline-from-right:hover:before, .underline-from-right:focus:before, .underline-from-right:active:before { left: 0; } /* Overline From Left */ .overline-from-left { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; overflow: hidden; } .overline-from-left:before { content: ""; position: absolute; z-index: -1; left: 0; right: 100%; top: 0; background: #2098d1; height: 4px; -webkit-transition-property: right; transition-property: right; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .overline-from-left:hover:before, .overline-from-left:focus:before, .overline-from-left:active:before { right: 0; } /* Overline From Center */ .overline-from-center { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; overflow: hidden; } .overline-from-center:before { content: ""; position: absolute; z-index: -1; left: 50%; right: 50%; top: 0; background: #2098d1; height: 4px; -webkit-transition-property: left, right; transition-property: left, right; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .overline-from-center:hover:before, .overline-from-center:focus:before, .overline-from-center:active:before { left: 0; right: 0; } /* Overline From Right */ .overline-from-right { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; overflow: hidden; } .overline-from-right:before { content: ""; position: absolute; z-index: -1; left: 100%; right: 0; top: 0; background: #2098d1; height: 4px; -webkit-transition-property: left; transition-property: left; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .overline-from-right:hover:before, .overline-from-right:focus:before, .overline-from-right:active:before { left: 0; } /* Reveal */ .reveal { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; overflow: hidden; } .reveal:before { content: ""; position: absolute; z-index: -1; left: 0; right: 0; top: 0; bottom: 0; border-color: #2098d1; border-style: solid; border-width: 0; -webkit-transition-property: border-width; transition-property: border-width; -webkit-transition-duration: 0.1s; transition-duration: 0.1s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .reveal:hover:before, .reveal:focus:before, .reveal:active:before { -webkit-transform: translateY(0); transform: translateY(0); border-width: 4px; } /* Underline Reveal */ .underline-reveal { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; overflow: hidden; } .underline-reveal:before { content: ""; position: absolute; z-index: -1; left: 0; right: 0; bottom: 0; background: #2098d1; height: 4px; -webkit-transform: translateY(4px); transform: translateY(4px); -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .underline-reveal:hover:before, .underline-reveal:focus:before, .underline-reveal:active:before { -webkit-transform: translateY(0); transform: translateY(0); } /* Overline Reveal */ .overline-reveal { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; overflow: hidden; } .overline-reveal:before { content: ""; position: absolute; z-index: -1; left: 0; right: 0; top: 0; background: #2098d1; height: 4px; -webkit-transform: translateY(-4px); transform: translateY(-4px); -webkit-transition-property: transform; transition-property: transform; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-timing-function: ease-out; transition-timing-function: ease-out; } .overline-reveal:hover:before, .overline-reveal:focus:before, .overline-reveal:active:before { -webkit-transform: translateY(0); transform: translateY(0); } /* SHADOW/GLOW TRANSITIONS */ /* Glow */ .glow { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: box-shadow; transition-property: box-shadow; } .glow:hover, .glow:focus, .glow:active { box-shadow: 0 0 8px rgba(0, 0, 0, 0.6); } /* Shadow */ .shadow { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: box-shadow; transition-property: box-shadow; } .shadow:hover, .shadow:focus, .shadow:active { box-shadow: 0 10px 10px -10px rgba(0, 0, 0, 0.5); } /* Grow Shadow */ .grow-shadow { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: box-shadow, transform; transition-property: box-shadow, transform; } .grow-shadow:hover, .grow-shadow:focus, .grow-shadow:active { box-shadow: 0 10px 10px -10px rgba(0, 0, 0, 0.5); -webkit-transform: scale(1.1); transform: scale(1.1); } /* Box Shadow Outset */ .box-shadow-outset { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: box-shadow; transition-property: box-shadow; } .box-shadow-outset:hover, .box-shadow-outset:focus, .box-shadow-outset:active { box-shadow: 2px 2px 2px rgba(0, 0, 0, 0.6); } /* Box Shadow Inset */ .box-shadow-inset { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: box-shadow; transition-property: box-shadow; box-shadow: inset 0 0 0 rgba(0, 0, 0, 0.6), 0 0 1px rgba(0, 0, 0, 0); /* Hack to improve aliasing on mobile/tablet devices */ } .box-shadow-inset:hover, .box-shadow-inset:focus, .box-shadow-inset:active { box-shadow: inset 2px 2px 2px rgba(0, 0, 0, 0.6), 0 0 1px rgba(0, 0, 0, 0); /* Hack to improve aliasing on mobile/tablet devices */ } /* Float Shadow */ .float-shadow { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: transform; transition-property: transform; } .float-shadow:before { pointer-events: none; position: absolute; z-index: -1; content: ''; top: 100%; left: 5%; height: 10px; width: 90%; opacity: 0; background: -webkit-radial-gradient(center, ellipse, rgba(0, 0, 0, 0.35) 0%, rgba(0, 0, 0, 0) 80%); background: radial-gradient(ellipse at center, rgba(0, 0, 0, 0.35) 0%, rgba(0, 0, 0, 0) 80%); /* W3C */ -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: transform, opacity; transition-property: transform, opacity; } .float-shadow:hover, .float-shadow:focus, .float-shadow:active { -webkit-transform: translateY(-5px); transform: translateY(-5px); /* move the element up by 5px */ } .float-shadow:hover:before, .float-shadow:focus:before, .float-shadow:active:before { opacity: 1; -webkit-transform: translateY(5px); transform: translateY(5px); /* move the element down by 5px (it will stay in place because it's attached to the element that also moves up 5px) */ } /* Shadow Radial */ .shadow-radial { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; } .shadow-radial:before, .shadow-radial:after { pointer-events: none; position: absolute; content: ''; left: 0; width: 100%; box-sizing: border-box; background-repeat: no-repeat; height: 5px; opacity: 0; -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: opacity; transition-property: opacity; } .shadow-radial:before { bottom: 100%; background: -webkit-radial-gradient(50% 150%, ellipse, rgba(0, 0, 0, 0.6) 0%, rgba(0, 0, 0, 0) 80%); background: radial-gradient(ellipse at 50% 150%, rgba(0, 0, 0, 0.6) 0%, rgba(0, 0, 0, 0) 80%); } .shadow-radial:after { top: 100%; background: -webkit-radial-gradient(50% -50%, ellipse, rgba(0, 0, 0, 0.6) 0%, rgba(0, 0, 0, 0) 80%); background: radial-gradient(ellipse at 50% -50%, rgba(0, 0, 0, 0.6) 0%, rgba(0, 0, 0, 0) 80%); } .shadow-radial:hover:before, .shadow-radial:focus:before, .shadow-radial:active:before, .shadow-radial:hover:after, .shadow-radial:focus:after, .shadow-radial:active:after { opacity: 1; } /* CURLS */ /* Curl Top Left */ .curl-top-left { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; } .curl-top-left:before { pointer-events: none; position: absolute; content: ''; height: 0; width: 0; top: 0; left: 0; background: white; /* IE9 */ background: linear-gradient(135deg, white 45%, #aaaaaa 50%, #cccccc 56%, white 80%); filter: progid:DXImageTransform.Microsoft.gradient(GradientType=0,startColorstr='#ffffff', endColorstr='#000000'); /*For IE7-8-9*/ z-index: 1000; box-shadow: 1px 1px 1px rgba(0, 0, 0, 0.4); -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: width, height; transition-property: width, height; } .curl-top-left:hover:before, .curl-top-left:focus:before, .curl-top-left:active:before { width: 25px; height: 25px; } /* Curl Top Right */ .curl-top-right { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; } .curl-top-right:before { pointer-events: none; position: absolute; content: ''; height: 0; width: 0; top: 0; right: 0; background: white; /* IE9 */ background: linear-gradient(225deg, white 45%, #aaaaaa 50%, #cccccc 56%, white 80%); box-shadow: -1px 1px 1px rgba(0, 0, 0, 0.4); -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: width, height; transition-property: width, height; } .curl-top-right:hover:before, .curl-top-right:focus:before, .curl-top-right:active:before { width: 25px; height: 25px; } /* Curl Bottom Right */ .curl-bottom-right { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; } .curl-bottom-right:before { pointer-events: none; position: absolute; content: ''; height: 0; width: 0; bottom: 0; right: 0; background: white; /* IE9 */ background: linear-gradient(315deg, white 45%, #aaaaaa 50%, #cccccc 56%, white 80%); box-shadow: -1px -1px 1px rgba(0, 0, 0, 0.4); -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: width, height; transition-property: width, height; } .curl-bottom-right:hover:before, .curl-bottom-right:focus:before, .curl-bottom-right:active:before { width: 25px; height: 25px; } /* Curl Bottom Left */ .curl-bottom-left { display: inline-block; vertical-align: middle; -webkit-transform: translateZ(0); transform: translateZ(0); box-shadow: 0 0 1px rgba(0, 0, 0, 0); -webkit-backface-visibility: hidden; backface-visibility: hidden; -moz-osx-font-smoothing: grayscale; position: relative; } .curl-bottom-left:before { pointer-events: none; position: absolute; content: ''; height: 0; width: 0; bottom: 0; left: 0; background: white; /* IE9 */ background: linear-gradient(45deg, white 45%, #aaaaaa 50%, #cccccc 56%, white 80%); box-shadow: 1px -1px 1px rgba(0, 0, 0, 0.4); -webkit-transition-duration: 0.3s; transition-duration: 0.3s; -webkit-transition-property: width, height; transition-property: width, height; } .curl-bottom-left:hover:before, .curl-bottom-left:focus:before, .curl-bottom-left:active:before { width: 25px; height: 25px; } .ripple { position: absolute; background: rgba(0,0,0,.25); border-radius: 100%; -webkit-transform: scale(0); -ms-transform: scale(0); transform: scale(0); pointer-events: none; } .ripple.show { -webkit-animation: ripple .5s ease-out; animation: ripple .5s ease-out; } @-webkit-keyframes ripple { to { -webkit-transform: scale(1.5); transform: scale(1.5); opacity: 0; } } @keyframes ripple { to { -webkit-transform: scale(1.5); transform: scale(1.5); opacity: 0; } } @media (luminosity: normal) { body { background: #f5f5f5; color: #262626; } } @media (luminosity: dim) { body { background: #e9e4e3; } } @media (luminosity: washed) { body { background: #ffffff; } } !
Defining Postmodernism Postmodernism is one of those words that has become a part our everyday language. How often do we describe a movie or a book as “so postmodern’? From James Rawson’s pop art, to authors like Vladimir Nabokov and Umberto Eco, to extremely popular movies like Moulin Rouge, Scream, and Pulp Fiction, there’s no getting around it: postmodernism has become an inseparable part of our lives and our entertainment. But what is it? Like any literary movement, postmodernism can’t be defined exactly—in fact, it is several ideas complied together. Postmodernism is known for its revolutionary approach and willingness to experiment. Considering the times we live in today, all this may seem very commonplace, but there was a period known as the Enlightenment back then in 17th and 8th centuries, which was all about order, unity, reason. Of course the post modernists were not the first ones to come up with this kind of approach; also romanticism and then modernism had already questioned the possibility of these ideals. Although,postmodernism is more about embracing the chaos. The word “postmodern” may have become cliché, but one cannot deny its popularity. It has given us some of the most-loved texts of the 20th and 21st centuries. So what is the contribution of post modernism in today’s time? Well, it has revolutionized our perspectives. While all the major literary movements were specific and defined in their approach, postmodernism does not focus on a particular set of “classic” authors or texts. It has helped change people’s ideas about what we can classify as literature. Sure, there may be some people who like to emphasize on the traditional, “serious,” “intellectual” texts, but postmodernism has made a major alterations in conventional ideas about literature, art, and culture.
Participation of lower-to-middle wage workers in a study of Chronic Disease Self-Management Program (CDSMP) effectiveness: Implications for reducing chronic disease burden among racial and ethnic minority populations. Although the Chronic Disease Self-Management Program (CDSMP) improves chronic disease outcomes, little is known about CDSMP participation in populations less than 65 years of age. We explore study and CDSMP participation rates by demographic characteristics with younger (40-64 years old), lower-to-middle wage workers with chronic disease in a randomized clinical trial (RCT) conducted in North Carolina. Descriptive statistics and regression models were used to examine associations between demographic, chronic disease burden, and employment variables, and time-dependent study enrollment and intervention participation outcomes that ranged from initiating consent (n = 1,067) to CDSMP completion (n = 41). Overall, participation among non-Whites was disproportionately higher (43%-59%) than that of Whites (42%-57%) relative to the age-matched racial composition of North Carolina (31% non-White and 69% White). Among participants randomized to the CDSMP, racial and ethnic minorities had the highest rates of participation. There were no significant demographic, chronic disease burden, or employment predictors among the participation outcomes examined, although this may have been due to the limited number of CDSMP workshop participation observations. Extending the CDSMP to lower-to-middle wage workers may be particularly effective in reaching racial and ethnic minority populations, who complete the program to a greater extent than their White, non-Hispanic counterparts.
Seems like a good man but theres no room for sentiment in football. Been a terrible chairman and if it had not been for getting lucky with Moyes doing the business for us (wasn't we after gary megson at the time?) god knows where we'd be now. Been at the helm for our longest trophyless run as a club. Time to move on now In the unlikely event that a multi-billionaire like Usmanov decided to provide Everton with the funding to build a shiny new stadium, do you really believe that it would be interest free?Whilst Usmanov may well be seriously wedged to the hilt, it wouldn't just be a case of him wandering into his local high street branch and withdrawing half a billion quid. Chances are, despite his enormous wealth, he hasn't actually got half a billion quid sat in the bank. His money will be either largely tied up in assets, or invested and earning a very healthy profit. Why would he just loan it to Everton interest free, whilst it is earning him a healthy profit invested? Didn't Chelsea get there money interest free and then he just wrote it off as a bad debt! I knew that someday I was going to die, and I knew that before I died, two things would happen to me. That number one; I would regret my entire life, and number two; that I would want to live my life over again. I see the happy clapping “be careful what you wish for” brigade are poking heads above the parapet here. The man has overseen the least successful period in our clubs history. He has taken the club to a point we’re we had to sell a fringe player to relay the pitch. He got into a position where phil green basically controlled our club. He let his ego fuck up the chance to have a stadium in the kings dock which we would have been in almost ten years with all that lovely extra revenue. He tried desperately to rip this club from the city of Liverpool. He has basically bought a company in a readonable position, ran it to a point were extinction was a real fear then (and fair play to him for this) sold it for a ridiculous profit. He got lucky because of the TV deals not his own corporate ability. Our fans have let this buffoon get away with murder, actively supported him even, yet call moshiri a fraud because he hasn’t built the stadium yet. The day he goes I will be happy and excited for the future. Logged I'm fat, but it's not my fault I have a genetic condition resulting in me retaining burgers. I see the happy clapping “be careful what you wish for” brigade are poking heads above the parapet here. The man has overseen the least successful period in our clubs history. He has taken the club to a point we’re we had to sell a fringe player to relay the pitch. He got into a position where phil green basically controlled our club. He let his ego fuck up the chance to have a stadium in the kings dock which we would have been in almost ten years with all that lovely extra revenue. He tried desperately to rip this club from the city of Liverpool. He has basically bought a company in a readonable position, ran it to a point were extinction was a real fear then (and fair play to him for this) sold it for a ridiculous profit. He got lucky because of the TV deals not his own corporate ability. Our fans have let this buffoon get away with murder, actively supported him even, yet call moshiri a fraud because he hasn’t built the stadium yet. The day he goes I will be happy and excited for the future. I always forget about kirby. That would have been the death of everton that
--- abstract: | Word $W$ is said to *encounter* word $V$ provided there is a homomorphism $\phi$ mapping letters to nonempty words so that $\phi(V)$ is a substring of $W$. For example, taking $\phi$ such that $\phi(h)=c$ and $\phi(u)=ien$, we see that “science” encounters “huh” since $cienc=\phi(huh)$. The density of $V$ in $W$, $\delta(V,W)$, is the proportion of substrings of $W$ that are homomorphic images of $V$. So the density of “huh” in “science” is $2/{8 \choose 2}$. A word is *doubled* if every letter that appears in the word appears at least twice. The dichotomy: Let $V$ be a word over any alphabet, $\Sigma$ a finite alphabet with at least 2 letters, and $W_n \in \Sigma^n$ chosen uniformly at random. Word $V$ is doubled if and only if $\E(\delta(V,W_n)) \rightarrow 0$ as $n \rightarrow \infty$. We further explore convergence for nondoubled words and concentration of the limit distribution for doubled words around its mean. address: | Department of Mathematics, University of South Carolina\ Department of Mathematics and Statistics, Queen’s University bibliography: - 'Rorabaugh-refs.bib' title: Density Dichotomy in Random Words --- \[firstpage\] Introduction ============ Graph densities provide the basis for many recent advances in extremal graph theory and the limit theory of graph (see Lovász [@L-12]). To see if this paradigm is similarly productive for other discrete structures, we here explore pattern densities in free words. In particular, we consider the asymptotic densities of a fixed pattern in random words as a first step in developing the combinatorial limit theory of free words. Definitions ----------- Free words (or simply, words) are elements of the semigroup formed from a nonempty alphabet $\Sigma$ with the binary operation of concatenation, denoted by juxtaposition, and with the empty word $\varepsilon$ as the identity element. The set of all finite words over $\Sigma$ is $\Sigma^*$ and the set of $\Sigma$-words of length $k \in \N$ is $\Sigma^k$. For alphabets $\Gamma$ and $\Sigma$, a homomorphism $\phi: \Gamma^* \rightarrow \Sigma^*$ is uniquely defined by a function $\phi:\Gamma \rightarrow \Sigma^*$. We call a homomorphism *nonerasing* provided it is defined by $\phi:\Gamma \rightarrow \Sigma^* \setminus \{\varepsilon\}$; that is, no letter maps to $\varepsilon$, the empty word. Let $V$ and $W$ be words. The *length* of $W$, denoted $|W|$, is the number of letters in $W$, including multiplicity. Denote with ${\rm L}(W)$ the set of letters found in $W$ and with $||W||$ the number of letter repeats in $W$, so $|W| = |{\rm L}(W)| + ||W||$. For example $|banana| = 6$, ${\rm L}(banana) = \{a,b,n\}$, and $||banana|| = 3$. $W$ has ${|W|+1 \choose 2}$ *substrings*, each defined by an ordered pair $(i,j)$ with $0\leq i < j \leq |W|$. Denote with $W[i,j]$ the word found in the $(i,j)$-substring, which consists of $j-i$ consecutive letters of $W$, beginning with the $(i+1)$-th. $V$ is a *factor* of $W$, denoted $V \leq W$, provided $V = W[i,j]$ for some $0\leq i < j \leq |W|$; that is, $W = SVT$ for some (possibly empty) words $S$ and $T$. For example, $banana[2,6] = nana \leq banana$. $W$ is an *instance* of $V$, or *$V$-instance*, provided there exists a nonerasing homomorphism $\phi$ such that $W = \phi(V)$. (Here $V$ is sometimes referred to as a *pattern* or *pattern word*). For example, $banana$ is an instance of $cool$ using homomorphism $\phi$ defined by $\phi(c)=b$, $\phi(o)=an$, and $\phi(l)=a$. $W$ *encounters* $V$, denoted $V \preceq W$, provided $W'$ is an instance of $V$ for some factor $W' \leq W$. For example $cool \preceq bananasplit$. For $W \neq \varepsilon$, denote with $\delta(V,W)$ the proportion of substrings of $W$ that give instances of $V$. For example, $\delta(xx, banana) = 2/{7 \choose 2}$. $\delta_{sur}(V,W)$ is the characteristic function for the event that $W$ is an instance of $V$. Fix alphabets $\Gamma$ and $\Sigma$. An *encounter* of $V$ in $W$ is an ordered triple $(a,b,\phi)$ where $W[a,b] = \phi(V)$ for homomorphism $\phi:\Gamma^* \rightarrow \Sigma^*$. When $\Gamma = {\rm L}(V)$ and $W \in \Sigma^*$, denote with $\hom(V,W)$ the number of encounters of $V$ in $W$. For example, $\hom(ab,cde) = 4$ since $cde[0,2]$ and $cde[1,3]$ are instances of $ab$, each for one homomorphism $\{a,b\}^* \rightarrow \{c,d,e\}^*$, and $cde[0,3]$ is an instance of $ab$ under two homomorphisms. Note that the conditions on $\Gamma$ and $\Sigma$ are necessary for $\hom(V,W)$ to not be 0 or $\infty$. For fixed words $V$ and $W \neq \varepsilon$, $${|W| + 1 \choose 2}\delta(V,W) \leq \hom(V,W).$$ Background ---------- Word encounters have primarily been explored from the perspective of avoidance. Word $W$ *avoids* a (pattern) word $V$ provided $V \not \preceq W$. $V$ is *$k$-avoidable* provided, from a $k$-letter alphabet, there are infinitely many words that avoid $V$. The premier result on word avoidance is generally considered to be the proof of Thue [@T-06] that the word $aa$ is 3-avoidable but not 2-avoidable. Two seminal papers on avoidability, by Bean, Ehrenfeucht, and McNulty [@BEM-79] and Zimin [@Z-82; @Z-84], include classification of unavoidable words–that is, words that are not $k$-avoidable for any $k$. Recently, the authors [@CR-14] and Tao [@T-14] investigated bounds on the length of words that avoid unavoidable words. There remain a number of open problems regarding which words are $k$-avoidable for particular $k$. See Lothaire [@L-02] and Currie [@C-05] for surveys on avoidability results and Blanchet-Sadri and Woodhouse [@BW-12] for recent work on 3-avoidability. A word is *doubled* provided every letter in the word occurs at least twice. Otherwise, if there is a letter that occurs exactly once, we say the word is *nondoubled* Every doubled word is $k$-avoidable for some $k>1$ [@L-02]. For a doubled word $V$ with $k \geq 2$ distinct letters and an alphabet $\Sigma$ with $|\Sigma| = q \geq 4$, $(k,q) \neq (2,4)$, Bell and Goh [@BG-07] showed that there are at least $\lambda(k,q)^n$ words in $\Sigma^n$ that avoid $V$, where $$\lambda(k,q) = m\left(1 + \frac{1}{(m-2)^k}\right)^{-1}.$$ This exponential lower bound on the number of words avoiding a doubled word hints at the moral of the present work: instances of doubled words are rare. For a doubled word $V$ and an alphabet $\Sigma$ with at least 2 letters, the probability that a random word $W_n \in \Sigma^n$ avoids $V$ is asymptotically 0. Indeed, the event that $W_n[b|V|,(b+1)|V|]$ is an instance of $V$ has nonzero probability and is independent for distinct $b$. Nevertheless, $\delta(V,W_n)$, the proportion of substrings of $W$ that are instances of $V$, is asymptotically negligible. The Dichotomy ============= In this section, we establish a density-motivated bipartition of all free words into doubled and nondoubled words. From there, we present a more detailed analysis of the asymptotic densities in these two classes. \[main\] Let $V$ be a word on any alphabet. Fix an alphabet $\Sigma$ with $q\geq2$ letters, and let $W_n \in \Sigma^n$ be chosen uniformly at random. The following are equivalent: 1. $V$ is doubled (that is, every letter in $V$ occurs at least twice); 2. $\lim_{n\rightarrow \infty} \E(\delta(V,W_n)) = 0$. First we prove $(i) \Longrightarrow (ii)$. Note that in $W_n$, there are in expectation the same number of encounters of $V$ as there are of any anagram of $V$. Indeed, if $V'$ is an anagram of $V$ and $\phi$ is a nonerasing homomorphism, then $|\phi(V')| = |\phi(V)|$. \[anagram\] If $V'$ is an anagram of $V$, then $\E(\hom(V,W_n))=\E(\hom(V',W_n))$. Assume $V$ is doubled and let $\Gamma = {\rm L}(V)$ and $k = |\Gamma|$. Given Fact \[anagram\], we consider an anagram $V' = XY$ of $V$, where $|X| = k$ and $\Gamma = {\rm L}(X) = {\rm L}(Y)$. That is, $X$ comprises one copy of each letter in $\Gamma$ and all the duplicate letters of $V$ are in $Y$. We obtain an upper bound for the average density of $V$ by estimating $\E(\hom(V',W_n))$. To do so, sum over starting position $i$ and length $j$ of encounters of $X$ in $W_n$ that might extend to an encounter of $V'$. There are ${j+1 \choose k+1}$ homomorphisms $\phi$ that map $X$ to $W_n[i,i+j]$ and the probability that $W_n[i+j,i+j+|\phi(Y)|] = \phi(Y)$ is at most $q^{-j}$. Also, the series $\sum_{j = k}^{\infty} {j+1 \choose k+1} q^{-j}$ converges (try the ratio test) to some $c$ not dependent on $n$. $$\begin{aligned} \E(\delta(V,W_n)) &\leq& \frac{1}{{n+1 \choose 2}}\E\left(\hom(V',W_n)\right) \\ &<& \frac{1}{{n+1 \choose 2}} \sum_{i = 0}^{n - |V|} \sum_{j = k}^{n - i} {j+1 \choose k+1} q^{-j} \\ &<& \frac{1}{{n+1 \choose 2}} \sum_{i = 0}^{n - |V|} c \\ &=& \frac{c(n-|V|+1)}{{n+1 \choose 2}} \\ &=& O(n^{-1}). \end{aligned}$$ We prove $(ii) \Longleftarrow (i)$ by contraposition. Assume there is a letter $x$ that occurs exactly once in $V$. Write $V = TxU$ where ${\rm L}(V) \setminus {\rm L}(TU) = \{x\}$. We obtain a lower bound for $\E(\delta(V,W_n))$ by only counting encounters with $|\phi(TU)| = |TU|$. Note that each such encounter is unique to its instance, preventing double-counting. For this undercount, we sum over encounters with $W_n[i,i+j]=\phi(x)$. $$\begin{aligned} \E(\delta(V,W_n)) &=& \E(\delta(TxU,W_n)) \\ &\geq&\frac{1}{{n+1 \choose 2}} \sum_{i = |T|}^{n-|U|-1} \sum_{j = 1}^{i-|T|} q^{-||TU||} \\ &=&q^{-||TU||}\frac{1}{{n+1 \choose 2}} \sum_{i = |T|}^{n-|U|-1} (i - |T|) \\ &=&q^{-||TU||}\frac{{n-|UT| \choose 2}}{{n+1 \choose 2}} \\ &\sim&q^{-||TU||}\\ &>&0. \end{aligned}$$ It behooves us now to develop more precise theory for these two classes of words: doubled and nondoubled. Lemma \[base\] below both helps develop that theory and gives insight into the detrimental effect that letter repetition has on encounter frequency. \[CRT\] For $\overline{r} = \{r_1, \ldots, r_k\} \in (\Z^+)^k$ and $d = \gcd_{i \in [k]}(r_i)$, there exists integer $N = N_{\overline{r}}$ such that for every $n>N$ there exist coefficients $a_1, \ldots, a_k \in \Z^+$ such that $dn = \sum_{i=1}^{k} a_ir_i$ and $a_i \leq N$ for $i \geq 2$. \[base\] For any word $V$, let $\Gamma = {\rm L}(V) = \{x_1, \ldots, x_k\}$ where $x_i$ has multiplicity $r_i$ for each $i \in [k]$. Let $U$ be $V$ with all letters of multiplicity $r= \min_{i \in [k]}(r_i)$ removed. Finally, let $\Sigma$ be any finite alphabet with $|\Sigma| = q\geq 2$ letters. Then for a uniformly randomly chosen $V$-instance $W \in \Sigma^{dn}$, where $d = \gcd_{i \in [k]}(r_i)$, there is asymptotically almost surely a homomorphism $\phi: \Gamma^* \rightarrow \Sigma^*$ with $\phi(V) = W$ and $|\phi(U)| < \sqrt{dn}$. Let $a_n$ be the number of $V$-instances in $\Sigma^n$ and $b_n$ be the number of homomorphisms $\phi : \Gamma^* \rightarrow \Sigma^*$ such that $|\phi(V)| = n$. Let $b_n^1$ be the number of these $\phi$ such that $\phi(U) < \sqrt{n}$ and $b_n^2$ the number of all other $\phi$ so that $b_n = b_n^1 + b_n^2$. Similarly, let $a_n^1$ be the number of $V$-instances in $\Sigma^n$ for which there exists a $\phi$ counted by $b_n^1$ and $a_n^2$ the number of instances with no such $\phi$, so $a_n = a_n^1 + a_n^2$. Observe that $a_n^2 \leq b_n^2$. Without loss of generality, assume $r_1 = r$ (rearrange the $x_i$ if not). We now utilize $N = N_{\overline{r}}$ from Proposition \[CRT\]. For sufficiently large $n$, we can undercount $a_{dn}^1$ by counting homomorphisms $\phi$ with $|\phi(x_i)| = a_i$ for the $a_i$ attained from Fact \[CRT\]. Indeed, distinct homomorphisms with the same image-length for every letter in $V$ produce distinct $V$-instances. Hence $$\begin{aligned} a_{dn}^1 & \geq & q^{\sum_{i=1}^k a_i} \\ & \geq & q^{\left(\frac{dn - (k-1)N}{r} + r(k-1)\right)} \\ & = & cq^{\left(\frac{dn}{r}\right)}, \end{aligned}$$ where $c = q^{(k-1)(r^2-N)/r}$ depends on $V$ but not on $n$. To overcount $b_n^2$ (and $a_{dn}^2$ by extension), we consider all ${n+1 \choose |V|+1}$ ways to partition an $n$-letter length and so determine the lengths of the images of the letters in $V$. However, for letters with multiplicity strictly greater than $r$, the sum of the lengths of their images must be at least $\sqrt{n}$. $$\begin{aligned} b_n^2 & \leq & {n+1 \choose |V|+1} \sum_{i = \ceil{\sqrt{n}}}^n q^{\left(\frac{n - i}{r} + \frac{i}{r+1}\right)}\\ & = & {n+1 \choose |V|+1} \sum_{i = \ceil{\sqrt{n}}}^n q^{\left(\frac{n}{r} - \frac{i}{r(r+1)}\right)}\\ & < & n^{|V|+2} q^{\left(\frac{n}{r} - \frac{\sqrt{n}}{r(r+1)}\right)}\\ & = & q^{\frac{n}{r}}o(1).\\ \\ a_{dn}^2 & \leq & b_{dn}^2\\ & = & o(a_{dn}^1). \end{aligned}$$ That is, the proportion of $V$-instances of length $dn$ that cannot be expressed with $|\phi(U)| < \sqrt{dn}$ diminishes to 0 as $n$ grows. Density of Nondoubled Words =========================== In Theorem \[main\], we showed that the density of nondoubled $V$ in long random words (over a fixed alphabet with at least two letters) does not approach 0. The natural follow-up question is: Does the density converge? To answer this question, we first prove the following lemma. Fixing $V = TxU$ where $x$ is a nonrecurring letter in $V$, the lemma tells us that all but a diminishing proportion of $V$-instances can be obtained by some $\phi$ with $|\phi(TU)|$ negligible. \[bulk\] Let $V = U_0x_1U_1x_2\cdots x_rU_r$ with $r\geq 1$, where $U = U_0U_1\cdots U_r$ is doubled with $k$ distinct letters (though any particular $U_j$ may be the empty word), the $x_i$ are distinct, and no $x_i$ occurs in $U$. Further, let $\Gamma$ be the $(k+r)$-letter alphabet of $V$ and let $\Sigma$ be any finite alphabet with $q\geq 2$ letters. Then there exists a nondecreasing function $g(n) = o(n)$ such that, for a randomly chosen $V$-instance $W \in \Sigma^n$, there is asymptotically almost surely a homomorphism $\phi: \Gamma^* \rightarrow \Sigma^*$ with $\phi(V) = W$ and $|\phi(x_r)| > n - g(n)$. Let $X_i = x_1x_2\cdots x_i$ for $0 \leq i \leq r$ (so $X_0 = \varepsilon$). For any word $W$, let $\Phi_W$ be the set of homomorphisms $\{\phi: \Gamma^* \rightarrow \Sigma^* \mid \phi(V)=W\}$ that map $V$ onto $W$. Define ${\bf P}_i$ to be the following proposition for $i \in [r]$: > There exists a nondecreasing function $f_i(n) = o(n)$ such that, for a randomly chosen $V$-instance $W \in \Sigma^n$, there is asymptotically almost surely a homomorphism $\phi \in \Phi_W$ such that $|\phi(UX_{i-1})| \leq f_i(n)$. The conclusion of this lemma is an immediate consequence of ${\bf P}_r$, with $g(n) = f_r(n)$, which we will prove by induction. Lemma \[base\] provides the base case, with $r = 1$ and $f_1(n) = \sqrt{n}$. Let us prove the inductive step: ${\bf P}_i$ implies ${\bf P}_{i+1}$ for $i \in [r-1]$. Roughly speaking, this says: If most instances of $V$ can be made with a homomorphism $\phi$ where $|\phi(UX_{i-1})|$ is negligible, then most instances of $V$ can be made with a homomorphism $\phi$ where $|\phi(UX_{i})|$ is negligible. Assume ${\bf P}_{i}$ for some $i \in [r-1]$, and set $f(n) = f_{i}(n)$. Let $A_n$ be the set of $V$-instances in $\Sigma^n$ such that $|\phi(UX_{i-1})| \leq f(n)$ for some $\phi \in \Phi_W$. Let $B_n$ be the set of all other $V$-instances in $\Sigma^n$. ${\bf P}_{i}$ implies $|B_n| = o(|A_n|)$. Case 1: $U_{i} = \varepsilon$, so $x_{i}$ and $x_{i+1}$ are consecutive in $V$. When $|\phi(UX_{i-1})| \leq f(n)$, we can define $\psi$ so that $\psi(x_{i}x_{i+1}) = \phi(x_{i}x_{i+1})$ and $|\psi(x_{i})|=1$; otherwise, let $\psi(y) = \phi(y)$ for $y \in\Gamma \setminus \{x_i,x_{i+1}\}$. Then $|\phi(UX_i)| \leq f(n)+1$ and ${\bf P}_{i+1}$ with $f_{i+1}(n) = f_i(n) + 1$. Case 2: $U_i \neq \varepsilon$, so $|U_i| > 0$. Let $g(n)$ be some nondecreasing function such that $f(n) = o(g(n))$ and $g(n) = o(n)$. (This will be the $f_{i+1}$ for ${\bf P}_{i+1}$.) Let $A_n^\alpha$ consist of $W \in A_n$ such that $|\phi(UX_{i})| \leq g(n)$ for some $\phi\in \Phi_W$. Let $A_n^\beta = A_n \setminus A_n^\alpha$. The objective henceforth is to show that $|A_n^\beta| = o(|A_n^\alpha|)$. For $Y \in A_n^\beta$, let $\Phi_Y^\beta$ be the set of homomorphisms $\{\phi \in \Phi_Y : |\phi(UX_{i-1})| \leq f(n)\}$ that disqualify $Y$ from being in $B_n$. Hence $Y \in A_n$ implies $\Phi_Y^\beta \neq \emptyset$. Since $Y \not \in A_n^\alpha$, $\phi \in \Phi_Y^\beta$ implies $|\phi(UX_{i})| > g(n)$, so $|\phi(x_i)|> g(n)-f(n)$. Pick $\phi_Y \in \Phi_Y^\beta$ as follows: - Primarily, minimize $|\phi(U_0x_1U_1x_2 \cdots U_{i-1}x_{i})|$; - Secondarily, minimize $|\phi(U_i)|$; - Tertiarily, minimize $|\phi(U_0x_1U_1x_2 \cdots U_{i-1})|$. Roughly speaking, we have chosen $\phi_Y$ to move the image of $U_i$ as far left as possible in $Y$. But since $Y \not\in A_n^\alpha$, we want it further left! To suppress the details we no longer need, let $Y = Y_1\phi_Y(x_i) \phi_Y(U_i) \phi_Y(x_{i+1}) Y_2$, where $Y_1 = \phi_Y(U_0x_1U_1x_2 \cdots U_{i-1})$ and $Y_2 = \phi_Y(U_{i+1}x_{i+2} \cdots U_r)$. Consider a word $Z \in \Gamma^n$ of the form $Y_1Z_1 \phi_Y(U_i) Z_2 \phi_Y(U_i) \phi_Y(x_{i+1}) Y_2$, where $Z_1$ is an initial string of $\phi_Y(x_{i})$ with $2f(n) \leq |Z_1| < g(n) - 2f(n)$ and $Z_2$ is a final string of $\phi_Y(x_{i})$. (See Figure 1.) In a sense, the image of $x_i$ was too long, so we replace a leftward substring with a copy of the image of $U_i$. Let $C_Y$ be the set of all such $Z$ with $|Z_1|$ a multiple of $f(n)$. For every $Z \in C_Y$ we can see that $Z \in A_n^\alpha$, by defining $\psi \in \Phi_Z$ as follows: $$\psi(y) = \left\{ \begin{array}{l l} Z_1 & \mbox{ if } y = x_{i}; \\ Z_2 \phi_Y(U_i)\phi_Y(x_{i+1})& \mbox{ if } y = x_{i+1}; \\ \phi_Y(y) & \mbox{ otherwise.} \end{array} \right.$$ (6,-1) rectangle (9,1); (0,1)–(29,1)–(29,-1)–(0,-1)–(0,1); (0,0)–(29,0); (-1,.5) node [$Y=$]{}; (-1,-.5) node [$Z=$]{}; (4,1)–(4,-1.5); (2,.5) node [$Y_1$]{}; (2,-.5) node [$Y_1$]{}; (14,1)–(14,-1); (6,0)–(6,-1.5); (9,0)–(9,-1.5); (9,.5) node [$\phi_Y(x_i)$]{}; (5,-.5) node [$Z_1$]{}; (5,-1.5) node [$\psi(x_i)$]{}; (7.5,-.5) node [$\phi_Y(U_i)$]{}; (11.5,-.5) node [$Z_2$]{}; (17,1)–(17,-1); (15.5,.5) node [$\phi_Y(U_i)$]{}; (15.5,-.5) node [$\phi_Y(U_i)$]{}; (23,1)–(23,-1.5); (20,.5) node [$\phi_Y(x_{i+1})$]{}; (20,-.5) node [$\phi_Y(x_{i+1})$]{}; (14.5,-1.5) node [$\psi(x_{i+1})$]{}; (26,.5) node [$Y_2$]{}; (26,-.5) node [$Y_2$]{}; Claim 1: $\displaystyle \liminf_{|Y| = n\rightarrow \infty} |C_Y| = \infty$. Since we want $2f(n) \leq |Z_1| < g(n) - 2f(n)$, and $g(n) - 2f(n) < |\phi_Y(x_i)| - |\phi_Y(U_i)|$, there are $g(n) - 4f(n)$ places to put the copy of $\phi_Y(U_i)$. To avoid any double-counting that might occur when some $Z$ and $Z'$ have their new copies of $\phi_Y(U_i)$ in overlapping locations, we further required that $f(n)$ divide $|Z_1|$. This produces the following lower bound: $$|C_Y| \geq \floor{\frac{g(n) - 4f(n)}{f(n)}} \rightarrow \infty.$$ Claim 2: For distinct $Y, Y' \in A_n^\beta$, $C_Y \cap C_{Y'} = \emptyset$. To prove Claim 2, take $Y,Y' \in A_n^\beta$ with $Z \in C_Y \cap C_{Y'}$. Define $Y_1 = \phi_Y(U_0x_1U_1x_2 \cdots U_{i-1})$ and $Y_2 = \phi_Y(U_{i+1}x_{i+2} \cdots U_r)$ as before and $Y'_1 = \phi_{Y'}(U_0x_1U_1x_2 \cdots U_{i-1})$ and $Y'_2 = \phi_{Y'}(U_{i+1}x_{i+2} \cdots U_r)$. Now for some $Z_1,Z'_1,Z_2,Z'_2$, $$Y_1Z_1 \phi_Y(U_i) Z_2 \phi_Y(U_i) \phi_Y(x_{i+1}) Y_2 = Z = Y'_1Z'_1 \phi_{Y'}(U_i) Z'_2 \phi_{Y'}(U_i) \phi_{Y'}(x_{i+1}) Y'_2,$$ with the following constraints: 1. $|Y_1\phi_Y(U_i)| \leq |\phi_Y(UX_{i})| \leq f(n)$; 2. $|Y'_1\phi_{Y'}(U_i)| \leq |\phi_{Y'}(UX_{i})| \leq f(n)$; 3. $2f(n) \leq |Z_1| < g(n) - 2f(n)$; 4. $2f(n) \leq |Z'_1| < g(n) - 2f(n)$; 5. $|Z_1 \phi_Y(U_i) Z_2| = |\phi_{Y}(x_{i})| > g(n) - f(n)$; 6. $|Z'_1 \phi_{Y'}(U_i) Z'_2| = |\phi_{Y'}(x_{i})| > g(n) - f(n)$. As a consequence: - $|Y_1Z_1 \phi_Y(U_i)| < g(n) - f(n) < |Z'_1 \phi_{Y'}(U_i) Z'_2|$, by (i), (iii), and (vi); - $|Y_1Z_1| \geq |Z_1| > 2f(n) > |Y'_1|$, by (iii) and (ii). Therefore, the copy of $\phi_Y(U_i)$ added to $Z$ is properly within the noted occurrence of $Z'_1 \phi_{Y'}(U_i) Z'_2$ in $Z'$, which is in the place of $\phi_{Y'}(x_{i})$ in $Y'$. In particular, the added copy of $\phi_Y(U_i)$ in $Z$ interferes with neither $Y_1'$ nor the original copy of $\phi_{Y'}(U_i)$. Thus $Y_1'$ is an initial substring of $Y$ and $\phi_{Y'}(U_i) \phi_{Y'}(x_{i+1}) Y_2'$ is a final substring of $Y$. Likewise, $Y_1$ is an initial substring of $Y'$ and $\phi_Y(U_i) \phi_Y(x_{i+1}) Y_2$ is a final substring of $Y'$. By the selection process of $\phi_Y$ and $\phi_{Y'}$, we know that $Y_1 = Y'_1$ and $\phi_Y(U_i) \phi_Y(x_{i+1}) Y_2 = \phi_{Y'}(U_i) \phi_{Y'}(x_{i+1}) Y_2'$. Finally, since $f(n)$ divides $Z_1$ and $Z_1'$, we deduce that $Z_1 = Z_1'$. Otherwise, the added copies of $\phi_Y(U_i)$ in $Z$ and of $\phi_{Y'}(U_i)$ in $Z'$ would not overlap, resulting in a contradiction to the selection of $\phi_Y$ and $\phi_{Y'}$. Therefore, $Y = Y'$, concluding the proof of Claim 2. Now $C_Y \subset A_n^\alpha$ for $Y \in A_n^\beta$. Claim 1 and Claim 2 together imply that $|A_n^\beta| = o(|A_n^\alpha|)$. Observe that the choice of $\sqrt{n}$ in Lemma \[base\] was arbitrary. The proof works for any function $f(n) = o(n)$ with $f(n) \rightarrow \infty$. Therefore, where Lemma \[bulk\] claims the existence of some $g(n) \rightarrow \infty$, the statement is in fact true for all $g(n) \rightarrow \infty$. Let $\mathbb{I}_n(V,\Sigma)$ be the probability that a uniformly randomly selected length-$n$ $\Sigma$-word is an instance of $V$. That is, $$\mathbb{I}_n(V,\Sigma) =\frac{|\{W \in \Sigma^n \mid \phi(V)=W \mbox{ for some homomorphism } \phi:{\rm L}(V)^* \rightarrow \Sigma^*\}|}{ |\Sigma|^{n}}.$$ \[EI\] For any $V$ and $\Sigma$ and for $W_n \in \Sigma^n$ chosen uniformly at random, $$\begin{aligned} {n+1 \choose 2}\E(\delta(V,W_n)) & = & \sum_{m=1}^n (n+1-m)\E(\delta_{sur}(V,W_m))\\ & = & \sum_{m=1}^n (n+1-m)\mathbb{I}_m(V,\Sigma). \end{aligned}$$ Denote $\mathbb{I}(V,\Sigma) = \lim_{n\rightarrow \infty}\mathbb{I}_n(V,\Sigma)$. When does this limit exist? \[nondoubledProb\] For nondoubled $V$ and alphabet $\Sigma$, $\mathbb{I}(V,\Sigma)$ exists. Moreover, $\mathbb{I}(V,\Sigma) > 0$. If $|\Sigma|=1$, then $\mathbb{I}_n(V,\Sigma)=1$ for $n \geq |V|$. Assume $|\Sigma| = q \geq 2$. Let $V = TxU$ where $x$ is the right-most nonrecurring letter in $V$. Let $\Gamma = {\rm L}(V)$ be the alphabet of letters in $V$. By Lemma \[bulk\], there is a nondecreasing function $g(n) = o(n)$ such that, for a randomly chosen $V$-instance $W \in \Sigma^n$, there is asymptotically almost surely a homomorphism $\phi: \Gamma^* \rightarrow \Sigma^*$ with $\phi(V) = W$ and $|\phi(x_r)| > n - g(n)$. Let $a_n$ be the number of $W \in \Sigma^n$ such that there exists $\phi: \Gamma^* \rightarrow \Sigma^*$ with $\phi(V) = W$ and $|\phi(x_r)| > n - g(n)$. Lemma \[bulk\] tells us that $\frac{a_n}{q^n} \sim \mathbb{I}_n(V,\Sigma)$. Note that $\frac{a_n}{q^n}$ is bounded. It suffices to show that $a_{n+1} \geq qa_n$ for sufficiently large $n$. Pick $n$ so that $g(n) < \frac{n}{3}$. For length-$n$ $V$-instance $W$ counted by $a_n$, let $\phi_W$ be a homomorphism that maximizing $|\phi_W(x_r)|$ and, of such, minimizes $|\phi_W(T)|$. For each $\phi_W$ and each $a \in \Sigma$, let $\phi_W^a$ be the function such that, if $\phi_W(x_r) = AB$ with $|A| = \floor{|\phi_W(x_r)|/2}$, then $\phi_W^a(x) = AaB$; $\phi_W^a(y) = \phi_W(y)$ for each $y \in \Gamma \setminus\{x\}$ Roughly speaking, we are inserting $a$ into the middle of the image of $x$. Suppose we are double-counting, so $\phi_W^a(V) = \phi_Y^b(V)$. As $$|\phi_W(x_r)|/2 > (n - g(n))/2 > n/3 > g(n) \geq |\phi_Y(TU)|$$ and vice-versa, the inserted $a$ (resp., $b$) of one map does not appear in the image of $TU$ under the other map. So $\phi_W(T)$ is an initial string and $\phi_W(U)$ a final string of $\phi_Y(V)$, and vice-versa. By the selection criteria of $\phi_W$ and $\phi_Y$, $|\phi_W(T)| = |\phi_Y(T)|$ and $|\phi_W(U)| = |\phi_Y(U)|$. Therefore the location of the added $a$ in $\phi_W^a(V)$ and the added $b$ in $\phi_W^b(V)$ are the same. Hence, $a = b$ and $W = Y$. Moreover $\mathbb{I}(V,\Sigma) \geq q^{-||V||} > 0$. Let $V = x_1x_2\cdots x_k$ have k distinct letters. Since every word of length at least k is a $V$-instance, $\mathbb{I}(V,\Sigma)=1$ for every alphabet $\Sigma$. When even one letter in $V$ is repeated, finding $\mathbb{I}(V,\Sigma)$ becomes a nontrivial task. Zimin’s classification of unavoidable words is as follows [@Z-82; @Z-84]: Every unavoidable word with $n$ distinct letters is encountered by $Z_n$, where $Z_0 = \varepsilon$ and $Z_{i+1} = Z_ix_{i+1}Z_i$ with $x_{i+1}$ a letter not occurring in $Z_i$. For example, $Z_2 = aba$ and $Z_3 = abacaba$. The authors can calculate $\mathbb{I}(Z_2,\Sigma)$ and $\mathbb{I}(Z_3,\Sigma)$ to arbitrary precision [@CR-16]. $|\Sigma|$ 2 3 4 5 6 7 $\cdots$ -------------------------- ----------- ----------- ----------- ----------- ----------- ----------- ---------- $\mathbb{I}(Z_2,\Sigma)$ 0.7322132 0.4430202 0.3122520 0.2399355 0.1944229 0.1632568 $\cdots$ $\mathbb{I}(Z_3,\Sigma)$ 0.1194437 0.0183514 0.0051925 0.0019974 0.0009253 0.0004857 $\cdots$ : $\mathbb{I}(Z_2,\Sigma)$ and $\mathbb{I}(Z_3,\Sigma)$ computed to 7 decimal places. Let $V$ be a nondoubled word on any alphabet. Fix an alphabet $\Sigma$, and let $W_n \in \Sigma^n$ be chosen uniformly at random. Then $$\lim_{n\rightarrow \infty}\E(\delta(V,W_n)) = \mathbb{I}(V,\Sigma).$$ Let $\mathbb{I} = \mathbb{I}(V,\Sigma)$ and $\epsilon > 0$. Pick $N = N_\epsilon$ sufficiently large so $|\mathbb{I} - \mathbb{I}_n(V,\Sigma)| < \frac{\epsilon}{2}$ when $n > N$. Applying Fact \[EI\] for $n > \max(N,4N/\epsilon)$, $$\begin{aligned} |\mathbb{I} - \E(\delta(V,W_n))|& = & \left|\mathbb{I}\frac{1}{{n+1 \choose 2}} \sum_{m=1}^n (n+1-m) - \frac{1}{{n+1 \choose 2}} \sum_{m=1}^n (n+1-m)\mathbb{I}_m(V,\Sigma)\right|\\ & \leq & \frac{1}{{n+1 \choose 2}} \sum_{m=1}^n (n+1-m)|\mathbb{I} - \mathbb{I}_m(V,\Sigma)|\\ & = & \frac{1}{{n+1 \choose 2}} \left[\sum_{m=1}^N + \sum_{m = N+1}^n\right] (n+1-m)|\mathbb{I} - \mathbb{I}_m(V,\Sigma)|\\ & < & \frac{1}{{n+1 \choose 2}} \left[\sum_{m=1}^{\floor{\epsilon n / 4}} (n+1-m)1 + \sum_{m = N+1}^n (n+1-m)\frac{\epsilon}{2} \right]\\ & < & \frac{1}{{n+1 \choose 2}} \left[\frac{\epsilon n}{4}n + {n+1 \choose 2}\frac{\epsilon}{2} \right]\\ & < & \epsilon. \end{aligned}$$ Concentration ============= For doubled $V$ and $|\Sigma|>1$, we established that the expectation of the density $\delta(V,W_n)$ converges to zero. In particular, we know the following. \[expectation\] Let $V$ be a doubled word, $\Sigma$ an alphabet with $q \geq 2$ letters, and $W_n \in \Sigma^n$ chosen uniformly at random. Then $$\E(\delta(V,W_n)) \sim \frac{1}{n}.$$ In the proof of Theorem \[main\], we showed that $$\E(\delta(V,W_n)) \leq \frac{\left(\sum_{j = k}^{\infty} {j+1 \choose k+1} q^{-j}\right)(n-|V|+1)}{{n+1 \choose 2}} = O(n^{-1}) .$$ The lower bound follows from an observation made in the Background section: “the event that $W_n[b|V|,(b+1)|V|]$ is an instance of $V$ has nonzero probability and is independent for distinct $b$.” Hence $$\E(\delta(V,W_n)) \geq \frac{ 1}{{n + 1 \choose 2}}\floor{\frac{n}{|V|}}\mathbb{I}_{|V|}(V,\Sigma) = \Omega(n^{-1}).$$ To bound variance and other higher order moments, we observe the following upper bound on $q^n \mathbb{I}_n(V,\Sigma)$. Hencefore, if ${x \choose y}$ is used with nonintegral $x$, we mean $${x \choose y} = \frac{\prod_{i = 0}^{y-1} (x-i)}{y!}.$$ \[instanceCount\] Let $V$ be a doubled word with exactly $k$ letters and $\Sigma$ an alphabet with $q \geq 2$ letters. Moreover, let ${\rm L}(V) = \{x_1, \ldots, x_k\}$ with $r_i$ be the multiplicity of $x_i$ in $V$ for each $i \in [k]$, $d = \gcd_{i \in [k]}(r_i)$, and $r = \min_{i \in [k]}(r_i)$. Then, $$\mathbb{I}_{n}(V,\Sigma) \leq {n/d+k+1 \choose k+1} q^{n(1-r)/r}.$$ Let $a_n(\overline{r})$ be the number of $k$-tuples $\overline{a} = (a_1, \cdots, a_k) \in (\Z^+)^k$ so that $\sum_{i=1}^{k} a_ir_i = n$. Then $a_{n}(\overline{r}) \leq {n/d+k +1 \choose k +1 }$. Indeed, if $d \! \not | \; n$, then $a_{n}(\overline{r}) = 0$. Otherwise, for each $\overline{a}$ counted by $a_{n}(\overline{r})$, there is a unique corresponding $\overline{b}\in (\Z^+)^k$ such that $1 \leq b_1 < b_2 < \cdots < b_k = n/d$ and $b_j = \frac{1}{d} \sum_{i = 1}^{j} a_ir_i$. The number of strictly increasing $k$-tuples of positive integers with largest value $n/d$ is ${n/d+k+1 \choose k+1}$. Let $W_n \in \Sigma^n$ chosen uniformly at random. Note that $q^n \mathbb{I}_n(V,\Sigma)$ is the number of instances of $V$ in $\Sigma^n$. Thus, $$q^{n}\mathbb{I}_{n}(V,\Sigma) \leq \E(\hom(V,W_{n})) < {n/d+k+1 \choose k+1} q^{n/r}.$$ We obtain nontrivial concentration around the mean using covariance and the fact that most “short” substrings in a word do not overlap. \[var\] Let $V$ be a doubled word with $k$ distinct letters, $\Sigma$ an alphabet with $q \geq 2$ letters, and $W_n \in \Sigma^n$ chosen uniformly at random. $${\rm Var}(\delta(V,W_n)) =O\left(\E(\delta(V,W_n))^2 \frac{(\log n)^3}{n}\right).$$ Let $X_n = {n+1 \choose 2}\delta(V,W_n)$ be the random variable counting the number of substrings of $W_n$ that are $V$-instances. For fixed $n$, let $X_{a,b}$ be the indicator variable for the event that $W_n[a,b]$ is a $V$-instance, so $X_n = \sum_{a=0}^{n-1} \sum_{b=a+1}^{n} X_{a,b}$. Let $(a,b) \sim (c,d)$ denote that $[a,b]$ and $[c,d]$ overlap. Note that $$\begin{aligned} {\rm Cov}(X_{a,b},X_{c,d})& \leq & \E(X_{a,b}X_{c,d})\\ & \leq & \min(\E(X_{a,b}),\E(X_{c,d})) \\ & = & \min(\mathbb{I}_{(b-a)}(V,\Sigma),\mathbb{I}_{(b-a)}(V,\Sigma))\\ & \leq & {i/d+k+1 \choose k+1}q^{i(1-r)/r}, \end{aligned}$$ for $i \in \{b-a,d-c\}$. For $i < n/3$, the number of intervals in $W_n$ of length at most $i$ that overlap a fixed interval of length $i$ is less than ${3i \choose 2}$. Define the following function on $n$, which acts as a threshold for “short” substrings of a random length-$n$ word: $$s(n) = -2 \log_q(n^{-(k+5)}) = t \log n,$$ where $t = \frac{2(k+5)}{\log(q)} > 0$. For sufficiently large $n$, $$\begin{aligned} {\rm Var}(X_n) & = & \sum_{\substack{0 \leq a < b \leq n \\ 0 \leq c < d \leq n}} {\rm Cov}(X_{a,b},X_{c,d})\\ & \leq & \sum_{(a,b) \sim (c,d)} \min(\mathbb{I}_{(b-a)}(V,\Sigma),\mathbb{I}_{(b-a)}(V,\Sigma)) \\ & = & \left[ \sum_{\substack{(a,b) \sim (c,d) \\ b-a,d-c \leq s(n)}} + \sum_{\substack{(a,b) \sim (c,d) \\ else}} \right] \min(\mathbb{I}_{(b-a)}(V,\Sigma),\mathbb{I}_{(b-a)}(V,\Sigma)) \\ & < & 2\sum_{i = 1}^{\floor{s(n)}}(n+1-i){3i \choose 2}\cdot 1 \\ & & + \sum_{i = \ceil{s(n)}}^{n} (n+1-i) {n+1 \choose 2}\cdot {i/d+k+1 \choose k+1}q^{i(1-r)/r} \\ & < &2s(n)n(3s(n))^2 + nnn^2n^{k+1}q^{s(n)(1-r)/r}\\ & = &18(t \log n)^3n + n^{5+k} q^{\log_q\left(n^{-(k+5)}\right)}\\\ & = & O(n(\log n)^3).\\ \end{aligned}$$ Since $\E(\delta(V,W_n)) = \Omega(n^{-1})$ by Corollary \[expectation\], $$\begin{aligned} {\rm Var}(\delta(V,W_n)) & = & {\rm Var}\left(\frac{X_n}{{n+1 \choose 2}}\right)\\ & = & \frac{{\rm Var}(X_n)}{{n+1 \choose 2}^2}\\ & = & O\left(\frac{(\log n)^3}{n^3}\right)\\ & = &O\left(\E(\delta(V,W_n))^2 \frac{(\log n)^3}{n}\right). \end{aligned}$$ \[prob\] Let $V$ be a word with $k$ distinct letters, each occurring at least $r \in \Z^+$ times. Let $\Sigma$ be a $q$-letter alphabet and $W_n \in \Sigma^n$ chosen uniformly at random. Recall that ${n+1 \choose 2}\delta(V,W_n)$ is the number substrings of $W_n$ that are $V$-instances. Then for any nondecreasing function $f(n) > 0$, $$\mathbb{P}\left({n+1 \choose 2}\delta(V,W_n) > n\cdot f(n) \right) < n^{k+3}q^{f(n)(1-r)/r}.$$ Lemma \[instanceCount\] gives a bound on the probability that randomly chosen $W_n \in \Sigma^n$ is a $V$-instance: $$\mathbb{P}(\delta_{sur}(V,W_n) = 1) = \mathbb{I}_{n}(V,\Sigma) \leq {n/d+k+1 \choose k+1}q^{n(1-r)/r}.$$ Since $\delta_{sur}(V,W) \in \{0,1\}$, $$\begin{aligned} \sum_{m=1}^{\floor{f(n)}} \sum_{\ell=0}^{n-m}\delta_{sur}(V,W_n[\ell,\ell+m]) & < & n \cdot f(n). \end{aligned}$$ Therefore, $$\begin{aligned} \mathbb{P}\left({n+1 \choose 2}\delta(V,W_n) > n\cdot f(n) \right) & = & \mathbb{P}\left(\sum_{m=1}^n \sum_{\ell=0}^{n-m}\delta_{sur}(V,W_n[\ell,\ell+m]) > n\cdot f(n) \right) \\ & < & \mathbb{P}\left(\sum_{m=\ceil{f(n)}}^n \sum_{\ell=0}^{n-m}\delta_{sur}(V,W_n[\ell,\ell+m])> 0 \right) \\ & < & \sum_{m=\ceil{f(n)}}^n \sum_{\ell=0}^{n-m}\mathbb{P}\left(\delta_{sur}(V,W_n[\ell,\ell+m])> 0 \right) \\ & = & \sum_{m=\ceil{f(n)}}^n (n-m+1) \mathbb{P}\left(\delta_{sur}(V,W_m) = 1 \right) \\ & \leq & \sum_{m=\ceil{f(n)}}^n (n-m+1){m/d+k+1 \choose k+1} q^{m(1-r)/r}\\ & < & n(n-m+1) {n/d+k+1\choose k+1} q^{f(n)(1-r)/r}\\ & < & n^{k+3}q^{f(n)(1-r)/r}. \end{aligned}$$ \[moments\] Let $V$ be a doubled word, $\Sigma$ an alphabet with $q \geq 2$ letters, and $W_n \in \Sigma^n$ chosen uniformly at random. Then the $p^{th}$ raw moment and the $p^{th}$ central moment of $\delta(V,W_n)$ are both $O\left(\left(\log(n)/n\right)^p\right)$. Let us use Lemma \[prob\] to first bound the $p$-th raw moments for $\delta(V,W_n)$, assuming $r\geq 2$. To minimize our bound, generalize the threshold function from Theorem \[var\]: $$s_p(n) = \frac{r}{1-r}\log_q(n^{-(k+5+p)}) = t_p \log n,$$ where $t_p = \frac{r(k+5+p)}{(r-1)\log(q)} > 0$. $$\begin{aligned} \E(\delta(V,W_n)^p) & = & \sum_{i = 0}^{{n+1 \choose 2}} \mathbb{P}\left(\delta(V,W_n) = \frac{i}{{n+1 \choose 2}}\right)\left(\frac{i}{{n+1 \choose 2}}\right)^p\\ & < & \sum_{i = 0}^{\floor{n\cdot s_p(n)}} \mathbb{P}\left(\delta(V,W_n) = \frac{i}{{n+1 \choose 2}}\right)\left(\frac{i}{{n+1 \choose 2}}\right)^p \\&&+ \sum_{i = \ceil{n\cdot s_p(n)}}^{{n+1 \choose 2}} n^{k+3}q^{s_p(n)(1-r)/r}\left(\frac{i}{{n+1 \choose 2}}\right)^p\\ & < & \left(\frac{n\cdot s_p(n)}{{n+1 \choose 2}}\right)^p + n^{k+5 }q^{s_p(n)(1-r)/r}\\ & = & \left(\frac{nt_p \log n}{{n+1 \choose 2}}\right)^p + n^{k+5 }q^{\log_q\left(n^{-(k+5+p)}\right)}\\ &= &O_p\left(\left(\frac{\log n}{n}\right)^p\right). \end{aligned}$$ Setting $p=1$, there exists some $c>2$ such that $\E_n= \E(\delta(V,W_n)) < (c\log n)/n$. We use this upper bound on the expectation (1st raw moment) to bound the central moments. $$\begin{aligned} \E(\left|\delta(V,W_n) - \E_n\right|^p) & = & \sum_{i = 0}^{{n+1 \choose 2}} \mathbb{P}\left(\delta(V,W_n) = \frac{i}{{n+1 \choose 2}}\right)\left|\frac{i}{{n+1 \choose 2}} - \E_n \right|^p\\ & \leq & \sum_{i = 0}^{\floor{n\cdot s_p(n)}} \mathbb{P}\left(\delta(V,W_n) = \frac{i}{{n+1 \choose 2}}\right)\left(\frac{c\log n}{n}\right)^p \\ & & + \sum_{i = \ceil{ns_p(n)}}^{{n+1 \choose 2}} \mathbb{P}\left(\delta(V,W_n) = \frac{i}{{n+1 \choose 2}}\right)\left(1\right)^p\\ & < &\left(\frac{c\log n}{n}\right)^p + n^{k+5}q^{s_p(n)(1-r)/r}\\ &= &O_p\left(\left(\frac{\log n}{n}\right)^p\right). \end{aligned}$$ For nondoubled word $V$, to what extent is the density of $V$ in random words concentrated about its mean? \[lastpage\]
If you are a web developer, chances are you have used whois before. WHOIS allows you to retrieve basic information about a domain such as when it was registered, when it will expire and the contact information of the owner. There are lots of websites and command line tools that allow you to query this information, but they all use the same protocol in the background. The WHOIS protocol is a simple, plaintext-based protocol that listens on TCP port 43. There is an RFC that defines the protocol, RFC 3912, but it doesn’t give useful information regarding how WHOIS works. I got all the information about this protocol by running the whois command and inspecting the data using Wireshark. One problematic aspect of the WHOIS protocol is that the responses are designed to be human-readable rather than machine-readable. Thankfully the information we need to extract usually follow a Header name: Header data format. You should split at the : and turn the header name into lowercase when you are looking for a specific header. The protocol WHOIS requests need to be terminated with a carriage return + line feed ( \r ). Connect to whois.iana.org. Send the TLD, followed by a newline. (e.g. Send “com” + “\r ”) A bunch of data about that TLD will be sent. The WHOIS server responsible for that TLD will be sent in a header called whois . . Connect to that server and send the full domain name followed by a newline. (e.g. Send “example.com” + “\r ”) The response data you get from this server is the WHOIS data, but there’s usually more data you can get from another server. This server’s address is sent to you in a header called whois server . Send the request and get the response in the same way as the first server. If you are going to be doing a large number of queries, you should probably cache your requests to whois.iana.org in order to keep their traffic low. Implementation in Python Let’s make a funtion in Python to get the WHOIS server responsible for a Top-Level domain. def get_tld_server ( tld = "com" ): sock = socket . socket () sock . connect (( "whois.iana.org" , 43 )) sock . send ( "{} " . format ( tld ). encode ( "utf-8" )) for line in sock . makefile (): parts = line . split ( ":" , 2 ) if len ( parts ) > 1 : header_name = parts [ 0 ]. strip () header_value = parts [ 1 ]. strip () if header_name . lower () == "whois" : return header_value This function above sends the TLD to the central WHOIS server, parses the response to find a line that looks like whois: whois.verisign-grs.com . Now that we have a server, we can get the data like this. def get_whois_data ( domain ): tld = domain . split ( "." )[ - 1 ] server = get_tld_server ( tld ) sock = socket . socket () sock . connect (( server , 43 )) sock . send ( "{} " . format ( domain ). encode ( "utf-8" )) for line in sock . makefile (): parts = line . split ( ":" , 2 ) if len ( parts ) > 1 : header_name = parts [ 0 ]. strip () header_value = parts [ 1 ]. strip () if header_name . lower () == "whois server" : print ( header_value ) yield line . replace ( " " , "" ) This function queries the actual server and yields the lines that it receives. If there is a second server to get more data from, it prints the address to the console. Using this information, we can modify the function a little to make it query the second server automatically. def get_whois_data ( domain , server = None ): if not server : tld = domain . split ( "." )[ - 1 ] server = get_tld_server ( tld ) nextserver = None sock = socket . socket () sock . connect (( server , 43 )) sock . send ( "{} " . format ( domain ). encode ( "utf-8" )) for line in sock . makefile (): parts = line . split ( ":" , 2 ) if len ( parts ) > 1 : header_name = parts [ 0 ]. strip () header_value = parts [ 1 ]. strip () if header_name . lower () == "whois server" : nextserver = header_value yield line . replace ( " " , "" ) if nextserver : for line in get_whois_data ( domain , nextserver ): yield line We can now use our new get_whois_data() function like this. It should give identical output to other WHOIS utilities. for line in get_whois_data ( "gkbrk.com" ): print ( line ) Thanks for reading this article about the WHOIS protocol. I hope you enjoyed it. You can find related information in these sources.
580 Toro Canyon Park Road Montecito, CA 93108 Ocean View Vineyard Parcel 580 Toro Canyon Park Road Montecito, CA 93108 Ocean View Vineyard Parcel 580 Toro Canyon Park RoadMontecito, CA 93108United States Land: 56.00 acres (approx.) Web #: 0114088 MLS ID: 16-3922 Located in the beautiful Santa Barbara foothills, this incredible, approx. 56-acre view parcel enjoys 360-degree panoramic coastline, Channel Island, and majestic mountain views. A private road leads to the gated entry with an olive and cypress tree-lined drive to the stunning knoll-top building site, perfect for a large custom home. There is no designated building envelope, so any future home would boast stunning views in a pastoral and serene setting. There are approx. four-planted acres planted in Syrah and Grenache grapes, underground utilities, dry wells and water. The zoning is split – approx. 31-acres are Ag. I-40, and the balance of approx. 26-acres are in MA zone district and designated environmentally sensitive. Exterior Features Neighborhood Location Directions Street view This material is based upon information which we consider reliable, but because it has been supplied by third parties, we cannot represent that it is accurate or complete, and it should not be relied upon as such. This offering is subject to errors, omissions, changes including price or withdrawal without notice. EQUAL HOUSING OPPORTUNITY Real estate agents affiliated with Sotheby's International Realty, Inc. are independent contractor sales associates and are not employees of Sotheby’s International Realty, Inc. Sotheby’s International Realty and the Sotheby’s International Realty logo are registered (or unregistered) service marks used with permission. Located in the beautiful Santa Barbara foothills, this incredible, approx. 56-acre view parcel enjoys 360-degree panoramic coastline, Channel Island, and majestic mountain views. A private road leads to the gated entry with an olive and cypress tree-lined drive to the stunning knoll-top building site, perfect for a large custom home. There is no designated building envelope, so any future home would boast stunning views in a pastoral and serene setting. There are approx. four-planted acres planted in Syrah and Grenache grapes, underground utilities, dry wells and water. The zoning is split – approx. 31-acres are Ag. I-40, and the balance of approx. 26-acres are in MA zone district and designated environmentally sensitive. This material is based upon information which we consider reliable but because it has been supplied by third parties, we cannot represent that it is accurate or complete and it should not be relied upon as such. This offering is subject to errors, omissions, changes including price or withdrawal without notice. Sotheby's International Realty and the Sotheby's International Realty logo are registered (or unregistered) service marks used with permission. Operated by Sotheby’s International Realty, Inc. Real estate agents affiliated with Sotheby's International Realty, Inc. are independent contractors and are not employees of Sotheby's International Realty, Inc.
These 11 Unfortunate Dogs Learned The Hard Way Not To Eat Bees. Ouch. 64 SHARES Advertisement There’s a popular old saying that goes something like, “Hey, don’t eat bees.” Or maybe it’s just common sense. But either way, seriously, you shouldn’t eat bees. Fortunately, you already know this, but dogs are not so fortune – they’re firm believers that bees just want to play. But oh no. Bees do not want to play. The folks over at BuzzFeed found a few dogs who learned that the hard way. And yes, you’re a horrible person for laughing at this. 7.) No amount of puppy dog eyes will heal that swelling 8.) Why the long face? 🙁 9.) Even puppies eat bees. 10.) Oh dear GOD. 11.) This one must’ve eaten an entire hive of bees. I would wrap this article up with the moral of the story, but it’s pretty clear: don’t let your dog eat a bee or it’s going to look ridiculous for a while. Warn your friends about the dangers (or hilarity, you twisted soul) of dogs eating bees by sharing this below.
"What'cha doing there kiddo?" "Just throwing rocks" "Good, good." "Get all that rock throwing out before you get married." "It was either this, or being inside with Sarah and the Wedding Planner figuring out where all the flowers should go." "Wise choice." "Listen, before tonight, before, before things get crazy,I wanted to give you something." "This was my dad's and I jus..." "I thought it would only be fitting." "I've never seen you wear it before." "Well that's because I never did." "Your grandfather didn't really like your mother, and you know, he thought marrying her was a mistake." "He told me, to my face, that the day that I got married, an then he gave me this watch." "So I never wore it." "Dad... are you trying to tell me something?" "Unlike me, you have made..the absolute right choice." "Thank you," "Oh here, that's yours." "I guess this is really happening, huh?" "oh, a soon as they arrange those flowers , and you run out of rocks..." "There's a lot of rocks out here." "Would you do me a favor?" "If you and Sarah ever have a kid, try to treat him a little better than I treated you." "No pressure, right?" "I'll see you inside, kiddo." "Yeah, yeah" "Subtitle By Persian Boy"
Introduction {#Sec1} ============ Clays such as sepiolite are used together with antibiotics as growth promoters in farming. This practice improves animal growth and product quality, and these additives are common in feed for broiler chickens and pigs^[@CR1],[@CR2]^. Sepiolite is considered to be safe, stable and chemically inert hence also being used in tablet formulation for human medicine^[@CR3]^. However, a recent study demonstrated that clays used as animal feed additives can increase the risk of horizontal gene transfer (HGT) among microbes, possibly resulting in increased antibiotic resistance^[@CR4],[@CR5]^. The transformation of bacteria by foreign DNA can be achieved when clay fibres are spread by friction or vibrations. This phenomenon is known as the Yoshida effect^[@CR6]^ and relies on the ability of mineral nanofibres or nano-needles to adsorb DNA and to penetrate bacterial cells under sliding friction forces^[@CR7]^. By its mechanical nature, the Yoshida effect can be used to transform diverse bacterial species^[@CR5],[@CR8],[@CR9]^. Sepiolite and other clays fibres are not only capable of delivering DNA into the receptor bacteria, the abrasive action of clays also means that they can promote the release of DNA by disrupting the bacterial cell envelope^[@CR5]^. Before Yoshida began his experiments with bacteria, the ability of asbestos to transform eukaryotic cells was reported at the end of the eighties^[@CR10]^. Indeed, fibrous clays and industrial nanofibres are considered genotoxic and carcinogenic, likely due to their ability to damage DNA^[@CR11]^. Fibrous clays have been assayed in several experimental models including bacteria and cell cultures, but they display a poor correlation with mutagenicity or carcinogenesis found *in vivo*^[@CR11],[@CR12]^. According to these observations, a significant concern arises from fibrous clays or industrial nanofibres which are responsible for severe human diseases such as asbestosis^[@CR13],[@CR14]^. However, short and long periods of exposure to fibres in several different genotoxicity tests have failed to identify a molecular basis of DNA damage^[@CR14]^. Thus, to date, the mechanisms underlying the genotoxicity and carcinogenicity of asbestos and other fibres remain obscure. Clays may also have the potential to enhance antibiotic resistance in farming activities^[@CR4]^. In natural scenarios, sediments and stones (gastroliths) are frequently swallowed by animals resulting in the unavoidable exposure of their microbiota to pebbles, sand, and clays. Soils and waters are a primary source of antimicrobials, either by natural microbial production or environmental antibiotic pollution, a major selective pressure that favours resistant strains^[@CR15],[@CR16]^. Gut microbes can themselves also produce antibiotic compounds^[@CR17]^. In this study, we experimentally demonstrate the ability of fibrous clays such as sepiolite and asbestos to transform bacteria and to induce mutagenic DNA double-strand breaks (DSBs) when they are exposed to friction forces. We propose a molecular mechanism of action for asbestos, which was a strong inducer of DSBs in *Escherichia coli* in the presence of friction. Finally, the importance of this mechanism is discussed for the speciation processes of the microbiota of animals that use gastroliths. Results and Discussion {#Sec2} ====================== Sepiolite increases mutant frequency in *E. coli* {#Sec3} ------------------------------------------------- Different types of clays can transform bacteria by absorbing DNA and penetrating the cell envelope. In this case, the penetration could allow the clays to interact with the intracellular DNA and to promote mutations. To test whether the joint action of sepiolite and friction forces (as in transformation) has an impact on bacterial mutation rate, the mutant frequency of *Escherichia coli* was measured by plating the bacteria on agar containing the antibiotic fosfomycin, and enumerating spontaneous mutants. Different concentrations and friction times were tested (Fig. [1](#Fig1){ref-type="fig"}). When the cells were merely exposed to sepiolite without any friction on the agar plates' surface, no significant differences in mutant frequencies were detected between them and control bacteria (Mann-Whitney U test; P = 0.999). In contrast, a six-fold increase in mutant frequency was found when friction was present for two or three minutes using 0.1 mg/ml of sepiolite (Mann-Whitney U test; P = 0.008) and a modest increase---but not significant---when the treatment lasted for one minute (Mann-Whitney U test; P = 0.421). Interestingly, only cells in the stationary phase displayed an increase in mutant frequency (Kruskal-Wallis test; P = 0.001): no significant mutagenesis was found when bacteria came from exponential cultures (Kruskal-Wallis test; P = 0.954; Fig. [1A](#Fig1){ref-type="fig"}). Regarding concentrations, we found the while sepiolite concentration increases, mutagenesis is also increased, and there is a statistic significant done-effect response (P = 2.2 × 10--16, DRC model fitted based on maximum likelihood, Fig. [1B](#Fig1){ref-type="fig"}). This result confirms that sepiolite is participating the mutagenicity of the treatments. We also noticed that although the trend in mutagenesis is highly significant, there are no significant differences among lower and high doses. The dispersion of data increased when more sepiolite was used. Also, the conservative inferences forced by the use of Bonferroni correction could influence the lack of detectable differences among lower and stronger doses. We chose the lower dose of 0.1 mg/ml for the rest of the experiments.Figure 1Sepiolite can induce mutagenesis after friction treatment only in stationary phase. Box-plot of the mutant frequency induced by sepiolite treatment in *E. coli* MG1655 exponential and stationary phases (**A**). The x-axis indicates the experimental treatment (control, the mixture of bacteria and sepiolite without friction force, and with friction force for one, two and three minutes). The increaase of sepiolite concentration increases the mutant frequency (**B**). There is a statistic significant donse effect response (P \< 0.001, drc model fitted based on maximum likelihood). Asterisks in panel A represent significant differences; Mann-Whitney *U*: P \< 0.01. Along with the mutant frequency experiments, the effect of the treatments on cell viability was checked. Sensitivity to the treatment was higher in the exponential phase than in the stationary phase cultures (Fig. [2](#Fig2){ref-type="fig"}). The observed mutant frequency differences were initially attributed to a higher sensitivity to the treatment. However, several hypotheses can explain this changes in mutant frequency and reduced-sensitivity in stationary phase cultures. The application of sliding force to bacterial cells with agar, in the absence of sepiolite or asbestos, did not account for any additional mutagenesis in the survival fraction (Fig. [S1](#MOESM1){ref-type="media"}).Figure 2The longer the friction time, the lower the cell viability. Box-plot of the survival of *E. coli* MG1655 after the action of friction with sepiolite for one, two and three minutes of treatment. Groups with and without sepiolite gently spread with glass beads onto agar plates were used as controls. Heavy metals have no influence on sepiolite mutagenesis {#Sec4} ------------------------------------------------------- Many minerals containing metals such as iron, aluminium or copper are toxic to bacteria because of the generation of reactive oxygen species (ROS) via the Fenton reaction^[@CR18]^. The release of metal ions inside the cell could, therefore, be the reason for the increase in mutagenesis. However, despite the addition of 2-2′ bipyridyl, a chelating agent, shortly before treatment, mutagenesis was still observed (Kruskal-Wallis test; P = 0.008; Fig. [S2](#MOESM1){ref-type="media"}). This result indicates that the mutagenic effect does not depend on the metals present in the fibres. Sepiolite interacts with the DNA by causing double-strand breaks {#Sec5} ---------------------------------------------------------------- A second likely explanation for the mutagenesis could be the physical interaction between individual clay fibres in motion with DNA producing DSBs. The ability of sepiolite fibres to penetrate and interact with DNA has already been stated^[@CR6],[@CR19]^. Physical or mechanical stress on the DNA duplex is a relevant cause of DSBs^[@CR20]^. To evaluate this possibility, the *E. coli* DH5α strain (*recA* deficient) carrying the plasmid (pET-19b) was subjected to treatment with sepiolite and sliding friction. Sepiolite without friction and bacterial cells alone were used as controls. The plasmid content was extracted, and its integrity was evaluated by gel migration (Fig. [3A](#Fig3){ref-type="fig"}). DNA extracted from plasmids typically shows three molecular conformations: supercoiled DNA (which migrates quickly), nicked DNA (which is a closed circle but relaxed due to single strand breaks and it has an intermediate migration rate) and linear DNA molecules (with a lower migration speed)^[@CR21]^. These latter DNA molecules were especially abundant in the friction-sepiolite treated group, whilst being present at a low level in control groups. Plasmids from the sepiolite group (under friction) had a significantly higher level of linearised molecules when compared to the control groups (One-Way ANOVA test; P = 3.33 × 10^−16^). According to these results, the joint action of sepiolite and friction are responsible for the induction of DSBs in the DNA. Interestingly, no increase in nicked DNA (single-strand break) was observed, indicating that if this type of lesion occurs, it is below the detection limit of this technique (Fig. [3B](#Fig3){ref-type="fig"}).Figure 3Linear plasmid DNA molecule abundance is higher when friction forces are applied. (**A**) Extraction of the plasmid pET-19b from sepiolite-treated *E. coli* DH5α, a *recA* deficient strain, after one minute of friction treatment (five extractions per treatment). Note the enrichment of linearised plasmid DNA molecules (5 Kb fragments?) from bacteria treated with sepiolite after two minutes of friction applied to a 1% agarose gel. (**B**) Box-plot of the abundance of single-strand DNA molecules after different experimental treatments (control, sepiolite without friction and sepiolite with friction). Plasmid pET-19b digested with a single cut site enzyme NdeI was used as a control for the linear molecule migration rate and as a reference to calculate relative intensities using a densitometry analysis. The asterisks represent a significant difference; Tukey HSD test: P \< 0.01. The view of mutagenic DSBs by mechanical shearing is consistent with the absence of mutagenic effect in exponentially growing bacteria. If the organism is diploid (even if the diploidy is only transient, as in replicating bacteria or replicating haploid yeast), then homology-directed repair can be used^[@CR20]^. Because *E. coli* lacks a pathway to join non-homologous ends, homologous recombination is the only mechanism to salvage broken chromosomes^[@CR22]^. But how can *E. coli* repair DSBs in stationary phase by homologous recombination? Stationary-phase cultures contain cells with several chromosome copies^[@CR23]^. In exponentially growing *E. coli* DSB repair is non-mutagenic^[@CR24],[@CR25]^. However, break repairs become mutagenic during the stationary phase and requires the Sigma S factor (RpoS), the SOS response, and the error-prone DNA polymerase PolIV. The change from one situation to the other has been described as a switch from high-fidelity repair in the exponential phase to error-prone DNA double-strand breaks during the stationary phase^[@CR24],[@CR25]^. Because DSBs are lethal unless repaired, and repair action requires RecA protein^[@CR24],[@CR25]^, the sepiolite mutagenesis experiment was repeated with *E. coli* DH5α, which is impaired in the SOS response triggering. We found that sepiolite mutagenesis was completely abolished by *recA* gene inactivation in the stationary phase (Kruskal-Wallis test; P = 0.011; Fig. [4](#Fig4){ref-type="fig"}). Thus, the lower level of mutant frequency in the *recA* deficient strain could be explained by the death of cells that suffered DSBs and were unable to repair them. Mutations introduced by DSB repair are considered a mechanism to generate diversity via mutagenic repair in bacteria^[@CR26],[@CR27]^.Figure 4Inactivation of the *recA* gene suppresses the mutagenic effect of sepiolite under friction in *E. coli* MG1655. Box-plot of the mutant frequency of *E. coli* MG1655 and DH5α (derivative *recA* mutant) when treated with sepiolite for two minutes. The asterisks represent a significant difference; Mann-Whitney *U*: P \< 0.01. The mutagenicity of clay treatment is also potentially enhanced in stationary phase cells due to DNA being more tightly compacted than in the exponential phase^[@CR28]^. Indeed, in *E. coli*, DNA goes into a co-crystallization state with the stress-induced protein Dps offering protection to several types of stress, which are ordinarily chemical damage^[@CR29]^. However, while crystallization is often associated with less flexibility or added fragility with direct physical contact, the less compacted DNA of proliferating *E. coli* is elastic and soft^[@CR30]^, which may limit the number of DSBs. It is then possible that mineral fibres under friction can break DNA strands more easily in the stationary than in the exponential phase. Sepiolite fibres can penetrate bacteria when friction forces are present {#Sec6} ------------------------------------------------------------------------ To support the hypothesis that the penetration and interaction of fibres with DNA cause DSBs inside the cell, we performed direct observation of sepiolite-treated bacteria using scanning electron microscopy (SEM). Observations from the SEM are compatible with the explanation that fibres are able to penetrate the bacteria without completely destroying the envelope. Additionally, bacteria were directly penetrated by fibres while those that were exposed to mineral without friction were not (Fig. [5](#Fig5){ref-type="fig"}). This observation is in concordance with previous studies, whereas sepiolite and other nano-sized acicular materials can penetrate bacterial cells under friction forces on a hydrogel^[@CR6]^. The partial destruction of the cell wall and the presence of mutants after adding 2-2′ bipyridyl, point to mechanical action as the causative agent of the damage. The notion of mechanical breaks is in agreement with the results from cell-free systems, where the breakage of plasmid DNA was not directly associated with the amount of iron released by asbestos fibres when they were incubated together^[@CR14]^.Figure 5Sepiolite can penetrate bacterial cells when friction forces are applied. SEM of stationary phase *E. coli* MG1655 treated with sepiolite. Red arrows represent potential sites of sepiolite fibre penetration. Bacteria were observed with different magnifications ranging from 40 000X to 70 000X. Sepiolite fibre length matters to cause significant DNA damage in the cell {#Sec7} -------------------------------------------------------------------------- Sepiolite also contains both long and short fibres (Fig. [S3](#MOESM1){ref-type="media"}). In the case of asbestos, long fibres are more dangerous because they have a higher carcinogenic potential. In an experiment designed to test the influence of sepiolite fibre length on mutagenesis in bacteria, we found that the exposure of stationary phase bacteria to a suspension of short fibres (less than 1 µm) did not cause any significant DNA damage when compared with the control, which is in contrast to the long-fibre original mineral suspension (Kruskal-Wallis test; P = 0.005; Fig. [6](#Fig6){ref-type="fig"}).Figure 6Removal of sepiolite fibres longer than 1 μm decreases fibre-induced mutagenesis to the level of the control. Box-plot of the mutant frequency of *E. coli* MG1655 when sepiolite fibres longer than 1 µm were removed in the mutagenesis experiments (lf-depleted sepiolite). Dry and reconstituted sepiolite (normal sepiolite) and bacterial cells (labeled as control) with no sepiolite were used to compare the effects of long fibre removal. Asterisks represent significant difference; Mann-Whitney *U*: P \< 0.01. Asbestos fibres increase the mutant frequency in the same way as sepiolite does {#Sec8} ------------------------------------------------------------------------------- Bacterial genotoxicity experiments are considered a key step in the assessment of the mutagenic properties of chemicals, drugs or materials in general^[@CR31]^. Because asbestos fibres resemble sepiolite ones, an experiment to test if asbestos fibres provoke an increase in mutagenesis was designed using crocidolite asbestos (Fig. [S3](#MOESM1){ref-type="media"}). In our assay, the addition of asbestos to bacteria on plates without friction did not increase the mutant frequency. In contrast, the application of friction when the fibres were present increased the mutant frequency even more than sepiolite alone (Kruskal-Wallis test; P = 0.002; Fig. [7](#Fig7){ref-type="fig"}), probably by the same mode of action. Yoshida *et al*. have suggested that asbestos and other clays can be potentially mutagenic based on the integrity analysis of genomic DNA from treated bacteria^[@CR32]^. We sumarise these results in a simple graphical model for *E. coli* that could be extended to other bacterial types (Fig. [8](#Fig8){ref-type="fig"}). A clear antecedent of the ability of fibrous nanoclays to penetrate bacteria was the transformation of monkey cells in culture by exogenous plasmid DNA using chrysotile (a type of asbestos)^[@CR10]^. Although the procedures are not described in details, we hypothesise that this transformation requires penetration of the cell membrane. Finally, we conducted an additional experiment to discard that friction itself was not responsible for the DNA damage that we observed during this work.Figure 7Asbestos can increase the mutation frequency of *E. coli* after friction by around one order of magnitude. Box-plot of mutant frequency induced by asbestos (crocidolite fibres) treatment in *E. coli* MG1655. The asterisk represents a significant difference; Mann-Whitney *U*: P \< 0.05. Equal letters represent no differences while different ones represent significant differences.Figure 8Graphical cartoon model on how clays fibres could induce mutagenesis in bacteria if they are present along with friction forces. The model focuses on *Escherichia coli*. Further discussion {#Sec9} ------------------ The poor correlation between DNA damage *in vivo* and *in vitro* described in previous studies^[@CR12]^ may be explained by the limited or lack of penetration of asbestos in experimental designs. Thus, the introduction of some friction or shaking could be useful in determining if penetration of cells by asbestos and other fibres underlie a molecular mechanism of carcinogenesis. The mechanism(s) underlying asbestos toxicity associated with the pathogenesis of mesothelioma has been a challenge to unravel for more than six decades^[@CR33]^. According to our results and the current knowledge about asbestos-induced carcinomas, we speculate on a model that explains a potential path leading to carcinomas. Briefly, we think that people exposed to asbestos fibres for prolonged periods accumulate them in the respiratory tract. Asbestos fibres are frequently found in the pleural cavity, and maybe they increase the friction coefficient in the pleural space, a parameter with a very small value in in physiological conditions^[@CR34]^. The coelomic movement (a cyclical mechanical movement between the parietal pleura, which is the membrane covering the inner surface of the thoracic cavity, and the visceral pleura, which is the membrane covering the lung surface) provokes the movement of asbestos, occasionally trespassing through the mesothelial cell membranes or floating mesothelial cells, physically interacting and disr~~r~~upting the DNA or spindle. This physical interaction, with adequate intensity, could induce DSBs, which generate chromosome aberrations or fragmentations in eukaryotic cells as we found here for bacteria. After years of exposure, DSBs or spindle disruption can cause chromosome damages or losses or aneuploidy that increase the probability of malignancy. The proposed model for eukaryote cells would need *in vitro* validation with epithelial cells but this is beyond the scope of the current study. Moreover, this model does not exclude other toxic and genotoxic mechanisms of asbestosis such as reactive species arising from the metal action or an inflammatory response. One of the most important limitations of our study is the lack of an animal model to test if our finding of mutagenicity in bacteria by clays occurs *in vivo*. In theory, clays present in livestock feed could promote antibiotic resistance and virulence in pathogenic bacteria by not only their transformation ability but also via mutations. However, testing conditions are hindered by the fact that experiments would require at least S1 security level, and this is difficult to achieve with livestock animals^[@CR4]^. Transformation of plasmid DNA requires penetration, and sepiolite and other clays have shown this capacity in a wide range of concentrations, although it diminishes at high concentrations due to bacterial death^[@CR9],[@CR35]--[@CR37]^. In a previous study, the pressure in the gut of many animal species was discussed, and these pressures meet the criteria necessary for penetration of bacteria by clay fibres very well^[@CR4]^. The presence of a hydrogel does not seem to be a problem since both the mucin gut layer or mucoid secretion in the respiratory tract can play that role, particularly if the fibres have the capacity to change local viscosity or if viscosity gradients exist across these body compartments. An implication of our study is that factors such the friction forces should be considered in assessing the genotoxic and carcinogenic potential of certain fibrous materials. Until now, many studies associate clay-induced damage mostly with ROS^[@CR14]^. DNA damage can be produced by oxidation-reduction processes generated by metal containing-fibres. Asbestos fibres are carcinogenic for both humans and experimental animals because asbestos produces DNA breaks leading to the formation of a micronucleus (a type of chromosomal aberration)^[@CR38]^. This kind of damage seems to be caused more by mechanical action rather than ROS generation, which can worsen the situation but is not necessarily the determining factor. In other words, we think that ROS is more a symptom than a cause. Other examples of a potentially dangerous material are the carbon nanotubes (CNTs), a novel industrial material with many applications. The genetic alterations provoked by these nanotubes in rat malignant mesothelioma were similar to those induced by asbestos^[@CR39]^. Interestingly, CNTs lack heavy metals in their composition. The nanoscale size and needle-like rigid structure of CNTs appear to be associated with their pathogenicity in mammalian cells^[@CR39]^. Coincidentally, CNTs can be used to transform bacteria with plasmids^[@CR40]^ in a similar fashion that asbestos^[@CR10],[@CR41]^ and sepiolite do^[@CR6],[@CR35]^. It would not be surprising if these fibrous nanomaterials share their ability to mechanically induce DSBs. Recently, a possible link between talcum powder and ovarian cancer risk associated with asbestos contamination in talc has been under discussion. Although the risk is small, some studies suggested a low or moderate but significant chance of cancer, while other rejected/discarded this correlation^[@CR42]--[@CR44]^. It is necessary to advance the understanding of the molecular bases of DNA damage by asbestos and other industrial fibres. If the proposed model of mechanical/physical DNA breaks is validated in future studies, some genotoxicity assays intended to unveil the mutagenic properties of materials (e.g. the Ames test) should be modified accordingly to include a standardised friction procedure or shaking during incubation steps. Similarly, several *in vitro* tests, with both bacteria and eukaryotic cells, were modified by researchers and regulatory agencies that introduced the metabolic activation by fraction S9 of liver homogenate^[@CR45]^. The induction of DSBs by nanofibres in bacteria could also be related to the microbiota evolution of animals that use gastroliths. It has been suggested that gut microbes play a crucial role in keeping species apart or enhancing speciation^[@CR46]^. It is tempting to speculate that animals that use gastroliths or sediment ingestion expose their microbiota to the abrasive action of stone derivative fibres. Therefore, the shaping of their own microbes is expected to contribute to their own speciation trajectories. Among animals that use or used gastroliths in their evolutionary trajectories, we find several branches of fishes, amphibians, reptiles (including dinosaurs) and birds. Gastroliths also regularly occur in several groups of invertebrates^[@CR47]^. Wings (2007) recommends making a distinction between lithophagy and geophagy. Lithophagy (stones larger than 0.063 mm in diameter) is defined as the deliberate consumption of stones that turn into gastroliths after their ingestion. Geophagy is the consumption of soil and is known for reptiles, birds, and mammals. These soils, rich in clays, salts or fat, serve mainly as a food supplement for the supply of specific minerals or for medical purposes^[@CR47]^. Both concepts can contribute the components that this mechanism needs to operate: gut microbiota, gut mucin mucoid layer (hydrogel) and friction forces provided by the peristaltic pressure of the digestive tract in animals, especially the gizzard and the stomach. An interesting question is why sepiolite from limestone gastroliths does not damage the animal gut. A convincing explanation is that the mucoid layer in the gut protects it from the action of these sharp fibres at the time that serves as a protective layer for the gut epithelium. In mammals, this mucoid layer is around 200 µm thick and is under continuous renovation^[@CR48]^. Sepiolite is a natural clay mineral characterised by a nanofibre structure with average dimensions less than or equal to 0.2 micrometers in diameter, and from 2 to 5 micrometers in length, although longer fibres can be present. Concluding remarks {#Sec10} ------------------ Overall, one of the most significant contributions of this article is the proposition for the first time of a bacterial model to test genotoxicity of nanofibres and to uncover a new mechanism of action for asbestos that correlates better with *in vivo* observations. Asbestosis is a global health and environmental problem, the molecular basis of which has provided a challenge for several decades^[@CR33]^. Although asbestos fibres are widely distributed in the anatomy of patients^[@CR33],[@CR49]^, the most common cancers caused by asbestos originate in lungs (mostly mesothelioma). If the most explored mechanism of action is based on reactive radicals (chemical damage), why do exposed populations not also show an increased frequency of other types of carcinoma such as leukaemia, lymphoma, liver or kidney cancer? Last but not least, is the tighter contact of slippery membranes (a monolayer of flattened epithelial-like cells) of the mesothelium. The pleural space is in continuous movement and constitutes a preferential target for asbestos-induced carcinogenesis. Of particular interest are free-floating mesothelial cells of the cavity, that even proliferate under damaging conditions^[@CR50]^. The free-floating cells are the ideal candidates to be penetrated by asbestos in the pleural space. They may be more sensitive to suffering direct (physical) or indirect (chemical) DNA damage and develop into a mesothelioma. Finally, the sepiolite transformation technique gained in popularity in recent years because there is no need to prepare competent cells^[@CR9],[@CR19],[@CR35],[@CR51]^. In this case, diverse bacteria can be transformed^[@CR4]^ in both stationary and exponentially growing phases. However, to prevent undesired mutations in both, plasmid and genomic DNA, it is highly recommendable to use exponential phase bacteria, where mutagenesis is not significantly increased, at least in *E. coli*. Methods {#Sec11} ======= Bacteria and growth conditions {#Sec12} ------------------------------ The *E. coli* MG1655 wild-type strain and its derivative mutants were cultured in Lysogenic Broth (LB). All experiments were performed at 37 °C, with shaking in liquid culture. All solid cultures were grown in LB agar 1.5% for standard procedures and 2% for the sepiolite treatment. All cultures were supplemented with antibiotics when appropriate. Mutant frequency estimation of sepiolite treated cells {#Sec13} ------------------------------------------------------ Approximately 2 × 10^9^ bacterial cells per ml of *E. coli* MG1655 and its derivative mutants from overnight or mid-exponential growing cultures were centrifuged and resuspended in 100 μl of sterilised transformation mixture, consisting of spanish sepiolite (Kremer Pigmente, Germany) suspended in aqueous solution at a final concentration of 0.1 mg/ml. In addition, to observe the influence of sepiolite concentration in mutant frequency, other concentrations were checked only with overnight cultures (0.1, 1, 10 and 100 mg/ml). Resuspended cells were spread on plates containing fresh Müller-Hinton-Agar (Sigma-Aldrich, Germany) medium solidified with 2% agar, and Petri dishes were pre-dried in a biological safety flow cabinet for 20 minutes before use. Friction force was provided by streaking bacterial cultures plus sepiolite with a sterile glass stirring sticks gently pressed onto the medium surface for one, two and three minutes, applying as much pressure as possible without breaking the agar gel. An additional control experiment was carried out without sepiolite to discard that only friction could induce any DNA damage in this conditions. Petri dishes were incubated at 37 °C for 2 hours to allow for DNA repair if any damage had occurred. The plates were gently washed four times with 5 ml of 0.9% sodium chloride solution using a 5 ml pipette and the resulting bacterial suspensions were transferred to 10 ml tubes to recover the cells by centrifugation at 3000 g for 10 minutes. The resulting pellets were resuspended in a final volume of 1 ml of fresh LB an incubate for 1 hour at 37 °C to allow the cells to recover. Appropriate dilutions were plated onto LB plates to estimate bacterial viability and in LB plus the antibiotic fosfomycin (50 µg/ml) to estimate the number of resistant mutants. Plates were incubated overnight at 37 °C. Each experiment consisted of 5 replicates and was repeated twice. Mutant frequencies were calculated by using the FALCOR web-tool^[@CR52]^. Influence of 2-2′ bipyridyl on sepiolite mutagenesis {#Sec14} ---------------------------------------------------- The effect of 2-2′ bipyridyl, a metal chelating agent^[@CR53]^, on sepiolite mutagenesis was determined by measuring its influence on the mutant frequency for a selected concentration of sepiolite, where mutagenesis was observed. The experiment consisted of adding a titrating concentration of 2-2′ bipyridyl (200 µM) to chelate metals five minutes before the treatment. Cultures treated with sepiolite and friction without the addition of 2-2′ bipyridyl and bacteria alone without sepiolite were used as a control. The mutant frequencies for these groups were determined as described above. Assessing double-strand breaks with a plasmid system {#Sec15} ---------------------------------------------------- To evaluate if sepiolite under friction treatment induces double-strand breaks in plasmid DNA, the strain *Escherichia coli* DH5α (fhuA2 lac(del)U169 phoA glnV44 Φ80′ lacZ(del)M15 gyrA96 recA1 relA1 endA1 thi-1 hsdR17) carrying the plasmid pET-19b (Novagen, Germany) was treated with sepiolite and sliding friction forces for one minute. Several samples were recovered from the plates and pooled to compensate for viability losses due to friction. The recovery was done by washing the surface with 5 ml 0.9% NaCl saline solution four times as described for mutagenesis experiments. The recovered pellets were washed with 1 ml of TE buffer and the OD~600~ adjusted to 1 for each type of sample. Plasmid DNA samples were extracted using a Qiagen mini plasmid extraction kit (Qiagen, Germany). Added sepiolite with or without friction and no sepiolite groups were used as a control group. Each experiment consisted of five replicates. The same amount of plasmid DNA per replicate was applied per well to an agarose gel that was stained with SYBR® Gold Nucleic Acid Gel Stain kit (Molecular Probes, USA). A NdeI (Promega, USA) digested aliquot of pET-19b was used as a control for the linear migration rate. The proportion of linear molecules of the plasmid were compared among groups using densitometry analysis with ImageJ^[@CR54]^. RecA deficient strain construction {#Sec16} ---------------------------------- The *recA* null mutant was constructed following a previously described methodology^[@CR55]^ with the primers 5′-CAGAACATATTGACTATCCGGTATTACCCG-GCATGACAGGAGTAAAAATGGT-GTAGGCTGGAGCTGCTTC-3′ and 5′-ATGCGACCCTTGTGTATCAAACAAGACGATTAAAAATCTTCGTTAGTTTCATGGGAAT-TAGCCATGGTCC-3′ (forward and reverse respectively) using the pKD3 plasmid as template. The mutant was checked by PCR amplification using the primers c1 5′-TTATACGCAAGGCGACAAGG-3′ and c2 5′-GATCTTCCGTCACAGGTAGG-3′ in combination with specific primers for upstream and downstream regions of *recA* gene: 5′-ATTGCAGACCTTGTGGCAAC-3′ and 5′-CGATCCAACAGGCGAGCATAT-3′ respectively. Additionally, the increased susceptibility to UV light and mitomycin C was tested phenotypically in comparison to the parental strain. The antibiotic resistance gene was eliminated using the pCP20 plasmid as described previously^[@CR55]^. SEM of *E. coli* treated with sepiolite {#Sec17} --------------------------------------- Approximately 2 × 10^9^ CFU of stationary phase *E. coli* MG1655 were treated with sepiolite and friction force was applied for one minute as described for the mutagenesis experiment. Circular agar blocks were taken from agar plates with a sterile cork borer (1 cm of diameter). Then, a thin surface layer was cut off, placed on a circular glass cover slip (1.5 cm of diameter) and incubated for 45 minutes at room temperature in a laminar flow cabinet to allow air drying of the samples. The cover slips with dehydrated agar sections were mounted on aluminium stubs using double-sided adhesive tape and coated with gold in a sputter coater (SCD-040; Balzers, Union, Liechtenstein). The specimens were examined with an FEI Quanta 200 SEM (FEI Co., Hillsboro, OR) operating at an accelerating voltage of 15 kV under high vacuum mode at different magnifications. At least 5 fields from independent plates were observed to check physical penetration by the mineral. Some samples of sepiolite or asbestos (crocidolites) alone were processed and observed in the same way. Long fibre-depleted sepiolite mutagenesis experiment {#Sec18} ---------------------------------------------------- To assess the role of sepiolite long fibres in mutagenesis, a sepiolite preparation depleted of fibres longer than 1 µm was obtained. A 100 ml sepiolite suspension (1 mg/ml) in distilled water was passed through Pall® Acrodisc® glass fibre syringe filters (Sigma, USA) several times. The resulting suspension was desiccated by evaporation at 70 °C overnight. A non-filtered solution was used as a control. From the obtained powder, two suspensions were prepared to a final proportion of 0.1 mg/ml. These two solutions were used for a mutagenesis experiment plating with fosfomycin as indicated previously, using a friction time of two minutes. Mutant frequency estimation of asbestos treated cells {#Sec19} ----------------------------------------------------- The procedure was carried out identically to the one described above for sepiolite. The friction time was set to two minutes and the same concentration that was used, 0.1 mg/ml of asbestos. We used the crocidolite asbestos analytical standard (SPI Supplies, USA). The asbestos fibres were resuspended in distilled water, autoclaved and sonicated in a water bath for 10 minutes before use to produce a homogeneous suspension. Statistical analysis {#Sec20} -------------------- To compare experimental groups, Kruskal-Wallis tests or One-way ANOVA tests were performed. In the case of significance, Bonferroni-corrected one-tailed Mann-Whitney U test or Tukey HSD test was used respectively. For the analysis of dose-response curves, we used the disease control rate (DCR) package of R sofware. The P values less than or equal to 0.05, after correction if needed, were considered statistically significant. All tests were performed with the statistical software R v. 3.4.2^[@CR56]^. Electronic supplementary material ================================= {#Sec21} Supplementary information **Electronic supplementary material** **Supplementary information** accompanies this paper at 10.1038/s41598-018-26958-5. **Publisher\'s note:** Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. We thank Jens Rolff and Sophie Armitage from Freie Universitat Berlin for valuable comments on the manuscript. ARR is supported SFB 973 (Deutsche Forschungsgemeinschaft, project C5). We are also greateful to the Plan Nacional de I+D+i and Instituto de Salud Carlos III, Subdirección General de Redes y Centros de Investigación Cooperativa, Ministerio de Economía y Competitividad, Spanish Network for Research in Infectious Diseases (REIPI RD12/0015) -- co-financed by European Development Regional Fund 'A way to achieve Europe' ERDF and SAF2015-72793-EXP and BFU2016-78250-P from Spanish Ministry of Science and Competitiveness (MINECO)-FEDER), funding to JB. E.G.T. and J.R.B., R.R. and A.R.R. conducted the experiments; J.B. and A.R.R. designed the experiments and wrote the paper. A.R.R. conceived the original hypothesis about mutagenesis and biological implications of the study. Competing Interests {#FPar1} =================== The authors declare no competing interests.
It seemed harmless enough last winter when little Alex Silverman started asking his mother for extra money to buy packs of Pokemon trading cards, the children's craze that has swept schoolyards and stationery stores across the country. Six months and more than $2,000 later, however, his mother, Janet, is convinced that her 9-year-old son's new hobby is no ordinary passing fad but a real threat to his welfare -- and to her wallet. In what could bring at least a smile, if not some remuneration, to millions of other concerned moms and dads, Mrs. Silverman and another Merrick mother have signed up with a team of class-action lawyers on both coasts to charge that the Pokemon craze constitutes a form of illegal gambling no less addictive than scratch tickets or slot machines. As only the childless need to be told, Pokemon (derived from the Japanese words for ''pocket monster'') cards are about the same size as baseball cards but carry the images and describe the special powers of dozens of imaginary creatures and monsters with names like Alakazam, Blastoise and Charizard. A pack of 10 or 11 sells for $5 to $8.
Introduction {#s1} ============ > *It is interesting to contemplate a tangled bank, clothed with many plants of many kinds, with birds singing on the bushes, with various insects flitting about, and with worms crawling through the damp earth, and to reflect that these elaborately constructed forms, so different from each other, and dependent upon each other in so complex a manner, have all been produced by laws acting around us...* Darwin, 1859 Illuminating the laws that produce Darwin\'s "tangled bank" remains one of the great challenges of biology, one that requires understanding how differences among forms are selected for, and how interdependence among forms is generated. In natural environments, meeting this challenge is complicated by the fact that selection pressures often vary widely over both space and time. Laboratory evolution experiments, in particular those using microbes, offer an attractive alternative by which to study, under controlled conditions, both the dynamic interplay between genotype and phenotype as well as the interactions among phenotypes in simple communities. Classical models of large asexually evolving populations led to the expectation that in simple environments complexity should be transient and limited in scope [@pgen.1004430-Muller1], [@pgen.1004430-Williams1]. Experimental evidence now suggests otherwise. Multiple genotypes that arise from a single ancestral clone can coexist over evolutionary time; in other words, *ex uno plures* (out of one many). This phenomenon has been documented in spatially and temporally unstructured chemostats [@pgen.1004430-Helling1], [@pgen.1004430-Ferenci1], in temporally-structured batch cultures [@pgen.1004430-Lang1]--[@pgen.1004430-Turner1] and in spatially-structured microcosms [@pgen.1004430-Rainey1]. In each setting, the emergence and persistence of polymorphism in the absence of sexual recombination requires that cohabitants opportunistically exploit unoccupied niche space, and/or accept trade-offs between being a specialist and a generalist [@pgen.1004430-Herron1]--[@pgen.1004430-Rainey2]. In serial dilution batch culture, multiple growth parameters can come under selection [@pgen.1004430-Rosenzweig1]: different clones may arise having reduced lag time, increased maximum specific growth rate, or enhanced capacity to survive at high cell densities in the presence of low nutrients [@pgen.1004430-Novak1]. Periodic changes in population density and nutrient levels may bring balancing selection to bear on these different phenotypes (e.g., [@pgen.1004430-Rozen1]), especially if mutations are antagonistically pleiotropic [@pgen.1004430-LeGac2], [@pgen.1004430-Rozen2]. In spatially structured environments selection may favor mutants better adapted to particular regions or better able to colonize microhabitats formed at the boundaries between such regions. By contrast, in continuous nutrient-limited environments, theory predicts that selection will favor clones better able to scavenge the limiting resource or more efficiently convert that resource to progeny [@pgen.1004430-Monod1], [@pgen.1004430-Kubitschek1]. Ultimately, the outcome of the 'evolutionary play' in any of these 'ecological theaters' (*sensu* [@pgen.1004430-Hutchinson1]) will depend on founder genotype, mutation rate, the complexity of genetic pathways leading to different adaptive strategies, as well as pleiotropy [@pgen.1004430-Wenger1] and epistatic interactions [@pgen.1004430-Kvitek1]. Increasing evidence points to the possibility of not one, but three potential outcomes when asexual microbes evolve in simple environments: *clonal succession*, where a population is successively swept by clones of higher fitness arising in the dominant lineage [@pgen.1004430-Novick1], [@pgen.1004430-Atwood1]; *clonal interference*, where fixation of a single fittest clone is deferred because independent beneficial mutations arise in multiple, independent clones that compete with one another and reduce each other\'s fitness [@pgen.1004430-Kao1]--[@pgen.1004430-Gerrish1], and what we propose to call *clonal reinforcement*, where the emergence of one genotype favors the emergence and persistence of other genotypes via cooperative interactions. Because cooperation is now recognized to be at least as important as competition in driving biological innovation and in structuring communities [@pgen.1004430-Boucher1], [@pgen.1004430-Thompson1], we investigated the genetic and environmental factors that foster interdependence in an evolving lab population. Previously [@pgen.1004430-Kinnersley1], we examined the transcriptomes of an experimentally evolved *E. coli* community in which three different strains that arose from a common ancestor stably coexisted in a simple, unstructured environment through metabolic cross-feeding [@pgen.1004430-Helling1], [@pgen.1004430-Rosenzweig2]. This system is unusual in that it clearly involves symbiotic interactions among ecotypes that co-evolved in the absence of spatial or temporal variation. Remarkably, the community\'s expression profile did not proportionately represent the sum of each strain\'s expression profile grown singly under evolutionary conditions, indicating that the whole was not the sum of its parts. Instead, expression data suggested that consumption of one ecotype\'s overflow metabolites by the others relieved feedback inhibition, adding a layer of complexity to the evolved clones\' interactions. Using a candidate gene approach we identified two mutations in the ancestral strain that may have predisposed clonal reinforcement [@pgen.1004430-Kinnersley1]. To better understand how physiological performance and expression profile map onto genotype, and to identify the molecular basis of community interactions we sequenced the genomes of each of the three community members and their common ancestor. We found unexpectedly high levels of genetic variation in the three-membered community as a whole and the numerically dominant strain in particular, as well as a strong mutational bias due to specific lesions in DNA repair. The dominant community member is a hypermutator that excels at acquiring glucose, but does so at the expense of carbon excreted as overflow metabolites to which it has limited access; this trade-off effectively opens up new niches for other genotypes. We discovered a set of adaptive mutations in this clone that have not been previously reported to co-occur in other *E. coli* evolution experiments, specifically those that enhance glucose acquisition and may serve to maintain redox balance, but may also increase net flux to overflow metabolites under aerobic conditions. Because this community member releases growth substrates that are differentially accessible to other community members, and because it shares only one SNP mutation with these strains, we suggest that it acts as an engine generating biodiversity, creating new metabolic niches, but not necessarily the occupants themselves. Results and Discussion {#s2} ====================== Description of the community {#s2a} ---------------------------- In previous publications [@pgen.1004430-Helling1], [@pgen.1004430-Kinnersley1], [@pgen.1004430-Rosenzweig2] we described certain features of a stable polymorphism that arose from a single clone during the course of 765 generations of aerobic, glucose-limited culture at 30°C (D≈0.20 hr^−1^) ([**Table 1**](#pgen-1004430-t001){ref-type="table"}). The four clones isolated from this population (CV101, C103, CV115 and CV116) were originally distinguished by their differences in antibiotic resistance and colony morphology, and later shown to exhibit strain-specific rates of glucose uptake, residual metabolite concentrations and expression profiles. In reconstruction experiments performed under evolutionary conditions CV101, CV103 and CV116 were shown to stably coexist at frequencies of approximately 0.10, 0.65 and 0.025, respectively. Because CV115 was not stably maintained, the interactions among CV101, CV103 and CV116 were studied more intensively. Based on differences in glucose uptake and residual substrate concentrations, and the fact that strains\' steady state frequencies could be predictably altered by exogenously increasing the concentrations of residual metabolites, we concluded that this community was sustained by positive density-dependent interactions in the form of cross-feeding, in which the numerically dominant strain CV103 best takes up the limiting resource glucose, but excretes acetate and glycerol (and/or a closely-related compound, glycerol 3-phosphate) (J. Adams unpublished results). These two overflow metabolites are then scavenged by CV101 and CV116, respectively. Transcriptional profiling of each clone in monoculture relative to the common ancestor, JA122, revealed gene expression differences among the evolved isolates related to carbon metabolism and expression differences specific to CV103 consistent with activation of stress response pathways and loss of motility. 10.1371/journal.pgen.1004430.t001 ###### Strain characteristics. ![](pgen.1004430.t001){#pgen-1004430-t001-1} Strain Relevant Characteristics[2](#nt102){ref-type="table-fn"} Mutation rate (/cell/gen) Specific growth rate (hr^−1^)[2](#nt102){ref-type="table-fn"} Relative growth yield[3](#nt103){ref-type="table-fn"} Rate of glucose uptake (µmol αMG/min/gm)[3](#nt103){ref-type="table-fn"} Equilibrium \[glucose\] (nmol/mL)[3](#nt103){ref-type="table-fn"} Equilibrium \[acetate\] (nmol/mL)[3](#nt103){ref-type="table-fn"} -------------------------------------------- --------------------------------------------------------------------------- --------------------------- --------------------------------------------------------------- ------------------------------------------------------- -------------------------------------------------------------------------- ------------------------------------------------------------------- ------------------------------------------------------------------- **K12 MG1655** CGSC 6300F- rph-1 λ- 3.60×10^−9^ **RH201** [1](#nt101){ref-type="table-fn"} CGSC 5346F- *thi 1leu6 thiI lacY1 tonA21 supE44 hss1 glpR200* **JA104** Deriv. of RH 201 F- *thi 1 lacY1 araD139gdh supE44 hss1*; lysogenic for λ **JA122** As JA104 but contains plasmid pBR322Δ5 1.00×10^−7^ 0.44±0.01 1.14±0.02 1.19±0.09 1.84±0.48 194±20 **CV101** Derivative of JA122; isolated after 773 generations, Amp^R^ 1.33×10^−7^ 0.50±0.02 1.11±0.02 1.66±0.06 0.88±0.31 0±0 **CV103** As CV101 but independent isolate, forms small colonies on TA agar, Amp^R^ 9.20×10^−7^ 0.40±0.01 0.81±0.04 2.46±0.16 0.07±0.03 252±70 **CV115** Derivative of JA122, isolated after 773 generations, lacks plasmid 1.14×10^−7^ 0.55±0.02 1.11±0.02 ND ND ND **CV116** As CV115 but forms small colonies on TA agar 1.10×10^−7^ 0.60±0.01 1.20±0.03 1.61±0.11 0.19±0.05 40±25 Ref. [@pgen.1004430-Adams1]. Data from [@pgen.1004430-Helling1], [Table 1](#pgen-1004430-t001){ref-type="table"}. Data from [@pgen.1004430-Rosenzweig2], [Table 2](#pgen-1004430-t002){ref-type="table"}. Whole genome re-sequencing {#s2b} -------------------------- As summarized in [**Table 2**](#pgen-1004430-t002){ref-type="table"}, 584 mutations (580 SNPs, two insertions and two deletions) were identified among the four evolved clones. This number is substantially higher than has been previously reported for laboratory evolution experiments of similar duration conducted under similar conditions [@pgen.1004430-Barrick1]. A majority of these mutations, 504 (86%), is in coding regions and 374 (64%) are non-synonymous, while 428 (73%), are unique to CV103. Almost all (99.7% (578)) SNPs are GC→TA transversions, suggesting defects in DNA repair among all of the evolved isolates. Strong transversion bias has been noted in other evolution experiments, and is likely due to defective repair of oxidatively damaged G:C base-pairs [@pgen.1004430-Barrick1], [@pgen.1004430-Nghiem1]. 10.1371/journal.pgen.1004430.t002 ###### Types of Single Nucleotide Polymorphisms (SNPs) and their distribution among evolved strains. ![](pgen.1004430.t002){#pgen-1004430-t002-2} Total mutations 584 --------------------------------- ------------- Insertions/deletions 4 SNPs 580 SNPs in coding regions 502 (86.6%) SNPs causing missense mutations 335 (57.8%) SNPs causing nonsense mutations 39 (6.7%) G to A transitions 1 (0.2%) C to T transitions 1 (0.2%) **G to T transversions** 293 (50.5%) **C to A transversions** 285 (49.1%) The community consists of lineages that diverged early in the history of the experiment {#s2c} --------------------------------------------------------------------------------------- Phylogenetic analyses of the whole genome sequences [@pgen.1004430-Kinnersley1] show that the dominant clone CV103 is part of a highly divergent lineage, while CV115 and CV116 are very closely related to one another, and share a common ancestor with CV101 ([**Fig. 1**](#pgen-1004430-g001){ref-type="fig"}). Indeed, as CV115 and CV116 differ by only two SNPs, one a synonymous substitution (*gutQ*, A221A), the other C-terminal (*ycaO* G546V), and because only CV101, CV103 and CV116 could be stably maintained at steady state, we restrict most of our discussion to these three clones. Remarkably, the evolved clones all share only one SNP. Thus, it is likely that the CV103 and CV101/CV115/CV116 lineages diverged from one another early in the experiment and that stable co-existence of more than one lineage was an early feature of the population. In fact, previous work documented a variant similar to CV103 (small colony, ampicillin-resistant) had risen to appreciable frequency by generation 340 [@pgen.1004430-Helling1]. This result is not unexpected, as subsequent to the observations of Helling et al. 1987, a number of other reports appeared showing that multiple genotypes can coexist in nutrient-limited chemostats [@pgen.1004430-Ferenci2]--[@pgen.1004430-Maharjan2]. An unanticipated finding in our experiments was the large number of SNPs that accumulated along the CV103 branch. ![Phylogeny of strains based on whole-genome sequence.\ 580 SNPs across all four genomes were used to reconstruct evolutionary relationships between consortium members using maximum likelihood. The number of SNPs that distinguish each lineage are shown above each branch in green.](pgen.1004430.g001){#pgen-1004430-g001} Mutation rate varies among evolved strains and their common ancestor {#s2d} -------------------------------------------------------------------- Fluctuation analyses performed on the ancestral strain, JA122, the canonical *E. coli* strain K12 MG1655, and the four co-evolved clones revealed that the founder strain, JA122, is a mutator whose mutation rate is approximately thirty-fold higher than *E. coli* K12 MG1655 ([**Table 1**](#pgen-1004430-t001){ref-type="table"}). This observation can be explained by a nonsense mutation in JA122 affecting the adenine glycosylase mismatch repair enzyme MutY (L299\*). Defects in MutY are known to cause a GC→TA transversion bias [@pgen.1004430-Nghiem1], [@pgen.1004430-Lin1] and have been observed by others in glucose limited chemostat experiments [@pgen.1004430-NotleyMcRobb2], [@pgen.1004430-NotleyMcRobb3]. Evolved strains CV101, CV115 and CV116 all had mutation rates similar to JA122, while CV103\'s mutation rate was almost 10-fold higher again ([**Table 1**](#pgen-1004430-t001){ref-type="table"}). This difference can be attributed to a second mutation resulting in an amino acid substitution (A56D) in the base-excision repair pathway DNA glycosylase, MutM. Increased mutation rate has been shown to be selected for in microbial evolution experiments performed under a variety of conditions [@pgen.1004430-Nghiem1], [@pgen.1004430-NotleyMcRobb3]--[@pgen.1004430-Gibson1] where it can strongly influence evolutionary dynamics [@pgen.1004430-deVisser2]. The fitness of mutators need not decrease over time; Maharjan et al. [@pgen.1004430-Maharjan3] recently showed that mutators arising under glucose limitation gain fitness relative to their ancestor as a result of adaptive mutations in, for example, *rpoS* and *mglD*. Mutator lineages persisted because most of the other mutations accumulating in their backgrounds were neutral in their effect on fitness, deleterious mutations being purged as the lineages evolved. A similar mechanism may be at work in our experiment, with an appreciable number of mutations in CV103 being neutral. Certain transcriptional units are repeatedly mutated {#s2e} ---------------------------------------------------- Given the large number of SNPs, we sought to determine whether certain genes or transcription units carried multiple mutations, either because they had had been selected for or because their inactivation allowed neutral mutations to accumulate. Overall, 52 transcription units and 37 individual genes contained more than one SNP (**[Table S1](#pgen.1004430.s001){ref-type="supplementary-material"}**). Twenty-five of the single/multiple gene hits occur exclusively in strain CV103 (**[Table S1](#pgen.1004430.s001){ref-type="supplementary-material"}**). Four of these (*eno*, *maeA*, *malG* and *ptsI*) are directly involved in glucose uptake/metabolism suggesting that they contribute to the superior glucose uptake kinetics of this clone. Five CV103-specific substitutions affect flagellar synthesis: three SNPs occur in *fliM*, which encodes a flagellar motor switch protein, one occurs in *fliF*, which encodes the flagellar M ring protein, and one occurs in *fliH*, which encodes another flagellar biosynthesis protein. These findings are consistent with the previously observed down-regulation of flagellar genes in CV103 and the fact this strain is non-motile [@pgen.1004430-Kinnersley1]. When all of the evolved isolates are considered, it is perhaps surprising that CV116, thought to salvage excreted glycerol/glycerol phosphate from CV103, has a number of mutations (10) in transcription units that are also mutated in CV103 (**[Table S1](#pgen.1004430.s001){ref-type="supplementary-material"}**). The same is not true for CV101, the strain that salvages overflow acetate (**[Table S1](#pgen.1004430.s001){ref-type="supplementary-material"}**). While most of these SNPs are silent mutations, they could plausibly affect RNA stability or translation. Of the non-silent changes, particularly noteworthy are four mutations (three in CV103 and one in CV116) that affect NADH:ubiquinone oxidoreductase I, as well as additional mutations affecting genes involved in anaerobic formate production and electron transfer (**[Table S1](#pgen.1004430.s001){ref-type="supplementary-material"}**). Because both CV103 and CV116 show enhanced glucose uptake relative to CV101 and the ancestral strain ([**Table 1**](#pgen-1004430-t001){ref-type="table"} and [@pgen.1004430-Helling1]), these changes may be shared features of an adaptive response to rapid glucose consumption and concomitant overproduction of NADH (discussed below). Certain SNPs are associated with strain-specific differences in transcription and/or translation {#s2f} ------------------------------------------------------------------------------------------------ Because we previously observed significant differences in gene expression among evolved isolates grown in monoculture [@pgen.1004430-Kinnersley1], we sought to identify SNPs that could explain these differences. Because the great majority of these transcriptional differences were manifest in CV103, we focused on genes that could directly or indirectly regulate loci differentially expressed in this strain and on the 428 genes associated with a SNP in CV103. The intersection of these two gene lists yielded three global regulators that could explain the majority of transcriptional differences between CV103 and the other evolved isolates: *rpoD*, *csrA* and *sdiA*. RpoD, the housekeeping sigma factor, controls transcription of over 2,300 genes. The ancestor of the four evolved isolates, JA122, has an amber nonsense mutation (E26\*, GAG→TAG) in *rpoD* that likely leads to reduced translation of RpoD, but not necessarily its complete absence, as JA122 also carries the supE44 amber suppressor. CV103 has an additional silent mutation in *rpoD* (T459T, ACC→ACA) that does not affect protein sequence but may affect translation, as the mutant codon ACA is 30% less common than the wild-type codon ACC [@pgen.1004430-Maloy1]. The regulatory protein CsrA favors gluconeogenesis and glycogen synthesis over glycolysis. While the CV103 mutation in *csrA* is also silent (G27G, GGC→GGA), the resulting codon change is from one that is common (*f* = 0.40) to one that is rare (*f* = 0.09). Finally, *sdiA* encodes an N-acylhomoserine-L-lactone receptor that functions in quorum sensing. In CV103, a SNP is located 27 base-pairs upstream of the *sdiA* transcriptional start site in a region that encodes a small RNA, RNA0-361. The function of this sRNA is unknown, but it has been repeatedly identified in screens for small RNAs that interact with the global RNA chaperone, Hfq [@pgen.1004430-Raghavan1], [@pgen.1004430-Zhang1], in which CV103 has a missense mutation (see below). Mutations that alter glucose transport: The outer membrane {#s2g} ---------------------------------------------------------- ([**Fig. 2**](#pgen-1004430-g002){ref-type="fig"}) In earlier work we showed that all evolved isolates were better able to scavenge limiting glucose than their common ancestor [@pgen.1004430-Rosenzweig2], and that strain CV103 had a significantly higher rate of glucose uptake than the other evolved isolates [@pgen.1004430-Helling1]. We later attributed these observations to increased expression of LamB glycoporin in all four strains relative to JA122 [@pgen.1004430-Kurlandzka1], and significantly higher transcription of *lamB* in CV103 relative to CV101, CV115 and CV116 [@pgen.1004430-Kinnersley1]. In other studies of adaptation under glucose limitation elevated *lamB* expression has repeatedly been tied to mutations that affect the regulation of the Mal operon, specifically mutations that affect expression of the *lamB* regulators Mlc and/or MalT [@pgen.1004430-NotleyMcRobb1], [@pgen.1004430-Kurlandzka1], [@pgen.1004430-NotleyMcRobb4]. While we previously found that CV101, CV115 and CV116 share a mutation in *malT* that could up-regulate *lamB* expression, this mutation did not occur in CV103 [@pgen.1004430-Kinnersley1], the strain that best scavenges limiting glucose. ![Gene expression and SNPs among loci that mediate glucose uptake.\ Several SNPs occur in or upstream of genes known or suspected to be involved in glucose uptake. Loci shown in green have lower monoculture transcription levels in all evolved isolates compared to the ancestor JA122, while loci shown in red have elevated monoculture transcript levels. Grey denotes no change in transcript level detected. Loci depicted in blue have different gene expression levels depending on the strain tested, and for these genes, the normalized log~2~ expression ratios of the evolved strain relative to JA122 are shown in the inset table (see [Materials and Methods](#s3){ref-type="sec"}). Positive values indicate increased expression in the evolved isolates while negative values denote decreased expression. SNPs thought to affect proteins involved in glucose transport are indicated by stars with strain and mutation details as indicated. Consistent with strain representations in [Figure 1](#pgen-1004430-g001){ref-type="fig"} light blue stars indicate ancestral mutations present in JA122, purple indicates SNPs in CV101, yellow indicates SNPs in CV103, green indicates those in CV115/116, brown indicates SNPs shared by CV101/CV103/CV115/CV116 and pink denotes SNPs shared by CV101 and CV115/116.](pgen.1004430.g002){#pgen-1004430-g002} Whole genome sequencing uncovered two other mutations in CV103 that help explain higher transcript levels of *lamB* mRNA and, by extension, its superior ability to scavenge limiting glucose. The first mutation affects the gene for MalK, a negative regulator of MalT [@pgen.1004430-Joly1]. Null mutations in *malK* promote constitutive *mal/lamB* gene expression [@pgen.1004430-Kuhnau1], [@pgen.1004430-Bukau1], presumably by disrupting the MalK-MalT interaction. The *malK* SNP in CV103 causes an amino acid change (D297E) in the C-terminal portion of the protein that contains an important part of the MalT interaction domain. Replacement of aa 297 is known to diminish the ability of MalK to inhibit MalT [@pgen.1004430-Bohm1], and thus the D297E SNP likely leads to increased *lamB* transcription during glucose-limited growth [@pgen.1004430-Notley1]--[@pgen.1004430-Raibaud2]. The second CV103 mutation that may influence *lamB* expression occurs in the gene for the RNA chaperone Hfq. Hfq is a global regulator that facilitates binding of small regulatory RNAs (sRNAs) to mRNAs and by doing so affects translation and/or degradation of those transcripts [@pgen.1004430-Vogel1], [@pgen.1004430-ValentinHansen1]. Details are scant as to how most of these sRNAs regulate their targets and how Hfq enhances or attenuates their activity, but the profound effect these interactions can have on key cellular processes is being increasingly recognized [@pgen.1004430-Vogel1], [@pgen.1004430-Sobrero1]. Hfq interacts with the mRNA of the *E. coli* stationary phase sigma factor, RpoS, and is required for efficient translation of RpoS mRNA [@pgen.1004430-Muffler1]. Reduced RpoS expression has been extensively studied as a key adaptation to continuous glucose-limitation [@pgen.1004430-NotleyMcRobb2], [@pgen.1004430-Seeto1], [@pgen.1004430-NotleyMcRobb5], and Hfq has recently been identified as an alternative mutational target under glucose limitation in *rpoS* ^+^ strains [@pgen.1004430-Maharjan4], [@pgen.1004430-Maharjan5]. In these isolates, a missense mutation in Hfq enhances glucose uptake via PtsG, increases levels of LamB, and apparently reduces the amount of functional RpoS, resulting in lower biomass yield. The *hfq* mutation in CV103, which results in a Q52H substitution, could have similar effects: CV103 has increased uptake of the glucose analog α-MG ([**Table 1**](#pgen-1004430-t001){ref-type="table"}), which occurs exclusively via PtsG, increased LamB gene expression, and decreased biomass yield relative to the other evolved clones [@pgen.1004430-Helling1], [@pgen.1004430-Kinnersley1]. Interestingly, the genomic context of the Hfq mutation in CV103 differs from those characterized by others in which defects in Hfq have evolved in an *rpoS* deficient background [@pgen.1004430-Maharjan4], [@pgen.1004430-Maharjan5]. CV103 and our other evolved isolates share an ancestral *rpoS*(Am) mutation which likely allows some RpoS translation. Mutations that alter glucose transport: The inner membrane {#s2h} ---------------------------------------------------------- ([**Fig. 2**](#pgen-1004430-g002){ref-type="fig"}) After entry into the periplasm, glucose is actively transported across the inner membrane using the glucose-specific sugar phosphotransferase system (PTS). Mutations that upregulate an alternative high-affinity glucose transporter, the galactose transporter MglBAC, are frequently observed following prolonged growth under glucose limitation [@pgen.1004430-NotleyMcRobb1], [@pgen.1004430-Kurlandzka1], [@pgen.1004430-NotleyMcRobb4]; in this regard, our system is no exception. In fact, the only SNP shared by all of the evolved isolates is in the operator sequence for the MglD repressor (*mglO*, C→A, +3 bp relative to the end of *mglD*), consistent with increased expression of the *mglBAC* transcription unit [@pgen.1004430-Kinnersley1], [@pgen.1004430-NotleyMcRobb1]. Because the rate of glucose uptake in CV103 exceeds that of the other clones, we looked for mutations that might affect expression or activity of other inner-membrane glucose transporters. CV103 has two mutations in *ptsI*, which encodes enzyme I of the *E. coli* sugar phosphotransferase system. This protein is active in its dimeric form and participates in glucose uptake by accepting a phosphate group from phophoenolpyruvate (PEP) and passing it via phosphocarrier protein Hpr to sugar-specific enzymes such as PtsG, which then use phosphate to "charge" incoming sugars ([**Fig. 2**](#pgen-1004430-g002){ref-type="fig"} and [**3**](#pgen-1004430-g003){ref-type="fig"}) [@pgen.1004430-Patel1], [@pgen.1004430-Postma1]. The mutations in *ptsI* result in two amino acid substitutions (A328S, M518I), both of which occur in the C-terminal region responsible for binding PEP and dimerization. These may be reasonably expected to alter PtsI activity [@pgen.1004430-Chauvin1], [@pgen.1004430-Seok1]; aa 328 is close to two residues that are part of the PEP binding site (R332 and D335), while aa 518 is close to C502, which is required for phosphotransfer [@pgen.1004430-Teplyakov1], [@pgen.1004430-GarciaAlles1]. When ∼PO~4~ is not passed along by PtsI, there can be regulatory consequences: unphosphorylated PtsG can bind the transcriptional regulator Mlc and prevent it from negatively regulating expression of its targets which include *ptsG* itself, *manXYZ* and *malT* [@pgen.1004430-Nam1]--[@pgen.1004430-Zeppenfeld1]. Thus, these mutations could also explain the up-regulation of *manXYZ* in CV103, and lead to higher expression of the LamB glycoporin though derepression of *malT* transcription [@pgen.1004430-Decker2]. PtsI has also been shown to interact directly with other phospho-enzymes, notably acetate kinase (*ackA*), thus mutations in this protein may also affect acetate excretion [@pgen.1004430-Fox1]. ![Gene expression and SNPs among loci that mediate glycerol and acetate uptake/metabolism.\ As in [Figure 2](#pgen-1004430-g002){ref-type="fig"}, a green color indicates that the gene has a lower transcription level in monoculture chemostats relative to the ancestor JA122. A red color denotes elevated monoculture transcript levels while grey denotes no change in transcript level. Expression levels of loci that vary significantly in a strain-specific manner are shown in blue; for these genes, the normalized log~2~ expression ratios of the evolved strain relative to JA122 are shown in the inset table (for details see [Materials and Methods](#s3){ref-type="sec"}). Positive values indicate increased expression in the evolved isolates while negative values denote decreased expression. Transcript ratios for these genes, relative to the ancestor JA122 grown under identical conditions, are presented in the inset table. Stars and corresponding text denote the location and type of particular SNPs. Consistent with strain representations in [Figure 1](#pgen-1004430-g001){ref-type="fig"}, light blue stars indicate ancestral mutations present in JA122, purple indicates SNPs present in CV101, yellow indicates SNPs in CV103, green indicates those in CV115/116, brown indicates SNPs shared by CV101/CV103/CV115/CV116 and pink denotes SNPs shared by CV101 and CV115/116.](pgen.1004430.g003){#pgen-1004430-g003} Mutations in central metabolism may contribute to CV103\'s superior performance and propensity to create niches {#s2i} --------------------------------------------------------------------------------------------------------------- Although glucose transport is increased in all evolved isolates relative to their common ancestor, and especially so in CV103, expression of many glycolytic genes is decreased ([**Fig. 4**](#pgen-1004430-g004){ref-type="fig"}). This trend has also been observed in yeast evolution experiments carried out under glucose limitation, and may reflect the selective advantage of an energy conservation strategy under low nutrient conditions [@pgen.1004430-Ferea1]. Also, the hypermutator lineage that gave rise to CV103 accumulated a number of mutations predicted to impact conversions in glycolysis, fermentation, and the TCA cycle. Certain of these mutations likely underlie CV103\'s superior glucose uptake kinetics, but some may also favor excretion of and restricted access to overflow metabolites, which opens up new niches for other genotypes. ![Gene expression and SNPs among loci that mediate glycolysis and fermentation.\ Mutations that may affect glycolysis and fermentation are restricted to the glucose-scavenger CV103. Green denotes lower transcription level in monoculture chemostats relative to the ancestor JA122. Red indicates higher transcript levels and grey denotes no transcript level change relative to JA122. Blue colored genes are those that show variable expression; normalized log~2~ expression ratios of the evolved strain relative to JA122 are shown in the inset table (for details see [Materials and Methods](#s3){ref-type="sec"}). Positive values indicate increased expression in the evolved isolates while negative values denote decreased expression. Stars and corresponding text denote the location and type of particular SNPs. Consistent with strain representations in [Figure 1](#pgen-1004430-g001){ref-type="fig"}, light blue stars indicate ancestral mutations present in JA122, purple indicates SNPs present in CV101, yellow indicates SNPs in CV103, green indicates those in CV115/116, brown indicates SNPs shared by CV101/CV103/CV115/CV116 and pink denotes SNPs shared by CV101 and CV115/116.](pgen.1004430.g004){#pgen-1004430-g004} Interconversion of fructose-6-phosphate and fructose-1,6-bisphosphate {#s2j} --------------------------------------------------------------------- In CV103, transcript levels of *pfkB*, which encodes PfkII, a secondary enzyme that converts fructose-6-phosphate into fructose-1,6,-bisphosphate, is more highly expressed in CV103 than in the other strains; CV103 also carries a missense mutation in this gene (Q201H) ([**Fig. 4**](#pgen-1004430-g004){ref-type="fig"}). It is unclear whether this mutation is beneficial, as PfkII is thought to be responsible for less 5% of the phosphofructokinase activity in *E. coli* [@pgen.1004430-Kotlarz1]. However, PfkII can also use tagatose-6-phosphate as a substrate [@pgen.1004430-Babul1]. CV103 has a surprising number of differences compared to the other clones in the expression and sequence of other genes in the galactitol/tagatose-6-P glycolytic pathway, including downregulation of *gatZY* (encoding tagatose-1,6-bisphosphate aldolase 2) and *gatABC* (galactitol PTS permease) as well as a mutation in the gene for GatY (G49\*) (**[Table S2](#pgen.1004430.s002){ref-type="supplementary-material"}**). As in a number of other K12-derived strains, the *gat* operon is likely constitutively expressed in JA122 due to IS3E element insertion in the galactitol regulator (GatR) gene [@pgen.1004430-Nobelmann1]. Interestingly, increased expression of *gat* genes has been observed in experiments where *E. coli* has been evolved under lactulose and/or methyl-galactoside limitation [@pgen.1004430-Zhong1], [@pgen.1004430-Zhong2], [@pgen.1004430-Zhong3]. Enolase, responsible for the conversion of 2-phosphoglycerate into phosphoenolpyruvate (PEP), has two mutations in CV103, one silent and one missense (L60L, A37S) ([**Fig. 4**](#pgen-1004430-g004){ref-type="fig"} and **[Table S2](#pgen.1004430.s002){ref-type="supplementary-material"}**). Aside from the regulatory role played by its product, PEP, enolase participates in the degradation of certain RNAs as part of the degradosome [@pgen.1004430-Morita1]. In particular, enolase is needed to degrade *ptsG* mRNA when intracellular levels of G-6-P are high (*i.e.*, during phosphosugar stress) [@pgen.1004430-Morita1], [@pgen.1004430-Vanderpool1]. This interaction also involves the sRNA SgrS, Hfq and Pnp (polynucleotide phosphorylase), in which CV103 also has a substitution (P104Q) [@pgen.1004430-Zhang1], [@pgen.1004430-Vanderpool1]--[@pgen.1004430-Vanderpool2] (**[Table S2](#pgen.1004430.s002){ref-type="supplementary-material"}**). *ptsG* mRNA is not degraded when Hfq is mutated [@pgen.1004430-Ikeda1], thus in CV103 the combined action of mutations in enolase, Pnp and Hfq may increase longevity of *ptsG* transcripts. From pyruvate to acetyl CoA and/or acetate {#s2k} ------------------------------------------ Pyruvate is a major metabolite that sits at the branch point between glycolysis, the TCA cycle and fermentation ([**Fig. 4**](#pgen-1004430-g004){ref-type="fig"}). Measurements of intracellular pyruvate indicated that all of the evolved isolates had significantly less intracellular pyruvate than their common ancestor under glucose-limited conditions, although no significant differences in pyruvate concentration could be detected among the evolved strains (**[Table S3](#pgen.1004430.s003){ref-type="supplementary-material"}**). The primary route for oxidation of pyruvate during aerobic growth is pyruvate dehydrogenase (PDH), a three-enzyme complex that catalyzes the conversion of pyruvate into acetyl-CoA and contributes to the redox burden by transferring electrons to NAD+ ([**Fig. 4**](#pgen-1004430-g004){ref-type="fig"} and [**5**](#pgen-1004430-g005){ref-type="fig"}). Protein profiling of CV103 suggested the presence of a mutation in one of the three PDH enzymes, *lpd*, severe enough to eliminate the corresponding spot on a 2D gel [@pgen.1004430-Kurlandzka1]. Whole genome sequencing confirmed a missense mutation in the CV103 *lpd* gene that results in an amino acid substitution (F76L) in the N-terminal portion of the translated protein (**[Table S2](#pgen.1004430.s002){ref-type="supplementary-material"}**). Because this substitution occurs in the FAD binding domain, it likely affects electron transfer from the reduced co-factor FADH~2~ to NAD+. PDH specific activity in CV103 was previously shown to be 2--3 fold lower than that in the other strains, indicating that this mutation does indeed have a negative effect [@pgen.1004430-Kurlandzka1]. Loss of *lpd* activity can lead to phenotypic changes consistent with many of the unique characteristics of CV103. In a screen for *E. coli* knockouts with extended lifespans, *lpd* null mutants were identified that had extended survival compared to wild-type *E. coli* K-12 MG1655 [@pgen.1004430-Gonidakis1]. This enhanced survival was accompanied by reduced growth rate, reduced stationary phase cell density, reduced oxygen consumption, reduced respiration and increased accumulation of extracellular acetate, many of which phenotypes are exhibited by CV103 ([**Table 1**](#pgen-1004430-t001){ref-type="table"}, [@pgen.1004430-Helling1]). ![Distribution of SNPs in pathways that mediate pyruvate catabolism.\ Several SNPs were detected in genes involved in the conversion of pyruvate into acetate/acetyl Co-A in CV103. The four routes with their respective cofactors are shown on the left. Genes involved in the conversion are shown on the right with asterisks denoting those genes that have a SNP in CV103. Stars and corresponding text denote the location and type of particular SNPs. Consistent with strain representations in [Figure 1](#pgen-1004430-g001){ref-type="fig"} light blue stars indicate ancestral mutations present in JA122, purple indicates SNPs present in CV101, yellow indicates SNPs in CV103, green indicates those in CV115/116, brown indicates SNPs shared by CV101/CV103/CV115/CV116 and pink denotes SNPs shared by CV101 and CV115/116.](pgen.1004430.g005){#pgen-1004430-g005} Given that CV103 rapidly consumes glucose while excreting acetate, it seems unusual that a mutation affecting the conversion of pyruvate into acetyl-CoA would be retained in this strain. An *lpd* knockout can still grow on glucose and produce acetate, but it does so more slowly by using an alternate route to acetate, pyruvate oxidase (PoxB) [@pgen.1004430-Li1]. In an effort to determine whether CV103 might be using an alternate enzymatic pathway to convert pyruvate into acetate, we compared gene expression and sequence data for the three alternative pyruvate oxidation pathways: pyruvate oxidase (POX), pyruvate:flavodoxin oxidoreductase (PFOR) and pyruvate formate-lyase (PFL) ([**Fig. 5**](#pgen-1004430-g005){ref-type="fig"}). The POX pathway directly converts pyruvate into acetate without concomitant ATP generation ([**Fig. 5**](#pgen-1004430-g005){ref-type="fig"}). Nevertheless, this pathway is active during growth on glucose and can substitute for PDH if highly expressed [@pgen.1004430-AbdelHamid1]. In our system, expression of the gene for POX (*poxB*) is downregulated in all four evolved isolates relative to their common ancestor. This is not unexpected, as other glycolytic genes are downregulated. However, CV103 has a nonsense mutation at amino acid 14 of *poxB* (E14\*) which, given its position at the extreme N-terminus, is likely to completely inactivate the protein. While the ancestral supE44 amber suppressor might allow limited *poxB* translation to occur, it is unlikely that the POX pathway produces an appreciable amount of acetate in CV103. A second gene involved in acetate excretion, *ydbK* is expressed under both anaerobic and aerobic (albeit at very low levels) conditions ([**Fig. 5**](#pgen-1004430-g005){ref-type="fig"}), [@pgen.1004430-Blaschkowski1], [@pgen.1004430-Eremina1]. *ydbK* encodes PFOR, which catalyzes the conversion of pyruvate into acetyl-CoA with concomitant reduction of flavodoxin or ferredoxin [@pgen.1004430-Akhtar1]. Interestingly, both of these reduced molecules can be used to re-activate oxygen sensitive PFL (see below) [@pgen.1004430-Blaschkowski1]. CV103 carries a missense mutation of unknown effect (R539L) in *ydbK*; however, because this ORF was not represented on our expression array, its transcription level is unknown. Finally, acetyl Co-A can also be produced by the cleavage of pyruvate by pyruvate formate-lyase (PFL). PFL activity is primarily associated with the *pflB* gene but is also encoded by *tdcE*, *ybiW* and *pflD* [@pgen.1004430-Sawers1]--[@pgen.1004430-Pecher1]. PFL is oxygen sensitive and thus the primary route to acetyl-CoA under anaerobic conditions, but it is transcribed, active and useful during microaerobiosis [@pgen.1004430-deGraef1]--[@pgen.1004430-Alexeeva1]. Moreover, production of PFL requires a smaller anabolic investment than production of PDH, and may thus be preferred under conditions of nutrient stress [@pgen.1004430-Carlson1]. Functional PFL requires both transcriptional (regulated by FNR and ArcA/B) and post-translational activation by the activating enzyme PflA or the alternate activator YfiD [@pgen.1004430-Alexeeva1], [@pgen.1004430-Sawers3]. Consistent with the downregulation of many glycolytic genes, transcript levels of both the primary PFL (*pflB*) and its activator (*pflA*) are also downregulated across all of the evolved strains relative to the ancestor JA122. The gene for *pflB* is unchanged, and *pflA* has a silent substitution in CV103 (L205L). By contrast, transcript levels of the three alternate PFLs (*tdcE*, *ybiW*, *pflD*) and their alternate activator *yfiD* are not altered in any of the evolved strains relative to JA122, though CV103 has SNPs in the genes that encode two of the alternate PFLs: YbiW (A469S) and PflD (G513G) ([**Fig. 5**](#pgen-1004430-g005){ref-type="fig"}). Perturbations in pyruvate transformation are known to impact a key state variable in central metabolism: cellular redox balance. NADH accumulates in cells with high glycolytic flux because it cannot be re-oxidized as fast as it is generated. This increased redox ratio (NADH/NAD+) creates a cellular response reminiscent of anaerobiosis, stimulating the cell to direct pyruvate toward overflow metabolites and leading to repression of TCA cycle genes such as isocitrate dehydrogenase (*icd*) and citrate synthase (*gltA*) [@pgen.1004430-Vemuri1]. Given the relatively rapid uptake of glucose and higher rate of acetate production by CV103, stress in the form of high redox ratio may have influenced the evolution of this strain. NAD+ regeneration typically occurs downstream of pyruvate either via the TCA cycle or fermentation, but could also occur via the conversion of DHAP into glycerol (see section on glycerol metabolism below). Mutations in CV103 likely diminish flux through aerobic pathways {#s2l} ---------------------------------------------------------------- ([**Fig. 6**](#pgen-1004430-g006){ref-type="fig"}) The TCA cycle consists of eight steps beginning with the conversion of acetyl CoA to citrate and ending with the conversion of malate to oxaloacetate. Expression profiling of each evolved isolate showed that relative to their common ancestor, levels of transcripts for proteins involved in three of these steps (α-ketoglutarate dehydrogenase, succinate dehydrogenase and fumarase) were upregulated across all evolved strains. At two other steps, aconitase (*acnB*) and isocitrate dehydrogenase (*icdA*), transcript levels were elevated in three of four strains, but reduced in CV103. Whole-genome sequencing uncovered intergenic SNPs in CV103 that could impact flux at the *icd* branch point connecting the TCA cycle with the glyoxylate bypass. In the ancestral strain, JA122, the negative regulator of the glyoxylate bypass, *iclR*, has a promoter mutation that likely affects *iclR* negative autoregulation, leading to higher expression and concomitant repression of the glyoxylate shunt genes *aceA*, *aceB* and *aceK*. AceK negatively impacts flux through isocitrate dehydrogenase by phosphorylation, diverting carbon through isocitrate lyase (*aceA*) and malate synthase (*aceB*) ([**Fig. 6**](#pgen-1004430-g006){ref-type="fig"}; [@pgen.1004430-Cozzone1]). Thus, in the ancestor increased IclR can reasonably be expected both to decrease transcription of glyoxylate bypass enzymes and to prevent inactivation of Icd by AceK. While CV101 and CV116 exhibit increased relative expression of *icdA* and *acnB*, CV103 shows decreased expression of both, perhaps owing to a C→A mutation that lies between the *aceA* and *aceK* open reading frames. ![Gene expression and SNPs among loci in the TCA cycle and glyoxylate shunt.\ Loci that are part of the TCA cycle are associated with SNPs in CV103, CV115/CV116 and the ancestor JA122. Transcriptional profiling SAM analysis shows that many of the TCA cycle genes are up-regulated in the evolved strains relative to their comon ancestor, while two genes that control the TCA/glyoxylate switch point (*icd*, *acnB*) are expressed at a lower level in CV103. Blue colored genes are those that show variable expression among strains; normalized log~2~ expression ratios of the evolved strain relative to JA122 are shown in the inset table (for details see [Materials and Methods](#s3){ref-type="sec"}). Color coding and symbols are the same as for [Figures 2](#pgen-1004430-g002){ref-type="fig"}--[5](#pgen-1004430-g005){ref-type="fig"}. Stars and corresponding text denote the location and type of particular SNPs. Consistent with strain representations in [Figure 1](#pgen-1004430-g001){ref-type="fig"} light blue stars indicate ancestral mutations present in JA122, purple indicates SNPs in CV101, yellow indicates SNPs in CV103, green indicates those in CV115/116, brown indicates SNPs shared by CV101/CV103/CV115/CV116 and pink denotes SNPs shared by CV101 and CV115/116.](pgen.1004430.g006){#pgen-1004430-g006} Cellular pyruvate levels have long been thought to modulate TCA cycle flux, principally by modulating isocitrate deydrogenase activity ([**Fig. 6**](#pgen-1004430-g006){ref-type="fig"}, [@pgen.1004430-ElMansi1], [@pgen.1004430-elMansi1]). The CV103-specific mutations described above may also affect the pool of pyruvate. *lpd* mutants have been shown to increase Entner-Doudoroff and glyoxylate shunt activities and to decrease TCA cycle activity [@pgen.1004430-Li1], while *poxB* null mutations have been shown to repress citrate synthase and malate dehydrogenase, and to activate *acs* [@pgen.1004430-Li2]. CV103 contains mutations in the *lpd* FAD binding domain, which likely accounts for the 2--3 fold reduction of its pyruvate dehydrogenase activity, as well as a nonsense mutation at amino acid 14 of *poxB* (E14\*) that likely inactivates this protein (**[Table S2](#pgen.1004430.s002){ref-type="supplementary-material"}**). Together these mutations could be expected to impede flux through the TCA cycle in CV103. Conspicuous among genes differentially expressed between evolved strains and their ancestor, and among the evolved strains themselves, were those encoding respiratory proteins that have a high H+/O coupling ratio. When each was grown by itself in glucose-limited chemostats, transcript levels for genes in the *cyoABCDE* operon that encode cytochrome oxidase subunits were significantly increased in CV101 and CV115/116, but significantly decreased in CV103, relative to their common ancestor JA122 [@pgen.1004430-Kinnersley1]. Finally, CV103 also shows gene expression differences and mutations affecting the respiratory chain. Under conditions of nutrient stress, metabolic cost-benefit analyses predict *E. coli* will shift from the more efficient but anabolically expensive NADH:ubiquinone oxidoreductase I (*nuoABCEFGHIJKLMN*)/cytochrome bo oxidase (*cyoABCD*) chain to the anabolically inexpensive lower-yield NADH:ubiquinone oxidoreductase II (*ndh*)/cytochrome bd oxidase (*cydABX*) pairing [@pgen.1004430-Carlson1], [@pgen.1004430-Carlson2], [@pgen.1004430-Weidner1]. Compared with JA122, expression of *nuoGHIJKL* is 1.1-fold lower in CV103 but 1.3 to 1.5-fold higher in CV101, CV116 and CV115. Similarly, transcript levels of *cyoABC* are 2.1-fold lower in CV103 and 1.3 to 1.9-fold higher in the other evolved strains. As noted, CV103 also has missense mutations that affect NuoM (L336F) and NuoI (R93L) as well as a silent substitution in NuoE (L14L). The effect of these differences in expression and sequence of NDH-I and cytochrome bo oxidase is unknown, but they may impact cellular redox balance. In summary, by considering the whole genome sequencing data in the light of transcriptome [@pgen.1004430-Kinnersley1], proteome [@pgen.1004430-Kurlandzka1], and phenotype data [@pgen.1004430-Rosenzweig2] a coherent picture emerges of the dominant clone, CV103, being highly fermentative but impaired in aerobic pathways, resulting in the production of overflow metabolites, which in the case of acetate creates a redox imbalance, but in the case of glycerol/glycerol phosphate, may provide a means to correct this imbalance. Because the other consortium members, like their common ancestor, are respiro-fermentative they are capable of exploiting the new biochemical niches created by CV103. The genetics of clonal reinforcement {#s2m} ------------------------------------ ([**Fig. 3**](#pgen-1004430-g003){ref-type="fig"}) We previously showed that differential production and scavenging of acetate, glycerol and/or glycerol phosphate explained stable coexistence of multiple genotypes under glucose limitation [@pgen.1004430-Rosenzweig2], [@pgen.1004430-Treves1]. Concerning acetate, whose excretion by CV103 supports growth of CV101, whole genome re-sequencing confirmed previously identified mutations in CV101 that up-regulate acetyl CoA-synthetase (Acs) and the acetate transporter ActP, as well as an ancestral mutation shared by the other clones that prevents efficient re-uptake of acetate by disrupting a CRP regulatory site in the *acs* promoter [@pgen.1004430-Kinnersley1]. No additional mutations affecting acetate excretion or uptake were found in any of the evolved strains\' genomes, so it is likely that these two alone explain the ability of CV101 to cross feed on the acetate produced by CV103. Regarding glycerol and/or glycerol phosphate, previous experiments had shown that chemostat-grown CV116 assimilate radiolabeled glycerol 50% faster than all other strains, and that when CV116 and CV103 were co-cultured under glucose limitation, the addition of exogenous glycerol [@pgen.1004430-Rosenzweig2] or glycerol 3-phosphate caused the frequency of CV116 to increase. All of the evolved strains carry an ancestral mutation (G55A) in the DNA-binding transcriptional repressor, GlpR, that renders it constitutively inactive [@pgen.1004430-Elvin1]. We also discovered a CV116-specific SNP in *glpK* encoding glycerol kinase, the first step in glycerol assimilation (**[Table S2](#pgen.1004430.s002){ref-type="supplementary-material"}**), though this is a silent substitution at a site (G232G; GGC→GGA) not currently known to be associated with *glpK* regulation. Transcriptional profiling of GlpR regulated genes showed that the transcription unit containing glycerol kinase (*glpFKX*) remained at ancestral levels, while genes for the glycerol-3-phosphate:phosphate antiporter GlpT (*glpT*), and the divergently transcribed anaerobic glycerol-3-phosphate dehydrogenase genes (*glpABC*) were upregulated across all isolates relative to their common ancestor [@pgen.1004430-Kinnersley1]. The absence of differences in *glp* gene expression between CV103 and CV116 led us to explore the possibility that glycerol and/or glycerol phosphate cross-feeding might be mediated by other mechanisms controlling the assimilation and production of these metabolites. For example, post-transcriptional regulation in CV103 could explain why JA122, CV101 and CV116 have three-fold higher specific activity of glycerol kinase, and two-fold higher specific activity of glycerol-3-phoshate dehydrogenase than CV103 [@pgen.1004430-Rosenzweig2]. GlpK is known to be post-transcriptionally inactivated by the unphosphorylated version of the glucose-specific PTS enzyme IIA^Glc^ (*crr*), or by an excess of the effector molecule fructose-1,6-bisphosphate [@pgen.1004430-Deutscher1]--[@pgen.1004430-Zwaig1]. As described above, IIA^Glc^ is phosphorylated via its interaction with the sugar non-specific EI (*ptsI*)/HPr (*ptsH*) ([**Fig. 3**](#pgen-1004430-g003){ref-type="fig"}). When glucose is transported through the inner membrane by the Enzyme II^Glc^ complex (*ptsG*/*crr*), IIA^Glc^ (*crr*) transfers its phosphate to IIBC^glc^ (*ptsG*), which then phosphorylates glucose to yield intracellular glucose-6-phosphate (reviewed in [@pgen.1004430-Deutscher1]). High levels of unphosphorylated IIA^Glc^ signal glucose abundance, and inhibit enzymes needed for catabolism of alternate carbon sources such as glycerol and glycerol phosphate. Specifically, unphosphorylated IIA^Glc^ is known to inhibit glycerol kinase activity [@pgen.1004430-Deutscher1], [@pgen.1004430-Novotny1], [@pgen.1004430-deBoer1]. We have already noted two mutations in CV103 *ptsI*, which, by impairing EI, could lead to excess unphosphorylated IIA^Glc^, which would inhibit glycerol kinase ([**Fig. 3**](#pgen-1004430-g003){ref-type="fig"}), and thereby restrict CV103\'s access to glycerol. CV103 may also have an excess of another potent glycerol kinase inhibitor: fructose-1,6-bisphosphate (FBP) [@pgen.1004430-Zwaig1], [@pgen.1004430-Lin2]. We previously noted that relative to JA122 and the other evolved isolates, CV103 has enhanced expression of *pfkB*, which encodes the minor FBP creating enzyme, and lower levels of *fbp*, which encodes the reverse enzyme fructose bisphosphatase [@pgen.1004430-Kinnersley1]. Whole-genome sequencing revealed a missense mutation of unknown effect in *pfkB* (Q201H). These distinctive features of CV103, combined with its demonstrated capacity for enhanced glucose transport and assimilation, may produce elevated levels of the GlpK inhibitor, FBP, further impeding CV103\'s ability to assimilate glycerol. To understand why CV103 might release glycerol and/or glycerol phosphate as metabolic by-products, we examined the transcript levels and sequences of genes encoding proteins involved in their production ([**Fig. 3**](#pgen-1004430-g003){ref-type="fig"} and [**Fig. 7**](#pgen-1004430-g007){ref-type="fig"}). Glycerol can be generated by *E. coli* as either (1) a by-product of phospholipid synthesis from sn-glycerol-3-phosphate, (2) an end-product of the detoxification of dihydroxyacetone phosphate/methylglyoxal, or (3) via hydrolysis of glycerol-1-phosphate [@pgen.1004430-Subedi1]. CV103 has multiple mutations that affect nearly every step of phospholipid biosynthesis ([**Fig. 7A**](#pgen-1004430-g007){ref-type="fig"}). While the number of SNPs suggests CV103 reaps some benefit from altering phospholipid production, these mutations should also have the effect of restricting glycerol and phospholipid formation from glycerol-3-phosphate. The second route to glycerol, detoxification of DHAP/methylglyoxal, is catalyzed by the reversible glycerol dehydrogenase GldA ([**Fig. 7B**](#pgen-1004430-g007){ref-type="fig"}). This reaction is likely to be useful for a strain such as CV103 that is consuming glucose at a high rate, because it prevents the buildup of DHAP and subsequent production of toxic methylglyoxal and, significantly, because it re-oxidizes NADH [@pgen.1004430-Subedi1], [@pgen.1004430-Applebee1]. CV103 may also have higher amounts of intracellular DHAP and methylglyoxal as a consequence of a non-synonymous mutation (A6D) in the gene for glycerol-3-phosphate dehydrogenase GpsA, which favors the production of DHAP from G3P ([**Fig. 3**](#pgen-1004430-g003){ref-type="fig"} and [**7**](#pgen-1004430-g007){ref-type="fig"}). No SNPs affecting GldA were found, and *gldA* transcript levels were not up- or downregulated in any of the isolates. The third mechanism for the production of glycerol is via the activity of the enzyme YfbT. YfbT catalyzes the conversion of glycerol-1-phosphate into glycerol and its gene is truncated in CV103 (E22\*), resulting in a defect likely expected to increase the pool of glycerol phosphate but not glycerol [@pgen.1004430-Lindner1]. ![SNPs in genes involved phospholipid biosynthesis and that contribute to glycerol synthesis.\ Three possible routes to the production of glycerol in *E. coli* are shown along with corresponding gene names and SNPs. CV103 carries mutations that affect (A) phospholipid biosynthesis (B) the interconversion of glycerol-3-phosphate and glycerol and (C) the interconversion of glycerol-1-phosphate and glycerol. A red color denotes elevated monoculture transcript levels while grey denotes no change in transcript level. Stars (★) and corresponding text denote the location and type of particular SNPs. Consistent with strain representations in [Figure 1](#pgen-1004430-g001){ref-type="fig"} light blue stars indicate ancestral mutations present in JA122, purple indicates SNPs in CV101, yellow indicates SNPs in CV103, green indicates those in CV115/116, brown indicates SNPs shared by CV101/CV103/CV115/CV116 and pink denotes SNPs shared by CV101 and CV115/116.](pgen.1004430.g007){#pgen-1004430-g007} In short, there are multiple, non-mutually exclusive reasons to explain why CV103 has both a diminished capacity to assimilate glycerol as well as an increased propensity to produce glycerol and/or glycerol phosphate as overflow metabolites. Clonal reinforcement drives the evolution of biocomplexity {#s2n} ---------------------------------------------------------- Biocomplexity, here defined as stable co-existence of multiple genotypes, can emerge in clonal populations evolving in environments that are spatially structured with respect to their physical features [@pgen.1004430-Rainey1], [@pgen.1004430-Rainey2] or temporally structured with respect to availability of limiting nutrients [@pgen.1004430-Rozen1], [@pgen.1004430-Herron1], [@pgen.1004430-Rozen3]. Under these conditions, the emergence of complexity can be explained in terms of classical niche theory [@pgen.1004430-Levine1]. Biocomplexity can also emerge in clonal populations evolving in simple, unstructured environments where reproduction is continuously limited by a single resource [@pgen.1004430-Helling1], [@pgen.1004430-Kao1], [@pgen.1004430-Maharjan3], [@pgen.1004430-Maharjan6]. There, population genetic complexity can be maintained by clonal interference, wherein competitive interactions preclude fixation of a fittest genotype [@pgen.1004430-Kao1], or by clonal reinforcement where one clone supports growth by others via the excretion of metabolizable substrates [@pgen.1004430-Helling1]. Our results bear out certain predictions arising from Mazancourt and Schwartz\'s resource ratio theory of cooperation [@pgen.1004430-deMazancourt1]. In their model, two species initially competing for two resources can evolve towards a cooperative trading relationship one of whose emergent properties is enhanced resource utilization. Conditions that favor this outcome include low mortality, low resource levels and differential efficiency between species at depleting limiting resources. Our community evolved under similar conditions: clonal lineages persisted for many generations under chronic resource limitation and gained differential access to available resources. Two differences between their model and our system are that our population was founded by a single clone initially limited on one resource, and that the mutations which gave one of its descendants preferential access to that resource have pleiotropic effects that favor production of secondary resources on which other clones can thrive. As for when this genotype arose, we know by PCR analysis that key CV103-specific mutations at *malK*, *mutM*, *ptsI*, *hfq* and *lpd* are present in the earliest Helling et al. [@pgen.1004430-Helling1] population sample archived (∼350 generations) (data not shown). Clonal reinforcement is driven by the genotype best able to acquire the limiting resource {#s2o} ----------------------------------------------------------------------------------------- A category of mutations certain to prove beneficial under nutrient limitation is one that favors increased uptake of the limiting nutrient, in this case glucose. Levels of residual glucose in steady state CV103 monocultures are significantly lower than in those of the other evolved strains and their common ancestor [@pgen.1004430-Rosenzweig2], consistent with CV103\'s more rapid uptake of the non-metabolizable glucose analogue α-MG [@pgen.1004430-Helling1] and its higher expression of LamB glycoporin [@pgen.1004430-Kurlandzka1]. The amino acid substitution in MalK (D297E) likely diminishes its ability to deactivate MalT and, by extension, activates *lamB* expression. A mutation in Hfq (Q52H), that may negatively affect translation of the stress response global regulator RpoS, would enhance glucose scavenging via LamB and PtsG [@pgen.1004430-Updegrove1], [@pgen.1004430-Updegrove2]. The evolution of a superior resource acquisition strategy results in trade-offs {#s2p} ------------------------------------------------------------------------------- Because glucose consumption in most organisms, including *E. coli*, is greater under anaerobic than under aerobic conditions (e.g., [@pgen.1004430-Ko1] and refs within), and because enhanced glucose consumption is an adaptive strategy selected for in glucose-limited chemostats, it is perhaps not surprising that, relative to the other evolved clones and their common ancestor, the metabolic profile of CV103 appears to be fermentative. Multiple lines of evidence support this interpretation: (i) TCA cycle genes encoding aconitase (*acnB*) and isocitrate dehydrogenase (*icd*) are downregulated ([**Fig. 6**](#pgen-1004430-g006){ref-type="fig"}), (ii) expression of the *cyoABCD* operon encoding cytochrome oxidase is reduced [@pgen.1004430-Kinnersley1], (iii) multiple mutations suggest CV103 is dealing with excess formate production (**[Table S4](#pgen.1004430.s004){ref-type="supplementary-material"}**), and (iv) steady state chemostats of CV103 contain appreciable residual concentrations of overflow metabolites [@pgen.1004430-Helling1], [@pgen.1004430-Rosenzweig2]. While we found no CV103-specific mutations that would constitutively repress aerobic pathways, missense mutations at *lpd* and *maeA*, and a nonsense mutation at *poxB* could be expected to diminish TCA cycle flux. Moreover, increased glucose consumption by *E. coli* under glucose limitation has been shown to repress both respiration and the TCA cycle via changes in global regulators such redox balance and pyruvate [@pgen.1004430-Vemuri1]. High glucose consumption also strongly represses transcription of *acs* encoding acetyl CoA synthetase [@pgen.1004430-Vemuri1], which helps to explain why no activity of this acetate scavenging enzyme can be detected in CV103 monocultures [@pgen.1004430-Rosenzweig2], and why extracellular acetate is present at a dilution rate (D = 0.2 h^−1^) where none is expected. We therefore conclude that CV103\'s fermentative metabolism arises as a consequence of selection for enhanced glucose consumption. The CV103 lineage\'s response to selection for enhanced glucose consumption results in trade-offs that critically determine its role in niche construction. At lower dilution rates *E. coli* growing under aerobic glucose-limitation usually carries out a high-yield metabolism that converts all available glucose to CO~2~ ([@pgen.1004430-vanHoek1] and refs therein). Indeed, under aerobic conditions the switch from respiratory to respiro-fermentative metabolism typically occurs at high growth rates and glucose concentrations, resulting in the production of overflow metabolites such as acetate. (Under anaerobic conditions, *E. coli* typically ferments all glucose to CO~2~, acetate and ethanol [@pgen.1004430-Tempest1].) The excretion of overflow metabolites under conditions of restricted TCA flux creates an imbalance in cellular redox, because acetate production in *E. coli*, unlike ethanol production in yeast and lactate production in animals, fails to regenerate NAD+ from the NADH formed by glycolysis. In CV103 this problem may be further exacerbated by mutations affecting pyruvate transformation, which would place an additional premium on NAD+-generating processes, including reactions that lead to glycerol and glycerol-3-phosphate production. Concerning the apparent pleiotropic effects arising from constitutively high glucose consumption in the CV103 background, it interesting to note that a recently discovered mechanism to limit the production of overflow metabolites is to overexpress the small RNA SgrS, which effectively reduces the rate of glucose consumption [@pgen.1004430-Negrete1]. SgrS, complexed with its binding partner, diminishes cells\' ability to create new sugar transporters, in particular PtsG [@pgen.1004430-Kawamoto1]. In CV103 the binding partner of SgrS, Hfq, has a missense mutation (Q52H), which may contribute to its rapid uptake, but incomplete assimilation of glucose. The glucose scavenging adaptations seen in CV103, which contribute to its persistence and its ability to create new niches, contrasts with metabolic adaptations commonly observed in experimentally evolved yeast [@pgen.1004430-Wenger1]. Yeast cultured at similar dilutions rates adapt to aerobic glucose limitation by reversing the Pasteur effect, switching from fermentative to respiratory metabolism, which results in an enormous gain in their reproductive output. While yeast evolution experiments typically begin with populations that produce appreciable amounts of overflow metabolites, mainly ethanol, strains quickly evolve a metabolic strategy that produces essentially no residual carbon [@pgen.1004430-Wenger1], [@pgen.1004430-Piotrowski1]. This difference in the adaptive trajectory followed by the two species is grounded in fundamental differences in their metabolism, which may preclude evolution of cross-feeding in yeast cultured under glucose limitation. The cost paid by one genotype to acquire the limiting resource opens up new niches for others {#s2q} --------------------------------------------------------------------------------------------- Superior glucose consumption by the largely fermentative strain CV103 helps to create multiple resources in an environment where initially only one was limiting, thereby providing a selective advantage to genotypes that can access those secondary resources. The mechanism by which strain CV101 gains preferential access to acetate is straightforward and relates to insertion of an IS*30* element in the upstream regulatory region of *acs* encoding the acetate-scavenging enzyme acetyl CoA synthetase [@pgen.1004430-Treves1]. The *acs* locus is misregulated in the ancestral background due to a mutation in the CRP binding site. Indeed, we observed appreciable amounts of acetate in JA122 monocultures at steady state [@pgen.1004430-Rosenzweig2], making it likely that selection pressure for acetate scavenging existed at the outset of these experiments. This pressure only increased with the advent of the CV103 lineage, which evolved a superior mechanism for glucose consumption, but which produces even more acetate because it retains the ancestral defect, and because increased flux through fermentative pathways represses *acs* transcription. The basic CV103 phenotype is additionally supported by mutations, in particular those related to pyruvate oxidation (e.g. *lpd*), that accentuate changes in redox potential typical of fermentative cells whose overflow metabolite is acetate. These changes likely favor the formation of glycerol through side-reactions whose dehydrogenase steps help regenerate NAD+. CV116 has preferential access to this other metabolite because it retains two ancestral mutations: one in *acs* that impairs acetate scavenging, and another in *glpR* that constitutively derepresses enzymes required for glycerol and glycerol phosphate assimilation. By contrast, CV103 likely has limited access to these resources because it has accumulated mutations in *ptsI* and *pfkB*, whose downstream effects include inhibition of glycerol kinase, the rate-limiting step in glycerol assimilation. Reinforcement may underlie clonal diversity in the laboratory and in nature {#s2r} --------------------------------------------------------------------------- The evolution and persistence of multiple genotypes in a population of asexual organisms supported by a single resource seems to violate the principles of competitive exclusion [@pgen.1004430-Gause1], [@pgen.1004430-Hardin1] and periodic selection [@pgen.1004430-Muller1], [@pgen.1004430-Crow1]. Yet this phenomenon has now been observed in a variety of simple experimental systems, in particular those that are temporally [@pgen.1004430-Rozen1], [@pgen.1004430-LeGac2] or spatially structured [@pgen.1004430-Rainey1], [@pgen.1004430-Rainey2]. Although continuous nutrient-limited chemostats are unstructured in both respects, a number of studies have now shown that multiple bacterial lineages, some of them mutators, can arise and coexist in a single chemostat vessel [@pgen.1004430-Helling1], [@pgen.1004430-NotleyMcRobb1], [@pgen.1004430-Maharjan2], [@pgen.1004430-Maharjan3], [@pgen.1004430-NotleyMcRobb4], [@pgen.1004430-Jezequel1]. However, none of these studies have provided evidence that biocomplexity can arise and be sustained by means of the trading relationships we call clonal reinforcement. We contend that this mechanism may be quite common, as it is formally analogous to and may sometimes be a precursor to syntrophy, a ubiquitous feature of natural bacterial communities [@pgen.1004430-Morris1]. Clonal reinforcement may also be at work in clinically relevant environments. For example, the dominant clones in tumors are often fermentative, differing markedly from normal (ancestral) tissue in their demand for O~2~ and nutrients, their production of CO~2~ (see [@pgen.1004430-Seyfried1] and refs therein), and in their release of overflow metabolites that acidify the local environment [@pgen.1004430-Vaughan1]. Such cells may create opportunities for subpopulations to follow independent evolutionary trajectories that lead to further genetic differentiation, perhaps even to changes in their contact inhibition and drug resistance phenotypes. Chronic bacterial infections are also genetically heterogeneous [@pgen.1004430-Ciofu1], and can even be supported by syntrophic interactions [@pgen.1004430-Qin1]. We may therefore reasonably ask: to what extent does clonal reinforcement enable subpopulations in tumors and chronic infections to differentiate and become more resistant to chemotherapy and/or less visible to the immune system? The answers to these questions have far-reaching implications. Materials and Methods {#s3} ===================== Strains, media and culture conditions {#s3a} ------------------------------------- *Escherichia coli* JA122, CV101, CV103, CV115 and CV116 were maintained as permanent frozen stocks and stored at −80°C in 20% glycerol. Davis Minimal medium was used for all liquid cultures with 0.025% glucose added for batch cultures and 0.0125% for chemostats [@pgen.1004430-Helling2]. Chemostat cultures were initiated using colonies picked from Tryptone Agar (TA) plates and outgrown in Davis minimal batch medium overnight. For transcriptional profiling, total protein and metabolite assays chemostats were maintained at 30°C with a dilution rate of ≈0.2 h^−1^ for approximately 70 hours (∼15 generations). At the end of each chemostat run, three aliquots of 50 mL culture were rapidly filtered onto 0.2 µm nylon membranes, flash-frozen in liquid nitrogen and stored at −80°C. Mutation rate determination {#s3b} --------------------------- Strains were streaked to colonies on LB agar overnight. Twelve colonies were picked in their entirety for each strain and inoculated into 3 mL of liquid LB, then grown overnight at 37°C. Subsequently, a portion of the liquid cultures was spread on LB plates containing 300 µg mL-1 rifampicin. Colonies were counted 48 h after spreading. To determine the titer, three cultures for each strain were spread on LB agar plates at 10^−7^, 10^−8^ and 10^−9^ dilutions. Colonies were counted and titers determined as the average of the three 10^−8^ dilutions. Mutation rates per cell per generation were calculated using maximum likelihood calculator FALCOR (<http://www.keshavsingh.org/protocols/FALCOR.html>) [@pgen.1004430-Sarkar1]. Pyruvate assays {#s3c} --------------- Following fast filtration and disruption by sonication intracellular pyruvate was determined on chemostat-grown cells using the Pyruvate Assay kit and PicoProbe (Biovision, Milpitas, CA, K609 and K317) as directed by the manufacturer\'s guidelines. Estimated values were normalized to cell protein, which was determined via the Pierce BCA Protein Assay Kit (Cat. \# 23227, Thermo Scientific, Rockford, IL) using BSA as standard. Transcriptional profiling {#s3d} ------------------------- Global gene profiling was described in detail in a previous publication [@pgen.1004430-Kinnersley1]. Briefly, total RNA was extracted from triplicate cultures of chemostat-grown JA122, CV101, CV103 and CV116 (D = 0.2 h^−1^, 0.0125% glucose) and hybridized to full-length open reading frame PCR products spotted onto aminosilane-coated slides. Raw data was analyzed using TIGR MIDAS and MeV software pipelines ([www.tm4.org](http://www.tm4.org)) and Significance Analysis of Microarrays (SAM) [@pgen.1004430-Tusher1] was used to examine expression differences between strains using a multi-class comparison consisting of four groups. Similarities among strains were identified using one-class SAM and differences between the strains were examined using a 4-class SAM. δ cutoffs were set at the 0% FDR threshold (i.e. the highest δ value that gave a median false discovery rate of 0%). Average (mean) log~2~ ratios were calculated after SAM analysis using Microsoft Excel and represent the relative expression ratios of each evolved isolate compared to their common ancestor. Nucleic acid extraction {#s3e} ----------------------- Genomic DNA for Illumina sequencing was extracted from cells grown in batch culture using a modification of methods described by Syn and Swarup [@pgen.1004430-Syn1]. Subsequent to DNA precipitation, spun pellets were re-suspended in 1XTE (10 mM Tris, 1 mM EDTA, pH 8.0) containing 50 µg/mL DNAse-free RNAse A and incubated at 37°C for 30 minutes. Samples were re-extracted once with phenol:chloroform (3∶1), once with phenol:chloroform (1∶1) and twice with chloroform and then precipitated with EtOH using standard techniques. Following re-precipitation, DNA was dissolved in TE. Illumina sequencing {#s3f} ------------------- Single-end 36 bp sequencing libraries were created using the Illumina Genomic DNA Sample Prep Kit according to manufacturer\'s instructions (5 µg input genomic DNA), and sequencing flow cells were prepared using the Illumina Standard Cluster Generation Kit. Samples were sequenced on the Illumina Genome Analyzer II, and image analysis and data extraction were performed using Illumina RTA 1.5.35.0. Reads (with qualities) were aligned to the K12 reference genome (gi\|49175990\|ref\|NC_000913.2) using BWA v0.5.8 [@pgen.1004430-Li3] with default parameters. Whole-genome pileup files were generated using SAMtools v0.1.8--18 [@pgen.1004430-Li4] and single-nucleotide polymorphisms due to the evolution were called using custom perl scripts that compared each evolved strain with the original ancestor. Briefly, SNPs passed the filter if they were represented in at least 40% of reads in the evolved strain and at most 10% in the reference strain, with at least 5 reads covering the position in both strains. Additional heuristic filters included a confirming read from both strands, and no more than one ambiguous SNP call ("N") or deletion ("\*") at that position. Insertions and deletions relative to the K12 reference sequence were identified using Breseq v. 0.18 with default parameters (<http://barricklab.org/breseq>; [@pgen.1004430-Barrick1]). Sanger sequencing {#s3g} ----------------- Thirty-seven SNPs identified by Illumina sequencing were verified by Sanger sequencing. PCR products were generated using Fermentas DreamTaq PCR Master Mix (Thermo Scientific, Waltham, MA) following manufacturer\'s instructions, treated with ExoSAP-IT (Affymetrix, Santa Clara, CA) and sequenced on an ABI3730XL machine by High Throughput Genomics Center (Seattle, WA) (**[Table S5](#pgen.1004430.s005){ref-type="supplementary-material"}**). Supporting Information {#s4} ====================== ###### Genes and transcription units (T.U.) affected by more than one mutation. (PDF) ###### Click here for additional data file. ###### All mutations. (PDF) ###### Click here for additional data file. ###### Intracellular pyruvate. (PDF) ###### Click here for additional data file. ###### Mutations associated with formate metabolism. (PDF) ###### Click here for additional data file. ###### SNP verification primers. (PDF) ###### Click here for additional data file. The authors gratefully acknowledge helpful discussions with Tom Ferenci and Ivana Gudelj, thank Matt Herron and Karen Schmidt for critically reading the manuscript, and Jacob Childress for assisting with fluctuation tests. [^1]: The authors have declared that no competing interests exist. [^2]: Conceived and designed the experiments: MK JW GS FR. Performed the experiments: MK JW EK. Analyzed the data: MK JW EK GS FR. Contributed reagents/materials/analysis tools: GS. Wrote the paper: MK JW EK JA GS FR.
Thousands of violators could be removed from sex offender registration by MICHAEL GORSEGNER Thousands of violators could be removed from sex offender registration HARRISBURG, Pa — Pennsylvania legislators are on the clock to fix a sex offender registration statute or thousands of violators could come off the list. The House Judiciary Committee met at the State Capitol this morning to update the status. The Pennsylvania Supreme Court recently ruled that a Cumberland County case that applied the sex offender registration retroactively is unconstitutional. If the laws don't change thousands of offenders might be free to go. "I do think there is some urgency with the legislature. Obviously, there is a lot of work that has to be done over here," said Cumberland County District Attorney Dave Freed. "So, what we are here doing today along with the Pennsylvania State Police it's sort of laying out where we think things stand, I'm making some suggestions on where the legislature can go." Freed's office is appealing the case to the U.S. Supreme Court. In the meantime, legislators are working with similar legislation from states like Alaska to try and change the current laws.
/* * Copyright (c) 2000-2003 Apple Computer, Inc. All rights reserved. * * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ * * This file contains Original Code and/or Modifications of Original Code * as defined in and that are subject to the Apple Public Source License * Version 2.0 (the 'License'). You may not use this file except in * compliance with the License. The rights granted to you under the License * may not be used to create, or enable the creation or redistribution of, * unlawful or unlicensed copies of an Apple operating system, or to * circumvent, violate, or enable the circumvention or violation of, any * terms of an Apple operating system software license agreement. * * Please obtain a copy of the License at * http://www.opensource.apple.com/apsl/ and read it before using this file. * * The Original Code and all software distributed under the License are * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. * Please see the License for the specific language governing rights and * limitations under the License. * * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ */ /* * @OSF_COPYRIGHT@ */ /* * Mach Operating System * Copyright (c) 1991,1990,1989 Carnegie Mellon University * All Rights Reserved. * * Permission to use, copy, modify and distribute this software and its * documentation is hereby granted, provided that both the copyright * notice and this permission notice appear in all copies of the * software, derivative works or modified versions, and any portions * thereof, and that both notices appear in supporting documentation. * * CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS "AS IS" * CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR * ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE. * * Carnegie Mellon requests users of this software to return to * * Software Distribution Coordinator or [email protected] * School of Computer Science * Carnegie Mellon University * Pittsburgh PA 15213-3890 * * any improvements or extensions that they make and grant Carnegie Mellon * the rights to redistribute these changes. */ /* */ subsystem #if KERNEL_USER KernelUser #endif notify 64; #include <mach/std_types.defs> #if SEQNOS serverprefix do_seqnos_; serverdemux seqnos_notify_server; #else /* !SEQNOS */ serverprefix do_; serverdemux notify_server; #endif /* SEQNOS */ /* MACH_NOTIFY_FIRST: 0100 */ skip; /* MACH_NOTIFY_PORT_DELETED: 0101 */ simpleroutine mach_notify_port_deleted( notify : mach_port_move_send_once_t; #if SEQNOS msgseqno seqno : mach_port_seqno_t; #endif /* SEQNOS */ name : mach_port_name_t); #if (KERNEL_USER | MACH_NOTIFY_SEND_POSSIBLE_EXPECTED) /* MACH_NOTIFY_SEND_POSSIBLE: 0102 */ simpleroutine mach_notify_send_possible( notify : mach_port_move_send_once_t; #if SEQNOS msgseqno seqno : mach_port_seqno_t; #endif /* SEQNOS */ name : mach_port_name_t); #else skip; #endif skip; /* was NOTIFY_OWNERSHIP_RIGHTS: 0103 */ skip; /* was NOTIFY_RECEIVE_RIGHTS: 0104 */ /* MACH_NOTIFY_PORT_DESTROYED: 0105 */ simpleroutine mach_notify_port_destroyed( notify : mach_port_move_send_once_t; #if SEQNOS msgseqno seqno : mach_port_seqno_t; #endif /* SEQNOS */ rights : mach_port_move_receive_t); /* MACH_NOTIFY_NO_SENDERS: 0106 */ simpleroutine mach_notify_no_senders( notify : mach_port_move_send_once_t; #if SEQNOS msgseqno seqno : mach_port_seqno_t; #endif /* SEQNOS */ mscount : mach_port_mscount_t); /* MACH_NOTIFY_SEND_ONCE: 0107 */ simpleroutine mach_notify_send_once( notify : mach_port_move_send_once_t #if SEQNOS ; msgseqno seqno : mach_port_seqno_t #endif /* SEQNOS */ ); /* MACH_NOTIFY_DEAD_NAME: 0110 */ simpleroutine mach_notify_dead_name( notify : mach_port_move_send_once_t; #if SEQNOS msgseqno seqno : mach_port_seqno_t; #endif /* SEQNOS */ name : mach_port_name_t); /* vim: set ft=c : */
"Go to her." Luke said again. Lorelai swiftly left the room and questioned nothing about it. "I don't blame you for sending her away." Matthew said lightly. "I'd be embarrassed too." Matthew grabbed a knife from his pocket. Luke stood still, not flinching. "Do you need that?" Luke asked. "Something to hide behind?" "I'm not hiding behind a knife." Matthew spat. "I'm going to use it as a weapon." "You're using it as a shield." Luke replied. Matthew breathed deeply. "Alright... Mr. Tough Guy. We'll do it your way." Matthew threw the knife to the other side of the room. He lunged towards Luke, but Luke quickly stepped out of the way and came back with a powerful uppercut. "I like things my way." Luke responded after knocking Matthew on his back. Matt quickly jumped to his feat and took yet another swing at Luke. A miss. Another swing and miss. Another and another. Luke punched Matthew several times in the face and then one powerful time in the stomach leaving him hunched over and bloody. Luke chuckled. "You want the knife back?" he asked. Anger filled Matthew. He hated being teased. "You know, I think I actually have something a little better." Matthew reached into his coat and pulled out a hand gun. Luke still didn't show any sign of fear. Matthew aimed it directly at Luke's heart. "Want know how it feels to be shot through the heart?" Matthew asked. "FREEZE!.. NYPD!" An officer shouted. Matthew quickly turned his head to see who was yelling from behind him, when he did so Luke grabbed the gun and wrestled Matthew to the ground. A shot was fired into the air but hit nothing but the ceiling tile above them. The police swarmed the two men and quickly drug Matthew away. Cook walked over to Luke who was relieved, but holding back all his emotions for the time being. "Good work Danes. Ever thought about a job in the police force?" "No thank you." Luke replied lightly. "I'll stick to my diner." "Looks like you helped a little more than expected huh?" "Guess so." Luke handed the gun to Cook and started to walk of but noticed Joe standing beside one of the cops. Instead he changed his destination. "Joe?" He asked surprisingly as he walked towards him. "What are you doing here?" "Hey, Luke." Joe replied calmly. "Well, this is my job." "You're a cop?" Luke asked amazed. "Sure am." Joe smiled. "You never told me that." "You never asked." Joe replied. "Good point." Luke retorted. "I'll see you back home." Joe said cheerfully. "I won't be much longer here." "Oh, I'll be staying here with Lorelai and Rory tonight." "Oh? How are they?" "They're good." Luke nodded. "Good. Tomorrow then." Joe ended. "Tomorrow." Luke repeated. Luke turned and headed back in the direction of Rory's room. (Outside the hospital) "Joe, you back stabbing, two faced...!" Matthew roared from inside the cop car. "Sorry, little brother." Joe replied as he walked on by the car and down the street. (Rory's room) "Luke..." Lorelai ran towards him when he entered the door. He hugged her and kissed her softly. "Please tell me this is all over." she said with her head buried in his chest. "It's all over." Luke told her. "Did he hurt you?" she asked standing back to examine him. "Not at all." Luke smiled. "Like I said, just a bully." Luke looked over at Rory who was fast asleep in her bed. "You didn't wake her?" he asked. "No." Lorelai replied. "For once, she was finally resting... really resting. I didn't want to ruin it for her." Lorelai said gazing at her pale face. Luke walked over and pulled the covers up over Rory. "She's an incredibly strong kid." (Christmas the following year at the Gilmore house) "God... I love snow." Lorelai said to herself as she stood on her porch. Luke came up behind her and wrapped his arms around her waste. "God... I love you." She smirked. "Come on, we're getting ready to open gifts." Luke smiled as he held out his hand. "Just a minute." she said as she continued to gaze at the snow. "This moment is perfect." "Tell me." Rory pleaded. "I can still acted surprised when I open it." She giggled. "That doesn't work that way." Tristan laughed. "Who's going to know any better?" Rory asked. "I will." Tristan replied. "But I'll tell you what, I will give you one gift early."
Afternoon everyone, Gráinne Ní Aodha here listening in on the questions being put to the government this week. If you have any thoughts, comments, or opinions, you can leave a comment below or tweet us @thejournal_ie. More expensive stamps could close post offices, Ireland’s overall amount of international aid has fallen, and Enda Kenny “doesn’t look like the man” to stop renting prices from rising, are the things TDs were concerned about today. The main issue for today was requests from Mícheál Martin, Enda Kenny and Brendan Howlin for Sinn Féin leader Gerry Adams to make a statement in the Dáil tomorrow about the Brian Stack murder investigation. The Cathaoirleach said it was up to the party whips to decide a time.
The present invention relates to underwater buoyancy apparatus of the kind having an expansible gas pocket for providing the required buoyancy, which apparatus is referred to hereinafter as "expansible buoyancy apparatus". The invention has particular, but not exclusive, application to diver's lifejackets, dry suits, and underwater lifting bags. The buoyancy of expansible buoyancy apparatus is provided initially by admitting gas, usually air, to the gas pocket of the apparatus. In a diver's lifejacket, the gas pocket usually is constituted by a closed flexible container which is inflated by the gas. The flexible nature of the container permits of expansion of the gas within the container. Lifting bags usually comprise an open-ended flexible bag into which the gas is admitted. In some cases, the whole bag can constitute the gas pocket in similar manner to a lifejacket. However, in other vases the gas pocket can be consituted by the volume occupied by a gas defined between the bag and water contained in the bag. In the latter case, expansion of the gas pocket to displace water through the open end of the bag. It is difficult to control the ascent of expansible buoyancy apparatus because the progressive decrease in water pressure upon ascent of the apparatus causes progressive expansion of the gas chamber and hence a progressive increase in buoyancy, which in turn causes accelerated ascent of the diver or article to which the buoyancy apparatus is attached. This is a particular problem in the case of lifting bags where acceleration of the bag and the article being lifted constitutes a significant risk to those operating the lifting bags. A device intended to vent excess buoyancy from a lifting bag is described as part of a hover control system in U.S. Pat. No. 3,659,299 (Davidson et al.). Davidson provides a venting valve mounted on the top of a lifting bag and intended to be opened by dynamic pressure of water caused by upward movement of the bag in water deflecting a diaphragm mechanically linked to the valve member of the venting valve. The venting valve is biassed shut by a spring of adjustable tension. In practice, the magnitude of the dynamic pressures needed to open the venting valve taught by Davidson means that the valve will not open to produce venting until the upward velocity of the bag is already excessive and the venting produced may in those circumstances not be fast enough to control the ascent. Davidson's apparatus will not in fact produce the hovering action he describes. U.S. Pat. No. 2,887,976 describes the use of a diaphragm exposed on one side to ambient water pressures as a means of sensing static pressure and operating a venting system to maintain pressure differential between a ballast tank and ambient within a permitted range. The static pressure sensor can be used to act directly on the venting valve because the forces available are greater than when sensing the dynamic pressure produced by ascent of a lift bag or lifejacket. Of course, the role played by the static pressure sensor in the apparatus of Hanna could not be played by a dynamic pressure sensor and Hanna's apparatus could not function if a dynamic pressure sensor were used.
Customer Testimonials Testimonial by Derek H. Wood (Mr.) Testimonials Received my completed order today Excellent service Many thanks ... Read more... Arthur Moutrey Well pleased with the Gaslow kit and the speed of despatch. Already left a review which is up on your site now. Be back for more stuff in the future. All the best Dave. ... Read more... Dave Hoyles Hi David, Just wanted to say that your a credit to on-line traders. Your communication on the progress of the transaction and speed of delivery was second to none. Thanks & will definitely return to your site. Rgrds, Michael Snape. ... Read more...
As a Teamsters representative, Rick Armstrong, a former Raleigh police officer, said he expects the city to back the officers involved. "It's part of the process that the chief and the mayor come out and publicly support what these officers did and educate the public on the importance of listening to what police officers have to say when they ask you to do something," he said. "This would have not happened if this individual had listened to what these officers asked him to do. We would not be in this situation." In the video, Hall can be seen swinging at officers, sometimes hitting them. When one officer fired a taser, the swings kept coming. Once on the ground, an officer could be seen kicking Hall. Police say that only happened after he bit an officer's leg. Court documents show he is accused of assaulting five officers -- injuring four of them. He also faces a variety of other charges after police say he abandoned his car in the middle of the road. They also thought he might be impaired. Over the weekend, his family said he has suffered from mental illness for years. He has been arrested numerous times since 1991 and has been charged before with resisting arrest and assaulting police officers. On Monday, a Raleigh detective, who is president of the Raleigh Police Protective Association, said he understands the public response on both sides of the issue. "Those situations draw an emotional response from the community especially from people who are not from a law enforcement background who may not understand the full totality of the circumstances that they are viewing," said Matt Cooper."Sometimes they are viewing just a portion of the whole situation. And that's why we would like people to look at the whole situation from front to back, from beginning to end and then draw your own conclusions as to whether or not law enforcement acted appropriately."
Despite losing decade, fans swarm Lions practice DETROIT (AP) — Supporting the Detroit Lions hasn't been easy during the last decade. It's sort of like being the parent of a habitual 'D' student. But that didn't stop 17,000 fans from swarming Saturday's open practice and autograph session at Ford Field. Coach Jim Schwartz says he appreciates the support and believes Detroit has a solid group of players. Defensive end Kyle Vanden Bosch was signed as a free agent and tackle Corey Williams arrived in a trade during the offseason. The Lions also drafted tackle Ndamukong Suh, bolstering what Schwartz hopes will be a disruptive front four. Detroit posted the league's first-ever 0-16 record during the 2008 season, then went 2-14 after rookie quarterback Matthew Stafford arrived.
Obesity, Diabetes Threaten Economic Health: Saudi Minister Riyadh, Saudi Arabia – Obesity and diabetes threaten Gulf states’ economic health as well as human wellbeing, Saudi Arabia’s health minister has said, as the region struggles with the growing cost of the conditions. The Gulf has a mounting problem with obesity, which is associated with diabetes. With most Gulf citizens aged under 30, overweight people and diabetes “threaten the wealth of our society and that is the youth,” Khaled al-Falih said Tuesday evening at the opening of an international conference about the two related health problems. Cited by the Saudi Press Agency, Falih said 15-20 percent of people in Gulf countries suffer from diabetes. Saudi experts have previously blamed urbanisation, addiction to smartphones, lack of exercise and the prevalence of fast food for unhealthy lifestyles. The minister cited a global study which put the cost of treating diabetes at $500 billion (440 billion euros) in 2011, a figure set to reach $750 billion by 2030. “They take up so much financial cost and medical effort that could be better channeled towards achieving valuable medical goals in research and development of health services,” Falih said.
WebRhythms is a series of short articles designed to teach rhythmic reading. Each article includes musical examples that help explain the concepts and an exercise that tests your new reading skills. Along with the written materials, WebRhythms allows you to download and print a copy of each exercise and provides a computer-perfect MIDI performance at a number of different tempi. With all these materials, it’s easy to be creative and challenge yourself while you learn or improve your reading ability. If you’re a novice at reading music, these articles will start you off by building a solid foundation. Those of you with strong reading skills can use these lessons to brush up and polish what you already know. The later lessons may even show you some new rhythmic ideas and procedures. Monster readers can take the Pro Challenge. Do you have what it takes to keep up? LESSON ELEVEN: SIXTEENTH NOTE TRIPLETS In past lessons, we’ve explored eighth note triplets and quarter note triplets. As a quick review, triplets are notes that divide a particular value into three equal divisions as opposed to two equal divisions. This month, WebRhythms dives into another type of triplet: sixteenth note triplets. You might already know how this rhythm sounds. If you’ve listened to Ravel’s Bolero, you’ve heard this rhythm. Remember the old rule for triplets that stated that there were “three in the time of two”? Well, three sixteenth triplets are going to be played in the same amount of time as two “regular” sixteenths. We can also approach this in another way. Since there are two “normal” sixteenths to an eighth, there will be three sixteenth triplets to each eighth note. Take a look at example 1. In this measure, you see a set of quarter triplets that take up the first two counts of the measure. Count three consists of a set of eighth triplets, and count four contains two grouping of sixteenth note triplets. Since there will be three sixteenth triplets for each eighth note, there are six sixteenth triplets for the entire fourth count (the value of one quarter note). Example 2 shows one of the possible ways to count sixteenth triplets. Just as eighth note triplets can be counted with a variety of syllables (one-and-ah; one-la-le; tri-po-let), sixteenth triplets are up for grabs too. Remember that the counting system that you use is not as important as being consistent. You can use any syllables that you feel comfortable with, as long as you use them all the time. As we start getting into shorter note values, it becomes more difficult to count them out loud. At a slow tempo, counting won’t cause you too much trouble. But, at faster speeds, you might have a problem getting your mouth to spit out the syllables fast enough! I like this choice (one-e-ah-and-e-ah) because the player gets a strong sense of a set of triplets falling on the number portion of the count and another set of triplets falling on the “and” of the count. These syllables are easy to say at a fast tempo. If you are using the syllables of one-la-le for eighth note triplets, then the syllables of one-ta-la-ta-le-ta might be more logical for you. In essence, this counting method lets you continue saying the one-la-le syllables for eighth note triplets, and simply add an additional “ta” syllable between each one to arrive at the sixteenth note triplet rhythm. This brings up another point about sixteenth triplets. Remember when we covered quarter note triplets? The trick to playing even quarter trips was to count and think of eighth triplets, and play every other note. When first learning to play sixteenth note triplets, you might try playing eighth note triplets with only one hand and then add your other hand to double the triplet’s speed. Just as there are two eighth note triplets in the value of each quarter note triplet, there are also two sixteenth triplets in the value of each eighth note triplet. Example 3 shows the relationship between all three values of triplets that have been covered so far. Since this example is visually aligned in terms of rhythmic values, it’s easy to notice that there are two eighth triplets to each quarter triplet, and that there are two sixteenth triplets to each eighth triplet. If you follow the sixteenth triplets all the way up to the top line, you can also see that there are four sixteenth note triplets to each quarter note triplet. If these relationships seem to be obvious, don’t take them for granted. Time relationships between sixteenths, eighths, and quarters are always the same, no matter what number is above a group of notes (threes, fives, sevens, thirteens, etc.). To say this another way, if four sixteenths equal the value of a quarter, then four sixteenth triplets equal the value of a quarter triplet. And, four sixteenth notes that are inside a grouping of thirteen will equal the value of a quarter note inside a grouping of thirteen. Example 4 shows two of the most common variations of the sixteenth triplet figure. For the first count of this example, only the first eighth is subdivided into the triplet. The value of the second eighth (attacking on the “and” of count one) is unaffected. In the second count of the example, the eighth note on the “and” syllable is replaced by a rest. As always, any note in any figure can be replaced by a rest. The third and fourth counts of the example show what happens when only the second eighth of the count is subdivided into the triplet. The counts under the example will show you where each number and “and” syllables occur. Again, begin this month’s exercise slowly. While you’re counting out loud, see if you can feel the sixteenth triplet figures working at the level of the eighth note. After you get a feel for the exercise, try increasing the tempo little by little. Once you reach the speed where counting each individual sixteenth triplet starts to get in the way, count each eighth note and “feel” the rhythm of sixteenth triplets inside the eighths. This is one of the few times when I’ll admit that counting each note may hinder instead of help you.
dbO Home Botanical Vases Act fast! Items with prices ending in $0.99 are final sale. No longer available Garden artistry. To create the molds for these delicate Botanical Vases, Dana Brandwein of dbO Home pressed actual leaves, wildflowers and honeycomb into the clay. They bring an earthy aesthetic to mantels and tables, whether you fill them with flowers or not.
IN THE COURT OF APPEALS OF THE STATE OF IDAHO Docket No. 43148 STATE OF IDAHO, ) 2016 Unpublished Opinion No. 595 ) Plaintiff-Respondent, ) Filed: July 13, 2016 ) v. ) Stephen W. Kenyon, Clerk ) JACOB DOUGLAS KEENE, ) THIS IS AN UNPUBLISHED ) OPINION AND SHALL NOT Defendant-Appellant. ) BE CITED AS AUTHORITY ) Appeal from the District Court of the Fourth Judicial District, State of Idaho, Ada County. Hon. Richard D. Greenwood, District Judge. Order revoking probation, affirmed. Eric D. Fredericksen, Interim State Appellate Public Defender; Ben P. McGreevy, Deputy Appellate Public Defender, Boise, for appellant. Hon. Lawrence G. Wasden, Attorney General; Mark W. Olson, Deputy Attorney General, Boise, for respondent. ________________________________________________ HUSKEY, Judge Jacob Douglas Keene appeals from the district court’s order revoking his probation, arguing the district court’s decision was tainted by factual and legal error. For the reasons set forth below, we affirm the district court’s order. I. FACTS AND PROCEDURE In 2008, Keene pleaded guilty to felony driving under the influence, Idaho Code §§ 18- 8004, -8005. The district court imposed a unified seven-year sentence, with two years determinate, suspended the sentence, and placed Keene on probation. In 2010, Keene violated the terms of his probation when he pleaded guilty to disturbing the peace, and the district court revoked and reinstated probation. In 2011, Keene again violated probation by using methamphetamine and not reporting his change of residence to his probation officer. The district court revoked probation, retained jurisdiction, and reinstated probation after Keene successfully 1 completed a period of retained jurisdiction. In 2012, Keene violated probation for a third time by consuming alcohol on multiple occasions. The district court revoked and reinstated probation, with the additional condition that Keene successfully complete the Ada County Drug Court program. In 2014, the State filed a motion for bench warrant for probation violation, alleging Keene violated his probation by failing to successfully complete drug court. The State also filed a motion to discharge Keene from drug court, alleging Keene committed twenty-two violations of his drug court agreement. At the drug court discharge hearing, Keene admitted to thirteen of the violations including failure to attend required meetings, missed urinalyses and breathalyzers, violations of no-contact orders, and maintaining a relationship with a fellow drug court participant. A probation officer testified he found expired Zyprexa pills at Keene’s residence, and Zyprexa was not a disclosed or approved medication for Keene. Based on Keene’s admissions, the court determined that Keene failed to “adhere to Drug Court rules and regulations.” In deciding whether to terminate or continue Keene in drug court, the court found Keene had been in the program for twenty-eight months, when on average, participants complete the program in seventeen to eighteen months. Further, the drug court found Keene “had not exhibited the behavior or progress in phase 3 that demonstrated eligibility for promotion to phase 4 in the immediate future.” The drug court concluded the “defendant’s lack of progress and continuing issues with honesty given the length of his involvement in Drug Court demonstrate that this program is not for him at this time.” As a result, the district court entered an order discharging Keene from drug court “for failing to adhere to Drug Court rules and regulations.” Keene’s failure to successfully complete drug court was the sole allegation in the motion for probation violation.1 At the probation violation evidentiary hearing, the district court took judicial notice of the order for discharge and found Keene violated the terms and conditions of his probation by not successfully completing drug court. Before the probation violation disposition hearing, Keene obtained treatment records indicating that Keene had disclosed his prescription of Zyprexa to the drug court. At the disposition hearing, the district court stated: “I 1 On November 18, 2014, the State filed a motion for bench warrant for probation violation and a motion for discharge from Ada County Drug Court program alleging probation violations. 2 will acknowledge that the records do reflect that the Zyprexa was disclosed on your initial forms . . . . But, ultimately, that is not why I made the decision for the discharge.” The district court explained multiple reasons for discharging Keene from drug court and revoking his probation: [T]here comes to be a point where we can’t foresee that you are going to be able to finish [drug court]. We don’t want drug court to become a chronic condition . . . . And I have known throughout your case that you have had mental health issues . . . . But I also know that, while mental health issues may be an explanation for some things, they are also not a justification for others, like the honesty issues that you have had throughout drug court. . . . . [Y]ou have been in this case for seven years. [Y]ou have served your sentence, except it hasn’t been behind bars; it’s just been in and out of jail and then a period in drug court where you’ve been in and out of jail. You’re doing your seven years in installments. .... So all of those things factor into it. The district court revoked Keene’s probation and commuted Keene’s sentence to 730 days in the Ada County Jail with credit for 440 days served, leaving 290 days to serve in county jail. Keene timely appeals. II. ANALYSIS A. Mootness Although Keene has completed his sentence, Keene argues his argument is not moot because there is a possibility for him to prevail on appeal, be reinstated on probation, successfully complete probation, and then request his felony conviction be reduced to a misdemeanor pursuant to I.C. § 19-2604(3). The State concedes there is theoretical relief for Keene under I.C. § 19-2604(3), but it is “very unlikely” and “there is, in a practical sense, no clearly identifiable or cognizable relief available to Keene.” Further, the State argues Keene’s argument is moot because Keene has completed his sentence. Generally, appellate review of an issue will be precluded where an issue is deemed moot. State v. Manley, 142 Idaho 338, 343, 127 P.3d 954, 959 (2005). A felony conviction that has collateral consequences and the fact that an appellant has fully served his sentence does not moot that appellant’s appeal. State v. Lute, 150 Idaho 837, 839, 252 P.3d 1255, 1257 (2011). A case becomes moot when the issues presented are no longer live or the defendant lacks a legally 3 cognizable interest in the outcome. Murphy v. Hunt, 455 U.S. 478, 481 (1982); Bradshaw v. State, 120 Idaho 429, 432, 816 P.2d 986, 989 (1991). Here, the likelihood of Keene’s success on probation is immaterial in determining whether Keene has a legally cognizable interest; thus, his appeal is not moot. B. Abuse of Discretion in Revoking Probation The probation violation at issue is Keene’s failure to successfully complete drug court. Keene argues the district court abused its discretion in revoking Keene’s probation based on his discharge from drug court because the discharge from drug court was tainted by factual error. Keene contends the factual error relied on by the drug court was that Keene possessed unauthorized Zyprexa, when treatment records show Keene disclosed his possession of Zyprexa to the drug court. Keene argues the district court would not have revoked probation if the information about Zyprexa was accurate. The State argues the district court properly revoked probation based on Keene’s length of time in drug court, Keene’s honesty issues, and the numerous occasions Keene failed to comply with the terms of community supervision and drug court. It is within the trial court’s discretion to revoke probation if any of the terms and conditions of the probation have been violated. I.C. §§ 19-2603, 20-222(2); State v. Beckett, 122 Idaho 324, 325, 834 P.2d 326, 327 (Ct. App. 1992); State v. Adams, 115 Idaho 1053, 1054, 772 P.2d 260, 261 (Ct. App. 1989); State v. Hass, 114 Idaho 554, 558, 758 P.2d 713, 717 (Ct. App. 1988). If a court has determined that the defendant violated his probation, it must then determine whether to revoke or continue probation. State v. Sanchez, 149 Idaho 102, 105, 233 P.3d 33, 36 (2009). In determining whether to revoke probation, a court must examine whether the probation is achieving the goal of rehabilitation and is consistent with the protection of society. State v. Upton, 127 Idaho 274, 275, 899 P.2d 984, 985 (Ct. App. 1995); Beckett, 122 Idaho at 325, 834 P.2d at 327; Hass, 114 Idaho at 558, 758 P.2d at 717. This decision is committed to the discretion of the trial court, and we review the determination for an abuse of discretion. State v. Reine, 122 Idaho 928, 931, 841 P.2d 458, 461 (Ct. App. 1992); State v. Roy, 113 Idaho 388, 392, 744 P.2d 116, 120 (Ct. App. 1987). Where the district court acts within the boundaries of its discretion, consistently with the applicable legal standards and through an exercise of reason, we will not reverse. Hass, 114 Idaho at 558, 758 P.2d at 717. When a discretionary ruling has been tainted by legal or factual error, we ordinarily vacate the decision and remand the matter for a 4 new, error-free discretionary determination by the trial court. McDonald v. State, 124 Idaho 103, 107, 856 P.2d 893, 897 (Ct. App. 1992). However, a remand may be avoided where it is apparent from the record that the result would not change or that a different result would represent an abuse of discretion. Id. (citing Dyer v. State, 115 Idaho 773, 776, 769 P.2d 1145, 1148 (Ct. App. 1989)). Therefore, if the district court erred in finding one probation violation, but correctly found one or more other violations, remand is not necessary if it is clear from the record that the district court would have revoked probation based solely upon the other violations. See State v. Mummert, 98 Idaho 452, 455, 566 P.2d 1110, 1113 (1977). 1. The discharge from drug court Keene contends the drug court’s decision to discharge Keene was based, in part, on a factual error, and such reliance constituted an abuse of discretion. The factual error, Keene asserts, was that Keene failed to disclosure the Zyprexa medication to drug court personnel. Here, the record supports the district court’s decision to discharge Keene from drug court. As noted above, the State brought a motion to discharge Keene from drug court, alleging Keene committed twenty-two violations of his drug court agreement. Keene subsequently admitted to thirteen violations of the drug court agreement raised in the motion to discharge. Based on Keene’s admissions to the violations, the drug court discharged Keene for “failing to adhere to Drug Court rules and regulations.” Thus, the district court did not discharge Keene from drug court based on the Zyprexa issue, but instead, based on the thirteen other violations Keene admitted. Therefore, the decision to discharge Keene from drug court was not based on a factual error, and the district court did not abuse its discretion in discharging Keene from drug court. 2. Revocation of probation Keene argues the district court abused its discretion when it relied on the drug court discharge as a basis for revoking Keene’s probation because the discharge was based on a factual error. Keene asserts, as noted above, the factual error was the district court’s belief that Zyprexa was not a disclosed medication at the time Keene entered drug court. There are two reasons this argument is unpersuasive. First, Keene concedes there was substantial evidence in the record to support the district court’s finding that Keene violated his probation by failing to successfully complete drug court. Second, the district court did not revoke probation based on the Zyprexa issue and thus, there was no factual or legal error relied upon by the district court in revoking probation. The court acknowledged Keene’s Zyprexa disclosure, but explained the Zyprexa 5 issue was not the reason for discharge from drug court; it was the other admissions made by Keene. The court then revoked Keene’s probation because Keene failed to successfully complete drug court. The record demonstrates the district court considered further probation inappropriate in light of Keene’s unwillingness to comply with the terms of probation, including the terms and conditions of drug court, and that probation would have been revoked regardless of whether the district court considered the Zyprexa disclosure. The district court did not abuse its discretion in revoking Keene’s probation, and its decision is supported by Keene’s admission that there was substantial evidence to find Keene violated probation by failing to complete drug court. C. Fundamental Error Generally, issues not raised below may not be considered for the first time on appeal. State v. Fodge, 121 Idaho 192, 195, 824 P.2d 123, 126 (1992). Idaho decisional law, however, has long allowed appellate courts to consider a claim of error to which no objection was made below if the issue presented rises to the level of fundamental error. See State v. Field, 144 Idaho 559, 571, 165 P.3d 273, 285 (2007); State v. Haggard, 94 Idaho 249, 251, 486 P.2d 260, 262 (1971). In State v. Perry, 150 Idaho 209, 245 P.3d 961 (2010), the Idaho Supreme Court abandoned the definitions it had previously utilized to describe what may constitute fundamental error. The Perry Court held that an appellate court should reverse an unobjected-to error when the defendant persuades the court that the alleged error: (1) violates one or more of the defendant’s unwaived constitutional rights; (2) is clear or obvious without the need for reference to any additional information not contained in the appellate record; and (3) affected the outcome of the trial proceedings. Id. at 226, 245 P.3d at 978. Keene argues the district court discharged him from drug court based on his lack of progress, and because that lack of progress was not a violation alleged in the State’s motion for discharge, Keene was deprived of his procedural due process rights. The State argues Keene failed to show that the district court violated constitutional due process by relying on the discharge decision, and Keene also failed to show that he was deprived of due process at the discharge hearing. Here, a condition of Keene’s probation was that he successfully complete drug court. As discussed above, the drug court did not find Keene violated the terms and conditions of drug court by failing to make progress. Instead, the drug court determined Keene 6 had violated the terms and conditions of drug court based on Keene’s admission to thirteen violations of the drug court agreement. Thereafter, in deciding whether to terminate or continue Keene in drug court, the court considered Keene’s lack of progress in the program. While the lack of timely progress was a factor in disposition, it was not a factor in determining whether Keene violated the terms and conditions of drug court. In determining that continued participation in drug court was not appropriate, the court considered, among other things, Keene’s lack of progress. Much like probation revocation, it is appropriate for the drug court to consider a multitude of factors in making its discharge determination; thus, it was appropriate to consider Keene’s lack of progress and honesty issues in deciding to discharge Keene from drug court. See Upton, 127 Idaho at 275, 899 P.2d at 985. As such, there was no due process violation that occurred in Keene’s discharge from drug court. Similarly, the district court’s reliance on Keene’s discharge from drug court to revoke probation did not violate due process. Keene concedes there was substantial evidence to find he failed to complete drug court, separate from the Zyprexa issue. The probation violation allegation was that Keene failed to satisfactorily complete drug court. In essence, Keene acknowledges there was substantial evidence justifying the court’s decision to revoke probation. Keene has made no allegation that there were any procedural defects in the probation revocation. Here, the district court had thirteen different bases on which it could have revoked probation because each of Keene’s admitted drug court agreement violations could have been the basis for discharging him from drug court. Similarly, each admission resulting in a termination from drug court would have supported the district court’s finding that probation had been violated. The district court explained multiple reasons for revoking probation, all of which are supported by the record, and that continued probation was not a viable option. Moreover, it is clear from the record that the district court would have revoked probation based upon the other violations, given Keene’s history of failing to meet the terms and conditions of his probation. For these reasons, we conclude that Keene has failed to meet his burden under the first prong of Perry because he has failed to show that a constitutional right was violated, and we need not address the other prongs of the Perry analysis. 7 III. CONCLUSION The district court did not abuse its discretion in revoking Keene’s probation because there was substantial evidence in the record showing Keene violated his probation by failing to complete drug court. Moreover, Keene did not establish fundamental error in regards to his constitutional arguments. Therefore, we affirm the district court’s order revoking Keene’s probation. Chief Judge MELANSON and Judge GUTIERREZ CONCUR. 8
Single-stream recycling means big changes to come for Durango Plastic, cans, cardboard, paper and even paper bags are among the items that can be recycled with the city of Durango’s new single-stream recycling program to be implemented in February. Glass will have to be taken to one of several locations. JERRY McBRIDE/Durango Herald illustration Plastic, cans, cardboard, paper and even paper bags are among the items that can be recycled with the city of Durango’s new single-stream recycling program to be implemented in February. Glass will have to be taken to one of several locations. Single-stream recycling is coming to Durango on Feb. 1, the city’s sustainability coordinator told a Green Business Roundtable lunch crowd of 60 on Wednesday. “It’s not fancy, but it allows us to combine the majority of recyclable items in one bin,” Mary Beth Miles said. “It reduces waste going to landfills and saves energy.” Instead of separate bins for separate products, almost everything can be dropped into a 60- or 90-gallon bin. The ease of disposal will require a new bin to allow automated instead of manual manipulation of containers. Customers must request a new bin, Miles said. They also will see a rate increase of $3 per month. Baled waste will be sold to the highest bidder, Miles said. Potential buyers have been identified in Denver, Phoenix and California. Adherence to disposal guidelines is important, Miles said, because companies that buy baled waste won’t accept more than 4 percent contamination. Glass can be dropped at numerous locations such as the markets and liquor stores where Dumpsters are located now, or at the recycling center, Miles said. Recycling glass to make new glass is the highest and best use of the resource, Miles said. “When glass is collected along with other waste, 30 percent ends up as new glass,” Miles said. “When glass is collected separately, 98 percent becomes new glass.” It’s estimated that single-stream recycling will increase the amount of material recycled by 30 percent, Miles said. This is the equivalent of what 5,500 average Americans or 7,300 Durango residents throw away in a year. Greenhouse-gas emissions will be reduced by an amount equal to the emissions of 2,229 passenger vehicles, Miles said. Commercial customers will have three bins instead of five under the new recycling program. Miles said a program for compostable items is in the future. The city wants to expand the size of the recycling center to 11,000 square feet from 7,420. The makeover will cost an estimated $1.6 million. When this will happen is uncertain. More information Information about the city of Durango’s new recycling program, scheduled to begin Feb. 1, is available from Mary Beth Miles, the city’s sustainability coordinator, at 375-4830. Information about new bins and pickup schedules is available at 375-5004.
Pyongyang promoting credit cards North Korea is promoting financial reform and will encourage its people to both save more and spend money on credit cards, the head of the communist country’s central bank said. In an interview with the Chosun Sinbo, a newspaper published in Japan by the pro-Pyongyang General Association of Korean Residents, Kim Chon-gyun, the president of the North’s Central Bank, discussed the country’s efforts to overhaul its financial system. The report was published on Tuesday. “Our main mission is providing the capital to build the country’s economy through means of smoothly circulating domestic funds,” Kim said. “As a part of the effort, we are developing new financial products and promoting credit card usage by the public.” Kim said the bank is preparing financial measures to support the creative and self-regulated businesses of economic institutions and companies as the country introduced a new economic management system, indicating that the North will expand loans to companies and stores. On May 30, 2014, Pyongyang announced an economic reform measure offering more autonomy to farmers, factories and companies, while allowing workers to keep a portion of whatever they produce. At the end of 2010, the North’s Foreign Trade Bank issued a debit card and Kyoro Bank followed suit, but transactions were rare. But more use is being seen in hotels in Pyongyang, North Korea experts have said. “Starting four years ago, the North prepared for financial reform by sending officials to Singapore for education,” said Cho Bong-hyun, a senior analyst at the IBK institute. “Since the North deeply studied credit cards, savings accounts and loans, a specific action plan will soon be announced.” In his interview, Kim also said Pyongyang has established a new national organization to fight money laundering and terrorist financing. The National Coordination Committee will be in charge of the mission, he said. The committee is chaired by a deputy premier and composed of officials from the central bank, Foreign and Finance Ministries and law-enforcement authorities. The North has been criticized for money laundering for years. Its illicit financial activities invited international sanctions including measures by the U.S. Treasury. In a move to dodge criticism last year, the North joined the Asia/Pacific Group on Money Laundering, the regional arm of the Financial Action Task Force under the Organization for Economic Cooperation and Development. BY SER MYO-JA [[email protected]]
# WSDL4R - XMLSchema length definition for WSDL. # Copyright (C) 2005 NAKAMURA, Hiroshi <[email protected]>. # This program is copyrighted free software by NAKAMURA, Hiroshi. You can # redistribute it and/or modify it under the same terms of Ruby's license; # either the dual license version in 2003, or any later version. require 'wsdl/info' module WSDL module XMLSchema class Length < Info def initialize super end def parse_element(element) nil end def parse_attr(attr, value) case attr when ValueAttrName value.source end end end end end
This week on Truthdig Radio in association with KPFK: The fiscal cliff is delayed, the 113th Congress is sworn in, the NDAA is signed, the Violence Against Women Act is killed and the LA Times is reborn. This week on Truthdig Radio in association with KPFK: The fiscal cliff is delayed, the 113th Congress is sworn in, the NDAA is signed, the Violence Against Women Act is killed and the L.A. Times is reborn.
Seattle Locksmith 24/7 Seattle Locksmith Service How important is it to you to sleep sound at night knowing you and your family is safe inside the house? Unfortunately, todays burglary trends are still increasingly worrying. This is why A Lenny Seattle Locksmith helps the community by ensuring that your locks or supplementary security systems can deter any attempt of breaching your property. The same goes for commercial properties. It is equally important to make sure your employees and assets are protected. With high-end systems today, this is possible. If you’re considering an upgrade or.just a starting business that requires fresh installation, then our local Seattle locksmith can help evaluate and customize a security system that matches your budget and your property. Our local locksmith Seattle may also recommend key-less entries or a rekeying process, especially for a business that has a high employee turnover to make sure your protection is effective all year round. CAR LOCKSMITH SERVICE A Lenny locksmith also specializes in car locksmith needs. Our dedicated car Seattle locksmith can go to your location on an average of 25 minutes. Re-keying or lock repairs and can take another 15 minutes or mode depending on how complex your locks are. Lock picking can take lesser minutes. A key stuck in the ignition? No problem. Our car locksmith can work through this and make sure that no further damage is done. We have the right tools for the job. If the ignition needs replacement, we’ll install it for you. As we always bring spare parts you can only imagine the prompt service you’re getting from our car locksmith. EMERGENCY LOCKOUTS Lockouts are extremely frustrating, and the situation can be more frustrating with an inexperienced locksmith. Our local locksmith Seattle has years of experience in dealing with the situation and has developed a talent for making sure that the customers get back their access to their interiors in a matter of minutes.
Q: ASP.NET MVC 3 Preview configure for ninject I'm giving ASP.NET MVC 3 Preview 1 a spin and want to configure ninject with it. Is the best way still to use ninject.web.mvc extension? The sample Scott Gu posts doesn't run. It throws an "Error activating IControllerFactory" exception. A: You don't need "Ninject.Web.Mvc" to configure Ninject in MVC 3, as I've blogged in a post titled "Dependency Injection in ASP.NET MVC 3 using Ninject". A: I believe Scott Gu's code should read... public static void RegisterServices(IKernel kernel) { kernel.Bind<IProductRepository>().To<SqlProductRepository>(); kernel.Bind<IControllerFactory>().To<NinjectControllerFactory>(); } Where the NinjectControllerFactory is found in... using Ninject.Web.Mvc; So yes, you do still need the mvc extension for Ninject. Perhaps there is a better/newer way to define the default controller factory in MVC 3, but that is how I did it. There may also be some strange behavior coming from MvcServiceLocator as indicated in this post.
# -*- coding: utf-8 -*- import json import cgruconfig import afnetwork class Block: ''' Block class for block manipulation ''' p_percentage = None capacity = None name = None service = None frames_per_task = None time_done = None job_id = None tasks_num = None block_num = None p_progressbar = None p_tasks_run_time = None state = None flags = None p_tasks_skipped = None frame_first = None frame_last = None st = None frames_inc = None p_tasks_done = None time_started = None data = None tasks = [] full = False class State: restart = 'restart' skip = 'skip' def __init__(self, data, full=False): ''' Constructor ''' self.p_percentage = data.get('p_percentage', 0) self.capacity = data.get('capacity', 0) self.name = data.get('name') self.service = data.get('service') self.frames_per_task = data.get('frames_per_task') self.time_done = data.get('time_done') self.job_id = data.get('job_id') self.tasks_num = data.get('tasks_num') self.block_num = data.get('block_num') self.p_progressbar = data.get('p_progressbar') self.p_tasks_run_time = data.get('p_tasks_run_time') self.state = data.get('state', '') self.flags = data.get('flags') self.p_tasks_skipped = data.get('p_tasks_skipped') self.frame_first = data.get('frame_first') self.frame_last = data.get('frame_last') self.st = data.get('st') self.frames_inc = data.get('frames_inc') self.p_tasks_done = data.get('p_tasks_done') self.time_started = data.get('time_started') self.data = data self.full = full if self.full is True and self.isNumeric() is False: self.tasks = data.get('tasks', []) def fillTasks(self): if self.full is not True: job = getJob(self.job_id, full=True) block = job.blocks[self.block_num] self.data = block.data self.tasks = block.tasks def setState(self, state, taskIds=[], verbose=False): action = 'action' data = {'ids': [self.job_id], 'type': 'jobs', 'block_ids': [self.block_num], 'operation': {'type': state, 'task_ids': taskIds}} output = _sendRequest(action, data, verbose) return output def restart(self, taskIds=[]): self.setState(self.State.restart, taskIds=taskIds) def skip(self, taskIds=[]): self.setState(self.State.skip, taskIds=taskIds) def isNumeric(self): return bool(self.flags >> 0) def appendTasks(self, tasks, verbose=False): """Append new tasks to an existing block :param tasks: list of new Task() objects :param bool verbose: verbosity toggle :return: server response """ output = "The block is numeric and cannot have tasks appended" if self.isNumeric() is False: tasks_data = [] for t in tasks: tasks_data.append(t.data) action = 'action' data = {'ids': [self.job_id], 'type': 'jobs', 'block_ids': [self.block_num], 'operation': { 'type': 'append_tasks', 'tasks': tasks_data}} output = _sendRequest(action, data, verbose) return output class Job: ''' Job class for job manipulation ''' id = None project = None blocks = [] name = None st = None state = None priority = None host_name = None branch = None time_creation = None time_done = None time_started = None serial = None user_name = None max_running_tasks = None max_running_tasks_per_host = None depend_mask = '' p_percentage = 0 data = None full = False class State: restart = 'restart' start = 'start' pause = 'pause' stop = 'stop' skip = 'skip' delete = 'delete' def __init__(self, jobId, data=None, full=False): ''' Constructor ''' self.id = jobId self.blocks = [] self.full = full if data is not None: self.data = data self.fillInfo(data) def fillInfo(self, data): self.project = data.get('project') self.name = data.get('name') self.st = data.get('st') self.state = data.get('state') self.priority = data.get('priority') self.host_name = data.get('host_name') self.branch = data.get('branch') self.time_creation = data.get('time_creation') self.time_done = data.get('time_done') self.time_started = data.get('time_started') self.serial = data.get('serial') self.user_name = data.get('user_name') self.max_running_tasks = data.get('max_running_tasks', -1) self.max_running_tasks_per_host = data.get('max_running_tasks_per_host', -1) self.depend_mask = data.get('depend_mask', '') self.fillBlocks(data['blocks'], self.full) def fillBlocks(self, blocksData, full): blocksProgress = 0 for blockData in blocksData: block = Block(blockData, full) if block.p_percentage is not None: blocksProgress += block.p_percentage self.blocks.append(block) self.p_percentage = blocksProgress / len(blocksData) def setState(self, jobState, verbose=False): action = 'action' data = {'ids': [self.id], 'type': 'jobs', 'operation': {'type': jobState}} output = _sendRequest(action, data, verbose) return output def pause(self): self.setState(self.State.pause) def start(self): self.setState(self.State.start) def stop(self): self.setState(self.State.stop) def delete(self): self.setState(self.State.delete) def getProgress(self, verbose=False,): action = 'get' data = {'type': 'jobs', 'ids': [self.id], 'mode': 'progress'} output = _sendRequest(action, data, verbose) if output is not None: if 'job_progress' in output: return output['job_progress'] return None def appendBlocks(self, blocks, verbose=False): """Append new blocks to an existing job :param bool verbose: verbosity toggle :return: server response """ action = 'action' blocks_data = [] for block in blocks: block.fillTasks() blocks_data.append(block.data) data = {'type': 'jobs', 'ids': [self.id], "operation": { 'type': 'append_blocks', 'blocks': blocks_data}} output = _sendRequest(action, data, verbose) return output class Render: ''' Render class for render manipulation ''' id = None name = None user_name = None capacity_used = None idle_time = None time_launch = None state = None st = None priority = None time_update = None time_register = None netifs = [] task_start_finish_time = None address = {} host = None busy_time = None max_tasks = None wol_idlesleep_time = None capacity = None power = None def __init__(self, renderId, data=None): ''' Constructor ''' self.id = renderId if data is not None: self.fillRenderInfo(data) def fillRenderInfo(self, data): self.name = data.get('name') self.user_name = data.get('user_name') self.capacity_used = data.get('capacity_used') self.idle_time = data.get('idle_time') self.time_launch = data.get('time_launch') self.state = data.get('state') self.st = data.get('st') self.priority = data.get('priority') self.time_update = data.get('time_update') self.time_register = data.get('time_register') # self.netifs = [] self.task_start_finish_time = data.get('task_start_finish_time') # self.address = {} self.host = data.get('host') self.busy_time = data.get('busy_time') def setUserName(self, username, verbose=False): action = 'action' data = {'type': 'renders'} data['mask'] = self.name data['params'] = {'user_name': username} output = _sendRequest(action, data, verbose) return output def setNimby(self, verbose=False): action = 'action' data = {'type': 'renders'} data['mask'] = self.name data['params'] = {'nimby': True} output = _sendRequest(action, data, verbose) return output def setNIMBY(self, verbose=False): action = 'action' data = {'type': 'renders'} data['mask'] = self.name data['params'] = {'NIMBY': True} output = _sendRequest(action, data, verbose) return output def setFree(self, verbose=False): action = 'action' data = {'type': 'renders'} data['mask'] = self.name data['params'] = {'nimby': False} output = _sendRequest(action, data, verbose) return output def setFreeUnpause(self, verbose=False): action = 'action' data = {'type': 'renders'} data['mask'] = self.name data['params'] = {'nimby': False, 'paused': False} output = _sendRequest(action, data, verbose) return output def ejectNotMyTasks(self, verbose=False): action = 'action' data = {'type': 'renders'} data['mask'] = self.name data['operation'] = {'type': 'eject_tasks_keep_my'} output = _sendRequest(action, data, verbose) return output def exit(self, verbose=False): action = 'action' data = {'type': 'renders'} data['mask'] = self.name data['operation'] = {'type': 'exit'} output = _sendRequest(action, data, verbose) return output def addService(self, serviceName, verbose=False): action = 'action' data = {'type': 'renders'} data['ids'] = [self.id] data['operation'] = {'type': 'farm', 'mode': 'service_add', 'name': serviceName, 'mask': serviceName} output = _sendRequest(action, data, verbose) return output def removeService(self, serviceName, verbose=False): action = 'action' data = {'type': 'renders'} data['ids'] = [self.id] data['operation'] = {'type': 'farm', 'mode': 'service_remove', 'name': serviceName, 'mask': serviceName} output = _sendRequest(action, data, verbose) return output def disableService(self, serviceName, verbose=False): action = 'action' data = {'type': 'renders'} data['ids'] = [self.id] data['operation'] = {'type': 'farm', 'mode': 'service_disable', 'name': serviceName, 'mask': serviceName} output = _sendRequest(action, data, verbose) return output def enableService(self, serviceName, verbose=False): action = 'action' data = {'type': 'renders'} data['ids'] = [self.id] data['operation'] = {'type': 'farm', 'mode': 'service_enable', 'name': serviceName, 'mask': serviceName} output = _sendRequest(action, data, verbose) return output def clearServices(self, verbose=False): action = 'action' data = {'type': 'renders'} data['ids'] = [self.id] data['operation'] = {'type': 'farm', 'mode': 'clear_services'} output = _sendRequest(action, data, verbose) return output def setPool(self, poolName, verbose=False): action = 'action' data = {'type': 'renders'} data['ids'] = [self.id] data['operation'] = {'type': 'set_pool', 'name': poolName} output = _sendRequest(action, data, verbose) return output def reassignPool(self, verbose=False): action = 'action' data = {'type': 'renders'} data['ids'] = [self.id] data['operation'] = {'type': 'reassign_pool'} output = _sendRequest(action, data, verbose) return output class Pool(): ''' Pool class for pool manipulation ''' id = None name = None parent = None services = None priority = None time_creation = None pools_total = None max_capacity_per_host = None task_start_finish_time = None run_tasks = None max_tasks_per_host = None renders_total = None run_capacity = None renders_num = None def __init__(self, poolId, data=None): ''' Constructor ''' self.id = poolId if data is not None: self.fillPoolInfo(data) def fillPoolInfo(self, data): self.name = data.get('name') self.parent = data.get('parent') self.services = data.get('services') self.priority = data.get('priority') self.time_creation = data.get('time_creation') self.pools_total = data.get('pools_total') self.max_capacity_per_host = data.get('max_capacity_per_host') self.task_start_finish_time = data.get('task_start_finish_time') self.run_tasks = data.get('run_tasks') self.max_tasks_per_host = data.get('max_tasks_per_host') self.renders_total = data.get('renders_total') self.run_capacity = data.get('run_capacity') def addService(self, serviceName, verbose=False): action = 'action' data = {'type': 'pools'} data['ids'] = [self.id] data['operation'] = {'type': 'farm', 'mode': 'service_add', 'name': serviceName, 'mask': serviceName} output = _sendRequest(action, data, verbose) return output def removeService(self, serviceName, verbose=False): action = 'action' data = {'type': 'pools'} data['ids'] = [self.id] data['operation'] = {'type': 'farm', 'mode': 'service_remove', 'name': serviceName, 'mask': serviceName} output = _sendRequest(action, data, verbose) return output def disableService(self, serviceName, verbose=False): action = 'action' data = {'type': 'pools'} data['ids'] = [self.id] data['operation'] = {'type': 'farm', 'mode': 'service_disable', 'name': serviceName, 'mask': serviceName} output = _sendRequest(action, data, verbose) return output def enableService(self, serviceName, verbose=False): action = 'action' data = {'type': 'pools'} data['ids'] = [self.id] data['operation'] = {'type': 'farm', 'mode': 'service_enable', 'name': serviceName, 'mask': serviceName} output = _sendRequest(action, data, verbose) return output def clearServices(self, verbose=False): action = 'action' data = {'type': 'pools'} data['ids'] = [self.id] data['operation'] = {'type': 'farm', 'mode': 'clear_services'} output = _sendRequest(action, data, verbose) return output def setMaxCapacity(self, capacity, verbose=False): action = 'action' data = {'type': 'pools'} data['ids'] = [self.id] data['params'] = {'max_capacity_per_host': capacity} output = _sendRequest(action, data, verbose) return output class Monitor(): ''' Monitor class for monitor registration ''' class WatchType: jobs = 'jobs' renders = 'renders' def __init__(self, verbose=False): action = 'monitor' data = {'engine': 'python'} output = _sendRequest(action, data, verbose) if output is not None: self.id = output['monitor']['id'] else: return None def __del__(self, verbose=False): action = 'action' data = {'type': 'monitors', 'ids': [self.id], 'operation': {"type": "deregister"}} _sendRequest(action, data, verbose, without_answer=True) def changeUid(self, uid, verbose=False): action = 'action' data = {'type': 'monitors', 'ids': [self.id], 'operation': {"type": "watch", "class": "perm", "uid": uid}} return _sendRequest(action, data, verbose) def subscribe(self, classType, verbose=False): action = 'action' data = {'type': 'monitors', 'ids': [self.id], 'operation': {"type": "watch", "class": classType, "status": "subscribe"}} return _sendRequest(action, data, verbose) def events(self): action = 'get' data = {'type': 'monitors', 'ids': [self.id], 'mode': 'events'} return _sendRequest(action, data) def _sendRequest(action, requestData, verbose=False, without_answer=False): """Missing DocString :param bool verbose: :return: """ data = {'user_name': cgruconfig.VARS['USERNAME'], "host_name": cgruconfig.VARS['HOSTNAME']} data.update(requestData) obj = {action: data} # print(json.dumps(obj)) output = afnetwork.sendServer(json.dumps(obj), verbose, i_without_answer=without_answer) if output[0] is True: return output[1] else: return None def getJobList(ids=None, full=False, verbose=False): """Missing DocString :param bool verbose: :return: """ action = 'get' data = {'type': 'jobs'} if ids is not None: data['ids'] = ids if full is True: data['mode'] = 'full' output = _sendRequest(action, data, verbose) jobs = [] if output is not None: if 'jobs' in output: for jobData in output['jobs']: job = Job(jobData['id'], jobData, full=full) jobs.append(job) return jobs def getJob(jobId, full=False, verbose=False): jobs = getJobList(ids=[jobId], full=full, verbose=verbose) if len(jobs) > 0: return jobs[0] else: return None def getRenderList(mask=None, ids=None, verbose=False): action = 'get' data = {'type': 'renders'} if mask is not None: data['mask'] = mask if ids is not None: data['ids'] = ids output = _sendRequest(action, data, verbose) renders = [] if output is not None: if 'renders' in output: for renderData in output['renders']: render = Render(renderData['id'], renderData) renders.append(render) return renders def getRenderResources(): action = 'get' data = {'type': 'renders', 'mode': 'resources'} output = _sendRequest(action, data) if output is not None: if 'renders' in output: return output['renders'] return None def getPoolList(ids=None, verbose=False): action = 'get' data = {'type': 'pools'} if ids is not None: data['ids'] = ids output = _sendRequest(action, data, verbose) pools = [] if output is not None: if 'pools' in output: for poolData in output['pools']: pool = Pool(poolData['id'], poolData) pools.append(pool) return pools
1.Now in those days John the Baptist comes, preaching in the wilderness of Judea, 2.And saying, Repent: 243243 “Ammendez-vous, ou, convertissez, ou, repentez.”— “Reform yourselves, or be converted, or, repent.” for the kingdom of heaven is at hand, 3.For this is he, of whom it has been spoken by Isaiah the prophet, who says, The voice of one crying in the wilderness, Prepare the way of the Lord, make his paths straight. 4.And the same John had his raiment of camel’s hair, and a leathern girdle about his loins; and his meat was locusts and wild honey. 5.Then went out to him Jerusalem, and all Judea, and all the region round about Jordan. 6.And were baptized in Jordan by him, confessing their sins. 1.The beginning of the gospel of Jesus Christ, the Son of God; 2.As it is written in the prophets, Lo, I send my messenger before thy face, who shall prepare thy way before thee. 3.The voice of one crying in the wilderness, Prepare the way of the Lord, make his paths straight. 4.John was baptizing in the wilderness, preaching the baptism of repentance, for the forgiveness of sins. 5.And all the country of Judea, and the inhabitants of Jerusalem, went out to him, and were all baptized by him in the river Jordan, confessing their sins. 6.And John was clothed with camel’s hair, and with a leathern girdle about his loins, and he ate locusts and wild honey. 1.And in the fifteenth year of the reign of Tiberius Cesar, when Pontius Pilate was governor of Judea, and Herod was tetrarch of Galilee, and his brother Philip was tetrarch of the country of Iturea and Trachonitis, and Lysanias was tetrarch of Abilene, 2.While Annas and Caiaphas were high priests, the word of the Lord came to John, the son of Zacharias, in the wilderness. 3.And he came into all the country surrounding Jordan, preaching the baptism of repentance for the forgiveness of sins. 4.As it is written in the book of the words of the prophet Isaiah, saying, The voice of one crying in the wilderness, Prepare the way of the Lord, make his paths straight. 5.Every valley shall be filled up, and every mountain and hill shall be laid low, and those things which are crooked shall become straight, and those which are rough shall become plain ways. 6.And all flesh shall see the salvation of God. Mark 1:1. The beginning of the Gospel. Though what we have hitherto taken out of Matthew and Luke is a part of the Gospel, yet it is not without reason that Mark makes the beginning of the Gospel to be the preaching of John the Baptist. For the Law and the Prophets then came to an end, (John 1:17.) “The Law and the Prophets were until John: since that time the kingdom of God is preached,” (Luke 16:16.) And with this agrees most fully the quotation which he makes from the Prophet Malachi, (3:1.) In order to inflame the minds of his people with a stronger desire of the promised salvation, the Lord had determined to leave them, for a time, without new prophecies. We know that the last of the true and lawful prophets was Malachi. That the Jews, in the meantime, may not faint with hunger, he exhorts them to continue under the Law of Moses, until the promised redemption appear. He mentions the law only, (John 1:17,) because the doctrine of the Prophets was not separate from the law, but was merely an appendage and fuller exposition of it, that the form of government in the Church might depend entirely on the Law. It is no new or uncommon thing in Scripture, to include the Prophets under the name of the Law: for they were all related to it as their fountain or design. The Gospel was not an inferior appendage to the Law, but a new form of instruction, by which the former was set aside. Malachi, distinguishing the two conditions of the Church, places the one under the Law, and commences the other with the preaching of John. He unquestionably describes the Baptist, when he says, “Behold, I send my messenger,” (Malachi 3:1:) for, as we have already said, that passage lays down an express distinction between the Law and the new order and condition of the Church. With the same view he had said a little before, (which is quoted by Mark, [9:13;] for the passages are quite similar,) “Behold, I send you Elijah the Prophet, before the coming of the great and dreadful day of the Lord,” (Malachi 4:5.) Again, “Behold, I send my messenger, and he shall prepare the way before me: and the Lord, whom ye seek, shall suddenly come to his temple,” (Malachi 3:1.) In both passages, the Lord promises a better condition of his Church than had existed under the Law, and this unquestionably points out the beginning of the Gospel But before the Lord came to restore the Church, a forerunner or herald was to come, and announce that he was at hand. Hence we infer, that the abrogation of the Law, and the beginning of the Gospel, strictly speaking, took place when John began to preach. The Evangelist John presents to us Christ clothed in flesh, “the Word made flesh,” (John 1:14;) so that his birth and the whole history of his appearance are included in the Gospel. But here Mark inquires, when the Gospel began to be published, and, therefore, properly begins with John, who was its first minister. And with this view the Heavenly Father chose that the life of his Son should be buried, as it were, in silence, until the time of the full revelation arrived. For it did not happen without the undoubted Providence of God, that the Evangelists leave out the whole period which Christ spent in private, and pass at once from his earliest infancy to his thirtieth year, when he was openly exhibited to the world, invested with his public character as a Redeemer; Luke excepted, who slightly touches one indication of his future calling, which occurred about his twelfth year, (Luke 2:42.) It had a very close connection with this object, that we should be informed, first, that Christ is a true man, (John 1:14,) and next, that he is “the Son of Abraham and of David,” (Matthew 1:1;) as to both of which, the Lord has been pleased to give us an attestation. The other matters which we have examined, relating to “the shepherds,” (Luke 2:8,) the “Magi,” (Matthew 2:1,) and “Simeon,” (Luke 2:25,) were intended to prove his Divinity. What Luke relates about John and his father Zacharias, (Luke 1:5,) was a sort of preparation for the Gospel. There is no impropriety in the change of the person which is here made, in quoting the words of Malachi. According to the prophet, God says, I send my messenger, and he shall prepare the way Before Me. Mark introduces God as addressing the Son, Behold, I send my messenger before thy face, who shall prepare thy way Before Thee. But we see that Mark had no other intention, than to express more clearly the prophet’s meaning. Mark designates Christ the Son of God The other Evangelists testify that he was born of the seed of Abraham and David, and therefore was the Son of man, (Matthew 8:20.) But Mark shows us, that no redemption is to be expected but from the Son of God Matthew 3:1Now in those days Luke 3:1. And in the fifteenth year It could not be gathered from Matthew and Mark in what year of his age John began to preach: but Luke shows sufficiently, that he was about thirty years of age. The ancient writers of the Church are almost unanimously agreed, that he was born fifteen years before the death of Augustus. His successor Tiberius had held the government of the Roman Empire for fifteen years, when the same John began to preach. In this way are made up the thirty years which I have mentioned. Hence it follows, that he did not long discharge the office of teacher, but, in a short time, gave way to Christ; for we shall soon find, that Christ also was baptized in the thirtieth year of his age, when he was immediately installed into the discharge of his public office. Now as John, the morning-star, or dawn, was immediately followed by Christ, “the Sun of Righteousness,” (Malachi 4:2,) there is no reason to wonder, that John disappeared, in order that Christ might shine alone in greater brightness. Luke 3:1. When Pontius Pilate was governor of Judea It is probable that this was the second year of Pilate’s government: for since Tiberius had held the reins of government, he had, as Josephus informs us, (xviii. 2:2,) appointed Valerius Gratus to be governor of Judea, in room of Annius Rufus. This change might take place in his second year. The same Josephus writes, that Valerius was governor of Judea for “eleven years, when Pontius Pilate came as his successor,” (Ant. 18:2:2.) Pilate, therefore, had governed the province for two years, when John began to preach the Gospel. This Herod, whom Luke makes tetrarch of Judea, was the second heir of Herod the Great, and succeeded to his father by will. Archelaus had received the ethnarchy of Judea, but, when he was banished to Vienna (Jos. Wars, 2, vii. 3) by Augustus, that portion fell into the hands of the Romans. Luke mentions here two sons of Herod, — Herod Antipas, who had been made tetrarch of Galilee, and governed Samaria and Peraea, — and Philip, who was tetrarch of Trachonitis and Iturea, and reigned from the sea of Tiberias, or Gennesareth, to the foot of Lebanon, which is the source of the river Jordan. Lysanias has been falsely supposed to be the son of Ptolemy Mennaeus, King of Chalcis, who had been long before put to death by Cleopatra, about thirty years before the birth of Christ, as Josephus relates, (Ant. 15:4:1.) He could hardly even be the grandson of Ptolemy, who, as the same Josephus records, kindled the Parthian war, (Wars, 1, xiii. 1;) for then he must have been more than sixty years of age at the time of which Luke speaks. Besides, as it was under Antigonus that the Parthian war commenced, he must even then have been a full-grown man. Now Ptolemy Mennaeus died not long after the murder of Julius Caesar, during the triumvirate of Lepidus, Antony, and Octavius, (Jos. Wars, 1, xiii. 1.) But as this grandson of Ptolemy bore the name of Lysanias as well as his father, he might have left a son who had the same surname. Meanwhile, there can be no hesitation in rejecting the error of those who make Lysanias to live sixty years after he had been slain by Cleopatra. The word Tetrarch is here used in a sense not quite accurate, as if the whole country had been divided into four parts. But as at first there was a fourfold division into districts, so afterwards, when other changes took place, the names Tetrarch and Tetrarchies were retained by way of honor. In this sense Pliny enumerates seventeen tetrarchies of one country. Luke 3:2. Annas and Caiaphas being the high priests It is certain, that there never were two persons who held the office of high priest at the same time. Josephus states, that Valerius Gratus made Caiaphas high priest, a short time before he left the government. During the time that Pilate was governor of Judea, Josephus does not speak of him as having made any change in this respect;244244The whole passage is remarkable, and proves that the appointment to the sacred office of high priest was entirely at the disposal of the Roman Governor. “This man (Valerius Gratus) deprived Ananus of the high priesthood, and appointed Ishmael, the son of Phabi, to be high priest. He also deprived him in a little time, and ordained Eleazar, the son of Ananus, who had been high priest before, to be high priest: which office, when he had held for a year, Gratus deprived him of it, and gave the high priesthood to Simon, the son of Camithus; and, when he had possessed that dignity no longer than a year, Joseph Caiaphas was made his successor. When Gratus had done those things, he went back to Rome, after he had tarried in Judea eleven years, when Pontius Pilate came as his successor.” — (Ant. 18:2:2.) but, on the contrary, states that, when Pilate had been recalled from the government, and sent to plead his cause at Rome, Vitellius, who was at that time governor of Syria, reduced Caiaphas to a private rank, and transferred the high priesthood to Jonathan, the son of Ananus, (Ant. 18:4:3.) When Luke says that there were two high priests, we must not understand him to mean, that both held the same title, but that the honor of the priesthood was partly shared with him by Annas his father-in-law. Luke’s narrative indicates such a state of trouble and confusion, that, though there was not more than one person who was actually high priest, the sacred office was torn in pieces by ambition and tyranny. The word of the Lord came upon John Before relating, as the other Evangelists do, that John began to exercise his office of teaching, Luke asserts that he was divinely called to that office: and he does so, in order to assure us, that the ministry of John carried undoubted authority. Why the interpreters have chosen to translate the word, ἐπὶ ᾿Ιωάννην, UPON John, instead of TO John, I do not see: but because there is no ambiguity as to the meaning, that this commission was entrusted to him, and that he received a command to preach, I have followed the received version. Hence infer, that there are no regular teachers, but those on whom God has conferred the office; and that it is not enough to have the word of God, if there be not likewise a special calling. Matthew and Mark do not speak of the preaching of John as extending beyond the wilderness, while Luke says, that he came into all the country around Jordan These statements may be reconciled by observing, that John discharged the office of teaching among the neighbors, with whom he dwelt; but that his Gospel spread more widely, and became known in many places, so that the report of it, in a short time, reached Jerusalem. Indeed, the whole of that tract of the Jordan might be called a wilderness: for the word does not mean “a solitude,” but “a rough, and mountainous, and thinly inhabited district.” Matthew 3:2. Repent ye Matthew differs from the other two Evangelists in this respect, that he relates the substance of John’s doctrine, as uttered by John himself, while they relate it in their own words; though Mark has one word more than Luke: for he says, he came Baptizing, and preaching the baptism of repentance But in substance there is the most perfect agreement: for they all connect repentance with the forgiveness of sins. The kingdom of God among men is nothing else than a restoration to a happy life; or, in other words, it is true and everlasting happiness. When John says, that the kingdom of God is at hand, his meaning is, that men, who were alienated from the righteousness of God, and banished from the kingdom of heaven, must be again gathered to God, and live under his guidance. This is accomplished by a free adoption and the forgiveness of sins, by which he reconciles to himself those who were unworthy. In a word, the kingdom of heaven is nothing else than “newness of life,” (Romans 6:4,) by which God restores us to the hope of a blessed immortality. Having rescued us from the bondage of sin and death, he claims us as his own; that, even while our pilgrimage on earth continues, we may enjoy the heavenly life by faith: for he “hath blessed us with all spiritual blessings in heavenly places in Christ,” (Ephesians 1:3.) Though we are like dead men, yet we know that our life is secure; for it “is hid with Christ in God,” (Colossians 3:3.) From this doctrine, as its source, is drawn the exhortation to repentance. For John does not say, “Repent ye, and in this way the kingdom of heaven will afterwards be at hand;” but first brings forward the grace of God, and then exhorts men to repent Hence it is evident, that the foundation of repentance is the mercy of God, by which he restores the lost. In no other sense is it stated by Mark and Luke, that he preached repentance for the forgiveness of sins Repentance is not placed first, as some ignorantly suppose, as if it were the ground of the forgiveness of sins, or as if it induced God to begin to be gracious to us; but men are commanded to repent, that they may receive the reconciliation which is offered to them. Now, as the undeserved love of God — by which he receives into his favor wretched men, “not imputing their trespasses unto them,” (2 Corinthians 5:19) — is first in order; so it must be observed, that pardon of sins is bestowed upon us in Christ, not that God may treat them with indulgence, but that he may heal us from our sins. And, indeed, without hatred of sin and remorse for transgressions, no man will taste the grace of God. But a definition of repentance and faith may explain more fully the manner in which both are connected; which leads me to handle this doctrine more sparingly. With regard to the meaning of the present passage, it is proper to observe, that the whole Gospel consists of two parts, — forgiveness of sins, and repentance Now, as Matthew denominates the first of these the kingdom of heaven, we may conclude, that men are in a state of deadly enmity with God, and altogether shut out from the heavenly kingdom, till God receives them into favor. Though John, when he introduces the mention of the grace of God, exhorts men to repentance, yet it must not be forgotten that repentance, not less than the inheritance of the heavenly kingdom, is the gift of God. As he freely pardons our sins, and delivers us, by his mercy, from the condemnation of eternal death, so also does he form us anew to his image, that we may live unto righteousness. As he freely adopts us for his sons, so he regenerates us by his Spirit, that our life may testify, that we do not falsely,245245 “Ce n'est pas a fausses enseignes ni par feintise.” — “It is not with false colors, nor by hypocrisy.” address him as our Father. In like manner, Christ washes away our sins by his blood, and reconciles our Heavenly Father to us by the sacrifice of his death; but, at the same time, in consequence of “our old man being crucified with him, and the body of sin destroyed,” (Romans 6:6) he makes us “alive” unto righteousness. The sum of the Gospel is, that God, through his Son, takes away our sins, and admits us to fellowship with him, that we, “denying ourselves” and our own nature, may “live soberly, righteously, and godly,” and thus may exercise ourselves on earth in meditating on the heavenly life. Luke 3:3. Preaching the baptism of repentance This form of expression shows first, generally, what is the right use of the Sacraments; and next, why baptism was instituted, and in what it consists. A sacrament, then, is not a dumb ceremony, exhibiting some unmeaning pomp without doctrine; but the Word of God is joined to it, and gives life to the outward ceremony. By the Word I mean, not mutterings of a magical character, made by some exorcist between his teeth, but what is pronounced with a clear and distinct voice, and leads to the edification of faith. For we are not simply told, that John baptized unto repentance, as if the grace of God were contained in a visible sign; but that he explained, in his preaching, the advantage of baptism, that the sign, through the word preached, might produce its effect. This is the peculiarity of baptism, that it is said to be an outward representation of repentance for the forgiveness of sins Now, as the meaning, power, and nature of that baptism are the same as ours, if we judge of the figure from its true import, it is incorrect to say, that the baptism of John is different from the baptism of Christ.246246 "Maintenant puis que le Baptesme de Jean a eu mesme signification, vertu et propriete que le nostre, si nous voulons juger de la figure et du signe selon la chose signifee, c'est 'a dire la verite, nous trouverons que le Baptesme administre par Christ, n'a point este autre que celuy que Jean a administre."—"Now, since the baptism of John had the same meaning, power, and nature as ours, if we wish to judge of the figure and of the sign according to the thing signified, that is to say the reality, we shall find that the Baptism administered by Christ was no other than that which John administered." Matthew 3:3. The yoke of one crying in the wilderness Though this passage of the prophet Isaiah (40:3) ought not to be limited exclusively to John, yet he is one of the number of those to whom it certainly refers. After having spoken of the destruction of the city, and of the awful calamities that would befall the people, he promises a restoration that would follow. His words are, When the temple had been thrown down, and sacrifices abolished, and the people led away into captivity, their affairs seemed to be desperate. And as their ears had been deaf to the uninterrupted voice of the prophets, the Lord kept silence for a time.247247 “Et pource qu'ils avoyent auparavant ferme leurs aureilles a la voix des prophetes, qui journellement et sans cesse, parloyent a eux, le Seigneur se teut, et laissa de parler a eux pour un temps.” — “And because they had formerly shut their ears to the voice of the prophets, who daily and unceasingly spoke to them, the Lord was silent, and ceased to speak to them for a time.” That pious minds may not be cast down during this melancholy silence, the prophet announces, that other preachers of grace will yet arise, to awaken in the people a hope of salvation. Such were Zechariah, Haggai, Malachi, and the like.248248 “Malachie, Esdras, et autres semblables personnages.” — “Malachi, Ezra, and other similar characters.” But as the restoration promised is perpetual, and not for a time only, and as Isaiah refers chiefly to the redemption, which was to be expressed at the coming of Christ, John the Baptist is justly considered the chief minister of consolation. Next follows in the words of the prophet, The voice of one crying That voice is contrasted with the temporary silence,249249 “Anquel il n'y avoit personne qui parlast au nom de Dieu;” — “in which there was nobody who spoke in the name of God.” which I have just mentioned: for the Jews were to be deprived, for a time, of the instruction, which they had wickedly despised. The word wilderness is here used metaphorically for desolation, or the frightful ruin of the nation, such as existed in the time of the captivity. It was so dismally shattered, that it might well be compared to a wilderness The prophet magnifies the grace of God. “Though the people,” says he, “have been driven far from their country, and even excluded from the society of men, yet the voice of God will yet be heard in the wilderness, to revive the dead with joyful consolation.” When John began to preach, Jerusalem was in this sense a wilderness: for all had been reduced to wild and frightful confusion. But the very sight of a visible wilderness must have had a powerful effect on stupid and hardened men, leading them to perceive that they were in a state of death, and to accept the promise of salvation, which had been held out to them. We now see, that this prediction actually relates to John, and is most properly applied to him. Prepare the way of the Lord The prophet undoubtedly addresses Cyrus and the Persians, whose agency the Lord employed in this matter. The meaning is: by his wonderful power, God will open a way to his people through impassable forests, through broken rocks, through a sandy desert; for he will have at hand the ministers of his grace, to remove all hindrances out of the way. But that was a shadowy anticipation of redemption. When the spiritual truth is about to appear, John is sent to remove obstacles. And even now the same voice sounds in our ears, that we may prepare the way of the Lord: that is, that we may take out of the way those sins which obstruct the kingdom of Christ, and thus may give access to his grace. To the same purpose are the following words of the prophet: the crooked shall be made straight, (Isaiah 40:4.) All that they mean is: there are intricate and crooked windings in the world, but through such appalling difficulties the Lord makes a way for himself, and breaks through, by incredible means, to accomplish our salvation. Luke 3:6And all flesh shall see the salvation of God That salvation will not be at all obscure, or experienced by a small number of persons, but will strike every eye, and will be common to all. Hence it follows that this prediction was far from being accomplished, when the people returned from Babylon:250250 “In populi reditu;” — “quand le peuple est retourne de Babylone.” for though the Lord gave, at that time, a memorable display of his grace, yet he did not reveal his salvation to the whole world. On the contrary, the prophet’s design was, to present the uncommon excellence of the salvation which was to be manifested, in contrast with God’s former benefits, and thus to inform believers, that the dispensations of God towards his Church had never been so remarkable, nor his power so illustriously displayed in their deliverance. Flesh is here put for men, without being intended to denote their depravity.251251 “Le mot de Chair n'est pas ice mis pour denoter la corruption de nature, mais il signifie simplement les hommes.” — “The word Flesh is not put here to denote the corruption of nature, but means simply men.” Matthew 3:4. And the same John had his raiment of camel’s hair The Evangelist does not desire us to reckon it as one of John’s chief excellencies, that he followed a rough and austere way of living, or even that he avoided a moderate and ordinary degree of elegance: but, having already stated that he was an inhabitant of the mountains, he now adds, that his food and clothing were adapted to his residence. And he mentions this, not only to inform us, that John was satisfied with the food and dress of the peasants, and partook of no delicacies; but that, under a mean and contemptible garb, he was held in high estimation by men of rank and splendor. Superstitious persons look upon righteousness as consisting almost entirely of outward appearances, and have commonly thought, that abstinence of this kind was the perfection of holiness. Nearly akin to this is the error, of supposing him to be a man who lived in solitude, and who disdained the ordinary way of living; as the only superiority of hermits and monks is, that they differ from other people. Nay, gross ignorance has gone so far that, out of camel’s hair they have made an entire skin. Now, there can be no doubt, that the Evangelist here describes a man of the mountains,252252 “Montanum hominem;” — “un homme suivant les montagnes.” widely distant from all the refinement and delicacies of towns,—not only satisfied with such food as could be procured, but eating only what was fit to be used in its natural state, such as wild honey, which is supplied by that region in great abundance, and locusts, with which it also abounds. Or he may have intended to point out that, when a man of mean aspect, and without any polite accomplishments, appeared in public life, it was attended by this advantage, that the majesty of God shone alone in him, and yet struck all with admiration. For we must observe what is added, that there was a great concourse of people from all directions; from which we infer, that his fame was very widely spread.253253 “Qu il a ete merveilleusement grand bruit de luy par tout le pays.” — “That there was an astonishingly great noise about him through all the country.” Or the Evangelist may have signified the design of God, to present, in the person of John, a singular instance of frugality, and, in this manner, to fill the Jews with reverence for his doctrine, or at least to convince them of ingratitude, according to that saying of our Lord, John the Baptist came neither eating bread nor drinking wine, (Luke 7:33.) Matthew 3:6; Mark 1:5. And were baptized, confessing their sins This confession was a testimony of repentance: for, as the Lord, in the sacraments, brings himself under obligation to us, as if he had given his own hand-writing, so it is our duty, on the other hand, to reply to him. In Baptism, he declares that our sins are forgiven, and calls us to repentance. That men may come forward, in a right manner, to be baptized, confession of sins is demanded from them: otherwise the whole performance would be nothing but an idle mockery254254 “Autrement, tout ce sainct mystere seroit tournee en mines et bas-tellerie.” — “Otherwise, all this holy mystery would be turned into grimaces and buffoonery.” Let it be observed, that we are here speaking of adults, who ought not, we. are aware, to be admitted indiscriminately into the Church, or introduced by Baptism into the body of Christ,255255 “En la communion de Christ;” — “into communion or fellowship with Christ.” till an examination has been previously made.256256 “Devant qu'ils n'ayent este examinez et interroguez de leur foy;” —”before they have been examined and interrogated as to their faith.” Hence it is obvious, how absurdly this passage has been tortured by the Papists, to support auricular confession. There were no priests at hand, in whose ears each individual might privately mutter257257 “Il n'y avoit point 1a de prestres, devant lequel un chacun eust peu s'a genouiller l'un apres l'autre, pourbarboter ses pechez en leurs aureilles.” — “There were no priests there, before whom each individual might kneel down, one after another, to mutter his sins in their ears.” his sins; nor is it said that they enumerated all their sins; nor are we told that John left in charge to his disciples an ordinary rule for confession. Even granting to Papists all that they ask, confession will belong to Catechumens alone,258258 “Ceste confession n'appartient droit qu'a ceux qui de nouveau se convertissent a la foy.” — “That confession would only belong to those who are recently converted to the faith.” and will have no place after Baptism. At all events, the law which they lay down for confession after Baptism, derives no countenance from John’s example.259259 “Pour le moins, quand ils commandent par leur loy de se confesser depuis le Baptesme, ils ne peuvent pas dire qu’ils ensuivent Jean, ny l’alleguer pour autheur.” — “At least, when they enjoin, by their law, to make confession after Baptism, they cannot say that they follow John, nor produce him as their author.” 244The whole passage is remarkable, and proves that the appointment to the sacred office of high priest was entirely at the disposal of the Roman Governor. “This man (Valerius Gratus) deprived Ananus of the high priesthood, and appointed Ishmael, the son of Phabi, to be high priest. He also deprived him in a little time, and ordained Eleazar, the son of Ananus, who had been high priest before, to be high priest: which office, when he had held for a year, Gratus deprived him of it, and gave the high priesthood to Simon, the son of Camithus; and, when he had possessed that dignity no longer than a year, Joseph Caiaphas was made his successor. When Gratus had done those things, he went back to Rome, after he had tarried in Judea eleven years, when Pontius Pilate came as his successor.” — (Ant. 18:2:2.) 246 "Maintenant puis que le Baptesme de Jean a eu mesme signification, vertu et propriete que le nostre, si nous voulons juger de la figure et du signe selon la chose signifee, c'est 'a dire la verite, nous trouverons que le Baptesme administre par Christ, n'a point este autre que celuy que Jean a administre."—"Now, since the baptism of John had the same meaning, power, and nature as ours, if we wish to judge of the figure and of the sign according to the thing signified, that is to say the reality, we shall find that the Baptism administered by Christ was no other than that which John administered." 247 “Et pource qu'ils avoyent auparavant ferme leurs aureilles a la voix des prophetes, qui journellement et sans cesse, parloyent a eux, le Seigneur se teut, et laissa de parler a eux pour un temps.” — “And because they had formerly shut their ears to the voice of the prophets, who daily and unceasingly spoke to them, the Lord was silent, and ceased to speak to them for a time.”
Q: $g$ is a meromorphic function on $\mathbb{C}$, $g(\frac1n)=\frac{1+n^4}{1-2n^4}$, please find out the analytical expression of $g$. Problem: If $g$ is a meromorphic function on $\mathbb{C}$, and for every $n\in\mathbb{N+}$, we have $$g \left (\frac1n \right)=\frac{1+n^4}{1-2n^4}$$, please find out the analytical expression of $g$. I think maybe I can use Laurent series to solve the problem, but I just get stuck here. A: Set $z = 1/n$, then $n = 1/z$ and $$g(z) = \frac{1 + \frac{1}{z^4}}{1 - \frac{2}{z^4}} = \frac{z^4 + 1}{z^4 - 2}.$$ Note that $g$ is holomorphic at $0$: in fact, $g(0) = -1/2$. If $h(z)$ is any other function holomorphic at $0$ which agrees with $g(z)$ on the sequence $z_n = 1/n$, then $h(z_n) - g(z_n) = 0$ for all $n$, and since $0$ is an accumulation point of $z_n$, the identity theorem shows $h(z) = g(z)$ for all $z$ for which $h(z)$ is defined.
1. Field of the invention Much present-day electronic equipment operates with optimum performance and reliability only when supplied with reasonably accurately sinusoidal alternating voltage. In many applications the available alternating voltage supplies are, or often become, of seriously imperfect waveform. This is particularly so if, as is often the case it is found necessary to employ a constant-voltage transformer in order to ensure that the voltage supplied to an equipment shall remain within close tolerances. 2. Description of the Prior Art It has been proposed in order to supply a load with an accurately predetermined alternating waveform to employ accurate-waveform generators, which are very expensive to construct and maintain or to employ low-frequency oscillators which seldom have sufficiently accurate waveforms. Elaborate arrangements using photoelectric cells cyclically exposed to light passing a moving mask or appropriate shape have also been used, but such apparatus involving moving elements is insufficiently reliable for many applications. It is also advantageous in some applications to be able to provide an a.-c. supply of a frequency other than those normally available.
Q: How does DispatcherServlet work if we have multiple XML Configuration file? Questions How does DispatcherServlet work if we have multiple XML Configuration file so how does Spring Application Context loads them and acts on them ? Scenario: In my case, we have an application that is supposed to global that is application should have AP{Asia-Pacific}, EM{Europ-Middleeast}, CA{Canada} and LA{Latin America} Versions. Currently, we have Application for one region that is EMand its has its XML Configuration File i.e, em-servelt.xml and then there is generic web.xml file now for AP region we have another ap-servlet.xml file and by the way both em-servlet.xml and ap-servlet.xml file would have same bean names but they would be pointing to Controllers in different packages, so for example, em would be pointing to something like com.em.DomainController and ap would be pointing to com.ap.DomainController. So my question is How is the request mapped to different controllers and how request is being recognized so that it should read from ap-servlet.xml or em-servlet.xml ? I hope am able to clearly state my question. A: The web.xml file can configure multiple DispatcherServlet instances, each having its own configuration. Each DispatcherServlet instance configures a WebApplicationContext separate from other DispatcherServlet instances, so you can use the same bean names without affecting the other application context. <!-- configured by WEB-INF/ap-servlet.xml --> <servlet> <servlet-name>ap</servlet-name> <servlet-class>org.springframework.web.servlet.DispatcherServlet</servlet-class> <load-on-startup>1</load-on-startup> </servlet> <!-- configured by WEB-INF/em-servlet.xml --> <servlet> <servlet-name>em</servlet-name> <servlet-class>org.springframework.web.servlet.DispatcherServlet</servlet-class> <load-on-startup>1</load-on-startup> </servlet> You must also configure web.xml to map requests to the appropriate DispatcherServlet. For example, each region could have a different URL path. <servlet-mapping> <servlet-name>ap</servlet-name> <url-pattern>/ap/*</url-pattern> </servlet-mapping> <servlet-mapping> <servlet-name>em</servlet-name> <url-pattern>/em/*</url-pattern> </servlet-mapping>
Whitehouse v Jordan Whitehouse v. Jordan [1981] 1 All ER 267: The claimant was a baby who suffered severe brain damage after a difficult birth. The defendant, a senior hospital registrar, was supervising delivery in a high-risk pregnancy. After the mother had been in labour for 22 hours, the defendant used forceps to assist the delivery. The Lords found that the doctor's standard of care did not fall below that of a reasonable doctor in the circumstances and so the baby was awarded no compensation. See also Negligence Notes Category:English tort case law Category:1981 in case law Category:House of Lords cases Category:1981 in British law
$8500mo Get Fast, Affordable, High-Speed Internet in Loon Lake Loon Lake, Washington residents looking for Internet service that is quick and economical have a clear choice—CenturyLink High-Speed Internet. With CenturyLink in Loon Lake, you can select your own Internet speed, so you’ll have the bandwidth you need to connect all the devices in your home. When you sign up for CenturyLink High-Speed Internet in Loon Lake, you get 11 free email accounts and 24/7 online access to your account. You’ll also be able to visit the CenturyLink home page to watch popular TV shows at your convenience. Get a great deal on CenturyLink’s Internet service with the 3 Year Price-Lock Guarantee. Sign up for CenturyLink High-Speed Internet in Loon Lake. Call today at 1-509-396-6684. Talk More, for Less with CenturyLink® Phone in Loon Lake, WA Have you been depending on your cell phone without considering the benefits that come from having a home phone? It may be time to make a change. A home phone from CenturyLink provides a level of security and stability that you can’t get with a cell phone. Loon Lake customers who invest in a CenturyLink home phone plan don’t have to deal with poor sound quality, calls that drop, or coverage that disappears in certain areas. Plus, having a home phone gives you added protection in an emergency since you or your family members will be able to place a call even if a cell phone battery is dead or coverage is spotty. You can also make local calls without stressing out about how many minutes you have left, since CenturyLink plans in Loon Lake include unlimited local calling—plus for just a few dollars a month you can upgrade to Unlimited Nationwide calling so you can call whoever you want wherever they live. Plus, if you have family members and friends all around the world, CenturyLink makes it easy to stay in touch with international and multilingual calling plans. Enjoy advanced calling features and improved communication—all with a home phone from CenturyLink. Bundle & Save with CenturyLink® TV, home phone, and Internet service are basic essentials that you use every day—and they shouldn’t put a strain on your budget. Save money on these standard services each month thanks to CenturyLink in Loon Lake. Double and triple play bundles from CenturyLink bring together the services you need to keep your home running. And you don’t have to worry about those prices increasing after a few months—with a 3 Year Price-Lock Guarantee, you can get the same low prices on CenturyLink’s most popular bundles for the entire duration of your contract. CenturyLink offers bundles that include home phone, Internet, and TV. And when you select a package, you get to choose the channels, features, and speeds that fit your lifestyle. You’ll also get to enjoy the DIRECTV’s exclusive NFL SUNDAY TICKET if you bundle DIRECTV service with CenturyLink. Make life in your Loon Lake home a little easier while saving money every month—sign up for a bundle today. The name CenturyLink and the pathways logo are trademarks of CenturyLink. PRICE FOR LIFE HIGH-SPEED INTERNET Rate will be $50/mo. in certain areas. Service and offer are not available everywhere. Limited time offer. Rate is available to new and existing qualifying residential customers who reside in qualifying markets where plan is available. CenturyLink-provided modem may be required for High-Speed Internet; lease ($10/mo. fee) or a one-time purchase ($150) option available (S&H applies for overnight delivery, if requested). Self installation, if available at customer's location, may be selected at no charge. A professional technician installation fee of $60 will apply, if selected by customer or is required due to network technology at customer location. Credit approval and deposit may be required. Month-to-month service may be canceled at any time. Plan cannot be combined with other promotions. Customer must remain in good standing and offer terminates if customer changes their account in any manner, including change of address (even if plan is available), change to service, and service suspension (Vacation Program) or disconnection. Additional restrictions may apply. CenturyLink may change, cancel, or substitute offers and services, or vary them by service area, at its sole discretion without notice. All products and services listed are governed by tariffs, terms of service, or terms and conditions posted at centurylink.com. See centurylink.com/help for taxes. Customers must accept HSI Subscriber Agreement prior to using service. Listed Internet speeds vary due to conditions outside of network control, including customer location, equipment, and access through a wireless connection, and are not guaranteed. See centurylink.com/internetpolicy for additional network performance information. UNLIMITED NATIONWIDE CALLING Service is not available everywhere. Activation fee applies. Home Phone with Unlimited Nationwide Calling — Service applies to 1 residential phone line with direct-dial, local and nationwide long distance voice calling from home phone, including Alaska, Puerto Rico, Guam, and U.S. Virgin Islands; excludes commercial use, call center, data and facsimile services (each may be billed at $0.10/minute), conference lines, directory and operator assistance, chat lines, pay-per-call, calling card use, or multi-housing units. Usage will be monitored for compliance and service may be suspended/terminated for noncompliance. If usage consistently exceeds 5,000 minutes/mo., customer may be moved to another plan. International calling billed separately. PRICE FOR LIFE DOUBLE PLAY (HIGH-SPEED INTERNET + PHONE) *Voice fees and surcharges include those that are federal, state, and local government permitted and mandated, such as 911, USF, Facilities Relocation Cost Recovery Fee, etc., in addition to taxes that apply and appear on your monthly bill. For information about taxes, fees and surcharges, visit www.centurylink.com/feesandtaxes; rates subject to change. Service and offer are not available everywhere. Limited time offer. Rate is available to new and existing, qualifying residential customers who reside in qualifying markets where plan is available. CenturyLink provided modem may be required for High Speed Internet; lease ($10/mo. fee) or a one-time purchase ($150) option available (S&H applies for overnight delivery, if requested).Credit approval and deposit may be required. Month to month service may be cancelled at any time. Plan cannot be combined with other promotions. Customer must remain in good standing and offer terminates if customer changes their account in any manner, including change of address (even if plan is available), change to service, and service suspension (Vacation Program) or disconnection. Additional restrictions may apply. CenturyLink may change, cancel, or substitute offers and services, or vary them by service area, at its sole discretion without notice. All products and services listed are governed by tariffs, terms of service, or terms and conditions posted at centurylink.com. Customers must accept HSI Subscriber Agreement prior to using service. Listed internet speeds vary due to conditions outside of network control, including customer location, equipment, and access through a wireless connection, and are not guaranteed. See centurylink.com/InternetPolicy for additional network performance information. Installation: Type of installation dependent on network technology at customer location. All installations available at no charge. Self install includes all equipment and instructions shipped; Tech Lite includes modem and wire placement to one jack; and, Tech (required for bonded and fiber) includes up to 5 computers with wire replacement to one jack. Home Phone with Unlimited Nationwide Calling: Service applies to 1 residential phone line with direct-dial, local and nationwide long distance voice calling from home phone, including Alaska, Puerto Rico, Guam, and U.S. Virgin Islands; excludes commercial use, call center, data and facsimile services (each may be billed at $0.10/minute), conference lines, directory and operator assistance, chat lines, pay-per-call, calling card use, or multi-housing units. Usage will be monitored for compliance and service may be suspended/terminated for noncompliance. If usage consistently exceeds 5,000 minutes/mo., customer may be moved to another plan. International calling billed separately.
Q: Does Office 2003 represent a security risk on a managed environment, due to end of mainstream support? With the end of mainstream support for Office 2003, it's tempting to retire Office 2003 from a managed network altogether (and replace with Office 2007, in our environment), but there are pockets of resistance (e.g. users who contractually share Access 2003 databases with large consortia internationally). Security is an effective rationale to compel users to upgrade, when it's defensible. Does Office 2003 represent a security threat on a managed network, due to end of mainstream support? EDIT: Much of our user base, and our back end, are moving to Office 2007 for Exchange and Sharepoint integration advantages - so sticking with 2003 in general is not the plan, and heterogeneity is a pain. A: Office 2003 is safe, as long as you are running SP3 and patching. Microsoft continues to provide security fixes for the duration of the extended support cycle. We had a similar issue with Access -- some users had Access applications that were essential to whatever they were doing. The solution is pretty simple -- you just configure the installer to leave Access 2003 behind! KB928091 discuses install order and some gotchas. (The big one is that you can only have one version of Outlook) You're actually just as well that you've waited, Office 2007 SP2 fixed all sorts of pretty serious errors, particularly with Outlook calendaring with Exchange 2007.
IGN : This is a first person experience game, we saw it unveiled at The Game Awards back in December; give me the quick elevator pitch. Loading Loading Loading Loading : That sounds an awful lot like the Sandra Bullock film Gravity.: When I first started working on this game, I just wasn’t aware of Gravity. When I started using the metaphor of the destruction of my personal life, and the destroyed space station, it became really clear that this was a game I really, really wanted to make, an experience I wanted to have, and a story I wanted to tell. About a month into working on this I discovered Gravity. I didn’t know about it beforehand, and initially I was devastated because you want to be original as much as you can, even though that’s next to impossible when you’re creating things. I was devastated and I was like “you can’t make this game anymore.” But at that time in my life I was really rebelling against being told who I am and what I can do and what I’ve done – so I just kind of said “f**k it,” there’s room for everyone. Gravity is not the first space disaster piece of entertainment, and you could certainly say Gravity is derivative of other things in some ways, but that’s not the point. The point is that it’s a story I want to tell and I’m not going to shy away from doing that because there’s some similarities to it in a really great movie. If people compare Adr1ft to Gravity, that’s awesome. It’s actually been helpful for us because people’s expectations have been set for a game experience like an Oscar-calibre film. Initially it was devastating, but I’ve just accepted it because I know what we’re doing is very different. I see people online all the time saying “oh, so basically Gravity the game.” Well, it’s not “basically Gravity the game” – it’s a space disaster that happens to have a main character who’s a woman. I only had two choices [laughs]. I didn’t want to make the traditional space-marine game. It’s just not something I was interested in. I think when people play the game they will see that we’re trying to do something different.: But you weren’t inspired by the film at all?Adam Orth: No, not at all. It was maybe a happy accident I guess, although it didn’t feel happy at the time. I definitely had a minute where I’m like “I can’t do this.” But it passes.: You sort of alluded to this when you talked about your personal life, but where did the idea for Adr1ft come from?: I had an idea for a space disaster game, and then the whole Twitter controversy [Xbox One “deal with it comments] happened. When you’re creating something, my personal belief is that you have to put as much of yourself into it, whether it’s painful or exhilarating, or happy – whatever it is, that’s the best art. I felt like, “if I’m going to do this, I’m not going to flinch at all.”: Is [making the game] a therapeutic experience for you?: I wouldn’t say it’s therapeutic because making games is a very long and not an immediate process at all. I had a lot of opportunities to talk about that stuff [Xbox One comments] when it happened and I didn’t because I knew I was going to make this game. I don’t think anyone cares about that stuff anymore. This is my personal statement about it. It’s just the way I chose to funnel it into my creativity.: You’ve already alluded to it, but you found yourself in a bit of a pickle on the internet. Leading up to the Xbox One’s launch you were an employee at Microsoft working on T.V stuff. People were very up in arms about the idea of this console having to always be online. You tweeted “Sorry, I don’t get the drama around an ‘always on’ console. Every device now is ‘always on.’ That’s the world we live in. #dealwithit.” You are no longer at Microsoft obviously. Do you think it was the hashtag that pushed people over the edge, or was it you replying to people, going further down that rabbit hole you had opened up for yourself?: I think it’s a little bit of both. It’s a super unfortunate thing that happened, and obviously the results were traumatic in a lot of ways. I don’t really think about it a lot anymore, although I do still hear about it on the internet. It’s definitely some people’s favorite past-time. I’ve talked about this, and have done a couple lectures about this. I definitely disrespected some people by having a sarcastic conversation with a friend – it’s not an excuse in any way, it’s just what happened. I shouldn’t have done it publically. I should have done it over a beer at a bar or something. It was an unfortunate event that – thankfully – is behind me, and it’s gotten me to where I am now.: Do you regret it? Would you not take it back even though it was a terrible thing, or do you wish you could take it back?: I would never take it back because you can’t take back life. You can’t do it. It sucked. It absolutely ripped my life apart but, when things burn down new things grow – that’s how I choose to look at it.: You locked your Twitter account for a while, but eventually came back.: Well, when it happened I think I got more than 10,000 Twitter followers within a couple hours. It was crazy. I locked it down because I didn’t know what to do.: How bad did it get? How much did the internet outrage seep into your real life?: I don’t think anything I could say about it here would be any different than what I’ve publically said about it already. I appreciate the desire to want to find that out from me in this interview but I think that it’s such a painful thing – not only for me but for my family too – that it’s just not worth getting into. It sucked that it happened, and I’m upset that I offended people. Somebody told me today, “find me someone who hasn’t said something stupid on the internet – you’ll never find them.” We all make mistakes in life, and it’s about how you recover from that and what you do next. That’s really what Adr1ft is about.: Are there any audio-logs or Easter eggs that say “deal with it” in the game anywhere? [Laughs].: No. I’ve got a sense of humor about the whole thing, but it’s just not that kind of game.: You’ve got Oculus Rift support. It seems like it could be an incredible Oculus Rift experience on the PC. Is that the ideal way to experience this game?: I don’t want to say that because it’s a very different experience. Initially I just approached the VR [virtual reality] thing as extra immersion, “immersion plus,” which it does give you. But what I wasn’t prepared for was how it actually elicits emotions when you’re having – well it’s really hard to describe. It connects you to the game in a fundamental way because everyone knows, or has their own idea, of what being stranded out in space feels like. When you’re able to even challenge the way someone thinks about that, or meet it, it’s very powerful. I’ve had some people try the game in virtual reality who were moved to tears. I don’t think it’s because we’re making this amazing artistic thing. I think we’re tapping into a primal emotion in people, with the subject matter and the situation, and then you add in this way to be in it in a way that you’ve never been able to do before – as a developer, that’s cool. It’s so powerful. We planned for VR from the beginning, and we’ve designed the game to support that. We feel really fortunate to be at this moment of excitement about it because very soon there’s going to be a bunch of platforms out there that support this game, and we can’t wait to get them out.: We just saw at GDC this week Sony unveil the latest version of Project Morpheus. They gave it a target release date of the first half of 2016. Is Morpheus something you guys would come back with an update for later down the road?: Yeah, absolutely, if Sony was interested in something like that. We’re definitely talking to them. We have Morpheus kits, and it’s something we’re super excited about. I’ve always been a PlayStation fanatic, so getting this game on PlayStation in a new way is really important to me personally.: You mentioned the tears with Oculus. Has anyone ever thrown up playing this game? Because it’s a zero G space game with an Oculus Rift.: No, actually, it’s the other way; people never get sick with our game. In my experience using VR, Adr1ft is unique in the fact that you’re not grounded to the floor, you can move in any direction, and it’s slow and dreamy. That allows for some really non-queasy gaming [laughter]. We’ve had people refuse to try this demo because they get sick all the time. I just force people to do it, and when they do it they’re like, “I feel great, nothing happened, it was great.” So, I think there’s a mix of happy accident and stuff we’re working on to try to do that – but it’s very non-queasy. We’ve probably had more than 500 VR demos of Adr1ft so far, and I can only count on one hand the people who’ve gotten sick.: Is there a significance to the fact that there’s a number 1 wedged into the middle of the name of the game?: I haven’t really talked about it before, but it’s not a big stretch to understand that you’re one person. You’re alone, and one is the loneliest number. I’ve taken a lot of s**t about it on the internet, believe me. But it doesn’t matter because, who cares? No one cares. If it means something to the people creating it, that’s all that matters. If you’re not going to buy the game because there’s a one in it, you’ve got bigger problems.: Somewhere there’s a marketing manager, perhaps at your publisher, who’s just cringing right now. “What do you mean it doesn’t matter what the game’s called?!” [Laughs].: That’s just the way it is. It means something to the game. It’s just there. Deal with it [laughter].: You’ve had an eclectic career. You were a recording artist, you toured, I’ve heard you’re friends with Rivers Cuomo. You have this big music background. How did you end up in video games?: It’s actually not that big of a stretch. I’ve always been a gamer. Me and my brother used to get new Atari cartridges and play the games and take out magic markers and paper afterwards and draw up brand new levels and send them in to Atari. Every three weeks later we would get a form letter back, always with stickers and patches and other cool stuff. It’s always been a part of my life, just like music. I was a musician in Los Angeles, professionally, for a while. I signed a publishing deal to write music for film and television. I begged my published to find me game-work. This was in the mid-late ‘90s, and the music business had no idea. You couldn’t tell record company people about it because that wasn’t even on their periphery at all. So, I got a job doing music for the PlayStation One James Bond game Tomorrow Never Dies. At this time it was a bit of a wild-west in the Hollywood video game making business. Unbeknownst to me, they had already hired somebody else to also do the same thing – a guy who was hugely famous then and now, Tommy Tallarico. They sadly informed me that the music I had composed, recorded, performed and turned in would not be going into the game, which was soul-crushing. I was burnt on it at that point. You’d have to start all over again, and I couldn’t do that. So, I became a tester. I floated around the Los Angeles area and I worked at every interactive studio at the time. But what I really wanted was to be a tester at Sony Santa Monica. I was incessant about bugging them constantly, and I finally got a job there. I was testing on Twisted Metal: Black, and I became friends with David Jaffe, and everyone at that studio. He [Jaffe] pulled me out of test and made me a junior game designer. My first real game design job was working on Twisted Metal: Black.: You worked on God of War with David Jaffe, you worked on a few Metal of Honor games at EA.Adam Orth: Yeah, I actually left Sony Santa Monica to go work on Medal of Honor because I was really passionate about that.: And then PopCap to work on a bunch of their IPs, LucasArts on a number of things. It just shows that if you are really serious about getting into game design, become a tester.Adam Orth: People ask me all the time how to get into the [game] industry. That’s how I got in. I don’t know if that advice is dated or not anymore, but it’s a great way. You get this foundation that you don’t get anywhere else. You get to learn the business and learn about each discipline. You get to learn about the coders and engineering, about design, art, audio, production – anything that happens in a game development studio. So if you apply yourself there, and you’re good, you can get out there. Over the years I’ve put a lot of people into test positions who are now game designers at big places. Somebody gave me a shot, and I’d like to help people out too. It’s awesome when I can take a guy off Twitter who seems reasonably bright and engaging, and get him a job testing at Naughty Dog, working on The Last of Us. Somebody gave me a shot, so it’s my duty to pay it forward. Otherwise, what are we doing here?: Is game development inherently a pretty nomadic life?Adam Orth: It can be. We’ve all read the stories. I’ve seen some pretty terrible things in my career of AAA game development. It’s hard because A. it’s kind of the nature of the beast, and B. it should never be. More and more I compare it to the film business. You have to have the stomach for it. I’ve seen people with families bouncing around, chasing these things and getting laid off. Like the Kotaku story that recently came out that told this long story about this family that kept going places and getting laid off, and they kept having more kids and they needed a new house – to me, no game job is worth doing that to your family. Nothing’s worth doing that to your family. But you have to admire the passion of these people who want to do it. Being in the game development industry is a gift. We have the greatest job, it’s amazing. But the reality of the nomadic nature [of the lifestyle] definitely exists, and it’s hard to have security on these giant teams and projects. I guess it’s also hard to have security when you start your own studio. It’s all about how you manage that risk and what you’re willing to sacrifice for those things. When you exist in the big AAA realm, it can be nomadic for sure. I’ve seen friends and colleagues moving all over the place.: Do you think that the middle-class of games is dead or dying? Games we would see in the original Xbox and PlayStation 2 era. It does seem like it’s gotten very much either AAA or indie titles.Adam Orth: Well yeah, the risk of making these mid-tier titles is too great. Who’s going to make those now? The larger companies aren’t going to do that, and the little guys can’t do it. If you can do it, it’s a risk. Is it a new IP, is it continuing something? I think there’s smart ways to do it, but from a development standpoint, if you take a $10 million dollar game, the risk of return on that investment is too great. That’s why people won’t do it.: Do you think we’re [the video game industry] in a healthy position right now? Are you worried?: I see the video game industry thriving right now. It’s just different. There’s no middle in this big AAA console thing, but look at mobile. There’s more games than ever now. That might be a bad thing but I don’t see the game industry being in a bad position.: At Microsoft you were a member of the core design team responsible for overall feature design on Xbox One with focus on interactive television. Are you happy with the way T.V functionality turned out on Xbox One?: It’s hard to say. My experience with the whole Twitter thing makes it hard to go back to that stuff. I don’t really watch a lot of T.V, so it’s not really a part of my life. It felt good doing at the time. I hoped it was something that would take off, but it doesn’t seem like, right now, it’s going somewhere. I think there’s space for it, but how’re we going to do it? How’s it going to be done? I think there’s a lot of smart, talented people who want to make it happen. I think it just wasn’t the time, and for whatever reason it didn’t work. I don’t think that it is something that is a dead idea – I just think it hasn’t been done correctly yet.: As somebody who was on the team that worked with that, are you saddened or disappointed that for various reasons the non-gaming features of the Xbox One have been minimized or brushed aside over the last year or so?: This is going to sound terrible, but I’m not really familiar with all the features on the Xbox right now because I don’t use it a lot. I don’t really have time. I’m spending every waking moment making Adr1ft, and I’m sadly out of touch with those things right now. So I don’t know if I could give you the best answer.: What’s the number one lesson you’ve taken from your past game development experience and applied to Adr1ft?: Never give up. Ever. I’ve been doing this for almost 18 years now, and I’m right now doing the thing I’m most inspired and interested in. Sorry every other game I’ve worked on [laughter]. If you believe in something, you can’t ever give up on it because once you do, what’s left? The death of dreams is a horrible thing to think about. I’ve been lucky. I’ve had a really interesting career, and I’ve been able to work with some amazing people on some amazing things. But now, for me, this is the beginning. I want to keep making these kind of games. We built our studio around the idea of the FPX, and it’s really important for us to hopefully be seen as a leader in making high quality products in that area. We’ve spent so much time in the AAA side of things, and we learned so many good things there. People often talk about AAA like it’s a negative thing – it’s not. There’s great, amazing AAA games. We learned all these amazing things and we can apply them in a different way. We’re seeing that we can do new and different things. Having taken the gun out of your hand, and then how do you interact with the world in an interesting and cool and meaningful way is super challenging. That’s what inspires us every day. How’re you going to get an immersive first-person experience where you can interact with the world and do something cool, sell a fantasy to someone, and make them want to keep playing and keep feeling and have a great experience with video games.: There is no combat in this game.: There is no combat in Adr1ft. There is not a single weapon, there’s not a single bullet – there’s not even another single living person. The enemy in Adr1ft is the environment.: The first-person experience subgenre seems to be taking off, with games like Firewatch and Everybody’s Gone to the Rapture, as well as Adr1ft.: To me, it’s ridiculous to even be mentioned with those games.: I’ve seen those games; I don’t think it’s ridiculous at all. They all look fantastic, including Adr1ft.: Well, thank you. Those are the games that inspire me and are the things I’m looking forward to the most. I cannot tell you how many times I’ve played Proteus or The Stanley Parable. Those games are just so inspiring to me. They showed me that you don’t have to do the same old thing. It’s not a new lesson. Proteus was a huge inspiration for Adr1ft – just massive. I can’t stop with that game. I’m obsessed with it. Having these smaller, immersive experience games that are out there – it’s great for everyone. I don’t think anyone out there is going to have a problem with a massively interesting and fun high quality immersive experience that’s not 65 hours. I often talk about Adr1ft being like going to see the director’s cut of Interstellar at the best IMAX you can. It’s like a $30-$40 night. You’re going to be entertained for 3 hours and maybe go back and see it again. That feels like a premium entertainment experience to me. I think about Adr1ft a little bit like that.: Why do you think this subgenre [first-person experience] has taken off? Is it a reaction to years and years of corridor shooters?: Personally, for us making it, it’s totally a reaction. We don’t want to make those games anymore. I love those games; I play those games; I devour those games; I don’t want to make them. There’s enough games that have violence and shooting out there, and there’s nothing wrong with that. It’s just, at the end of the day, when you’re done developing your game, what do you want to say? How do you want to portray yourself and your team? How do you want to give the player a new way to interact with the world? I’m going to hammer home on that. It’s very important to us. I just can’t shoot anyone in the face anymore [laughter]. I can’t do it. The other guys on my team feel the same way, and we’re totally united with that. That’s not to say that there wouldn’t ever be any violence in our games, but I don’t want to put the player in a position where they’re committing violent acts. There’s a lot of interesting ways to make games that don’t require violence. That’s not a new concept either.: When the game comes out this summer, how do you want people to remember Adr1ft?: Hopefully in a couple ways. I want people to remember Adr1ft in the fact that they had a great mechanical experience. Maybe Adr1ft is not really “fun” for people – it’s very stressful. Tense, stress, frightening, claustrophobic sometimes. I want people to feel like they had a good game mechanic experience, which I think we have. Using oxygen as a shared health and propulsion resource makes every movement count. There’s these little micro-decisions that are hopefully meaningful to people. I would hope people key into that. It seems like people playing the game now really like that. I want people to remember that it was beautiful to look at. It’s got a great engine [Unreal Engine 4] that’s exceeding our expectations for the way the game looks. From the narrative, I want people to feel like, hey, this is not a normal video game story, and is maybe unique in that way. I want people to maybe think about, after they follow the journey of this story, that maybe they have a quiet moment or two of reflection upon, “how would I do that?” or “maybe I can take something away here.” It’s not a teaching thing, it’s not about learning. Hopefully you took something away from it where you pause for a minute and go “that was different and cool, and I want to maybe try that again.” I want to actually take this opportunity to really hammer home, because a lot of people don’t understand that we’re making a traditional game. They think, “oh, it’s not only VR?” I don’t really know how that happened [laughter]. I kind of know how it happened, but it’s a strange thing. It’s actually a traditional game first, but even better with VR. Don’t forget that.
/*! * Copyright 2010 - 2019 Hitachi Vantara. All rights reserved. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. * */ package org.pentaho.s3.vfs; import com.amazonaws.services.s3.AmazonS3; import com.amazonaws.services.s3.model.AmazonS3Exception; import com.amazonaws.services.s3.model.Bucket; import com.amazonaws.services.s3.model.CopyObjectRequest; import com.amazonaws.services.s3.model.InitiateMultipartUploadResult; import com.amazonaws.services.s3.model.ListObjectsRequest; import com.amazonaws.services.s3.model.ObjectListing; import com.amazonaws.services.s3.model.ObjectMetadata; import com.amazonaws.services.s3.model.PartETag; import com.amazonaws.services.s3.model.PutObjectRequest; import com.amazonaws.services.s3.model.S3Object; import com.amazonaws.services.s3.model.S3ObjectInputStream; import com.amazonaws.services.s3.model.S3ObjectSummary; import com.amazonaws.services.s3.model.UploadPartResult; import org.apache.commons.vfs2.CacheStrategy; import org.apache.commons.vfs2.FileName; import org.apache.commons.vfs2.FileObject; import org.apache.commons.vfs2.FileSystemException; import org.apache.commons.vfs2.FileSystemOptions; import org.apache.commons.vfs2.FileType; import org.apache.commons.vfs2.FilesCache; import org.apache.commons.vfs2.impl.DefaultFileSystemManager; import org.apache.commons.vfs2.provider.VfsComponentContext; import org.junit.Before; import org.junit.BeforeClass; import org.junit.Test; import org.mockito.ArgumentCaptor; import java.io.OutputStream; import java.util.ArrayList; import java.util.Arrays; import java.util.Date; import java.util.List; import java.util.stream.Collectors; import org.pentaho.di.core.KettleEnvironment; import org.pentaho.di.core.util.StorageUnitConverter; import org.pentaho.s3common.S3KettleProperty; import static java.util.AbstractMap.SimpleEntry; import static org.junit.Assert.assertEquals; import static org.junit.Assert.assertTrue; import static org.junit.Assert.assertFalse; import static org.junit.Assert.fail; import static org.junit.Assert.assertNotNull; import static org.mockito.Mockito.mock; import static org.mockito.Mockito.spy; import static org.mockito.Mockito.when; import static org.mockito.Mockito.any; import static org.mockito.Mockito.anyString; import static org.mockito.Mockito.verify; import static org.mockito.Mockito.times; import static org.mockito.Mockito.atMost; /** * created by: dzmitry_bahdanovich date: 10/18/13 */ public class S3FileObjectTest { public static final String HOST = "S3"; public static final String SCHEME = "s3"; public static final int PORT = 843; public static final String BUCKET_NAME = "bucket3"; public static final String OBJECT_NAME = "obj"; private S3FileName filename; private S3FileSystem fileSystemSpy; private S3FileObject s3FileObjectBucketSpy; private S3FileObject s3FileObjectFileSpy; private S3FileObject s3FileObjectSpyRoot; private AmazonS3 s3ServiceMock; private static final String S3VFS_USE_TEMPORARY_FILE_ON_UPLOAD_DATA = "s3.vfs.useTempFileOnUploadData"; private ObjectListing childObjectListing; private S3Object s3ObjectMock; private S3ObjectInputStream s3ObjectInputStream; private ObjectMetadata s3ObjectMetadata; private List<String> childObjectNameComp = new ArrayList<>(); private List<String> childBucketNameListComp = new ArrayList<>(); private long contentLength = 42; private final String origKey = "some/key"; private Date testDate = new Date(); @BeforeClass public static void initKettle() throws Exception { KettleEnvironment.init( false ); } @Before public void setUp() throws Exception { s3ServiceMock = mock( AmazonS3.class ); S3Object s3Object = new S3Object(); s3Object.setKey( OBJECT_NAME ); s3Object.setBucketName( BUCKET_NAME ); filename = new S3FileName( SCHEME, BUCKET_NAME, BUCKET_NAME, FileType.FOLDER ); S3FileName rootFileName = new S3FileName( SCHEME, "", "", FileType.FOLDER ); S3KettleProperty s3KettleProperty = mock( S3KettleProperty.class ); when ( s3KettleProperty.getPartSize() ).thenReturn( "5MB" ); S3FileSystem fileSystem = new S3FileSystem( rootFileName, new FileSystemOptions(), new StorageUnitConverter(), s3KettleProperty ); fileSystemSpy = spy( fileSystem ); VfsComponentContext context = mock( VfsComponentContext.class ); final DefaultFileSystemManager fsm = new DefaultFileSystemManager(); FilesCache cache = mock( FilesCache.class ); fsm.setFilesCache( cache ); fsm.setCacheStrategy( CacheStrategy.ON_RESOLVE ); when( context.getFileSystemManager() ).thenReturn( fsm ); fileSystemSpy.setContext( context ); S3FileObject s3FileObject = new S3FileObject( filename, fileSystemSpy ); s3FileObjectBucketSpy = spy( s3FileObject ); s3FileObjectFileSpy = spy( new S3FileObject( new S3FileName( SCHEME, BUCKET_NAME, BUCKET_NAME + "/" + origKey, FileType.IMAGINARY ), fileSystemSpy ) ); S3FileObject s3FileObjectRoot = new S3FileObject( rootFileName, fileSystemSpy ); s3FileObjectSpyRoot = spy( s3FileObjectRoot ); // specify the behaviour of S3 Service //when( s3ServiceMock.getBucket( BUCKET_NAME ) ).thenReturn( testBucket ); when( s3ServiceMock.getObject( BUCKET_NAME, OBJECT_NAME ) ).thenReturn( s3Object ); when( s3ServiceMock.getObject( BUCKET_NAME, OBJECT_NAME ) ).thenReturn( s3Object ); when( s3ServiceMock.listBuckets() ).thenReturn( createBuckets() ); when( s3ServiceMock.doesBucketExistV2( BUCKET_NAME ) ).thenReturn( true ); childObjectListing = mock( ObjectListing.class ); when( childObjectListing.getObjectSummaries() ).thenReturn( createObjectSummaries( 0 ) ).thenReturn( new ArrayList<>() ); when( childObjectListing.getCommonPrefixes() ).thenReturn( new ArrayList<>() ).thenReturn( createCommonPrefixes( 3 ) ); when( childObjectListing.isTruncated() ).thenReturn( true ).thenReturn( false ); when( s3ServiceMock.listObjects( any( ListObjectsRequest.class ) ) ).thenReturn( childObjectListing ); when( s3ServiceMock.listObjects( anyString(), anyString() ) ).thenReturn( childObjectListing ); when( s3ServiceMock.listNextBatchOfObjects( any( ObjectListing.class ) ) ).thenReturn( childObjectListing ); s3ObjectMock = mock( S3Object.class ); s3ObjectInputStream = mock( S3ObjectInputStream.class ); s3ObjectMetadata = mock( ObjectMetadata.class ); when( s3ObjectMock.getObjectContent() ).thenReturn( s3ObjectInputStream ); when( s3ServiceMock.getObjectMetadata( anyString(), anyString() ) ).thenReturn( s3ObjectMetadata ); when( s3ObjectMetadata.getContentLength() ).thenReturn( contentLength ); when( s3ObjectMetadata.getLastModified() ).thenReturn( testDate ); when( s3ServiceMock.getObject( anyString(), anyString() ) ).thenReturn( s3ObjectMock ); when( fileSystemSpy.getS3Client() ).thenReturn( s3ServiceMock ); } @Test public void testGetS3Object() throws Exception { when( s3ServiceMock.getObject( anyString(), anyString() ) ).thenReturn( new S3Object() ); S3FileObject s3FileObject = new S3FileObject( filename, fileSystemSpy ); S3Object s3Object = s3FileObject.getS3Object(); assertNotNull( s3Object ); } @Test public void testGetS3BucketName() { filename = new S3FileName( SCHEME, BUCKET_NAME, "", FileType.FOLDER ); when( s3FileObjectBucketSpy.getName() ).thenReturn( filename ); s3FileObjectBucketSpy.getS3BucketName(); } @Test public void testDoGetOutputStream() throws Exception { InitiateMultipartUploadResult initResponse = mock( InitiateMultipartUploadResult.class ); when( initResponse.getUploadId() ).thenReturn( "foo" ); when( s3ServiceMock.initiateMultipartUpload( any() ) ).thenReturn( initResponse ); UploadPartResult uploadPartResult = mock( UploadPartResult.class ); PartETag tag = mock( PartETag.class ); when( s3ServiceMock.uploadPart( any() ) ).thenReturn( uploadPartResult ); when( uploadPartResult.getPartETag() ).thenReturn( tag ); assertNotNull( s3FileObjectBucketSpy.doGetOutputStream( false ) ); OutputStream out = s3FileObjectBucketSpy.doGetOutputStream( true ); assertNotNull( out ); out.write( new byte[ 1024 * 1024 * 6 ] ); // 6MB out.close(); // check kettle.properties 's3.vfs.partSize' is less than [5MB, 6MB) verify(s3ServiceMock, times(2) ).uploadPart(any()); verify( s3ServiceMock, atMost( 1 ) ).completeMultipartUpload( any() ); } @Test public void testDoGetInputStream() throws Exception { assertNotNull( s3FileObjectBucketSpy.getInputStream() ); } @Test public void testDoGetTypeImaginary() throws Exception { assertEquals( FileType.IMAGINARY, s3FileObjectFileSpy.getType() ); } @Test public void testDoGetTypeFolder() throws Exception { FileName mockFile = mock( FileName.class ); when( s3FileObjectBucketSpy.getName() ).thenReturn( mockFile ); when( mockFile.getPath() ).thenReturn( S3FileObject.DELIMITER ); assertEquals( FileType.FOLDER, s3FileObjectBucketSpy.getType() ); } @Test public void testDoCreateFolder() throws Exception { S3FileObject notRootBucket = spy( new S3FileObject( new S3FileName( SCHEME, BUCKET_NAME, BUCKET_NAME + "/" + origKey, FileType.IMAGINARY ), fileSystemSpy ) ); notRootBucket.createFolder(); ArgumentCaptor<PutObjectRequest> putObjectRequestArgumentCaptor = ArgumentCaptor.forClass( PutObjectRequest.class ); verify( s3ServiceMock ).putObject( putObjectRequestArgumentCaptor.capture() ); assertEquals( BUCKET_NAME, putObjectRequestArgumentCaptor.getValue().getBucketName() ); assertEquals( "some/key/", putObjectRequestArgumentCaptor.getValue().getKey() ); } @Test public void testCanRenameTo() throws Exception { FileObject newFile = mock( FileObject.class ); assertFalse( s3FileObjectBucketSpy.canRenameTo( newFile ) ); when( s3FileObjectBucketSpy.getType() ).thenReturn( FileType.FOLDER ); assertFalse( s3FileObjectBucketSpy.canRenameTo( newFile ) ); } @Test( expected = NullPointerException.class ) public void testCanRenameToNullFile() throws Exception { // This is a bug / weakness in VFS itself s3FileObjectBucketSpy.canRenameTo( null ); } @Test public void testDoDelete() throws Exception { fileSystemSpy.init(); s3FileObjectBucketSpy.doDelete(); verify( s3ServiceMock ).deleteObject( "bucket3", "key0" ); verify( s3ServiceMock ).deleteObject( "bucket3", "key1" ); verify( s3ServiceMock ).deleteObject( "bucket3", "key2" ); verify( s3ServiceMock ).deleteObject( "bucket3", "" ); } @Test public void testDoRename() throws Exception { String someNewBucketName = "someNewBucketName"; String someNewKey = "some/newKey"; S3FileName newFileName = new S3FileName( SCHEME, someNewBucketName, someNewBucketName + "/" + someNewKey, FileType.FILE ); S3FileObject newFile = new S3FileObject( newFileName, fileSystemSpy ); ArgumentCaptor<CopyObjectRequest> copyObjectRequestArgumentCaptor = ArgumentCaptor.forClass( CopyObjectRequest.class ); when( s3ServiceMock.doesBucketExistV2( someNewBucketName ) ).thenReturn( true ); s3FileObjectFileSpy.doAttach(); s3FileObjectFileSpy.moveTo( newFile ); verify( s3ServiceMock ).copyObject( copyObjectRequestArgumentCaptor.capture() ); assertEquals( someNewBucketName, copyObjectRequestArgumentCaptor.getValue().getDestinationBucketName() ); assertEquals( someNewKey, copyObjectRequestArgumentCaptor.getValue().getDestinationKey() ); assertEquals( BUCKET_NAME, copyObjectRequestArgumentCaptor.getValue().getSourceBucketName() ); assertEquals( origKey, copyObjectRequestArgumentCaptor.getValue().getSourceKey() ); } @Test public void testDoGetLastModifiedTime() throws Exception { s3FileObjectFileSpy.doAttach(); assertEquals( testDate.getTime(), s3FileObjectFileSpy.doGetLastModifiedTime() ); } @Test public void testListChildrenNotRoot() throws FileSystemException { fileSystemSpy.init(); FileObject[] children = s3FileObjectBucketSpy.getChildren(); assertTrue( children.length == 6 ); List<String> childNameArray = Arrays.asList( children ).stream() .map( child -> child.getName().getPath() ) .collect( Collectors.toList() ); assertEquals( childObjectNameComp, childNameArray ); } @Test public void testListChildrenRoot() throws FileSystemException { fileSystemSpy.init(); FileObject[] children = s3FileObjectSpyRoot.getChildren(); assertTrue( children.length == 4 ); List<String> childNameArray = Arrays.asList( children ).stream() .map( child -> child.getName().getPath() ) .collect( Collectors.toList() ); assertEquals( childBucketNameListComp, childNameArray ); } @Test public void testFixFilePathToFile() { String bucketName = "s3:/"; String key = "bucketName/some/key/path"; SimpleEntry<String, String> newPath = s3FileObjectBucketSpy.fixFilePath( key, bucketName ); assertEquals( "bucketName", newPath.getValue() ); assertEquals( "some/key/path", newPath.getKey() ); } @Test public void testFixFilePathToFolder() { String bucketName = "s3:/"; String key = "bucketName"; SimpleEntry<String, String> newPath = s3FileObjectBucketSpy.fixFilePath( key, bucketName ); assertEquals( "bucketName", newPath.getValue() ); assertEquals( "", newPath.getKey() ); } @Test public void testHandleAttachException() throws FileSystemException { String testKey = BUCKET_NAME + "/" + origKey; String testBucket = "badBucketName"; AmazonS3Exception exception = new AmazonS3Exception("NoSuchKey"); //test the case where the folder exists and contains things; no exception should be thrown when( s3ServiceMock.getObject( BUCKET_NAME, origKey + "/" ) ).thenThrow( exception ); try { s3FileObjectFileSpy.handleAttachException( testKey, testBucket ); } catch ( FileSystemException e ) { fail( "Caught exception " + e.getMessage() ); } assertEquals( FileType.FOLDER, s3FileObjectFileSpy.getType() ); } @Test public void testHandleAttachExceptionEmptyFolder() throws FileSystemException { String testKey = BUCKET_NAME + "/" + origKey; String testBucket = "badBucketName"; AmazonS3Exception exception = new AmazonS3Exception("NoSuchKey"); exception.setErrorCode("NoSuchKey"); //test the case where the folder exists and contains things; no exception should be thrown when( s3ServiceMock.getObject( BUCKET_NAME, origKey + "/" ) ).thenThrow( exception ); childObjectListing = mock( ObjectListing.class ); when( childObjectListing.getObjectSummaries() ).thenReturn( new ArrayList<>() ); when( childObjectListing.getCommonPrefixes() ).thenReturn( new ArrayList<>() ); when( s3ServiceMock.listObjects( any( ListObjectsRequest.class ) ) ).thenReturn( childObjectListing ); try { s3FileObjectFileSpy.handleAttachException( testKey, testBucket ); } catch ( FileSystemException e ) { fail( "Caught exception " + e.getMessage() ); } assertEquals( FileType.IMAGINARY, s3FileObjectFileSpy.getType() ); } private List<Bucket> createBuckets() { List<Bucket> buckets = new ArrayList<>(); buckets.add( new Bucket( "bucket1" ) ); buckets.add( new Bucket( "bucket2" ) ); buckets.add( new Bucket( "bucket3" ) ); buckets.add( new Bucket( "bucket4" ) ); childBucketNameListComp.addAll( buckets.stream().map( bucket -> "/" + bucket.getName() ).collect( Collectors.toList() ) ); return buckets; } private List<S3ObjectSummary> createObjectSummaries( int startnum ) { List<S3ObjectSummary> summaries = new ArrayList<>(); for ( int i = startnum; i < startnum + 3; i++ ) { S3ObjectSummary summary = new S3ObjectSummary(); summary.setBucketName( BUCKET_NAME ); summary.setKey( "key" + i ); summaries.add( summary ); childObjectNameComp.add( BUCKET_NAME + "/" + "key" + i ); } return summaries; } private List<String> createCommonPrefixes( int startnum ) { List<String> prefixes = new ArrayList<>(); for ( int i = startnum; i < startnum + 3; i++ ) { prefixes.add( "key" + i ); childObjectNameComp.add( BUCKET_NAME + "/" + "key" + i ); } return prefixes; } }
Picking up on Sandy Levinson's and Mark Tushnet’s recent postings, and drawing on my own working life as a “real historian” with more than a passing interest in originalism, I asked the other Jack to add a posting of my own on Heller. Many readers will know that I do not come to this question lightly, having written both a long review piece on The Second Amendent: The Highest Stage of Originalism for the Chicago-Kent symposium and, more recently, the historians’ brief supporting the D.C. position in the case itself. I agree with Mark that neither of the two main opinions in Heller would pass muster as serious historical writing, but I would disagree with Sandy that the two opinions are equally incompetent. The basis of that disagreement goes beyond the obvious fact that the dissent of Stevens tracks (and even cites) my historians’ brief to the interesting analytical or methodological differences between the two opinions. On some of these differences I am certain readers of this list are more au courant than I can claim to be, and I welcome comment and enlightenment. As Tom Friedman likes to say, let me explain. The pivot of my disagreement lies in weighing the merits of Scalia’s approach, which basically says that the actual history of how the Second Amendment made its way into the text of the Constitution is irrelevant, against Stevens’ more focused reliance on what was actually in dispute in 1787-1789 (if there were any serious contemporary commentary post-Sept. 1789, one could say 1787-1791, but since there does not seem to have been, the narrow date range works for me). When I embarked on the project that became Original Meanings many years ago, my genuine purpose was to develop a historically-grounded way of thinking about what the document originally meant. It supposed that there were four categories of evidence (broadly defined) that one could bring to bear: (1) the intentions of the framers, (2) the understandings of the ratifiers, (3) the intellectual legacy (which I think would include prior legal doctrine and understandings) on which both could draw, and (4) what I call the lessons of experience, meaning the inferences we can draw particularly about (1) and (2) from knowing something about the political history of the Revolutionary era proper and the way in which that affected and altered received understandings. As a “real historian” my inclination would be to give greater preference to (1) and (4) but the larger point was to think about the value of all four categories. In writing a brief for Heller (and before that, Hamdan and Vieth) I tried to adhere to this methodology, and in reading the opinions in the first, with their avowed originalist emphases, I have kept the same strictures in mind. And that is why I am troubled by the idea that they are equally illustrative examples of law office history. The Scalia opinion seems materially defective to me for several reasons. The most important, as noted earlier, is its explicit disdain for the legislative history of the Amendment, whether that is described in terms of the Convention’s framing of the Militia Clause, the public exchanges and ratification convention debates it sparked, or what we know of the progress of the Amendment itself through Congress. I understand that this position correlates with Scalia’s general skepticism about legislative history in statutory construction, but that does not alleviate my concern. Why? As a “real historian,” I think that all of the following points are relevant to any kind of serious originalism. First, as opposed to Scalia’s reliance on the “normal meaning” of a “pre-existing” definition of militia, one point that the Convention debates of August 1787 and any of a number of secondary historical works establishes is that the definition of the militia was precisely what was at issue. This does not rule out the idea that there was a previous “normal” or “public” meaning available to ordinary citizens, but it also reminds us that nearly all of the key concepts of political life (e.g., the definition of “executive power”) came under a great deal of stress in the decade after 1776, making it essential to recover their meaning not merely from the best dictionaries available but also from the context in which they were used. Scalia’s version of originalism/textualism, as applied in this opinion, seems oblivious to the most important findings that historians from Edmund Morgan (writing on the Stamp Act) on through Bailyn, Wood, myself, and others have argued over the last half-century: that this was a deeply creative era in constitutionalism and political thought, and the idea that static definitions will capture the dynamism of what was going on cannot possibly be true. Next to bigger concepts like “constitution” or “executive power” or “rights,” fussing about the meaning of militia might seem small potatoes. But the point holds equally well. (There is a deeper issue here that I also wonder whether the “public meaning” school has considered, much less addressed, relating to the 18th-century’s preoccupation with the plasticity of language itself. This is famously alluded to in Madison’s well-known but brief observations about language in Federalist 37, but one might wish to consult the broader discussion in Hannah Dawson, Locke, Language and Early-Modern Philosophy [Cambridge U. P., 2007]. It would be a great irony if the legal scholars’ emphasis on public meaning failed to take account of the skepticism of the period under study on this very point.) Second, Scalia’s professed disdain for what was actually being debated allows him to avoid asking what became of those statements of 1787-1788 that seem to be most suggestive of the idea that the Second Amendment was conceived to cover private purposes of gun ownership. He makes passing mention of three usual suspects: the Dissent of the minority Antifederalists in the Pennsylvania convention; the lone recommendation against individual disarmament emanating from the NH convention; and Samuel Adams’s similar reference in the Massachusetts Convention. The most telling of these, as I argued in the brief, is the first (a) because it was published relatively early in the ratification campaign, and could thus have become a rallying point for anyone at all concerned with the security of a private right; (b) because it quickly became an object of Federalist ridicule, lying there ideologically inert; and (c) because that in turn meant that the ensuing debate really was about the militia as an institution, not an individual right that no one in 1789 understood to be on the table. I see that I am myself lapsing into advocacy at this point, so I will yield the floor with this concluding observation: there are two quite different modes of originalist analysis at play in the two opinions, and clear choices therefore (beyond the outcomes) in asking which one delivers more analytically. From the vantage point of a “real historian” (or a “working historian,” to cite an important early essay of Bailyn’s), Stevens’ approach appears superior, not only because of result, but because it rests less on theoretical pronouncements that are difficult if not impossible to test and focuses more tightly on a salient “legislative history” of the provision in question. This is simply the classic argument against Scalia's approach. And it makes a lot of good points. On the other hand, Scalia has good points as well, about the impossibility of reading the mind of the legislature and of deciding which legislators' opinions to credit and which ones not to. That said, the historical materials Scalia relies on have their own indeterminancies. The truth is absent a pretty clear consensus on what the original public meaning was, I don't see it as particularly MORE accurate than legislative history. I hope that readers here recognize Prof. Rakove. Reading history happens to be one of my passions, and I hope that Prof. Rakove won't be embarrassed if I say that he's at the very peak of the profession over the last 40 years, in that small group which includes Bernard Bailyn and Gordon Wood. This argument might have some merit if the language of the Second Amendment was at all vague or plastic. However, there is very little apparent plasticity in the command of the operative clause: "the right of the People to keep and bear arms shall not be infringed." That is about as clear as language can get Under no rule of grammar of which I am aware can the prefatory comment - "A well regulated Militia, being necessary to the security of a free State" - be considered a limiting phrase which would control the scope of the operative phrase. Rather, it is clearly a comment as to a purpose of the Second Amendment. Consequently, to the extent that there is not an historical consensus as to the exact meaning of the prefatory comment, it is irrelevant to the legal interpretation of the Second Amendment because the operative clause is not limited no matter how that debate turns out. However, there is very little apparent plasticity in the command of the operative clause: "the right of the People to keep and bear arms shall not be infringed." That is about as clear as language can get. Under no rule of grammar of which I am aware can the prefatory comment - "A well regulated Militia, being necessary to the security of a free State" - be considered a limiting phrase which would control the scope of the operative phrase. Rather, it is clearly a comment as to a purpose of the Second Amendment. This is the sort of thing that pisses me off. The issue isn't one of "grammar", it is one of context. And yes, words without a prefatory statement may very well have a different meaning than words with a prefatory statement. Consider: 1. There shall be no sales at trade shows within the county. 2. The public safety requiring that guns be sold through licensed dealers, there shall be no sales at trade shows within the county. Now, are you going to tell me that the prefatory clause has no bearing on what 2 means? Look, in the end, I don't disagree with the bottom line position taken by Scalia and by Bart that there is an individual right to bear arms. But this is just a classic example of how silly the entire conservative rhetorical scheme on judging is. OF COURSE context matters, and prefatory clauses can render even seemingly unambiguous language narrower. That's what context does. Among other things, it helps us identify what the ambiguities are as well as helping us resolve them. And when Bart says "I know of no law of grammar", he's not speaking as an academic expert on the English language. (Neither am I.) He's just popping off his mouth. He really doesn't care whether experts on interpreting English texts who have devoted their lives to studying meaning (including latent ambiguities) would agree with him or not. It's just a talking point. Context always matters. Sometimes it doesn't change things (though actually I do think that the militia clause changes things even for Justice Scalia (especially with respect to how he interprets US v. Miller), though he won't admit it). Sometimes it does. But this idea put out by gun rights advocates who have no particular expertise on the workings of the English language that you can draw an artificial rule that "a preamble can never narrow an operative clause" is just unmitigated crap. As I recall, of the 69 briefs filed, two were referred to as briefs of historians. I read both and thought Rakove's was superior, in spades, as the other focused excessively on English law and not on the issues faced by the Framers. (I have not as yet read the other 67 briefs, and old age may keep me from being able to accomplish this, especially since the post-Heller conversations take up so much time.) I hope Prof. Rakove will contribute more conversation at this Blog. I did recognize him, Mark. As I pointed out, he was one of the professional historians who were defending Bellesiles' fraud after he was exposed. This demonstrates at best bad judgment where gun control has saliency. His status as a professional historian doesn't mean squat, in that instance he proved that he could be wrong where even moderately informed laymen had no trouble getting it right, if gun control was salient. This isn't an ad hom, I'm just pointing out his judgment on this subject is demonstrably lacking. I have read the bloggers' award winning book on original meanings and found it very good. I also recall an op-ed where he strongly rejected the gun rights view. I found it much less good. Anyway, I don't agree with the sentiment that Scalia was noticably worse than Stevens. He could have been bad too, but Stevens was not better. To suggest as much, sorry, is wrong. For instance, take Stevens' quickie dismissal of the English Bill of Rights, an influence of much more than the 2A. One thing alone -- yeah, it protected Protestants. In this country, we have religious freedom. Yes, there they had legislative supremacy. Our system is different. But, this doesn't erase the English bill was quite important to our development. Likewise, Stevens might have cited the debate, but was it honest? In his view, even commentators interpreting things in the turn of the 19th Century that didn't agree with him basically wasn't aware of the context of the amendment's ratification. Such claim of ignorance really needs more proof than supplied. Likewise, as Sandy noted earlier, Stevens' statement of how clear everything is (and the idea they framers surely didn't honor some natural right of self defense) "risible" to quote Stevens. Stevens' opinion had its good side, probably. But, to ignore its depths is really disgraces the historian here who should know better. It suggests a bias that leads the like of Brett to (on some level correctly) sneer. Oh, stuff it. Anyone with even a layman's knowledge of the relevant material recognized a few pages into Bellesiles' book that he was playing fast and loose with the truth, and this dude was defending the accuracy of the work long after it had been demolished. I'm sure he's a decent historian where his feelings don't enter into the matter, but he's proven that on THIS subject, his judgment is lousy. Sorry, you don't get to defend an academic fraud long after it's exposed, and not have it come back to haunt you when you start opining on the same topic. Out of my depth? I knew Bellesiles was a fraud before Rakove did, I think that says something. A prefatory comment like that which precedes the Second Amendment and a number of state constitutional amendments of that era suggests a reason for the operative clause which follows. Gramatically, a prefatory comment is positive language adding to the operative right by providing an example rather than negative language limiting the right in some way. The Second Amendment prefatory comment has no negative language from which to infer limits on the operative right. Furthermore, the language of the operative clause confirms the plain grammatical reading of the prefatory clause as a positive comment rather than a limiting clause. The command in the operative clause is that the right "shall not be infringed." This command clearly states that no limits shall be placed on the right and only makes sense if the prefatory clause is a positive comment on what is included in the operative right. It makes no grammatical sense to interpret the prefatory comment as limiting the right to the subset of militia duty and then follow that clause with a command that the right to keep and bear arms shall not be limited. Let us rewrite the First Amendment to read like the Second Amendment: "An exchange of political views being necessary for the operation of a free State, Congress shall make no law abridging the freedom of speech or of the press." Can anyone here offer a grammatical case that the prefatory comment here limits the operative command that "Congress shall make no law abridging the freedom of speech or of the press" to protect only the "exchange of political views" and nothing else? Can anyone here offer a grammatical case that the prefatory comment here limits the operative command that "Congress shall make no law abridging the freedom of speech or of the press" to protect only the "exchange of political views" and nothing else? Bart, I'll tell you what we can offer: your own juvenile arguments. Exhibit A would be your own arguments here on this blog against the dissemination of "enemy propaganda" which happens to be "speech" and which according to your argument de jure is an absolute right which can in no way be infringed. You are so utterly inconsistent in your application of "legal analysis" that your words carry all the heft of dried leaves blowing in the wind. Thanks to Professor Jack Rakove for a great post (and for his great overall scholarship in this area). And three cheers for Dilan for saying what ought to be obvious. I would add that it makes no sense to say that the prefatory clause states a purpose, and then read the purpose out of the so-called "operative" clause, (which of course says nothing about self-defense in the home or otherwise). Finally, if the court is going to play the role of the Supreme Court of Historical Appeals, it is incumbent on it to look at all the historical evidenced, not what conveniently and selectively supports an ideological position. Justice Scalia ignores evidence of legislative intent and debates so he can impose his own personal views. Breyer is correct that it is Scalia's "methodology" which empowers judges. The legal question is not whether the Second Amendment protects an individual, collective or civic right at some point in history, but whether a particular current legislation burdens that right unreasonably. On the PBS "News Hour" last evening Prof. Douglas Kmiec appeared and discussed the Heller case. He lamented the fact that both the majority and dissent were so far apart on the original meaning of the Second Amendment. Which started me thinking: Maybe J. P. Stevens' opinion went into great historical analysis and detail because he wanted to upset the entire originalist applecart---to show that on this amendment's language two different interpretations of the historical record were permissible. His side garnered 4 votes, Nino's 5, but in the end we find outrselves with where Kmiec finds himself---realizing that there can be no agreement on such a fundamental tenant of originalism. All and all, Stevens' opinion may be one of the most subtle, sophisticated opinions in decades. Professor Rakove's brief was a fine and exhaustively thorough historical treatment of the militia in America. It would have been great if ever Article I, Section 8, Clauses 15 and 16 needed to be interpreted by the Supreme Court. For understanding the Second Amendment -- not all that useful. However, this attempt at misdirection did not fool the majority, which focused on the right being described, not on the one stated reason why the right benefited the United States of America. The historical English origins of the right were apropos here for two reasons: the right of the Englishman to be armed had never been tied to militia service, and the rights of Americans equalled or exceeded those of Englishmen in every instance. "An exchange of political views being necessary for the operation of a free State, Congress shall make no law abridging the freedom of speech or of the press." Can anyone here offer a grammatical case that the prefatory comment here limits the operative command that "Congress shall make no law abridging the freedom of speech or of the press" to protect only the "exchange of political views" and nothing else? Actually, Bart, if the First Amendment read like that, the argument that it only applies to political speech (made by Bork in his famous 1970 law review article, "Neutral Principles and First Amendment Analysis", would be quite a bit stronger than it is. At my age I don't worry too much about my reputation any more. Whether the Cubs' starting pitching will hold up is another matter. Anyone who wants to check my record on l'affaire Bellesiles can read the following postings on two H-net listservsH-Law for 4/18/2001H-OIEAHC FOR 5/28/2002 and 1/27/2003The first of these contains the following comment: "The criticisms raised about Bellesiles'documentation deserve serious consideration, and if he has reallyscrewed up, or distorted the evidence, then he should be heldaccountable, and if he can't defend his use of sources or rebut andrefute the criticisms, then his work should be discredited." I think I was also quoted to that effect in one or two published news articles on the matter. It remains an open question in my mind how much of Bellesiles' problem is to ascribed to incompetence, how much to fraud, but in either case it is inaccurate to portray me as a diehard defender. I thought (still think) that the questions he raised are interesting ones, and that we know a lot less about the use of firearms in colonial America than we should. That knowledge, if attained, would not be relevant to the "public meaning" style of originalism that I thought was the critical object of my original posting, but it would be to the explicitly historical approach that I describe here because it bears directly on the question, how were the framers and ratifiers of the Constitution and Second Amendment thinking about the recent or prospective role of the militia. When, for example, George Mason worried about the militia being disarmed under the Constitution, he was not envisioning the BATF going door to door seizing weapons, but Congress failing to keep the militia well-armed (or regulated). kid and dilan -- Context, or rather structure, is useful to figure out the meaning of the Second Amendment. First of all, we can presume the Second Amendment refers to a right of individuals because it is prefaced by the First Amendment, and followed by the Third through Ninth Amendment, all of which refer to rights of individuals against the power of their government. Only after all of these does an amendment mentioning to state power appear. Had the Second Amendment referred to state powers or state rights, it would have been put next to the Tenth Amendment. The Constitution was well organized by subject; it does not skip around. Second, we can use grammar to study the structure of the amendment. Grammatically speaking, the Second Amendment contains only one clause, the preface being a verbless noun constituting an absolute adjective. "The right of the people to keep and bear arms shall not be infringed" constitutes a complete thought all by itself, with a subject "right" and a predicate "shall (not) be infringed." "To keep" and "(to) bear" modify the noun "right" and explain what sort of right is being referred to. The right belongs to the people just as in the rest of the first nine amendments. The other part of the sentence is the noun "militia," modified by the adjective "well-regulated" and by the participial phrase "being necessary to a free state." This part cannot express a complete thought on its own, and merely modifies the sense of the sentence. No words are present in the sentence that would limit the right to militiamen, or condition the right on militia membership. No "onlys" or "provided that" etc. etc. as were used in contemporary documents. Therefore, the introductory phrase does not limit the right, but merely describes a reason why and how the uninfringed right can benefit the U.S. First of all, we can presume the Second Amendment refers to a right of individuals because it is prefaced by the First Amendment, and followed by the Third through Ninth Amendment, all of which refer to rights of individuals against the power of their government. I happen to agree with your conclusion, but it's problematic, to say the least, from an originalist perspective. A great many people in 1791 did not see these amendments as protecting individual rights per se. The official Federalist position, remember, was that no BoR was necessary because the limited powers in the Constitution left Congress unable to affect such rights. Thus, for example, Hamilton in Federalist 84: "Why, for instance, should it be said that the liberty of the press shall not be restrained, when no power is given by which restrictions may be imposed? I will not contend that such a provision would confer a regulating power; but it is evident that it would furnish, to men disposed to usurp, a plausible pretense for claiming that power. They might urge with a semblance of reason, that the Constitution ought not to be charged with the absurdity of providing against the abuse of an authority which was not given, and that the provision against restraining the liberty of the press afforded a clear implication, that a power to prescribe proper regulations concerning it was intended to be vested in the national government. This may serve as a specimen of the numerous handles which would be given to the doctrine of constructive powers, by the indulgence of an injudicious zeal for bills of rights." In this view, and equally in the view of many anti-Federalists, the BoR was NOT an expression or list of individual rights, it was a confirmation of the limits on the power of the federal government (specifically, the necessary and proper clause). This explains the language of the 1A -- not "the people have a right to free speech", but "Congress shall make no law" (and it's very hard indeed to see the Establishment Clause as expressing an individual right). Or, take the takings clause: " nor shall private property be taken...." That's a restriction on government's power, not the expression of a right. Or at least it would have seemed that way to many in 1791. The grammar argument is no more persuasive than multiple other such arguments. In saying all this, I'm not even denying your conclusion that the 2A protects an individual right. My sole point is that neither the history nor the text are definitive. In the end, I don't disagree that the 2nd Amendment protects an individual right. And I do agree with the "context" (i.e., look what comes before an after it) argument you make on that. But what you and Bart are claiming is some sort of "rule" of grammar is nothing of the sort. The Second Amendment is not an English assignment-- it is a legal text. Like all legal text (statutes, constitutions, contracts), there are a number of established tools to construe it. And the idea that these tools DO NOT and CANNOT include the prefatory clause that is part of the very provision we are construing is stupid. Idiotic. Imbecilic. Unworthy of serious consideration. This isn't the way we construe statutes, it isn't the way we construe constitutions. And whether or not you believe there is some "rule of grammar" that requires it (in fact, I think most English professors would seriously dress you down and say you don't know what you are talking about, but I am not expert enough on English grammar to know for sure), the fact is that the RULES OF LAW, i.e., of construction of legal text, which are what matters here, hold that context, including prefatory text, can change the interpretation of a text. And for good reason-- see my earlier 2 examples, in which an apparent ban on the sale of any item at a trade show becomes a ban on gun sales only through a prefatory clause. That example is grammatically identical to the Second Amendment. The truth is, you guys aren't honest enough to say "I think the Second Amendment should protect an individual right not connected to militias because I really think gun rights are important." That's what you actually believe. But instead of being honest, you guys make up "rules of grammar" and pretend to be experts on English usage, which you aren't, and deliberately disregard the ACTUAL rules of statutory construction which say that prefatory clauses count. I should add one other thing. There's a whole bunch of jurisprudential philosophy works (I am thinking of HLA Hart and the like) regarding "no vehicles in the park" and what it might mean. In other words, while conservatives live in their alternative universe where made up "rules of grammar" trump established methods of interpretation, legal philosophers (who are about twice as smart as conservatives) have been bandying this problem about for 50 years and have much deeper and more nuanced thoughts about how to interpret a text. But you would have to care about ideas rather than just winning elections for this stuff to matter to you, and I've seen no evidence that you folks really do. Mark Field -- I accept your phrasing that the first eight amendments limit the power of government in specific enumerated ways. Dilan -- judging from the prefaces to California statutes, a statute's stated goal is irrelevant to its interpretation. (The People of California find and declare as follows...) But here is the rule you accused me of making up: ABSOLUTE PHRASE Usually (but not always, as we shall see), an absolute phrase (also called a nominative absolute) is a group of words consisting of a noun or pronoun and a participle as well as any related modifiers. Absolute phrases do not directly connect to or modify any specific word in the rest of the sentence; instead, they modify the entire sentence, adding information. They are always treated as parenthetical elements and are set off from the rest of the sentence with a comma or a pair of commas (sometimes by a dash or pair of dashes). Notice that absolute phrases contain a subject (which is often modified by a participle), but not a true finite verb. * Their reputation as winners secured by victory, the New York Liberty charged into the semifinals. * The season nearly finished, Rebecca Lobo and Sophie Witherspoon emerged as true leaders. * The two superstars signed autographs into the night, their faces beaming happily. When the participle of an absolute phrase is a form of to be, such as being or having been, the participle is often left out but understood. * The season [being] over, they were mobbed by fans in Times Square. * [Having been] Stars all their adult lives, they seemed used to the attention. I would add that it makes no sense to say that the prefatory clause states a purpose, and then read the purpose out of the so-called "operative" clause.. Neither I nor the Heller majority are reading the militia purpose out of the operative clause. Rather, an armed citizenry is necessary to the existence to the general militia made up of all the People. In reality, it is the dissent who wishes to disarm the general militia made up of all the People by not only limiting the right to the militia, but also truncating the definition of militia to the federalized National Guard. But what you and Bart are claiming is some sort of "rule" of grammar is nothing of the sort. The Second Amendment is not an English assignment-- it is a legal text. Like all legal text (statutes, constitutions, contracts), there are a number of established tools to construe it. And the idea that these tools DO NOT and CANNOT include the prefatory clause that is part of the very provision we are construing is stupid. Idiotic. Imbecilic. Unworthy of serious consideration. To start, the first rule of constitutional interpretation is to read the actual text. One cannot read English without applying the basic grammatical precepts of the language. To argue that basic grammar has not place in constitutional interpretation is absurd. Furthermore, neither I nor the Heller Court wrote out the prefatory comment. Once again, the prefatory comment is a positive statement which implies that keeping and bearing arms for service if the militia is called up is one purpose for the following operative right. If the drafters of the Second Amendment wanted to use the initial clause to limit the operative right, they would have used limiting language in the initial clause and would not have used language implying an uninfringible right in the second clause. Right. Those people who are inclined to approach this debate on the basis of grammar all agree that the first part (the absolute phrase) modifies the sense of the entire sentence. Dilan rightfully calls you on your assertion because there is nothing inherent in the concept of an "absolute phrase" that determines how the sense of the sentence is modified; the notion that the absolute phrase is always a positive statement or a mere example--but never a limiting factor--is ridiculous. "Weather permitting, the People can fly kites in the park." "God willing, we'll have a thousand customers tonight." "All things being equal, higher oil prices will lead to lower oil demand." "Neither I nor the Heller majority are reading the militia purpose out of the operative clause. Rather, an armed citizenry is necessary to the existence to the general militia made up of all the People." Actually, I'd argue that the majority DID read it out, when they pulled that "common civilian use" slight of hand, to avoid admitting that the arms covered were any suitable for militia use. Militia arms at the time of the Constitution were in fact small arms commonly owned by the People for private use, but not all arms suitable for military use. This is also a useful definition to incorporate evolutionary technological advances in small arms such as cartridges, bolt action and semi automatic feeds without having to extend to exponential absurdities like suitcase nukes. Automatic feeds fall into a gray area. However, I am willing to sacrifice the right to possess automatic firearms in exchange for a return to a robust guarantee to possess and carry nearly all other small arms. I do not believe this limit would cripple the check of an armed citizenry on the government. Scalia implied that an Armed citizenry would have little chance against our modern standing Army. I completely disagree. The Army had a difficult time checking about 5 million armed Sunni in Iraq. In the United States, an tyrannical Army would face around 200 million armed Americans. Scalia is offering a 90% solution. Do not look that gift horse in the mouth. In regards to the comments re arms, if you read over the various state constitutional provisions that detail the arming of the militias, as well as the Militia Act of 1792, the arms that militiamen were required to equip themselves with were long weapons, not pistols. Officers, as well as cavalry soldiers such as dragoons, were the only troops who needed pistols at the time. The average farmer/militiaman during the Revolution did not purchase a pistol to defend the family homestead, put food on the table, or go to war when required. It would be interesting to ponder whether a revolver or colt-45 would have passed the Miller test in 1939. Justice Silberman of the DC Circuit certainly believes that modern handguns, although most hold multiple rounds and many are semi-automatic, are obviously protected as lineal descendants of the original breach-loading flintlocks. Is this Kyllo-esque logic what the Framers really had in mind, though? The "rule" you quoted (without any source citation) says NOTHING about interpretation. (Not surprising, because grammar and interpretation are two separate disciplines.) Again, go back and look at my 2:10 post near the top of the thread. I set out two sentences, one with a gramatically identical prefatory clause to the one in the Second Amendment. They clearly have two separate meanings; the prefatory clause clearly narrows the meaning. What I accuse you and others of making up is this principle that as a matter of INTERPRETATION, prefatory clauses never narrow the operative clause. There is no such "rule"; indeed, there are uncountable examples where it has and does. To start, the first rule of constitutional interpretation is to read the actual text. One cannot read English without applying the basic grammatical precepts of the language. There is no basic "grammatical precept" that rules out INTERPRETING texts in their context, including prefatory clauses. Rules of grammar tell us how to put words together-- they don't prescribe ABSOLUTE rules that COURTS must follow when interpreting LEGAL DOCUMENTS. And the rules of interpretation-- which unlike your complete unmitigated BS grammatical rules, actually CONTROL the issue of how the Second Amendment should be construed, PERMIT the use of prefatory clauses. And for good reason-- check out my 2:10 post near the top of the thread and you will see why. dilan, your sentence is not parallel to the Second Amendment, and your prefatory phrase changes nothing. The independent clause says there will be no sales of anything, and guns are merely a subset of anything. The prefatory phrase explains the reason to bar the sale of this subset. A parallel sentence is, A well-regulated household, being necessary to the tranquility of a husband, the right of women to do housework, shall not be infringed. Do you really believe that such a sentence would prohibit husband-free women from doing housework? To the extent that legal interpretation is different from grammar, here are the principles of textual construction which apply here: Noscitur a sociis: To the extent that the prefatory comment is ambiguous, it's meaning can be determined by reference to unambiguous operative clause. Because the operative clause commands that the right shall be not limited, the prefatory comment cannot be interpreted as a limiting provision. Avoiding Absurdity: It is absurd to interpret the prefatory comment as a limiting provision when the operative clause unambiguously commands that the right shall not be limited. Clear Statement Rule: A provision of the Constitution shall not be interpreted to abridge long standing rights of individuals. See the scholarship offered by the majority tracing the right to keep and bear arms back hundreds of years into English history. In pari materia: All similar combinations of prefatory comment and operative clause in state constitutions drafted at that time have been interpreted the prefatory comments as simply noting a single but not exclusive purpose for the operative clause. The Green Bag has published several interesting articles on the problem of identifying the actual text. It is surprisingly complicated. As relevant here, the commas may or may not be part of the text, and the presence may affect meaning. I'll sign on to the "originalist" modes of interpreting the Second Amendment -- any of them -- so long as we all undestand that the "right" being protected consists solely of a right to keep only those weapons that existed at the time of the framing of the Constitution. Enjoy your flintlocks and front-loading muskets, gentlemen! dilan, your sentence is not parallel to the Second Amendment, and your prefatory phrase changes nothing. The independent clause says there will be no sales of anything, and guns are merely a subset of anything. The prefatory phrase explains the reason to bar the sale of this subset. If you believe this, you will never be a judge. Look again. Sentence #1 says that no sales at any trade shows are permitted. Sentence #2 says that no GUN sales at trade shows are permitted. It's clear as day. You guys are constructing an artificial rule that you will IGNORE crucial context and get intended meanings WRONG in order to ensure that you don't have to discuss well regulated militias. It is the worst type of unprincipled judicial activism, which is of course all too typical of conservatives who consistently refuse to enforce the laws as written or defer to the political branches. I don't want to start a long thread with you on statutory construction. Suffice to say, none of the doctrines that you identify bar the use of purpose clauses to interpret statutes or constitutional provisions. See Padilla v. Hanft, 4th Cit. 2005 (purpose clause of Authorization to Use Military Force supports adoption of broad interpretation of provision); Michigan Bell Telephone v. MCIMetro Access, 6th Cir. 2003 (construing purpose clause of telecommunication statute to aid in interpretation of statute); compare Cutshall v. Sandquist, 6th Cir. 1999 (purpose clause enacted AFTER commencement of litigation receives no weight). Really, your arguments in interpretation boil down to "the framers may have told us this important information about what they were doing, but I refuse to consider it because I am a judicial activist conservative who doesn't enforce constitutional provisions as written and believes that unelected judges should impose their will over the democratic choices of the majority". so glad to see you on another discussion about grammar. perhaps you will return to address the grammatically proper reading the 1A's "no law respecting an establishment of religion" we discussed before, now that grammar is once again front and center:nerpzilla said... BD: Establishment is the act of forming an organization or, in this case, a state religion. The Establishment Clause text nowhere calls for a broader separation of church and state in all matters. The clause states “Congress shall pass no law respecting an establishment of religion.” The preposition “of” is used instead of “a” because of the general aspect of the clause. Your reading reads out the “of” and reads in “a,” making the clause specify no establishment of a national religion. By using “of,” the clause no longer discusses the establishment of a single religious sect, but instead, “establishment of religion” must be read together. To start, let me thank you for your thoughtful response which actually addresses, rather than sidesteps, my textual argument.I do not see how the use of "of" rather than "a" changes the meaning of "establishment." Establishment means the creation of an organization or thing. In this case, the organization or thing being established is "religion." Religion established by the state is by definition a state religion.“respecting” is specifically chosen also – early proposals also had “touching” as the word – to create a broad nature of the amendment."Respecting" simply means in regard to. Thus, the Establishment Clause merely prohibits Congress from passing any laws in regard to establishment of religion. I agree that "respecting" is a broad term, but its prohibition is still limited to the controlling phrase "establishment of religion." In order to arrive at their various holdings that the government cannot become overly entangled in religion, the Courts had to write out the term establishment from the Establishment Clause to have it read "Congress shall make no law respecting...religion." That is the only way you can textually sidestep the controlling term on the Establishment Clause.This was not some “personal stance” of Jefferson’s, both him and Madison felt it was crucial to the health of the republic to keep church and state separate." The fact that Jefferson and Madison may have strongly believed that a wall between church and state was crucial to the health of the Republic does not remove this belief from the realm of personal opinion. This was not the argument being made by Madison or anyone else among the drafters. Madison spoke of stopping the government from adopting a religion and forcing citizens of other faiths to conform to that religion. He did not change this argument as the Establishment Clause developed and added the word "respecting." # posted by Blogger Bart DePalma : 12:40 PMMonday, June 25, 2007 nerpzilla said... Mr DePalma- I must disagree with your textual reading. the clause states: "Congress shall make no law respecting an establishment of religion." an is an article. it can only modify a noun. "establishment" is therefore a noun, and "of religion" is a preposition modifying "establishment." "an establishment of religion" is the same as a "religious establishment." Therefore, Congress shall make no law "respecting a religious establishment." This means, as the founders understood it to mean, the national government was completely barred from making any laws dealing with religious institutions. ... I was considering bringing this point up in support of my argument that Mr. Madison's later position advancing a stricter separation of church and state is both contrary to the language of the actual Establishment Clause and to the interpretation of that provision which he sold to other drafters during the constitutional convention. Mr. Madison's veto statement is no different from one of Mr. Bush's signing statements advancing his interpretations of his Article II powers. While Bush and Madison are free to advance their own personal interpretations of the Constitution, these opinions bear no more weight than those of you and I.While apparently there are some who think your opinion is superior to J-Mad or TJ's, I must humbly side with the Founders.I had a good chuckle upon reading charles' post concerning the relative trustworthiness of myself and Mr. Jefferson. While I might start purring if I keep getting stroked that way, I am going to be a wet blanket and observe that opinions are irrelevant. Rather, we need to stick with the objective facts. The Establishment Clause says what it says and the drafters' arguments during the debates, including that of Mr. Madison, are on the record. For the reasons I have advanced before, I would rest my case that the Establishment Clause requires and was meant to require only that Congress may not establish a state religion.# posted by Blogger Bart DePalma : 4:01 PM If basic grammar is so important in the context of the second amendment, it seems strange that you would ignore the plain text (no difference between "of" and "a[n]") in the First. In the second, you have argued that To start, the first rule of constitutional interpretation is to read the actual text. One cannot read English without applying the basic grammatical precepts of the language. To argue that basic grammar has not place in constitutional interpretation is absurd, yet you have, in the past, apparently held different beliefs, not concerning yourself with whether an "an" or an "of" was used, and whether the word "establishment" is grammatically an noun or a verb. Is this a recent change, or is there a reason to the inconsistency? If the latter, under your jurisprudential theory, which amendments need to be strictly construed with proper grammar, and which ones can we simply substitute other parts of speech so that the text supports predetermined results? I would suggest that this variation on the First Amendment is a more accurate version of the Second Amendment format than your gun show hypo because it has a general comment on the importance of one form of speech followed by the First Amendments actual operative command: "An exchange of political views being necessary for the operation of a free State, Congress shall make no law abridging the freedom of speech or of the press." Can you offer a grammatical case that the prefatory comment here limits the operative command that "Congress shall make no law abridging the freedom of speech or of the press" to protect only the "exchange of political views" and nothing else? "an" is an article. it can only modify a noun. "establishment" is therefore a noun, and "of religion" is a preposition modifying "establishment." "an establishment of religion" is the same as a "religious establishment." Therefore, Congress shall make no law "respecting a religious establishment." This means, as the founders understood it to mean, the national government was completely barred from making any laws dealing with religious institutions. The second point does not follow from the first. Conceding for the sake of argument your grammatical construction, the results are still the same. "Establishment of religion" and "religious establishment" both refer to a state religion. The problem with your grammar is that the phrase "establishment of religion" implies a future act wile your revised term "religious establishment" implies an event that has already occurred. Given that the First Amendment is forbidding future acts, the first phrase makes more sense. Once again, in order to arrive at their various holdings that the government cannot become overly entangled in religion, the Courts had to write out the term establishment from the Establishment Clause to have it read "Congress shall make no law respecting...religion." "An exchange of political views being necessary for the operation of a free State, Congress shall make no law abridging the freedom of speech or of the press." Can you offer a grammatical case that the prefatory comment here limits the operative command that "Congress shall make no law abridging the freedom of speech or of the press" to protect only the "exchange of political views" and nothing else? Bart, this has nothing to do with grammar. It has to do with two things-- INTERPRETATION and your political ideology. In fact, if the First Amendment had that language, my bet is that no matter what you claim, it would be a lot more likely that Bork's 1970 view of the First Amendment (i.e., that it only applied to political speech) would be adopted. And even if it were not adopted wholesale, you would see the exceptions with respect to things like obscenity and other nonpolitical speech interpreted a lot more broadly than they are. And the reason is that despite what you say, as a matter of INTERPRETATION, a prefatory clause can often be an important guide to what the author means to include in the "operative" clause and what he or she does not. As I said, what is really going on-- and what you won't admit-- is that result oriented judicial activists like yourself who substitute your personal views for the law as written and who substitute the decisions of unelected judges for the work of democratically elected legislatures don't like the "well regulated militia" language, don't want it to have any impact on the interpretation of the Second Amendment, and therefore latched onto whatever argument they could think of to deprive it of any effect. As I said, I think it is truly sad that there are people out there who believe that unelected judges should impose their own policy preferences over those of democratically elected bodies. As so many intelligent commentators have told us, this is the worst kind of tyranny. And Bart, your weak arguments on this issue are clearly a fig-leaf to cover the actual agenda of overriding the wishes of the American people as expressed by the decisions of their local governments. As a friendly amendment to Dilan's point immediately above, it is no affront to grammar to use the prefatory clause -- "An exchange of political views being necessary for the operation of a free State" -- as a guide to what one of the key terms of operative clause -- to wit, "the freedom of speech or of the press" -- actually means. This is a definitional question, not a question of grammar. "[T]he freedom of speech or of the press" is not self-defining. Indeed, the inclusion of the definite article suggests that the drafter had in mind a particular notion of a particular species of freedom in mind. "Can anyone here offer a grammatical case that the prefatory comment here limits the operative command ..."? --> the Amicus of the Professors of Linguistics and English. The PLE brief was not able to offer a grammatical case that the prefatory phrase limits the operative command. They tried but failed to refute the conclusion of the DC Circuit court that the prefatory phrase articulates only a purpose, not its “exclusive” purpose, Parker, 478 F.3d at 386, 389, and the purpose actually articulated in the Amendment is only the Amendment’s “most salient political benefit,” which the court described as being the preservation of “the militia.” Id. at 390. To attempt to show that the prefatory phrase limited the operative command, the PLE were reduced to handwaving that "bear arms" had an exclusively military meaning, and that "well-regulated" meant that the militia was subject to regulation, instead of that the militia possessed the qualities expected of the militia, as in the parallel idioms of well-regulated household, mind, young man, young woman, child, etc. By separating "well" from "regulated," the PLE put the cart before the horse in the following. Note that their interpretation of the meaning of the term "well-regulated" after the word "but" in the following is quite reasonable, while their interpretation in the beginning of the following sentence is quite fanciful: The use of the past participle “regulated” in that modifier suggests a militia that not only is “subject to” regulation under the militia laws, but also is in possession of the qualities that flow from participation in regular military exercises—orderliness, discipline, proficiency with arms, knowledge about maneuvers and so on. In a 5 to 4 decision on June 12, 2008, the United States Supreme Court in Boumediene v. Bush, ruled that detainees being held at Guantánamo Bay can challenge their detention in federal civilian courts. In other words, five justices conferred constitutional rights upon non-citizen illegal combatants. The constitution does not even contemplate such an interpretation, but yet, Justices Kennedy, Ginsburg, Souter, Breyer and Stevens found that right in the document. If the five justice above found a right in the constitution that was not even contemplated, then surely, it is very difficult to see how four of those justices failed to find an individual right to arms in the Second Amendment. You see, the Second Amendment does talk about the right of the people, and since Justices Ginsburg, Souter, Breyer and Stevens seem to have an affinity for “erring” on the side of creating rights for individuals, it is very difficult to see how they failed to find an individual right in the Second Amendment. In a 5 to 4 decision on June 12, 2008, the United States Supreme Court in Boumediene v. Bush, ruled that detainees being held at Guantánamo Bay can challenge their detention in federal civilian courts. In other words, five justices conferred constitutional rights upon non-citizen illegal combatants. The constitution does not even contemplate such an interpretation, but yet, Justices Kennedy, Ginsburg, Souter, Breyer and Stevens found that right in the document. If the five justice above found a right in the constitution that was not even contemplated, then surely, it is very difficult to see how four of those justices failed to find an individual right to arms in the Second Amendment. You see, the Second Amendment does talk about the right of the people, and since Justices Ginsburg, Souter, Breyer and Stevens seem to have an affinity for “erring” on the side of creating rights for individuals, it is very difficult to see how they failed to find an individual right in the Second Amendment. Whether the method used was cogent or not, anyone who reads Article VI of the Articles of Confederation can clearly determine that militia was not an organized State body as that was prohibited. There are many letters from members of congress showing what they thought of the 2nd Amend such as the one from Lee: “To preserve liberty, it is essential that the whole body of the peoplealways possess arms, and be taught alike, especially when young, how to usethem." from Letters from the Federal Farmer to the Republic (1787-1788), Letter XVIII Given Original Meanings' excellent debunking of the value of trying to ascertain the intent of people focused about slavery on almost every issue, it is nonetheless delightful to hear Prof. Rakove's analysis of original intent on the individual v. militia gun issue. What I wonder is why the common ground sought by modern federalists is not based upon the notion that the 2nd Amendment's expressed militia rational can now only clearly (and therefore constitutionally per J. Posner) serve to reserve all measures of gun control to the States. Perhaps the Founders, all too cognizant of possible civil war and sensing the weakness of the 9th and 10th Amendments, sought to cement the ability to defend themselves in the 2nd. Professor Rakove is a "real historian" who has himself engaged in law office history in his Heller amicus brief. For those who want to see exactly why the Second Amendment dispute has been ongoing for over four decades, read this History News Network article severly criticizing Rakove's erros of fact and off-track history: http://hnn.us/articles/47238.html
The same forces that have existed for months are pulling on mortgage rates – among them, the German bond market, US economic data, the Greek debt soap opera, and Fed rate hike fears – which has resulted in volatility and unpredictability. Recently, German bonds seem to have held the most sway. Even on days when the other forces push down, German bonds seem to be able to drag US rates the other way. Really, I don’t see that changing, but a couple upcoming events at least have a chance. Greece has a debt payment due next week, and it seems they really don’t have the money this time. I’d say odds are that the European Union will figure out some way to rescue them again, but if it doesn’t, Greece would default. The effect probably won’t be catastrophic as it won’t be a big surprise, but it should put some downward pressure on rates. Next week also is a jobs report week. The last report was back on trend of a little more than 200k jobs, but, unfortunately, average earnings also returned to trend showing little income growth for US workers. As I’ve said previously, I think earnings growth is more important than job growth at this point. The addition of low-paying service jobs makes for weak economic growth and little pressure on interest rates. The Home Affordable Refinance Program or HARP has been a boon for homeowners wanting to refinance. The program targets underwater mortgages, but its reduced documentation requirements and favorable interest rates make it attractive to all homeowners. The Federal Housing Finance Admin reports the program has helped 3.3 million homeowners refinance their mortgages since its inception in 2009, and it was scheduled to end at the end of this year. However, Mel Watt, Director of the FHFA recently announced a one year extension through 2016. Watt claims an additional 600,000 homeowners still could benefit from a HARP refinance. Keep in mind the two most important restrictions of the program. To be eligible: – Your mortgage must be owned by Fannie Mae or Freddie Mac. (Fannie and Freddie have a tool on their Web sites to help you determine that or give me a call for help.) – And, your mortgage must have closed prior to June 1st, 2009. If you still haven’t been able to refinance, you may want to give this program one more look. The expanded eligibility requirements might allow you to qualify even if you’ve run off the road a couple times in your financial past. Mortgage rates have been on a tear lately, rising from near record lows to the highest rates of the year in a few, short weeks. But it seems the train has run out of coal for now. Rates have plateaued. The question is will we regain the ground we lost? There is hope. Recent US economic data has been disappointing, and some analysts are tossing around the dreaded “R” work – recession. Overseas economies don’t look much stronger, and the European Union still is struggling with the Greek question. With all that acting as a wet blanket, you wouldn’t think we’d be worried about higher rates. The problem is the German Bund. Investors drove German rates close to zero earlier in the year. A few weeks ago, investors started selling, and German rates rose rapidly, dragging US rates along for the ride. For now, let’s take solace in the fact that rates have paused, but it’s entirely possible that the lemmings will start running towards the cliff again. If you choose to hope for lower rates, float cautiously and remain vigilant. Mortgage rates are likely to remain volatile, but floating could be a successful strategy if you watch for a dip like last Fri. After a very quiet winter, volatility has returned to mortgage rates in a big way. Thirty-year rates have shot up about 3/8th of a percent in the past two weeks. This rapid rise has been harder to understand because it’s not related to the typical market forces we watch. US interest rates are rising primarily because European rates are rising. The increase in Europe has been much more severe and seems to be related to the belief that European quantitative easing has cured all that ails the European economies. Whereas previous record low yields in Europe pushed US rates down, now they’re pulling them up. An additional factor is the recent record issuance of US corporate debt. Corporations are racing to take advantage of debt financing before rates rise. Corporate debt also acts as a substitute for mortgage bonds. The short-term market sentiment clearly has turned against low rates. While US economic data still doesn’t support higher rates, if you have a short-term time horizon, it would be risky waiting for rates to reverse. It’s quite possible when rates do dip that they’ll be a higher than today. Mortgage rates moved higher last week – and quickly – but why? The 1st quarter GDP report showed almost no growth of the US economy to begin the year. It seemed that that coupled with other weak economic data would keep rates low. Unfortunately, the markets didn’t cooperate. We’ve talked a lot this year about how super-low European rates have supported low US rates even when the US economy seemed to be strengthening. Last week, European rates increased dramatically, and it seems they drug US rates along for the ride. Another contributing factor may have been the report showing wage growth picked up last quarter. As we discussed before, the lack of wage growth in our economic recovery probably was helping keep rates low. How about the week ahead? The market seems oversold at the moment, which could support a bounce to lower rates. This is a jobs report week. If we get another disappointing report Fri, we could quickly recover what we lost during the last week. However, a strong report could confirm the current market sentiment and leave rates where they are.
Q: How can I output a command to a file, without getting a blank file on error? I'm trying to run a command, write that to a file, and then I'm using that file for something else. The gist of what I need is: myAPICommand.exe parameters > myFile.txt The problem is that myAPICommand.exe fails a lot. I attempt to fix some of the problems and rerun, but I get hit with "cannot overwrite existing file". I have to run a separate rm command to cleanup the blank myFile.txt and then rerun myAPICommand.exe. It's not the most egregious problem, but it is annoying. How can I avoid writing a blank file when my base command fails? A: You can delete the file after running, if the command fails, with myAPICommand parameters > myFile.txt || rm myFile.txt But I would suggest clobbering the file instead: myAPICommand parameters >| myFile.txt See What are the shell's control and redirection operators? for details. A: You must have "noclobber" set, check the following example: $ echo 1 > 1 # create file $ cat 1 1 $ echo 2 > 1 # overwrite file $ cat 1 2 $ set -o noclobber $ echo 3 > 1 # file is now protected from accidental overwrite bash: 1: cannot overwrite existing file $ cat 1 2 $ echo 3 >| 1 # temporary allow overwrite $ cat 1 3 $ echo 4 > 1 bash: 1: cannot overwrite existing file $ cat 1 3 $ set +o noclobber $ echo 4 > 1 $ cat 1 4 "noclobber" is only for overwrite, you can still append though: $ echo 4 > 1 bash: 1: cannot overwrite existing file $ echo 4 >> 1 To check if you have that flag set you can type echo $- and see if you have C flag set (or set -o |grep clobber). Q: How can I avoid writing a blank file when my base command fails? Any requirements? You could just simply store the output in a variable and then check if it is empty. Check the following example (note that the way you check the variable needs fine adjusting to your needs, in the example I didn't quote it or use anything like ${cmd_output+x} which checks if variable is set, to avoid writing a file containing whitespaces only. $ cmd_output=$(echo) $ test $cmd_output && echo yes || echo no no $ cmd_output=$(echo -e '\n\n\n') $ test $cmd_output && echo yes || echo no no $ cmd_output=$(echo -e ' ') $ test $cmd_output && echo yes || echo no no $ cmd_output=$(echo -e 'something') $ test $cmd_output && echo yes || echo no yes $ cmd_output=$(myAPICommand.exe parameters) $ test $cmd_output && echo "$cmd_output" > myFile.txt Example without using a single variable holding the whole output: log() { while read data; do echo "$data" >> myFile.txt; done; } myAPICommand.exe parameters |log A: You could create a script to run the myAPICommand.exe, but have it first remove the myFile.txt if it exists. Then you don't have to constantly do the rm command to clean up. Like: if [ -e myFile.txt ] then rm myFile.txt && myAPICommand.exe else You could also make it so that your command cleans up after itself. If the file is empty adding something like the following. Like: if [ -s myFile.txt ] then EXIT 0 else rm myFile.txt && EXIT 1 fi
Research Abstracts Online January 2010 - March 2011 PI: Traian Dumitrica, Associate Fellow Study of Bending Deformations in Carbon Nanotubes These researchers recently discovered that to obtain accurate microscopic modeling of bending, it is not essential to make recourse to large systems and massive parallelization. Instead, it can be achieved by a change in paradigm in atomistic modeling, through the simplifications introduced by objective molecular dynamics (MD), a recently developed scheme that performs calculations on small cells under rotational boundary conditions. Carbon nanotube (CNT) bending is simulated using objective MD in conjunction with the Tersoff potential. The researchers plan to study multi-walled CNTs. Because these systems have a significantly larger number of atoms, computations will be carried out on multiple processors (up to 10) using their own code, called TROCADERO.
Prophylaxis of radiation-induced nausea and vomiting using 5-hydroxytryptamine-3 serotonin receptor antagonists: a systematic review of randomized trials. To systematically review the effectiveness and safety of 5-hydroxytryptamine-3 receptor antagonists (5-HT3 RAs) compared with other antiemetic medication or placebo for prophylaxis of radiation-induced nausea and vomiting. We searched the following electronic databases: MEDLINE, Embase, the Cochrane Central Register of Controlled Clinical Trials, and Web of Science. We also hand-searched reference lists of included studies. Randomized, controlled trials that compared a 5-HT3 RA with another antiemetic medication or placebo for preventing radiation-induced nausea and vomiting were included. We excluded studies recruiting patients receiving concomitant chemotherapy. When appropriate, meta-analysis was conducted using Review Manager (v5) software. Relative risks were calculated using inverse variance as the statistical method under a random-effects model. We assessed the quality of evidence by outcome using the Grading of Recommendations Assessment, Development, and Evaluation approach. Eligibility screening of 47 articles resulted in 9 included in the review. The overall methodologic quality was moderate. Meta-analysis of 5-HT3 RAs vs. placebo showed significant benefit for 5-HT3 RAs (relative risk [RR] 0.70; 95% confidence interval [CI] 0.57-0.86 for emesis; RR 0.84, 95% CI 0.73-0.96 for nausea). Meta-analysis comparing 5-HT3 RAs vs. metoclopramide showed a significant benefit of the 5-HT3 RAs for emetic control (RR 0.27, 95% CI 0.15-0.47). 5-Hydroxytryptamine-3 RAs are superior to placebo and other antiemetics for prevention of emesis, but little benefit was identified for nausea prevention. 5-Hydroxytryptamine-3 RAs are suggested for prevention of emesis. Limited evidence was found regarding delayed emesis, adverse events, quality of life, or need for rescue medication. Future randomized, controlled trials should evaluate different 5-HT3 antiemetics and new agents with novel mechanisms of action such at the NK(1) receptor antagonists to determine the most effective drug. Delayed nausea and vomiting should be a focus of future study, perhaps concentrating on the palliative cancer population.
INTRODUCTION {#s1} ============ Alveolar rhabdomyosarcoma (ARMS) is a highly aggressive soft tissue sarcoma affecting children and adolescent age groups. At the genomic level it can be associated with translocations involving t(2;13) or t(1;13) resulting in fusion transcripts of PAX3-FKHR (FOXO1) and PAX7-FKHR (FOXO1) genes and corresponding proteins, reportedly accounting for 55% and 22% of ARMS, respectively in one study \[[@R1]\]. Moreover, in this same study the PAX3-FKHR group demonstrated an estimated 4-year overall survival of only 8% and with metastatic disease, a significant increased risk of failure and death. The biology of ARMS has recently been summarized to include blocks in differentiation and promotion of proliferation in the context of genomic aberrations and specifically, has incorporated the insulin-like growth factor (IGF), c-Met, GSK3-β, transforming growth factor (TGF)-beta/Gli2, YY1, and enhancer of Zeste homolog 2 (EZH2) pathways \[[@R2]--[@R17]\]. In short, by neutralizing the biological influence of the fusion transcript and protein, PAX3-FKHR (FOXO1) and targeting the pathways that impose both a block in differentiation and facilitate proliferation, we should be able to convert this aggressive and lethal form of ARMS to a more benign and indolent state and prevent recurrent disease. The purpose of this report is threefold: 1. to present genomic and morphoproteomic findings in a patient with PAX3-FKHR (FOXO1) ARMS that help to further define the biology of this subtype; 2. to show, in a xenograft model, confirmation of therapies that could target its genomic and proteomic biology and the block in differentiation and lead to tumoral regression and/or tumoral growth inhibition; and 3. to propose a clinically scientific treatment regimen that could be used in both an initial and maintenance mode to target the biology of PAX3-FKHR (FOXO1) subtype of ARMS, remove the block in differentiation and minimize the risk of recurrent disease. RESULTS {#s2} ======= Patient clinical course and treatment history {#s2_1} --------------------------------------------- A 10 year-old male had originally presented with alveolar rhabdomyosarcoma of the left hand with a positive axillary lymph node for which he underwent chemoradiation therapy (x15 months). He then recurred at age 12 with an abdominal mass in the soft tissue of the retroperitoneal region and in the subcutaneous region of the back for which he received vinorelbine, cyclophosphamide and temsirolimus, with a reported 70% tumor reduction. Unfortunately, the patient\'s ARMS subsequently recurred again, this time with new testicular and retroperitoneal lesions and brain metastasis for which he was treated with temozolomide and irinotecan, and then metformin and vorinostat approximately one month prior to the biopsy of the right lower quadrant mass. He died at age 14 with metastasis to the brain and leptomeningeal sarcomatosis. An autopsy also revealed extensive metastatic disease in the organs of the abdominal cavity, the retroperitoneum, diaphragm and rib cage, but with no metastatic nodules in the lung parenchyma. Molecular analyses {#s2_2} ------------------ Fluorescent *in situ* hybridization (FISH) analysis was performed on a biopsy from the retroperitoneal biopsy by an outside hospital and confirmed the presence of *FKHR (FOXO1)* gene rearrangement. A subsequent independent genomic report from a different commercial laboratory confirmed the *PAX3-FKHR (FOXO1)* translocation in his ARMS. Morphoproteomic analysis \[[@R18], [@R19]\] performed on a portion of the biopsy from the abdomen demonstrated the following proteomic findings associated with correlates to the *PAX3-FKHR (FOXO1)* translocation and with its dedifferentiated state: total insulin-like growth factor −1 receptor (IGF-1R\[Tyr1165/1166\]) expression in the cytoplasm of virtually all of the tumor cells at 1-3+ signal intensity (on a scale of 0 to 3+)\[[@R2], [@R3]\]; constitutive activation of c-Met tyrosine kinase as evidenced by the expression of phosphorylated (p)-c-Met (Tyr1234/1235) at up to 2+\[[@R4], [@R5]\]; constitutive activation of the IGF-1R/mTORC2/Akt pathway with concomitant nuclear expression of p-mTOR (Ser 2448) and p-Akt (Ser 473) consistent with mTORC2 pathway activation and downstream signaling from the IGF-1R pathway \[[@R20]--[@R24]\]; Silent mating type information regulation 2 homolog 1(Sirt1) which is an NAD+ histone deacetylase and can be tumorigenic in the context of maintaining an undifferentiated primitive state and in providing active tumorigenic molecules to drive cell proliferation \[[@R25]--[@R27]\] was expressed at up to 3+ in the majority of the tumoral nuclei (\>90%); glioma-associated oncogene protein 2 (Gli2) which can reflect signaling from the sonic hedgehog pathway and the transforming growth factor (TGF)-beta{Smad3} pathway and thereby has the potential to inhibit MyoD and contribute to a block in differentiation to a benign form \[[@R7]--[@R10]\] was variably expressed (0 to 3+) but in the majority of tumoral nuclei; and Enhancer of Zeste homolog 2 (EZH2), a histone methyltransferase was immunopositive in the majority of the tumoral nuclei consistent with both the repression of genes that are associated with stem cell differentiation and collaboration with JARID2, a downstream target of PAX3-FKHR leading to the inhibition of myogenic differentiation \[[@R12]--[@R17]\]. The digital images from the morphoproteomic analysis along with the microanatomical features of the tumor are depicted in Figures [1](#F1){ref-type="fig"} and [2](#F2){ref-type="fig"}. Further consideration of the genomic and proteomic correlates and their application to targeted therapy are contained below in the Discussion. ![The patient\'s ARMS, PAX3-FKHR subtype with: H&E stained section showing dedifferentiated tumor cells\ **A.** high expression of insulin-like growth factor (IGF)-1 receptor \[Tyr1165/1166\] in the cytoplasm of the tumor cells **B.** activation of c-Met tyrosine kinase as evidenced by the moderate expression in the cytoplasm of phosphorylated (p)-c-Met (Tyr1234/1235) at up to 2+ **C.** constitutive activation of the mTORC2/Akt pathway with concomitant nuclear expression of p-mTOR (Ser 2448) and p-Akt (Ser473) consistent with mTORC2 pathway activation **D.** and **E.** and downstream signaling from IGF-1R. Contrast with negative control **F.** (DAB\[3,3′-diaminobenzidine\] brown chromogenic signal; original magnifications x400 for Frames A-F).](oncotarget-07-46263-g001){#F1} ![Dedifferentiated tumor cells in the patient\'s ARMS, PAX3-FKHR subtype showing correlative expression in tumoral nuclei of: Sirt1\ **A.** Gli2 **B.** and EZH2 **C.** and **D.** DAB brown chromogenic signal, original magnifications x400 for Frames A, B and D and x100 for Frame C).](oncotarget-07-46263-g002){#F2} Xenograft testing {#s2_3} ----------------- A personalized model of the antitumor activity of selected therapies was created from a portion of the patient\'s ARMS, also obtained via biopsy of the recurrent tumor from the right lower quadrant of his abdomen (Personalized Champions TumorGraft^®^ Test). The combinatorial or individual therapies that effected either tumor regression (TR) and/or tumor growth inhibition (TGI) included the following: TR following treatment with Entinostat alone or combined with docetaxel (Figure [3](#F3){ref-type="fig"} and Table [1](#T1){ref-type="table"}); and TGI seen with valproic acid+ metformin +celecoxib (39%), with celecoxib +docetaxel (60%), with entinostat + docetaxel (121%), and with entinostat alone (113%) \[Figure [4](#F4){ref-type="fig"} and Table [1](#T1){ref-type="table"}\]. These data only became available after the patient was deceased. ![Relative growth of treatment groups at test completion\ Note tumor regression with entinostat and tumor growth inhibition with valproic acid, a class I histone deacetylase inhibitor, celecoxib and metformin.](oncotarget-07-46263-g003){#F3} ![Tumor volume and agent activity data plotted against test days 0 to 18\ Note tumor regression over time with entinostat and tumor growth inhibition over time with valproic acid, a class I histone deacetylase inhibitor, celecoxib and metformin vis-à-vis the control.](oncotarget-07-46263-g004){#F4} ###### Tumor volume and agent activity(%TGI=tumor growth inhibition;%TR=tumor regression) ------------------------------------------------------ Group \% TGI RECIST PD/SD/PR/CR\* %TR ---------------- -------- ---------------------- ----- **Control** 6/0/0/0 Atovastatin\ n/a 3/0/0/0 n/a Vismodegib\ Valproic Acid Valproic Acid\ 39 3/0/0/0 n/a Metformin\ Celecoxib Topotecan\ 12 3/0/0/0 n/a Docetaxel Celecoxib\ 60 3/0/0/0 n/a Docetaxel Entinostat\ 121 0/0/3/0 65 Docetaxel Capecitabine 51 3/0/0/0 n/a Pemetrexed 34 3/0/0/0 n/a Entinostat 113 0/1/3/0 43 ------------------------------------------------------ PD-Progressive Disease; SD-Stable Disease; PR-Partial Response; CR-Complete Response DISCUSSION {#s3} ========== Genomic testing of this patient\'s ARMS confirmed it as *PAX3-FKHR (FOXO1)* subtype. Furthermore, the aggressive nature of this tumor and the unfortunate eventual outcome coincides with the behavior and high mortality of this subtype. Using morphoproteomic analysis in conjunction with the genomic characterization of the patient\'s tumor as *PAX3-FKHR (FOXO1)* subtype and data from xenograft testing of his tumor in the context of data mining of the National Library of Medicine\'s MEDLINE data base, we have further characterized the biology of this subtype and provide genomic, proteomic and pharmacogenomics correlates to targeted therapies. PAX3-FKHR (FOXO1) fusion gene/protein correlates with the following morphoproteomic findings in this patient\'s ARMS: high expression levels of the protein analyte, total IGF-1R (Tyr1165/1166) consistent with the ability of the fusion oncoprotein to upregulate the transcription of the *IGF-1receptor* gene promoter resulting in the corresponding protein \[[@R2], [@R3]\]; and expression with constitutive activation of c-Met (phosphorylated on tyrosine 1234/1235) consistent with the role of the fusion protein in upregulating MET and inducing a ligand-independent activation of Met signaling, a proproliferative pathway in ARMS \[[@R4], [@R5]\]. Additional downstream signaling of PAX3-FKHR (FOXO1) fusion gene/oncoprotein include the proproliferative GSK3beta pathway \[[@R6]\] and JARID2, the latter enabling the collaboration of EZH2 with YY1. Parenthetically, YY1 in this collaboration with JARID2 can recruit EZH2 and HDAC 1 to the promoter region leading to a block in differentiation, partially via the downregulation of miR-29b2 and miR-29c and by inhibiting MyoD, favoring rhabdomyosarcoma cell proliferation over differentiation \[[@R11]--[@R17], [@R28]\]. Phosphorylative activation of PAX3-FOX01 by polo-like kinase (PLK) 1 \[[@R29]\] is noteworthy as a potential contributor to the pathogenesis of this subtype of ARMS. Moreover, the correlative expression of the IGF-1R/mTORC2/Akt pathway with constitutive activation of p-Akt (Ser 473) in his tumor could have played a dual role in ARMS. By activating the downstream nuclear factor (NF)-kappaB pathway \[[@R18], [@R19]\], p-Akt could facilitate the availability of YY1 and thereby the block in differentiation and conversely, p-Akt (Ser 473) can exert feedback inhibition of PAX3-FKHR \[[@R30]\]. The latter coincides with the clinical response in the patient during temsirolimus therapy given that rapalogs can initially upregulate the IGF-1R/mTORC2/Akt pathway \[[@R24], [@R31]\] and could have temporarily moderated the PAX3-FKHR signaling. Finally, other factors that are likely to have imposed a block in myoblastic differentiation include Sirt1 and Gli2, which were detected by morphoproteomic analysis. These pathogenetic factors of this PAX3-FKHR (FOXO1) subtype of ARMS imposing a block in differentiation and favoring proliferation are depicted in the schematic (see Figure [5](#F5){ref-type="fig"}). ![A schematic depicting the biology of PAX3-FKHR (FOXO1) subtype of ARMS that integrates genomics and proteomics in a pathogenetic sequence, resulting in a dedifferentiated state and promoting proliferation (see ![](oncotarget-07-46263-i001.jpg))\ Moreover, therapies that can target the genomics and molecular biology and take advantage of pharmacogenomics to relieve the block in differentiation to a more benign form and result in reduced proliferation are also illustrated in the schematic (see ![](oncotarget-07-46263-i002.jpg)) and covered in detail in the Discussion. A proof of concept is provided in part by the results of xenograft testing of the patient\'s ARMS, PAX3-FKHR (FOXO1) subtype with the application of entinostat showing tumor regression and a combination of valproic acid, a class I histone deacetylase inhibitor, celecoxib and metformin showing tumor growth inhibition (see Figures [3](#F3){ref-type="fig"} and [4](#F4){ref-type="fig"}, Table [1](#T1){ref-type="table"} and Discussion).](oncotarget-07-46263-g005){#F5} In this context, the following agents should act to address the biology of ARMS by acting at genomic and proteomic levels: 1) Entinostat by virtue of its ability to: a) inhibit class I HDAC \[[@R32]\] and thereby, to interrupt the YY1-EZH2-HDAC1 inhibition of miR-29b2 and mir-29c allowing arrest of ARMS cell proliferation and promoting differentiation \[[@R11]--[@R17], [@R28]\]; and b) its ability to effect direct transcriptional supression of PAX3:FOXO1 \[[@R33]\] and to inhibit the phosphorylative activation of PAX3---FOXO1 by polo-like kinase (PLK)1 \[[@R29], [@R34], [@R35]\]; 2) celecoxib inhibits the NF-kappaB pathway at multiple points \[[@R36]\] and should reduce the overproduction of YY1; 3) sulforaphane, a nutraceutical suppresses polycomb group protein level including EZH2 \[[@R37]\] and this should promote alveolar rhabdomyosarcoma\'s differentiation to a more benign form, induce apoptosis in the tumor cells \[[@R38]\] and reduce the survival of alveolar rhabdomyosarcoma leading to elimination of the tumor (in the latter study, sulforaphane was also shown to decrease the mRNA and protein levels of PAX3-FKHR, MYCN and MET in ARMS cells); 4) retinoic acid upregulates miR-214 which downregulates EZH2 protein in embryonic stem cells and miR-214-mediated EZH2 protein reduction accelerates skeletal muscle cell differentiation \[[@R39]\] (Both all-trans retinoic acid, ATRA and 9-cis retinoic acid suppressed the cell growth of alveolar rhabdomyosarcoma with evidence of a differentiating effect \[[@R40]\]. ATRA increased the expression of some genes associated with muscle differentiation and slowed the proliferation and promoted a more differentiated myogenic phenotype in ARMS cell lines \[[@R41]\]. A phase I study with Entinostat, in combination with 13-cis-retinoic acid for patients with solid tumors but none with ARMS was completed and showed that these were reasonably well tolerated in the dosing regimen used \[[@R42]\]); and 5) metformin should be effective by virtue of its ability to: a) upregulate miR-26a and thereby downregulate EZH2 \[[@R43]\] (miR-26a has been shown to be low and EZH2mRNA high in ARMS cells and patient samples vis-à-vis controls \[[@R44]\]); b) its ability to reduce the signaling to the NF-kappaB pathway by virtue of its ability to inhibit the IGF-1R/mTORC2/Akt pathway \[[@R18], [@R19], [@R24]\]; c) its ability to suppress polo-like kinase genes via activation of AMPK \[[@R45]\] and to interfere in the TGF-beta{Smad}3/Gli2 pathway (*vide supra* \[[@R7]--[@R10], [@R46]--[@R48]\]). These pathways and therapeutic agents are schematically represented in the diagram below (see Figure [5](#F5){ref-type="fig"}). Proofs of concept are also provided by the results of xenograft testing of the patient\'s PAX3-FKRH (FOXO1) subtype of ARMS (*vide supra*). Specifically, tumor regression and tumor growth inhibition were effected with Entinostat alone and tumor growth inhibition was achieved with a combination of Valproic Acid, a class I histone deacetylase inhibitor, celecoxib and metformin. In summary, we present genomic and morphoproteomic findings in a patient with PAX3-FKHR (FOXO1) subtype of ARMS that further define the existing biology of this subtype of ARMS and correlate these with a block in myoblastic differentiation of this malignant process to a more benign form. Using data mining of the National Library of Medicine\'s MEDLINE database, we identified therapeutic targets and agents acting in pharmacoproteomic and pharmacogenomic fashion that could remove the etiopathogenetic block to myoblastic differentiation in this subtype. Proofs of concept are also provided from xenograft testing of this tumor using agents that interrupt the pathways that block differentiation and also effected tumor regression and/or tumor growth inhibition. These are provided as a basis for clinical scientific consideration as we build a therapeutic strategy to target the PAX3-FKHR (FOXO1) subtype of ARMS. To that end, we contemplate offering a pilot trial for patients with the PAX3-FKHR (FOXO1) subtype who have recurrent disease. Such a trial will incorporate morphoproteomic-guided targeted therapies designed to remove blocks in myoblastic differentiation to a more benign form, and will be applied in a maintenance mode with a low toxicity profile in an effort to reduce the risk of recurrent disease. MATERIALS AND METHODS {#s4} ===================== With Institutional Review Board approval to perform follow-up on patients on whom morphoproteomic analysis had been performed (IRB\#HSC-MS-11-0410), we reviewed the medical records and test results of a patient with ARMS, who had been referred to the CONSULTATIVE PROTEOMICS service at UTHealth-Medical School at Houston for morphoproteomic analysis. Xenograft testing was performed by Champions Oncology Inc. Morphoproteomics {#s4_1} ---------------- The application of bright-field microscopy and immunohistochemistry directed against protein analytes can contribute to the defining of the biology of a disease process and facilitate the integration of genomic, proteomic and pharmacogenomics events into its etiopathogenesis and provide rationale for targeted therapies. To that end, we applied immunohistochemical probes against the following protein analytes to formalin-fixed paraffin-embedded sections of the patient\'s recurrent ARMS in the right lower quadrant: total insulin-like growth factor −1 receptor (IGF-1R\[Tyr1165/1166\] (Gen Way Biotech Inc. San Diego, CA); c-Met, phosphorylated on tyrosine 1234/1235 (Cell Signaling Technology, Inc, Danvers, MA); mammalian target of rapamycin (mTOR), phosphorylated on serine 2448 (Cell Signaling Technology, Inc); Akt, phosphorylated on serine 473 (Cell Signaling Technology, Inc); silent mating type information regulation 2 homolog 1 (Sirt1)(Abcam Inc. \[E104;ab32441\]); glioma-associated oncogene protein 2 (Gli2)(Abcam, Inc\[ab26056\]); and enhancer of Zeste homolog 2 (EZH2, Cell Signaling Technology, Inc). The details of the morphoproteomic staining procedure have been previously described \[[@R49]\]. Xenograft testing {#s4_2} ----------------- An explant from the patient\'s right lower quadrant recurrent ARMS was referred to Personalized Champions Tumorgraft^®^ chemosensitivity testing and immediately implanted into immunodeficient mice. Per Champions Oncology, the following details are stated verbatim for the materials and methodologies employed: ### Agent efficacy {#s4_2_1} All test agents were formulated according to manufacturer\'s specifications. Beginning Day 0, tumor dimensions were measured twice weekly by digital caliper and data, including individual and mean estimated tumor volumes (Mean TV ± SEM), are recorded for each group. Tumor volume was calculated using the formula: *TV= width^2^ x length x π/6*. ### Tumor growth inhibition and RECIST {#s4_2_2} At study completion, percent tumor growth inhibition (%TGI) values were calculated and reported for each treatment group (T) versus control (C) using initial (i) and final (f) tumor measurements by the formula: *%TGI=\[1-(Tf-Ti)/(Cf-Ci)\]x100*. Individual mice reporting a tumor volume \>120% of the Day 0 measurement are considered to have progressive disease (PD). Individual mice with neither sufficient shrinkage nor sufficient tumor volume increases are considered to have stable disease (SD). Individual mice reporting a tumor volume ≤70% of the Day 0 measurement for two consecutive measurements over a seven day period are considered partial responders (PR). If the PR persisted until study completion, percent tumor regression (%TR) is determined using the formula: *%TR=(1-Tf/Ti)x100*; a mean value is calculated for the entire treatment group. Individual mice lacking palpable tumors for two consecutive measurements over a seven day period are classified as complete responders (CR). All data collected in this study was managed electronically and stored on a redundant server system. The clinical specificity for this test is 60%; the clinical sensitivity of this test is 98.1%. The authors thank Pamela K Johnston, HT (ASCP) for technical assistance and Ms. Bheravi Patel for secretarial support and help with the graphics. **CONFLICTS OF INTEREST** The authors declared that they have no conflicts of interest to this work. **FUNDING** The authors note that there was no external funding for this work and the costs of preparation and publication were paid from the Harvey S. Rosenberg, M.D. Chair in Pathology and Laboratory Medicine endowment that supports the morphoproteomic initiative.
30 Cal.App.2d Supp. 773 (1938) E. C. ROOS, Appellant, v. FLOYD JANSEN et al., Respondents. California Court of Appeals. April 11, 1938. Joseph Schecter for Appellant. Logan Beamer for Respondents. Bishop, J. In the judgment from which the plaintiff has appealed it is recited that a motion to dismiss for lack of jurisdiction had been granted. We are of the opinion that it was error for the trial court to enter a judgment of dismissal for lack of jurisdiction, for it not only had jurisdiction but there was in the premises no operative limitation upon its right to exercise its jurisdiction, as it appeared to be a proper court for the trial of the case. [1] In general, the complaint is one for the balance of $126 overdue plaintiff's assignor for medical services. Specifically, it contains four causes of action: the first, one relying on an open book account; the second, alleging an indebtedness for services rendered at the special instance and request of the defendants; the third, setting up an account stated; while the fourth alleged that the indebtedness was upon an open, mutual and current account. No contention is or may be made that, when tested for jurisdictional purposes, the action is other than an action at law for $126, the four causes of action being but different methods of presenting the one claim of $126. In order to understand the issues on this appeal, these simple facts must be known. In the complaint it was alleged "that the defendants herein are residents of the City of Los Angeles, County of Los Angeles". This allegation, as were all others, was denied, and on the trial it was made to appear that the respondents (defendants below) did not reside in the city of Los Angeles, but did reside in the city of Glendale, Los Angeles County. The complaint also contained such allegations as these: "That within four years last past ... in the City of Los Angeles, County of Los Angeles, State of California, the defendants herein became and were indebted to plaintiff's assignor in the sum of $126.00, upon an open book account" and again "That within four years last past ... in the City of Los Angeles, County of Los Angeles, State of California, an account was stated between [30 Cal.App.2d Supp. 775] plaintiff's assignor and the defendants herein ..." Like statements of place were made in the other counts. The effect of these allegations, used in the common counts, was to declare that the obligations sued upon were contracted to be performed in Los Angeles City. While the trial did not progress to a judgment on the merits, there was nothing developed, so far as it did go, at variance with the theory of the complaint that the obligations were contracted to be performed in Los Angeles City. Evidence was presented that the agreement for the medical services was orally made in Los Angeles City; the services were performed there; plaintiff's assignor had his office there. [2] In the absence of a special agreement as to the place where a contract is to be performed, it is to be deemed performable at the creditor's place of business, Bank of Yolo v. Sperry Flour Co., (1903) 141 Cal. 314 [74 P. 855, 65 L.R.A. 90] (applying secs. 1488 and 1489, Civ. Code); Kaupke v. Lemoore etc. Co., (1935) 7 Cal.App.2d 362 [46 PaCal.2d 204], or, in the absence of a contrary showing, a contract is to be deemed performable where it is made. (Fitzhugh v. University Realty Co., (1920) 46 Cal.App. 198, 201 [188 P. 1023]; Southwestern Portland Cement Co. v. Cochrane, (1931) 114 Cal.App. Supp. 778, 781 [300 P. 445].) [3] If we understand aright respondents' defense of the judgment of dismissal, it is that when it developed as a fact at the trial that the defendants lived in the city of Glendale, and not, as alleged in the complaint, in the city of Los Angeles, the jurisdiction of the trial court which had appeared to exist was proved to be nonexistent, with the result that no choice remained but to dismiss the action. It may be that this position, which we shall see is quite untenable, was not that taken by the trial judge, but that he believed, when the fact appeared, that the defendants resided in Glendale, that he was either authorized or compelled to dismiss the action by virtue of those provisions, hereafter quoted, of section 396a, Code of Civil Procedure. To evaluate properly either respondents' position or the only other position we can think of as being taken in support of the judgment, several sections of the Code of Civil Procedure should be freshly in mind. Since the legislature, in 1933, at the inspiration of the California Code Commission, revised these sections, they make that which respondents' [30 Cal.App.2d Supp. 776] argument fails to note, a clean-cut distinction between questions of jurisdiction of subject-matter and those involving the place of trial. No innovation was made by the 1933 revision in the classification of our trial courts; those of general interest remain as formerly: a superior court in each county of the state (sec. 6, art. VI, Const.); a municipal court in each city with over forty thousand population that establishes such a court (sec. 85, Code Civ. Proc.); and justices' courts of class A, in cities, towns and judicial townships having a population of 30,000 or more, and in those with less than that population, justices' courts of class B (sec. 81, Code Civ. Proc.). "In so far as the jurisdiction of municipal and justices' courts is the same, such jurisdiction is concurrent," is the provision of section 83, Code of Civil Procedure. It follows that each municipal court of the state, each justice's court of class A and each justice's court of class B, would have had jurisdiction to try the action under review, for the jurisdiction of those several courts, with respect to actions at law, is made dependent on the demand, exclusive of interest (or the value of property in question), being, respectively, two thousand dollars or less sec. 89, Code Civ. Proc.), one thousand dollars or less and three hundred dollars or less (sec. 112, Code Civ. Proc.). In saying that each of these courts would have had "jurisdiction" to try this case, we are using the word "jurisdiction" in the sense in which we understand these sections of the code to use it. These sections are concerned with questions of jurisdiction and not with the question: Which, of the courts having jurisdiction, is the proper court for the trial of the action? The answer to this last question we look for in part II, title IV of the Code of Civil Procedure, which has the heading: "Place of Trial of Civil Actions." There, in section 395, subdivision 1, we find: "When a defendant has contracted to perform an obligation in a particular county, and the demand, exclusive of interest, does not exceed three hundred dollars, either the county where such obligation is to be performed, or the county in which the defendant, or any such defendant, resides at the commencement of the action, shall be a proper county for the trial of an action founded on such obligation, and the county in which such obligation is incurred shall be deemed to be the county in which it is to be performed unless there is a special contract in writing to the contrary." Then later we find (in the [30 Cal.App.2d Supp. 777] same section, subdivision 2): "The proper court for the trial of any such action, in the county hereinabove designated as the proper county, shall be determined as follows: If there is a municipal or justice's court, having jurisdiction of the subject-matter of the action, established in the city, city and county, town or judicial township, in which the defendant, or any defendant, so resides, ... or, in the cases hereinabove mentioned, in which the obligation was contracted to be performed, such court is a proper court for the trial of such action." From these provisions it is plain, and as to this respondent raises no question, that Los Angeles County was the proper county for the trial of this action. It is also clear that if the defendants resided in Los Angeles City and also that was the city in which the obligation was contracted to be performed, then the trial court was the proper court to try the action. If, however, as was made to appear at the trial, the defendants lived in the city of Glendale, but the obligation was contracted to be performed in Los Angeles City, then either the justice's court of Glendale township or the trial court was a proper court for the trial of the case. [4] So far, it appears that under any theory of the case, that presented by the complaint or that revealed by the evidence, the trial court had jurisdiction of the action. In passing we may note that whatever the rule may have been, it is now required that an action pending in a court without jurisdiction of the subject-matter be not dismissed, but be transferred to a proper court having jurisdiction. (Sec. 396, Code Civ. Proc.) It also appears that whether tested by the complaint or the facts thus far adduced, the trial court was at least one of the proper courts for the trial of the action. But were it true that the trial court was not the proper court, the remedy for that condition would not be a dismissal of the action. Section 396b, Code of Civil Procedure, expressly provides that "if an action or proceeding is commenced in a court having jurisdiction of the subject-matter thereof, other than the court designated as the proper court for the trial thereof, under the provisions of this title, the action may, notwithstanding, be tried in the court where commenced, unless the defendant, at the time he answers or demurs, files with the clerk, or with the justice if there be no clerk, an affidavit of merits and notice of [30 Cal.App.2d Supp. 778] motion for an order transferring the action or proceeding to the proper court". An exception is made to the provision just quoted; it is: "Except as otherwise provided in section 396a" (Code Civ. Proc.). It is because of this that we have suggested that possibly the trial court was of the opinion that the provisions of section 396a warranted his judgment of dismissal. In part that section reads: "In all actions and proceedings within the subject-matter jurisdiction of justices' courts of class B, whether commenced in a justice's or municipal court, plaintiff must state facts in the complaint, verified by his oath, or the oath of his attorney, or in an affidavit of the plaintiff or of his attorney filed with the complaint, from which it can be determined which court is, under the provisions of this title, the proper court for the trial of such action or proceeding. When such affidavit is filed with the complaint, a copy thereof must be served with the summons. Except as herein provided, if such complaint or affidavit be not so filed, no further proceedings shall be had in the action or proceeding, except to dismiss the same, unless defendant consents, in the manner hereinafter provided, to the keeping of the action or proceeding in the court where commenced." Later, in the second paragraph of the same section, we find: "When it appears from such complaint or affidavit of the plaintiff that the court in which such action or proceeding is commenced is a proper court for the trial thereof, all proper proceedings may be had, and the action or proceeding may be tried therein." In the case under review the complaint was verified by the plaintiff; in it was a statement that the defendants resided in Los Angeles City. These facts, standing alone, bring the case within the second paragraph of the section, just quoted, for they reveal the trial court as a proper court for the trial thereof, although not necessarily the only proper court, and hence "all proper proceedings may be had, and the action or proceeding may be tried therein". But this is not all. As already noted, the complaint stated facts, or perhaps we should say, in view of the use of the common counts, employed a formula, from which it appeared that the obligations were contracted to be performed in Los Angeles City. From the complaint, therefore, it would be determined that the trial court was the only proper court for the trial of the action. [30 Cal.App.2d Supp. 779] The fact, developed at the trial, that the allegation of the complaint was incorrect which stated that the defendants resided in the city of Los Angeles, for in truth they resided in the city of Glendale, did not authorize the dismissal even should we disregard all other allegations and facts. Section 396a, Code of Civil Procedure, contemplates just such a possibility, for it provides further in the second paragraph, from which we have already quoted: "provided, however, that in such case a motion for a transfer of the action or proceeding may be made as in other cases, within the time, upon the grounds, and in the manner provided in this title, and if upon such motion it appears that such action or proceeding is not pending in the proper court, or should for other cause be transferred, the same shall be ordered transferred as provided in this title." Respondent's remedy, if he desired to have the action transferred to the Glendale justice's court or to any other court, was to make a motion for a transfer. This he did not do; instead he moved for a dismissal. There was no theory on which the court was justified in entering a judgment of dismissal. The judgment of dismissal is reversed; appellant to recover his costs of appeal. Shaw, P. J., and Schauer, J., concurred.
The objective of this research is to elucidate the mechanism or mechanisms by which substituted amphetamines, such as methylenedioxyamphetamine (MDA), rho-choloroamphetamine (pCA) and methylenedioxymethamphetamine (MDMA) cause a long term reduction in brain serotonin (5HT) levels and cause lesions in certain brain regions. These compounds are members of the phenylisopropylamine class of stimulants and hallucinogens that have a long history of abuse. The appearance of the methylenedioxy compounds as abused substances has caused concern because of their potential for toxicity and the lack of understanding of the detailed pharmacology. The research is centered about a model in which the drugs are metabolized either peripherally or in the brain to substance that concentrate in serotonin neurons and generate reactive electrophilic compounds and/or toxic oxygen radicals. The approach utilizes both whole animal and cell culture as the biological media and a number of chemical methods for analysis of changes in cellular properties and in the drug itself. In vivo studies investigation the metabolic N-demethylenation to catecholamines, the N-demethylation of MDMA, and the O-derivatization of catecholamine metabolites are proposed using GC/MS to analyze plasma and brain tissue extracts. The effects of heavy isotope substitution on metabolically active centers on toxicity will also be assessed as an approach to determining the metabolic pathway for toxicity. The neurochemical changes will be monitored in the whole animal by microdialysis and HPLC methodology. The data from in vivo experiments will be analyzed by pharmacokinetic modelling techniques to assess the relationship between drug levels and pharmacological response. Previous studies had demonstrated that a glutathione (GSH) adduct of a metabolite was formed in vitro and its identity and conditions for its formation will be determined. A neuroblastoma based cell line (NG108-15) has been shown to be sensitive to the toxic actions of some of the phenylisopropylamine derivatives. This line will be used to study the formation of this adduct and the biochemical sequence of toxin-induced cell death. The results of these experiments and the relevant methodology will then be applied to studies on the brains of treated animals to assess the validity of the in vitro experiments. The studies utilized techniques in pharmacokinetics, cell culture and general analytical chemistry to elucidate mechanisms.
The City of Winnipeg is building a $2.6-million wall alongside a parking lot it leases to a South River Heights retail complex to protect it from traffic on Waverley Street. Winnipeg's public works department added a $2.6-million retaining wall to the scope of the Waverley underpass construction project this July, according to a report to council's finance committee.​ ​The wall will wrap around the west side of a surface-parking lot the city has leased out since 1999 to Piazza De Nardi, a Taylor Avenue retail complex that houses a wine store and high-end grocery. The wall ensures Piazza De Nardi can continue to lease about 35 parking stalls from the city and will also allow the retail complex to keep its sign and outdoor garden, said Piazza De Nardi's Tom De Nardi. "It's basically there to leave the corner as it looks today," De Nardi said Monday in a telephone interview. "Initially, when the whole project started, the consultant identified a need for a wall. But then it disappeared." De Nardi, whose family bought the Taylor Avenue land with the intention of leasing the city land next door over the long term, said he lobbied the city to reinstate the wall because the parking is a crucial amenity for his business, which he describes as unique in Winnipeg. "It's not a big-box store. It's something that's done with love and passion. We feel Piazza is as much a part of the community as skating rinks," he said. The city declined requests to explain the increase in scope of the Waverley underpass project, which is now expected to cost $121.4 million, down from an initial budget of $156.3 million. Transcona Coun. Russ Wyatt said he believes the initial budget for the Waverley underpass was grossly inflated and said it is "nonsense" to suggest any savings have been achieved. He said he supports the idea of protecting Piazza De Nardi, but still questions the cost. "The De Nardi business has done a lot for the community and the city. There could been a lot of impacts with respect to expropriations​," Wyatt said.
The battle of the sexes. The sex determining gene, Sry, determines the sex of the organism by initiating development of a testis rather than an ovary from the cells of the bipotential gonad. In the 10 years since the discovery of Sry, new genes and cellular pathways that operate in the establishment of the gonadal primordium and the initiation of testis development have been discovered. Experiments defining mechanisms downstream of Sry are providing clear examples of how a regulatory transcription factor initiates cellular processes including proliferation and cell migration, which in turn influence architectural patterning, fate commitment, and differentiation of cells within an organ.
Information Help Your Child Beat ADHD with Ayurveda Date Posted:21 February 2011 With sharpened pencils and colorful new backpacks, thousands of school children have returned to the freshly scrubbed hallways of our schools to begin a new year of learning and development. How can you make sure your child is getting the most out of hours spent in school? One way is to enhance learning ability with the natural techniques of Maharishi Ayurveda. Ayurvedic texts describe three aspects of mental ability: dhi (the power of acquisition or learning) dhriti, (the power of retention) smriti (the ability to recall). When the three mental functions are not in balance, either individually or in their coordination with one another, then learning problems can crop up. Children who have learning problems often feel like failures in school, which leads to frustration and low self-esteem. When these three mental functions are coordinated, then the child's memory is quick and bright. If impurities (ama) are obstructing the channels of communication between these three functions, then not only learning problems but behavioral problems can begin. The high incidence of Attention Deficit Hyperactivity Disorder (ADHD) worldwide is a prime example of a learning/behavioral problem for millions of children. According to a study in Advanced Pediatrics, the frequency of ADHD among school children has been estimated to be as high as 20 percent. What Maharishi Ayurveda Says What causes some children to thrive on learning while others struggle? According to Maharishi Ayurveda, most learning problems are caused by eating food that is lacking in intelligence. By this we mean food laced with chemicals, junk food, and food that is not fresh. Food lacking in intelligence disturbs the intellect and mind, and it disrupts the intellectual rhythm between dhi, dhriti, and smriti. This is especially true for children, who are naturally more sensitive than adults. Modern researchers are just discovering the link between learning disorders and harmful food additives such as the chemical food preservatives BHT and BHA, the cake rising agent calcium silicate, and other colorings, flavorings and emulsifiers. Unfortunately, these harmful food additives and preservatives are found in most packaged foods. A rather shocking study showed that the average person consumes 8–10 pounds of additives a year. Because children have lower body weights and are in the critical developmental years, the harmful effects of these additives are magnified many times. And artificial flavors, colors and preservatives can cause more allergic reactions in children because they are more sensitive than adults. When children are eating unintelligent food, they are not nourishing the mind with minerals, vitamins, and other aspects of nature's intelligence. And modern researchers confirm ancient ayurvedic wisdom -- that any nutritional deficiency can result in diminished mental function. Another cause of mental deficiency in children includes not getting enough sleep. If children do not go to bed on time, or if they watch violent TV shows or read frightening comics before bed, that can disrupt sleep and aggravate the doshas, which then can be expressed as poor memory and recall in school. But diet is still most important, because diet also affects the quality of sleep. Diet is the primary focus for enhancing mental ability, because even herbal compounds won't work if the child is eating unintelligent food. Addressing Three Types of Learning Imbalances To understand how Maharishi Ayurveda can help nourish the memory and attention span in children, it's important to understand the three subdoshas involved in memory. These are: Prana Vata, which governs the brain, sensory perception, and the mind; Sadhaka Pitta, which governs the emotions and their effect on the functions of the heart; In Ayurveda, three types of imbalances of the mind are described, and each is associated with a different subdosha. We can correlate diminished learning ability combined with a hyperactive mind, with a breakdown in Prana Vata. A disturbance in Sadhaka Pitta is associated with a learning imbalance that carries over from childhood into adolescence and young adulthood -- the Pitta time of life. And imbalances in Tarpaka Kapha correlate with problems with learning that occur without hyperactivity involved. For all three types of learning imbalances, Maharishi Ayurveda recommends fresh, organic foods that are prepared using intelligent cooking methods. This means that they are prepared in a way that does not destroy nature's intelligence, and in a way that creates bliss after eating. Also follow an ayurvedic diet that pacifies the specific subdosha causing the imbalance. The daily ayurvedic oil massage is also a powerful way to balance the doshas and help enhance learning ability. If time does not permit a daily massage, doing it regularly every weekend will help. At night, Peace at Night aroma oil can be added to an aroma pot by the child's bed to help provide a deeper, more balanced night's sleep. Mind Power with Ayurvedic Herbal Compounds Besides diet and daily routine, Maharishi Ayurveda offers another sophisticated method for addressing imbalances in memory and attention. These include traditional herbal compounds, called Medhya Rasayanas, that provide powerful nourishment for the mind. Medhya Rasayanas enhance dhi, dhriti, and smriti individually, and they enhance the coordination between these three mental factors. Medhya Rasayanas have also come to the attention of modern researchers. Take Mandook Purni (Centella Asiatica) for instance. The ancient texts say, 'This Mandook Purni is medhya, giving consciousness and rasayana value. And modern research published in the Journal of Psychiatry shows that this herb produced a significant increase in the mental abilities of 30 mentally disabled children. Brahmi, (Bacopa Monniera and Herpestis Monniera) is another important Medhya Rasayana. The texts mention that Brahmi is both medhya and hridya, meaning that it supports both the heart and the mind. A study in the Journal of Ethnopharmacology shows that Brahmi improved acquisition, retention and delayed extinction of newly acquired behavior in rats. The third Medhya Rasayana, Shankhapushpi or Aloeweed, appears in the following verse: "Shankapushpi has a specific action as medhya action. It is also being researched as a memory-enhancing herb. Using these Medhya Rasayanas as a base, Maharishi Ayurveda has developed several powerful products to help enhance learning and memory. For instance, the Intelligence Plus (formerly Study Power) herbal formula is ideal not just for children but students of all ages, because it helps enhance attention span, focus, and the ability to acquire new information and to apply it later. An impressive 1995 research study published in Free Radical Biology of Medicine found that Intelligence Plus (formerly Study Power) helps increase intelligence. The Medhya Rasayanas are also found in Mind Plus Syrup, which is ideal for helping to calm the mind in stressful situations. It is effective in enhancing problem-solving ability, retention and recall. Youthful Mind is especially designed for people over forty, nourishing and revitalizing all three mental functions as the mind ages. These products are ideal for people of all ages who use their minds at school or on the job, and want to feel fresh, creative, and fatigue-free. Mental performance can be expanded to its full potential. All it requires is going back to the basics -- proper nutrition, quality sleep and the balanced wisdom of herbs that can help nourish the mind in a natural, safe way. Six Keys to Mind Power -- at Any Age Eat fresh, pure foods -- The Maharishi Ayurveda advice for kids holds true for everyone -- stay away from foods with chemicals, pesticides or additives. The purer the foods you eat, the more of their intelligence you absorb. Balanced Nutrition is Essential—A diet rich in healthy proteins, such as from soy, with plenty of fruits and vegetables, is good for enhancing mental potential. Don't count fat out entirely, fat plays some essential roles in the physiology. The Power of Antioxidants -- Recent research shows that blueberries are powerful food for the brain because of their antioxidant value. The brain is especially vulnerable to free-radical damage. Take Amrit everyday for superior antioxidant protection—it has been shown to have 1,000 times the free-radical scavenging power of vitamin C or E! Get Your Zzzzs -- Research has confirmed that sleep deprivation leads to diminished mental performance. Ayurveda considers sleep to be a basic building block for good mind/body health, just like diet. Manage Stress -- High levels of stress negatively impact both mind and body. Practice the Transcendental Meditation technique, or find other ways to relax. Keep that Brain Working! -- Like the battery in your automobile, you have to keep your mind active to keep it running. So keep those creative juices flowing and exercise your brain regularly! References 2: T. E. Duormaa, "The adverse effects of food additives on health: a review of the literature with a special emphasis on childhood hyperactivity," Journal of Automolecular Medicine, Vol. 4, pp. 225-38 (1994).
Recent Comments Archives Categories Meta In this guide, we well review how the best appetite suppressant works, where you can find them and their benefits and side effects. A number of factors can affect the fine balance within the body; some of these are general stress levels, sleep deprivation, and hormone imbalance. These days, you can get a whole range of diet products that are designed to reduce your calorie intake which helps in weight loss. They are termed as appetite suppressants and have gained widespread popularity. You can get them online or in prescription marketplaces. In fact, many appetite suppressant pills have been duly approved by FDA and you can safely take them on a long-term basis. How appetite suppressants work? Almost all appetite suppressants function mainly through two chemicals, which is catecholamine and serotonin. Most of the serotonin in the body is located in the gut and remaining (about 9 percent) is located in the central nervous system; this is the case both with humans and animals. Serotonin has many functions that it can easily perform such as helping memory and basic motor skills in the body such as caching. It also plays a big role in maintaining efficacy of antidepressant medications. Its final function is to prompt vasoconstriction of blood vessels, which allows your blood to clot making it an important part of your wound healing process. The main function of serotonin is regulation of appetite, mood and sleep and they all share close interactions. Just imagine a scenario where you cannot sleep for days. You will feel angry and agitated due to low serotonin levels. Alternatively, when you enjoy a filling meal, you may feel content due to the volume of food in your stomach, which improves serotonin production. Appetite suppressant artificially boosts serotonin levels whereby tricking an individual into believing that they are full and therefore they can do with lesser calories over a day than they usually would. What precautions should I take when using an appetite suppressant? Before taking a course of appetite suppressants it is important to talk to your doctor and inform him or her if you or any of your family members suffer from an overactive thyroid, high blood pressure, diabetes, glaucoma, emotional issues or kidney disease. Appetite suppressants also prompt addictive behavior and if you are suffering from addictive tendencies in the past, then you may suffer from similar issues with appetite suppressors. This medication will also not be prescribed if you are pregnant. The above details are also helpful if you want to opt for an OTC appetite suppressant as they could be harmful if you do not take them with precautions prescribed by the manufacturers. However, if you opt for herbal supplements they are completely safe. Some appetite suppressors can also interact with many medications for various reasons. If you are not familiar with any medical issues we have discussed above, then it’s best to first consult your doctor to know your options. It’s best to avoid appetite suppressors if you are taking MAO inhibitors, blood pressure medication, and some other weight loss inducing medications or stimulants that may increase your heart rate. Conclusion All in all, you have many options when it comes to appetite suppressants. Most online stores selling them offer you many options, so you can order your requirement right from the comfort of your home. Weight Loss healthy Diets is a blog about the different types of diet plans that can help you lose weight. We analyse and review the popular diets and weight loss plans to help you lose weight fast and effectively. Subscribe to our weight loss blog and keep updated with the best weight loss plans.
Dine under the stars with your special someone on a variety of delicious foods that overflow from one of our large picnic baskets. We will provide you with your own picnic quilt, a luminaire lantern, as well as soft romantic music for your enjoyment. Dining under the stars has never been more exciting than here at Faulkner Lake Orchard.
// Copyright (c) Microsoft Corporation. All rights reserved. // Licensed under the MIT License. using Azure.Core; namespace Azure.AI.TextAnalytics.Models { [CodeGenModel("StringIndexType")] internal partial struct StringIndexType { } }
Q: Can charging by conduction and charging by induction occur simultaneously? If I connect a neutral body to a charged body (suppose it is negatively charged) with a conducting wire, how will the neutral body get charged - by induction or by conduction? A: "Electrically charging an object" can have different meanings: adding or removing charge from an object, i.e. changing its state so that the total charge is different than before by adding/removing electrons/ions. To do that, you need some way of conducting the charges (usually a wire for electrons). In your example, a wire could lead the electrons from a negatively charged body to a neutral body (assuming that both bodies themselves conduct sufficiently). moving charges (i.e. changing the charge distribution) within the object without changing the total charge. In most cases, this includes performing work on the system and includes "charging a battery" = changing the electrochemical configuration. It can be done in any number of ways by creating an electrical or magnetic field, which leads to charge movement. This is governed by the Maxwell equations, which includes induction (applying force on electrons by changing the magnetic field). Those phenomena can happen simultaneously if the setup is chosen accordingly. In your example, assuming conducting bodies, the charging will mostly be the done by adding charge. Additionally, the arising currents change rapidly and also create changing magnetic and electrical fields that perform work on the bodies, thus moving charge within the bodies. I'm Austrian, so I can only say that the latter meaning is colloquial in German, maybe it's the same in English.
At the start of April, Bitcoin price broke through resistance at $4,200, triggering a massive rally across the crypto market and a cascading effect of trader’s stops being hit, creating an hour-long price spike of nearly $1,000 per BTC. Analysts believe the initial surge was caused by a single actor who had a strategy in mind, planning to cause as much price impact as possible. Regardless of the reason behind the surge in Bitcoin price to over $5,000 where it is currently ranging, the powerful upward movement was enough to revive bullish sentiment throughout the cryptosphere. Now, as the April monthly candle closes bulls are rejoicing over the fact Bitcoin has closed over resistance for the first time in “ages,” and has even withstood the blow of the Bitfinex and Tether FUD that emerged just days before the monthly close. April Aftermath: Crypto Analysts and Traders See Bull Run Beginnings in Bitcoin Yesterday’s daily candle close in Bitcoin price charts, was also the close of the monthly candle for April 2019 – a month that has been among the most bullish witnessed for Bitcoin in months, possibly since the leading cryptocurrency’s previous all-time high back in December 2017. Bitcoin and second-ranked crypto by market cap Ethereum saw their trading volume surges to peak crypto hype bubble levels. In the end, April closed in the green as expected, at a price of roughly $5,272 on Coinbase. On Bitfinex, an exchange currently embroiled in a scandal involving borrowing from Tether reserves to hide an $850 million loss and where Bitcoin has significantly diverged in price, price per BTC closed setting highest daily candle body close since the start of 2019. Analysts aren’t yet ruling out a re-test of former resistance turned support, however, most expect that support to hold if Bitcoin price ever gets there, and would view the correction as healthy, potentially resetting indicators for another surge upward. Things are starting to look better, finally bouncing back from the Tether news, waiting to see if we are going to find support from where we left off or if previous levels of resistance are still in effect. Bitcoin closed the month at a 28.5% price increase, adding over $1,200 per BTC to the price of the most important cryptocurrency in the space. Where Bitcoin goes from here is anyone’s guess, but many are expecting the aforementioned retest of resistanceM turned support, or a rally to test former support turned resistance at $6,000. Should Bitcoin break above $6,000 and close a monthly candle, much of the crypto market would be confident that the beginnings of a new bull run had started. According to eToro senior market analyst Mati Greenspan, bitcoin is in amidst a parabolic bull cycle and is on track to sustain its strong momentum over the medium to long term. Since January, within less than six months, the bitcoin price has increased by nearly 100 percent against the U.S. dollar. With a 98% gain year-to-date, bitcoin has outperformed most assets in 2019 (source: coinmarketcap.com) Still, despite its large short-term rally, Greenspan noted that the dominant cryptocurrency is only at the start of a bigger cycle that may lead to new highs for the asset. WHY INDUSTRY EXECUTIVES ARE SO OPTIMISTIC IN BITCOIN In December 2018, the bitcoin price dropped to its lowest yearly point at $3,150. At the time, even though the industry had demonstrated significant progress in improving the infrastructure supporting the asset class, the sentiment around… World’s third largest cryptocurrency Ripple (XRP) has appreciated up to 31-percent against the US dollar in just two days. The XRP-to-dollar exchange rate Tuesday established an intraday high towards $0.405, up 25.05% since the market open on Luxembourg-based Bitstamp exchange. The pair dropped as much as 5.05-percent ahead of the European session to neutralize its overbought sentiments, finding interim support at $0.384-level. RIPPLE (XRP) SURGES 25% IN A DAY | SOURCE: TRADINGVIEW.COM, BITSTAMP The sentiment was the same across the rest of the cryptocurrency index, with almost all the leading cryptocurrency posting surplus intraday gains. Bitcoin (BTC), for instance, extended its rally action to establish a new 2019 peak towards $8,836.19. Ethereum, EOS, and Bitcoin Cash too recorded double-digit percentage gains on a 24-hour adjusted timeframe. Share your thoughts and views on this interview by commenting below Facebook, the largest social media giant, made news after it announced that it would launch its own cryptocurrency, Facebook Coin. It was also rumoured that Facebook was looking out for VC firms to invest in their cryptocurrency project, with the targeted sum being “as much as $1 billion.” Now, according to an official announcement, Facebook is going to lift its ban on cryptocurrency and blockchain related ads on its platform. The facebook statement read : “Starting 5 June, we will update our Prohibited Financial Products and Services Policy to no longer allow ads promoting contracts for difference [CFDs], complex financial products that are often associated with predatory behaviour. These products, due to their complexity, often mislead people.” Facebook had implemented the ban on cryptocurrency ads and promotional campaigns related to blockchains and ICOs back in January 2018. It was believed that the ban was to tackle concerns… Craig Wright, a man who, as WIRED wrote about back in 2016, either created Bitcoin or very badly wants someone to believe he did. Now rumours are swirling through the Bitcoin world that Wright himself is poised to publicly claim—and possibly offer some sort of proof—that he really is Satoshi Nakamoto, the mysterious inventor of Bitcoin. If he does, he’ll have to convince a highly skeptical cryptography community for whom “proof” is a serious word, and one that requires cryptographic levels of certainty. The suggestion is that Wright, an Australian cryptographer and security professional, has arranged to perform a demonstration for media in London sometime in the next week that’s intended to convince the world he’s bitcoin’s creator.1 Luckily for any legitimate claimant to the Satoshi throne—and for bitcoiners tired of the long succession of unproven candidates and speculation—there are some clear, almost incontrovertible ways for Satoshi Nakamoto to prove himself. When…
Marineland Animal Defense BREAKING: an organizer from Marineland Animal Defense has arrived on site at Marineland in Niagara Falls Ontario and will live in this bathtub for the next 3 days. There is no difference between his confinement to the tub and an orca in a tiny tank inside this facility. Solidarity from Marineland Animal Defense for all animals held captive. If you are in the area, please drop by and show some support! We hear they would really appreciate a warm drink and a few high fives. The tub will be on site and occupied for the entire closing weekend. OneFight would like to make explicitly clear our unwavering and fully invested support in both Dylan Powell and Marineland Animal Defense (MAD hereafter) during this time of intimidation and aggression by the now notoriously shameful Marineland Canada. We recognize that others, such as Christine Santos have been served as well, and we are also in full support of her defense. The situation with Dylan Powell and MAD is a clear cut example of a SLAPP suit after the campaign against the park had a banner year when more than a dozen whistleblowers, as well as undercover footage from inside the park, and a series of mainstream press articles made public information that MAD had known for years, and activists in the area had been protesting for decades. None of MAD’s actions have ever been violent towards any employee at Marineland, nor has any property been damaged, even when a mass of protesters symbolically entered the park on the final day of 2012 in an act of civil disobedience to picket and eventually end the dolphin show in progress—not so much as a single garbage pail was overturned, nor even one piece of material removed from the site, and all protesters exited the park peacefully and orderly. Only one trespass ticket was issued despite more than 100 people breaching the turnstiles. Yet, the suit against Dylan claims that these peaceful and at a great majority entirely legal actions have somehow been in breach of civil law, intimidating, harassing, and are sufficient for a 1.5 million dollar claim. Conversely, at demonstrations activists associated with MAD have been verbally assaulted and threatened by owner John Holer. On numerous occasions he has been recorded saying he’d cut the head off of individuals and has attempted/threatened to hit others with his truck. Materials denouncing freedom of expression and the legitimate concerns of protesters have been erected illegally on public property (signage warning of protesters and instructions to ignore them.) Permanent signs not being the only misuse of public property; city council was propositioned and accepted a proposal to lease public land to the park in order to make legal protesting suddenly illegal on property owned by the municipality of Niagara for the purpose of “beautification” before the season in 2012 (only to have nothing happen to the leased parcel but regular grass cutting). Increasingly this past year hostility has escalated. Peaceful law-abiding people demonstrating across from the gates were frequently harassed and intimidated through threats as well as in a few isolated cases physical contact/harm. We think it is laughable that MAD is being painted as the aggressor at this juncture. Dylan Powell has always sustained pressure on the person who has the ability to end this tomorrow should he choose to: John Holer. Dylan has never been rattled nor dissuaded by threatening letters from lawyers nor threatening remarks from animal abusers—this time will be no different. His strength and his success will be partly due to his tremendous character, but by equal measure, the response and support of his community and kin. This is where we must all stand up, step in, and speak out. He is not alone and we must ensure that he, nor Marineland do not ever forget that. With the mainstream media covering the story in the park, MAD and Dylan both could have remained separate in their organizing and likely insulated themselves from a lot of potential litigation, but understanding that these stories and the animals inside have an urgent need to get out of Marineland, these risks were accepted. They have now come to collect, and that is why we all must continue to rally together, and create strong associations and networks of support. If you are a member of an organization, or you feel inclined as an individual, please send us or MAD a statement of support so we can collect and publish them. During this time, it is important to support all of those who have been and will yet be served, but we feel it is but also important to support Dylan as he is being sued because of his active involvement in the resistance to animal cruelty at the park. This supposition is further corroborated by the fact that unlike the others, Dylan’s papers contain injunctions that would, if Marineland is successful, make it unviable for him or some other activists to organize against or protest near the park itself. These actions are not about Marineland wanting retribution, they are about crippling the opposition to captivity and stifling the gains MAD has realized this year. Dylan’s suit is not because he spoke about secrets he was made privy to because of his job, nor because he broke any laws, contracts, non-disclosure agreements or promises. On the contrary, Dylan’s suit is about silencing the resistance through the false assumption that if they remove the head the body will die. This is why this statement, and any other statement that any group or individual wishes to issue is so critical. Dylan is not the head. Dylan is our comrade, he is our peer, he is our brother, he is us. If you take him out, 5 more will take his place, and they will be emboldened by anger over this offense against our cohort and fueled by the desire for justice. This lawsuit is meant to scare our community, and fracture it, but it will only knit us tighter together. An attack on one of us is an attack on all of us. The movement cannot be stopped, not by any measure of money or any pack of lawyers. It cannot be stopped because we as individuals are not moving anything—it is the ground that is moving and if Marineland, John Holer and all the animal abusers out there cannot keep pace with the changing landscape, they will surely fall, and that will be no ones fault but their own. Forever with Dylan, MAD, the animals, and all who resist—until the bitter end, After 3 days living in a bathtub outside Marineland in Niagara Falls Ontario, Marineland Animal Defense Organizer Jeremy, AKA: TubMan has left his tub! He did shows for audiences when they gathered, he was cold at night and hit during the day living in this contrived and cramped environment, and he relied on others to bring him the food and water he needed to live. After 3 days and two whole nights without even leaving the tub to go to the bathroom, he is now safe and sound at home. He wanted to make sure people understood the significance of that; after 3 days he was able to quit and go home. The animals inside Marineland will not ever be able to return home without people like us stepping in, working to close this facility and every other one like it the world over, rehabilitating and/or re-homing these animals so that they can live some kind of fair life in either seaside sanctuaries or eventually after unlearning their domestication, return to their homes and families. (Which it has been documented that some captive dolphins have done! Returning years later to the same locations they were caught and rejoining their family groups.) TubMan is no more, but Jeremy, and Marineland Animal Defense are still here and still fighting and we none of us will give up the fight for these animals. Because living in a bathtub isn’t fun for anyone, orca or activist alike. Yesterday I went to Princess Cinema to view Blackfish, the new documentary about Tilikum (the male killer whale at SeaWorld). Tilikum is almost 40 years old and his dorsal fin has flopped over - this happens to virtually ALL MALE ORCAS in captivity. I mean it just makes them look unhealthy and sad; how can people not see this? The footage and story are still haunting me. I’ve had a really dark feeling ever since. From the way the babies are stolen from their families in the ocean and the sounds of the screaming, grieving mothers, to the way they are bred in captivity (forcibly ejaculating the males into Ziploc bags, then pouring it into the females, thereby raping the whales each time they want a new performer), to the fact that despite having killed 3 trainers and having been attacked endlessly by the female whales, they refuse to retire him or think HEY MAYBE WE SHOULD LEAVE THESE GUYS IN THE OCEAN. The whales are kept in 20 x 30’ tin pools overnight, dude. 2/3 of their lives spent in a pool even smaller than the shit they perform in. The trainers withhold food from them if they don’t do the tricks properly. They’re not kept in their pods (whom they stay with forever, in the wild); the groups you might see at a marine animal park are a mere mishmash of whales who don’t know each other, who were bought and sold from various parks all over the world. It’s very difficult watching the babies being stolen from their mothers. The baby cries out in fear, the mother cries out in grief, anger, stress - Those majestic, intelligent animals, being reduced to playthings, to toys, to objects for profit. Shame. I think that this movie will do a great job of helping to end marine animal captivity. shout out to Kiska, 37 year old orca who swims alone at Marineland, has lost all 5 of her babies and spends her whole day and night floating in a fucking concrete, chemical pool, depressed, lonely, sick. I love you and one day you will be free. Dylan is currently being sued, amongst a few other whistleblowers, by Marineland for $1.5 Million, with a SLAPP lawsuit, not to win against him, but to silence protesters and whistleblowers. He has since attained such titles as cult leader, Jim Jones with flying monkeys, etc. Next Thursday we’ll be having a bakesale at 98 Chaplin. All proceeds will be going towards Marineland Animal Defense.We are looking for bakers and buyers. Please ensure that all goods are vegan friendly! Larry, the harbour seal with “an amazing little personality” who arrived at Marineland about eight years ago is now a shadow of his former self. After repeated exposure to unhealthy water, he has gone blind. An animal advocacy group expects a surge of new protesters at Saturday’s demonstration outside Marineland. The group will meet at noon Saturday, pickets and water bottles in hand, on the grass near the park’s entrance. They’re scheduled to protest until 2 p.m. He says the new protesters are joining after former Marineland employees told the Star of poor water conditions, chronic short-staffing and repeated instances of animal suffering at the park. Extra pickets are being painted by the veteran demonstrators, who come from a variety of groups including Marineland Animal Defense, Ocean Voice London and Niagara Action for Animals. Saturday’s protest is the sixth of 10 protests this summer organized by Marineland Animal Defense. On average, about 20 to 50 people join the demonstrations. “I don’t want to close down the place, I want them to make it into an amusement park with no animals,” said Jill DiTillio, a protester for the past 20 years. “That way tourists don’t need to be concerned about the animals. Most of the locals are quite aware of what’s going on and are unwilling to go.” But protesting at Marineland became more difficult in June. Marineland signed a lease with Niagara Falls city council in June for about 400 metres of Portage Rd., a public space near the park’s entrance. The park’s lawyer told council that the land was meant for “beautification” through landscaping. The three-year lease was approved. In reaction, protesters temporarily moved their campaign to a new spot: the doorstep of John Holer, Marineland’s owner. “If you’re not going to let us protest on municipal property by doing something weird like that, we’re going to come protest at your house,” said DiTillio. Protesters can still march on a plot of grass beside Marineland. A line of trees draws the border between the public property and Marineland’s leased land. The group recently bought megaphones to shout their message to park patrons driving to buy admission. Powell said copies of the Star’s investigation will be handed out to people entering the park “We’ve got our hands on a bunch of copies, for anyone who wants to read about what’s going on inside the park,” he said. The group is an eclectic mix of people of all ages from across Southern Ontario. “What we have in common is that it’s a bunch of concerned citizens. We want to bring to light that these animals should not be in captivity in the conditions that they are in,” said Jeremy Larivee, an electrician who protests with Ocean Voice London. 2012 was a tough year for Marineland. The Toronto Star ran a series of damning articles in which former Marineland employees told of neglect, chronic water quality problems that caused pain and even blindness in the animals, and mass graves on site. The revelations bolstered public opposition to the embattled park, culminating in an 800-person demonstration in which chanting protesters spontaneously flooded into the park. Now, Marineland has lashed back by filing two $1 million-plus lawsuits: one against Dylan Powell, longtime community organizer and a major voice in Marineland Animal Defense, and another against Christine Santos, a former Marineland trainer whose criticism of the treatment of killer whale Kiska was featured in the Star. Tune in as Powell talks SLAPP lawsuits and legal strategy. (SLAPP = Strategic Lawsuit Against Public Participation, a lawsuit designed to intimidate and silence critics.) Powell will also reflect on the activism successes of 2012, and tip us off about what Niagara activists have planned for 2013, including a speaking tour about Marineland and an anti-vivisection campaign at Brock University. Marineland Animal Defense’s opening day protests happen on May 18th in Niagara Falls, Ontario. Help them be the voice of Marineland’s animals, and help stop the cruelty and neglect that is going on there. I can’t be there because of my job, as if the police show up, I could lose my job. But I will be promoting the protest the up coming weeks on my tumblr accounts, twitter and facebook, as well as verbally to anyone who will listen. The MAD organizer now dubbed “Tubman” is still there and over hour 18 in the tub! His feet are cold, but his spirits are high! Love and support has been pouring in from all over the world! Go Jeremy Go! He can see all the supportive messages from everyone and it’s really great! He’ll be there until the park closes for the season! Show him some love if you can! It is with heavy hearts that we write this post - reduced to words that will never capture the full effect we want them to have. The organizing hub of Marineland Animal Defense have been closely following the health of Stephen Watson for months as for many of of us he is a friend, comrade, mentor, teacher and inspiration. News today, that after months of battling stage 3 cancer, Stephen Watson now has congestive heart failure and two weeks to live is a horrible blow. Stephen’s effect, through life long advocacy as an artist, is very easily recognizable within our group. Many of our members are from London, On - where Stephen lives - and without doubt the majority of dedicated ocean activists and advocates in Ontario come from London, On. The beginnings of M.A.D. also came as a result of a fundraiser in St. Catharines in January 2010 where Stephen and his wife Renee tabled for Sea Shepherd - a prisoner support fundraiser for the AETA 4 where “The Cove” was screened. Without Stephen, Renee, and the entire Watson family, M.A.D. and much of the ocean advocacy that happens in Ontario and throughout the world simply would not exist. Stephen is now facing an unbelievable uphill battle - and as a result of the criminalization of his brother, Paul, he may not be able to see his brother again. We are disgusted to live in a world where this is considered “justice.” For those who despair, please re double your efforts in supporting Paul Watson as a result of this news. We are also urging all members to reach out and leave message of support with the Watson family - acknowledging Stephen’s advocacy and supporting him and his family. For a person so noted for his heart, Stephen has now given it to the rest of us to carry. We aim to make him proud.
Making VR Movies You’d Actually Want to Watch The key to making a compelling virtual-reality movie: forget about storytelling and focus on creating immersive worlds. So says Google’s VR filmmaker, Jessica Brillhart, who has quickly become a leader in the emerging field of cinematic VR content. Brillhart, who spoke Wednesday at EmTech MIT 2016 in Cambridge, Massachusetts, describes her job as helping people create high-quality VR content—specifically, short 360° videos that consumers can watch online, using their smartphones and lightweight VR headsets. It’s an area of intense interest to Google, which began supporting 360° videos on YouTube last year and recently launched a mobile VR platform called Daydream, along with a compatible headset and smartphone. To get people to buy its VR gadgets and tune in to YouTube, Google needs engaging content. Brillhart is helping by making VR films for YouTube and writing and talking about what she’s learned from experimenting with this new medium for the past year and a half. “There’s nothing definitive that people can use as a guide [for VR filmmaking],” she says. “So I’m being proactive about figuring stuff out and putting it out in the world for discussion.” One of Brillhart’s major findings is that conventional storytelling doesn’t suit VR film. A 360° VR movie is actually a range of potential stories rather than a single story, she explains, because it can be viewed from many different angles. Filmmakers who ignore this fundamental aspect of VR film will annoy their audiences and fail to leverage the technology’s unique features, she contends. When Brillhart makes a VR film, she focuses on capturing a series of dynamic 360° shots or “worlds,” rather than a sequence of static film frames. When she edits the movies, she imagines how viewers (whom she calls “visitors”) will engage with each of the worlds. Then she figures out how to pull visitors through the shots in a way that seems coherent even though it’s not strictly linear. Brillhart devised the technique while she was editing her first VR film,World Tour, last year. She started off doing a conventional frame-to-frame edit, but as soon as she viewed a rough cut through a VR headset, she realized it didn’t work. In frustration, she looked up at the ceiling one night, spotted a round lightbulb, and started sketching circles. Below is what her edit for that film looks like, in diagram form. The circles represent the different worlds in the film, while the black and white dots show where a visitor is most likely to enter and exit each world. It’s a technique more familiar in video games than film. “Game designers understand that they’re creating an experiential hub for potential stories and not a direct one-to-one story,” Brillhart says. “They come up with a general idea and provide players with the means to discover the story on their own.” VR filmmakers can learn from them, and from architects, who similarly “build spaces that have conversations with people,” she says.
Glucocorticoids regulate the transcription of Na(+)-K(+)-ATPase genes in the infant rat kidney. Glucocorticoids modulate the maturation of Na(+)-K(+)-ATPase mRNA in a tissue- and age-dependent manner. In this study, we report the effect of glucocorticoids on Na(+)-K(+)-ATPase gene transcription in the infant rat kidney. Ten-day-old rats were treated with one intraperitoneal injection of betamethasone. In glucocorticoid-treated rats, there was a significant increase in renal cortical alpha 1- and beta 1-mRNAs (3.08 +/- 0.34- and 4.06 +/- 0.10-fold). Pretreatment with cycloheximide, an inhibitor of protein synthesis, did not abolish the increase in alpha 1- and beta 1-mRNA after glucocorticoids. The alpha 1- and beta 1-gene transcription rates were significantly increased in nuclei isolated from kidneys of glucocorticoid-treated rat (2.16 +/- 0.05- and 3.12 +/- 0.50-fold). Interaction between nuclear proteins and Na(+)-K(+)-ATPase alpha 1-promoter was studied by gel retardation assay. Nuclear protein from glucocorticoid-treated rats retarded a fragment of alpha 1-promoter that includes a half-consensus glucocorticoid response element (GRE) at position -750 bp but did not retard a fragment including a half-consensus GRE at position -481. Retardation of alpha 1-promoter was inhibited by incubation with molar excess of GRE or with a monoclonal antibody against glucocorticoid receptor. We conclude that in the infant kidney, glucocorticoids directly stimulate the transcription of alpha 1- and beta 1-Na(+)-K(+)-ATPase subunits. It is likely that the binding of glucocorticoid receptor to alpha 1-Na(+)-K(+)-ATPase promoter requires the presence of an auxiliary factor.
“My body belongs to me,” said Amina , an ex-Femen member who posed topless on the web. The Sousse prostitutes seem to be following this same trend of activism. So, who was Amina protesting for, on March 8, by showing up fully naked in a demonstration in the vicinity of the Louvre in Paris? Indeed, being a prostitute is not a daily joy ride. While prostitution is one the oldest professions, it also one of the most difficult. Reaching the point of using one’s body to gain a living is disappointing, to say the least. However, when it comes to individual freedoms, these demands go hand in hand with the slogans advocated by many. However, the conclusion that we can immediately draw is that the situation of women's rights is different from how some women are portraying it. We will definitely find out more about this situation in the coming days, whether the demands will be greeted by a favorable opinion and whether the Sousse prostitutes will get their clients back. Prostitutes protested at the gates of the National Constituent Assembly in the Tunisian city of Sousse on March 11 to demand that the brothel where they used to work be reopened. These sex workers made a public appearance, thus liberating themselves from social dogmas that marginalized them and from the disdainful looks often thrown their way. They proclaimed their right to work legally because they have legal authorization and approval from the local authorities. It is certainly quite an unusual situation, but a very brave one, for an Arab country that is reportedly under the grip of Islamism. Perhaps she was thinking of fighting for her peers who are under the grip of conservatism. Yet, what Ettounsiya TV station broadcast on Saturday tends to say otherwise. A young Tunisian woman appearing on Naoufel Ouertani’s show proclaimed, loud and clear, her right to consume cannabis without fear of any punishment. She said that the courage she built during her imprisonment allowed her to challenge the social system that frowns upon cannabis consumption. She also added that she is a cannabis smoker and will never quit. Tunisia is undoubtedly emancipated. While some might think that it is excessively emancipated, others believe that it is only emancipated as required by the context. Obviously, however, Tunisian women have long fought for ideas and ways to achieve them, rather than fighting for their rights to their own body. Women have been reduced to an image of propaganda for the fallen regime, so they will definitely not be an image of propaganda for another regime sought by others. Their bodies will not be exploited for reasons that will eventually harm their interests, for public nudity serves no idea except that of the lack of means of expression. Thanks to many associative actions and individual initiatives, the female battle in Tunisia will not have as vector the body of the woman who cries out not to be considered as an object. Actions such as those undertaken by Amina are more likely to derail Tunisian women from the route they have taken since the revolution, i.e., since their massive presence in demonstrations, their participation in the public arena as valued players and their involvement in actions related to civil society. Work on women's affairs in Tunisia requires further consolidation and preservation. We must therefore be careful so that this does not jeopardize the achievements that others have fought for just because of a battle trend that is not in line with the context. Tunisian women are generally emancipated from the conservative mentality, and this is quite obvious! Persistent cases of abuse against women — namely in terms of imposing a certain idea — are to be treated in a manner that is different from the biased and repulsive representation of modernism. The fight for women's rights did not start on March 8, 2014. It actually started with the presence of notable female rulers Queen Dido and Queen Kahina in the history of this country, with the forward thinking of Tunisian reformer Tahar Haddad and the late President Habib Bourguiba, and with the unparalleled actions of Aziza Othmana and Bchira Ben Mrad.
Near shot-noise-level relative frequency stabilization of a laser-diode-pumped Nd:YVO(4) microchip laser. A laser-diode-pumped Nd:YVO(4) microchip laser was built and actively frequency stabilized relative to a Fabry-Perot cavity with the frequency-modulated sideband technique. The error signal reaches the shot-noise level of 7.4 mHz/√Hz around 1 kHz. Excess intensity noise sets a lower limit of16.5 mHz/√Hz for the relative frequency noise, corresponding to a spectral linewidth of 860 μHz. We discuss the method for reconstructing the actual frequency deviation from the observed error signal.
.. cyrusman:: proxyd(8) .. _imap-reference-manpages-systemcommands-proxyd: ========== **proxyd** ========== Proxyd is a symlink to :cyrusman:`imapd(8)` if you build with murder enabled. .. include:: /assets/man-imapdproxyd.rst
1852 [Published on Page 4] Sufficient returns of the Elections held yesterday are received, to show that FRANKLIN PIERCE and WM. R. KING are to be the next President and Vice President of the United States. True, our returns are far from complete, at the present writing, even from our own State; but the decided Democratic majorities already marked up sufficiently indicate the complexion of the State. In this City, the Democratic Electoral Ticket has from ten to eleven thousand majority. Connecticut, Delaware, Maryland, and Rhode Island are known to have given a Democratic triumph. Louisiana, Pennsylvania and Ohio look in the same direction, although in both the latter States the Whigs seem to have made large gains. The little-known Mr. Pierce’s landslide over Gen. Winfield Scott would signal the death knell for the Whig party, which was increasingly divided over the issue of slavery.
What is the r'th term of 39888, 53158, 66428, 79698? 13270*r + 26618 What is the w'th term of 2450275, 4900533, 7350791, 9801049, 12251307? 2450258*w + 17 What is the p'th term of -41893, -335152, -1131139, -2681218, -5236753, -9049108, -14369647, -21449734? -41894*p**3 - p + 2 What is the r'th term of -116055, -232069, -348069, -464055, -580027? 7*r**2 - 116035*r - 27 What is the v'th term of 30788, 61228, 91668, 122108, 152548? 30440*v + 348 What is the c'th term of 3319, 7270, 11233, 15214, 19219, 23254, 27325? c**3 + 3944*c - 626 What is the k'th term of -1063, -993, -897, -787, -675? -2*k**3 + 25*k**2 + 9*k - 1095 What is the j'th term of -13315414, -13315428, -13315452, -13315486, -13315530? -5*j**2 + j - 13315410 What is the g'th term of 80295, 160587, 240871, 321147? -4*g**2 + 80304*g - 5 What is the r'th term of -9368795, -18737590, -28106385, -37475180? -9368795*r What is the w'th term of 65431, 73622, 81801, 89962, 98099? -w**3 + 8198*w + 57234 What is the f'th term of 110240, 110263, 110304, 110369, 110464, 110595? f**3 + 3*f**2 + 7*f + 110229 What is the q'th term of 3798, 16150, 36722, 65502, 102478, 147638, 200970, 262462? -2*q**3 + 4122*q**2 - 322 What is the f'th term of -670767, -670772, -670777, -670782, -670787? -5*f - 670762 What is the l'th term of 6642861, 13285696, 19928531, 26571366, 33214201, 39857036? 6642835*l + 26 What is the r'th term of 363890, 363865, 363838, 363809, 363778, 363745? -r**2 - 22*r + 363913 What is the c'th term of -2291, -2874, -4459, -7544, -12627, -20206, -30779? -83*c**3 - 3*c**2 + 7*c - 2212 What is the s'th term of -101018229, -404072916, -909164059, -1616291658? -101018228*s**2 - 3*s + 2 What is the k'th term of 34525850, 69051695, 103577542, 138103391, 172629242, 207155095, 241680950? k**2 + 34525842*k + 7 What is the k'th term of 7684, 7752, 7878, 8062, 8304, 8604, 8962? 29*k**2 - 19*k + 7674 What is the p'th term of -4467766, -17871042, -40209834, -71484142, -111693966, -160839306, -218920162? -4467758*p**2 - 2*p - 6 What is the s'th term of 566, 1863, 4036, 7085? 438*s**2 - 17*s + 145 What is the s'th term of -2589, -5226, -7987, -10872, -13881, -17014? -62*s**2 - 2451*s - 76 What is the f'th term of -25178, -100291, -225480, -400745, -626086, -901503? -25038*f**2 + f - 141 What is the s'th term of -52753, -52794, -52837, -52882, -52929, -52978? -s**2 - 38*s - 52714 What is the p'th term of -1431, -4650, -13401, -30450, -58563, -100506, -159045? -461*p**3 + 8*p - 978 What is the j'th term of -177, -859, -2001, -3603, -5665, -8187? -230*j**2 + 8*j + 45 What is the o'th term of -488, -3735, -9144, -16715, -26448, -38343, -52400? -1081*o**2 - 4*o + 597 What is the j'th term of 74413977, 74413976, 74413975, 74413974, 74413973? -j + 74413978 What is the v'th term of 129639, 259844, 390047, 520248, 650447, 780644? -v**2 + 130208*v - 568 What is the n'th term of 310035791, 620071581, 930107371, 1240143161, 1550178951, 1860214741? 310035790*n + 1 What is the d'th term of 152570, 610334, 1373294, 2441450, 3814802, 5493350? 152598*d**2 - 30*d + 2 What is the w'th term of 2067581, 2067516, 2067451, 2067386, 2067321? -65*w + 2067646 What is the v'th term of -5772, -15181, -24590? -9409*v + 3637 What is the t'th term of 1382198, 2764390, 4146582, 5528774, 6910966, 8293158? 1382192*t + 6 What is the m'th term of 1947, 14771, 49571, 117333, 229043, 395687, 628251, 937721? 1831*m**3 + 2*m**2 + m + 113 What is the h'th term of -78223692, -78223704, -78223718, -78223734, -78223752, -78223772? -h**2 - 9*h - 78223682 What is the f'th term of -12888, -103061, -347806, -824409, -1610156? -12881*f**3 - 6*f - 1 What is the m'th term of -1720431, -1720435, -1720439, -1720443? -4*m - 1720427 What is the l'th term of -2940, -68, 2804, 5676, 8548, 11420? 2872*l - 5812 What is the d'th term of 98277337, 196554676, 294832015, 393109354, 491386693, 589664032? 98277339*d - 2 What is the n'th term of 10741, 10625, 10427, 10147, 9785, 9341? -41*n**2 + 7*n + 10775 What is the r'th term of 444, 770, 1060, 1302, 1484, 1594, 1620? -2*r**3 - 6*r**2 + 358*r + 94 What is the i'th term of -143701, -144520, -145339, -146158, -146977? -819*i - 142882 What is the w'th term of -1035758, -1035754, -1035750? 4*w - 1035762 What is the y'th term of 17072163, 34144318, 51216473? 17072155*y + 8 What is the b'th term of -531, -2432, -5775, -10704, -17363, -25896? -24*b**3 - 577*b**2 - 2*b + 72 What is the t'th term of 337, 212, 157, 208, 401, 772, 1357, 2192? 6*t**3 - t**2 - 164*t + 496 What is the q'th term of 131995, 264353, 396711, 529069, 661427? 132358*q - 363 What is the i'th term of -24271025, -24271026, -24271027? -i - 24271024 What is the q'th term of -2763, -5578, -8395, -11214? -q**2 - 2812*q + 50 What is the j'th term of -54908, -219625, -494170, -878549, -1372768, -1976833? -j**3 - 54908*j**2 + 14*j - 13 What is the b'th term of -1053988, -1054018, -1054052, -1054090, -1054132, -1054178? -2*b**2 - 24*b - 1053962 What is the u'th term of 8159686, 16319354, 24479022, 32638690? 8159668*u + 18 What is the l'th term of 4796, 38284, 129128, 305990, 597532? 4777*l**3 + 16*l**2 + l + 2 What is the j'th term of 349730, 349731, 349732, 349733? j + 349729 What is the a'th term of -9264, -9225, -9116, -8901, -8544, -8009, -7260? 6*a**3 - a**2 - 9269 What is the m'th term of -5717, -11477, -17237, -22997, -28757? -5760*m + 43 What is the p'th term of -259360, -257035, -254710? 2325*p - 261685 What is the i'th term of 1260117913, 1260117911, 1260117909, 1260117907, 1260117905? -2*i + 1260117915 What is the w'th term of -378107, -378203, -378319, -378455? -10*w**2 - 66*w - 378031 What is the s'th term of 890699, 890738, 890801, 890888? 12*s**2 + 3*s + 890684 What is the p'th term of 843221, 1686442, 2529663, 3372884, 4216105? 843221*p What is the h'th term of -315943577, -631887157, -947830737, -1263774317, -1579717897, -1895661477? -315943580*h + 3 What is the f'th term of 362026, 362022, 362030, 362056, 362106? f**3 - 11*f + 362036 What is the y'th term of 315425, 315731, 316025, 316301, 316553, 316775? -y**3 + 313*y + 315113 What is the q'th term of 1696165, 1696085, 1696005, 1695925? -80*q + 1696245 What is the p'th term of -24374, -49406, -74440, -99476, -124514, -149554? -p**2 - 25029*p + 656 What is the l'th term of -59281744, -118563496, -177845250, -237127006, -296408764? -l**2 - 59281749*l + 6 What is the i'th term of -12061923, -12061925, -12061927, -12061929, -12061931? -2*i - 12061921 What is the u'th term of 1059, 4238, 9537, 16950, 26471, 38094, 51813? -u**3 + 1066*u**2 - 12*u + 6 What is the s'th term of -14887, -14880, -14867, -14848, -14823, -14792, -14755? 3*s**2 - 2*s - 14888 What is the b'th term of -4790, -19109, -42948, -76313, -119210, -171645, -233624? -b**3 - 4754*b**2 - 50*b + 15 What is the t'th term of -8133, -7981, -7829? 152*t - 8285 What is the c'th term of 60549, 484478, 1635141, 3875904, 7570133, 13081194, 20772453? 60561*c**3 + c**2 - c - 12 What is the z'th term of -51594340, -51594367, -51594394, -51594421? -27*z - 51594313 What is the h'th term of -26065, -26055, -26045, -26035, -26025, -26015? 10*h - 26075 What is the y'th term of -36510, -61238, -85970, -110706, -135446? -2*y**2 - 24722*y - 11786 What is the t'th term of -1315817, -1315685, -1315553, -1315421? 132*t - 1315949 What is the i'th term of -103913, -208132, -312351, -416570, -520789, -625008? -104219*i + 306 What is the g'th term of 15005676, 15005678, 15005680, 15005682? 2*g + 15005674 What is the g'th term of -160255, -320509, -480763? -160254*g - 1 What is the q'th term of 261, -2735, -7723, -14703, -23675, -34639? -996*q**2 - 8*q + 1265 What is the i'th term of -55283, -224012, -505235, -898958, -1405187, -2023928? -i**3 - 56241*i**2 + i + 958 What is the u'th term of -7261, -12336, -17411, -22486, -27561, -32636? -5075*u - 2186 What is the f'th term of -6673890, -6674155, -6674420? -265*f - 6673625 What is the o'th term of 22055, 22137, 22315, 22619, 23079, 23725, 24587? 5*o**3 + 18*o**2 - 7*o + 22039 What is the j'th term of 88834094, 177668188, 266502282? 88834094*j What is the q'th term of -7874265, -7874269, -7874273, -7874277? -4*q - 7874261 What is the k'th term of -22762, -22673, -22526, -22321? 29*k**2 + 2*k - 22793 What i
Q: Delete function not working I am developing an app which has a splash screen that downloads a couple of files, before the files start to download I want to check whether the files already exist or not, and if they exist I want to delete them. The code shown below contains the right file paths and the function to check if the file exists seems to work as the read out in Logcat states "file deleted". However when I check on the phone itself I see that whenever I launch the app 2 more files are added to the folder with the same file name but with increasing numbers e.g. Launch 1... I get clientraw.txt clientrawextra.txt Launch 2... I get clientraw.txt clientrawextra.txt clientraw-1.txt clientrawextra-1.txt and so on..... Therefore it would seem the delete function isn't working, any help would be appreciated! //Code that checks if the clientraw.txt file already exists, if so the file is deleted File sdCard = Environment.getExternalStorageDirectory(); File file = new File(sdCard.getAbsolutePath() + "/Download", client); Log.d("file path", String.valueOf(file)); if (file.exists()) { file.delete(); Log.d("file", "file deleted"); } File sdCardextra = Environment.getExternalStorageDirectory(); File fileextra = new File(sdCardextra.getAbsolutePath() + "/Download", clientextra); if (fileextra.exists()) { fileextra.delete(); Log.d("file", "file deleted"); } ready(); It seems that it doesn't delete the file fast enough? When I get rid of the ready(); method (The method that downloads the files) it does delete the files fine, so I'm thinking that the files start downloading before the previous files are deleted really stuck on this one?! A: Try this void deleteExternalStoragePublicPicture() { // Create a path where we will place our picture in the user's // public download directory and delete the file. If external // storage is not currently mounted this will fail. File path = Environment.getExternalStoragePublicDirectory( Environment.DIRECTORY_DOWNLOADS); File file = new File(path, "DemoPicture.jpg"); file.delete(); }
/* uDig - User Friendly Desktop Internet GIS client * http://udig.refractions.net * (C) 2011, Refractions Research Inc. * * All rights reserved. This program and the accompanying materials * are made available under the terms of the Eclipse Public License v1.0 * (http://www.eclipse.org/legal/epl-v10.html), and the Refractions BSD * License v1.0 (http://udig.refractions.net/files/bsd3-v10.html). */ package org.locationtech.udig.project.internal.property; import java.net.URL; import java.util.Set; import java.util.concurrent.CopyOnWriteArraySet; import java.util.concurrent.atomic.AtomicBoolean; import org.locationtech.udig.catalog.CatalogPlugin; import org.locationtech.udig.catalog.IGeoResource; import org.locationtech.udig.catalog.objectproperty.ObjectPropertyCatalogListener; import org.locationtech.udig.project.BlackboardEvent; import org.locationtech.udig.project.IBlackboard; import org.locationtech.udig.project.IBlackboardListener; import org.locationtech.udig.project.ILayer; import org.locationtech.udig.project.ProjectBlackboardConstants; import org.locationtech.udig.ui.operations.AbstractPropertyValue; import org.locationtech.udig.ui.operations.PropertyValue; import org.geotools.data.FeatureSource; /** * Returns true if the layer has a FeatureSource as a resource. * * @author Jody Garnett (LISAsoft) * @since 1.3.0 */ public class FeatureSourceResourceProperty extends AbstractPropertyValue<ILayer> implements PropertyValue<ILayer> { private volatile AtomicBoolean isEvaluating = new AtomicBoolean(false); private Set<URL> ids = new CopyOnWriteArraySet<URL>(); public boolean canCacheResult() { return false; } public boolean isBlocking() { return false; } public boolean isTrue( final ILayer object, String value ) { isEvaluating.set(true); try { object.getBlackboard().addListener(new IBlackboardListener(){ public void blackBoardChanged( BlackboardEvent event ) { if (event.getKey().equals(ProjectBlackboardConstants.LAYER__DATA_QUERY)) { notifyListeners(object); } } public void blackBoardCleared( IBlackboard source ) { notifyListeners(object); } }); final IGeoResource resource = object.findGeoResource(FeatureSource.class); if (resource != null && ids.add(resource.getIdentifier())) { CatalogPlugin.getDefault().getLocalCatalog().addCatalogListener( new ObjectPropertyCatalogListener(object, resource, isEvaluating, this)); } boolean canResolve = resource.canResolve(FeatureSource.class); return canResolve; } catch (Exception e) { return false; } finally { isEvaluating.set(false); } } }
Featured by Color: At Aminus3, we love color. Packed within every picture is a collection of pretty pixels varying in shades of red, green and blue. Every time an Aminus3 photographer uploads an image, our crack team of palette pondering robot scientists use our patent pending three pass scan technique to create a magical color scheme for all to enjoy. Click any of the color bars to browse photos by color.
- Posted on June 15, 2016 The latest major version of Node.js's package manager introduces a breaking change regarding the peerDependencies section of the package.json file. With NPM 2, these dependencies were installed in the root node_modules folder; this is NPM 3's default behaviour, and peerDependencies are no longer fetched by npm install. Instead, the tool will simply warn you if these dependencies are unmet. But what if you relied on this feature and have to support both versions? Looking for an answer to this question, I stumbled upon this article that proposes a simple solution: duplicate peerDependencies as dependencies, which will result in installing the right stuff at the right place no matter the NPM version in use. This works, but has a few drawbacks, the most important in my eyes being the obvious code configuration duplication, which often rhymes with maintenance pain. I therefore put up a Bash workaround, that will play nicely with Jenkins jobs and other install scripts: Kinda dirty, but it works with no need to think about it. Feel free to discuss this solution and propose something better in the comments! Note: using npm shrinkwrap also seems to work around this once dependencies have been correctly installed at least once, which could cancel the need to perform the above trick on a regular basis.You must enable JavaScript to see comments.
I read that one of the three cyclists cleaned up by a car Monday morning has died. An article in The Courier has me perplexed. Apparently the road was reduced from 2 lanes each way to one plus a cycle lane, then abandoned after a few months due to community opposition. A bike lane was installed on the road in 2011, reducing it from four car lanes to two, but it was scrapped by the state government only months later, due to community opposition. Mr Ellis said the road was in a good condition and the focus for cyclists and the state government should instead be around enforcing a one-metre rule between riders and cars. "It was installed, and then it was de-installed because a lot of people including cyclists complained about it," Mr Ellis, who has cycled on Macedon roads for a decade, said. "It benefited a few people but it's not the ideal situation. I think the 'metre matters' rule is really what we need to encourage because all cyclists benefit from that." Mr Ellis being Macedon Ranges Cycling Club president Brett Ellis. I'm not familiar with the cycle lane business.....I used that road a lot in the 80's and 90's; not for the last 10 years at least. Maybe someone familiar with it can shed light here? Surely it was safer with a cycle lane? No parked cars to worry about for one. The usual suspects (the ones blitzing that road well into three digits and slamming into the arse of right turners) made the usual apocalyptic claims, well supported by the "I'm a cyclist too and I do not support this" crowd. ...whatever the road rules, self-preservation is the absolute priority for a cyclist when mixing it with motorised traffic.London Boy 29/12/2011 fat and old wrote:I'm not familiar with the cycle lane business.....I used that road a lot in the 80's and 90's; not for the last 10 years at least. Maybe someone familiar with it can shed light here? Surely it was safer with a cycle lane? No parked cars to worry about for one. Yeah multilane roads like that with no adequate shoulder (or cycle lane) are an accident waiting to happen for cyclists. Two types of incidents spring to mind. 1. (Probably the case here). Even under light traffic conditions, perfect visibility and long straight roads, you are in danger any time that two cars are travelling close together. You may be highly visible and the first car might see you from 800 metres or more away, but if they stay in that lane and only move around you at the very last second (which is very common) then the guy behind gets only seconds to see you and react. Add to this the preference these days for large 4WD's and vans that maximally obscure the visibility of the road ahead for the following driver, plus the boredom and distraction from driving on a long straight quiet road, and it's a real danger. 2. The other situation is more of an issue when the traffic is heavier. Tailgating drivers in the center lane are too close to the car ahead to have any real visibility of the left lane ahead. Yet despite the lack of visibility they'll happily dive into that lane in a split second when they perceive that a gap is opening up there (though the apparent gap was actually just cars moving out of the way of a cyclist). BTW Fat and Old. Do you know what the speed limit is on that particular road? Last edited by uart on Wed Jun 14, 2017 9:56 pm, edited 3 times in total. Thoglette wrote:Some comments on the bike lane here too. Photos of the site in The Age coverage. They could have compromised on the bike lane issue. It would have been very easy to have three traffic lanes and still leave room for a decent marked cycle lane on each side (marked with painted bicycle icons - which really helps the more challenged motorists get the idea). With 3 lanes they could alternate one and two lanes in each direction, so as to avoid congestion points like right hand turns etc, and still provide regular overtake opportunities for slow vehicles. It was a totally stupid decision to completely scrap the cycles lanes when other options were available. Last edited by uart on Thu Jun 15, 2017 12:01 am, edited 1 time in total. Back when I used it regularly the limit was 100. Wouldn't be surprised if it was 80 now, but I don't know? uart wrote: Thoglette wrote:Some comments on the bike lane here too. Photos of the site in The Age coverage. They could have compromised on the bike lane issue. It would have been very easy to have three traffic lanes and still leave room for a decent marked cycle lane on each side (marked with painted bicycle icons - which really helps the more challenged motorists get the idea). With 3 lanes they could alternate one and two lanes in each direction, so as to avoid congestion points like right hand turns etc, and still provide regular overtake opportunities for slow vehicles. It was a totally stupid decision to completely scrap the cycles lanes when other options were available. At the least. That's why I asked if anyone here used it during the period it was cycle laned? It beggars belief that it was more dangerous to cycles then. Fast traffic sure, but almost totally local and sparse due to the freeway being parallel and close. The way they were described as one lane cars, one lane cycles (it's mostly 2 lanes each way) with the existing width suggests a pretty wide section of lane for cycles? I have no doubt as to the scenario.....cycles obscured by first car/vehicle, second car runs into them. This is a failure of design and local prejudice moreso than a failure of the driver involved imo. And meanwhile all I'm reading about is some fire overseas Edit....I just saw the screenshot of the accident in the other thread. Were they actually in a cycle lane? Say What? Something's wrong here. I'm starting to be very suspicious of the Club Presidents comments? Ross Tyson Bendigo Advertiser 14 Jun wrote:THE volatile relationship between cyclists and motorists has again been thrust into the spotlight this week following two serious incidents in our region. The first occurred on Monday morning in Macedon when a car struck a group of cyclists from behind, leaving one man fighting for his life and two others nursing serious injuries. Then, just hours later, a 45-year-old Bendigo cyclist was hospitalised with arm injuries after a crash involving a car on Howard Street, Jackass Flat. These two events highlight the dangers cyclists face every single time they don the lycra and go for a ride on road networks that are not designed with their safety at heart.....Cyclists rely on the skill and goodwill of drivers in order to make it home in one piece, but this is not a responsibility that sits well with many motorists. They view the road as their domain and regard bike riders as merely trespassers. No quarter is given, even when it is pleaded for through ringing bells and furious hand gestures. Still reporting "fighting for his life". Is there anything in press stating otherwise? fat and old wrote:This is a failure of design and local prejudice moreso than a failure of the driver involved imo. Strongly disagree. If you're travelling so close to the car in front of you that you can't see oncoming obstructions/hazards, then you are at fault IMO. Not disagreeing here. My sentiment is that had there been a cycle lane this may (depending on the riders) have been less likely. That is the fault of those who campaigned against it. Although as the accident seems to have occurred adjacent to or in a cycle lane I guess that's moot. For mine, this accident opens a can of worms in more ways than one. Thoglette....I read that one had died in an article yesty. I could have misread another story or something. Can't find anything to suggest a death today. Hopefully I was wrong. I notice that those editorials are already getting comments blaming the cyclists involved! brinkenJun 14 2017 at 5:36amWhy blame it on the driver a very likely scenario is that after the first car passed the riders drifted out into the cars path. Marnie Rogers • 2 days agoI find it ludicrous that cyclists are still permitted to share the same road as cars, trucks and other vehicles going at high speed. We would not allow roller bladers/skaters, go carts, quad bikes, mobility scooters etc on highways, and yet happily allow bike riders and then say drivers are responsible for their safety. Bicycles were a mode of transport before cars but that does not mean they should still have right of passage (excuse the pun) on public roads amongst larger, fast moving traffic.Create specific bike lanes on roads, widen footpaths to create a bike lane - charge cyclists a registration fee or toll fee to cover the costs if necessary, but stop trying to combine two very different modes of transport on public roads designed for fast moving MOTOR vehicles. Who is online About the Australian Cycling Forums The largest cycling discussion forum in Australia for all things bike; from new riders to seasoned bike nuts, the Australian Cycling Forums are a welcoming community where you can ask questions and talk about the type of bikes and cycling topics you like.
{A "SPECIAL" logo appears on the screen and spins a few times as we zoom in on it. As this happens, it turns from blue to pink.} {Music plays in the background. A calendar appears for the month of December, with most of the days crossed out in red X's. December 21st and 22nd (Friday and Saturday) become crossed out, then the camera zooms in on Sunday the 23rd. A title appears: "A new Homestar cartoon written and animated by the Brethren Chaps." This title is crossed out with a red X, and the camera pans to Monday the 24th. Another title appears: "Voices by Matt C. and Missy P." This title is then crossed out, and the camera pans to Tuesday the 25th, which is already labeled "Decemberween". This day is circled in red, and additional words appear, making the title read: "The Best Decemberween Ever". Fade out.} {Fade outside, next to Homestar's house, where it is snowing. The background music continues to play. Homestar walks out of his house wearing a brown hunter's hat. He walks a short distance and behind a brick wall, stopping next to Strong Sad, who is leaning on the wall. The music slowly fades out.} HOMESTAR RUNNER:{Sighs twice; his breath is visible. A long pause, and then he sighs again.} STRONG SAD: What's the matter, Homestar? HOMESTAR RUNNER:{Surprised} Oh! Strong Sad! I can't decide what to get Strong Bad for Decemberween. STRONG SAD: Uh... What do you mean? {Cut to a wide shot with Homestar and Strong Sad silhouetted.} HOMESTAR RUNNER: Well, I know he's kind of a jerk sometimes, and he says "holy crap" a lot, but I think if I get him the perfect present, he just might like me again. {Cut to a close-up of Strong Sad.} STRONG SAD: What? People get presents for Decemberween? I always just get locked in the bathtub! {She drops her completed sign. Cut back to the original shot of Homestar and Marzipan. The new sign reads: "DECEMBER WEEN KILLS BUNNIES"} HOMESTAR RUNNER: Now that's a good idea! {The background music starts up again. Cut to a silhouette of Homestar walking among some trees, which sway back and forth in the wind. Cut to Bubs' Concession Stand, which has lights and holiday decorations all over it. Homestar walks up.} BUBS: Hey there, Homestar, what can I do for you on this fine holiday? HOMESTAR RUNNER: I can't find a frickin' present for Strong Bad. BUBS: Well, you know what Coach Z says... {Zoom in on Homestar.} HOMESTAR RUNNER:{annoyed, and leaning back} Yes, I know! I know! {Zoom back out.} BUBS: Oh, well, take a look around. I got all types of crazy crap! {Zoom in on Homestar again.} HOMESTAR RUNNER:{holds up a NES cartridge: Tag Team Wrestling} No... {tosses it away, holds up a pair of gold, sparkling oven mitts with "SB" written in cursive letters} No... {tosses the gloves away, pulls out a Strong Sad voodoo doll with pins sticking out of it} Uh, are you allowed to sell this? {tosses the doll away, holds up a "Frampton Comes Alive" album with an autograph addressed to Strong Bad} No... {Cut to a silhouette of Bubs' Concession Stand as seen from the side. The items Homestar discarded are lying in a pile behind him.} HOMESTAR RUNNER:{holds up a rectangular object} That's it! This is the perfect present! {Cut to a field with snow-covered trees in the background. The camera pans right to show several of the characters opening or exchanging gifts. Strong Mad and The Cheat are the first to appear. The Cheat opens a gift and his head explodes. Marzipan pans into the shot, followed by Coach Z in the foreground.} STRONG BAD:{holds up his gift and shakes it} Okay, let's see what we got from Homestar here... HOMESTAR RUNNER: Open it! Open it! That one's from me. It took me forever to pick it out! STRONG BAD:{opens his gift, which turns out to be a Deep Impact DVD} What?! The Deep Impact DVD?! You got me this for like the last three years, man! HOMESTAR RUNNER: I know! And you liked it so much, I decided to get it for you again! STRONG BAD: Oh, man! This is the worst Decemberween ever! HOMESTAR RUNNER:{overlapping Strong Bad} This is the best Decemberween ever! {Cut to black, then fade back in to the field. All of the main characters except Strong Sad and Homsar are gathered together. During each chorus, everyone sings except The Poopsmith and Pom Pom. The Cheat squeaks along with the music, and Coach Z pronounces Decemberween as "Decemberwern".} When Homestar is talking to Bubs at his concession stand, you can remove some of the Christmas lights and move them around just as in the Astro Lite game. To help do this, pause the toon by right-clicking and unchecking play. A Jew's harp is an ancient Eurasian instrument, also known as a jaw harp or mouth harp. Some believe it is called a 'juice harp' because the sound of the words 'juice' and 'Jews' are similar. It should also be noted that some people consider the term Jew's harp offensive, and that the alternatives are generally preferred. <A HREF=main6.html></A> <A HREF=http://www.homestarrunner.com/xmas.html></A> <!-- text used in the movie--> <!--loading... The End Copyright 1965 Free Country USA --> This cartoon seems to have been made during a transitionary period of sorts: The animation is of the most recent style, but the voices are the type that are associated more with the previous style. Notice, for instance, Homestar's pronunciation of "Strong Bad". Also, Bubs' Concession stand still has its old "Concessions by Bubs" sign, as seen in Where's The Cheat? and A Jumping Jack Contest. The calendar at the beginning of the toon shows December having only 29 days. In Marshmallow's Last Stand, Homestar has the shape of a star on his soles. In this toon, his footprints in the snow are just lines. The introduction, with the spinning Special logo and sound effect, is a reference to the logo and sound that CBS used to preface their specials. The actual opening, used from 1973 to the late 1980s, is viewable here. This was used earlier in A Holiday Greeting, as well as in The Luau (in this case, only the music was used). Homestar wears a winter hat (similar to Charlie Brown's hat) and walks out of a house, along the low brick wall and sighs. Strong Sad's arms are also drawn with thick elbows, similar to the Peanuts characters. One of Marzipan's signs reads that Decemberween is too commercial, which is also similarly referenced in "A Charlie Brown Christmas", in which Charlie Brown thinks his dog Snoopy has gone commercial when he sees him decorating his dog house to enter a "lights and display" contest. Listerine (Coach Z's "mouthwarsh") is an over-the-counter mouthwash created by Pfizer Inc. With an alcohol concentration between 21% and 26% w/v, it is possible to get drunk off of Listerine, as demonstrated by Coach Z. However, the alcohol in Listerine is denatured, which would cause him to regurgitate it before the alcohol could take effect. Deep Impact is a 1998 science fiction film released by Paramount Pictures and DreamWorks Pictures. The interrelated stories of the plot describe events which take place surrounding the discovery of the fictional comet "Wolf-Biederman" due to impact Earth, and its subsequent approach to our planet. The first piece of Bubs' "crazy crap" that Homestar looks at is a Tag Team Wrestling game cartridge for the original NES. This game features a villain team known as the Strong Bads, the namesake of Free Country's glove-wearing email-checker (and possibly, the basis of his likeness. One of the members of the Strong Bads in the game wears a red and black mask similar to that of the better known Strong Bad from the cartoons). MATT: Yeah, same with, like, in Peanuts. Like it's—it's just a wall that's independent, by itself, I don't know if it's dividing something from... MIKE: Oh, look! It's Strong Sad's old mouth. MATT: Oh, yeah. And his funny arms! MIKE:{laughs} MATT: "The Decemberator 2000" is a great name for a Christmas tree. It's funny that we're making reference to The Yello Dello in this with Coach Z's dialogue, which now, I would, I wanna pretend The Yello Dello maybe never happened. MIKE:{laughs} MATT: No, that's not true. I remember we wrote this, uh, a lot of this driving to and from Ashville visiting with... would that've been... MIKE: "All The Real Girls" MATT: Yeah, "All The Real Girls". So Marzipan is dressed up in this, like, Decemberween, y'know, attire. She's clearly in the spirit of things, yet she's going to protest it at the same time. MIKE:{laughs} I don't think we've ever seen this wallpaper and that whole background. MATT: And that lamp... MIKE: Has that lamp shown up? MATT: I don't think so. MIKE: We usually just see Marzipan's red couch, or her blue couch, and, um, her "Thank You" painting. MATT: Right. Oooh! Woosh. {wind noises} MIKE: I like that wind. I remember thinking that was solid. MATT: There's the old "Concessions by Bubs" sign! I didn't realize, so the rest of his concession stand is still the same. But just the sign is updated. MIKE: Yeah. MATT: I thought we did a whole overhaul. The inside, too. You can see the popcorn machine and microwave that he used to have in there. MIKE:{laughs} MATT: Now he just has a couple shelves and a sno-cone machine. Is that about it? MIKE: Yeah. MATT:{regarding all the gifts that Homestar is throwing} Wait, Mike! These are all things that would be very appropriate for Strong Bad to have. MIKE: It's just... and Strong Bad liking Frampton! MATT:{laughs} That was short-lived! MIKE:{laughs} ...short-lived! MATT: It's like, "Well, if you happen to see this one part on our website, then maybe..." MATT: There's another instance of The Cheat's head exploding. That seems to happen to him a lot.
Anyone else having trouble? Anyone know when the ebook version of v.30 is coming out? The only version available here in the UK right now would cost me over £16 (about US $28) which is kind of excessive especially since I was hoping to get it on kindle anyway, having just bought my first tablet (a kindle fire). Dustin Adams wrote:There's two salesladies over there. In the past I've had a fun conversation with either Sarah or ... well I've deleted the e-mails, so I don't remember. But she exists, really she does. It seems insane that you can't just buy it electronically. All our technology and there are still these silly limitations. I wonder, if you say visited the US, could you get things from amazon.com? Or would you also need a US bank account or card to draw from? Then again, there are Amazon gift cards... But they might be coded too. What a pain. Dustin Adams wrote:It seems insane that you can't just buy it electronically. All our technology and there are still these silly limitations. I wonder, if you say visited the US, could you get things from amazon.com? Or would you also need a US bank account or card to draw from? Then again, there are Amazon gift cards... But they might be coded too. What a pain. It looks like Amazon.com will take my credit card for paper books, but for kindle books in place of the "Buy" button it just says "Kindle titles are available for UK customers on Amazon.co.uk". The kindle doesn't seem to be out yet anyway. I've tried buying epubs before from Barnes and Noble but they certainly don't take UK credit cards. The paper copy from Amazon.com is marginally cheaper but of course there's the long wait and worry that it might not arrive at all. (My problems getting paper copies of Asimov's here in the swamp are infamous). So I'll probably get it over here, or just wait and hope the ebook arrives eventually! If you (or anyone else) ever needs me to act as a go-between, I'm happy to. I have free shipping with Amazon to me, and I can package and mail overseas. We can work out reimbursement through Paypal, which converts easily between currencies.
First published in English in 1996 as Immersed in God, this 20th anniversary edition serves an anecdotal account of the life of St. Josemaria Escriva (1902-1975). Blessed Alvaro (1914-1994) was at the saint’s side for almost 40 years as his confessor, and from 1976 to his death as the Prelate of Opus Dei, was the successor to St. Josemaria. Blessed Alvaro relates dozens of accounts of Saint Josemaria’s apostolate, his service to the Church, and his personality. Many of these stories only came to light after his death, when letters and tributes poured into Rome from around the world. These lively anecdotes are gathered in 13 chapters which form a mosaic of the life of St. Josemaria and provided thousands of readers around the world with a picture of the saint, just before publication of an official three volume biography, The Founder of Opus Dei, by Andres Vazquez de Prada. Cesare Cavalleri is an Italian journalist and writer, literary critic, and director of Edizioni Ares, a Catholic publishing company based in Rome.
Failure to pay attention leads to serious accidents On behalf of Vincent J. DeSalvo, Attorney at Law posted in Car Accidents on Monday, March 28, 2016. One of the most important responsibilities of any driver is to avoid obstacles, such as other vehicles in the roadway. When a driver fails to do so, serious accidents can follow. In fact, a large number accidents that occur here in Louisiana and across the country are caused by drivers who are not paying attention to their surroundings or are impaired. Shortly before 7:30 a.m., a vehicle was headed eastbound on Louisiana 442. At the same time, a garbage truck was collecting trash at locations on the highway. The 64-year-old man driving the vehicle somehow failed to notice that the garbage truck had come to a stop and plowed into the back of it. The car driver was killed by the injuries he suffered in the crash. Unfortunately, a 33-year-old sanitation worker who was at the back of the truck collecting trash at the time was struck along with the garbage truck. He suffered serious injuries and was transported to a hospital in Hammond by helicopter. At last report, his condition was considered to be critical. Even though police do not believe impairment was a factor in the accident, toxicology tests are being performed on both drivers. The injured sanitation worker will most likely receive workers' compensation benefits to help with the financial impact this accident will have on his life and family. As would be the case in other serious accidents, he may also file a third-party personal injury claim against the estate of the deceased driver. Any damages awarded by the the court if negligence is successfully established, could supplement any benefits he receives. The use of the Internet or this form for communication with the firm or any individual member of the firm does not establish an attorney-client relationship. Confidential or time-sensitive information should not be sent through this form.
College-Bound: Transition Planning Strategies for Students With Type 1 Diabetes. Transition planning is mandated for students who receive special education services; however, it is not required for students with chronic conditions. Students with chronic conditions nearing graduation would benefit from more intensive attention to their post-high school self-care needs and responsibilities. Students with type 1 diabetes must be able to understand the necessary self-care of one of the most complicated and intensive chronic conditions yet there are no evidence-based strategies for how to help students transition from the support provided at school to independence at graduation. The need for a student with type 1diabetes to independently manage their diabetes is even greater as the student leaves home for college. School nurses, who are also certified diabetes educators, created a support group for seniors with type 1 diabetes. The group focused on life after high school and provided the students with a detailed checklist to help improve knowledge and prepare students for the transition to college. Participants felt better prepared to move on to college armed with their checklist and other resources to help when away from home.
Maoists destroy Panchayat office in Orissa Bhubaneswar, Feb 9 (IANS) Maoists Monday destroyed an office of a village council in Orissa’s Malkangiri district, the police said. The rebels entered Badigata village, some 700 km from here and destroyed over 60 percent of the building using pick axes, shovels and crowbars, inspector-in-charge of the Kalimela police station P.K. Bisoi told IANS over phone. The building was constructed a year ago and was fully functional. “Maoists are targeting official buildings in the interior areas because they fear the buildings could be used to keep police forces during forthcoming election,” he said.
EXCLUSIVE AT NET-A-PORTER.COM. Jennifer Meyer's bracelet will make a thoughtful gift for someone special. Handmade in the designer's studio, this 18-karat gold piece is detailed with delicate 'love' lettering. Wear yours solo or layer it with similar styles.
05 January 2011 how about cameron's house from ferris bueller's day off? it's for sale! The famous home is located at 370 Beech St. and is surrounded by trees. With 5,300 square feet of living space, the 4 bedroom, 3 bath home has floor-to-ceiling windows throughout. In total, the home sits on a one acre lot with 43,560 square feet. Built in 1953, this home was designed by extraordinary architects A. James Speyer and David Haid. (via) Discovery Channel is teaming with the Vatican for an unprecedented new series hunting the deadliest catch of all: Demons. The Exorcist Files will recreate stories of real-life hauntings and demonic possession, based on cases investigated by the Catholic Church. The project includes access into the Vatican’s case files, as well as interviews with the organization’s top exorcists — religious experts who are rarely seen on television. (via) the boston globe has an interesting article about the evolution of the political soundbite as a media tool, namely, the continual reduction in its average length. In the summer of 1992, just as George H. W. Bush, Bill Clinton, and Ross Perot were gearing up for their presidential race, CBS announced a new policy for its nightly news. Starting immediately, the network would not use any sound bite — that is, any footage of a candidate speaking uninterrupted — that lasted less than 30 seconds. If you’ve watched any political coverage since 1992, you know what happened: CBS’s experiment failed. This week, as Congress’s 112th session begins, the shrinking sound bite stands as a rare enemy of Republicans and Democrats alike. Whether running for president of the United States or for city council, politicians can count on seeing their words broken into ever smaller and more fragmentary bits. You might debate whom to blame — asked about nine-second sound bites, one TV executive replied, “the politicians started it” — but you can’t dispute the trend. In recent presidential elections, the average TV sound bite has dropped to a tick under eight seconds. A shorter, dumber, and shriller political discourse, it seems, has become another hazard of modern life. (via)